<<

A Bibliography of Publications on : 2000–2009

Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 05 February 2021 Version 3.332

Title word cross-reference [MFFT05]. 2m [KLY02, KKY02]. 3 [BP04, Ben00, ChLYL09, CT09, Lav09, OMT02, WH09, ZTP05]. $35.00 [Top02]. $49.99 [Gum04]. $5 [SCF01]. 5 [Pat04]. #1 [Man01, RSA02]. #10 [RSA00b]. #11 $51.48 [Pap05]. 512 [CDL+00]. 7 [RSA01, Clu03]. #13 [RSA03b]. #15 [Gri01, Pat03a]. (2,128) [WB02]. 0 [AIK04]. [RSA00d, RSA00c]. #9 [RSA00e]. ABC [PS04b]. d [BD00b]. E0 [FL01a]. f8 2 [KSHY01]. gx [Shp02]. g (x, 1) [SZP02]. (k, n) + 1 [LCZ05c]. (λ, ω)[vDKST06].(p ) e k GF (2) [CP03]. GF(2m) [OTIT01, RMPJ08]. [BINP03]. (t, n) [CHY05a, HL05c, Kog02, GF (pm)[BGK+03]. GF(pt)[PZ01].H A LZL+01, YCH04, CLT07]. (tn) 2 [CBB05]. k [BJLS02, CT08b, GPC08, [PW05, SC05a]. + [Abe01]. {0, 1} HKS00, QPV05, WL02]. l [QPV05]. M +1 [LBGZ01, LBGZ02]. 1 [Wu02]. $125 [AS01a]. F [CY02]. Z∗ [Gro05]. GF(2) [And04]. 128 [AIK+01, PCG01]. 13 n [GS03, KTT07]. GF(2m) [HSL+02]. $15.00 [Imr03]. 2 + [BBGM08, KTT07, KWP06, RMH03a, RS04]. [Bih00, BGN05, CY02, CKL 03, DNP07, n GF(2 ) [KKH03]. SL (F n ) [SGGB00]. µ Gau02, GHK+06, GIKR02, HKA+05, 2 2 [LN04]. n KLR09, SC02b, Ver02, Wen03]. 2000 [Eva09]. [CT08b, Gon06, HKS00, LKJL01, TM01]. 2000  10 [Mau01]. 228 [Bih02]. 2k

1 2

N 0.292 [BD00b]. NC0 [AIK06]. p [FL06]. Lee04b, MZ04, Sma05, dCdVSG05]. 11-15 prqs [LKYL00]. ps [CHH01]. Q [Yas08]. r [AUW01]. 11th [CCMR05, HYZ05b, HH04, [JY01]. w [DwWmW05, OT03b]. xv [Gon06]. HH05, RM04, Roy05, USE02b]. 12 [TPS01]. y [OS01]. Zn [LWL09]. 128 [JJ02, WFLY04]. 128-Bit [SM03b]. 12th [GH05, MS05b, PT06]. 13-15 -Adic [GHK+06]. -Bit [ACM05b]. 130 [LM08]. 14th [AIK+01, CDL+00, PCG01]. -Connected [AMW07, AAC+01, Bir07]. 150-Kilometer [BJLS02]. -Coordinate [OS01]. -coverings [Das08]. 155 [LMP+01]. 15th [MJ04, BC01]. [SC02b]. -decompositions [vDKST06]. 160 [KSF00]. 16th [BS03]. 17th [IEE05b]. -DNF [BGN05]. -Metric 186 [Nat00]. 186-2 [Nat00]. 18th [KM07]. [LBGZ01, LBGZ02]. -NNAF [DwWmW05]. 19005-1 [ISO05]. 192-bit [Luc00]. 1930s -out-of- [CT08b]. -Polynomials [Bur02]. 1945 [Bau08]. 1960s [Bur02]. 1962 [FL06, CHH01]. -Round [AJ08]. 1987 [Kha05]. 1993 [PPV96]. 1999 [BP04, Bih00, GIKR02, CKL+03]. -Source [Lee03b, Uni00a, Uni00b, Uni00f, Uni00c, [KLR09]. -st [AS01a]. -Steiner [WL02]. Uni00e, Uni00d, Uni00g, Uni00h, Uni01]. -Threshold [CLT07, Kog02]. -way 19th [BCDH09]. 1V [CGBS01]. [LKJL01]. -Year-Old [Eva09]. 2 [Nat00, SK05a]. 2.0 [Cor00a]. 2000 .NET [For04, TG04]. [CGH+00b, Eke02, Irw03, KH08, KI01a, Sch00b, Wit01, YG01c]. 2001 /dev/random [BH05]. /evolution [ACM01a, BC01, GJSS01, Lee03a, Pem01b]. [Pat02a]. /MOM [DJLT01]. 2002 [B+02, IEE02, RSA03a, Yun02a]. 2003 [ACM03a, ACM03b, ACM03c, BS03, Bon03, 0 [And04, BC04a, Gum04, Imr03, Puz04, FLA+03, WKP03]. 2004 [ACM04b, ZC04]. WYY05d]. 0-07-222742-7 [Gum04]. 2005 [ACM05a, ACM05b, ACM05c, ANS05, 0-13-100851-X [For04]. 0-226-74410-8 HYZ05b, ISO05, Roy05, Ter08, Ytr06]. 2006 [Top02]. 0-262-14075-6 [Pag03]. [ACM06]. 2007 [ACM07, Ano06b, SM07b]. 0-321-20217-1 [Puz04]. 0-385-49532-3 2008 [ACM08, Dew08, YRS+09]. 2009 [Imr03]. 0-470-84402-7 [And04]. 024-Bit [ACM09, May09]. 20th [Bel00]. 21 [AJ01b]. [GS07a]. ’05 [ACM05c, MS05b, ZC09]. ’07 21264 [WB00]. 21st [Jef08, Kil01a]. 21th [ACM07]. ’08 [ACM08]. ’09 [IEE09a]. 22 [McK04, TTZ01]. 22nd [ACM09, IEE09a]. [Yun02a]. 23rd [Bon03]. 24th [Cra05a, Fra04]. 256-bit [Luc00]. 25th 1 [BD00a, BSW01, FOP06, GM00b, [Sho05a]. 26 [DB04]. 26th [EBC+00]. 27th GLG+02, HKR01, MP06, PS01c, Puz04, [Men07]. 29. [Eke02]. 29th [FLA+03]. Uni00c, Uni00d, Uni00g, WYY05b, WYY05c, Was08a]. 1-58488-518-1 [Was08a]. 3 [Duw03, Imr03]. 3-515-07640-9 [Eag05]. 1-Connected [BJLS02]. 1-out-of-n 3-540-66778-4 [Duw03]. 3- [AOS02]. 1.82Gbits [KV01]. [Kel05a, Kel05b]. 3.0 [Flu02b, Hei01, SQ01]. 1.82Gbits/sec [KV01]. 101 [Sei00a]. 305 [ECM00a]. 306 [ECM00b]. 30th 10118-3 [ISO04]. 106 [Coc02a]. 314pp [Duw03]. 3278 [BWBL02]. [Uni00c, Uni00d, Uni00g]. 106-1 33rd [ACM01a]. 36th [ACM04b]. 37th [Uni00c, Uni00d, Uni00g]. 108-bit [Bar00a]. [ACM05c]. 39th [ACM07]. 3D [LZP+04]. 109-bit [Pri00]. 10th [Coc02a, Joh03, 3GPP [KSHY01, SM02]. 3rd 3

[ACM05a, USE00a]. [CM00, Cou04, DIRR05, HLvA02, HJW01, JL00, MSJ02, MP02, Mas04, Wag02, BJN00, 4 [Duw03]. 4-round [DLP+09]. 40th BCDM00, CD00a, CC04c, FKS+00, GHJV00, [ACM08]. 41st [IEE00a]. 42nd [IEE01a]. GTZ04, HT04, HP01, Iwa08, IK00, Jon08, 43rd [IEE02]. 44th [IEE03]. 45th [IEE04]. KKS00a, KM00, LM08, Mes00, Pei09, Yas08]. 46th [IEE05a]. 47th [IEE06]. 48th [IEE07]. Abstracting [Bla01a, Mon03]. abstraction 49th [IEE08]. 4th [BLP06]. abstractions [BG07b]. Abstracts [BCKK05, BC05c, DWML05, DRS05, Fra01, [Sch00b]. Accelerated [Elb08]. Gum04, JM03, KKP02, Kim01, Kim02, Accelerating [ESG+05]. acceleration KN03, MS05a, NP02a]. [EHKH04]. Accelerator [CGBS01, RS04, TSO00, XB01, DPT+02]. 5 [BCJ+06, Wac05]. 50th [IEE09b]. 512 Acceptance [CFRR02]. Access [AD07, GLG+02]. 5th [CV04, KJR05, LL03, [ANRS01, Ano02e, BNPW03, CGMM02, LLT+04, Li05, NP02a, Syv02, WKP03]. DS06, HC08, MS03b, Ril02, Sma03a, Sun00a, ZGLX05, AW05, AW08, AFB05, BA06, 64 [LKH+08, WWCW00]. 6th [Bla03, BNP08, Che08b, DFM04, Hos06b, HW03c, Des02, HA00, JQ04, LL04d, MMV06, Oka00]. HY03, IY06, JW06, KNS05, LKZ+04, MF07, MSP+08, PS02a, STY07, WL05, WC01b, 7 [And04, Gum04]. 7-round [Pha04]. 7.2 You04]. access-control [BNP08]. [TvdKB+01]. 77 [AL04]. 7th accessible [Pau02a]. accountability [BDZ04, Boy01, Chr00, DFPS06, PC05a, [WABL+08]. Accounting [Lai08]. RS05, Sch01d, ST01d, Wri03]. Accumulator [GTH02]. Accumulators [CL02a]. accurate [ZY08]. Achieve 8-Round [BF00a]. 8.8/11.2 [DFPS06]. 800 [CFS01]. Achievement [Coc01a]. [BG07a, Hir09]. 800-90 [BG07a, Hir09]. Achievements [VDKP05]. achieving 802.11b [SIR04]. 802.11g [Coc02a]. [PS04c]. ACISP [YG01c]. ACM [ACM01a, 802.11i [HSD+05]. 802.15.4 [Miˇs08]. 82 ACM03a, ACM03b, ACM03c, ACM05b, [Kwo03b]. 8th [Chr01, Hon01, Jue04, Mat02, ACM05c, ACM06, ACM07, ACM08, ACM09, SMP+09, VY01, Vau05a, WK06, Zhe02b]. ACM10, MS05b, Bar00b, FMA02, Raj06]. ACNS [GKS05, IKY05, JYZ04, ZYH03]. 9 [CGP+02, Gan08]. 9/11 [Ark05, Mah04]. acoustic [ZZT05]. Acquiring [SETB08]. 90 [BG07a, Hir09]. 9796 [GM00b]. 9796-1 across [Dav07, ZBLvB05].ˇ Act [Kha05, [GM00b]. ’98 [Wil99]. ’99 [DN00b]. 9th Uni00a, Uni00e, Uni00d, Uni00g, Uni00h]. [CCMR02, CSY09, DR02c, DKU05, Lai03, Actel [DV08]. Action [SE01]. Active NH03, Pat03b, PY05, YDKM06]. [BC05a, BACS02, BP02, LJL05, MA00a, MA00b, Tad02, BPS08]. Active-Content = [KOMM01]. [MA00a, MA00b]. activities [AJ08, SN07]. actually [Hau06]. Ad A-1 [ISO05]. A.2.4 [Kel05a, Kel05b]. A5 [BSS02, KH05, WT02, Cha05b, DHMR07, [BD00a, BSW01, PS01c]. A5/1 KVD07, LHC08, LKZ+04, PCSM07, SLP07, [BD00a, BSW01, PS01c]. AAFG1 [Hug02]. TW07, ZC09, MAaT04]. ’ad-Durayhim’s AAIs [LOP04]. Aarhus [Cra05a]. Abadi [MAaT04]. Ad-hoc [MW04]. Abelian [CF02, PHK+01, RS02]. [BSS02, WT02, DHMR07, ZC09]. Abstention [JLL02]. Abstract Adaptation [ISSZ08]. Adapting [MJD01]. 4

Adaptive Coc02b, DR00b, DR02a, DR02b, DLP+09, [CM00, CBB05, CTL04, CL08, Coc02a, CS02, DPR01, Dan01, Dra00, EYCP00, Elb08, CS03b, DSS01, EFY+05, FMY01, JMV02, Fer06, FM02b, GC00a, HW03b, IBM00, KCJ+01, KLL01, LP01, MP05, Nov01, Pie05, IKM00, IK00, IK01, Joh00, KS09a, Kel05a, ZWC02, AAPP07, Che07a, DP04, MB08, Kel05b, KFSS00, KV01, LP02a, Len01, SH11, WNQ08, XMST07, YZDW07, ZCW04]. MHM+02, Mes00, Mes01, MR02a, MR02b, Adaptively OST05, OST06, PBTW07, PQ03b, RRY00, [AF04b, CHK05, FMY02, JL00]. SKKS00, SM03b, Sch00b, SKW+00, SW00a, Adaptively-Secure [CHK05]. Added SL00, WW00, WB00, WOL01, WWGP00, [Ano02b, St.00]. Adding [FBWC02]. WWCW00]. AES-CBC [Fer06]. AES-like Addison [Puc03]. Addition [DLP+09]. AES-related [Sch00b]. Affine [KT00, LPZ06, PP06a]. Additive [Ben00, CT09, Fel06, HH09]. [FMY01, MF01]. Additive-Sharing Affine-Transformation-Invariant [CT09]. [FMY01]. Address AFIS [Zir07]. African [WD01b]. after [IIT03, Nik02a, Nik02b, FXAM04, RW07]. [Ber03, McL06]. again [Fox00]. Against Address-Bit [IIT03]. Addressing [CS05b, DM07b, FKSW00, KS00a, KKS00a, [HTW07]. Adi [Coc03]. Adic [GHK+06]. KKS01, Mes00, Mes01, MPSW05, MH04, adjacent [JT01b]. Adjustment [BSNO00]. PV06b, Pro01, RK05, AG01, Ava03, Bau05, Adlan [MAaTxx]. Adleman BPR00, BP02, BBN+09, BBB+02, BGM09, [BB79, Coc03, SP79]. Administration BCP02b, CM00, CS03b, DB04, DJ06, [USE00c, USE00a, Ris06, WL04a]. Des00b, Des00c, Egh00, EBS01, FP01, Fry00, administrative [Cra05b]. Admitting Geb04, HNZI02, HLL+01, HG07, Hsu05b, [HSZI00]. Advance [CZB+01]. Advanced HLC08, Ino05, ISW03, IIT03, JKS02, JJ00b, [CF07, DFPS06, Lan00a, Lut02, MM01c, JT01a, Kan01, KM02, KML+02, LM08, Mor05, Sch06a, BBK+03b, DFCW00, ISTE08, LPV+09, Lu02, Mit00, M¨ol02, MG08, Swe08, Tan01, Ase02, Bar00c, III00, Bur03, NRR00, NLD08, OKS06, OS00, OT03a, CMR06, Coc02b, DR01, DR02b, Dan01, OT03b, PKBD01, PSC+02, PSP+08, PS01b, DRS05, FIP01a, GC01a, Har00, Her09a, PQ03b, RS01, SKQ01, Sch01b, Sch01f, Lan04a, MP01a, Mor05, NIS00, Pha04, SB00, SDFH00, SDF01, Sem00, Sho00b, SKU+00, Sye00, WBRF00, Wri01, YW06]. Advances SKI01, SLL+00, Tad02, TV03, VHP01, [Aki09, Bel00, BSS04, BSS05, Bon03, Boy01, XH05, YJ00, YKLM02a, YKLM02b, Cla00a, DFPST07, ELvS01, Kil01a, Oka00, YKLM03, ZCW04, ZSJN07]. Age Pfi01, Pre00, TIS07, Yun02a, Kat01, Bih03, [Mar08b, Lev01]. Agency CC04a, Cra05a, Fra04, Knu02, Lai03, [AJ08, Bam02, Kov01]. Agent Lee04b, LLT+04, Li05, LST+05, Men07, [HQ05, KC02, PZDH09, RdS01, RC01, Roy05, Sho05a, Zhe02b]. Advantage [SZ01]. Rot01, ZYM05, KXD00, SSM+08, SH00]. advantages [CDS07]. adventures [Hro09]. Agent-Based [HQ05, SSM+08]. Agents Adversarial [CLR09, GSS08, MNS08]. [WHI01, Hau06, LSA+07]. Ages Adversarial-knowledge [CLR09]. [Eag05, Kin01]. Aggregate Adversaries [CM00, JQY01, KSR02, Lu02, [BGLS03, WK05]. Aggregated [ZSN05]. RK05, SKR02, GXT+08, ZD05]. Adversary Aggregation [Her06, CCMT09, MS09b]. [Aba00, Gor06, RW02]. AES Aggressive [Wyl05]. AGM [Gau02]. [CGH+00b, DRS05, FIP01a, Her09a, Pha04, Agreement [AAFG01, CT08a, GW00, AG01, Ano00a, AL00b, BDK+09, CG03, HR05, HS07, RW03a, SK00, Tan07b, 5

ABB+04, AKNRT04, CYY05, CYH05, YRY05c, And03, SA02]. Algorithmic Che04a, CY05, CJ04, CJL05, HWWM03, [Hro09, Jou09, Has01b]. Algorithmics Jua04, KPT04, KRY05, KHKL05, LKKY03a, [Hro03]. Algorithms LKKY03b, LL04a, LLL04, LL05a, LKY05b, [AD07, Ano09d, AB09, BKLS02, III00, LKY05c, LKY05d, LLY06, LLS+09, LLR02, BWBL02, CPhX04, CLR01, Dam07, PQ03a, PQ06, SW06, Shi05, SW05a, SC05b, DWN01, FW09, Gau02, GL06b, Har06, Tsa06, Tse07, VK08, YW05, YC09b, YS02, Har00, Int00, JP03, Kel05a, Kel05b, Lee03b, YSH03, Yi04, YRY05b, ZC04, LLR06]. LR07, LP02b, PBB02, Pre02a, Pre02b, SL00, agricultural [Lov01]. Aided TLYL04, TV03, WBRF00, WWGP00, [NS01b, HLL+02]. aim [Pau02a]. Aimed AHK03b, Ano01n, AH05, CKL+09, CCM01, [SFDF06]. Airport [Sas07]. airwaves GHPT05, GPC08, HW03a, HWR09, HHG06, [Dav07]. Ajtai [GK05]. AKS [Che03]. Al Hro05, JK01a, MCHN05, Pre07, Rhi03, [MAaTxx, Hwa05, Irw03, KJY05, MAaT05, TC05, XLMS06, ZLZS07, Zir07, dH08]. MAaT07, PKH05, XY04, YRY05c, ZAX05, Alien [Wil01b]. All-or-Nothing MAaT03, MAaTxx]. al-fusul [MAaT05]. [Des00c, SR00]. Alley [DR01, Wie00]. al-Ka [MAaT07]. Al-Kindi Alliance [Ano04e]. Allied [Hau03, Hau06]. [MAaT03, MAaTxx]. al-mutargima Allocation [CCM05, LZ09]. Allowing [MAaT05]. Alan [Pet08]. Alcatraz [JLL02]. Almost [LSVS09]. Alchemy [Pag03]. alert [AJ08]. [AP09, BS00a, Jut01, Mar02b]. Alpha alerts [NCRX04]. Alexandria [MS05b]. [WB00, Wu02]. Alpha1 [KHD01]. Altera Algebra [Cou01, CD01a, Lan04a, CKY07, [Ano02e]. Alternating [Wer02, HKPR05]. Fau09, HW03a, HWR09, Sho05b]. Alternative Algebraic [AK03, Bar09, Can06b, CMR06, [Bad07, Gar03a, Han00, BMW02b]. always CM03, Cou03, CFS05, FJ03, FSW01, GV05, [BB79]. am [Eke02, SU07]. Amalfi GPS06, HR04a, HM02b, Hug02, Mas04, [BC05c, CGP03]. Amenability [WW00]. MNP01, MR02a, MR02b, PDMS09, Bul09, America [DB04]. American CKN06, CDL06, Iwa08, May09]. [GL05, Kat05b, Alv00, Naf05]. Americans algebraically [RBF08]. algebras [WD01b]. among [BDFP02]. Algorithm [ANS05, AEMR09, [BN00a, KT00, SKU+00, Win05c]. Bar00a, Bar00c, Bi09, BSC01a, ChLYL09, Amongst [Pem01b]. Amplification CU01, CJ03a, CJS01, CTLL01, CG03, CC06, [CHS05, LTW05, RK05, SV08b]. Amplified CH07c, CKM00, CT03, CP03, DR01, DG00, [KKS00a, KKS01, KML+02]. Amplifier Dhe03, EYCP00, FBW01, FMS01, GMM01, [Pli01]. Amsterdam [Knu02]. Analyses HTS02, HM02c, HZSL05, JKK+01, KBD03, [BPR05, Des00a, Pau01]. Analysing [BL02]. KMM+06, KY02c, KLB+02a, KTT07, KV01, Analysis [ARJ08, ABR01, AKS06, AD07, LPZ06, MM01b, MM01c, MS02e, NMSK01, Ano01c, AIK+01, ARC+01, Ava03, BN00a, OS01, PZL09, PBTW07, Ram01, RS01, BDhKB09, BRS02, BF05, Bor01, BSL02, SS01a, SPGQ06, WHLH05, Wes01, Wie00, Cry00, CK02a, CS03b, DPV01, Dra00, AJS08, App05, BF06a, Bla00, CO09a, FL01a, FGM00a, Gir06, Gol01c, GHPT05, CHC01, CKY05, CYH+07, CHH01, FP09, GLG+02, GPR06, HSZI01, HKR01, HSS04, Fer06, FSGV01, GPX08, Jon08, KJ01, Hey03, HM02c, IIT03, JK01a, JQYY01, Kwo02, Kwo03b, LCP04, LLLZ06a, JT01a, JQY01, hKLS00, KMS02, LCK03, LLLZ06b, MN14, OS07, SH11, SCS05a, LKHL09, LY05, LWK00, LH07, MOP06, SM08, SZP02, TM01, WL02, WN95, Wue09, Mar02b, Mas04, MS01, MMMT09, Mea01, 6

Mes00, Mes01, MAaTxx, MG08, NP02b, [Fis01b, HNO+09, Ano05b, CDM00, DFM04, NSS02, OS06, OOP03,¨ Puc03, QS01, DMS00, HR07, Poi00]. Anyone [Ros07]. SSST06, Sha01c, Sma03b, SDMN06, SQ01, Anytime [DJLT01]. Anywhere [DJLT01]. SWT07, YSS+01, ZC00, ZGLX05, AvdH00, Apache [Had00]. API [MWM01, Mor03]. AW05, AW08, Abd01, AHK03b, Asl04b, APIs [BM01c]. Appendix [Kel05a, Kel05b]. BDSV08, BBK+03b, Bjo05, BG07a, BR05, Applet [ZFK04]. applets [Bis03a]. BCJ+06, CKL+09, CW07, CS05a, DS09, Applicability [Wya02, TM01]. DKS08, GW08, GM04, GTZ04, Has01b, Application Hir09, Hro05, Hut01, JEZ04, JPL04, JSW05, [ADI09, ACS02, Bai01b, Boy01, CL02a, KSF00, Kor09, LKH+08, LMW05]. analysis CKQ03, Dam07, Dhe03, GHK+06, HF00, [LW05a, LKJL01, Lu07, Mea04, MT07, IKP+07, JX05, Jou04, Lai03, Lee04b, LLS05b, MRST06, OS00, PSG+09, PS08b, SK01b, LXM+05, NP07, Oka00, Pfi01, PQ03b, WLT05a, WPP05, XH05, XMST07, PS01c, Pre00, RC01, Roy05, RK06, Sch01a, YCW+08, YC08, ZWWL01, ZL04c, ZDW06]. SFDF06, TWNA08, TEM+01, UHA+09, Analytic [Shp03, Nie04]. Analyzing WG05, YSR01, Zhe02b, BG09, CMKT00, [MS01, Shy02, CP07, DFG00, HM02a, CP07, DIM08, FP00, HCBLETRG06, JRS09, ME08b, NCRX04]. anatomy [Bam02]. JMV09, LGKY10, Lav09, MT07, MPHD06, Anchor [Ree01]. Ancient MK05a, NZS05, RSS04, SSST06, TC00]. [Imr03, Sin00, Mol05, Pin06]. Andrei Application-Aware [IKP+07]. [Puz04]. Andrew [Puz04]. Anguilla Applications [Fra01]. Anniversary [Sal01b, Coc02a]. [AF04b, AC02, AGT01, And04, BLST01, annotated [Pet08]. annoyances [Tyn05]. BH05, Bar06b, BI05a, BGK+03, BS00a, annoying [Tyn05]. Annual Bih03, BGOY08, BSS02, BL08, CC04a, [ACM01a, ACM02, ACM04b, ACM05c, CD00a, CV02, CGHG01, CZ05, CHSS02, ACM06, ACM07, ACM08, Bon03, Cra05a, CSY09, Cra05a, CDI05, DJ01, DK02, DK07, ELvS01, Fra04, IEE00a, IEE02, IEE03, DA03, DFPS06, FR02, GSS08, GKK+09, IEE04, IEE05a, IEE06, IEE07, IEE08, GJKR03, Gen04a, GRW06, Gol01a, Gol04, IEE09b, Kil01a, MZ04, Men07, Sho05a, HRS02, HN06, Har06, Has01a, HSS04, HR05, USE01b, USE01a, USE02c, VY01, Yun02a, HJW05, JT01b, JY01, KMM+06, KGL04, ACM00, Bel00, HA00, Jef08, NH03, ST01d]. KMO01, KBM09, KKIM01, Knu02, MAA07, anomaly [RCG+05]. Anonymity [GM03, MM07b, Nie02c, Nie02d, PS02b, RSN+01, IKOS06, MP02, SS01b, EY09, LV07, Par04]. Sch06b, Shp03, SXY01, SPGQ06, Vau02, anonymization [FXAM04, RW07]. Wya02, XYL09, YZ00, Zea00, Zho02, Anonymous [ABC+05, CL02a, CL04a, ACTZ05,´ Ate04, AH05, AFGH06, BG08, HSHI02, HSHI06, KT01, LHL+08, SOOI02, BGL+03, CCCY01, CM05b, CS09, CSK+08, Wan04a, YT09, ZJ09, BP03a, Chi08b, DY09a, DFCW00, DJLT01, FP09, Fin03, Chi08c, Chi08d, EY09, LHC08, Sae02, Fis01a, Gal02, GVC+08, GKK+07, GB09, Sha03c, WCJ05, YTWY05, ZC09]. ANSI HHSS01, Has02, Hen01, HKPR05, Jac00, [III00, Kel05a, Kel05b, Oiw09]. ANSI-C KVN+09, KNS05, Laf00, Lee04a]. [Oiw09]. answer [Ano01e]. Answers applications [PT08]. Anthony [Pag03]. Anti [LJ05a, LPW06, LB05, MY01, Mal06, MC04, [Kha05, Ano05c]. Anti-Circumvention MSV04, Nie04, PW08, PBD07, PC00, QS00, [Kha05]. anti-virus [Ano05c]. anticipation Ros06b, SSS06, Sch00a, Sch01c, S+03, [Goo00]. Antikythera [Eva09]. Any Sch04a, Sch04b, Sch05a, SPHH06, WW08, 7

WA06, WV00, YS04, ZBP05]. Applied [BP03a, Cal00c]. Areas [HW03a, HWR09, SL07, GV09, GNP05, [HH04, MZ04, PT06, VY01, AMW07, IKY05, JYZ04, ZYH03]. Applying Buc00a, HH05, HA00, NH03, ST01d]. [Elb09, KC02, Lan00d, LMSV07, SQ01, Aren’t [Bau01a, Bau01b]. Arguments SPMLS02, TND+09, vDKST06]. [HNO+09]. ARITH [BS03, BC01, IEE05b]. Appointed [CL01a]. apprehension [AJ08]. ARITH-15 [BC01]. ARITH-16 [BS03]. Approach [BKM07, CGFSHG09, CDR01, ARITH-17 [IEE05b]. Arithmetic CW09, Chi08a, CB01, DJLT01, Kra03, [BS03, BIP05, BGK+03, BCDH09, BC01, Lai07, LL05c, Lut03, OMT02, PBD00, CT03, Gro03, IEE05b, KM07, Kir03, PPV96, Pau02a, Pre02a, SKG09, VH09, VVS01, RDJ+01, SR06, GPS05, PS04a, SOIG07]. Vir03, XYL09, YKMB08, AA08, CGL+08a, arithmetics [Lam91]. ARM7 CGL+08b, CGL+08c, CJT01, DLMM05, [DV08, XB01]. armies [Ano03c]. Army GGH+08, Har05a, JJ01, JW01, KVD07, [Boy03]. Arne [Bec02]. array [DZL01]. LG09, LYC02, MT09, Mar05b, MI09, Mos06, Arrays NN03, SLP07, SK03, SN04, SW00b, ZLX99, [ABM08, BS00a, GC01a, HWW05, PP06a]. ZSZ01, ZL04b, ZL04a]. Approaches Arrived [Law05]. arsenal [Blu09]. Art [CGMM02, AvdH00, DG05, Fri07, Has01b, [And07, Bis03b, Col03, Mar05a, MZ02, KXD00]. approval [Wan04b]. CS07a, DMS07, Eri03, Eri08, MS02d]. Approximation Article [Che08b]. Artifacts [EHK+03]. [CLZ02, Hro03, Kuk01, WL02]. Artificial [Cop04b, MMYH02]. Arun Approximations [BDQ04]. Apress [Ter08]. [For04]. ASCI [MJD01]. ASIACRYPT April [Ano00d, Buc00a, Chr00, Chr01, [Lai03, Lee04b, Roy05, Zhe02b, Boy01, CCMR02, CCMR05, CGH+00b, DFPS06, Oka00, DN00b, KI01a]. ASIC [WOL01]. Joy03b, Knu02, Mat02, NIS00, Nac01, ASIP [SKW+07]. asks [Ano08a]. ASM Sch01d, SMP+09, YDKM06]. APSS [MK05a]. Aspect [Kos01a]. Aspects [ZSV05]. Arabic [MAaTxx]. Arbitrarily [BLMS00, CMR06, Pel06, AN03, DLP+09, [RW03b]. Arbitrary [AR01, BR00b, BR01, Rup09]. Aspiration [Ash03]. assembly CKN00, CHJ+01b, CF02, Tee06]. [Gou09]. assessing [CDD+05]. assessment Arbitrary-Length [CC05e, DMS07]. assets [KH03, NRR00]. [AR01, BR00b, CKN00, CHJ+01b]. Assignment [BRTM09, HC08, CHC04, Architectural [ASK07, ABM00, BMA00a, CJ03c, DFM04, HW03c, Hwa00, Lin01a, BMA00b, BMA00c, CW02, Gro03, KV01, TP07, WC01b, hY08]. assignments LTM+00, ZYLG05, Ano05c]. Architecture [SWR05]. Assisted [BH05, GC01b, Gut02b, Gut04a, KKY02, [ECG+07, XS03, Art04, BB05, LHL04a]. KY02c, KDO01, LKM+05, LZ04, LXM+05, ASSL [VH09]. associated [XLMS06]. Lut02, MP01c, MFS+09, Rot02a, SMTM01, associativity [HRS08]. Assumption SM03b, SLG+05, Uzu04, Che00a, CC05e, [CS00, DN00a, FOPS01, KMZ03, ZD05]. DHL06, Ino05, LHL03b, MPPM09, SKW+07, Assumptions SHL07, SH05, Tan01, WWA01]. [ABR01, BP04, BCP02a, FS01a, KLR09, Architectures Lin03, MNT+00, Nao03, SBZ02, Mic02a]. [BGK+03, KLY02, RM02, SM02, Con04, Assurance [LXM+05, AL04, BJ02, FOP06, DP04, GKS05, NdM04, RH00, WH02b]. Gha07, Jen09]. Assurances [Bar06b]. archival [SGMV09]. Archives [RC01]. Astrology [Pag03]. Astronomy [MYC01]. archiving [DMSW09]. area Asymmetric 8

