applied cryptography - protocols, algorithms, and source code in c

G pinheiro how to strengthen feal against

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: n Computer Laboratory, Harvard University, 1981. 1287. M.O. Rabin, “Fingerprinting by Random Polynomials,” Technical Report TR–15–81, Center for Research in Computing Technology, Harvard University, 1981. 1288. T. Rabin and M. Ben–Or, “Verifiable Secret Sharing and Multiparty Protocols with Honest Majority,” Proceedings of the 21st ACM Symposium on the Theory of Computing, 1989, pp. 73–85. 1289. RAND Corporation, A Million Random Digits with 100,000 Normal Deviates, Glencoe, IL: Free Press Publishers, 1955. 1290. T.R.N. Rao, “Cryposystems Using Algebraic Codes,” International Conference on Computer Systems and Signal Processing, Bangalore, India, Dec 1984. 1291. T.R.N. Rao, “On Struit–Tilburg Cryptanalysis of Rao–Nam Scheme,” Advances in Cryptology—CRYPTO ’87 Proceedings, Springer–Verlag, 1988, pp. 458–460. 1292. T.R.N. Rao and K.H. Nam, “Private–Key Algebraic–Coded Cryptosystems,” Advances in Cryptology—CRYPTO ’86 Proceedings, Springer–Verlag, 1987, pp. 35–48. 1293. T.R.N. Rao and K.H. Nam, “Private–Key Algebraic–Code Encryptions,” IEEE Transactions on Information Theory, v. 35, n. 4, Jul 1989, pp. 829–833. 1294. J.A. Reeds, “Cracking Random Number Generator,” Cryptologia, v. 1, n. 1, Jan 1977, pp. 20–26. 1295. J.A. Reeds, “Cracking a Multiplicative Congruential Encryption Algorithm,” in Information Linkage Between Applied Mathematics and Industry, P.C.C. Wang, ed., Academic Press, 1979, pp. 467–472. 1296. J.A. Reeds, “Solution of Challenge Cipher,” Cryptologia, v. 3, n. 2, Apr 1979, pp. 83–95. 1297. J.A. Reeds and J.L. Manferdelli, “DES Has No Per Round Linear Factors,” Advances in Cryptology: Proceedings of CRYPTO 84, Springer–Verlag, 1985, pp. 377–389. 1298. J.A. Reeds and N.J.A. Sloane, “Shift Register Synthesis (Modulo m),” SIAM Journal on Computing, v. 14, n. 3, Aug 1985, pp. 505–513. 1299. J.A. Reeds and P.J. Weinberger, “File Security and the UNIX Crypt Command,...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online