applied cryptography - protocols, algorithms, and source code in c

8489 1047 ca meadows formal verification of

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: re Encryption, Cambridge Security Workshop Proceedings, Springer–Verlag, 1994, pp. 211–221. 858. L.R. Knudsen, “Block Ciphers—Analysis, Design, Applications,” Ph.D. dissertation, Aarhus University, Nov 1994. 859. L.R. Knudsen, personal communication, 1994. 860. L.R. Knudsen, “Applications of Higher Order Differentials and Partial Differentials,” K.U. Leuven Workshop on Cryptographic Algorithms, Springer–Verlag, 1995, to appear. 861. L.R. Knudsen and X. Lai, “New Attacks on All Double Block Length Hash Functions of Hash Rate 1, Including the Parallel–DM,” Advances in Cryptology—EUROCRYPT ’94 Proceedings, Springer–Verlag, 1995, to appear. 862. L.R. Knudsen, “A Weakness in SAFER K–64,” Advances in Cryptology–CRYPTO ‘95 Proceedings, Springer–Verlag, 1995, to appear. 863. D. Knuth, The Art of Computer Programming: Volume 2, Seminumerical Algorithms, 2nd edition, Addison–Wesley, 1981. 864. D. Knuth, “Deciphering a Linear Congruential Encryption,” IEEE Transactions on Information Theory, v. IT–31, n. 1, Jan 1985, pp. 49–52. 865. K. Kobayashi and L. Aoki, “On Linear Cryptanalysis of MBAL,” Proceedings of the 1995 Symposium on Cryptography and Information Security (SCIS 95), Inuyama, Japan, 24–27 Jan 1995, pp. A4.2.1–9. 866. K. Kobayashi, K. Tamura, and Y. Nemoto, “Two–dimensional Modified Rabin Cryptosystem,” Transactions of the Institute of Electronics, Information, and Communication Engineers, v. J72–D, n. 5, May 1989, pp. 850–851. (In Japanese.) 867. N. Koblitz, “Elliptic Curve Cryptosystems,” Mathematics of Computation, v. 48, n. 177, 1987, pp. 203–209. 868. N. Koblitz, “A Family of Jacobians Suitable for Discrete Log Cryptosystems,” Advances in Cryptology—CRYPTO ’88 Proceedings, Springer–Verlag, 1990, pp. 94–99. 869. N. Koblitz, “Constructing Elliptic Curve Cryptosystems in Characteristic 2,” Advances in Cryptology—CRYPTO ’90 Proceedings, Springer–Verlag, 1991, pp. 156–167. 8...
View Full Document

Ask a homework question - tutors are online