%%% -*-BibTeX-*- %%% ==================================================================== %%% BibTeX-file{ %%% author = "Nelson H. F. Beebe", %%% version = "1.110", %%% date = "02 November 2023", %%% time = "07:31:09 MDT", %%% filename = "cryptography1990.bib", %%% address = "University of Utah %%% Department of Mathematics, 110 LCB %%% 155 S 1400 E RM 233 %%% Salt Lake City, UT 84112-0090 %%% USA", %%% telephone = "+1 801 581 5254", %%% FAX = "+1 801 581 4148", %%% URL = "https://www.math.utah.edu/~beebe", %%% checksum = "34791 87546 340808 3663690", %%% email = "beebe at math.utah.edu, beebe at acm.org, %%% beebe at computer.org (Internet)", %%% codetable = "ISO/ASCII", %%% keywords = "bibliography; BibTeX; Blowfish; cipher; %%% Clipper; code breaking; cracking; %%% cryptanalysis; crypto; cryptobytes; %%% cryptography; cryptology; cryptosystem; data %%% encryption algorithm; decryption; DES; %%% Diffie; digital signature; encryption; %%% Hellmann; International Data Encryption %%% Algorithm (IDEA); Kahn; Kerberos; key escrow; %%% kleptography; PGP; Pretty Good Privacy; %%% Rivest; RSA; Schneier; Smart Card; %%% steganography; Twofish; Zimmermann", %%% license = "public domain", %%% supported = "yes", %%% docstring = "This is bibliography of publications on %%% cryptography and related subjects for the %%% years 1606--1999. Material for years %%% 2000--date appears in a companion %%% bibliography, cryptography2000.bib, to reduce %%% the size of this bibliography. %%% %%% The initial draft of this bibliography was %%% extracted using the bibsearch utility from %%% the large TeX User Group and BibNet Project %%% bibliography archives, available on the %%% Internet at %%% %%% https://www.math.utah.edu/pub/tex/bib %%% https://www.math.utah.edu/pub/tex/bib/index-table.html %%% %%% and %%% %%% https://www.math.utah.edu/pub/bibnet %%% https://www.math.utah.edu/pub/bibnet/index.html %%% %%% As of April 1999, these archives hold more %%% than 231,000 bibliographic entries in BibTeX %%% form. %%% %%% Those results were then augmented by entries %%% for books found in the University of %%% California Melvyl catalog, the Library of %%% Congress catalog, and the OCLC WorldCat %%% database, and by other publications found in %%% the Compendex database, the OCLC Contents1st, %%% Proceedings, and PapersFirst databases, and %%% the MathSciNet database. %%% %%% Counterpane Systems maintains a Web site at %%% %%% http://www.counterpane.com/ %%% http://www.counterpane.com/publish.html %%% %%% with a substantial number of their technical %%% reports and articles available in electronic %%% form. %%% %%% The International Association for Cryptologic %%% Research (IACR) is a ``non-profit scientific %%% organization whose primary purpose is to %%% further research in cryptology and related %%% fields''. It has a World-Wide Web site at %%% %%% http://www.iacr.org/index.html %%% %%% IACR publishes an email newsletter thrice %%% yearly. Back issues are available starting %%% with Volume 15, Number 1, Fall 1998 at the %%% above site. It also supports a distinguished %%% lecture series %%% %%% http://www.iacr.org/publications/dl/ %%% %%% and a preprint server %%% %%% http://www.iacr.org/publications/preprint.html %%% %%% The Cryptography and Security Group at the %%% Department of Computer Science and %%% Engineering of the University of California %%% at San Diego supports a World-Wide Web site, %%% called the Theory of Cryptography Library, at %%% %%% http://philby.ucsd.edu/cryptolib/ %%% %%% There is another site with cryptographic %%% miscellanea and news articles at %%% %%% http://cryptome.org/ %%% %%% There is an archive of the cryptography %%% mailing list at %%% %%% http://www.mail-archive.com/cryptography%40wasabisystems.com/ %%% %%% All of the cited references from all of the %%% articles in the online journal CryptoBytes %%% are also included, with referencedin key %%% values recording the source of citations. %%% %%% However, publications in the journals %%% %%% * Cryptography and Communications, %%% * Cryptologia, %%% * Designs, Codes, and Cryptography, %%% * Groups Complexity Cryptology, %%% * Journal of Cryptology, %%% * Journal of Discrete Mathematical %%% Sciences and Cryptography %%% %%% are generally excluded, unless they are %%% cross-referenced by other entries in this %%% bibliography, because they are covered in %%% separate companion bibliographies, %%% cryptologia.bib, designscodescryptogr.bib, %%% jcryptology.bib, and jdiscrmathscicrypto.bib. %%% %%% At version 1.110, the year coverage looked %%% like this: %%% %%% 1988 ( 2) 1996 ( 469) 2004 ( 0) %%% 1989 ( 1) 1997 ( 540) 2005 ( 2) %%% 1990 ( 163) 1998 ( 791) 2006 ( 0) %%% 1991 ( 206) 1999 ( 724) 2007 ( 0) %%% 1992 ( 158) 2000 ( 3) 2008 ( 0) %%% 1993 ( 313) 2001 ( 2) 2009 ( 0) %%% 1994 ( 340) 2002 ( 0) 2010 ( 1) %%% 1995 ( 419) 2003 ( 0) %%% 19xx ( 21) %%% %%% Article: 2638 %%% Book: 222 %%% InCollection: 68 %%% InProceedings: 569 %%% Manual: 50 %%% MastersThesis: 68 %%% Misc: 101 %%% Periodical: 1 %%% PhdThesis: 28 %%% Proceedings: 219 %%% TechReport: 162 %%% Unpublished: 29 %%% %%% Total entries: 4155 %%% %%% There is a hypertext bibliography of %%% classical cryptography at %%% %%% http://ourworld.compuserve.com/homepages/crypto/BIB1XX.HTM %%% %%% CIPHER, the Electronic Newsletter of the %%% Technical Committee on Security and Privacy, %%% A Technical Committee of the Computer Society %%% of the IEEE, is available on the World-Wide %%% Web at %%% %%% http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher %%% %%% with pointers to all back issues (1994--1998). %%% %%% ``CRYPTO-GRAM is a free monthly newsletter %%% providing summaries, analyses, insights, and %%% commentaries on cryptography and computer %%% security. To subscribe, visit %%% %%% http://www.counterpane.com/crypto-gram.html %%% %%% or send a blank message to %%% %%% crypto-gram-subscribe at chaparraltree.com %%% %%% Back issues are available on %%% %%% http://www.counterpane.com'' %%% %%% CRYPTO-GRAM is a good source of news of %%% recent developments in the field, and %%% contains many interesting essays on aspects %%% of cryptography. %%% %%% There is a Web site on steganography at %%% %%% http://www.cl.cam.ac.uk/~fapp2/steganography/ %%% %%% In this bibliography, entries are sorted %%% first by ascending year, and within each %%% year, alphabetically by author or editor, %%% and then, if necessary, by the 3-letter %%% abbreviation at the end of the BibTeX %%% citation tag, using the bibsort -byyear %%% utility. Year order has been chosen to %%% make it easier to identify the most recent %%% work. %%% %%% The checksum field above contains a CRC-16 %%% checksum as the first value, followed by the %%% equivalent of the standard UNIX wc (word %%% count) utility output of lines, words, and %%% characters. This is produced by Robert %%% Solovay's checksum utility.", %%% } %%% ====================================================================

@Preamble{ "\ifx \undefined \cprime \def \cprime {$\mathsurround=0pt '$}\fi" # "\ifx \undefined \Dbar \def \Dbar {\leavevmode\raise0.2ex\hbox{--}\kern-0.5emD} \fi" # "\ifx \undefined \mathbb \def \mathbb #1{{\bf #1}}\fi" # "\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}}\fi" # "\ifx \undefined \operatorname \def \operatorname #1{{\rm #1}}\fi" # "\hyphenation{ Aba-di Arch-ives Ding-yi for-ge-ry Go-pa-la-krish-nan Hi-de-ki Kraw-czyk Lands-verk Law-rence Leigh-ton Mich-ael Moell-er North-ridge para-digm para-digms Piep-rzyk Piv-e-teau Ram-kilde Re-tro-fit-ting Rich-ard Sho-stak Si-ro-mo-n-ey Ste-ph-en The-o-dore Tho-m-as Tzone-lih venge-ance Will-iam Ye-sh-i-va }" }

%%% ==================================================================== %%% Acknowledgement abbreviations:

@String{ack-bs= "Bruce Schneier, Counterpane Systems, 101 East Minnehaha Parkway, Minneapolis, MN 55419, e-mail: \path|schneier@counterpane.com"} @String{ack-nhfb= "Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, FAX: +1 801 581 4148, e-mail: \path|beebe@math.utah.edu|, \path|beebe@acm.org|, \path|beebe@computer.org| (Internet), URL: \path|https://www.math.utah.edu/~beebe/|"} @String{ack-pb= "Preston Briggs, Tera Computer Company, 2815 Eastlake East, Seattle, WA 98102, USA, Tel: +1 206 325-0800, e-mail: \path|preston@tera.com|"}

%%% ==================================================================== %%% Institution abbreviations:

@String{inst-COUNTERPANE-INTERNET-SECURITY= "Counterpane Internet Security"} @String{inst-COUNTERPANE-INTERNET-SECURITY:adr= "3031 Tisch Way, Suite 100PE, San Jose, CA 95128, USA"} @String{inst-COUNTERPANE-LABS= "Counterpane Systems"} @String{inst-COUNTERPANE-LABS:adr= "101 East Minnehaha Parkway, Minneapolis, MN 55419"} @String{inst-COUNTERPANE-SYSTEMS= "Counterpane Systems"} @String{inst-COUNTERPANE-SYSTEMS:adr= "101 East Minnehaha Parkway, Minneapolis, MN 55419"}

%% Old address: %% String{inst-COUNTERPANE-SYSTEMS:adr = "Oak Park, IL, USA"}

@String{inst-CSU= "Colorado State University"} @String{inst-CSU:adr= "Fort Collins, CO, USA"} @String{inst-IBM-WATSON= "IBM T. J. Watson Research Center"} @String{inst-IBM-WATSON:adr= "Yorktown Heights, NY, USA"} @String{inst-KENT-STATE-UNIV= "Kent State University"} @String{inst-KENT-STATE-UNIV:adr= "Kent, OH, USA"} @String{inst-MIT-CS= "Massachusetts Institute of Technology, Computer Science Lab."} @String{inst-MIT:adr= "Cambridge, Massachusetts"} @String{inst-NORTHWESTERN-UNIVERSITY= "Northwestern University"} @String{inst-NORTHWESTERN-UNIVERSITY:adr= "Evanston, IL, USA"} @String{inst-SRC-IDA= "Supercomputing Research Center: IDA"} @String{inst-SRC-IDA:adr= "Lanham, MD, USA"} @String{inst-UC-BERKELEY-ICSI= "International Computer Science Institute"} @String{inst-UC-BERKELEY-ICSI:adr= "Berkeley, CA, USA"} @String{inst-UIUC-CSRD= "University of Illinois at Urbana-Champaign, Center for Supercomputing Research and Development"} @String{inst-UIUC-CSRD:adr= "Urbana, IL 61801, USA"} @String{inst-UTK= "University of Tennessee, Knoxville"} @String{inst-UTK:adr= "Knoxville, TN 37996, USA"}

%%% ==================================================================== %%% Journal abbreviations:

@String{j-ACTA-INFO= "Acta Informatica"} @String{j-ADV-ENG-SOFTWARE= "Advances in Engineering Software"} @String{j-ADV-IMAGING= "Advanced Imaging"} @String{j-ALGORITHMICA= "Algorithmica"} @String{j-AMER-MATH-MONTHLY= "American Mathematical Monthly"} @String{j-AMER-STAT= "The American Statistician"} @String{j-ANN-BIOMED-ENG= "Annals of biomedical engineering"} @String{j-ANN-HIST-COMPUT= "Annals of the History of Computing"} @String{j-ANNALS-MATH-STAT= "Ann. Math. Stat."} @String{j-APPL-ALGEBRA-ENG-COMMUN-COMPUT= "Applicable algebra in engineering, communication and computing"} @String{j-APPL-MATH-COMP= "Applied Mathematics and Computation"} @String{j-APPL-MATH-LETT= "Applied Mathematics Letters"} @String{j-APPL-NUM-MATH= "Applied Numerical Mathematics: Transactions of IMACS"} @String{j-APPL-STAT= "Applied Statistics"} @String{j-ASTERISK= "Asterisk: the journal of computer documentation"} @String{j-ATT-BELL-LAB-TECH-J= "ATT Bell Lab. tech. j"} @String{j-ATT-TECH-J= "AT\&T Technical Journal"} @String{j-BANK-SYST-TECHNOL= "Bank systems + technology"} @String{j-BELL-SYS-TECH-J= "The Bell System Technical Journal"} @String{j-BIOCHEM-CELL-BIO= "Biochemistry and cell biology = Biochimie et biologie cellulaire"} @String{j-BIT= "BIT"} @String{j-BT-TECH-J= "BT Technology Journal"} @String{j-BULL-AUSTRAL-MATH-SOC= "Bulletin of the Australian Mathematical Society"} @String{j-BYTE= "BYTE Magazine"} @String{j-C-PLUS-PLUS-REPORT= "C++ Report"} @String{j-CACM= "Communications of the Association for Computing Machinery"} @String{j-CAN-MATH-BULL= "Bulletin canadien de math\-{\'e}\-mat\-iques = Canadian Mathematical Bulletin"} @String{j-CCCUJ= "C/C++ Users Journal"} @String{j-CG-WORLD= "Computer Graphics World"} @String{j-CGF= "Com{\-}pu{\-}ter Graphics Forum"} @String{j-CGIP= "Computer Graphics and Image Processing"} @String{j-CHIN-J-COMPUTERS= "Chinese Journal of Computers = Chi suan chi hsueh pao"} @String{j-CISCO-WORLD= "Cisco World: The Independent Journal for Internetworking Professionals"} @String{j-COLLEGE-MATH-J= "College Mathematics Journal"} @String{j-COMP-ARCH-NEWS= "ACM SIGARCH Computer Architecture News"} @String{j-COMP-ART-INTELL= "Computers and Artificial Intelligence = Vychislitel'nye mashiny i iskusstvennyi intellekt"} @String{j-COMP-COMM-REV= "Computer Communications Review, ACM SIGCOMM"} @String{j-COMP-GRAPHICS= "Computer Graphics"} @String{j-COMP-J= "The Computer Journal"} @String{j-COMP-LANG-MAG= "Computer Language Magazine"} @String{j-COMP-LANGS= "Computer Languages"} @String{j-COMP-LAW-SECURITY-REP= "The Computer Law and Security Report"} @String{j-COMP-NET= "Computer Networks: The International Journal of Distributed Informatique"} @String{j-COMP-NET-AMSTERDAM= "Computer Networks (Amsterdam, Netherlands: 1999)"} @String{j-COMP-NET-ISDN= "Computer Networks and ISDN Systems"} @String{j-COMP-PHYS-COMM= "Computer Physics Communications"} @String{j-COMP-PHYSICS= "Computers in physics"} @String{j-COMP-STRUCTURES= "Computers and Structures"} @String{j-COMP-SURV= "ACM Computing Surveys"} @String{j-COMP-SYS= "Computing Systems"} @String{j-COMPLEX-SYSTEMS= "Complex Systems"} @String{j-COMPUT-COMPLEX= "Computational complexity"} @String{j-COMPUT-MATH-APPL= "Computers and Mathematics with Applications"} @String{j-COMPUT-METH-PROG-BIOMED= "Computer Methods and Programs in Biomedicine"} @String{j-COMPUT-SECUR= "Computers and Security"} @String{j-COMPUT-SECUR-J= "Computer Security Journal"} @String{j-COMPUT-SYST-ENG= "Computing systems in engineering: an international journal"} @String{j-COMPUT-SYST-SCI-ENG= "Computer Systems Science and Engineering"} @String{j-COMPUTER= "Computer"} @String{j-COMPUTERS-AND-GRAPHICS= "Computers and Graphics"} @String{j-COMPUTERWORLD= "Computerworld"} @String{j-COMPUTING= "Computing"} @String{j-CONG-NUM= "Congressus Numerantium"} @String{j-CONN-LAW-REVIEW= "Connecticut Law Review"} @String{j-CPE= "Concurrency: practice and experience"} @String{j-CRYPTOBYTES= "CryptoBytes"} @String{j-CRYPTOLOG= "Cryptolog"} @String{j-CRYPTOLOGIA= "Cryptologia"} @String{j-CUJ= "C Users Journal"} @String{j-CVGIP= "Computer Vision, Graphics, and Image Processing"} @String{j-CVGIP-GMIP= "Computer Vision, Graphics, and Image Processing. Graphical Models and Image Processing"} @String{j-DATAMATION= "Datamation"} @String{j-DDDU= "Dr. Dobb's Developer Update"} @String{j-DDJ= "Dr. Dobb's Journal of Software Tools"} @String{j-DEC-TECH-J= "Digital Technical Journal of Digital Equipment Corporation"} @String{j-DESIGN-NEWS= "Design news"} @String{j-DESIGNS-CODES-CRYPTOGR= "Designs, Codes, and Cryptography"} @String{j-DISCRETE-APPL-MATH= "Discrete Applied Mathematics"} @String{j-DISCRETE-MATH-APPL= "Discrete Mathematics and Applications"} @String{j-ELECT-COMM-JAPAN-3-FUND-ELECT-SCI= "Electronics and communications in Japan. Part 3, Fundamental electronic science"} @String{j-ELECT-LETTERS= "Electronics Letters"} @String{j-ELECTRONICS= "Electronics"} @String{j-EMBED-SYS-PROG= "Embedded Systems Programming"} @String{j-ENEWS= "Electronic News"} @String{j-ENG-FRACTURE-MECH= "Engineering fracture mechanics"} @String{j-EPODD= "Electronic Pub\-lish\-ing\emdash{}Orig\-i\-na\-tion, Dissemination, and Design"} @String{j-ETT= "European Transactions on Telecommunications: ETT"} @String{j-EUR-TRANS-TELECOMM= "European transactions on telecommunications and related technologies"} @String{j-EUUG-NEWSLETTER= "EUUG Newsletter"} @String{j-FED-REGIST= "Federal Register"} @String{j-FINANC-TECH-INT-BULL= "Financial Technology International Bulletin"} @String{j-FINITE-FIELDS-APPL= "Finite Fields and their Applications"} @String{j-FUT-GEN-COMP-SYS= "Future Generation Computer Systems"} @String{j-GRAPH-MODELS-IMAGE-PROC= "Graphical models and image processing: GMIP"} @String{j-HEWLETT-PACKARD-J= "Hew\-lett-Pack\-ard Journal: technical information from the laboratories of Hew\-lett-Pack\-ard Company"} @String{j-IBM-JRD= "IBM Journal of Research and Development"} @String{j-IBM-SYS-J= "IBM Systems Journal"} @String{j-IBM-TDB= "IBM Technical Disclosure Bulletin"} @String{j-IEE-CONF-PUBL= "IEE conference publication"} @String{j-IEE-PROC-VIS-IMAGE-SIGNAL-PROCESS= "IEE proceedings. Vision, image, and signal processing"} @String{j-IEEE-ANN-HIST-COMPUT= "IEEE Annals of the History of Computing"} @String{j-IEEE-ASSP= "IEEE Trans. ASSP"} @String{j-IEEE-CGA= "IEEE Computer Graphics and Applications"} @String{j-IEEE-COMM-MAG= "IEEE Communications Magazine"} @String{j-IEEE-CONCURR= "IEEE Concurrency"} @String{j-IEEE-J-SEL-AREAS-COMMUN= "IEEE Journal on Selected Areas in Communications"} @String{j-IEEE-MICRO= "IEEE Micro"} @String{j-IEEE-MULTIMEDIA= "IEEE MultiMedia"} @String{j-IEEE-PAR-DIST-TECH= "IEEE parallel and distributed technology: systems and applications"} @String{j-IEEE-SOFTWARE= "IEEE Software"} @String{j-IEEE-SPECTRUM= "IEEE Spectrum"} @String{j-IEEE-TRANS-COMM= "IEEE Transactions on Communications"} @String{j-IEEE-TRANS-COMPUT= "IEEE Transactions on Computers"} @String{j-IEEE-TRANS-CONSUMER-ELECTRONICS= "IEEE Transactions on Consumer Electronics"} @String{j-IEEE-TRANS-IMAGE-PROCESS= "IEEE Transactions on Image Processing"} @String{j-IEEE-TRANS-INF-THEORY= "IEEE Transactions on Information Theory"} @String{j-IEEE-TRANS-NETWORKING= "IEEE\slash ACM Transactions on Networking"} @String{j-IEEE-TRANS-PAR-DIST-SYS= "IEEE Transactions on Parallel and Distributed Systems"} @String{j-IEEE-TRANS-PATT-ANAL-MACH-INTEL= "IEEE Transactions on Pattern Analysis and Machine Intelligence"} @String{j-IEEE-TRANS-PROF-COMM= "IEEE Transactions on Professional Communication"} @String{j-IEEE-TRANS-SOFTW-ENG= "IEEE Transactions on Software Engineering"} @String{j-IEICE-TRANS-FUND-ELECT= "IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences"} @String{j-IJQC= "International Journal of Quantum Chemistry"} @String{j-IJSAHPC= "The International Journal of Supercomputer Applications and High Performance Computing"} @String{j-IMAGE-VIS-COMPUT= "Image and Vision Computing"} @String{j-INF-COMM-TECH-LAW= "Information \& Communications Technology Law"} @String{j-INF-COMPUT= "Information and Computation"} @String{j-INF-SOC= "The Information Society"} @String{j-INFO-PROC-LETT= "Information Processing Letters"} @String{j-INFO-PROC-MAN= "Information Processing and Management"} @String{j-INFO-SCI= "Information Sciences"} @String{j-INFORMATION-WEEK= "Information Week"} @String{j-INT-J-BIFURC-CHAOS-APPL-SCI-ENG= "International journal of bifurcation and chaos in applied sciences and engineering"} @String{j-INT-J-COMPUT-INF-SCI= "International Journal of Computer and Information Sciences"} @String{j-INT-J-COMPUT-MATH= "International Journal of Computer Mathematics"} @String{j-INT-J-COMPUT-SYST-SCI-ENG= "International Journal of Computer Systems Science and Engineering"} @String{j-INT-J-ELECTRON= "International Journal of Electronics Theoretical \& Experimental"} @String{j-INT-J-SYST-SCI= "International Journal of Systems Science"} @String{j-INTELL-NATL-SECUR= "Intelligence and National Security"} @String{j-ISIS= "Isis"} @String{j-J-ACM= "Journal of the Association for Computing Machinery"} @String{j-J-ALG= "Journal of Algorithms"} @String{j-J-AM-SOC-INF-SCI= "Journal of the American Society for Information Science"} @String{j-J-COMP-SCI-TECH= "Journal of computer science and technology"} @String{j-J-COMP-SECUR= "Journal of Computer Security"} @String{j-J-COMP-SYS-SCI= "Journal of Computer and System Sciences"} @String{j-J-CRYPTOLOGY= "Journal of Cryptology"} @String{j-J-DOC= "Journal of Documentation"} @String{j-J-ELECTRON-IMAGING= "Journal of Electronic Imaging"} @String{j-J-ENG-MECH= "Journal of Engineering Mechanics"} @String{j-J-MATH-PHYS= "Journal of Mathematical Physics"} @String{j-J-MOD-OPT= "Journal of Modern Optics"} @String{j-J-NETW-COMPUT-APPL= "Journal of Network and Computer Applications"} @String{j-J-PAR-DIST-COMP= "Journal of Parallel and Distributed Computing"} @String{j-J-RES-NATL-INST-STAND-TECHNOL= "Journal of research of the National Institute of Standards and Technology"} @String{j-J-SCI-IND-RES= "Journal of Scientific and Industrial Research"} @String{j-J-SIAM= "Journal of the Society for Industrial and Applied Mathematics"} @String{j-J-SUPERCOMPUTING= "The Journal of Supercomputing"} @String{j-J-SYMBOLIC-COMP= "Journal of Symbolic Computation"} @String{j-J-SYST-SOFTW= "The Journal of Systems and Software"} @String{j-J-UCS= "J.UCS: Journal of Universal Computer Science"} @String{j-J-VIS-COMP-ANIMATION= "The Journal of Visualization and Computer Animation"} @String{j-JAVA-REPORT= "{Java} Report: The Source for {Java} Development"} @String{j-JAVAWORLD= "JavaWorld: IDG's magazine for the Java community"} @String{j-LECT-NOTES-COMP-SCI= "Lecture Notes in Computer Science"} @String{j-LINEAR-ALGEBRA-APPL= "Linear Algebra and its Applications"} @String{j-LINUX-J= "Linux Journal"} @String{j-LMS-J-COMPUT-MATH= "LMS Journal of Computation and Mathematics"} @String{j-LOGIN= ";login: the USENIX Association newsletter"} @String{j-MACUSER= "MacUser"} @String{j-MATH-COMP-EDU= "Mathematics and computer education"} @String{j-MATH-COMP-MODELLING= "Mathematical and computer modelling"} @String{j-MATH-COMP-SIM= "Mathematics and Computers in Simulation"} @String{j-MATH-COMPUT= "Mathematics of Computation"} @String{j-MATH-GAZ= "The Mathematical Gazette"} @String{j-MATH-MAG= "Mathematics Magazine"} @String{j-MATH-SEMESTERBER= "Mathematische Semesterberichte"} @String{j-MATH-SLOVACA= "Mathematica Slovaca"} @String{j-MATHEMATICA-J= "Mathematica Journal"} @String{j-MATHEMATIKA= "Mathematika"} @String{j-MICROELECT-RELIABILITY= "Microelectronics and Reliability"} @String{j-N-I-A-CR= "Newsletter of the International Association for Cryptologic Research"} @String{j-NAMS= "Notices of the American Mathematical Society"} @String{j-NATUR-SCI-J-XIANGTAN-UNIV= "Natural Science Journal of Xiangtan University = Xiangtan Daxue Ziran Kexue Xuebao"} @String{j-NETWORK-SECURITY= "Network Security"} @String{j-NORDIC-J-COMPUT= "Nordic Journal of Computing"} @String{j-NTT-R-D= "NTT R\&D"} @String{j-NUM-LIN-ALG-APPL= "Numerical linear algebra with applications"} @String{j-NUM-MATH= "Numerische Mathematik"} @String{j-NUMER-ALGORITHMS= "Numerical Algorithms"} @String{j-OBZORNIK-MAT-FIZ= "Dru{\\v{s}}tvo Matematikov, Fizikov in Astronomov SRS. Obzornik za Matematiko in Fiziko"} @String{j-OPEN-COMPUTING= "Open Computing"} @String{j-OPEN-SYSTEMS-TODAY= "Open Systems Today"} @String{j-OPER-SYS-REV= "Operating Systems Review"} @String{j-PARALLEL-ALGORITHMS-APPL= "Parallel Algorithms and Applications"} @String{j-PARALLEL-COMPUTING= "Parallel Computing"} @String{j-PARALLEL-PROCESS-LETT= "Parallel Processing Letters"} @String{j-PC-TECH= "PC Techniques"} @String{j-PERFORM-COMPUT= "Performance Computing"} @String{j-PHILIPS-J-RES= "Philips Journal of Research"} @String{j-PROC-ICASSP= "Proceedings of the International Conference on Acoustics, Speech, and Signal Processing"} @String{j-PROC-IEEE= "Proceedings of the IEEE"} @String{j-PROC-SPIE= "Proceedings of the SPIE --- The International Society for Optical Engineering"} @String{j-SCI-AMER= "Scientific American"} @String{j-SCI-AMER-INT-ED= "Scientific American [International Edition]"} @String{j-SCI-CHINA-SER-E-TECH-SCI= "Science in {China}. Series {E}, Technological sciences"} @String{j-SCI-COMPUT-PROGRAM= "Science of Computer Programming"} @String{j-SCIENCE= "Science"} @String{j-SIAM-J-ALG-DISC-METH= "SIAM Journal on Algebraic and Discrete Methods"} @String{j-SIAM-J-APPL-MATH= "SIAM Journal on Applied Mathematics"} @String{j-SIAM-J-COMPUT= "SIAM Journal on Computing"} @String{j-SIAM-J-DISCR-MATH= "SIAM Journal on Discrete Mathematics"} @String{j-SIAM-J-MAT-ANA-APPL= "SIAM Journal on Matrix Analysis and Applications"} @String{j-SIAM-J-NUMER-ANAL= "SIAM Journal on Numerical Analysis"} @String{j-SIAM-J-SCI-STAT-COMP= "SIAM Journal on Scientific and Statistical Computing"} @String{j-SIAM-REVIEW= "SIAM Review"} @String{j-SIG-PROC= "Signal Processing"} @String{j-SIGACT= "ACM SIGACT News"} @String{j-SIGADA-LETTERS= "ACM SIGADA Ada Letters"} @String{j-SIGCSE= "SIGCSE Bulletin (ACM Special Interest Group on Computer Science Education)"} @String{j-SIGMETRICS= "ACM SIGMETRICS Performance Evaluation Review"} @String{j-SIGMOD= "SIGMOD Record (ACM Special Interest Group on Management of Data)"} @String{j-SIGNUM= "ACM SIGNUM Newsletter"} @String{j-SIGPLAN= "ACM SIG{\-}PLAN Notices"} @String{j-SIGSAM= "SIGSAM Bulletin (ACM Special Interest Group on Symbolic and Algebraic Manipulation)"} @String{j-SIGSOFT= "ACM SIGSOFT Software Engineering Notes"} @String{j-SMITHSONIAN= "Smithsonian"} @String{j-SOUTHCON= "Southcon Conference Record"} @String{j-SPE= "Soft\-ware\emdash Prac\-tice and Experience"} @String{j-SUNSERVER= "SunServer"} @String{j-SUPER-REV= "Supercomputing Review"} @String{j-SUPERCOMPUTER= "Supercomputer"} @String{j-SUPERCOMPUTING-REVIEW= "Supercomputing Review"} @String{j-SYS-ADMIN= "Sys Admin: The Journal for UNIX Systems Administrators"} @String{j-SYS-COMP-JAPAN= "Systems and computers in Japan"} @String{j-TECH-COMMUN= "Technical Communication"} @String{j-TELECOMMUNICATIONS-AMERICAS-ED= "Telecommunications (Americas Edition)"} @String{j-THEOR-COMP-SCI= "Theoretical Computer Science"} @String{j-THEORIA= "Theoria"} @String{j-TISSEC= "ACM Transactions on Information and System Security"} @String{j-TOCS= "ACM Transactions on Computer Systems"} @String{j-TODS= "ACM Transactions on Database Systems"} @String{j-TOIS= "ACM Transactions on Information Systems"} @String{j-TOMS= "ACM Transactions on Mathematical Software"} @String{j-TOPLAS= "ACM Transactions on Programming Languages and Systems"} @String{j-TRANS-AM-NUCL-SOC= "Transactions of the American Nuclear Society"} @String{j-TRANS-INFO-PROCESSING-SOC-JAPAN= "Transactions of the Information Processing Society of Japan"} @String{j-UNIX-DEVELOPER= "UNIX Developer"} @String{j-UNIX-WORLD= "UNIX/world"} @String{j-WEBSERVER= "WebServer Magazine: For Managers of World Wide Web Sites"} @String{j-X-RESOURCE= "{The X Resource}"}

%%% ==================================================================== %%% Organization abbreviations:

@String{org-GENERAL-ELECTRIC= "General Electric"} @String{org-GENERAL-ELECTRIC:adr= "Schenectady, NY, USA"}

%%% ==================================================================== %%% Publisher abbreviations:

@String{pub-A-K-PETERS= "A. K. Peters, Ltd."} @String{pub-A-K-PETERS:adr= "Wellesley, MA, USA"} @String{pub-ACADEMIC= "Academic Press"} @String{pub-ACADEMIC:adr= "New York, NY, USA"} @String{pub-ACM= "ACM Press"} @String{pub-ACM:adr= "New York, NY 10036, USA"} @String{pub-AEGEAN-PARK= "Aegean Park Press"} @String{pub-AEGEAN-PARK:adr= "Laguna Hills, CA, USA"} @String{pub-AFIPS= "AFIPS Press"} @String{pub-AFIPS:adr= "Montvale, NJ, USA"} @String{pub-AMS= "American Mathematical Society"} @String{pub-AMS:adr= "Providence, RI, USA"} @String{pub-ANSI= "American National Standards Institute"} @String{pub-ANSI:adr= "1430 Broadway, New York, NY 10018, USA"} @String{pub-AP-PROFESSIONAL= "AP Professional"} @String{pub-AP-PROFESSIONAL:adr= "Boston, MA, USA"} @String{pub-ARTECH= "Artech House Inc."} @String{pub-ARTECH:adr= "Norwood, MA, USA"} @String{pub-AW= "Ad{\-d}i{\-s}on-Wes{\-l}ey"} @String{pub-AW:adr= "Reading, MA, USA"} @String{pub-BIRKHAUSER= "Birkh{\"a}user Verlag"} @String{pub-BIRKHAUSER:adr= "Basel, Switzerland"} @String{pub-BLACKWELL-SCI= "Blackwell Scientific Publications"} @String{pub-BLACKWELL-SCI:adr= "Oxford, UK"} @String{pub-CAMBRIDGE= "Cambridge University Press"} @String{pub-CAMBRIDGE:adr= "Cambridge, UK"} @String{pub-CHAPMAN-HALL= "Chapman and Hall, Ltd."} @String{pub-CHAPMAN-HALL:adr= "London, UK"} @String{pub-CLARENDON= "Clarendon Press"} @String{pub-CLARENDON:adr= "Oxford, UK"} @String{pub-CRC= "CRC Press"} @String{pub-CRC:adr= "2000 N.W. Corporate Blvd., Boca Raton, FL 33431-9868, USA"} @String{pub-CUP= "Cambridge University Press"} @String{pub-CUP:adr= "New York, NY, USA"} @String{pub-DEKKER= "Marcel Dekker, Inc."} @String{pub-DEKKER:adr= "New York, NY, USA"} @String{pub-DOUBLEDAY= "Doubleday"} @String{pub-DOUBLEDAY:adr= "New York, NY, USA"} @String{pub-DOVER= "Dover Publications, Inc."} @String{pub-DOVER:adr= "New York, NY, USA"} @String{pub-ECMA= "ECMA (European Association for Standardizing Information and Communication Systems)"} @String{pub-ECMA:adr= "Geneva, Switzerland"} @String{pub-ELSEVIER= "Elsevier"} @String{pub-ELSEVIER:adr= "Amsterdam, The Netherlands"} @String{pub-GORDON-BREACH= "Gordon and Breach"} @String{pub-GORDON-BREACH:adr= "Langhorne, PA, USA"} @String{pub-HARTUNG-GORRE= "Hartung-Gorre Verlag"} @String{pub-HARTUNG-GORRE:adr= "Konstanz, Switzerland"} @String{pub-HAYDEN-BOOK= "Hayden Book Co."} @String{pub-HAYDEN-BOOK:adr= "Rochelle Park, NJ, USA"} @String{pub-HOLDEN-DAY= "Holden-Day"} @String{pub-HOLDEN-DAY:adr= "San Francisco, CA, USA"} @String{pub-HOUGHTON-MIFFLIN= "Houghton-Mifflin"} @String{pub-HOUGHTON-MIFFLIN:adr= "Boston, MA, USA"} @String{pub-IBM= "IBM Corporation"} @String{pub-IBM:adr= "San Jose, CA, USA"} @String{pub-IEE= "IEE"} @String{pub-IEE:adr= "London, UK"} @String{pub-IEEE= "IEEE Computer Society Press"} @String{pub-IEEE:adr= "1109 Spring Street, Suite 300, Silver Spring, MD 20910, USA"} @String{pub-IMA= "Institute of Mathematics and its Applications"} @String{pub-IMA:adr= "Southend-on-Sea, UK"} @String{pub-IOS= "IOS Press"} @String{pub-IOS:adr= "Postal Drawer 10558, Burke, VA 2209-0558, USA"} @String{pub-ISO= "International Organization for Standardization"} @String{pub-ISO:adr= "Geneva, Switzerland"} @String{pub-JOHNS-HOPKINS= "The Johns Hopkins University Press"} @String{pub-JOHNS-HOPKINS:adr= "Baltimore, MD, USA"} @String{pub-JW= "John Wiley"} @String{pub-JW:adr= "New York, NY, USA"} @String{pub-KAP= "Kluwer Academic Publisher"} @String{pub-KAP:adr= "Norwell, MA, USA, and Dordrecht, The Netherlands"} @String{pub-KLUWER= "Kluwer Academic Publishers"} @String{pub-KLUWER:adr= "Dordrecht, The Netherlands"} @String{pub-KNOPF= "Alfred A. Knopf"} @String{pub-KNOPF:adr= "New York, NY, USA"} @String{pub-MACMILLAN= "MacMillan Publishing Company"} @String{pub-MACMILLAN:adr= "New York, NY, USA"} @String{pub-MANNING= "Manning Publications"} @String{pub-MANNING:adr= "Greenwich, CT, USA"} @String{pub-MASSON= "Masson Editeur"} @String{pub-MASSON:adr= "Masson, France"} @String{pub-MATH-ASSOC-AMER= "Mathematical Association of America"} @String{pub-MATH-ASSOC-AMER:adr= "Washington, DC, USA"} @String{pub-MCGRAW-HILL= "Mc{\-}Graw-Hill"} @String{pub-MCGRAW-HILL:adr= "New York, NY, USA"} @String{pub-MILLER-FREEMAN= "Miller Freeman Publications"} @String{pub-MILLER-FREEMAN:adr= "San Francisco, CA, USA"} @String{pub-MINDQ= "MindQ Publishing, Inc."} @String{pub-MINDQ:adr= "450 Springpark Place Ste. 1200, Herndon, VA 20170, USA, Tel: +1 703 708-9380"} @String{pub-MIT= "MIT Press"} @String{pub-MIT:adr= "Cambridge, MA, USA"} @String{pub-MORGAN-KAUFMANN= "Morgan Kaufmann Publishers"} @String{pub-MORGAN-KAUFMANN:adr= "Los Altos, CA 94022, USA"} @String{pub-NAP= "National Academy Press"} @String{pub-NAP:adr= "Washington, DC, USA"} @String{pub-NAT-COMP-CENTRE= "National Computing Centre"} @String{pub-NAT-COMP-CENTRE:adr= "Manchester, UK"} @String{pub-NBS= "U.S. National Bureau of Standards"} @String{pub-NBS:adr= "Gaithersburg, MD, USA"} @String{pub-NIST= "National Institute for Standards and Technology"} @String{pub-NIST:adr= "Gaithersburg, MD 20899-8900, USA"} @String{pub-NORTH-HOLLAND= "North-Hol{\-}land"} @String{pub-NORTH-HOLLAND:adr= "Amsterdam, The Netherlands"} @String{pub-NORTON= "W. W. Norton \& Co."} @String{pub-NORTON:adr= "New York, NY, USA"} @String{pub-NTIS= "National Technical Information Service"} @String{pub-NTIS:adr= "Washington, DC, USA"} @String{pub-ORA= "O'Reilly \& {Associates, Inc.}"} @String{pub-ORA:adr= "103a Morris Street, Sebastopol, CA 95472, USA, Tel: +1 707 829 0515, and 90 Sherman Street, Cambridge, MA 02140, USA, Tel: +1 617 354 5800"} @String{pub-OSBORNE= "Osborne\slash Mc{\-}Graw-Hill"} @String{pub-OSBORNE:adr= "Berkeley, CA, USA"} @String{pub-OXFORD= "Oxford University Press"} @String{pub-OXFORD:adr= "Walton Street, Oxford OX2 6DP, UK"} @String{pub-PEACHPIT= "Peachpit Press, Inc."} @String{pub-PEACHPIT:adr= "1085 Keith Avenue, Berkeley, CA 94708, USA"} @String{pub-PH= "Pren{\-}tice-Hall, Inc."} @String{pub-PH:adr= "Upper Saddle River, NJ 07458, USA"} @String{pub-PHPTR= "Pren{\-}tice-Hall PTR"} @String{pub-PHPTR:adr= "Upper Saddle River, NJ 07458, USA"} @String{pub-PLENUM= "Plenum Press"} @String{pub-PLENUM:adr= "New York, NY, USA; London, UK"} @String{pub-PRINCETON= "Princeton University Press"} @String{pub-PRINCETON:adr= "Princeton, NJ, USA"} @String{pub-PROJECT-GUTENBERG= "Project Gutenberg"} @String{pub-PROJECT-GUTENBERG:adr= "P.O. Box 2782, Champaign, IL 61825-2782, USA"} @String{pub-RANDOM= "Random House"} @String{pub-RANDOM:adr= "New York, NY, USA"} @String{pub-REIDEL= "D. Reidel"} @String{pub-REIDEL:adr= "Dordrecht, Boston, Lancaster, Tokyo"} @String{pub-RSA= "RSA Data Security, Inc."} @String{pub-RSA:adr= "Redwood City, CA, USA"} @String{pub-SAMS= "Howard W. Sams"} @String{pub-SAMS:adr= "Indianapolis, IN 46268, USA"} @String{pub-SIAM= "Society for Industrial and Applied Mathematics"} @String{pub-SIAM:adr= "Philadelphia, PA, USA"} @String{pub-SIMON-SCHUSTER= "Simon and Schuster"} @String{pub-SIMON-SCHUSTER:adr= "1230 Ave. of the Americas, New York, NY 10020, USA"} @String{pub-SPE= "Society of Petroleum Engineers"} @String{pub-SPE:adr= "Richardson, TX, USA"} @String{pub-SPIE= "Society of Photo-optical Instrumentation Engineers (SPIE)"} @String{pub-SPIE:adr= "Bellingham, WA, USA"} @String{pub-SRI= "SRI International"} @String{pub-SRI:adr= "333 Ravenswood Avenue, Menlo Park, CA 94025-3493, USA, Tel: +1 415 859 6387, FAX: +1 415 859-6028"} @String{pub-STATSCI= "StatSci, a Division of MathSoft, Inc."} @String{pub-STATSCI:adr= "Seattle, WA, USA"} @String{pub-SUN= "Sun Microsystems"} @String{pub-SUN:adr= "2550 Garcia Avenue, Mountain View, CA 94043, USA"} @String{pub-SV= "Spring{\-}er-Ver{\-}lag"} @String{pub-SV:adr= "Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ etc."} @String{pub-USC-ISI= "University of Southern California, Information Sciences Institute"} @String{pub-USC-ISI:adr= "Marina del Rey, CA, USA"} @String{pub-USENIX= "USENIX Association"} @String{pub-USENIX:adr= "Berkeley, CA, USA"} @String{pub-USGPO= "United States Government Printing Office"} @String{pub-USGPO:adr= "Washington, DC, USA"} @String{pub-UTILITAS-MATH= "Utilitas Mathematica Publishers"} @String{pub-UTILITAS-MATH:adr= "Winnipeg, Manitoba, Canada"} @String{pub-VENTANA= "Ventana Press"} @String{pub-VENTANA:adr= "Chapel Hill, NC, USA"} @String{pub-VIEWEG= "Vieweg \& Son"} @String{pub-VIEWEG:adr= "Braunschweig, Germany"} @String{pub-WESTVIEW= "Westview Press"} @String{pub-WESTVIEW:adr= "Boulder, CO, USA"} @String{pub-WILEY= "John Wiley and Sons, Inc."} @String{pub-WILEY:adr= "New York, NY, USA"} @String{pub-WORLD-SCI= "World Scientific Publishing Co."} @String{pub-WORLD-SCI:adr= "Singapore; Philadelphia, PA, USA; River Edge, NJ, USA"} @String{pub-YALE= "Yale University Press"} @String{pub-YALE:adr= "New Haven, CT, USA"}

%%% ==================================================================== %%% Series abbreviations:

@String{ser-LNAI= "Lecture Notes in Artificial Intelligence"} @String{ser-LNCS= "Lecture Notes in Computer Science"} @String{ser-LNMATH= "Lecture Notes in Mathematics"} @String{ser-PROJECT-GUTENBERG= "Project Gutenberg"} @String{ser-SIGPLAN= "ACM SIG{\-}PLAN Notices"}

%%% ==================================================================== %%% Bibliography entries, sorted by year, and then by citation label:

