applied cryptography - protocols, algorithms, and source code in c

31 n 6 jun 1988 pp 742749 774 942 p lecuyer random

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 28, n. 5, Sep 1982, pp. 714–720. 758. ISO DIS 8730, “Banking—Requirements for Message Authentication (Wholesale),” Association for Payment Clearing Services, London, Jul 1987. 759. ISO DIS 8731–1, “Banking—Approved Algorithms for Message Authentication—Part 1: DEA,” Association for Payment Clearing Services, London, 1987. 760. ISO DIS 8731–2, “Banking—Approved Algorithms for Message Authentication—Part 2: Message Authenticator Algorithm,” Association for Payment Clearing Services, London, 1987. 761. ISO DIS 8732, “Banking—Key Management (Wholesale),” Association for Payment Clearing Services, London, Dec 1987. 762. ISO/IEC 9796, “Information Technology—Security Techniques—Digital Signature Scheme Giving Message Recovery,” International Organization for Standardization, Jul 1991. 763. ISO/IEC 9797, “Data Cryptographic Techniques—Data Integrity Mechanism Using a Cryptographic Check Function Employing a Block Cipher Algorithm,” International Organization for Standardization, 1989. 764. ISO DIS 10118 DRAFT, “Information Technology—Security Techniques—Hash Functions,” International Organization for Standardization, 1989. 765. ISO DIS 10118 DRAFT, “Information Technology—Security Techniques—Hash Functions,” International Organization for Standardization, April 1991. 766. ISO N98, “Hash Functions Using a Pseudo Random Algorithm,” working document, ISO–IEC/JTC1/SC27/WG2, International Organization for Standardization, 1992. 767. ISO N179, “AR Fingerprint Function,” working document, ISO–IEC/JTC1/SC27/ WG2, International Organization for Standardization, 1992. 768. ISO/IEC 10118, “Information Technology—Security Techniques—Hash Functions—Part 1: General and Part 2: Hash–Functions Using an n–Bit Block Cipher Algorithm,” International Organization for Standardization, 1993. 769. K. Ito, S. Kondo, and Y. Mitsuoka, “SXAL8/MBAL Algorithm,” Technical Report, ISEC93–68, IEICE Japan, 1993....
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online