-
3
-
-
85030313424
-
-
private communication
-
Moti Yung, private communication.
-
-
-
Yung, M.1
-
4
-
-
84945163204
-
A High Speed Manipulation Detection Code
-
Springer Verlag, Lecture Notes on Computer Science
-
“A High Speed Manipulation Detection Code”, by Roben R. Jueneman, Advances in Cryptology - CRYPTO '86, Springer Verlag, Lecture Notes on Computer Science, Vol. 263, page 327 to 346.
-
Advances in Cryptology - CRYPTO '86
, vol.263
, pp. 327-346
-
-
Jueneman, R.R.1
-
5
-
-
85034664741
-
Another Birthday Attack
-
Springer Verlag, Lecture Notes on Computer Science
-
“Another Birthday Attack” by Don Coppersmith, Advances in Cryptology - CRYPTO '85, Springer Verlag, Lecture Notes on Computer Science, Vol. 218, pages 14 to 17.
-
Advances in Cryptology - CRYPTO '85
, vol.218
, pp. 14-17
-
-
Coppersmith, D.1
-
6
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
Springer Verlag, Lecture Notes on Computer Science
-
“A digital signature based on a conventional encryption function”, by Ralph C. Merkle, Advances in Cryptology CRYPTO 87, Springer Verlag, Lecture Notes on Computer Science, Vol. 293, page 369-378.
-
Advances in Cryptology CRYPTO 87
, vol.293
, pp. 369-378
-
-
Merkle, R.C.1
-
7
-
-
57849150065
-
Cryptography and Data Security
-
“Cryptography and Data Security”, by Dorothy E. R. Denning, Addison-Wesley 1982, page 170.
-
(1982)
Addison-Wesley
, pp. 170
-
-
Denning, D.E.R.1
-
8
-
-
0019587141
-
On the security of multiple encryption
-
July
-
“On the security of multiple encryption”, by Ralph C. Merkle, CACM Vol. 24 No. 7, July 1981 pages 465 to 467.
-
(1981)
CACM
, vol.24
, Issue.7
, pp. 465-467
-
-
Merkle, R.C.1
-
10
-
-
84890522850
-
Communication Theory of Secrecy Systems
-
Oct
-
“Communication Theory of Secrecy Systems”, by C. E. Shannon, Bell Sys. Tech. Jour. 28 (Oct. 1949) 656-715
-
(1949)
Bell Sys. Tech. Jour
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
11
-
-
0022114816
-
Message Authentication
-
September
-
“Message Authentication” by R. R. Jueneman, S. M. Matyas, C. H. Meyer, IEEE Communications Magazine, Vol. 23, No. 9, September 1985 pages 29-40.
-
(1985)
IEEE Communications Magazine
, vol.23
, Issue.9
, pp. 29-40
-
-
Jueneman, R.R.1
Matyas, S.M.2
Meyer, C.H.3
-
12
-
-
0022029028
-
Generating strong one-way functions with cryptographic algorithm
-
March
-
“Generating strong one-way functions with cryptographic algorithm”, by S. M. Matyas, C. H. Meyer, and J. Oseas, IBM Technical Disclosure Bulletin, Vol. 27, No. 10A, March 1985 pages 5658-5659
-
(1985)
IBM Technical Disclosure Bulletin
, vol.27
, Issue.10 A
, pp. 5658-5659
-
-
Matyas, S.M.1
Meyer, C.H.2
Oseas, J.3
-
13
-
-
85030315851
-
-
preliminary version June 9, Analysis of the system presented in [4]
-
“Analysis of Jueneman’s MDC Scheme”, by Don Coppersmith, preliminary version June 9, 1988. Analysis of the system presented in [4]
-
(1988)
Analysis of Jueneman’s MDC Scheme
-
-
Coppersmith, D.1
-
14
-
-
0024012695
-
The Data Encryption Standard: Past and Future
-
May
-
“The Data Encryption Standard: Past and Future” by M.E. Smid and D.K. Branstad, Proc. of the IEEE, Vol 76 No. 5 pp 550-559, May 1988
-
(1988)
Proc. of the IEEE
, vol.76
, Issue.5
, pp. 550-559
-
-
Smid, M.E.1
Branstad, D.K.2
-
15
-
-
85030329445
-
Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information
-
U.S. Government Priming Office, October
-
“Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information”, U.S. Congress, Office of Technology Assessment, OTA-CIT-310, U.S. Government Priming Office, October 1987
-
(1987)
U.S. Congress, Office of Technology Assessment, OTA-CIT-310
-
-
-
16
-
-
0017501281
-
Exhaustive cryptanalysis of the NBS data encryption standard
-
June
-
“Exhaustive cryptanalysis of the NBS data encryption standard”, by Whitfield Diffie and Martin Heilman, Computer, June 1977, pages 74-78
-
(1977)
Computer
, pp. 74-78
-
-
Diffie, W.1
Heilman, M.2
-
18
-
-
0000966673
-
One Way Hash Functions and DES
-
“One Way Hash Functions and DES”, by Ralph C. Merkle, Crypto '89.
-
Crypto '89
-
-
Merkle, R.C.1
-
19
-
-
85030314258
-
Data Encryption Standard (DES)
-
Springfield, VA, Apr
-
“Data Encryption Standard (DES)", National Bureau of Standards (U.S.), Federal Information Processing Standards Publication 46, National Technical Information Service, Springfield, VA, Apr. 1977
-
(1977)
National Bureau of Standards (U.S.), Federal Information Processing Standards Publication 46, National Technical Information Service
-
-
-
20
-
-
0001820140
-
Cryptography and Computer Privacy
-
May
-
“Cryptography and Computer Privacy”, by H. Feistei, Sei. Amer. Vol. 228, No. 5 pp 15-23, May 1973
-
(1973)
Sei. Amer
, vol.228
, Issue.5
, pp. 15-23
-
-
Feistei, H.1
-
23
-
-
85030317044
-
A Fast Software One-Way Hash Function
-
submitted to the, The C source for this method is available by anonymous FTP from arisia.xerox.com (13.1.100.206) in directory /pub/hash
-
“A Fast Software One-Way Hash Function,” submitted to the Journal of Cryptology. The C source for this method is available by anonymous FTP from arisia.xerox.com (13.1.100.206) in directory /pub/hash.
-
Journal of Cryptology
-
-
|