Cryptography Reference
In-Depth Information
[196] L. C. Washington.
Elliptic Curves: Theory and Cryptography
, 2nd Edition. CRC
Press, 2008.
[197] P. Wayner.
Disappearing Cryptography: Information Hiding: Steganography and
Watermarking
. 3rd Edition. Morgan Kaufmann, 2008.
[198] D. Welsh.
Codes and Crypography
. Clarendon Press, 1988.
[199] M. J. Wiener. Efficient DES key search. Technical report, School of Computer
Science, Carleton University, 1994.
[200] Wikipedia. Digital
signatures and law.
http://en.wikipedia.org/wiki/Digital_
[201] Wikipedia. One-time password.
http://en.wikipedia.org/wiki/One-time_password.
[202] Wikipedia.
Padding
(cryptography).
[203] Wikipedia. RC4.
http://en.wikipedia.org/wiki/RC4.
[204] Wikipedia. Web of trust.
http://en.wikipedia.org/wiki/Web_of_trust.
[205] J. Yan, A. Blackwell, R. Anderson, and A. Grant. Password memorability and
security: Empirical results.
IEEE Security and Privacy
, September/October:25-31,
2004.
[206] A. L. Young and M. Yung.
Malicious Cryptography: Exposing Cryptovirology
. Wiley,
2004.
[207] E. Zabala. Rijndael inspector.
http://www.formaestudio.com/rijndaelinspector/.
[208] W. Zeng, H. Yu, and C.-Y. Lin (Eds.).
Multimedia Security Technologies for Digital
Rights Management
. Academic Press, 2006.