applied cryptography - protocols, algorithms, and source code in c

Matsui differential attack on message authentication

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: . Luchangco and K. Koyama, “An Attack on an ID–Based Key Sharing System, Proceedings of the 1993 Korea–Japan Workshop on Information Security and Cryptography, Seoul, Korea, 24–26 Oct 1993, pp. 262–271. 995. D.J.C. MacKay, “A Free Energy Minimization Framework for Inferring the State of a Shift Register Given the Noisy Output Sequence,” K.U. Leuven Workshop on Cryptographic Algorithms, Springer–Verlag, 1995, to appear. 996. M.D. MacLaren and G. Marsaglia, “Uniform Random Number Generators,” Journal of the ACM v. 12, n. 1, Jan 1965, pp. 83–89. 997. D. MacMillan, “Single Chip Encrypts Data at 14Mb/s,” Electronics, v. 54, n. 12, 16 June 1981, pp. 161–165. 998. R. Madhavan and L.E. Peppard, “A Multiprocessor GaAs RSA Cryptosystem,” Proceedings CCVLSI–89: Canadian Conference on Very Large Scale Integration, Vancouver, BC, Canada, 22–24 Oct 1989, pp. 115–122. 999. W.E. Madryga, “A High Performance Encryption Algorithm,” Computer Security: A Global Challenge, Elsevier Science Publishers, 1984, pp. 557–570. 1000. M. Mambo, A. Nishikawa, S. Tsujii, and E. Okamoto, “Efficient Secure Broadcast Communication System,” Proceedings of the 1993 Korea–Japan Workshop on Information Security and Cryptography, Seoul, Korea, 24–26 Oct 1993, pp. 23–33. 1001. M. Mambo, K. Usuda, and E. Okamoto, “Proxy Signatures,” Proceedings of the 1995 Symposium on Cryptography and Information Security (SCIS 95), Inuyama, Japan, 24–27 Jan 1995, pp. B1.1.1–17. 1002. W. Mao and C. Boyd, “Towards Formal Analysis of Security Protocols,” Proceedings of the Computer Security Foundations Workshop VI, IEEE Computer Society Press, 1993, pp. 147–158. 1003. G. Marsaglia and T.A. Bray, “On–Line Random Number Generators and their Use in Combinations,” Communications of the ACM, v. 11, n. 11, Nov 1968, p. 757–759. 1004. K.M. Martin, “Untrustworthy Participants in Perfect Secret Sharing Schemes,” Cryptography and Coding III, M.J. Ganley, ed., Oxford: Clarendon Press, 1993, pp. 255–264. 1005. J.L. Massey, “Shift–Register Synthesis and...
View Full Document

Ask a homework question - tutors are online