applied cryptography - protocols, algorithms, and source code in c

514 wf ehrsam chw meyer rl powers jl smith and

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: es, “Matter of National Institute of Standards and Technology—Use of Electronic Data Interchange Technology to Create Valid Obligations,” File B–245714, 13 Dec 1991. 363. M.S. Conn, letter to Joe Abernathy, National Security Agency, Ser: Q43–111–92, 10 Jun 1992. 364. C. Connell, “An Analysis of NewDES: A Modified Version of DES,” Cryptologia, v. 14, n. 3, Jul 1990, pp. 217–223. 365. S.A. Cook, “The Complexity of Theorem–Proving Procedures,” Proceedings of the 3rd Annual ACM Symposium on the Theory of Computing, 1971, pp. 151–158. 366. R.H. Cooper and W. Patterson, “A Generalization of the Knapsack Method Using Galois Fields,” Cryptologia, v. 8, n. 4, Oct 1984, pp. 343–347. 367. R.H. Cooper and W. Patterson, “RSA as a Benchmark for Multiprocessor Machines,” Advances in Cryptology—AUSCRYPT ’90 Proceedings, Springer–Verlag, 1990, pp. 356–359. 368. D. Coppersmith, “Fast Evaluation of Logarithms in Fields of Characteristic Two,” IEEE Transactions on Information Theory, v. 30, n. 4, Jul 1984, pp. 587–594. 369. D. Coppersmith, “Another Birthday Attack,” Advances in Cryptology—CRYPTO ’85 Proceedings, Springer–Verlag, 1986, pp. 14–17. 370. D. Coppersmith, “Cheating at Mental Poker,” Advances in Cryptology—CRYPTO ’85 Proceedings, Springer–Verlag, 1986, pp. 104–107. 371. D. Coppersmith, “The Real Reason for Rivest’s Phenomenon,” Advances in Cryptology—CRYPTO ’85 Proceedings, Springer–Verlag, 1986, pp. 535–536. 372. D. Coppersmith, “Two Broken Hash Functions,” Research Report RD 18397, IBM T.J. Watson Center, Oct 1992. 373. D. Coppersmith, “The Data Encryption Standard (DES) and Its Strength against Attacks,” Technical Report RC 18613, IBM T.J. Watson Center, Dec 1992. 374. D. Coppersmith, “The Data Encryption Standard (DES) and its Strength against Attacks,” IBM Journal of Research and Development, v. 38, n. 3, May 1994, pp. 243–250. 375. D. Coppersmith, “Attack on the Cryptograph...
View Full Document

Ask a homework question - tutors are online