applied cryptography - protocols, algorithms, and source code in c

Implementation with diffie hellman 519520 elgamal 519

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Proceedings, Springer–Verlag, 1994, pp. 40–49. 1527. T. Tokita, T. Sorimachi, and M. Matsui, “An Efficient Search Algorithm for the Best Expression on Linear Cryptanalysis,” IEICE Japan, Technical Report, ISEC93–97, 1994. 1528. M. Tompa and H. Woll, “Random Self–Reducibility and Zero–Knowledge Interactive Proofs of Possession of Information,” Proceedings of the 28th IEEE Symposium on the Foundations of Computer Science, 1987, pp. 472–482. 1529. M. Tompa and H. Woll, “How to Share a Secret with Cheaters,” Journal of Cryptology, v. 1, n. 2, 1988, pp. 133–138. 1530. M.–J. Toussaint, “Verification of Cryptographic Protocols,” Ph.D. dissertation, Université de Li•ge, 1991. 1531. M.–J. Toussaint, “Deriving the Complete Knowledge of Participants in Cryptographic Protocols,” Advances in Cryptology—CRYPTO ’91 Proceedings, Springer–Verlag, 1992, pp. 24–43. 1532. M.–J. Toussaint, “Separating the Specification and Implementation Phases in Cryptology,” ESORICS 92, Proceedings of the Second European Symposium on Research in Computer Security, Springer–Verlag, 1992, pp. 77–101. 1533. P.D. Townsend, J.G. Rarity, and P.R. Tapster, “Enhanced Single Photon Fringe Visibility in a 10 km–Long Prototype Quantum Cryptography Channel,” Electronics Letters, v. 28, n. 14, 8 Jul 1993, pp. 1291–1293. 1534. S.A. Tretter, “Properties of PN2 Sequences,” IEEE Transactions on Information Theory, v. IT–20, n. 2, Mar 1974, pp. 295–297. 1535. H. Truman, “Memorandum for: The Secretary of State, The Secretary of Defense,” A 20707 5/4/54/OSO, NSA TS CONTL. NO 73–00405, 24 Oct 1952. 1536. Y.W. Tsai and T. Hwang, “ID Based Public Key Cryptosystem Based on Okamoto and Tanaka’s ID Based One–Way Communications Scheme,” Electronics Letters, v. 26, n. 10, 1 May 1990, pp. 666–668. 1537. G. Tsudik, “Message Authentication with One–Way Hash Functions,” ACM Computer Communications Review, v. 22, n. 5, 1992, pp. 29–38. 1538. S. Tsujii and K. Araki, “A Rebuttal to Coppersmith’s Attacking Method,” memorandum presented at Crypto ’94, Aug 1994. 1539. S. Tsujii, K. Araki, J. Chao, T. Sekine, and Y. Matsuzaki, “ID–Based Key Sharing Scheme—Cancellation of Random Numbers by Iterative Addition,” IEICE Japan, Technical Report, ISEC 92–47, Oct 1992. 1540. S. Tsujii, K. Araki, and T. Sekine, “A New Scheme of Noninteractive ID–Based Key Sharing with Explosively High Degree of Separability,” Techni...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online