Cryptography Reference
In-Depth Information
[103] W. Gibson, Neuromancer , Ace Books (Reissue Edition) (2003). ( Cited on
page 377. )
[104] E.N. Gilbert, A comparison of signalling alphabets , Bell Systems Technical
Journal 31 (1952), 504-522. ( Cited on page 446. )
[105] M.J.E. Golay, Notes on digital coding , Proc. IEEE 37 (1949), 657. ( Cited
on page 455. )
[106] M.J.E. Golay, Binary coding , Trans. IRE PGIT 4 (1954), 23-28. ( Cited
on page 455. )
[107] M.J.E. Golay, Notes on the penny-weighing problem, lossless symbol coding
with nonprimes, etc. , IEEE Transactions on Information Theory 4 (1958),
103-109. ( Cited on page 455. )
[108] S. Goldwasser and J. Kilian, Almost all primes can be quickly certified ,
Proceedings Eighteenth Annu. ACM Symp. Theor. Comput. (1986), 316-
329. ( Cited on page 554. )
[109] S. Goldwasser and S. Micali, Probabilistic encryption , Journal of Com-
puter and System Sciences (1984), 270-299. ( Cited on page 508. )
[110] S. Goldwasser, S. Micali, and P. Tong, Why and how to establish a pri-
vate code on a public network , in Proceedings of the Twenty-third IEEE
Symposium on Foundations of Computer Science (1982), 134-144. ( Cited
on page 508. )
[111] S. Golomb, Shift Register Sequences , Revised edition, Aegean Park
Press (1982). ( Cited on pages 158 and 571. )
[112] V.D. Goppa, A new class of linear error-correcting codes , Problems of
Information Transmission 6 (1970), 207-212. ( Cited on page 465. )
[113] J. Gordon, Strong primes are easy to find ,in Advances in Cryptology ,
EUROCRYPT '84, Springer-Verlag, Berlin, LNCS 209 (1985), 216-223.
( Cited on page 558. )
[114] G. Gratzer, Lattice Theory: First Concepts and Distributive Lat-
tices , W.H. Freeman, San Francisco (1971). ( Cited on page 457. )
[115] R. Graves, The White Goddess — AHistorical Grammar of Po-
etic Myth , Carcanet Press Ltd. (1999). ( Cited on page 15. )
[116] K. Hafner, Cyberpunks: Outlaws and Hackers on the Cyber Fron-
tier — revised , Simon and Schuster (1995). ( Cited on pages 315, 384. )
[117] R.W. Hamming, Error detecting and error correcting codes , Bell Systems
Technical Journal 29 (1950), 147-160. ( Cited on pages 442 and 455. )
Search WWH ::




Custom Search