@Book{Beckett:1988:IC, author = "Brian Beckett", title = "Introduction to cryptology", publisher = pub-BLACKWELL-SCI, address = pub-BLACKWELL-SCI:adr, pages = "xiv + 344", year = "1988", ISBN = "0-632-01836-4 (paperback), 0-632-02243-4", ISBN-13 = "978-0-632-01836-9 (paperback), 978-0-632-02243-4", LCCN = "QA76.9.A25 B43 1988", bibdate = "Mon Jun 16 16:48:49 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; z3950.loc.gov:7090/Voyager", series = "Professional and industrial computing series", acknowledgement = ack-nhfb, subject = "Computer security; Data protection; Cryptography", } @Misc{Linn:1988:RPE, author = "J. Linn", title = "{RFC 1040}: Privacy enhancement for {Internet} electronic mail: Part {I}: Message encipherment and authentication procedures", day = "1", month = jan, year = "1988", bibdate = "Thu Oct 16 09:34:09 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Obsoleted by RFC1113 \cite{Linn:1989:RPE}. Obsoletes RFC0989 \cite{Linn:1987:RPE}. Status: UNKNOWN.", URL = "ftp://ftp.internic.net/rfc/rfc1040.txt; ftp://ftp.internic.net/rfc/rfc1113.txt; ftp://ftp.internic.net/rfc/rfc989.txt; https://www.math.utah.edu/pub/rfc/rfc1040.txt; https://www.math.utah.edu/pub/rfc/rfc1113.txt; https://www.math.utah.edu/pub/rfc/rfc989.txt", acknowledgement = ack-nhfb, format = "TXT=76276 bytes", obsoletedby = "Obsoleted by RFC1113 \cite{Linn:1989:RPE}.", obsoletes = "Obsoletes RFC0989 \cite{Linn:1987:RPE}.", online = "yes", status = "UNKNOWN", } @Misc{Linn:1989:RPE, author = "J. Linn", title = "{RFC 1113}: Privacy enhancement for {Internet} electronic mail: Part {I} --- message encipherment and authentication procedures", day = "1", month = aug, year = "1989", bibdate = "Thu Oct 16 09:34:09 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Obsoleted by RFC1421 \cite{Linn:1993:RPE}. Obsoletes RFC0989, RFC1040 \cite{Linn:1987:RPE,Linn:1993:RPE}. Status: HISTORIC.", URL = "ftp://ftp.internic.net/rfc/rfc1040.txt; ftp://ftp.internic.net/rfc/rfc1113.txt; ftp://ftp.internic.net/rfc/rfc1421.txt; ftp://ftp.internic.net/rfc/rfc989.txt; https://www.math.utah.edu/pub/rfc/rfc1040.txt; https://www.math.utah.edu/pub/rfc/rfc1113.txt; https://www.math.utah.edu/pub/rfc/rfc1421.txt; https://www.math.utah.edu/pub/rfc/rfc989.txt", acknowledgement = ack-nhfb, format = "TXT=89293 bytes", obsoletedby = "Obsoleted by RFC1421 \cite{Linn:1993:RPE}.", obsoletes = "Obsoletes RFC0989, RFC1040 \cite{Linn:1987:RPE,Linn:1988:RPE}.", online = "yes", status = "HISTORIC", } @Article{Agnew:1990:FEC, author = "Gordon B. Agnew and R. C. Mullin and Scott A. Vanstone", title = "A Fast Elliptic Curve Cryptosystem", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "706--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340706.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340706.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Alagappan:1990:PDA, author = "K. Alagappan and A. M. {De Alvare} and D. Klein and C. Neuman", title = "Panel and discussion on Authentication", crossref = "USENIX:1990:USI", pages = "??--??", year = "1990", bibdate = "Sat Apr 20 19:22:52 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, annote = "25 Papers", keywords = "Unix security; Usenix", } @Article{Anonymous:1990:SEL, author = "Anonymous", title = "A standard for extremely low frequency magnetic fields; Standards for public key encryption algorithms to be discussed", journal = j-COMPUTER, volume = "23", number = "4", pages = "95--??", month = apr, year = "1990", CODEN = "CPTRB4", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Tue May 14 16:20:44 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @InCollection{Apolloni:1990:TNN, author = "B. Apolloni and N. Cesa-Bianchi and G. Ronchini", booktitle = "Parallel architectures and neural networks (Salerno, 1990)", title = "Training neural networks to break the knapsack cryptosystem", publisher = "World Sci. Publishing", address = "Teaneck, NJ", pages = "377--382", year = "1990", MRclass = "94A60 (92B20)", MRnumber = "1 105 355", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", } @Article{Barrett:1990:SDU, author = "Paul Barrett and Raymund Eisele", title = "The Smart Diskette --- a Universal User Token and Personal Crypto-Engine (Invited)", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "74--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:59 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0435/04350074.htm; http://link.springer-ny.com/link/service/series/0558/papers/0435/04350074.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", remark = "Appears in \cite{Brassard:1990:ACC}.", } @Article{Bauspiess:1990:HKA, author = "Fritz Bauspie{\ss} and Hans-Joachim Knobloch", title = "How to Keep Authenticity Alive in a Computer Network", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "38--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340038.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340038.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Book{Beckett:1990:IAM, author = "Brian Beckett", title = "Introduction aux m{\'e}thodes de la cryptologie", volume = "5", publisher = pub-MASSON, address = pub-MASSON:adr, pages = "332", year = "1990", ISBN = "2-225-81941-6", ISBN-13 = "978-2-225-81941-4", LCCN = "????", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = "Logique mathematiques informatique", acknowledgement = ack-nhfb, alttitle = "Introduction to cryptology. fran{\c{c}}aise.", annote = "Traduction de: {\em Introduction to cryptology}.", keywords = "Cryptographie. --- Informatique.", } @Book{Bedini:1990:TJS, author = "Silvio A. Bedini", title = "{Thomas Jefferson}: statesman of science", publisher = pub-MACMILLAN, address = pub-MACMILLAN:adr, pages = "xviii + 616 + 24", year = "1990", ISBN = "0-02-897041-1", ISBN-13 = "978-0-02-897041-7", LCCN = "E332.2 .B37 1990", bibdate = "Sun Dec 24 11:25:29 MST 2017", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "This biography follows Jefferson's scientific achievements throughout his entire life, including the establishiment of the Corps of Discovery to map the western territories and the United States Coast Survey to map national coastlines, the training of military engineers, and the establishment of the University of Virginia.", acknowledgement = ack-nhfb, remark = "According to \cite[page 34]{Bedini:1990:TJS}, this book discusses Jefferson's wheel cipher.", subject = "Jefferson, Thomas; Presidents; United States; Biography; Statesmen; Science; History", subject-dates = "1743--1826", tableofcontents = "Frontier gentry (1700--1760) \\ Town and gown (1760--1762) \\ Law and learning (1762--1772) \\ Climate for greatness (1772--1781) \\ ``Measure of a shadow'' (1781--1784) \\ ``The vaunted scene' (1784--1786) \\ The Virginian abroad (1786--1789) \\ The ship of state (1789--1792) \\ The veiling of diplomacy (1792--1793) \\ Rosinante stabled (1794--1796) \\ ``Honorable and easy'' (1797--1801) \\ ``Splendid misery'' (1801--1804) \\ Philosopher president (1805--1807) \\ ``The corps of discovery'' (1804--1807) \\ ``The shackles of power'' (1805--1809) \\ The twilight years (1809--1815) \\ Venerable sage (1815--1824) \\ The Dream fulfilled (1824--1827) \\ Appendix: Documents", } @Article{Bellare:1990:NIO, author = "Mihir Bellare and Silvio Micali", title = "Non-interactive oblivious transfer and applications", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "547--557", year = "1990", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/0-387-34805-0_48", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sun Mar 11 11:03:58 2012", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0435/04350194.htm; http://link.springer-ny.com/link/service/series/0558/papers/0435/04350194.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", remark = "Appears in \cite{Brassard:1990:ACC}.", } @Article{Bellare:1990:NPD, author = "Mihir Bellare and Shafi Goldwasser", title = "New Paradigms for Digital Signatures and Message Authentication Based on Non-interactive Zero Knowledge Proofs", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "194--211", year = "1990", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/0-387-34805-0_19", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:59 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0435/04350194.htm; http://link.springer-ny.com/link/service/series/0558/papers/0435/04350194.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", remark = "Appears in \cite{Brassard:1990:ACC}.", } @Article{Bellare:1990:SSK, author = "Mihir Bellare and Lenore Cowen and Shafi Goldwasser", title = "On the Structure of Secret Key Exchange Protocols", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "604--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:59 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0435/04350604.htm; http://link.springer-ny.com/link/service/series/0558/papers/0435/04350604.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Ben-Or:1990:EPP, author = "M. Ben-Or and O. Goldreich and S. Goldwasser and J. H{\aa}stad and J. Kilian and S. Micali and P. Rogaway", title = "Everything provable is provable in zero-knowledge", crossref = "Goldwasser:1990:ACC", pages = "37--56", year = "1990", bibdate = "Sun Mar 11 11:04:22 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Bender:1990:IEC, author = "Andreas Bender and Guy Castagnoli", title = "On the implementation of elliptic curve cryptosystems", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "186--192", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "11T71 (11G20 94A60)", MRnumber = "91d:11154", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Lecture Notes in Computer Science", remark = "Appears in \cite{Brassard:1990:ACC}.", } @InCollection{Bertilsson:1990:CVE, author = "Michael Bertilsson and Ernest F. Brickell and Ingemar Ingemarsson", title = "Cryptanalysis of video encryption based on space-filling curves", crossref = "Quisquater:1990:ACE", pages = "403--411", year = "1990", MRclass = "94A60", MRnumber = "1 083 964", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; MathSciNet database", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340403.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340403.pdf", } @TechReport{Biham:1990:DCD, author = "Eli Biham and Adi Shamir", title = "Differential cryptanalysis of {DES}-like cryptosystems", type = "Technical report", number = "CS90-16", institution = "Department of Computer Science, Weizmann Institute of Science", address = "Rehovot, Israel", pages = "107", month = jul, year = "1990", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "The Data Encryption Standard (DES) is the best known and most widely used cryptosystem for civilian applications. It was developed at IBM and adopted by the National Buraeu [sic] of Standards in the mid 70's, and has successfully withstood all the attacks published so far in the open literature. In this paper we develop a new type of cryptanalytic attack which can break DES with up to eight rounds in a few minutes on a PC and can break DES with up to 15 rounds faster than an exhaustive search. The new attack can be applied to a variety of DES-like substitution/permutation cryptosystems, and demonstrates the crucial role of the (unpublished) design rules.", acknowledgement = ack-nhfb, keywords = "Cryptography.", } @TechReport{Bishop:1990:AGD, author = "Matt Bishop", title = "Administrator's guide to the digital signature facility ``rover''", type = "Technical report", number = "PCS-TR 90-153", institution = "Department of Mathematics and Computer Science, Dartmouth College", address = "Hanover, NH, USA", year = "1990", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, annote = "``August 1990.''", keywords = "Computer science.", } @PhdThesis{Bosma:1990:PPC, author = "W. Bosma", title = "Primality Proving with Cyclotomy", type = "Doctoral Dissertation", school = "University of Amsterdam", address = "Amsterdam, The Netherlands", pages = "??", year = "1990", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 1]{Silverman:1997:FGR}.", } @Article{Boyd:1990:NMK, author = "Colin Boyd", title = "A New Multiple Key Cipher and an Improved Voting Scheme", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "617--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340617.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340617.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Brand:1990:PNU, author = "Russell L. Brand", title = "Problems with the Normal Use of Cryptography for Providing Security on Unclassified Networks (Invited)", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "30--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:59 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0435/04350030.htm; http://link.springer-ny.com/link/service/series/0558/papers/0435/04350030.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", remark = "Appears in \cite{Brassard:1990:ACC}.", } @Article{Brasard:1990:CCH, author = "Gilles Brasard", title = "Cryptology --- column 3 hot news on interactive protocols", journal = j-SIGACT, volume = "21", number = "1", pages = "7", month = jan, year = "1990", CODEN = "SIGNDM", DOI = "https://doi.org/10.1145/379139.379162", ISSN = "0163-5700 (print), 1943-5827 (electronic)", ISSN-L = "0163-5700", bibdate = "Wed Mar 21 09:45:50 MDT 2012", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/sigact.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGACT News", journal-URL = "http://dl.acm.org/citation.cfm?id=J697", } @Article{Brassard:1990:CCH, author = "Gilles Brassard", title = "Cryptology --- column 4: hiding information from oracles", journal = j-SIGACT, volume = "21", number = "2", pages = "5", month = "Spring", year = "1990", CODEN = "SIGNDM", DOI = "https://doi.org/10.1145/379172.379174", ISSN = "0163-5700 (print), 1943-5827 (electronic)", ISSN-L = "0163-5700", bibdate = "Wed Mar 21 09:45:50 MDT 2012", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/sigact.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGACT News", journal-URL = "http://dl.acm.org/citation.cfm?id=J697", } @Article{Brickell:1990:CIS, author = "Ernest F. Brickell and Daniel M. Davenport", title = "On the Classification of Ideal Secret Sharing Schemes (Extended Abstract)", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "278--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:59 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0435/04350278.htm; http://link.springer-ny.com/link/service/series/0558/papers/0435/04350278.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Brickell:1990:SHI, author = "Ernest F. Brickell", title = "A Survey of Hardware Implementations of {RSA} (Invited), (Abstract)", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "368--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:59 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0435/04350368.htm; http://link.springer-ny.com/link/service/series/0558/papers/0435/04350368.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", remark = "Appears in \cite{Brassard:1990:ACC}.", } @Article{Brickell:1990:SIS, author = "Ernest F. Brickell", title = "Some Ideal Secret Sharing Schemes", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "468--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340468.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340468.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Brown:1990:DPT, author = "Lawrence Brown and Jennifer Seberry", title = "On the Design of Permutation $ {P} $ in {DES} Type Cryptosystems", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "696--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340696.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340696.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Burrows:1990:LA, author = "Michael Burrows and Martin Abadi and Roger Needham", title = "A Logic of Authentication", journal = j-TOCS, volume = "8", number = "1", pages = "18--36", month = feb, year = "1990", CODEN = "ACSYEC", ISSN = "0734-2071 (print), 1557-7333 (electronic)", ISSN-L = "0734-2071", bibdate = "Wed Jan 13 18:36:53 MST 1999", bibsource = "http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org:80/pubs/citations/journals/tocs/1990-8-1/p18-burrows/", acknowledgement = ack-nhfb, fjournal = "ACM Transactions on Computer Systems", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774", keywords = "security; theory; verification", subject = "{\bf C.2.2} Computer Systems Organization, COMPUTER-COMMUNICATION NETWORKS, Network Protocols, Protocol verification. {\bf C.2.0} Computer Systems Organization, COMPUTER-COMMUNICATION NETWORKS, General, Security and protection (e.g., firewalls). {\bf D.4.6} Software, OPERATING SYSTEMS, Security and Protection, Authentication. {\bf F.3.1} Theory of Computation, LOGICS AND MEANINGS OF PROGRAMS, Specifying and Verifying and Reasoning about Programs. {\bf D.4.6} Software, OPERATING SYSTEMS, Security and Protection, Cryptographic controls.", } @Article{Cao:1990:DKC, author = "Zhen Fu Cao and Bao Dong Zheng", title = "A discussion on knapsack cryptosystems concealed by a matrix cover", journal = "J. Harbin Inst. Tech.", volume = "6", pages = "34--41", year = "1990", ISSN = "0367-6234", MRclass = "94A60", MRnumber = "92i:94016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Journal of Harbin Institute of Technology. Harbin Gongye Daxue Xuebao", } @Article{Chaum:1990:SDA, author = "David Chaum", title = "The Spymasters Double-Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "591--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:59 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0435/04350591.htm; http://link.springer-ny.com/link/service/series/0558/papers/0435/04350591.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Chor:1990:SSI, author = "Benny Chor and Eyal Kushilevitz", title = "Secret Sharing over Infinite Domains (Extended Abstract)", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "299--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:59 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0435/04350299.htm; http://link.springer-ny.com/link/service/series/0558/papers/0435/04350299.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Comba:1990:ECI, author = "P. G. Comba", title = "Exponentiation cryptosystems on the {IBM PC}", journal = j-IBM-SYS-J, volume = "29", number = "4", pages = "526--538", year = "1990", CODEN = "IBMSA7", ISSN = "0018-8670", bibdate = "Tue Mar 19 17:38:46 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib", abstract = "Several cryptosystems based on exponentiation have been proposed. Some of these are of the public key variety and offer notable advantages in cryptographic key management, both for secret communication and for message authentication. The need for extensive arithmetic calculations with very large integers (hundreds of digits long) is a drawback of these systems. The paper describes a set of experimental programs that were developed to demonstrate that exponentiation cryptosystems can be efficiently implemented on the IBM Personal Computer (PC). The programs are organized into four layers, comprising procedures for: multiple precision integer arithmetic, modular exponentiation, prime number generation and testing, and cryptographic key generation. The major emphasis is on methods and techniques for improving execution speed. The items discussed include: the use of a specialized squaring procedure; a recursive splitting method to speed up squaring and multiplication; the computation of residues by using multiplication instead of division; the efficient encoding of residue information; and the use of thresholds to select the most effective primality testing algorithm for a given size number. Timing results are presented and discussed. Finally, the paper discusses the advantages of a mixed system that combines the superior key management capabilities inherent in public key cryptosystems with the much higher bulk-encryption speed obtainable with the Data Encryption Algorithm.", acknowledgement = ack-nhfb, affiliation = "IBM Cambridge Sci. Center, MA, USA", classification = "B6120B (Codes); C6130 (Data handling techniques)", fjournal = "IBM Systems Journal", keywords = "Bulk-encryption speed; Cryptographic key management; Cryptosystems; Data Encryption Algorithm; Execution speed; Exponentiation; IBM Personal Computer; Message authentication; Multiple precision integer arithmetic; Primality testing algorithm; Prime number generation; Public key; Recursive splitting method; Residues; Secret communication; Specialized squaring procedure", language = "English", pubcountry = "USA", thesaurus = "Cryptography; IBM computers; Microcomputer applications", } @Article{Crepeau:1990:VDS, author = "Claude Cr{\'e}peau", title = "Verifiable Disclose for Secrets and Applications (Abstract)", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "150--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340150.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340150.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Damgaard:1990:DPH, author = "I. B. Damg{\aa}rd", title = "A design principle for hash functions", crossref = "Brassard:1990:ACC", pages = "416--427", year = "1990", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 5]{Bellare:1996:MAU}, \cite[Ref. 4]{Kaliski:1995:MAM}, \cite[Ref. 7]{Dobbertin:1996:SMA}.", } @Article{Davida:1990:KDS, author = "George I. Davida and Yvo Desmedt and Ren{\'e} Peralta", title = "A Key Distribution System Based on Any One-Way Function (Extended Abstract)", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "75--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340075.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340075.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Davis:1990:NSP, author = "Don Davis and Ralph Swick", title = "Network security via private-key certificates", journal = j-OPER-SYS-REV, volume = "24", number = "4", pages = "64--67", month = oct, year = "1990", CODEN = "OSRED8", ISSN = "0163-5980 (print), 1943-586X (electronic)", ISSN-L = "0163-5980", bibdate = "Sat Aug 26 08:55:53 MDT 2006", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Operating Systems Review", } @TechReport{Davis:1990:WSK, author = "Don Davis and Ralph Swick", title = "Workstation services and {Kerberos} authentication at {Project Athena}", type = "Report", number = "MIT/LCS/TM 424", institution = "Laboratory for Computer Science, Massachusetts Institute of Technology", address = "Cambridge, MA, USA", pages = "8", year = "1990", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @InProceedings{DeAlvare:1990:HCC, author = "Ana Maria {De Alvare}", title = "How Crackers Crack Passwords", crossref = "USENIX:1990:USI", pages = "103--112", day = "27", month = aug, year = "1990", bibdate = "Tue Feb 20 15:42:13 MST 1996", bibsource = "ftp://ftp.uu.net/library/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/usenix1990.bib", acknowledgement = ack-nhfb, affiliation = "Lawrence Livermore Laboratory", annote = "25 Papers", keywords = "Unix security; Usenix", } @Misc{Denning:1990:DES, author = "Dorothy Denning", title = "{Data Encryption Standard}: fifteen years of public scrutiny", publisher = "ACSA", address = "Silver Spring, MD, USA", pages = "various", year = "1990", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, annote = "Speech delivered at the 6th annual Computer Security Applications Conference by the 1990 distinguished lecturer in computer security. VHS format.", keywords = "Computer security --- Congresses.", } @InProceedings{DeSantis:1990:DPS, author = "A. {De Santis} and M. Yung", title = "On the Design of Provably-Secure Cryptographic Hash Functions", crossref = "Damgaard:1990:ACE", pages = "377--397", year = "1990", bibdate = "Sat Jul 16 12:02:43 1994", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", acknowledgement = ack-nhfb, } @Article{Desmedt:1990:MCS, author = "Yvo G. Desmedt", title = "Making conditionally secure cryptosystems unconditionally abuse-free in a general context (extended abstract)", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "6--16", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60", MRnumber = "1 062 222", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Lecture Notes in Computer Science", remark = "Appears in \cite{Brassard:1990:ACC}.", } @InCollection{Desmedt:1990:PAA, author = "Yvo Desmedt", booktitle = "Sequences (Naples/Positano, 1988)", title = "Protecting against abuses of cryptosystems in particular in the context of verification of peace treaties (extended abstract)", publisher = "Springer", address = "New York", pages = "394--405", year = "1990", MRclass = "94A60", MRnumber = "1 040 322", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", } @InProceedings{Desmedt:1990:TC, author = "Y. Desmedt and Y. Frankel", title = "Threshold cryptosystems", crossref = "Brassard:1990:ACC", pages = "307--315", year = "1990", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 12]{Gemmell:1997:ITC}, \cite[Ref. 11]{Canetti:1997:PSL}.", } @Article{DeSoete:1990:CAS, author = "Marijke {De Soete} and Klaus Vedder and Michael Walker", title = "{Cartesian} Authentication Schemes", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "476--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340476.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340476.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Diffie:1990:APK, author = "Whitfield Diffie", title = "The Adolescence of Public-Key Cryptography (Invited)", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "2--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340002.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340002.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{DomingoiFerrer:1990:FSK, author = "Josep {Domingo i Ferrer} and Lloren{\c{c}} {Huguet i Rotger}", title = "Full Secure Key Exchange and Authentication with No Previously Shared Secrets", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "665--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340665.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340665.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Duhoux:1990:DBA, author = "Yves Duhoux", title = "Deciphering {Bronze Age} Scripts of {Crete} --- The Case of {Linear A} (Invited)", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "649--650", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340649.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340649.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Even:1990:LLD, author = "Shimon Even and Oded Goldreich and Silvio Micali", title = "On-Line\slash Off-Line Digital Signatures", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "263--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:59 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0435/04350263.htm; http://link.springer-ny.com/link/service/series/0558/papers/0435/04350263.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", remark = "Appears in \cite{Brassard:1990:ACC}.", } @Article{Fiat:1990:BR, author = "Amos Fiat", title = "Batch {RSA}", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "175--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:59 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0435/04350175.htm; http://link.springer-ny.com/link/service/series/0558/papers/0435/04350175.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", remark = "Appears in \cite{Brassard:1990:ACC}.", } @Article{Flajolet:1990:RMS, author = "P. Flajolet and A. M. Odlyzko", title = "Random mapping statistics", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "329--354", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Jul 19 06:53:43 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.research.att.com/~amo/doc/arch/random.mappings.pdf; http://www.research.att.com/~amo/doc/arch/random.mappings.ps; http://www.research.att.com/~amo/doc/arch/random.mappings.tex", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Frankel:1990:PPL, author = "Y. Frankel", title = "A practical protocol for large group oriented networks", crossref = "Quisquater:1990:ACE", pages = "56--61", year = "1990", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 16]{Gemmell:1997:ITC}.", } @Book{Gait:1990:VCH, author = "Jason Gait", title = "Validating the correctness of hardware implementations of the {NBS Data Encryption Standard}", number = "500-20/1980", publisher = pub-NBS, address = pub-NBS:adr, pages = "iv + 40", month = sep, year = "1990", LCCN = "QC100.A1U54 no. 500-20 19", bibdate = "Mon Oct 19 08:50:31 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = "NBS special publication", acknowledgement = ack-nhfb, keywords = "computers --- access control --- code words; computers --- testing; Monte Carlo method", } @Article{Galil:1990:SPK, author = "Zvi Galil and Stuart Haber and Moti Yung", title = "A Secure Public-Key Authentication Scheme", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "3--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340003.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340003.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Gibson:1990:SCD, author = "J. K. Gibson", title = "Some comments on {Damg{\aa}rd's} hashing principle", journal = j-ELECT-LETTERS, volume = "26", number = "15", pages = "1178--1179", day = "19", month = jul, year = "1990", CODEN = "ELLEAK", ISSN = "0013-5194 (print), 1350-911X (electronic)", ISSN-L = "0013-5194", bibdate = "Sat Jan 25 17:38:12 MST 1997", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib; UnCover library database", abstract = "A general principle given by Damg{\aa}rd for constructing hash functions is modified and used to show how the security of block cipher hashing can be improved. A small correction to Damg{\aa}rd's work is made.", acknowledgement = ack-nhfb, affiliation = "Birkbeck Coll", affiliationaddress = "London, Engl", classification = "723; 921", fjournal = "Electronics Letters", journalabr = "Electron Lett", keywords = "Analysis; Block Cipher Hashing; Codes, Symbolic; Cryptography; Hash Functions", } @Article{Godlewski:1990:KMA, author = "Philippe Godlewski and Chris Mitchell", title = "Key Minimal Authentication Systems for Unconditional Secrecy", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "497--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340497.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340497.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Goldberg:1990:MUA, author = "David Goldberg", title = "The {MITRE} User Authentication System", crossref = "USENIX:1990:USI", pages = "1--4", year = "1990", bibdate = "Tue Feb 20 15:42:13 MST 1996", bibsource = "ftp://ftp.uu.net/library/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, affiliation = "MITRE", } @InProceedings{Goldwasser:1990:SPS, author = "Shafi Goldwasser", title = "The search for provably secure cryptosystems", crossref = "Pomerance:1990:CCNb", pages = "89--113", year = "1990", MRclass = "94A60 (11T71 11Y16 68Q15)", MRnumber = "1095553 (92k:94018)", bibdate = "Fri Sep 17 09:26:34 2010", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Gollmann:1990:CC, author = "Dieter Gollmann and William G. Chambers", title = "A Cryptanalysis of $ \mbox {Step}_{k, m}$-Cascades", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "680--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340680.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340680.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Gotoh:1990:MRR, author = "Yasuko Gotoh and Kazuo Takaragi and Ryoichi Sasaki", title = "A method for rapid {RSA} key generation", journal = j-SYS-COMP-JAPAN, volume = "21", number = "8", pages = "11--20", year = "1990", CODEN = "SCJAEP", ISSN = "0882-1666 (print), 1520-684X (electronic)", ISSN-L = "0882-1666", MRclass = "94A60 (11T71)", MRnumber = "91j:94020", MRreviewer = "Min Qiang Huang", bibdate = "Tue Feb 9 11:14:49 MST 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Systems and computers in Japan", } @Article{Grehan:1990:CDE, author = "R. Grehan", title = "Cloak and Data: An explanation of secret codes and a puzzle to test your skill", journal = j-BYTE, volume = "15", number = "6", pages = "311--312, 314, 316, 318, 320, 322, 324", month = jun, year = "1990", CODEN = "BYTEDJ", ISSN = "0360-5280 (print), 1082-7838 (electronic)", ISSN-L = "0360-5280", bibdate = "Thu Sep 12 17:47:21 MDT 1996", bibsource = "/usr/local/src/bib/bibliography/Misc/security.1.bib; https://www.math.utah.edu/pub/tex/bib/byte1990.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, classification = "B6120B (Codes); C6130 (Data handling techniques)", fjournal = "BYTE Magazine", keywords = "Asymmetric cryptosystems; Beale cipher; Caesar cipher; Concealment; Cryptography; Data encryption standard; DES; Encryption methods; Exclusive-OR cipher; Plaintext; Public-key cryptosystems; Secret key; Security; Transposition ciphers; Trick", thesaurus = "Cryptography", } @MastersThesis{Guarin:1990:SIA, author = "Maria Victoria Guarin", title = "A study of information authentication and a proposed digital signature scheme", type = "Thesis ({M.S. in Engin.})", school = "University of Texas at Austin", address = "Austin, TX, USA", pages = "viii + 135", year = "1990", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, keywords = "Computer security; Cryptography; Electronic data processing departments --- Security measures", } @InCollection{Hardjono:1990:RED, author = "Thomas Hardjono", booktitle = "Advances in cryptology---AUSCRYPT '90 (Sydney, 1990)", title = "Record encryption in distributed databases", volume = "453", publisher = pub-SV, address = pub-SV:adr, pages = "386--395", year = "1990", MRclass = "68P25 (94A60)", MRnumber = "91j:68032", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; MathSciNet database", series = "Lecture Notes in Comput. Sci.", } @InProceedings{Hardjono:1990:SKS, author = "Thomas Hardjono and Jennifer Seberry", title = "Search Key Substitution in the Encipherment of {B}-Trees", crossref = "McLeod:1990:VLD", pages = "50--58", year = "1990", bibdate = "Fri Jan 12 07:50:32 MST 2001", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; http://www.vldb.org/dblp/db/conf/vldb/vldb90.html", URL = "http://www.vldb.org/dblp/db/conf/vldb/HardjonoS90.html", acknowledgement = ack-nhfb, authorurl = "http://www.vldb.org/dblp/db/indices/a-tree/h/Hardjono:Thomas.html; http://www.vldb.org/dblp/db/indices/a-tree/s/Seberry:Jennifer.html", } @Article{Harn:1990:EPE, author = "Lein Harn and Thomas Kiesler", title = "An efficient probabilistic encryption scheme", journal = j-INFO-PROC-LETT, volume = "34", number = "3", pages = "123--129", day = "9", month = apr, year = "1990", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", MRclass = "94A60 (68P25 68Q25)", MRnumber = "91h:94025", MRreviewer = "Jozef Vysko{\v{c}}", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/infoproc.bib; MathSciNet database", acknowledgement = ack-nhfb, affiliation = "Univ of Missouri-Kansas City", affiliationaddress = "Kansas City, MO, USA", classification = "723; 922; C6130 (Data handling techniques)", corpsource = "Comput. Sci. Telecommun. Program, Missouri Univ., Kansas City, MO, USA", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "Cryptography; cryptography; digital signature scheme; Probabilistic Encryption; probabilistic encryption scheme; Probability; Public Key Cryptography; public key encryption; Quadratic Residues; RSA scheme; trapdoor function", treatment = "P Practical; T Theoretical or Mathematical", } @Article{Hwang:1990:PKA, author = "Tzonelih Hwang and T. R. N. Rao", title = "Private-Key Algebraic-Code Cryptosystems with High Information Rates", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "657--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340657.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340657.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Isselhorst:1990:UFP, author = "Hartmut Isselhorst", title = "The Use of Fractions in Public-Key Cryptosystems", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "47--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340047.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340047.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Jaburek:1990:GGP, author = "W. J. Jaburek", title = "A Generalization of {El Gamal}'s Public Key Cryptosystem", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "23--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340023.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340023.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Book{Jackson:1990:SITa, author = "Keith M. Jackson", title = "Secure information transfer: {PC} encryption: a practical guide", publisher = "Blackwell Scientific Publications", address = "Oxford, UK; Boston, MA, USA", pages = "ix + 182", year = "1990", ISBN = "0-632-02664-2", ISBN-13 = "978-0-632-02664-7", LCCN = "QA76.9.A25J32 1990", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, keywords = "Computer systems --- Data --- Encryption; Cryptography; Microcomputers --- Access control", } @Book{Jackson:1990:SITb, author = "Keith M. Jackson", title = "Secure information transfer: {PC} encryption: a practical guide", publisher = pub-CRC, address = pub-CRC:adr, pages = "ix + 182", year = "1990", ISBN = "0-8493-7711-0", ISBN-13 = "978-0-8493-7711-2", LCCN = "QA 76.9 A25 J32 1990", bibdate = "Mon Oct 19 08:50:31 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, keywords = "Computer security; Cryptography.", } @MastersThesis{Johnson:1990:EDE, author = "Craig W. Johnson", title = "An examination of the {Data Encryption Standard} and its use in the commercial environment", type = "Thesis ({M.S.})", school = "University of Colorado", address = "Boulder, CO, USA", pages = "xi + 207", year = "1990", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, keywords = "Data protection --- Standards; Electronic funds transfers --- Security measures.", } @Article{Jones:1990:PKC, author = "M. Christopher W. Jones", title = "A public key cryptosystem as hard as factorisation", journal = "Irish Math. Soc. Bull.", volume = "24", pages = "59--66", year = "1990", ISSN = "0791-5578", MRclass = "94A60", MRnumber = "1 112 464", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Irish Mathematical Society Bulletin", } @Article{Joyce:1990:IAB, author = "Rick Joyce and Gopal Gupta", title = "Identity authentication based on keystroke latencies", journal = j-CACM, volume = "33", number = "2", pages = "168--176", month = feb, year = "1990", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu May 30 09:41:10 MDT 1996", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib; http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cacm1990.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/75582.html", abstract = "A digital signature is as unique an identifier as its human counterpart, according to the authors who offer a user verification method to support their claim.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "experimentation; security; verification", subject = "{\bf K.6.m}: Computing Milieux, MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS, Miscellaneous, Security*.", } @Article{Kalipha:1990:NPK, author = "Saad M. Kalipha and Jafar Wadi Abdul-Sada and Hussain Ali Hussain", title = "New public-key cryptosystem", journal = j-INT-J-SYST-SCI, volume = "21", number = "1", pages = "205--215", year = "1990", CODEN = "IJSYA9", ISSN = "0020-7721", ISSN-L = "0020-7721", MRclass = "94A60", MRnumber = "1 037 375", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "International Journal of Systems Science", } @InProceedings{Klein:1990:FCS, author = "Daniel Klein", title = "Foiling the Cracker: a Survey of, and Improvements to, Password Security", crossref = "USENIX:1990:USI", institution = "Software Engineering Institute, CMU", pages = "5--14", year = "1990", bibdate = "Wed Aug 13 10:48:45 MDT 1997", bibsource = "ftp://ftp.uu.net/library/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; http://www.usenix.org/cgi-bin/sortbib.pl?-sA", acknowledgement = ack-nhfb, affiliation = "Software Engineering Institute, CMU", } @Article{Koblitz:1990:FJS, author = "Neal Koblitz", booktitle = "Advances in cryptology---CRYPTO '88 (Santa Barbara, CA, 1988)", title = "A family of {Jacobians} suitable for discrete log cryptosystems", journal = j-LECT-NOTES-COMP-SCI, volume = "403", pages = "94--99", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "11T71 (14G15 94A60)", MRnumber = "91g:11153", MRreviewer = "Jos{\'e} Felipe Voloch", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Lecture Notes in Computer Science", } @Article{Kohl:1990:UEK, author = "John T. Kohl", title = "The Use of Encryption in {Kerberos} for Network Authentication (Invited)", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "35--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:59 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0435/04350035.htm; http://link.springer-ny.com/link/service/series/0558/papers/0435/04350035.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", remark = "Appears in \cite{Brassard:1990:ACC}.", } @Article{Krawczyk:1990:HPC, author = "Hugo Krawczyk", title = "How to Predict Congruential Generators", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "138--153", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Aug 11 15:15:00 2004", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0435/04350138.htm; http://link.springer-ny.com/link/service/series/0558/papers/0435/04350138.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", remark = "Appears in \cite{Brassard:1990:ACC}.", } @PhdThesis{Kuo:1990:TEC, author = "Chung Jung Kuo", title = "Transform encryption coding", type = "Thesis ({Ph.D.})", school = "Department of Electrical Engineering, Michigan State University", address = "East Lansing, MI 48824, USA", pages = "vi + 101", year = "1990", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, annote = "Microfilm. Ann Arbor, Mich.: University Microfilms, 1991. 1 microfilm reel; 35 mm.", keywords = "Coding theory; Data compression (Computer science); Digital electronics; Information theory", } @InProceedings{Lagarias:1990:PNG, author = "J. C. Lagarias", title = "Pseudorandom number generators in cryptography and number theory", crossref = "Pomerance:1990:CCNb", pages = "115--143", year = "1990", MRclass = "11K45 (11T71 68P25 94A60)", MRnumber = "1095554 (92f:11109)", MRreviewer = "Kevin S. McCurley", bibdate = "Fri Sep 17 09:26:34 2010", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Book{Leary:1990:SCS, author = "Penn Leary", title = "The second cryptographic {Shakespeare}: a monograph wherein the poems and plays attributed to {William Shakespeare} are proven to contain the enciphered name of the concealed author, {Francis Bacon}", publisher = "Westchester House", address = "Omaha, NE, USA", edition = "Enlarged", pages = "313", year = "1990", ISBN = "0-9617917-1-3", ISBN-13 = "978-0-9617917-1-1", LCCN = "PR2944 .L38 1990", bibdate = "Mon Nov 30 10:10:19 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @InProceedings{Lenstra:1990:NFS, author = "A. K. Lenstra and H. W. {Lenstra, Jr.} and M. S. Manasse and J. M. Pollard", title = "The Number Field Sieve", crossref = "ACM:1990:PTS", pages = "564--572", year = "1990", bibdate = "Thu Jan 21 13:33:06 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "For discussion of the generalized number field sieve, see \cite{Lenstra:1993:FNF}.", acknowledgement = ack-nhfb, } @InProceedings{Lenstra:1990:PT, author = "Arjen K. Lenstra", title = "Primality testing", crossref = "Pomerance:1990:CCNb", pages = "13--25", year = "1990", MRclass = "11Y11 (11A51)", MRnumber = "1095549 (92g:11123)", MRreviewer = "Ren{\'e} Schoof", bibdate = "Fri Sep 17 09:26:34 2010", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Li:1990:ACP, author = "Da Xing Li and Ze Zeng Zhang", title = "An attack on a class of public key cryptosystems based on the {Euclidean} algorithm", journal = "Kexue Tongbao (Chinese)", volume = "35", number = "11", pages = "871--874", year = "1990", ISSN = "0023-074X", MRclass = "94A60 (68P25)", MRnumber = "1 099 293", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Kexue Tongbao. Chinese Science Bulletin", } @InProceedings{Lidl:1990:SMA, author = "Rudolf Lidl", title = "Some mathematical aspects of recent advances in cryptology", crossref = "Loxton:1990:NTC", pages = "1--8", year = "1990", MRclass = "94A60 (11K45 11T71)", MRnumber = "91b:94039", bibdate = "Thu Apr 04 10:07:13 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Book{Longo:1990:GCC, author = "G. Longo and M. Marchi and A. Sgarro", title = "Geometries, codes and cryptography", volume = "313", publisher = pub-SV, address = pub-SV:adr, pages = "227", year = "1990", ISBN = "3-211-82205-4 (Wien), 0-387-82205-4 (New York)", ISBN-13 = "978-3-211-82205-0 (Wien), 978-0-387-82205-1 (New York)", LCCN = "Z103 .G46 1990", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Based on lectures held at the International Centre for Mechanical Sciences in Udine, Italy, 1989.", series = "Courses and lectures", acknowledgement = ack-nhfb, keywords = "ciphers; coding theory; cryptography; geometry", } @InProceedings{Lunt:1990:EK, author = "Steven Lunt", title = "Experiences with {Kerberos}", crossref = "USENIX:1990:USI", pages = "113--120", day = "27", month = aug, year = "1990", bibdate = "Tue Feb 20 15:42:13 MST 1996", bibsource = "ftp://ftp.uu.net/library/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/usenix1990.bib", acknowledgement = ack-nhfb, affiliation = "Bellcore", keywords = "Unix security; Usenix", } @Article{Magliveras:1990:CTC, author = "Spyros S. Magliveras and Nasir D. Memon and Kok C. Tam", booktitle = "Proceedings of the Twenty-first Southeastern Conference on Combinatorics, Graph Theory, and Computing (Boca Raton, FL, 1990)", title = "Complexity tests of cryptosystem {PGM}", journal = j-CONG-NUM, volume = "79", pages = "61--68", year = "1990", ISSN = "0384-9864", MRclass = "94A60", MRnumber = "1 140 497", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Congressus Numerantium. A Conference Journal on Numerical Themes", } @Article{Magliveras:1990:LCP, author = "Spyros S. Magliveras and Nasir D. Memon", booktitle = "Proceedings of the Twentieth Southeastern Conference on Combinatorics, Graph Theory, and Computing (Boca Raton, FL, 1989)", title = "The linear complexity profile of cryptosystem {PGM}", journal = j-CONG-NUM, volume = "72", pages = "51--60", year = "1990", ISSN = "0384-9864", MRclass = "94A60 (68P25 68Q30)", MRnumber = "91d:94013", MRreviewer = "Joan Boyar", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Congressus Numerantium. A Conference Journal on Numerical Themes", } @Article{Magliveras:1990:PCP, author = "Spyros S. Magliveras and Nasir D. Memon", booktitle = "Advances in cryptology---CRYPTO '89 (Santa Barbara, CA, 1989)", title = "Properties of cryptosystem {PGM}", journal = j-LECT-NOTES-COMP-SCI, volume = "435", publisher = "Springer", address = "New York", pages = "447--460", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60 (20B99)", MRnumber = "92d:94019", MRreviewer = "Do Long Van", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Lecture Notes in Computer Science", remark = "Appears in \cite{Brassard:1990:ACC}.", } @Article{Matsumoto:1990:EAC, author = "Tsutomu Matsumoto and Hideki Imai", title = "An efficient asymmetric cryptosystem supporting authenticity and confidentiality with public multivariate polynomial tuples", journal = j-ELECT-COMM-JAPAN-3-FUND-ELECT-SCI, volume = "73", number = "7", pages = "1--17", year = "1990", CODEN = "ECJSER", ISSN = "1042-0967 (print), 1520-6440 (electronic)", ISSN-L = "1042-0967", MRclass = "94A60", MRnumber = "1 084 468", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Electronics and Communications in Japan. Part III: Fundamental Electronic Science", } @Article{Maurer:1990:FGS, author = "Ueli M. Maurer", title = "Fast Generation of Secure {RSA}-Moduli with Almost Maximal Diversity", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "636--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340636.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340636.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{McCurley:1990:DLP, author = "Kevin S. McCurley", title = "The discrete logarithm problem", crossref = "Pomerance:1990:CCNb", pages = "49--74", year = "1990", MRclass = "11Y16 (11T71 94A60)", MRnumber = "1095551 (92d:11133)", MRreviewer = "Kaisa Nyberg", bibdate = "Fri Sep 17 09:26:34 2010", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @InProceedings{McCurley:1990:OEC, author = "Kevin S. McCurley", title = "Odds and ends from cryptology and computational number theory", crossref = "Pomerance:1990:CCNb", pages = "145--166", year = "1990", MRclass = "11T71 (11Y16 94A60)", MRnumber = "1095555 (92j:11149)", MRreviewer = "Eric Bach", bibdate = "Fri Sep 17 09:26:34 2010", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Meier:1990:NCC, author = "Willi Meier and Othmar Staffelbach", title = "Nonlinearity Criteria for Cryptographic Functions", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "549--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340549.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340549.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Menezes:1990:IEC, author = "Alfred Menezes and Scott Vanstone", booktitle = "Advances in cryptology---AUSCRYPT '90 (Sydney, 1990)", title = "The implementation of elliptic curve cryptosystems", journal = j-LECT-NOTES-COMP-SCI, volume = "453", pages = "2--13", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60 (11T71 14G15)", MRnumber = "91j:94021", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Lecture Notes in Computer Science", } @InProceedings{Merkle:1990:CDS, author = "R. C. Merkle", title = "A Certified Digital Signature (Subtitle: That Antique Paper from 1979)", crossref = "Brassard:1990:ACC", pages = "218--238", year = "1990", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0435/04350218.htm; http://link.springer-ny.com/link/service/series/0558/papers/0435/04350218.pdf", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 23]{Goldreich:1997:FMCb}.", } @InProceedings{Merkle:1990:OWH, author = "R. Merkle", title = "One Way Hash Functions and {DES}", crossref = "Brassard:1990:ACC", pages = "428--446 (or 428--466??)", year = "1990", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", note = "Based on unpublished paper from 1979 and his Ph.D thesis, Stanford, 1979.", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 11]{Bellare:1996:MAU}, \cite[Ref. 6]{Kaliski:1995:MAM}.", } @Article{Miyaguchi:1990:FCC, author = "Shoji Miyaguchi", booktitle = "Advances in cryptology---CRYPTO '89 (Santa Barbara, CA, 1989)", title = "The {FEAL-$8$} cryptosystem and a call for attack", journal = j-LECT-NOTES-COMP-SCI, volume = "435", publisher = "Springer", address = "New York", pages = "624--627", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60", MRnumber = "1 062 260", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Lecture Notes in Computer Science", remark = "Appears in \cite{Brassard:1990:ACC}.", } @Article{Montgomery:1990:FEP, author = "P. L. Montgomery and R. D. Silverman", title = "An {FFT} Extension to the {P}-1 Factoring Algorithm", journal = j-MATH-COMPUT, volume = "54", pages = "839--854", year = "1990", CODEN = "MCMPAF", ISSN = "0025-5718 (print), 1088-6842 (electronic)", ISSN-L = "0025-5718", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Mathematics of Computation", journal-URL = "http://www.ams.org/mcom/", referencedin = "Referenced in \cite[Ref. 7]{Silverman:1997:FGR}.", } @InProceedings{Naor:1990:PKC, author = "M. Naor and M. Yung", title = "Public-key cryptosystems provably secure against chosen ciphertext attacks", crossref = "ACM:1990:PTS", pages = "427--437", year = "1990", bibdate = "Wed Feb 20 18:33:59 MST 2002", bibsource = "http://portal.acm.org/; http://www.acm.org/pubs/contents/proceedings/series/stoc/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org/pubs/citations/proceedings/stoc/100216/p427-naor/", acknowledgement = ack-nhfb, } @Article{Nelson:1990:SAE, author = "Ruth Nelson and John Heimann", title = "{SDNS} Architecture and End-to-End Encryption", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "356--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:59 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0435/04350356.htm; http://link.springer-ny.com/link/service/series/0558/papers/0435/04350356.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", remark = "Appears in \cite{Brassard:1990:ACC}.", } @InProceedings{Odlyzko:1990:RFK, author = "A. M. Odlyzko", title = "The rise and fall of knapsack cryptosystems", crossref = "Pomerance:1990:CCNb", pages = "75--88", year = "1990", MRclass = "94A60 (11T71 11Y16)", MRnumber = "92f:94016", MRreviewer = "Kaisa Nyberg", bibdate = "Mon Jul 19 06:47:15 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.research.att.com/~amo/doc/arch/knapsack.survey.pdf; http://www.research.att.com/~amo/doc/arch/knapsack.survey.ps; http://www.research.att.com/~amo/doc/arch/knapsack.survey.troff", acknowledgement = ack-nhfb, } @Article{Okamoto:1990:DZKb, author = "Tatsuaki Okamoto and Kazuo Ohta", title = "Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "481--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:59 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0435/04350481.htm; http://link.springer-ny.com/link/service/series/0558/papers/0435/04350481.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", remark = "Appears in \cite{Brassard:1990:ACC}.", } @InProceedings{Omura:1990:PKC, author = "J. Omura", title = "A Public Key Cell Design for Smart Card Chips", crossref = "Anonymous:1990:IWH", pages = "983--985", year = "1990", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 11]{Handschuh:1998:SCC}.", } @InProceedings{Panneerselvam:1990:RSA, author = "G. Panneerselvam and G. A. Jullien and S. Bandyopadhyay and W. C. Miller", booktitle = "Proceedings --- Parbase-90 International Conference on Databases, Parallel Architectures, and Their Applications (Mar 7--9 1990: Miami Beach, FL, USA)", title = "Reconfigurable systolic architectures for hashing", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "543--??", year = "1990", bibdate = "Sat Jan 25 17:38:12 MST 1997", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", note = "IEEE catalog number 90CH2728-4.", abstract = "The authors develop a novel technique in which concepts of both bucketing and open addressing schemes are modified in such a manner that they can be suitable for VLSI\slash WSI implementation, namely, dynamically reconfigurable hash tables. In this method, finite storage is allocated for each bucket. Instead of searching the entire table or a part of the table for an empty storage place, the overflowing synonyms are inserted into the successor's bucket (next to the home bucket). If the successor's bucket overflows, the same technique is repeated until the table is stable. The host bucket takes care of all the relative operations for its guest items. As soon as an empty place arises in the original bucket, the host bucket returns the guest element to the original bucket; in essence, dynamically variable capacity buckets have been created. These buckets are designed using systolic arrays.", acknowledgement = ack-nhfb, affiliation = "VLSI Research Group, Univ of Windsor, Windsor, Ont, Can", classification = "722; 723", conference = "PARBASE-90: International Conference on Databases, Parallel Architectures, and Their Applications", conferenceyear = "1990", keywords = "Computer Architecture; Computer Systems, Digital --- Multiprocessing; Data Processing --- File Organization; Dynamically Reconfigurable Hash Tables; Hashing; Reconfigurable Systolic Architectures", meetingabr = "PARBASE 90 Int Conf Databases Parallel Archit Appl", meetingaddress = "Miami Beach, FL, USA", meetingdate = "Mar 7--9 1990", meetingdate2 = "03/07--09/90", publisherinfo = "IEEE Service Center", sponsor = "Florida Int Univ, Miami, FL, USA; IEEE; Euromicro", } @InProceedings{Pfitzmann:1990:HBD, author = "B. Pfitzmann and A. Pfitzmann", title = "How to Break the Direct {RSA}-Implementation of {MIXes}", crossref = "Quisquater:1990:ACE", pages = "373--??", year = "1990", bibdate = "Thu Apr 04 10:08:08 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340373.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340373.pdf; http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1023.html", acknowledgement = ack-nhfb, keywords = "information hiding; steganography", } @InProceedings{Pomerance:1990:CCNa, author = "Carl Pomerance", title = "Cryptology and computational number theory --- an introduction", crossref = "Pomerance:1990:CCNb", pages = "1--12", year = "1990", bibdate = "Fri Sep 17 09:26:34 2010", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @InProceedings{Pomerance:1990:F, author = "Carl Pomerance", title = "Factoring", crossref = "Pomerance:1990:CCNb", pages = "27--47", year = "1990", bibdate = "Fri Sep 17 09:26:34 2010", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Preneel:1990:CTA, author = "Bart Preneel and Antoon Bosselaers and Ren{\'e} Govaerts and Joos Vandewalle", title = "A Chosen Text Attack on the Modified Cryptographic Checksum Algorithm of {Cohen} and {Huang}", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "154--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:59 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0435/04350154.htm; http://link.springer-ny.com/link/service/series/0558/papers/0435/04350154.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Preparata:1990:PCD, author = "F. P. Preparata and J. E. Vuillemin", title = "Practical cellular dividers", journal = j-IEEE-TRANS-COMPUT, volume = "39", number = "5", pages = "605--614", month = may, year = "1990", CODEN = "ITCOB4", DOI = "https://doi.org/10.1109/12.53574", ISSN = "0018-9340 (print), 1557-9956 (electronic)", ISSN-L = "0018-9340", bibdate = "Tue Dec 12 09:17:24 MST 1995", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/fparith.bib", abstract = "A discussion is presented of parallel division algorithms that can be classified among modified higher radix nonrestoring online division methods, where redundant representations are extensively utilized to speed up the operation. The network realizations of these algorithms are cellular, or even systolic with exclusively local control; they have both size (area) and time of O(n), where n is the length of the dividend representation. The same structures can also be used as a signed, digit-serial multiplier. When suitably equipped with some control and a few registers, the divider/multiplier brings remarkable performance to large modular arithmetic, RSA cryptography, and greatest common divisor computations. They are also of interest for the design of floating-point units and signal processing applications.", acknowledgement = ack-nhfb, affiliation = "Ecole Normale Superieure, Paris, France", classification = "C5230 (Digital arithmetic methods)", fjournal = "IEEE Transactions on Computers", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12", keywords = "Digit-serial multiplier; Divider/multiplier; Floating-point units; Greatest common divisor computations; Modular arithmetic; Nonrestoring online division methods; Parallel division algorithms; Redundant representations; RSA cryptography; Signal processing; Signed; Systolic", language = "English", pubcountry = "USA", thesaurus = "Digital arithmetic; Dividing circuits; Parallel algorithms", } @InProceedings{Quisquater:1990:BHF, author = "J. J. Quisquater and M. Girault", title = "$ 2 n$-Bit Hash-Functions Using $n$-Bit Symmetric Block Cipher Algorithms", crossref = "Quisquater:1990:ACE", pages = "102--??", year = "1990", bibdate = "Sat Jul 16 17:49:05 1994", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340102.