Ремонт принтеров, сканнеров, факсов и остальной офисной техники


назад Оглавление вперед




[158]

368. D. Coppersmith, "Fast Evaluation of Logarithms in Fields of Characteristic Two," IEEE Transactions on Information Theory, v.30,n.4,Jull984,pp.587-594.

369.D. Coppersmith, "Another Birthday Attack, " Advances in Cryptology CRYPTO 85 Proceedings, Springer-Verlag, 1986, pp. 14-17.

370.D. Coppersmith, "Cheating at Mental Poker, " Advances in Cryptology CRYPTO 85 Proceedings, Springer-Verlag, 1986, pp. 104-107.

371.D. Coppersmith, "The Real Reason for Rivests Phenomenon, " Advances in Cryptology

CRYPTO 85 Proceedings, Springer-Verlag, 1986, pp. 535-536.

372.D. Coppersmith, "Two Broken Hash Functions," Research Report RD 18397, IBM T.J.

Watson Center, Oct 1992.

373.D. Coppersmith, "The Data Encryption Standard (DES) and Its Strength against Attacks,"

Technical Report RC 18613, IBM T.J. Watson Center, Dec 1992.

374.D. Coppersmith, "The Data Encryption Standard (DES) and its Strength against Attacks, "

IBM /ournal of Research and Development, v. 38, n. 3, May 1994, pp. 243-250.

375.D. Coppersmith, "Attack on the Cryptographic Scheme NIKS-TAS," Advances in

Cryptology CRYPTO 94 Proceedings, Springer-Verlag, 1994, pp. 294-307.

376.D. Coppersmith, personal communication, 1994.

377.D. Coppersmith and E. Grossman, "Generators for Certain Alternating Groups with

Applications to Cryptography, " SIAM Journal on Applied Mathematics, v. 29, n. 4, Dec 1975, pp. 624-627.

378.D. Coppersmith, H. Krawczyk, and Y. Mansour, "The Shrinking Generator, " Advances in

Cryptology CRYPTO 93 Proceedings, Springer-Verlag, 1994, pp. 22-39.

379.D. Coppersmith, A. Odlykzo, and R. Schroeppel, "Discrete Logarithms in GF (p),

Algorithmica, v. 1, n. 1, 1986, pp. 1-16.

380.D. Coppersmith and R Rogaway, "Software Efficient Pseudo Random Function and the Use

Thereof for Encryption," U.S. Patent pending, 1995.

381.D. Coppersmith, J. Stern, and S. Vaudenay, "Attacks on the Birational Signature Schemes,

" Advances in Cryptology CRYPTO 93 Proceedings, Springer-Verlag, 1994, pp. 435443.

382. V. Cordonnier and J.-J. Quisquater, eds.. CARD1S 94 Proceedings of the First Smart Card Research and Advanced Application Conference, Lille, France, 24-26 Oct 1994.


383.C. Couvreur and J.-J. Quisquater, "An Introduction to Fast Generation of Large Prime Numbers," Philips /ournal Research, v. 37. n. 5 6, 1982, pp. 231-264.

384.C. Couvreur and J.-J. Quisquater, "An Introduction to Fast Generation of Large Prime

Numbers," Philips journal Research, v. 38, 1983, i 77

385.C. Coveyou and R.D. MacPherson, "Fourier Analysis of Uniform Random Number

Gcncrators," lournal of the ACM, v. 14, n. 1, 1967, pp. 100-119.

386.T.M. Cover and R.C. King, "A Convergent Gambling Estimate of the Entropy of English,"

IEEE Tran.saction.s on Informa- tion Theory, v. IT-24, n. 4, Jul 1978, pp. 413-421.

387.R.J.F. Cramer and T.R Pedersen, "Improved Privacy in Wallets with Observers," Advances

in Cryptology EZJROCRYPT 93 Proceedings, Springer-Verlag, 1994, pp. 329-343.

388.R.E. Crandell, "Method and Apparatus for Public Key Exchange in a Cryptographic

System," U.S. Patent #5,159,632, 27 Oct 1992.

