Cryptography Reference
In-Depth Information
Bibliography
[1] H. Ableson and G.J. Sussman, Structure and Interpretation of Com-
puter Programs , MIT Press, Second Edition (1996). ( Cited on page 388. )
[2] C. Adams, The CAST- 128 Encryption Algorithm , Internet Request for
Comments 2144, (May 1977). ( Cited on pages 275, 507. )
[3] C. Adams, Constructing symmetric ciphers using the CAST design pro-
cedure , Designs, Codes, and Cryptography 12 , November (1997), 71-104.
( Cited on pages 275, 507. )
[4] C. Adams and S. Lloyd, Understanding Public-Key Infrastructure ,
New Riders Publishing, Indianapolis, IN (1999). ( Cited on page 239. )
[5] L. M. Adleman and M.-D. Huang, Primality testing and two dimensional
Abelian varieties over finite fields , LNM, Springer-Verlag, Berlin 1512
(1992). ( Cited on page 554. )
[6] M. Agrawal, N. Kayal, and N. Saxena, Primes is in P , preprint. ( Cited on
pages 526 and 555-557. )
[7] W.R. Alford, A. Granville, and C. Pomerance, There are infinitely many
Carmichael numbers , Ann. Math. 140 (1994), 703-722. ( Cited on page
551. )
[8] W.
Arbaugh,
An
inductive
chosen
plaintext
attack
against
WEP/WEP2 ,
IEEE
doc
802.11-02/30,
May
(2001)
(see:
http://grouper.ieee.org/groups/802/11/ ). ( Cited on page 344. )
[9] J. Arkko and H. Haverinen, EAP AKA authentication , INTERNET-
DRAFT, draft-arkko-pppext-eap-aka-11.txt , October (2003). ( Cited on page
347. )
[10] D. Atkins, M. Graff, A.K. Lenstra, and P.C. Leyland, The magic words are
SQUEAMISH OSSIFRAGE in Advances in Cryptology , ASIACRYPT
'94, Springer-Verlag, Berlin, LNCS 917 (1995), 263-277. ( Cited on page
175. )
Search WWH ::




Custom Search