{\rtf1\ansi\deff0\deftab360

{\fonttbl
{\f0\fswiss\fcharset0 Arial}
{\f1\froman\fcharset0 Times New Roman}
{\f2\fswiss\fcharset0 Verdana}
{\f3\froman\fcharset2 Symbol}
}

{\colortbl;
\red0\green0\blue0;
}

{\info
{\author Biblio 7.x}{\operator }{\title Biblio RTF Export}}

\f1\fs24
\paperw11907\paperh16839
\pgncont\pgndec\pgnstarts1\pgnrestart
Fluhrer, Scott, Itsik Mantin, and Adi Shamir. "Weaknesses in the Key Scheduling Algorithm of RC4." \i Lecture Notes in Computer Science\i0  2259 (2001).\par \par Feige, Uriel, Amos Fiat, and Adi Shamir. "Zero-Knowledge Proofs of Identity." \i  Journal of Cryptology\i0  1 (1988).\par \par Fiat, Amos, and Adi Shamir. \i How to Prove Yourself: Practical Solutions of Identification and Signature Problems\i0  In \i Advances in Cryptology ?  Proceedings of CRYPTO?86, Lecture Notes in Computer Science\i0 . Vol. 263., 1987.\par \par Shamir, Adi. "How to Share a Secret." \i Communications of the ACM\i0  22, no. 11 (1979): 612-613.\par \par Rivest, Ronald L., Adi Shamir, and Leonard Adleman. "A Method for Obtaining Digital Signatures and Public Key Cryptosystems." \i Communications of the ACM\i0  21, no. 2 (1978): 120-126.\par \par Rivest, Ronald, Adi Shamir, and Leonard Adleman. "A method for obtaining digital signatures and public-key cryptosystems." \i Communications of the ACM\i0  21, no. 2 (1978): 120-126.\par \par Rivest, Ronald L., Adi Shamir, and Leonard Adleman. "A Method of Obtaining Digital Signatures and Public-Key Cryptosystems." \i Communications of the ACM\i0  21, no. 2 (1978): 120-126.\par \par }