applied cryptography - protocols, algorithms, and source code in c

956 ak lenstra and ms manasse factoring with two large

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: (In Japanese.) 770. K.R. Iversen, “The Application of Cryptographic Zero–Knowledge Techniques in Computerized Secret Ballot Election Schemes,” Ph.D. dissertation, IDT–report 1991:3, Norwegian Institute of Technology, Feb 1991. 771. K.R. Iversen, “A Cryptographic Scheme for Computerized General Elections,” Advances in Cryptology—CRYPTO ’91 Proceedings, Springer–Verlag, 1992, pp. 405–419. 772. K. Iwamura, T. Matsumoto, and H. Imai, “An Implementation Method for RSA Cryptosystem with Parallel Processing,” Transactions of the Institute of Electronics, Information, and Communication Engineers, v. J75–A, n. 8, Aug 1992, pp. 1301–1311. 773. W.J. Jaburek, “A Generalization of ElGamal’s Public Key Cryptosystem,” Advances in Cryptology—EUROCRYPT ’89 Proceedings, 1990, Springer–Verlag, pp. 23–28. 774. N.S. James, R. Lidi, and H. Niederreiter, “Breaking the Cade Cipher,” Advances in Cryptology—CRYPTO ’86 Proceedings, 1987, Springer–Verlag, pp. 60–63. 775. C.J.A. Jansen, “On the Key Storage Requirements for Secure Terminals,” Computers and Security, v. 5, n. 2, Jun 1986, pp. 145–149. 776. C.J.A. Jansen, “Investigations on Nonlinear Streamcipher Systems: Construction and Evaluation Methods,” Ph.D. dissertation, Technical University of Delft, 1989. 777. C.J.A. Jansen and D.E. Boekee, “Modes of Blockcipher Algorithms and their Protection against Active Eavesdropping,” Advances in Cryptology—EUROCRYPT ’87 Proceedings, Springer–Verlag, 1988, pp. 281–286. 778. S.M. Jennings, “A Special Class of Binary Sequences,” Ph.D. dissertation, University of London, 1980. 779. S.M. Jennings, “Multiplexed Sequences: Some Properties of the Minimum Polynomial,” Lecture Notes in Computer Science 149; Cryptography: Proceedings of the Workshop on Cryptography, Springer–Verlag, 1983, pp. 189–206. 780. S.M. Jennings, “Autocorrelation Function of the Multiplexed Sequence,” IEE Proceedings, v. 131, n. 2, Apr 1984, pp. 169–172. 781. T. Jin, “Care and Feeding of Yo...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online