Unformatted text preview: 50. D.M. Gordon and K.S. McCurley, “Massively Parallel Computation of Discrete Logarithms,” Advances in Cryptology—CRYPTO ’92 Proceedings, Springer–Verlag, 1993, pp. 312–323. 651. J.A. Gordon, “Strong Primes are Easy to Find,” Advances in Cryptology: Proceedings of EUROCRYPT 84, Springer–Verlag, 1985, pp. 216–223. 652. J.A. Gordon, “Very Simple Method to Find the Minimal Polynomial of an Arbitrary Non–Zero Element of a Finite Field,” Electronics Letters, v. 12, n. 25, 9 Dec 1976, pp. 663–664. 653. J.A. Gordon and R. Retkin, “Are Big S–Boxes Best?” Cryptography, Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29–April 2, 1982, Springer–Verlag, 1983, pp. 257–262. 654. M. Goresky and A. Klapper, “Feedback Registers Based on Ramified Extension of the 2–adic Numbers,” Advances in Cryptology—EUROCRYPT ’94 Proceedings, Springer–Verlag, 1995, to appear. 655. GOST, Gosudarstvennyi Standard 28147–89, “Cryptographic Protection for Data Processing Systems,” Government Committee of the USSR for Standards, 1989. (In Russian.) 656. GOST R 34.10–94, Gosudarstvennyi Standard of Russian Federation, “Information technology. Cryptographic Data Security. Produce and check procedures of Electronic Digital Signature based on Asymmetric Cryptographic Algorithm.” Government Committee of the Russia for Standards, 1994. (In Russian.) 657. GOST R 34.11–94, Gosudarstvennyi Standard of Russian Federation, “Information technology. Cryptographic Data Security. Hashing function.” Government Committee of the Russia for Standards, 1994. (In Russian.) 658. R. Göttfert and H. Niederreiter, “On the Linear Complexity of Products of Shift–Register Sequences,” Advances in Cryptology—EUROCRYPT ’93 Proceedings, Springer–Verlag, 1994, pp. 151–158. 659. R. Göttfert and H. Niederreiter, “A General Lower Bound for the Linear Complexity of the Product of Shift–Register Sequences,” Advances in Cryptology—EUROCRYPT ’94 Proceedings, Springer–Verlag, 1995, to appear. 660. J. van de Graaf and R. Peralta, “A Simple and Secure Wa...
View
Full Document
 Fall '10
 ALIULGER
 Cryptography, Bruce Schneier, Applied Cryptography, EarthWeb, Search Search Tips

Click to edit the document details