Cryptography Reference
In-Depth Information
[118] R.W. Hamming, Coding and Information Theory , Prentice-Hall, En-
glewood Cliffs, NJ (1980). ( Cited on page 442. )
[119] M. Handley, C. Kreibich, and V. Paxson, Network intrusion detection:
Evasion, tra ; c normalization, and end-to-end semantics , Proceedings of
the USENIX Security Symposium (2001), 115-131. ( Cited on page 395. )
[120] J. Hastad, Solving simultaneous modular equations of low degree , Siam J.
Comput. 17 (1988), 336-341. ( Cited on page 178. )
[121] S. Hawking, ABrief History of Time , Bantam, New York (1988).
( Cited on page 159. )
[122] H.M. Heys, A tutorial on linear and differential cryptanalysis , Technical
Report CORR 2001-17, Department of Combinatorics and Optimization,
University of Waterloo, Waterloo, Canada (2001). ( Cited on page 132. )
[123] L. S. Hill, Cryptography in an algebraic alphabet , Amer. Math. Monthly,
36 , 306-312 (1929). ( Cited on page 87. )
[124] A. Hocquenghem, Codes correcteurs d'erreurs , Chiffres 2 (1959), 147-156.
( Cited on page 461. )
[125] R.J. Hughes, G.G. Luther, G.L. Morgan, C.G. Peterson, and C. Sim-
mons, Quantum cryptography over underground optical fibers , in Advances
in Cryptology — Crypto '96, LNCS 1109 , Springer-Verlag, Berlin (1996),
329-342. ( Cited on page 370. )
[126] ISO/IEC 9594-8, Information technology — Open Systems Interconnec-
tion — The Directory: Authentication framework , International Organiza-
tion for Standardization, Geneva, Switzerland (1995). ( Cited on page 268. )
[127] ITU-T Recommendation X.500, The directory — Overview of concepts
and models , ITU, Geneva, Switzerland (1997). ( Cited on page 240. )
[128] ITU-T Recommendation X.509, Information technology — Open systems
interconnection — The directory: Authentication framework (June 1997).
( Cited on page 238. )
[129] D.P. Jablon, Strong password-only authenticated key exchange , Computer
Communications Review, ACM SIGCOMM 26 (1996), 5-26. ( Cited on page
199. )
[130] R.R. Juenman, Analysis of certain aspects of output feedback mode in
Advances in Cryptology — Crypto '82, Plenum Press (1996), 99-128. ( Cited
on page 136. )
[131] D. Kahn, The Codebreakers , Macmillan, New York (1967). ( Cited on
pages 4, 79. )
Search WWH ::




Custom Search