{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

applied cryptography - protocols, algorithms, and source code in c

257262 654 m goresky and a klapper feedback registers

Info icon This preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: er Cryptographic Techniques,” Proceedings of AFIPS National Computer Conference, 1976, pp. 109–112. 496. W. Diffie and M.E. Hellman, “New Directions in Cryptography,” IEEE Transactions on Information Theory, v. IT–22, n. 6, Nov 1976, pp. 644–654. 497. W. Diffie and M.E. Hellman, “Exhaustive Cryptanalysis of the NBS Data Encryption Standard,” Computer, v. 10, n. 6, Jun 1977, pp. 74–84. 498. W. Diffie and M.E. Hellman, “Privacy and Authentication: An Introduction to Cryptography,” Proceedings of the IEEE, v. 67, n. 3, Mar 1979, pp. 397–427. 499. W. Diffie, L. Strawczynski, B. O’Higgins, and D. Steer, “An ISDN Secure Telephone Unit,” Proceedings of the National Telecommunications Forum, v. 41, n. 1, 1987, pp. 473–477. 500. W. Diffie, P.C. van Oorschot, and M.J. Wiener, “Authentication and Authenticated Key Exchanges,” Designs, Codes and Cryptography, v. 2, 1992, 107–125. 501. C. Ding, “The Differential Cryptanalysis and Design of Natural Stream Ciphers,” Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer–Verlag, 1994, pp. 101–115. 502. C. Ding, G. Xiao, and W. Shan, The Stability Theory of Stream Ciphers, Springer–Verlag, 1991. 503. A. Di Porto and W. Wolfowicz, “VINO: A Block Cipher Including Variable Permutations,” Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer–Verlag, 1994, pp. 205–210. 504. B. Dixon and A.K. Lenstra, “Factoring Integers Using SIMD Sieves,” Advances in Cryptology—EUROCRYPT ’93 Proceedings, Springer–Verlag, 1994, pp. 28–39. 505. J.D. Dixon, “Factorization and Primality Tests,” American Mathematical Monthly, v. 91, n. 6, 1984, pp. 333–352. 506. D. Dolev and A. Yao, “On the Security of Public Key Protocols,” Proceedings of the 22nd Annual Symposium on the Foundations of Computer Science, 1981, pp. 350– 357. 507. L.X. Duan and C.C. Nian, “Modified Lu–Lee Cryptosystems,” Electronics Letters, v. 25, n. 13, 22 Jun 1989, p. 826. 508. R. Durstenfeld, “...
View Full Document

{[ snackBarMessage ]}