applied cryptography - protocols, algorithms, and source code in c

76 n 5 may 1988 pp 578593 268 ef brickell and am

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: yptographic Fault–Tolerant Distributed Computation,” Proceedings of the 20th ACM Symposium on the Theory of Computing, 1988, pp. 1–10. 137. M. Ben–Or, O. Goldreich, S. Goldwasser, J. Håstad, J. Kilian, S. Micali, and P. Rogaway, “Everything Provable is Provable in Zero–Knowledge,” Advances in Cryptology—CRYPTO ’88 Proceedings, Springer–Verlag, 1990, pp. 37–56. 138. M. Ben–Or, O. Goldreich, S. Micali, and R.L. Rivest, “A Fair Protocol for Signing Contracts,” IEEE Transactions on Information Theory, v. 36, n. 1, Jan 1990, pp. 40–46. 139. H.A. Bergen and W.J. Caelli, “File Security in WordPerfect 5.0,” Cryptologia, v. 15, n. 1, Jan 1991, pp. 57–66. 140. E.R. Berlekamp, Algebraic Coding Theory, Aegean Park Press, 1984. 141. S. Berkovits, “How to Broadcast a Secret,” Advances in Cryptology—EUROCRYPT ’91 Proceedings, Springer–Verlag, 1991, pp. 535–541. 142. S. Berkovits, J. Kowalchuk, and B. Schanning, “Implementing Public–Key Scheme,” IEEE Communications Magazine, v. 17, n. 3, May 1979, pp. 2–3. 143. D.J. Bernstein, Bernstein vs. U.S. Department of State et al., Civil Action No. C95–0582–MHP, United States District Court for the Northern District of California, 21 Feb 1995. 144. T. Berson, “Differential Cryptanalysis Mod 232 with Applications to MD5,” Advances in Cryptology—EUROCRYPT ’92 Proceedings, 1992, pp. 71–80. 145. T. Beth, Verfahren der schnellen Fourier–Transformation, Teubner, Stuttgart, 1984. (In German.) 146. T. Beth, “Efficient Zero–Knowledge Identification Scheme for Smart Cards,” Advances in Cryptology—EUROCRYPT ’88 Proceedings, Springer–Verlag, 1988, pp. 77–84. 147. T. Beth, B.M. Cook, and D. Gollmann, “Architectures for Exponentiation in GF(2n),” Advances in Cryptology—CRYPTO ’86 Proceedings, Springer–Verlag, 1987, pp. 302–310. 148. T. Beth and Y. Desmedt, “Identification Tokens—or: Solving the Chess Grandmaster Problem,” Advances in Cryptology—CRYPTO ’90 Proceedings, Springer...
View Full Document

Ask a homework question - tutors are online