applied cryptography - protocols, algorithms, and source code in c

5870 618 o goldreich and e kushilevitz a perfect

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: on Standard: Fifteen Years of Public Scrutiny,” Proceedings of the Sixth Annual Computer Security Applications Conference, IEEE Computer Society Press, 1990. 460. D.E. Denning, “The Clipper Chip: A Technical Summary,” unpublished manuscript, 21 Apr 1993. 461. D.E. Denning and G.M. Sacco, “Timestamps in Key Distribution Protocols,” Communications of the ACM, v. 24, n. 8, Aug 1981, pp. 533–536. 462. D.E. Denning and M. Smid, “Key Escrowing Today,” IEEE Communications Magazine, v. 32, n. 9, Sep 1994, pp. 58–68. 463. T. Denny, B. Dodson, A.K. Lenstra, and M.S. Manasse, “On the Factorization of RSA–120,” Advances in Cryptology—CRYPTO ’93 Proceedings, Springer–Verlag, 1994, pp. 166–174. 464. W.F. Denny, “Encryptions Using Linear and Non–Linear Codes: Implementations and Security Considerations,” Ph.D. dissertation, The Center for Advanced Computer Studies, University of Southern Louisiana, Spring 1988. 465. Department of Defense, “Department of Defense Trusted Computer System Evaluation Criteria,” DOD 5200.28–STD, Dec 1985. 466. Department of State, “International Traffic in Arms Regulations (ITAR),” 22 CFR 120–130, Office of Munitions Control, Nov 1989. 467. Department of State, “Defense Trade Regulations,” 22 CFR 120–130, Office of Defense Trade Controls, May 1992. 468. Department of the Treasury, “Electronic Funds and Securities Transfer Policy,” Department of the Treasury Directives Manual, Chapter TD 81, Section 80, Department of the Treasury, 16 Aug 1984. 469. Department of the Treasury, “Criteria and Procedures for Testing, Evaluating, and Certifying Message Authentication Decisions for Federal E.F.T. Use,” Department of the Treasury, 1 May 1985. 470. Department of the Treasury, “Electronic Funds and Securities Transfer Policy—Message Authentication and Enhanced Security,” Order No. 106–09, Department of the Treasury, 2 Oct 1986. 471. H. Dobbertin, “A Survey on the Construction of Bent Functions,” K.U. Leu...
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online