Cryptography Reference
In-Depth Information
[292] M.J. Williamson,
Thoughts on cheaper non-secret encryption
, GCHQ-
CESG publication, August 10 (1976). (
Cited on pages 103, 104.
)
[293] T. Ylonen,
SSH protocol architecture
, INTERNET-DRAFT,
draft-ietf-
secsh-architecture-15.txt
, October (2003). (
Cited on pages 335, 337.
)
[294] T. Ylonen,
SSH transport layer protocol
, INTERNET-DRAFT,
draft-ietf-
secsh-transport-17.txt
, October (2003). (
Cited on pages 335, 337.
)
[295] T. Ylonen,
SSH connection protocol
, INTERNET-DRAFT,
draft-ietf-
secsh-connect-18.txt
, October (2003). (
Cited on pages 335, 339.
)
[296] T. Ylonen, T.J. Rinne, and S. Lehtinen,
Secure shell authentication
agent protocol
, INTERNET-DRAFT,
draft-ietf-secsh-agent-02.txt
, January
(2004). (
Cited on page 335.
)
[297] G. Yuval,
How to swindle Rabin
, Cryptologia
3
(1979), 187-190. (
Cited
on page 254.
)
[298] Y. Zamyatin,
The Dragon and Other Stories
, Penguin, London
(1975). (
Cited on page 428.
)
[299] J. Ziv and A. Lempel,
A universal algorithm for sequential data compres-
sion
, IEEE Transactions on Information Theory, May (1977). (
Cited on
page 277.
)