applied cryptography - protocols, algorithms, and source code in c

Frog protocol 5657 wiener michael 153 284 359 williams

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: back with carry shift registers, maximal-period, 406–407 Continued fraction algorithm, 256 Contract signing, simultaneous: with an arbitrator, 118 without an arbitrator face-to-face, 118–119 not face-to-face, 119–120 using cryptography, 120–122 Control Vector, 180 Convertible undeniable signatures, 538–539 Coppersmith, Don, 94, 266, 280, 283, 293, 398, 457 Coppersmith’s algorithm, 263 Correlation attack, 380 Correlation immunity, stream ciphers, 380 Correlations, random-sequence generators, 425 Counter mode, 205–206, 209 Counting coincidences, 14 Crab, 342–344 Credit cards, anonymous, 147 Crepeau, Claude, 555 Crypt(1), 414 CRYPT(3), 296 Cryptanalysis, 1, 5–8 differential, see Differential cryptanalysis FEAL, 311–312 GOST, 333–334 IDEA, 323 linear, 290–293 LOKI91, 316 Madryga, 306 N-Hash, 434–435 related-key, 290 Snefru, 432 types, 5–7 Cryptanalysts, 1 Crypt Breakers Workbench, 414 Cryptographers, 1 Cryptographic algorithm, see Cipher Cryptographically secure pseudo-random, 45 Cryptographic facility, 562 Cryptographic mode, 189 Cryptographic protection, databases, 73–74 Cryptographic protocol, 22 Cryptography, 1 CRYPTO-LEGGO, 414 Cryptologists, 1 Cryptology, 1 CRYPTO-MECCANO, 346 Cryptosystem...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online