applied cryptography - protocols, algorithms, and source code in c

334 d chaum c crpeau and ib damgrd multiparty

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: um on Theory of Computing, 1988, pp. 103–112. 199. M. Blum and S. Goldwasser, “An Efficient Probabilistic Public–Key Encryption Scheme Which Hides All Partial Information,” Advances in Cryptology: Proceedings of CRYPTO 84, Springer–Verlag, 1985, pp. 289–299. 200. M. Blum and S. Micali, “How to Generate Cryptographically–Strong Sequences of Pseudo–Random Bits,” SIAM Journal on Computing, v. 13, n. 4, Nov 1984, pp. 850–864. 201. B. den Boer, “Cryptanalysis of F.E.A.L.,” Advances in Cryptology—EUROCRYPT ’88 Proceedings, Springer–Verlag, 1988, pp. 293–300. 202. B. den Boer and A. Bosselaers, “An Attack on the Last Two Rounds of MD4,” Advances in Cryptology—CRYPTO ’91 Proceedings, Springer–Verlag, 1992, pp. 194–203. 203. B. den Boer and A. Bosselaers, “Collisions for the Compression Function of MD5,” Advances in Cryptology—EUROCRYPT ’93 Proceedings, Springer–Verlag, 1994, pp. 293–304. 204. J.–P. Boly, A. Bosselaers, R. Cramer, R. Michelsen, S. Mjølsnes, F. Muller, T. Pedersen, B. Pfitzmann, P. de Rooij, B. Schoenmakers, M. Schunter, L. Vallée, and M. Waidner, “Digital Payment Systems in the ESPRIT Project CAFE,” Securicom 94, Paris, France, 2–6 Jan 1994, pp. 35–45. 205. J.–P. Boly, A. Bosselaers, R. Cramer, R. Michelsen, S. Mjølsnes, F. Muller, T. Pedersen, B. Pfitzmann, P. de Rooij, B. Schoenmakers, M. Schunter, L. Vallée, and M. Waidner, “The ESPRIT Project CAFE—High Security Digital Payment System,” Computer Security—ESORICS 94, Springer–Verlag, 1994, pp. 217–230. 206. D.J. Bond, “Practical Primality Testing,” Proceedings of IEE International Conference on Secure Communications Systems, 22–23 Feb 1984, pp. 50–53. 207. H. Bonnenberg, Secure Testing of VSLI Cryptographic Equipment, Series in Microelectronics, Vol. 25, Konstanz: Hartung Gorre Verlag, 1993. 208. H. Bonnenberg, A. Curiger, N. Felber, H. Kaeslin, and X. Lai, “VLSI Implementation of a New Block Cipher,” Proceedings of the IEEE International Conference on Computer Design: VLSI in Computer...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online