This preview shows page 1. Sign up to view the full content.
Unformatted text preview: (In Japanese.) 770. K.R. Iversen, “The Application of Cryptographic Zero–Knowledge Techniques in Computerized Secret Ballot Election Schemes,” Ph.D. dissertation, IDT–report 1991:3, Norwegian Institute of Technology, Feb 1991. 771. K.R. Iversen, “A Cryptographic Scheme for Computerized General Elections,” Advances in Cryptology—CRYPTO ’91 Proceedings, Springer–Verlag, 1992, pp. 405–419. 772. K. Iwamura, T. Matsumoto, and H. Imai, “An Implementation Method for RSA Cryptosystem with Parallel Processing,” Transactions of the Institute of Electronics, Information, and Communication Engineers, v. J75–A, n. 8, Aug 1992, pp. 1301–1311. 773. W.J. Jaburek, “A Generalization of ElGamal’s Public Key Cryptosystem,” Advances in Cryptology—EUROCRYPT ’89 Proceedings, 1990, Springer–Verlag, pp. 23–28. 774. N.S. James, R. Lidi, and H. Niederreiter, “Breaking the Cade Cipher,” Advances in Cryptology—CRYPTO ’86 Proceedings, 1987, Springer–Verlag, pp. 60–63. 775. C.J.A. Jansen, “On the Key Storage Requirements for Secure Terminals,” Computers and Security, v. 5, n. 2, Jun 1986, pp. 145–149. 776. C.J.A. Jansen, “Investigations on Nonlinear Streamcipher Systems: Construction and Evaluation Methods,” Ph.D. dissertation, Technical University of Delft, 1989. 777. C.J.A. Jansen and D.E. Boekee, “Modes of Blockcipher Algorithms and their Protection against Active Eavesdropping,” Advances in Cryptology—EUROCRYPT ’87 Proceedings, Springer–Verlag, 1988, pp. 281–286. 778. S.M. Jennings, “A Special Class of Binary Sequences,” Ph.D. dissertation, University of London, 1980. 779. S.M. Jennings, “Multiplexed Sequences: Some Properties of the Minimum Polynomial,” Lecture Notes in Computer Science 149; Cryptography: Proceedings of the Workshop on Cryptography, Springer–Verlag, 1983, pp. 189–206. 780. S.M. Jennings, “Autocorrelation Function of the Multiplexed Sequence,” IEE Proceedings, v. 131, n. 2, Apr 1984, pp. 169–172. 781. T. Jin, “Care and Feeding of Yo...
View
Full
Document
This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.
 Fall '10
 ALIULGER
 Cryptography

Click to edit the document details