Cryptography Reference
In-Depth Information
[66] M. Hell, T. Johansson and W. Meier. Grain - A Stream Cipher for
Constrained Environments. International Journal of Wireless and Mobile
Computing, Special Issue on Security of Computer Network and Mobile
Systems, 2006.
[67] M. Hell, T. Johansson, A. Maximov and W. Meier. A Stream Cipher
Proposal: Grain-128. ISIT 2006, Seattle, USA.
[68] M. E. Hellman. A Cryptanalytic Time-Memory Trade-Off. IEEE Trans-
actions on Information Theory, page 401-406, vol. 26, issue 4, July 1980.
[69] M. Hermelin and K. Nyberg. Correlation properties of Bluetooth com-
biner. ICISC 1999, pages 17-29, vol. 1787, Lecture Notes in Computer
Science, Springer, 2000.
[70] I. N. Herstein. Abstract Algebra. Wiley. Third Edition, January 1, 1996.
[71] J. J. Hoch and A. Shamir. Fault Analysis of Stream Ciphers. CHES 2004,
pages 240-253, vol. 3156, Lecture Notes in Computer Science, Springer.
[72] R. V. Hogg, A. Craig and J. W. McKean. Introduction to Mathematical
Statistics. Prentice Hall. Sixth Edition, June 27, 2004.
[73] J. Hong and P. Sarkar. New Applications of Time Memory Data Trade-
offs. ASIACRYPT 2005, pages 353-372, vol. 3788, Lecture Notes in Com-
puter Science, Springer.
[74] E. Horowitz and S. Sahni. Fundamentals of Data Structures. W.H. Free-
man & Company, 1982.
[75] R. Housley, D. Whiting and N. Ferguson. Alternate temporal key hash.
IEEE doc. 802.11-02/282r2, April 2002.
[76] S. Indesteege and B. Preneel. Collisions for RC4-Hash. ISC 2008, pages
355-366, vol. 5222, Lecture Notes in Computer Science, Springer.
[77] T. Isobe, T. Ohigashi, H. Kuwakado and M. Morii. How to Break Py and
Pypy by a Chosen-IV Attack. 2006. Available at http://www.ecrypt.
eu.org/stream/pyp2.html [last accessed on April 30, 2011].
[78] R. J. Jenkins. ISAAC and RC4. 1996. Available at http://
burtleburtle.net/bob/rand/isaac.html [last accessed on April 30,
2011].
[79] P. Judge and M. Ammar. Security Issues and Solutions in Multicast Con-
tent Distribution: A Survey. IEEE Network, January/February 2003.
[80] D. Kahn. The Codebreakers: The Comprehensive History of Secret Com-
munication from Ancient Times to the Internet. Scribner, 1996.
Search WWH ::




Custom Search