applied cryptography - protocols, algorithms, and source code in c

88 using symmetric cryptography 8687 blakley george

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Uniquely Solvable by Asymmetric Encryption Techniques,” Proceedings of IEEE EASCON ’79, 1979, pp. 661–662. 1455. G.J. Simmons, “Some Number Theoretic Questions Arising in Asymmetric Encryption Techniques,” Annual Meeting of the American Mathematical Society, AMS Abstract 763.94.1, 1979, pp. 136–151. 1456. G.J. Simmons, “High Speed Arithmetic Using Redundant Number Systems,” Proceedings of the National Telecommunications Conference, 1980, pp. 49.3.1–49.3.2. 1457. G.J. Simmons, “A ‘Weak’ Privacy Protocol Using the RSA Cryptosystem,” Cryptologia, v. 7, n. 2, Apr 1983, pp. 180–182. 1458. G.J. Simmons, “The Prisoner’s Problem and the Subliminal Channel,” Advances in Cryptology: Proceedings of CRYPTO ’83, Plenum Press, 1984, pp. 51–67. 1459. G.J. Simmons, “The Subliminal Channel and Digital Signatures,” Advances in Cryptology: Proceedings of EUROCRYPT 84, Springer–Verlag, 1985, pp. 364–378. 1460. G.J. Simmons, “A Secure Subliminal Channel (?),” Advances in Cryptology—CRYPTO ’85 Proceedings, Springer–Verlag, 1986, pp. 33–41. 1461. G.J. Simmons, “Cryptology,” Encyclopedia Britannica, 16th edition, 1986, pp. 913–924B. 1462. G.J. Simmons, “How to (Really) Share a Secret,” Advances in Cryptology—CRYPTO ’88 Proceedings, Springer–Verlag, 1990, pp. 390–448. 1463. G.J. Simmons, “Prepositioned Secret Sharing Schemes and/or Shared Control Schemes,” Advances in Cryptology—EUROCRYPT ’89 Proceedings, Springer–Verlag, 1990, pp. 436–467. 1464. G.J. Simmons, “Geometric Shares Secret and/or Shared Control Schemes,” Advances in Cryptology—CRYPTO ’90 Proceedings, Springer–Verlag, 1991, pp. 216–241. 1465. G.J. Simmons, ed., Contemporary Cryptology: The Science of Information Integrity, IEEE Press, 1992. 1466. G.J. Simmons, “An Introduction to Shared Secret and/or Shared Control Schemes and Their Application,” in Contemporary Cryptology: The Science of Information Integrity, G.J. Simmons, ed., IEEE Press, 1992, pp. 441–497. 1467. G.J. Simmons, “How to Insure that Data Acquired to Verify Treaty Compliance Are Trustworthy,” in Contemporary Cryptology: The Science of Information Integrity, G.J. Simmons, ed., IEEE Press, 1992, pp. 615–630. 1468. G.J. Simmons, “The Subliminal Channels of the U.S. Digital Signature Algorithm (DSA),” Proceedings of the Third Symposium on: State and P...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online