Cryptography Reference
In-Depth Information
[196] L. C. Washington. Elliptic Curves: Theory and Cryptography , 2nd Edition. CRC
Press, 2008.
[197] P. Wayner. Disappearing Cryptography: Information Hiding: Steganography and
Watermarking . 3rd Edition. Morgan Kaufmann, 2008.
[198] D. Welsh. Codes and Crypography . Clarendon Press, 1988.
[199] M. J. Wiener. Efficient DES key search. Technical report, School of Computer
Science, Carleton University, 1994.
[200] Wikipedia. Digital
signatures and law. http://en.wikipedia.org/wiki/Digital_
signatures_and_law.
[201] Wikipedia. One-time password. http://en.wikipedia.org/wiki/One-time_password.
[202] Wikipedia.
Padding
(cryptography).
http://en.wikipedia.org/wiki/Padding_
(cryptography).
[203] Wikipedia. RC4. http://en.wikipedia.org/wiki/RC4.
[204] Wikipedia. Web of trust. http://en.wikipedia.org/wiki/Web_of_trust.
[205] J. Yan, A. Blackwell, R. Anderson, and A. Grant. Password memorability and
security: Empirical results. IEEE Security and Privacy , September/October:25-31,
2004.
[206] A. L. Young and M. Yung. Malicious Cryptography: Exposing Cryptovirology . Wiley,
2004.
[207] E. Zabala. Rijndael inspector. http://www.formaestudio.com/rijndaelinspector/.
[208] W. Zeng, H. Yu, and C.-Y. Lin (Eds.). Multimedia Security Technologies for Digital
Rights Management . Academic Press, 2006.
Search WWH ::




Custom Search