applied cryptography - protocols, algorithms, and source code in c

O widman crypto users handbook a guide for

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: “On the Limitation of BAN Logic,” Advances in Cryptology—EUROCRYPT ’93 Proceedings, Springer–Verlag, 1994, pp. 240–247. 222. C. Boyd and W. Mao, “Designing Secure Key Exchange Protocols,” Computer Security—ESORICS 94, Springer–Verlag, 1994, pp. 217–230. 223. B.O. Brachtl, D. Coppersmith, M.M. Hyden, S.M. Matyas, C.H. Meyer, J. Oseas, S. Pilpel, and M. Schilling, “Data Authentication Using Modification Detection Codes Based on a Public One Way Function,” U.S. Patent #4,908,861, 13 Mar 1990. 224. J. Brandt, I.B. Damgård, P. Landrock, and T. Pederson, “Zero–Knowledge Authentication Scheme with Secret Key Exchange,” Advances in Cryptology—CRYPTO ’88, Springer–Verlag, 1990, pp. 583–588. 225. S.A. Brands, “An Efficient Off–Line Electronic Cash System Based on the Representation Problem,” Report CS–R9323, Computer Science/Department of Algorithms and Architecture, CWI, Mar 1993. 226. S.A. Brands, “Untraceable Off–line Cash in Wallet with Observers,” Advances in Cryptology—CRYPTO ’93, Springer–Verlag, 1994, pp. 302–318. 227. S.A. Brands, “Electronic Cash on the Internet,” Proceedings of the Internet Society 1995 Symposium on Network and Distributed Systems Security, IEEE Computer Society Press 1995, pp 64–84. 228. D.K. Branstad, “Hellman’s Data Does Not Support His Conclusion,” IEEE Spectrum, v. 16, n. 7, Jul 1979, p. 39. 229. D.K. Branstad, J. Gait, and S. Katzke, “Report on the Workshop on Cryptography in Support of Computer Security,” NBSIR 77–1291, National Bureau of Standards, Sep 21–22, 1976, September 1977. 230. G. Brassard, “A Note on the Complexity of Cryptography,” IEEE Transactions on Information Theory, v. IT–25, n. 2, Mar 1979, pp. 232–233. 231. G. Brassard, “Relativized Cryptography,” Proceedings of the IEEE 20th Annual Symposium on the Foundations of Computer Science, 1979, pp. 383–391. 232. G. Brassard, “A Time–Luck Tradeoff in Relativized Cryptography,” Proceedings of the IEEE 21st Annual Symposium on the Foundations of Computer S...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online