applied cryptography - protocols, algorithms, and source code in c

Rl rivest a shamir and lm adleman on digital

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Pseudorandom Number Generator with Dynamic Structure and Its Properties,” Proceedings of the 1994 Symposium on Cryptography and Information Security (SCIS 94), Biwako, Japan, 27–29 Jan 1994, pp. 8A.1–11. 1118. R. Morris, “The Data Encryption Standard—Retrospective and Prospects,” IEEE Communications Magazine, v. 16, n. 6, Nov 1978, pp. 11–14. 1119. R. Morris, remarks at the 1993 Cambridge Protocols Workshop, 1993. 1120. R. Morris, N.J.A. Sloane, and A.D. Wyner, “Assessment of the NBS Proposed Data Encryption Standard,” Cryptologia, v. 1, n. 3, Jul 1977, pp. 281–291. 1121. R. Morris and K. Thompson, “Password Security: A Case History,” Communications of the ACM, v. 22, n. 11, Nov 1979, pp. 594–597. 1122. S.B. Morris, “Escrow Encryption,” lecture at MIT Laboratory for Computer Science, 2 Jun 1994. 1123. M.N. Morrison and J. Brillhart, “A Method of Factoring and the Factorization of F7,” Mathematics of Computation, v. 29, n. 129, Jan 1975, pp. 183–205. 1124. L.E. Moser, “A Logic of Knowledge and Belief for Reasoning About Computer Security,” Proceedings of the Computer Security Foundations Workshop II, IEEE Computer Society Press, 1989, pp. 57–63. 1125. Motorola Government Electronics Division, Advanced Techniques in Network Security, Scottsdale, AZ, 1977. 1126. W.B. Müller, “Polynomial Functions in Modern Cryptology,” Contributions to General Algebra 3: Proceedings of the Vienna Conference, Vienna: Verlag Hölder–Pichler–Tempsky, 1985, pp. 7–32. 1127. W.B. Müller and W. Nöbauer, “Some Remarks on Public–Key Cryptography,” Studia Scientiarum Mathematicarum Hungarica, v. 16, 1981, pp. 71–76. 1128. W.B. Müller and W. Nöbauer, “Cryptanalysis of the Dickson Scheme,” Advances in Cryptology—EUROCRYPT ’85 Proceedings, Springer–Verlag, 1986, pp. 50–61. 1129. C. Muller–Scholer, “A Microprocessor–Based Cryptoprocessor,” IEEE Micro, Oct 1983, pp. 5–15. 1130. R.C. Mullin, E. Nemeth, and N. Weidenhofer, “Will Public Key Cryptosystems Live Up to Their Expectations?—HEP Impl...
View Full Document

Ask a homework question - tutors are online