{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

applied cryptography - protocols, algorithms, and source code in c

6 n 2 1993 pp 6585 216 j boyar and r peralta on the

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: euven Workshop on Cryptographic Algorithms, Springer–Verlag, 1995, to appear. 90. K.R. Bauer, T.A. Bersen, and R.J. Feiertag, “A Key Distribution Protocol Using Event Markers,” ACM Transactions on Computer Systems, v. 1, n. 3, 1983, pp. 249–255. 91. F. Bauspiess and F. Damm, “Requirements for Cryptographic Hash Functions,” Computers & Security, v. 11, n. 5, Sep 1992, pp. 427–437. 92. D. Bayer, S. Haber, and W.S. Stornetta, “Improving the Efficiency and Reliability of Digital Time–Stamping,” Sequences ’91: Methods in Communication, Security, and Computer Science, Springer–Verlag, 1992, pp. 329–334. 93. R. Bayer and J.K. Metzger, “On the Encipherment of Search Trees and Random Access Files,” ACM Transactions on Database Systems, v. 1, n. 1, Mar 1976, pp. 37–52. 94. M. Beale and M.F. Monaghan, “Encrytion Using Random Boolean Functions,” Cryptography and Coding, H.J. Beker and F.C. Piper, eds., Oxford: Clarendon Press, 1989, pp. 219–230. 95. P. Beauchemin and G. Brassard, “A Generalization of Hellman’s Extension to Shannon’s Approach to Cryptography,” Journal of Cryptology, v. 1, n. 2, 1988, pp. 129–132. 96. P. Beauchemin, G. Brassard, C. Crépeau, C. Goutier, and C. Pomerance, “The Generation of Random Numbers that are Probably Prime,” Journal of Cryptology, v. 1, n. 1, 1988, pp. 53–64. 97. D. Beaver, J. Feigenbaum, and V. Shoup, “Hiding Instances in Zero–Knowledge Proofs,” Advances in Cryptology—CRYPTO ’90 Proceedings, Springer–Verlag, 1991, pp. 326–338. 98. H. Beker, J. Friend, and P. Halliden, “Simplifying Key Management in Electronic Funds Transfer Points of Sale Systems,” Electronics Letters, v. 19, n. 12, Jun 1983, pp. 442–444. 99. H. Beker and F. Piper, Cipher Systems: The Protection of Communications, London: Northwood Books, 1982. 100. D.E. Bell and L.J. LaPadula, “Secure Computer Systems: Mathematical Foundations,” Report ESD–TR–73–275, MITRE Corp., 1973. 101. D.E. Bell and L.J. LaPadula, “Secure Computer Systems:...
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online