[CH07b, Man01, SY01a, SBZ02, WHI01, NS05a, NLD08, OST06, PQ03a, RG05, YG01a, GJ04, Lee01, OP01b]. Sch00c, Sch01f, Shi05, SL06, SK05b, SW00b, Asymptotically [vDW04]. Asynchronous WL07a, WL04b, Yan07, YS02, ZSJN07]. [CKPS01, FML+03, KSR02, SKR02, ZSV05]. Attitudes [FDIR00, CF05]. attractors at-targama [MAaT05]. Atlanta [IEE09b]. [HHYW07]. Attribute ATM [Pat02a, Pat02b, Zea00]. Atomic [LY05, RSA00e, IY05]. Attributes [SS01b]. [CNV06]. Attached [RCBL00]. Auction [AS01a, Ano01a]. auctioning Attachments [Ric07]. Attack [Ahm08, [RCG+05]. Auctions [Bra01b]. Audio CKQ03, CS05b, CS03b, Des00b, Fil00, FV03, [Arn01, CS05c, DRL09, MH05, WNY09, GHJV00, GHJV01, HQ01, Hug02, HW01, WWL+02, XFZ01, WNQ08, BS01b, KJR05, JJ00b, KCP01, KS00a, KML+02, KM01c, KN03]. Audio- [KJR05]. Audio-and LY07, LNL+08, LV04, LMV05, Luc02a, [BS01b, KN03]. Augmented Man01, MH04, MSU05, Nov01, OM09, [CS07c, You01]. Augmenting [AL04]. PV06a, PQ03b, RMS05, SGM09, Sch01b, August [AMW07, Bel00, B+02, Bon03, Sho00b, Sma03b, VHP01, YKLM02a, ZC04, Fra04, HH04, HH05, HA00, JQ04, KKP02, ASK05, Ade09, Ano09c, DKL+00a, Duj08, Kil01a, KP01, MZ04, Men07, NH03, PT06, Duj09, GM00a, HAuR04, Hes04b, HG07, RS05, Sch00a, Sch04a, Sch04b, Sch05a, Iwa08, JJ02, KS09a, KM04a, LM08, Law09b, Sho05a, ST01d, USE00a, USE00d, USE01c, LS05b, Mir05, OS00, SIR04, XH05, ZCW04]. USE02b, VY01, Yun02a]. Australia Attack-Resistant [LNL+08]. attacker [Boy01, IZ00]. Austria [BDSV08]. Attackers [JMV02]. Attacking [DKU05, Pfi01, Jef08]. Authentic [FMP03, KPR03, Luc00, TMMM05, BF06a]. [DGMS03, Dur01, SS01b]. Authenticate Attacking-Based [TMMM05]. Attacks [Bau03a, Bau03b]. Authenticated [ARR03, AG01, AK03, BC05a, BPR00, [AGT01, BN00a, BPR00, BU02, BC04b, BP02, BMM00, BBB+02, BDK+09, BU02, BMN01, BMP00, BCP01, CPP04, Chi08e, BM03b, BGM09, BCP02b, BM01c, Can06b, DG03, DA03, EP02, GKKO07, GL03, CS07b, CZ03, CT08a, CJS01, CKM00, GTTC03, HS07, KOY01, KY03, Kra03, Lee01, CJNP00, CM03, Cou03, CWR09, CD01b, LHT09, MPS00, Mac01, MSJ02, MND+04, DPV01, DFS04, DJ06, DS08, DM07b, NA07, Nam02, Ngu05, Poh01, SK00, Vau05b, FKSW00, FOBH05, FP01, Fry00, Fur02b, WC01a, YPPK09, Yi04, ZWCY02, BKN04, Gen04a, Gir06, GK02, HSH+08a, HNZI02, BCP07, CYY05, CYH05, Che04a, CLC08, HR04a, HSH+01, HLC08, ISW03, JKS02, CJ04, CJL05, DG06, GL06a, GMR05, JJ00d, KKS00a, KS00b, KKS01, KCJ+01, HTJ08, HWW02, HWWM03, Hsu05a, KI01a, Law09a, LLS05a, LWS05, LJ05b, Hwa05, HL05c, HL05d, Jua04, KOY09, MOP06, MP06, MF01, McK04, Mes00, KRY05, LKKY03a, LKKY03b, LL04a, Mes01, M¨ol02, MG08, OT03a, OT03b, LLL04, LL05a, LKY05c, LKY05d, LHC08, OOP03,¨ OST05, Ove06, PKBD01, PDMS09, LLR02, LLR06, LWK05a, Miˇs08, PQ03a, RS01, SKQ01, Sem00, SWT07, Tad02, VV07, PQ06, RBB03, Sei05, SW05a, SC05b, TLH05, WYY05a, WYY05d, WLZZ05, YYDO01, TJ01a, Tse07, WLH06, WH02a, XY04, YY01, YG01b, vW01, BPS08, Bau05, YW05, YC09a, YS02, YSH03, YRY05b, BCS08, BZ03, CKL+09, CS05a, DK08, YPKL08, ZC04, ZAX05, ZW05b, ZL05]. Geb04, HSH+08b, HSH+09, Has01b, Hsu05b, Authenticating HL05b, Ino05, IM06, JDJ01]. attacks [AIP01, Chi08a, CGV09, Fur05, JW05, [KS05a, KTC03, LPV+09, LSH00, MMJ05, PM08, RCBL00, YSS+01, Lin01b]. 9

Authentication GLC+04, GTY08, GS09, GUQ01, GTZ04, [AAK09, AP09, ANRS01, Ano01b, Ano01c, HM02a, Hen06b, Her09b, Hsu05b, HLTJ09, Ano01f, Ano02d, AHKM02, ANL01, BH06, HYS03, HLL04, HL05b, sHCP09, JP06, BACS02, BCL+05b, BCG+02, BM03a, JPL04, KLY03, KJY05, KN03, KTC03, BH00a, BKR00, BCC01, BCC02, BC05b, KCL03, Ku04, KC05, KCC05, LC03, LHY02, BDhKB09, BR02, BDFP05, BDF01b, LLH02, LHL03a, LF03, LKY04, LW04, BM03c, BL02, BLDT09, BWE+00, CV03, LHL04a, LKY05a, LLY06, LLS+09, LFHT07, CGP08, CS07b, CC01b, CLK01a, CLK01b, Li05, LST+05, LCX08, LW05a, LLH06, CC05b, CC09, CJT02, CJ03d, CWY05, LFW04, LHL03b, LH03, LT04, LC04a, CT09, Cim02, Cir01, CFRR02, CGK+02, Lin07, LN04, LLW08a, LLW08b, LC05a, CF05, CJK+04, Cou01, CMB+05, Dav07, LC05b, Luk01, MS09c, MABI06, McK04, DP00, Dwo03, ETZ00, EM03, FIP02a, Mit00, MR00, ME08b, MP07, NC09, NLD08, FGM00b, Fre03, FSSF01, FDIR00, Gan01a, OHB08b, PY08, PCS03, PCC03, PI06, Pei04, Gar03a, GMW05, GSVC02, GD02, GT02, Pha06, Pot03, Pot07, RFR07a, RFR07b, Gut04c, Had00, HSZI01, HSHI02, HSHI06, RFR07c, RG06, SNW01, SG07, SN07, HKW06, HY01, Hoe01, HS01b, HP00, HL07, Sch05c, Sco04, Sei05, SBS09, Sha05c, SLH03, ISSZ08, Jab01, JP02a, JP07, JP02b, KJR05, SSM+08, SW06, Shi05, SL05a, St.00, Ste05a, KC09b, KH05, KVD07, Kra01, Ku02, KZ09, SW02]. authentication [SCS05b, SC05c, KS06b, Law05, Li01, LLT+04, LB04, LL05c, SCS05c, SZS05, SY06, TM06, TBJ02, LSH03b, LM00, LOP04, LHL+08, Lys07, TOEO00, TIS07, TW07, Tsa08, TWL05, MW06, MM01a, Mal02]. Authentication UBEP09, VM03, VK08, Voi05, Wac05, [MJ04, MD04, MR03, MGC02, MNT06, WLT03, Wan04a, WLT05a, WDLN09, Nao02, Nik02a, Nik02b, OKE02, OHB08a, WDCJ09, WC03b, WL04b, WHHT08, PBD00, Par04, PMRZ00, PBC05, PK01, XwWL08, YW04b, YW04a, YWC05, Qu01, RKZD02, Ric07, Ril02, SNWX01, YWL05, YTWY05, YCYW07, YWWD08, SR01, Sch04c, Sch05b, Sei00b, SY01b, YC09c, YC09b, YS04, YRY04, YRY05a, SBG02, Smi00, Smi01c, Smi02, SE09, SK06, YRY05c, YRY05d, YY05b, YbJf04, ZL04a, Str01b, SJ05, SYLC05, SC01, TK03, ZK05, ZSN05, Zha06, ZDW06, ZSJN07, TZT09a, TZT09b, Tsa01, VN04, WLLL09, dB07, CS08b, ECM00a, ECM00b, LSH03a]. WCJ09, Way01, Way02a, Wea06, WKB08, authenticator [CKY07, jLC07]. WT02, WS03, WL07b, WLT05b, WHL05, Authenticity XYL09, YI01, YEP+06, YSR01, YLLL02, [AB01, Bla02a, CBD+05, GJ03, GOR02b, YKW01, Zaf00, ZJ04, ZBLvB05,ˇ AvdH00, HG03, RW03b, Sch01a, Mit02a]. AF04a, All06, Ano00k, Ano00l, Ano05b, AUTHMAC DH [Asl04b]. Author Art04, AAKD09, Asl04a, Asl04b, AL04, [Ano00b, Ano01d]. authorisation [SN07]. Ayo06, Bad07, Bel04, BGP02, BSSM+07, Authorities [CHSS02, HWW04, WH02b]. BFG04, BFG05, BS01b, BBG+02, BDFP02, Authority [Con00, JLL02, CCH05, KB09]. BFM07, Cer04a, CBB05, CC01a, CCK04a, Authorization [BACS02, CJK+04, LSZ05, CL04d, CC04b, CCK04b, CC05c, CZ03, RKZD02, YT09, GJJ05, JEZ04, Lin07, CY05, CCS08, CWJT01, CJT01, CJ03b, LOP04, SRJ01, WL04a, WZB05, YbJf04]. CH07a, Chi08b, Chi08c]. authentication Authorship [Top02]. auto [YY00]. [Chi08d, CL09, CF07, Coc01a, CMdV06, auto-recoverable [YY00]. Automata Dal01, DSGP06, DY09a, DGK+04, DG05, [LZ04, MGC02, Wue09, Bao04, CC05d, DW05, FLZ02, FCZ05, FGM03, Gan08, KK03, Laf00, LQ08, Mon03, SBZ04, SHH07, 10

TC00, dRMS05]. automate [Bur02]. CGFSHG09, CvTMH01,ˇ CK02a, CGMM02, Automated [CDR01, LLW05, LLW09, CF01b, CC02a, CV03, CPP04, CCD07, HJW05, IY05, LS05b]. Automatic [BD04a, CS07b, CC01b, CLT07, CHSS02, CHM+02, GJJ05, GL00, ST01c, XNK+05, RG05]. CZK05, CM05a, CTH08, CGK+02, Coc01b, Automating [Gue09]. automorphism Cou01, CFS01, CS00, DN00a, DKMR05, [Pae03]. automotive [LPW06]. Autonomic DT03, EHK+03, EM03, FL06, FM02a, [VH09, Che05c]. autopsie [Car00]. FMY01, FGL02, GMP01a, GMP01b, Gar03a, auxiliary [Dam00, DKL09]. availability Gen00b, GM02a, GL03, GS02b, Gen03, [CBD+05]. Available [DJLT01]. AV B PA GST04, GPS06, Gro01, Gro03, GW01, [BS01b, KJR05, KN03]. Average Her06, HM02b, HS00, HL02, HQ05, HC08, [KMT01, CGHG06]. average-case [Mic02b]. HH09, Igl02, Jam00, KBD03, KLN+06, avoid [Tyn05]. avoided [CNPQ03]. Award KJR05, KKG03, KY02a, KL05, Kel05a, [RSA03a, Bar00b, Coc03]. Awarded Kel05b, KY01c, KY02b, KC09b, KK02, [Coc02b]. Aware [IKP+07, OHB08a, KC02, KCD07, KPR03, KM05, Kra02a, CBSU06, OHB08b, Zea00]. Awareness Ku02, KWP06, KT00, LLL02, LP03]. Based [HLM03, BK05]. Away [LKLK05, LHT09, LZ01, LZ04, LL05c, [Coc03, Ols00, Tee06]. Awkward LPZ06, LY07, LXH07, LLRW07, LWK00, [TvdKB+01]. Axiomatization [dH08]. LSC03, LHS05, LSZ05, LLS05b, LCD07, MPS00, Mar08a, Mar08b, MNP01, Miy01, B [SPK08, YG01a]. B-Spline [SPK08]. MGC02, M¨ul01a, MSU05, NMO05, Nak01, B2B [Zho02]. Babbage [Bar00a]. Back Nam02, NBD01, NSS02, Nov01, NMSK01, [CZB+01, KCD07, SF07, Ano00g, Dea06]. PV06a, PV06b, PP06a, PZL09, PMRZ00, Back-End [KCD07]. Backdoors [CS03c]. Ril02, RE02, RH02, RS00, RS03, RS08, Backup [Str02]. backward RMCG01, Sal05b, Sch01a, SSFC09, Sha02, [HCD08a, HCD08b]. Sha01e, SOOI02, SXY01, Sma03a, SBEW01, backward-and-forward SGB01, TMMM05, TYLL02, TZT09a, [HCD08a, HCD08b]. Bacon [GG05a]. bad TZT09b, VMSV05, Vau05b, Ver06a, VHP01, [BBN+09]. bail [Ano01h]. Bait [Luc02a]. VK07, WRW02, WY02, WZW05, WG05, Balancing [H¨of01, Lut02]. Ballot [Cha04]. WCJ09, WH09, WBD01, WC04, XYL09, Baltimore [ACM05b, ACM05c, GL05]. YKMY01, YT09, YYDO01, YSS+01, Banach [AUW01]. Bandwidth YKW01, YLH05, ZK02, ZGLX05, ZP05, [CGJ+02, YY01, SLP07]. ZJ09, ZS05, ZWCY02, vDW04, AAPP07, bandwidth-efficient [SLP07]. AA08, Ano02b, Ano05b, App05, AAKD09, Bandwidth-Optimal [YY01]. Bangalore BGB09, BBC+09, BR04, BFG08, BS01b, [MMV06]. Banking [HKW06]. Barbara Bla01b, BMW05, BLP06, BGL+03, BDS09b, [Bel00, Bon03, Fra04, Kil01a, Men07, Sho05a, Buh06, CGHG06, CG06, CL02b]. based Yun02a]. Barcode [Che08b]. Bare [DPV04]. [CO09a, CL04d, CFY+10, CL00, CCH04, Barken [Sty04]. Barret [Gro01]. barriers CY05, Che05a, CCS08, CGL+08a, CGL+08b, [Kov01]. base [DIM08, XSWC10, IR02]. CGL+08c, CJT01, CL09, CJL06, CLK04, Based [Ano01c, ANR01, AF03, AJO08, CJL05, Cho08b, CYH+07, CFVZ06, BDG+01, BKLS02, BNPS02, BN02, Ben00, CCD+04, CTT07, CHT02, CC04c, Cra05b, BRS02, BF01b, BF03, BB04, Bon07, DS09, DPT+02, DHL06, DRL09, DV08, BCHK07, BGH07, BPR+08, BD03, BMN01, DW01, Dug04, EHKH04, FLZ02, FXAM04, Boy03, BQR01, BM01c, BSNO00, BRTM09, FWL08, GMR08, GW08, GSK09, GL06a, 11

GHdGSS00, GS01, GPS05, GGS+09, GB09, battles [Cal00d]. Bay [Cal00c]. Bayes HM00, HLL+02, HCD08a, HCD08b, HRL09, [Goo00]. BB84 [Ina02a]. BC [IEE02]. BCH Has00, Her07, Her09b, HPS01, HG05a, [MLC01]. BDD [KLN+06, Kra02a]. Hsu05a, HLwWZ09, H¨uh00, HP01, HLL03, BDD-Based [Kra02a]. Be HL05d, sHCP09, IM06, JK01a, JK01b, [Bar00a, Pau02a, CNPQ03, YJ00, vT01]. JMV09, JW06, JPL04, JZCW05, JLL01, Beach [IEE00a]. beat [Lev01]. because KG09, hKLS00, KLY03, KPT04, KN03, [AJ08]. Become [Ort00, Wal04]. Been KHL09, KW00, KNS05, KCL03, Ku04, [Nic01]. BeepBeep [Dri02]. before [Uni00a, KCC05, Kwo03a, KHKL05, LHL03a, LF03, Uni00b, Uni00f, Uni00e, Uni00h, YJ00]. LL04b, LKY05a, LKY05b, LHY05, jLC07, Beginning [Dew08, Hoo05]. Beginnings LG09, LD01, LTH05, LPM05, LW05a, [Bud00b]. Begins [MP00]. Behavior LWZH05, LYGL07, LLW08a, LLW08b, [Vav03]. BEHEMOTH [Bar00c]. behind LCC05, LSA+07, LCZ05c, LCZ05a, LLC06a, [Hen06b]. Beijing [FLY06, LST+05]. Being LLC06b, MW06, MS09c, Mic01]. based [ASW+01, ES00a]. beleid [dL00]. Belgium [MR09, MI09, Mit00, MB08, MC04, [DR02c, Pre00, QS00]. Belief [BPST02]. MPPM09, MV03b, NZCG05, NC09, believing [Buh06]. Bell [BZ02, Eke02]. NSNK05, OS09, PCSM07, PW05, PBMB01, Benchmark PSG+09, PS08a, Pel06, PSP+08, PC00, [Ase02, TLYL04, LDH06, YLT06]. Bendy Pha06, PLJ05a, PLJ05b, QCB05a, Reg03, [Sas07]. Benefit [YKLM02a]. benefits Reg04, RG09, RCG+05, Sae02, SG07, Sco04, [CH00]. Benford [NM09]. Bennett Sei05, SH11, SM11, SPG02, Sha03c, Sha03d, [BGM09]. Bergen [Ytr06]. Berkeley SC05a, Sha05c, Sha05d, SLH03, SCS05a, [IEE06]. Berlin [FLA+03]. Bermuda mSgFtL05, SSM+08, SW05a, SH00, SK01b, [Bla03]. Bernard [DNRS03]. Berners SCL05, SLC05, Sun02, SCS05c, SY06, [Coc02b]. Berners-Lee [Coc02b]. Best TNG04, TWNA08, Tsa08, Tsa05, UHA+09, [Bau01a, Bau01b, MFS+09, Gol08, Ste02]. UBEP09, VS01, VKS09, WAF00, WLT03, BestCrypt [Bau02b]. Bethesda [ACM09]. WL07a, WJP07, WNQ08, WLHH05, Whi09, Better [FV03, PM00, RR02, SKQ01, WV00, WH02b, WY05, WC05, XMST07, HLLL03, Pau03, Rie00]. BetterBASIC YW04a, YCW+08, YWWD08, YC09b, YS04, [ASW+01]. Between hY08, YJ00, YPSZ01, YRY05c, YPKL08, [DKMR05, Ket06, Ngu05, NN06, Fau09, YY00, ZC04, ZC09, ZDW06, ZCL05, GKM+00, GC05, MSV04, Pau01, RW03a, ZYW07, dRMS05, NZS05]. Bases Sch02, Sch04d, SK06]. Beurling [Bec02]. [AAC+01, ADDS06, BKP09, B+02, Beyond [Gor06, Hei03, LMW05, Mar08a, CvTMH01,ˇ EBC+00, FJ03, FLA+03, Sch03, See04, Sty04]. BGP CCT08, Fau09, ZT03]. Basic [ZSN05, vOWK07]. Bi [Cou04, PJK01]. [Gol01b, Gol01a, Gol04, Kat05b, Puc03, Bi-directional [PJK01]. Bi-linear [Cou04]. Ste02, Bon00]. Basics [Leh06, Lut02]. Bias [CL02c, Sel00]. Biased Basing [BS00a, LSKC05]. BiBa [RR02]. [BPR+08, CHL02, AGGM06, AGGM10]. Bibliography [Bee05]. Bidiagonal [BR09]. Basis [RMH03b, Vav03, vW01, GPS05, Bidiagonal-Singular [BR09]. big [RR03a]. LS05b, RMH03a]. Batch [Ara02, HLT01, BigNum [SR06]. Bilateral [CT08a]. PBD07, Sha01d, BLH06, HLH00]. Batching Bilinear [BGLS03, BMS03, CL04a, HMS04, [SB01]. Battery [CBSU06]. Battle KK02, DSGP06, LC05b, VK08]. Bill [Bud00a, Bud02, SM00c, SM05, SM07a]. [Gen00a]. billing [SSM+08]. Binarization 12

[LSKC05]. Binary [ADI09, HHM01, KYHC01, KKG03, LLRW07, LRW02, MV00, LSKC05, OSSST04, SKG09, WCJ09, MS02e, NPV01, OMSK01, Pat01, PS06, ACTZ05,´ BG08, BG09, FSGV01, GB09]. Pli01, RMS05, SM03b, SYY+02, SKU+00, Binary-Ternary [ADI09]. BIND [Kle07]. SKI01, WCJ09, XH03, YG01b, Bai08, Binding [DN02b]. BioAW [MJ04]. BF06a, DY01, Dun06, Egh00, GPX08, Biometric [AHKM02, Dal01, EM03, Hey03, JK01b, Jun05, Kat05a, KJ01, LDH06, HWH01, KJR05, LLT+04, PMRZ00, PK01, LCP04, LKH+08, MMJ05, PSP+08, RBB03, SR01, Sas07, Way01, Way02a, Wea06, SHJR04, SHH07, WF02, XH05, YI00]. BS01b, Gui06, JP06, KN03, Li05, LST+05, Block-Based [LLRW07, BBC+09]. MR00, RFR07a, RFR07b, RFR07c, Smi00, Block-Cipher [BR02, RBB03]. MJ04, TBJ02, ZJ04]. Biometric-Based Block-Cipher-Based [BRS02]. [PMRZ00]. Biometrics Block-DCT [BSC01a]. Blockcipher [Ano04a, Ash03, Bjo05, MR03, Ril02, Str01a, [GM02c, OS07]. blockciphers [Fur01]. BSSM+07, BCP+03, Buh06]. Blocks [Jou02]. Blockwise [JMV02]. Biometrics-Based [Ril02]. Biomolecular Blockwise-Adaptive [JMV02]. Bluetooth [Bi09]. Birds [MLM03]. birth [GBM02, LV04, LMV05]. Blunders [Bur01]. [Bud06, SE01]. Birthday [Wag02]. Blur [VHP01]. Blur/Deblur [VHP01]. Bisimulation [BJP02]. Bit Blurring [LSKC05, SK06]. Board [AIK+01, BK06a, BL08, CGHG01, CDL+00, [CGBS01]. boat [DB04]. Body DMS00, GS07a, IIT03, KZ07, LNS02, [Bam02, TG07]. BOEL [Fin02]. Boethius MS09d, PCG01, RMH03b, SM03b, SXY01, [Eag05]. bolstered [Ano01i]. bombe VKS09, ATSVY00, Bar00a, BK07, GPX08, [Wil01a, Tur04]. Bombes [Ano02i, LBA00]. KZ03, KKL09, Luc00, PLSvdLE10, Pri00, bombs [Lov01]. Bonds [CAC03]. Boneh RMPJ08, SWR05, UHA+09, WW08, ZFK04]. [ASK05, Hes04a]. Bonn [DRS05]. Book Bit-Fixing [KZ07, KZ03]. bit-substitution [And04, Duw03, Eag05, Eva09, Fal07, For04, [GPX08]. BitLocker [Kor09]. Bits Gas01, Gum04, Imr03, Irw03, Jan08a, [BS01d, SZ01, HN04, Shp02]. Bitslice Lee03a, Lee03b, Mar05a, MP01b, Nie02a, [DPV01]. Black [Ano01j, CF02, CFS05, Nie04, Pag03, Pap05, Ree01, Rot07, Sal03b, DI05, DIRR05, DS08, KY01d]. Black-Box See04, Shp04a, Sin02, Spr03, Sty04, Ter08, [Ano01j, BRS02, CF02, CFS05, DI05, Top02, Uzu04, Wal00, Was08a, Kat05b, DIRR05, KY01d]. Blackmailing [PS01b]. Lam07, Lun09, MAaT05, Ros00b, Sin99, Bletchley Sin00, AAG+00]. Books [Sal00b, Cop05, Cop06, Cop10, HS01a, [Che00b, Dr.00c, Ros00b, Ree01]. Bookshelf Sal05a, SE01, Smi01b, Wei06, Win00]. Blind [Lut02, Lut03, Wil01b]. Bookworm [AO00, BNPS02, BB00a, BSC01b, CL01b, [Sal03b]. Boolean GSK09, JKK+01, LY07, Naf05, Pau02b, [Car02, CT03, CS09, MS02b, QPV05, SM00a, SPK08, ZTP05, ZK02, Fan03, HC04a, SM00b, SM03a, WV00]. Boom [Ano04a]. JLL01, JL04, LHY05, LCZ05b, MS09a, Boomerang [KKS00a, KKS01, KML+02]. SV08a, SHT05, WHH05, ZC05]. blindness Boot [HSH+08a, HSH+08b, HSH+09]. [AvdH00]. Blink [Sas07]. Block Border [MJF07]. Borders [PGT07]. [AIK+01, BBC+09, BKR00, BRS02, BR02, Boston [USE01b, USE01a]. bot [Ano08b]. BSC01a, CvTMH01,ˇ Can01b, CLLL00, Botschaften [Sch09]. bottleneck [WL02]. CP02, CMB+05, Cro01, DR00a, Dwo03, bottlenecks [HTW07]. Bound [CY08, EYCP00, Flu02a, HSH+01, JKK+01, KCP01, DGN03, KMT01, HLLL03, hY08, GW00]. 13

Boundaries [PGT07]. Bounded [Cur05, SGA07]. Brutus [CJM00]. BSD [Che04b, DFSS08, DIS02, Din01, Din05, [Lin02, ASW+01, Lin02]. BSDCon Lu02, MPSW05, MSTS04, Vad03, DFSS05]. [USE02a]. Bubble [Ber03]. Buchmann Bounded-Quantum-Storage [DFSS08]. [Lee03a]. Buffer [FOBH05, Fry00, Ino05]. Bounding [DM07b]. Bounds [BDF01b, Bug [BCS08, Bor00]. bugs [GJL06]. BP03b, DIRR05, Di 01, GGKT05, RW03a, Building [Jou02, Knu07, Mar02a, And08b, SNWX01, SM00b, Shp03, Wal01, WW05, Bra01a, FB01, LS05b, McG06, MPHD06, GT00, GGK03, JZ09, KS05b, PS02a, Shp99]. PQ06, DB04]. buitenlands [dL00]. Bouwmeester [Duw03]. Box Bulletin [Cer04b]. Bulletproof [Cha05b]. [Ano01j, BRS02, CF02, CFS05, DI05, bundles [GT02]. Burrows [ABM08]. DIRR05, DS08, FM02b, KY01d, Kil01b, Burying [Arn01]. Bush [Ris06]. business SMTM01, JmBdXgXm05]. Boxes [HHSS01, Poh01]. Buy [PLW07]. Buyer [Bih00, BCDM00, ZC00]. BP [MM01a]. buys [Zaf00]. Buzzes [Coc02b]. [Wei00, Wei05]. Braid Bytecode [Coo02, Ler02]. Byzantine [AAFG01, CJ03a, GM02a, Hug02, KLC+00, [CNV06, HGR07, LLR02, LLR06, PI06]. LLH01, LP03, MSU05, Cho08b, Hen06a]. Byzantine-Resistant [CNV06]. Braille [Pau02b]. Branch [AKS06]. Branches [Fel06]. Brassard [BGM09]. C [Ter08, Zol01, III00, Oiw09, RMPJ08, Break [BP06, Sin02, HM04, WA06]. Sea05, Sea09, VM03, WK01, Wel05]. C# Breaker [Rey01]. Breakers [CD00b]. [MJ03]. C-testable [RMPJ08]. C2C Breaking [HTJ08]. CA [ACM03b, Joy03b, KKP02, [Ano09a, BKN04, Das08, DKFX05, GO03, Men05, Men07, Nac01, Oka04, Poi06, Pre02c, GK02, Kov01, KR03, K¨uh08, Sal00a, Wri05, USE02a, USE02b]. CAA [MGC02]. Cache Fie09, Gar01, SE01, Smi01b, SL07, Swe08]. [BTTF02, Kle07, OST05, OST06, TSS+03, breaks [OS00]. Breakthrough Ino05, WL07a]. cache-based [WL07a]. [Coc02a, LR01, Pal02, Pau02a]. Brief Caches [GSVC02, LLK05]. Caernarvon [Bon07, Cos03, Kir01a, Boo05, Gra01]. [TKP+08]. Caesar [Chu02, You06]. Briefs [MP00, PM00, Pau02a, Pau02b, CAIDA [Pri00]. Cairo [EBC+00]. CaLC Pau03, Pau09]. Bright [Ano01j, LNP02]. [Sil01]. calculus [MRST06]. Calcutta brings [Ano04e]. Bristol [DFCW00]. [Roy00a]. Calibrating [SDMN06]. Calif Britain [Gui06]. British [ACM03c]. California [ACM03a, ACM07, [ACM08, Fie09, Fra01, Syv02, Bud00b]. Bel00, Bon03, Fra04, IEE00a, Kil01a, Sch01c, Broadband [MP00, SHL07, MJF+08]. Sch04a, Sch05a, Sho05a, USE00b, USE02c, Broadcast [AFI06, BGW05, CKPS01, Wil99, Yun02a, IEE06]. Call CNV06, DS03, FWW04, GSW00, GKKO07, [Ano04b, Ano07b, Ano07a, MD04]. Calls GRW06, HS02a, HLL05, LNP02, SNW01, [WG05, Ano08c, WCJ05]. Cambridge Woo00, ASW00, KSW06, Kre05, Mar05b, [ACM10, Chr00, Chr01, CCMR02, CCMR05, NLD08, RG09, WDLN09, LN04]. IEE03, JQ04, Kat05b, Kil05, Nao04, Pag03, broadcasting [TJ01b, WH02b]. Broke Puc03, Rot07]. [AIK+01, HQ01, [Urb01, KS04]. Broken [Ahm08]. Brooks KM02, LHL+02, SM03b, SKI01, XH05]. [Bar00b]. BRSIM [BPS08]. BRSIM/UC Camera [CGK+02, Gei03]. Camera-Based [BPS08]. BRSIM/UC-soundness [BPS08]. [CGK+02]. Can Bruce [Hei03, Sty04, See04]. Bruges [BB02, CZB+01, Dav01c, Lai08, Ros07, [Pre00]. Brumley [ASK05]. Brute Ver06b, CNPQ03, CG05, SBB05, Zir07]. 14

Canada [ACM02, ACM08, AMW07, HH04, CNS02, GS07a, Nie02b, OST05, Vau01, HH05, HA00, IEE02, MS05a, MZ04, NH03, BKN04, BF06a, BK05, CSK+08, HRS08, PT06, ST01d, VY01]. Candidate KWDB06, Mic02a, Mic02b, OST06, Pei09, [III00, EYCP00, NIS00, SKW+00, SL00]. STY07, SKW+07, SPHH06, Sul05, Candidates ZWWL01]. case/average [Mic02b]. cases [AL00b, DPR01, Dra00, GC01a, SB00, [ABHS09]. Cash [PS01b]. Cathedral SGB01, WW00, GC00a, WB00]. Cannes [USE02a]. Cats [Pem01b]. Caught [Wei00]. [AJ01a, AJ01b]. cannot [Gav08]. canonical cause [SBB05]. Causes [Mur01]. [TP07]. CANS [DWML05]. Canterbury Cautionary [GMP01a]. Cayley [Lam91]. [CZ05]. Cantor [WPP05]. Capabilities Cayman [Syv02]. CBC [BDTW01, AL04, ABDS01]. Capability [BBKN01, BPR05, BR00b, DGH+04, Fer06, [MH05]. capable [ETMP05]. Capacity JMV02, KI03, Vau01, Vau02]. CBIDs [ChLYL09, Sug01, ME08a, Wan05]. Cape [MC04]. CCA [KOMM01, M¨ul01b]. CCA2 [IEE05b]. capital [SW05b]. capture [BST02, Lin03, RG09]. CCA2-Secure [AMB06]. Card [BCST00, CMG+01, CL07, [Lin03]. CCGrid [TLC06]. CCM [Dwo03]. CJT02, DF01, DFPS06, RE03, RS01, SR01, CCS [Mar02b, MS05b]. CDH [CM05a]. Ano00k, Ano00l, Ano05b, AJ01b, Bor00, CDH-Based [CM05a]. Cell BGL+03, Bur00, Cal00c, Car01, CCCY01, [Fox00, MYC01, SHL07]. Cell-phone-free Cha05a, Cla00b, Con00, CH00, DFCW00, [Fox00]. Cellular GMG00, HM01a, Has02, Hen01, Hus01, [Laf00, LZ04, MGC02, PZL09, Rie00, SBZ04, Jac00, LSA+07, LC05a, Lu07, QS00, RE00, Bao04, ETMP05, KK03, SHH07, Wan04a, SP02, Smi00, VK08, Zaf00, Che00a, FGL02, dRMS05, Wue09, SSM+08]. Censoring Pau02b, SKKS00, TV03]. card-based [Ano01e]. Center [LSA+07]. CARDIS [DFPS06]. [AUW01, CH01a, CYH04, LPM05]. CARDIS’98 [QS00]. Cards Centered [BKM07, CMB+05]. Central [And04, AJ01b, Bel01, CK06, DJLT01, [CHL02]. Centralized [Wac05]. Centre HBdJL01, JSJK01, JY01, Lan00d, MOP06, [PPV96]. Centric [Mit02b]. Century MV01, MN01, MG08, NFQ03, QS01, Sak01, [Eva09, Kob00, Lan00c, PRS04, Gan01b, Sha01c, TBDL01, VPG01, YKMY01, Lan00a]. Century-Long [Eva09]. CERT Ano04c, Ano04f, AJ01a, BPR01, BCHJ05, [Sea09]. certicom [LM08]. Certificate Bur00, DFH01, DFPST07, FCZ05, Fin03, [BLM01, Gen03, GMR08]. GUQ01, Gui06, HHSS01, Hsu05b, Jua04, Certificate-Based [Gen03, GMR08]. KLY03, LKY05a, Ler02, LCS09, MY01, Certificateless [HLC08, HRL09]. Pha06, Poh01, PB01, Pre07, SVDF07, Certificates [BDTW01, CMG+01, RdS01, SLH03, TIS07, WC03b, YW04b, YWWD08, Bra01a, LCK04, ZSM05]. Certification Ano03a, BJvdB02, CL04d, CCK04b, Che00a, [Ano01o, CHM+02, RSA00b, BGB09, Gro03, HL05b, Ku04, KC05, LHY02, Sco04, BD04b, KB09]. Certified [ANR01, CSV07, SCF01, YW04a]. CardS4 [GN01]. Care LXH07, NZCG05, BCL05a, BCW05, [Mad00a, RC06, Ano03a]. carefully CWH00, CCH05, CJ05, HW04, HW05, HL04, [Cla00b]. Carlo [Bi09, Sug03]. carrying LL06, LWK05a, NZS05, Sha04b, Sha05b, [Art04]. cars [LPW06]. Cartilage [MYC01]. TLH05, Tsa05, TJC03, WH03]. Cerven Cartography [SGM09, SWR05]. Cascade [Sal03b]. CFS [Ito01]. ChaCha [Ber08]. [DGH+04]. Cascaded [Jou04]. Case Chain [YT09, YZ00, Wue09]. chain-rules [ABK00, Ano05a, BBGM08, BU02, BCP01, [Wue09]. Chained [BCC01, BC05b]. 15