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340102.pdf", acknowledgement = ack-nhfb, } @Article{Rackoff:1990:BTP, author = "Charles Rackoff", booktitle = "Advances in cryptology---CRYPTO '88 (Santa Barbara, CA, 1988)", title = "A basic theory of public and private cryptosystems", journal = j-LECT-NOTES-COMP-SCI, volume = "403", pages = "249--255", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60", MRnumber = "1 046 394", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Lecture Notes in Computer Science", } @InCollection{Rivest:1990:C, author = "Ron Rivest", editor = "Jan van Leeuwen", booktitle = "Handbook of Theoretical Computer Science", title = "Cryptography", publisher = pub-ELSEVIER, address = pub-ELSEVIER:adr, pages = "717--755", year = "1990", ISBN = "0-444-88075-5 (Elsevier: set), 0-444-88071-2 (Elsevier: vol. A), 0-444-88074-7 (Elsevier: vol. B), 0-262-22040-7 (MIT Press: set), 0-262-22038-5 (MIT Press: vol. A), 0-262-22039-3 (MIT Press: vol. B)", ISBN-13 = "978-0-444-88075-8 (Elsevier: set), 978-0-444-88071-0 (Elsevier: vol. A), 978-0-444-88074-1 (Elsevier: vol. B), 978-0-262-22040-8 (MIT Press: set), 978-0-262-22038-5 (MIT Press: vol. A), 978-0-262-22039-2 (MIT Press: vol. B)", LCCN = "QA76 .H279 1990", bibdate = "Sun Mar 11 10:14:10 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Misc{Rivest:1990:RMM, author = "R. L. Rivest", title = "{RFC 1186}: {MD4} message digest algorithm", day = "1", month = oct, year = "1990", bibdate = "Thu Oct 16 09:34:09 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/rfc.bib", note = "Status: INFORMATIONAL.", URL = "ftp://ftp.internic.net/rfc/rfc1186.txt; https://www.math.utah.edu/pub/rfc/rfc1186.txt", acknowledgement = ack-nhfb, format = "TXT=35391 bytes", online = "yes", status = "INFORMATIONAL", } @Book{Roman:1990:C, author = "Steven Roman", title = "Cryptology", publisher = "Innovative textbooks", address = "Irvine, CA, USA", edition = "Second", pages = "various", year = "1990", ISBN = "1-878015-06-0", ISBN-13 = "978-1-878015-06-8", LCCN = "????", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = "Modules in mathematics", acknowledgement = ack-nhfb, keywords = "Cryptography.", } @InProceedings{Rompel:1990:OWF, author = "J. Rompel", title = "One-way functions are necessary and sufficient for secure signatures", crossref = "ACM:1990:PTS", pages = "387--394", year = "1990", bibdate = "Wed Feb 20 18:33:59 MST 2002", bibsource = "http://portal.acm.org/; http://www.acm.org/pubs/contents/proceedings/series/stoc/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org/pubs/citations/proceedings/stoc/100216/p387-rompel/", acknowledgement = ack-nhfb, } @Article{Russel:1990:HLS, author = "D. Russel", title = "High-level Security Architecture and the {Kerberos} System", journal = j-COMP-NET-ISDN, volume = "19", number = "??", pages = "201--214", year = "1990", CODEN = "CNISE9", ISSN = "0169-7552 (print), 1879-2324 (electronic)", ISSN-L = "0169-7552", bibdate = "Sat Sep 25 15:30:02 1999", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/bibsec.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Computer Networks and ISDN Systems", journal-URL = "http://www.sciencedirect.com/science/journal/01697552", } @Book{Salomaa:1990:PC, author = "Arto Salomaa", title = "Public-key cryptography", volume = "23", publisher = pub-SV, address = pub-SV:adr, pages = "x + 245", year = "1990", ISBN = "3-540-52831-8 (Berlin), 0-387-52831-8 (New York)", ISBN-13 = "978-3-540-52831-9 (Berlin), 978-0-387-52831-1 (New York)", LCCN = "QA76.9.A25 S26 1990", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = "EATCS monographs on theoretical computer science", acknowledgement = ack-nhfb, keywords = "computers --- access control; cryptography", } @Article{Schnorr:1990:EISa, author = "Claus P. Schnorr", title = "Efficient Identification and Signatures for Smart Cards (Abstract)", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "688--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340688.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340688.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Schnorr:1990:EISb, author = "C. Schnorr", title = "Efficient identification and signatures for smartcards", crossref = "Brassard:1990:ACC", pages = "239--252", year = "1990", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 13]{Handschuh:1998:SCC}.", } @Book{Schroeder:1990:NTS, author = "M. R. (Manfred Robert) Schroeder", title = "Number theory in science and communication: with applications in cryptography, physics, digital information, computing, and self-similarity", volume = "7", publisher = pub-SV, address = pub-SV:adr, edition = "Second enlarged, corrected printing", pages = "xix + 374", year = "1990", ISBN = "0-387-15800-6", ISBN-13 = "978-0-387-15800-6", LCCN = "QA 241 S318 1990", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = "Springer series in information sciences", acknowledgement = ack-nhfb, keywords = "number theory", } @Article{Sgarro:1990:IDB, author = "Andrea Sgarro", title = "Informational Divergence Bounds for Authentication Codes", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "93--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340093.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340093.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Shepherd:1990:CSS, author = "S. J. Shepherd and P. W. Sanders and A. Patel", title = "A Comprehensive Security System --- the Concepts, Agents and Protocols", journal = j-COMPUT-SECUR, volume = "9", number = "7", pages = "631--643", month = nov, year = "1990", CODEN = "CPSEDU", ISSN = "0167-4048", ISSN-L = "0167-4048", bibdate = "Mon Nov 30 06:30:05 1998", bibsource = "http://www.eeng.brad.ac.uk/Research/crypto_pubs.html; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Computers and Security", } @InProceedings{Shepherd:1990:DSA, author = "S. J. Shepherd and P. W. Sanders", editor = "????", booktitle = "Proceedings of the International Federation of Information Processing (IFIP) International Workshop on Distributed Systems Operations and Management, Berlin, 22--23 October 1990", title = "A Distributed Security Architecture for Large Scale Systems", publisher = "????", address = "????", pages = "??--??", year = "1990", ISBN = "????", ISBN-13 = "????", LCCN = "????", bibdate = "Mon Nov 30 06:39:37 1998", bibsource = "http://www.eeng.brad.ac.uk/Research/crypto_pubs.html; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @InProceedings{Simmons:1990:HRS, author = "G. J. Simmons", title = "How to (really) share a secret", crossref = "Goldwasser:1990:ACC", pages = "390--449", year = "1990", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 39]{Gemmell:1997:ITC}.", } @Article{Simmons:1990:PSS, author = "Gustavus J. Simmons", title = "Prepositioned Shared Secret and\slash or Shared Control Schemes (Invited)", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "436--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340436.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340436.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Siromoney:1990:PKC, author = "Rani Siromoney and Lisa Mathew", title = "A public key cryptosystem based on {Lyndon} words", journal = j-INFO-PROC-LETT, volume = "35", number = "1", pages = "33--36", day = "15", month = jun, year = "1990", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", MRclass = "94A60 (20M35)", MRnumber = "92d:94022", MRreviewer = "Do Long Van", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/infoproc.bib", acknowledgement = ack-nhfb, affiliation = "Madras Christian Coll", affiliationaddress = "Madras, India", classification = "723; 921; B6120B (Codes); C6130 (Data handling techniques)", corpsource = "Madras Christian Coll., India", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "Cryptography; cryptography; cryptotext; Lyndon Words; Lyndon words; Mathematical Techniques --- Number Theory; Mathematical Techniques--Number Theory; Morphisms; plaintext blocksize; public key cryptosystem; Public Key Cryptosystems; rewriting systems; Thue rewriting rules; Thue Systems", treatment = "P Practical; T Theoretical or Mathematical", } @Article{Smith:1990:PPC, author = "Jonathan M. Smith", title = "Practical Problems with a Cryptographic Protection Scheme (Invited)", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "64--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:59 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0435/04350064.htm; http://link.springer-ny.com/link/service/series/0558/papers/0435/04350064.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Stevens:1990:CPi, author = "Al Stevens", title = "{C} Programming", journal = j-DDJ, volume = "15", number = "9", pages = "127--??", month = sep, year = "1990", CODEN = "DDJOEB", ISSN = "1044-789X", bibdate = "Tue Sep 03 09:15:25 1996", bibsource = "http://www.ddj.com/index/author/index.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; UnCover database", abstract = "Al comes in from the cold to discuss hacks, spooks, and data encryption techniques.", acknowledgement = ack-nhfb, fjournal = "Dr. Dobb's Journal of Software Tools", } @Article{Stevens:1990:CPk, author = "Al Stevens", title = "{C} Programming", journal = j-DDJ, volume = "15", number = "11", pages = "149--??", month = nov, year = "1990", CODEN = "DDJOEB", ISSN = "1044-789X", bibdate = "Tue Sep 03 09:15:27 1996", bibsource = "http://www.ddj.com/index/author/index.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; UnCover database", abstract = "Al returns to the data encryption algorithm and the DES discussion he began in September.", acknowledgement = ack-nhfb, fjournal = "Dr. Dobb's Journal of Software Tools", } @Article{Stout:1990:SDE, author = "Robert B. Stout", title = "{S-CODER} for Data Encryption", journal = j-DDJ, volume = "15", number = "1", pages = "52, 54, 56, 58, 110--111", month = jan, year = "1990", CODEN = "DDJOEB", ISSN = "1044-789X", bibdate = "Tue Sep 03 09:10:29 1996", bibsource = "http://www.ddj.com/index/author/index.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib; UnCover database", abstract = "S-CODER is the core of a data encryption engine that can be implemented with virtually any high-level language and can serve as the building block for enhanced security systems.", acknowledgement = ack-nhfb, classification = "B6120B (Codes); C6130 (Data handling techniques)", fjournal = "Dr. Dobb's Journal of Software Tools", keywords = "Algorithm; ANSI C; Data encryption; Enhanced security applications; Secure data systems", thesaurus = "C listings; Cryptography", } @Article{Sun:1990:KGE, author = "Qi Sun and Rong Xiao", title = "A kind of good elliptic curve used to set up cryptosystem", journal = "Chinese Sci. Bull.", volume = "35", number = "1", pages = "81--82", year = "1990", ISSN = "1001-6538", MRclass = "11T71 (11G20 94A60)", MRnumber = "91d:11158", MRreviewer = "Zhen Fu Cao", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Chinese Science Bulletin. Kexue Tongbao", } @Article{Tanaka:1990:RSI, author = "Hatsukazu Tanaka", title = "A realization scheme for the identity-based cryptosystem", journal = j-ELECT-COMM-JAPAN-3-FUND-ELECT-SCI, volume = "73", number = "5", pages = "1--7", year = "1990", CODEN = "ECJSER", ISSN = "1042-0967 (print), 1520-6440 (electronic)", ISSN-L = "1042-0967", MRclass = "94A60", MRnumber = "1 066 546", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Electronics and Communications in Japan. Part III: Fundamental Electronic Science", } @InProceedings{Tardo:1990:PKB, author = "Joe Tardo and Kannan Alagappan and Richard Pitkin", title = "Public-Key-based Authentication Using {Internet} Certificates", crossref = "USENIX:1990:USI", institution = "Digital Equipment Corporation", pages = "121--124", year = "1990", bibdate = "Wed Aug 13 10:48:45 MDT 1997", bibsource = "ftp://ftp.uu.net/library/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; http://www.usenix.org/cgi-bin/sortbib.pl?-sA", acknowledgement = ack-nhfb, affiliation = "Digital Equipment Corporation", keywords = "Unix security; Usenix", } @MastersThesis{Taylor:1990:DSI, author = "Laura Mignon Taylor", title = "Data security issues and encryption algorithms", type = "Thesis ({M.S.})", school = "University of Colorado", address = "Boulder, CO, USA", pages = "vii + 131", year = "1990", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, keywords = "Data protection; Information storage and retrieval systems --- Securities; Privacy, Right of.", } @MastersThesis{Tso:1990:NPK, author = "Theodore Ts'o", title = "{Nox}, a private key encryption server with flexible semantics", type = "Thesis ({B.S.})", school = "Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology", address = "Cambridge, MA, USA", pages = "49", year = "1990", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Supervised by David Clark.", acknowledgement = ack-nhfb, } @Article{Vandemeulebroecke:1990:SCB, author = "Andr{\'e} Vandemeulebroecke and Etienne Vanzieleghem and Tony Denayer and Paul G. A. Jespers", title = "A Single Chip 1024 Bits {RSA} Processor", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "219--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340219.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340219.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Vandewalle:1990:ECC, author = "Joos Vandewalle and David Chaum and Walter Fumy and Cees J. A. Jansen and Peter Landrock and G. Roelofsen", title = "A {European} Call for Cryptographic Algorithms: {RIPE}: {Race Integrity Primitives Evaluation}", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "267--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340267.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340267.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{vanTilburg:1990:MPK, author = "Johan van Tilburg", booktitle = "Advances in cryptology---CRYPTO '88 (Santa Barbara, CA, 1988)", title = "On the {McEliece} public-key cryptosystem", journal = j-LECT-NOTES-COMP-SCI, volume = "403", pages = "119--131", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60", MRnumber = "1 046 386", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Lecture Notes in Computer Science", } @MastersThesis{Venema:1990:IEI, author = "Terry Lee Venema", title = "In-memory encryption and the impact on system security", type = "Thesis ({M.S.})", school = "Wright State University", address = "Dayton, OH, USA", pages = "x + 90", year = "1990", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, keywords = "Computer security; Data encryption (Computer science)", } @Article{Waidner:1990:DCD, author = "Michael Waidner and Birgit Pfitzmann", title = "The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract)", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "690--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340690.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340690.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Waidner:1990:USR, author = "M. Waidner", title = "Unconditional Sender and Recipient Untraceability in Spite of Active Attacks", crossref = "Quisquater:1990:ACE", pages = "??--??", year = "1990", bibdate = "Thu Apr 04 10:08:05 2002", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1024.html", acknowledgement = ack-nhfb, keywords = "information hiding; steganography", } @Article{Wallace:1990:PRG, author = "C. S. Wallace", title = "Physically random generator", journal = j-COMPUT-SYST-SCI-ENG, volume = "5", number = "2", pages = "82--88", month = apr, year = "1990", CODEN = "CSSEEI", ISSN = "0267-6192", bibdate = "Thu Feb 4 13:21:32 MST 1999", bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/allison.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; OCLC Contents1st database", acknowledgement = ack-nhfb, affiliation = "Monash Univ", affiliationaddress = "Clayton, Aust", classification = "921; 922", fjournal = "Computer Systems Science and Engineering", journalabr = "Comput Syst Sci Eng", keywords = "Cryptographic Techniques; Cryptography; Mathematical Statistics; Mathematical Techniques --- Algorithms", } @InProceedings{White:1990:CDP, author = "S. R. White", title = "Covert Distributed processing with Computer Viruses", crossref = "Brassard:1990:ACC", volume = "435", pages = "616--619", year = "1990", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1026.html", acknowledgement = ack-nhfb, keywords = "information hiding; steganography", } @Article{Wichmann:1990:CMR, author = "Peer Wichmann", title = "Cryptanalysis of a Modified Rotor Machine", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "395--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340395.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340395.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Wiener:1990:CSRa, author = "Michael J. Wiener", title = "Cryptanalysis of Short {RSA} Secret Exponents (Abstract)", journal = j-LECT-NOTES-COMP-SCI, volume = "434", pages = "372--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:57 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0434.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0434/04340372.htm; http://link.springer-ny.com/link/service/series/0558/papers/0434/04340372.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Wiener:1990:CSRb, author = "Michael J. Wiener", title = "Cryptanalysis of short {RSA} secret exponents", journal = j-IEEE-TRANS-INF-THEORY, volume = "36", number = "3", pages = "553--558", year = "1990", CODEN = "IETTAW", DOI = "https://doi.org/10.1109/18.54902", ISSN = "0018-9448 (print), 1557-9654 (electronic)", ISSN-L = "0018-9448", MRclass = "94A60", MRnumber = "91f:94018", MRreviewer = "Shimshon Berkovits", bibdate = "Tue Feb 9 11:14:49 MST 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Information Theory", referencedin = "Referenced in \cite[Ref. 24]{Kaliski:1995:SUR}.", } @MastersThesis{Woolsey:1990:DDE, author = "Matthew A. Woolsey", title = "Digital data encryption techniques with application to computer software access authorization", type = "Thesis ({M.S.E.})", school = "University of Arkansas, Fayetteville", address = "Fayetteville, AR, USA", pages = "viii + 125", month = may, year = "1990", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, keywords = "Software protection.", } @Book{Yardley:1990:ABC, author = "Herbert O. Yardley", title = "The {American Black Chamber}", volume = "52", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "375", year = "1990", ISBN = "0-89412-154-5 (paperback), 0-89412-155-3 (hard cover)", ISBN-13 = "978-0-89412-154-8 (paperback), 978-0-89412-155-5 (hard cover)", LCCN = "D639.S7 Y3 1990", bibdate = "Wed Nov 15 14:26:02 2000", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Originally published by Bobbs-Merrill, Indianapolis, IN, USA, 1931.", series = "A cryptographic series", acknowledgement = ack-nhfb, } @MastersThesis{Zang:1990:ESE, author = "Xiguang Zang", title = "Enhanced substitution-permutation encryption networks", type = "Thesis ({M.S. in Computer Science})", school = "University of Wisconsin-Milwaukee", address = "Milwaukee, WI, USA", pages = "viii + 26", year = "1990", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, keywords = "Cryptography; Data protection", } @Article{Zeng:1990:LCT, author = "Ken Cheng Zeng and C. H. Yang and T. R. N. Rao", booktitle = "Advances in cryptology---CRYPTO '89 (Santa Barbara, CA, 1989)", title = "On the linear consistency test ({LCT}) in cryptanalysis with applications", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "164--174", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60 (15A06)", MRnumber = "91e:94022", MRreviewer = "Guy Jumarie", bibdate = "Sat Oct 26 10:21:29 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Lecture Notes in Computer Science", remark = "Appears in \cite{Brassard:1990:ACC}.", } @Article{Zeng:1990:LSM, author = "Ken Cheng Zeng and Min Qiang Huang", booktitle = "Advances in cryptology---CRYPTO '88 (Santa Barbara, CA, 1988)", title = "On the linear syndrome method in cryptanalysis", journal = j-LECT-NOTES-COMP-SCI, volume = "403", pages = "469--478", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60", MRnumber = "1 046 404", bibdate = "Sat Oct 26 10:21:29 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Lecture Notes in Computer Science", } @Article{Zheng:1990:CBC, author = "Yuliang Zheng and Tsutomu Matsumoto and Hideki Imai", title = "On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses (Extended Abstract)", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "461--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:59 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0435/04350461.htm; http://link.springer-ny.com/link/service/series/0558/papers/0435/04350461.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", remark = "Appears in \cite{Brassard:1990:ACC}.", } @PhdThesis{Zheng:1990:PDS, author = "Yuliang Zheng", title = "Principles for Designing Secure Block Ciphers and One-Way Hash Functions", school = "Yokohama National University", address = "Yokohama, Japan", pages = "??", year = "1990", bibdate = "Thu Jul 21 09:39:51 1994", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", acknowledgement = ack-nhfb, } @Article{Abadi:1991:ADS, author = "M. Abadi and M. Burrows and C. Kaufman and B. Lampson", title = "Authentication and Delegation with Smart-cards", journal = j-LECT-NOTES-COMP-SCI, volume = "526", pages = "326--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Abraham:1991:TSS, author = "D. G. Abraham and G. M. Dolan and G. P. Double and J. V. Stevens", title = "{Transaction Security System}", journal = j-IBM-SYS-J, volume = "30", number = "2", pages = "206--229", year = "1991", CODEN = "IBMSA7", ISSN = "0018-8670", bibdate = "Tue Mar 19 17:38:46 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib", note = "See erratum \cite{Anonymous:1991:ESS}.", abstract = "Components of previous security systems were designed independently from one another and were often difficult to integrate. Described is the recently available IBM transaction security system. It implements the common cryptographic architecture and offers a comprehensive set of security products that allow users to implement end-to-end secure systems with IBM components. The system includes a mainframe host-attached network security processor, high-performance encryption adapters for the IBM personal computer and Personal System/2. Micro Channel, an RS-232 attached security interface unit, and a credit-card size state-of-the-art personal security card containing a high-performance microprocessor. The application programming interface provides common programming in the host and the workstation and supports all of the systems application architecture languages except REXX and RPG. Applications may be written to run on multiple virtual storage (MVS) and PC DOS operating systems.", acknowledgement = ack-nhfb, affiliation = "IBM Services Sector Div., Charlotte, NC, USA", classification = "C6130 (Data handling techniques)", fjournal = "IBM Systems Journal", keywords = "Application programming interface; Common cryptographic architecture; Encryption adapters; End-to-end secure systems; IBM transaction security system; Multiple virtual storage; PC DOS operating systems; REXX; RPG; RS-232 attached security interface unit; Security products; Systems application architecture languages; Transaction security system", language = "English", pubcountry = "USA", thesaurus = "Security of data; Transaction processing", } @Book{Adamek:1991:FCT, author = "Jiri Adamek", title = "Foundations of coding: theory and applications of error-correcting codes, with an introduction to cryptography and information theory", publisher = pub-WILEY, address = pub-WILEY:adr, pages = "xiii + 336", year = "1991", ISBN = "0-471-62187-0", ISBN-13 = "978-0-471-62187-4", LCCN = "QA268 .A36 1991", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "A Wiley-Interscience publication.", acknowledgement = ack-nhfb, keywords = "coding theory", } @Article{Anonymous:1991:E, author = "Anonymous", title = "On the {Enigma}", journal = j-CRYPTOLOG, volume = "18", number = "2", pages = "31--32", year = "1991", ISSN = "0740-7602", ISSN-L = "0740-7602", bibdate = "Sun Dec 24 11:18:08 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "https://archive.org/download/cryptolog_121/cryptolog_121.pdf", acknowledgement = ack-nhfb, remark = "Author's name, like much else in this journal, is censored by white rectangles. The article body is free of such treatment.", } @Article{Anonymous:1991:ESS, author = "Anonymous", title = "Erratum: ``{Transaction Security System}''", journal = j-IBM-SYS-J, volume = "30", number = "4", pages = "598--598", year = "1991", CODEN = "IBMSA7", ISSN = "0018-8670", bibdate = "Tue Mar 19 17:38:46 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "See \cite{Abraham:1991:TSS}.", acknowledgement = ack-nhfb, fjournal = "IBM Systems Journal", } @Article{Anonymous:1991:FFL, author = "Anonymous", title = "Fax Facts: The little-known digital secrets tucked inside every fax device", journal = j-BYTE, volume = "16", number = "2", pages = "301--??", month = feb, year = "1991", CODEN = "BYTEDJ", ISSN = "0360-5280 (print), 1082-7838 (electronic)", ISSN-L = "0360-5280", bibdate = "Tue Jan 2 10:01:41 MST 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "BYTE Magazine", } @Manual{Anonymous:1991:IIS, title = "{ISO/IEC}. {International Standard 9796}: Information Technology, Security Techniques: Digital Signature Scheme Giving Message Recovery", organization = pub-ISO, address = pub-ISO:adr, pages = "??", year = "1991", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 13]{Kaliski:1995:SUR}.", } @Book{Barker:1991:IAD, author = "Wayne G. Barker", title = "Introduction to the analysis of the {Data Encryption Standard} ({DES})", volume = "55", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "viii + 190", year = "1991", ISBN = "0-89412-169-3, 0-89412-170-7 (library)", ISBN-13 = "978-0-89412-169-2, 978-0-89412-170-8 (library)", LCCN = "QA76.9.A25B378 1991", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = "A cryptographic series", acknowledgement = ack-nhfb, keywords = "Computers --- Access control --- Standards; Cryptography --- Standards", } @InProceedings{Bellovin:1991:LKA, author = "Steven M. Bellovin and Michael Merritt", title = "Limitations of the {Kerberos} Authentication System", crossref = "USENIX:1991:PWU", pages = "253--267", month = "Winter", year = "1991", bibdate = "Fri Oct 18 07:24:24 MDT 1996", bibsource = "ftp://ftp.uu.net/library/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/usenix1990.bib", note = "FTP - research.att.com:/dist/kerblimit.usenix.ps.Z; local - kerblimit.usenix.ps.", URL = "ftp://research.bell-labs.com/dist/kerblimit.usenix.ps.Z; local --- kerblimit.usenix.ps", acknowledgement = ack-nhfb, affiliation = "AT\&T Bell Laboratories", } @Article{Bennett:1991:EQC, author = "Charles H. Bennett and Fran{\c{c}}ois Bessette and Gilles Brassard and Louis Salvail and John Smolin", title = "Experimental Quantum Cryptography", journal = j-LECT-NOTES-COMP-SCI, volume = "473", pages = "253--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:01 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0473.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0473/04730253.htm; http://link.springer-ny.com/link/service/series/0558/papers/0473/04730253.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Berkovits:1991:HBS, author = "S. Berkovits", title = "How to Broadcast a Secret", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "535--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Beth:1991:NEC, author = "T. Beth and F. Schaefer", booktitle = "Advances in cryptology---EUROCRYPT '91 (Brighton, 1991)", title = "Nonsupersingular elliptic curves for public key cryptosystems", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "316--327", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60 (14H52)", MRnumber = "1 227 811", bibdate = "Mon Feb 4 12:02:05 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0547.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0547/05470316.htm; http://link.springer-ny.com/link/service/series/0558/papers/0547/05470316.pdf", fjournal = "Lecture Notes in Computer Science", } @Article{Beth:1991:NSE, author = "Thomas Beth and F. Schaefer", title = "Non Supersingular Elliptic Curves for Public Key Cryptosystems", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "316--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:05 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0547.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0547/05470316.htm; http://link.springer-ny.com/link/service/series/0558/papers/0547/05470316.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Beutelspacher:1991:EFS, author = "Albrecht Beutelspacher and Ute Rosenbaum", title = "Essentially $ \ell $-fold Secure Authentication Systems", journal = j-LECT-NOTES-COMP-SCI, volume = "473", pages = "294--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:01 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0473.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0473/04730294.htm; http://link.springer-ny.com/link/service/series/0558/papers/0473/04730294.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Biham:1991:CCC, author = "E. Biham", title = "Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at {EUROCRYPT} '91", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "532--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Biham:1991:DCD, author = "E. Biham and A. Shamir", title = "Differential Cryptanalysis of {DES}-like Cryptosystems (invited talk)", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "2--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @TechReport{Biham:1991:DCFa, author = "Eli Biham and Adi Shamir", title = "Differential cryptanalysis of {Feal} and {$N$}-Hash", type = "Technical report", number = "CS91-17", institution = "Department of Applied Mathematics and Computer Science, Weizmann Institute of Science", address = "Rehovot, Israel", pages = "34", month = oct, year = "1991", bibdate = "Mon Nov 09 18:35:42 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "In [1,2] we introduced the notion of differential cryptanalysis and described its application to DES[11] and several of its variants. In this paper we show the applicability of differential cryptanalysis to the Feal family of encryption algorithms and to the N-Hash hash function. In addition, we show how to transform differential cryptanalytic chosen plaintext attacks into known plaintext attacks.", acknowledgement = ack-nhfb, keywords = "Cryptography.", } @Article{Biham:1991:DCFb, author = "E. Biham and A. Shamir", title = "Differential Cryptanalysis of {Feal} and {$N$}-Hash", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "1--16", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60 (68P25)", MRnumber = "1 227 792", bibdate = "Mon Nov 09 18:35:33 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @TechReport{Biham:1991:DCS, author = "Eli Biham and Adi Shamir", title = "Differential cryptanalysis of {Snefru}, {Khafre}, {REDOC-II}, {LOKI} and {Lucifer}", type = "Technical report", number = "CS91-18", institution = "Department of Applied Mathematics and Computer Science, Weizmann Institute of Science", address = "Rehovot, Israel", pages = "36", month = oct, year = "1991", bibdate = "Wed Nov 25 07:07:05 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "In [1,2] we introduced the notion of differential cryptanalysis based on chosen plaintext attacks. In [3,4] we described the application of differential cryptanalysis to Feal [13,12] and extended the method to known plaintext attacks. In this paper differential cryptanalysis methods are applied to the hash function Snefru[10] and to the cryptosystems Khafre [11], REDOC-II [6,7], LOKI [5] and Lucifer [8].", acknowledgement = ack-nhfb, keywords = "Cryptography.", } @Article{Bird:1991:SDT, author = "Ray Bird and Inder Gopal and Amir Herzberg and Phil Janson and Shay Kutten and Refik Molva and Moti Yung", title = "Systematic Design of Two-Party Authentication Protocols", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "44--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:11 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0576.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0576/05760044.htm; http://link.springer-ny.com/link/service/series/0558/papers/0576/05760044.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Bishop:1991:AMU, author = "Matt Bishop", title = "An Authentication Mechanism for {USENET}", crossref = "USENIX:1991:PWU", pages = "281--288", day = "21--25", month = jan, year = "1991", bibdate = "Fri Oct 18 07:24:24 MDT 1996", bibsource = "ftp://ftp.uu.net/library/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, affiliation = "Dartmouth College", } @Article{Boer:1991:ALT, author = "Bert den Boer and Antoon Bosselaers", title = "An Attack on the Last Two Rounds of {MD4}", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "194--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:11 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0576.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0576/05760194.htm; http://link.springer-ny.com/link/service/series/0558/papers/0576/05760194.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Boyar:1991:CUS, author = "J. Boyar and D. Chaum and I. Damg{\aa}rd and T. Pederson", title = "Convertible undeniable signatures", crossref = "Menezes:1991:ACC", pages = "189--205", year = "1991", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 4]{Gemmell:1997:ITC}.", } @Article{Brickell:1991:IID, author = "E. F. Brickell and K. S. McCurley", title = "Interactive identification and digital signatures", journal = j-ATT-TECH-J, volume = "70", number = "6", pages = "73--86", month = nov # "\slash " # dec, year = "1991", CODEN = "ATJOEM", ISSN = "2376-676X (print), 8756-2324 (electronic)", ISSN-L = "8756-2324", bibdate = "Fri Nov 12 13:11:10 2010", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "An interactive identification scheme is a method for remotely (or locally) verifying an individual's identity. Interaction prevents the person who is doing the verifying from collecting information that could be used later to impersonate the individual. It also prevents anyone else from gaining such information. Interactive identification schemes have many potential applications-from providing more secure remote computer logins to providing more secure band-card transactions. Such schemes can also be used to construct digital signatures, a way of signing an electronic document that makes the signature easy to check but difficult for an unauthorized person to forge. The authors describe the general problems of identification and signatures, explain some shortcomings of current methods, and discuss how interactive identification schemes address them. They also describe an interactive identification scheme discovered at Sandia National Laboratories in which the security is based on the computational difficulty of solving two hard problems.", acknowledgement = ack-nhfb, fjournal = "AT\&T Technical Journal", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/", keywords = "interactive systems; security of data", subject = "digital signatures; interactive identification; electronic document; Sandia National Laboratories; security; computational difficulty", } @Article{Brickell:1991:SIB, author = "Ernest F. Brickell and Douglas R. Stinson", title = "Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes (Extended Abstract)", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "242--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:02 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0537.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0537/05370242.htm; http://link.springer-ny.com/link/service/series/0558/papers/0537/05370242.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Broscius:1991:EPH, author = "Albert G. Broscius and Jonathan M. Smith", title = "Exploiting Parallelism in Hardware Implementation of the {DES}", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "367--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:11 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0576.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0576/05760367.htm; http://link.springer-ny.com/link/service/series/0558/papers/0576/05760367.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Bruyere:1991:MCB, author = "V. Bruyere", title = "Maximal codes with bounded deciphering delay", journal = j-THEOR-COMP-SCI, volume = "84", number = "1", pages = "53--76", day = "22", month = jul, year = "1991", CODEN = "TCSCDI", ISSN = "0304-3975 (print), 1879-2294 (electronic)", ISSN-L = "0304-3975", bibdate = "Sat Nov 22 13:24:22 MST 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, classification = "B6120B (Codes); C1260 (Information theory)", corpsource = "Univ. de Mons-Hainaut, Belgium", fjournal = "Theoretical Computer Science", journal-URL = "http://www.sciencedirect.com/science/journal/03043975", keywords = "bounded deciphering delay; codes; finite code; finite deciphering delay; maximal codes", pubcountry = "Netherlands", treatment = "T Theoretical or Mathematical", } @Article{Buchmann:1991:NTA, author = "J. Buchmann", title = "Number Theoretic Algorithms and Cryptology", journal = j-LECT-NOTES-COMP-SCI, volume = "529", pages = "16--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Buck:1991:MCT, author = "R. Creighton Buck", title = "Modern Cryptology: a Tutorial ({Gilles Brassard})", journal = j-SIAM-REVIEW, volume = "33", number = "3", pages = "487--??", month = sep, year = "1991", CODEN = "SIREAD", ISSN = "0036-1445 (print), 1095-7200 (electronic)", ISSN-L = "0036-1445", bibdate = "Mon Jan 20 09:29:37 MST 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/siamreview.bib", acknowledgement = ack-nhfb, fjournal = "SIAM Review", journal-URL = "http://epubs.siam.org/sirev", } @Article{Burmester:1991:ALN, author = "Mike V. D. Burmester and Yvo Desmedt", title = "All Languages in {NP} Have Divertible Zero-Knowledge Proofs and Arguments under Cryptographic Assumptions (Extended Abstract)", journal = j-LECT-NOTES-COMP-SCI, volume = "473", pages = "1--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:01 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0473.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0473/04730001.htm; http://link.springer-ny.com/link/service/series/0558/papers/0473/04730001.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Camion:1991:KHF, author = "P. Camion and J. Patarin", title = "The Knapsack Hash Function Proposed at {Crypto '89} Can be Broken", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "39--53", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Capocelli:1991:SSS, author = "R. M. Capocelli and A. {De Santis} and L. Gargano and U. Vaccaro", title = "On the size of shares for secret sharing schemes", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "101--113", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 09 17:36:04 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; MathSciNet database", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Ceruzzi:1991:RCK, author = "Paul Ceruzzi and Kenneth Flamm and Peggy Aldrich Kidwell and Herbert R. J. Grosch and John A. N. Lee", title = "Reviews: {Campbell-Kelly: ICL: A Business and Technical History}; {Aspray: Computing Before Computers}; {Watson and Petre: Father, Son \& Co.}; {Asimov and Frenkel: Robots: Machines in Man's Image}; {McNeil: An Encyclopedia of the History of Technology}; {Byte: Fifteenth Anniversary Summit}; {Deavours and Kruh: The Turing Bombe: Was it Enough?}; {Pearcey: A History of Australian Computing}; {Aspray: The Origins of John von Neumann's Theory of Automata}; {Crossley and Henry: Thus Spake al-Khwarizmi: a Translation of the text of Cambridge University Library Ms. li.vi.5}; {Fauvel and Gerdes: African Slave and Calculating Prodigy: Bicentenary of the Death of Thomas Fuller}; {Marling: Maestro of Many Keyboards [brief biography of Donald Knuth]}", journal = j-ANN-HIST-COMPUT, volume = "13", number = "1", pages = "111--117", month = jan # "\slash " # mar, year = "1991", CODEN = "AHCOE5", ISSN = "0164-1239", bibdate = "Fri Nov 1 15:29:15 MST 2002", bibsource = "Compendex database; https://www.math.utah.edu/pub/mirrors/ftp.ira.uka.de/bibliography/Misc/annhistcomput.bib; https://www.math.utah.edu/pub/tex/bib/annhistcomput.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://dlib.computer.org/an/books/an1991/pdf/a1111.pdf; http://www.computer.org/annals/an1991/a1111abs.htm", acknowledgement = ack-nhfb, fjournal = "Annals of the History of Computing", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650", } @Article{Ceruzzi:1991:RGC, author = "Paul Ceruzzi and Eric A. Weiss and John Walker Mauer and Thomas Drucker and Peggy Aldrich Kidwell and K. W. Smillie", title = "Reviews: {Grosch: Computer: Bit slices from a life}; {Tomayko: Computers in spaceflight: The NASA Experience}; {B{\"u}low: Denk, Maschine! Geschichten {\"u}ber Robotor, computer und Kunstliche Inteligenz}; {Napier: Rabdology}; {Charlesworth: Calculators \& Computers; Calculators \& Computers --- The 20th Century; Transistors}. Forty years of computing, {Datamation}; {Bennett: The industrial instrument --- Master of industry, servant of management: Automatic control in the process industries, 1900--1940}. {Kapera: The Enigma Bulletin}", journal = j-ANN-HIST-COMPUT, volume = "13", number = "4", pages = "364--368", month = oct # "\slash " # dec, year = "1991", CODEN = "AHCOE5", ISSN = "0164-1239", bibdate = "Sat Jul 14 18:57:39 2001", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://dlib.computer.org/an/books/an1991/pdf/a4364.pdf; http://www.computer.org/annals/an1991/a4364abs.htm", acknowledgement = ack-nhfb, annote = "From the paper, on the Enigma Bulletin: ``This is a new journal, published in Krakow, Poland, and devoted to the subject of ciphers and codebreaking. Articles appearing in the first issue (dated December 1990) are in German and English. Further information may be obtained from the editor, Dr. Zdzislaw Jan Kapera, ul. Borsucza 3/58,30-408 Krakow, Poland.''", fjournal = "Annals of the History of Computing", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650", } @Article{Chang:1991:BCC, author = "Chin-Chen Chang and Tzong-Chen Wu", title = "Broadcasting cryptosystem in computer networks using interpolating polynomials", journal = j-COMPUT-SYST-SCI-ENG, volume = "6", number = "3", pages = "185--??", month = jul, year = "1991", CODEN = "CSSEEI", ISSN = "0267-6192", bibdate = "Wed Feb 3 11:14:12 MST 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; OCLC Contents1st database", acknowledgement = ack-nhfb, fjournal = "Computer Systems Science and Engineering", } @Article{Chaum:1991:CSU, author = "David Chaum and Eug{\`e}ne van Heijst and Birgit Pfitzmann", title = "Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer (Extended Abstract)", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "470--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:11 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0576.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0576/05760470.htm; http://link.springer-ny.com/link/service/series/0558/papers/0576/05760470.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Chaum:1991:USD, author = "David Chaum and Sandra Roijakkers", title = "Unconditionally Secure Digital Signatures", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "206--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:02 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0537.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0537/05370206.htm; http://link.springer-ny.com/link/service/series/0558/papers/0537/05370206.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Chee:1991:CNP, author = "Yeow Meng Chee and Antoine Joux and Jacques Stern", title = "The Cryptanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "204--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:11 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0576.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0576/05760204.htm; http://link.springer-ny.com/link/service/series/0558/papers/0576/05760204.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Chepyzhov:1991:FCA, author = "V. Chepyzhov and B. Smeets", title = "On a Fast Correlation Attack on Certain Stream Ciphers", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "176--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Chuang:1991:MER, author = "Chih-Chwen C. Chuang and James George Dunham", title = "Matrix Extensions of the {RSA} Algorithm", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "140--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:02 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0537.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0537/05370140.htm; http://link.springer-ny.com/link/service/series/0558/papers/0537/05370140.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Cleve:1991:CTI, author = "R. Cleve", title = "Complexity Theoretic Issues Concerning Block Ciphers Related to {D.E.S.}", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "530--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Cusick:1991:RIC, author = "Thomas W. Cusick and Michael C. Wood", title = "The {REDOC II} Cryptosystem", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "545--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:02 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0537.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0537/05370545.htm; http://link.springer-ny.com/link/service/series/0558/papers/0537/05370545.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Damgaard:1991:TPP, author = "Ivan Bjerre Damg{\aa}rd", title = "Towards Practical Public Key Systems Secure against Chosen Ciphertext Attacks", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "445--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:11 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0576.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0576/05760445.htm; http://link.springer-ny.com/link/service/series/0558/papers/0576/05760445.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{denBoer:1991:ALT, author = "B. {den Boer} and A. Bosselaers", title = "An attack on the last two rounds of {MD4}", crossref = "Feigenbaum:1991:ACC", pages = "194--203", year = "1991", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 7]{Preneel:1997:CHF}, \cite[Ref. 5]{Dobbertin:1996:SMA}.", } @Article{DeSantis:1991:CAN, author = "A. {De Santis} and M. Yung", title = "Cryptographic Applications of the Non-Interactive Metaproof and Many-Prover Systems", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "366--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{DeSantis:1991:DPSa, author = "Alfredo {De Santis} and Moti Yung", title = "On the Design of Provably-Secure Cryptographic Hash Functions (Extended Summary)", journal = j-LECT-NOTES-COMP-SCI, volume = "473", pages = "412--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:01 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0473.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0473/04730412.htm; http://link.springer-ny.com/link/service/series/0558/papers/0473/04730412.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{DeSantis:1991:DPSb, author = "A. {De Santis} and M. Yung", title = "On the Design of Provably-Secure Cryptographic Hash Functions", crossref = "Damgaard:1991:ACE", pages = "377--397", year = "1991", bibdate = "Sat Jul 16 12:02:43 1994", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", acknowledgement = ack-nhfb, } @Article{Desmedt:1991:AUS, author = "Yvo Desmedt and Moti Yung", title = "Arbitrated Unconditionally Secure Authentication Can Be Unconditionally Protected against Arbiter's Attacks (Extended Abstract)", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "177--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:02 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0537.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0537/05370177.htm; http://link.springer-ny.com/link/service/series/0558/papers/0537/05370177.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Desmedt:1991:SGA, author = "Yvo Desmedt and Yair Frankel", title = "Shared Generation of Authenticators and Signatures (Extended Abstract)", crossref = "Feigenbaum:1991:ACC", pages = "457--469", year = "1991", bibdate = "Fri Jun 11 18:01:45 1999", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0576.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0576/05760457.htm; http://link.springer-ny.com/link/service/series/0558/papers/0576/05760457.pdf", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 14]{Gemmell:1997:ITC}.", } @Article{Desmedt:1991:WUS, author = "Y. Desmedt and M. Yung", title = "Weaknesses of Undeniable Signature Schemes", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "205--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{deWaleffe:1991:CSC, author = "Dominique de Waleffe and Jean-Jacques Quisquater", title = "{CORSAIR}: a Smart Card for Public Key Cryptosystems", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "502--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:03 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0537.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0537/05370502.htm; http://link.springer-ny.com/link/service/series/0558/papers/0537/05370502.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @MastersThesis{DiazdeLeon:1991:PIE, author = "Peter Joseph {Diaz de Leon}", title = "A parallel implementation of an encryption coprocessor", type = "Thesis ({M.S. in Computer Science})", school = "University of Wisconsin-Milwaukee", address = "Milwaukee, WI, USA", pages = "viii + 69", year = "1991", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, keywords = "Cryptography; Data protection; Parallel processing (Electronic computers)", } @Book{Ding:1991:STS, author = "C. (Cunsheng) Ding and G. Xiao and W. Shan", title = "The stability theory of stream ciphers", volume = "561", publisher = pub-SV, address = pub-SV:adr, pages = "ix + 187", year = "1991", CODEN = "LNCSD9", ISBN = "3-540-54973-0 (Berlin), 0-387-54973-0 (New York)", ISBN-13 = "978-3-540-54973-4 (Berlin), 978-0-387-54973-6 (New York)", ISSN = "0302-9743 (print), 1611-3349 (electronic)", LCCN = "QA402.3 .D536 1991", bibdate = "Wed Feb 14 06:00:56 MST 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs.bib", series = ser-LNCS, acknowledgement = ack-nhfb, keywords = "ciphers; control theory; stability", } @InProceedings{Dolev:1991:NC, author = "D. Dolev and C. Dwork and M. Naor", title = "Non-Malleable Cryptography", crossref = "ACM:1991:PTT", pages = "542--552", year = "1991", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Full version available from authors.", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 5]{Johnson:1996:AEE}, \cite[Ref. 9]{Goldreich:1997:FMCb}.", } @InProceedings{Dolev:1991:NMC, author = "Danny Dolev and Cynthia Dwork and Moni Naor", title = "Non-malleable cryptography", crossref = "ACM:1991:PTT", pages = "542--552", year = "1991", bibdate = "Wed Feb 20 18:33:59 MST 2002", bibsource = "http://portal.acm.org/; http://www.acm.org/pubs/contents/proceedings/series/stoc/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org/pubs/articles/proceedings/stoc/103418/p542-dolev/p542-dolev.pdf; http://www.acm.org/pubs/citations/proceedings/stoc/103418/p542-dolev/", acknowledgement = ack-nhfb, } @Article{Domingo-Ferrer:1991:CTP, author = "J. Domingo-Ferrer and L. Huguet-Rotger", title = "A cryptographic tool for programs protection", journal = j-LECT-NOTES-COMP-SCI, volume = "514", pages = "227--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Domingo-Ferrer:1991:DUI, author = "Josep Domingo-Ferrer", title = "Distributed user identification by zero-knowledge access rights proving", journal = j-INFO-PROC-LETT, volume = "40", number = "5", pages = "235--239", day = "13", month = dec, year = "1991", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, affiliation = "Universitat Autonoma de Barcelona", affiliationaddress = "Barcelona, Spain", classification = "716; 717; 718; 722; 723; C4240 (Programming and algorithm theory); C6130S (Data security)", corpsource = "Dept. d'Inf., Univ. Autonoma de Barcelona, Spain", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "Access Control; access control; certified list; computational complexity; computer network; computer networks; Computer Networks --- Protocols; Computer Workstations; cryptography; Data Processing --- Data Acquisition; Data Processing --- Security of Data; Database Systems; Distributed; Distributed Identification; Distributed Systems; distributed user identification; rights granting; rights revocation; secret information; Servers; servers; unshared rights; User Portability; user registration; Zero Knowledge Proofs; zero-knowledge access rights proving", treatment = "T Theoretical or Mathematical", } @Article{Domingo-Ferrer:1991:SRT, author = "Josep Domingo-Ferrer", title = "Software Run-Time Protection: a Cryptographic Issue", journal = j-LECT-NOTES-COMP-SCI, volume = "473", pages = "474--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:01 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0473.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0473/04730474.htm; http://link.springer-ny.com/link/service/series/0558/papers/0473/04730474.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Dusse:1991:CLM, author = "Stephen R. Dusse and Burt S. {Kaliski Jr.}", title = "A Cryptographic Library for the {Motorola DSP56000}", journal = j-LECT-NOTES-COMP-SCI, volume = "473", pages = "230--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:01 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0473.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0473/04730230.htm; http://link.springer-ny.com/link/service/series/0558/papers/0473/04730230.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Dwork:1991:VSS, author = "Cynthia Dwork", title = "On verification in secret sharing", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "114--128", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 09 17:36:04 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; MathSciNet database", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Evertse:1991:WNR, author = "Jan-Hendrik Evertse and Eug{\`e}ne van Heyst", title = "Which New {RSA} Signatures Can Be from Some Given {RSA} Signatures? (Extended Abstract)", journal = j-LECT-NOTES-COMP-SCI, volume = "473", pages = "83--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:01 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0473.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0473/04730083.htm; http://link.springer-ny.com/link/service/series/0558/papers/0473/04730083.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Book{Feigenbaum:1991:DCC, author = "Joan Feigenbaum and Michael Merritt", title = "Distributed computing and cryptography: proceedings of a {DIMACS} Workshop, October 4--6, 1989", volume = "2", publisher = pub-ACM, address = pub-ACM:adr, pages = "ix + 262", year = "1991", ISBN = "0-8218-6590-0 (AMS), 0-89791-384-1 (ACM)", ISBN-13 = "978-0-8218-6590-3 (AMS), 978-0-89791-384-3 (ACM)", ISSN = "1052-1798", LCCN = "QA76.9.D5 D43 1989", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "The DIMACS Workshop in Distributed Computing and Cryptography.", series = "DIMACS series in discrete mathematics and theoretical computer science", acknowledgement = ack-nhfb, keywords = "cryptography --- congresses; electronic data processing --- distributed processing --- congresses", } @Article{Fischer:1991:MSK, author = "Michael J. Fischer and Rebecca N. Wright", title = "Multiparty Secret Key Exchange Using a Random Deal of Cards (Extended Abstract)", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "141--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:11 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0576.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0576/05760141.htm; http://link.springer-ny.com/link/service/series/0558/papers/0576/05760141.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Fujioka:1991:EED, author = "Atsushi Fujioka and Tatsuaki Okamoto and Shoji Miyaguchi", title = "{ESIGN}: An Efficient Digital Signature Implementation for Smart Cards", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "446--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:05 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0547.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0547/05470446.htm; http://link.springer-ny.com/link/service/series/0558/papers/0547/05470446.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Fujioka:1991:IBS, author = "A. Fujioka and T. Okamoto and K. Ohta", title = "Interactive Bi-Proof Systems and Undeniable Signature Schemes", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "243--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Gabidulin:1991:INC, author = "E. M. Gabidulin and A. V. Paramonov and O. V. Tretjakov", title = "Ideals over a Non-Commutative Ring and Their Application in Cryptology", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "482--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:05 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0547.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0547/05470482.htm; http://link.springer-ny.com/link/service/series/0558/papers/0547/05470482.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Gabidulin:1991:INR, author = "E. M. Gabidulin and A. V. Paramonov and O. V. Tretjakov", title = "Ideals over a Non-Commutative Ring and Their Application in Cryptology", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "482--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1992.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Gaddy:1991:BOP, author = "David W. Gaddy", title = "Breaking into Our Past: Enigmas of Another Kind", journal = j-CRYPTOLOG, volume = "18", number = "2", pages = "33--35", year = "1991", ISSN = "0740-7602", ISSN-L = "0740-7602", bibdate = "Sun Dec 24 11:22:40 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "https://archive.org/download/cryptolog_121/cryptolog_121.pdf", acknowledgement = ack-nhfb, keywords = "Bazeries cylinder-cipher; Center for Cryptologic History; Thomas Jefferson wheel cipher; Sven Wasstr{\"o}m; Baron Fridric Gripenstierna", remark = "Gaddy discusses possible precursors of the German Enigma cipher machine that may be dated earlier than 1786.", } @Article{Garzon:1991:CGG, author = "M. Garzon and Y. Zalcstein", title = "The complexity of {Grigorchuk} groups with application to cryptography", journal = j-THEOR-COMP-SCI, volume = "88", number = "1", pages = "83--98", day = "30", month = sep, year = "1991", CODEN = "TCSCDI", ISSN = "0304-3975 (print), 1879-2294 (electronic)", ISSN-L = "0304-3975", bibdate = "Sat Nov 22 13:24:22 MST 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/tcs1990.bib", acknowledgement = ack-nhfb, classification = "B6120B (Codes); C4210 (Formal logic); C4240 (Programming and algorithm theory); C6130 (Data handling techniques)", corpsource = "Dept. of Math. Sci., Memphis State Univ., TN, USA", fjournal = "Theoretical Computer Science", journal-URL = "http://www.sciencedirect.com/science/journal/03043975", keywords = "computational complexity; cryptography; formal languages; Grigorchuk groups; infinite complete binary tree; natural complete sets; permutation groups; public-key cryptosystems; space complexity; time complexity; translation theorem; Turing complexity; word problems", pubcountry = "Netherlands", treatment = "T Theoretical or Mathematical", } @Article{Gibson:1991:EGC, author = "J. Keith Gibson", booktitle = "Advances in cryptology---EUROCRYPT '91 (Brighton, 1991)", title = "Equivalent {Goppa} Codes and Trapdoors to {McEliece}'s Public Key Cryptosystem", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "517--521", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60 (94B27)", MRnumber = "1 227 821", bibdate = "Mon Feb 4 12:02:05 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0547.