Cryptography Reference
In-Depth Information
[249] C.E. Shannon,
A mathematical theory of communication
, Bell Systems
Technical Journal
27
(1948), 379-423, 623-656. (
Cited on pages 425-427,
429, 437.
)
[250] C.E. Shannon,
Communication theory of secrecy systems
, Bell Systems
Technical Journal
28
(1949), 656-715. (
Cited on pages 128, 129.
)
[251] J.F. Shoch and J.A. Hupp,
The 'worm' programs: Early experience with
a distributed computation
, Commun. ACM
25
(1982), 172-180. (
Cited on
page 408.
)
[252] P. Shor,
Algorithms for quantum computation: discrete logarithms and
factoring
, Proceedings 35-th IEEE Annual Symposium on Foundations of
Computer Science (1994), 124-134. (
Cited on page 371.
)
[253] G.J. Simmons,
Message authentication without secrecy: A secure com-
munications problem uniquely solvable by asymmetric techniques
, in IEEE
Electronics and Aerospace Systems Convention, EASCON '79Record, Ar-
lington, VA (1979), 661-662. (
Cited on pages 372, 373.
)
[254] G.J. Simmons,
Message authentication without secrecy
,in
Secure Com-
munications and Asymmetric Cryptosystems
, G.J. Simmons, ed.,
AAAS Selected Symposia Series
69
, Westview Press, Boulder, Colorado
(1982), 105-139. (
Cited on pages 372, 374.
)
[255] G.J. Simmons,
Verification of treaty compliance-revisited
, in Proceedings
of the 1983 IEEE Symposium on Security and Privacy, IEEE Computer
Society Press, Oakland, CA (1983), 25-27. (
Cited on page 372.
)
[256] G.J. Simmons,
The prisoner's problem and the subliminal channel
,in
Ad-
vances in Cryptology
, CRYPTO '83, Plenum Press, New York (1984),
51-67. (
Cited on page 374.
)
[257] G.J. Simmons,
The subliminal channels in the U.S. digital signature al-
gorithm
(
DSA
), in Proceedings of the Third Symposium on: State and
Progress of Research in Cryptography, Rome, Italy (1993), 35-54. (
Cited
on page 374.
)
[258] G.J. Simmons,
An introduction to the mathematics of trust in security
protocols
, in Proceedings: Computer Security Foundations Workshop VI,
IEEE Computer Society Press, Franconia, NH (1993), 121-127. (
Cited on
page 374.
)
[259] G.J. Simmons,
Cryptanalysis and protocol failures
, Commun. ACM
37
(1994), 56-65. (
Cited on page 374.
)
[260] G.J. Simmons,
Subliminal communication is easy using the DSA
,in
Advances in Cryptology
, EUROCRYPT '93, Springer-Verlag, Berlin,
LNCS
765
(1994), 218-232. (
Cited on page 374.
)
Search WWH ::
Custom Search