Chaining [BKR00, CBB05, PCC03]. CHESS-64 [LKHL09]. Cheswick [Che05b]. challenge [LM08, LW05a, PRS04, Smi08]. Chicago [ACM04b, Top02, Con00]. Chien challenge/response [LW05a]. Challenges [YRY05b]. Children [Pau02a, Sye00]. [Cla00a, GV09, Nao03, Sta03, SVEG09]. China [B+02, DWML05, FLY06, JYZ04, Chang [CWJT01, ZC05]. change [CYH05]. LLT+04, Li05, LST+05, ZJ04, ZYH03, Changes [Mur01]. Changing [BST03]. Ano00c, TTZ01]. Chinese Channel [BU02, CHVV03, Law09a, LCK03, [LLT+04, Li05, Sch01b, CAC06, YKLM03]. M¨ol02, NMO05, OT03a, OT03b, Sch06a, Chip SYLC05, ARR03, BP03a, BG07b, Buh06, [Ade09, BNPW03, DV08, MM01b, MM01c, CNPQ03, KSWH00, LCZ05b, MS09c, MP00, Mit02b, Fox00, ISTE08, Ano04c]. PSP+08, WL07a, YTWY05]. Channels Chip-Secured [BNPW03]. Chipkarten [AIP01, CK02b, Nam02, Vau05b, LH04]. [Ano04c]. Chips [Ano00d, GP00, Pau02b]. Chaos [JK01b, SK01b, WZW05, JK01a, Choice [Jam00]. Choquet [SH11, SM11]. LMC+03, McN03, PSG+09]. Chaos-Based Chosen [BCHK07, CKN03, CHJ+01a, [WZW05, SK01b, JK01a, PSG+09]. Chaotic CHJ+01b, CS02, CS03b, DN02a, Des00b, [BCGH11, LLL+01, Mul06, SXY01, USS02, DK05, FP01, IM06, JKS02, JJ00b, KS00a, Vav03, AMRP00, AMRP04,´ GHdGSS00, KY01a, KCJ+01, KMZ03, KM01c, KI01a, GB09, HHYW07, HLwWZ09, JK01b, Man01, Nov01, PV06b, Poi00, Sho00b, LMC+03, LYGL07, MA02, PBMB01, PS01a, BMW05, CHH+09, KG09, ZCW04]. PZL09, SPG02, SL09, UHA+09, VKS09, Chosen- [BCHK07, CKN03, WG02, WW08, kWpLwW01, WLW04, CHJ+01a, CHJ+01b, Des00b, DK05, FP01, YZEE09]. Chapman [Kat05b, Was08a]. JKS02, JJ00b, KCJ+01, KMZ03, Nov01, chapters [MAaT05, Tat05]. Characteristic PV06b, Poi00, CHH+09, KG09]. [Gau02, GPS06, KT00, Ver02, GPS05]. Chosen-Plaintext [DN02a, KM01c, KI01a]. characteristics CHW [CHC04]. CIA [Mah04, Ris06]. [RFR07a, RFR07b, RFR07c]. Cincinnati [BD08]. Cinematic [CAC03]. Characterization [AJO08, Nam02, XH03, Cipher [AIK+01, BKR00, BRS02, BR02, BGM04, KY00, QPV05, XLMS06]. Cer04b, CLLL00, Cro01, CL02c, DR00a, Characterizations [Pas05]. DG00, DPS05, DF07, Dwo03, EYCP00, Characterizing [BTW05, BTW08]. FF01a, Flu02a, GG05a, GBM02, HCJ02, Charging [BACS02, RH02]. Chatter HQ01, KYHC01, KHD01, LKHL09, [Kee05]. Chaum MSNH07, NPV01, OMSK01, Pat01, PS06, [BNPS02, KLN+06, WHH05]. Chaumian Sal00a, SM01, SM02, SYY+02, SXY01, [M¨ol03a]. Cheating SBEW01, SKI01, WB02, Wu02, XH03, [CCL09, OKS06, PZ01, PZ02b, PZ02a, ZP01]. ZCC01, BGP09, BD00a, BVP+04, GPX08, check [Kir01b]. Checkable [BPST02]. HAuR04, Hey03, KH08, Kid00, LKH+08, Checking [BL02, JP07, KLN+06, YJ00, Mac00, PSP+08, RBB03, Sal00b, SHH07, GGH+08, RG05]. checklists [Sha01a]. WW08, Win05b, WF02, XH05]. Ciphers Checks [FM02a]. Checksums [AAG+00, BBKN01, BS00b, BR01, BKM07, [Sto01, SGPH98]. Cheju [Kim01]. CvTMH01,ˇ Can01b, CF01b, Can06b, CJS01, Chemical [EIG01]. Chen [LW05c]. Chu02, CHJ02, CP02, CM03, Cou03, DPV01, Chennai [CV04, RD01, Roy05]. Chernobyl Eag05, Fil00, FF01a, Fil02, Gol01d, Gol01e, [Rie03]. CHES [JQ04, KKP02, KP01, HR00, HR04a, HSH+01, Jam00, Jan06, KNP01, RS05, WKP03]. CHESS [LKHL09]. Kan01, KCP01, KKG03, LRW02, MV00, 16

Oni01, PP06a, Pli01, RMS05, Sar02, SM03b, Clouds [GS01, VS01]. Cluster SKU+00, Wal00, Wri05, ??02, YG01b, ZC00, [H¨of01, KCD07, SEF+06, TLC06, TW07]. Bai08, Bar06a, Bel07a, Ber07, Bod99, Cluster-Based [KCD07]. Clusters DLP+09, DY01, DS09, Dun06, DK08, Egh00, [MFS+09]. CM [CMKT00, GHK+06]. CMS GPG06, HW03a, HWR09, Hey03, JK01b, [BWBL02, DKU05]. Co Jun05, Kat05a, KSWH00, Kin01, LMSV07, [Bud00b, Nd05, ACM01b]. Co-Design LDH06, Lun09, Max06, MI09, MRT10, [Nd05]. Co-operation [Bud00b]. Coalition MWM01, Pin06, SHJR04, SK03, Smi01b, [ACJT00]. Coalition-Resistant [ACJT00]. SL07, SB05, TT00, Wag03, YI00, You06, coarse [Rhi03]. Coast [Boy01]. Cod Kat05b]. Ciphertext [BBK03a, BCHK07, [IEE05b]. Code CKN03, CF01b, CS07c, CHJ+01a, CHJ+01b, [Ark05, BKR00, BR04, CD00b, CV03, CS02, CS03b, Des00b, DK05, FP01, JKS02, Cer04b, FIP02a, FF01b, HSZI01, Imr03, JJ00b, KS00a, KY01a, KCJ+01, KMZ03, KY01e, Lai08, OS09, Ree01, Rey01, Sal00a, Kur01, Man01, Nov01, PV06b, Sho00b, Sin02, SZ03, ZYR01, BGB09, CSV07, Che08b, BMW05, CHH+09, IM06, KG09, Poi00]. DW01, HM04, HL03, KS04, Lev01, MMJ05, Ciphertext-Only [BBK03a]. Mul02, Ros00b, RSA09a, SM00c, SM05, [AFI06, BGW05, BGN05, Gen04b, JJ00a]. SM07a, Sin99, Sin00, Swe08, AAG+00, SE01]. Circuit Code-based [BR04, OS09, BGB09]. [EHK+03, GSS08, HR05, MG08, KS05b]. Codebook [CTH08, YWWS09, WJP07]. Circuits [BI05a, FML+03, Gol03, ISW03, Codebook-linked [YWWS09]. MD05, PBTW07, You01, GLC+04]. Codebreaker [Hau03, Pin06]. Circumvention [Kha05]. Cirencester Codebreakers [Bec02, Gan01b, Gas01, [Hon01, Pat03b, Sma05]. CIRM [PPV96]. HS01a, Kah67a, Kah67b, Kah74, Kah96]. CISC [FLY06]. Citizen [Mit02b]. citizens Codebreaking [Bud00a, Bud00b, Sin01b, [Ano03a]. claims [DS00]. clamping Alv00, Bud02, Cop05, Cop06, Cop10]. [Ano03a]. Clandestine [Wri05]. Class Codebuster [Ano04d]. codec [Che08a]. [Car02, KM01a, KKH03, NN06, OP01a, Codecs [LLRW07]. Coded [MLC01]. Pli01, SBZ02, XYXYX11, DKL00b, Fox00, Codes HM00, Uni01]. Classes [CY02, RSA00e]. [Bee05, BP06, Big08, Bod99, BQR01, CC09, Classical [BYJK08, Gav08, GW00, LW05b, Chu02, CDG+05, GMW05, Jan06, KY02b, NA07, BYJK04, JZ09]. Classification Mol05, NN06, SNWX01, Sin01b, Smi01b, [HMS04, PBD00, Uni01]. clauses [SV08a]. Urb01, Wri05, ??02, YYDO01, Yek07, cle [RSA09a]. Cleaner [TR09a, TR09b]. Bel07a, aSM01, Bul09, DB04, DKL00b, Cleaning [Lut03]. cleanup [Lov01]. Client DW05, DW01, Gar01, HW03a, HWR09, [ANRS01, Ano01f, ANL01, FSSF01, PS05, Kov01, Lam07, Lun09, Min03, NS01a, WKB08, Bad07, HTJ08, LF03, YS04]. PCS03, Pin06, Reg05, Reg09, Sav04, Sun02]. Client-Server [ANRS01, PS05]. codeword [AJ08]. Coding client-to-client [HTJ08]. Clients [Buc00a, CS05c, HHL+00, Joy00, LLL+01, [JRFH01, RKZD02, WLH06]. Clinton MZ02, Pat03b, RK06, Sal05c, Sma05, TW02, [Gen00a]. Clip [FGL02]. Cliques [PQ06]. TW06b, Ytr06, Che07a, DW05, Gar04, Cliques-type [PQ06]. clock [Pau02b]. Hon01, PPV96, Sch00a, Sch01c, S+03, Sch04a, Clocked [CGFSHG09, MH04]. Close Sch04b, Sch05a, Sea05, Sea09, TW05, Irw03]. [DM07b]. closer [Ano04e]. closing Coefficients [CH01b, KT00]. coffin [Rie03]. [Lau08b, PWGP03]. cloud [CKS09]. Cohen [Was08a]. Coherent [TPPM07]. 17

Coin [Lin01c]. Coin-Tossing [Lin01c]. [DN00a, Nie02b]. commodity Coins [HR04b]. Cold [CGL+08a, CGL+08b, CGL+08c]. Common [HSH+08a, AJ08, HSH+08b, HSH+09]. [Pas03, TG07]. Commonwealth [PY05]. cold-boot [HSH+08b, HSH+09]. communicating [Hut01]. Communication collaboration [AK02a, ANRS01, BYJK08, BBK03a, [ED03, PCSM07, SBG05, SBG07]. BIW08, Big08, Col03, Fis05, GKK+09, collaborative [LLY06]. collapse [SBB05]. LLS+09, Mar07, NA07, PL01, Sch06b, Collection [GMM08, Bro05a]. Collections SKR02, Wri05, vDW04, BYJK04, BC05c, [Kuh00]. Collective [BBB+02, BGM09]. CC05c, CGP03, EY09, GKK+07, GG05b, collide [GNP05]. Collision [DG02, IKO05, GC05, HYS03, JZ09, JRS09, KPS02, LPM05, MS09c, WYY05a, WYY05d, GM00a, Sem00]. Lin02, MP08, Mul06, PBMB01, Par04, Collision-Resistant [IKO05]. Collisions RH03, SNW01, UP05, WWA01]. [BC04a, GIS05, HR04b, WFLY04, WYY05b, Communication-Efficient [Fis05, LLS+09]. WYY05c]. Collusion Communications [BGW05, HNZI02, Zan01]. Cologne [BCC02, GN06, HJ07, Igl02, Kra01, Lan00a, [WKP03]. Color Lan04b, LCK01, LL02, LL01, MS05b, Sal01b, [CTL04, Che07a, Che08a, CTY09, FGD01, Vau05b, VMC02, BP03a, CYH04, HWW02, AEEdR05, CO09a, CDD07, Yan02, YCL07]. LC04a, Sal05c, Ser06, SL05a, Wil99, WGL00, Colorado [BC01, Sch04b, USE00d]. YTWY05, DKU05]. Community [SK06]. Colored [CDD07]. Colossus commutativity [HRS08]. commuting [Cop04a, Cop05, Cop06, Cop10, Lav06, [CKRT08]. Compact [CG03, JT01b, Sal00b, Sal00a, Sal05a, Salxx]. Colour SMTM01, YT09, ZLK02, JAW+00, Mic02a]. [RS00]. Coloured [AADK05]. Columbia companies [Ros04, Ste00]. Company [ACM08]. column [Raj06]. Combination [ASW+01, Zaf00]. Comparative [CF01b, Gau02, GHPT05, GB09]. [DPR01, GLG+02, Kat05b, LFHT07, LOP04]. Combinatorial Comparing [HU05, KLN+06]. [GMW05, Hro03, SLTB+06, Hen06a]. Comparison [GC00a, GC01a, Gau02, Combinatorics [Lee03b]. Combined JRB+06, MS02e, SW00a, WW00, FGM03, [LLS05a]. Combiner [Sar02, LL06]. JL03, Sma01, WB00]. Compendium Combiners [AK03]. Combining [Abe04]. [Lut02]. Compensated [AAK09]. Comes [Mar08b, Ano03g]. Coming competition [Cla00b]. compiler [Dan01]. Commemoration [BZ02]. [DFG00, Oiw09]. Compilers [Lut02]. Comment [SCS05b, WY05, WLW04]. complement [YC09c]. Complementary Comments [AS01c, CGH+00b, JW01, [AS01c]. Complete [Bar00a, Bee05, Bud00a, MNFG02, SKW+00, CJT04]. Commerce FGMO01, GCKL08, HMS04, KY00, MS09d, [CLK01b, GS02a, Kir01a, Sta00, Uni01, Sal07, TWM+09, Bud02]. Completeness ZYM05, BM03a, FB01, Gra01, MY01, SN07, [HG03, MW04, ABHS09, PT08]. Complex TMM01, YC09a]. commercial [JKK+01, LKLK05]. Complexity [LCC05, YLR05]. Commercializing [BYJK08, BLM01, BDK+09, CKRT08, [Moo07]. Commitment [DN02b, DMS00, CB01, DN00a, FBW01, GKKO07, GKK+09, FF00, CAC06, HR07, KKL09]. HR04a, Lut02, Nie02b, RMH03b, Ros00a, Commitments [BN00b, CF01a, DFS04, Rot05, Shp03, BYJK04, CDD00, GKK+07, FM02a, Gen04a, HNO+09]. Committee GIKR01, Gor05, JZ09, Mic02a, MP08, [Uni00a, Uni00b]. committing RMH03a, Rot02b, Rot03, Shp99, SPHH06, 18

TW06a, SV08a, Fal07, Rot07]. Computationally [MPSW05]. Complexity-Theoretic [CB01]. Computations compliance [LMW05]. Compliant [HL05a, ML05, RMH04, SBZ04, TC05]. [CGBS01, RVS09]. Component Compute [MFS+09]. Computed [FBW01]. [BSL02, Hei01, TEM+01]. composability Computer [PS04c]. Composable [AF04b, BOHL+05, [BS03, Bis03b, Bro05a, BCDH09, BC01, BLDT09, CF01a, CK02b, DN02b, DN03, CSW+08, CZK05, CGK+02, Coc02a, Coc03, NMO05, RK05, Can01a, CLOS02]. Eva09, HYZ05b, IEE00a, IEE01a, IEE02, Composite IEE03, IEE04, IEE05a, IEE05b, IEE06, [CQS01, GMP01a, RDJ+01, Zhe01]. IEE07, IEE08, IEE09b, Ifr00, JBR05, KM07, Composition Leh06, Lut02, MYC01, MS05b, MAC+03, [BJP02, BN00a, CR03, CV02, Pie05, Sho00a, Nie02d, RC06, SB07, Tyn05, Cas02, Che05b, Can06a, LLR02, LLR06, Puc06]. DFGH04, Fau09, FOP06, GKS05, Lov01, compositional [GM04]. Compostela Mal06, PRS04, PHS03, Sal05c, Sal05d, Shu06, [BS03]. Compound [SB05]. SL06, SE01, dCdVSG05, GKS05, dCdVSG05]. Comprehensive [dLB07]. Compress Computer-Science [Coc03]. [Gen04b]. Compressed [ISSZ08, SB04]. computerized [LMC+03, Pau02b]. Compressed-Domain [ISSZ08]. Computers [Coc03, Ett02, TSS+03, Cop05, Compressibility [HN06]. Compression Cop06, Cop10, Heg09, RH00]. Computing [ABM08, BD03, CC06, HSKC01, Kel02, [ACM00, ACM01a, ACM01b, ACM02, LHS05, RS08, Sal07, SDFH00, WWL+02, ACM03b, ACM04b, ACM05a, ACM05c, WC03a, FS08, Gar04, Laf00, LJ05a, Sch00a, ACM06, ACM07, ACM08, ACM09, ACM10, Sch01c, S+03, Sch04a, Sch04b, Sch05a, ASW+01, BBDK00, CGH00a, CLK01a, TTZ01, Zir07]. Cop04b, EP02, JP03, LBA00, LKHL09, Compression--Hiding [BD03]. Lut03, May04, PHM03, Sch06b, SKG09, Compromise [Ahm08, Lai08]. SCF01, Sim02, SEF+06, Sta03, TLC06, Compromised [ZYN08]. Comput VH09, Ver02, WC01a, Wri00, Yan00, [McK04]. computability [Pet08]. YKMB08, Cha07, Che05c, CHT02, DHL06, Computable [Vad03]. Computation HV09, HKPR05, LMC+03, MI09, PP03, [ACS02, Bai01b, BCL+05b, BI05a, BIM00, PP07, Raj06, RP00, Sei05, WLH06, Wil99, BJLS02, CC00, CDM00, CDN01, CDG+05, YLR05, Lut03]. Compuware [Ano02d]. CDI05, DN03, DI05, DM00b, FS02, conceal [BB79]. Concealing [DMS00]. FGMO01, FWW04, GIKR02, HCK09, Concealment [DA03]. Concept Has01a, HM01b, Jef08, KO04, KLML05, [ARC+01, Ano09c]. concepts KSR02, Lin01c, PS05, WW05, Ano02g, AB09, [AB09, Kra07, SWR05, MC04]. concerning BEZ00, BEZ01, CLOS02, CLC08, CDD00, [HW03b]. Concerns [MP00]. concrete DwWmW05, Fan03, GCKL08, HT04, HLL03, [KNS05]. Concurrency [JL00]. IKOS07, LMSV07, LC04a, May09, Mis06, Concurrent [BP02, DPV04, Gen04a, SH05, WLHH05, WY05, SM07b, Duw03]. KKG03, Ros00a, Ros06a, Dam00]. computation-efficient [CLC08]. Conditional [LMV05, WN02]. Conditions Computational [CCL09, DLP+09, GH02, [IKO05]. Conference HG03, KLR09, KK06, Rup09, SM07b, [ACM03a, ACM04a, Ano06b, AAC+01, WvD02, AUW01, IKOS08, Lam01, Lau08a, AJ01b, Bel00, B+02, BZ02, BS01b, Bih03, Nie02a, Sho05b, SHJR04]. Bla03, Bon03, Boy01, Buc00a, CC04a, CV04, 19

CGP03, CGH+00b, Cra05a, DKU05, Constrained [BCH+00, DBS+06, HS01b, DFCW00, DFPS06, EBC+00, ELvS01, MRL+02, Nit09, Zhe02a, Has00, RAL07]. FLY06, Fra01, FMA02, Fra04, FLA+03, constraints [CC05d, LPM05, SN04]. HR06, HYZ05b, IEE09a, IKY05, JYZ04, Construct [CDMP05, Gol01d]. JM03, Joy03b, Jue04, KJR05, Kil01a, constructed [Tsa05]. Constructible Kim02, KN03, Knu02, Lai03, LL03, Lee04b, [NNT05]. Constructing LLT+04, LL04d, MMV06, MS05b, MS02c, [Des00b, Fis01b, LL04b, Vad03, Wen03, Men05, Men07, NIS00, Nac01, Nao04, Oka00, JZCW05, NS01a, ZL05]. Construction Oka04, Pat03b, Pem01b, Pfi01, Poi06, Pre00, [BBKN01, BB00b, Car02, CMKT00, Lin03, Pre02c, RD01, Roy00a, Roy05, Sho05a, Sil01, Nie02c, SM00a, TNM00, YWD08, DW05, SM07b, Sma05, Syv02, USE00c, USE00a, SC02c]. Constructions USE01b, USE01a, USE02c, Wil99, Won01, [BS00a, BR00b, BRS02, GMW05, GGKT05, Wri03, Yun02a, YDKM06, ZJ04, Zhe02b, GM02c, Jou04, PR08, PZ02b, SNWX01, ZYH03, AUW01, BC05c, DV05, DWML05, SM00b, GT00, GPV08, IK03, IK06, NR04, DRS05, Hon01, Kil05, Li05, PC05a, PY05, PR05, Reg03, Reg04, vDKST06]. PPV96, QS00, Son00, WK06]. Confidences constructive [GGH+08]. consumption [Gan01a]. Confidentiality [Miˇs08]. Contact [YKMY01, Car00]. [Dwo03, Pem01a, YC08]. configurable Contact-Less [YKMY01]. Contactless [MBS04]. Configuration [Sha02, Mos06]. [And04, KS02, Cla00b, Fin03]. Confirmation [SK00]. Confirmer Contemporary [Ahm07, Opp05, SVEG09]. [CM00, GM03]. Confiscation [DBS01]. Content [AAK09, CGJ+02, HHJS04, Conformance [LBR00, RSA00c]. MA00a, MA00b, RE02, XMST07, YKW01, confounded [Bel07a]. confusion [She01]. ATS04, DY09a, GSK09, SG07]. congestion [SBB05]. Congress Content-adaptive [XMST07]. [Uni00a, Uni00b, Uni00f, Uni00e, Uni00h]. Content-Based [RE02, YKW01, SG07]. congruences [Ste08]. Congruential Content-triggered [HHJS04]. Contest [CS05b, LS05a, SB05]. conic [Bar00b]. Context [DJLT01, FPS01, SN04]. [LWL09, LCC05, LCZ05a]. Conjecture continue [Lov01]. continued [Dan02]. [CU01]. Conjugacy [CJ03a]. Conjugate Contra [Mah04]. contract [WK05]. [Igl02]. Connected [BJLS02, H¨of01]. Contrast Connection [HR00, Jam00, Goo00, Mic02b]. [BDDS03, HKS00, HT06, KS03, CDFM05]. Connection-Polynomials [Jam00]. Contrast-optimal [HKS00]. Connections [WRW02]. Conquer [SKQ01]. Contrast-Sensitive [HT06]. Control conscious [DMSW09]. Consensus [ABEL05, ANRS01, BW07, CGMM02, HC08, [CNV06]. conservation [Che05b]. LY05, Sma03a, ZGLX05, BNP08, DFM04, Considerations DPT+02, HW03c, JW06, KNS05, LKZ+04, [DBS+06, Hei07, Rub01, Sch07, SVEG09]. MD04, MSP+08, PS04b, STY07, WC01b]. Considering [WA07]. Consistency Control-flow [ABEL05]. Controlled [ABC+05, JEZ04]. consistent [RG06]. [GVC+08, IMM01, AW05, AW08, LAPS08]. Constant Controlling [HY03, MS03b, MS02d, WL05]. [App07, BI05a, CS07c, CD01a, DPV04, Controls [Har01a, Har01b, Gei03]. DN02b, DI05, Lin01c, Sun00a, IKOS08]. convenience [WDCJ09]. conventional Constant-Depth [BI05a]. [CJ04, YW05, YRY05b]. convergence Constant-Round [DPV04, DI05, Lin01c]. [Ano04e]. Converging [Pot07]. 20

Conversation [GK04]. conversations [Ava03, Fry00, GM00b, MOP06, OST05, [VAVY09]. Conversion [CDI05, Ket06]. Has01b, JDJ01, Man08, OST06]. Counters Conversions [KI01b]. Convertible [KMO01]. counterterrorism [Naf05]. [Chi08e, LH04, LHT09, WH02a, CL04b, Counting [Gau02, Kuh00, Hig08]. Couple LWK05a, ZW05b]. Convolution [PG05]. [SXY01]. coupled [LF03]. course cookbook [VM03]. cookies [Cha05a]. Cool [AA04b, GV09, GL05]. courses [Gha07]. [Ano00d]. Coordinate [OS01]. Cover [GA05, Gut02a, LNP02, NN03, RS00]. COPACOBANA [GKN+08]. coverage [DS00]. coverings [SC02b]. Copenhagen [TBJ02]. Copley Covert [Col03]. Cozens [Sal03b]. CPCMS [USE01b, USE01a]. coprocessing [ML05]. [Sha02]. CPI [ECG+07]. CPN [AADK05]. Coprocessor CPOL [BZP05]. CPUs [ESG+05]. Crack [Gut00, Ito00, LS01b, OTIT01, AV04]. [Sin02, Ano08b, Min03]. Crackberries Coprocessors [Smi02]. Copy [Sta05]. Cracked [AAG+00, Nic01, Pri00]. [LTM+00, Per05b]. copying [Gei03, SV08a]. Crackers [Ols00, SEK01, SEK02, NRR00]. Copyright [Kha05, LLL02, PBB02, XFZ01, Cracking [DZL01, BZ03, Cur05]. ZTP05, Ano01p, Gil07, HLC07, KA09, Crackproof [Sal03b]. Cracks Kwo03a, Ree03]. CORBA [TEM+01]. Core [Bar00a, Ste05c]. Cramer [BF00a, Dim07, DV08, HMS04, TPS01]. [Luc02b, VMSV05]. CRC Corfu [SM07b]. Corner [Kat05b, Spr03, Was08a, SGPH98]. [Mar08a, TR09a, TR09b]. corners [Blu09]. Creation [MV01, Top02, MB08]. Creator Corporate [HW01, KH03]. Correcting [Coc01a]. Credentials [MZ02, NN06, YYDO01, ZYR01]. [CL02a, CL04a, LLW05, LLW09]. Credit Correction [CNB+02]. Crete [ACM01a]. crime [BQR01, CTBA+01, Din05, LN08, LW05b, [Cas02, KB00, Lau08b, Mad00c]. criminal MPSW05, SKQ01, TEM+01, Gar04]. [Men03]. criminals [Win05c]. crisis Correctness [Gui06, Wal04]. Criteria [Can01b, IBM00]. [PBD05, Bel07b, HSD+05, dH08]. criterion [QPV05]. Critical Correlated [FWW04]. Correlation [LKM+05, SE09, CS07a, Gor05, Her09b]. [BSC01b, CJS01, Gol01c, JJ00d, LV04, cron [Oue05]. Cropping [SDFH00]. Cross LMV05, MH04, Nyb01, SY01a, WRW02, [Bau02b, SM08, LCX08, SLP07]. ZC00, GG05b, JJ02]. Correlations cross-authentication [LCX08]. [KM00, KM01b]. corruption [XNK+05]. Cross-disciplinary [SM08]. cross-layer COS [FF01a, WB02]. Cost [SLP07]. Cross-Platform [Bau02b]. crowd [CDF01, FBW01, PD07, Sta05, YEP+06, [Fox00]. CRT [FMP03, Kuh02a, May02]. CL09, SHJR04, SK03, YLR05]. CRT-Exponent [May02]. crypt [Per03]. Cost-Effective [PD07]. Cryptanalyses [HW03c, Kan01, SKU+00]. cost-ineffectiveness [YLR05]. Could [Min03, Cla00b, Pau02b]. Count [Che07b]. [ASK07, AMRP00, And03, Ano07b, Ano07a, Counter BDG+01, Bao04, BLH06, BP03a, BBK03a, [DIS02, QS01, SLG+05, SL06, MMJ05]. Bar06a, BP01a, BD00a, Bih00, BFMR02, Counter-Measures [QS01]. Countering BDK02a, BDK02b, BSW01, BDD03, BD00b, [PP06b, SK05b]. Countermeasure [IIT03, BCCN01, CGFSHG09, CV02, CC01a, MMMT09, OT03a, PKBD01, YKLM02a]. CC01b, CL01b, CYY05, CKY05, CKK+02, Countermeasures CWJT01, CJT03, Cho06, Cho08b, CHJ02, 21

CP02, Cou04, CGJ+02, DG00, DGP07a, Ano01e, Ano01k, Ano01m, Bec02, BK05, DGP07b, DGP09, DN00b, FJ03, FKS+00, HGNS03, Mad00c, Mat05, Pot05, Web02, FKL+01b, FKL+01a, Fin06, Flu02a, Flu02b, Bel00, Bon03, Kil01a, Yun02a, Sei00a]. Fur01, Fur02a, Fur02b, GS07a, GM02a, Crypto-algorithms [Ano01n, CCM01]. GJSS01, GS02c, GM02b, GM00b, GBM02, Crypto-based [MC04]. Crypto-CCS GC00b, Gra02a, GS09, GKN+08, HPC02, [Mar02b]. Crypto-integrity [Yun02b]. HQR01, HAuR04, Hen06a, HLL+01, Crypto-systems [Ano01n, CCM01]. HSM+02, HHK+04, Hsu05a, HLH00, Hwa00, Cryptoanalysis [HSIR02, LD01]. JK02a, JJ00c, JJ01, JmBdXgXm05, Jou09, CryptoAPI [Bon00]. Cryptoclub [BP06]. Joy03a, KM02, KW03, KS00b, KRY05, Cryptocomplexity [Rot05, Fal07]. KW02, KRS+02, KKS00b, Kra02a, KC05, Cryptocoprocessor [HV04]. K¨uh01, K¨uh02b, KHKL05, LC03, LHL+02, Cryptographer [Joy03b, Nac01, Oka04, LP03, Lee03c, LKY04, LL05a, LR07, Poi06, Pre02c, Men05]. Cryptographers LBGZ01, LBGZ02]. Cryptanalysis [Coc03, Heg09, KLN+06, Tsa07, Bel07a, [LLH04, LL05c, LLCL08, LW05c, MS03a, Hau03]. Cryptographic May02, MG01, MHL+02, Mor05, NPV01, [AC02, AADK05, AL00a, Ano09d, ADH+07, Nit09, PSC+02, PKH05, Pei04, Pel06, Pha06, Ase02, BLST01, BDF+01a, Bar00a, PS06, PS01c, QCB05a, Sch06a, Sco04, BGK+03, Bih03, Bla01a, Bor01, BDP02, Sha03c, Sha05a, STK02, SGB01, SGK08, Bra01b, BM01c, BL08, Bur06, CC04a, SKI01, SHH07, TIGD01, TM06, TLH05, Can01b, Car02, CCDP01, CHL02, CKY07, TJ01b, TSS+03, Wag00, Wag03, WLT03, CB01, Cra05a, CS09, CO09b, DD02, WL05, WBD01, WB02, Wu02, XwWL08, DHMR07, DFM04, DS00, DWN01, DHR00, XY04, YSD02, YW04b, YW05, YKLM02a, DV08, DFG01, FIP01b, FS00, Fis01a, YKLM02b, YRY05a, YY05a, You01, YG01a, FGM00a, Fri01, GMP01a, Gar05, GSS08, YG01c, ZYR01, ZKL01, ZC05, ZK05, ZF05, GGKT05, Gol01d, GK02, GTH02, Gor02a, ZC09, dW02, AMRP04,´ BF01a, Bai08, GL00, GUQ01, Gut00, Gut02b, Gut04a, Bar09, BS01c, Buh06, Bul09, Bur02, CV05, HTS02, HN06, Har06, Has01a, HL05a, HC08, CKN06, CKL+03, Dun06, Egh00, EBS01, Igl02, IY00, Ito01, IMM01, JT05, KMO01, Eke09, Fie09, GPG06, Goo00, Jun05, KY01b, KY02b, Kil01b, KS06a, KS09b, KSWH00, Kuk01, LMSV07, Max06, Knu02, K¨us02, Law09a, LN08, LS05a, MAaT03, MAaT04, MAaT05, MAaT06, LKJL01, MS02a, MOP06, Mea01, MNP01, MAaT07, Nyb01, Pha04, RSQL03, Rup09, MRL+02, MMH02, Mor03, MK05b, MSU05, SK01a, Sel00, Sin09, SL07, SCS05b, SLL+00, NIS01a, NIS01b, Nao03, Nd05, Ngu05, Nie04, Swe08, TC00, TM01, WLW04, WF02, YI00]. OTIT01, OP01a, PKBD01, PR08, PZDH09, cryptanalysis [YJ00, YKLM03, Kat05b]. Pem01b, Pfi01]. Cryptographic cryptanalyst [Wil06]. Cryptanalytic [Pin02, Pin03, PS02b, Pot06, Pre00, Pre02a, [BS00b, KFSS00, Oec03, QSR+02, Yan07, Pre02b, RSA00d, RSA01, RR00, RRS06, Wil01a]. Cryptic [Wri05, Ano03b]. Rot01, RSN+01, SM00a, SS01a, SGM09, CRYPTIM [Ust01b]. CRYPTO [Fra04, Sha02, Shp03, Shy02, SFDF06, SVW00, Men07, Sho05a, Ahm08, Ano01n, Ano03g, SR06, SL09, TLYL04, TWNA08, TBDL01, Bau01a, Bau01b, Bur01, CCM01, CNB+02, Uzu04, WKP03, WN02, WBL01, WC01b, Gen01, Hil05, Lev01, Lev02, Mad00b, You01, Zha08, AMRP04,´ ACTZ05,´ ALV02, Mar08a, Mar02b, MC04, Mur06, Pal02, AV04, BGB09, BDSV08, Bla01b, BP05, Pem01b, SYLC05, TR09a, TR09b, Yun02b, BG08, BG09, BDNN02, BD04a, BGL+03, 22

