applied cryptography - protocols, algorithms, and source code in c

62 denning sacco protocol 63 with digital signatures

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Description Technique in the Specification of Authentication Protocols,” Computer Standards and Interfaces, v. 9, 1990, pp. 203–215. 1567. S. Vaudenay, “FFT–Hash–II Is not Yet Collision–Free,” Advances in Cryptology—CRYPTO ’92 Proceedings, Springer–Verlag, pp. 587–593. 1568. S. Vaudenay, “Differential Cryptanalysis of Blowfish,” unpublished manuscript, 1995. 1569. U.V. Vazirani and V.V. Vazirani, “Trapdoor Pseudo–Random Number Generators with Applications to Protocol Design,” Proceedings of the 24th IEEE Symposium on the Foundations of Computer Science, 1983, pp. 23–30. 1570. U.V. Vazirani and V.V. Vazirani, “Efficient and Secure Pseudo–Random Number Generation,” Proceedings of the 25th IEEE Symposium on the Foundations of Computer Science, 1984, pp. 458–463. 1571. U.V. Vazirani and V.V. Vazirani, “Efficient and Secure Pseudo–Random Number Generation,” Advances in Cryptology: Proceedings of CRYPTO ’84, Springer–Verlag, 1985, pp. 193–202. 1572. I. Verbauwhede, F. Hoornaert, J. Vanderwalle, and H. De Man, “ASIC Cryptographical Processor Based on DES,” Euro ASIC ’91 Proceedings, 1991, pp. 292–295. 1573. I. Verbauwhede, F. Hoornaert, J. Vanderwalle, H. De Man, and R. Govaerts, “Security Considerations in the Design and Implementation of a New DES Chip,” Advances in Cryptology—EUROCRYPT ’87 Proceedings, Springer–Verlag, 1988, pp. 287–300. 1574. R. Vogel, “On the Linear Complexity of Cascaded Sequences,” Advances in Cryptology: Proceedings of EUROCRYPT 84, Springer–Verlag, 1985, pp. 99–109. 1575. S. von Solms and D. Naccache, “On Blind Signatures and Perfect Crimes,” Computers & Security, v. 11, 1992, pp. 581–583. 1576. V.L. Voydock and S.T. Kent, “Security Mechanisms in High–Level Networks,” ACM Computing Surveys, v. 15, n. 2, Jun 1983, pp. 135–171. 1577. N.R. Wagner, P.S. Putter, and M.R. Cain, “Large–Scale Randomization Techniques,” Advances in Cryptology—CRYPTO ’86 Proceedings, Springer–Verlag, 1987, pp. 393–404. 1578. M. Waidner and B. Pfitzmann, “The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability,” Advances in Cryptology—EUROCRYPT ’89 Proceedings, Springer–Verlag, 1990, p. 690. 1579. S.T. Walker, “Software Key Escrow—A Better Solution for Law Enforcement’s Needs?” TIS Report #533, Trusted Information Systems, Aug 1994. 1580. S.T. Walker, “...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online