applied cryptography - protocols, algorithms, and source code in c

3341 1461 gj simmons cryptology encyclopedia

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: padimitriou, Computational Complexity, Addison–Wesley, 1994. 1227. C.S. Park, “Improving Code Rate of McEliece’s Public–key Cryptosystem,” Electronics Letters, v. 25, n. 21, 12 Oct 1989, pp. 1466–1467. 1228. S. Park, Y. Kim, S. Lee, and K. Kim, “Attacks on Tanaka’s Non–interactive Key Sharing Scheme,” Proceedings of the 1995 Symposium on Cryptography and Information Security (SCIS 95), Inuyama, Japan, 24–27 Jan 1995, pp. B3.4.1–4. 1229. S.J. Park, K.H. Lee, and D.H. Won, “An Entrusted Undeniable Signature,” Proceedings of the 1995 Japan–Korea Workshop on Information Security and Cryptography, Inuyama, Japan, 24–27 Jan 1995, pp. 120–126. 1230. S.J. Park, K.H. Lee, and D.H. Won, “A Practical Group Signature,” Proceedings of the 1995 Japan–Korea Workshop on Information Security and Cryptography, Inuyama, Japan, 24–27 Jan 1995, pp. 127–133. 1231. S.K. Park and K.W. Miller, “Random Number Generators: Good Ones Are Hard to Find,” Communications of the ACM, v. 31, n. 10, Oct 1988, pp. 1192–1201. 1232. J. Patarin, “How to Find and Avoid Collisions for the Knapsack Hash Function,” Advances in Cryptology—EUROCRYPT ’93 Proceedings, Springer–Verlag, 1994, pp. 305–317. 1233. W. Patterson, Mathematical Cryptology for Computer Scientists and Mathematicians, Totowa, N.J.: Rowman & Littlefield, 1987. 1234. W.H. Payne, “Public Key Cryptography Is Easy to Break,” William H. Payne, unpublished manuscript, 16 Oct 90. 1235. T.P. Pederson, “Distributed Provers with Applications to Undeniable Signatures,” Advances in Cryptology—EUROCRYPT ’91 Proceedings, Springer–Verlag, 1991, pp. 221–242. 1236. S. Peleg and A. Rosenfield, “Breaking Substitution Ciphers Using a Relaxation Algorithm,” Communications of the ACM, v. 22, n. 11, Nov 1979, pp. 598–605. 1237. R. Peralta, “Simultaneous Security of Bits in the Discrete Log,” Advances in Cryptology—EUROCRYPT ’85, Springer–Verlag, 1986, pp. 62–72. 1238. I. Peterson,...
View Full Document

Ask a homework question - tutors are online