BMV06, BR05, Can01a, Can06a, CHC04, IEE00b, IKY05, Irw03, IKOS06, IKOS08, Coh03, CC05d, CDL06, DP04, Dug04, JYZ04, JL00, JT01b, JT01a, Jue04, Kak06, DFG00, FS03a, FSGV01, GT00, GPV08, KLR09, KZ07, KGS07, Kat05b, KK06, GJ04, GM04, GB09, HW03c, HY03, IK03, KBM09, KPMF02, KWDB06, KY01c, Kir01a, IK06, IYK02, IYK03, JW01, KAM08, KSF00, KMS02, KM05, KSZ02, KS03, KWP06, KS05b, KP03, LGKY10, LMTV05, Lau05, Lam01, LGS01, LSY01, Lee03b, LLL+01, LLW05, LLW09, ML05, Mea04, MT07, Lie05, LDM04, LW05b, LP02b, Lut03, Lys08, Mic02b, MRST06, Mon03, NN03, NdM04, MNT+00, MP02, Mao01, Mao04, MSI10, NdM06, PS04a, PSG+09, PR05, Pre07, MZ04, Mau01, MAA07, MB01, MR09, Pri00, Puc06, QPV05, Reg03, Reg04, Ren09]. MS03b, Mol01, Mol03b, Mur01, Nao04, cryptographic Nie02a, Nie02d, NH02, PV06a, PY06, Pel06, [RMH04, RBF08, RAL07, RSS04, ST03a, PM02, PBB02, Poi02, PT06, Puc03, RSA00a, SV08a, SOIG07, SW00b, TNG04, RSA02, RSA03b, RS04, Rot07, RS03, RS08, kWpLwW01, WLW04, XLMS06, YLT06, Rug04, Sat06, SP05, Sch06b, Sha01b, She01, ZLX99, ZWWL01, ZL04b, dH08, BWBL02, SXY01, Sma03a, Sta02a, SGK08, Sti95, JQ04, KKP02, KP01, KNP01, RS05]. Sti01, Sti02, Sti06c, SJ05, Syv02, TSO00, Cryptographically TW06a, TG04, TMM01, TW02, TW06b, [ADD09, AHS08, BJP02, BCGH11, BFCZ08, Tro08, TR09a, TR09b]. Cryptography BB00b, FR08, MS02b, PLSvdLE10, RGX06, [Uni01, USS02, VY01, VMC02, WPS01, Aam03, AW05, AW08, Lau08a, SM03a]. Wei04, WK01, Wel05, Wie00, WvD02, Wri00, Cryptographically-masked [AHS08]. YWC08, Ytr06, YC01, YDKM06, ZYH03, CryptoGraphics [CK06]. cryptographie vDW04, Imr03, AMW07, AEH17, AN03, [RSA09a]. Cryptography AUW01, Ano02a, Ano02g, ABDS01, Ber09b, [ANS05, AF04b, ADI09, AA04b, Ano00e, BBD09, Bis03a, BSS04, BSS05, Bla03, Ano01j, Ano02b, Ano02f, Ano02h, Ano04b, BDN00, BCD06, BEZ00, BEZ01, BGM04, Ano05a, Ano07b, Ano07a, AAFG01, AIK04, BEM+07, Buc00a, Buc01, Buc04, BLRS09, AIK06, App07, AEAQ05, ABM00, Bai01a, BMA00a, BMA00b, BMA00c, CCT08, Bai01b, BINP03, BDZ04, BOV03, BOV07, CJ03c, CDFM05, CDD07, Cos00, Cre00, BBGM08, BM01a, BR00a, BY03, Ber00, DD04, Dif01, DIM08, DwWmW05, DOPS04, Ber03, Big08, BWBL02, Bla02b, BDDS03, DKL09, DW09, Duw03, Eke02, FXAM04, Bon00, Bon07, BPR01, Boy03, BLMS00, FP09, Fra01, FP00, GV09, GL05, GKK+07, BK06b, BKM07, Buc00b, BD08, BP01b, Geb04, GRTZ02, Gol99, GG05b, GHPT05, BRTM09, CPS07, Cer04b, CCL09, CSW+08, GPS05, GNP05, HH05, HHL+00, Hei03, CQS01, CPD06, Cob04, CFA+06, Cop00, HKPR05, HA00, Hig08, HKS00, Hoo05, Cor06, Dr.00c, Dam07, DFSS08, DFSS05, HG05b, HLwWZ09, IZ00, IM06, JK01b, Das08, DD00, DFGH04, DK02, DK07, Des02, Jan08b, JMV09, Joy00, KZ03, KL08, Kat01, DT03, DY09b, DSS01, DDN00, DDN03, Kil05, Kim01, Kob00, Kra07, Lan00c, Lee04a]. Dre00, DP08, EPP+07, EP05, Elb09, Ell04, cryptography [Lin01a, Lop06, Mau04, ECG+07, Ett02, FS03b, Gal01, Gal02, May01, McA08, MBS04, MM07a, Mol07, GHK+06, GKK+09, Gen06, GS02b, GH02, NP02a, Nis03a, NH03, Opp05, OS09, PP09, Gol01b, Gol01a, Gol04, GC01b, Gra01, PY05, PC09, PC00, Pin06, Pip03, Reg05, GPS06, GN06, Gri01, Gro05, HR06, HH04]. Reg09, Rot02b, Rot03, Roy00b, Rup09, Cryptography STY07, Sch02, Sch04d, SBZ04, Ser06, SH05, [HHM01, HMV04, HSS01, HPS08, Hon01, Shp99, Sil05, Sin99, Sin00, Smo04, ST01d, 23

Sti11, SK01b, TW05, UHA+09, Van03, Ban05, BF06a, BB79, CHC01, CMKT00, Vau05a, VM03, WW08, Was08b, Way02b, EBS01, EHKH04, GH08, GBKP01, HM00, Way09, Wen03, Whi09, Wri03, YC09a, Has00, Has01b, H¨uh00, HP01, KW00, YY04, YC07, vT05, For04, HC02, Kat05b, Kos01c, LL04b, LD01, Luk01, Mic01, Mis06, Pat03b, Sil01, Sma05, Bee05, Lee03a, Ree01, OS00, Pei09, PLJ05b, SSST06, Sha05c, Wal00, Was08a, MP01b, Shp04a, Kat05b, Sma01, TO01, TC05, Tsa05, Ver01, Why05, Spr03, Ter08, Ros00b]. Wol04, WPP05, WV00, YY00, ZSZ01, vT01]. cryptography-based [FXAM04]. [YY04]. CRYPTREC Cryptologic [BS00a]. Cryptological [IY00]. CSCW [ZP05]. CSP [SBS09]. CT [Lew00]. Cryptologie [dL00]. [Joy03b, Men05, Nac01, Oka04, Poi06, Cryptologists [WD01b]. Cryptology Pre02c, ZC09]. CT-RSA [Joy03b, Men05, [Bar02, Bon03, CGM07, CC04a, Fal07, Nac01, Oka04, Poi06, Pre02c, ZC09]. CTO FLY06, Fra04, JM03, Knu02, Lai03, LL04d, [Ano03g]. CTS [Con00]. Cuban [AJ08]. Lut02, MMV06, Neu04, NS01c, Ngu01, Cube [DS08, PDMS09]. Cube-Type Oka04, Poi06, Rot05, RS02, Sha03b, Zhe02b, [PDMS09]. culture [Gil07]. Cumulative dL00, Bau00, Bau02a, Bau07, Bel00, Bih03, [LG04, WP03]. cure [RD09]. cure-all Boo05, Boy01, CV04, Cra05a, DV05, Fau09, [RD09]. Current Gar01, Joy03b, Kil01a, Kim02, Lam91, LL03, [Ano03b, DFH01, PRS04, LPW06]. Lee04b, MS02c, Men05, Men07, Nac01, curriculum [FOP06]. Curve Oka00, PC05a, Pfi01, Pre00, Pre02c, RD01, [ANS05, ADI09, Ano05a, Ava03, BINP03, Roy00a, Roy05, Sho05a, Son00, Won01, Bar00a, BBGM08, BMM00, BWBL02, BS01d, WK06, Yun02a, vT00, DWML05]. BMN01, CQS01, CFA+06, GPP08, HYZ05a, CryptoManiac [WWA01]. Crypton HHM01, HMV04, HM02c, JT01b, JT01a, [CKK+02, MG01]. KBM09, KPMF02, KSZ02, KWP06, LW02, [BST02, FL06, GG01, GK05, GHW01, Hug02, M¨ol02, Kir03, OTIT01, OS01, PWGP03, KM01a, KY02c, KLC+00, LHT09, dVP06, Pel06, RSA03b, RS04, RS01, Sat06, Was08a, Luc02b, NSNK05, NBD01, Ove06, PHK+01, WPS01, XB01, YYZ01, ZLK02, BSS04, YG01a, YG01c, Zhe02a, Zho06, Bao04, BSS05, BGM04, BG07a, CCH04, Che05a, CL02b, CCH04, Che05a, Cho06, CFVZ06, CFVZ06, DIM08, DwWmW05, EHKH04, CHH01, Dan02, DHL06, EKRMA01, GBKP01, Has01b, Hsu05a, HL05d, JMV09, GHdGSS00, GS01, GC00b, GMW01, Hen06a, JW06, LL04c, LWL09, Mis06, OS00, ST03a, Iwa08, JW06, KY09, LL04c, LL06, LKYL00, SSST06, SH05, Sma01, SCL05, SLC05, Loi00, LS01c, OP01b, Pae03, Poi00, SPG02, TC05, Van03, Ver01, Wol04, WPP05, YC09a, SCS05a, SP79, SLC05, Sun00b, Sun02, SZP02, YC09b, ZSZ01, ZL05, vT01]. Curve-Based TJ01b, TJ01a, VS01, War00, YC09b, hY08]. [KWP06, Pel06]. Curves [AHRH08, Bai01a, BB00b, CY02, Gal01, GLV01, Gau02, [Aki09, Ava03, BDG+01, BKLS02, BPS00, GHK+06, Kid02, PWGP03, Ver02, CMKT00, BMM00, CHSS02, CCW02, DDG+06, Hus04, LWZH05, MP01b, MSV04, Sil05, DKXY02, ESG+05, FJ03, Fel06, FP01, Sim02, SC02b, Was08b, Wen03, Yas08]. HJW01, IZ00, Jou02, JQYY01, KY02a, customer [Lin01b]. CVS [DFG01]. Cyber Kim01, KLY02, KKY02, KI01b, KM04b, [FNRC05, WW04, Mad00c, Mau05]. Kos01b, LZ04, LP01, MA02, NP02a, NSS02, cyber-crime [Mad00c]. Cyberinsurance OTU00, OS01, PWGP03, ST01a, SKQ01, [BP07]. Cybersecurity [PLW07]. SKG09, Ste01, Vad03, Wya02, XB01, ZLK02, cyberspace [Mit02a]. cycles 24

[ABHS09, BPS08]. Cyclic [PG05, Mic02a]. [LKH+08]. Dead [Gut02a]. deaf [Pau02b]. Czech [MJ04]. Dealer [DK01, Sun00a]. Dealing [BH00a, BC05b]. death [For09]. Debate D [Duw03, Ben00, ChLYL09, CT09, DNP07, [Jol01, Mad00a]. Debian [YRS+09, Ahm08]. Lav09, OMT02, WH09, ZTP05]. D.R Deblur [VHP01]. Debugger [Ano02d]. [Irw03]. dad [Che05b]. dæmons [Mos06]. Debugging [Ano02d]. Dec [IEE09a]. Damg˚ard [CDMP05]. dark [Blu09]. decades [Lov01]. decades-old [Lov01]. darkening [CDD07]. DARPA [Coc01a]. December Data [ACM03a, ACM04a, ABM08, Ano02a, [ACM05a, Boy01, CV04, DWML05, FLY06, AAC+01, BGHP02, B+02, BS00b, BNPW03, Hon01, JM03, Kim02, Lai03, Lee04b, LLT+04, Bro05b, Che01a, CTLL01, DBS01, EBC+00, Li05, MMV06, MS02c, Oka00, PC05a, Elb09, FMA02, FLA+03, GA05, GMM08, Pat03b, RD01, Roy00a, Roy05, Sma05, Son00, GTTC03, HLL+02, Ken02a, Ken02b, K¨us02, USE00c, Uni01, Won01, WK06, Zhe02b]. Lan00b, LLRW07, LP00, LHS05, LS08, Decentralized [MSP+08]. deception Lut03, MND+04, MS03b, MFS+09, [CS07a, Mah04, MS02d]. Decidability NNAM10, NM09, OS05, Per05a, RKZD02, [K¨us02]. Deciding [Bau05]. Decimal RK06, Sal03a, Sal07, Sin01a, SK03, SDMN06, [BJvdB02]. Decimalisation [BZ03]. TZDZ05, TPPM07, VDKP05, WS05, WY02, Decimation [Fil00]. decipherable WN02, kc01, vW01, AMB06, AG09, Ade09, [aSM01, Sav04]. Deciphering AHK03b, AKSX04, Ano02c, Arn01, Bla00, [Eri02, KB07, Ark05, Bau08, Lov01, NS01a]. BNP08, CCMT09, Cer04a, CO09a, CLR09, Decision [DJ06, GR04, KM04a]. CPG+04, DZL01, DGMS03, FS04, HILM02, Decisional [CU01]. Decisions LLK05, MJ03, Mal06, Men03, MI09, PY05, [Coc02a, Sch07]. Decodable [Yek07]. Pin02, Pin03, Sal05c, Sch00a, Sch01c, S+03, Decoding [KY02b, LBGZ01, LBGZ02, Sch04a, Sch04b, Sch05a, SGPH98, SETB08, Rai00, AGKS07, Bul09, Eva09]. WMDR08, YLC+09, YC08, ZSJN07, Zir07, decomposing [FP09]. Decomposition AEH17, Cur05, DK08, Lin02, Pap05]. [BR09, CL04c, SC02c]. decompositions Data-Hiding [VDKP05]. Data-Oriented [vDKST06]. Decorrelation [NNAM10]. data/image [Sch00a, Sch01c, [CLLL00, Vau01]. decrypt [Bih02]. S+03, Sch04a, Sch04b, Sch05a]. Database Decrypted [Bau00, Bau02a, Bau07, MB01]. [ACM03c, ACM05b, BI05a, BBPV00, KS02, Decryption [Bar00b, BST02, CS03a, SVEG09, Gal02, HILM02, Mau04, PS08b, CCD07, FPS01, HGNP+03, Int00, KCJ+01, PBVB01]. database-service-provider Ano08a, Che01e, DZL01, GH08, Mil03, [HILM02]. Databases [AK02b, CDM+05, OS07, Shp04b, SWH+09, Whi09]. DN04, AHK03a, CDD+05, CKY07, GA03, Decryptor [TPS01, Zol01]. DeCSS MSP09, MNT06, NS05b, UG08,¨ YPPK09]. [Coc02a]. Dedicated [ISO04]. Deep Datamining [DN04]. [CMS08]. Defeating [CSK+08]. Defective Datenverschl¨usselung [Lin02]. David [BTTF02, Dav01b, Dav01c, KLR09]. [Gas01, Pap05, Bar05, Eag05]. Day Defending [NRR00, Pro01]. Defense [SE01, CSW05, Win05c]. Days [GK02, HW01, Mir05, Wyl05, Bol02]. [Adl03, Riv03, Smo04]. DC [USE01c]. DCT defenses [SL06]. defined [Yas08]. [BSC01a, BSC01b, CH01b, KT00, LY07, Definition [YWD08, SNI00]. Definitions LSC03]. DCT-Based [LY07, LSC03]. DDH [Uni01, AH05]. Definitive [Lys02]. DDO [LKH+08]. DDO-64 [BS01a, BSB05, Gar03b]. defying [HRS08]. 25

Degenerate [Ber09a]. Degradation SRQL03, Uzu04, WZW05, WW08, WLLL09, [BSC01a]. Degree [CV02, QPV05]. ARJ08, Ade09, CMS08, GG05b, Gut04c, Degrees [Sat06]. D´ej`a [DP00]. DeKaRT HC04a, Hut01, KSF00, MI09, MWM01, [Gol03]. Dekker [Irw03]. Delacorte SVEG09, YCW+08, YC08]. Design/CPN [Imr03]. Delay [WRW02, NS01a]. Delayed [AADK05]. designated [LV07]. Designing [JM07]. delegated [CL04c]. Delegation [HBC+08, MRT10, TCR03, C+02, CG05, [WN02, ZP05, MW06]. Delhi [JM03, RM04]. Lan00c]. Designs Delivers [Ano02e]. Delivery [Bee05, CC02a, Bai08, Des00a, WL07a]. [NZCG05, RMCG01, DY09a, NZS05]. Desktop [Mun08, BDET00]. Desmedt Delphi [TEM+01, Hei01]. Demand [CHH+09]. Desynchronization [CDTT05]. [BD03, CMB+05, SEF+06]. Demilitarized Detached [Sha01c]. Detailed [Lut03]. [Kum07]. Democracies [CZB+01]. Details [Scr01]. Detect [FOBH05]. Democracy [CTBA+01]. Demography Detecting [Coc03]. Demons [Mos06]. demonstrably [CMS09, FGD01, JQYY01, Har07a, LHL04a]. [HL06]. demystifying [RR04]. Deniability Detection [Pas03]. Deniable [Nao02, CCK04a, [AS01b, AD07, BB00a, BKM07, CH01b, CSK+08, DG05, LC05b, YRY05c, Zha06]. CZK05, JT05, KKG03, SKQ01, SY01a, Denial [Mah04, Nik02a, Nik02b, PKBD01, SLT01, ST01c, TZDZ05, TMMM05, WG05, Ril02, Mir05]. Denial-of-Service YI01, Zan01, Bej06, BBK+03b, HLL+02, [Nik02a, PKBD01]. Denmark Men03, NN02, WMS08, YW06, ZGTG05]. [Cra05a, TBJ02]. Denver Detection/Correction [SKQ01]. Detector [ACM01b, Sch04b, USE00d]. Department [BSC01b, DNP07]. Determined [KKH03]. [Bol02, Eri01]. Dependable Determining [KS03, LQ08, OS07]. [NABG03, And08b]. Dependent Deterministic [Gol03, WS05, BPS08, SK03]. deployed [BK06a, Her06, KZ03, KZ07, May04, BK07]. [BDET00]. Deploying [BH00b, GSB+04]. dev [BH05]. Developers Deployment [CL07, KDO01, Mur01, [Ano06c, Dew08, MK05b, Nis03a]. Sin01a, App05, JRR09]. Dept [Uni01]. Developing [MV03b, Cra05b, Gal02, HL06]. Depth [BI05a]. Derandomization Development [Ano02e, CNB+02, Dam07, [BOV03, BOV07]. Derivation [DGH+04]. HF00, WA07, HL06, Lov01, Sha01a, Mar05a]. Deriving [BJP02, CSW05]. Developments [Ano03g, Pre07, Sha04a]. DES-encrypted [Bih02]. DES-like develops [Pau02b]. Deviates [Egh00, EBS01]. Desch [LBA00]. [Ran55, Ran01]. Device Describing [PS06]. Description [Ric07, ST03b, WPS01]. Devices [Lav06, MH05]. Descriptors [BCH+00, CFRR02, Dam07, EP02, GST04, [DNP07, SP04]. Design Hei07, JP02a, JW05, Kha05, KHD01, MV01, [Abd01, AADK05, Ano02e, ADD09, AIK+01, MRL+02, SCF01, WC01a, Ano06a, CMS08, ARC+01, Bar00b, Can01b, CCDP01, Cim02, CF07, DMT07, sHCP09, Tse07, YC09b, CB01, CS03b, CMB+05, CLZ02, DR02a, ZYW07]. Devil [Bla01c]. DFT [Che08a]. DR02b, DS09, DF07, EHK+03, FF01a, DH [Lys02]. DHIES [ABR01]. DHP FZH05, GSS08, Geb04, Gut02b, Gut04a, [MSV04]. Diablerets [Vau05a]. Diagnosis HRL09, Hro05, Ken02b, KB09, KDO01, [Ano04b, BK06b, XNK+05]. Diagnostics Lan04a, LCP04, LL04c, LB05, MKP09, [NM09]. Diagonal [PJH01, PJK01]. MP00, Nd05, NSS02, Rhi03, SJT09, SPG02, Dickson [SZP02]. Dictionaries [AGT01]. 26

Dictionary [BPR00, BCP02b, CS07b, DJ06, AAPP07, AA08, Ano00i, Ano01p, Ate04, Pho01, NS05a]. did [MH09]. Diego BLH06, Bra01a, Cal00a, CS08a, CWH00, [ACM03a, ACM03b, ACM03c, ACM07, CL00, CJ05, Che07a, Che00b, Die00, FB01]. Sch00a, Sch01c, Sch04a, Sch05a, USE00b]. digital Dies [Bar00a, Coc01a, Mat05]. difference [GGK03, Gil07, HRL09, HLC07, HLH00, [PBMB01, dW02]. Differencing HHC05, KP00, LG04, LG09, Lev01, LLC06b, [LS08, WWTH08]. Different MKY08, NRR00, PC05b, PLJ05a, PBV08, [CGMM02, Sma01]. Differential [Ava03, QCB05b, Ree03, Sha01d, Sha04b, Sha05d, BMM00, BF00a, BFMR02, BDK02a, Cry00, SCL05, TCC02, TND+09, UP05, WNQ08, CV02, CKK+02, CKL+03, Eke09, Fur02a, WHLH03, WC05, XC05, XMST07, Ano09b, Gra02a, HLL+01, HSM+02, HHK+04, IIT03, Ano13, BCKK05, CDS07, CKL05, FIP00, JT01a, Kan01, KM02, KCP01, LHL+02, Fox00, Gen00a, KCR04, Nat00, PK03, SA02]. MP06, MMMT09, MHL+02, MG08, PSC+02, Digital-Audio [WNY09]. PQ03b, SK01a, SKU+00, SKI01, YSD02, Digital-Signature [Eng00]. Digits vW01, BF01a, CUS08, Che08a, DLP+09, [Che04b, Ran55, Ran01]. Dimension Egh00, EBS01, Pha04, SLL+00, TM01]. [DDG+06, TZT09a, TZT09b]. Dimensional Differential-Linear [BDK02a]. [XYXYX11]. Dimensionality [SBG02]. Differentials [BF00b]. Difficult dimensions [CLR09]. Dining [KLN+06]. [Bud00b, MT02]. Difficult-to-pass [MT02]. diplomacy [Alv00]. Direct Diffie [Jan08a, ABR01, ASW+01, BS01d, [BMW05, KG09]. directional [PJK01]. BMP00, BCP01, BCP02a, BCP02b, BCP07, Directions [Sha01b, DFH01]. directly CY08, CU01, CJ03a, CKRT08, FS01b, [JZCW05]. Director [Mad04]. directories GR04, Kil01b, KK02, KM04a, Kra03, Kra05, [C+02, Pet03]. directory [C+02]. disabled Miˇs08, Tsa06, YRY05c]. diffuse [Wal04]. [Pau02a]. disadvantage [CDS07]. diffuser [Fer06]. diffusing [She01]. digest Disappear [Per05a]. Disappearing [MSP09]. Digit [Way02b, Way09]. disappointed [Ste00]. [KWP06, Tan07a, BG09, HKPR05, Kir01b]. Disaster [WCZ05]. disciplinary [SM08]. Digital [ANS05, AvdH00, AR00, AS08, disclosure [JM07, Swi05]. Discover Ano01g, Ano02d, ABRW01, Bar00a, Bar06b, [Eva09]. Discovery BL08, BDS09b, Cal00b, CCH05, CC09, [Bi09, HLL+02, SBG07, SGA07]. discredits Che01b, CFS01, CMB02, CMB+08, CZB+01, [Ano09c]. Discrete [CS03a, CNS02, Che04b, CGJ+02, DSP01, EIG01, Eng00, EHK+03, CCW02, Gen00b, GV05, GPP08, KC09b, HSZI00, HSZI01, Han00, HS01b, HHGP+03, LW02, LJL05, VK07, HN04, HW03a, HW01, HLT01, JBR05, KZ01, Kal01, KC02, HWR09, Hsu05a, HL05d, JL03, JLL01, Kuh00, Kwo02, Kwo03b, LZL+01, LLL+01, LHL03a, LL04b, LHY05, LTH05, PLJ05a, Lin01b, LWL09, LL01, Lut03, Mad00a, QCB05a, Sch01e, Sha05c, Sha05d, SWR05, MM01a, MM02, MSI10, Meh01, PL01, PJH01, SCL05, SLC05, SCS05c, Yas08]. discretized PCG01, PZL09, PBM+07, Ram01, RdS01, [MA02]. Discryption [Har07b]. discursive RS01, Sam09, Sch00d, Sch06b, Scr01, Sha01e, [Mit02a]. Discussion SC02a, Shi08, SLT01, Sug01, TMM01, [Ano01a, Ano01b, Ano01c, Ano01j, Ano01n, TJC03, USS02, VHP01, VK07, WNY09, Ano01f, Ano01o, KLB+02a, Mal02, Nik02b]. Win05a, WBD01, Wu01, WV01, WC03a, dish [Ano01l]. Dishonest [GKKO07]. WC04, Wya02, XFZ01, XYL09, YWWS09, disjoint [Gut04c]. Disk YYDO01, YYZ01, ZWC02, Zho02, ZCW04, [Cro01, Har07b, Siv06, CS08a, Fer06]. 27 dismantles [Hil06]. dispatches [Kee05]. [BR01, CLK01a, CLK01b, Vau01]. displayed [CGV09]. Displays [Kuh02a]. Domingo [CKN06]. Dominic [Rot07]. Disputed [CAC06]. Distance Dominica [PY05]. domino [CGFSHG09, CPhX04, DM07b, DW01]. [LLLZ06a, LLLZ06b]. don’t [Win05c]. distinguished [HWW04, WH02b]. Don’ts [FSSF01]. DONUT [CLLL00]. Distinguishing [HSR+01]. Distortion Door [SF07]. Doors [Eri02]. [BGI08, CS05c]. Distortion-Free [BGI08]. DOS-Resistant [Ano01f, ANL01]. Double Distortions [HH09, SDF01]. Distributed [ADDS06, CY08, CMJP03, Coc02a, DIM08, [BCS02, BT02, CLK01a, CS08b, CD01a, GH08, GB09, Hau06, JSW05]. double-base DS03, EP05, FM02a, FS01a, GJKR03, [DIM08]. Double-Gate [Coc02a]. GSVC02, GTH02, LLY06, SCF01, WT02, Double-Size [CMJP03]. double-trapdoor And08b, AFGH06, BDET00, CO09b, [JSW05]. Doubling [FV03]. Douglas FMY02, KKL09, LN04, LLW08a, MSP+08, [Spr03]. Down [BBPV00, Coc02b, Ano00g, PS08a, Raj06, WZB05, YbJf04]. Ano03d, Ano03a, Pot03, PBVB01, Ste05c]. Distribution [BDF+01a, BOHL+05, Downwards [FV03]. DPA [SGB01, TV03]. BBB+02, BGM09, BSNO00, FS01b, Ina02a, DPA-Based [SGB01]. Dr [Ano03g]. Dr. Ina02b, Ku02, LLL02, NA07, Sch01a, YI01, [Dr.00c]. Draft [Mad00b, Ste00, Dwo03]. ATS04, Asl04b, Bad07, CYH04, CCD06, drastic [Sug03]. drawn [vOT08]. DRBG GL06b, MP08, SLP07, Shp01, Shp04b, SY06, [Hir09]. Dress [Ahm08]. drinks [Ano03d]. WHHT08, YS04, ZLG01]. Distributions Drive [NP07, Kor09]. DSA [CY08]. Diversity [Kun01]. Divide [MR01a, SA02, Sha01d, TvdKB+01]. [SKQ01]. Division DSA-type [Sha01d]. DSEA [HZSL05, KKY02, Tan07a, Che08b, MN14]. [LLLZ06a, LLLZ06b]. DSP Divisor [KM01a]. DL [Geb04, WWGP00]. DSP-embedded [HRL09, PLJ05b, Sch01f, Sch01e, WMDR08]. [Geb04]. DSPs [WWGP00]. DSS DL-based [HRL09, PLJ05b]. [Ano09b, Ano13, FIP00, Nat00]. DTD DL-encryption [Sch01f]. DL-keys [Sch01e]. [PCK02]. Dual [HLC07, KHY04, LKLK05, DL-STDM [WMDR08]. DLP [MSV04]. SF07, WCJ09, ST03a]. dual-field [ST03a]. DM [Eag05]. DNA [AEH17, GPX08]. DNF Dual-Pair [WCJ09]. Dual-Tree [LKLK05]. [BGN05]. DNS [Her09b, Kle07]. Dual-wrapped [HLC07]. Dumb [Eri01]. DNS-based [Her09b]. DNSSEC [Gue09]. Dummies [Cob04]. Dump [KCJ+01]. Do [Bur06, HSR+01, HR04b, Win01, BB79]. Dunaynir [MAaT05]. d’une [Car00]. Dobb’s [Dr.00c]. Document [ISO05, Durahim [MAaTxx]. Durayhim’s PJH01, ST01c, VHP01, CDS07, CL04c]. [MAaT04]. during [AJ08, Bec02, WA07]. Documents [PJK01, AW05, AW08, Dust [KGS07]. Dutch [dL00]. Duty DGK+04, GA03, UG08].¨ dodging [Phi06]. [ZGLX05]. DVD [Gei03, Per05b]. Dwork Does [AB01, Pie05, Con09, Wal04]. Doing [DNRS03, GK05, Zha06]. DWT [BM01a]. Dolev [BPS08, BDNN02, ZD05]. [LHS05, PBC05]. DWT-Based [LHS05]. Domain [AS08, Bar00c, BSC01a, BSC01b, Dynamic [AFB05, BNP08, BCP01, BSL02, CJK+04, Cor00b, Cor02, DOP05, BCP02a, BFM07, CL02a, CW09, CCD+04, DNP07, GW01, ISSZ08, Kuh02a, Lan00d, CTT07, GTH02, HQ05, Pat01, Sug03, TT01, LZ01, MM01a, OMT02, PBC05, SOHS01, BBG+02, GL06b, HW03c, LCP04, LLY06, SDFH00, ZLK02, BR06, CS05a, DSP01, LCK04, LCC05, RG05, Yi04]. dynamic-key EKRMA01, Zir07]. Domains [LCP04]. dynamics 28

