Cryptography Reference
In-Depth Information
interrelations, and classic ciphering methods. The coverage of
the period from 1945 to the present is a bit short in the second
edition, but the respective chapter is still interesting and
informative.
[KahnEnig]
Kahn, D., Seizing the Enigma , Houghton Mifflin, Boston,
1991. This topic can perhaps be seen as an intensification of
[KahnCode]. You will learn interesting details about the
history of the Enigma, and the way it was handled in the
Wehrmacht, and all the dramatic circumstances under which
secret material was yielded from German submarines, and
much more. There is only one downside to this topic: it is
currently unavailable.
[KalisRC5]
Kaliski, B. S., Yin, Y. L., On Differential and Linear
Cryptanalysis of the RC5 Encryption Algorithm , in Advances
in Cryptology — CRYPTO '95, Springer, 1995, pp. 171 - 184.
[KirPGP]
Kirsch, C., S/MIME versus OpenPGP: Eine Entscheidungshilfe
(A Comparison of the two Products), KES, 1/2001, pp. 60 - 65.
[Klima]
Klima, V., Finding MD5 Collisions—a Toy for a Notebook,
cryptography.hyperlink.cz/md5/MD5 collisions.pdf .
Description of how to compute MD5 collisions on a notebook
(included on the Web site to this topic).
[KnudRC5]
Knudsen, L. R., Meier, W., Improved Differential Attacks of
RC5 , in Advances in Cryptology — CRYPTO '96, Springer,
1996.
[Knuth2]
Knuth, D., The Art of Computer Programming , Vol. 2,
Seminumerical Algorithms, 2nd edn, Addison-Wesley, 1981.
[Koch.DFA]
Kocher, P., Fault-induced Crypto Attacks and the Risks of
Press Releases , News article; included on our Web site.
[Koch.Tim]
Kocher, P. C., Cryptanalysis of Diffie-Hellman, RSA, DSS, and
Other Systems Using Timing Attacks , preliminary manuscript;
the final version appeared with the title 'Timing Attacks on
Implementations of Diffie-Hellman, RSA, DSS, and Other
Systems', in Proceedings of CRYPTO '96, Springer, 1996, pp.
104 - 113.
[Kunz.ct]
Kunze, M., Netz-Razzia (Network Raid), c't, 7/95, p. 22.
[LMM.IDEA]
Lai, X., Massey, J. L., Murphy, S., Markov Ciphers and
Differential Cryptanalysis , in Advances in
Cryptology — EUROCRYPT '91, Springer, 1991, pp. 17 - 38.
Search WWH ::




Custom Search