Cryptography Reference
In-Depth Information
[249] C.E. Shannon, A mathematical theory of communication , Bell Systems
Technical Journal 27 (1948), 379-423, 623-656. ( Cited on pages 425-427,
429, 437. )
[250] C.E. Shannon, Communication theory of secrecy systems , Bell Systems
Technical Journal 28 (1949), 656-715. ( Cited on pages 128, 129. )
[251] J.F. Shoch and J.A. Hupp, The 'worm' programs: Early experience with
a distributed computation , Commun. ACM 25 (1982), 172-180. ( Cited on
page 408. )
[252] P. Shor, Algorithms for quantum computation: discrete logarithms and
factoring , Proceedings 35-th IEEE Annual Symposium on Foundations of
Computer Science (1994), 124-134. ( Cited on page 371. )
[253] G.J. Simmons, Message authentication without secrecy: A secure com-
munications problem uniquely solvable by asymmetric techniques , in IEEE
Electronics and Aerospace Systems Convention, EASCON '79Record, Ar-
lington, VA (1979), 661-662. ( Cited on pages 372, 373. )
[254] G.J. Simmons, Message authentication without secrecy ,in Secure Com-
munications and Asymmetric Cryptosystems , G.J. Simmons, ed.,
AAAS Selected Symposia Series 69 , Westview Press, Boulder, Colorado
(1982), 105-139. ( Cited on pages 372, 374. )
[255] G.J. Simmons, Verification of treaty compliance-revisited , in Proceedings
of the 1983 IEEE Symposium on Security and Privacy, IEEE Computer
Society Press, Oakland, CA (1983), 25-27. ( Cited on page 372. )
[256] G.J. Simmons, The prisoner's problem and the subliminal channel ,in Ad-
vances in Cryptology , CRYPTO '83, Plenum Press, New York (1984),
51-67. ( Cited on page 374. )
[257] G.J. Simmons, The subliminal channels in the U.S. digital signature al-
gorithm ( DSA ), in Proceedings of the Third Symposium on: State and
Progress of Research in Cryptography, Rome, Italy (1993), 35-54. ( Cited
on page 374. )
[258] G.J. Simmons, An introduction to the mathematics of trust in security
protocols , in Proceedings: Computer Security Foundations Workshop VI,
IEEE Computer Society Press, Franconia, NH (1993), 121-127. ( Cited on
page 374. )
[259] G.J. Simmons, Cryptanalysis and protocol failures , Commun. ACM 37
(1994), 56-65. ( Cited on page 374. )
[260] G.J. Simmons, Subliminal communication is easy using the DSA ,in
Advances in Cryptology , EUROCRYPT '93, Springer-Verlag, Berlin,
LNCS 765 (1994), 218-232. ( Cited on page 374. )
Search WWH ::




Custom Search