Cryptography Reference
In-Depth Information
[103] W. Gibson,
Neuromancer
, Ace Books (Reissue Edition) (2003). (
Cited on
page 377.
)
[104] E.N. Gilbert,
A comparison of signalling alphabets
, Bell Systems Technical
Journal
31
(1952), 504-522. (
Cited on page 446.
)
[105] M.J.E. Golay,
Notes on digital coding
, Proc. IEEE
37
(1949), 657. (
Cited
on page 455.
)
[106] M.J.E. Golay,
Binary coding
, Trans. IRE PGIT
4
(1954), 23-28. (
Cited
on page 455.
)
[107] M.J.E. Golay,
Notes on the penny-weighing problem, lossless symbol coding
with nonprimes, etc.
, IEEE Transactions on Information Theory
4
(1958),
103-109. (
Cited on page 455.
)
[108] S. Goldwasser and J. Kilian,
Almost all primes can be quickly certified
,
Proceedings Eighteenth Annu. ACM Symp. Theor. Comput. (1986), 316-
329. (
Cited on page 554.
)
[109] S. Goldwasser and S. Micali,
Probabilistic encryption
, Journal of Com-
puter and System Sciences (1984), 270-299. (
Cited on page 508.
)
[110] S. Goldwasser, S. Micali, and P. Tong,
Why and how to establish a pri-
vate code on a public network
, in Proceedings of the Twenty-third IEEE
Symposium on Foundations of Computer Science (1982), 134-144. (
Cited
on page 508.
)
[111] S. Golomb,
Shift Register Sequences
, Revised edition, Aegean Park
Press (1982). (
Cited on pages 158 and 571.
)
[112] V.D. Goppa,
A new class of linear error-correcting codes
, Problems of
Information Transmission
6
(1970), 207-212. (
Cited on page 465.
)
[113] J. Gordon,
Strong primes are easy to find
,in
Advances in Cryptology
,
EUROCRYPT '84, Springer-Verlag, Berlin, LNCS
209
(1985), 216-223.
(
Cited on page 558.
)
[114] G. Gratzer,
Lattice Theory: First Concepts and Distributive Lat-
tices
, W.H. Freeman, San Francisco (1971). (
Cited on page 457.
)
[115] R. Graves,
The White Goddess — AHistorical Grammar of Po-
etic Myth
, Carcanet Press Ltd. (1999). (
Cited on page 15.
)
[116] K. Hafner,
Cyberpunks: Outlaws and Hackers on the Cyber Fron-
tier — revised
, Simon and Schuster (1995). (
Cited on pages 315, 384.
)
[117] R.W. Hamming,
Error detecting and error correcting codes
, Bell Systems
Technical Journal
29
(1950), 147-160. (
Cited on pages 442 and 455.
)
Search WWH ::
Custom Search