Unformatted text preview: Time–Stamping of Digital Documents,” U.S. Patent #5,136,647, 4 Aug 1992. 686. S. Haber and W.S. Stornetta, “Method of Extending the Validity of a Cryptographic Certificate,” U.S. Patent #5,373,561, 13 Dec 1994. 687. T. Habutsu, Y. Nishio, I. Sasase, and S. Mori, “A Secret Key Cryptosystem by Iterating a Chaotic Map,” Transactions of the Institute of Electronics, Information, and Communication Engineers, v. E73, n. 7, Jul 1990, pp. 1041–1044. 688. T. Habutsu, Y. Nishio, I. Sasase, and S. Mori, “A Secret Key Cryptosystem by Iterating a Chaotic Map,” Advances in Cryptology—EUROCRYPT ’91 Proceedings, Springer–Verlag, 1991, pp. 127–140. 689. S. Hada and H. Tanaka, “An Improvement Scheme of DES against Differential Cryptanalysis,” Proceedings of the 1994 Symposium on Cryptography and Information Security (SCIS 94), Lake Biwa, Japan, 27–29 Jan 1994, pp 14A.1–11. (In Japanese.) 690. B.C.W. Hagelin, “The Story of the Hagelin Cryptos,” Cryptologia, v. 18, n. 3, Jul 1994, pp. 204–242. 691. T. Hansen and G.L. Mullen, “Primitive Polynomials over Finite Fields,” Mathematics of Computation, v. 59, n. 200, Oct 1992, pp. 639–643. 692. S. Harada and S. Kasahara, “An ID–Based Key Sharing Scheme Without Preliminary Communication,” IEICE Japan, Technical Report, ISEC89–38, 1989. (In Japanese.) 693. S. Harari, “A Correlation Cryptographic Scheme,” EUROCODE ’90—International Symposium on Coding Theory, Springer–Verlag, 1991, pp. 180–192. 694. T. Hardjono and J. Seberry, “Authentication via Multi–Service Tickets in the Kuperee Server,” Computer Security—ESORICS 94, Springer–Verlag, 1994, pp. 144–160. 695. L. Harn and T. Kiesler, “New Scheme for Digital Multisignatures,” Electronics Letters, v. 25, n. 15, 20 Jul 1989, pp. 1002– 1003. 696. L. Harn and T. Kiesler, “Improved Rabin’s Scheme with High Efficiency,” Electronics Letters, v. 25, n. 15, 20 Jul 1989, p. 1016. 697. L. Harn and T. Kiesler, “Two New Ef...
View
Full
Document
This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.
 Fall '10
 ALIULGER
 Cryptography

Click to edit the document details