applied cryptography - protocols, algorithms, and source code in c

It26 n 6 nov 1980 pp 726729 1602 hc williams an

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Allowing Open Objection to the Tally,” Transactions of the Institute of Electronics, Information, and Communication Engineers, v. E77–A, n. 1, 1994, pp. 24–30. 1371. K. Sako and J. Kilian, “Secure Voting Using Partially Compatible Homomorphisms,” Advances in Cryptology—CRYPTO ’94 Proceedings, Springer–Verlag, 1994, p. 411–424. 1372. K. Sako and J. Kilian, “Receipt–Free Mix–Type Voting Scheme—A Practical Solution to the Implementation of a Voting Booth,” Advances in Cryptology—EUROCRYPT ’95 Proceedings, Springer–Verlag, 1995, pp. 393–403. 1373. A. Salomaa, Public–Key Cryptography, Springer–Verlag, 1990. 1374. A. Salomaa and L. Santean, “Secret Selling of Secrets with Many Buyers,” ETACS Bulletin, v. 42, 1990, pp. 178–186. 1375. M. Sántha and U.V. Vazirani, “Generating Quasi–Random Sequences from Slightly Random Sources,” Proceedings of the 25th Annual Symposium on the Foundations of Computer Science, 1984, pp. 434–440. 1376. M. Sántha and U.V. Vazirani, “Generating Quasi–Random Sequences from Slightly Random Sources,” Journal of Computer and System Sciences, v. 33, 1986, pp. 75–87. 1377. S. Saryazdi, “An Extension to ElGamal Public Key Cryptosystem with a New Signature Scheme,” Proceedings of the 1990 Bilkent International Conference on New Trends in Communication, Control, and Signal Processing, North Holland: Elsevier Science Publishers, 1990, pp. 195–198. 1378. J.E. Savage, “Some Simple Self–Synchronizing Digital Data Scramblers,” Bell System Technical Journal, v. 46, n. 2, Feb 1967, pp. 448–487. 1379. B.P. Schanning, “Applying Public Key Distribution to Local Area Networks,” Computers & Security, v. 1, n. 3, Nov 1982, pp. 268–274. 1380. B.P. Schanning, S.A. Powers, and J. Kowalchuk, “MEMO: Privacy and Authentication for the Automated Office,” Proceedings of the 5th Conference on Local Computer Networks, IEEE Press, 1980, pp. 21–30. 1381. Schaumuller–Bichl, “Zur Analy...
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online