applied cryptography - protocols, algorithms, and source code in c

Pseudo hadamard transform 340 pseudo random function

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: oto, and H. Imai, “On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses,” Advances in Cryptology—CRYPTO ’89 Proceedings, Springer–Verlag, 1990, pp. 461–480. 1645. Y. Zheng, T. Matsumoto, and H. Imai, “Duality between two Cryptographic Primitives,” Proceedings of the 8th International Conference on Applied Algebra, Algebraic Algorithms and Error–Correcting Codes, Springer–Verlag, 1991, pp. 379–390. 1646. Y. Zheng, J. Pieprzyk, and J. Seberry, “HAVAL—A One–Way Hashing Algorithm with Variable Length of Output,” Advances in Crytology—AUSCRYPT ’92 Proceedings, Springer–Verlag, 1993, pp. 83–104. 1647. N. Zierler, “Linear Recurring Sequences,” Journal Soc. Indust. Appl. Math., v. 7, n. 1, Mar 1959, pp. 31–48. 1648. N. Zierler, “Primitive Trinomials Whose Degree Is a Mersenne Exponent,” Information and Control, v. 15, 1969, pp. 67–69. 1649. N. Zierler and J. Brillhart, “On Primitive Trinomials (mod 2),” Information and Control, v. 13, n. 6, Dec 1968, pp. 541–544. 1650. N. Zierler and W.H. Mills, “Products of Linear Recurring Sequences,” Journal of Algebra, v. 27, n. 1, Oct 1973, pp. 147–157. 1651. C. Zimmer, “Perfect Gibberish,” Discover, v. 13, n. 12, Dec 1992, pp. 92–99. 1652. P.R. Zimmermann, The Official PGP User’s Guide, Boston: MIT Press, 1995. 1653. P.R. Zimmermann, PGP Source Code and Internals, Boston: MIT Press, 1995. Previous Table of Contents Next Products | Contact Us | About Us | Privacy | Ad Info | Home Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc. All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is prohibited. Read EarthWeb's privacy statement. To access the contents, click the chapter and section titles. Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth) Go! Keyword Brief Full Advanced Search Search Tips (Publisher: John Wiley & Sons, Inc.) Author(s): Bruce Schneier ISBN: 0471128457 Publication Date: 01/01/96 Search this book: Go! Previous Table of Contents Next ----------- Index A5, 389, 662–667 Abadi, Martin, 66 Absolute rate, of language, 234 Accreditation, 103 Active attacks, 27 Active cheaters, 27 Adams, Carlisle, 334 Adaptive-chosen-plaintext attack, 6 Addition chaining, 244 Additive generators, 390–392 Adjudicated protocol, 26, 71 Adjudicator, 26 Adlem...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online