1996-01-10 - Reports available via CTRS

Header Data

From: “David J. Bianco” <bianco@itribe.net>
To: cypherpunks@toad.com
Message Hash: 0f6373ef1914b4e830bf86abef7dd42cfb5a8b82350099a8963294e9d2c4663c
Message ID: <199601101438.JAA03611@gatekeeper.itribe.net>
Reply To: N/A
UTC Datetime: 1996-01-10 14:51:45 UTC
Raw Date: Wed, 10 Jan 1996 22:51:45 +0800

Raw message

From: "David J. Bianco" <bianco@itribe.net>
Date: Wed, 10 Jan 1996 22:51:45 +0800
To: cypherpunks@toad.com
Subject: Reports available via CTRS
Message-ID: <199601101438.JAA03611@gatekeeper.itribe.net>
MIME-Version: 1.0
Content-Type: text/plain


[Abstracts for, and (in most cases) links to these report titles can be found 
at the CTRS site, http://www.itribe.net/CTRS/ ]

1.Tuomas Aura, Modelling the Needham-Schroeder authentication protocol with high
     level Petri nets, Technical Report B14, Espoo, Finland, September 1995. 

2.Arnold G. Reinhold, Diceware for Passphrase Generation and Other Cryptographic
     Applications, Cambridge, MA, July 28, 1995. 

3.Arnold G. Reinhold, A Diceware Word List, Cambridge, MA, July 28, 1995. 

4.Arnold G. Reinhold, Results of a Survey on PGP Pass Phrase Usage, Cambridge, MA, July
     28, 1995. 

5.Arnold G. Reinhold, "Common Sense and Cryptography" , Internet Secrets, John Levine
     and Carol Baroudi (Ed.), Foster City, CA, 1995, pp. 115-150. 

6.Arnold G. Reinhold, On the Function of MHC-Antigen Specificity, Cambridge, MA,
     March 3, 1989. 

7.VeriSign, Inc., FAQ: Answers About Today's Digital IDs, July 15, 1995. 

8.Roos, Andrew, A Class of Weak Keys in the RC4 Stream Cipher (Preliminary Draft),
     Westville, South Africa, September 1995. 

9.Terry Ritter, Substitution Cipher with Pseudo-Random Shuffling: The Dynamic
     Substitution Combiner., Cryptologia, vol. 14, no. 4, 1990, pp. 289-303. 

10.Terry Ritter, Transposition Cipher with Pseudo-Random Shuffling: The Dynamic
     Transposition Combiner., Cryptologia, vol. 15, no. 1, 1991, pp. 1-17. 

11.Terry Ritter, The Efficient Generation of Cryptographic Confusion Sequences.,
     Cryptologia, vol. 15, no. 2, 1991, pp. 81-139. 

12.Terry Ritter, Voice and Video Cryptography in a DSP Environment., Proceedings of the
     Second Annual Texas Instruments TMS320 Educators Conference, Houston, Texas, August
     5-7, 1992. 

13.Terry Ritter, Estimating Population from Repetitions in Accumulated Random
     Samples., Cryptologia, vol. 18, no. 2, 1994, pp. 155-190. 

14.Camenisch, Jan; Piveteau, Jean-Marc; Stadler, Markus, An Efficient Fair Payment System,
     India, Mai 1996. 

15.Camenisch, Jan; Piveteau, Jean-Marc; Stadler, Markus, An Efficient Electronic Payment
     System Protecting Privacy, Lecture Notes in Computer Science, vol. 875, pp. 207-215,
     Berlin, November 1994. 

16.Camenisch, Jan; Piveteau, Jean-Marc; Stadler, Markus, Blind Signatures Based on the
     Discrete Logarithm Problem, Proceedings of EUROCRYPT 94,Lecture Notes in Computer
     Science, vol. 9505, pp. 428-432, Berlin, May 1994. 

17.Stadler, Markus; Piveteau, Jean-Marc; Camenisch, Jan, Fair Blind Signatures ,
     Proceedings of EUROCRYPT 95,Lecture Notes in Computer Science, vol. 921, pp. 209-219,
     Berlin, May 1995. 

18.Kocher, Paul C., Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using
     Timing Attacks, Stanford, California, December 1995. 

19.Schoenmakers, Berry, An Efficient Electronic Payment System Withstanding Parallel
     Attacks, CS-R9522, Amsterdam, Netherlands, March, 1995.


===========================================================================
David J. Bianco			| Web Wonders, Online Oddities, Cool Stuff
iTribe, Inc.			| Phone: (804) 446-9060 Fax: (804) 446-9061
Suite 1700, World Trade Center	| email: <bianco@itribe.net>
Norfolk, VA 23510		| URL  : http://www.itribe.net/~bianco/





Thread