applied cryptography - protocols, algorithms, and source code in c

57 n 21 31 jan 1992 pp 37473749 540 proposed

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ographic System,” U.S. Patent #5,159,632, 27 Oct 1992. 389. C. Crépeau, “A Secure Poker Protocol That Minimizes the Effect of Player Coalitions,” Advances in Cryptology—CRYPTO ’85 Proceedings, Springer–Verlag, 1986, pp. 73–86. 390. C. Crépeau, “A Zero–Knowledge Poker Protocol that Achieves Confidentiality of the Players’ Strategy, or How to Achieve an Electronic Poker Face,” Advances in Cryptology—CRYPTO ’86 Proceedings, Springer–Verlag, 1987, pp. 239–247. 391. C. Crépeau, “Equivalence Between Two Flavours of Oblivious Transfer,” Advances in Cryptology—CRYPTO ’87 Proceedings, Springer–Verlag, 1988, pp. 350–354. 392. C. Crépeau, “Correct and Private Reductions among Oblivious Transfers,” Ph.D. dissertation, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 1990. 393. C. Crépeau, “Quantum Oblivious Transfer,” Journal of Modern Optics, v. 41, n. 12, Dec 1994, pp. 2445–2454. 394. C. Crépeau and J. Kilian, “Achieving Oblivious Transfer Using Weakened Security Assumptions,” Proceedings of the 29th Annual Symposium on the Foundations of Computer Science, 1988, pp. 42–52. 395. C. Crépeau and J. Kilian, “Weakening Security Assumptions and Oblivious Transfer,” Advances in Cryptology—CRYPTO ’88 Proceedings, Springer–Verlag, 1990, pp. 2–7. 396. C. Crépeau and L. Salvail, “Quantum Oblivious Mutual Identification,” Advances in Cryptology—EUROCRYPT ’95 Proceedings, Springer–Verlag, 1995, pp. 133–146. 397. A. Curiger, H. Bonnenberg, R. Zimmermann, N. Felber, H. Kaeslin and W. Fichtner, “VINCI: VLSI Implementation of the New Block Cipher IDEA,” Proceedings of IEEE CICC ’93, San Diego, CA, May 1993, pp. 15.5.1–15.5.4. 398. A. Curiger and B. Stuber, “Specification for the IDEA Chip,” Technical Report No. 92/03, Institut für Integrierte Systeme, ETH Zurich, Feb 1992. 399. T. Cusick, “Boolean Functions Satisfying a Higher Order Strict Avalanche Criterion,” Advances in Cryptology—E...
View Full Document

Ask a homework question - tutors are online