Cryptography Reference
In-Depth Information
[56] I.B. Damgard. A Design Principle for Hash Functions. In Advances in Cryptology
CRYPTO'89 , Santa Barbara, CA, Lecture Notes in Computer Science 435. Springer-
Verlag, NY, 1990, pp. 416-427.
[57] D.W. Davies, G.I.P. Parkin. The Average Cycle Size of the Key Stream in Output Feedback
Encipherment. In Advances in Cryptology, Proceedings of CRYPTO'82 , 1982, pp. 97-98.
Re-edited by Springer, NY, LNCS vol. 1440, 1998.
[58] T. Dierks, C. Allen. The TLS Protocol Version 1.0. Internet Standard. RFC 2246, The
Internet Society, 1999.
[59] W. Diffie, M.E. Hellman. New Directions in Cryptography. IEEE Transactions on Infor-
mation Theory , vol. IT-22, pp. 644-654, 1976.
[60] W. Diffie, S. Landau. Privacy on the Lineā€”The Politics of Wiretapping and Encryption .
The MIT Press, Cambridge, MA, 1998.
[61] H. Dobbertin. The First Two Rounds of MD4 are Not One-Way. In Fast Software Encryp-
tion'98 , Paris, France, Lecture Notes in Computer Science 1372. Springer-Verlag, NY,
1998, pp. 284-292.
[62] H. Dobbertin. Cryptanalysis of MD4. Journal of Cryptology , vol. 11, pp. 253-271,
1998.
[63] T. ElGamal. Cryptography and Logarithms over Finite Fields. PhD Thesis, Stanford
University, 1984.
[64] T. ElGamal. A Public-Key Cryptosystem and a Signature Scheme Based on Discrete
Logarithms. In Advances in Cryptology CRYPTO'84 , Santa Barbara, CA, Lecture Notes
in Computer Science 196. Springer-Verlag, NY, 1985, pp. 10-18.
[65] T. ElGamal. A Public-Key Cryptosystem and a Signature Scheme Based on Discrete
Logarithms. IEEE Transactions on Information Theory , vol. IT-31, pp. 469-472, 1985.
[66] U. Feige, A. Fiat, A. Shamir. Zero-Knowledge Proofs of Identity. Journal of Cryptology ,
vol. 1, pp. 77-94, 1988.
[67] N. Ferguson, B. Schneier. Practical Cryptography . John Wiley & Sons, NY, 2003.
[68] A. Fiat, A. Shamir. How to Prove Yourself: Practical Solutions to Identification
and Signature Problems. In Advances in Cryptology CRYPTO'86 , Santa Barbara,
CA, Lecture Notes in Computer Science 263. Springer-Verlag, NY, 1987, pp. 186-
194.
[69] J. Franks, P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen, L. Stew-
art. HTTP Authentication: Basic and Digest Access Authentication. Internet Standard.
RFC 2617, The Internet Society, 1999.
Search WWH ::




Custom Search