applied cryptography - protocols, algorithms, and source code in c

332 1117 t moriyasu m morii and m kasahara nonlinear

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ger–Verlag, 1991, pp. 237–246. 918. J.B. Lacy, D.P. Mitchell, and W.M. Schell, “CryptoLib: Cryptography in Software,” UNIX Security Symposium IV Proceedings, USENIX Association, 1993, pp. 1–17. 919. J.C. Lagarias, “Knapsack Public Key Cryptosystems and Diophantine Approximations,” Advances in Cryptology: Proceedings of Crypto 83, Plenum Press, 1984, pp. 3–23. 920. J.C. Lagarias, “Performance Analysis of Shamir’s Attack on the Basic Merkle–Hellman Knapsack Cryptosystem,” Lecture Notes in Computer Science 172; Proceedings of the 11th International Colloquium on Automata, Languages, and Programming (ICALP), Springer–Verlag, 1984, pp. 312–323. 921. J.C. Lagarias and A.M. Odlyzko, “Solving Low–Density Subset Sum Problems,” Proceedings of the 24th IEEE Symposium on Foundations of Computer Science, 1983, pp. 1–10. 922. J.C. Lagarias and A.M. Odlyzko, “Solving Low–Density Subset Sum Problems,” Journal of the ACM, v. 32, n. 1, Jan 1985, pp. 229–246. 923. J.C. Lagarias and J. Reeds, “Unique Extrapolation of Polynomial Recurrences,” SIAM Journal on Computing, v. 17, n. 2, Apr 1988, pp. 342–362. 924. X. Lai, Detailed Description and a Software Implementation of the IPES Cipher, unpublished manuscript, 8 Nov 1991. 925. X. Lai, On the Design and Security of Block Ciphers, ETH Series in Information Processing, v. 1, Konstanz: Hartung–Gorre Verlag, 1992. 926. X. Lai, personal communication, 1993. 927. X. Lai, “Higher Order Derivatives and Differential Cryptanalysis,” Communications and Cryptography: Two Sides of One Tapestry, R.E. Blahut et al., eds., Kluwer Adademic Publishers, 1994, pp. 227–233. 928. X. Lai and L. Knudsen, “Attacks on Double Block Length Hash Functions,” Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer–Verlag, 1994, pp. 157–165. 929. X. Lai and J. Massey, “A Proposal for a New Block Encryption Standard,” Advances in Cryptology—EUROCRYPT ’90 Proceedings, Springer–Verlag, 1991, pp. 389–404. 930. X. Lai and J. Massey,...
View Full Document

Ask a homework question - tutors are online