applied cryptography - protocols, algorithms, and source code in c

307 f chabaud and s vaudenay links between

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Janson, S. Kutten, R. Molva, and M. Yung, “A Modular Family of Secure Protocols for Authentication and Key Distribution,” IEEE/ACM Transactions on Networking, to appear. 176. M. Bishop, “An Application for a Fast Data Encryption Standard Implementation,” Computing Systems, v. 1, n. 3, 1988, pp. 221–254. 177. M. Bishop, “Privacy–Enhanced Electronic Mail,” Distributed Computing and Cryptography, J. Feigenbaum and M. Merritt, eds., American Mathematical Society, 1991, pp. 93–106. 178. M. Bishop, “Privacy–Enhanced Electronic Mail,” Internetworking: Research and Experience, v. 2, n. 4, Dec 1991, pp. 199–233. 179. M. Bishop, “Recent Changes to Privacy Enhanced Electronic Mail,” Internetworking: Research and Experience, v. 4, n. 1, Mar 1993, pp. 47–59. 180. I.F. Blake, R. Fuji–Hara, R.C. Mullin, and S.A. Vanstone, “Computing Logarithms in Finite Fields of Characteristic Two,” SIAM Journal on Algebraic Discrete Methods, v. 5, 1984, pp. 276–285. 181. I.F. Blake, R.C. Mullin, and S.A. Vanstone, “Computing Logarithms in GF (2n),” Advances in Cryptology: Proceedings of CRYPTO 84, Springer–Verlag, 1985, pp. 73–82. 182. G.R. Blakley, “Safeguarding Cryptographic Keys,” Proceedings of the National Computer Conference, 1979, American Federation of Information Processing Societies, v. 48, 1979, pp. 313–317. 183. G.R. Blakley, “One–Time Pads are Key Safeguarding Schemes, Not Cryptosystems—Fast Key Safeguarding Schemes (Threshold Schemes) Exist,” Proceedings of the 1980 Symposium on Security and Privacy, IEEE Computer Society, Apr 1980, pp. 108–113. 184. G.R. Blakley and I. Borosh, “Rivest–Shamir–Adleman Public Key Cryptosystems Do Not Always Conceal Messages,” Computers and Mathematics with Applications, v. 5, n. 3, 1979, pp. 169–178. 185. G.R. Blakley and C. Meadows, “A Database Encryption Scheme which Allows the Computation of Statistics Using Encrypted Data,” Proceedings of the 1985 Symposium on Security and P...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online