메뉴 건너뛰기




Volumn 37, Issue 11, 1994, Pages 56-65

Cryptanalysis and Protocol Failures

(1)  Simmons, Gustavus J a  

a NONE   (United States)

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMMUNICATION CHANNELS (INFORMATION THEORY); COMPUTATIONAL METHODS; CRYPTOGRAPHY; DATA COMMUNICATION SYSTEMS; FAILURE ANALYSIS; NETWORK PROTOCOLS; SYSTEMS ANALYSIS;

EID: 0028532997     PISSN: 00010782     EISSN: 15577317     Source Type: Journal    
DOI: 10.1145/188280.188298     Document Type: Article
Times cited : (41)

References (12)
  • 1
    • 84976829824 scopus 로고
    • Special section on encryption standards and the proposed digital signature standard. (July)
    • Commun. ACM. Special section on encryption standards and the proposed digital signature standard. (July 1992), 32-54.
    • (1992) Commun. ACM. , pp. 32-54
  • 2
    • 84976722218 scopus 로고
    • 186. Digital signature standard (DSS). May
    • Federal Information Processing Standard (FIPS) 186. Digital signature standard (DSS). May 1994.
    • (1994)
  • 3
    • 0026652177 scopus 로고
    • A cubic residue code equivalent to factorization
    • Loxton, J., Khoo, D.S.P., Bird, G.J., and Seberry, J. A cubic residue code equivalent to factorization. J Cryptol 5 (1992), 139-150.
    • (1992) J Cryptol , vol.5 , pp. 139-150
    • Loxton, J.1    Khoo, D.S.P.2    Bird, G.J.3    Seberry, J.4
  • 4
    • 84976812255 scopus 로고
    • Contemporary cryptology: An introduction
    • G.J. Simmons, Ed. IEEE Press, New York, pp. 3-39; also in Proceedings of the IEEE 76, 5 (May), 1991
    • Massey, J.L. Contemporary cryptology: An introduction. In Contemporary Cryptology: The Science of Information Integrity, G.J. Simmons, Ed. IEEE Press, New York, 1991, pp. 3-39; also in Proceedings of the IEEE 76, 5 (May 1988), 533-549.
    • (1988) Contemporary Cryptology: The Science of Information Integrity , pp. 533-549
    • Massey, J.L.1
  • 6
    • 0024014116 scopus 로고
    • also in, (May)
    • also in Proceedings of the IEEE 76, 5 (May 1988), 594-602.
    • (1988) Proceedings of the IEEE , vol.76 , Issue.5 , pp. 594-602
  • 7
    • 1642535141 scopus 로고
    • The subliminal channels in the U.S. digital signature algorithm (DSA)
    • (Rome, Italy, Feb. 15-16). W. Wolfowicz, Ed. Fondazione Ugo Bordoni, Rome
    • Simmons, G.J. The subliminal channels in the U.S. digital signature algorithm (DSA). In Proceedings of the 3rd Symposium on Stale and Progress of Research in Cryptography (Rome, Italy, Feb. 15-16). W. Wolfowicz, Ed. Fondazione Ugo Bordoni, Rome, 1993, pp. 35-54.
    • (1993) Proceedings of the 3rd Symposium on Stale and Progress of Research in Cryptography , pp. 35-54
    • Simmons, G.J.1
  • 8
    • 84978194862 scopus 로고
    • Subliminal communication is possible using the DSA
    • Tor Helleseth Ed. (Lofthus, Norway, May 23-27, 1993), Springer-Verlag, Berlin
    • Simmons, G.J. Subliminal communication is possible using the DSA. In Lecture Notes in Computer Science 765: Advances in Cryptology: Proceedings Eurocrypt '93. Tor Helleseth Ed. (Lofthus, Norway, May 23-27, 1993), Springer-Verlag, Berlin, 1994, pp. 218-232.
    • (1994) Lecture Notes in Computer Science 765: Advances in Cryptology: Proceedings Eurocrypt '93 , pp. 218-232
    • Simmons, G.J.1
  • 9
    • 3142696449 scopus 로고
    • An introduction to the mathematics of trust in security protocols
    • (Franconia, N.H., June 15-17). IEEE Computer Society Press, Los Alamitos, Calif.
    • Simmons, G.J. An introduction to the mathematics of trust in security protocols. In Proceedings: Computer Security Foundations Workshop VI (Franconia, N.H., June 15-17). IEEE Computer Society Press, Los Alamitos, Calif., 1993, pp. 121-127.
    • (1993) Proceedings: Computer Security Foundations Workshop VI , pp. 121-127
    • Simmons, G.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.