Cryptography Reference
In-Depth Information
[174] W.B. Muller and and R. Norbauer,
Cryptanalysis of the Dickson-scheme
in Advances in Cryptology, EUROCRYPT '85 (Linz 1985), Springer-Verlag,
Berlin, LNCS
219
(1986), 50-61. (
Cited on page 581.
)
[175] S. Murphy,
The cryptanalysis of FEAL-4 with 20 chosen plaintexts
,J.
Cryptol.
2
(1990), 145-154. (
Cited on page 127.
)
[176] M. Myers, R. Ankeny, A. Malpani, S. Galperin, and C. Adams,
X.509
Internet Public Key Infrastructure On-Line Certificate Status protocol —
OCSP
, Internet Request for Comments 2560 (June 1999). (
Cited on page
240.
)
[177] R.M. Needham and M.D. Schroeder,
Using encryption for authentication
in large networks of computers
, Commun. ACM
21
(1978), 993-999. (
Cited
on page 197.
)
[178] R.M. Needham and M.D. Schroeder,
Authentication revisited
, Operating
Syst. Rev.
21
(1987), 7. (
Cited on page 197.
)
[179] W.B. Nobauer,
Uber Gruppen von Dickson-Polynomfunktionen und einige
damit zusammenhangende zahlentheoretische Fragen
, Monatsh. Math.
77
(1973), 330-344. (
Cited on page 578.
)
[180] W.B. Nobauer,
Uber die Fixpunkte der Dickson-Permutationen
,
Osterreich. Akad. Wiss. Math.-Natur. Kl. Sitzungsber. II
193
(1984), 115-
133. (
Cited on page 578.
)
[181] W.B. Nobauer,
Redei-Funktionen fur Zweierpotenzen
, Period. Math. Hun-
gar.
17
(1986), 37-44. (
Cited on page 581.
)
[182] T. Okamoto and K. Ohta,
Universal electronic cash
,in
Advances in
Cryptology
, CRYPTO '91, Springer-Verlag, Berlin, LNCS
576
(1992),
324-337. (
Cited on page 231.
)
[183] P. van Oorschot,
A comparison of practical public-key cryptosystems based
on integer factorization and discrete logarithms
,in
ContemporaryCryp-
tography: The Science of Information Integrity
, G. Simmons, ed.,
IEEE Press, Piscatoway, NJ (1992), 289-322. (
Cited on page 165.
)
[184] D.H. Phan and D. Pointchevel,
About the security of ciphers
(
Semantic
security and pseudo-random permutations
), in Proceedings of the Eleventh
Annual Workshop on Selected Areas of Cryptography, Waterloo, Canada
(H.Handschuh and A. Hasan eds.) (2004). (
Cited on page 508.
)
[185] PKCS1,
Public key cryptography standard no.
1
version
2
.
0, RSA Labs.
(
Cited on page 174.
)
[186] E.A. Poe,
Edgar Allan Poe Selected Works
, Random House, Toronto,
New York (1990), 357-381. (
Cited on page 37.
)
Search WWH ::
Custom Search