Unformatted text preview: es, “Matter of National Institute of Standards and Technology—Use of Electronic Data Interchange Technology to Create Valid Obligations,” File B–245714, 13 Dec 1991. 363. M.S. Conn, letter to Joe Abernathy, National Security Agency, Ser: Q43–111–92, 10 Jun 1992. 364. C. Connell, “An Analysis of NewDES: A Modified Version of DES,” Cryptologia, v. 14, n. 3, Jul 1990, pp. 217–223. 365. S.A. Cook, “The Complexity of Theorem–Proving Procedures,” Proceedings of the 3rd Annual ACM Symposium on the Theory of Computing, 1971, pp. 151–158. 366. R.H. Cooper and W. Patterson, “A Generalization of the Knapsack Method Using Galois Fields,” Cryptologia, v. 8, n. 4, Oct 1984, pp. 343–347. 367. R.H. Cooper and W. Patterson, “RSA as a Benchmark for Multiprocessor Machines,” Advances in Cryptology—AUSCRYPT ’90 Proceedings, Springer–Verlag, 1990, pp. 356–359. 368. D. Coppersmith, “Fast Evaluation of Logarithms in Fields of Characteristic Two,” IEEE Transactions on Information Theory, v. 30, n. 4, Jul 1984, pp. 587–594. 369. D. Coppersmith, “Another Birthday Attack,” Advances in Cryptology—CRYPTO ’85 Proceedings, Springer–Verlag, 1986, pp. 14–17. 370. D. Coppersmith, “Cheating at Mental Poker,” Advances in Cryptology—CRYPTO ’85 Proceedings, Springer–Verlag, 1986, pp. 104–107. 371. D. Coppersmith, “The Real Reason for Rivest’s Phenomenon,” Advances in Cryptology—CRYPTO ’85 Proceedings, Springer–Verlag, 1986, pp. 535–536. 372. D. Coppersmith, “Two Broken Hash Functions,” Research Report RD 18397, IBM T.J. Watson Center, Oct 1992. 373. D. Coppersmith, “The Data Encryption Standard (DES) and Its Strength against Attacks,” Technical Report RC 18613, IBM T.J. Watson Center, Dec 1992. 374. D. Coppersmith, “The Data Encryption Standard (DES) and its Strength against Attacks,” IBM Journal of Research and Development, v. 38, n. 3, May 1994, pp. 243–250. 375. D. Coppersmith, “Attack on the Cryptograph...
View
Full
Document
This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.
 Fall '10
 ALIULGER
 Cryptography

Click to edit the document details