{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

applied cryptography - protocols, algorithms, and source code in c

7081 838 k kim s park and s lee how to strengthen des

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: y to Show the Validity of Your Public Key,” Advances in Cryptology—CRYPTO ’87 Proceedings, Springer–Verlag, 1988, pp. 128–134. 661. J. Grollman and A.L. Selman, “Complexity Measures for Public–Key Cryptosystems,” Proceedings of the 25th IEEE Symposium on the Foundations of Computer Science, 1984, pp. 495–503. 662. GSA Federal Standard 1026, “Telecommunications: General Security Requirements for Equipment Using the Data Encryption Standard,” General Services Administration, Apr 1982. 663. GSA Federal Standard 1027, “Telecommunications: Interoperability and Security Requirements for Use of the Data Encryption Standard in the Physical and Data Link Layers of Data Communications,” General Services Administration, Jan 1983. 664. GSA Federal Standard 1028, “Interoperability and Security Requirements for Use of the Data Encryption Standard with CCITT Group 3 Facsimile Equipment,” General Services Administration, Apr 1985. 665. P. Guam, “Cellular Automaton Public Key Cryptosystems,” Complex Systems, v. 1, 1987, pp. 51–56. 666. H. Guan, “An Analysis of the Finite Automata Public Key Algorithm,” CHINACRYPT ’94, Xidian, China, 11–15 Nov 1994, pp. 120–126. (In Chinese.) 667. G. Guanella, “Means for and Method for Secret Signalling,” U.S. Patent #2,405,500, 6 Aug 1946. 668. M. Gude, “Concept for a High–Performance Random Number Generator Based on Physical Random Phenomena,” Frequenz, v. 39, 1985, pp. 187–190. 669. M. Gude, “Ein quasi–idealer Gleichverteilungsgenerator basierend auf physikalischen Zufallsphänomenen,” Ph.D. dissertation, Aachen University of Technology, 1987. (In German.) 670. L.C. Guillou and J.–J. Quisquater, “A Practical Zero–Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory,” Advances in Cryptology—EUROCRYPT ’88 Proceedings, Springer–Verlag, 1988, pp. 123–128. 671. L.C. Guillou and J.–J. Quisquater, “A ‘Paradoxical’ Identity–Based Signature Scheme Resulting from Zero–Knowledge,...
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online