Cryptography Reference
In-Depth Information
[292] M.J. Williamson, Thoughts on cheaper non-secret encryption , GCHQ-
CESG publication, August 10 (1976). ( Cited on pages 103, 104. )
[293] T. Ylonen, SSH protocol architecture , INTERNET-DRAFT, draft-ietf-
secsh-architecture-15.txt , October (2003). ( Cited on pages 335, 337. )
[294] T. Ylonen, SSH transport layer protocol , INTERNET-DRAFT, draft-ietf-
secsh-transport-17.txt , October (2003). ( Cited on pages 335, 337. )
[295] T. Ylonen, SSH connection protocol , INTERNET-DRAFT, draft-ietf-
secsh-connect-18.txt , October (2003). ( Cited on pages 335, 339. )
[296] T. Ylonen, T.J. Rinne, and S. Lehtinen, Secure shell authentication
agent protocol , INTERNET-DRAFT, draft-ietf-secsh-agent-02.txt , January
(2004). ( Cited on page 335. )
[297] G. Yuval, How to swindle Rabin , Cryptologia 3 (1979), 187-190. ( Cited
on page 254. )
[298] Y. Zamyatin, The Dragon and Other Stories , Penguin, London
(1975). ( Cited on page 428. )
[299] J. Ziv and A. Lempel, A universal algorithm for sequential data compres-
sion , IEEE Transactions on Information Theory, May (1977). ( Cited on
page 277. )
Search WWH ::




Custom Search