[BGP02, sHCP09, jLC07, MR00]. CJT02, Chi08a, CJL05, CT08b, CKK03, dynamics-based [sHCP09, jLC07]. Cou01, Dam00, DN03, Dhe03, FF00, Fis05, FS01c, GLV01, GC01b, GTH02, GST04, E-business [Poh01, HHSS01]. GBKP01, HCJ02, HSZI01, Has01a, HS00, E-Commerce [Kir01a, TMM01, BM03a, HW04, HZSL05, HL07, H¨uh00, HS07, Jua04, Gra01, SN07, Sta00, MY01]. E-Goods KOY01, KOY09, KLY02, KO03, KHD01, [NZCG05]. e-Government [RM02]. KKH03, LSY01, LCK01, LKY05a, LKY05b, E-Learning [CAC06]. e-mail LC05a, Mac01, MV03a, MP01c, MN14, Nd05, [Che01f, LL04c, NZS05, Smi03, All06, NSNK05, OS01, PCS03, PBD05, Ram01, ANR01, KS00a, Law05]. e-mails [LG09]. RSQL03, RDJ+01, SM01, SM03a, SW06, e-payment [Has02]. E-Security [NDJB01]. SRQL03, SSNGS00, Tsa08, TC05, WHLH05, E-smart [AJ01b]. E-Vote [Che07b]. WYY05d, WHI01, WC01a, XB01, XS03, e-voting [CJT03, Cha04]. E-Wallet YWD08, YLH05, Zan01, Zho06, ACTZ05,´ [ETZ00]. E0 [LV04]. [SKU+00]. Early AFB05, Bla01b, CC04b, CC05c, CY05, [ASW+01, Nik02a, Nik02b, Pag03, Riv03, CHC05, CLC08, DS09, Dew08, DwWmW05]. Bur02, Cal00d, Smo04, ZGTG05]. Easier efficient [FP09, FSGV01, HHG06, HC04a, [Pau09]. Easy [GR04, Hos06b]. JW06, KHYM08, LPV+09, LLS+09, LCK04, Eavesdropping [Kuh02a, Kee05]. LLH04, LYC02, Mic02a, MSP09, NR04, ebanking [WDCJ09]. eBook PCC03, RG05, RBB03, SLP07, SKW+07, [Ano02d, WWL+02]. EC [SF07]. ECC Sha05b, SC05a, WK05, XC05, Yan02, [BWBL02, CL09, Miˇs08, Tsa05]. YTWY05, YC09a, ZSN05, ZYW07]. ECC-based [CL09, Tsa05]. ECC2K Efficiently [IKNP03, NNT05, AGKS07]. [LM08]. ECC2K-130 [LM08]. ECCV effort [Weh00]. efforts [Pau02a]. Eggs [MJ04, TBJ02]. ECDSA [ANS05]. Eclipse [Wei06, Wei05]. EGPGV [MFS+09]. Egypt [Coc02b]. ECMA-305 [ECM00a]. [EBC+00, Imr03, Sin00]. Eighth ECMA-306 [ECM00b]. economics [Ble07]. [ACM06, B+02, ELvS01, IEE01b]. Einstein ECPP [Che03]. ed [Gum04, Nis03a]. Edge [HR13, MNT+00]. EJB [TEM+01]. Ekert [Sta05]. Edinburgh [RS05, Pem01b]. Edit [Duw03]. El-Gamal [EKRMA01]. Election [CGFSHG09]. editing [MAaTxx]. Edition [JLL02, Cal00b]. Elections [Cha04, PvS01]. [Cho08a, Irw03, Spr03]. Editor Electrical [Wal04]. Electromagnetic [MFS+09, Sak01, KP03, SK06]. Editorial [SGM09, QS01]. Electronic [Eri01, Eri02, FOP06]. Editors [Ble07, CLK01b, CM02, Dur01, H¨of01, [BK06b, PTP07, SJT09, SGK08]. EDK ISO05, IY00, KMO01, KS02, Lan04b, LLL02, [Ano02e]. Eds [Duw03, Pag03]. Education Mad00a, MNFG02, Rub01, RMCG01, Str01a, [Puz04, RC06, CAC03]. Effect [AEV+07]. YKMY01, ZYM05, AvdH00, AAKD09, Effective [CDR01, PD07, Sen03, SL06]. Cal00a, Cas03, EY09, FB01, HJW05]. Effects [BBGM08, Har00, GJ04, SN07]. element [MS02d]. Elementary Efficiency [III00, GGKT05, SLG+05, GT00, [Sin09, Ste08, Tat05]. Elephant [Fer06]. GGK03, KT06, YTH04]. Efficient Eleven [All03]. ElGamal [BJN00, CL02b, [ACS02, ABRW01, AEMR09, BCGH11, CWH00, HL04, LHT09, SJ00]. Bai01b, BINP03, BKLS02, BR00a, BGHP02, ElGamal-like [CWH00, HL04]. Elizabeth BDSV08, BGK+03, BS00a, BF01c, BGH07, [Bud06]. Elliptic BB00b, BCDM00, CKPS01, CL02a, [ADI09, Ano05a, Bai01a, BINP03, Bar00a, CCMT09, CCD07, CL01b, CPhX04, CM05a, BBGM08, BMM00, BS01d, BMN01, BB00b, 29

CQS01, CFA+06, GLV01, Gau02, GPP08, [BBK03a, BGHP02, BGLS03, CD01b, Hug04, HYZ05a, HHM01, HMV04, HM02c, Hus04, Lan04a, LH07, MMZ00, NNAM10, RMCG01, JT01b, JT01a, KBM09, KPMF02, Kid02, Sta02b, Vau01, WRW02, Whi09, Woo00, KSZ02, LW02, MP01b, M¨ol02, Kir03, AMB06, Ano06a, Bih02, BNP08, CCMT09, OTIT01, OS01, OT03b, PWGP03, RSA03b, CDD+05, CSK+08, FJ04, HILM02, Hes04a, RS04, RS01, Sat06, Sil05, Was08a, Was08b, LHL04b, LSH00, MW04, Pet03, UG08].¨ WPS01, XB01, YYZ01, vT01, BSS04, BSS05, Encrypting [Pro00, RC01, Zho06]. BGM04, BG07a, CCH04, Che05a, CFVZ06, Encryption DIM08, DwWmW05, EHKH04, GBKP01, [ABC+05, Abe01, AS01a, Abe04, AEH17, Hsu05a, HL05d, JMV09, JW06, LL04c, AP09, AB01, ADR02, And03, Ano01g, LWZH05, Mis06, MSV04, OS00, ST03a, Ano01h, Ano01i, Ase02, ANR01, AFI06, SSST06, SH05, Sim02, Sma01, SC02b, SCL05, AF03, Bar00c, III00, Bau02b, BN00a, BR00a, SLC05, TC05, Van03, Ver01, YC09a, YC09b, BBM00, BBDP01, BU02, BF01b, BF03, Yas08, ZSZ01, ZL05, ANS05, BWBL02]. BB04, BGW05, BCHK07, BGH07, BPR+08, Ellis [Coc01a]. Elmau [IEE01b]. Else BB03, BNPW03, BD03, BKY02, Bur03, [FL01b]. elude [Che01f]. EMA [QS01]. Cal00d, Cal00e, CD00a, CS03a, CHK03, Email [ES00b, Gar03a, Her09b, Luc06]. CHK05, CGHG01, Che01a, CTLL01, Chi08e, Email-Based [Gar03a]. emanations Cho08a, CMR06, Cla00a, Coc02b, Coc01b, [ZZT05]. Embedded CJNP00, CHJ+01b, CDN01, CS02, CS03b, [Ano01c, Ano02d, Ano02e, BBGM08, Dri02, Cro01, Cur05, DS03, DR01, DR02b, DR02c, DV08, GSS08, JT05, JQ04, KKP02, LPW06, DN00a, DN03, Dan01, DJ06, Des00a, Des00b, NdM04, RS05, SPGQ06, WKP03, YSS+01, Des00c, DL98, DR02d, DA03, DFK+03, ARJ08, BGM04, Fox00, Geb04, KVN+09, DK05, DS05b, Dri02, FIP01a, FL01a, GC01a, KP01, KNP01, KP03, MBS04, Nis03a, GSW00, Gen03, GRW06, GH05, GD02, TKP+08, XQ07, Fin02]. Embedding GMM01, Gutxx, HSH+08a, HS02a, HYZ05a, [AAK09, JX05, JG07, LSC03, Sal03b, WY02, HSHI02, HSHI06, HKR01, HWW05, Har07b, WC04, CO09a, KC09a, Wan05]. Embrace Har00, Hei07, Her09a, HS00, HR05, HG03]. [CNB+02]. Embracing [Ano03d]. EMD Encryption [HL02, HGNP+03, HLL05, [BR06]. Emperor [Smi01b]. Empirical HLC08, ISSZ08, Joh03, Jol01, JK02b, JK02c, [HW03b, Goo00]. empirically [SS03]. JMV02, JKRW01, Jut01, KBD03, KSHY01, employee [You04]. Emptiness [DIS02]. KS00a, KY01a, Kha05, KKJ+07, Kos01a, Emulex [CZB+01, CTBA+01]. Enabled Kra01, Kur01, KD04, Lai07, Lan00a, Lan00b, [Por06, CCCY01, DY09a]. Enabling LP03, LHT09, LY07, LLRW07, Lin03, [Web02]. encapsulation [CHH+09, KG09]. LNP02, LMV05, LCD07, Man01, Mar07, Encipher [BR00a]. Enciphering Mar08a, Mar08b, MF01, MM01c, MP01a, [HR03, KT01]. Encode MP00, MP05, M¨ol03a, Mor05, M¨ul01a, [BR00a, BKN04, Ano08c]. MS09d, NIS00, Nam02, NZCG05, NZS05, Encode-Then-Encipher [BR00a]. NP02b, Nie02b, PV06b, PM00, Pau09, Encode-then-Encrypt-and-MAC Pem01a, PZL09, PDMS09, Pha04, Por01, [BKN04]. encoded [WMS08]. Encoding PS00, Pre01, RM04, RK06, RDJ+01, Sam01, [JT01b, RS00, Lin02]. encounter [Win05c]. Sch00b, SJ00, Siv06, SB00, CAC06, SRQL03, Encountering [Wol03]. Encrypt SPGQ06, SBZ02, Sye00, TV03, Uni00a, [BKN04, BTTF02, Dav01c, Pet05, Dav01b]. Uni00c, Uni00e, Uni00d, Uni00g, Uni00h, Encrypted Ust01b, VMSV05, WZW05, WBRF00, 30

Wri01, YEP+06, YW06, ASW00, Abd01, Energy-efficient [LPV+09]. ABHS09, AKSX04, AMRP00, ABW09, Energy-security [Ino05]. enforce [SN04]. Ano00e, Ano00c, Ano00f, Ano00g, Ano00h]. Enforcement [GN06]. enforces [BP05]. encryption Enforcing [GMM08, HRS08]. Engine [Ano00j, Ano02a, Ano03g, Ano06d, App05, [Fri01, MMH02, DP04, SHL07]. engineer Ate04, ACdM05, AFGH06, BPS08, BKN04, [Pau02b, SN04]. Engineering BR04, BBN+09, Ber09a, BBK+03b, Bir07, [CNB+02, MNT+00, MYC01, Pem01b, Bla00, BJN00, Bro05b, CG06, CS08a, Roy00b, SM07b, TR09a, TR09b, VH09, CBSU06, CHC01, CKRT08, DZL01, DL07, And08b, EC05, Jen09, Man08, Wal04]. DRS05, DW01, Fer06, FB01, Fox00, FMS05, engineers [Pri00]. engines [PM08]. GMR08, GGK03, Gen09a, Gen09b, Enhance [ZWC02]. Enhanced GKM+00, Gou09, Gua05, Gut04c, HSH+08b, [JKRW01, LHL04b, ZGLX05, CZ03, McK04, HSH+09, HS02b, HHYW07, HCD08a, OP01b, TWL05, WLT03, WHH05, ZSM05]. HCD08b, HAuR04, HWW02, Hsu05a, enhanced-security [OP01b]. Hwa05, HL05c, HL05d, IM06, JK01a, JK01b, Enhancement [CJ05, FLZ02, LSH03a, JXW05, JSW05, JZCW05, KY00, KJ01, LSH03b, SLH03, YW04a]. enhancements KSW06, KHL09, Kor09, KW00, Kre05, [ADH+07]. Enhancing K¨uh08, Laf00, LV07, Lee01, LCP04, LJ05a, [BDK02a, MS05a, SE09, Sun00b, DY01]. LMC+03, LLLZ06a, LLLZ06b, LLCL08, enigma [Rob02, Rob09, BCB+05, Cas06, LB05, Lu02, Lud05, LK01, LWK05a, Mad04, Chu02, Cop04b, DB04, GO03, Goo00, Joy00, Mar05b, Mat02, M¨ul01b, Mun08, NK06, Kap05, KS04, SM00c, SM05, SM07a, SE01, OS07, PBMB01, PS01a, Pau02a, Pau03, Thi03, Wil01a, Win05b, Win00]. Enigmy RG09, Rhi03, RBB03, RSP05, SNI00, [Kap05]. Enough SKW+07, Sch00a, Sch01c, S+03, Sch04a]. [CNB+02, Pat03a, Ano03e, YJ00]. encryption [Sch04b, Sch05a, Sch01d, Sch01f, Enrolment [HWH01]. Entangled SH11, SM11, SR00, SVEG09, Shp04b, SK03, [Bar00c, LB04]. Enterprise [BH00b, C+02, Ste00, SP03, SWH+09, Tan01, TTZ01, HM05, MJF07, App05, TCR03]. Entropic TOEO00, TM01, TLH05, Uni00b, UP05, [DS05b]. Entropy VKS09, WG02, Weh00, WN95, Wol03, [DS05b, EHMS00, LH07, JRS09]. WH02a, XY04, XSWC10, Yan02, YGZ05, Entzifferung [Bau08]. Environment YZEE09, YC07, ZLG01, ZL04a, ZAX05, [BST03, DeL07, HS01b, LSVS09, IM06, ZW05b, ZL05, ZFK04, ZD05, CHKO08, KKL09, KB00, Rhi03, Whi09, ZBP05]. CHJ+01a, RR04, Uni00f, Wue09, Jan08a]. Environmental [PS05]. Environments encryption/cipher [HAuR04]. [CJK+04, LKHL09, BGM04, MNS08, encryption/decryption [OS07]. SBG05, SBG07, SN04, YC09a, YbJf04]. Encryptor [LMP+01, TPS01, Ano00a]. ephemeral [Miˇs08]. Ephemerizer [Per05a]. Encryptor/Decryptor [TPS01]. EPOC [JQY01]. ePOST [MPHD06]. EPR Encyclopedia [Bid03, vT05]. End [Ina02b]. Equation [FJ03]. Equations [KCD07, Per03, SKKS00, WWGP00, YSR01, [CP02, DDG+06, GS03, PBMB01]. AMB06, SU07]. End-to-End Equipping [DMT07]. Equitability [YSR01, AMB06]. Ended [K¨us02]. [DBS01]. equivalence Endomorphisms [GLV01]. Endpoint [Fis01a, LQ08, MSV04]. Equivalent [Kad07]. Enemies [DM07b]. Energy [Fer00, KOMM01, May04, SIR04]. Era [GC01b, Ino05, LPV+09, SLP07, Miˇs08]. [MP00, Uni00c, Bur00, Uni00f]. erasure 31

[PCS03]. Erasures [JL00]. Erich [Bau08]. [CTBA+01]. Everywhere [Ber00]. ERP [LSZ05]. Erratum Evidence [Ver01, Bro05a, HW03b]. [AGGM10, Kwo03b, LLLZ06a, McK04]. Evolution [DF01, Ree01, Pat02a, Ros00b, Erroneous [CH01b, MNT+00]. Error SP02, Sin99, Sin00]. evolutionary [BBK+03b, BQR01, Din05, KKG03, LW05b, [LMSV07]. Evolved [LMHCETR06]. Exact LM02, MLC01, MPSW05, MZ02, NN06, [Cor00b]. examines [Nis03a]. example SKQ01, YI01, YYDO01, ZYR01, Zol01, [Bla00, GC05, Zir07]. Exchange Gar04, LHL04a, YW06]. Error-Correcting [BH06, BPR00, BMN01, BMP00, BCP01, [NN06, ZYR01]. Error-Prone [MLC01]. BCP02a, BCP02b, CK02a, CK02b, DG03, Errors [AD07, AL07, Reg05, Reg09]. DLY08, GL03, JL08, KOY01, KY03, MPS00, escape [Blu09, Fur05]. Escrow Mac01, MSJ02, Ngu05, VPG01, WC01a, [AK02a, Ano01a, CL01a, DBS01, LCK01, WV01, ZWCY02, BBG+02, BCP07, CLC08, ATSVY00, CL02b, LCC05]. Escrowed CWJT01, DG06, GL06a, GMR05, HTJ08, [PS01b]. eServer [AV04]. ESORICS KS05a, KOY09, LHL04b, LW04, LFHT07, [dCdVSG05]. espionage [Bud06]. essays LHC08, LSH00, MS03a, Miˇs08, WLH06, [MAaT07]. Essential YC09a, YPKL08, ZYW07, CPP04, CP07, [Cop04b, Dr.00c, MR02a, MR02b]. ECM00b]. exchanging [KN08]. Exclusive essentials [HHL+00, Irw03]. establishing [GRW06]. Executing [HILM02, LJ05a]. [Kov03, KH03]. Establishment Execution [Coo02]. Exhaustive [Des00c]. [BM03c, NIS03b, HMvdLM07, LF03, SL05a]. Existing [MV01, BDET00]. Expanded Estimation [Cho08a, Irw03]. Expander [JMV09]. [EFY+05, JX05, KLB+02a, LNL+08, Sel00]. Expanding [DN02a]. expansible [LLW08a]. ethical [Har05b, Woo05]. Euclidean Expansion [DN02b, BCD06, HKPR05]. [CPhX04, CMJP03, CLZ02, WL02]. EULA expansions [HKPR05]. Expected [WWL+02]. EUR [Eag05]. EUROCRYPT [KL05, RK06, DLP+09]. Experience [Bih03, CC04a, Cra05a, Knu02, Pfi01, Pre00, [Sas07, BCHJ05]. Experiences GJSS01]. Eurographics [MFS+09]. [MPHD06, USE00b]. Experimental [BG09, Europe [Pag03]. European CGBS01, OOP03,¨ WS02, RSQL03, Smo04]. [AL06, CZ05, KGL04, Pre01, dCdVSG05, Experimentation [Hun05]. Ano00f, Che08b, Die00, Pre02a]. Experimenting [LSVS09]. experiments EUROPKI [AL06, CZ05, KGL04]. EV [Bru06]. expert [Ano01h, Che05b]. [HTJ08]. EV-C2C-PAKE [HTJ08]. Expiration [MP00, Sch05b]. Explicit Evaluate [Pre02a]. Evaluating [CY08, GRW06, WPP05]. Exploit [BGN05, NTW07]. Evaluation [BR00a, FOBH05]. exploitation [BSC01a, EYCP00, FS00, FML+03, IKM00, [Eri03, Eri08, KVN+09]. Exploiting IY00, JJ00a, Kan01, Kir03, SKKS00, BZP05, [CK06, ETMP05, HR00, HM04, ZWC02]. FXAM04, FS03a, LCP04, MCHN05, RC05, Exploits [MJF07, CSW05]. exploration RN00a, RN00b]. Evaluations [LM02]. [SKW+07]. Exploratory [Lut03]. Evangelizing [Coc01a]. evasion [Blu09]. Exponent [BP04, BM01b, DN00b, May02, even [Bih02, OS00, Win05c]. EventGuard SZ01, CKY05, Duj08, GD05, Shp04b]. [SL05b]. events [SBS09]. ever [Fur05]. Exponential [BYJK04, BYJK08, CY08, Everlasting [DR02d]. Every GKK+07, GKK+09, Shp05]. [Che07b, TH01, DKK07, Win05c]. Exponentiation Everyone [Han00]. Everything [KKH03, SK07, CKRT08, HGNS03]. 32

Exponents [FS02, FS01b, BS02]. Export Family [CQS01, Flu02b, NPV01, SK05a, [Mad00b, Ano00h, Mad00c]. Exposed You01, Ber07, FNRC05, GBKP01, MP07]. [Gum04, MSK03, SSS06]. exposing [YY04]. Fan [YRY05c]. fare [GMG00]. Fascinating Expositive [MAaT05]. Exposure [Sch09]. FA S M E [RM02]. Fast [BM03b, DSS01, KZ07, CDD+05, KZ03]. [AL00b, ABM00, BDTW01, BST02, CJS01, Exposure-Resilient [DSS01, KZ07, KZ03]. CC06, CQS01, Cor00a, Cou03, Cro01, FS02, expressions [MW04]. Extended GC01a, GD02, GMM01, GPC08, HGG07, [ABDS01, BPS00, CM00, Cou04, DIRR05, HR04a, JJ00d, KKIM01, KK03, KKJ+07, HLvA02, HJW01, JL00, MSJ02, MP02, LSY01, LS05b, MSNH07, Kir03, NS05a, OST05, Wag02, BJN00, CD00a, HT04, HP01, NSS02, OKE02, OT03b, PG05, RR02, Tsa06, Mis06, Pei09, QPV05, LKJL01]. Extending UHA+09, Yan05, ABB+04, BMA00a, [ADDS06, IKNP03, Ove06, Sal03b, SS01a]. BMA00b, BMA00c, JAW+00, JJ02, Lud05, Extension PBMB01, WWA01, Bir07, DR02c, GH05, [Bai01a, YWD08, BR06, CMdV06]. Joh03, Mat02, RM04, Sch00b, Sch01d]. Extensions [ABC+05, BBGM08, CS07c, Faster [Bar00c, CMJP03, GLV01, KS09a, HM02b, Rot02a, Wei04, Elb08]. Extracting LV04, Oec03, Ban05, Why05]. faszinierende [Cer04a]. Extraction [Sch09]. Fat [MYC01, TvdKB+01]. Fault [DGH+04, RW03a, MB08, PBV08]. [Ano04b, BMM00, BK06b, BKM07, DS03, Extractors [Fis05, KLR09, KZ07, Lu02, Gir06, PV06a, PQ03b, WL07b, YKLM02b, Vad03, DW09, KZ03, Sha04a]. HGR07, Lin07, PI06, RMH04, YJ00, Extraordinary [Top02]. Extreme YKLM03, ZL04a]. fault-based [YJ00]. [Ree03, Ano02d]. Extrusion [Bej06]. Eye Fault-Tolerant [Sas07, CAC03]. Eye-Opening [CAC03]. [WL07b, HGR07, Lin07, RMH04]. Faults [GSS08, VS08]. Favour [Gen01]. Favre F5 [Wes01]. Face [MFS+09]. FBI [Mad04]. FC [KZ09, NH02, PK01, SBG02, TZT09b, PY08]. [Bla03, Fra01, Jue04, PY05, Syv02, Wri03]. FaceHashing [TNG04]. Faces Fear [Hei03, See04, Sty04, Sch03]. [NS01c, Ngu01]. facets [Rot02b, Rot03]. Feasibility [APV05, BDET00]. feasible fact [Ano03g]. Factor [LM08]. Feature [GW01, Gut02a, HH09, [DN02b, Sas07, BSSM+07, Hen06b, Sch05c, LNP02, LLC06a, NN03]. Features St.00, Ste05a, YWWD08, dB07]. Factoring [PK01, SBG02]. February [BN02, KY02a, KLB+02a, KOMM01, May04, [DR02c, Fra01, GH05, Joh03, Jue04, Kil05, PV06b, ST03b, LTH05, LCZ05c, M¨ul01b, Kim01, Men05, NP02a, Nao04, Oka04, PY05, PLJ05a, QCB05a, Sha03d, Sha05d, ZCL05]. Poi06, Pre02c, RM04, Syv02, USE02a, Wil99]. Factoring-Based [PV06b]. factorisation Federated [GG08]. Factorization [CDL+00, Lam91]. [DeL07, Ano04e, GTY08, Smi08, Sul05]. Facts [GO03]. Fade [CAC03]. Fail Feedback [CGFSHG09, CM03, Cou03, Igl02, [JQYY01, SSNGS00]. Fail-stop [SSNGS00]. Hey03, SPG02]. FeedForward [BP01a]. Failures [DFG01, HGNP+03]. Fair Feel [PM00]. Feeling [Buh06]. Feistel [CC00, DLY08, GC01a, JLL01, JL04, LMS05, [Cou04, Kan01, LMSV07, Oni01, Pat04]. PS00, VPG01, WV01, LSA+07, MS03a]. Feldman [AF04b]. Ferrer [CKN06]. Fetal Fair-Zero [LMS05]. fairness [GCKL08]. [MYC01]. fetch [HTW07]. Fi faithfulness [GTZ04]. false [ZSJN07]. [Sty04, Bar03]. Fiat [VS08]. fiction Falsification [OM09]. Fame [Bar00c]. [Ano03g]. FIDES [ISTE08]. Field 33

[FJ03, GC01a, RDJ+01, CKY07, GMG00, First-order [Coh03, KS06b]. Fish Has00, JL03, ST03a]. Fields [Fie09, Wei06, Wei00, Wei05]. Fit [CCM05]. [Bai01a, BT02, CU01, Che04b, CQS01, Five [SW00a, MS02b, Rot02b, Rot03]. CFS05, HCK09, HHM01, KKH03, Lov01, five-lecture [Rot02b, Rot03]. Fix MNP01, MM07b, RS08, SP05, SKG09, Ver02, [TEM+01]. Fixed [AR01, BCCN01, CKN00, Gar04, HP01, JL03, RMH04, Sim02, Sma01]. LS01a, Shp04b, SP79]. Fixed-Length Fifth [ACM03b, SM07b]. Fighting [AR01, CKN00]. Fixed-Pattern [DGN03, SZ03]. File [CCDP01, GIS05, [BCCN01, LS01a]. Fixing [KZ07, KZ03]. Ito01, LK01, BDET00, CSK+08, HTW07, FL [Des02, Jue04]. flash [ST06, SGB01]. Hos06b, ISO05, MKKW00, MSP+08]. Files Flat [SV08a]. Flaws [Tot00, Che02, Lov01]. Filesystem [Gra02a, SPMLS02, Vau02, SL05a]. [Bau02b, Pet05]. Filesystems [WBL01]. Flexibility [LP02a]. Flexible Filter [CMG+01, CLK01b, DGK+04, OT03a, [LBGZ01, LBGZ02, MSNH07, Sar02, CMS08]. Tsa01, BA06, KC05, LHY02, WWA01]. Filter-Combiner [Sar02]. Filtered [MH04]. Floating [NS05c]. Floating-Point [NS05c]. Filtering [SDFH00]. Final Flow [BDNN02, ABEL05, FR08, ME08a, [DPR01, Dra00, GC01a]. Finalist [SB00]. TWM+09]. Flows Finalists [EYCP00, IKM00, IK00, IK01, [ECM00a, AHS08, Cer04a, Lau08a]. Flying Mes00, Mes01, SKKS00, SW00a, WWCW00]. [Fox00]. FOCS [IEE02, IEE03, IEE04, Finally [Coc02b]. Financial IEE05a, IEE06, IEE07]. foes [Rie00]. [ANS05, Gri01, Pem01b, Wri03, Bla03, FOKSTRAUT [BH00a]. Fo o Fra01, Jue04, PY05, Syv02]. Find [LH07]. [Puz04, VGM04]. Food [MNT+00]. Fo ol Finding [HR04b, MP06, WYY05b, [RW02]. Fo otsteps [Lav06]. force WYY05c, ZT03, SW00b]. [Cur05, SGA07]. forces [AJ08]. Ford FINDsomeone.com [Gra98]. Fine [SS01b]. [Mar05a]. Forecast [Rai00]. Forecasting Fine-Grained [SS01b]. Fingerprint [WWL+02]. Forensic [Ano02d, HHYW07, HBF09, KHY04, [PS08b, Cas02, Kor09]. forensically MMYH02, CL04d, MMJP03, UBEP09]. [ME08b]. Forensics [JBR05, CS04, CS08a, fingerprint-based [CL04d]. CDS07, MS09a, MKY08, MAC+03]. Forest Fingerprinting [KT01, CTT07]. [FBW01]. Forgery Fingerprints [TK03, KLY03, Sco04]. [CH01a, CKM00, LS01a, SLT01, HSW09]. Fingers [MMYH02]. Finite Forgotten [Eag05, Kin01, OC03]. Form [BLST01, BR01, CU01, Che04b, CQS01, [ADI09, CH07c, OS01, LKYL00, Mic01]. HCK09, HWW05, KKH03, MM07b, PHK+01, Formal [BGB09, Bel07b, BCHJ05, BCJ+06, RS08, Ver02, Gar04, Has00, LMC+03, LQ08, CL05, DKS08, GOR02b, HG03, Lan00d, NS01a, RMH04, Sma01, SLTB+06, TC00]. Mea01, YWD08, ABHS09, JW01, Mea04, Finkenzeller [And04]. FIPS [Nat00]. Pau01, SW02, ZLX99, ZL04b]. Formalizing firewall [LJY04]. firm [Zaf00]. First [HM01a]. Formally [BJP02]. format [Bar00a, BBD09, Coh03, CM02, CMB+05, [ISO05, RG05]. format-string [RG05]. FLY06, KGL04, KS06b, MNP01, Nao04, Formation [RW03a, Luk01]. Formats NNT05, OOP03,¨ PK03, QSR+02, Roy00a, [GIS05]. Former [Mad04]. Forms USE00b, Wil99, ZJ04, ZYH03, AJ01a, Cla00b, [JT01b, LLL04]. Formula [Kog02]. Coc02a, DV05, LBA00, RH00, Uni00a, Formulae [CH07b, WPP05]. Formulas Uni00b, Uni00f, Uni00e, Uni00h, Lan00a]. [BGN05]. Formulations [AHRH08]. Fort 34

[Smi03]. Forum Jut01, Fox00, KS06b, SBG05, Bol02]. [CZB+01, CTBA+01, CNB+02, CMB+05]. FreeBSD [Coc01a, Mur02, Siv06]. forums [Hil06]. Forward Freedom [Uni00a, Uni00e, Uni00d, Uni00g, [AR00, AFI06, BY03, CHK03, IR01, Uni00h, Mil03]. FREENIX HCD08a, HCD08b, SY06, ZYW07]. [USE01b, USE02c]. French [Wri03]. Forward-Secure Frequencies [DD02]. Frequency [AR00, AFI06, CHK03, IR01]. [OMT02, Sak01, SOHS01, CS05a]. Forward-Security [BY03]. Forwarding Frequency-Domain [OMT02]. Frey [KCD07, Kra02b]. FOSS [Bol02]. Found [Was08a]. Friar [GG05a]. Friendly [Bar00a]. Foundation [Lut03]. [CTY09, CRSP09, Hsu05b, HL05b, SZS05, Foundations [DKK07, Gol01b, Gol01a, WLT05a, WC03b, YW04b]. fries [Ano01k]. Gol04, IEE00a, IEE01a, IEE02, IEE03, FrontPage [WWL+02]. FSE IEE04, IEE05a, IEE06, IEE07, IEE08, [Bir07, DR02c, GH05, Joh03, Mat02, RM04, IEE09b, Nie02d, Sal05d, Kat05b, Puc03]. Sch00b, Sch01d]. FTC [Ste05c]. fuels Founder [Bar00a, Ano03g]. Four [Mad04]. Full [Cor00b, DOP05, LKHL09, [LXM+05]. Four-Layer [LXM+05]. Fourier WYY05b, WYY05c, BI04, CS08a, HS02b, [Che07a, DSP01, DNP07, KC09b, LPZ06, LKH+08, Oiw09]. full-encryption [HS02b]. SP04]. Fourteenth [USE00c]. Fourth Full-Round [LKHL09, LKH+08]. Fully [ACM02, ACM05b, DFCW00]. FPGA [BL08, FS01a, Gen09b, KPMF02, RG09, [Ano02e, CC02a, CGBS01, CG03, CNPQ03, Gen09a]. Function [BRS02, CDMP05, EYCP00, EHKH04, KMM+06, KY09, Fis01b, Flu02b, GIS05, HNO+09, HPC02, KBM09, KRS+02, LP02a, MM01b, MM01c, JJ00a, Kan01, Kil01b, Nie02c, RB01, Yan05, OTIT01, OOP03,¨ Pat01, PBTW07, QSR+02, CHY05b, CJ04, HR07, LW04, LPM05, TYLL02, TPS01, USS02, WW00]. FPGAs Tsa08, WWTH08, YW05, YRY05b]. [AD07, DPR01, MMMT09, RSQL03, SGM09, Functional [ECM00a, WA06]. SK05a]. Fractal [AA04a, JLMS03, WC03a]. Functionalities [PS05]. functionality Fraction [Wal03]. fractional [ETMP05]. Functions [DSP01, SSST06]. fractions [Dan02]. [AEMR09, BBDK00, Bon01, Can01b, CV02, Fragile [CC09, CH01b, CT09, Nak01, Car02, Che01c, DN02a, DGN03, DNRS03, PJK01, LYGL07, SY01b]. Frame [LHS05]. Fil02, FIPR05, GLG+02, HMS04, HR04b, Frames [HWW05]. Framework Jou04, Kil01b, LTW05, Lys02, PR01, RR08, [ANRS01, GL03, GOR02b, Hun05, NMO05, SM00a, SM00b, SS01a, Sho00a, Sho00b, NP07, PS06, RS00, Shy02, ZYN08, AHK03b, Ver02, WP03, WFLY04, Wer02, AGGM06, Ayo06, CCCY01, CP07, CC04c, DMSW09, AGGM10, ALV02, CS09, DS09, GVC+08, GJJ05, GL06a, GM04, JEZ04, KNS05, HRS08, ISO04, KK07, KS05b, LLH02, MS09b, MBS04, YCW+08, HF00]. France LKY04, MS02b, MS09c, Mic02a, Mic02b, [ACM04a, ACM05a, AJ01a, AJ01b, GH05, NR04, PW08, QPV05, SM03a, Whi09, KNP01, NP02a, PPV96, KM07]. Francis YRY04, ZW05a, RRS06]. Fundamentals [Bud06]. Francisco [Cal00c, Joy03b, Men05, [And04, PHS03, Shi08, Way01, vT00, Fin03]. Nac01, Oka04, USE02a, USE02b]. Funds [Coc01a]. Further [JS05, JPL04, FranzSteiner [Eag05]. fraud [Ano03a]. LL04a, LL05c, Ano09c, MP07, YRY05a]. Fred [Bar00b]. Free Fusion [KZ09, TZDZ05, ZS05, BG09]. fusul [AP09, Ano02e, Bau01a, Bau01b, BGI08, [MAaT05]. Future Coc01a, CNV06, DG02, HS00, HM01b, JP03, [ASW+01, Ano02f, Joh00, LNP02, NFQ03, 35

