{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

applied cryptography - protocols, algorithms, and source code in c

664 gsa federal standard 1028 interoperability and

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Algorithm 235: Random Permutation,” Communications of the ACM, v. 7, n. 7, Jul 1964, p. 420. 509. S. Dussé and B. Kaliski, Jr., “A Cryptographic Library for the Motorola DSP56000,” Advances in Cryptology—EUROCRYPT ’90 Proceedings, Springer–Verlag, 1991, pp. 230–244. 510. C. Dwork and L. Stockmeyer, “Zero–Knowledge with Finite State Verifiers,” Advances in Cryptology—CRYPTO ’88 Proceedings, Springer–Verlag, 1990, pp. 71–75. 511. D.E. Eastlake, S.D. Crocker, and J.I. Schiller, “Randomness Requirements for Security,” RFC 1750, Dec 1994. 512. H. Eberle, “A High–Speed DES Implementation for Network Applications,” Advances in Cryptology—CRYPTO ’92 Proceedings, Springer–Verlag, pp. 521–539. 513. J. Edwards, “Implementing Electronic Poker: A Practical Exercise in Zero–Knowledge Interactive Proofs,” Master’s thesis, Department of Computer Science, University of Kentucky, May 1994. 514. W.F. Ehrsam, C.H.W. Meyer, R.L. Powers, J.L. Smith, and W.L. Tuchman, “Product Block Cipher for Data Security,” U.S. Patent #3,962,539, 8 Jun 1976. 515. W.F. Ehrsam, C.H.W. Meyer, and W.L. Tuchman, “A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard,” IBM Systems Journal, v. 17, n. 2, 1978, pp. 106–125. 516. R. Eier and H. Lagger, “Trapdoors in Knapsack Cryptosystems,” Lecture Notes in Computer Science 149; Cryptography—Proceedings, Burg Feuerstein 1982, Springer–Verlag, 1983, pp. 316–322. 517. A.K. Ekert, “Quantum Cryptography Based on Bell’s Theorem,” Physical Review Letters, v. 67, n. 6, Aug 1991, pp. 661–663. 518. T. ElGamal, “A Public–Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” Advances in Cryptology: Proceedings of CRYPTO 84, Springer–Verlag, 1985, pp. 10–18. 519. T. ElGamal, “A Public–Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Transactions on Information Theory, v. IT–31, n. 4, 1985, pp. 469–472. 520. T. ElG...
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online