Cryptography Reference
In-Depth Information
Bibliography
[1] H. Ableson and G.J. Sussman,
Structure and Interpretation of Com-
puter Programs
, MIT Press, Second Edition (1996). (
Cited on page 388.
)
[2] C. Adams,
The CAST-
128
Encryption Algorithm
, Internet Request for
Comments 2144, (May 1977). (
Cited on pages 275, 507.
)
[3] C. Adams,
Constructing symmetric ciphers using the CAST design pro-
cedure
, Designs, Codes, and Cryptography
12
, November (1997), 71-104.
(
Cited on pages 275, 507.
)
[4] C. Adams and S. Lloyd,
Understanding Public-Key Infrastructure
,
New Riders Publishing, Indianapolis, IN (1999). (
Cited on page 239.
)
[5] L. M. Adleman and M.-D. Huang,
Primality testing and two dimensional
Abelian varieties over finite fields
, LNM, Springer-Verlag, Berlin
1512
(1992). (
Cited on page 554.
)
[6] M. Agrawal, N. Kayal, and N. Saxena,
Primes is in P
, preprint. (
Cited on
pages 526 and 555-557.
)
[7] W.R. Alford, A. Granville, and C. Pomerance,
There are infinitely many
Carmichael numbers
, Ann. Math.
140
(1994), 703-722. (
Cited on page
551.
)
[8] W.
Arbaugh,
An
inductive
chosen
plaintext
attack
against
WEP/WEP2
,
IEEE
doc
802.11-02/30,
May
(2001)
(see:
http://grouper.ieee.org/groups/802/11/
). (
Cited on page 344.
)
[9] J. Arkko and H. Haverinen,
EAP AKA authentication
, INTERNET-
DRAFT,
draft-arkko-pppext-eap-aka-11.txt
, October (2003). (
Cited on page
347.
)
[10] D. Atkins, M. Graff, A.K. Lenstra, and P.C. Leyland,
The magic words are
SQUEAMISH OSSIFRAGE
in
Advances in Cryptology
, ASIACRYPT
'94, Springer-Verlag, Berlin, LNCS
917
(1995), 263-277. (
Cited on page
175.
)
Search WWH ::
Custom Search