Cryptography Reference
In-Depth Information
[GardRSA]
Gardner, M., A New Kind of Cipher That Would Take Millions
of Years to Break , Scientific American, Vol. 237 (1977), No. 8,
pp. 120 - 124.
[GarPGP]
Garfinkel, S. PGP: Pretty Good Privacy , O'Reilly & Assoc.,
1995, ISBN 1-56592-098-8. This topic has become known as
the 'PGP bible'; written in an entertaining style, it includes a
large amount of interesting information about the author and
the PGP landscape. However, it does not always go into the
cryptologic details.
[Gemmel]
Gemmel, P. S., An Introduction to Threshold Cryptography ,
CryptoBytes, No. 3, Vol. 2 (1997), pp. 7 - 12; also available at
www.rsa.com/rsalabs/pubs/cryptobytes.html .
[GolicA5]
Golic, J. D., Cryptanalysis of Alleged A5 Stream Cipher ,
Advances in Cryptology — EUROCRYPT '97, pp. 239 - 255,
Springer, 1997, LNCS 1233.
[Hager]
Hager, N., Secret Power , Craig Potton Publishing, Nelson,
New Zealand, 1996, ISBN 0-908802-35-8. This is the first and
probably the only topic that describes the Echelon system of
the NSA in detail (see Section 8.2.1). There is presumably no
other work as comprehensive and current as this on
communications intelligence. Despite some dry passages, the
contents read like a thriller. Unfortunately, the topic is hard to
get (the first edition had to be reprinted in the year of
publication).
[Harris]
Harris, R., Enigma , Heyne-Verlag, Munich, 7th edn, 1995,
ISBN 3-453-09077-2 (English original: Random House,
London/New York). A well-written and thrilling topic about
the atmosphere at Bletchley Park (where the Enigma was
decrypted during World War II). The story is closer to reality
than you'd believe.
[Hastad]
Hastad, J., On Using RSA with Low Exponent in a Public Key
Network , in: Advances in Cryptology — CRYPTO '85
Proceedings, Springer, 1986, pp. 403 - 408.
[HawIDEA]
Hawkes, P., Differential-Linear Weak Key Classes of IDEA ,
Advances in Cryptology — EUROCRYPT '98, Springer, 1998,
pp. 112 - 126.
[Hell.troff]
Hellman, M. E., A Cryptanalytic Time-Memory Trade Off ,
IEEE Transactions on Information Theory, Vol. 26, No. 4
(1980), pp. 401 - 406.
Search WWH ::




Custom Search