Sch00e, Ano05b, HP00, LPW06, SK03]. LMHCETR06, LV04, NNAM10, SXY01, Fuzzing [SGA07]. Fuzzy SFDF06, TWNA08, TZT09a, TZT09b, [SH11, HS02b, NC09, SM11]. fuzzy-based ZKL01, Aam03, ACTZ05,´ Bel08, BG08, [NC09]. BG09, BG07a, CFY+10, DGP09, GB09, HG05a, HLwWZ09, JAW+00, KH08, KSF00, G [Coc03, For04, Was08a]. Gaitherburg LGKY10, MRT10, Pan07, PSG+09, [SMP+09]. Gamal [EKRMA01]. Game PLSvdLE10, PSP+08, PC00, RGX06, SH11, [DHR00, LM02, CAC06, BR04, Gou09, SM11, SR07, SB05, UHA+09, WW08, HCBLETRG06]. game-like [Gou09]. XSWC10, VKS09]. Generators game-playing [BR04]. Gamers [MP00]. [BST03, BK06a, BL08, CF01b, CS05b, Games [KN08, HCBLETRG06]. Ganesh Fin06, Kra02a, LBGZ01, LBGZ02, LS05a, [For04]. Ganz´ua [GPG06]. Gap MH04, RSN+01, Vav03, BK07, BGPGS05, [OP01a, PWGP03, RW03a, Sch02, Sch04d]. CO09b, Sti11, SK01b, Tsa06, YZEE09]. Gap-Problems [OP01a]. Gate generators-part [SK01b]. Generic [Coc02a, GC01a]. gates [TWM+09]. [BN00a, DOP05, GGKT05, HLL05, Mar02b, Gauging [PvS01]. Gauss [KKH03]. MV01, GT00, MP08, Sch01f, Sch01e, Gaussian [EKRMA01, JL03]. Gbps XLMS06, CHJ+01a]. Genetic [HSIR02, [TPS01]. GCD [JP03]. GCD-Free [JP03]. LMHCETR06, CV05, SCS05a, WJP07]. GCM [KS09a]. geeks [McN03]. Gennaro [Miy01]. Geheimschreiber [Joy00, UW00]. GEM Gennaro-Krawczyk-Rabin [Miy01]. [CHJ+01a, JMV02]. gems [Six05]. General gentle [RR03a]. Gentry [Hes04a]. Genuine [AB09, CDM00, DN00a, ESG+05, GMP01b, [HR13]. Genus [CY02, GHK+06, Wen03]. Kog02, Lin03, MND+04, Sal01a, YC01, Geometric [GTTC03, HH09, LLS05a, HCBLETRG06, IY06, JL03, LJ05a]. LL05c, LJ05b, SDF01, CJT01]. General-Purpose [ESG+05]. Geometrical [LWS05]. geometry Generalisation [DJ01]. Generalization [PPV96, WW06]. George [Gum04]. [YYZ01, HWW02]. Generalizations Georgia [IEE09b]. German [LD04, LS08]. Generalized [Sch09, Ano04c, Bau08, Lin02, Mor05, [KSR02, Mic02a, TC01, TJ01a, Wag02, Sal00b, Sal00a, Win05b]. Germany WHLH05, Elb08, LKYL00, LWL09, Shi05]. [DRS05, Duw03, FLA+03, WKP03, IEE01b]. Generate [HSR+01, Wer02, FSGV01]. Geschichte [Sch09]. Get Generated [Coc01a, WD01a, Cla00b]. gets [Bor00]. [ADD09, MRL+02, XYXYX11, RBF08]. Getting [Kar02, PM00]. GF Generating [BINP03, KPMF02, KLY02, KKY02]. GH [BMK00, BCDM00, GG01, MFK+06, SS03]. [GHW01]. GHS [Hes04b]. giant [Lam07]. Generation [ACS02, BCGH11, BH05, Gibson [Ove06]. Giesbrecht [CHH01]. BK06a, CS03c, ESG+05, GJKR03, GL01, Gigabit [CGBS01]. Gigabits [HTS02]. GW01, JG01, MR01a, Ram01, TL07, TV03, Give [CNB+02]. Given [Wal03]. Giving WP03, WHLH05, Web08, WS02, Ano04f, [Tee06, Wu01]. Global [Ahm08, LWS05, BK07, BG08, BF01c, ISTE08, LS05b, Por06, Ano00h, BK00, Kee05, KB00]. TNG04, Van03]. Generator Globus [MJD01]. GN [SC05b]. [ADD09, BP01a, DI05, Dic03, DGP07a, GN-authenticated [SC05b]. Gnana DGP07b, DV08, EHK+03, Gen00b, GM02a, [For04]. GNU [Coc01a]. GnuPG Gol01c, GPR06, Int03, Kel05a, Kel05b, [JKS02, Sti06b]. GNY [Tee06]. Go 36

[Bur06, CZB+01, HCBLETRG06]. Goals LL06, LLH04, LPM05, LWK05b, NS05b, [PHM03, Phi06]. goes PQ03a, PQ06, RH03, SNW01, Sha05a, [Mur06, Pan07, Wal09]. Gold TJ01a, Tse07, WGL00, WHHT08, YLC+09, [Boy01, For04, Tsa07]. Goldreich YY05a, ZC04, ZX04]. group-by [YLC+09]. [Kat05b, Lee03b, Puc03, AC02]. Gong Group-Oriented [LZL+01, HWW04, [GG01]. Good CHC05, CWJT01, LL06, TJ01a, WHHT08]. [CB01, Kid02, MP06, GG05b, vT01]. Groups [BSS02, CV03, CF02, Dre00, Goodness [CMB+05]. Goods [NZCG05]. GM02a, GST04, KM01a, KLC+00, LLH01, Google [Con09, Law09b]. Googling LP03, Luc02b, MN01, PHK+01, GR04, [Con09]. GOST [SK01a]. got [Car01]. HM00, LLY06, Pae03, Yi04]. GSM Goubin [Sma03b]. Governance [TPPM07]. [Ano09a, BBK03a, BD00a, Cha05b, Cim02]. Government [IY00, RM02, Lev01, LCS09]. Guadeloupe [Wri03]. Guanajuato Governments [Ano00g]. GPG [Buc00a]. Guangzhou [LLT+04, Li05]. [Bau01a, Bau01b, Luc06]. GPS [CKQ03]. Guessing GPT [Ove06]. GPU [BCGH11]. GQ [AGKS07, Bau05, Shi05, YS02, DLMM05]. [BP02]. graduate [GV09]. Grafton [Pag03]. Guest [KP03, Sak01, BK06b, MFS+09, grain [Rhi03]. Grained [SS01b]. Grand PTP07, SJT09, SGK08]. GUI [LG09]. [Syv02]. granted [Ano00h]. Graph Guide [Ano06c, BS01a, BSB05, BCP+03, [CGFSHG09, GTTC03, HM02b, VVS01, BP01b, HMV04, Poo03, Vac06, Wei04, YKW01, CTT07]. Graph-Based And08b, Bon00, Bro05b, C+02, Che00a, [CGFSHG09, HM02b, CTT07]. graphical Gar03b, Kov03, Lun09, Mol05, SL06]. [vOT08]. Graphics Guidebook [SEK01, SEK02]. Guided [CK06, DNP07, MFS+09]. Graphs [ZY08, Pet08]. Guidelines [MMZ00, Die00]. [NNT05, Ust01b, JMV09, WGL00]. Guildford [KN03]. Gummy [MMYH02]. Gravrilenko [Puz04]. Gray Guo [LLLZ06a, LLLZ06b]. Gutmann [FGD01, Har05b]. Gray-Scale [FGD01]. [Uzu04]. grayscale [YCL07]. greatest [Bel07a]. Greece [ACM01a, KGL04, SM07b]. greedy H [Was08a]. H.R [Uni00d, Uni00h]. H.R. [HKPR05]. Green [TR09a, TR09b]. [Uni00a, Uni00e]. H64 [GMM01]. Hack GREMLIN [H¨of01]. Grenoble [ACM05a]. [MYC01, Sin02, SL06]. hacked [Ano02c]. grey [BDN00, SCS05a]. GRH [JMV09]. hacker [Gol08, Har05b, Woo05]. Hackers Grid [ACM05a, MJD01, SEF+06, TLC06, [SEK01, SEK02, Ano01i, BD04b, NRR00, ZBP05, Cha07, CJK+04]. GridOne Win05c]. Hacking [YC09c]. Grids [CTY09, MPPM09]. grip [Eri03, Eri08, Gum04, Man08, MSK03, [Buh06]. Gr¨obner [CCT08, FJ03, Fau09]. SSS06, VGM04, Puz04, Har05b]. hacks Group [ANRS01, AAFG01, ACJT00, [Sti06b, Sti06a]. Hadamard [HWW05]. BBS04, BCP01, BCP02a, BCP02b, CD00a, Hagenberg [Jef08]. Half [HS02b]. CvTMH01,ˇ CH01a, HSHI02, HSHI06, Half-encryption [HS02b]. Halfspaces HWW04, Hug02, JP02b, KY03, Kin02, [KS06a, KS09b]. Hall LZL+01, MSU05, SOOI02, SWH05, Ste01, [Bar00c, For04, Kat05b, Was08a, MAaT05]. Tan07b, VMSV05, Wer02, AKNRT04, Hall/CRC [Kat05b, Was08a]. Halmstad BCP07, CL04b, CYH04, CHC05, CWJT01, [BS01b]. Hamming [GK02]. hamper CJT04, CLK04, Cho08b, ED03, He02, [Lov01]. Hand [WBL01]. Handbook Hen06a, HWW02, KS05a, KPT04, KKKL09, [And04, Cas02, CFA+06, Jan06, MMJP03, 37

RE03, dLB07, AB09, Fin03, Har05b, KB00, [BDS09b, KCL03, Ku04, KCC05]. KH03, MJ03, RE00, Was08a]. Handheld Hash-CBC [BBKN01]. Hash-chaining [BMK00, Ano06a]. Handhelds [MP00]. [CBB05]. Hash-Function [BRS02]. Handle [RC06]. Handling [KL05, Lut03]. Hash-functions [ISO04]. Hashes Handoff [OKE02]. Hands [Sch01a, GNP05]. Hashing [KLB+02b, Shu06]. Hands-on [IKO05, SGGB00, WS03]. H AVA L [KLB+02b, Shu06]. Handshake [SB01]. [WFLY04]. H AVA L- 1 2 8 [WFLY04]. Handshakes [Ver06a]. Handwriting HAVEGE [SS03]. HB [MP07]. HB-family [Ano02d]. Hankerson [Irw03]. Haptic [MP07]. HB-MP [MP07]. HCI [YKMB08]. [PBM+07]. Haptics [Pau02a]. Hard head [RFR07a, RFR07b, RFR07c]. [Har07b, HMS04, Hro03, Lai07, CGHG06, headlines [Hen06b]. Health GPV08]. Hard-Core [HMS04]. Hard-Disk [Mad00a, Ano03a, CCCY01]. health-care [Har07b]. Hard-Line [Lai07]. [Ano03a]. Healthcare [BTTF02]. heap hard-on-average [CGHG06]. hardcore [ST06]. Hearing [Sch01e]. hardcover [Uni00c, Uni00g, Uni00b, Uni00f, Uni00h]. [Eag05, Pag03, Top02, Pap05]. Harddisk hearings [Uni00b]. heart [Mur06]. [Por01]. hardening [Mos06]. Hardness Heavens [Eva09]. Hedge [Sho00b]. [CHS05, CNS02, KY02b, KS06a, LTW05, Hedged [BBN+09]. Heimdal [WD01a]. SV08b, AGGM06, KS09b, SU07, AGGM10]. held [Buc00a, PPV96, Uni00b]. Hellman Hardware [KM04a, ABR01, ASW+01, BS01d, BMP00, [Ano02b, Ano07b, Ano07a, BM01a, DF01, BCP01, BCP02a, BCP02b, BCP07, CY08, Dic03, FW09, FD01, Fri01, GS03, GS07a, CU01, CJ03a, CKRT08, FS01b, GR04, GK02, GPS05, GLG+02, Gro01, GPP08, Kil01b, KK02, Kra03, Kra05, Miˇs08, Tsa06, IKM00, ISW03, JQ04, KKP02, Nd05, PS01c, YRY05c]. help [Ano08a]. Helped [Gan01b]. RS05, RS04, SOTD00, SMTM01, SM02, Helps [DF01, Pri00]. Helsinki [Bur00]. SM03b, SRQL03, SGK08, TSO00, TBDL01, Hensel [CNS02]. Her [Bud06]. Here WKP03, WBRF00, XH03, XB01, YKLM02b, [Bur06, Law05]. Hermite [Mic01]. heroes Zhe02a, ARJ08, Ano00a, BBK+03b, DS09, [OC03]. Herriot [Coc03]. Hersonissos EHKH04, GC00a, HBC+08, KP01, KNP01, [ACM01a]. Hessenberg [SSFC09]. KP03, NdM04, RAL07, SOIG07, VS08, Heterogeneous Wol04, YKLM03, YW06]. Hardware-based [BCS02, H¨of01, KHYM08, ZBLvB05].ˇ [Ano02b]. hardware-constrained [RAL07]. heuristic [SS03]. Heuristics [Hro03]. HFE hardware/software [ARJ08]. Harley [FJ03, CHH01, Fel06]. [WPP05]. Harn [GG01]. Hash HFE-Cryptosystems [Fel06]. HIBE [Ano08d, Ano12, AEMR09, BBKN01, [CS07c]. Hidden [HGNS03, KW03, LNS02, BRS02, BDS09b, Bur06, CBB05, Cor00b, Six05, GMR05, Lun09, Shp05, FJ03, Sch09]. Cor02, CDMP05, CS02, DOP05, FIP02b, Hide [CC06, PH03, Shp05]. hide-and-seek Fil02, GIS05, GLG+02, HPC02, HR04b, [Shp05]. Hiding ISO04, Jou04, KMM+06, MD05, RRS06, [BD03, CLT07, Col03, DN02b, GA05, RR08, RB01, SS01a, Sho00a, Sho00b, SK05a, HNO+09, LHS05, LS08, MH05, MMMT09, WFLY04, Yan05, YZ00, BR06, DS09, VDKP05, WC03a, HR07, JDJ01, KP00, KCL03, Ku04, KCC05, LLH02, LKY04, RSP05, Way02b, Way09, YCL07]. Hierachy LW04, MS09c, Mic02b, Tsa08, Wag00, [HC08]. Hierarchical YRY04, FIP02a, ZW05a]. Hash-based [GS02b, HNZI02, HL02, Lin01a, MN01, 38

YLH05, BD04b, Che07a, CJ03c, JW06, [MF07, PS02a]. Homomorphic KAM08, WC01b, hY08]. hierarchies [AS01a, Aki09, CDN01, DN03, HS00, Cho06, [AFB05, Cer04a, HY03, WL05]. hierarchy Gen09a, Gen09b]. homomorphism [CLK04, CMdV06, HW03c, Hwa00, JA02]. [CKN06]. homophonic [Sav04]. [OMSK01]. Hieroglyphs Honeynets [Dim07]. Hong [Wri05]. High [ACM01b, Ano00d, Ano02d, [B+02, ZJ04, Cla00b]. honor [OC03]. hook ChLYL09, CW09, CJL06, CGJ+02, DS05b, [JEZ04]. hooks [GJJ05]. hop FZH05, Gro01, HNZI02, HV04, Int00, [NC09, ZSJN07]. hop-by-hop [ZSJN07]. JKRW01, KMM+06, Ken02b, KM05, KB00, Horizon [Coc02b]. host [Shu06]. hostile Kra05, KT01, MM01b, NFQ03, RW07, [ABB+04]. Hosts [H¨of01, SZ08]. Hot SKKS00, SOTD00, SM02, SGM09, SLG+05, [IEE01b]. Hotel TL07, Uni00c, Wie00, WWGP00, YKMY01, [USE01b, USE01a, USE02a]. HotOS Zhe01, BVP+04, BZP05, BGL+03, Jen09, [IEE01b]. HotOS-VIII [IEE01b]. hours KC09a, SK03, Uni00f, WWTH08, Zir07]. [Fox00]. House high-assurance [Jen09]. High-Bandwidth [Uni00a, Uni00b, Uni00f, Uni00e, Uni00h]. [CGJ+02]. High-Dynamic-Range [CW09]. Hsu [BCW05, HL05c]. HTML [CNB+02]. High-End [SKKS00, WWGP00]. HTTP [Zha00]. Huang [ZC05]. Huge High-Performance [MSNH07, NNT05]. Hull [KMT01]. Human [Kra05, NFQ03, BZP05]. High-Speed [Dre00, GL01, JW05, KOY01, You04, [Ano00d, Ano02d, Gro01, JKRW01, Man08, MS02d, RFR07a, RFR07b, RFR07c]. KMM+06, SOTD00, SM02, Wie00, Human-Memorable [KOY01]. Hundred YKMY01, RW07, BGL+03]. [Uni00a, Uni00b, Uni00f, Uni00e, Uni00h]. High-technology-crime [KB00]. Hunting [GJL06]. H¨uttenhain High-Throughput [HV04]. Higher [Bau08, Bau08]. Hwang [SCS05b, ZK05, [CV02, KCP01, BF01a]. Highly [CV02]. Hsu05a, HL05d, KTC03, KCL03, LW05c, hijacking [Ste05c]. Hill [Gum04, USE02a]. QCB05a, WL05, YRY05d, ZYR01]. Hilton [KJR05]. HIPAA [AEV+07]. Hwang-Rao [ZYR01]. HWWM [LKY05c]. histograms [CO09a]. historic [Pet08]. HWWM-authenticated [LKY05c]. Historical [RE02, MWM01]. History Hybrid [BP03b, Ifr00, Pag03, Sal01a, Sin01b, [ADI09, CBB05, KD04, LZ04, PK01, Asl04a, CAC06, Top02, dLB07, AJ08, Boo05, CJ03b, HG07, LPM05, TM06]. Hyderabad HSW09, Jan08b, KNS05, Naf05, Nis03a, [MS02c]. Hype [Way02a, Che01d]. Hyper Pin06, Ris06, RH00, RG06, Wil01a]. [DR02d, Lu02, PZL09]. Hyper-chaotic history-based [KNS05]. hit [Bjo05]. [PZL09]. Hyper-Encryption HMAC [FIP02a, DGH+04, Hir09, RR08]. [DR02d, Lu02]. Hyperelliptic HMQV [Kra05]. Hoare [dH08]. Hoax [Ava03, CY02, CFA+06, HSS01, PWGP03, [CZB+01, CTBA+01]. hoc [BSS02, Cha05b, Ver02, Was08a, ZLK02, CMKT00, Wen03, DHMR07, KH05, KVD07, LHC08, LKZ+04, Wol04, WPP05]. Hyperencryption PCSM07, SLP07, TW07, WT02, ZC09]. [Che01d]. hyperlinking [Che01e]. Hold [PM00]. Holier [MYC01]. Holistic hypotheses [KW00]. [RM02]. Homage [JP02b]. Home [IEE00b, SEK01, SEK02, CAC03, Pet03]. I-tracings [RE02]. i.e [NP02a, Wil99]. IA Homegrown [Str02]. Homeland [WWCW00]. IA-64 [WWCW00]. IACBC [Man02, Mau05, RR03b]. homogeneous [JMV02]. IBE [ABC+05]. IBM [Ano04e, 39

AV04, ADH +07, CGH+00b, Web08, Weh00]. [TZDZ05]. IDtrust2009 [SMP+09]. IEC Ibn [ISO04]. IEEE [MAaT04, MAaT05, MAaTxx, MAaT07]. [BS03, BCDH09, BC01, IEE01a, IEE02, Ibn-Adlan [MAaTxx]. Ibn-Al-Durahim IEE03, IEE04, IEE05a, IEE05b, IEE06, [MAaTxx]. iButton [HWH01]. IC IEE07, IEE08, IEE09b, KM07, HSD+05, [BGL+03, PC00]. ICBA [ZJ04]. ICCMSE Hug04, Miˇs08, PHM03, ZDW06]. IEM [SM07b]. ICISC [RC05]. IFIP [Kim02, LL03, LL04d, PC05a, Won01, WK06]. [DKU05, DFPS06, DFCW00, ELvS01]. II ICISC’99 [Son00]. ICM [IEE09a, IEE09a]. [Ban05, Bau01a, Bau01b, Bau01c, Bec02, ICs [Bar00c]. ID [Gui06, ZJ09, BRTM09, Bud00a, Bud02, Hau03, Kov01, MH09, CCD07, CL07, CS07c, CL00, GS02b, GTY08, OC03, Res01a, Res01b, Sal00a, ZT03]. III HC08, KLY03, KHL09, Ku02, LCS09, Sco04, [Sch00a, Ano00d, Bau03b]. IKE SW05a, SCL05, WBD01, WH02b, YC09b, [CK02a, Kra03]. I’ll [PLW07]. illegal YLH05, ZK02, ZC04, ZC09]. Id-Based [Che01e]. Illinois [ACM04b]. Illusions [ZJ09, CCD07, GS02b, HC08, Ku02, [Koc02]. illustrated [Lun09]. Im WBD01, YLH05, ZK02, CL00, KLY03, [BGI+01, DOPS04, RR05]. IMA KHL09, Sco04, SW05a, SCL05, WH02b, [Pat03b, Sma05, Hon01]. Image YC09b, ZC04, ZC09]. IDE [Ano02d]. Idea [AS01c, BSC01a, BSC01b, BQR01, CYH01, [Cos03, RR03a, CTLL01, HTS02]. Ideal CLT07, CC09, CC06, GW01, KBD03, KC09b, [BTW05, BTW08, CDFM05, Lan00d, LLS05a, LZ01, LWS05, LY07, LJ05b, LSC03, Gen09b]. Ideas [Gha07, Eri01]. LSKC05, PZL09, RS00, SDFH00, SDF01, Identification SSFC09, SH11, SM11, SYLC05, TTZ01, [BP02, BLDT09, Gar03a, GLC+04, KK02, TH01, TC01, UP05, VKS09, VK07, WY02, Kir01b, Lys07, Sak01, SK06, Zhe01, And04, WLT05b, YZEE09, AAPP07, AA08, CC02b, Dal01, Fin03, PBV08, YCW+08, ZC09]. CHC01, Che07a, Che08a, GSK09, HLC07, identifiers [MC04]. Identifying KC09a, LLCL08, Lin00a, LT04, LYGL07, [HBF09, LLS05b, ZYN08, DMS07]. LLC06b, MS09a, MB08, PBV08, Sch00a, identities [Kwo02, Kwo03b]. Identity Sch01c, S+03, Sch04a, Sch04b, Sch05a, [App05, BF01b, BF03, BB04, BCHK07, mSgFtL05, TL02, Wan05, WMS08, WC05, BGH07, BPR+08, Boy03, BRTM09, CL01a, XSWC10, YCYW07, YCL07, ZLZS07]. CHM+02, Coc01b, Dea06, DT03, GK04, Image-Feature [GW01]. Her06, Her07, HY01, HL02, KC02, LCD07, image-identification [PBV08]. Images Mar08a, Mar08b, Mit02b, Neu06, PCSM07, [CTL04, CC08, CW09, DP00, FGD01, LS08, Phi06, SMP+09, Ano01l, Ano04e, BMW05, PJH01, PBC05, RE02, WCJ09, WC04, CG06, CJL05, GG08, Gui06, KG09, LL04b, YWWS09, AAPP07, AEEdR05, BDN00, LWZH05, RG09, Sae02, Sha03c, Sma06, FWTC05, HHYW07, TCC02, TND+09]. Smi08, Sul05, Wal04, Wan04b, Win05a, Imaginary [HJW01, HM00, H¨uh00]. Imai Woo05, YCW+08, You04, ZYW07]. [DDG+06, YG01a]. Imbalanced [ZWCY02]. Identity-Based Immersive [Coc01a]. Immune [BF01b, BF03, BCHK07, Boy03, BRTM09, [CZK05, PZ02b, YKLM02b, ZP01, YKLM03]. DT03, Her06, HL02, KC02, LCD07, Mar08a, Immunization [HR05]. Impact Mar08b, App05, Her07, PCSM07, BMW05, [Ber03, HGNP+03, JKRW01, MMYH02, CG06, CJL05, KG09, LL04b, LWZH05, Wri00, CS08a]. Imperfect Sae02, Sha03c, YCW+08, ZYW07]. IDSFM [CPS07, DOPS04]. Impersonation 40

[BP02, Hsu05b]. implant [Fox00]. vDKST06, CYY05, HTJ08, Iwa08, PR05, Implement [HQ05]. Implementation QCB05a, YW05, YRY05a, ZW05a]. [AD07, AG01, Ase02, Ash03, ARC+01, Improvement [AS01c, AJO08, Che04a, BBD+02, CCDP01, CGP08, CG03, CQS01, CZK05, CCW02, Di 01, HWWM03, CS05a, Cor00a, EYCP00, EHK+03, FW09, HWW03, Hwa05, LKY05c, LKY05d, LTH05, FBW01, FD01, GC01a, Gir06, HTS02, MNT+00, NP07, Sha04b, Sha05b, WHLH03, HHM01, JKS02, KMM+06, KMS01, KTT07, YRY05b, YRY05c, ZYM05, ZAX05, BLH06, KRS+02, KV01, LP02a, MMZ00, MKP09, CCK04a, CL04c, CHY05a, Hsu05a, JSW05, MM01c, MNP01, MP01c, Mur02, Nov01, JmBdXgXm05, KJY05, LL04a, LW05c, NMSK01, Oiw09, OTIT01, Pat01, PBTW07, SZS05, TO01, WLT05a, YW04a, YWC05, QSR+02, RDJ+01, SM01, Sha01e, SK05a, YRY05a, YRY05d, ZC09]. Improvements SRQL03, USS02, Vir03, WZW05, WW00, [BBM00, HWW02, JL03, NP02b, YCYW07, WOL01, XB01, Zea00, BI04, BBK+03b, CH07a, HW03c, SRQL03]. Improving C+02, CNPQ03, DS09, DKL+00a, [ASK05, Dim07, EBS01, KMT01, LHC08, GHdGSS00, GBKP01, H¨uh00, HP01, Hut01, LS01b, Mic01, SKQ01, SB01, Sun02, XQ07, KY09, LL04c, LCX08, LB05, Rhi03, SM03a, YEP+06, YGZ05]. incentives [Swi05]. SVDF07, Wol04, YW06, ZFK04]. Incident [JBR05, Tom06]. Including Implementations [SR01]. Incomputable [Ver06b]. [AL00b, BJP02, III00, CTLL01, CGBS01, inconsistencies [MS09a]. Incorporating EPP+07, GLG+02, MM01b, MP01a, RS01, [MFS+09]. incorrectness [CHC04]. WWCW00, ASK05, BFCZ08, BFGT08, Increase [NNAM10, PBTW07]. Increasing BG07b, Elb08, FR08, RAL07, RSQL03]. [AEH17, CS05c]. Incremental Implemented [TSS+03]. Implementing [BKY02, LKLK05]. IND-CCA [M¨ul01b]. [Dwi04, Kor09, LM08, LDM04, MWS08, IND-CCA2 [BST02]. Independence NDJB01, Pet03, Smi01a, SR06, Woo05, [BP03b]. Independent C+02, CW02]. Implications [BS00a, BSL02, Kin02, GSK09]. Index [Kun01, LJ05a, MF01, Ayo06, Bjo05, Fri07]. [Ano00b, Ano01d]. indexing [YPPK09]. Implies [KY01e]. Imply [Pie05]. India [CV04, JM03, MMV06, MS02c, RD01, Importance [Ano02b, KCJ+01, TIGD01]. Roy00a, RM04, Roy05, Ano03d]. Indies Important [SM00a]. imposed [XLMS06]. [Fra01, Syv02, Wri03]. Individual Impossibilities [CHL02]. Impossibility [BCC02, TW07]. INDOCRYPT [CV04, [APV05, BPR+08, Fis01b, PQ06]. JM03, MMV06, MS02c, RD01, Roy00a]. Impossible [BF00a, BF00b, CKK+02, Induced [Vau02]. Industrial [USE00b]. HSM+02, MHL+02, Pha04, SKU+00, SKI01]. Industry [ANS05, Mad00a, Ort00]. impostor [jLC07]. improve ineffectiveness [YLR05]. Infeasibility [Pau02a, CAC06]. Improve-ment [CAC06]. [FS08]. Inference [Mar02b, CDD+05]. Improved Infinite [TZT09a, TZT09b, Vau01]. infinity [AFGH06, BPR05, BB05, BF00b, CL01b, [Hil05]. Influencing [Bla01c]. Inform CKK+02, CJ04, DN00a, DG02, Fan03, [Kwo03b, San05]. Information FKS+00, FKL+01b, FKL+01a, GMR08, [AP09, BW07, BIM00, BZ02, Big08, BB03, Gen00b, HCK09, HKA+05, JQYY01, Kin00, BJ02, Boy01, CGM07, CC06, DM00b, KT06, Ku02, K¨uh02b, LW04, LL06, Mic02b, ECM00a, ELvS01, Hay06, HQ05, HW01, Miy01, MH04, Kir03, MS02e, PR08, ST01b, ISO04, JDJ01, JG07, KP00, Kel02, KLB+02b, SWH05, SC05c, TNM00, YSH03, ZKL01, KO00, Lai03, Lee04b, LW05b, LL01, MH05, 41

MMZ00, Oka00, PP06b, RSA00d, RS01, [DKXY02]. Integer [Gro03, JL03, MN14]. Roy05, Sch06b, SVW00, Son00, Sta06, Ste02, Integers TG07, VDKP05, WABL+08, Yek07, Zhe02b, [CH07c, GMP01a, KKIM01, EKRMA01]. ZS05, dLB07, vW01, ABHS09, ABW09, Integral [KW02, WH09, SM11, SH11]. Arn01, Bid03, BK00, BEZ00, BEZ01, Bro05b, Integrated [ECM00a, ECM00b, GMG00, Duw03, FR08, FOP06, Gar04, Gha07, IY05, Lut03, GLC+04, LK01, SSM+08, SN04]. KN08, KB00, Kov03, MS09b, ME08a, PS02a, Integrating [Wit01, AEH17]. Integration Sch02, Sch04d, Sun02, TWM+09, Way02b, [Ito00, CJL06, Sug03]. Integrity Way09, CSY09, FLY06, GW00, Kim02, [Ano02e, CS08b, Jut01, MA00a, MA00b, LL03, LL04d, PC05a, Won01, WK06]. Pre01, Sch01a, ABEL05, AL04, MD04, information-flow [FR08]. MNT06, SHJR04, Yun02b]. Intel Information-Theoretic [VDKP05, vW01]. [Coc02a, MP00]. Intellectual Information-Theoretically [DM00b]. [Qu01, WY02]. Intelligence Infrastructure [AHKM02, AL06, BC04b, [Cop04b, AJ08]. Intelligent [Cos03]. Inter BWE+00, CL07, ES00a, FL01b, KGL04, [WRW02, ECM00b]. Inter-Exchange Sin01a, BHM03, BDS+09a, Ben01a, CZ05, [ECM00b]. Inter-Packet [WRW02]. FB01, Gor05, LCK04, MWS08, Ben02]. interaction [Gav08]. Interactions [Fau09]. Infrastructures [HCDO02, Lin00b, PHM03, Interactive WBD01, Bra01a, LAPS08, LOP04, SN07]. [BC05b, DG00, MS09c, CHK05, DDO+01, INIDP04 [LDM04]. initial [DK08]. Fis01b, Fis05, HNZI02, HJW01, KKL09, initiation [YWL05]. Initiative KHL09, MSTS04, Pas05, vT00, MS09c]. [Coc01a, Cal00b]. initiatives [Mau05]. Interception [CHVV03]. interdomain injection [MMJ05, ZSJN07]. Injective [MABI06, vOWK07]. interesting [SWR05]. [CMdV06, Kos01c]. Innovation Interface [RSA01]. Interference [Sam09, SW05b]. innovations [Web02]. [FGM00a, FGM00b, GA05, BR05]. Innovative [MM07a]. Innsbruck [Pfi01]. Interlaken [CC04a]. Interleaved Input [CAC06, TC00, DKL09, VM03]. [ZSJN07, NC09]. intermediaries [JA02]. Input-trees [TC00]. Insecure Internal [Har07b, Bej06]. International [Vau05b, Wal01, BJN00, LLH06, XwWL08]. [ACM03a, ACM04a, ACM05a, ACM09, Insecurity ACM10, AN03, Ano00d, AAC+01, AJ01b, [Bla02b, DOP05, Lai08, Man02, NS01b]. BDZ04, Bel00, B+02, BBD09, BS01b, Bih03, insertion [MB08]. insertion-extraction Bla03, Bon03, Boy01, Buc00a, BD08, CC04a, [MB08]. Insider CV04, CTLL01, Chr00, Chr01, CCMR02, [CMS09, Tad02, KS05a, Mah04]. Insights CCMR05, CSY09, CGP03, Cra05a, DR02c, [Kun01]. Inspired [CC09]. Installation Des02, DKU05, DFPS06, EBC+00, Fra01, [USE00a]. instance [FS08]. Instances FMA02, Fra04, FLA+03, GH05, HYZ05b, [GG01, HN06]. Instant [BBK03a, RR05]. IEE09a, IZ00, IKY05, JYZ04, Jef08, Joh03, Instantiated [RR08]. Instantiation JM03, JQ04, Jue04, KKP02, KCR04, KJR05, [BF05]. Instruction [BBGM08, EP05, Kil01a, Kim01, Kim02, KN03, Knu02, KP01, KTT07, Bru06, Elb08, HTW07, MMJ05]. KNP01, Lai03, LL03, Lee04b, LST+05, Instruction-Level [EP05]. LL04d, MMV06, MJ04, MS05a, Mat02, Instruction-Set [BBGM08]. Instructions MZ04, MS02c, Men07, NP02a, NH03, Oka00, [LSY01]. instrumentation [MPPM09]. Pat03b, PK03, Pfi01, Pre00, PT06, RD01, insubvertible [ACdM05]. Insulated RS05, Roy00a, RM04, Roy05, Sch01d, 42

