An Experience Teaching a Graduate Course in Cryptography
暂无分享,去创建一个
[1] Neil Haller,et al. The S/KEY One-Time Password System , 1995, RFC.
[2] Xuejia Lai,et al. A Proposal for a New Block Encryption Standard , 1991, EUROCRYPT.
[3] Matt Blaze,et al. The Architecture and Implementation of Network Layer Security in UNIX , 1993, USENIX Security Symposium.
[4] Moti Yung,et al. The KryptoKnight family of light-weight protocols for authentication and key distribution , 1995, TNET.
[5] Matt Blaze,et al. A cryptographic file system for UNIX , 1993, CCS '93.
[6] John B. Lacy. CryptoLib: Cryptography in Software , 1993, USENIX Security Symposium.
[7] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[8] Dorothy E. Denning. The Clipper Encryption System , 1993 .
[9] Martin E. Hellman,et al. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[10] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[11] Aviel D. Rubin. Independent One-Time Passwords , 1996, Comput. Syst..
[12] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.
[13] Dan S. Wallach,et al. Security Flaws in the HotJava Web Browser , 1995 .
[14] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[15] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[16] John Linn,et al. Privacy enhancement for Internet electronic mail: Part III - algorithms, modes, and identifiers , 1989, RFC.
[17] Aviel D. Rubin. Trusted distribution of software over the Internet , 1995, Proceedings of the Symposium on Network and Distributed System Security.
[18] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[19] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[20] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[21] Paul C. Kocher. Cryptanalysis of Di e-Hellman, RSA, DSS, and Other Systems Using Timing Attacks , 1999 .
[22] B. Clifford Neuman,et al. Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.
[23] Peter Honeyman,et al. Long Running Jobs in an Authenticated Environment , 1993, USENIX Security Symposium.
[24] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[25] Len LaPadula,et al. Secure Computer Systems: A Mathematical Model , 1996 .
[26] Ronald L. Rivest,et al. The RC4 encryption algorithm , 1992 .
[27] David M. Balenson,et al. Commercial Key Escrow: Something for Everyone Now and for the Future , 1995 .
[28] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[29] Lester S. Hill. Cryptography in An Algebraic Alphabet , 1929 .
[30] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.