applied cryptography - protocols, algorithms, and source code in c

M sntha and uv vazirani generating quasirandom

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: , “Clipper Chip Technology,” 30 Apr 1993. 1156. National Institute of Standards and Technology, “Capstone Chip Technology,” 30 Apr 1993. 1157. J. Nechvatal, “Public Key Cryptography,” NIST Special Publication 800–2, National Institute of Standards and Technology, U.S. Department of Commerce, Apr 1991. 1158. J. Nechvatal, “Public Key Cryptography,” Contemporary Cryptology: The Science of Information Integrity, G.J. Simmons, ed., IEEE Press, 1992, pp. 177–288. 1159. R.M. Needham and M.D. Schroeder, “Using Encryption for Authentication in Large Networks of Computers,” Communications of the ACM, v. 21, n. 12, Dec 1978, pp. 993–999. 1160. R.M. Needham and M.D. Schroeder, “Authentication Revisited,” Operating Systems Review, v. 21, n. 1, 1987, p. 7. 1161. D.M. Nessett, “A Critique of the Burrows, Abadi, and Needham Logic,” Operating System Review, v. 20, n. 2, Apr 1990, pp. 35–38. 1162. B.C. Neuman and S. Stubblebine, “A Note on the Use of Timestamps as Nonces,” Operating Systems Review, v. 27, n. 2, Apr 1993, pp. 10–14. 1163. B.C. Neuman and T. Ts’o, “Kerberos: An Authentication Service for Computer Networks,” IEEE Communications Magazine, v. 32, n. 9, Sep 1994, pp. 33–38. 1164. L. Neuwirth, “Statement of Lee Neuwirth of Cylink on HR145,” submitted to congressional committees considering HR145, Feb 1987. 1165. D.B. Newman, Jr. and R.L. Pickholtz, “Cryptography in the Private Sector,” IEEE Communications Magazine, v. 24, n. 8, Aug 1986, pp. 7–10. 1166. H. Niederreiter, “A Public–Key Cryptosystem Based on Shift Register Sequences,” Advances in Cryptology—EUROCRYPT ’85 Proceedings, Springer–Verlag, 1986, pp. 35–39. 1167. H. Niederreiter, “Knapsack–Type Cryptosystems and Algebraic Coding Theory,” Problems of Control and Information Theory, v. 15, n. 2, 1986, pp. 159–166. 1168. H. Niederreiter, “The Linear Complexity Profile and the Jump Complexity of Keystream Sequences,” Advances in Cryptology—EUROCRYPT ’90 Proceedings, Springer–Verlag, 1991, pp. 174–188. 1169. V. Niemi, “A New Trapdoor in Knapsacks,...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online