applied cryptography - protocols, algorithms, and source code in c

4 1992 pp 5763 in russian 1448 vm sidenikov and so

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: gnature Scheme Based on Quadratic Inequalities,” Proceedings of the 1985 Symposium on Security and Privacy, IEEE, Apr 1985, pp. 123–132. 1216. J.D. Olsen, R.A. Scholtz, and L.R. Welch, “Bent Function Sequences,” IEEE Transactions on Information Theory, v. IT–28, n. 6, Nov 1982, pp. 858–864. 1217. H. Ong and C.P. Schnorr, “Signatures through Approximate Representations by Quadratic Forms,” Advances in Cryptology: Proceedings of Crypto 83, Plenum Press, 1984. 1218. H. Ong and C.P. Schnorr, “Fast Signature Generation with a Fiat Shamir–Like Scheme,” Advances in Cryptology—EUROCRYPT ’90 Proceedings, Springer–Verlag, 1991, pp. 432–440. 1219. H. Ong, C.P. Schnorr, and A. Shamir, “An Efficient Signature Scheme Based on Polynomial Equations,” Proceedings of the 16th Annual Symposium on the Theory of Computing, 1984, pp. 208–216. 1220. H. Ong, C.P. Schnorr, and A. Shamir, “Efficient Signature Schemes Based on Polynomial Equations,” Advances in Cryptology: Proceedings of CRYPTO 84, Springer–Verlag, 1985, pp. 37–46. 1221. Open Shop Information Services, OSIS Security Aspects, OSIS European Working Group, WG1, final report, Oct 1985. 1222. G.A. Orton, M.P. Roy, P.A. Scott, L.E. Peppard, and S.E. Tavares, “VLSI Implementation of Public–Key Encryption Algorithms,” Advances in Cryptology— CRYPTO ’86 Proceedings, Springer–Verlag, 1987, pp. 277–301. 1223. H. Orup, E. Svendsen, and E. Andreasen, “VICTOR—An Efficient RSA Hardware Implementation,” Advances in Cryptology—EUROCRYPT ’90 Proceedings, Springer–Verlag, 1991, pp. 245–252. 1224. D. Otway and O. Rees, “Efficient and Timely Mutual Authentication,” Operating Systems Review, v. 21, n. 1, 1987, pp. 8–10. 1225. G. Pagels–Fick, “Implementation Issues for Master Key Distribution and Protected Keyload Procedures,” Computers and Security: A Global Challenge, Proceedings of IFIP/SEC ’83, North Holland: Elsevier Science Publishers, 1984, pp. 381–390. 1226. C.M. Pa...
View Full Document

Ask a homework question - tutors are online