389.C. Crepeau, "A Secure Poker Protocol That Minimizes the Effect of Player Coalitions,"

Advances in Cryptology CKYPIO 85 Proceedings, Springer-Verlag, 1986, pit. 73-86.

390.C. Crepcau, "A Zcro-Knowlcdge Poker Protocol that Achieves Confidentiality of the

Players Strategy, or How to Achieve an Electronic Poker Face, " Advances in Cryptology CRYPTO 86 Proceedings, Springer-Verlag, 1987, pp. 23Y-247,

391.C. Crepeau, "Equivalence Between Two Flavours of Oblivious Transfer," Advances in

Cryptology CRYPTO 87 Proceedings, Springer-Ver lag, 1988, pp. 350-354.

392.C. Crepeau, "Correct and Private Reductions among Oblivious Transfers," Ph.D.

dissertation, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 1990.

393.C. Crcpcau, "Quantum Oblivious Transfcr, " journal of Modern Optics, v. 41, n. 12, Dec

1994, pp. 2445-2454.

394.C. Crepeau and J. Kilian, "Achieving Oblivious Transfer Using Weakened Security

Assumptions, " Proceedings of the 29th Amllzal Symposium on the Foundatijns of Computer Science, 1 988, pp. 42-.32.

395.C. Crepeau and J. Kilian, "Weakening Security Assumptions and Oblivious Transfer, "

Advances in Cryptology CRYPTO 88 Proceedings, Springer-Verlag, 1990, pp. 2-7.

396.C. Crepeau and L. Salvail, "Quantum Oblivious Mutual Identification, " Advances in

Cryptology EUROCRYPT 95 Proceed- ings, Springer-Verlag 1995, pp. 133-146.


397.A. Curiger, H. Bonnenberg, R. Zimmermann, N. Felber, H. Kaeslin and W. Fichtner,

"VINCI: VLSI Implementation of the New Block Cipher IDEA," Proceedings of IEEE CICC 93, San Diego, CA, May 1993, pp. 15.5.1-15.5.4.

398.A. Curiger and B. Stuber, "Specification for the IDEA Chip, " Technical Report No.

92/03, Institut fur Integrierte Systeme, ETH Zurich, Feb 1992.

399.T. Cusick, "Boolean Functions Satisfying a Higher Order Strict Avalanche Criterion,"

Advances in Cryptology EUROCRYPT 93 Proceedings, Springer-Verlag, 1994, pp. 102117.

400.T.W. Cusick and M.C. Wood, "The REDOC-II Cryptosystem," Advances in Cryptology

CRYPTO 90 Proceedings, Springer-Verlag, 1991, pp. 545-563.

401.Cylink Corporation, Cylink Corporation vs. RSA Data Security, Inc., Civil Action No.

C94-02332-CW, United States District Court for the Northern District of Califor- nia, 30

Jun 1994.

402.J. Daeman, "Cipher and Hash Function Design, " Ph.D. Thesis, Katholieke Univer- siteit

Leuven, Mar 95.

403.J. Daeman, A. Bosselaers, R. Govaerts, and J. Vandewalle, "Collisions for Schnorrs Hash

Function FFT-Hash Presented at Crypto 91," Advances in Cryptology ASIA CRYPT 91

Proceedings, Springer- Verlag, 1993, pp. 477-480.

404.J. Daeman, R. Govaerts, and J. Vandewalle, "A Framework for the Design of One-Way

Hash Functions Including Cryptanalysis of Damgards Onc-Way Function Based on Cellular Automata, " Advances in Cryp- tology ASIA CRYPT 91 Proceedings, Springer-

Verlag, 1993, pp. 82-96.

405.J. Daeman, R. Govaerts, and J. Vandewalle, "A Hardware Design Model for Crypto-

graphic Algorithms, " ESORICS 92, Pro- ceedings of the Second European Sympo- sium on Research in Computer Security, Springer-Verlag, 1992, pp. 419 434.

