applied cryptography - protocols, algorithms, and source code in c

Applied cryptography protocols algorithms and source code in c

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 70. N. Koblitz, “Hyperelliptic Cryptosystems,” Journal of Cryptology, v. 1, n. 3, 1989, pp. 129–150. 871. N. Koblitz, “CM–Curves with Good Cryptographic Properties,” Advances in Cryptology—CRYPTO ’91 Proceedings, Springer–Verlag, 1992, pp. 279–287. 872. Ç.K. Koç, “High–Speed RSA Implementation,” Version 2.0, RSA Laboratories, Nov 1994. 873. M.J. Kochanski, “Remarks on Lu and Lee’s Proposals,” Cryptologia, v. 4, n. 4, 1980, pp. 204–207. 874. M.J. Kochanski, “Developing an RSA Chip,” Advances in Cryptology—CRYPTO ’85 Proceedings, Springer–Verlag, 1986, pp. 350–357. 875. J.T. Kohl, “The Use of Encryption in Kerberos for Network Authentication,” Advances in Cryptology—CRYPTO ’89 Proceedings, Springer–Verlag, 1990, pp. 35–43. 876. J.T. Kohl, “The Evolution of the Kerberos Authentication Service,” EurOpen Conference Proceedings, May 1991, pp. 295–313. 877. J.T. Kohl and B.C. Neuman, “The Kerberos Network Authentication Service,” RFC 1510, Sep 1993. 878. J.T. Kohl, B.C. Neuman, and T. Ts’o, “The Evolution of the Kerberos Authentication System,” Distributed Open Systems, IEEE Computer Society Press, 1994, pp. 78–94. 879. Kohnfelder, “Toward a Practical Public Key Cryptosystem,” Bachelor’s thesis, MIT Department of Electrical Engineering, May 1978. 880. A.G. Konheim, Cryptography: A Primer, New York: John Wiley & Sons, 1981. 881. A.G. Konheim, M.H. Mack, R.K. McNeill, B. Tuckerman, and G. Waldbaum, “The IPS Cryptographic Programs,” IBM Systems Journal, v. 19, n. 2, 1980, pp. 253–283. 882. V.I. Korzhik and A.I. Turkin, “Cryptanalysis of McEliece’s Public–Key Cryptosystem,” Advances in Cryptology—EUROCRYPT ’91 Proceedings, Springer–Verlag, 1991, pp. 68–70. 883. S.C. Kothari, “Generalized Linear Threshold Scheme,” Advances in Cryptology: Proceedings of CRYPTO 84, Springer–Verlag, 1985, pp. 231–241. 884. J. Kowalchuk, B.P. Schanning, and S. Powers, “Communication Privacy: Integration of Public and Secret Key Cryptog...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online