applied cryptography - protocols, algorithms, and source code in c

Massey safer k64 a byteoriented blockciphering

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: riften und die Dechiffrir–kunst, E.S. Miller und Sohn, 1863. (In German.) 820. A. Kehne, J. Schonwalder, and H. Langendorfer, “A Nonce–Based Protocol for Multiple Authentications,” Operating Systems Review, v. 26, n. 4, Oct 1992, pp. 84–89. 821. J. Kelsey, personal communication, 1994. 822. R. Kemmerer, “Analyzing Encryption Protocols Using Formal Verification Techniques,” IEEE Journal on Selected Areas in Communications, v. 7, n. 4, May 1989, pp. 448–457. 823. R. Kemmerer, C.A. Meadows, and J. Millen, “Three Systems for Cryptographic Protocol Analysis,” Journal of Cryptology, v. 7, n. 2, 1994, pp. 79–130. 824. S.T. Kent, “Encryption–Based Protection Protocols for Interactive User–Computer Communications,” MIT/LCS/TR–162, MIT Laboratory for Computer Science, May 1976. 825. S.T. Kent, “Privacy Enhancement for Internet Electronic Mail: Part II: Certificate–Based Key Management,” RFC 1422, Feb 1993. 826. S.T. Kent, “Understanding the Internet Certification System,” Proceedings of INET ’93, The Internet Society, 1993, pp. BAB1–BAB10. 827. S.T. Kent and J. Linn, “Privacy Enhancement for Internet Electronic Mail: Part II: Certificate–Based Key Management,” RFC 1114, Aug 1989. 828. V. Kessler and G. Wedel, “AUTOLOG—An Advanced Logic of Authentication,” Proceedings of the Computer Security Foundations Workshop VII, IEEE Computer Society Press, 1994, pp. 90–99. 829. E.L. Key, “An Analysis of the Structure and Complexity of Nonlinear Binary Sequence Generators,” IEEE Transactions on Information Theory, v. IT–22, n. 6, Nov 1976, pp. 732–736. 830. T. Kiesler and L. Harn, “RSA Blocking and Multisignature Schemes with No Bit Expansion,” Electronics Letters, v. 26, n. 18, 30 Aug 1990, pp. 1490–1491. 831. J. Kilian, Uses of Randomness in Algorithms and Protocols, MIT Press, 1990. 832. J. Kilian, “Achieving Zero–Knowledge Robustly,” Advances in Cryptology—CRYPTO ’90 Proceedings, Springer–Verlag, 1991, pp. 313...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online