Cryptography Reference
In-Depth Information
[132] L. Keliher, H. Meijer, and S. Tavares, Improving the upper bound on the
maximum average linear probability for Rijndael ,in Selected Areas in
Cryptography , S. Vaudenay and A.M. Youssef, ed., SAC, 2001, LNCS
2259 , Springer-Verlag, Berlin (2001), 112-128. ( Cited on page 150. )
[133] J.O. Kephart, G.B. Sorkin, M. Swimmer, and S.R. White, Blueprint for
a computer immune system , Proceedings of the 1997 International Virus
Bulletin Conference, San Francisco, October (1997). ( Cited on page 404. )
[134] B.W. Kernighan and R. Pike, The UNIX Programming Environ-
ment , Prentice Hall, Computer Books, Upper Saddle River, NJ (1984).
( Cited on page 390. )
[135] B.W. Kernighan and D. Ritchie, C Programming Language , Prentice
Hall PTR, Upper Saddle River, NJ, Second Edition (1988). ( Cited on pages
390,391. )
[136] J. Kilian and P. Rogaway, How to protect DES against exhaustive key
search , in Advances in Cryptology - Crypto '96, Springer-Verlag, Berlin
(1996), 252-267. ( Cited on page 132. )
[137] G. Kipper, Investigator's Guide to Steganography , Auerbach Pub.,
Boca Raton, FL (2004). ( Cited on pages 192, 374. )
[138] D.E. Knuth, The Art of Computer Programming , Volume 2 ,
Seminumerical Algorithms , Third Edition, Addison-Wesley, Reading
MA and Paris (1998). ( Cited on page 83. )
[139] P. Kocher, Timing attacks on implementations of Di ; e-Hellman, RSA,
DSS, and other systems ,in Advances in Cryptology , CRYPTO '96,
Springer-Verlag, Berlin, LNCS 1109 (1996), 104-113. ( Cited on page 176. )
[140] H. Kragh, Quantum Generations , Princeton University Press, NJ
(1999). ( Cited on page 366. )
[141] E. Kranakis, Primality and Cryptography , Wiley, New York (1986).
( Cited on page 212. )
[142] H. Krawczyk, The order of encryption and authentication for protecting
communications ( or: How secure is SSL? ), in Advances in Cryptology
— CRYPTO 2001, Springer-Verlag, Berlin, LNCS 2139 (2001), 310-331.
( Cited on pages 225, 267, 339. )
[143] J. Leech, Some sphere packings in higher space , Canad. J. Math. 16
(1964), 657-682. ( Cited on page 457. )
[144] R.S. Lehman, Factoring large integers , Math. Comp. 28 (1974), 637-646.
( Cited on page 510. )
[145] D.H. Lehmer and R.E. Powers, On factoring large numbers , Bull. Amer.
Math. Soc. 37 (1931), 770-736. ( Cited on page 511. )
Search WWH ::




Custom Search