applied cryptography - protocols, algorithms, and source code in c

In french 526 a evans w kantrowitz and e weiss a user

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ic Scheme NIKS–TAS,” Advances in Cryptology—CRYPTO ’94 Proceedings, Springer–Verlag, 1994, pp. 294–307. 376. D. Coppersmith, personal communication, 1994. 377. D. Coppersmith and E. Grossman, “Generators for Certain Alternating Groups with Applications to Cryptography,” SIAM Journal on Applied Mathematics, v. 29, n. 4, Dec 1975, pp. 624–627. 378. D. Coppersmith, H. Krawczyk, and Y. Mansour, “The Shrinking Generator,” Advances in Cryptology—CRYPTO ’93 Proceedings, Springer–Verlag, 1994, pp. 22–39. 379. D. Coppersmith, A. Odlykzo, and R. Schroeppel, “Discrete Logarithms in GF(p),” Algorithmica, v. 1, n. 1, 1986, pp. 1–16. 380. D. Coppersmith and P. Rogaway, “Software Efficient Pseudo Random Function and the Use Thereof for Encryption,” U.S. Patent pending, 1995. 381. D. Coppersmith, J. Stern, and S. Vaudenay, “Attacks on the Birational Signature Schemes,” Advances in Cryptology—CRYPTO ’93 Proceedings, Springer–Verlag, 1994, pp. 435–443. 382. V. Cordonnier and J.–J. Quisquater, eds., CARDIS ’94—Proceedings of the First Smart Card Research and Advanced Application Conference, Lille, France, 24–26 Oct 1994. 383. C. Couvreur and J.–J. Quisquater, “An Introduction to Fast Generation of Large Prime Numbers,” Philips Journal Research, v. 37, n. 5–6, 1982, pp. 231–264. 384. C. Couvreur and J.–J. Quisquater, “An Introduction to Fast Generation of Large Prime Numbers,” Philips Journal Research, v. 38, 1983, p. 77. 385. C. Coveyou and R.D. MacPherson, “Fourier Analysis of Uniform Random Number Generators,” Journal of the ACM, v. 14, n. 1, 1967, pp. 100–119. 386. T.M. Cover and R.C. King, “A Convergent Gambling Estimate of the Entropy of English,” IEEE Transactions on Information Theory, v. IT–24, n. 4, Jul 1978, pp. 413–421. 387. R.J.F. Cramer and T.P. Pedersen, “Improved Privacy in Wallets with Observers,” Advances in Cryptology—EUROCRYPT ’93 Proceedings, Springer–Verlag, 1994, pp. 329–343. 388. R.E. Crandell, “Method and Apparatus for Public Key Exchange in a Crypt...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online