Cryptography Reference
In-Depth Information
[Skipana]
Biham, E., Biruykov, A., Shamir, A., Cryptanalysis of
Skipjack Reduced to 31 Rounds Using Impossible Differentials ,
Proceedings EUROCRYPT '99, Springer, LNCS 1592,
pp. 12 - 23.
[SomSham]
Someren, N. V., Shamir, A., Playing 'Hide and Seek' with
Stored Keys , Proceedings of 3rd International Conference on
Financial Cryptography '99, Springer, LNCS 1648.
[SpiegClon]
Aussichten eines Klons (The Prospects of a Clone), Der
Spiegel, 18/98, pp. 98 - 99.
[SpiegDat]
Lauscher im Datenreich (Eavesdroppers in the Data Realm),
Der Spiegel, 36/96, pp. 198 - 211.
[Stins]
Stinson, D., Cryptography: Theory and Practice , CRC Press,
1995, ISBN 0-8493-8521-0. An important and modern work
on cryptography; very mathematical and yet easy to read.
[Twinkle]
Lenstra, A. K., Shamir, A., Analysis and Optimization of the
TWINKLE Factoring Device , Proceedings EUROCRYPT
2000, Springer, LNCS 1807, pp. 35 ff.
[ViegaMess]
Viega, J., Messier, M., Secure Programming Cookbook for C
and C++ , O'Reilly, 2003, ISBN 0-596-00394-3.
[Wcf]
Anderson, R., ATM Security—Why Cryptosystems Fail ,
Proceedings of the First ACM Conference on Computer and
Communications Security (11/93), pp. 215 - 227.
[Welch]
Welch, A. T., A Technique for High-Performance Data
Compression , IEEE Computer, 17(6) (1984), pp. 8 - 14.
[Westf]
Westfeld, A., Steganografie am Beispiel einer Videokonferenz
(Steganography by the Example of a Video Conference), in:
[Mupf], pp. 507 - 525.
[WillClear10]
Williams, C. P., Clearwater, S. H., Ultimate Zero and One ,
Copernicus/Springer, New York, 2000, ISBN 0-387-94769-8.
[WinkSpy]
Winkler, I., Spies Among Us , Wiley, 2005, ISBN
0-7645-8468-5.
[Wobfcrypt]
Wobst, R., Schnell & geheimnisvoll, Ein neues
Verschl usselungsverfahren (Fast & Mysterious, A New
Encryption Method), UNIX-Magazin, 7/92, pp. 86 - 95. This is
the fcrypt method discussed in Section 3.7.
Search WWH ::




Custom Search