applied cryptography - protocols, algorithms, and source code in c

4757 1643 y zheng t matsumoto and h imai impossibility

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Chip Solution,” Advances in Cryptology—EUROCRYPT ’87 Proceedings, Springer–Verlag, 1988, pp. 95–105. 1410. H. Sedlack and U. Golze, “An RSA Cryptography Processor,” Microprocessing and Microprogramming, v. 18, 1986, pp. 583–590. 1411. E.S. Selmer, Linear Recurrence over Finite Field, University of Bergen, Norway, 1966. 1412. J.O. Shallit, “On the Worst Case of Three Algorithms for Computing the Jacobi Symbol,” Journal of Symbolic Computation, v. 10, n. 6, Dec 1990, pp. 593–610. 1413. A. Shamir, “A Fast Signature Scheme,” MIT Laboratory for Computer Science, Technical Memorandum, MIT/LCS/TM–107, Massachusetts Institute of Technology, Jul 1978. 1414. A. Shamir, “How to Share a Secret,” Communications of the ACM, v. 24, n. 11, Nov 1979, pp. 612–613. 1415. A. Shamir, “On the Cryptocomplexity of Knapsack Systems,” Proceedings of the 11th ACM Symposium on the Theory of Computing, 1979, pp. 118–129. 1416. A. Shamir, “The Cryptographic Security of Compact Knapsacks,” MIT Library for Computer Science, Technical Memorandum, MIT/LCS/TM–164, Massachusetts Institute of Technology, 1980. 1417. A. Shamir, “On the Generation of Cryptographically Strong Pseudo–Random Sequences,” Lecture Notes in Computer Science 62: 8th International Colloquium on Automata, Languages, and Programming, Springer–Verlag, 1981. 1418. A. Shamir, “A Polynomial Time Algorithm for Breaking the Basic Merkle–Hellman Cryptosystem,” Advances in Cryptology: Proceedings of Crypto 82, Plenum Press, 1983, pp. 279–288. 1419. A. Shamir, “A Polynomial Time Algorithm for Breaking the Basic Merkle–Hellman Cryptosystem,” Proceedings of the 23rd IEEE Symposium on the Foundations of Computer Science, 1982, pp. 145–152. 1420. A. Shamir, “On the Generation of Cryptographically Strong Pseudo–Random Sequences,” ACM Transactions on Computer Systems, v. 1, n. 1, Feb 1983, pp. 38–44. 1421. A. Shamir, “A Polynomial Time Algorithm for Breaking the Basic Merkle...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online