applied cryptography - protocols, algorithms, and source code in c

3 jul 1992 pp 193214 1585 p wayner mimic functions and

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: nces in Cryptology—EUROCRYPT ’85, Springer–Verlag, 1986, pp. 260–272. 1359. R.A. Rueppel, “When Shift Registers Clock Themselves,” Advances in Cryptology—EUROCRYPT ’87 Proceedings, Springer–Verlag, 1987, pp. 53–64. 1360. R.A. Rueppel, “Security Models and Notions for Stream Ciphers,” Cryptography and Coding II, C. Mitchell, ed., Oxford: Clarendon Press, 1992, pp. 213–230. 1361. R.A. Rueppel, “On the Security of Schnorr’s Pseudo–Random Sequence Generator,” Advances in Cryptology—EUROCRYPT ’89 Proceedings, Springer–Verlag, 1990, pp. 423–428. 1362. R.A. Rueppel, “Stream Ciphers,” Contemporary Cryptology: The Science of Information Integrity, G.J. Simmons, ed., IEEE Press, 1992, pp. 65–134. 1363. R.A. Rueppel and J.L. Massey, “The Knapsack as a Nonlinear Function,” IEEE International Symposium on Information Theory, Brighton, UK, May 1985. 1364. R.A. Rueppel and O.J. Staffelbach, “Products of Linear Recurring Sequences with Maximum Complexity,” IEEE Transactions on Information Theory, v. IT–33, n. 1, Jan 1987, pp. 124–131. 1365. D. Russell and G.T. Gangemi, Computer Security Basics, O’Reilly and Associates, Inc., 1991. 1366. S. Russell and P. Craig, “Privacy Enhanced Mail Modules for ELM,” Proceedings of the Internet Society 1994 Workshop on Network and Distributed System Security, The Internet Society, 1994, pp. 21–34. 1367. D.F.H. Sadok and J. Kelner, “Privacy Enhanced Mail Design and Implementation Perspectives,” Computer Communications Review, v. 24, n. 3, Jul 1994, pp. 38–46. 1368. K. Sakano, “Digital Signatures with User–Flexible Reliability,” Proceedings of the 1993 Symposium on Cryptography and Information Security (SCIS 93), Shuzenji, Japan, 28–30 Jan 1993, pp. 5C.1–8. 1369. K. Sakano, C. Park, and K. Kurosawa, “(k,n) Threshold Undeniable Signature Scheme,” Proceedings of the 1993 Korea–Japan Workshop on Information Security and Cryptography, Seoul, Korea, 24–26 Oct 1993, pp. 184–193. 1370. K. Sako, “Electronic Voting Schemes...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online