Cryptography Reference
In-Depth Information
[Skipana]
Biham, E., Biruykov, A., Shamir, A.,
Cryptanalysis of
Skipjack Reduced to 31 Rounds Using Impossible Differentials
,
Proceedings EUROCRYPT '99, Springer, LNCS 1592,
pp. 12 - 23.
[SomSham]
Someren, N. V., Shamir, A.,
Playing 'Hide and Seek' with
Stored Keys
, Proceedings of 3rd International Conference on
Financial Cryptography '99, Springer, LNCS 1648.
[SpiegClon]
Aussichten eines Klons
(The Prospects of a Clone), Der
Spiegel, 18/98, pp. 98 - 99.
[SpiegDat]
Lauscher im Datenreich
(Eavesdroppers in the Data Realm),
Der Spiegel, 36/96, pp. 198 - 211.
[Stins]
Stinson, D.,
Cryptography: Theory and Practice
, CRC Press,
1995, ISBN 0-8493-8521-0. An important and modern work
on cryptography; very mathematical and yet easy to read.
[Twinkle]
Lenstra, A. K., Shamir, A.,
Analysis and Optimization of the
TWINKLE Factoring Device
, Proceedings EUROCRYPT
2000, Springer, LNCS 1807, pp. 35 ff.
[ViegaMess]
Viega, J., Messier, M.,
Secure Programming Cookbook for C
and C++
, O'Reilly, 2003, ISBN 0-596-00394-3.
[Wcf]
Anderson, R.,
ATM Security—Why Cryptosystems Fail
,
Proceedings of the First ACM Conference on Computer and
Communications Security (11/93), pp. 215 - 227.
[Welch]
Welch, A. T.,
A Technique for High-Performance Data
Compression
, IEEE Computer, 17(6) (1984), pp. 8 - 14.
[Westf]
Westfeld, A.,
Steganografie am Beispiel einer Videokonferenz
(Steganography by the Example of a Video Conference), in:
[Mupf], pp. 507 - 525.
[WillClear10]
Williams, C. P., Clearwater, S. H.,
Ultimate Zero and One
,
Copernicus/Springer, New York, 2000, ISBN 0-387-94769-8.
[WinkSpy]
Winkler, I.,
Spies Among Us
, Wiley, 2005, ISBN
0-7645-8468-5.
[Wobfcrypt]
Wobst, R.,
Schnell & geheimnisvoll, Ein neues
Verschl usselungsverfahren
(Fast & Mysterious, A New
Encryption Method), UNIX-Magazin, 7/92, pp. 86 - 95. This is
the
fcrypt
method discussed in Section 3.7.