406.J. Daemcn, R. Govacrts, and J. Vandewalle, "Block Ciphers Based on Modular Arithmetic, " Proceedings of the 3rd Symposium on State and Progress of Research in Cryptography,

Rome, Italy, 15-16 Feb 1993, pp. 418. 80-89.

407.J. Daemen, R. Govaerts. and J. Vandewalle, "Fast Hashing Both in Hardware and Soft ware," presented at the rump session of CRYPTO 93, Aug 1993.

408.J. Daeman, R. Govaerts, and J. Vandewalle, "Resynchronization Weaknesses in Syn chronous Stream Ciphers," Advances in Cryptology E UR O CRYPT 93 Proceed ings, Springer-Verlag, 1994, pp. 159-167.

409.J. Daeman, R. Govaerts, and J. Vandewalle, "Weak Keys for IDEA, " Advances in Cryptology CRYPTO 93 Proceedings, Springer-Verlag, 1994, pp. 224-230.



[стр.Начало] [стр.1] [стр.2] [стр.3] [стр.4] [стр.5] [стр.6] [стр.7] [стр.8] [стр.9] [стр.10] [стр.11] [стр.12] [стр.13] [стр.14] [стр.15] [стр.16] [стр.17] [стр.18] [стр.19] [стр.20] [стр.21] [стр.22] [стр.23] [стр.24] [стр.25] [стр.26] [стр.27] [стр.28] [стр.29] [стр.30] [стр.31] [стр.32] [стр.33] [стр.34] [стр.35] [стр.36] [стр.37] [стр.38] [стр.39] [стр.40] [стр.41] [стр.42] [стр.43] [стр.44] [стр.45] [стр.46] [стр.47] [стр.48] [стр.49] [стр.50] [стр.51] [стр.52] [стр.53] [стр.54] [стр.55] [стр.56] [стр.57] [стр.58] [стр.59] [стр.60] [стр.61] [стр.62] [стр.63] [стр.64] [стр.65] [стр.66] [стр.67] [стр.68] [стр.69] [стр.70] [стр.71] [стр.72] [стр.73] [стр.74] [стр.75] [стр.76] [стр.77] [стр.78] [стр.79] [стр.80] [стр.81] [стр.82] [стр.83] [стр.84] [стр.85] [стр.86] [стр.87] [стр.88] [стр.89] [стр.90] [стр.91] [стр.92] [стр.93] [стр.94] [стр.95] [стр.96] [стр.97] [стр.98] [стр.99] [стр.100] [стр.101] [стр.102] [стр.103] [стр.104] [стр.105] [стр.106] [стр.107] [стр.108] [стр.109] [стр.110] [стр.111] [стр.112] [стр.113] [стр.114] [стр.115] [стр.116] [стр.117] [стр.118] [стр.119] [стр.120] [стр.121] [стр.122] [стр.123] [стр.124] [стр.125] [стр.126] [стр.127] [стр.128] [стр.129] [стр.130] [стр.131] [стр.132] [стр.133] [стр.134] [стр.135] [стр.136] [стр.137] [стр.138] [стр.139] [стр.140] [стр.141] [стр.142] [стр.143] [стр.144] [стр.145] [стр.146] [стр.147] [стр.148] [стр.149] [стр.150] [стр.151] [стр.152] [стр.153] [стр.154] [стр.155] [стр.156] [стр.157] [стр.158] [стр.159] [стр.160] [стр.161] [стр.162] [стр.163] [стр.164] [стр.165] [стр.166] [стр.167] [стр.168] [стр.169] [стр.170] [стр.171] [стр.172] [стр.173] [стр.174] [стр.175] [стр.176] [стр.177] [стр.178] [стр.179] [стр.180] [стр.181] [стр.182] [стр.183] [стр.184] [стр.185] [стр.186] [стр.187] [стр.188] [стр.189] [стр.190] [стр.191] [стр.192] [стр.193] [стр.194] [стр.195] [стр.196] [стр.197] [стр.198] [стр.199] [стр.200] [стр.201] [стр.202] [стр.203]