applied cryptography - protocols, algorithms, and source code in c

331343 641 d gollmann and wg chambers clockcontrolled

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: . Desmedt and Y. Frankel, “Threshold Cryptosystems,” Advances in Cryptology—CRYPTO ’89 Proceedings, Springer–Verlag, 1990, pp. 307–315. 484. Y. Desmedt and Y. Frankel, “Shared Generation of Authentication and Signatures,” Advances in Cryptology—CRYPTO ’91 Proceedings, Springer–Verlag, 1992, pp. 457–469. 485. Y. Desmedt, C. Goutier, and S. Bengio, “Special Uses and Abuses of the Fiat–Shamir Passport Protocol,” Advances in Cryptology—CRYPTO ’87 Proceedings, Springer–Verlag, 1988, pp. 21–39. 486. Y. Desmedt and A.M. Odlykzo, “A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Problems,” Advances in Cryptology—CRYPTO ’85 Proceedings, Springer–Verlag, 1986, pp. 516–522. 487. Y. Desmedt, J.–J. Quisquater, and M. Davio, “Dependence of Output on Input in DES: Small Avalanche Characteristics,” Advances in Cryptology: Proceedings of CRYPTO 84, Springer–Verlag, 1985, pp. 359–376. 488. Y. Desmedt, J. Vandewalle, and R. Govaerts, “Critical Analysis of the Security of Knapsack Public Key Algorithms,” IEEE Transactions on Information Theory, v. IT–30, n. 4, Jul 1984, pp. 601–611. 489. Y. Desmedt and M. Yung, “Weaknesses of Undeniable Signature Schemes,” Advances in Cryptology—EUROCRYPT ’91 Proceedings, Springer–Verlag, 1991, pp. 205–220. 490. W. Diffie, lecture at IEEE Information Theory Workshop, Ithaca, N.Y., 1977. 491. W. Diffie, “Cryptographic Technology: Fifteen Year Forecast,” BNR Inc., Jan 1981. 492. W. Diffie, “The First Ten Years of Public–Key Cryptography,” Proceedings of the IEEE, v. 76, n. 5, May 1988, pp. 560–577. 493. W. Diffie, “Authenticated Key Exchange and Secure Interactive Communication,” Proceedings of SECURICOM ’90, 1990. 494. W. Diffie, “The First Ten Years of Public–Key Cryptography,” in Contemporary Cryptology: The Science of Information Integrity, G.J. Simmons, ed., IEEE Press, 1992, pp. 135–175. 495. W. Diffie and M.E. Hellman, “Multius...
View Full Document

Ask a homework question - tutors are online