Cryptography Reference
In-Depth Information
[75] T. ElGamal, A public key cryptosystem and a signature scheme based on
discrete logarithms ,in AdvancesinCryptology , CRYPTO '84, Springer-
Verlag, Berlin, LNCS 196 (1985), 10-18. ( Cited on page 187. )
[76] J.H. Ellis, The possibility of secure non-secret digital encryption , GCHQ-
CESG publication, January (1970). ( Cited on page 103. )
[77] J.H. Ellis, The history of non-secret encryption , GCHQ-CESG publication
(1987). ( Cited on page 103. )
[78] Sir A.J. Evans, ThePalaceofMinos: AComparativeAccountofthe
Successive Stages of the Early Cretan Civilization as Illustrated
by the Discoveries at Knossos , Macmillan, London, (1921-1935), (4
volumes plus index, bound into 7 topics). ( Cited on page 31. )
[79] U. Feige, A. Fiat, and A. Shamir, Zero-knowledge proofs of identity , Pro-
ceedings nineteenth Annu. ACM Symp. Theor. Comput. (1987), 210-217.
( Cited on page 202. )
[80] U. Feige, A. Fiat, and A. Shamir, Zero-knowledge proofs of identity ,J.
Cryptol. 1 (1988), 77-94. ( Cited on page 202. )
[81] H. Feistel, Cryptography and computer privacy , Sci. Am., May (1973).
( Cited on page 142. )
[82] N. Ferguson, Michael: An improved MIC for 802.11 WEP , IEEE doc 02-
020r0, January 17 (2002) (see: http://grouper.ieee.org/groups/802/11/ ).
( Cited on page 349. )
[83] N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner, and
D. Whiting, Improved cryptanalysis of Rijndael ,in Fast software encryp-
tion , Seventh International Workshop, FSE 2000, 1978 of LNCS, Springer-
Verlag, Berlin (2000), 213-230. ( Cited on page 150. )
[84] N. Ferguson, R. Schroeppel, and D. Whiting, A simple algebraic represen-
tation of Rijndael ,in Selected Areas in Cryptography , S. Vaudenay
and A.M. Youssef, ed., SAC, 2001, 2259 of LNCS, Springer-Verlag, Berlin
(2001), 103-111. ( Cited on page 150. )
[85] N. Ferguson and B. Schneier, Practical Cryptography , Wiley, Indi-
anapolis, IN (2003). ( Cited on pages 142, 151, 349. )
[86] R.P. Feynman, SurelyYou'reJokingMr.Feynman , W.W. Norton and
Co., New York (1985). ( Cited on page 366. )
[87] A. Fiat and A. Shamir, How to prove yourself: Practical solution to identi-
fication and signature problems ,in Advances in Cryptology , CRYPTO
'86, Springer-Verlag, Berlin, LNCS 263 (1987), 186-194. ( Cited on page
202. )
Search WWH ::




Custom Search