“Secrecy, Authentication, and Public Key Systems”, Stanford Ph.D. thesis, 1979, by Ralph C. Merkle.
Google Scholar
“A Certified Digital Signature”, unpublished paper. 1979. To appear in Crypto’ 89.
Google Scholar
“Universal One-Way Hash Functions and their Cryptographic Applications”. Moni Naor and Moti Yung. Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, Seattle, Washington May 15–17. 1989. page 33–43.
Google Scholar
“A High Speed Manipulation Detection Code”, by Robert R. Jueneman, Advances in Cryptology-CRYPTO’ 86, Springer Verlag. Lecture Notes on Computer Science, Vol. 263. page 327 to 346.
Google Scholar
“Another Birthday Attack” by Don Coppersmith, Advances in Cryptology-CRYPTO’ 85. Springer Verlag, Lecture Notes on Computer Science, Vol. 218, pages 14 to 17.
Google Scholar
“A digital signature based on a conventional encryption function”. by Ralph C. Merkle, Advances in Cryptology CRYPTO 87, Springer Verlag, Lecture Notes on Computer Science, Vol. 293. page 369–378.
Google Scholar
“Cryptography and Data Security”, by Dorothy E. R. Denning. Addison-Wesley 1982. page 170.
Google Scholar
“On the security of multiple encryption”. by Ralph C. Merkle. CACM Vol. 24 No. 7, July 1981 pages 465 to 467.
MathSciNet
Google Scholar
“Results of an initial attempt to cryptanalyze the NBS Data Encryption Standard”. by Martin Hellman et. al., Information Systems lab. report SEL 76-042, Stanford University 1976.
Google Scholar
“Communication Theory of Secrecy Systems”, by C. E. Shannon, Bell Sys. Tech. Jour. 28 (Oct. 1949) 656–715
MathSciNet
Google Scholar
“Message Authentication” by R. R. Jueneman. S. M. Matyas, C. H. Meyer, IEEE Communications Magazine, Vol. 23, No. 9. September 1985 pages 29–40.
CrossRef
Google Scholar
“Generating strong one-way functions with cryptographic algorithm”, by S. M. Matyas. C. H. Meyer, and J. Oseas, IBM Technical Disclosure Bulletin, Vol. 27, No. 10A. March 1985 pages 5658–5659
Google Scholar
“Analysis of Jueneman’s MDC Scheme”. by Don Coppersmith, preliminary version June 9.1988. Analysis of the system presented in [4].
Google Scholar
“The Data Encryption Standard: Past and Future” by M.E. Smid and D.K. Branstad, Proc. of the IEEE, Vol 76 No. 5 pp 550–559, May 1988
CrossRef
Google Scholar
“Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information”, U.S. Congress. Office of Technology Assessment OTA-CIT-310, U.S. Government Printing Office, October 1987
Google Scholar
“Exhaustive cryptanalysis of the NBS data encryption standard”. Computer, June 1977. pages 74–78
Google Scholar
“Cryptograhy: a new dimension in data security”, by Carl H. Meyer and Stephen M. Matyas, Wiley 1982.
Google Scholar
“Secure program code with modification detection code”. by Carl H. Meyer and Michael Schilling; Proceedings of the 5th Worldwide Congress on Computers and Communication Security and Protection — SECURICOM 88. pp. 111–130, SEDEP, 8. Rud de la Michodiese, 75002. Paris, France.
Google Scholar
“Cryptography — A State of the Art Review,” by Carl H. Meyer, COMEURO 89. Hamburg, May 8–12, 1989. Proceedings-VLSI and Computer Peripherals, 3rd Annual European Computer Conference, pp. 150–154.
Google Scholar
“Design Principles for Hash Functions” by Ivan Damgaard. Crypto’ 89.
Google Scholar