Unformatted text preview: er Cryptographic Techniques,” Proceedings of AFIPS National Computer Conference, 1976, pp. 109–112. 496. W. Diffie and M.E. Hellman, “New Directions in Cryptography,” IEEE Transactions on Information Theory, v. IT–22, n. 6, Nov 1976, pp. 644–654. 497. W. Diffie and M.E. Hellman, “Exhaustive Cryptanalysis of the NBS Data Encryption Standard,” Computer, v. 10, n. 6, Jun 1977, pp. 74–84. 498. W. Diffie and M.E. Hellman, “Privacy and Authentication: An Introduction to Cryptography,” Proceedings of the IEEE, v. 67, n. 3, Mar 1979, pp. 397–427. 499. W. Diffie, L. Strawczynski, B. O’Higgins, and D. Steer, “An ISDN Secure Telephone Unit,” Proceedings of the National Telecommunications Forum, v. 41, n. 1, 1987, pp. 473–477. 500. W. Diffie, P.C. van Oorschot, and M.J. Wiener, “Authentication and Authenticated Key Exchanges,” Designs, Codes and Cryptography, v. 2, 1992, 107–125. 501. C. Ding, “The Differential Cryptanalysis and Design of Natural Stream Ciphers,” Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer–Verlag, 1994, pp. 101–115. 502. C. Ding, G. Xiao, and W. Shan, The Stability Theory of Stream Ciphers, Springer–Verlag, 1991. 503. A. Di Porto and W. Wolfowicz, “VINO: A Block Cipher Including Variable Permutations,” Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer–Verlag, 1994, pp. 205–210. 504. B. Dixon and A.K. Lenstra, “Factoring Integers Using SIMD Sieves,” Advances in Cryptology—EUROCRYPT ’93 Proceedings, Springer–Verlag, 1994, pp. 28–39. 505. J.D. Dixon, “Factorization and Primality Tests,” American Mathematical Monthly, v. 91, n. 6, 1984, pp. 333–352. 506. D. Dolev and A. Yao, “On the Security of Public Key Protocols,” Proceedings of the 22nd Annual Symposium on the Foundations of Computer Science, 1981, pp. 350– 357. 507. L.X. Duan and C.C. Nian, “Modified Lu–Lee Cryptosystems,” Electronics Letters, v. 25, n. 13, 22 Jun 1989, p. 826. 508. R. Durstenfeld, “...
View
Full Document
 Fall '10
 ALIULGER
 Cryptography, Bruce Schneier, Applied Cryptography, EarthWeb, Search Search Tips

Click to edit the document details