applied cryptography - protocols, algorithms, and source code in c

6779 1090 mj mihajlevic and jd golic a fast iterative

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Probabilistic Swapping Schemes to Strengthen DES against Differential Cryptanalysis,” Proceedings of the 1993 Symposium on Cryptography and Information Security (SCIS 93), Shuzenji, Japan, 28–30 Jan 1993, pp. 15D.1–12. 895. K. Koyama and Y. Tsuruoka, “Speeding up Elliptic Cryptosystems Using a Singled Binary Window Method,” Advances in Cryptology—CRYPTO ’92 Proceedings, Springer–Verlag, 1993, pp. 345–357. 896. E. Kranakis, Primality and Cryptography, Wiler–Teubner Series in Computer Science, 1986. 897. D. Kravitz, “Digital Signature Algorithm,” U.S. Patent #5,231,668, 27 Jul 1993. 898. D. Kravitz and I. Reed, “Extension of RSA Cryptostructure: A Galois Approach,” Electronics Letters, v. 18, n. 6, 18 Mar 1982, pp. 255–256. 899. H. Krawczyk, “How to Predict Congruential Generators,” Advances in Cryptology—CRYPTO ’89 Proceedings, Springer–Verlag, 1990, pp. 138–153. 900. H. Krawczyk, “How to Predict Congruential Generators,” Journal of Algorithms, v. 13, n. 4, Dec 1992, pp. 527–545. 901. H. Krawczyk, “The Shrinking Generator: Some Practical Considerations,” Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer–Verlag, 1994, pp. 45–46. 902. G.J. Kühn, “Algorithms for Self–Synchronizing Ciphers,” Proceedings of COMSIG 88, 1988. 903. G.J. Kühn, F. Bruwer, and W. Smit, “’n Vinnige Veeldoelige Enkripsievlokkie,” Proceedings of Infosec 90, 1990. (In Afrikaans.) 904. S. Kullback, Statistical Methods in Cryptanalysis, U.S. Government Printing Office, 1935. Reprinted by Aegean Park Press, 1976. 905. P.V. Kumar, R.A. Scholtz, and L.R. Welch, “Generalized Bent Functions and their Properties,” Journal of Combinational Theory, Series A, v. 40, n. 1, Sep 1985, pp. 90–107. 906. M. Kurosaki, T. Matsumoto, and H. Imai, “Simple Methods for Multipurpose Certification,” Proceedings of the 1989 Symposium on Cryptography and Information Security (SCIS 89), Gotenba, Japan, 1989. 907. M. Kurosaki, T. Matsumoto, and H. Imai, “Proving that You Belong to at L...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online