Cryptography Reference
In-Depth Information
[174] W.B. Muller and and R. Norbauer, Cryptanalysis of the Dickson-scheme
in Advances in Cryptology, EUROCRYPT '85 (Linz 1985), Springer-Verlag,
Berlin, LNCS 219 (1986), 50-61. ( Cited on page 581. )
[175] S. Murphy, The cryptanalysis of FEAL-4 with 20 chosen plaintexts ,J.
Cryptol. 2 (1990), 145-154. ( Cited on page 127. )
[176] M. Myers, R. Ankeny, A. Malpani, S. Galperin, and C. Adams, X.509
Internet Public Key Infrastructure On-Line Certificate Status protocol —
OCSP , Internet Request for Comments 2560 (June 1999). ( Cited on page
240. )
[177] R.M. Needham and M.D. Schroeder, Using encryption for authentication
in large networks of computers , Commun. ACM 21 (1978), 993-999. ( Cited
on page 197. )
[178] R.M. Needham and M.D. Schroeder, Authentication revisited , Operating
Syst. Rev. 21 (1987), 7. ( Cited on page 197. )
[179] W.B. Nobauer, Uber Gruppen von Dickson-Polynomfunktionen und einige
damit zusammenhangende zahlentheoretische Fragen , Monatsh. Math. 77
(1973), 330-344. ( Cited on page 578. )
[180] W.B. Nobauer, Uber die Fixpunkte der Dickson-Permutationen ,
Osterreich. Akad. Wiss. Math.-Natur. Kl. Sitzungsber. II 193 (1984), 115-
133. ( Cited on page 578. )
[181] W.B. Nobauer, Redei-Funktionen fur Zweierpotenzen , Period. Math. Hun-
gar. 17 (1986), 37-44. ( Cited on page 581. )
[182] T. Okamoto and K. Ohta, Universal electronic cash ,in Advances in
Cryptology , CRYPTO '91, Springer-Verlag, Berlin, LNCS 576 (1992),
324-337. ( Cited on page 231. )
[183] P. van Oorschot, A comparison of practical public-key cryptosystems based
on integer factorization and discrete logarithms ,in ContemporaryCryp-
tography: The Science of Information Integrity , G. Simmons, ed.,
IEEE Press, Piscatoway, NJ (1992), 289-322. ( Cited on page 165. )
[184] D.H. Phan and D. Pointchevel, About the security of ciphers ( Semantic
security and pseudo-random permutations ), in Proceedings of the Eleventh
Annual Workshop on Selected Areas of Cryptography, Waterloo, Canada
(H.Handschuh and A. Hasan eds.) (2004). ( Cited on page 508. )
[185] PKCS1, Public key cryptography standard no. 1 version 2 . 0, RSA Labs.
( Cited on page 174. )
[186] E.A. Poe, Edgar Allan Poe Selected Works , Random House, Toronto,
New York (1990), 357-381. ( Cited on page 37. )
Search WWH ::




Custom Search