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0547/05470517.htm; http://link.springer-ny.com/link/service/series/0558/papers/0547/05470517.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Gilbert:1991:SAF, author = "Henry Gilbert and Guy Chass{\'e}", title = "A Statistical Attack of the {FEAL}-8 Cryptosystem", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "22--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:02 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0537.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0537/05370022.htm; http://link.springer-ny.com/link/service/series/0558/papers/0537/05370022.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Girault:1991:SCP, author = "Marc Girault", title = "Self-Certified Public Keys", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "490--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:05 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0547.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0547/05470490.htm; http://link.springer-ny.com/link/service/series/0558/papers/0547/05470490.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Goldburg:1991:ACA, author = "B. Goldburg and E. Dawson and S. Sridharan", title = "The Automated Cryptanalysis of Analog Speech Scramblers", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "422--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Goldreich:1991:PYN, author = "Oded Goldreich and Silvio Micali and Avi Wigderson", title = "Proofs that Yield Nothing But Their Validity or All Languages in {NP} Have Zero-Knowledge Proof Systems", journal = j-J-ACM, volume = "38", number = "3", pages = "691--729", month = jul, year = "1991", CODEN = "JACOAH", ISSN = "0004-5411 (print), 1557-735X (electronic)", ISSN-L = "0004-5411", bibdate = "Tue Oct 25 11:41:42 1994", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/jacm.bib", note = "They show that for a language $L$ in {\em NP\/} and a string $w$ in $L$, there exists a probabilistic interactive proof that efficiently demonstrates membership of $x$ in $L$ without conveying additional information. Previously, zero-knowledge proofs were known only for some problems that were in both {\em NP\/} and {\em co-NP\/}. A preliminary version of this paper appeared in {\em Proc. 27th Ann. IEEE Symp. on Foundations of Computer Science}, 1986, under the title ``Proofs that yield nothing but their validity and a methodology of cryptographic protocol design.''", URL = "http://www.acm.org/pubs/toc/Abstracts/0004-5411/116852.html", acknowledgement = ack-nhfb, fjournal = "Journal of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J401", keywords = "cryptographic protocols; Design; fault-tolerant distributed computing; graph isomorphism; interactive proofs; languages; methodological design of protocols; NP; one-way functions; proof systems; Security; theory; Theory of Computation; Verification; zero-knowledge", referencedin = "Referenced in \cite[Ref. 16]{Goldreich:1997:FMCb}.", subject = "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical Logic, Proof theory. {\bf E.4}: Data, CODING AND INFORMATION THEORY.", } @Article{Golic:1991:NCC, author = "Jovan Dj. Goli{\'c} and Miodrag J. Mihaljevi{\'c}", booktitle = "Advances in cryptology---EUROCRYPT '90 (Aarhus, 1990)", title = "A noisy clock-controlled shift register cryptanalysis concept based on sequence comparison approach", journal = j-LECT-NOTES-COMP-SCI, volume = "473", pages = "487--491", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A55 (68P25 94A60)", MRnumber = "1 102 507", bibdate = "Sat Oct 26 10:21:29 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Lecture Notes in Computer Science", } @InProceedings{Guillou:1991:PTA, author = "Louis C. Guillou and Jean-Jacques Quisquater and Mike Walker and Peter Landrock and Caroline Shaer", title = "Precautions Taken against Various Potential Attacks in {ISO\slash IEC DIS 9796 $ \ll $Digital Signature Scheme Giving Message Recovery$ \gg $}", crossref = "Damgaard:1991:ACE", pages = "465--473", year = "1991", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0473.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0473/04730465.htm; http://link.springer-ny.com/link/service/series/0558/papers/0473/04730465.pdf", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 11]{Kaliski:1995:SUR}.", } @Article{Haber:1991:HTD, author = "Stuart Haber and W. Scott Stornetta", title = "How to time-stamp a digital document", journal = j-J-CRYPTOLOGY, volume = "3", number = "2", pages = "99--111", year = "1991", CODEN = "JOCREQ", ISSN = "0933-2790 (print), 1432-1378 (electronic)", ISSN-L = "0933-2790", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, affiliation = "Bellcore", affiliationaddress = "Morristown, NJ, USA", classification = "723; 914", fjournal = "Journal of Cryptology", journal-URL = "http://link.springer.com/journal/145", journalabr = "J Cryptol", keywords = "Computer Networks--Security Systems; Cryptography; Data Processing--Security of Data; Time-Stamp", referencedin = "Referenced in \cite[Ref. 3]{Haber:1995:HDD}.", } @Article{Habutsu:1991:SKC, author = "Toshiki Habutsu and Yoshifumi Nishio and Iwao Sasase and Shinsaku Mori", booktitle = "Advances in cryptology---EUROCRYPT '91 (Brighton, 1991)", title = "A secret key cryptosystem by iterating a chaotic map", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "127--140", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60", MRnumber = "1 227 800", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Lecture Notes in Computer Science", } @Book{Hafner:1991:COH, author = "Katie Hafner and John Markoff", title = "Cyberpunk: Outlaws and Hackers on the Computer Frontier", publisher = pub-SIMON-SCHUSTER, address = pub-SIMON-SCHUSTER:adr, pages = "368", year = "1991", ISBN = "0-671-68322-5", ISBN-13 = "978-0-671-68322-1", LCCN = "QA76.9.A25 H34 1991", bibdate = "Fri Mar 24 17:59:49 1995", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Interviews with some of the crackers who have appeared conspicuously in the press in the past few years. One of the co-authors is the New York Times reporter who broke the Stoll story to the public.", price = "US\$22.95", acknowledgement = ack-jsq, } @Article{Harari:1991:CCS, author = "S. Harari", title = "A correlation cryptographic scheme", journal = j-LECT-NOTES-COMP-SCI, volume = "514", pages = "180--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Holloway:1991:RA, author = "Marguerite Holloway", title = "{R}$_x$ for addiction", journal = j-SCI-AMER, volume = "264", number = "3", pages = "94--??", month = mar, year = "1991", CODEN = "SCAMAC", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Wed May 20 10:04:23 MDT 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "Neuroscientists are making progress toward understanding the devastating and intractable problem of drug addiction. By deciphering the complex interplay of neurotransmitters and receptors, they are designing highly targeted drugs to treat addiction on a chemical and, eventually, genetic level. Their findings have implications for treating mental illnesses.", acknowledgement = ack-nhfb, fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", journalabr = "Sci Am", } @InProceedings{Hotchkiss:1991:ASI, author = "R. S. Hotchkiss and C. L. Wampler", title = "The auditorialization of scientific information", crossref = "IEEE:1991:PSA", pages = "453--461", year = "1991", bibdate = "Wed Apr 15 16:28:01 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/supercomputing91.bib", acknowledgement = ack-nhfb, classification = "B6130 (Speech analysis and processing techniques); B6140 (Signal processing and detection); C5260 (Digital signal processing); C5585 (Speech recognition and synthesis)", corpsource = "Los Alamos Nat. Lab., NM, USA", keywords = "auditorialization; computerised signal processing; cryptography; encoding; encrypt; functional data; mathematical functions; scientific information; sequences of music; sound errors; speech analysis and processing; speech recognition", sponsororg = "IEEE; ACM", treatment = "P Practical", } @Article{Huber:1991:SCC, author = "Klaus Huber", title = "Some Considerations Concerning the Selection of {RSA} Moduli", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "294--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:05 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0547.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0547/05470294.htm; http://link.springer-ny.com/link/service/series/0558/papers/0547/05470294.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Hwang:1991:CGO, author = "Tzonelih Hwang", booktitle = "Advances in cryptology---EUROCRYPT '90 (Aarhus, 1990)", title = "Cryptosystem for group oriented cryptography", journal = j-LECT-NOTES-COMP-SCI, volume = "473", pages = "352--360", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "68P25 (94A60)", MRnumber = "1 102 495", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Lecture Notes in Computer Science", } @Article{Ingemarsson:1991:PSS, author = "Ingemar Ingemarsson and Gustavus J. Simmons", title = "A Protocol to Set Up Shared Secret Schemes without the Assistance of Mutually Trusted Party", journal = j-LECT-NOTES-COMP-SCI, volume = "473", pages = "266--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:01 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0473.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0473/04730266.htm; http://link.springer-ny.com/link/service/series/0558/papers/0473/04730266.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @TechReport{IRD:1991:DFV, author = "{International Resource Development, Inc.}", title = "Data, fax and voice encryption equipment, worldwide", type = "Report", number = "782", institution = "International Resource Development", address = "New Canaan, CT, USA", pages = "vi + 298", month = dec, year = "1991", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, keywords = "Cryptography equipment industry; Market surveys.", } @Article{Itoh:1991:CFI, author = "Toshiya Itoh", title = "Characterization for a family of infinitely many irreducible equally spaced polynomials", journal = j-INFO-PROC-LETT, volume = "37", number = "5", pages = "273--277", day = "14", month = mar, year = "1991", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", MRclass = "11T06 (94B99)", MRnumber = "92d:11129", MRreviewer = "Rudolf Lidl", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, affiliation = "Tokyo Inst of Technology", affiliationaddress = "Yokohama, Jpn", classification = "721; 723; 921; C4240 (Programming and algorithm theory)", corpsource = "Dept. of Inf. Process., Graduate Sch., Tokyo Inst. of Technol., Yokohama, Japan", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "complexity; computational complexity; Computer Programming --- Algorithms; Computers, Digital --- Multiplying Circuits; cryptography; Dividers; Equally Spaced Polynomials; error correction; Galois Fields; irreducible equally spaced polynomials; Mathematical Techniques; parallel algorithms; Polynomials; polynomials", treatment = "T Theoretical or Mathematical", } @Article{Iversen:1991:CSC, author = "Kenneth R. Iversen", title = "A Cryptographic Scheme for Computerized General Elections", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "405--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:11 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0576.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0576/05760405.htm; http://link.springer-ny.com/link/service/series/0558/papers/0576/05760405.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Johnson:1991:CCA, author = "D. B. Johnson and G. M. Dolan and M. J. Kelly and A. V. Le and S. M. Matyas", title = "{Common Cryptographic Architecture Cryptographic Application Programming Interface}", journal = j-IBM-SYS-J, volume = "30", number = "2", pages = "130--150", year = "1991", CODEN = "IBMSA7", ISSN = "0018-8670", bibdate = "Tue Mar 19 17:38:46 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib", abstract = "Cryptography is considered by many users to be a complicated subject. An architecture for a cryptographic application programming interface simplifies customer use of cryptographic services by helping to ensure compliance with national and international standards and by providing intuitive high-level services that may be implemented on a broad range of operating systems and underlying hardware. This paper gives an overview of the design rationale of the recently announced common cryptographic architecture cryptographic application programming interface and gives typical application scenarios showing methods of using the services described in the architecture to meet security requirements.", acknowledgement = ack-nhfb, affiliation = "IBM Federal Sector Div., Manassas, VA, USA", classification = "C6130 (Data handling techniques); C6180 (User interfaces)", fjournal = "IBM Systems Journal", keywords = "Cryptographic architecture cryptographic application programming interface; Design rationale; Intuitive high-level services; Operating systems; Overview; Security requirements; Standards", language = "English", pubcountry = "USA", thesaurus = "Cryptography; User interfaces", } @Article{Johnson:1991:TSS, author = "D. B. Johnson and G. M. Dolan", title = "{Transaction Security System} extensions to the {Common Cryptographic Architecture}", journal = j-IBM-SYS-J, volume = "30", number = "2", pages = "230--243", year = "1991", CODEN = "IBMSA7", ISSN = "0018-8670", bibdate = "Tue Mar 19 17:38:46 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib", abstract = "A well-designed application program interface for a line of cryptographic products simplifies customer use of cryptographic services by helping to ensure compliance with national and international standards and by providing intuitive high-level services that may be implemented on disparate systems. The common cryptographic architecture is IBM's strategic cryptographic architecture. The transaction security system implements the common cryptographic architecture in full. Furthermore, the transaction security system has implemented extensions to the architecture to address additional customer requirements. This paper gives the design rationale for some of the additional cryptographic functionality in the transaction security system beyond that mandated by the common cryptographic architecture.", acknowledgement = ack-nhfb, affiliation = "IBM Federal Sector Div., Manassas, VA, USA", classification = "C6130 (Data handling techniques)", fjournal = "IBM Systems Journal", keywords = "Application program interface; Common cryptographic architecture; Standards; Transaction security system", language = "English", pubcountry = "USA", thesaurus = "Cryptography; Transaction processing", } @Article{Jolitz:1991:PUI, author = "William Frederick Jolitz and Lynne Greer Jolitz", title = "Porting {UNIX} to the 386. The initial root filesystem", journal = j-DDJ, volume = "16", number = "5", pages = "46, 48, 50, 52--54", month = may, year = "1991", CODEN = "DDJOEB", ISSN = "1044-789X", bibdate = "Tue Sep 10 09:11:02 MDT 1996", bibsource = "http://www.ddj.com/index/author/index.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; UnCover database", abstract = "Bill and Lynne describe the 386BSD root filesystem, a key component of kernel development.", acknowledgement = ack-nhfb, classification = "C6110B (Software engineering techniques); C6120 (File organisation); C6150J (Operating systems)", fjournal = "Dr. Dobb's Journal of Software Tools", keywords = "386BSD operating system kernel; 80386 Based microcomputers; Bulk storage; Data files; Data structure; File organization deciphering; Initial root filesystem; Software porting; UNIX", thesaurus = "Data structures; File organisation; Microcomputer applications; Software portability; Unix", } @Book{Kahn:1991:SER, author = "David Kahn", title = "Seizing the {Enigma}: the race to break the {German U-boat} codes, 1939--1943", publisher = pub-HOUGHTON-MIFFLIN, address = pub-HOUGHTON-MIFFLIN:adr, pages = "xii + 336", year = "1991", ISBN = "0-395-42739-8", ISBN-13 = "978-0-395-42739-2", LCCN = "D810.C88 K34 1991", bibdate = "Thu Jan 21 14:19:53 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Kahn:1991:WWW, author = "David Kahn", title = "Why Weren't We Warned?", journal = "MHQ: Quarterly Journal of Military History", volume = "4", number = "1", pages = "50--59", month = "Autumn", year = "1991", ISSN = "1040-5992", ISSN-L = "1040-5992", bibdate = "Sun Dec 31 07:12:43 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.historynet.com/why-werent-we-warned.htm", abstract = "The contention that that broken Japanese codes could have alerted us won't go away. Were key messages overlooked? Deliberately withheld? Or is there a simpler explanation?", acknowledgement = ack-nhfb, journal-URL = "http://www.historynet.com/magazines/mhq", } @Article{Kaliski:1991:MMD, author = "Burt S. {Kaliski Jr.}", title = "The {MD4} Message Digest Algorithm", journal = j-LECT-NOTES-COMP-SCI, volume = "473", pages = "492--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:01 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0473.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0473/04730492.htm; http://link.springer-ny.com/link/service/series/0558/papers/0473/04730492.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Koblitz:1991:CCG, author = "Neal Koblitz", title = "{CM}-curves with good cryptographic properties", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "279--287", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 09 17:36:04 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; MathSciNet database", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Koblitz:1991:CEC, author = "Neal Koblitz", booktitle = "Advances in cryptology---CRYPTO '90 (Santa Barbara, CA, 1990)", title = "Constructing elliptic curve cryptosystems in characteristic {$2$}", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "156--167", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60", MRnumber = "1 232 869", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Lecture Notes in Computer Science", } @Article{Koblitz:1991:JSI, author = "Neal Koblitz", title = "{Jacobi} sums, irreducible zeta-polynomials, and cryptography", journal = j-CAN-MATH-BULL, volume = "34", number = "??", pages = "229--235", month = "????", year = "1991", CODEN = "CMBUA3", DOI = "https://doi.org/10.4153/CMB-1991-037-6", ISSN = "0008-4395 (print), 1496-4287 (electronic)", ISSN-L = "0008-4395", bibdate = "Thu Sep 8 10:05:59 MDT 2011", bibsource = "http://cms.math.ca/cmb/v34/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Canadian mathematical bulletin = Bulletin canadien de math{\'e}matiques", journal-URL = "http://cms.math.ca/cmb/", } @Article{Kompella:1991:FCC, author = "K. Kompella and L. Adleman", title = "Fast Checkers for Cryptography", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "515--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Korzhik:1991:CMP, author = "Valery I. Korzhik and Andrey I. Turkin", title = "Cryptanalysis of {McEliece}'s Public-Key Cryptosystem", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "68--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:05 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0547.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0547/05470068.htm; http://link.springer-ny.com/link/service/series/0558/papers/0547/05470068.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Koyama:1991:NPC, author = "K. Koyama and R. Terada", title = "Nonlinear Parity Circuits and their Cryptographic Applications", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "582--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Koyama:1991:NPK, author = "Kenji Koyama and Ueli M. Maurer and Tatsuaki Okamoto and Scott A. Vanstone", title = "New Public-Key Schemes Based on Elliptic Curves over the Ring {$ Z_n $}", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "252--266", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60 (11T71)", MRnumber = "94e:94014", bibdate = "Tue Feb 5 11:48:11 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0576.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; MathSciNet database", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0576/05760252.htm; http://link.springer-ny.com/link/service/series/0558/papers/0576/05760252.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Kuijk:1991:RSE, author = "A. A. M. Kuijk", title = "Report on the {Sixth Eurographics Workshop on Graphics Hardware}", journal = j-CGF, volume = "10", number = "4", pages = "363--364", month = dec, year = "1991", CODEN = "CGFODY", ISSN = "0167-7055 (print), 1467-8659 (electronic)", ISSN-L = "0167-7055", bibdate = "Wed Jan 3 14:24:13 MST 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cgf.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Com{\-}pu{\-}ter Graphics Forum", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1467-8659/", } @Article{Kurosawa:1991:GPK, author = "Kaoru Kurosawa and Yutaka Katayama and Wakaha Ogata and Shigeo Tsujii", booktitle = "Advances in cryptology---EUROCRYPT '90 (Aarhus, 1990)", title = "General Public Key Residue Cryptosystems and Mental Poker Protocols", journal = j-LECT-NOTES-COMP-SCI, volume = "473", pages = "374--388", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "68P25 (94A60)", MRnumber = "1 102 497", bibdate = "Mon Feb 4 12:02:01 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0473.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0473/04730374.htm; http://link.springer-ny.com/link/service/series/0558/papers/0473/04730374.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Lai:1991:MCD, author = "X. Lai and J. L. Massey and S. Murphy", title = "{Markov} Ciphers and Differential Cryptanalysis", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "17--38", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60", MRnumber = "1 227 793", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", referencedin = "Referenced in \cite[Ref. 4]{Caronni:1997:HEE}.", } @InCollection{Lai:1991:PNB, author = "Xuejia Lai and James L. Massey", booktitle = "Advances in cryptology---EUROCRYPT '90 (Aarhus, 1990)", title = "A proposal for a new block encryption standard", volume = "473", publisher = pub-SV, address = pub-SV:adr, pages = "389--404", year = "1991", MRclass = "68P25 (94A60)", MRnumber = "1 102 498", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0473.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib; MathSciNet database", note = "See \cite{Luo:2010:PAE} for proofs of requirements on the number of rounds.", series = j-LECT-NOTES-COMP-SCI, URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0473/04730389.htm; http://link.springer-ny.com/link/service/series/0558/papers/0473/04730389.pdf", } @Article{LaMacchia:1991:CDL, author = "B. A. LaMacchia and A. M. Odlyzko", title = "Computation of Discrete Logarithms in Prime Fields", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "616--618", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Jul 19 06:40:22 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.research.att.com/~amo/doc/arch/prime.discrete.logs.pdf; http://www.research.att.com/~amo/doc/arch/prime.discrete.logs.ps; http://www.research.att.com/~amo/doc/arch/prime.discrete.logs.tex", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{LaMacchia:1991:SLS, author = "B. A. LaMacchia and A. M. Odlyzko", title = "Solving Large Sparse Linear Systems over Finite Fields", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "109--133", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Jul 19 06:41:33 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.research.att.com/~amo/doc/arch/sparse.linear.eqs.pdf; http://www.research.att.com/~amo/doc/arch/sparse.linear.eqs.ps; http://www.research.att.com/~amo/doc/arch/sparse.linear.eqs.tex", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Lampson:1991:ADS, author = "Butler Lampson and Mart{\'\i}n Abadi and Michael Burrows and Edward Wobber", title = "Authentication in distributed systems: theory and practice", journal = j-OPER-SYS-REV, volume = "25", number = "5", pages = "165--182", month = oct, year = "1991", CODEN = "OSRED8", ISSN = "0163-5980 (print), 1943-586X (electronic)", ISSN-L = "0163-5980", bibdate = "Sat Aug 26 08:55:57 MDT 2006", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Operating Systems Review", } @InProceedings{Leong:1991:UPE, author = "Philip Leong and Chris Tham", title = "{UNIX} Password Encryption Considered Unsecure", crossref = "USENIX:1991:PWU", pages = "269--280", day = "21--25", month = jan, year = "1991", bibdate = "Fri Oct 18 07:24:24 MDT 1996", bibsource = "ftp://ftp.uu.net/library/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, affiliation = "University of Sydney; State Bank of Victoria", } @Book{Levine:1991:USC, author = "Jack Levine", title = "{United States} cryptographic patents, 1861--1989", publisher = "Cryptologia", address = "Terre Haute, IN, USA", edition = "Second", pages = "115", year = "1991", ISBN = "0-9610560-1-0", ISBN-13 = "978-0-9610560-1-8", LCCN = "Z103 .L66 1991", bibdate = "Sat Nov 18 12:53:52 MST 2000", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, keywords = "cryptography; patents", } @Article{Li:1991:BCP, author = "Da Xing Li and Ze Zeng Zhang", title = "Breaking a class of public-key cryptosystems with {Euclid} algorithm", journal = "Chinese Sci. Bull.", volume = "36", number = "10", pages = "873--876", year = "1991", ISSN = "1001-6538", MRclass = "94A60 (68P25)", MRnumber = "1 138 046", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Chinese Science Bulletin. Kexue Tongbao", } @Article{Li:1991:HBM, author = "Da Xing Li and Ze Zeng Zhang", title = "How to break up modified {Lu-Lee} cryptosystems", journal = "Chinese Sci. Bull.", volume = "36", number = "12", pages = "1050--1053", year = "1991", ISSN = "1001-6538", MRclass = "94A60", MRnumber = "92k:94019", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Chinese Science Bulletin. Kexue Tongbao", } @Article{Li:1991:JAE, author = "Y. Li and X. Wang", title = "A Joint Authentication and Encryption Scheme Based on Algebraic Coding Theory", journal = j-LECT-NOTES-COMP-SCI, volume = "539", pages = "241--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1992.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Lia:1991:PNB, author = "Xuejia Lia and James L. Massey", title = "A Proposal for a New Block Encryption Standard", crossref = "Damgaard:1991:ACE", pages = "55--70", year = "1991", bibdate = "Thu Jan 21 14:36:18 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, annote = "Describes the IDEA cipher.", } @Article{Long:1991:PAA, author = "Yong Hong Long", title = "A probabilistic attack algorithm for the public key cryptosystem {RSA}", journal = j-NATUR-SCI-J-XIANGTAN-UNIV, volume = "13", number = "3", pages = "113--118", year = "1991", CODEN = "XDZEWR", ISSN = "1000-5900", MRclass = "94A60", MRnumber = "92j:94013", bibdate = "Tue Feb 9 11:14:49 MST 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "In Chinese.", acknowledgement = ack-nhfb, fjournal = "Natural Science Journal of Xiangtan University. Xiangtan Daxue Ziran Kexue Xuebao", } @PhdThesis{Mastrovito:1991:VAC, author = "E. D. Mastrovito", title = "{VLSI} Architectures for Computations in {Galois} Fields", type = "{Ph.D.} thesis", school = "Link{\"o}ping University", address = "Link{\"o}ping, Sweden", pages = "????", year = "1991", bibdate = "Fri Jun 24 21:10:31 2005", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Matyas:1991:KHC, author = "S. M. Matyas", title = "Key handling with control vectors", journal = j-IBM-SYS-J, volume = "30", number = "2", pages = "151--174", year = "1991", CODEN = "IBMSA7", ISSN = "0018-8670", bibdate = "Tue Mar 19 17:38:46 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib", abstract = "A method is presented for controlling cryptographic key usage based on control vectors. Each cryptographic key has an associated control vector that defines the permitted uses of the key within the cryptographic system. At key generation, the control vector is cryptographically coupled to the key via a special encryption process. Each encrypted key and control vector is stored and distributed within the cryptographic system as a single token. Decryption of a key requires respecification of the control vector. As part of the decryption process, the cryptographic hardware also verifies that the requested use of the key is authorized by the control vector. This paper focuses mainly on the use of control vectors in cryptosystems based on the data encryption algorithm.", acknowledgement = ack-nhfb, affiliation = "IBM Federal Sector Div., Manassas, VA, USA", classification = "C6130 (Data handling techniques)", fjournal = "IBM Systems Journal", keywords = "Associated control vector; Control vectors; Cryptographic key usage; Cryptographic system; Decryption; Encryption process", language = "English", pubcountry = "USA", thesaurus = "Cryptography", } @Article{Matyas:1991:KSB, author = "S. M. Matyas and A. V. Le and D. G. Abraham", title = "A key-management scheme based on control vectors", journal = j-IBM-SYS-J, volume = "30", number = "2", pages = "175--191", year = "1991", CODEN = "IBMSA7", ISSN = "0018-8670", bibdate = "Tue Mar 19 17:38:46 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib", abstract = "This paper presents a cryptographic key-management scheme based on control vectors. This is a new concept that permits cryptographic keys belonging to a cryptographic system to be easily, securely, and efficiently controlled. The new key-management scheme-built on the cryptographic architecture and key management implemented in a prior set of IBM cryptographic products-has been implemented in the newly announced IBM Transaction Security System.", acknowledgement = ack-nhfb, affiliation = "IBM Federal Sector Div., Manassas, VA, USA", classification = "C6130 (Data handling techniques)", fjournal = "IBM Systems Journal", keywords = "Control vectors; IBM cryptographic products; IBM Transaction Security System; Key-management scheme", language = "English", pubcountry = "USA", thesaurus = "Cryptography; Standards", } @TechReport{Maurer:1991:DSS, author = "Ueli M. Maurer", title = "A digital signature scheme and a public-key cryptosystem based on elliptic curves over {Z}[subscript m]", type = "DIMACS technical report", number = "91-39", institution = "DIMACS, Center for Discrete Mathematics and Theoretical Computer Science", address = "Rutgers, NJ, USA", pages = "11", month = may, year = "1991", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "Two new trapdoor one-way functions are proposed that are based on multiplication on elliptic curves over the ring Z[subscript m]. Such an elliptic curve is not a group, but it can be extended to form a group. A first class of functions has the property that assigning an element of the domain or range of the function to a given message requires knowledge of the trapdoor. These functions can therefore be used only in a digital signature scheme, but not in a public-key cryptosystem. A second, preferred class of functions does not suffer from this problem and can be used for the same applications as the RSA trapdoor one-way function, including zero-knowledge identification protocols. Like the RSA system, the new system could be broken when a modulus could be factored, and it is not known whether breaking the system is equivalent to factoring the modulus. However, unless this equivalence holds for the RSA system, our system seems to be more secure than the RSA system. Its encryption speed is half the speed of the RSA system.", acknowledgement = ack-nhfb, annote = "Supported in part by Omnisec AG, Switzerland and by a Postdoctoral Fellowship from the Swiss NSF", keywords = "Cryptography.", } @Article{Maurer:1991:NAD, author = "U. M. Maurer", title = "New Approaches to the Design of Self-Synchronizing Stream Ciphers", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "458--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Maurer:1991:NIP, author = "Ueli M. Maurer and Yacov Yacobi", title = "Non-Interactive Public-Key Cryptography", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "498--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:05 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0547.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0547/05470498.htm; http://link.springer-ny.com/link/service/series/0558/papers/0547/05470498.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Maurer:1991:PCS, author = "Ueli M. Maurer", title = "Perfect cryptographic security from partially independent channels", crossref = "ACM:1991:PTT", pages = "561--571", year = "1991", bibdate = "Wed Feb 20 18:33:59 MST 2002", bibsource = "http://portal.acm.org/; http://www.acm.org/pubs/contents/proceedings/series/stoc/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org/pubs/articles/proceedings/stoc/103418/p561-maurer/p561-maurer.pdf; http://www.acm.org/pubs/citations/proceedings/stoc/103418/p561-maurer/", acknowledgement = ack-nhfb, } @Article{Maurer:1991:PSS, author = "Ueli M. Maurer", title = "A Provably-Secure Strongly-Randomized Cipher", journal = j-LECT-NOTES-COMP-SCI, volume = "473", pages = "361--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:01 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0473.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0473/04730361.htm; http://link.springer-ny.com/link/service/series/0558/papers/0473/04730361.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{McInnes:1991:IPK, author = "J. L. McInnes and B. Pinkas", title = "On the Impossibility of Private Key Cryptography with Weakly Random Keys", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "421--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Meier:1991:CPC, author = "Willi Meier and Othmar Staffelbach", title = "Correlation Properties of Combiners with Memory in Stream Ciphers (Extended Abstract)", journal = j-LECT-NOTES-COMP-SCI, volume = "473", pages = "204--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:01 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0473.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0473/04730204.htm; http://link.springer-ny.com/link/service/series/0558/papers/0473/04730204.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @MastersThesis{Mendez:1991:AKA, author = "Trevor D. (Trevor DeCordova) Mendez", title = "Adding {Kerberos} authentication to the {QUIPU} implementation of {X.500}", type = "Thesis ({B.S.})", school = "Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology", address = "Cambridge, MA, USA", pages = "24", year = "1991", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Merkle:1991:FSE, author = "Ralph C. Merkle", title = "Fast Software Encryption Functions", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "476--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:02 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0537.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0537/05370476.htm; http://link.springer-ny.com/link/service/series/0558/papers/0537/05370476.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Mihaljevic:1991:CCP, author = "M. J. Mihaljevic and J. D. Golic", title = "A Comparison of Cryptanalytic Principles Based on Iterative Error-Correction", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "527--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Miyaguchi:1991:FCF, author = "S. Miyaguchi", title = "The {FEAL} Cipher Family", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "627--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Morita:1991:SCT, author = "Hikaru Morita and Kazuo Ohta and Shoji Miyaguchi", title = "A Switching Closure Test to Analyze Cryptosystems (Extended Abstract)", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "183--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:11 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0576.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0576/05760183.htm; http://link.springer-ny.com/link/service/series/0558/papers/0576/05760183.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Mund:1991:ZCP, author = "S. Mund", title = "{Ziv--Lempel} Complexity for Periodic Sequences and its Cryptographic Application", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "114--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Nov 24 17:24:51 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Mund:1991:ZLC, author = "Sibylle Mund", title = "{Ziv--Lempel} Complexity for Periodic Sequences and its Cryptographic Application", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "114--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:05 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0547.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0547/05470114.htm; http://link.springer-ny.com/link/service/series/0558/papers/0547/05470114.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Book{Nag-dban-blo-bzan-bstan-pai-rgyal-mtshan:1991:RDN, author = "Lcan-lun Pandita Nag-dban-blo-bzan-bstan-pa'i-rgyal-mtshan", title = "Rgya dkar nag rgya ser {Kasmira Bal Bod Hor} gyi yi ge dan dpe ris rnam gran man ba: graphic tables of {Indic} and allied scripts with ornamental and cryptographic characters of {Tibet}", publisher = "Library of Tibetan Works and Archives", address = "Dharamsala, India", pages = "30", year = "1991", LCCN = "A 2 523 753", bibdate = "Sat Nov 18 12:53:52 MST 2000", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Tibetan, Mongolian, Nepali, and several Indic languages; prefatory matters in English. Reproduced from a incomplete A-ba-ga Bsod-nams-kun-sdud-glin blockprints from the library of the 4th Sga-rje Khams-sprul Rinpoche.", acknowledgement = ack-nhfb, keywords = "Indic languages -- writing; Tibet (China) -- languages -- orthography and spelling; Tibetan language -- writing", } @Book{Nechvatal:1991:PC, author = "James Nechvatal", title = "Public-key cryptography", publisher = "U.S. Dept. of Commerce, National Institute of Standards and Technology", address = "Washington, DC, USA", pages = "ix + 162", month = apr, year = "1991", LCCN = "QC 100 U57 no.800-2 1991 Microfiche", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Microfiche", series = "NIST special publication: Computer security 800-2", acknowledgement = ack-nhfb, keywords = "computer security; cryptography", } @Article{Neumann:1991:IRCd, author = "Peter G. Neumann", title = "Inside {RISKS}: Collaborative Efforts", journal = j-CACM, volume = "34", number = "12", pages = "162--162", month = dec, year = "1991", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu May 30 09:41:10 MDT 1996", bibsource = "http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/125411.html", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "design; legal aspects; standardization; theory", subject = "{\bf K.4.3}: Computing Milieux, COMPUTERS AND SOCIETY, Organizational Impacts. {\bf H.4.3}: Information Systems, INFORMATION SYSTEMS APPLICATIONS, Communications Applications. {\bf K.5.1}: Computing Milieux, LEGAL ASPECTS OF COMPUTING, Software Protection. {\bf E.3}: Data, DATA ENCRYPTION, Data encryption standard (DES).", } @InCollection{Nissan:1991:EMF, author = "Ephraim Nissan", editor = "Ian Lancashire", booktitle = "The Humanities Computing Yearbook, 1989--90", title = "{Etruscan} [computer models for]", publisher = pub-CLARENDON, address = pub-CLARENDON:adr, pages = "246", year = "1991", bibdate = "Sun May 5 08:00:59 MDT 1996", bibsource = "https://www.math.utah.edu/pub/bibnet/authors/e/ephraim-nissan.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", keywords = "annotated bibliography decipher", } @Article{NIST:1991:DSS, author = "{National Institute of Standards and Technology}", title = "Digital Signature Standard {(DSS)}", journal = j-FED-REGIST, volume = "56", number = "169", pages = "??--??", month = aug, year = "1991", CODEN = "FEREAC", ISSN = "0097-6326", ISSN-L = "0097-6326", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Federal Register", journal-URL = "https://www.archives.gov/federal-register", referencedin = "Referenced in \cite[Ref. 6]{Bellare:1996:MAU}.", } @Article{Ohta:1991:MAH, author = "Kazuo Ohta and Tatsuaki Okamoto and Kenji Koyama", title = "Membership Authentication for Hierarchical Multigroups Using the Extended {Fiat--Shamir} Scheme", journal = j-LECT-NOTES-COMP-SCI, volume = "473", pages = "446--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:01 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0473.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0473/04730446.htm; http://link.springer-ny.com/link/service/series/0558/papers/0473/04730446.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Okamoto:1991:EAC, author = "Tatsuaki Okamoto and Kouichi Sakurai", title = "Efficient algorithms for the construction of hyperelliptic cryptosystems", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "267--278", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 09 17:36:04 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; MathSciNet database", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Book{Ong:1991:TCM, author = "Sing Guat Ong and Jennifer Seberry and Thomas. Hardjono", title = "Towards the cryptanalysis of Mandarin (Pinyin)", volume = "3", publisher = "Centre for Computer Security Research", address = "Canberra, ACT, Australia", pages = "ix + 208", year = "1991", ISBN = "0-7317-0177-1", ISBN-13 = "978-0-7317-0177-3", ISSN = "1034-1757", LCCN = "????", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = "CCSR tutorial series in computer security", acknowledgement = ack-nhfb, keywords = "Cryptography; Mandarin dialects --- Syntax.", } @Article{Oorschot:1991:CPP, author = "Paul C. van Oorschot", title = "A Comparison of Practical Public-Key Cryptosystems Based on Integer Factorization and Discrete Logarithms", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "576--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:02 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0537.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0537/05370576.htm; http://link.springer-ny.com/link/service/series/0558/papers/0537/05370576.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Orup:1991:VER, author = "Holger Orup and Erik Svendsen and Erik Andreasen", title = "{VICTOR} --- an Efficient {RSA} Hardware Implementation", journal = j-LECT-NOTES-COMP-SCI, volume = "473", pages = "245--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:01 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0473.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0473/04730245.htm; http://link.springer-ny.com/link/service/series/0558/papers/0473/04730245.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Ostrovsky:1991:HWM, author = "R. Ostrovsky and M. Yung", booktitle = "Proc. 10th ACM Symp. on Principles of Distributed Computation", title = "How to withstand mobile virus attacks", publisher = pub-ACM, address = pub-ACM:adr, pages = "51--61 (or 51--59??)", year = "1991", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 32]{Gemmell:1997:ITC}, \cite[Ref. 24]{Canetti:1997:PSL}.", } @Article{Patarin:1991:NRP, author = "Jacques Patarin", title = "New results on pseudorandom permutation generators based on the {DES} scheme", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "301--213", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 09 17:36:04 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; MathSciNet database", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Patarin:1991:PPB, author = "J. Patarin", title = "Pseudorandom permutations based on the {DES} scheme", journal = j-LECT-NOTES-COMP-SCI, volume = "514", pages = "193--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Pedersen:1991:DPA, author = "T. P. Pedersen", title = "Distributed provers with applications to undeniable signatures", crossref = "Davies:1991:ACE", pages = "221--242", year = "1991", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 33]{Gemmell:1997:ITC}.", } @Article{Pedersen:1991:NII, author = "Torben Pryds Pedersen", title = "Non-interactive and Information-Theoretic Secure Verifiable Secret Sharing", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "129--140", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:11 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0576.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; MathSciNet database", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0576/05760129.htm; http://link.springer-ny.com/link/service/series/0558/papers/0576/05760129.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Pedersen:1991:NIS, author = "T. P. Pedersen", title = "Non-interactive and information-theoretic secure verifiable secret sharing", crossref = "Feigenbaum:1991:ACC", pages = "129--140", year = "1991", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 35]{Gemmell:1997:ITC}.", } @Article{Pedersen:1991:NIT, author = "Torben Pryds Pedersen", title = "Noninteractive and information-theoretic secure verifiable secret sharing", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "129--140", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 09 17:36:04 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; MathSciNet database", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Pedersen:1991:TCT, author = "T. P. Pedersen", title = "A threshold cryptosystem without a trusted party", crossref = "Davies:1991:ACE", pages = "522--526", year = "1991", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 34]{Gemmell:1997:ITC}.", } @MastersThesis{Perry:1991:EIT, author = "Chuckwudi Perry", title = "An efficient implementation of triple enciphered {Data Encryption Standard}", type = "Thesis ({M.S.})", school = "Prairie View A and M University", address = "Prairie View, TX 77446-2355, USA", pages = "xi + 67", year = "1991", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, keywords = "Computers --- Access control; Major Engineering.", } @InCollection{Petho:1991:PTA, author = "A. Peth{\"o}", booktitle = "Computational number theory (Debrecen, 1989)", title = "On a polynomial transformation and its application to the construction of a public key cryptosystem", publisher = "de Gruyter", address = "Berlin", pages = "31--43", year = "1991", MRclass = "94A60 (11T71 68P25)", MRnumber = "93e:94011", MRreviewer = "Mu Lan Liu", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", } @Article{Pieprzyk:1991:RAS, author = "J{\'o}zef P. Pieprzyk and Reihaneh Safavi-Naini", title = "Randomized Authentication Systems", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "472--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:05 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0547.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0547/05470472.htm; http://link.springer-ny.com/link/service/series/0558/papers/0547/05470472.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Portz:1991:UIN, author = "M. Portz", title = "On the Use of Interconnection Networks in Cryptography", journal = j-LECT-NOTES-COMP-SCI, volume = "547", pages = "302--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Post:1991:RSE, author = "Frits H. Post and Andrea J. S. Hin", title = "Report on the {Second Eurographics Workshop on Visualization in Scientific Computing}", journal = j-CGF, volume = "10", number = "3", pages = "261--264", month = sep, year = "1991", CODEN = "CGFODY", ISSN = "0167-7055 (print), 1467-8659 (electronic)", ISSN-L = "0167-7055", bibdate = "Wed Jan 3 14:24:13 MST 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cgf.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Com{\-}pu{\-}ter Graphics Forum", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1467-8659/", } @InProceedings{Preneel:1991:CRH, author = "B. Preneel and R. Govaerts and J. Vandewalle", title = "Collision resistant hash functions based on blockciphers", crossref = "Feigenbaum:1991:ACC", pages = "??", year = "1991", bibdate = "Sat Jul 16 17:43:33 1994", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Quisquater:1991:CLE, author = "Jean-Jacques Quisquater and Yvo G. Desmedt", title = "{Chinese Lotto} as an Exhaustive Code-Breaking Machine", journal = j-COMPUTER, volume = "24", number = "11", pages = "14--22", month = nov, year = "1991", CODEN = "CPTRB4", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Tue May 14 16:20:44 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/computer.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/super.bib", abstract = "Why use a Cray-2 for problems that can be solved by less expensive distributed computers? Exploiting randomness can produce a simple fault-tolerant architecture.", acknowledgement = ack-nhfb, affiliation = "Louvain Univ., Belgium", classification = "C5220 (Computer architecture); C5470 (Performance evaluation and testing); C6130S (Data security)", fjournal = "Computer", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", keywords = "Chinese lotto; Deterministic; Distributed processors; Elementary concepts; Fault-tolerant exhaustive code-breaking machine; Probability theory; Random", thesaurus = "Cryptography; Distributed processing; Fault tolerant computing", } @Article{Rackoff:1991:NIZ, author = "Charles Rackoff and Daniel R. Simon", title = "Non-interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "433--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:11 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0576.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0576/05760433.htm; http://link.springer-ny.com/link/service/series/0558/papers/0576/05760433.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @MastersThesis{Revello:1991:CEC, author = "Timothy E. Revello", title = "A combination of exponentiation ciphers and the data encryption standard as a pseudorandom number generator", type = "Thesis ({M.S.})", school = "Rensselaer Polytechnic Institute at The Hartford Graduate Center", address = "Troy, NY, USA", pages = "viii + 68", year = "1991", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, keywords = "Ciphers; Cryptography; Random number generators.", } @Article{Rivest:1991:FFM, author = "R. L. Rivest", title = "Finding Four Million Large Random Primes", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "625--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Rivest:1991:MMD, author = "R. L. Rivest", title = "The {MD4} message digest algorithm", crossref = "Menezes:1991:ACC", pages = "303--311", year = "1991", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 14]{Dobbertin:1996:SMA}, \cite[Ref. 21]{Preneel:1997:CHF}.", } @Article{Rudich:1991:UIP, author = "Steven Rudich", title = "The Use of Interaction in Public Cryptosystems (Extended Abstract)", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "242--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:11 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0576.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0576/05760242.htm; http://link.springer-ny.com/link/service/series/0558/papers/0576/05760242.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Salomaa:1991:VRS, author = "A. Salomaa", title = "Verifying and Recasting Secret Ballots in Computer Networks", journal = j-LECT-NOTES-COMP-SCI, volume = "555", pages = "283--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1992.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Santis:1991:CAN, author = "Alfredo {De Santis} and Moti Yung", title = "Cryptographic Applications of the Non-interactive Metaproof and Many-Prover Systems (Preliminary Version)", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "366--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:02 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0537.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0537/05370366.htm; http://link.springer-ny.com/link/service/series/0558/papers/0537/05370366.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Santis:1991:PRP, author = "Alfredo {De Santis} and Giuseppe Persiano", title = "Public-Randomness in Public-Key Cryptography (Extended Abstract)", journal = j-LECT-NOTES-COMP-SCI, volume = "473", pages = "46--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:01 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0473.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0473/04730046.htm; http://link.springer-ny.com/link/service/series/0558/papers/0473/04730046.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Schmitt:1991:EAA, author = "Joacheim Schmitt", title = "An embedding algorithm for algebraic congruence function fields", crossref = "Watt:1991:IPI", pages = "187--188", year = "1991", bibdate = "Thu Mar 12 08:38:03 MST 1998", bibsource = "http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/issac.bib", URL = "http://www.acm.org:80/pubs/citations/proceedings/issac/120694/p187-schmitt/", abstract = "Provides an analogue of the Round 4 algorithm of Ford/Zassenhaus (1978) for algebraic congruence function fields. The reduction steps can also be used in other embedding algorithms. The algorithm is implemented within the computer algebra system SIMATH. The corresponding programs are written in C. The results can be used in integration and cryptography.", acknowledgement = ack-nhfb, affiliation = "Saarlandes Univ., Saarbrucken, Germany", classification = "C1110 (Algebra); C1160 (Combinatorial mathematics)", keywords = "Algebraic congruence function fields; algorithms; Computer algebra system; Cryptography; Embedding algorithms; Integration; Round 4 algorithm; SIMATH", subject = "{\bf I.1.0} Computing Methodologies, SYMBOLIC AND ALGEBRAIC MANIPULATION, General. {\bf F.2.1} Theory of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms and Problems, Number-theoretic computations. {\bf I.1.3} Computing Methodologies, SYMBOLIC AND ALGEBRAIC MANIPULATION, Languages and Systems. {\bf F.2.1} Theory of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms and Problems, Computations on polynomials.", thesaurus = "Number theory", } @Article{Schneier:1991:OHF, author = "Bruce Schneier", title = "One-Way Hash Functions: Probabilistic algorithms can be used for general-purpose pattern matching", journal = j-DDJ, volume = "16", number = "9", pages = "148--151", day = "1", month = sep, year = "1991", CODEN = "DDJOEB", ISSN = "1044-789X", bibdate = "Tue Sep 10 09:11:02 MDT 1996", bibsource = "http://www.ddj.com/index/author/index.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib; UnCover database", acknowledgement = ack-nhfb, classification = "C6120 (File organisation); C6130 (Data handling techniques)", fjournal = "Dr. Dobb's Journal of Software Tools", keywords = "128-Bit hash; 32 Bit; 32-Bit architectures; 32-Bit operands; Cryptographic algorithm; DES; Digital Encryption Standard; MD5; Message Digest; One-way hash function", thesaurus = "C listings; Cryptography; File organisation", } @InProceedings{Schnorr:1991:FHE, author = "C. P. Schnorr", title = "{FFT}-Hashing, An Efficient Cryptographic Hash Function", crossref = "Feigenbaum:1991:ACC", pages = "??", year = "1991", bibdate = "Sat Jul 16 17:51:40 1994", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", acknowledgement = ack-nhfb, } @Article{Schrift:1991:UNB, author = "A. W. Schrift and Adi Shamir", title = "On the Universality of the Next Bit Test", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "394--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:02 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0537.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0537/05370394.htm; http://link.springer-ny.com/link/service/series/0558/papers/0537/05370394.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Sgarro:1991:LBA, author = "Andrea Sgarro", title = "Lower Bounds for Authentication Codes with Splitting", journal = j-LECT-NOTES-COMP-SCI, volume = "473", pages = "283--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:01 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0473.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0473/04730283.htm; http://link.springer-ny.com/link/service/series/0558/papers/0473/04730283.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Sgarro:1991:STC, author = "A. Sgarro", title = "A {Shannon}-theoretic coding theorem in authentication theory", journal = j-LECT-NOTES-COMP-SCI, volume = "514", pages = "282--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "(Invited speaker)", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Simmons:1991:GSS, author = "Gustavus J. Simmons", title = "Geometric Shared Secret and\slash or Shared Control Schemes (invited talk)", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "216--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:02 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0537.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0537/05370216.htm; http://link.springer-ny.com/link/service/series/0558/papers/0537/05370216.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Smeets:1991:CAC, author = "Ben Smeets and Peter Vanroose and Zhe-xian Wan", title = "On the Construction of Authentication Codes with Sand Codes Withstanding Spoofing Attacks of Order $ {L} \geq 2 $", journal = j-LECT-NOTES-COMP-SCI, volume = "473", pages = "306--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:01 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0473.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0473/04730306.htm; http://link.springer-ny.com/link/service/series/0558/papers/0473/04730306.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Staffelbach:1991:CSC, author = "O. Staffelbach and W. Meier", title = "Cryptographic Significance of the Carry for Ciphers Based on Integer Addition", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "601--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Steinberg:1991:VSV, author = "Steve Steinberg", title = "Viewpoint: a Student's View of Cryptography in Computer Science", journal = j-CACM, volume = "34", number = "2", pages = "15--17", month = feb, year = "1991", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Tue Jan 28 14:51:51 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm1990.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @Article{Stern:1991:CPK, author = "Jacques Stern and Philippe Toffin", booktitle = "Advances in cryptology---EUROCRYPT '90 (Aarhus, 1990)", title = "Cryptanalysis of a Public-Key Cryptosystem Based on Approximations by Rational Numbers", journal = j-LECT-NOTES-COMP-SCI, volume = "473", pages = "313--317", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "68P25 (94A60)", MRnumber = "1 102 491", bibdate = "Mon Feb 4 12:02:01 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0473.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0473/04730313.htm; http://link.springer-ny.com/link/service/series/0558/papers/0473/04730313.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Stinson:1991:CCA, author = "Douglas R. Stinson", title = "Combinatorial characterizations of authentication codes", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "62--73", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:11 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0576.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; MathSciNet database", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0576/05760062.htm; http://link.springer-ny.com/link/service/series/0558/papers/0576/05760062.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Stinson:1991:UHA, author = "Douglas R. Stinson", title = "Universal Hashing and Authentication Codes", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "74--85", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:11 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0576.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; MathSciNet database", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0576/05760074.htm; http://link.springer-ny.com/link/service/series/0558/papers/0576/05760074.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Misc{Sun:1991:RSE, author = "{Sun Microsystems Computer Corporation}", title = "A release of {Solaris 1.0.1} encryption kit for {SunOS 4.1.2} for {SPARC} systems", publisher = pub-SUN, address = pub-SUN:adr, edition = "Release 1.0.1.", pages = "various", year = "1991", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, annote = "Title from disk label. Contains cryptographic utilities for SunOS. System requirements: Sun workstation; SunOS 4.1.2; CD-ROM drive.", keywords = "Computer security --- Computer programs; Computers --- Access control --- Computer programs; Sun workstation", } @Article{Sun:1991:UDE, author = "Qi Sun", title = "Using {Diophantine} equations to construct public key cryptosystems", journal = "Sichuan Daxue Xuebao", volume = "28", number = "1", pages = "15--18", year = "1991", CODEN = "SCTHAO", ISSN = "0490-6756", MRclass = "94A60", MRnumber = "92b:94037", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Journal of Sichuan University. Natural Science Edition. Sichuan Daxue Xuebao. Ziran Kexue Ban", } @Article{Tangney:1991:SIS, author = "Brendan Tangney and Vinny Cahill and Chris Horn and Dominic Herity and Alan Judge and Gradimir Starovic and Mark Sheppard", title = "Some ideas on support for fault tolerance in {COMANDOS}, an object oriented distributed system", journal = j-OPER-SYS-REV, volume = "25", number = "2", pages = "130--135", month = apr, year = "1991", CODEN = "OSRED8", ISSN = "0163-5980 (print), 1943-586X (electronic)", ISSN-L = "0163-5980", bibdate = "Sat Aug 26 08:55:41 MDT 2006", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Operating Systems Review", } @MastersThesis{Thao:1991:SAD, author = "Sam V. Thao", title = "A statistical analysis of the data encryption standard", type = "Thesis ({M.S. in Computer Science})", school = "University of Wisconsin-Milwaukee", address = "Milwaukee, WI, USA", pages = "viii + 58", year = "1991", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, keywords = "Cryptography; Data protection; Statistical hypothesis testing.", } @Article{Toussaint:1991:DCK, author = "Marie-Jeanne Toussaint", title = "Deriving the Complete Knowledge of Participants in Cryptographic Protocols (Extended Abstract)", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "24--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:11 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0576.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0576/05760024.htm; http://link.springer-ny.com/link/service/series/0558/papers/0576/05760024.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Tsujii:1991:NIB, author = "Shigeo Tsujii and Jinhui Chao", title = "A new {ID}-based key sharing system", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "288--299", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 09 17:36:04 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; MathSciNet database", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{vanOorschot:1991:CPP, author = "Paul C. van Oorschot", title = "A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "576--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:02:03 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0537.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0537/05370576.htm; http://link.springer-ny.com/link/service/series/0558/papers/0537/05370576.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{vanOorschot:1991:KPA, author = "Paul C. van Oorschot and Michael J. Wiener", title = "A known-plaintext attack on two-key triple encryption", crossref = "Damgaard:1991:ACE", pages = "318--325", year = "1991", MRclass = "68P25 (94A60)", MRnumber = "1 102 492", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0473.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; MathSciNet database", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0473/04730318.htm; http://link.springer-ny.com/link/service/series/0558/papers/0473/04730318.pdf", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 26]{Biham:1998:TA}.", } @InProceedings{Waleffe:1991:CSC, author = "Dominique de Waleffe and Jean-Jacques Quisquater", title = "{CORSAIR}: a Smart Card for Public Key Cryptosystems", crossref = "Menezes:1991:ACC", pages = "503--513", year = "1991", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0537.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0537/05370502.htm; http://link.springer-ny.com/link/service/series/0558/papers/0537/05370502.pdf", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 15]{Handschuh:1998:SCC}.", } @Article{Wayner:1991:TDL, author = "Peter Wayner", title = "True Data: a look at techniques for ensuring the authenticity of the data you send, receive, or store", journal = j-BYTE, volume = "16", number = "9", pages = "122--124, 126, 128", month = sep, year = "1991", CODEN = "BYTEDJ", ISSN = "0360-5280 (print), 1082-7838 (electronic)", ISSN-L = "0360-5280", bibdate = "Thu Sep 12 18:39:30 MDT 1996", bibsource = "/usr/local/src/bib/bibliography/Misc/security.1.bib; https://www.math.utah.edu/pub/tex/bib/byte1990.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, classification = "C6130 (Data handling techniques)", fjournal = "BYTE Magazine", keywords = "Checksum; computer security, cryptographic checksums, snefru, md5, authentication, Kerberos, public key cryptosystems; Cryptography; Data authentication; Data integrity; Data security; Electronic signatures; Public-key cryptographic codes", ort = "Zeitschrift", thesaurus = "Cryptography; Data handling; Data integrity; Security of data", } @Article{Weissman:1991:IRA, author = "Clark Weissman", title = "Inside {RISKS}: a National Debate on Encryption Exportability", journal = j-CACM, volume = "34", number = "10", pages = "162--162", month = oct, year = "1991", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu May 30 09:41:10 MDT 1996", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib; http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/125294.html", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "standardization; theory", subject = "{\bf E.3}: Data, DATA ENCRYPTION, Data encryption standard (DES).", } @Article{Weissman:1991:IRN, author = "Clark Weissman", title = "Inside {RISKS}: a National Debate on Encryption Exportability", journal = j-CACM, volume = "34", number = "10", pages = "162--162", month = oct, year = "1991", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu May 30 09:41:10 MDT 1996", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib; http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cacm1990.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/125294.html", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "standardization; theory", subject = "{\bf E.3}: Data, DATA ENCRYPTION, Data encryption standard (DES).", } @Book{Winterbotham:1991:US, author = "F. W. (Frederick William) Winterbotham", title = "The {Ultra} spy", publisher = "Papermac", address = "London, UK", pages = "258 + 8", year = "1991", ISBN = "0-333-55881-2 (paperback)", ISBN-13 = "978-0-333-55881-2 (paperback)", LCCN = "UB271.G72 W564 1991", bibdate = "Fri May 13 08:14:55 MDT 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; melvyl.cdlib.org:210/CDL90", acknowledgement = ack-nhfb, author-dates = "1897--1990", remark = "Originally published: London : Macmillan, 1989.", subject = "Winterbotham, F. W; (Frederick William); Intelligence officers; Great Britain; Biography; Espionage, British; History; 20th century; World War, 1939--1945; Cryptography", } @Article{Yeh:1991:EIC, author = "P. C. Yeh and R. M. {Smith, Sr.}", title = "{ESA\slash 390} integrated cryptographic facility: {An} overview", journal = j-IBM-SYS-J, volume = "30", number = "2", pages = "192--205", year = "1991", CODEN = "IBMSA7", ISSN = "0018-8670", bibdate = "Sun Sep 15 05:47:47 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib", abstract = "This paper reviews the objectives of the Enterprise Systems Architecture/390 (ESA/390) integrated cryptographic facility. It presents the cryptographic key-management scheme, summarizes key elements and unique characteristics of the facility, and describes the physical security provided by the first ESA/390 implementation.", acknowledgement = ack-nhfb, affiliation = "IBM Data Syst. Div., Poughkeepsie, NY, USA", classification = "C6130 (Data handling techniques)", fjournal = "IBM Systems Journal", keywords = "Enterprise Systems Architecture/390; ESA/390; ESA/390 integrated cryptographic facility; Key-management scheme; Overview; Physical security", language = "English", pubcountry = "USA", thesaurus = "Cryptography", } @Article{Yu:1991:SED, author = "K. W. Yu and Tong Lai Yu", title = "Superimposing Encrypted Data", journal = j-CACM, volume = "34", number = "2", pages = "48--54", month = feb, year = "1991", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", MRclass = "68P25", MRnumber = "1 093 271", bibdate = "Thu Apr 29 17:44:08 1999", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib; http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "See \cite{Boyd:1992:RDE}.", URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/102800.html", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "algorithms; security; theory", subject = "{\bf E.3}: Data, DATA ENCRYPTION, Data encryption standard (DES).", } @Article{Zeng:1991:ILS, author = "K. Zeng and C. H. Yang and T. R. N. Rao", title = "An Improved Linear Syndrome Algorithm in Cryptanalysis with Applications", journal = j-LECT-NOTES-COMP-SCI, volume = "537", pages = "34--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60", MRnumber = "1 232 867", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Zeng:1991:PBG, author = "Kencheng Zeng and Chung-Huang Yang and Dah-Yea Wei and T. R. N. Rao", title = "Pseudorandom Bit Generators in Stream-Cipher Cryptography", journal = j-COMPUTER, volume = "24", number = "2", pages = "8--17", month = feb, year = "1991", CODEN = "CPTRB4", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Tue Feb 04 06:56:11 1997", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/computer.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "The information age lends new dimensions to the art of cryptography. Techniques for encryption, decryption, and fending off attacks from intruders provide the only protection of sensitive data.", acknowledgement = ack-nhfb, affiliation = "Center for Adv Comput Studies, Univ of Southwestern Louisiana, Lafayette, LA, USA", classification = "723; 922; C5230 (Digital arithmetic methods); C6130 (Data handling techniques)", fjournal = "Computer", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", journalabr = "Computer", keywords = "Cryptography; Data Processing --- Security of Data; Keystream generators; Linear Consistency Attack; Linear feedback shift registers; Linear Syndrome Attack; Mathematical Statistics --- Random Number Generation; Multiclocking; Nonlinear feedforward transformation; Nonlinear Feedforward Transformation; Pseudorandom Bit Generators; Pseudorandom bit generators; Siegenthaler Correlation Attack; Step control; Stream-cipher cryptography; Stream-Cipher Cryptography", thesaurus = "Cryptography; Feedback; Random number generation; Shift registers", } @Article{Zhang:1991:BNK, author = "Zhao Zhi Zhang", title = "Breaking a new knapsack public key cryptosystem", journal = "J. Systems Sci. Math. Sci.", volume = "11", number = "1", pages = "91--97", year = "1991", CODEN = "XKSHEW", ISSN = "1000-0577", MRclass = "94B05 (68P25)", MRnumber = "1 112 755", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Journal of Systems Science and Mathematical Sciences. Xitong Kexue yu Shuxue", } @Article{Zheng:1991:DBT, author = "Y. Zheng and T. Matsumoto and H. Imai", title = "Duality between Two Cryptographic Primitives", journal = j-LECT-NOTES-COMP-SCI, volume = "508", pages = "379--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 08:51:55 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Adam:1992:DSC, author = "J. A. Adam", title = "Data security --- cryptography = privacy?", journal = j-IEEE-SPECTRUM, volume = "29", number = "8", pages = "29--35", month = aug, year = "1992", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/6.144533", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Thu Jan 16 07:37:23 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum1990.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Computer security; cryptography; Cryptography; cryptography; Data security; data security; Digital Signature Standard; Digital signatures; Electronic commerce; enciphering schemes; encryption; Government; government intelligence agencies; Information security; Modems; National security; NIST; public-key cryptography; standards", } @Article{Adams:1992:IAB, author = "Carlisle M. Adams", title = "On immunity against {Biham} and {Shamir}'s ``differential cryptanalysis''", journal = j-INFO-PROC-LETT, volume = "41", number = "2", pages = "77--80", day = "14", month = feb, year = "1992", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/infoproc.bib", acknowledgement = ack-nhfb, affiliation = "Bell-Northern Research Ltd", affiliationaddress = "Ottawa, Ont, Can", classification = "723; B6120B (Codes); C1260 (Information theory); C4240 (Programming and algorithm theory); C6130S (Data security)", corpsource = "Bell-Northern Res. Ltd., Ottawa, Ont., Canada", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "8-round Lucifer; algorithm theory; bent function based substitution boxes; cryptanalytic attack; Cryptography; cryptography; Cryptography; cryptosystems; Data Encryption Standard; data encryption standard; Data Encryption Standard; DES; DES-like ciphers; differential cryptanalysis; n-round FEAL; s-boxes; Substitution Boxes; substitution-permutation network; Substitution-permutation Networks", treatment = "T Theoretical or Mathematical", } @Article{Agarwal:1992:RSO, author = "Pankaj K. Agarwal", title = "Ray Shooting and Other Applications of Spanning Trees with Low Stabbing Number", journal = j-SIAM-J-COMPUT, volume = "21", number = "3", pages = "540--570", month = jun, year = "1992", CODEN = "SMJCAT", ISSN = "0097-5397 (print), 1095-7111 (electronic)", ISSN-L = "0097-5397", MRclass = "68U05 (52B55 68Q20)", MRnumber = "93f:68091", MRreviewer = "Ratko To{\v{s}}i\'c", bibdate = "Sat Jan 18 18:03:50 MST 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib", acknowledgement = ack-nhfb, fjournal = "SIAM Journal on Computing", journal-URL = "http://epubs.siam.org/sicomp", } @Article{Alexandris:1992:FMC, author = "N. Alexandris", title = "Factorization methods in cryptosystems", journal = "Bull. Greek Math. Soc.", volume = "34", pages = "65--82", year = "1992", ISSN = "0072-7466", MRclass = "11T71 (11Y05 94A60)", MRnumber = "95e:11130", MRreviewer = "Kaisa Nyberg", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Bulletin of the Greek Mathematical Society", } @Article{Andrasiu:1992:NCB, author = "Mircea Andra{\c{s}}iu and Adrian Atanasiu and Gheorghe P{\u{a}}un and Arto Salomaa", title = "A new cryptosystem based on formal language theory", journal = "Bull. Math. Soc. Sci. Math. Roumanie (N.S.)", volume = "36(84)", number = "1", pages = "1--16", year = "1992", ISSN = "1220-3874", MRclass = "94A60 (68Q45)", MRnumber = "96c:94004", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Bulletin Math\'ematique de la Soci\'et\'e des Sciences Math\'ematiques de Roumanie. Nouvelle S\'erie", } @Article{Anonymous:1992:AUd, author = "Anonymous", title = "{Answers to UNIX}", journal = j-UNIX-WORLD, volume = "9", number = "9", pages = "121--??", month = sep, year = "1992", ISSN = "0739-5922", bibdate = "Sat Jan 27 06:20:21 MST 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "Encrypting shell scripts, showing groups, and fast C shell start-up.", acknowledgement = ack-nhfb, fjournal = "UNIX/world", } @Article{Anonymous:1992:DDS, author = "Anonymous", title = "Double Data Security", journal = j-DATAMATION, volume = "38", number = "??", pages = "21--??", day = "15", month = nov, year = "1992", CODEN = "DTMNAT", ISSN = "0011-6963", bibdate = "Sat Jan 27 07:35:21 MST 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "Cettlan's SecureModem 2032e can help protect networks from unauthorized access with callback and link encryption. Incoming calls are authenticated automatically without the need for a user to log on.", acknowledgement = ack-nhfb, fjournal = "Datamation", } @Article{Anonymous:1992:DES, author = "Anonymous", title = "Debating encryption standards", journal = j-CACM, volume = "35", number = "7", pages = "32--34", month = jul, year = "1992", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu May 30 09:41:10 MDT 1996", bibsource = "http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/129903.html", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "security; standardization", subject = "{\bf E.3}: Data, DATA ENCRYPTION, Data encryption standard (DES).", } @Article{Baker:1992:CAB, author = "H. G. Baker", title = "Computing {$ A * B \pmod {N} $} efficiently in {ANSI C}", journal = j-SIGPLAN, volume = "27", number = "1", pages = "95--98", month = jan, year = "1992", CODEN = "SINODQ", ISSN = "0362-1340 (print), 1523-2867 (print), 1558-1160 (electronic)", ISSN-L = "0362-1340", bibdate = "Thu Dec 14 17:21:15 MST 1995", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/sigplan.bib", abstract = "The modular product computation $ A * B \mod {N} $ is a bottleneck for some public-key encryption algorithms, as well as many exact computations implemented using the Chinese remainder theorem. The author shows how to compute $ A * B \pmod {N} $ efficiently, for single-precision $A$, $B$, and $N$, on a modern RISC architecture (Intel 80860) in ANSI C. On this architecture, the method computes $ A * B \pmod {N}$ faster than ANSI C computes $ A \% N$, for unsigned longs $A$ and $N$.", acknowledgement = ack-nhfb, affiliation = "Nimble Comput. Corp., Encino, CA, USA", classification = "C5230 (Digital arithmetic methods); C6110 (Systems analysis and programming); C6130S (Data security); C6140D (High level languages)", fjournal = "ACM SIGPLAN Notices", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J706", keywords = "ANSI C; Chinese remainder theorem; Exact computations; Intel 80860; Modular product computation; Public-key encryption algorithms; RISC architecture; Single-precision", thesaurus = "C language; Cryptography; Digital arithmetic; Programming", } @Book{Barker:1992:CSC, author = "Wayne G. Barker", title = "Cryptanalysis of the single columnar transposition cipher", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "ix + 146", year = "1992", ISBN = "0-89412-193-6", ISBN-13 = "978-0-89412-193-7", LCCN = "????", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, keywords = "Cryptography", } @Article{Barlow:1992:DPP, author = "John Perry Barlow", title = "Decrypting the puzzle palace", journal = j-CACM, volume = "35", number = "7", pages = "25--31", month = jul, year = "1992", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu May 30 09:41:10 MDT 1996", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.bib; http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cacm1990.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/129910.html", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "human factors; legal aspects; security", subject = "{\bf K.4.1}: Computing Milieux, COMPUTERS AND SOCIETY, Public Policy Issues, Privacy. {\bf K.6.5}: Computing Milieux, MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS, Security and Protection. {\bf K.4.2}: Computing Milieux, COMPUTERS AND SOCIETY, Social Issues, Abuse and crime involving computers. {\bf K.5.2}: Computing Milieux, LEGAL ASPECTS OF COMPUTING, Governmental Issues. {\bf H.4.3}: Information Systems, INFORMATION SYSTEMS APPLICATIONS, Communications Applications.", } @Article{Bauspiess:1992:RCH, author = "Fritz Bauspiess and Frank Damm", title = "Requirements for cryptographic hash functions", journal = j-COMPUT-SECUR, volume = "11", number = "5", pages = "427--437", day = "1", month = sep, year = "1992", CODEN = "CPSEDU", ISSN = "0167-4048", ISSN-L = "0167-4048", bibdate = "Sat May 25 13:29:25 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib; UnCover library database", acknowledgement = ack-nhfb, fjournal = "Computers and Security", } @Article{Beauquier:1992:TDP, author = "J. Beauquier", title = "Two distributed problems involving {Byzantine} processes", journal = j-THEOR-COMP-SCI, volume = "95", number = "1", pages = "169--185", day = "23", month = mar, year = "1992", CODEN = "TCSCDI", ISSN = "0304-3975 (print), 1879-2294 (electronic)", ISSN-L = "0304-3975", bibdate = "Sat Nov 22 13:24:22 MST 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/tcs1990.bib", acknowledgement = ack-nhfb, classification = "C4240P (Parallel programming and algorithm theory); C5640 (Protocols)", corpsource = "LRI-CNRS, Univ. Paris Sud, Orsay, France", fjournal = "Theoretical Computer Science", journal-URL = "http://www.sciencedirect.com/science/journal/03043975", keywords = "Byzantine faulty behavior; Byzantine processes; complexity; computational complexity; digital signature; distributed problems; distributed processing; message passing; mutual exclusion problem; naming problem; protocol; protocols; synchrony", pubcountry = "Netherlands", treatment = "P Practical; T Theoretical or Mathematical", } @Article{Bellare:1992:HSG, author = "Mihir Bellare and Silvio Micali", title = "How to Sign Given Any Trapdoor Permutation", journal = j-J-ACM, volume = "39", number = "1", pages = "214--233", month = jan, year = "1992", CODEN = "JACOAH", ISSN = "0004-5411 (print), 1557-735X (electronic)", ISSN-L = "0004-5411", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/jacm.bib", URL = "http://www.acm.org/pubs/toc/Abstracts/0004-5411/147537.html", abstract = "A digital signature scheme is presented, which is based on the existence of any trapdoor permutation. The scheme is secure in the strongest possible natural sense: namely, it is secure against existential forgery under adaptive chosen message attack.", acknowledgement = ack-nhfb, fjournal = "Journal of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J401", keywords = "Algorithms; cryptography; digital signatures; randomness; Security; Theory; Theory of Computation; trapdoor functions", subject = "{\bf F.2.m}: Theory of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY, Miscellaneous. {\bf G.3}: Mathematics of Computing, PROBABILITY AND STATISTICS, Probabilistic algorithms (including Monte Carlo). {\bf C.2.0}: Computer Systems Organization, COMPUTER-COMMUNICATION NETWORKS, General, Security and protection. {\bf D.4.6}: Software, OPERATING SYSTEMS, Security and Protection, Authentication. {\bf D.4.6}: Software, OPERATING SYSTEMS, Security and Protection, Cryptographic controls. {\bf E.3}: Data, DATA ENCRYPTION.", } @TechReport{Bellcore:1992:GRX, author = "{Bellcore}", title = "Generic Requirements for {X Window System} Security", number = "FA-STS-991324", institution = "Framework Technical Advisory", month = jun # " 30", year = "1992", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/epstein.bib", note = "Describes some of the problems associated with X in a commercial environment, and specifies solutions including Kerberos. Also talks about auditing in X.", acknowledgement = ack-nhfb, } @Article{Bennett:1992:QC, author = "Charles H. Bennett and Gilles Brassard and Artur K. Ekert", title = "Quantum Cryptography", journal = j-SCI-AMER, volume = "267", number = "4", pages = "50--?? (Int. ed. 26--??)", month = oct, year = "1992", CODEN = "SCAMAC", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Tue May 19 18:01:43 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/sciam.bib", abstract = "The desire to communicate in total secrecy is probably as old as humankind. Myriad codes and ciphers have been devised only to be broken by mathematicians. Quantum physics may finally give the communicating parties a decisive edge. Because observing a quantum phenomenon perturbs that which is seen, any attempt at eavesdropping will alert the legitimate users.", acknowledgement = ack-nhfb, fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", keywords = "code breaking; Heisenberg uncertainty principle; photon polarization; privacy amplification; public-key cryptography; quantum cryptographic devices; quantum key distribution; Vernam cipher", } @PhdThesis{Biham:1992:DCI, author = "Eli Biham", title = "Differential cryptanalysis of iterated cryptosystems", type = "Dissertation ({Ph.D.})", school = "Department of Applied Mathematics and Computer Science, Weizmann Institute of Science", address = "Rehovot, Israel", pages = "iii + 150", year = "1992", bibdate = "Sat May 14 07:16:28 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://lib-phds1/Dissertations/biham_eli.pdf", acknowledgement = ack-nhfb, advisor = "Adi Shamir", } @Article{Bishop:1992:FPC, author = "Matt Bishop", title = "{Foiling Password Cracking}", journal = j-UNIX-WORLD, volume = "9", number = "3", pages = "85--??", month = mar, year = "1992", ISSN = "0739-5922", bibdate = "Sat Jan 27 06:20:21 MST 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/opencomp.bib", abstract = "Often the weakest link in the security chain, passwords need to be carefully chosen to make them uncrackable. This tutorial explains UNIX's password scheme and how to pick better passwords", acknowledgement = ack-nhfb, fjournal = "UNIX/world", } @Article{Boyd:1992:FFA, author = "Colin Boyd", title = "A Formal Framework for Authentication", journal = j-LECT-NOTES-COMP-SCI, volume = "648", pages = "273--??", year = "1992", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:46:24 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Boyd:1992:RDE, author = "Colin Boyd and Tong Lai Yu", title = "Remarks on a Data Encryption Scheme of {Yu} and {Yu} (letters)", journal = j-CACM, volume = "35", number = "6", pages = "24--25", month = jun, year = "1992", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Tue Jan 28 14:53:17 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "See \cite{Yu:1991:SED}.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @InCollection{Brickell:1992:CSR, author = "E. F. Brickell and A. M. Odlyzko", title = "Cryptanalysis: a survey of recent results", crossref = "Simmons:1992:CCS", pages = "501--540", year = "1992", MRclass = "94A60 (68P25)", MRnumber = "1 205 139", bibdate = "Tue Nov 05 07:36:38 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib", URL = "http://www.research.att.com/~amo/doc/arch/cryptanalysis.surv.pdf; http://www.research.att.com/~amo/doc/arch/cryptanalysis.surv.ps; http://www.research.att.com/~amo/doc/arch/cryptanalysis.surv.tex", } @Article{Burmester:1992:EZK, author = "M. V. D. Burmester and Y. G. Desmedt and T. Beth", title = "Efficient Zero-Knowledge Identification Schemes for Smart Cards", journal = j-COMP-J, volume = "35", number = "1", pages = "21--29", month = feb, year = "1992", CODEN = "CMPJA6", ISSN = "0010-4620 (print), 1460-2067 (electronic)", ISSN-L = "0010-4620", bibdate = "Wed Jul 21 09:53:30 MDT 1999", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.bib; https://www.math.utah.edu/pub/tex/bib/compj1990.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; http://www3.oup.co.uk/computer_journal/Volume_35/Issue_01/Vol35_01.index.html", URL = "http://www3.oup.co.uk/computer_journal/Volume_35/Issue_01/Vol35_01.body.html#AbstractBurmester", acknowledgement = ack-nhfb, affiliation = "Dept. of Math., London Univ., Egham, UK", author-1-adr = "Department of Mathematics, University of London -- RHBNC, Egham, Surrey TW2O OEX", author-2-adr = "Department of EE {\&} CS, University of Wisconsin Milwaukee, P.O. Box 784, WI 53201, USA", author-3-adr = "European Institute for System Security, Universit{\"a}t Karlsruhe, Fakult{\"a}t f{\"u}r Informatik, D-7500 Karlsruhe, Germany", classcodes = "B6120B (Codes); C6130S (Data security); C4240 (Programming and algorithm theory)", classification = "B6120B (Codes); C4240 (Programming and algorithm theory); C6130S (Data security)", corpsource = "Dept. of Math., London Univ., Egham, UK", fjournal = "The Computer Journal", journal-URL = "http://comjnl.oxfordjournals.org/", keywords = "Chaum-; Chaum-Evertse-van de Graaf; computational complexity; Computer fraud; computer fraud; cryptography; Electronic passport; electronic passport; Evertse-van de Graaf; Fiat--Shamir; Guillou-Quisquater; Masquerading; masquerading; Security; security; security of data; Smart cards; smart cards; Zero-knowledge identification; zero-knowledge identification", thesaurus = "Computational complexity; Cryptography; Security of data; Smart cards", treatment = "T Theoretical or Mathematical", } @Article{Callimahos:1992:HC, author = "Lambros D. Callimahos", title = "A History of Cryptology", journal = j-CRYPTOLOG, volume = "19", number = "3", pages = "23--35", month = jun, year = "1992", ISSN = "0740-7602", ISSN-L = "0740-7602", bibdate = "Sun Dec 24 09:26:32 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "https://archive.org/download/cryptolog_125/cryptolog_125.pdf", acknowledgement = ack-nhfb, } @Article{Chaum:1992:AEPa, author = "David Chaum", title = "Achieving Electronic Privacy", journal = j-SCI-AMER, volume = "267", number = "2", pages = "96--?? (Intl. ed. 76--81)", month = aug, year = "1992", CODEN = "SCAMAC", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Thu Jan 28 14:31:51 MST 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "All of your electronic transactions, from credit card purchases to bank withdrawals, are creating a digital dossier of your life. The author proposes an encryption system that would allow individuals and institutions to take advantage of the benefits of computer communications while protecting privacy.", acknowledgement = ack-nhfb, affiliation = "Center for Math. and Comput. Sci., Amsterdam, Netherlands", classification = "C6130S (Data security); C7120 (Finance)", corpsource = "Center for Math. and Comput. Sci., Amsterdam, Netherlands", fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", keywords = "Blind signature; blind signature; blind signature cryptography; credentials; Credentials; credit card; Credit card; credit transactions; cryptographic invention; Cryptographic invention; cryptography; data privacy; database; Database; digital credentials; Digital signature; digital signature; EFTS; electronic cash; Electronic cash; electronic privacy; Electronic privacy; electronic privacy; Identification; identification; Numbers; numbers; Personal information; personal information; private keys; public keys; Representative; representative; secure digital pseudonyms; smart credit cards; Untraceable transactions; untraceable transactions", thesaurus = "Credit transactions; Cryptography; Data privacy; EFTS", treatment = "A Application; G General Review", xxjournal = j-SCI-AMER-INT-ED, xxnewdata = "1998.01.30", } @Article{Chaum:1992:AEPb, author = "D. Chaum", title = "Achieving electronic privacy", journal = j-SCI-AMER-INT-ED, volume = "267", number = "2", pages = "76--81", month = aug, year = "1992", CODEN = "SCAMAC", ISSN = "0036-8733 (print), 1946-7087 (electronic)", bibdate = "Mon May 18 08:08:24 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/sciam.bib", acknowledgement = ack-nhfb, affiliation = "Center for Math. and Comput. Sci., Amsterdam, Netherlands", classification = "C6130S (Data security); C7120 (Finance)", corpsource = "Center for Math. and Comput. Sci., Amsterdam, Netherlands", keywords = "Blind signature; blind signature; Credentials; credentials; Credit card; credit card; credit transactions; Cryptographic invention; cryptographic invention; cryptography; data privacy; Database; database; Digital signature; digital signature; EFTS; Electronic cash; electronic cash; Electronic privacy; electronic privacy; Identification; identification; Numbers; numbers; Personal information; personal information; Representative; representative; Untraceable transactions; untraceable transactions", thesaurus = "Credit transactions; Cryptography; Data privacy; EFTS", treatment = "A Application; G General Review", } @InProceedings{Cheswick:1992:EBW, author = "Bill Cheswick", title = "An Evening with {Berferd} in Which a Cracker is Lured, Endured, and Studied", crossref = "USENIX:1992:PWU", pages = "163--174", month = "Winter", year = "1992", bibdate = "Fri Oct 18 07:24:24 MDT 1996", bibsource = "ftp://ftp.uu.net/library/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, affiliation = "AT\&T Bell Laboratories, Murray Hill", } @Article{Chiopris:1992:SBE, author = "Carlo Chiopris", title = "The {SECReTS} Banking Expert System from Phase 1 to Phase 2", journal = j-LECT-NOTES-COMP-SCI, volume = "636", pages = "91--??", year = "1992", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:46:24 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Coster:1992:ILD, author = "M. J. Coster and A. Joux and B. A. LaMacchia and A. M. Odlyzko and C. P. Schnorr and J. Stern", title = "Improved low-density subset sum algorithms", journal = j-COMPUT-COMPLEX, volume = "2", number = "??", pages = "111--128", month = "????", year = "1992", CODEN = "CPTCEU", ISSN = "1016-3328", ISSN-L = "1016-3328", bibdate = "Mon Jul 19 06:32:10 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.research.att.com/~amo/doc/arch/better.low.density.pdf; http://www.research.att.com/~amo/doc/arch/better.low.density.ps; http://www.research.att.com/~amo/doc/arch/better.low.density.tex", acknowledgement = ack-nhfb, fjournal = "Computational complexity", } @Article{Crawford:1992:AS, author = "David J. Crawford and Philip E. {Fox (ed.)}", title = "The {Autoscritcher} and the {Superscritcher}", journal = j-IEEE-ANN-HIST-COMPUT, volume = "14", number = "3", pages = "9--22", month = jul # "--" # sep, year = "1992", CODEN = "IAHCEX", DOI = "https://doi.org/10.1109/85.150065", ISSN = "1058-6180 (print), 1934-1547 (electronic)", ISSN-L = "1058-6180", bibdate = "Thu Jul 12 06:22:54 MDT 2001", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://dlib.computer.org/an/books/an1992/pdf/a3009.pdf; http://www.computer.org/annals/an1992/a3009abs.htm", acknowledgement = ack-nhfb, fjournal = "IEEE Annals of the History of Computing", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=85", keywords = "Bletchley Park; cryptography", } @Article{Crawford:1992:ASA, author = "David J. Crawford", title = "{Autoscritcher} and the superscritcher: Aids to cryptanalysis of the {German Enigma} cipher machine, 1944--1946", journal = j-ANN-HIST-COMPUT, volume = "14", number = "3", pages = "9--22", month = jul # "\slash " # sep, year = "1992", CODEN = "AHCOE5", ISSN = "0164-1239", bibdate = "Sat Jul 14 18:57:39 2001", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Annals of the History of Computing", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650", } @Article{Daemen:1992:HDM, author = "Joan Daemen and Rene Govaerts and Joos Vandewalle", title = "A Hardware Design Model for Cryptographic Algorithms", journal = j-LECT-NOTES-COMP-SCI, volume = "648", pages = "419--??", year = "1992", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:46:24 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1992.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Dawid:1992:BSC, author = "H. Dawid and G. Fettweis", booktitle = "GLOBECOM '92. Communication for Global Users. IEEE Global Telecommunications Conference. Conference Record", title = "Bit-level systolic carry-save array division", publisher = pub-IEEE, address = pub-IEEE:adr, bookpages = "xlviii + 1920", pages = "484--488 (vol. 1)", year = "1992", ISBN = "0-7803-0608-2 (softbound), 0-7803-0609-0 (casebound), 0-7803-0610-4 (microfiche)", ISBN-13 = "978-0-7803-0608-0 (softbound), 978-0-7803-0609-7 (casebound), 978-0-7803-0610-3 (microfiche)", LCCN = "TK5101.A1 I243 1992", bibdate = "Tue Dec 12 09:27:13 MST 1995", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/fparith.bib", note = "Three volumes. IEEE catalog no. 92CH3130-2.", abstract = "A bit-level systolic carry-save division array that allows bit-level pipelining, just as for carry-save array multipliers, is presented. This architecture leads to very fast, efficient and regular division implementations as needed in digital signal processing (DSP) applications such as speech processing or cryptography. The architecture is very well suited for integer division as well as for the division of normalized fixed-point mantissas used in floating-point number system implementations.", acknowledgement = ack-nhfb, affiliation = "Aachen Univ. of Technol., Germany", classification = "B1265B (Logic circuits); C5130 (Microprocessor chips); C5230 (Digital arithmetic methods); C5260 (Digital signal processing)", confdate = "6-9 Dec. 1992", conflocation = "Orlando, FL, USA", confsponsor = "IEEE", keywords = "Bit-level pipelining; Carry-save array multipliers; Cryptography; Digital signal processing; DSP; Floating-point number system; Integer division; Normalized fixed-point mantissas; Speech processing; Systolic carry-save array division", language = "English", pubcountry = "USA", thesaurus = "Digital arithmetic; Systolic arrays", } @InProceedings{DeDecker:1992:HID, author = "Bart {De Decker} and Els {Van Herreweghen} and Frank Piessens and K. U. Leuven", title = "Heterogeneous Intra-Domain Authentication", crossref = "USENIX:1992:USI", pages = "285--298", day = "14--17", month = sep, year = "1992", bibdate = "Wed Aug 13 10:48:45 MDT 1997", bibsource = "ftp://ftp.uu.net/library/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; http://www.usenix.org/cgi-bin/sortbib.pl?-sA", acknowledgement = ack-nhfb, keywords = "unix security; USENIX", } @Article{Desmedt:1992:BTC, author = "Yvo Desmedt", title = "Breaking the Traditional Computer Security Research Barriers", journal = j-LECT-NOTES-COMP-SCI, volume = "648", pages = "125--138", year = "1992", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:46:24 MDT 1996", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1992.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/021114.html", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "information hiding; steganography", xxtitle = "Breaking the Traditional Computer Security Barriers", } @Article{Diffie:1992:AAK, author = "Whitfield Diffie and Paul C. {van Oorschot} and Michael J. Wiener", title = "Authentication and authenticated key exchanges", journal = j-DESIGNS-CODES-CRYPTOGR, volume = "2", number = "2", pages = "107--125", month = jun, year = "1992", CODEN = "DCCREC", DOI = "https://doi.org/10.1007/BF00124891", ISSN = "0925-1022 (print), 1573-7586 (electronic)", ISSN-L = "0925-1022", bibdate = "Wed Feb 10 09:30:50 MST 1999", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Designs, codes, and cryptography", journalabr = "Des Codes Cryptography", referencedin = "Referenced in \cite[Ref. 12]{Canetti:1997:PSL}.", } @Book{Drea:1992:MUC, author = "Edward J. Drea", title = "{MacArthur}'s {ULTRA}: codebreaking and the war against {Japan}, 1942--1945", publisher = "University Press of Kansas", address = "Lawrence, KS, USA", pages = "xv + 296", year = "1992", ISBN = "0-7006-0504-5, 0-7006-0576-2 (paperback)", ISBN-13 = "978-0-7006-0504-0, 978-0-7006-0576-7 (paperback)", LCCN = "D767 .D66 1992", bibdate = "Thu Dec 28 09:25:20 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; z3950.loc.gov:7090/Voyager", series = "Modern war studies", abstract = "No one writing on military operations in the Southwest Pacific will be able to ignore this book: William M. Leary, editor of \booktitle{We Shall Return: MacArthur's Commanders and the Defeat of Japan, 1941-=1945}. Adds significantly to our understanding of the war and of MacArthur as commander and strategist: Stanley L. Falk, author of \booktitle{0Bataan: The March of Death}. A `must' item for analysis of the Pacific war: Harold Deutsch, author of \booktitle{Hitler and His Generals}. Author Biography: Edward J. Drea is chief of the Research and Analysis Division at the US Army Center of Military History in Washington, DC, and author of \booktitle{The 1942 Japanese General Election}. He is fluent in Japanese. On the Military Intelligence History Reading List 2012.", acknowledgement = ack-nhfb, author-dates = "1944--", subject = "World War, 1939-1945; Campaigns; Pacific Area; Cryptography; Military intelligence; MacArthur, Douglas; Military leadership; History", subject-dates = "1880--1964", tableofcontents = "MacArthur's codebreaking organization \\ ULTRA's trials and errors, 1942 \\ Breaking into the Japanese army code, January 1943--January 1944 \\ ULTRA's great victory: the Hollandia operation, January 1943--January 1944 \\ Misreading ULTRA, May--September 1944 \\ The missing division: Leyte, 1944 \\ The numbers game: Luzon, January--June 1945 \\ ULTRA as seer: uncovering Japanese plans for homeland defense, June--August 1945", } @Article{Evertse:1992:WNR, author = "Jan-Hendrik Evertse and Eug{\`e}ne {van Heyst}", title = "Which new {RSA}-signatures can be computed from certain given {RSA}-signatures?", journal = j-J-CRYPTOLOGY, volume = "5", number = "1", pages = "41--52", month = "????", year = "1992", CODEN = "JOCREQ", ISSN = "0933-2790 (print), 1432-1378 (electronic)", ISSN-L = "0933-2790", MRclass = "94A60", MRnumber = "93g:94010", MRreviewer = "Hirosuke Yamamoto", bibdate = "Sat Nov 21 16:36:38 MST 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, affiliation = "Univ of Leiden", affiliationaddress = "Leiden, Neth", classification = "723; 921", fjournal = "Journal of Cryptology", journal-URL = "http://link.springer.com/journal/145", journalabr = "J Cryptol", keywords = "Analysis; Computer Programming --- Algorithms; Cryptographic Protocol; Cryptography; Mathematical Techniques --- Number Theory; rsa Signatures", referencedin = "Referenced in \cite[Ref. 9]{Kaliski:1995:SUR}.", } @Article{Farrow:1992:HIY, author = "Rik Farrow", title = "{How to Improve Your System Security}", journal = j-UNIX-WORLD, volume = "9", number = "4", pages = "59--??", month = apr, year = "1992", ISSN = "0739-5922", bibdate = "Sat Jan 27 06:20:21 MST 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "Keeping UNIX systems secure requires more than sophisticated software and undecipherable passwords, it begins with an enforceable security policy", acknowledgement = ack-nhfb, fjournal = "UNIX/world", } @Article{Feigenbaum:1992:CPM, author = "Joan Feigenbaum and Eric Grosse and James A. Reeds", title = "Cryptographic Protection of Membership Lists", journal = j-N-I-A-CR, volume = "9", number = "1", pages = "16--20", year = "1992", bibsource = "https://www.math.utah.edu/pub/bibnet/authors/g/grosse-eric.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "ftp://cm.bell-labs.com/cm/cs/doc/91/4-12.ps.Z", acknowledgement = ack-nhfb, fjournal = "Newsletter of the International Association for Cryptologic Research", } @Article{Fiat:1992:NH, author = "Amos Fiat and Moni Naor and Jeanette P. Schmidt and Alan Siegel", title = "Nonoblivious Hashing", journal = j-J-ACM, volume = "39", number = "4", pages = "764--782", month = oct, year = "1992", CODEN = "JACOAH", ISSN = "0004-5411 (print), 1557-735X (electronic)", ISSN-L = "0004-5411", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/jacm.bib", URL = "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146591.html", abstract = "Nonoblivious hashing, where information gathered from unsuccessful probes is used to modify subsequent probe strategy, is introduced and used to obtain the following results for static lookup on full tables: \begin{enumerate} \item An $ O(1)$-time worst-case scheme that uses only logarithmic additional memory, (and no memory when the domain size is linear in the table size), which improves upon previously linear space requirements. \item An almost sure $ O(1)$-time probabilistic worst-case scheme, which uses no additional memory and which improves upon previously logarithmic time requirements. \item Enhancements to hashing: (1) and (2) are solved for multikey records, where search can be performed under any key in time $ O(1)$; these schemes also permit properties, such as nearest neighbor and rank, to be determined in logarithmic time. \end{enumerate}", acknowledgement = ack-nhfb, fjournal = "Journal of the Association for Computing Machinery", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J401", keywords = "$O(1)$ probe search; Algorithms; Analysis of Algorithms; dictionary problem; model of computation; oblivious and nonoblivious search; perfect hashing; Theory; upper and lower bounds", subject = "{\bf F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and Problems, Routing and layout. {\bf E.1}: Data, DATA STRUCTURES, Tables. {\bf E.2}: Data, DATA STORAGE REPRESENTATIONS, Hash-table representations. {\bf E.4}: Data, CODING AND INFORMATION THEORY, Nonsecret encoding schemes. {\bf H.3.3}: Information Systems, INFORMATION STORAGE AND RETRIEVAL, Information Search and Retrieval, Search process.", } @Article{Francis:1992:PSG, author = "B. Francis", title = "{PC} security grows up", journal = j-DATAMATION, volume = "38", number = "22", pages = "61--62, 64", month = nov, year = "1992", CODEN = "DTMNAT", ISSN = "0011-6963", bibdate = "Sat Sep 14 11:45:48 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, classification = "D1060 (Security)", fjournal = "Datamation", keywords = "CA-ACF2/PC; CA-Top Secret/PC; Computer Associates International; Fifth Generation Systems; Net/DACS; PC network security; PC security management; PC/DACS; Pyramid Development Corporation; SAFF; Software", language = "English", pubcountry = "USA", thesaurus = "Microcomputers; Security of data", } @TechReport{Frankel:1992:PRT, author = "Y. Frankel and Y. Desmedt", title = "Parallel reliable threshold multisignature", type = "Technical Report", number = "TR-92-04-02", institution = "Department of EE \& CS, University of Wisconsin-Milwaukee", address = "Milwaukee, WI, USA", pages = "??", month = apr, year = "1992", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 17]{Gemmell:1997:ITC}.", } @Book{Friedman:1992:MC, author = "William F. (William Frederick) Friedman", title = "Military cryptanalysis", number = "30, 40, 60-61", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, year = "1992", ISBN = "0-89412-044-1 (pt. 1), 0-89412-064-6 (pt. 2), 0-89412-196-0 (pt. 3), 0-89412-198-7 (soft: pt. 4)", ISBN-13 = "978-0-89412-044-2 (pt. 1), 978-0-89412-064-0 (pt. 2), 978-0-89412-196-8 (pt. 3), 978-0-89412-198-2 (soft: pt. 4)", LCCN = "Z103.5.F77 1992", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = "A cryptographic series", acknowledgement = ack-nhfb, annote = "pt. 1. Monoalphabetic substitution systems --- pt. 2. Simpler varieties of polyalphabetic substitution systems --- pt. 3. Simpler varieties of aperiodic substitution systems --- pt. 4. Transportation and fractionating systems.", author-dates = "1891--1969", keywords = "Ciphers; Cryptography.", } @Book{Friedman:1992:MCP, author = "William F. (William Frederick) Friedman", title = "Military cryptanalysis. Part {III}, Simpler varieties of aperiodic substitution systems", volume = "60", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "189", year = "1992", ISBN = "0-89412-196-0", ISBN-13 = "978-0-89412-196-8", LCCN = "Z103.5.F77 1992", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = "Cryptographic series", acknowledgement = ack-nhfb, alttitle = "Simpler varieties of aperiodic substitution systems.", annote = "Reprint of a U.S. military text, originally published in 1939. Declassified December 1992.", author-dates = "1891--1969", keywords = "Ciphers; Communications, Military; Cryptography", } @InProceedings{Gollmann:1992:ATC, author = "D. Gollmann", booktitle = "Cryptography and coding, II (Cirencester, 1989)", title = "Automata theory and cryptanalysis", volume = "33", publisher = pub-OXFORD, address = pub-OXFORD:adr, pages = "67--74", year = "1992", MRclass = "94A60 (68Q68)", MRnumber = "93a:94023", bibdate = "Sat Oct 26 10:21:29 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = "Inst. Math. Appl. Conf. Ser. New Ser.", } @Article{Gong:1992:SRD, author = "Li Gong", title = "A security risk of depending on synchronized clocks", journal = j-OPER-SYS-REV, volume = "26", number = "1", pages = "49--53", month = jan, year = "1992", CODEN = "OSRED8", ISSN = "0163-5980 (print), 1943-586X (electronic)", ISSN-L = "0163-5980", bibdate = "Sat Aug 26 08:55:36 MDT 2006", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Operating Systems Review", } @Book{Hafner:1992:COH, author = "Katie Hafner and John Markoff", title = "Cyberpunk: Outlaws and Hackers on the Computer Frontier", publisher = pub-SIMON-SCHUSTER, address = pub-SIMON-SCHUSTER:adr, edition = "First {Touchstone}", pages = "368", year = "1992", ISBN = "0-671-77879-X", ISBN-13 = "978-0-671-77879-8", LCCN = "QA76.9.A25 H28 1992", bibdate = "Tue Nov 24 10:14:09 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Hauser:1992:VMA, author = "Ralf C. Hauser and E. Stewart Lee", title = "Verification and Modelling of Authentication Protocols", journal = j-LECT-NOTES-COMP-SCI, volume = "648", pages = "141--??", year = "1992", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:46:24 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{He:1992:IKB, author = "Jing Min He", title = "An improved knapsack-based public key cryptosystem", journal = "J. Tsinghua Univ.", volume = "32", number = "4", pages = "86--91", year = "1992", CODEN = "QDXKE8", ISSN = "1000-0054", MRclass = "94A60", MRnumber = "93i:94011", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Journal of Tsinghua University. Science and Technology. Qinghua Daxue Xuebao. Ziran Kexue Ban", } @Article{Horgan:1992:CSP, author = "J. Horgan", title = "{Claude E. Shannon} [Profile]", journal = j-IEEE-SPECTRUM, volume = "29", number = "4", pages = "72--75", month = apr, year = "1992", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.1992.672257", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Thu Jan 16 07:37:23 2020", bibsource = "https://www.math.utah.edu/pub/bibnet/authors/s/shannon-claude-elwood.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum1990.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Biographies; Cryptography; Decoding; Mathematics", } @Article{Hwang:1992:AOT, author = "Tzonelih Hwang", title = "Attacks on {Okamoto} and {Tanaka}'s one-way {ID}-based key distribution system", journal = j-INFO-PROC-LETT, volume = "43", number = "2", pages = "83--86", day = "24", month = aug, year = "1992", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, classification = "B6120B (Codes); C6130S (Data security)", corpsource = "Inst. of Inf. Eng., Nat. Cheng Kung Univ., Tainan, Taiwan", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", keywords = "cryptography; data security; one-way ID-based key distribution system; private communications", treatment = "T Theoretical or Mathematical", } @Article{Hwang:1992:EIB, author = "Tzonelih Hwang", title = "Efficient {ID}-based key distribution with tamperfree devices", journal = j-INFO-PROC-LETT, volume = "44", number = "1", pages = "31--34", day = "9", month = nov, year = "1992", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, affiliation = "Natl Cheng Kung Univ", affiliationaddress = "Tainan, Taiwan", classification = "716.1; 723.2; 731.2; B6120B (Codes); C6130S (Data security)", corpsource = "Inst. of Inf. Eng., Nat. Cheng Kung Univ., Tainan, Taiwan", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "Codes (symbols); Cryptography; cryptography; Data processing; ID based cryptosystems; ID-based key distribution; Identification (control systems); Key distribution; message authentication; private-key cryptosystems; Security of data; security scheme; Security systems; Sender authentication; sender authentication; supersecret keys; Tamperfree devices; tamperfree devices", treatment = "T Theoretical or Mathematical", } @Article{Hwang:1992:EIK, author = "Tzonelih Hwang", title = "Efficient {ID}-based key distribution with tamperfree devices", journal = j-INFO-PROC-LETT, volume = "44", number = "1", pages = "31--34", day = "09", month = nov, year = "1992", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Wed Jan 29 09:23:05 MST 1997", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/infoproc.bib", acknowledgement = ack-nhfb, affiliation = "Natl Cheng Kung Univ", affiliationaddress = "Tainan, Taiwan", classification = "716.1; 723.2; 731.2", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "Codes (symbols); Cryptography; Data processing; ID based cryptosystems; Identification (control systems); Key distribution; Security of data; Security systems; Sender authentication; Tamperfree devices", } @Article{Hwang:1992:PGO, author = "Tzonelih Hwang", title = "Protocols for group oriented secret sharing", journal = j-INFO-PROC-LETT, volume = "42", number = "4", pages = "179--182", day = "19", month = jun, year = "1992", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/infoproc.bib", acknowledgement = ack-nhfb, affiliation = "Natl Cheng Kung Univ", affiliationaddress = "Tainan, Taiwan", classification = "723; 921; B6120B (Codes); B6150M (Protocols); C1260 (Information theory); C6130S (Data security)", corpsource = "Inst. of Inf. Eng., Nat. Cheng Kung Univ., Tainan, Taiwan", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "authenticate; ciphertext; Communication Security; Cryptography; cryptography; Cryptography; decryption keys; discrete logarithm problem; encrypted message; encryption keys; Group Oriented Cryptography; group oriented cryptography; Group Oriented Cryptography; group oriented secret sharing; information destination; information sender; Mathematical Techniques --- Interpolation; Mathematical Techniques --- Polynomials; message broadcast; protocols; receiving group", treatment = "T Theoretical or Mathematical", } @PhdThesis{Impagliazzo:1992:PGP, author = "Russell Graham Impagliazzo", title = "Pseudo-random generators for probabilistic algorithms and for cryptography", type = "Thesis ({Ph.D.} in Mathematics)", school = "Department of Mathematics, University of California, Berkeley", address = "Berkeley, CA, USA", pages = "105", month = dec, year = "1992", LCCN = "????", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, keywords = "dissertations, academic --- UCB --- mathematics --- 1991--2000; University of California, Berkeley. Dept. of Mathematics --- dissertations", } @Article{Kaliski:1992:MAC, author = "Burton S. {Kaliski, Jr.}", title = "Multiple-precision arithmetic in {C}", journal = j-DDJ, volume = "17", number = "8", pages = "40, 42, 44, 46--48, 116--119", month = aug, year = "1992", CODEN = "DDJOEB", ISSN = "1044-789X", bibdate = "Tue Sep 10 10:06:23 MDT 1996", bibsource = "http://www.ddj.com/index/author/index.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib; UnCover database", abstract = "Adding and subtracting 8- or 16-bit numbers used to be enough. But where do you start if you want to add, subtract, multiply, or divide 64-, 128-, or 512-bit numbers --- particularly when using a language like C that currently supports only 32 bits\ldots{}.", acknowledgement = ack-nhfb, classification = "C6110 (Systems analysis and programming); C6130S (Data security); C7310 (Mathematics)", fjournal = "Dr. Dobb's Journal of Software Tools", keywords = "C programs; Cryptographic toolkit; Multiple precision arithmetic; Portable code; RSAREF", thesaurus = "C listings; Cryptography; Digital arithmetic; Mathematics computing; Programming; Software portability", } @Article{Kehne:1992:NBP, author = "A. Kehne and J. Sch{\"o}nw{\"a}lder and H. Langend{\"o}rfer", title = "A nonce-based protocol for multiple authentications", journal = j-OPER-SYS-REV, volume = "26", number = "4", pages = "84--89", month = oct, year = "1992", CODEN = "OSRED8", ISSN = "0163-5980 (print), 1943-586X (electronic)", ISSN-L = "0163-5980", bibdate = "Sat Aug 26 08:55:51 MDT 2006", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Operating Systems Review", } @Article{Kirstein:1992:PAS, author = "P. T. Kirstein and P. Williams", title = "Piloting authentication and security services within {OSI} applications for {RTD} information ({PASSWORD})", journal = j-COMP-NET-ISDN, volume = "25", number = "4--5", pages = "483--??", month = nov, year = "1992", CODEN = "CNISE9", ISSN = "0169-7552 (print), 1879-2324 (electronic)", ISSN-L = "0169-7552", bibdate = "Wed Sep 22 18:15:30 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Computer Networks and ISDN Systems", journal-URL = "http://www.sciencedirect.com/science/journal/01697552", } @Article{Knowles:1992:AFC, author = "Brad Knowles and Roger Schlafly and Grant D. Schultz and Lynn Zelvin and Paul Heckel and E. Robert Yoches", title = "{ACM Forum}: Comments on Cryptography", journal = j-CACM, volume = "35", number = "11", pages = "19--24, 112", month = nov, year = "1992", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Sat Feb 01 07:59:00 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm1990.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @TechReport{Knudsen:1992:CL, author = "Lars Ramkilde Knudsen", title = "Cryptanalysis of {LOKI}", type = "Technical Report", number = "DAIMI PB-403", institution = "Computer Science Department, Aarhus University", address = "{\AA}rhus, Denmark", pages = "17", month = jul, year = "1992", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "In [BrPiSe90] Brown, Pieprzyk and Seberry proposed a new encryption primitive, which encrypts and decrypts a 64-bit block of data using a 64-bit key. Furthermore they propose a way to build private versions of LOKI. In this paper we show first that the keyspace of any LOKI-version is only 2p60s, not 2p64 sas claimed. Therefore there are 15 equivalent keys for every key, that encrypts/decrypts texts the same way. An immediate consequence is, that the proposed Single Block Hash Mode is no good. It is very easy to find collisions. Secondly we do differential cryptanalysis on LOKI and show that n-round LOKI, n [< or =] 14 is vulnerable to this kind of attack, at least in principle. We show that we cannot find a characteristic with a probability high enough to break LOKI with 16 rounds. However one might find a private LOKI-version, that is vulnerable to a differential attack for n=16. Finally we consider differentials, introduced in [LMM91], versus characteristics, introduced in [BiSha90].", acknowledgement = ack-nhfb, keywords = "Cryptography.", } @InProceedings{Krishnakumar:1992:HTE, author = "Narayanan Krishnakumar and Arthur J. Bernstein", title = "High Throughput Escrow Algorithms for Replicated Databases", crossref = "Yuan:1992:VLD", pages = "175--186", year = "1992", bibdate = "Fri Jan 12 07:50:33 MST 2001", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; http://www.vldb.org/dblp/db/conf/vldb/vldb92.html", URL = "http://www.vldb.org/dblp/db/conf/vldb/KrishnakumarB92.html", acknowledgement = ack-nhfb, authorurl = "http://www.vldb.org/dblp/db/indices/a-tree/k/Krishnakumar:Narayanan.html; http://www.vldb.org/dblp/db/indices/a-tree/b/Bernstein:Arthur_J=.html", } @InCollection{Kucera:1992:GES, author = "Lud{\v{e}}k Ku{\v{c}}era", booktitle = "Graph-theoretic concepts in computer science (Fischbachau, 1991)", title = "A generalized encryption scheme based on random graphs", volume = "570", publisher = pub-SV, address = pub-SV:adr, pages = "180--186", year = "1992", MRclass = "94A60 (05C80)", MRnumber = "1 245 056", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; MathSciNet database", series = "Lecture Notes in Comput. Sci.", } @InProceedings{Kurak:1992:CNI, author = "C. Kurak and J. McHugh", title = "A Cautionary Note on Image Downgrading", crossref = "IEEE:1992:PEA", pages = "153--159", year = "1992", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1012.html", acknowledgement = ack-nhfb, keywords = "information hiding; steganography", } @Article{Kwok-Yan:1992:FAA, author = "Lam Kwok-Yan and Dieter Gollmann", title = "Freshness Assurance of Authentication Protocols", journal = j-LECT-NOTES-COMP-SCI, volume = "648", pages = "261--??", year = "1992", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:46:24 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Kwok-Yan:1992:TAD, author = "Lam Kwok-Yan and Thomas Beth", title = "Timely Authentication in Distributed Systems", journal = j-LECT-NOTES-COMP-SCI, volume = "648", pages = "293--??", year = "1992", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:46:24 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Book{Lai:1992:DSB, author = "Xuejia Lai", title = "On the design and security of block ciphers", publisher = pub-HARTUNG-GORRE, address = pub-HARTUNG-GORRE:adr, pages = "xii + 108", year = "1992", ISBN = "3-89191-573-X", ISBN-13 = "978-3-89191-573-8", LCCN = "QA76.9.A25L335 1992", bibdate = "Sun Jul 17 11:09:41 1994", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", note = "This is the author's {Ph.D.} dissertation. ``Secret-key block ciphers are the subject of this work. The design and security of block ciphers, together with their application in hashing techniques, are considered. In particular, iterated block ciphers that are based on iterating a weak round function several times are considered. Four basic constructions for the round function of an iterated cipher are studied.''", acknowledgement = ack-nhfb, } @InProceedings{Lai:1992:MCD, author = "X. Lai and J. L. Massey and S. Murphy", editor = "????", booktitle = "{Advances in Cryptology, Proceedings of EUROCRYPT 91}", title = "{Markov} ciphers and differential cryptanalysis", volume = "547", publisher = pub-SV, address = pub-SV:adr, pages = "17--38", year = "1992", bibdate = "Thu Sep 22 18:52:07 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = ser-LNCS, acknowledgement = ack-nhfb, } @Article{Lampson:1992:ADS, author = "Butler Lampson and Mart{\'\i}n Abadi and Michael Burrows and Edward Wobber", title = "Authentication in Distributed Systems: Theory and Practice", journal = j-TOCS, volume = "10", number = "4", pages = "265--310", month = nov, year = "1992", CODEN = "ACSYEC", ISSN = "0734-2071 (print), 1557-7333 (electronic)", ISSN-L = "0734-2071", bibdate = "Wed Jan 13 18:36:53 MST 1999", bibsource = "http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org:80/pubs/citations/journals/tocs/1992-10-4/p265-lampson/", abstract = "We describe a theory of authentication and a system that implements it. Our theory is based on the notion of principal and a ``speaks for'' relation between principals. A simple principal either has a name or is a communication channel; a compound principal can express an adopted role or delegated authority. The theory shows how to reason about a principal's authority by deducing the other principals that it can speak for; authenticating a channel is one important application. We use the theory to explain many existing and proposed security mechanisms. In particular, we describe the system we have built. It passes principals efficiently as arguments or results of remote procedure calls, and it handles public and shared key encryption, name lookup in a large name space, groups of principals, program loading, delegation, access control, and revocation.", acknowledgement = ack-nhfb, fjournal = "ACM Transactions on Computer Systems", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774", keywords = "security; theory; verification", subject = "{\bf D.4.6} Software, OPERATING SYSTEMS, Security and Protection, Authentication. {\bf D.4.6} Software, OPERATING SYSTEMS, Security and Protection, Access controls. {\bf D.4.6} Software, OPERATING SYSTEMS, Security and Protection, Cryptographic controls. {\bf C.2.4} Computer Systems Organization, COMPUTER-COMMUNICATION NETWORKS, Distributed Systems. {\bf E.3} Data, DATA ENCRYPTION. {\bf K.6.5} Computing Milieux, MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS, Security and Protection, Authentication.", } @Article{Lassak:1992:SRP, author = "Miroslav La{\v{s}}{\v{s}}{\'a}k", title = "Some remarks on the {Peth{\H{o}}} public key cryptosystem", journal = "Ast\'erisque", volume = "209", pages = "15, 257--264", year = "1992", ISSN = "0303-1179", MRclass = "11T71 (94A60)", MRnumber = "94e:11135", MRreviewer = "Kaisa Nyberg", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Journ{\'e}es Arithm{\'e}tiques, 1991 (Geneva)", fjournal = "Ast\'erisque", } @Book{Lewis:1992:SCP, author = "Frank W. Lewis", title = "Solving cipher problems: cryptanalysis, probabilities and diagnostics", volume = "58", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "v + 253 + 12", year = "1992", ISBN = "0-89412-179-0, 0-89412-178-2", ISBN-13 = "978-0-89412-179-1, 978-0-89412-178-4", LCCN = "????", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = "A Cryptographic series", acknowledgement = ack-nhfb, keywords = "Ciphers; Cryptography.", } @Article{Lin:1992:RCD, author = "C. H. Lin and C. C. Chang and R. C. T. Lee", title = "A Record-Oriented Cryptosystem for Database Sharing", journal = j-COMP-J, volume = "35", number = "6", pages = "658--660", month = dec, year = "1992", CODEN = "CMPJA6", ISSN = "0010-4620 (print), 1460-2067 (electronic)", ISSN-L = "0010-4620", bibdate = "Tue Mar 25 13:51:56 MST 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/compj1990.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, affiliation = "Inst. of Comput. Sci., Nat. Tsing Hua Univ., Hsinchu, Taiwan", classcodes = "C6130S (Data security); C6160 (Database management systems (DBMS)); C7250L (Non-bibliographic systems)", classification = "C6130S (Data security); C6160 (Database management systems (DBMS)); C7250L (Non-bibliographic systems)", corpsource = "Inst. of Comput. Sci., Nat. Tsing Hua Univ., Hsinchu, Taiwan", fjournal = "The Computer Journal", journal-URL = "http://comjnl.oxfordjournals.org/", keywords = "cryptography; cryptosystem; Cryptosystem; database management systems; database sharing; Database sharing; encryption system; Encryption system; encryption/decryption scheme; Encryption/decryption scheme; field; Field; management; record-oriented; Record-oriented; record-oriented cryptosystem; Record-oriented cryptosystem; records; security; Security; storage; Storage", thesaurus = "Cryptography; Database management systems; Records management", treatment = "P Practical", } @Misc{Lloyd:1992:RPA, author = "B. Lloyd and W. Simpson", title = "{RFC 1334}: {PPP} Authentication Protocols", month = oct, year = "1992", bibdate = "Thu Oct 16 09:34:09 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Obsoleted by RFC1994 \cite{Simpson:1996:RPC}. Status: PROPOSED STANDARD.", URL = "ftp://ftp.internic.net/rfc/rfc1334.txt; ftp://ftp.internic.net/rfc/rfc1994.txt; https://www.math.utah.edu/pub/rfc/rfc1334.txt; https://www.math.utah.edu/pub/rfc/rfc1994.txt", acknowledgement = ack-nhfb, format = "TXT=33248 bytes", obsoletedby = "Obsoleted by RFC1994 \cite{Simpson:1996:RPC}.", online = "yes", status = "PROPOSED STANDARD", } @Article{Long:1992:UDE, author = "Yong Hong Long", title = "Using {Diophantine} equations to construct public-key cryptosystems", journal = j-NATUR-SCI-J-XIANGTAN-UNIV, volume = "14", number = "2", pages = "116--122", year = "1992", CODEN = "XDZEWR", ISSN = "1000-5900", MRclass = "94A60 (11T71 68P25)", MRnumber = "93j:94024", MRreviewer = "Mu Lan Liu", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Natural Science Journal of Xiangtan University. Xiangtan Daxue Ziran Kexue Xuebao", } @InProceedings{Madsen:1992:GCD, author = "J{\o}rgen Bo Madsen", title = "The Greatest Cracker-Case in {Denmark}: The Detecting, Tracing, and Arresting of Two International Crackers", crossref = "USENIX:1992:USI", pages = "17--40", year = "1992", bibdate = "Tue Feb 20 15:42:13 MST 1996", bibsource = "ftp://ftp.uu.net/library/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", affiliation = "The Danish Computing Center for Research and Education", } @InProceedings{McHugh:1992:EBD, author = "J. McHugh", title = "An {EMACS} based downgrader for the {SAT}", crossref = "IEEE:1992:PEA", pages = "228--237", year = "1992", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Reprinted in `Computer and Network Security'.", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1013.html", acknowledgement = ack-nhfb, keywords = "information hiding; steganography", xxnote = "Check pages?? Cited volume has only xxvii + 233.", } @Article{McLaughlin:1992:YAM, author = "Robert McLaughlin", title = "Yet another machine to break {DES}", journal = j-COMPUT-SECUR, volume = "11", number = "5", pages = "492--492", month = sep, year = "1992", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:53 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1990.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740489290259T", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Book{Meijer:1992:SSA, author = "A. R. Meijer", title = "Sharing a secret: applications of number theory and set theory to cryptology", volume = "730", publisher = "COMAP, Inc.", address = "Lexington, MA, USA", pages = "12", year = "1992", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = "UMAP modules in undergraduate mathematics and its applications", acknowledgement = ack-nhfb, annote = "Published in cooperation with the Society for Industrial and Applied Mathematics, the Mathematical Association of America, the National Council of Teachers of Mathematics, the American Mathematical Association of Two-Year Colleges, The Institute of Management Sciences, and the American Statistical Association.", keywords = "Cryptology; Number theory; Set theory.", } @Book{Millikin:1992:ECC, author = "Donald D. Millikin", title = "Elementary cryptography and cryptanalysis", volume = "56", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "vii + 132", year = "1992", ISBN = "0-89412-173-1 (soft cover), 0-89412-174-X (library bound)", ISBN-13 = "978-0-89412-173-9 (soft cover), 978-0-89412-174-6 (library bound)", LCCN = "????", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = "A Cryptographic series", acknowledgement = ack-nhfb, annote = "``\ldots{} reproduction of a classic text written and used by Donald D. Millikin to introduce cryptography and cryptanalysis to college students at New York University in 1943.''", keywords = "Ciphers; Cryptography", } @Article{Mitchell:1992:AMI, author = "C. J. Mitchell", title = "Authenticating multicast {Internet} electronic mail messages using a bidirectional {MAC} is insecure", journal = j-IEEE-TRANS-COMPUT, volume = "41", number = "4", pages = "505--507", month = apr, year = "1992", CODEN = "ITCOB4", DOI = "https://doi.org/10.1109/12.135563", ISSN = "0018-9340 (print), 1557-9956 (electronic)", ISSN-L = "0018-9340", bibdate = "Thu Jul 7 10:49:16 MDT 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranscomput1990.bib", URL = "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=135563", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Computers", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12", } @Book{Mitchell:1992:CCI, author = "Chris Mitchell", title = "Cryptography and coding {II}", publisher = pub-OXFORD, address = pub-OXFORD:adr, pages = "xi + 301", year = "1992", ISBN = "0-19-853393-4", ISBN-13 = "978-0-19-853393-1", LCCN = "QA268.C75 1992", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Based on the proceedings of a conference organized by the Institute of Mathematics and its Applications on cryptography and coding, held at the Royal Agricultural College, Cirencester, in December 1989.", price = "UK\pounds40.00, US\$60.00", series = "The Institute of Mathematics and Its Applications conference series; new ser., 33", acknowledgement = ack-nhfb, keywords = "coding theory --- congresses; cryptography --- congresses", } @MastersThesis{Mohtashemi:1992:CHC, author = "Mojdeh Mohtashemi", title = "On the cryptanalysis of {Huffman} codes", type = "Thesis ({M.S.})", school = "Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology", address = "Cambridge, MA, USA", pages = "35", month = may, year = "1992", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Also published as Technical report MIT/LCS/TR-617", abstract = "Data-compression techniques such as Huffman coding are often used in conjunction with cryptographic schemes. By removing redundancy in the source document, they can significantly increase the difficulty of cryptanalysis. In this thesis we consider the question: `what is the difficulty of breaking a data-compression scheme by itself?' We examine most closely the problem of deciphering a file that has been Huffman-coded, but for which the Huffman code used is unavailable. We find that a Huffman-code can be surprisingly difficult to cryptanalyze. We present a detailed analysis of the situation for a three-symbol source alphabet, and concisely derive the conditions when the source probabilities lead to true ambiguity. We also present some general results for the case of an arbitrary (finite) alphabet, and show that: 1. If the source probabilities are highly skewed, then there is no ambiguity. 2. If the source probabilities are equally likely and the size of the source alphabet is a power of two, then there is total ambiguity.", acknowledgement = ack-nhfb, keywords = "Ambiguity; Coding theory; Cryptography; Data compression (Computer science)", } @Article{Molva:1992:KAK, author = "Refik Molva and Gene Tsudik and Els {Van Herreweghen} and Stefano Zatti", title = "{KryptoKnight} Authentication and Key Distribution System", journal = j-LECT-NOTES-COMP-SCI, volume = "648", pages = "155--??", year = "1992", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:46:24 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InCollection{Moore:1992:PFC, author = "J. H. Moore", booktitle = "Contemporary cryptology", title = "Protocol failures in cryptosystems", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "541--558", year = "1992", MRclass = "94A60", MRnumber = "1 205 140", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", } @Article{Morii:1992:PSP, author = "Masakatu Morii and Masao Kasahara", title = "Perfect staircase profile of linear complexity for finite sequences", journal = j-INFO-PROC-LETT, volume = "44", number = "2", pages = "85--89", day = "19", month = nov, year = "1992", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", MRclass = "68Q30 (68P05 68P25 94A60)", MRnumber = "93j:68081", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, classification = "C4240 (Programming and algorithm theory)", corpsource = "Dept. of Comput. Sci., Ehime Univ., Matsuyama, Japan", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", keywords = "computational complexity; cryptology; linear complexity; pseudo-random sequences; random number generation; staircase profile; unpredictability", treatment = "T Theoretical or Mathematical", } @Book{Morris:1992:FMC, author = "Stephen Brent Morris", title = "The {Folger} manuscript: the cryptanalysis and interpretation of an {American Masonic} manuscript", volume = "23", publisher = "Masonic Book Club", address = "Bloomington, IL, USA", pages = "xxxii + 255", year = "1992", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = "Publications of the Masonic Book Club", acknowledgement = ack-nhfb, keywords = "Cryptography; Folger, Robert B. --- Freemasonry; Folger, Robert B. --- Manuscripts; Freemasonry --- History; Freemasonry --- New York (State) --- History", } @Article{Moskovitz:1992:CCC, author = "I. S. Moskovitz and A. R. Miller", title = "The Channel Capacity of a Certain Noisy Timing Channel", journal = j-IEEE-TRANS-INF-THEORY, volume = "IT-38", number = "4", pages = "1339--1343", month = "????", year = "1992", CODEN = "IETTAW", DOI = "https://doi.org/10.1109/18.144712", ISSN = "0018-9448 (print), 1557-9654 (electronic)", ISSN-L = "0018-9448", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/021229.html", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Information Theory", keywords = "information hiding; steganography", } @InProceedings{Moskowitz:1992:CAA, author = "I. S. Moskowitz and O. L. Costich", title = "A Classical Automata Approach to Noninterference Type Problems", crossref = "IEEE:1992:CSF", pages = "2--8", year = "1992", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/021420.html", acknowledgement = ack-nhfb, keywords = "information hiding; steganography", xxnote = "Computer Security Foundations Workshop....Franconia, New Hampshire. UC Melvyl has 4 entries, but none for 1992.", } @InProceedings{Moskowitz:1992:IDI, author = "I. S. Moskowitz and A. R. Miller", title = "The Influence of Delay on an Idealized Channel's Bandwidth", crossref = "IEEE:1992:PIC", pages = "63--67", year = "1992", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1017.html", acknowledgement = ack-nhfb, keywords = "information hiding; steganography", } @MastersThesis{Mu:1992:ICS, author = "Hao Mu", title = "{ID}-based cryptographic schemes for user identification, key distribution, and digital signature", type = "Thesis ({M.S.})", school = "Computer Science Telecommunication Program. University of Missouri-Kansas City", address = "Kansas City, MO, USA", pages = "ix + 54", year = "1992", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Musser:1992:UVE, author = "Frederic O. Musser", title = "{Ultra} vs {Enigma}: {Goucher}'s Top Secret Contribution to Victory in {Europe} in {World War II}", journal = "Goucher Quarterly", volume = "70", number = "2", pages = "4--7", month = "????", year = "1992", bibdate = "Sun Dec 31 07:37:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://cdm16235.contentdm.oclc.org/cdm/compoundobject/collection/p16235coll16/id/589/rec/328", acknowledgement = ack-nhfb, journal-URL = "http://blogs.goucher.edu/magazine/all-issues/", } @Article{Neumann:1992:IRF, author = "Peter G. Neumann", title = "Inside {RISKS}: Fraud by Computer", journal = j-CACM, volume = "35", number = "8", pages = "154--154", month = aug, year = "1992", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu May 30 09:41:10 MDT 1996", bibsource = "http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cacm1990.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/135238.html", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "human factors; security", subject = "{\bf K.4.2}: Computing Milieux, COMPUTERS AND SOCIETY, Social Issues, Abuse and crime involving computers. {\bf K.6.5}: Computing Milieux, MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS, Security and Protection, Authentication. {\bf K.7.m}: Computing Milieux, THE COMPUTING PROFESSION, Miscellaneous, Ethics.", } @Article{NIST:1992:DSS, author = "{National Institute of Standards and Technology (NIST)}", title = "The {Digital Signature Standard}, Proposed by {NIST}", journal = j-CACM, volume = "35", number = "7", pages = "36--40", month = jul, year = "1992", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Sat May 03 11:54:09 1997", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.bib; http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cacm1990.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/129904.html", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "security; standardization", subject = "{\bf E.3}: Data, DATA ENCRYPTION, Public key cryptosystems. {\bf E.3}: Data, DATA ENCRYPTION, Data encryption standard (DES).", } @Manual{NIST:1992:PYA, author = "{National Institute of Standards and Technology (NIST)}", title = "Publication {YY}: Announcement and Specifications for a {Secure Hash Standard} ({SHS})", pages = "??", month = jan # " 22", year = "1992", bibdate = "Thu Jul 21 08:52:08 1994", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Okamoto:1992:EAC, author = "Tatsuaki Okamoto and Kouichi Sakurai", booktitle = "Advances in cryptology---CRYPTO '91 (Santa Barbara, CA, 1991)", title = "Efficient algorithms for the construction of hyperelliptic cryptosystems", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "267--278", year = "1992", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60 (11T71)", MRnumber = "94g:94023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Lecture Notes in Computer Science", } @TechReport{Posch:1992:MRR, author = "K. C. Posch and R. Posch", title = "Modulo reduction in residue number systems", institution = "Inst., TU, Ges.", address = "????", pages = "16", year = "1992", bibdate = "Thu Nov 18 09:44:56 2010", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = "IIG-report-series", URL = "http://books.google.com/books?id=YPLKHAAACAAJ", abstract = "Residue number systems provide a good means for extremely long integer arithmetic. Their carry-free operations make parallel implementations feasible. Some applications involving very long integers, such as public key encryption, rely heavily on fast modulo reductions. This paper shows a new combination of residue number systems with efficient modulo reduction methods. Two methods are compared, and the faster one is scrutinized in detail. Both methods have the same order of complexity, $ O(\log n) $, with $n$ denoting the amount of registers involved.", acknowledgement = ack-nhfb, } @InProceedings{Posch:1992:RNS, author = "K. C. Posch and R. Posch", booktitle = "Proceedings of the Fourth IEEE Symposium on Parallel and Distributed Processing 1992", title = "Residue number systems: a key to parallelism in public key cryptography", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "432--435", year = "1992", CODEN = "????", DOI = "https://doi.org/10.1109/SPDP.1992.242713", ISSN = "????", bibdate = "Fri Nov 9 11:38:58 MST 2007", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, keywords = "residue arithmetic; residue number system", summary = "Public key cryptography and parallel algorithms are considered. Special attention is paid to algorithms using long integer modulo arithmetic. A modification of the commonly known RSA algorithm is taken as a candidate. So far all implementations have \ldots{}", } @TechReport{Posch:1992:TMD, author = "Reinhard Posch", title = "Trustworthy management of distribution and operation of encryption devices", type = "Report", number = "344", institution = "Institutes for Information Processing", address = "Graz, Austria", pages = "11 + 3", month = oct, year = "1992", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "Distribution of security devices such as chips for cryptographic use is [sic] makes sense. It must be managed in a trustworthy way so as not to be forged by an intruder. If, in the hopefully near future, all relevant data processing is attempted to be done in a secure way, the distribution of security devices will be widespread. The only way to prevent fake devices from being substituted in place of secure devices is a trusted distribution and operation. This work concentrates on the problem of delivering and operating an encryption device using public key cryptography. In this context a security architecture for the organization and distribution of an RSA chip is presented. This is done under the assumption that the chip housing is a valid physical security and that reverse engineering of the chip does not reveal internal secrets. On this basis a method is presented that inhibits introduction of fake chips using deliberately built-in security holes. The principal method used is a secret distribution key within the chip. This key is used for distribution and authentication of the chip manufacturer as well as for encrypted key loading in the field during operation. The proposed distribution protocol still allows the loading of freely chosen user keys with a minimum overhead. For special applications, each customer could be assigned a unique distribution key based on a single and identical secret key for a set of cryptographic chips.", acknowledgement = ack-nhfb, keywords = "Cryptography.", } @InProceedings{Preneel:1992:CSH, author = "B. Preneel and R. Govaerts and J. Vandewalle", booktitle = "????", title = "Cryptographically Secure Hash Functions: an Overview", publisher = "????", address = "????", pages = "??", year = "1992", bibdate = "Sat Jul 16 17:43:33 1994", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", note = "Reference in \cite[p.~186]{Pieprzyk:1993:DHA}.", acknowledgement = ack-nhfb, } @InProceedings{Proctor:1992:AIC, author = "N. Proctor and P. Neumann", title = "Architectural Implications of Covert Channels", crossref = "NIST:1992:NCS", pages = "28--43", year = "1992", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/021136.html", acknowledgement = ack-nhfb, keywords = "information hiding; steganography", } @Article{Ramagopal:1992:DRB, author = "S. Ramagopal", title = "The {\em {Dictyostelium}} ribosome: biochemistry, molecular biology, and developmental regulation", journal = j-BIOCHEM-CELL-BIO, volume = "70", number = "9", pages = "738--750", month = sep, year = "1992", ISSN = "0829-8211", bibdate = "Wed Feb 28 14:47:49 MST 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "This is the first comprehensive review of ribosomes in the cellular slime mold {\em {Dictyostelium} discoideum}. The physicochemical, biochemical, cellular, molecular, and developmental properties are reviewed. Several features demonstrate that a unique class of ribosomes exists in this organism, and a study of these ribosomes will be important to decipher special features of translational regulation, and evolution of the organelle in the eukaryotic kingdom.", acknowledgement = ack-nhfb, announcement = "9304 JOURNAL ARTICLE", chemicalsubs = "0 (Ribosomal Proteins); 0 (RNA, Ribosomal)", countrypub = "CANADA", datesentered = "Entered 930218", meshheadings = "{\em {Dictyostelium}}--growth and development (GD)/ultrastructure (*UL); Ribosomes--chemistry (CH)/ultrastructure (UL)/physiology (*PH); Ribosomal Proteins--chemistry (CH)/genetics (GE)/physiology (PH); RNA, Ribosomal--genetics (GE); Animal", recordno = "93129418", } @Article{Reiter:1992:ISG, author = "Michael Reiter", title = "Integrating Security in a Group Oriented Distributed System", journal = j-OPER-SYS-REV, volume = "26", number = "2", pages = "27--27", month = apr, year = "1992", CODEN = "OSRED8", ISSN = "0163-5980 (print), 1943-586X (electronic)", ISSN-L = "0163-5980", bibdate = "Sat Aug 26 08:55:41 MDT 2006", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Operating Systems Review", } @Misc{Rivest:1992:RMMa, author = "R. Rivest", title = "{RFC 1320}: The {MD4} Message-Digest Algorithm", month = apr, year = "1992", bibdate = "Thu Oct 16 09:34:09 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/rfc.bib", note = "Status: INFORMATIONAL.", URL = "ftp://ftp.internic.net/rfc/rfc1320.txt; https://www.math.utah.edu/pub/rfc/rfc1320.txt", acknowledgement = ack-nhfb, format = "TXT=32407 bytes", online = "yes", referencedin = "Referenced in \cite[Ref. 22]{Preneel:1997:CHF}, \cite[Ref. 15]{Dobbertin:1996:SMA}.", status = "INFORMATIONAL", } @Misc{Rivest:1992:RMMb, author = "R. Rivest", title = "{RFC 1321}: The {MD5} Message-Digest Algorithm", month = apr, year = "1992", bibdate = "Thu Oct 16 09:34:09 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/rfc.bib", note = "Status: INFORMATIONAL.", URL = "ftp://ftp.internic.net/rfc/rfc1321.txt; https://www.math.utah.edu/pub/rfc/rfc1321.txt", acknowledgement = ack-nhfb, format = "TXT=35222 bytes", online = "yes", referencedin = "Referenced in \cite[Ref. 9]{Kaliski:1995:MAM}, \cite[Ref. 15]{Bellare:1996:MAU}, \cite[Ref. 16]{Dobbertin:1996:SMA}, \cite[Ref. 23]{Preneel:1997:CHF}, \cite[Ref. 6]{Rivest:1996:PMT}.", status = "INFORMATIONAL", } @Article{Rivest:1992:RNP, author = "Ronald L. Rivest and Martin E. Hellman and John C. Anderson and John W. Lyons", title = "Responses to {NIST}'s proposal", journal = j-CACM, volume = "35", number = "7", pages = "41--54", month = jul, year = "1992", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Tue Jan 28 14:55:40 1997", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.bib; http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cacm1990.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/129905.html", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "security; standardization", subject = "{\bf E.3}: Data, DATA ENCRYPTION, Public key cryptosystems. {\bf E.3}: Data, DATA ENCRYPTION, Data encryption standard (DES).", } @Article{Schifreen:1992:PPD, author = "R. Schifreen", title = "Practical {PC} data security", journal = j-BYTE, volume = "17", number = "8", pages = "94IS-23--24, 94IS-26, 94IS-28, 94IS-30", month = aug, year = "1992", CODEN = "BYTEDJ", ISSN = "0360-5280 (print), 1082-7838 (electronic)", ISSN-L = "0360-5280", bibdate = "Thu Sep 12 16:56:18 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, classification = "D1060 (Security)", fjournal = "BYTE Magazine", keywords = "Availability; Backup; Confidentiality; Encryption; Integrity; LAN security; MS-DOS utilities; PC data security; Secure erasure", thesaurus = "Security of data", } @Article{Schneier:1992:SSA, author = "Bruce Schneier", title = "Sharing Secrets Among Friends", journal = j-COMP-LANG-MAG, volume = "9", number = "4", pages = "57--??", month = apr, year = "1992", CODEN = "COMLEF", ISSN = "0749-2839", bibdate = "Tue Jan 23 08:04:25 MST 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Computer Language Magazine", } @Article{Schneier:1992:UPC, author = "Bruce Schneier", title = "Untangling public-key cryptography: the key to secure communications", journal = j-DDJ, volume = "17", number = "5", pages = "16, 17, 20, 22, 24, 26, 28", month = may, year = "1992", CODEN = "DDJOEB", ISSN = "1044-789X", bibdate = "Tue Sep 10 10:06:23 MDT 1996", bibsource = "http://www.ddj.com/index/author/index.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib; UnCover database", abstract = "As we move into the world of electronic communication, the need for secure, private messaging becomes more and more important.", acknowledgement = ack-nhfb, affiliation = "Counterpane Syst., Oak Park, IL, USA", classification = "B6120B (Codes); C6130S (Data security)", fjournal = "Dr. Dobb's Journal of Software Tools", keywords = "Bit commitment; Computer networks; Data encryption; Digital Encryption Standard; Digital signatures; Fair coin tosses; Mental poker; Password protection; PKC algorithms; Private key; Public key; Public-Key Cryptography; Simultaneous contract signing", thesaurus = "Cryptography", } @Book{Scudder:1992:OLA, author = "W. Blaine Scudder", title = "{O. H. Lee\slash Alek James Hidell}: a lesson in conspiracy and cryptology", publisher = "????", address = "????", pages = "various", year = "1992", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, keywords = "Assassination; Kennedy, John F. (John Fitzgerald) 1917--1963", } @Book{Sedgewick:1992:AC, author = "Robert Sedgewick", title = "Algorithms in {C++}", publisher = pub-AW, address = pub-AW:adr, pages = "xiv + 656", year = "1992", ISBN = "0-201-36118-3, 0-201-51059-6", ISBN-13 = "978-0-201-36118-6, 978-0-201-51059-1", LCCN = "QA76.73.C153 S38 1992", MRclass = "68N15, 68-01, 68-04, 68P10, 68W10, 68W15, 68N15", bibdate = "Mon Jan 3 12:10:05 1994", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib; https://www.math.utah.edu/pub/tex/bib/master.bib; https://www.math.utah.edu/pub/tex/bib/numana1990.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib; https://www.math.utah.edu/pub/tex/bib/string-matching.bib", ZMnumber = "0826.68025", acknowledgement = ack-nhfb, libnote = "Not yet in my library.", tableofcontents = "Fundamentals \\ 1: Introduction \\ Algorithms \\ Outline of Topics \\ 2: C++ (and C) \\ Example: Euclid's Algorithm \\ Types of Data \\ Input/Output \\ Concluding Remarks \\ 3: Elementary Data Structures \\ Arrays \\ Linked Lists \\ Storage Allocation \\ Pushdown Stacks \\ Queues \\ Linked List Implementation of Stacks \\ Abstract and Concrete Data Types \\ 4: Trees \\ Glossary \\ Properties \\ Representing Binary Trees \\ Representing Forests \\ Traversing Trees \\ 5: Recursion \\ Recurrences \\ Divide-and-Conquer \\ Recursive Tree Traversal \\ Removing Recursion \\ Perspective \\ 6: Analysis of Algorithms \\ Framework \\ Classification of Algorithms \\ Computational Complexity \\ Average-Case Analysis \\ Approximate and Asymptotic Results \\ Basic Recurrences \\ Perspective \\ 7: Implementation of Algorithms \\ Selecting an Algorithm \\ Empirical Analysis \\ Program Optimization \\ Algorithms and Systems \\ Sorting Algorithms \\ 8: Elementary Sorting Methods \\ Rules of the Game \\ Selection Sort \\ Insertion Sort \\ Digression: Bubble Sort \\ Performance Characteristics of Elementary Sorts \\ Sorting Files with Large Records \\ Shellsort \\ Distribution Counting \\ 9: Quicksort \\ The Basic Algorithm \\ Performance Characteristics of Quicksort \\ Removing Recursion \\ Small Subfiles \\ Median-of-Three Partitioning \\ Selection \\ 10: Radix Sorting \\ Bits \\ Radix Exchange Sort \\ Straight Radix Sort \\ Performance Characteristics of Radix Sorts \\ A Linear Sort \\ 11: Priority Queues \\ Elementary Implementations \\ Heap Data Structure \\ Algorithms on Heaps \\ Heapsort \\ Indirect Heaps \\ Advanced Implementations \\ 12: Mergesort \\ Merging \\ Mergesort \\ List Mergesort \\ Bottom-Up Mergesort \\ Performance Characteristics \\ Optimized Implementations \\ Recursion Revisited \\ 13: External Sorting \\ Sort-Merge \\ Balanced Multiway Merging \\ Replacement Selection \\ Practical Considerations \\ Polyphase Merging \\ An Easier Way \\ Searching Algorithms \\ 14: Elementary Searching Methods \\ Sequential Searching \\ Binary Search \\ Binary Tree Search \\ Deletion \\ Indirect Binary Search Trees \\ 15: Balanced Trees \\ Top-Down 2-3-4 Trees \\ Red-Black Trees \\ Other Algorithms \\ 16: Hashing \\ Hash Functions \\ Separate Chaining \\ Linear Probing \\ Double Hashing \\ Perspective \\ 17: Radix Searching \\ Digital Search Trees \\ Radix Search Tries \\ Multiway Radix Searching \\ Patricia \\ 18: External Searching \\ Indexed Sequential Access \\ B-Trees \\ Extendible Hashing \\ Virtual Memory \\ String Processing \\ 19: String Searching \\ A Short History \\ Brute-Force Algorithm \\ Knuth--Morris--Pratt Algorithm \\ Boyer--Moore Algorithm \\ Rabin--Karp Algorithm \\ Multiple Searches \\ 20: Pattern Matching \\ Describing Patterns \\ Pattern Matching Machines \\ Representing the Machine \\ Simulating the Machine \\ 21: Parsing \\ Context-Free Grammars \\ Top-Down Parsing \\ Bottom-Up Parsing \\ Compilers \\ Compiler-Compilers \\ 22: File Compression \\ Run-Length Encoding \\ Variable-Length Encoding \\ Building the Huffman Code \\ Implementation \\ 23: Cryptology \\ Rules of the Game \\ Simple Methods \\ Encryption/Decryption Machines \\ Public-Key Cryptosystems \\ Geometric Algorithms \\ 24: Elementary Geometric Methods \\ Points, Lines, and Polygons \\ Line Segment Intersection \\ Simple Closed Path \\ Inclusion in a Polygon \\ Perspective \\ 25: Finding the Convex Hull \\ Rules of the Game \\ Package-Wrapping \\ The Graham Scan \\ Interior Elimination \\ Performance Issues \\ 26: Range Searching \\ Elementary Methods \\ Grid Method \\ Two-Dimensional Trees \\ Multidimensional Range Searching \\ 27: Geometric Intersection \\ Horizontal and Vertical Lines \\ Implementation \\ General Line Intersection \\ 28: Closest-Point Problems \\ Closest-Pair Problem \\ Voronoi Diagrams \\ Graph Algorithms \\ 29: Elementary Graph Algorithms \\ Glossary \\ Representation \\ Depth-First Search \\ Nonrecursive Depth-First Search \\ Breadth-First Search \\ Mazes \\ Perspective \\ 30: Connectivity \\ Connected Components \\ Biconnectivity \\ Union-Find Algorithms \\ 31: Weighted Graphs \\ Minimum Spanning Tree \\ Priority-First Search \\ Kruskal's Method \\ Shortest Path \\ Minimum Spanning Tree and Shortest Paths in Dense Graphs \\ Geometric Problems \\ 32: Directed Graphs \\ Depth-First Search \\ Transitive Closure \\ All Shortest Paths \\ Topological Sorting \\ Strongly Connected Components \\ 33: Network Flow \\ The Network Flow Problem \\ Ford--Fulkerson Method \\ Network Searching \\ 34: Matching \\ Bipartite Graphs \\ Stable Marriage Problem \\ Advanced Algorithms \\ Mathematical Algorithms \\ 35: Random Numbers \\ Applications \\ Linear Congruential Method \\ Additive Congruential Method \\ Testing Randomness \\ Implementation Notes \\ 36: Arithmetic \\ Polynomial Arithmetic \\ Polynomial Evaluation and Interpolation \\ Polynomial Multiplication \\ Arithmetic Operations with Large Integers \\ Matrix Arithmetic \\ 37: Gaussian Elimination \\ A Simple Example \\ Outline of the Method \\ Variations and Extensions \\ 38: Curve Fitting \\ Polynomial Interpolation \\ Spline Interpolation \\ Method of Least Squares \\ 39: Integration \\ Symbolic Integration \\ Simple Quadrature Methods \\ Compound Methods \\ Adaptive Quadrature \\ Advanced Topics \\ 40: Parallel Algorithms \\ General Approaches \\ Perfect Shuffles \\ Systolic Arrays \\ Perspective \\ 41: The Fast Fourier Transform \\ Evaluate, Multiply, Interpolate \\ Complex Roots of Unity \\ Evaluation at the Roots of Unity \\ Interpolation at the Roots of Unity \\ Implementation \\ 42: Dynamic Programming \\ Knapsack Problem \\ Matrix Chain Product \\ Optimal Binary Search Trees \\ Time and Space Requirements \\ 43: Linear Programming \\ Linear Programs \\ Geometric Interpretation \\ The Simplex Method \\ Implementation \\ 44: Exhaustive Search \\ Exhaustive Search in Graphs \\ Backtracking \\ Digression: Permutation Generation \\ Approximation Algorithms \\ 45: NP-Complete Problems \\ Deterministic and Nondeterministic Polynomial-Time Algorithms \\ NP-Completeness \\ Cook's Theorem \\ Some NP-Complete Problems", } @MastersThesis{Segal:1992:NTC, author = "Alida Segal", title = "New trends in cryptology", type = "Thesis ({M.S. [C.Sc.]})", school = "School of Engineering. Department of Computer Sciences, City College of New York", address = "New York, NY, USA", pages = "3 + 34", year = "1992", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, keywords = "Cryptography.", } @PhdThesis{Shepherd:1992:DSA, author = "S. J. Shepherd", title = "A Distributed Security Architecture for Large Scale Systems", type = "{Ph.D.} thesis", school = "University of Plymouth", address = "Plymouth, UK", pages = "????", month = jun, year = "1992", bibdate = "Mon Nov 30 07:06:39 1998", bibsource = "http://www.eeng.brad.ac.uk/Research/crypto_pubs.html; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @TechReport{Shepherd:1992:FFW, author = "S. J. Shepherd", title = "Factoring with false witnesses", type = "Internal research note", number = "1", institution = "Electronic and Electrical Engineering Department, University of Bradford", address = "Bradford, Yorkshire, UK", month = feb, year = "1992", bibdate = "Mon Nov 30 07:02:46 1998", bibsource = "http://www.eeng.brad.ac.uk/Research/crypto_pubs.html; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Shepherd:1992:FHS, author = "S. J. Shepherd", title = "A fast, high security public key processor", journal = "Innovation Journal", volume = "??", number = "??", pages = "16--17", month = jun, year = "1992", bibdate = "Mon Nov 30 07:00:20 1998", bibsource = "http://www.eeng.brad.ac.uk/Research/crypto_pubs.html; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @TechReport{Shepherd:1992:HSC, author = "S. J. Shepherd", title = "A High Speed Cryptographic Engine", type = "Internal Research Note", number = "4", institution = "Electronic and Electrical Engineering Department, University of Bradford", address = "Bradford, Yorkshire, UK", month = jun, year = "1992", bibdate = "Mon Nov 30 07:03:45 1998", bibsource = "http://www.eeng.brad.ac.uk/Research/crypto_pubs.html; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Commercial-in-confidence.", acknowledgement = ack-nhfb, } @TechReport{Shepherd:1992:NPS, author = "S. J. Shepherd", title = "A Numerical Processor with Supercomputer Performance Based on State-of-the-Art Finite-Impulse-Response Filter Digital Signal Processors", type = "Internal Research Note", number = "5", institution = "Electronic and Electrical Engineering Department, University of Bradford", address = "Bradford, Yorkshire, UK", month = oct, year = "1992", bibdate = "Mon Nov 30 07:04:51 1998", bibsource = "http://www.eeng.brad.ac.uk/Research/crypto_pubs.html; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Commercial-in-confidence.", acknowledgement = ack-nhfb, } @InProceedings{Shepherd:1992:SIR, author = "S. J. Shepherd", editor = "????", booktitle = "Proceedings of the British Computer Society Special Interest Group Workshop on Computer Security, Solihull, 15 September 1992", title = "The Security Issues of Radio {LANs}", publisher = "????", address = "????", pages = "??--??", year = "1992", ISBN = "????", ISBN-13 = "????", LCCN = "????", bibdate = "Mon Nov 30 06:40:34 1998", bibsource = "http://www.eeng.brad.ac.uk/Research/crypto_pubs.html; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @MastersThesis{Sherrod:1992:DES, author = "Elizabeth Llewellyn Sherrod", title = "{Data Encryption Standard} and {Rivest-Shamir-Adleman} encryption schemes: a comparative survey", type = "Thesis ({M.S.})", school = "Division of Computer Science, Department of Mathematical Sciences, Virginia Commonwealth University", address = "Richmond, VA, USA", pages = "vi + 115", year = "1992", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @InCollection{Smid:1992:DES, author = "Miles E. Smid and Dennis K. Branstad", editor = "Gustavus J. Simmons", booktitle = "Contemporary Cryptology --- The Science of Information Integrity", title = "The {Data Encryption Standard}: Past and future", crossref = "Simmons:1992:CCS", chapter = "1", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "43--64", year = "1992", MRclass = "68P25", MRnumber = "1 205 130", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; MathSciNet database", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 24]{Biham:1998:TA}.", } @Article{Smith:1992:ICF, author = "R. M. {Smith, Sr.} and P. C. Yeh", title = "{Integrated Cryptographic Facility} of the {Enterprise Systems Architecture\slash 390}: design considerations", journal = j-IBM-JRD, volume = "36", number = "4", pages = "683--693", month = jul, year = "1992", CODEN = "IBMJAE", ISSN = "0018-8646 (print), 2151-8556 (electronic)", ISSN-L = "0018-8646", bibdate = "Tue Mar 25 14:26:59 MST 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib", abstract = "The paper reviews the considerations that shaped the design of the Enterprise Systems Architecture/390 Integrated Cryptographic Facility. It describes design issues, alternatives, and decisions, and it provides the rationale behind some of the decisions. Issues related to performance, security, usability, and availability are covered.", acknowledgement = ack-nhfb, affiliation = "IBM Enterprise Syst., Poughkeepsie, NY, USA", classcodes = "B6210L (Computer communications); B6120B (Codes); C5620L (Local area networks); C6150N (Distributed systems); C6130E (Data interchange)", classification = "B6120B (Codes); B6210L (Computer communications); C5620L (Local area networks); C6130E (Data interchange); C6150N (Distributed systems)", corpsource = "IBM Enterprise Syst., Poughkeepsie, NY, USA", fjournal = "IBM Journal of Research and Development", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520", keywords = "Architecture/390; availability; Availability; Cryptographic Facility; cryptography; Enterprise Systems; Integrated; Integrated Cryptographic Facility; local area networks; network operating systems; performance; Performance; security; Security; usability; Usability", thesaurus = "Cryptography; Local area networks; Network operating systems", treatment = "P Practical", xxauthor = "R. M. {Smith, Jr.} and P. C. Yeh", } @InProceedings{Stewart:1992:SCK, author = "John N. Stewart", title = "{SunOS, C2} and {Kerberos} --- a Comparative Review", crossref = "USENIX:1992:USI", pages = "265--284", day = "14--17", month = sep, year = "1992", bibdate = "Fri Oct 18 07:24:24 MDT 1996", bibsource = "ftp://ftp.uu.net/library/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/usenix1990.bib", acknowledgement = ack-nhfb, affiliation = "Syracuse University", } @Article{Subramanian:1992:LT, author = "K. G. Subramanian and R. Siromoney and L. Mathew", title = "{Lyndon} trees", journal = j-THEOR-COMP-SCI, volume = "106", number = "2", pages = "373--383", day = "14", month = dec, year = "1992", CODEN = "TCSCDI", ISSN = "0304-3975 (print), 1879-2294 (electronic)", ISSN-L = "0304-3975", bibdate = "Sat Nov 22 13:15:15 MST 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/tcs1990.bib", acknowledgement = ack-nhfb, classification = "C1160 (Combinatorial mathematics); C6130S (Data security)", corpsource = "Dept. of Math., Madras Christian Coll., India", fjournal = "Theoretical Computer Science", journal-URL = "http://www.sciencedirect.com/science/journal/03043975", keywords = "cryptanalysis; decryption; encryption; factorization theorem; Lyndon trees; Lyndon words; public key cryptography; public key cryptosystem; trees (mathematics)", pubcountry = "Netherlands", treatment = "T Theoretical or Mathematical", } @Article{Syverson:1992:KBS, author = "Paul F. Syverson", title = "Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols", journal = j-J-COMP-SECUR, volume = "1", number = "3--4", pages = "317--334", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-13-407", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Takagi:1992:MMH, author = "N. Takagi and S. Yajima", title = "Modular multiplication hardware algorithms with a redundant representation and their application to {RSA} cryptosystem", journal = j-IEEE-TRANS-COMPUT, volume = "41", number = "7", pages = "887--891", month = jul, year = "1992", CODEN = "ITCOB4", DOI = "https://doi.org/10.1109/12.256444", ISSN = "0018-9340 (print), 1557-9956 (electronic)", ISSN-L = "0018-9340", bibdate = "Thu Jul 7 10:49:18 MDT 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranscomput1990.bib", URL = "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=256444", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Computers", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12", } @Article{Tan:1992:NPE, author = "Yang Lin Tan and Dong Qing Xie", title = "A note on probabilistic encryption", journal = "Hunan Daxue Xuebao", volume = "19", number = "3", pages = "20--25", year = "1992", CODEN = "HDAXE3", ISSN = "1000-2472", MRclass = "68P25", MRnumber = "1 193 580", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; MathSciNet database", fjournal = "Hunan Daxue Xuebao. Ziran Kexue Ban. Journal of Hunan University. Natural Sciences", } @Article{Tardo:1992:SGA, author = "Joseph J. Tardo and Kannan Alagappan", title = "{SPX}: Global Authentication Using Public Key Certificates", journal = j-J-COMP-SECUR, volume = "1", number = "3--4", pages = "295--316", month = "????", year = "1992", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-1992-13-406", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Tue May 24 06:20:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer Security", journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Book{Tijdeman:1992:CDP, author = "R. Tijdeman and Jacobus Henricus {van Lint}", title = "Cryptography and data protection: proceedings of a symposium at the Royal Netherlands Academy of Arts and Sciences on 19th December 1990", publisher = pub-NORTH-HOLLAND, address = pub-NORTH-HOLLAND:adr, pages = "vii + 104", year = "1992", ISBN = "0-444-85746-X", ISBN-13 = "978-0-444-85746-0", LCCN = "Q57 .A532", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = "Koninklijke Nederlandse Akademie van Wetenschappen, Verhandelingen, Afd. Natuurkunde. Eerste reeks; deel 38", acknowledgement = ack-nhfb, keywords = "computer security --- congresses; cryptography --- congresses", } @Article{Toussaint:1992:SSI, author = "Marie-Jeanne Toussaint", title = "Separating the Specification and Implementation Phases in Cryptology", journal = j-LECT-NOTES-COMP-SCI, volume = "648", pages = "77--??", year = "1992", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:46:24 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Tsudik:1992:MAOa, author = "Gene Tsudik", title = "Message authentication with one-way hash functions", journal = j-COMP-COMM-REV, volume = "22", number = "5", pages = "29--38", month = oct, year = "1992", CODEN = "CCRED2", ISSN = "0146-4833", ISSN-L = "0146-4833", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; UnCover library database", acknowledgement = ack-nhfb, fjournal = "Computer Communication Review", referencedin = "Referenced in \cite[Ref. 10]{Kaliski:1995:MAM}.", } @InProceedings{Tsudik:1992:MAOb, author = "G. Tsudik", title = "Message authentication with one-way hash functions", crossref = "IEEE:1992:PII", pages = "??--??", year = "1992", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 17]{Bellare:1996:MAU}.", } @Book{Tsujii:1992:CS, author = "Shigeo Tsujii", title = "Cryptography and security", volume = "1(2)", publisher = pub-GORDON-BREACH, address = pub-GORDON-BREACH:adr, pages = "xi + 156", year = "1992", ISBN = "2-88124-869-1", ISBN-13 = "978-2-88124-869-6", ISSN = "1058-7306", LCCN = "QA76.9.A25 T78 1992", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = "Japanese technology reviews. Section B, Computers and communications", acknowledgement = ack-nhfb, keywords = "computer security; cryptography", } @Book{USNSACSSCCH:1992:FLT, author = "{United States.National Security Agency\slash Central Security Service.Center for Cryptologic History}", title = "The {Friedman} legacy: a tribute to {William and Elizebeth Friedman}", volume = "3", publisher = "Center for Cryptologic History", address = "Fort George G. Meade, MD, USA", pages = "v + 282", year = "1992", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = "United States cryptologic history. Sources in cryptologic history", acknowledgement = ack-nhfb, keywords = "Cryptographers --- United States --- Biography; Cryptography --- United States --- History --- To 1900; Friedman, Elizebeth Smith (1892--1980); Friedman, William F. (William Frederick) (1891--1969)", remark = "Originally published as: Six lectures on cryptology in 1963; with two essays: ``The legendary William F. Friedman'' by Lambros Callimahos and ``Breaking codes was this couple's lifetime career'' by James R. Chiles as well as biographical information on William Friedman and Elizabeth Smith Friedman.", } @InCollection{vanOorschot:1992:CPP, author = "Paul C. van Oorschot", booktitle = "Contemporary cryptology", title = "A comparison of practical public key cryptosystems based on integer factorization and discrete logarithms", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "289--322", year = "1992", MRclass = "94A60", MRnumber = "1 205 134", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", } @Article{Venkaiah:1992:RBP, author = "V. Ch. Venkaiah", title = "An {RSA} based public-key cryptosystem for secure communication", journal = "Proc. Indian Acad. Sci. Math. Sci.", volume = "102", number = "2", pages = "147--153", year = "1992", ISSN = "0253-4142", MRclass = "94A60 (11T71)", MRnumber = "1 195 739", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Indian Academy of Sciences. Proceedings. Mathematical Sciences", } @Article{VonZurGathen:1992:PEE, author = "Joachim {Von Zur Gathen}", title = "Processor-efficient exponentiation in finite fields", journal = j-INFO-PROC-LETT, volume = "41", number = "2", pages = "81--86", day = "14", month = feb, year = "1992", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, affiliation = "Univ of Toronto", affiliationaddress = "Toronto, Ont, Can", classification = "723; B6120B (Codes); C1260 (Information theory); C4240P (Parallel programming and algorithm theory); C6130S (Data security)", corpsource = "Dept. of Comput. Sci., Toronto Univ., Ont., Canada", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "Computer Programming --- Algorithms; Computer Systems Programming; Cryptography; cryptography; Exponentiation; exponentiation; Finite Fields; finite fields; ground field; Multiprocessing Programs; normal basis; Parallel Algorithms; parallel algorithms; processor-efficiency", treatment = "T Theoretical or Mathematical", } @Article{VonZurGathen:1992:PEF, author = "Joachim {Von Zur Gathen}", title = "Processor-efficient exponentiation in finite fields", journal = j-INFO-PROC-LETT, volume = "41", number = "2", pages = "81--86", day = "14", month = feb, year = "1992", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Wed Jan 29 09:23:05 MST 1997", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/infoproc.bib", acknowledgement = ack-nhfb, affiliation = "Univ of Toronto", affiliationaddress = "Toronto, Ont, Can", classification = "723", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "Computer Programming --- Algorithms; Computer Systems Programming; Cryptography; Exponentiation; Finite Fields; Multiprocessing Programs; Parallel Algorithms", } @MastersThesis{Wang:1992:CDS, author = "Dacheng Wang", title = "Cryptosystem and digital signature scheme based on error-correcting codes", type = "Thesis ({M.S.})", school = "Computer Science Telecommunications Program. University of Missouri-Kansas City", address = "Kansas City, MO, USA", pages = "vii + 48", year = "1992", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Wang:1992:DKT, author = "Xiao Yun Wang", title = "A {Diophantine}-knapsack type public-key cryptosystem", journal = "Shandong Daxue Xuebao Ziran Kexue Ban", volume = "27", number = "1", pages = "29--34", year = "1992", CODEN = "SDXKEU", ISSN = "0559-7234", MRclass = "94A60", MRnumber = "1 171 208", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Shandong Daxue Xuebao. Ziran Kexue Ban. Journal of Shandong University. Natural Science Edition", } @Article{Want:1992:ABL, author = "Roy Want and Andy Hopper and Veronica Falcao and Jonathan Gibbons", title = "The Active Badge Location System", journal = j-TOIS, volume = "10", number = "1", pages = "91--102", month = jan, year = "1992", CODEN = "ATISET", ISSN = "1046-8188", ISSN-L = "0734-2047", bibdate = "Sat Jan 16 19:04:41 MST 1999", bibsource = "Compendex database; http://www.acm.org/pubs/tois/toc.html; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org:80", abstract = "A novel system for the location of people in an office environment is described. Members of staff wear badges that transmit signals providing information about their location to a centralized location service, through a network of sensors. The paper also examines alternative location techniques, system design issues and applications, particularly relating to telephone call routing. Location systems raise concerns about the privacy of an individual, and these issues are also addressed.", acknowledgement = ack-nhfb, affiliation = "Olivetti Research Ltd", affiliationaddress = "Cambridge, Engl", classification = "716.1; 718.1; 722.3; 723.2; 723.3; 903.3", fjournal = "ACM Transactions on Information Systems", journalabr = "ACM Trans Inf Syst", keywords = "Active badges; Computer networks; Data communication equipment; Data communication systems; Database systems; Digital communication systems; Information retrieval systems; Location; Location systems; Multiplexing equipment; Office automation; Privacy issues; Security of data; Sensors; Tagging systems", } @InProceedings{Willcox:1992:TCS, author = "D. A. Willcox and S. R. Bunch", title = "A Tool for Covert Storage Channel Analysis of the {UNIX} Kernel", crossref = "NIST:1992:NCS", pages = "697--706", year = "1992", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/021148.html", acknowledgement = ack-nhfb, keywords = "information hiding; steganography", } @Article{Woo:1992:ADS, author = "Thomas Y. C. Woo and Simon S. Lam", title = "Authentication for Distributed Systems", journal = j-COMPUTER, volume = "25", number = "1", pages = "39--52", month = jan, year = "1992", CODEN = "CPTRB4", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Fri Jun 11 18:01:47 1999", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/computer.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "See correction \cite{Woo:1992:CAD}.", abstract = "A. distributed system is susceptible to a. variety of security threats mounted by intruders. We describe a. number of protocols to authenticate users, hosts, and processes.", acknowledgement = ack-nhfb, affiliation = "Univ of Texas, Austin, TX, USA", classification = "722; 723; B6150M (Protocols); C5640 (Protocols); C6130S (Data security)", fjournal = "Computer", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", journalabr = "Computer", keywords = "Authentication; Authentication Protocols; Computer Networks --- Protocols; Computer Systems, Digital --- Distributed; Cryptography; Data Processing; Distributed systems; General Identity Authentication; General identity authentication; Kerberos; Kerberos Authentication Services; Message Content Authentication; Message content authentication; Message Origin Authentication; Message origin authentication; Protocols; Security of Data; SPX; User Authentication", thesaurus = "Distributed processing; Protocols; Security of data", } @Article{Woo:1992:ARC, author = "T. Y. C. Woo and S. S. Lam", title = "`Authentication' revisited (correction and addendum to {`Authentication' for distributed systems, Jan. 92, 39--52})", journal = j-COMPUTER, volume = "25", number = "3", pages = "10", month = mar, year = "1992", CODEN = "CPTRB4", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Fri Sep 13 18:26:01 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/computer1990.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, affiliation = "Texas Univ., Austin, TX, USA", classification = "C5640 (Protocols); C6130S (Data security)", fjournal = "Computer", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", keywords = "Distributed systems; Peer-peer authentication protocol", thesaurus = "Distributed processing; Protocols; Security of data", } @Article{Woo:1992:CAD, author = "Thomas Y. C. Woo and Simon S. Lam", title = "Correction: Authentication for distributed systems", journal = j-COMPUTER, volume = "25", number = "3", pages = "10--10", month = mar, year = "1992", CODEN = "CPTRB4", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Fri Jun 11 18:01:50 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "See \cite{Woo:1992:ADS}.", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @MastersThesis{Wu:1992:GOC, author = "Chih-Kuo Wu", title = "Group oriented cryptosystem and digital signature scheme without the assistance of a mutually trusted party", type = "Thesis ({M.S.})", school = "Computer Science Telecommunications Program. University of Missouri-Kansas City", address = "Kansas City, MO, USA", pages = "vii + 43", year = "1992", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Xie:1992:PEC, author = "Dong Qing Xie", title = "Partially efficient computation and criteria of security for public key cryptosystems", journal = "Hunan Daxue Xuebao", volume = "19", number = "6", pages = "50--56, 70", year = "1992", CODEN = "HDAXE3", ISSN = "1000-2472", MRclass = "94A60", MRnumber = "93m:94022", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Hunan Daxue Xuebao. Ziran Kexue Ban. Journal of Hunan University. Natural Sciences", } @Article{Yu:1992:NTD, author = "Xiu Yuan Yu", title = "A note on the trap-door knapsack public-key cryptosystem", journal = "Gaoxiao Yingyong Shuxue Xuebao", volume = "7", number = "4", pages = "502--508", year = "1992", ISSN = "1000-4424", MRclass = "94A60", MRnumber = "93i:94014", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Gaoxiao Yingyong Shuxue Xuebao. Applied Mathematics. A Journal of Chinese Universities", } @Article{Abadi:1993:ADS, author = "M. Abadi and M. Burrows and C. Kaufman and B. Lampson", title = "Authentication and delegation with smart-cards", journal = j-SCI-COMPUT-PROGRAM, volume = "21", number = "2", pages = "93--113", month = oct, year = "1993", CODEN = "SCPGD4", ISSN = "0167-6423 (print), 1872-7964 (electronic)", ISSN-L = "0167-6423", bibdate = "Sun Oct 10 09:12:09 MDT 1999", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, affiliation = "Digital Equipment Corp", affiliationaddress = "Palo Alto, USA", classification = "714.2; 722.3; 722.4; 723.2", fjournal = "Science of Computer Programming", journal-URL = "http://www.sciencedirect.com/science/journal/01676423", journalabr = "Sci Comput Program", keywords = "Authentication; Authority delegation; Complex trust relations; Cryptography; Data processing; Decoding; Decryption; Distributed computer systems; Encoding (symbols); Encryption; Network protocols; Nodes; Point of sale terminals; Public key smart card protocols; Security of data; Smart cards; User interfaces", } @Article{Abadi:1993:CAC, author = "Mart{\'\i}n Abadi and Michael Burrows and Butler Lampson and Gordon Plotkin", title = "A Calculus for Access Control in Distributed Systems", journal = j-TOPLAS, volume = "15", number = "4", pages = "706--734", month = sep, year = "1993", CODEN = "ATPSDT", ISSN = "0164-0925 (print), 1558-4593 (electronic)", ISSN-L = "0164-0925", bibdate = "Fri Jan 5 07:58:42 MST 1996", bibsource = "Compiler/TOPLAS.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/toplas.bib", URL = "http://www.acm.org/pubs/toc/Abstracts/0164-0925/155225.html", abstract = "We study some of the concepts, protocols, and algorithms for access control in distributed systems, from a logical perspective. We account for how a principal may come to believe that another principal is making a request, either on his own or on someone else's behalf. We also provide a logical language for access control lists and theories for deciding whether requests should be granted.", acknowledgement = ack-nhfb # " and " # ack-pb, fjournal = "ACM Transactions on Programming Languages and Systems", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J783", keywords = "security; theory; verification", subject = "{\bf D.4.6}: Software, OPERATING SYSTEMS, Security and Protection, Access controls. {\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical Logic. {\bf D.4.6}: Software, OPERATING SYSTEMS, Security and Protection, Authentication. {\bf D.4.6}: Software, OPERATING SYSTEMS, Security and Protection, Verification. {\bf C.2.4}: Computer Systems Organization, COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.", } @Article{Abbott:1993:INT, author = "Mark B. Abbott and Larry L. Peterson", title = "Increasing network throughput by integrating protocol layers", journal = j-IEEE-TRANS-NETWORKING, volume = "1", number = "5", pages = "600--610", month = oct, year = "1993", CODEN = "IEANEP", DOI = "https://doi.org/10.1109/90.251918", ISSN = "1063-6692 (print), 1558-2566 (electronic)", ISSN-L = "1063-6692", bibdate = "Tue Jul 27 15:53:14 MDT 1999", bibsource = "http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org:80/pubs/citations/journals/ton/1993-1-5/p600-abbott/", acknowledgement = ack-nhfb, fjournal = "IEEE\slash ACM Transactions on Networking", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771", keywords = "design; performance; security; theory", subject = "{\bf C.2.2} Computer Systems Organization, COMPUTER-COMMUNICATION NETWORKS, Network Protocols. {\bf C.2.0} Computer Systems Organization, COMPUTER-COMMUNICATION NETWORKS, General, Security and protection (e.g., firewalls). {\bf E.3} Data, DATA ENCRYPTION.", } @Article{Agnew:1993:DFE, author = "Gordon B. Agnew and R. C. Mullin and Scott A. Vanstone", title = "On the development of a fast elliptic curve cryptosystem", journal = j-LECT-NOTES-COMP-SCI, volume = "658", pages = "482--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:29 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0658.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0658/06580482.htm; http://link.springer-ny.com/link/service/series/0558/papers/0658/06580482.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @PhdThesis{Alabbadi:1993:IEC, author = "Mohssen Alabbadi", title = "Integration of error correction, encryption, and signature based on linear error-correcting block codes", type = "Thesis ({Ph.D.})", school = "School of Electrical Engineering, Georgia Institute of Technology", address = "Atlanta, GA, USA", pages = "xii + 185", year = "1993", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Directed by Stephen B. Wicker.", acknowledgement = ack-nhfb, keywords = "Error-correcting codes (Information theory); Markov processes.", } @Misc{Alagappan:1993:RTA, author = "K. Alagappan", title = "{RFC 1412}: {Telnet Authentication}: {SPX}", month = jan, year = "1993", bibdate = "Thu Oct 16 09:34:09 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Status: EXPERIMENTAL.", URL = "ftp://ftp.internic.net/rfc/rfc1412.txt; https://www.math.utah.edu/pub/rfc/rfc1412.txt", acknowledgement = ack-nhfb, format = "TXT=6952 bytes", online = "yes", status = "EXPERIMENTAL", } @Article{Anderson:1993:PRT, author = "R. J. Anderson", title = "A practical {RSA} trapdoor", journal = "Electronic Letters", volume = "??", number = "??", pages = "29--??", month = "????", year = "1993", DOI = "????", bibdate = "Mon Mar 09 11:20:12 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "????", acknowledgement = ack-nhfb, remark = "Cite in \cite[reference 4]{Schneier:2015:SWC}.", } @Article{Andrasiu:1993:LTP, author = "Mircea Andra{\c{s}}iu and Gheorghe P{\u{a}}un and J{\"u}rgen Dassow and Arto Salomaa", title = "Language-theoretic problems arising from {Richelieu} cryptosystems", journal = j-THEOR-COMP-SCI, volume = "116", number = "2", pages = "339--357", day = "16", month = aug, year = "1993", CODEN = "TCSCDI", ISSN = "0304-3975 (print), 1879-2294 (electronic)", ISSN-L = "0304-3975", MRclass = "68Q45 (03D05 68P25 94A60)", MRnumber = "94i:68149", MRreviewer = "William R. Nico", bibdate = "Mon Jul 19 22:17:28 MDT 1999", bibsource = "http://www.elsevier.com/cgi-bin/cas/tree/store/tcs/cas_free/browse/browse.cgi?year=1993&volume=116&issue=2; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/tcs1990.bib", URL = "http://www.elsevier.com/cgi-bin/cas/tree/store/tcs/cas_sub/browse/browse.cgi?year=1993&volume=116&issue=2&aid=1238", acknowledgement = ack-nhfb, classification = "C4210 (Formal logic); C6130S (Data security)", corpsource = "Inst. of Math., Bucuresti, Romania", fjournal = "Theoretical Computer Science", journal-URL = "http://www.sciencedirect.com/science/journal/03043975", keywords = "cryptography; decidability; formal languages; language theoretic problems; Richelieu cryptosystems", pubcountry = "Netherlands", treatment = "P Practical; T Theoretical or Mathematical", } @Article{Anonymous:1993:ACT, author = "Anonymous", title = "Anti-counterfeit trials begin with watermark technology", journal = j-FINANC-TECH-INT-BULL, volume = "XI", number = "2", pages = "6--7", month = oct, year = "1993", CODEN = "FTIBFY", ISSN = "0265-1661", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/024122.html", acknowledgement = ack-nhfb, fjournal = "Financial Technology International Bulletin", keywords = "information hiding; steganography", } @Article{Anonymous:1993:BRd, author = "Anonymous", title = "Book Reviews", journal = j-SCI-AMER, volume = "268", number = "4", pages = "123--??", month = apr, year = "1993", CODEN = "SCAMAC", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Wed Jun 19 06:56:52 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "Living machines \ldots{} Maya decipherer \ldots{} Docile Astrid.", acknowledgement = ack-nhfb, fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", } @Manual{Anonymous:1993:CCA, author = "{IBM}", title = "Common Cryptographic Architecture: Cryptographic Application Programming Interface --- Public Key Algorithm", organization = pub-IBM, address = pub-IBM:adr, pages = "??", month = apr, year = "1993", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "IBM publication SC40-1676.", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 7]{Johnson:1996:AEE}.", } @Article{Anonymous:1993:CKR, author = "Anonymous", title = "Can {Kerberos} Really Make {UNIX} Secure?", journal = j-DATAMATION, volume = "39", number = "1", pages = "59--??", day = "01", month = jan, year = "1993", CODEN = "DTMNAT", ISSN = "0011-6963", bibdate = "Sat Jan 27 07:35:21 MST 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/datamation.bib", abstract = "New Versions of MIT's Kerberos UNIX security technology are on the way for cross-platform, multiuser authentication of complex corporate systems.", acknowledgement = ack-nhfb, fjournal = "Datamation", } @Article{Anonymous:1993:CNh, author = "Anonymous", title = "{CS} News", journal = j-COMPUTER, volume = "26", number = "11", pages = "76--??", month = nov, year = "1993", CODEN = "CPTRB4", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Tue May 14 16:20:44 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/computer.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "Cryptographic policy", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Manual{Anonymous:1993:FPD, title = "{FIPS} Publication 46-2: Data Encryption Standard", organization = "National Institute of Standards and Technology (formerly National Bureau of Standards)", address = "Gaithersburg, MD, USA", pages = "??", day = "30", month = dec, year = "1993", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 4]{Kaliski:1995:SRE}.", } @Manual{Anonymous:1993:FSH, author = "Anonymous", title = "{FIPS} 180, Secure Hash Standard", organization = "NIST, US Department of Commerce", address = "Washington, DC, USA", month = may, year = "1993", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 16]{Preneel:1997:CHF}.", } @Article{Anonymous:1993:SBh, author = "Anonymous", title = "Science and Business", journal = j-SCI-AMER, volume = "269", number = "2", pages = "112--??", month = aug, year = "1993", CODEN = "SCAMAC", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Wed Jun 19 06:56:52 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "Controlling computers with mind and motion \ldots{} Hard-sell zoo \ldots{} Are drug companies price gougers? \ldots{} Costly ``Clipper'' \ldots{} Photosynthetic film \ldots{} Stable todorokite \ldots{} The Analytical Economist: Should the banks be deregulated?", acknowledgement = ack-nhfb, fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", } @Article{Anonymous:1993:SMC, author = "Anonymous", title = "{Secure E-Mail Cheaply With Software Encryption}", journal = j-DATAMATION, volume = "39", number = "23", pages = "48--??", day = "01", month = dec, year = "1993", CODEN = "DTMNAT", ISSN = "0011-6963", bibdate = "Sat Jan 27 07:35:21 MST 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "Once only bankers, Wall Street firms and defense contractors could afford encryption. Now, new standards and security software are making encryption more convenient and cheap.", acknowledgement = ack-nhfb, fjournal = "Datamation", } @Article{Anonymous:1993:WND, author = "Anonymous", title = "What's New: The {DTR-1} is a notebook or a pen computer, the {SmartLink V32bis FaxModem} encrypts your data, {LapCAD} 5 for the {Mac} gives you finite modeling, and more", journal = j-BYTE, volume = "18", number = "6", pages = "57--??", month = may, year = "1993", CODEN = "BYTEDJ", ISSN = "0360-5280 (print), 1082-7838 (electronic)", ISSN-L = "0360-5280", bibdate = "Tue Jan 2 10:01:41 MST 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "BYTE Magazine", } @Article{Anshel:1993:PMT, author = "Iris Lee Anshel and Michael Anshel", title = "From the Post-{Markov} Theorem Through Decision Problems to Public-Key Cryptography", journal = j-AMER-MATH-MONTHLY, volume = "100", number = "9", pages = "835--844", month = nov, year = "1993", CODEN = "AMMYAE", ISSN = "0002-9890 (print), 1930-0972 (electronic)", ISSN-L = "0002-9890", MRclass = "94-03 (03-01 03D03 03D25 03D40 94A60)", MRnumber = "1 247 530", bibdate = "Wed Dec 3 17:17:33 MST 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/amermathmonthly1990.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "American Mathematical Monthly", journal-URL = "https://www.jstor.org/journals/00029890.htm", } @Article{Arazi:1993:AEA, author = "B. Arazi", title = "Architectures for exponentiation over {$ \mathrm {GD}(2^n) $} adopted for smartcard application", journal = j-IEEE-TRANS-COMPUT, volume = "42", number = "4", pages = "494--497", month = apr, year = "1993", CODEN = "ITCOB4", DOI = "https://doi.org/10.1109/12.214694", ISSN = "0018-9340 (print), 1557-9956 (electronic)", ISSN-L = "0018-9340", bibdate = "Thu Jul 7 07:58:48 MDT 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranscomput1990.bib", URL = "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=214694", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Computers", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12", } @Article{Atanasiu:1993:AEU, author = "Adrian Atanasiu", title = "About encryption using formal methods---substitution on words and languages", journal = "An. Univ. Bucure{\c{s}}ti Mat. Inform.", volume = "42/43", pages = "68--75", year = "1993/94", ISSN = "1224-7170", MRclass = "94A60", MRnumber = "1 307 005", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; MathSciNet database", fjournal = "Analele Universit{\u{a}}{\c{t}}ii Bucure{\c{s}}ti. Matematic{\u{a}}-Informatic{\u{a}}", } @MastersThesis{Atkins:1993:CKE, author = "Derek A. (Derek Allan) Atkins", title = "{Charon}: {Kerberos} extensions for authentication over secondary networks", type = "Thesis ({B.S.})", school = "Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology", address = "Cambridge, MA, USA", pages = "vii + 91", year = "1993", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Banisar:1993:BCE, author = "David Banisar", title = "Battle For Control of Encryption Technology", journal = j-IEEE-SOFTWARE, volume = "10", number = "4", pages = "95--97", month = jul, year = "1993", CODEN = "IESOEG", DOI = "https://doi.org/10.1109/52.219638", ISSN = "0740-7459 (print), 0740-7459 (electronic)", ISSN-L = "0740-7459", bibdate = "Tue Jan 9 17:09:45 MST 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/ieeesoft.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Software", journal-URL = "http://www.computer.org/portal/web/csdl/magazines/software", } @Article{Baritaud:1993:SPK, author = "T. Baritaud and M. Campana and P. Chauvaud and H. Gilbert", title = "On the Security of the Permuted Kernel Identification Scheme", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "305--311", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Barlow:1993:EFA, author = "John Perry Barlow", title = "The Electronic Frontier: a Plain Text on Crypto Policy", journal = j-CACM, volume = "36", number = "11", pages = "21--26", month = nov, year = "1993", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu May 30 09:41:10 MDT 1996", bibsource = "http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cacm1990.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/163378.html", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "legal aspects; security", subject = "{\bf K.5.2}: Computing Milieux, LEGAL ASPECTS OF COMPUTING, Governmental Issues. {\bf K.4.1}: Computing Milieux, COMPUTERS AND SOCIETY, Public Policy Issues, Privacy. {\bf E.3}: Data, DATA ENCRYPTION.", } @Article{Barlow:1993:EFP, author = "John Perry Barlow", title = "The Electronic Frontier: a Plain Text on Crypto Policy", journal = j-CACM, volume = "36", number = "11", pages = "21--26", month = nov, year = "1993", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu May 30 09:41:10 MDT 1996", bibsource = "http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cacm1990.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/163378.html", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "legal aspects; security", subject = "{\bf K.5.2}: Computing Milieux, LEGAL ASPECTS OF COMPUTING, Governmental Issues. {\bf K.4.1}: Computing Milieux, COMPUTERS AND SOCIETY, Public Policy Issues, Privacy. {\bf E.3}: Data, DATA ENCRYPTION.", } @Article{Baskerville:1993:ISS, author = "Richard Baskerville", title = "Information Systems Security Design Methods: Implications for Information Systems Development", journal = j-COMP-SURV, volume = "25", number = "4", pages = "375--414", month = dec, year = "1993", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/162124.162127", ISSN = "0360-0300 (print), 1557-7341 (electronic)", ISSN-L = "0360-0300", bibdate = "Thu Jun 19 09:44:55 MDT 2008", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib; http://www.acm.org/pubs/contents/journals/surveys/; https://www.math.utah.edu/pub/tex/bib/compsurv.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org/pubs/toc/Abstracts/0360-0300/162127.html", abstract = "The security of information systems is a serious issue because computer abuse is increasing. It is important, therefore, that systems analysts and designers develop expertise in methods for specifying information systems security. The characteristics found in three generations of general information system design methods provide a framework for comparing and understanding current security design methods. These methods include approaches that use checklists of controls, divide functional requirements into engineering partitions, and create abstract models of both the problem and the solution. Comparisons and contrasts reveal that advances in security methods lag behind advances in general systems development methods. This analysis also reveals that more general methods fail to consider security specifications rigorously.", acknowledgement = ack-nhfb, fjournal = "ACM Computing Surveys", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J204", keywords = "checklists; control; integrity; management; risk analysis; safety; security; structured systems analysis and design; system modeling", subject = "{\bf C.0}: Computer Systems Organization, GENERAL, Systems specification methodology. {\bf H.1.1}: Information Systems, MODELS AND PRINCIPLES, Systems and Information Theory, Value of information. {\bf H.1.2}: Information Systems, MODELS AND PRINCIPLES, User/Machine Systems, Human factors. {\bf K.6.1}: Computing Milieux, MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS, Project and People Management, Systems analysis and design. {\bf K.6.5}: Computing Milieux, MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS, Security and Protection, Authentication. {\bf K.6.5}: Computing Milieux, MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS, Security and Protection, Insurance. {\bf K.6.5}: Computing Milieux, MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS, Security and Protection, Invasive software. {\bf K.6.5}: Computing Milieux, MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS, Security and Protection, Physical security.", } @InProceedings{Bayer:1993:IER, author = "D. Bayer and S. Haber and W. S. Stornetta", editor = "R. M. Capocelli and A. {De Santis} and U. Vaccaro", booktitle = "Sequences II: Methods in Communication, Security, and Computer Science", title = "Improving the efficiency and reliability of digital time-stamping", publisher = pub-SV, address = pub-SV:adr, pages = "329--334", year = "1993", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 1]{Haber:1995:HDD}.", } @Article{Beaver:1993:CPP, author = "Donald Beaver and Stuart Haber", title = "Cryptographic protocols provably secure against dynamic adversaries", journal = j-LECT-NOTES-COMP-SCI, volume = "658", pages = "307--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:29 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0658.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0658/06580307.htm; http://link.springer-ny.com/link/service/series/0558/papers/0658/06580307.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Beaver:1993:HBS, author = "D. Beaver", title = "How to break a ``secure'' oblivious transfer protocol", journal = j-LECT-NOTES-COMP-SCI, volume = "658", pages = "285--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Beimel:1993:UIS, author = "Amos Beimel and Benny Chor", title = "Universally Ideal Secret Sharing Schemes (Preliminary Version)", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "183--195", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:51 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0740.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0740/07400183.htm; http://link.springer-ny.com/link/service/series/0558/papers/0740/07400183.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Bellare:1993:CCT, author = "M. Bellare and M. Yung", title = "Certifying Cryptographic Tools: The Case of Trapdoor Permutations", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "442--460", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Bellare:1993:DPK, author = "M. Bellare and O. Goldreich", title = "On Defining Proofs of Knowledge", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "390--420", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Beller:1993:BDH, author = "Michael J. Beller and Yacov Yacobi", title = "Batch {Diffie--Hellman} key agreement systems and their application to portable communications", journal = j-LECT-NOTES-COMP-SCI, volume = "658", pages = "208--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:29 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0658.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0658/06580208.htm; http://link.springer-ny.com/link/service/series/0558/papers/0658/06580208.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Beller:1993:BDK, author = "M. J. Beller and Y. Yacobi", title = "Batch {Diffie--Hellman} key agreement systems and their application to portable communications", journal = j-LECT-NOTES-COMP-SCI, volume = "658", pages = "208--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Berson:1993:DCA, author = "T. Berson", title = "Differential cryptanalysis $ \bmod 2^32 $ with applications to {MD5}", crossref = "Rueppel:1993:ACE", pages = "71--80", year = "1993", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 2]{Preneel:1997:CHF}.", } @Article{Bertilsson:1993:CPS, author = "M. Bertilsson and I. Ingemarsson", title = "A construction of practical secret sharing schemes using linear block codes", journal = j-LECT-NOTES-COMP-SCI, volume = "718", pages = "67--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Book{Biham:1993:DCD, author = "Eli Biham and Adi Shamir", title = "Differential Cryptanalysis of the {Data Encryption Standard}", publisher = pub-SV, address = pub-SV:adr, pages = "ix + 188", year = "1993", ISBN = "0-387-97930-1 (New York), 3-540-97930-1 (Berlin)", ISBN-13 = "978-0-387-97930-4 (New York), 978-3-540-97930-2 (Berlin)", LCCN = "QA76.9.A25 B54 1993", MRclass = "94A60", MRnumber = "95a:94007", MRreviewer = "Joan Boyar", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; MathSciNet database", acknowledgement = ack-nhfb, keywords = "Computers --- Access control; Cryptography; Data encryption (Computer science)", referencedin = "Referenced in \cite[Ref. 1]{Yin:1997:REA}, \cite[Ref. 7]{Biham:1998:TA}, \cite[Ref. 1]{Kaliski:1995:SRE}, \cite[Ref. 1]{Rivest:1995:REAc}.", } @Article{Biham:1993:DCF, author = "E. Biham and A. Shamir", title = "Differential Cryptanalysis of the Full $ 16$-Round {DES}", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "487--496", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @InProceedings{Blakley:1993:TPD, author = "R. Blakley and G. R. Blakley and A. H. Chan and J. L. Massey", title = "Threshold Protocols with Disenrollment", crossref = "Brickell:1993:ACC", pages = "540--548", year = "1993", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 3]{Gemmell:1997:ITC}.", } @Article{Blakley:1993:TSD, author = "B. Blakley and G. R. Blakley and A. H. Chan and J. L. Massey", title = "Threshold Schernes with Disenrollment", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "540--548", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @InProceedings{Blaze:1993:TMS, author = "Matt Blaze", title = "Transparent Mistrust: {OS} Support for Cryptography-in-the-Large", crossref = "IEEE:1993:FIW", pages = "98--102", year = "1993", bibdate = "Mon May 28 10:00:13 MDT 2001", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; OCLC Proceedings database", URL = "http://ieeexplore.ieee.org/iel2/918/8054/00348165.pdf", acknowledgement = ack-nhfb, } @Article{Blundo:1993:ESM, author = "C. Blundo and A. {De Santis} and U. Vaccaro", title = "Efficient sharing of many secrets", journal = j-LECT-NOTES-COMP-SCI, volume = "665", pages = "692--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Blundo:1993:GDS, author = "C. Blundo and A. {De Santis} and D. R. Stinson and U. Vaccaro", title = "Graph decompositions and secret sharing schemes", journal = j-LECT-NOTES-COMP-SCI, volume = "658", pages = "1--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Blundo:1993:IRS, author = "C. Blundo and A. {De Santis} and L. Gargano and U. Vaccaro", title = "On the Information Rate of Secret Sharing Schemes", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "148--167", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Blundo:1993:PSK, author = "C. Blundo and A. {De Santis} and A. Herzberg and S. Kutten", title = "Perfectly-Secure Key Distribution for Dynamic Conferences", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "471--486", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Misc{Borman:1993:RTAa, author = "D. Borman", title = "{RFC 1409}: {Telnet Authentication Option}", month = jan, year = "1993", bibdate = "Thu Oct 16 09:34:09 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Obsoleted by RFC1416 \cite{Borman:1993:RTAc}. Status: EXPERIMENTAL.", URL = "ftp://ftp.internic.net/rfc/rfc1409.txt; ftp://ftp.internic.net/rfc/rfc1416.txt; https://www.math.utah.edu/pub/rfc/rfc1409.txt; https://www.math.utah.edu/pub/rfc/rfc1416.txt", acknowledgement = ack-nhfb, format = "TXT=13119 bytes", obsoletedby = "Obsoleted by RFC1416 \cite{Borman:1993:RTAc}.", online = "yes", status = "EXPERIMENTAL", } @Misc{Borman:1993:RTAb, author = "D. Borman", title = "{RFC 1411}: {Telnet Authentication}: {Kerberos Version} 4", month = jan, year = "1993", bibdate = "Thu Oct 16 09:34:09 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/rfc.bib", note = "Status: EXPERIMENTAL.", URL = "ftp://ftp.internic.net/rfc/rfc1411.txt; https://www.math.utah.edu/pub/rfc/rfc1411.txt", acknowledgement = ack-nhfb, format = "TXT=7967 bytes", online = "yes", status = "EXPERIMENTAL", } @Misc{Borman:1993:RTAc, author = "D. Borman", title = "{RFC 1416}: {Telnet Authentication Option}", month = feb, year = "1993", bibdate = "Thu Oct 16 09:34:09 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Obsoletes RFC1409 \cite{Borman:1993:RTAa}. Status: EXPERIMENTAL.", URL = "ftp://ftp.internic.net/rfc/rfc1409.txt; ftp://ftp.internic.net/rfc/rfc1416.txt; https://www.math.utah.edu/pub/rfc/rfc1409.txt; https://www.math.utah.edu/pub/rfc/rfc1416.txt", acknowledgement = ack-nhfb, format = "TXT=13270 bytes", obsoletes = "Obsoletes RFC1409 \cite{Borman:1993:RTAa}.", online = "yes", status = "EXPERIMENTAL", } @Article{Bos:1993:PUS, author = "J. N. E. Bos and D. Chaum", title = "Provably Unforgeable Signatures", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "1--14", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Bosselaers:1993:CWP, author = "A. Bosselaers and R. Govaerts and J. Vandewalle", title = "Cryptography Within Phase {I} of the {EEC-RACE} Programme", journal = j-LECT-NOTES-COMP-SCI, volume = "741", pages = "227--234", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "computer security; ESAT; industrial cryptography", } @MastersThesis{Bowling:1993:SEA, author = "Brian D. Bowling", title = "The secure encryption algorithm", type = "Thesis ({M.S.})", school = "University of Cincinnati", address = "Cincinnati, OH, USA", pages = "63", year = "1993", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Brandt:1993:GPP, author = "J. Brandt and I. Damgaard", title = "On Generation of Probable Primes by Incremental Search", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "358--370", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @TechReport{Branstad:1993:RNW, author = "Dennis K. Branstad", title = "Report of the {NIST} Workshop on Digital Signature Certificate Mangement: December 10--11, 1992", number = "NIST 5234", institution = pub-NIST, address = pub-NIST:adr, pages = "various", month = oct, year = "1993", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Book{Brassard:1993:CM, author = "Gilles Brassard", title = "Cryptologie moderne", volume = "9", publisher = pub-MASSON, address = pub-MASSON:adr, pages = "x + 124", year = "1993", ISBN = "2-225-83970-0", ISBN-13 = "978-2-225-83970-2", LCCN = "????", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Traduction de {\em Modern Cryptology}, Claude Goutier, traducteur.", series = "Logique Mathematiques Informatique", acknowledgement = ack-nhfb, alttitle = "Modern Cryptology. fran{\c{c}}ais.", keywords = "Cryptologie --- informatique; Donnees --- compression (Informatique).", } @Article{Brown:1993:IRD, author = "Lawrence Brown and Matthew Kwan and Josef Pieprzyk and Jennifer Seberry", title = "Improving Resistance to Differential Cryptanalysis and the Redesign of {LOKI}", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "36--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Calvelli:1993:ARS, author = "Claudio Calvelli and Vijay Varadharajan", title = "Authentication and revocation in {SPM} extended abstract", journal = j-OPER-SYS-REV, volume = "27", number = "4", pages = "42--57", month = oct, year = "1993", CODEN = "OSRED8", ISSN = "0163-5980 (print), 1943-586X (electronic)", ISSN-L = "0163-5980", bibdate = "Sat Aug 26 08:55:51 MDT 2006", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Operating Systems Review", } @Article{Campbell:1993:G, author = "K. W. Campbell and M. J. Wiener", title = "{DES} is not a Group", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "512--520", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Carlet:1993:PBF, author = "C. Carlet", title = "Partially-Bent Functions", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "280--291", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Chaum:1993:NCB, author = "D. Chaum", title = "Numbers Can Be a Better Form of Cash than Paper", journal = j-LECT-NOTES-COMP-SCI, volume = "741", pages = "174--178", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "computer security; ESAT; industrial cryptography", } @Article{Chaum:1993:WDO, author = "D. Chaum and T. {Pryds Pedersen}", title = "Wallet Databases with Observers", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "89--105", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Chor:1993:CPT, author = "Benny Chor and Eyal Kushilevitz", title = "A communication-privacy tradeoff for modular addition", journal = j-INFO-PROC-LETT, volume = "45", number = "4", pages = "205--210", day = "22", month = mar, year = "1993", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", MRclass = "68Q25 (68M10 94A60)", MRnumber = "93m:68070", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, classification = "B6150M (Protocols); C4240P (Parallel programming and algorithm theory); C5640 (Protocols)", corpsource = "Dept. of Comput. Sci., Technion, Haifa, Israel", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", keywords = "communication complexity; communication-privacy tradeoff; modular addition; protocol; protocols; t-privately; tight lower bound", treatment = "P Practical; T Theoretical or Mathematical", } @InProceedings{Clark:1993:EMS, author = "R. K. Clark and I. B. Greenberg and P. K. Boucher and T. F. Lunt and P. G. Neumann and D. M. Wells and E. D. Jensen", title = "Effects of Multilevel Security on Real-Time Applications", crossref = "IEEE:1993:PNA", pages = "120--129", year = "1993", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/031208.html", acknowledgement = ack-nhfb, keywords = "information hiding; steganography", } @Article{Courington:1993:PEA, author = "Jeff Courington", title = "Printer Encryption on {AIX}", journal = j-SYS-ADMIN, volume = "2", number = "4", pages = "47--??", month = jul # "\slash " # aug, year = "1993", CODEN = "SYADE7", ISSN = "1061-2688", bibdate = "Sat Aug 31 19:04:03 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Sys admin: the journal for UNIX system administrators", } @Article{Daemen:1993:CSH, author = "Joan Daemen and Antoon Bosselaers and Rene Govaerts and Joos Vandewalle", title = "Collisions for {Schnorr}'s Hash Function {FFT-Hash} Presented at {Crypto}'91", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "477--480", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Daemen:1993:FDO, author = "Joan Daemen and Rene Govaerts and Joos Vandewalle", title = "A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of {Damg{\aa}rd}'s One-Way Function Based on a Cellular Automaton", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "82--96", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Damgaard:1993:ACE, author = "Ivan Damg{\aa}rd and Peter Landrock and Carl Pomerance", title = "Average case error estimates for the strong probable prime test", journal = j-MATH-COMPUT, volume = "61", number = "203", pages = "177--194", month = jul, year = "1993", CODEN = "MCMPAF", ISSN = "0025-5718 (print), 1088-6842 (electronic)", ISSN-L = "0025-5718", MRclass = "11Y11 (11A51)", MRnumber = "94b:11124", MRreviewer = "Herman J. J. te Riele", bibdate = "Sat Jan 11 13:29:06 MST 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Mathematics of Computation", journal-URL = "http://www.ams.org/mcom/", referencedin = "Referenced in \cite[Ref. 3]{Silverman:1997:FGR}.", } @Article{Dawson:1993:CSG, author = "E. Dawson", title = "Cryptanalysis of summation generator", journal = j-LECT-NOTES-COMP-SCI, volume = "718", pages = "209--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{DeDecker:1993:USK, author = "B. {De Decker}", title = "{Unix} Security and {Kerberos}", journal = j-LECT-NOTES-COMP-SCI, volume = "741", pages = "257--274", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "computer security; ESAT; industrial cryptography", } @Article{DeSchutter:1993:TFA, author = "B. {De Schutter}", title = "Trends in the Fight Against Computer-Related Delinquency", journal = j-LECT-NOTES-COMP-SCI, volume = "741", pages = "3--19", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "computer security; ESAT; industrial cryptography", } @Article{Desmedt:1993:PPS, author = "Y. Desmedt and J. Seberry", title = "Practical proven secure authentication with arbitration", journal = j-LECT-NOTES-COMP-SCI, volume = "718", pages = "27--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Desmedt:1993:PZS, author = "Y. Desmedt and Y. Frankel", editor = "R. Capocelli and A. {De Santis} and U. Vaccaro", booktitle = "Sequences II: Methods in Communication, Security, and Computer Science", title = "Perfect zero-knowledge sharing schemes over any finite {Abelian} group", publisher = pub-SV, address = pub-SV:adr, pages = "369--378", year = "1993", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 13]{Gemmell:1997:ITC}.", } @Article{Desmedt:1993:TC, author = "Y. Desmedt", title = "Threshold cryptosystems", journal = j-LECT-NOTES-COMP-SCI, volume = "718", pages = "3--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{DeSoete:1993:PKC, author = "M. {De Soete}", title = "Public Key Cryptography", journal = j-LECT-NOTES-COMP-SCI, volume = "741", pages = "33--49", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "computer security; ESAT; industrial cryptography", } @Article{Dessmark:1993:MDD, author = "A. Dessmark and K. Jansen and A. Lingas", title = "The Maximum $k$-Dependent and $f$-Dependent Set Problem", journal = j-LECT-NOTES-COMP-SCI, volume = "762", pages = "88--97", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "algorithms; computation; ISAAC", } @Article{Detombe:1993:CLC, author = "J. Detombe and S. E. Tavares", title = "Constructing large cryptographically strong {S}-boxes", journal = j-LECT-NOTES-COMP-SCI, volume = "718", pages = "165--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{DeWaleffe:1993:BLP, author = "D. {De Waleffe} and J.-J. Quisquater", title = "Better Login Protocols for Computer Networks", journal = j-LECT-NOTES-COMP-SCI, volume = "741", pages = "50--70", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "computer security; ESAT; industrial cryptography", } @Article{Dwork:1993:LCP, author = "C. Dwork and U. Feige and J. Kilian and M. Naor", title = "Low communication {2-Prover} Zero-Knowledge Proofs for {NP}", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "215--227", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Dwork:1993:PPC, author = "C. Dwork and M. Naor", title = "Pricing via Processing or Combatting Junk Mail", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "139--147", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Eberle:1993:HSI, author = "H. Eberle", title = "A High-Speed {DES} Implementation for Network Applications", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "521--539", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Even:1993:CCS, author = "Shimon Even and Yishay Mansour", title = "A Construction of a Cipher from a Single Pseudorandom Permutation", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "210--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", referencedin = "Referenced in \cite[Ref. 1]{Rogaway:1996:SD}.", } @Article{Evertse:1993:WNR, author = "Jan-Hendrik Evertse and Eug{\`e}ne van Heyst", title = "Which new {RSA} signatures can be computed from {RSA} signatures, obtained in a specific interactive protocol?", journal = j-LECT-NOTES-COMP-SCI, volume = "658", pages = "378--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:29 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0658.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0658/06580378.htm; http://link.springer-ny.com/link/service/series/0558/papers/0658/06580378.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Book{Feit:1993:TIA, author = "Sidnie Feit", title = "{TCP\slash IP}: Architecture, Protocols and Implementation", publisher = pub-MCGRAW-HILL, address = pub-MCGRAW-HILL:adr, pages = "xxiii + 466", year = "1993", ISBN = "0-07-020346-6", ISBN-13 = "978-0-07-020346-4", LCCN = "TK5105.5 .F423 1993", bibdate = "Mon Mar 27 19:22:56 1995", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/internet.bib; internet-books.1995.03.06", note = "Covers protocols plus additional services and products: NFS NIS, BIND, ARP, RIP, KERBEROS, SNMP, etc. Discusses hoe to invoke network services, plan name/address structure, troubleshoot, connect via bridges and routers.", price = "US\$44.95", acknowledgement = ack-nhfb, } @InProceedings{Fellows:1993:FPC, author = "Michael R. Fellows and Neal Koblitz", title = "Fixed-parameter complexity and cryptography", crossref = "Cohen:1993:AAA", pages = "121--131", year = "1993", DOI = "https://doi.org/10.1007/3-540-56686-4_38", bibdate = "Sun Mar 11 10:38:38 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Fellows:1993:KKI, author = "M. Fellows and N. Koblitz", title = "Kid Krypto (Invited)", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "371--389", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Manual{FIPS:1993:APG, author = "{FIPS}", title = "Automated Password Generator", volume = "181", organization = pub-NIST, address = pub-NIST:adr, day = "5", month = oct, year = "1993", bibdate = "Thu Aug 18 07:16:02 2005", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = "FIPS PUB", URL = "http://www.itl.nist.gov/fipspubs/fip181.htm", acknowledgement = ack-nhfb, keywords = "computer security; cryptography", } @Book{FIPS:1993:SHS, author = "{FIPS (Federal Information Processing Standards Publication)}", title = "Secure Hash Standard: {FIPS} {PUB} 180, May 11, 1993", publisher = pub-USGPO, address = pub-USGPO:adr, pages = "??", month = may # " 11", year = "1993", bibdate = "Thu Jul 21 08:52:12 1994", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Forsyth:1993:ACS, author = "W. S. Forsyth and R. Safavi-Naini", booktitle = "Proceedings of the Sixteenth Australian Computer Science Conference (ACSC-16) (Brisbane, 1993)", title = "Automated cryptanalysis of substitution ciphers", journal = "Austral. Comput. Sci. Comm.", volume = "15", number = "1, part A", pages = "153--161", year = "1993", ISSN = "0157-3055", MRclass = "94A60", MRnumber = "1 238 999", bibdate = "Sat Oct 26 10:21:29 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Australian Computer Science Communications", } @Article{Frankel:1993:NEH, author = "Y. Frankel and Y. Desmedt and M. Burmester", title = "Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "549--557", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @InProceedings{Frankel:1993:NHG, author = "Y. Frankel and Y. Desmedt and M. Burmester", title = "Non-existence of homomorphic general sharing schemes for some key spaces", crossref = "Brickell:1993:ACC", pages = "549--557", year = "1993", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 18]{Gemmell:1997:ITC}.", } @Article{Franksen:1993:BCM, author = "Ole Immanuel Franksen", title = "{Babbage} and cryptography. {Or}, the mystery of {Admiral Beaufort}'s cipher", journal = j-MATH-COMP-SIM, volume = "35", number = "4", pages = "327--367", month = oct, year = "1993", CODEN = "MCSIDR", DOI = "https://doi.org/10.1016/0378-4754(93)90063-Z", ISSN = "0378-4754 (print), 1872-7166 (electronic)", ISSN-L = "0378-4754", MRclass = "01A70 (94-03 94A60)", MRnumber = "1245617 (94h:01036)", bibdate = "Tue Jan 15 11:49:13 2013", bibsource = "https://www.math.utah.edu/pub/tex/bib/adabooks.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.sciencedirect.com/science/article/pii/037847549390063Z", acknowledgement = ack-nhfb, fjournal = "Mathematics and Computers in Simulation", } @Article{Friedmann:1993:TDC, author = "G. L. Friedmann", title = "The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image", journal = j-IEEE-TRANS-CONSUMER-ELECTRONICS, volume = "39", number = "4", pages = "905--910", month = nov, year = "1993", CODEN = "ITCEDA", ISSN = "0098-3063", ISSN-L = "0098-3063", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/043125.html", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Consumer Electronics", keywords = "information hiding; steganography", } @Article{Fujioka:1993:PSV, author = "A. Fujioka and T. Okamoto and K. Ohta", title = "A practical secret voting scheme for large scale elections", journal = j-LECT-NOTES-COMP-SCI, volume = "718", pages = "244--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Fumy:1993:LAN, author = "W. Fumy", title = "(Local Area) Network Security", journal = j-LECT-NOTES-COMP-SCI, volume = "741", pages = "211--226", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "computer security; ESAT; industrial cryptography", } @Article{Fumy:1993:PCK, author = "Walter Fumy and Matthias Leclerc", title = "Placement of cryptographic key distribution within {OSI}: design alternatives and assessment", journal = j-COMP-NET-ISDN, volume = "26", number = "2", pages = "217--225", day = "1", month = oct, year = "1993", CODEN = "CNISE9", ISSN = "0169-7552 (print), 1879-2324 (electronic)", ISSN-L = "0169-7552", bibdate = "Fri Sep 24 20:20:32 MDT 1999", bibsource = "http://www.elsevier.com/cgi-bin/cas/tree/store/cna/cas_free/browse/browse.cgi?year=1993&volume=26&issue=2; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.elsevier.com/cgi-bin/cas/tree/store/comnet/cas_sub/browse/browse.cgi?year=1993&volume=26&issue=2&aid=1184", acknowledgement = ack-nhfb, fjournal = "Computer Networks and ISDN Systems", journal-URL = "http://www.sciencedirect.com/science/journal/01697552", } @Article{Funny:1993:KM, author = "W. Funny", title = "Key Management", journal = j-LECT-NOTES-COMP-SCI, volume = "741", pages = "132--150", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "computer security; ESAT; industrial cryptography", } @Misc{Galvin:1993:RSP, author = "J. Galvin and K. McCloghrie", title = "{RFC 1446}: Security Protocols for version 2 of the {Simple Network Management Protocol} ({SNMPv2})", month = apr, year = "1993", bibdate = "Thu Oct 16 09:34:09 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Status: HISTORIC.", URL = "ftp://ftp.internic.net/rfc/rfc1446.txt; https://www.math.utah.edu/pub/rfc/rfc1446.txt", acknowledgement = ack-nhfb, format = "TXT=108733 bytes", online = "yes", referencedin = "Referenced in \cite[Ref. 5]{Kaliski:1995:MAM}.", status = "HISTORIC", } @Book{Ganley:1993:CCI, author = "M. J. Ganley", title = "Cryptography and coding {III}", publisher = pub-OXFORD, address = pub-OXFORD:adr, pages = "xi + 377", year = "1993", ISBN = "0-19-853691-7", ISBN-13 = "978-0-19-853691-8", LCCN = "QA268.C75 1993", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "``Based on the proceedings of a conference organized by the Institute of Mathematics and its Applications on cryptography and coding, held at the Royal Agricultural College, Cirencester, in December 1991''.", series = "The Institute of Mathematics and Its Applications conference series; new ser.,; 45", acknowledgement = ack-nhfb, keywords = "coding theory --- congresses; cryptography --- congresses", } @Article{Geoffroy:1993:APF, author = "M. Geoffroy and R. Bjones and H. Cnudde", title = "{AXYTRANS}: Physical Funds Transport and {DES}", journal = j-LECT-NOTES-COMP-SCI, volume = "741", pages = "244--256", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "computer security; ESAT; industrial cryptography", } @Article{Ghezzi:1993:RSS, author = "C. Ghezzi and M. Felder and C. Bellettini", title = "Real-Time Systems: a Survey of Approaches to Formal Specification and Verification", journal = j-LECT-NOTES-COMP-SCI, volume = "717", pages = "11--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Goldwasser:1993:ISN, author = "S. Goldwasser and R. Ostrovsky", title = "Invariant Signatures and Non-Interactive Zero-Knowledge Proofs are Equivalent", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "228--245", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Gopalakrishnan:1993:NCC, author = "K. Gopalakrishnan and D. G. Hoffman and D. R. Stinson", title = "A note on a conjecture concerning symmetric resilient functions", journal = j-INFO-PROC-LETT, volume = "47", number = "3", pages = "139--143", day = "14", month = sep, year = "1993", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", MRclass = "94A60", MRnumber = "94k:94009", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/infoproc.bib", acknowledgement = ack-nhfb, affiliation = "Univ of Nebraska-Lincoln", affiliationaddress = "Lincoln, NE, USA", classification = "716.1; 721.1; 723.2; 921.1; B6120B (Codes); C4200 (Computer theory); C6130S (Data security)", corpsource = "Dept. of Comput. Sci. and Eng., Nebraska Univ., Lincoln, NE, USA", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "Arithmetic properties; arithmetic properties; Arithmetic properties; Binomial coefficients; binomial coefficients; Binomial coefficients; bit extraction problem; Boolean algebra; Boolean functions; computation theory; Computation theory; Cryptography; cryptography; Cryptography; Set theory; Subset sum; subset sum; Subset sum; Symmetric resilient functions; symmetric resilient functions; Symmetric resilient functions; t-resilient functions; theory of computation", treatment = "T Theoretical or Mathematical", } @Article{Gordon:1993:DDT, author = "Daniel M. Gordon", booktitle = "Advances in cryptology---CRYPTO '92 (Santa Barbara, CA, 1992)", title = "Designing and Detecting Trapdoors for Discrete Log Cryptosystems", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "66--75", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60", MRnumber = "95d:94018", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Gordon:1993:DLU, author = "Daniel M. Gordon", title = "Discrete logarithms in {$ {\rm GF}(p) $} using the number field sieve", journal = j-SIAM-J-DISCR-MATH, volume = "6", number = "1", pages = "124--138", month = feb, year = "1993", CODEN = "SJDMEC", ISSN = "0895-4801 (print), 1095-7146 (electronic)", ISSN-L = "0895-4801", MRclass = "11Y16 (11N36)", MRnumber = "94d:11104", MRreviewer = "Joe P. Buhler", bibdate = "Thu Apr 9 15:20:35 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/siamjdiscrmath.bib", acknowledgement = ack-nhfb, fjournal = "SIAM Journal on Discrete Mathematics", journal-URL = "http://epubs.siam.org/sidma", } @Article{Gordon:1993:MPC, author = "D. M. Gordon and K. S. McCurley", title = "Massively Parallel Computation of Discrete Logarithms", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "312--323", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Han:1993:TCC, author = "Y. Han and L. A. Hemaspaandra and T. Thierauf", title = "Threshold Computation and Cryptographic Security", journal = j-LECT-NOTES-COMP-SCI, volume = "762", pages = "230--239", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "algorithms; computation; ISAAC", } @Article{Hardjono:1993:PDM, author = "T. Hardjono and Y. Zheng", title = "A practical digital multisignature scheme based on discrete logarithms", journal = j-LECT-NOTES-COMP-SCI, volume = "718", pages = "122--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Harn:1993:GUS, author = "L. Harn and S. Yang", title = "Group-oriented undeniable signature schemes without the assistance of a mutually trusted party", journal = j-LECT-NOTES-COMP-SCI, volume = "718", pages = "133--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Harn:1993:OTP, author = "Lein Harn and Lin Hung-Yu", title = "An Oblivious Transfer Protocol and Its Application for the Exchange of Secrets", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "312--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Harn:1993:PKC, author = "L. Harn and S. Yang", title = "Public-key cryptosystem based on the discrete logarithm problem", journal = j-LECT-NOTES-COMP-SCI, volume = "718", pages = "469--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Harn:1993:SGS, author = "L. Harn and H.-Y. Lin", title = "An $l$-Span Generalized Secret Sharing Scheme", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "558--565", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Harper:1993:PKC, author = "Greg Harper and Alfred Menezes and Scott A. Vanstone", title = "Public-Key Cryptosystems with Very Small Key Lengths", journal = j-LECT-NOTES-COMP-SCI, volume = "658", pages = "163--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:29 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0658.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0658/06580163.htm; http://link.springer-ny.com/link/service/series/0558/papers/0658/06580163.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Hasan:1993:MMO, author = "M. A. Hasan and M. Z. Wang and V. K. Bhargava", title = "A modified {Massey--Omura} parallel multiplier for a class of finite field", journal = j-IEEE-TRANS-COMPUT, volume = "42", number = "10", pages = "1278--1280", month = oct, year = "1993", CODEN = "ITCOB4", DOI = "https://doi.org/10.1109/12.257715", ISSN = "0018-9340 (print), 1557-9956 (electronic)", ISSN-L = "0018-9340", bibdate = "Fri Jun 24 21:05:32 2005", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Computers", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12", } @Book{Held:1993:TSD, author = "Gilbert Held", title = "Top secret data encryption techniques", publisher = pub-SAMS, address = pub-SAMS:adr, pages = "218", year = "1993", ISBN = "0-672-30293-4", ISBN-13 = "978-0-672-30293-0", LCCN = "QA76.9.A25H43 1993", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, annote = "System requirements for computer disk: IBM-compatible PC; DOS; hard disk drive with 1.2MB free space.", keywords = "Computers --- Access control --- Passwords; Cryptography; Data encryption (Computer science); Data protection", } @Article{Herzberg:1993:PRC, author = "A. Herzberg and M. Luby", title = "Public Randomness in Cryptography", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "421--432", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Book{Hinsley:1993:BIS, author = "F. H. (Francis Harry) Hinsley", title = "{British} intelligence in the {Second World War}", publisher = pub-CUP, address = pub-CUP:adr, edition = "Abridged", pages = "xiii + 628", year = "1993", ISBN = "0-521-44304-0", ISBN-13 = "978-0-521-44304-3", LCCN = "D810.S7 H49 1993", bibdate = "Mon Nov 4 07:46:57 MST 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Abridgement of British intelligence in the Second World War originally published in 5 v. between 1979--1990.", acknowledgement = ack-nhfb, keywords = "Great Britain --- history --- George VI, 1936--1952; World War, 1939--1945 --- secret service --- Great Britain", } @Book{Hinsley:1993:CIS, editor = "{Sir} F. H. Hinsley and Alan Stripp", title = "Codebreakers: the inside story of {Bletchley Park}", publisher = pub-OXFORD, address = pub-OXFORD:adr, pages = "xxi + 321", year = "1993", ISBN = "0-19-820327-6, 0-19-285304-X", ISBN-13 = "978-0-19-820327-8, 978-0-19-285304-2", LCCN = "D810.C88 M46 1993", bibdate = "Thu Jan 21 14:14:26 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Hirschfeld:1993:MER, author = "R. Hirschfeld", title = "Making Electronic Refunds Safer", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "106--112", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Hoffman:1993:CC, author = "Lance J. Hoffman", title = "Clipping {Clipper}", journal = j-CACM, volume = "36", number = "9", pages = "15--17", month = sep, year = "1993", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu May 30 09:41:10 MDT 1996", bibsource = "http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cacm1990.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/162691.html", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "legal aspects; theory", subject = "{\bf K.4.1}: Computing Milieux, COMPUTERS AND SOCIETY, Public Policy Issues, Privacy. {\bf K.5.2}: Computing Milieux, LEGAL ASPECTS OF COMPUTING, Governmental Issues. {\bf E.3}: Data, DATA ENCRYPTION.", } @InProceedings{Hohl:1993:SIH, author = "W. Hohl and X. Lai and T. Meier and C. Waldvogel", title = "Security of iterated hash functions based on block ciphers", crossref = "Stinson:1993:ACC", pages = "379--390", year = "1993", bibdate = "Sat Apr 20 17:33:34 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Hwang:1993:SSD, author = "Tzonelih Hwang", title = "Scheme for secure digital mobile communications based on symmetric key cryptography", journal = j-INFO-PROC-LETT, volume = "48", number = "1", pages = "35--37", day = "29", month = oct, year = "1993", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/infoproc.bib", acknowledgement = ack-nhfb, affiliation = "Natl Cheng Kung Univ", affiliationaddress = "Tainan, Taiwan", classification = "716.3; 722.2; 722.3; 723.2; B6120B (Codes); B6250F (Mobile radio systems)", corpsource = "Inst. of Inf. Eng., Nat. Cheng Kung Univ., Tainan, Taiwan", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "Computer networks; Cryptography; cryptography; Data processing; Digital communication systems; digital mobile communications; hardware-limited terminals; Key distribution; key distribution; Keys (for locks); mobile communication systems; mobile communications; Mobile telecommunication systems; secure digital mobile communications; Security of data; Smart cards; Symmetric key cryptography; symmetric key cryptography; symmetric key cryptosystems; User authentication; user authentication", treatment = "T Theoretical or Mathematical", } @Article{Iwamura:1993:HIM, author = "K. Iwamura and T. Matsumoto and H. Imai", title = "High-speed implementation methods for {RSA} scheme", journal = j-LECT-NOTES-COMP-SCI, volume = "658", pages = "221--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Iwamura:1993:HSI, author = "Keiichi Iwamura and Tsutomu Matsumoto and Hideki Imai", title = "High-Speed Implementation Methods for {RSA} Scheme", journal = j-LECT-NOTES-COMP-SCI, volume = "658", pages = "221--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:29 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0658.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0658/06580221.htm; http://link.springer-ny.com/link/service/series/0558/papers/0658/06580221.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Jackson:1993:CAG, author = "W.-A. Jackson and K. M. Martin", title = "Cumulative arrays and geometric secret sharing schemes", journal = j-LECT-NOTES-COMP-SCI, volume = "718", pages = "48--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Jaeger:1993:LCC, author = "J. L. Jaeger and R. T. Carlson", title = "Laser communications for covert links", crossref = "Anonymous:1993:LC", pages = "95--106", year = "1993", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/024130.html", acknowledgement = ack-nhfb, keywords = "information hiding; steganography", } @Article{Jones:1993:DAC, author = "G. Jones and M. Sheeran", title = "Designing arithmetic circuits by refinement in {Ruby}", journal = j-LECT-NOTES-COMP-SCI, volume = "669", pages = "107--136", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "mathematics; program construction; programming research", } @Article{Joux:1993:CAK, author = "Antoine Joux and Jacques Stern", title = "Cryptanalysis of Another Knapsack Cryptosystem", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "470--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Kaliski:1993:SES, author = "Burt Kaliski", title = "A Survey of Encryption Standards", journal = j-IEEE-MICRO, volume = "13", number = "6", pages = "74--81", month = nov # "\slash " # dec, year = "1993", CODEN = "IEMIDZ", DOI = "https://doi.org/10.1109/40.248057", ISSN = "0272-1732 (print), 1937-4143 (electronic)", ISSN-L = "0272-1732", bibdate = "Mon Apr 7 14:39:59 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/ieeemicro.bib", abstract = "Demystifying the large number of computer security algorithms and standards", acknowledgement = ack-nhfb, classcodes = "B6120B (Codes); B6210G (Electronic mail); C6130S (Data security); C7104 (Office automation); C7120 (Finance); C6120 (File organisation)", corpsource = "RSA Lab., Redwood City, CA, USA", fjournal = "IEEE Micro", journal-URL = "http://www.computer.org/csdl/mags/mi/index.html", keywords = "algorithms; authentication; banking; codes; cryptographic hash functions; cryptography; cryptosystems; digital signature schemes; directory; electronic mail; encryption; encryption standards; escrowed; file; key-agreement; network management; organisation; public-key; secret-key cryptosystems; secure communications; standards", treatment = "B Bibliography; P Practical", } @Article{Kaliski:1993:ZBA, author = "Burton S. {Kaliski, Jr.}", title = "The {Z80180} and big-number arithmetic", journal = j-DDJ, volume = "18", number = "9", pages = "50, 52, 54, 56, 58, 90--91", month = sep, year = "1993", CODEN = "DDJOEB", ISSN = "1044-789X", bibdate = "Tue Sep 10 08:57:56 MDT 1996", bibsource = "http://www.ddj.com/index/author/index.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib; UnCover database", abstract = "There's nothing difficult about performing big-number arithmetic on powerful 32-bit processors like the 486 or Pentium. But where do you start if you want to implement 512-bit operations on 8-bit controllers? That's the problem Burt recently faced --- and here's his solution.", acknowledgement = ack-nhfb, classification = "C5130 (Microprocessor chips); C5230 (Digital arithmetic methods); C6130S (Data security)", fjournal = "Dr. Dobb's Journal of Software Tools", keywords = "8 Bit; Big-number arithmetic; Cryptography; Data security; Mathematically-intensive systems; RSA private-key operations; Z80180 microcontroller", thesaurus = "C listings; Cryptography; Digital arithmetic; Microcontrollers", } @InProceedings{Kang:1993:PRR, author = "M. H. Kang and I. S. Moskowitz", title = "A Pump for Rapid, Reliable, Secure Communications", crossref = "ACM:1993:FAC", pages = "118--129", year = "1993", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/031218.html", acknowledgement = ack-nhfb, keywords = "information hiding; steganography", } @Misc{Kaufman:1993:RDD, author = "C. Kaufman", title = "{RFC 1507}: {DASS} --- Distributed Authentication Security Service", month = sep, year = "1993", bibdate = "Thu Oct 16 09:34:09 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Status: PROPOSED STANDARD.", URL = "ftp://ftp.internic.net/rfc/rfc1507.txt; https://www.math.utah.edu/pub/rfc/rfc1507.txt", acknowledgement = ack-nhfb, format = "TXT=287809 bytes", online = "yes", status = "PROPOSED STANDARD", } @Article{Kent:1993:IPE, author = "Stephen T. Kent", title = "{Internet} Privacy Enhanced Mail", journal = j-CACM, volume = "36", number = "8", pages = "48--60", month = aug, year = "1993", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Sat Apr 06 08:07:10 1996", bibsource = "http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cacm1990.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/163390.html", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "security", subject = "{\bf H.4.3}: Information Systems, INFORMATION SYSTEMS APPLICATIONS, Communications Applications, Electronic mail. {\bf D.4.6}: Software, OPERATING SYSTEMS, Security and Protection, Access controls. {\bf D.4.6}: Software, OPERATING SYSTEMS, Security and Protection, Authentication. {\bf D.4.6}: Software, OPERATING SYSTEMS, Security and Protection, Cryptographic controls. {\bf D.4.6}: Software, OPERATING SYSTEMS, Security and Protection, Verification. {\bf K.6.5}: Computing Milieux, MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS, Security and Protection, Authentication. {\bf C.2.1}: Computer Systems Organization, COMPUTER-COMMUNICATION NETWORKS, Network Architecture and Design, Internet.", } @InProceedings{Kharitonov:1993:CHD, author = "Michael Kharitonov", title = "Cryptographic hardness of distribution-specific learning", crossref = "ACM:1993:PTF", pages = "372--381", year = "1993", bibdate = "Wed Feb 20 18:34:01 MST 2002", bibsource = "http://portal.acm.org/; http://www.acm.org/pubs/contents/proceedings/series/stoc/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org/pubs/articles/proceedings/stoc/167088/p372-kharitonov/p372-kharitonov.pdf; http://www.acm.org/pubs/citations/proceedings/stoc/167088/p372-kharitonov/", acknowledgement = ack-nhfb, } @Article{Kim:1993:CLB, author = "Kwangjo Kim", title = "Construction of {DES-Like S}-Boxes Based on {Boolean} Functions Satisfying the {SAC}", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "59--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @TechReport{Knudsen:1993:CLa, author = "Lars Ramkilde Knudsen", title = "Cryptanalysis of {LOKI91}", type = "Technical report", number = "DAIMI PB-440", institution = "Computer Science Department, Aarhus University", address = "{\AA}rhus, Denmark", pages = "18", year = "1993", bibdate = "Sat May 14 09:58:01 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Knudsen:1993:CLb, author = "L. R. Knudsen", title = "Cryptanalysis of {LOKI91}", journal = j-LECT-NOTES-COMP-SCI, volume = "718", pages = "196--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Knudsen:1993:CLc, author = "Lars Ramkilde Knudsen", title = "Cryptanalysis of {LOKI}", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "22--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Knudsen:1993:ICS, author = "L. R. Knudsen", title = "Iterative Characteristics of {DES} and $ s^2$-{DES}", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "497--511", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Misc{Kohl:1993:RKN, author = "J. Kohl and C. Neuman", title = "{RFC 1510}: The {Kerberos Network Authentication Service} ({V5})", month = sep, year = "1993", bibdate = "Thu Oct 16 09:34:09 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/rfc.bib", note = "Status: PROPOSED STANDARD.", URL = "ftp://ftp.internic.net/rfc/rfc1510.txt; https://www.math.utah.edu/pub/rfc/rfc1510.txt", acknowledgement = ack-nhfb, format = "TXT=275395 bytes", online = "yes", status = "PROPOSED STANDARD", } @InProceedings{Kornerup:1993:HRM, author = "Peter Kornerup", title = "High-Radix Modular Multiplication for Cryptosystems", crossref = "Swartzlander:1993:SCA", pages = "277--283", year = "1993", bibdate = "Wed Nov 14 18:46:45 2007", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acsel-lab.com/arithmetic/arith11/papers/ARITH11_Kornerup.pdf", acknowledgement = ack-nhfb, keywords = "ARITH-11", } @Article{Koyama:1993:SEC, author = "Kenji Koyama and Yukio Tsuruoka", booktitle = "Advances in cryptology---CRYPTO '92 (Santa Barbara, CA, 1992)", title = "Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "345--357", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60", MRnumber = "1 287 864", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Misc{Kravitz:1993:DSA, author = "D. W. Kravitz", title = "Digital Signature Algorithm", howpublished = "US Patent No. 5,231,668A.", day = "26", month = jul, year = "1993", bibdate = "Sat Nov 29 13:36:12 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Patent filed 26 July 1991.", URL = "https://www.google.com/patents/US5231668", abstract = "A method is provided for generating and verifying a digital signature of a message $m$. This method requires a pair of corresponding public and secret keys ($y$ and $x$) for each signer, as well as a pair of public and secret values ($r$ and $k$) generated for each message by the signer. The public value $r$ is calculated according to the rule $ r = (g k \bmod p) \bmod q$. A value $s$ is then selected according to the rule $ s = k - 1 (H(m) + x r) \bmod q$ where $H$ is a known conventional hashing function. The message $m$, along with the signature $ (r, s)$ is then transmitted. When the transmitted signal is received a verification process is provided. The received values of $r$ and $s$ are tested to determine whether they are congruent to $ 0 \mod g$. Additionally, $r$ is tested to determine whether it is equal to $ v \mod q$, where $v$ is computed from $r$, $s$, $m$ and $y$. For legitimately executed signatures, $ v = g k \mod p$.", acknowledgement = ack-nhfb, } @Article{Kwan:1993:GPT, author = "Matthew Kwan and Josef Pieprzyk", title = "A General Purpose Technique for Locating Key Scheduling Weaknesses in {DES-like} Cryptosystems", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "237--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Kwan:1993:SAD, author = "Matthew Kwan", title = "Simultaneous Attacks in Differential Cryptanalysis (Getting More Pairs Per Encryption)", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "489--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Manual{Laboratories:1993:PKC, author = "{RSA Laboratories}", title = "Public Key Cryptography Standard \#1: {RSA} Encryption Standard Version 1.5", organization = pub-RSA, address = pub-RSA:adr, pages = "??", month = nov, year = "1993", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 10]{Johnson:1996:AEE}.", } @InProceedings{Lacy:1993:CCS, author = "John B. Lacy", title = "{CryptoLib}: Cryptography in Software", crossref = "USENIX:1993:USI", pages = "1--17", day = "4--6", month = oct, year = "1993", bibdate = "Thu Feb 22 08:12:14 MST 1996", bibsource = "ftp://ftp.uu.net/library/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/usenix1990.bib; http://www.usenix.org/", acknowledgement = ack-nhfb, affiliation = "AT\&T Bell Laboratories", } @Article{Lai:1993:FCC, author = "X. Lai and R. A. Rueppel and J. Woollven", title = "A fast cryptographic checksum algorithm based on stream ciphers", journal = j-LECT-NOTES-COMP-SCI, volume = "718", pages = "339--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Lai:1993:HFBa, author = "X. Lai and J. L. Massey", title = "Hash Functions Based on Block Ciphers", crossref = "Rueppel:1993:ACE", pages = "53--66", year = "1993", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", acknowledgement = ack-nhfb, } @Article{Lai:1993:HFBb, author = "Xuejia Lai and James L. Massey", title = "Hash Functions Based on Block Ciphers", journal = j-LECT-NOTES-COMP-SCI, volume = "658", pages = "55--70", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:29 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0658.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0658/06580055.htm; http://link.springer-ny.com/link/service/series/0558/papers/0658/06580055.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Laih:1993:GTC, author = "Chi-Sung Laih and Lein Harn", title = "Generalized Threshold Cryptosystems", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "159--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Laih:1993:SAS, author = "C.-S. Laih and S.-M. Yen", title = "Secure addition sequence and its applications on the server-aided secret computation protocols", journal = j-LECT-NOTES-COMP-SCI, volume = "718", pages = "219--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Laih:1993:TES, author = "Chi-Sung Laih and Sung-Ming Yen and Lein Harn", title = "Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "450--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1994.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Le:1993:PKE, author = "A. V. Le and S. M. Matyas and D. B. Johnson and J. D. Wilkins", title = "A public key extension to the {Common Cryptographic Architecture}", journal = j-IBM-SYS-J, volume = "32", number = "3", pages = "461--485", year = "1993", CODEN = "IBMSA7", ISSN = "0018-8670", bibdate = "Tue Mar 19 17:38:46 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib", note = "G321-5521.", abstract = "A new method for extending the IBM Common Cryptographic Architecture (CCA) to include public key cryptography is presented. The public key extension provides nonrepudiation via digital signatures and an electronic means to distribute data encryption algorithm (DEA) key-encrypting keys in a hybrid data encryption algorithm-public key algorithm (DEA-PKA) cryptographic system. The improvements are based on a novel method for extending the control vector concept used in the IBM Common Cryptographic Architecture. Four new key types that separate the public and private key pairs into four classes according to their broad uses within the cryptographic system are defined. The public key extension to the CCA is implemented in the IBM Transaction Security System (TSS). This paper discusses both the public key extension to the CCA and the TSS implementation of this architectural extension.", acknowledgement = ack-nhfb, affiliation = "IBM Federal Syst. Co., Manassas, VA, USA", classification = "C6130S (Data security)", fjournal = "IBM Systems Journal", keywords = "Common Cryptographic Architecture; Control vector concept; Data encryption algorithm; Digital signatures; Hybrid data encryption algorithm; IBM Common Cryptographic Architecture; IBM Transaction Security System; Nonrepudiation; Public key extension", language = "English", pubcountry = "USA", thesaurus = "Public key cryptography; Transaction processing", } @Article{Lennox:1993:ES, author = "G. Lennox", title = "{EDI} security", journal = j-LECT-NOTES-COMP-SCI, volume = "741", pages = "235--243", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "computer security; ESAT; industrial cryptography", } @Book{Lenstra:1993:DNF, author = "A. K. Lenstra and H. W. {Lenstra, Jr.}", title = "The Development of the Number Field Sieve", volume = "1554", publisher = pub-SV, address = pub-SV:adr, pages = "viii + 131", year = "1993", ISBN = "0-387-57013-6 (New York), 3-540-57013-6 (Berlin)", ISBN-13 = "978-0-387-57013-6 (New York), 978-3-540-57013-4 (Berlin)", LCCN = "QA3 .L35 v.1554", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = ser-LNMATH, acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 4]{Wiener:1998:PCP}, \cite[Ref. 8]{Odlyzko:1995:FIF}.", } @Article{Lenstra:1993:FNF, author = "A. K. Lenstra and H. W. {Lenstra, Jr.} and M. S. Manasse and J. M. Pollard", title = "The factorization of the ninth {Fermat} number", journal = j-MATH-COMPUT, volume = "61", number = "203", pages = "319--349", month = jul, year = "1993", CODEN = "MCMPAF", ISSN = "0025-5718 (print), 1088-6842 (electronic)", ISSN-L = "0025-5718", MRclass = "11Y05 (11Y40)", MRnumber = "93k:11116", MRreviewer = "Rhonda Lee Hatcher", bibdate = "Thu Apr 29 18:02:36 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "See \cite{Lenstra:1990:NFS}.", acknowledgement = ack-nhfb, fjournal = "Mathematics of Computation", journal-URL = "http://www.ams.org/mcom/", } @Article{Liaw:1993:OAA, author = "Horng Twu Liaw and Chin Laung Lei", title = "An optimal algorithm to assign cryptographic keys in a tree structure for access control", journal = j-BIT, volume = "33", number = "1", pages = "46--56", month = mar, year = "1993", CODEN = "BITTEL, NBITAB", DOI = "https://doi.org/10.1007/BF01990342", ISSN = "0006-3835 (print), 1572-9125 (electronic)", ISSN-L = "0006-3835", MRclass = "94A60", MRnumber = "1 326 001", bibdate = "Wed Jan 4 18:52:23 MST 2006", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0006-3835&volume=33&issue=1; https://www.math.utah.edu/pub/tex/bib/bit.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.mai.liu.se/BIT/contents/bit33.html; http://www.springerlink.com/openurl.asp?genre=article&issn=0006-3835&volume=33&issue=1&spage=46", acknowledgement = ack-nhfb, fjournal = "BIT (Nordisk tidskrift for informationsbehandling)", journal-URL = "http://link.springer.com/journal/10543", } @Article{Liebl:1993:ADS, author = "Armin Liebl", title = "Authentication in distributed systems: a bibliography", journal = j-OPER-SYS-REV, volume = "27", number = "4", pages = "31--41", month = oct, year = "1993", CODEN = "OSRED8", ISSN = "0163-5980 (print), 1943-586X (electronic)", ISSN-L = "0163-5980", bibdate = "Sat Aug 26 08:55:51 MDT 2006", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Operating Systems Review", } @Article{Lin:1993:GSS, author = "Hung-Yu Lin and Lein Harn", title = "A Generalized Secret Sharing Scheme with Cheater Detection", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "149--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Misc{Linn:1993:RCA, author = "J. Linn", title = "{RFC 1511}: Common Authentication Technology Overview", month = sep, year = "1993", bibdate = "Thu Oct 16 09:34:09 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Status: INFORMATIONAL.", URL = "ftp://ftp.internic.net/rfc/rfc1511.txt; https://www.math.utah.edu/pub/rfc/rfc1511.txt", acknowledgement = ack-nhfb, format = "TXT=4185 bytes", online = "yes", status = "INFORMATIONAL", } @Misc{Linn:1993:RPE, author = "J. Linn", title = "{RFC 1421}: Privacy Enhancement for {Internet} Electronic Mail: Part {I}: Message Encryption and Authentication Procedures", month = feb, year = "1993", bibdate = "Thu Oct 16 09:34:09 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Obsoletes RFC1113 \cite{Linn:1989:RPE}. Status: PROPOSED STANDARD.", URL = "ftp://ftp.internic.net/rfc/rfc1113.txt; ftp://ftp.internic.net/rfc/rfc1421.txt; https://www.math.utah.edu/pub/rfc/rfc1113.txt; https://www.math.utah.edu/pub/rfc/rfc1421.txt", acknowledgement = ack-nhfb, format = "TXT=103894 bytes", obsoletes = "Obsoletes RFC1113 \cite{Linn:1989:RPE}.", online = "yes", status = "PROPOSED STANDARD", } @MastersThesis{Lippit:1993:PIC, author = "Yukio Lippit", title = "Phantomic inscryptions: the cryptology of {Abraham} and {Torok}", type = "Thesis ({A.B., Honors in Literature})", school = "Harvard University", address = "Cambridge, MA, USA", pages = "69", year = "1993", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, keywords = "Abraham, Nicolas; Bereavement --- Psychological aspects; Torok, Maria", } @Article{Longley:1993:TNC, author = "D. Longley and S. M. Matyas", title = "Technical note: Complementarity attacks and control vectors", journal = j-IBM-SYS-J, volume = "32", number = "2", pages = "321--325", year = "1993", CODEN = "IBMSA7", ISSN = "0018-8670", bibdate = "Sun Sep 15 05:36:36 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib", abstract = "A control vector is a data structure that specifies the nature and role of an associated cryptographic key. The control vector is checked by software and cryptographic hardware in order to limit the range of permissible operations to be undertaken with ciphertext produced with the key. The linking of the control vector and cryptographic key is such that attempts to modify, or substitute, control vectors will cause the subsequent processing to operate with a corrupted key, and hence ensure protection of data encrypted with the genuine key. A potential attack on the control vector approach is described in which the complement of the control vector is substituted. The manner in which such attacks are thwarted by the IBM implementation of control vectors is also described.", acknowledgement = ack-nhfb, affiliation = "Queensland Univ. of Technol., Brisbane, Qld., Australia", classification = "B6120B (Codes); C6120 (File organisation); C6130S (Data security)", fjournal = "IBM Systems Journal", keywords = "Ciphertext; Complementary attacks; Control vectors; Cryptographic key; Data structure; IBM; Permissible operations", language = "English", pubcountry = "USA", thesaurus = "Cryptography; Data structures", } @Article{Madonia:1993:GSP, author = "M. Madonia and S. Salemi and T. Sportelli", title = "A generalization of {Sardinas} and {Patterson}'s algorithm to $z$-codes", journal = j-THEOR-COMP-SCI, volume = "108", number = "2", pages = "251--270", day = "15", month = feb, year = "1993", CODEN = "TCSCDI", ISSN = "0304-3975 (print), 1879-2294 (electronic)", ISSN-L = "0304-3975", bibdate = "Sat Nov 22 13:15:15 MST 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, classification = "B6120B (Codes); C1260 (Information theory); C4240 (Programming and algorithm theory)", corpsource = "Dipartimento di Matematica ed Applicazioni, Palermo Univ., Italy", fjournal = "Theoretical Computer Science", journal-URL = "http://www.sciencedirect.com/science/journal/03043975", keywords = "algorithm complexity; codes; computational complexity; double z-factorization; finite set; Patterson; Sardinas; shortest words; tight upper bound; z-codes theory; z-deciphering delay", pubcountry = "Netherlands", treatment = "T Theoretical or Mathematical", } @Article{Matsui:1993:LCM, author = "M. Matsui", title = "Linear cryptanalysis method for {DES} cipher", journal = j-LECT-NOTES-COMP-SCI, volume = "765", pages = "386--397", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Feb 27 08:32:41 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Matsui:1993:NMK, author = "M. Matsui and A. Yamagishi", title = "A new method for known plaintext attack of {FEAL} cipher", journal = j-LECT-NOTES-COMP-SCI, volume = "658", pages = "81--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Matsumoto:1993:VIA, author = "T. Matsumoto and H. Imai and C.-S. Laih and S.-M. Yen", title = "On verifiable implicit asking protocols for {RSA} computation", journal = j-LECT-NOTES-COMP-SCI, volume = "718", pages = "296--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Maurer:1993:PSK, author = "U. M. Maurer", title = "Protocols for Secret Key Agreement by Public Discussion Based on Common Information", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "461--470", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @InProceedings{Maurer:1993:RIT, author = "U. M. Maurer", title = "The role of information theory in cryptography", crossref = "Farrell:1993:CCC", pages = "49--71", year = "1993", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/041815.html", acknowledgement = ack-nhfb, keywords = "information hiding; steganography", } @Article{Maurer:1993:RNI, author = "Ueli M. Maurer and Yacov Yacobi", title = "A remark on a non-interactive public-key distribution system", journal = j-LECT-NOTES-COMP-SCI, volume = "658", pages = "458--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:29 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0658.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0658/06580458.htm; http://link.springer-ny.com/link/service/series/0558/papers/0658/06580458.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Meier:1993:EMC, author = "W. Meier and O. Staffelbach", title = "Efficient Multiplication on Certain Nonsupersingular Elliptic Curves", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "333--344", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Meijers:1993:EMV, author = "Joost Meijers and Johan {van Tilburg}", title = "Extended Majority Voting and Private-Key Algebraic-Code Encryptions", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "288--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Menezes:1993:CPE, author = "Alfred J. Menezes and Scott A. Vanstone and Robert J. Zuccherato", title = "Counting points on elliptic curves over {$ \mbox {\bf F}_{2^m} $}", journal = j-MATH-COMPUT, volume = "60", number = "201", pages = "407--420", month = jan, year = "1993", CODEN = "MCMPAF", ISSN = "0025-5718 (print), 1088-6842 (electronic)", ISSN-L = "0025-5718", MRclass = "11Y16 (11G20 11T71 14H52)", MRnumber = "93f:11098", MRreviewer = "Andrew Bremner", bibdate = "Tue Mar 25 15:38:13 MST 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/mathcomp1990.bib", acknowledgement = ack-nhfb, classcodes = "B6120B (Codes); C6130S (Data security)", corpsource = "Dept. of Combinatorics and Optimization, Waterloo Univ., Ont., Canada", fjournal = "Mathematics of Computation", journal-URL = "http://www.ams.org/mcom/", keywords = "counting points; elliptic curves; elliptic equations; public key cryptography", treatment = "T Theoretical or Mathematical", } @Book{Menezes:1993:ECP, author = "Alfred Menezes", title = "Elliptic Curve Public Key Cryptosystems", volume = "234", publisher = "Kluwer Academic Publishers", address = "Boston, MA", pages = "xiv + 128", year = "1993", ISBN = "0-7923-9368-6", ISBN-13 = "978-0-7923-9368-9", LCCN = "QA76.9.A25 M46 1993", MRclass = "94A60 (11G20 11T71)", MRnumber = "2000d:94023", bibdate = "Mon Jul 19 08:05:58 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "With a foreword by Neal Koblitz, Communications and Information Theory", series = "The Kluwer International Series in Engineering and Computer Science", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 3]{Odlyzko:1995:FIF}, \cite[Ref. 3]{Menezes:1995:ECC}, and \cite[Ref. 7]{Escott:1999:AEC}.", } @Article{Mercuri:1993:IRC, author = "Rebecca Mercuri", title = "Inside Risks: Corrupted Polling", journal = j-CACM, volume = "36", number = "11", pages = "122, 94", month = nov, year = "1993", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu May 30 09:41:10 MDT 1996", bibsource = "http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cacm1990.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/163380.html", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "performance; reliability", subject = "{\bf K.4.m}: Computing Milieux, COMPUTERS AND SOCIETY, Miscellaneous. {\bf K.6.5}: Computing Milieux, MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS, Security and Protection, Authentication.", } @InProceedings{Micali:1993:FPC, author = "S. Micali", title = "Fair Public-Key Cryptosystems", crossref = "Brickell:1993:ACC", pages = "113--138", year = "1993", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 24]{Goldreich:1997:FMCb}.", } @Article{Micali:1993:FPK, author = "Silvio Micali", title = "Fair Public-Key Cryptosystems (Rough Draft)", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "113--138", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:51 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0740.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0740/07400113.htm; http://link.springer-ny.com/link/service/series/0558/papers/0740/07400113.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Miyaji:1993:ECS, author = "Atsuko Miyaji", booktitle = "Advances in cryptology---AUSCRYPT '92 (Gold Coast, 1992)", title = "Elliptic curves over {$ {\bf F}_p $} suitable for cryptosystems", journal = j-LECT-NOTES-COMP-SCI, volume = "718", pages = "479--491", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "11T71 (11G20 94A60)", MRnumber = "95g:11124", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "Lecture Notes in Computer Science", } @Article{Miyaji:1993:OEC, author = "Atsuko Miyaji", title = "On Ordinary Elliptic Curve Cryptosystems", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "460--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Miyano:1993:MEN, author = "Hiroshi Miyano", title = "A Method to Estimate the Number of Ciphertext Pairs for Differential Cryptanalysis", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "51--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Mjolsnes:1993:PCP, author = "Stig Fr. Mjolsnes", title = "Privacy, Cryptographic Pseudonyms, and The State of Health", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "493--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Monagan:1993:GPD, author = "M. Monagan", title = "{Gauss}: a Parameterized Domain of Computation System with Support for Signature Functions", journal = j-LECT-NOTES-COMP-SCI, volume = "722", pages = "81--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Oct 31 18:50:52 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Naccache:1993:MSF, author = "David Naccache", title = "A {Montgomery}-suitable {Fiat--Shamir}-like authentication scheme", journal = j-LECT-NOTES-COMP-SCI, volume = "658", pages = "488--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:29 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0658.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0658/06580488.htm; http://link.springer-ny.com/link/service/series/0558/papers/0658/06580488.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Naor:1993:PZK, author = "M. Naor and R. Ostrovsky and R. Venkatesan and M. Yung", title = "Perfect Zero-Knowledge Arguments for {NP} can be Based on General Complexity Assumptions", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "196--214", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Nieh:1993:MAC, author = "B. B. Nieh and S. E. Tavares", title = "Modelling and analyzing cryptographic protocols using {Petri} nets", journal = j-LECT-NOTES-COMP-SCI, volume = "718", pages = "275--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Manual{NIST:1993:DES, author = "{National Institute of Standards and Technology (U. S.)}", title = "Data encryption standard ({DES})", number = "46-2", organization = pub-NIST, address = pub-NIST:adr, pages = "18", day = "30", month = dec, year = "1993", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Category: computer security, subcategory: cryptography. Supersedes FIPS PUB 46-1-1988 January 22. Reaffirmed December 30, 1993.", series = "Federal information processing standards publication, FIPS PUB", acknowledgement = ack-nhfb, keywords = "Computer security --- Standards; Data protection --- Standards; Electronic data processing departments --- Security measures; Standards", } @Manual{Nist:1993:DSS, author = "{NIST}", title = "Digital Signature Standard", publisher = pub-NIST, address = pub-NIST:adr, pages = "??", day = "1", month = feb, year = "1993", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "FIPS PUB 186.", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 10]{Handschuh:1998:SCC}.", } @Manual{NIST:1993:FPD, author = "{National Institute of Standards and Technology}", title = "{FIPS} Publication 46-2: Data Encryption Standard", organization = pub-NIST, address = pub-NIST:adr, pages = "??", month = dec, year = "1993", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 5]{Caronni:1997:HEE}.", } @Manual{NIST:1993:FPS, author = "{NIST}", title = "{FIPS PUB} 180: Secure Hash Standard {(SHS)}", organization = "National Institute of Standards and Technology", address = "Gaithersburg, MD, USA", pages = "??", day = "11", month = may, year = "1993", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 8]{Kaliski:1995:MAM}.", } @Article{Nyberg:1993:PSA, author = "K. Nyberg and L. R. Knudsen", title = "Probable Security Against Differential Cryptanalysis", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "566--574", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60", MRnumber = "95d:94024", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Ogata:1993:NSS, author = "W. Ogata and K. Kurosawa and S. Tsujii", title = "Nonperfect secret sharing schemes", journal = j-LECT-NOTES-COMP-SCI, volume = "718", pages = "56--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Ohta:1993:DMS, author = "Kazuo Ohta and Tatsuaki Okamoto", title = "A Digital Multisignature Scheme Based on the {Fiat--Shamir} Scheme", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "139--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Okamoto:1993:EDS, author = "Tatsuaki Okamoto and Atsushi Fujioka and Eiichiro Fujisaki", title = "An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring {$ Z_n $}", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "54--65", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:51 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0740.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0740/07400054.htm; http://link.springer-ny.com/link/service/series/0558/papers/0740/07400054.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Okamoto:1993:PSP, author = "T. Okamoto", title = "Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "31--53", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Okamoto:1993:RAC, author = "T. Okamoto", title = "On the Relationship among Cryptographic Physical Assumptions", journal = j-LECT-NOTES-COMP-SCI, volume = "762", pages = "369--378", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "algorithms; computation; ISAAC", } @InProceedings{Ozaki:1993:HVP, author = "S. Ozaki and T. Matsumoto and H. Imai", title = "A Holder Verification Protocol Using Fingerprints", crossref = "Anonymous:1993:JIK", pages = "1--9", year = "1993", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/033159.html", acknowledgement = ack-nhfb, keywords = "information hiding; steganography", } @Article{Paabo:1993:AD, author = "Svante P{\"a}{\"a}bo", title = "Ancient {DNA}", journal = j-SCI-AMER, volume = "269", number = "5", pages = "86--?? (Intl. ed. 60--??)", month = nov, year = "1993", CODEN = "SCAMAC", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Thu Jan 28 14:31:51 MST 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "DNA from creatures that died tens of thousands or even millions of years ago can be partially reproduced. Although the degradation of the molecule at death prevents complete deciphering, the study of reconstituted fragments allows revealing comparisons to made between extant and ancient species.", acknowledgement = ack-nhfb, fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", xxnewdata = "1998.01.30", } @Article{Paun:1993:CPS, author = "Gheorghe P{\u{a}}un and Arto Salomaa", title = "Closure properties of slender languages", journal = j-THEOR-COMP-SCI, volume = "120", number = "2", pages = "293--301", day = "22", month = nov, year = "1993", CODEN = "TCSCDI", ISSN = "0304-3975 (print), 1879-2294 (electronic)", ISSN-L = "0304-3975", bibdate = "Mon Jul 19 22:17:43 MDT 1999", bibsource = "http://www.elsevier.com/cgi-bin/cas/tree/store/tcs/cas_free/browse/browse.cgi?year=1993&volume=120&issue=2; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/tcs1990.bib", URL = "http://www.elsevier.com/cgi-bin/cas/tree/store/tcs/cas_sub/browse/browse.cgi?year=1993&volume=120&issue=2&aid=1406", acknowledgement = ack-nhfb, classification = "C4210 (Formal logic); C6130S (Data security)", corpsource = "Inst. of Math., Bucharest, Romania", fjournal = "Theoretical Computer Science", journal-URL = "http://www.sciencedirect.com/science/journal/03043975", keywords = "Chomsky hierarchy; closure properties; cryptography; formal languages; slender languages", pubcountry = "Netherlands", treatment = "P Practical; T Theoretical or Mathematical", } @Article{Peralta:1993:QSD, author = "R. Peralta", title = "A Quadratic Sieve on the $n$-Dimensional Cube", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "324--332", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Pfitzmann:1993:APS, author = "Birgit Pfitzmann and Michael Waidner", title = "Attacks on protocols for server-aided {RSA} computation", journal = j-LECT-NOTES-COMP-SCI, volume = "658", pages = "153--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:29 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0658.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0658/06580153.htm; http://link.springer-ny.com/link/service/series/0558/papers/0658/06580153.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Pfitzmann:1993:MES, author = "Andreas Pfitzmann and Ralf A{\ss}mann", title = "More efficient software implementations of (generalized) {DES}", journal = j-COMPUT-SECUR, volume = "12", number = "5", pages = "477--500", month = aug, year = "1993", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:58 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1990.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740489390069H", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Pieper:1993:CRD, author = "Reinhold Pieper", title = "Cryptanalysis of {R{\'e}di}- and {Dickson} permutations on arbitrary finite rings", journal = j-APPL-ALGEBRA-ENG-COMMUN-COMPUT, volume = "4", number = "1", pages = "59--76", year = "1993", CODEN = "AAECEW", ISSN = "0938-1279 (print), 1432-0622 (electronic)", ISSN-L = "0938-1279", MRclass = "94A60 (13M99)", MRnumber = "94i:94018", MRreviewer = "Winfried M{\"u}ller", bibdate = "Tue Feb 9 11:14:49 MST 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Applicable algebra in engineering, communication and computing", } @Book{Pieprzyk:1993:DHA, author = "Josef Pieprzyk and Babak Sadeghiyan", title = "Design of Hashing Algorithms", volume = "756", publisher = pub-SV, address = pub-SV:adr, pages = "xiii + 194", year = "1993", ISBN = "0-387-57500-6 (New York), 3-540-57500-6 (Berlin)", ISBN-13 = "978-0-387-57500-1 (New York), 978-3-540-57500-9 (Berlin)", LCCN = "QA76.9.H36 P53 1993", bibdate = "Sat Jul 16 01:06:51 1994", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = ser-LNCS, acknowledgement = ack-nhfb, } @InProceedings{Piper:1993:DSH, author = "F. Piper and P. Wild", title = "Digital Signatures and Hash Functions", crossref = "Anonymous:1993:CSA", pages = "124--130", year = "1993", bibdate = "Sat Apr 20 17:33:34 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Portz:1993:GDB, author = "M. Portz", title = "A generalized description of {DES-based} and {Benes}-based permutation generators", journal = j-LECT-NOTES-COMP-SCI, volume = "718", pages = "397--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @TechReport{Posch:1993:PFP, author = "Reinhard Posch", title = "Pipelining and full parallelism for long integer arithmetic in encryption devices", type = "Report", number = "357", institution = "Institutes for Information Processing Graz", address = "Graz, Austria", pages = "8", month = mar, year = "1993", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "This work is an attempt to evaluate some of the limits in long integer arithmetic applied to encryption, concentrating mainly on two methods. The first is the multiplication as parallel as possible, combined with a division free modulo reduction [1] and the second is a residue number system-based method [2] for modulo exponentiation. These methods can be used to implement the standard RSA [3] algorithm or a modified RSA algorithm with a reduced key space. Either method is suited to a scalable VLSI design for both single chip and multichip parallelism. Multichip approaches call for extended evaluation as communication among the processors (chips) has a dominating effect. Parallel structures, including pipelining, are investigated to provide suggestions on high performance architectures, for the resulting approach.", acknowledgement = ack-nhfb, keywords = "Cryptography.", } @PhdThesis{Preneel:1993:ADC, author = "B. Preneel", title = "Analysis and Design of Cryptographic Hash Functions", type = "Thesis ({Ph.D.})", school = "Katholieke Universiteit Leuven", address = "Leuven, Belgium", pages = "355", month = jan, year = "1993", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://wwwlib.umi.com/dissertations/fullcit/f64276", abstract = "The subject of this thesis is the study of cryptographic hash functions. The importance of hash functions for protecting the authenticity of information is demonstrated. Applications include integrity protection, conventional message authentication and digital signatures. Theoretical results on cryptographic hash functions are reviewed. The information theoretic approach to authentication is described, and the practicality of schemes based on universal hash functions is studied. An overview is given of the complexity theoretical definitions and constructions. The main contribution of this thesis lies in the study of practical constructions for hash functions. A general model for hash functions is proposed and taxonomy for attacks is presented. Then all schemes in the literature are divided into three classes: hash functions based on block ciphers, hash functions based on modular arithmetic and dedicated hash functions. An overview is given of existing attacks, new attacks are demonstrated, and new schemes are proposed. The study of basic building blocks of cryptographic hash functions leads to the study of the cryptographic properties of Boolean functions. New criteria are defined and functions satisfying new and existing criteria are studied.", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 19]{Kaliski:1995:SUR}.", } @InProceedings{Preneel:1993:CHF, author = "B. Preneel and R. Govaerts and J. Vandewalle", title = "Cryptographic Hash Functions", crossref = "Wolfowicz:1993:SPS", pages = "161--171", year = "1993", bibdate = "Sat Apr 20 17:33:34 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", acknowledgement = ack-nhfb, } @InProceedings{Preneel:1993:HFB, author = "B. Preneel and R. Govaerts and J. Vandewalle", title = "Hash functions based on block ciphers: a synthetic approach", crossref = "Stinson:1993:ACC", pages = "368--378", year = "1993", bibdate = "Sat Apr 20 17:33:34 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Preneel:1993:IAH, author = "B. Preneel and R. Govaerts and J. Vandewalle", title = "Information Authentication: Hash Functions and Digital Signatures", journal = j-LECT-NOTES-COMP-SCI, volume = "741", pages = "87--131", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "computer security; ESAT; industrial cryptography", } @Article{Preneel:1993:SCT, author = "B. Preneel", title = "Standardization of Cryptographic Techniques", journal = j-LECT-NOTES-COMP-SCI, volume = "741", pages = "162--173", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "computer security; ESAT; industrial cryptography", } @InProceedings{Rackoff:1993:CDA, author = "Charles Rackoff and Daniel R. Simon", title = "Cryptographic defense against traffic analysis", crossref = "ACM:1993:PTF", pages = "672--681", year = "1993", bibdate = "Wed Feb 20 18:34:01 MST 2002", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Rezny:1993:BCM, author = "M. Rezny and E. Trimarchi", title = "A block cipher method using combinations of different methods under the control of the user key", journal = j-LECT-NOTES-COMP-SCI, volume = "718", pages = "531--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Rhee:1993:RAC, author = "Man Y. Rhee", title = "Research Activities on Cryptology in {Korea}", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "179--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Rhodes:1993:ZF, author = "Daniela Rhodes and Aaron Klug", title = "Zinc Fingers", journal = j-SCI-AMER, volume = "268", number = "2", pages = "56--?? (Intl. ed. 32--??)", month = feb, year = "1993", CODEN = "SCAMAC", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Thu Jan 28 14:31:51 MST 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", abstract = "These projections on transcription factors grip specific sites on DNA, preparing genes for activation. Since they were discovered in 1985, proteins incorporating zinc fingers have been identified in diverse species, from yeast to humans. Several laboratories have begun to decipher how these zinc-containing proteins select and bind to DNA and to elucidate the role they play in switching on genes.", acknowledgement = ack-nhfb, fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", xxnewdata = "1998.01.30", } @Article{Rivest:1993:CML, author = "Ronald L. Rivest", title = "Cryptography and Machine Learning", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "427--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Rivest:1993:DRR, author = "R. Rivest", title = "{Dr. Ron Rivest} on the Difficulty of Factoring Ciphertext", journal = "The RSA Newsletter", volume = "1", number = "1", pages = "??--??", month = "Fall", year = "1993", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "reprinted, in an updated form, in an appendix on pages 361-364 in S. Garfinkel, PGP: Pretty Good Privacy, O'Reilly \& Associates, 1995.", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 20]{Kaliski:1995:SUR}.", } @Article{Rivest:1993:NPD, author = "Ronald L. Rivest", title = "On {NIST}'s Proposed {Digital Signature Standard}", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "481--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Roberts:1993:ECI, author = "D. W. Roberts", title = "Evaluation Criteria for {IT} Security", journal = j-LECT-NOTES-COMP-SCI, volume = "741", pages = "151--161", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "computer security; ESAT; industrial cryptography", } @Misc{Rose:1993:RCM, author = "M. Rose", title = "{RFC 1544}: The Content-{MD5} Header Field", month = nov, year = "1993", bibdate = "Thu Oct 16 09:34:09 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Obsoleted by RFC1864 \cite{Myers:1995:RCM}. Status: PROPOSED STANDARD.", URL = "ftp://ftp.internic.net/rfc/rfc1544.txt; ftp://ftp.internic.net/rfc/rfc1864.txt; https://www.math.utah.edu/pub/rfc/rfc1544.txt; https://www.math.utah.edu/pub/rfc/rfc1864.txt", acknowledgement = ack-nhfb, format = "TXT=6478 bytes", obsoletedby = "Obsoleted by RFC1864 \cite{Myers:1995:RCM}.", online = "yes", status = "PROPOSED STANDARD", } @Manual{RSA:1993:PCM, author = "{RSA Laboratories}", title = "{PKCS \#7}: Cryptographic Message Syntax Standard", organization = pub-RSA, address = pub-RSA:adr, day = "1", month = nov, year = "1993", bibdate = "Mon Dec 08 08:18:29 2003", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.rsasecurity.com/rsalabs/pkcs/pkcs-7/index.html", acknowledgement = ack-nhfb, } @Manual{RSA:1993:PDH, author = "{RSA Laboratories}", title = "{PKCS \#3}: {Diffie--Hellman Key-Agreement Standard}", organization = pub-RSA, address = pub-RSA:adr, day = "1", month = nov, year = "1993", bibdate = "Mon Dec 08 08:12:19 2003", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.rsasecurity.com/rsalabs/pkcs/pkcs-3/index.html", acknowledgement = ack-nhfb, } @Manual{RSA:1993:PEC, author = "{RSA Laboratories}", title = "{PKCS \#6}: Extended-Certificate Syntax Standard", organization = pub-RSA, address = pub-RSA:adr, day = "1", month = nov, year = "1993", bibdate = "Mon Dec 08 08:14:32 2003", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.rsasecurity.com/rsalabs/pkcs/pkcs-6/index.html", acknowledgement = ack-nhfb, } @Manual{RSA:1993:PPK, author = "{RSA Laboratories}", title = "{PKCS \#8}: Private-Key Information Syntax Standard", organization = pub-RSA, address = pub-RSA:adr, day = "1", month = nov, year = "1993", bibdate = "Mon Dec 08 08:18:29 2003", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.rsasecurity.com/rsalabs/pkcs/pkcs-8/index.html", acknowledgement = ack-nhfb, } @Manual{RSA:1993:PRE, author = "{RSA Laboratories}", title = "{PKCS} \#1: {RSA} Encryption Standard, Version 1.5", organization = pub-RSA, address = pub-RSA:adr, pages = "??", month = nov, year = "1993", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.rsasecurity.com/rsalabs/pkcs/pkcs-1/index.html", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 22]{Kaliski:1995:SUR}.", } @InProceedings{Rubin:1993:LRJ, author = "A. D. Rubin and P. Honeyman", title = "Long Running Jobs in an Authenticated Environment", crossref = "USENIX:1993:USI", pages = "19--28", day = "4--6", month = oct, year = "1993", bibdate = "Tue Oct 22 08:51:21 2002", bibsource = "ftp://ftp.uu.net/library/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; http://www.usenix.org/", URL = "http://www.usenix.org/publications/library/proceedings/sec4/", acknowledgement = ack-nhfb, affiliation = "University of Michigan, Ann Arbor", } @Article{Ruskey:1993:SCG, author = "F. Ruskey", title = "Simple Combinatorial Gray Codes Constructed by Reversing Sublists", journal = j-LECT-NOTES-COMP-SCI, volume = "762", pages = "201--208", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "algorithms; computation; ISAAC", } @Article{Russell:1993:NSC, author = "A. Y. Russell", title = "Necessary and Sufficient Conditions for Collision-Free Hashing", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "433--441", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Safavi-Naini:1993:ACU, author = "R. Safavi-Naini and L. Tombak", title = "Authentication codes under impersonation attack", journal = j-LECT-NOTES-COMP-SCI, volume = "718", pages = "35--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Safavi-Naini:1993:FTA, author = "Reihaneh Safavi-Naini", title = "{Feistel} Type Authentication Codes", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "170--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Safford:1993:SRA, author = "David R. Safford and Douglas Lee Schales and David K. Hess", title = "Secure {RPC} Authentication {(SRA)} for {TELNET} and {FTP}", crossref = "USENIX:1993:USI", pages = "63--67", day = "4--6", month = oct, year = "1993", bibdate = "Tue Oct 22 08:52:33 2002", bibsource = "ftp://ftp.uu.net/library/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; http://www.usenix.org/", URL = "http://www.usenix.org/publications/library/proceedings/sec4/rpc.saf.html", acknowledgement = ack-nhfb, affiliation = "Texas A \& M University", } @Article{Sakurai:1993:DBS, author = "K. Sakurai and T. Itoh", title = "On the Discrepancy between Serial and Parallel of Zero-Knowledge Protocols", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "246--259", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Sakurai:1993:SCS, author = "K. Sakurai and T. Itoh", title = "Subliminal channels for signature transfer and their application to signature distribution schemes", journal = j-LECT-NOTES-COMP-SCI, volume = "718", pages = "231--243", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/021630.html", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "information hiding; steganography", } @Article{Sale:1993:EBP, author = "Tony Sale", title = "The {Enigma of Bletchley Park}", journal = "Resurrection: The Computer Conservation Society Journal", volume = "??", number = "6", pages = "??--??", month = "Summer", year = "1993", ISSN = "0958-7403", ISSN-L = "0958-7403", bibdate = "Sun Jul 26 08:13:42 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "https://computerconservationsociety.org/resurrection/res06.htm#e", acknowledgement = ack-nhfb, } @Book{Schilling:1993:MBC, editor = "Donald L. Schilling", title = "Meteor burst communications: theory and practice", publisher = "Wiley", address = "New York", pages = "xi + 459", year = "1993", ISBN = "0-471-52212-0", ISBN-13 = "978-0-471-52212-6", LCCN = "TK6562.S5 S35 1993", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", series = "Wiley series in telecommunications", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1011.html", acknowledgement = ack-nhfb, keywords = "information hiding; steganography", } @Article{Schneier:1993:DS, author = "Bruce Schneier", title = "Digital Signatures", journal = j-BYTE, volume = "18", number = "??", pages = "??--??", month = "??", year = "1993", CODEN = "BYTEDJ", ISSN = "0360-5280 (print), 1082-7838 (electronic)", ISSN-L = "0360-5280", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", fjournal = "BYTE Magazine", } @Article{Schneier:1993:IEA, author = "Bruce Schneier", title = "The {IDEA} Encryption Algorithm", journal = j-DDJ, volume = "18", number = "13", pages = "50, 52, 54, 56, 106", month = dec, year = "1993", CODEN = "DDJOEB", ISSN = "1044-789X", bibdate = "Tue Sep 03 09:15:45 1996", bibsource = "http://www.ddj.com/index/author/index.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib; UnCover database", abstract = "The International Data Encryption Algorithm (IDEA) may be one of the most secure block algorithms available to the public today. Bruce examines its 128-bit-long key (over twice the length of the familiar DES) and unravels the algorithm for both encryption and decryption.", acknowledgement = ack-nhfb, classification = "B6120B (Codes); C6130S (Data security)", fjournal = "Dr. Dobb's Journal of Software Tools", keywords = "128-Bit-long key; Block cipher algorithm; Decryption; IDEA encryption algorithm; International Data Encryption Algorithm; Security", thesaurus = "C listings; Cryptography", } @Article{Schneier:1993:SCD, author = "B. Schneier", title = "Subliminal channels in the {Digital Signature Algorithm}", journal = j-COMPUT-SECUR-J, volume = "9", number = "2", pages = "57--63", month = "Fall", year = "1993", CODEN = "CSJLDR", ISSN = "0277-0865", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/031624.html", acknowledgement = ack-nhfb, fjournal = "Computer Security Journal", keywords = "information hiding; steganography", } @Article{Schneier:1993:UHD, author = "Bruce Schneier", title = "Under the Hood: Digital Signatures: Digital signatures will enable electronic documents to serve as legal instruments", journal = j-BYTE, volume = "18", number = "12", pages = "3309--??", month = nov, year = "1993", CODEN = "BYTEDJ", ISSN = "0360-5280 (print), 1082-7838 (electronic)", ISSN-L = "0360-5280", bibdate = "Tue Jan 2 10:01:41 MST 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "BYTE Magazine", } @InProceedings{Schnorr:1993:FHI, author = "C. P. Schnorr", title = "{FFT}-Hash {II}, Efficient Cryptographic Hashing", crossref = "Rueppel:1993:ACE", pages = "41--51", year = "1993", bibdate = "Sun Jul 17 19:44:40 1994", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", acknowledgement = ack-nhfb, } @Article{Schnorr:1993:FIE, author = "C. P. Schnorr", title = "{FFT-hash} {II}, efficient cryptographic hashing", journal = j-LECT-NOTES-COMP-SCI, volume = "658", pages = "45--54", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Book{Sedgewick:1993:AM, author = "Robert Sedgewick", title = "Algorithms in {Modula-3}", publisher = pub-AW, address = pub-AW:adr, pages = "xiv + 656", year = "1993", ISBN = "0-201-53351-0", ISBN-13 = "978-0-201-53351-4", LCCN = "QA76.73.M63 S43 1993", bibdate = "Mon Jan 3 12:10:05 1994", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/master.bib", acknowledgement = ack-nhfb, libnote = "Not yet in my library.", tableofcontents = "1: Introduction \\ 2: Modula-3 \\ 3: Elementary Data Structures \\ 4: Trees \\ 5: Recursion \\ 6: Analysis of Algorithms \\ 7: Implementation of Algorithms \\ 8: Elementary Sorting Methods \\ 9: Quicksort \\ 10: Radix Sorting \\ 11: Priority Queues \\ 12: Mergesort \\ 13: External Sorting \\ 14: Elementary Searching Methods \\ 15: Balanced Trees \\ 16: Hashing \\ 17: Radix Searching \\ 18: External Searching \\ 19: String Searching \\ 20: Pattern Matching \\ 21: Parsing \\ 22: File Compression \\ 23: Cryptology \\ 24: Elementary Geometric Methods \\ 25: Finding the Convex Hull \\ 26: Range Searching \\ 27: Geometric Intersection \\ 28: Closest-Point Problems \\ 29: Elementary Graph Algorithms \\ 30: Connectivity \\ 31: Weighted Graphs \\ 32: Directed Graphs \\ 33: Network Flow \\ 34: Matching \\ 35: Random Numbers \\ 36: Arithmetic \\ 37: Gaussian Elimination \\ 38: Curve Fitting \\ 39: Integration \\ 40: Parallel Algorithms \\ 41: The Fast Fourier Transform \\ 42: Dynamic Programming \\ 43: Linear Programming \\ 44: Exhaustive Search \\ 45: NP-Complete Problems", } @Article{Sgarro:1993:ITB, author = "Andrea Sgarro", title = "Information-theoretic bounds for authentication frauds", journal = j-LECT-NOTES-COMP-SCI, volume = "658", pages = "467--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:29 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0658.htm; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0658/06580467.htm; http://link.springer-ny.com/link/service/series/0558/papers/0658/06580467.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @InProceedings{Shand:1993:FIR, author = "M. Shand and J. Vuillemin", title = "Fast Implementations of {RSA} Cryptography", crossref = "Swartzlander:1993:SCA", pages = "252--259", year = "1993", bibdate = "Wed Nov 14 18:47:51 2007", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.acsel-lab.com/arithmetic/arith11/papers/ARITH11_Shand.pdf", acknowledgement = ack-nhfb, keywords = "ARITH-11", } @InProceedings{Shepherd:1993:ACCa, author = "S. J. Shepherd", editor = "????", booktitle = "Proceedings of the First International Network Security Conference, London, 26--27 May 1993.", title = "Access Control and Cryptography", publisher = "????", address = "????", pages = "??--??", year = "1993", ISBN = "????", ISBN-13 = "????", LCCN = "????", bibdate = "Mon Nov 30 06:42:27 1998", bibsource = "http://www.eeng.brad.ac.uk/Research/crypto_pubs.html; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @InProceedings{Shepherd:1993:ACCb, author = "S. J. Shepherd", editor = "????", booktitle = "Proceedings of the Fourth International PC Security Conference, London, 13--15 September 1993", title = "Access Control and Cryptography", publisher = "????", address = "????", pages = "??--??", year = "1993", ISBN = "????", ISBN-13 = "????", LCCN = "????", bibdate = "Mon Nov 30 06:42:27 1998", bibsource = "http://www.eeng.brad.ac.uk/Research/crypto_pubs.html; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @InCollection{Shepherd:1993:EOS, author = "S. J. Shepherd", title = "Extended {OSI} Security Architecture", crossref = "Muftic:1993:SAO", chapter = "7--8", pages = "??--??", year = "1993", bibdate = "Fri Apr 16 15:26:15 1999", bibsource = "http://www.eeng.brad.ac.uk/Research/crypto_pubs.html; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @InProceedings{Shepherd:1993:WNS, author = "S. J. Shepherd", editor = "????", booktitle = "Proceedings of the British Computer Society Computer Security Specialist Group, Sutton Coldfield, 13 March 1993", title = "Wireless Network Security and Cryptography", publisher = "????", address = "????", pages = "??--??", year = "1993", ISBN = "????", ISBN-13 = "????", LCCN = "????", bibdate = "Mon Nov 30 06:41:23 1998", bibsource = "http://www.eeng.brad.ac.uk/Research/crypto_pubs.html; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, } @Article{Shimbo:1993:CSC, author = "Atsushi Shimbo and Shin-ichi Kawamura", title = "Cryptanalysis of Several Conference Key Distribution Schemes", journal = j-LECT-NOTES-COMP-SCI, volume = "739", pages = "265--??", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon May 13 11:49:00 MDT 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Silverman:1993:PAE, author = "R. D. Silverman and S. S. {Wagstaff, Jr.}", title = "A Practical Analysis of the Elliptic Curve Factoring Algorithm", journal = j-MATH-COMPUT, volume = "61", pages = "445--462", year = "1993", CODEN = "MCMPAF", ISSN = "0025-5718 (print), 1088-6842 (electronic)", ISSN-L = "0025-5718", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", acknowledgement = ack-nhfb, fjournal = "Mathematics of Computation", journal-URL = "http://www.ams.org/mcom/", referencedin = "Referenced in \cite[Ref. 12]{Silverman:1997:FGR}.", } @InProceedings{Simmons:1993:SCU, author = "G. J. Simmons", title = "The Subliminal Channels in the {US Digital Signature Algorithm} ({DSA})", crossref = "Wolfowicz:1993:SPS", pages = "35--54", year = "1993", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/022612.html", acknowledgement = ack-nhfb, keywords = "information hiding; steganography", } @Article{Sivabalan:1993:DSN, author = "M. Sivabalan and S. Tavares and L. E. Peppard", title = "On the Design of {SP} Networks form an Information Theoretic Point of View", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "260--279", year = "1993", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Sep 15 10:01:31 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", keywords = "CRYPTO; cryptology", } @Article{Smid:1993:RCN, author = "Miles E. Smid and Dennis K. Branstad", title = "Response to Comments on the {NIST} Proposed Digital Signature Standard (Invited)", journal = j-LECT-NOTES-COMP-SCI, volume = "740",