applied cryptography - protocols, algorithms, and source code in c

Hart to decode short cryptograms communications of

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 1, 11 Jul 1994, pp. 35317–35318. 544. U. Feige, A. Fiat, and A. Shamir, “Zero Knowledge Proofs of Identity,” Proceedings of the 19th Annual ACM Symposium on the Theory of Computing, 1987, pp. 210–217. 545. U. Feige, A. Fiat, and A. Shamir, “Zero Knowledge Proofs of Identity,” Journal of Cryptology, v. 1, n. 2, 1988, pp. 77–94. 546. U. Feige and A. Shamir, “Zero Knowledge Proofs of Knowledge in Two Rounds,” Advances in Cryptology—CRYPTO ’89 Proceedings, Springer–Verlag, 1990, pp. 526–544. 547. J. Feigenbaum, “Encrypting Problem Instances, or,..., Can You Take Advantage of Someone Without Having to Trust Him,” Advances in Cryptology—CRYPTO ’85 Proceedings, Springer–Verlag, 1986, pp. 477–488. 548. J. Feigenbaum, “Overview of Interactive Proof Systems and Zero–Knowledge,” in Contemporary Cryptology: The Science of Information Integrity, G.J. Simmons, ed., IEEE Press, 1992, pp. 423–439. 549. J. Feigenbaum, M.Y. Liberman, E. Grosse, and J.A. Reeds, “Cryptographic Protection of Membership Lists,” Newsletter of the International Association of Cryptologic Research, v. 9, 1992, pp. 16–20. 550. J. Feigenbaum, M.Y. Liverman, and R.N. Wright, “Cryptographic Protection of Databases and Software,” Distributed Computing and Cryptography, J. Feigenbaum and M. Merritt, eds., American Mathematical Society, 1991, pp. 161–172. 551. H. Feistel, “Cryptographic Coding for Data–Bank Privacy,” RC 2827, Yorktown Heights, NY: IBM Research, Mar 1970. 552. H. Feistel, “Cryptography and Computer Privacy,” Scientific American, v. 228, n. 5, May 1973, pp. 15–23. 553. H. Feistel, “Block Cipher Cryptographic System,” U.S. Patent #3,798,359, 19 Mar 1974. 554. H. Feistel, “Step Code Ciphering System,” U.S. Patent #3,798,360, 19 Mar 1974. 555. H. Feistel, “Centralized Verification System,” U.S. Patent #3,798,605, 19 Mar 1974. 556. H. Feistel, W.A. Notz, and J.L. Smith, “Cryptographic Techniques for Machine to Machine Dat...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online