Cryptography Reference
In-Depth Information
[Wobghm]
Wobst, R., Begrenzte Allmacht (Omnipotence Limited), UNIX
open, 10/99, pp. 33 - 39. This article shows fascinating
technical possibilities of major intelligence agencies, mainly
based on a STOA report of the EU.
[Wobhash]
New Attacks on Hash Functions , International Security
Bulletin (ISB) 3 (10)/05, pp. 85 - 94.
[Woblock]
Wobst, R., Dringendes Bedurfnis (Urgent Need), UNIX open,
4/93, pp. 32 - 34.
[Wobmail]
Wobst, R., Hartmann, D., Kirsch, C., Seeger, J., Vorwiegend
sonnig (Mostly Sunny), using GnuPG for mail encryption, iX,
3/2004, pp. 126 - 131.
[Wobmail2]
Wobst, R., Der lange Weg zur sicheren E-Mail (The Long Way
to Secure E-Mail), Lanline Special, III/2002, pp. 45 - 49. Also
available at www.lanline.de > full text search.
[Wobpgp]
Wobst, R., Nicht abschrecken lassen (Don't Let Yourself Be
Put Off), an introduction to the use of PGP, UNIX open,
10/97, pp. 38 - 41.
[Wobrump]
Wobst, R., Plaintext Compression Helps the Cryptanalyst ,
contribution to the Rump Session at EUROCRYPT '97.
[Wobsymm]
Wobst, R., Wissen ist Macht (Knowledge is Power), Part I,
UNIX open, 4/96, pp. 94 - 100, Starke Abwehr (Strong
Defense), Part II, UNIX open, 5/95, pp. 118 - 124.
[Wobtroja]
Wobst, R., Trojanische Kryptografie (Trojan Cryptography),
UNIX open, 12/97, pp. 42 - 47.
[WoodBiom]
Woodward, J. D., Orlans, N. M., Higgins, P. T., Biometrics ,
McGraw-Hill/Osborne, 2003, ISBN 0-07-222-227-1.
[Young]
Young, A., Yung, M., Cleptography: Using Cryptography
Against Cryptography , Proceedings EUROCRYPT '97,
Springer, LNCS 1233, pp. 62 - 74.
[ZimmPGP]
Zimmermann, P., Pretty Good Privacy: Public Key Encryption
for the Masses , in: [Hoff], pp. 93 - 107 (1.9).
Search WWH ::




Custom Search