applied cryptography - protocols, algorithms, and source code in c

D dissertation katholieke universiteit leuven jan

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: on Properties of Combiners with Memory in Stream Ciphers,” Advances in Cryptology—EUROCRYPT ’90 Proceedings, Springer–Verlag, 1991, pp. 204–213. 1054. W. Meier and O. Staffelbach, “Correlation Properties of Combiners with Memory in Stream Ciphers,” Journal of Cryptology, v. 5, n. 1, 1992, pp. 67–86. 1055. W. Meier and O. Staffelbach, “The Self–Shrinking Generator,” Communications and Cryptography: Two Sides of One Tapestry, R.E. Blahut et al., eds., Kluwer Adademic Publishers, 1994, pp. 287–295. 1056. J. Meijers, “Algebraic–Coded Cryptosystems,” Master’s thesis, Technical University Eindhoven, 1990. 1057. J. Meijers and J. van Tilburg, “On the Rao–Nam Private–Key Cryptosystem Using Linear Codes,” International Symposium on Information Theory, Budapest, Hungary, 1991. 1058. J. Meijers and J. van Tilburg, “An Improved ST–Attack on the Rao–Nam Private–Key Cryptosystem,” International Conference on Finite Fields, Coding Theory, and Advances in Communications and Computing, Las Vegas, NV, 1991. 1059. A. Menezes, Elliptic Curve Public Key Cryptosystems, Kluwer Academic Publishers, 1993. 1060. A. Menezes, ed., Applications of Finite Fields, Kluwer Academic Publishers, 1993. 1061. A. Menezes and S.A. Vanstone, “Elliptic Curve Cryptosystems and Their Implementations,” Journal of Cryptology, v. 6, n. 4, 1993, pp. 209–224. 1062. A. Menezes and S.A. Vanstone, “The Implementation of Elliptic Curve Cryptosystems,” Advances in Cryptology—AUSCRYPT ’90 Proceedings, Springer–Verlag, 1990, pp. 2–13. 1063. R. Menicocci, “Short Gollmann Cascade Generators May Be Insecure,” Codes and Ciphers, Institute of Mathematics and its Applications, 1995, pp. 281–297. 1064. R.C. Merkle, “Secure Communication Over Insecure Channels,” Communications of the ACM, v. 21, n. 4, 1978, pp. 294–299. 1065. R.C. Merkle, “Secrecy, Authentication, and Public Key Systems,” Ph.D. dissertation, Stanford University, 1979. 1066. R.C. Merkl...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online