applied cryptography - protocols, algorithms, and source code in c

266282 757 i ingemarsson dt tang and ck wong a

Info icon This preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Wiley & Sons, 1968. 594. P. Gallay and E. Depret, “A Cryptography Microprocessor,” 1988 IEEE International Solid–State Circuits Conference Digest of Technical Papers, 1988, pp. 148–149. 595. R.A. Games, “There are no de Bruijn Sequences of Span n with Complexity 2n–1 + n + 1,” Journal of Combinatorical Theory, Series A, v. 34, n. 2, Mar 1983, pp. 248–251. 596. R.A. Games and A.H. Chan, “A Fast Algorithm for Determining the Complexity of a Binary Sequence with 2n,” IEEE Transactions on Information Theory, v. IT–29, n. 1, Jan 1983, pp. 144–146. 597. R.A. Games, A.H. Chan, and E.L. Key, “On the Complexity of de Bruijn Sequences,” Journal of Combinatorical Theory, Series A, v. 33, n. 1, Nov 1982, pp. 233–246. 598. S.H. Gao and G.L. Mullen, “Dickson Polynomials and Irreducible Polynomials over Finite Fields,” Journal of Number Theory, v. 49, n. 1, Oct 1994, pp. 18–132. 599. M. Gardner, “A New Kind of Cipher That Would Take Millions of Years to Break,” Scientific American, v. 237, n. 8, Aug 1977, pp. 120–124. 600. M.R. Garey and D.S. Johnson, Computers and Intractability: A Guide to the Theory of NP–Completeness, W.H. Freeman and Co., 1979. 601. S.L. Garfinkel, PGP: Pretty Good Privacy, Sebastopol, CA: O’Reilly and Associates, 1995. 602. C.W. Gardiner, “Distributed Public Key Certificate Management,” Proceedings of the Privacy and Security Research Group 1993 Workshop on Network and Distributed System Security, The Internet Society, 1993, pp. 69–73. 603. G. Garon and R. Outerbridge, “DES Watch: An Examination of the Sufficiency of the Data Encryption Standard for Financial Institution Information Security in the 1990’s,” Cryptologia, v. 15, n. 3, Jul 1991, pp. 177–193. 604. M. Gasser, A. Goldstein, C. Kaufman, and B. Lampson, “The Digital Distributed Systems Security Architecture,” Proceedings of the 12th National Computer Security Conference, NIST, 1989, pp. 305–319. 605. J. von zur Gathen, D. Kozen, and S. Landau...
View Full Document

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern