-
2
-
-
0001263548
-
A Certified Digital Signature
-
unpublished paper
-
“A Certified Digital Signature”, unpublished paper. 1979. To appear in Crypto’ 89.
-
(1979)
Crypto’ 89
-
-
-
5
-
-
85034664741
-
Another Birthday Attack
-
Springer Verlag, Lecture Notes on Computer Science
-
“Another Birthday Attack” by Don Coppersmith, Advances in Cryptology-CRYPTO’ 85. Springer Verlag, Lecture Notes on Computer Science, Vol. 218, pages 14-17.
-
Advances in Cryptology-CRYPTO’ 85
, vol.218
, pp. 14-17
-
-
Coppersmith, D.1
-
6
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
Springer Verlag, Lecture Notes on Computer Science
-
“A digital signature based on a conventional encryption function”. by Ralph C. Merkle, Advances in Cryptology CRYPTO 87, Springer Verlag, Lecture Notes on Computer Science, Vol. 293. page 369–378.
-
Advances in Cryptology CRYPTO 87
, vol.293
, pp. 369-378
-
-
Merkle, R.C.1
-
8
-
-
0019587141
-
On the security of multiple encryption
-
July
-
“On the security of multiple encryption”. by Ralph C. Merkle. CACM Vol. 24 No. 7, July 1981 pages 465-467.
-
(1981)
CACM
, vol.24
, Issue.7
, pp. 465-467
-
-
Merkle, R.C.1
-
10
-
-
84890522850
-
Communication Theory of Secrecy Systems
-
Oct
-
“Communication Theory of Secrecy Systems”, by C. E. Shannon, Bell Sys. Tech. Jour. 28 (Oct. 1949) 656–715
-
(1949)
Bell Sys. Tech. Jour
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
11
-
-
0022114816
-
Message Authentication
-
September
-
“Message Authentication” by R. R. Jueneman. S. M. Matyas, C. H. Meyer, IEEE Communications Magazine, Vol. 23, No. 9. September 1985 pages 29–40.
-
(1985)
IEEE Communications Magazine
, vol.23
, Issue.9
, pp. 29-40
-
-
Jueneman, R.R.1
Matyas, S.M.2
Meyer, C.H.3
-
12
-
-
0022029028
-
Generating strong one-way functions with cryptographic algorithm
-
March
-
“Generating strong one-way functions with cryptographic algorithm”, by S. M. Matyas. C. H. Meyer, and J. Oseas, IBM Technical Disclosure Bulletin, Vol. 27, No. 10A. March 1985 pages 5658–5659
-
(1985)
IBM Technical Disclosure Bulletin
, vol.27
, Issue.10
, pp. 5658-5659
-
-
Matyas, S.M.1
Meyer, C.H.2
Oseas, J.3
-
13
-
-
85030315851
-
-
preliminary version June 9, Analysis of the system presented in [4]
-
“Analysis of Jueneman’s MDC Scheme”. by Don Coppersmith, preliminary version June 9.1988. Analysis of the system presented in [4].
-
(1988)
Analysis of Jueneman’s MDC Scheme
-
-
Coppersmith, D.1
-
14
-
-
0024012695
-
The Data Encryption Standard: Past and Future
-
May
-
“The Data Encryption Standard: Past and Future” by M.E. Smid and D.K. Branstad, Proc. of the IEEE, Vol 76 No. 5 pp 550–559, May 1988
-
(1988)
Proc. of the IEEE
, vol.76
, Issue.5
, pp. 550-559
-
-
Smid, M.E.1
Branstad, D.K.2
-
15
-
-
85032876264
-
-
U.S. Congress. Office of Technology Assessment OTA-CIT-310, U.S. Government Printing Office, October
-
“Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information”, U.S. Congress. Office of Technology Assessment OTA-CIT-310, U.S. Government Printing Office, October 1987
-
(1987)
-
-
-
16
-
-
0017501281
-
-
June
-
“Exhaustive cryptanalysis of the NBS data encryption standard”. Computer, June 1977. pages 74–78
-
(1977)
Computer
, pp. 74-78
-
-
-
18
-
-
0002182072
-
Secure program code with modification detection code
-
SEDEP, 8. Rud de la Michodiese, 75002. Paris, France
-
“Secure program code with modification detection code”. by Carl H. Meyer and Michael Schilling; Proceedings of the 5th Worldwide Congress on Computers and Communication Security and Protection — SECURICOM 88. pp. 111–130, SEDEP, 8. Rud de la Michodiese, 75002. Paris, France.
-
Proceedings of the 5Th Worldwide Congress on Computers and Communication Security and Protection — SECURICOM 88
, pp. 111-130
-
-
Meyer, C.H.1
Schilling, M.2
-
19
-
-
0024926516
-
Cryptography — A State of the Art Review
-
COMEURO 89. Hamburg, May 8–12, 1989
-
“Cryptography — A State of the Art Review,” by Carl H. Meyer, COMEURO 89. Hamburg, May 8–12, 1989. Proceedings-VLSI and Computer Peripherals, 3rd Annual European Computer Conference, pp. 150–154.
-
Proceedings-Vlsi and Computer Peripherals, 3Rd Annual European Computer Conference
, pp. 150-154
-
-
Meyer, C.H.1
-
20
-
-
85032878183
-
Design Principles for Hash Functions
-
“Design Principles for Hash Functions” by Ivan Damgaard. Crypto’ 89.
-
Crypto’ 89
-
-
Damgaard, I.1
|