Cryptography Reference
In-Depth Information
[75] T. ElGamal,
A public key cryptosystem and a signature scheme based on
discrete logarithms
,in
AdvancesinCryptology
, CRYPTO '84, Springer-
Verlag, Berlin, LNCS
196
(1985), 10-18. (
Cited on page 187.
)
[76] J.H. Ellis,
The possibility of secure non-secret digital encryption
, GCHQ-
CESG publication, January (1970). (
Cited on page 103.
)
[77] J.H. Ellis,
The history of non-secret encryption
, GCHQ-CESG publication
(1987). (
Cited on page 103.
)
[78] Sir A.J. Evans,
ThePalaceofMinos: AComparativeAccountofthe
Successive Stages of the Early Cretan Civilization as Illustrated
by the Discoveries at Knossos
, Macmillan, London, (1921-1935), (4
volumes plus index, bound into 7 topics). (
Cited on page 31.
)
[79] U. Feige, A. Fiat, and A. Shamir,
Zero-knowledge proofs of identity
, Pro-
ceedings nineteenth Annu. ACM Symp. Theor. Comput. (1987), 210-217.
(
Cited on page 202.
)
[80] U. Feige, A. Fiat, and A. Shamir,
Zero-knowledge proofs of identity
,J.
Cryptol.
1
(1988), 77-94. (
Cited on page 202.
)
[81] H. Feistel,
Cryptography and computer privacy
, Sci. Am., May (1973).
(
Cited on page 142.
)
[82] N. Ferguson,
Michael: An improved MIC for 802.11 WEP
, IEEE doc 02-
020r0, January 17 (2002) (see:
http://grouper.ieee.org/groups/802/11/
).
(
Cited on page 349.
)
[83] N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner, and
D. Whiting,
Improved cryptanalysis of Rijndael
,in
Fast software encryp-
tion
, Seventh International Workshop, FSE 2000,
1978
of LNCS, Springer-
Verlag, Berlin (2000), 213-230. (
Cited on page 150.
)
[84] N. Ferguson, R. Schroeppel, and D. Whiting,
A simple algebraic represen-
tation of Rijndael
,in
Selected Areas in Cryptography
, S. Vaudenay
and A.M. Youssef, ed., SAC, 2001,
2259
of LNCS, Springer-Verlag, Berlin
(2001), 103-111. (
Cited on page 150.
)
[85] N. Ferguson and B. Schneier,
Practical Cryptography
, Wiley, Indi-
anapolis, IN (2003). (
Cited on pages 142, 151, 349.
)
[86] R.P. Feynman,
SurelyYou'reJokingMr.Feynman
, W.W. Norton and
Co., New York (1985). (
Cited on page 366.
)
[87] A. Fiat and A. Shamir,
How to prove yourself: Practical solution to identi-
fication and signature problems
,in
Advances in Cryptology
, CRYPTO
'86, Springer-Verlag, Berlin, LNCS
263
(1987), 186-194. (
Cited on page
202.
)
Search WWH ::
Custom Search