applied cryptography - protocols, algorithms, and source code in c

797 p kaijser t parker and d pinkas sesame the

Info icon This preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Symposium on Theory of Computing, 1985, pp. 291–304. 627. S. Goldwasser, S. Micali, and C. Rackoff, “The Knowledge Complexity of Interactive Proof Systems,” SIAM Journal on Computing, v. 18, n. 1, Feb 1989, pp. 186– 208. 628. S. Goldwasser, S. Micali, and R.L. Rivest, “A Digital Signature Scheme Secure Against Adaptive Chosen–Message Attacks,” SIAM Journal on Computing, v. 17, n. 2, Apr 1988, pp. 281–308. 629. S. Goldwasser, S. Micali, and A.C. Yao, “On Signatures and Authentication,” Advances in Cryptology: Proceedings of Crypto 82, Plenum Press, 1983, pp. 211–215. 630. J.D. Golic, “On the Linear Complexity of Functions of Periodic GF(q) Sequences,” IEEE Transactions on Information Theory, v. IT–35, n. 1, Jan 1989, pp. 69–75. 631. J.D. Golic, “Linear Cryptanalysis of Stream Ciphers,” K.U. Leuven Workshop on Cryptographic Algorithms, Springer–Verlag, 1995, pp. 262–282. 632. J.D. Golic, “Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers,” Advances in Cryptology—EUROCRYPT ’95 Proceedings, Springer–Verlag, 1995, to appear. 633. J.D. Golic and M.J. Mihajlevic, “A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance,” Journal of Cryptology, v. 3, n. 3, 1991, pp. 201–212. 634. J.D. Golic and L. O’Connor, “Embedding and Probabilistic Correlation Attacks on Clock–Controlled Shift Registers,” Advances in Cryptology—EUROCRYPT ’94 Proceedings, Springer–Verlag, 1995, to appear. 635. R. Golliver, A.K. Lenstra, K.S. McCurley, “Lattice Sieving and Trial Division,” Proceedings of the Algorithmic Number Theory Symposium, Cornell, 1994, to appear. 636. D. Gollmann, “Kaskadenschaltungen taktgesteuerter Schieberegister als Pseudozufallszahlengeneratoren,” Ph.D. dissertation, Universität Linz, 1983. (In German.) 637. D. Gollmann, “Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers,” Advances in Cryptology: Proceedings of EUROCRYPT 84...
View Full Document

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern