[PDF][PDF] Secure names for bit-strings

S Haber, WS Stornetta - Proceedings of the 4th ACM Conference on …, 1997 - dl.acm.org
Having the author or publisher of a document compute a digital signature for its bit-string
content is a reasonable use of cryptographic tools for this purpose.(See, for example,[R 95 …

MD2 is not secure without the checksum byte

N Rogier, P Chauvaud - Designs, Codes and Cryptography, 1997 - Springer
Abstract In 1989, Ron Rivest introduced the MD2 Message Digest Algorithm which takes as
input a message of arbitrary length and produces as output a 128-bit message digest, by …

Cryptanalysis of message authentication codes

B Preneel - International Workshop on Information Security, 1997 - Springer
This paper gives a survey of attacks on Message Authentication Codes (MACS). First it
defines the required security properties. Next it describes generic forgery and key recovery …

A Study on the Internet as a Commerce Medium

R Ziya - 1997 - search.proquest.com
For businesses, large and small alike, computing and networking technology is quickly
becoming an absolute necessity. Computers are already populating many offices by …

[图书][B] Authentication schema defying known crackers' techniques

PJ Abadie - 1997 - search.proquest.com
Thousands of computer users utilize systems requiring that they prove their identity in order
to access specific services. This procedure, called authentication, usually requires the …

[PDF][PDF] SECURITY–ENCRYPTION TECHNIQUES, CASH PROTOCOLS, CASH SYSTEMS.

R Ziya - 1997 - tacplast.com
In this paper the term security is used as the reliability of communication between the
consumer and the commercial Internet site. Due to the nature of the Internet, or generally the …

[引用][C] Systematische Entwurfsmethoden für praktikable Kryptosysteme

S Lucks - 1997 - Cuvillier Verlag

[引用][C] Evaluation methodology for security primitives

B Preneel, B Van Rompay, JJ Quiquater… - 1997 - Technical report, TIMESEC Project …