This preview shows page 1. Sign up to view the full content.
Unformatted text preview: rivacy, IEEE Computer Society, Apr 1985, pp. 116–122. 186. M. Blaze, “A Cryptographic File System for UNIX,” 1st ACM Conference on Computer and Communications Security, ACM Press, 1993, pp. 9–16. 187. M. Blaze, “Protocol Failure in the Escrowed Encryption Standard,” 2nd ACM Conference on Computer and Communications Security, ACM Press, 1994, pp. 59–67. 188. M. Blaze, “Key Management in an Encrypting File System,” Proceedings of the Summer 94 USENIX Conference, USENIX Association, 1994, pp. 27–35. 189. M. Blaze and B. Schneier, “The MacGuffin Block Cipher Algorithm,” K.U. Leuven Workshop on Cryptographic Algorithms, Springer–Verlag, 1995, to appear. 190. U. Blöcher and M. Dichtl, “Fish: A Fast Software Stream Cipher,” Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer–Verlag, 1994, pp. 41–44. 191. R. Blom, “Non–Public Key Distribution,” Advances in Cryptology: Proceedings of Crypto 82, Plenum Press, 1983, pp. 231–236. 192. K.J. Blow and S.J.D. Phoenix, “On a Fundamental Theorem of Quantum Cryptography,” Journal of Modern Optics, v. 40, n. 1, Jan 1993, pp. 33–36. 193. L. Blum, M. Blum, and M. Shub, “A Simple Unpredictable Pseudo–Random Number Generator,” SIAM Journal on Computing, v. 15, n. 2, 1986, pp. 364–383. 194. M. Blum, “Coin Flipping by Telephone: A Protocol for Solving Impossible Problems,” Proceedings of the 24th IEEE Computer Conference (CompCon), 1982, pp. 133–137. 195. M. Blum, “How to Exchange (Secret) Keys,” ACM Transactions on Computer Systems, v. 1, n. 2, May 1983, pp. 175–193. 196. M. Blum, “How to Prove a Theorem So No One Else Can Claim It,” Proceedings of the International Congress of Mathematicians, Berkeley, CA, 1986, pp. 1444–1451. 197. M. Blum, A. De Santis, S. Micali, and G. Persiano, “Noninteractive Zero–Knowledge,” SIAM Journal on Computing, v. 20, n. 6, Dec 1991, pp. 1084–1118. 198. M. Blum, P. Feldman, and S. Micali, “Non–Interactive Zero–Knowledge and Its Applications,” Proceedings of the 20th ACM Symposi...
View
Full
Document
This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.
 Fall '10
 ALIULGER
 Cryptography

Click to edit the document details