Cryptography Reference
In-Depth Information
[11] Marcus Aurelius, Meditations , from Marcus Aurelius and His Times, Trans-
lations from Paganism to Christianity , W.J. Black, Inc., Roslyn, NY
(1973). ( Cited on page 116. )
[12] T. Balister, The Phaistos Disk , Copyright T. Balister, Production:
Ebner, Ulm, Germany, English translation: M. Sheer, first edition, ISBN
# 3-9806168-0-0. ( Cited on page 2. )
[13] M. Bellare and T. Kohno, SSH transport layer encryption modes ,
INTERNET-DRAFT, draft-ietf-secsh-newmodes-01.txt , October (2003).
( Cited on page 335. )
[14] M. Bellare and P. Rogaway, Random oracles are practical: A paradigm for
designing e ; cient protocols , in First ACM Conference on Computer and
Communications Security, ACM Press, New York (1993), 62-73. ( Cited on
page 587. )
[15] M. Bellare and P. Rogaway, Optimal asymmetric encryption in Advances in
Cryptology , EUROCRYPT '94, Springer-Verlag, Berlin, LNCS 950 (1994),
92-111. ( Cited on page 174. )
[16] S.M. Bellovin, Security problems in the TCP/IP protocol suite , Computer
Communications Review 19 (1989), 32-48. ( Cited on page 315. )
[17] S.M. Bellovin and M. Merritt, Encrypted key exchange: Password-based
protocols secure against dictionary attacks , in Proceedings of the 1992 IEEE
Computer Society Conference on Research in Security and Privacy (1992),
72-84. ( Cited on page 199. )
[18] S.M. Bellovin and M. Merritt, Cryptographic protocol for secure communi-
cations , U.S. Patent 5241599, August 31 (1993). ( Cited on page 199. )
[19] S.M. Bellovin and M. Merritt, Augmented encrypted key exchange: A
password-based protocol secure against dictionary attacks and password file
compromise , Technical report, AT&T Bell Labs (1994). ( Cited on page
199. )
[20] C. Bennett and G. Brassard, The dawn of a new era for quantum cryp-
tography: The experimental prototype is working! , SIGACT News 20 , Fall
(1989), 78-82. ( Cited on page 370. )
[21] C. Bennett, G. Brassard, C. Crepeau, R. Josza, A. Peres, and W. Woot-
ers, Teleporting an unknown quantum state via dual classical and Einstein-
Podolsky-Rosen channels , Physical Review Letters 70 (1993), 1895-1899.
( Cited on page 371. )
[22] E. Biham and L.R. Knudsen, Cryptanalysis of the ANSI X9.52 CBCM
mode , J. Cryptol. (2002), 47-59. ( Cited on page 132. )
Search WWH ::




Custom Search