Unformatted text preview: istributed System Security, The Internet Society, 1994, pp. 35–42. 352. G.C. Chiou and W.C. Chen, “Secure Broadcasting Using the Secure Lock,” IEEE Transactions on Software Engineering, v. SE–15, n. 8, Aug 1989, pp. 929–934. 353. Y.J. Choie and H.S. Hwoang, “On the Cryptosystem Using Elliptic Curves,” Proceedings of the 1993 Korea–Japan Workshop on Information Security and Cryptography, Seoul, Korea, 24–26 Oct 1993, pp. 105–113. 354. B. Chor and O. Goldreich, “RSA/Rabin Least Significant Bits are 1/2+1/poly(log N) Secure,” Advances in Cryptology: Proceedings of CRYPTO 84, Springer–Verlag, 1985, pp. 303–313. 355. B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch, “Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults,” Proceedings of the 26th Annual IEEE Symposium on the Foundations of Computer Science, 1985, pp. 383–395. 356. B. Chor and R.L. Rivest, “A Knapsack Type Public Key Cryptosystem Based on Arithmetic in Finite Fields,” Advances in Cryptology: Proceedings of CRYPTO 84, Springer–Verlag, 1985, pp. 54–65. 357. P. Christoffersson, S.–A. Ekahll, V. Fåk, S. Herda, P. Mattila, W. Price, and H.–O. Widman, Crypto Users’ Handbook: A Guide for Implementors of Cryptographic Protection in Computer Systems, North Holland: Elsevier Science Publishers, 1988. 358. R. Cleve, “Controlled Gradual Disclosure Schemes for Random Bits and Their Applications,” Advances in Cryptology—CRYPTO ’89 Proceedings, Springer–Verlag, 1990, pp. 572–588. 359. J.D. Cohen, “Improving Privacy in Cryptographic Elections,” Yale University Computer Science Department Technical Report YALEU/DCS/TR–454, Feb 1986. 360. J.D. Cohen and M.H. Fischer, “A Robust and Verifiable Cryptographically Secure Election Scheme,” Proceedings of the 26th Annual IEEE Symposium on the Foundations of Computer Science, 1985, pp. 372–382. 361. R. Cole, “A Model for Security in Distributed Systems,” Computers and Security, v. 9, n. 4, Apr 1990, pp. 319–330. 362. Comptroller General of the United Stat...
View Full Document
- Fall '10
- Cryptography, Bruce Schneier, Applied Cryptography, EarthWeb, Search Search Tips