Cryptography Reference
In-Depth Information
[132] L. Keliher, H. Meijer, and S. Tavares,
Improving the upper bound on the
maximum average linear probability for Rijndael
,in
Selected Areas in
Cryptography
, S. Vaudenay and A.M. Youssef, ed., SAC, 2001, LNCS
2259
, Springer-Verlag, Berlin (2001), 112-128. (
Cited on page 150.
)
[133] J.O. Kephart, G.B. Sorkin, M. Swimmer, and S.R. White,
Blueprint for
a computer immune system
, Proceedings of the 1997 International Virus
Bulletin Conference, San Francisco, October (1997). (
Cited on page 404.
)
[134] B.W. Kernighan and R. Pike,
The UNIX Programming Environ-
ment
, Prentice Hall, Computer Books, Upper Saddle River, NJ (1984).
(
Cited on page 390.
)
[135] B.W. Kernighan and D. Ritchie,
C Programming Language
, Prentice
Hall PTR, Upper Saddle River, NJ, Second Edition (1988). (
Cited on pages
390,391.
)
[136] J. Kilian and P. Rogaway,
How to protect DES against exhaustive key
search
, in Advances in Cryptology - Crypto '96, Springer-Verlag, Berlin
(1996), 252-267. (
Cited on page 132.
)
[137] G. Kipper,
Investigator's Guide to Steganography
, Auerbach Pub.,
Boca Raton, FL (2004). (
Cited on pages 192, 374.
)
[138] D.E. Knuth,
The Art of Computer Programming
, Volume
2
,
Seminumerical Algorithms
, Third Edition, Addison-Wesley, Reading
MA and Paris (1998). (
Cited on page 83.
)
[139] P. Kocher,
Timing attacks on implementations of Di
;
e-Hellman, RSA,
DSS, and other systems
,in
Advances in Cryptology
, CRYPTO '96,
Springer-Verlag, Berlin, LNCS
1109
(1996), 104-113. (
Cited on page 176.
)
[140] H. Kragh,
Quantum Generations
, Princeton University Press, NJ
(1999). (
Cited on page 366.
)
[141] E. Kranakis,
Primality and Cryptography
, Wiley, New York (1986).
(
Cited on page 212.
)
[142] H. Krawczyk,
The order of encryption and authentication for protecting
communications
(
or: How secure is SSL?
), in
Advances in Cryptology
— CRYPTO 2001, Springer-Verlag, Berlin, LNCS
2139
(2001), 310-331.
(
Cited on pages 225, 267, 339.
)
[143] J. Leech,
Some sphere packings in higher space
, Canad. J. Math.
16
(1964), 657-682. (
Cited on page 457.
)
[144] R.S. Lehman,
Factoring large integers
, Math. Comp.
28
(1974), 637-646.
(
Cited on page 510.
)
[145] D.H. Lehmer and R.E. Powers,
On factoring large numbers
, Bull. Amer.
Math. Soc.
37
(1931), 770-736. (
Cited on page 511.
)
Search WWH ::
Custom Search