applied cryptography - protocols, algorithms, and source code in c

424 computer security act of 1987 600601 computing

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: . 282–290. 1485. K. Smith, “Watch Out Hackers, Public Encryption Chips Are Coming,” Electronics Week, 20 May 1985, pp. 30–31. 1486. P. Smith, “LUC Public–Key Encryption,” Dr. Dobb’s Journal, v. 18, n. 1, Jan 1993, pp. 44–49. 1487. P. Smith and M. Lennon, “LUC: A New Public Key System,” Proceedings of the Ninth International Conference on Information Security, IFIP/Sec 1993, North Holland: Elsevier Science Publishers, 1993, pp. 91–111. 1488. E. Snekkenes, “Exploring the BAN Approach to Protocol Analysis,” Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991, pp. 171–181. 1489. B. Snow, “Multiple Independent Binary Bit Stream Generator,” U.S. Patent #5,237,615, 17 Aug 1993. 1490. R. Solovay and V. Strassen, “A Fast Monte–Carlo Test for Primality,” SIAM Journal on Computing, v. 6, Mar 1977, pp. 84–85; erratum in ibid, v. 7, 1978, p. 118. 1491. T. Sorimachi, T. Tokita, and M. Matsui, “On a Cipher Evaluation Method Based on Differential Cryptanalysis,” Proceedings of the 1994 Symposium on Cryptography and Information Security (SCIS 94), Lake Biwa, Japan, 27–29 Jan 1994, pp. 4C.1–9. (In Japanese.) 1492. A. Sorkin, “Lucifer, a Cryptographic Algorithm,” Cryptologia, v. 8, n. 1, Jan 1984, pp. 22–41. 1493. W. Stallings, “Kerberos Keeps the Ethernet Secure,” Data Communications, Oct 1994, pp. 103–111. 1494. W. Stallings, Network and Internetwork Security, Englewood Cliffs, N.J.: Prentice–Hall, 1995. 1495. W. Stallings, Protect Your Privacy: A Guide for PGP Users, Englewood Cliffs, N.J.: Prentice–Hall, 1995. 1496. Standards Association of Australia, “Australian Standard 2805.4 1985: Electronic Funds Transfer—Requirements for Interfaces: Part 4—Message Authentication,” SAA, North Sydney, NSW, 1985. 1497. Standards Association of Australia, “Australian Standard 2805.5 1985: Electronic Funds Transfer—Requirements for Interfaces: Part 5—Data Encipherment Algorithm,” SAA, North Sydney, NSW, 1985. 1498. Standards Association of Australia, “Australian Standard 2805.5.3: Electronic Data Transfer—Requirements for Interfaces: Part 5.3—Data Encipherment Algorithm 2,” SAA, North Sydney, NSW, 1992. 1499. J.G. Steiner, B.C. Neuman, and J.I. Schiller, “Kerberos: An Authentication Service for Open Network Systems,” USENIX Conference Proceedings, Feb 1988, pp. 191–202. 1500. J. Stern, “Secret Linear Congruential Generators Are Not Cryptograp...
View Full Document

Ask a homework question - tutors are online