Cryptography Reference
In-Depth Information
[11] Marcus Aurelius,
Meditations
, from
Marcus Aurelius and His Times, Trans-
lations from Paganism to Christianity
, W.J. Black, Inc., Roslyn, NY
(1973). (
Cited on page 116.
)
[12] T. Balister,
The Phaistos Disk
, Copyright T. Balister, Production:
Ebner, Ulm, Germany, English translation: M. Sheer, first edition, ISBN
# 3-9806168-0-0. (
Cited on page 2.
)
[13] M. Bellare and T. Kohno,
SSH transport layer encryption modes
,
INTERNET-DRAFT,
draft-ietf-secsh-newmodes-01.txt
, October (2003).
(
Cited on page 335.
)
[14] M. Bellare and P. Rogaway,
Random oracles are practical: A paradigm for
designing e
;
cient protocols
, in First ACM Conference on Computer and
Communications Security, ACM Press, New York (1993), 62-73. (
Cited on
page 587.
)
[15] M. Bellare and P. Rogaway,
Optimal asymmetric encryption
in
Advances in
Cryptology
, EUROCRYPT '94, Springer-Verlag, Berlin, LNCS
950
(1994),
92-111. (
Cited on page 174.
)
[16] S.M. Bellovin,
Security problems in the TCP/IP protocol suite
, Computer
Communications Review
19
(1989), 32-48. (
Cited on page 315.
)
[17] S.M. Bellovin and M. Merritt,
Encrypted key exchange: Password-based
protocols secure against dictionary attacks
, in Proceedings of the 1992 IEEE
Computer Society Conference on Research in Security and Privacy (1992),
72-84. (
Cited on page 199.
)
[18] S.M. Bellovin and M. Merritt,
Cryptographic protocol for secure communi-
cations
, U.S. Patent 5241599, August 31 (1993). (
Cited on page 199.
)
[19] S.M. Bellovin and M. Merritt,
Augmented encrypted key exchange: A
password-based protocol secure against dictionary attacks and password file
compromise
, Technical report, AT&T Bell Labs (1994). (
Cited on page
199.
)
[20] C. Bennett and G. Brassard,
The dawn of a new era for quantum cryp-
tography: The experimental prototype is working!
, SIGACT News
20
, Fall
(1989), 78-82. (
Cited on page 370.
)
[21] C. Bennett, G. Brassard, C. Crepeau, R. Josza, A. Peres, and W. Woot-
ers,
Teleporting an unknown quantum state via dual classical and Einstein-
Podolsky-Rosen channels
, Physical Review Letters
70
(1993), 1895-1899.
(
Cited on page 371.
)
[22] E. Biham and L.R. Knudsen,
Cryptanalysis of the ANSI X9.52 CBCM
mode
, J. Cryptol. (2002), 47-59. (
Cited on page 132.
)
Search WWH ::
Custom Search