Sho05a, Sil01, SM07b, Syv02, TBJ02, [WH09]. Invasion [ASW+01]. invasions TLC06, Uni00a, VY01, Vau05a, WKP03, [Tyn05]. Invention [Bra06, Ifr00, Sav05a]. Wil99, Won01, Wri03]. International Inventions [Sav05b]. Inventors [Bar00c]. [Yun02a, YDKM06, ZJ04, Zhe02b, ZYH03, Inverse [Har06, OS07]. Inverses AMW07, AUW01, Ano00e, AJ01a, BCKK05, [CGH00a, Has01a, JP03, MFFT05]. Bir07, BC05c, CKL05, DV05, DWML05, Inversion DRS05, GKS05, HH04, HH05, HA00, Hon01, [BNPS02, KKY02, KTT07, SPG02]. May09, PC05a, PY05, PPV96, QS00, Sma05, Inversion/Division [KKY02]. inversive Son00, ST01d, WK06, Ytr06]. Internet [SB05]. Investigating [AMB06, BW07]. [SMP+09, ABB+04, Ben01a, Ben02, Cal00a, investigation [Cas02]. Investigative Che05b, Chu02, Cla00a, Coc03, DP04, [Men03]. investigator [KB00]. Invisibility DGMS03, EM03, Gal02, GSS03, HKW06, [GM03]. Invisible [MB08, WD01b, WC04]. IFH01, Jan00, MF01, McN03, MA00a, Invitation [Bar02]. Invited Mir05, PM00, PLW07, PvS01, Pho01, [FGM00a, Lan00d, DRS05]. involutional PHM03, Rub01, SBB05, SEK01, SEK02, [SHH07]. ions [Min03]. IP [Ano00a, CD01b, Sto01, Tsa01, TWL05, Uri01, WCJ05, Wri05, FXAM04, HL07, Lin07, MV03b, RW07]. ZGTG05, kc01]. Internet-wide [SBB05]. IP-based [MV03b]. IPAKE [CPP04]. Interoperability [Hil00, TEM+01, BHM03]. IPSEC [Vau02, CGBS01, Dav01a, interoperable [BFGT08]. Interpolation KMM+06, SKW+07, FS00, FS03a, XLMS06]. [LW02, YG01b, FWTC05, KT06]. IPSec-Compliant [CGBS01]. IPTables Interpolations [Sat06]. Interpretation [GC05]. IPv6 [Nik02a, Nik02b]. Iran [Mas04, CC04c]. interpretation-based [Mah04]. Ire [Cos03]. Iris [CJL06]. [CC04c]. Intersections [KS06a, KS09b]. Irregular [MH04]. Irregularly Interstate [RM02]. intranet [Jan00]. [CGFSHG09]. Irreversibility [ZWC02]. Intrinsic [ZWC02]. introduced [Ano00a]. ISBN [And04, Duw03, Eag05, For04, Introducing [JL00]. Introduction Gum04, Imr03, Pag03, Puz04, Top02]. [Ben02, Ber09b, Bis03a, BK06b, Buc00b, Island Buc01, Buc04, CLR01, DK02, DK07, Fal07, [CSY09, KGL04, Kim01, Lee04b, IEE07]. Hay06, HPS08, Hro03, HC02, KL08, MAA07, ISO [GM00b]. ISO/IEC [ISO04]. ISO9979 Mol01, Neu04, PTP07, PM02, PH03, Puc07, [TM01]. ISO9979-20 [TM01]. Isolated Res01a, Res01b, Rot05, Sak01, SJT09, [LSVS09, MMMT09]. Isomorphism [CY02]. SGK08, TW02, TW05, TW06b, Big08, Isomorphisms [CPP04]. Israel [Jol01]. CS07a, CM05b, Gar01, HW98, Hro05, KP03, ISSAC [Jef08]. issue [FOP06, FOP06]. Mol07, RR03a, RP00, Sho05b, TW06a, Issues [BDF+01a, BH00a, Hil00, KRV01, Kat05b, Rot07, Lee03a]. Intrusion Mea01, PBM+07, SEF+06, MKY08, Pat02b]. [CZK05, DFK+03, DP07, JT05, TZDZ05, ISW’97 [You01]. IT-Architectures TMMM05, WG05, HLL+02, MAC+03, [RM02]. Italy [AAC+01, AL06, BCKK05, NCRX04, NN02, YbJf04, IR02]. BC05c, CGP03, dCdVSG05, IEE04]. Intrusion-Resilient Itanium [CHT02, Int00]. Itanium-based [DFK+03, DP07, IR02]. intrusion-tolerant [CHT02]. Iterated [Jou04, Oni01]. [YbJf04]. intrusions [Bej06]. intrusive Iteration [Che03]. IV [Sch01c, HSH+01]. [AMB06, RFR07a, RFR07b, RFR07c]. IWBRS [LST+05]. IWDW invalid [CJT04]. Invariant [BCKK05, CKL05, KCR04, PK03]. [Ben00, CT09, HH09, ZLZS07]. Invariants 43

J2EE [BTTF02]. Jack [Coc03]. James [KYHC01, KSHY01, SM02]. Katholieke [Top02]. jamming [LPV+09]. Jan [BBD09]. Katz [Bar00a]. Keccak [YRY05b]. January [BDPV09]. Keep [DM07b, Lys08, FS04]. [Des02, GL05, IZ00, Vau05a, Wri03]. Japan Keeping [SEK01, SEK02]. KEM [NMO05]. [Ano00d, Mat02, Oka00, Coc02b, Smi01b]. Kerberos [BCJ+06, Coc01a, Gar03b, Hil00, Japanese [IY00]. Java [Ano04c, Mar05a, Ito00, LLW08a, MJD01, MPPM09, Rub00, WBL01, Ano02e, Ano03a, Ano04c, Ano04f, Smi01a, Wac05, WD01a, Wit01]. AJ01a, BCS02, Bis03a, BJvdB02, CMG+01, Kerckhoffs [KMZ03]. Kernel Che00a, CCM05, Coo02, DPT+02, DJLT01, [Int00, Mor03, BK05, HB06]. Key Dra00, EM03, Gal02, GW08, GN01, HM01a, [ANS05, ASW00, AK02a, Ano01n, Ano09d, Has02, Hoo05, Hun05, Lai08, LBR00, Ler02, AAFG01, AEAQ05, AL06, AF03, ABM00, LDM04, Mar02a, MWM01, Nis03a, RC01, BC05a, BPS08, BH06, BDG+01, BDZ04, Rot02a, SA02, SL00, Str01b, SJ05, Vir03, Bar00a, BPS00, BPR00, BBM00, BBDP01, Wei04, Win01, Zea00, ZFK04]. Java-Based BY03, BOHL+05, Ben02, BLM01, Bih00, [EM03, DPT+02, GW08]. Java-L¨osung BBB+02, BDK+09, BR00b, BM03b, [Ano04c]. J AVA - R i n g [WBL01]. JavaCard BDTW01, BMN01, BM03c, BGM09, BMP00, [AJ01a]. Javacards [Cim02]. JavaScript BCP01, BCP02a, BCP02b, BM01c, BST02, [TEM+01]. javax.crypto [Win01]. JBitsTM CK02a, CK02b, CHK03, CHK05, CPP04, [MP01a]. JCCM [CMG+01]. Jean Che01a, CT08a, CHKO08, CJ03c, CCW02, [MFS+09]. Jeju [CSY09, Lee04b]. Jeng CCM01, CKM00, CS02, CS03b, CS03c, [QCB05b]. Jenness [Sal03b]. Jessop DPV04, DJ01, DPS05, Des00c, DBS01, [Ano03b]. JICC [HYZ05b]. Jim [Coc01a]. Des02, DG03, DY09b, DKXY02, DFK+03, Job [MYC01]. jobs [Oue05]. Joel [Gum04]. DGH+04, DBS+06, ESG+05, EP05, ES00a, Johannes [Lee03a]. John FL06, FKSW00, FMS01, FL01b, GL03, [And04, BZ02, NH03, Rot07, Ano03b, Coc03]. GJKR03, GW00, GL01, Gol03, GHW01, Joins [Bar00c, Con00]. Joint GC01b, GSB+04, Gut04b, HNZI02, HCDO02, [ADI09, ADR02, CR03, HYZ05b, HYZ05a, HLM03, Hoe01, HR05, HG03, HC08, Puc03, MI09]. J¨org [Fal07]. Jose HJW01, HS07, HLC08, IEE00b, Ina02a, [Poi06, Pre02c]. Joseph [LBA00]. Journal Ina02b, JL08, Jou02, JG01, Jue04, Kal03]. [LLLZ06a]. Journey [FF01b]. Jr [Kat05b]. Key [KGL04, KOY01, KY03, Kat05b, Judiciary [Uni00h]. Julius [Chu02]. July Kel05a, Kel05b, Kel00, KKIM01, KM01a, [ACM01a, CZ05, Jef08, KJR05, May09, KLY02, KKY02, KY02c, KLC+00, KI01b, PPV96, Roy00b, Sch01c, S+03, Uni00a, KM04b, Kos01a, Kos01b, Ku02, KOMM01, Uni00b, Uni00e, Uni00d, ZJ04]. Jump KY01e, Kur01, KI03, LCK01, LLL02, LP03, [MP00]. June [ACM03a, ACM03b, ACM03c, LV00, Len01, Lin03, Lin00b, MPS00, Mac01, ACM04b, ACM04a, ACM05b, ACM07, MSJ02, MHM+02, May04, MR01b, MR01c, ACM09, ACM10, AL06, BS03, BS01b, M¨ol03a, Mol03b, M¨ul01a, Mur00, NIS03b, BCDH09, BC01, CZ05, FMA02, IEE05b, NA07, Ngu05, NBD01, NSS02, OTU00, IKY05, JYZ04, KGL04, KN03, KM07, Ort00, PHK+01, PR01, Poi02, PHM03, PPV96, TBJ02, USE01b, USE01a, USE02c]. RSA00a, RR00, RW03a, RW02, ST01a, Just [ABB+04, Ano06a, Gut02a, Car01]. ST02, Sha01e, Sin01a, SVW00, SK00, Ste01, ST01c, TSO00, Tan07b, TT01, VV07, Wal03, Kahn [Gas01]. Kaikan [Ano00d]. WZW05, WHI01, WC01a, Woo00, WBD01, Kaspersky [Ano08a]. KASUMI Wya02, YKMY01, YI01, YG01c, YDKM06, 44

Zhe02a, ZWCY02, ABHS09, AJS08, AUW01, [DPS05]. Key-Share [CT08a]. AKNRT04, Asl04b, AFB05, BHM03, Bad07, Key-Sharing [HNZI02, WBD01]. BBN+09, Ben01a, BB79, BG08, BBG+02, Keyboard [ZZT05]. Keyczar [Law09b]. BD00b, Bra01a, BCP07, BMA00a, BMA00b, keyed [K¨uh08, SR00, FIP02a]. BMA00c, BD04b, CCT08]. key Keyed-Hash [FIP02a]. keying [CL02b, CZ05, CYY05, CYH05, Che04a, [ABB+04, Che08a, EGK08]. Keyless [Qu01]. CHC04, CY05, CLC08, CKRT08, CWJT01, Keys [AOS02, APV05, AFI06, BT02, CJ04, CLK04, Cho06, CHH+09, CJL05, BMK00, BGW05, CHM+02, EHMS00, Fer00, CCD06, Cre00, DFM04, DG06, DMT07, HSH+08a, LXH07, Luc00, MN01, MRL+02, DW09, EKRMA01, ED03, EHKH04, FMY02, Moo07, Nit09, Oni01, PS00, Smi01c, Str02, FP00, GMLS02, Gal02, GH08, GL06a, TvdKB+01, Ano01k, BCL05a, BCW05, GMR05, GKM+00, GS01, GL06b, GMW01, Ber09a, BF01c, CWH00, CCH05, CJ05, Gue09, HCD08a, HCD08b, HAuR04, HSH+08b, HSH+09, HW04, HY03, HL04, HHG06, HLLL03, HTJ08, HG05b, HW03c, KAM08, LHL04b, LLW08b, LS01c, LWK05a, HWWM03, HMvdLM07, HLTJ09, Hwa00, ML05, NN03, Sch01e, Sha04b, Sha05b, SB05, HLL04, IZ00, Iwa08, IM06, Jan08b, JRR09, TLH05, TJC03, WH03, YRS+09]. JW06, JXW05, JZCW05, Jua04, KY00, Keystream [AMRP04,´ Kra02a, LV04, KS05a, KOY09, KHYM08, KAM08, KG09, MH04, WLW04, PS01a, SM11]. Keystroke Kim01, KPT04, KRY05, Kob00, KW00, [sHCP09, MR00, BGP02, jLC07]. Kos01c, KHKL05, LHL03a, LF03, LKKY03a, Keystrokes [SWT07]. Keyword [FIPR05]. LKKY03b, LCP04, LHL04b, LL04a, LW04, KGC [HLC08]. KGS [ZYW07]. KHAZAD LLL04, LL05a, LKY05b, LKY05c, LKY05d, [PQ03b]. KIAS [May09]. Kid [CAC06]. LLY06, LLS+09, LFHT07, LCK04, LPM05, Kikai [Ano00d]. Kikai-Shinko-Kaikan LHC08, LKJL01, LSH00, Lin01a, LS01c, [Ano00d]. kill [Lov01]. Killing [Lov01]. LCC05, Lop06, MWS08, MKKW00, MP08, Kilometer [Das08]. kind [DW01]. Kindi Miˇs08, MRT10, M¨ul01b, NP02a, PS08a]. key [MAaT03, MAaTxx]. King [Eag05]. [PI06, Pei09, Pei04, PQ03a, PQ06, PC09, Kingdom [DFCW00]. Kingston PSP+08, PLJ05b, Pot06, Pri00, RH03, [HA00, PT06]. Kit [Ano02e]. Klaus SNI00, SLP07, SRJ01, SBZ04, Sha05c, [And04]. Kleptographic [YY01]. knapsack SW06, Shi05, SL05a, SW05a, Shp04a, SC05b, [Kos01c, SLC05]. knapsacks [Mic02a]. SIR04, SLC05, Sun00b, Sun02, SZP02, Knife [Boy03]. Know SCS05b, SC05c, SCS05c, SY06, TP07, TO01, [CMB+05, Ros07, Con09, DKK07, Win05c]. TNG04, Tsa06, Tsa05, Tse07, VS01, Vau05a, Knowing [CH01a]. Knowledge VK08, WDLN09, War00, WLH06, WGL00, [Abe01, Abe04, AS01b, APV05, BP04, Cou01, WV00, WC01b, Wu01, WL04b, WHHT08, DPV04, DFS04, DDO+01, Eri02, Fis05, XH05, YW05, YC09a, YC09b, YS02, YSH03, Gen04a, GK05, HNO+09, KS06b, LMS05, YS04, hY08, Yi04, YRY05a, YRY05b, LHL+08, MR01b, MV03a, Pas05, Ros00a, YY05b, YPKL08, ZLG01, ZC04, ZK05, Ros06a, TG07, BDSV08, CLR09, Dam00, ZSM05, ZYW07, ABB+04, GL05]. Hro09, IKOS07, JRR09, PBD07, KK07]. Key-Based [Sha01e]. Key-Dependent Knowledge-of-Exponent [BP04]. Known [Gol03, BPS08]. Key-Exchange [CKN06, CMB+05, DN02a, Fur02b, HSH+01, [BH06, CK02a, KS05a]. Key-Insulated Bao04, YTH04]. Known-IV [HSH+01]. [DKXY02]. key-management [JW06]. Known-Plaintext Key-Privacy [BBDP01]. Key-Recycling [DN02a, Fur02b, CKN06]. knows [Fox00]. 45

Koblitz [AHRH08, Has01b]. Kolmogorov [Ree03]. Layer [Sch01a]. Kommunikation [Lin02]. Kong [LXM+05, LPV+09, SLP07, ZL04c]. layered [B+02, ZJ04, Cla00b]. Konstantin [Puz04]. [KVD07]. Layers [Gri01]. Laying [Lut03]. Korea Lazy [CCM05]. LDAP [CSY09, CKL05, KCR04, Kim01, Kim02, [Bau03a, Bau03b, BH00b]. Lead [Tsa07]. Kum07, LL03, Lee04b, LL04d, May09, Leak [RST01]. Leakage [CKN01, DP08, PC05a, PK03, Son00, Won01, WK06]. Kel02, RS01, ABHS09, CNK04, IY05]. Korner [Mor03]. Ko´sciuszko [OC03]. Leakage-Resilient [DP08]. leaked Krawczyk [Miy01]. Kryptoanalyse [Mad00b]. Learned [GSB+04]. Learning [Mor05]. Kuala [DV05]. Kunming [KS06a, LY07, CAC06, BKW03, KS09b, [ZYH03]. Kurosawa [CHH+09]. Kurtz Mal06, Reg05, Reg09, SM08, Whi09]. Least [Gum04]. Kyoto [Oka00]. [SZ01]. lecture [Rot02b, Rot03, Adl03, RSA03a, Riv03, Sha03b]. Lee L [Sem00]. L-collision [Sem00]. [Sty04, YRY05d, Coc02b, KRY05, KCL03, Laboratory [Bru06, LBA00]. Lagrange KHKL05, LKY05d, SCS05b, ZK05]. Left [FWTC05]. Laid [Wei06, Wei05]. Lam [Dhe03, HKPR05]. left-to-right [HKPR05]. [Wag00]. Lamar [LMHCETR06]. lamp Legal [Coc02a, AN03]. Legislation [Eng00]. [McN03]. LAN legislative [AvdH00]. legitimate [Lin01b]. [Bar03, LFHT07, Pau03, SZ08, Sty04]. Leighton [Rub00]. Leighton-Micali Lanczos [BF06a]. Landau [Jan08a]. [Rub00]. Length [AR01, BR00b, CKN00, Landscape [Ahm07]. Language [ARC+01, CHJ+01b, M¨ol03a, RK06]. DD02, Gou09, Jen09, MW04, WAF00]. Length-Preserving [M¨ol03a]. Leonard language-based [WAF00]. languages [Coc03]. Less [YKMY01, BD00b]. Lessons [Lun09, Rob02, Rob09]. Lantern [Ano01k]. [GSB+04, KFSS00]. Lest Laos [Lov01]. Laptop [PGT07]. Large [HSH+08a, HSH+08b, HSH+09]. Lets [AAC+01, BH00a, B+02, CDR01, Cro01, [Pau02a]. Lett [Kwo03b]. Letters EBC+00, FLA+03, GG01, Kuh00, PG05, [ASW+01, BTTF02, MNT+00, TEM+01, SM01, ST03b, USE00a, BP03a, CKY05, TvdKB+01, WWL+02]. Leuven CJ03b, Has00, HMvdLM07, HY03, PS08a, [BBD09, DR02c]. Level [EP05, MV00, SM03a, TM06, WL05]. Large-Scale TV03, BDN00, DHL06, KVN+09, SS03]. [CDR01, BH00a, BP03a, HMvdLM07, PS08a]. Levels [KM05, CUS08, Voi05]. Leveraging Larger [Car02]. LARPBS [CPhX04]. [BRTM09]. LEVIATHAN [CL02c]. Levin Lasers [Igl02, UHA+09]. late [Sch05c]. [AC02]. LFSR latency [RSP05]. Lattice [DS09, Jam00, JZCW05, MRT10]. [CD01b, HHGP+03, MV03a, MR09, BLRS09, LFSR-Based [Jam00]. LHL HPS01, HG07, IM06, Mic01, Reg03, Reg04]. [Pei04, YRY05a]. LHL-key [Pei04, YRY05a]. Lattice-based Li [JW01, KCL03, SZS05, QCB05a, SCS05b, [MR09, HPS01, IM06, Reg04]. ZK05]. Liaw [TJ01b]. Liberty lattice-reduction [HG07]. Lattices [Lan04b, Ano00e, Ano04e]. librarian [NS01c, Ngu01, GPV08, Gen09b, Mic02a, [PBV08]. Libraries [Fin02, MK05b]. Reg05, Reg09, Shp05, Sil01]. Launched Library [KSZ02, Lau05, Law09b]. Libre [Bar00b, Ano00j]. Launches [Ano02d]. lava [Jen09]. license [Ano00h]. Lies [McN03]. Law [Gan01b, Sch00d, Swa01, Che00b, Ste05c]. [GN06, MNFG02, Ste05c, NM09]. lawsuits Life [Cop04b, GSB+04]. lifecycle [HL06]. 46

Lifetime [Coc01a, CPG+04]. Lifting Logarithm [CNS02]. Light [WT02]. Light-Weight [CNS02, Che04b, CCW02, GV05, GPP08, [WT02]. Lights [Gei03]. Lightweight LW02, Hsu05a, HL05d, JLL01, LL04b, [EPP+07, Mal02, CH07a, CL09, MP07]. LHY05, Sch01e, SCL05, SLC05, Yas08]. Like [Coc02a, PSC+02, VMSV05, BCDM00, Logarithmic [EGK08]. Logarithms CWH00, DLP+09, Egh00, EBS01, Gou09, [CS03a, JL03, LHL03a, LTH05, PLJ05a, HSL+02, HL04, SKU+00, SLL+00]. LILI QCB05a, Sha05c, Sha05d, SCS05c]. Logging [JJ02]. LILI-128 [JJ02]. Limit [Das08]. [Fox00, MT09]. Logic Limitations [Gua05, Fis01a, LG09]. [BPST02, Cop04b, KBD03, KS06b, Li01, Limited [AK02a, LCD07, Buh06, Tse07]. Nie02d, SQ01, SC01, Tee06, TV03, BDNN02, limiting [CCK04b]. Limits [CWR09]. Lin BD04a, DZL01, SW02, WZB05, dH08]. [CC02b, CHY05a, KTC03, YY05b]. Line Logic-Based [KBD03]. Logical [Cho08a, DL98, Jan08a, Lai07, Lu02, SK06, [Asl04b, Kra07, SP03, CLK04, Zha08]. YLLL02, Bau05, BCS02, DL07, Luk01, Shi05]. Logics [IK03, IK06]. Login Linear [LL05c, CCK04b, CJT01]. Logistic [KJ01]. [BDK02a, BDK02b, BDQ04, CGFSHG09, Logo [LZ09]. London [Pag03, Top02]. CS05b, CHJ02, Cou01, CM03, Cou03, Long [ABRW01, Dur01, Eva09, GSW00, CDM00, CD01a, CDG+05, FM02a, FM02b, Gro03, PCG01, Zho06, BMV06, ISO05, GS03, GBM02, HLL+01, Hug02, JJ00d, LG04, SGMV09]. Long-Lived [GSW00]. Kan01, KMT01, Kin02, KM01c, KRS+02, Long-Term [ABRW01, Dur01, BMV06, KY01e, LLL+01, LS05a, NPV01, PSC+02, ISO05, LG04, SGMV09]. Look PG05, PZ02a, SNWX01, STK02, WF02, [Bon07, Has00, Lut03, Sye00, Hen06b]. YSD02, BD04a, Bul09, CKL+03, Cou04, Look-up [Has00]. Looking GHPT05, Kuk01, LLL04, Reg05, Reg09, [ASW+01, Ano01j, Cla00b]. looks [Nis03a]. RSQL03, Sel00, SLL+00, TM01, XSWC10]. Lookup [MFFT05]. loop [KVN+09]. Linearization [DDG+06]. Linearly loop-level [KVN+09]. Loopholes [Ste01]. [ADD09]. Lines [SP04]. Linguistic Lorenz [GHdGSS00, Sal00a]. Lorenz-based [CDR01]. link [LPV+09]. link-layer [GHdGSS00]. Losing [Sta05]. LosLobos [LPV+09]. linkages [ZAX05]. linked [Pri00]. Loss [LHS05, BC05b, Mit00]. Lossy [YWWS09]. Linking [GW00]. Linux [AIP01, HSKC01, PW08, Asl04a]. Lost [Lin02, ASW+01, FR02, Fin02, Fri01, GJJ05, [PY06, Rob02, Rob09]. L¨osung [Ano04c]. Gan08, GPR06, JEZ04, Lin02, Mor03, Pri00, lot [Cla00b]. Lotteries [FPS01]. Louisiana Shu06, Sta02b, Sta05]. LISA [USE00c]. list [USE00c]. Louvain [QS00]. [AGKS07]. Listening [Cas03]. little Louvain-la-Neuve [QS00]. Low [Che01d, Lam07, Sch05c]. Live [Lov01]. [Ano00d, BM01b, CH07c, GST04, HNZI02, Lived [GSW00]. lives [FNRC05]. living HGR07, JP02a, KBM09, RMH03b, RMH03a, [BCB+05]. LLL [CKY05, NS05c]. Load SU07, SHJR04, SZ01, WC01a, CL09, CO09b, [CC08, H¨of01]. Loads [GH02]. Loan Fan03, HLL03, LGKY10, LC04a, SK03, [SOOI02]. Loaning [Bla01c]. Local WLHH05, WLH06, WY05, ZYW07]. [NABG03, Lav09]. Locality [MFS+09]. low-computation [Fan03, LC04a]. Localization [WLT05b, CKL+09]. Locally low-cost [CL09]. Low-end [SU07]. [Vad03, Yek07]. Location Low-Exponent [SZ01]. Low-overhead [HY01, KZ01, LNL+08, Buh06, SG07]. [HGR07]. Low-Power Locations [Kra02b]. Log [Gen00b, HN04]. [Ano00d, JP02a, KBM09, CO09b, ZYW07]. 47

Low-State [GST04]. Low-Weight [CH07c]. TMM01, Woo00, Wya02, ASW00, AJS08, Lower AFB05, CG06, Cha05a, Dea06, GTY08, [BDF01b, BP03b, DIRR05, GT00, GGK03, ISO05, Jan00, JW06, KHYM08, KAM08, PS02a, Shp03, WW05, KS05b, Shp99]. LSB LMW05, LPM05, LR01, LK01, MKKW00, [CS05c, FGD01, WMS08]. LSB-encoded Neu06, Pot06, RH03, SRJ01, Sen03, Sma06, [WMS08]. LSD [HS02a]. Lu [QCB05b]. Smi08, UP05, Woo05, You04]. manager Luby [MP03, Pat03a]. LUC [LNS02]. [KH03, Sha01a]. Managing Luminy [PPV96]. Lumpur [DV05]. Lund [MA00a, MA00b, NDJB01, Oue05, PTP07, [Joh03]. lurk [Rie00]. LUT [CC02a, TL07]. PBB02, Tot00, BJ02, Kov03, KH03]. Luxembourg [Bir07]. Lyndon Mandrake [TvdKB+01]. MANETs [GS01, VS01]. Lynn [Hes04a]. LZ [AL04]. [STY07, DF07]. manipulation [SWR05]. LZ-77 [AL04]. LZSS [CFY+10]. Manuscript [GG05a, Rug04]. manuscripts [MAaTxx]. Many M [DNRS03]. [TM01]. MA [BB02, Di 01, MP03, Di 03, SVDF07]. [ACM10, JQ04, Kil05, KP01, Nao04, Pag03]. Many-Round [MP03]. many-to-one MAC [BKN04, CKM00, KI03, LPV+09, [SVDF07]. Map Vau01, Kra03]. MacDES [CKM00]. [XYXYX11, KJ01, Lee04a, PC05b, SL09]. Machine Maple [Cos00, TT00]. mapping [Tan01]. [LBA00, Mal06, Pro00, Cas06, Kid00, Pau02b, Maps [BGLS03, BMS03, CL04a, LLL+01, SWR05, WNQ08, Win05b, HM01a, Pet08]. WP03, JK01b, MA02]. Maqasid [MAaT05]. Macraigor [Ano02d]. MACs Marcel [Irw03]. March [BPR05, BR00b, BM01c, Sem00]. Made [BDZ04, Bir07, Bla03, HR06, PY05, Sil01, [Ste05b]. Madison [FMA02]. Maelstrom Uni00g, Uni00h, Ytr06]. Marian [Kap05]. [MYC01]. Magic [DNRS03, GH04, Bur02, Marjan [BCB+05]. Markers [FBW01]. GP00, Hro09, Ano01k]. Magyarik [dVP06]. Market [Bar00a, Ano01i, Neu06, Swi05]. Mail [ANR01, Cos03, KS00a, Law05, Marketplace [PLW07, VN04]. Markov Che01f, LL04c, NZS05, Smi03, All06]. mails [KW03]. Marks [Ano01c, YSS+01]. [LG09]. Mainframe [Web08]. mainstream Markup [Uni00a, Uni00d, Uni00e]. [Bjo05]. Maintaining [MJF07, Zho02]. Marrakech [IEE09a]. Marriott Maintenance [NABG03]. Maiorana [USE01b, USE01a]. MARS [Car02]. Majesty [Bud06]. Majority [BF00a, BCDM00, Fer00, IBM00, IK00, [GKKO07, SV08b]. Make KKS00a, KS00b, KKS01, SOTD00]. [BP06, Ber03, Sin02]. Makes [Pau09, Pal02]. MARS-like [BCDM00]. Mary Making [Che07b, CRSP09, Gar01, Lut03, [Ree01, Ros00b, Sin99]. Maryland Mit00, Mul02, Oec03, Per05a, Wri05]. [ACM05b, ACM05c, ACM09, SMP+09, Malaysia [DV05]. Malaysian [Kha05]. GL05]. Mash [And08a]. masked Malicious [HLC08, SZ03, YY04, Tsa06]. [AHS08, Lau08a]. Masking malleable [DW09, FF00, PR05]. Malware [CHJ02, CT03, GK02, Lav09]. [LH07, SZ03]. Man [Gen04a, Urb01]. Massachusetts Man-in-the-Middle [Gen04a]. [IEE05b, USE01b, USE01a, IEE03]. masses Management [Pot06]. Massive [Ano01l]. massively [ACM03a, ACM04a, Ano02d, Ano02e, BP07, [FP00]. massively-parallel [FP00]. Match BW07, ELvS01, FMA02, GK04, Gut04b, [JJ00a, WC04, LLC06a]. Matching KB06, Lin00b, Mit02b, Scr01, Sha02, [ABM08, Len01, UBEP09, Voi05]. 48 materialized [MSP09]. Materials [SLT01]. [MYC01, Moo01]. Meet [Cla00a, HG07]. Math [SR06, McN03]. Mathematical meet-in-the-middle [HG07]. meeting [AUW01, Cas06, FF01b, GL05, HPS08, [Jef08]. Meets [Way02a]. Melbourne Kat05b, You06, GKS05, Hil05, Sin09]. [IZ00]. Member [CTH08]. Membership Mathematics [NBD01, Fis01a]. Memoir [Bar05]. [BP06, Lew00, Nie02d, Sch05a, Wal00, Gar04, Memorable [KOY01]. Memoriam Sch00a, Sch01c, S+03, Sch04a, Sch04b]. [DNRS03]. Memory [AK03, AJO08, BS00b, Math´ematiques [RSA09b, PPV96]. CCM05, DK08, DGN03, HNZI02, HBdJL01, Matrices [TL07, CFVZ06, LMTV05]. KCJ+01, Oec03, OT03b, QSR+02, RSP05, Matrix [CV03, BF06a, OS07]. Matroids YEP+06, CC05d, Has00, Oiw09, Pau02a, [CDG+05]. Matsumoto [DDG+06, YG01a]. ST06, XNK+05, YGZ05]. Memory-Bound Mature [Tro08]. Max [Di 01]. maximal [DGN03]. memory-safe [Oiw09]. [H¨uh00, HJW01]. maximizing [GSK09]. Memoryless [Sar02]. MEMS [ECG+07]. maxims [Bau00, Bau02a, Bau07]. MEMS-Assisted [ECG+07]. ment Maximum [KMT01, ZC00, DW01]. May [CAC06]. menu [Mea04]. [ACM00, ACM02, ACM05c, ACM06, [Flu02a, Cro01]. Merkle ACM08, ACM09, Bih03, CC04a, Cra05a, [CDMP05, JLMS03]. Mersenne [Ano03f]. DRS05, IEE01b, Knu02, KNP01, MJ04, Mesh MS05a, PM00, Pfi01, Pre00, TLC06, Uni00f, [LPZ06, ZTP05, KB09, LZP+04, YPSZ01]. Uni00c, YKLM02a, Pau02a, YJ00]. Mbps Meshes [BGI08, Lav09]. Message [LMP+01]. McClure [Gum04]. McEliece [BKR00, BR02, BWBL02, BDF01b, CV03, [CFS01, KI01a, KI01b, Loi00, LS01c, Sun00b]. Coc02b, FIP02a, FGM00b, GTZ04, Jut01, McEliece-Based [CFS01]. McFarland OM09, SNR04, WS03, Zol01, BPS08, [Car02]. McGraw [Gum04]. McGraw-Hill CCH05, CJ05, Gav08, HW05, Kar02, MD04, [Gum04]. MD4 [DG02, WFLY04]. MD5 MS09c, Sha04b, TJC03, Wu01, ZF05, [Ano09c, Eke09, For09, WFLY04]. Me ZAX05, ZCW04]. Messages [CAC03, CNB+02]. Mean [Ara02, AR01, BR00b, CHJ+01b, DS05b, [Bar00c, KLML05, Ver06b]. Means Sch09, Wri05, Zho06, Alv00, Ano08c, [LMHCETR06, Nis03a]. measure [Lav09]. BCG+02, Bih02, BB79, Lun09, SP79]. Measurement messaging [Opp01, RR05]. meta [Ano02e, kc01, CO09b, FXAM04, RW07]. [SM08, PLJ05a, QCB05b, Sha05d]. measurement-based [FXAM04]. Meta-He [PLJ05a, QCB05b, Sha05d]. Measures [CB01, QS01, GSK09]. meta-learning [SM08]. metadata Measuring [Siv06]. Mechanising [Bel01]. [CDS07, FJ04]. metamorphic [CSW05]. Mechanism [Eva09, LXM+05, WY02, CL08, Metaphor [CNB+02]. Metering [BC04b]. CLK04, GH08, LCP04, ME08b, RFR07a, Method [BDTW01, GHK+06, GL00, Gro01, RFR07b, RFR07c, WAF00]. Mechanisms HRS02, HQ05, JKK+01, LL02, M¨ol02, [BACS02, CJK+04, Her09b, Lin00a, MD04, OKE02, OT03a, OT03b, SOHS01, TIGD01, Mir05, Pip03]. mechanized [dH08]. Media TSO00, WH09, WNY09, ZL05, AMRP04,´ [And08a, Hei07, CBB05, Ano02d]. DwWmW05, Gut04c, JL03, MSP09, media-streaming [CBB05]. Median MFK+06, WG02, WWTH08, kWpLwW01, [Cap01]. Mediated [DT03, CG06]. WLW04, YC09c, YCL07, CHJ+01a]. mediator [SBG05]. mediator-free Methodologies [SPMLS02, NdM04]. [SBG05]. medical [AL07]. Medicine Methodology 49

