applied cryptography - protocols, algorithms, and source code in c

24 n 7 1981 pp 465467 1076 m merritt cryptographic

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: raphy,” Proceedings of the National Telecommunication Conference, IEEE Press, 1980, pp. 49.1.1–49.1.5. 885. K. Koyama, “A Master Key for the RSA Public–Key Cryptosystem,” Transactions of the Institute of Electronics, Information, and Communication Engineers, v. J65–D, n. 2, Feb 1982, pp. 163–170. 886. K. Koyama, “A Cryptosystem Using the Master Key for Multi–Address Communications,” Transactions of the Institute of Electronics, Information, and Communication Engineers, v. J65–D, n. 9, Sep 1982, pp. 1151–1158. 887. K. Koyama, “Demonstrating Membership of a Group Using the Shizuya–Koyama–Itoh (SKI) Protocol,” Proceedings of the 1989 Symposium on Cryptography and Information Security (SCIS 89), Gotenba, Japan, 1989. 888. K. Koyama, “Direct Demonstration of the Power to Break Public–Key Cryptosystems,” Advances in Cryptology—AUSCRYPT ’90 Proceedings, Springer–Verlag, 1990, pp. 14–21. 889. K. Koyama, “Security and Unique Decipherability of Two–dimensional Public Key Cryptosystems,” Transactions of the Institute of Electronics, Information, and Communication Engineers, v. E73, n. 7, Jul 1990, pp. 1057–1067. 890. K. Koyama, U.M. Maurer, T. Okamoto, and S.A. Vanstone, “New Public–Key Schemes Based on Elliptic Curves over the Ring Zn,” Advances in Cryptology—CRYPTO ’91 Proceedings, Springer–Verlag, 1992, pp. 252–266. 891. K. Koyama and K. Ohta, “Identity–based Conference Key Distribution System,” Advances in Cryptology—CRYPTO ’87 Proceedings, Springer–Verlag, 1988, pp. 175–184. 892. K. Koyama and T. Okamoto, “Elliptic Curve Cryptosystems and Their Applications,” IEICE Transactions on Information and Systems, v. E75–D, n. 1, Jan 1992, pp. 50–57. 893. K. Koyama and R. Terada, “How to Strengthen DES–Like Cryptosystems against Differential Cryptanalysis,” Transactions of the Institute of Electronics, Information, and Communication Engineers, v. E76–A, n. 1, Jan 1993, pp. 63–69. 894. K. Koyama and R. Terada, “...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online