A Two-Server Auction Scheme Ari Juels and Mike Szydlo Financial Cryptography 02 12 March 2002.
The AKS Primality Test Ilse Haim Directed Reading Program Mentor: Jon Huang University of Maryland, College Park May 2, 2013.
Cryptography and Network Security Chapter 7 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Practical Cryptography Lecture 2 Public Key Cryptography.
ECE-8843 csc.gatech/copeland/jac/8843/ Prof. John A. Copeland
1 Hash Function. Hash Functions Dedicated Hash Functions ◦ Useful for lightweight authentication in RFID system Message Authentication Codes ◦ CBC-MAC.