applied cryptography - protocols, algorithms, and source code in c

Finite field 254 discrete logarithms 261263 fips pub

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: cal Report, Department of Computer Science, Tokyo Institute of Technology, 93TR–0016, May 1993. 1541. S. Tsujii, K. Araki, and T. Sekine, “A New Scheme of Non Interactive ID–Based key Sharing with Explosively High Degree of Separability (Second Version),” Technical Report, Department of Computer Science, Tokyo Institute of Technology, 93TR–0020, Jul 1993. 1542. S. Tsujii, K. Araki, T. Sekine, and K. Tanada, “A New Scheme of Non Interactive ID–Based Key Sharing with Explosively High Degree of Separability,” Proceedings of the 1993 Korea–Japan Workshop on Information Security and Cryptography, Seoul, Korea, 24–26 Oct 1993, pp. 49–58. 1543. S. Tsujii, K. Araki, H. Tanaki, J. Chao, T. Sekine, and Y. Matsuzaki, “ID–Based Key Sharing Scheme—Reply to Tanaka’s Comment,” IEICE Japan, Technical Report, ISEC 92–60, Dec 1992. 1544. S. Tsujii and J. Chao, “A New ID–based Key Sharing System,” Advances in Cryptology—CRYPTO ’91 Proceedings, Springer–Verlag, 1992, pp. 288–299. 1545. S. Tsujii, J. Chao, and K. Araki, “A Simple ID–Based Scheme for Key Sharing,” IEICE Japan, Technical Report, ISEC 92–25, Aug 1992. 1546. S. Tsujii and T. Itoh, “An ID–Based Cryptosystem Based on the Discrete Logarithm Problem,” IEEE Journal on Selected Areas in Communication, v. 7, n. 4, May 1989, pp. 467–473. 1547. S. Tsujii and T. Itoh, “An ID–Based Cryptosystem Based on the Discrete Logarithm Problem,” Electronics Letters, v. 23, n. 24, Nov 1989, pp. 1318–1320. 1548. S. Tsujii, K. Kurosawa, T. Itoh, A. Fujioka, and T. Matsumoto, “A Public–Key Cryptosystem Based on the Difficulty of Solving a System of Non–Linear Equations,” TSUJII Laboratory Technical Memorandum, n. 1, 1986. 1549. Y. Tsunoo, E. Okamoto, and H. Doi, “Analytical Known Plain–Text Attack for FEAL–4 and Its Improvement,” Proceedings of the 1994 Symposium on Cryptography and Information Security (SCIS 93), 1993. 1550. Y. Tsunoo, E. Okamoto, T. Uyematsu, and M. Mambo, “Analytical Known Plain–Text Attack for FEAL–6” Proceedings of the 1993 Korea–Japan Workshop on Information Security and Cryptography, Seoul, Korea, 24–26 Oct 1993, pp. 253–261. 1551. W. Tuchman, “Hellman Presents No Shortcut Solutions to DES,” IEEE Spectrum, v. 16, n. 7, July 1979, pp. 40–41. 1552. U.S. Senate Select Committee on Intelligence, “Unclassified Summary: Involvement of NSA in the Development of the Data Encryption Standard,” IEEE Communic...
View Full Document

Ask a homework question - tutors are online