Cryptography Reference
In-Depth Information
[118] R.W. Hamming,
Coding and Information Theory
, Prentice-Hall, En-
glewood Cliffs, NJ (1980). (
Cited on page 442.
)
[119] M. Handley, C. Kreibich, and V. Paxson,
Network intrusion detection:
Evasion, tra
;
c normalization, and end-to-end semantics
, Proceedings of
the USENIX Security Symposium (2001), 115-131. (
Cited on page 395.
)
[120] J. Hastad,
Solving simultaneous modular equations of low degree
, Siam J.
Comput.
17
(1988), 336-341. (
Cited on page 178.
)
[121] S. Hawking,
ABrief History of Time
, Bantam, New York (1988).
(
Cited on page 159.
)
[122] H.M. Heys,
A tutorial on linear and differential cryptanalysis
, Technical
Report CORR 2001-17, Department of Combinatorics and Optimization,
University of Waterloo, Waterloo, Canada (2001). (
Cited on page 132.
)
[123] L. S. Hill,
Cryptography in an algebraic alphabet
, Amer. Math. Monthly,
36
, 306-312 (1929). (
Cited on page 87.
)
[124] A. Hocquenghem,
Codes correcteurs d'erreurs
, Chiffres
2
(1959), 147-156.
(
Cited on page 461.
)
[125] R.J. Hughes, G.G. Luther, G.L. Morgan, C.G. Peterson, and C. Sim-
mons,
Quantum cryptography over underground optical fibers
, in Advances
in Cryptology — Crypto '96, LNCS
1109
, Springer-Verlag, Berlin (1996),
329-342. (
Cited on page 370.
)
[126] ISO/IEC 9594-8,
Information technology — Open Systems Interconnec-
tion — The Directory: Authentication framework
, International Organiza-
tion for Standardization, Geneva, Switzerland (1995). (
Cited on page 268.
)
[127] ITU-T Recommendation X.500,
The directory — Overview of concepts
and models
, ITU, Geneva, Switzerland (1997). (
Cited on page 240.
)
[128] ITU-T Recommendation X.509,
Information technology — Open systems
interconnection — The directory: Authentication framework
(June 1997).
(
Cited on page 238.
)
[129] D.P. Jablon,
Strong password-only authenticated key exchange
, Computer
Communications Review, ACM SIGCOMM
26
(1996), 5-26. (
Cited on page
199.
)
[130] R.R. Juenman,
Analysis of certain aspects of output feedback mode
in
Advances in Cryptology — Crypto '82, Plenum Press (1996), 99-128. (
Cited
on page 136.
)
[131] D. Kahn,
The Codebreakers
, Macmillan, New York (1967). (
Cited on
pages 4, 79.
)
Search WWH ::
Custom Search