applied cryptography - protocols, algorithms, and source code in c

Tuckerman and g waldbaum the ips cryptographic

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ficient Cryptosystems Based on Rabin’s Scheme,” Fifth Annual Computer Security Applications Conference, IEEE Computer Society Press, 1990, pp. 263–270. 698. L. Harn and D.–C. Wang, “Cryptanalysis and Modification of Digital Signature Scheme Based on Error–Correcting Codes,” Electronics Letters, v. 28, n. 2, 10 Jan 1992, p. 157–159. 699. L. Harn and Y. Xu, “Design of Generalized ElGamal Type Digital Signature Schemes Based on Discrete Logarithm,” Electronics Letters, v. 30, n. 24, 24 Nov 1994, p. 2025–2026. 700. L. Harn and S. Yang, “Group–Oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party,” Advances in Cryptology—AUSCRYPT ’92 Proceedings, Springer–Verlag, 1993, pp. 133–142. 701. G. Harper, A. Menezes, and S. Vanstone, “Public–Key Cryptosystems with Very Small Key Lengths,” Advances in Cryptology—EUROCRYPT ’92 Proceedings, Springer–Verlag, 1993, pp. 163–173. 702. C. Harpes, “Notes on High Order Differential Cryptanalysis of DES,” internal report, Signal and Information Processing Laboratory, Swiss Federal Institute of Technology, Aug 1993. 703. G.W. Hart, “To Decode Short Cryptograms,” Communications of the ACM, v. 37, n. 9, Sep 1994, pp. 102–108. 704. J. Hastad, “On Using RSA with Low Exponent in a Public Key Network,” Advances in Cryptology—CRYPTO ’85 Proceedings, Springer–Verlag, 1986, pp. 403–408. 705. J. Hastad and A. Shamir, “The Cryptographic Security of Truncated Linearly Related Variables,” Proceedings of the 17th Annual ACM Symposium on the Theory of Computing, 1985, pp. 356–362. 706. R.C. Hauser and E.S. Lee, “Verification and Modelling of Authentication Protocols,” ESORICS 92, Proceedings of the Second European Symposium on Research in Computer Security, Springer–Verlag, 1992, pp. 131–154. 707. B. Hayes, “Anonymous One–Time Signatures and Flexible Untraceable Electronic Cash,” Advances in Cryptology—AUSCRYPT ’90 Proceedings, Springer...
View Full Document

Ask a homework question - tutors are online