applied cryptography - protocols, algorithms, and source code in c

Polyalphabetic substitution cipher 1011 polygram

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ential Public–Key Distribution System,” IBM Systems Journal, v. 15, n. 1, 1982, pp. 102–116. 1632. K. Yiu and K. Peterson, “A Single–Chip VLSI Implementation of the Discrete Exponential Public–Key Distribution System,” Proceedings of Government Microcircuit Applications Conference, 1982, pp. 18–23. 1633. H.Y. Youm, S.L. Lee, and M.Y. Rhee, “Practical Protocols for Electronic Cash,” Proceedings of the 1993 Korea–Japan Workshop on Information Security and Cryptography, Seoul, Korea, 24–26 Oct 1993, pp. 10–22. 1634. M. Yung, “Cryptoprotocols: Subscriptions to a Public Key, the Secret Blocking, and the Multi–Player Mental Poker Game,” Advances in Cryptology: Proceedings of CRYPTO 84, Springer–Verlag, 1985, 439–453. 1635. G. Yuval, “How to Swindle Rabin,” Cryptologia, v. 3, n. 3, Jul 1979, pp. 187–190. 1636. K.C. Zeng and M. Huang, “On the Linear Syndrome Method in Cryptanalysis,” Advances in Cryptology—CRYPTO ’88 Proceedings, Springer–Verlag, 1990, pp. 469–478. 1637. K.C. Zeng, M. Huang, and T.R.N. Rao, “An Improved Linear Algorithm in Cryptanalysis with Applications,” Advances in Cryptology—CRYPTO ’90 Proceedings, Springer–Verlag, 1991, pp. 34–47. 1638. K.C. Zeng, C.–H. Yang, and T.R.N. Rao, “On the Linear Consistency Test (LCT) in Cryptanalysis with Applications,” Advances in Cryptology—CRYPTO ’89 Proceedings, Springer–Verlag, 1990, pp. 164–174. 1639. K.C. Zeng, C.–H. Yang, D.–Y. Wei, and T.R.N. Rao, “Pseudorandom Bit Generators in Stream–Cipher Cryptography,” IEEE Computer, v. 24, n. 2, Feb 1991, pp. 8–17. 1640. M. Zhang, S.E. Tavares, and L.L. Campbell, “Information Leakage of Boolean Functions and Its Relationship to Other Cryptographic Criteria,” Proceedings of the 2nd Annual ACM Conference on Computer and Communications Security, ACM Press, 1994, pp. 156–165. 1641. M. Zhang and G. Xiao, “A Modified Design Criterion for Stream Ciphers,” CHINACRYPT ’94, Xidian, China, 11–15 Nov 1994, pp. 201–209. (In Chinese.) 1642. Y. Zheng, T. Matsumoto, and H. Imai, “Duality between two Cryptographic Primitives,” Papers of Technical Group for Information Security, IEICE of Japan, Mar 1989, pp. 47–57. 1643. Y. Zheng, T. Matsumoto, and H. Imai, “Impossibility and Optimality Results in Constructing Pseudorandom Permutations,” Advances in Cryptology—EUROCRYPT ’89 Proceedings, Springer–Verlag, 1990, pp. 412–422. 1644. Y. Zheng, T. Matsum...
View Full Document

Ask a homework question - tutors are online