This preview shows page 1. Sign up to view the full content.
Unformatted text preview: ernational Telecommunications Union, Geneva, 1989. 305. CCITT, Recommendation X.800, “Security Architecture for Open Systems Interconnection for CCITT Applications,” International Telephone and Telegraph, International Telecommunications Union, Geneva, 1991. 306. F. Chabaud, “On the Security of Some Cryptosystems Based on Error–Correcting Codes,” Advances in Cryptology—EUROCRYPT ’94 Proceedings, Springer–Verlag, 1995, to appear. 307. F. Chabaud and S. Vaudenay, “Links Between Differential and Linear Cryptanalysis,” Advances in Cryptology—EUROCRYPT ’94 Proceedings, Springer–Verlag, 1995, to appear. 308. W.G. Chambers and D. Gollmann, “Generators for Sequences with Near–Maximal Linear Equivalence,” IEE Proceedings, V. 135, Pt. E, n. 1, Jan 1988, pp. 67–69. 309. W.G. Chambers and D. Gollmann, “Lock–In Effect in Cascades of Clock–Controlled Shirt Registers,” Advances in Cryptology—EUROCRYPT ’88 Proceedings, Springer–Verlag, 1988, pp. 331–343. 310. A. Chan and R. Games, “On the Linear Span of Binary Sequences from Finite Geometries,” Advances in Cryptology—CRYPTO ’86 Proceedings, Springer–Verlag, 1987, pp. 405–417. 311. J.P. Chandler, D.C. Arrington, D.R. Berkelhammer, and W.L. Gill, “Identification and Analysis of Foreign Laws and Regulations Pertaining to the Use of Commercial Encryption Products for Voice and Data Communications,” National Intellectual Property Law Institute, George Washington University, Washington, D.C., Jan 1994. 312. C.C. Chang and S.J. Hwang, “Cryptographic Authentication of Passwords,” Proceedings of the 25th Annual 1991 IEEE International Carnahan Conference on Security Technology, Taipei, Taiwan, 1–3 Oct 1991, pp. 126–130. 313. C.C. Chang and S.J. Hwang, “A Strategy for Transforming Public–Key Cryptosystems into Identity–Based Cryptosystems,” Proceedings of the 25th Annual 1991 IEEE International Carnahan Conference on Security Technology, Taipei, Taiwan, 1–3 Oc...
View Full Document
- Fall '10