Cryptography Reference
In-Depth Information
[84] S. Haber, W.S. Stornetta. How to Time-Stamp a Digital Document.
Journal of Cryptology
,
vol. 3, pp. 99-111, 1991.
[85] N. Haller. The S/KEY One-Time Password System. RFC 1760, 1995.
[86] N. Haller, C. Metz, P. Nesser, M. Straw. A One-Time Password System. Internet Standard.
RFC 2289, The Internet Society, 1998.
[87] J. Hastad. Solving Simultaneous Modular Equations of Low Degree.
SIAM Journal on
Computing
, vol. 17, pp. 376-404, 1988.
[88] M.E. Hellman. A Cryptanalysis Time-Memory Trade-Off.
IEEE Transactions on Infor-
mation Theory
, vol. IT-26, pp. 401-406, 1980.
[89] M.E. Hellman, R. Merkle, R. Schroeppel, L. Washington, W. Diffie, S. Pohlig,
P. Schweitzer.
Results of an Initial Attempt to Cryptanalyze the NBS Data Encryption
Standard
. Stanford University, September 1976.
[90] H.M. Heys. A Tutorial on Linear and Differential Cryptanalysis. Technical Report
CORR 2001-17, Centre for Applied Cryptographic Research, Department of Combi-
natorics and Optimization, University of Waterloo, 2001. (Also appears in
Cryptologia
,
vol. 26, pp. 189-221, 2002.)
[91] F.H. Hinsley, A. Stripp.
Code Breakers
. Oxford University Press, NY, 1993.
[92] J.E. Hopcroft, J.D. Ullman.
Introduction to Automata Theory, Languages, and Computa-
tion
. Addison Wesley, London, 1979.
[93] R. Housley, W. Ford, W. Polk, D. Solo. Internet X.509 Public Key Infrastructure Certificate
and CRL Profile. Internet Standard. RFC 2459, The Internet Society, 1999.
[94] T. Iwata, K. Kurosawa. OMAC: One-Key CBC MAC. In
Fast Software Encryption'03
,
Lund, Sweden, Lecture Notes in Computer Science 2887. Springer-Verlag, NY, 2003,
pp. 137-161.
[95] T. Jakobsen, L.R. Knudsen. The Interpolation Attack on Block Ciphers. In
Fast Software
Encryption'97
, Haifa, Israel, Lecture Notes in Computer Science 1267. Springer-Verlag,
NY, 1997, pp. 28-40.
[96] P.
Junod,
S.
Vaudenay.
FOX
Specifications
Version
1.1.
Technical
Report
EPFL/IC/2004/75, EPFL, 2004.
[97] P. Junod, S. Vaudenay. FOX: A New Family of Block Ciphers. In
Selected Areas in Cryp-
tography'04
, Watterloo, ON, Canada, Lecture Notes in Computer Science 3357. Springer-
Verlag, NY, 2005, pp. 114-129.
[98] D. Kahn.
The Codebreakers
. Scriber, 1996.
[99] R.M. Karp. Reducibility among Combinatorial Problems. In
Complexity of Computer
Computations
, Plenum Press, New York, 1972. pp. 85-103.
Search WWH ::
Custom Search