applied cryptography - protocols, algorithms, and source code in c

266282 757 i ingemarsson dt tang and ck wong a

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Wiley & Sons, 1968. 594. P. Gallay and E. Depret, “A Cryptography Microprocessor,” 1988 IEEE International Solid–State Circuits Conference Digest of Technical Papers, 1988, pp. 148–149. 595. R.A. Games, “There are no de Bruijn Sequences of Span n with Complexity 2n–1 + n + 1,” Journal of Combinatorical Theory, Series A, v. 34, n. 2, Mar 1983, pp. 248–251. 596. R.A. Games and A.H. Chan, “A Fast Algorithm for Determining the Complexity of a Binary Sequence with 2n,” IEEE Transactions on Information Theory, v. IT–29, n. 1, Jan 1983, pp. 144–146. 597. R.A. Games, A.H. Chan, and E.L. Key, “On the Complexity of de Bruijn Sequences,” Journal of Combinatorical Theory, Series A, v. 33, n. 1, Nov 1982, pp. 233–246. 598. S.H. Gao and G.L. Mullen, “Dickson Polynomials and Irreducible Polynomials over Finite Fields,” Journal of Number Theory, v. 49, n. 1, Oct 1994, pp. 18–132. 599. M. Gardner, “A New Kind of Cipher That Would Take Millions of Years to Break,” Scientific American, v. 237, n. 8, Aug 1977, pp. 120–124. 600. M.R. Garey and D.S. Johnson, Computers and Intractability: A Guide to the Theory of NP–Completeness, W.H. Freeman and Co., 1979. 601. S.L. Garfinkel, PGP: Pretty Good Privacy, Sebastopol, CA: O’Reilly and Associates, 1995. 602. C.W. Gardiner, “Distributed Public Key Certificate Management,” Proceedings of the Privacy and Security Research Group 1993 Workshop on Network and Distributed System Security, The Internet Society, 1993, pp. 69–73. 603. G. Garon and R. Outerbridge, “DES Watch: An Examination of the Sufficiency of the Data Encryption Standard for Financial Institution Information Security in the 1990’s,” Cryptologia, v. 15, n. 3, Jul 1991, pp. 177–193. 604. M. Gasser, A. Goldstein, C. Kaufman, and B. Lampson, “The Digital Distributed Systems Security Architecture,” Proceedings of the 12th National Computer Security Conference, NIST, 1989, pp. 305–319. 605. J. von zur Gathen, D. Kozen, and S. Landau...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online