applied cryptography - protocols, algorithms, and source code in c

843847 435 dw davies and wl price security for

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: –19. 292. E.A. Campbell, R. Safavi–Naini, and P.A. Pleasants, “Partial Belief and Probabilistic Reasoning in the Analysis of Secure Protocols,” Proceedings of the Computer Security Foundations Workshop V, IEEE Computer Society Press, 1992, pp. 92–110. 293. K.W. Campbell and M.J. Wiener, “DES Is Not a Group,” Advances in Cryptology—CRYPTO ’92 Proceedings, Springer–Verlag, pp. 512–520. 294. Z.F. Cao and G. Zhao, “Some New MC Knapsack Cryptosystems,” CHINACRYPT ’94, Xidian, China, 11–15 Nov 1994, pp. 70–75. (In Chinese). 295. C. Carlet, “Partially–Bent Functions,” Advances in Cryptology—CRYPTO ’92 Proceedings, Springer–Verlag, 1993, pp. 280–291. 296. C. Carlet, “Partially Bent Functions,” Designs, Codes and Cryptography, v. 3, 1993, pp. 135–145. 297. C. Carlet, “Two New Classes of Bent Functions” Advances in Cryptology—EUROCRYPT ’93 Proceedings, Springer–Verlag, 1994, pp. 77–101. 298. C. Carlet, J. Seberry, and X.M. Zhang, “Comments on ‘Generating and Counting Binary Bent Sequences,’” IEEE Transactions on Information Theory, v. IT–40, n. 2, Mar 1994, p. 600. 299. J.M. Carroll, Computer Security, 2nd edition, Butterworths, 1987. 300. J.M. Carroll, “The Three Faces of Information Security,” Advances in Cryptology—AUSCRYPT ’90 Proceedings, Springer–Verlag, 1990, pp. 433–450. 301. J.M. Carroll, “‘Do–it–yourself’ Cryptography,” Computers & Security, v. 9, n. 7, Nov 1990, pp. 613–619. 302. T.R. Caron and R.D. Silverman, “Parallel Implementation of the Quadratic Scheme,” Journal of Supercomputing, v. 1, n. 3, 1988, pp. 273–290. 303. CCITT, Draft Recommendation X.509, “The Directory—Authentication Framework,” Consultation Committee, International Telephone and Telegraph, International Telecommunications Union, Geneva, 1987. 304. CCITT, Recommendation X.509, “The Directory—Authentication Framework,” Consultation Committee, International Telephone and Telegraph, Int...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online