applied cryptography - protocols, algorithms, and source code in c

287293 1313 v rijmen and b preneel improved

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Hash),” Proceedings of SECURICOM ’90, 1990, pp. 127–137. 1106. S. Miyaguchi, K. Ohta, and M. Iwata, “128–bit Hash Function (N–Hash),” NTT Review, v. 2, n. 6, Nov 1990, pp. 128–132. 1107. S. Miyaguchi, K. Ohta, and M. Iwata, “Confirmation that Some Hash Functions Are Not Collision Free,” Advances in Cryptology—EUROCRYPT ’90 Proceedings, Springer–Verlag, 1991, pp. 326–343. 1108. S. Miyaguchi, A. Shiraishi, and A. Shimizu, “Fast Data Encipherment Algorithm FEAL–8,” Review of the Electrical Communication Laboratories, v. 36, n. 4, 1988. 1109. H. Miyano, “Differential Cryptanalysis on CALC and Its Evaluation,” Proceedings of the 1992 Symposium on Cryptography and Information Security (SCIS 92), Tateshina, Japan, 2–4 Apr 1992, pp. 7B.1–8. 1110. R. Molva, G. Tsudik, E. van Herreweghen, and S. Zatti, “KryptoKnight Authentication and Key Distribution System,” Proceedings of European Symposium on Research in Computer Security, Toulouse, France, Nov 1992. 1111. P.L. Montgomery, “Modular Multiplication without Trial Division,” Mathematics of Computation, v. 44, n. 170, 1985, pp. 519–521. 1112. P.L. Montgomery, “Speeding the Pollard and Elliptic Curve Methods of Factorization,” Mathematics of Computation, v. 48, n. 177, Jan 1987, pp. 243–264. 1113. P.L. Montgomery and R. Silverman, “An FFT Extension to the p–1 Factoring Algorithm,” Mathematics of Computation, v. 54, n. 190, 1990, pp. 839–854. 1114. J.H. Moore, “Protocol Failures in Cryptosystems,” Proceedings of the IEEE, v. 76, n. 5, May 1988. 1115. J.H. Moore, “Protocol Failures in Cryptosystems,” in Contemporary Cryptology: The Science of Information Integrity, G.J. Simmons, ed., IEEE Press, 1992, pp. 541–558. 1116. J.H. Moore and G.J. Simmons, “Cycle Structure of the DES with Weak and Semi–Weak Keys,” Advances in Cryptology—CRYPTO ’86 Proceedings, Springer–Verlag, 1987, pp. 3–32. 1117. T. Moriyasu, M. Morii, and M. Kasahara, “Nonlinear...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online