applied cryptography - protocols, algorithms, and source code in c

Applied cryptography protocols algorithms and source code in c

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: age Authentication,” IEEE Communications Magazine, v. 23, n. 9, Sep 1985, pp. 29–40. 794. D. Kahn, The Codebreakers: The Story of Secret Writing, New York: Macmillan Publishing Co., 1967. 795. D. Kahn, Kahn on Codes, New York: Macmillan Publishing Co., 1983. 796. D. Kahn, Seizing the Enigma, Boston: Houghton Mifflin Co., 1991. 797. P. Kaijser, T. Parker, and D. Pinkas, “SESAME: The Solution to Security for Open Distributed Systems,” Journal of Computer Communications, v. 17, n. 4, Jul 1994, pp. 501–518. 798. R. Kailar and V.D. Gilgor, “On Belief Evolution in Authentication Protocols,” Proceedings of the Computer Security Foundations Workshop IV, IEEE Computer Society Press, 1991, pp. 102–116. 799. B.S. Kaliski, “A Pseudo Random Bit Generator Based on Elliptic Logarithms,” Master’s thesis, Massachusetts Institute of Technology, 1987. 800. B.S. Kaliski, letter to NIST regarding DSS, 4 Nov 1991. 801. B.S. Kaliski, “The MD2 Message Digest Algorithm,” RFC 1319, Apr 1992. 802. B.S. Kaliski, “Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certificates and Related Services,” RFC 1424, Feb 1993. 803. B.S. Kaliski, “An Overview of the PKCS Standards,” RSA Laboratories, Nov 1993. 804. B.S. Kaliski, “A Survey of Encryption Standards, IEEE Micro, v. 13, n. 6, Dec 1993, pp. 74–81. 805. B.S. Kaliski, personal communication, 1993. 806. B.S. Kaliski, “On the Security and Performance of Several Triple–DES Modes,” RSA Laboratories, draft manuscript, Jan 1994. 807. B.S. Kaliski, R.L. Rivest, and A.T. Sherman, “Is the Data Encryption Standard a Group?”, Advances in Cryptology—EUROCRYPT ’85, Springer–Verlag, 1986, pp. 81–95. 808. B.S. Kaliski, R.L. Rivest, and A.T. Sherman, “Is the Data Encryption Standard a Pure Cipher? (Results of More Cycling Experiments in DES),” Advances in Cryptology—CRYPTO ’85 Proceedings, Springer–Verlag, 1986, pp. 212–226. 809. B.S. Kaliski, R.L. Rivest, and A.T. Sherman, “Is the...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online