Cryptography Reference
In-Depth Information
[37] W. Di e and M. E. Hellman. Multiuser Cryptographic Techniques. Fed-
eral Information Processing Standard Conference Proceedings, pages
109-112, vol. 45, 1976.
[38] W. Di e and M. E. Hellman. New Directions in Cryptography. IEEE
Transactions on Information Theory, pages 644-654, vol. 22, 1976.
[39] W. Du and M. J. Atallah. Secure multi-party computation problems and
their applications: A review and open problems. Proceedings of the New
Security Paradigms Workshop, pages 11-20, Coudcroft, New Mexico,
USA, September 11-13, 2001.
[40] O. Dunkelman. A small observation on HC-128. Available at http://
www.ecrypt.eu.org/stream/phorum/read.php?1,1143 Date: Novem-
ber 14, 2007. [last accessed on April 30, 2011].
[41] P. Ekdahl and T. Johansson. Another attack on A5/1. IEEE Transcation
on Information Theory, pages 284-289, vol. 49, no. 1, 2003.
[42] eSTREAM, the ECRYPT Stream Cipher Project. http://www.ecrypt.
eu.org/stream [last accessed on April 30, 2011].
[43] ETSI/SAGE Specification Version 1.1. Specification of the 3GPP Confi-
dentiality and Integrity Algorithms UEA2 & UIA2, Document 2: SNOW
3G Specification. September 6, 2006.
[44] ETSI/SAGE Specification Version 1.4. Specification of the 3GPP Confi-
dentiality and Integrity Algorithms 128-EEA3 & 128-EIA3, Document 2:
ZUC Specification. July 30, 2010.
[45] Federal Information Processing Standards (FIPS). Publication 46, Jan-
uary 15, 1977.
[46] Federal Information Processing Standards (FIPS). Publication 197, 2001.
[47] J. Feghhi and P. Williams. Digital Certificates: Applied Internet Security.
Addison-Wesley Professional. October 9, 1998.
[48] N. Ferguson. Michael: an improved MIC for 802.11 WEP. IEEE doc.
802.11-02/020r0, Januaru 2002.
[49] R. P. Feynman. Simulating Physics with Computers. International Jour-
nal of Theoretical Physics, pages 467-488, vol. 21, no. 6/7, 1982.
[50] H. Finney. An RC4 cycle that can't happen. Post in sci.crypt, September
1994.
[51] S. R. Fluhrer and D. A. McGrew. Statistical Analysis of the Alleged RC4
Keystream Generator. FSE 2000, pages 19-30, vol. 1978, Lecture Notes
in Computer Science, Springer.
Search WWH ::




Custom Search