[VMSV05, HM02a, HCBLETRG06]. KZ01, KB07, KC02, KHD01, LCK01, Mal02, Methods [BCDM00, CFRR02, FD01, MM02, PL01, RKZD02, RdS01, RC01, Kin00, Lan00d, Mea01, Neu04, Sal05b, Rot01, SH00, ZYM05, CC05c, CJ03b, CF05, Sch06a, SM07b, TNM00, Vir03, Bau00, CF07, DHMR07, HP00, HYS03, sHCP09, Bau02a, Bau07, BGM04, BCHJ05, CM05b, ISTE08, KVD07, KXD00, LC03, LC04a, GKS05, JZCW05, LMSV07, LFHT07, Mal06, Lin07, LKZ+04, Par04, Pau02a, SSM+08, SSST06, Shp99, YW06]. Metric SL05a, TM06, TW07, Tse07, Wan04a, [LBGZ01, LBGZ02]. Metrics [LZ01, NP07]. YC09a, YC09b]. mobile-commerce Mexico [Buc00a]. MGC’05 [ACM05a]. [YC09a]. mod [TM01]. Modal [GN01]. Miami [Des02]. Micali [Rub00]. Michael Mode [Ter08]. Micro [ASK07, Eng00, Ste05c]. [BR02, Dwo03, HR03, HKR01, KSHY01, Micro-Architectural [ASK07]. SLG+05, WB02, Hey03, RBB03, ZL04c]. microcontrollers [GBKP01]. Model [Abe01, Abe04, BH05, BPST02, Microelectronics [IEE09a]. BL02, CLK01a, CS07c, CPhX04, Chi08e, Microprocessor [Web08, GP00]. CT09, DPV04, DFSS08, Din01, Din05, Microprocessors [LKM+05]. Microscopic ECM00a, Gra02b, HLC08, KLN+06, KW03, [MYC01]. Microsoft LJL05, MND+04, MNFG02, MR01b, MR01c, [Bon00, Scr01, Ste05b, Weh00]. Middle MSTS04, Pas03, SA02, Sal05b, Sar02, [Eag05, Gen04a, HG07, Kin01]. Middleware SFDF06, TZDZ05, Vad03, WCZ05, WT02, [ACM05a, KRV01, LGS01, MBS04]. WvD02, ZGLX05, ZP05, ZS05, BKW03, Migration [Pat02a]. Mikhailovsky CUS08, CCD06, Dam00, DFSS05, GMR08, [Puz04]. Milan [dCdVSG05]. military HILM02, LCX08, LLW08a, LLW08b, MS09b, [Ark05]. Million [Ran55, Ran01, Ano03a]. PS04b, SRJ01, TP07, DY09a]. MIME [Dav01b, Dav01c, LG09, Opp01]. Model-Based [Sal05b]. Modeling Min [MR01b]. Min-round [MR01b]. mind [AADK05, CDD+05, HMvdLM07, KS05a, [Lau08b]. Mine [For04]. Minimal ZP05, Laf00, SS04]. modelled [BG08]. [FBW01, FGMO01, JY01, SC02b]. Modelling [HCDO02, JP07, Puc03]. Minimalist [Tro08]. Minimizing [LPM05]. Models Mining [LP00, Lut03, HLL+02, Mal06, [Ben00, BB00a, LR07, Lin00b, WH09, Men03, Pin02, Pin03, ZY08]. MiniPASS Cra05b, GKS05, Lin01b, SC02b, vOT08]. [HS01b]. Minos [CC05e]. MinRank Modern [Gol99, Mao04, Pag03, SM07b, [Cou01]. Minutiae [UBEP09]. Swe08, Bud06, Fur01, IM06, KL08, Mol05, Minutiae-based [UBEP09]. Misbehaving SE01, Lut03, Lee03b]. Modes [JQY01, SBB05]. Misinformation [DGH+04, Dwo03, GD02, Gol01e, HSH+01, [CZB+01]. Missed [TvdKB+01]. MIST JMV02, JKRW01, Jut01, KY01a]. Modified [Wal03]. Mistakes [Ste05b]. MISTY [CHC04, HPC02, JY01, KI01a, ST02, [KYHC01, K¨uh01]. MISTY-Type Che08a, CJT01, HWWM03, LL04a, LL05a, [KYHC01]. MISTY1 [BF01a, K¨uh02b]. kWpLwW01]. modifying [CSV07]. Mithra [Fre03]. Mitigating [NLD08]. Mix Modular [BIP05, BKP09, CMJP03, CH07c, [JJ00a]. Mixed [SKR02]. Mixes [M¨ol03a]. Dhe03, FP00, Gro01, Har06, HGG07, JP03, Miyazaki [WHLH03]. MMM [GKS05]. NSS02, PP06a, PG05, SK07, Ste01, Tan07a, MMM-ACNS [GKS05]. Mnemosyne Wal01, WL04a, HSD+05]. Modulation [RH02, HR02]. Mobile [AS01c, Che07a]. Module [Ano02d, LM00, [Cha05a, CFRR02, Dim07, GN06, JP02a, SGM09, ARJ08, BG09, Jan08b]. Modules 50

[FIP01b, NIS01b, GJJ05, JEZ04, Sei00b]. [ARR03]. Multi-designated [LV07]. Moduli [Bai01b, GMP01b, Wal01]. Modulo Multi-Domain [CJK+04]. multi-factor [ACS02, Gon06, Gro03, MFFT05, Zhe01, [BSSM+07]. multi-hop [NC09]. Wan05]. Modulus multi-linear [LLL04]. Multi-party [Ano01o, CGH00a, CDL+00, SZ01, WY02, [CDM00, CDG+05, FGMO01, FWW04, WS02, LKYL00, WWTH08]. HM01b, LLL04, CLOS02]. Modulus-Based [WY02]. Mollin [Kat05b]. Multi-property-preserving [BR06]. MOM [DJLT01]. MONA [KMS01]. Multi-Proxy Mondriaan [BF06a]. Money [ZJ09, HC04b, LW05c, TYH04]. [Ano01a, YKMY01, JP06]. monitor Multi-Receiver [CCD07]. Multi-recipient [MK05a]. Monitored [PS05]. Monitoring [Kur01]. multi-scroll [HHYW07]. [AK02a, BCS02, Por06, Bej06, GXT+08, multi-secret [CC05a, CHY05a, FWTC05, ZGTG05]. Monitors [JT05]. Monks PW05, SC05a, YCH04]. Multi-server [Eag05, Kin01]. monoalphabetic [GPG06]. [Tsa01, LHL03b, Tsa08, TWL05]. monolithic [GHdGSS00]. Monotones Multi-Servers [HS07]. multi-signature [WW05]. Monsters [And08a]. Monte [HWH05, HC04b, HL04, LCZ05b, LW05c, [Bi09, Sug03]. Monterey [USE02c]. TYH04]. multi-stage [CHY05b]. Montgomery [CH07c, HKA+05, NMSK01, Multi-trapdoor [Gen04a]. Multi-user OS01, PS04a, TSO00, Wal01, WS03]. [BBM00, DLY08, GMLS02]. multi-valued Montgomery-Form [OS01]. Montpellier [DZL01]. Multiagent [ZS05]. [KM07]. Montr´eal [ACM02]. Morocco Multiagent-Based [ZS05]. multibit [IEE09a]. MorphoSys [Tan01]. MOSS [TND+09]. Multicast [Dav01b]. Most [GG05a, Shp02, Tyn05]. [AIP01, BPS00, BDF01b, ASW00, Asl04a, Mothballed [Bar00c]. Motif [Bi09]. CBB05, GIKR01, GL06b, JA02, KB09, Motion [EFY+05, hKLS00, WMDR08]. MP08, PCS03, YC08, ZCW04]. Mountain [JYZ04]. mouse [HLwWZ09]. Multicollisions [Jou04]. Multilevel move [Jac00]. movement [HLwWZ09]. MP [LN04]. Multimedia [AAK09, FMS05, [MP07]. MP3 [DRL09]. MPEG GA05, HL07, LLRW07, Sun05, WLLL09, [LHS05, MLC01, SG07, YZDW07]. DY09a, DKU05, Laf00, Ren09, SG07, YC08]. MPEG-4 [SG07]. MRF [Che01a]. MRM Multimodal [PY08]. Multipartite [HR13]. [TIGD01]. MSP430x33x [GBKP01]. Multiparty [BCC02, BGOY08, CDN01, MSXML [TEM+01, Hei01]. Mu [CJT03]. DN03, DI05, GIKR02, OZL08, PMRZ00, Much [Che01d, Con09]. Multi CDD00, HT04, IKOS07]. multipath [ARR03, BBM00, BR06, CCD07, CJK+04, [SK05b]. Multiple [AIK+01, Ara02, BDQ04, CDM00, CDG+05, DLY08, DJLT01, CLK01a, CLK01b, CHSS02, Che08b, DK05, FGMO01, FWW04, Gen04a, HM01b, HS07, Har00, HZSL05, HLT01, Jab01, STK02, JLL02, Kur01, LV07, LLL04, Tsa01, ZJ09, SR06, TIGD01, BLH06, Che04a, CJ04, BSSM+07, CLOS02, CC05a, CHY05a, DM07a, HLH00, KC09a, MN14, Sha01d, CHY05b, DZL01, FWTC05, GMLS02, SW05a, TCC02, YW05, YSH03, YRY05b]. HHYW07, HWH05, HC04b, HL04, LHL03b, multiple-key [Che04a, CJ04, SW05a, LCZ05b, LW05c, NC09, PW05, SC05a, YW05, YSH03, YRY05b]. Tsa08, TWL05, TYH04, YCH04]. Multiple-Precision [HZSL05, MN14]. Multi-applications [DJLT01]. Multiple-watermarking [Che08b]. Multi-Authority [JLL02]. Multi-channel Multiples [HR00]. Multiplication 51

[AHRH08, ADDS06, BKP09, CMJP03, Necessity [SBZ02]. Nederlanden [dL00]. CH07c, Dhe03, GLV01, HM02c, KKIM01, Need [Coc01a, HR04b, Sty04]. Needs M¨ol02, NMSK01, OS01, Tan07a, Wal01, [CZB+01, DKK07]. Negotiation BINP03, DwWmW05, FP00, GD05, Has00, [DBS+06, HHJS04, IY05, LLW05, LLW09]. Mis06]. Multiplications [Har06, OT03b]. Nema [Kid00]. NESSIE [Pre01, Mac00, Multiplicative [Has01a, KO03, MFFT05]. Pre02a, Pre02b, SGB01, DPVR00]. nested Multiplier [HKA+05]. Multipliers [LCK04]. Net [CAC03, Ano08b, LKJL01]. [CMJP03, KWP06, RMH03b, WS05, Netherlands [Knu02, Ano01m]. NetHost HGNS03, RMPJ08, RMH03a]. Multiply [AMB06]. NetHost-Sensor [AMB06]. Nets [KTT07]. multiprocessor [ISTE08]. [AADK05]. Netspionage [BK00]. Network Multipurpose [Boy03]. Multireceiver [Ano02d, Ano03c, Bar03, BGOY08, Con04, [HSZI01]. Multiresolution CLZ02, Dim07, FBWC02, Gum04, Har05a, [hKLS00, YPSZ01]. Multiset [aSM01]. IKY05, JYZ04, KKG03, KPS02, Ken02b, Multisignature [Tad02, CWH00, CL04c, LMP+01, Lu07, Mal02, NNAM10, NN02, CCH04, He02, LWL09, LC04b, LWK05b, PZDH09, PZL09, Poo03, RCBL00, RC05, Wu01, YY05a, ZX04]. multisignatures Sty04, TLYL04, VMC02, YC01, ZYH03, [CL00, WH02b]. Multithreaded [Zha00]. ZS05, Bru06, CJ03b, CMS08, Coc01a, Multivariable [DS05a]. Multivariate DWML05, GKS05, HLL+02, LC03, LPV+09, [DY09b, BGP09, FP09]. Municipal MW06, ME08a, MSK03, Miˇs08, Pri00, [MJF+08]. museums [Six05]. Music RAL07, Sch00c, Sta02a, TIS07, Vac06, [MNS01, XMST07]. mutargima [MAaT05]. Wyl05, YLT06, ECM00a, ECM00b]. Mutation [Lut02]. Mutual [JP02a, KH05, Network-Attached [RCBL00]. CCS08, SW06, VK08, YWWD08, YC09b]. network-based [HLL+02]. Networked Mutually [WC01a]. My [Che05b]. [Sch00d, Che00b, LB05]. Networking MYCRYPT [DV05]. mysterious [Bel07a]. [ACM01b, Ros07, Moo01, VM03]. Networks Mystery [GG05a, Rug04]. Myths [AEAQ05, BJLS02, CGM07, DBS+06, Fin06, [GO03, kc01]. GPCS08,ˇ Gor05, JKRW01, KZ01, Ken02a, KH05, LNL+08, NABG03, PR01, RKZD02, N [Mar05a, AOS02, KOMM01]. NAF Sin01a, WT02, Zea00, ZYN08, ZWCY02, [OT03b]. Names AJS08, Asl04a, BBG+02, BC05c, CCMT09, [Coc01a, Sha02, Ark05, CGV09]. Naming CGP03, CBD+05, DHMR07, ETMP05, [Ano01b, BH00b]. Nanotechnology HJ07, HMvdLM07, JRR09, KXTZ09, [RR03a, RR03b]. Naor [Zha06]. Napoleon KHYM08, KB09, KVD07, LDH06, LHC08, [Urb01]. narrowed [Sch04d]. narrowing LW05a, LLH06, Lin07, LN04, Lop06, [MT07]. NASA [Ano02c, Wil99]. Nation LKZ+04, MWS08, MJF+08, MS09b, NC09, [Lan04a]. National NLD08, PCSM07, PS08a, Pat02b, SLP07, [BWE+00, Jol01, LCS09, AJ08, Bam02]. SSM+08, TP07, TM06, TCR03, TW07, National-Scale [BWE+00]. Natural WDLN09, XwWL08, YC07, ZSJN07, [ARC+01, Top02, WMS08]. Nature [Pag03]. ZBLvB05,ˇ Ano02d, CS08b]. Neural Naval [LBA00, Goo00]. Nazi [KMS02, PZL09, PR01, YC01, YC07]. [Hau06, KS04]. NC [AIK04]. nCipher Neural-Network [YC01]. Neuve [QS00]. [Ano03g]. NCP [SQ01]. NCR [LBA00]. Nevada [ELvS01, IEE01a]. Never Near [BC04a, DPS05]. Near-Collisions [Wei00, Hau06]. Newfoundland [NH03]. [BC04a]. Necessary [LCK03, MN01]. Newman [Pag03]. Newmanry [Sal01a]. 52

News [Ano03d, Bar00a, Bar00b, Bar00c, non-perfect [DM07a]. non-physicists Cla00a, Coc01a, Coc02a, Coc02b, Coc03, [RP00]. non-quantum [IM06]. Eng00, Fox00, MYC01, MP00, PM00, non-repudiation [HLL04, LSA+07, SC05c]. Pau02a, Pau02b, Pau03, Pau09, Pri00, Non-trivial [KO00]. Non-Uniform CAC03, CAC06, Sta05, Raj06]. Newton [SPK08]. nonce [CY05, LKY05a]. [KT06]. Next nonce-based [CY05, LKY05a]. Nonces [ESG+05, McL06, TV03, Van03, Web08, [BR00a]. Noncontact [Sak01]. BD04b, ISTE08, RR03a, Ros04]. noninterference [DFG00]. Next-Generation [ESG+05, Web08]. NFA noninvertibility [HRS08]. Nonlinear [DIS02]. NFS [Sta02b]. Nice [DS06, JJ00c]. [BP01a, BI05b, CV02, Che01c, LBGZ01, Nicko [Ano03g]. [Fur02a, Mac00]. LBGZ02, SM00a, ZC00, BGPGS05, CFVZ06, nine [Tat05]. Ninth [USE00d]. NIST KH08]. Nonlinearity [SM00b]. [BG07a, Dra00, Hir09, Kel05a, Kel05b, Nonmalleable RRS06, SF07]. NIST-Recommended [ABW09, DDN00, DDN03, PR08]. [Kel05a, Kel05b]. NMAC [RR08]. nonrepudiable [TYH04, YTH04]. NMAC/HMAC [RR08]. NNAF nonrepudiation [HW05, OZL08]. [DwWmW05]. No Nonsecurity [Sch07]. Nonuniform [CU01]. [Sta05, Sty04, Uni00g, Wei06, Wei05, CC05b]. Normal Nobel [MNT+00]. Node [BRTM09, Fox00]. [Ran55, Ran01, GPS05, Mic01, RMH03a]. Nodes [ZYN08, RAL07]. NOEKEON Normalization [VK07]. Norway [Ytr06]. [DPVR00]. Noise [BKW03, GA05, Nose [Fox00]. notarization [LG04]. MPSW05, SDMN06, MS09a, PC00]. Notarized [GTY08]. Notation noise-based [PC00]. Noise-tolerant [Eag05, Kin01]. Note [BKW03]. noisy [HGNS03]. Nominative [CWY05, FS02, GMP01a, GIS05, KCP01, [PL01]. Non Ros00a, MF07, PC05b, Yan02, Zha06]. [BR05, CHK05, CZB+01, DN00a, DDO+01, Notes [KSF00]. Nothing [Des00c, SR00]. DW09, FF00, Fis01b, Fis05, FGM00a, Notions [BPS00, BN00a, CK02b, DKMR05, FGM00b, HNZI02, HJW01, IYK02, IYK03, HU05, Kos01a, Des00a, KY00, PS04c]. JT01b, Kos01c, KO00, MSTS04, Nie02b, Novel [BBC+09, CC02a, CYH01, CDTT05, PHK+01, Pas05, SPK08, WBL01, DM07a, CW09, HC08, MP01c, WCJ09, AJS08, DS02, H¨uh00, HLL04, IM06, KKL09, BG08, CCS08, DSGP06, GB09, HG05a, KHL09, LSA+07, PR05, RP00, RFR07a, MRT10, SPG02, SCS05a, mSgFtL05, WC05]. RFR07b, RFR07c, SC05c, XSWC10]. November [ACM01b, ACM05a, BZ02, Non-adjacent [JT01b]. Non-committing CKL05, Eke02, IEE00a, IEE02, Lai03, LL03, [DN00a, Nie02b]. Non-Cryptographic LL04d, MS05b, PK03]. novice [WBL01, IYK02, IYK03]. Non-injective [Dew08, Gou09]. Novo [Bi09]. NP [Kos01c]. Non-interactive [AGGM06, FS08, HN06, AGGM10]. [CHK05, DDO+01, Fis01b, Fis05, HNZI02, NP-hardness [AGGM06, AGGM10]. HJW01, MSTS04, Pas05, KKL09, KHL09]. NPCryptBench [YLT06]. NSA [RC05]. Non-interference [BR05]. non-intrusive NSF [Han00]. NSS [GJSS01, HPS01]. NT [RFR07a, RFR07b, RFR07c]. non-linear [Str01b, USE00a]. NT/2000 [USE00a]. [XSWC10]. Non-malleable NTRU [GJSS01, GS02c, HPS01, HHGP+03, [DW09, FF00, PR05]. Non-maximal HGNP+03, HG07, JJ00b, NP02b]. [HJW01, H¨uh00]. Non-OOSD [CZB+01]. NTRUEncrypt [HHG06, KY09]. 53

NTRUSIGN [RBB03]. occur [Web02]. Ocean [MYC01]. [HHGP+03, HHG06, HWH08, ZJ09]. October NTRUSign-Based [ZJ09]. Number [AJ08, BD08, CKL05, IEE01a, IEE03, IEE04, [BIP05, BST03, BK06a, Che08b, Cos00, IEE05a, IEE06, IEE07, IEE08, IEE09b, CD01a, CFS05, Dic03, DGP07a, DGP07b, KCR04, LST+05, TTZ01, USE00b, ZYH03]. DV08, Eag05, EHK+03, Fin06, Gon06, Octopus [Cla00b]. Oded [Lee03b]. odyssey GPR06, Hig08, Int03, Kat05b, Kel05a, [Gol08]. Oedipus [Lav06]. Off [AJO08, Kel05b, Ket06, KM01b, LMHCETR06, Coc02b, Oec03, Shi05, YLLL02, Bau05]. LNS02, MNP01, NR04, NNAM10, RSN+01, Off-Line [YLLL02, Shi05, Bau05]. Offering SP05, Sch06b, Shp99, Shp03, SFDF06, [YC08]. Office [Uni01]. officer [Kov03]. TWNA08, TL07, TZT09a, TZT09b, Vav03, Official [BP01b, Coc02b]. Offline Wal00, Yan00, YKLM02b, Aam03, AUW01, [DJ06, ST01b, WV01]. Offs [PS01c]. OH BS02, BK07, Bel08, BGPGS05, BG08, BG09, [BD08]. oil [RD09]. Old [Eva09, Lov01]. BG07a, BGL+03, CFY+10, CNPQ03, CO09b, On-Demand [SEF+06]. On-Line DIM08, DGP09, FP00, HG05a, HGNS03, [Lu02, BCS02, Luk01]. One HLwWZ09, HP01, JAW+00, JL03, KH08, [AK02a, BYJK08, CHL02, Che03, DIS02, KSF00, Kin01, Lam01, LGKY10, Mit00, Di 01, DW01, DMS00, Fis01b, GKK+09, MRT10, Nie02a, Nie04, Pan07, PSG+09, HNO+09, HM02b, HR05, KI01a, KO03, PSP+08, PC00, RGX06, SH11, Sho05b, KO00, LTW05, LDM04, MLM03, PV06b, Shp05, Sim02, Ste08, SR07, Sti11, SK01b, PG05, PLJ05b, RR02, Sho00a, Uni00a, Tat05, Wag03, Was08b, XSWC10, YZEE09]. Uni00b, Uni00f, Uni00e, Uni00h, XYXYX11, Number-Notation [Eag05, Kin01]. YZ00, YKLM02a, AGGM06, AGGM10, Number-theoretic [NR04]. Numbers BYJK04, CCK04b, CHY05b, CJ04, CC05d, [BCGH11, GH04, HSR+01, HBF09, Ifr00, Di 03, DS02, GKK+07, HR07, HRS08, MN01, ST03b, AG09, HW98, KB39, Kir01b, HLTJ09, JZ09, KK07, KKKP05, KK03, MFK+06, SS03, Shp05, Tip27]. numeric LW04, LPM05, LQ08, LC04a, Mic02a, Poi00, [AKSX04]. Numerical [WWL+02]. SVDF07, SV08a, SW05a, Tsa08, YW05, numerically [Sav04]. Numerous [CC08]. YRY05b, ZW05a]. One-Dimensional NURBS [Ben00]. NUSH [WF02]. NY [XYXYX11]. One-Time [HM02b, LDM04, [HR06, IKY05, KJR05, Sch01d, YDKM06, RR02, CCK04b, DS02, HLTJ09, LC04a]. Ano01l, NIS00]. Nyberg [Ara02]. one-variable [SV08a]. One-Way [BYJK08, CHL02, DMS00, Fis01b, GKK+09, O [Kat05b, Puc03]. OAEP [Man01, BF05, HNO+09, HR05, KO03, KO00, LTW05, BF06b, Bon01, FOPS01, Sho01]. Sho00a, YZ00, AK02a, AGGM06, AGGM10, Obfuscated [NS05b]. Obfuscating BYJK04, CHY05b, CJ04, GKK+07, HR07, [BGI+01]. obfuscation [CT02]. Object HRS08, JZ09, KK07, KKKP05, KK03, [RSA00e, DHL06, MWM01, ST06]. LW04, LPM05, LQ08, Mic02a, Poi00, Tsa08, object-oriented [DHL06, MWM01]. YW05, YRY05b, ZW05a]. One-Wayness Objects [CCM05, ZTP05, PB01, Whi09]. [KI01a, PV06b]. Ongoing [Sam09]. Onion Oblivious [CT08b, Din01, FIPR05, IKNP03, [CL05]. Online SDF01, GKM+00, KKL09]. obscurity [BDF+01a, BBKN01, Fis05, LCS09, Ort00, [MN03]. Observability [JQYY01]. Rey01, ST01b, VAVY09, Voi05, FNRC05, observers [JL04]. Obstacles [KM04a]. Fox00, Pan07, Tyn05, PT08]. Obtaining [Bar06b, BP03b]. OCB Online/Offline [ST01b]. Only 54

[BBK03a, CF01b, GL01, Hoe01, VV07, Kra01, Luc02b, NNT05, NM09, Sty04, BCDM00, FKS+00, GHJV00, Iwa08, IK00, Tad02, Zhe01, BF01a, Coh03, JZCW05, Jon08, KKS00a, KM00, LM08, Mes00, KS06b, QPV05]. Order-Specified [Tad02]. Wan04b, Yas08]. Ontario ordered [HY03, WL05]. Ordering [Mea04]. [HA00, ST01d, VY01]. OOSCD [CZB+01]. Orders [HJW01, PS02b, HM00, H¨uh00]. OOSD [CZB+01]. Open Ore [CHH01]. Oregon [ACM00, BCDH09]. [Bar00c, Bol02, Can06b, EP02, Gut00, Joh05, Organization K¨us02, Lin02, Mea01, PM00, VDKP05, [JG07, MMZ00, MP00, C+02]. Ano03d, ETMP05, McA08, Bar00b, Lin02]. Organizational [PTP07, BJ02]. organized Open-Ended [K¨us02]. Open-Secret [AUW01]. Oriented [HR00, LZL+01, [Joh05]. Open-Source NNAM10, SKU+00, ZCC01, CHC05, [Bol02, Gut00, McA08]. OpenCard [HF00]. CWJT01, DHL06, HWW04, LL06, LWZH05, Opening [CAC03]. OpenSSH MWM01, Sae02, Sha03c, TJ01a, WHHT08]. [Bau01c, Sta02b, TvdKB+01, Hos06a, Mos06]. Origin [MABI06, MD04]. Original [JQY01]. OpenSSL [Fri01, Res01a, Res01b, Sti06a, Originators [Cop04a]. Origins [Cop04a]. VMC02, YRS+09, Bel08]. Operating Orleans [USE00c]. Orsay [DPT+02]. OS- [BCST00, DGP07a, DGP07b, IEE01b, SR01, [CRSP09]. oscillator [BGL+03, GB09]. CGL+08a, CGL+08b, CGL+08c, DGP09, oscillator-based [BGL+03]. oscillators KWDB06, MPHD06, SETB08, TKP+08]. [SPG02]. OSNP [HLTJ09]. Other Operation [BR02, BKM07, Dwo03, EP02, [BF05, Ngu05, Wri05, Cla00b]. Gol01e, HSH+01, JKRW01, KY01a, Bud00b, Otherworldly [MYC01]. Ottawa RBB03, Win00]. Operation-Centered [AMW07, MZ04]. our [Sta05]. ourselves [BKM07]. Operational [WA07, GMG00]. [Fur05]. Outbound [Smi02]. Output Operations [BIP05, IMM01, KDO01, [Dic03, YJ00]. Outsource [HL05a]. KS05c, LS01b, Ark05, Dug04]. operator outsourced [Wan05]. Operators [CH00]. opinion [MSP09, MNT06, YPPK09, YLC+09]. [BHM03, GS07b, Lan00c]. Opponent overcoming [CHC04]. Overdefined [Cos03]. Opportunities [CWR09]. Optical [CP02]. Overflow [FOBH05, Fry00, Ino05]. [Kuh02a, Pau02b]. Optimal [Bai01a, overhead [HGR07, IKOS08, RSP05]. BDDS03, CHJ+01b, CDF01, CF02, DPS05, overheads [XLMS06]. overlay DNP07, GMW05, IR01, KO04, KS03, LZ09, [SL05b, YC08]. overlays [SK05b]. Man01, MPSW05, MP08, SNR04, YY01, Overshadow vDW04, BCD06, HKS00, LSH03a, LSH03b]. [CGL+08a, CGL+08b, CGL+08c]. overview optimality [NK06]. Optimised [TL07]. [SVEG09]. own [Phi06]. own-goals [Phi06]. Optimistic [CC00, DLY08]. Optimization Ownership [Hro03, Ken02a, Kre05, KV01, SMTM01, [AS01b, Nik02a, Nik02b, CL08, Lin01b]. TLYL04, WPP05]. optimized [LC03]. optimizing [Dwi04]. Optimum P [Puc03, AKS02, KR03]. P1363 [IEE00b]. [KWP06, OKS06]. option [Mat05]. options P2P [BRTM09, STY07, WN02, YLR05]. [Fri07, Pot03]. Opts [Han00]. Oracle P2Ps [LHL+08]. PA [Cor00a, WWCW00]. [ABR01, Abe01, Abe04, BF05, Chi08e, PA-RISC [Cor00a, WWCW00]. PACA Gra02b, Nie02b, Pas03, Ano02e]. Oracles [Art04]. Package [Win01]. Packed [LH07]. [BNPS02, BB04, KG09, RG09]. Order Packet [AKSX04, Bai01a, CV02, KCP01, KCJ+01, [BR09, WRW02, WLZZ05, BC05b, CMS08]. 55

Pad [LDM04, DS02]. [Wue09]. Parameterizable [KPMF02]. [AR01, BCCN01, CKN00, CJNP02, KO03, parameterization [LZP+04]. Parameters LS01a, Man01, Vau02]. Paddings [NP02b]. [ZLK02]. Parametric [Vir03]. Paranoid PadLock [Lud05]. PadLock-wicked [Bau01a, Bau01b, Bau01c, Bau02b, Bau03a, [Lud05]. Page [IEE00b]. PageRank Bau03b, Gua05, Oue05, Ste05a, Luc06]. [GPC08]. pages [Fal07, Rot07]. paging Parascript [Ano02d]. Parasitic [ETZ00]. [SZ08]. Paillier Parents [Pau02a]. Parents-to-Be [Pau02a]. [CGHG01, DJ01, NSNK05, ST02]. Pair Paris [ACM04a, GH05, KNP01, NP02a]. [WCJ09]. Pairing [BKLS02, BF01b, BF03, Parity [DRL09, KKG03, You01, BKW03]. CHSS02, GPS06, HCD08a, HCD08b, KM05, Parity-Based [KKG03, DRL09]. Park LXH07, Kir03, PV06a, SKG09, Sma03a, [Cop05, Cop06, Cop10, HS01a, Sal00b, GPS05, Lee04a, PC05b, VAVY09]. Sal05a, SE01, Smi01b, Wei06, Win00]. Part Pairing-Based [BKLS02, GPS06, KM05, [Har01a, Har01b, ISO04, ISO05, Puc06, LXH07, PV06a, HCD08a, HCD08b, GPS05]. TR09b, Can06a, SK01b, Bau01a, Bau01b, Pairings Bau01c, Bau03b, Res01a, Res01b, Wac05]. [Bon07, BGH07, Jou02, SB04, ZK02, CJL05, Partial DSGP06, LWZH05, LC05b, SW05a, VK08]. [BM03b, Cor02, Her06, ABHS09, CP07]. pairs [LYGL07, Shp01]. Pairwise Partial-Domain [Cor02]. Partially [CLLL00, FM02a, HMvdLM07]. PAKE [AO00, MSP09, Bao04, Fan03, HC04a, HY03, [HTJ08]. Palm HLL03, WL05, WLHH05, WY05, ZC05]. [BDhKB09, WPS01, Wil99, Ano02d]. Participatory [CTBA+01]. parties Palmprint [KZ09]. PAM [FR02, Sei00b]. [LKY05b]. Partition [CTH08, WJP07]. Panama [BDPV09]. Panel [FL01b]. Partitioned [DN04]. partitioning Panopticon [YN01]. Paper [BF06a, Che07a]. partitions [Sav04]. Party [CC09, MFS+09, Pet08]. Papers [KO04, Lin01c, MR01a, WW05, WV01, [Ano04b, Ano07b, Ano07a, Sch00b, Ytr06, CLOS02, CLC08, CDM00, CDG+05, Wil99, Bla03, Chr01, CCMR02, CCMR05, FGMO01, FWW04, GCKL08, HM01b, CSY09, CGP03, DR02c, GH05, Joh03, JW01, LHL04b, LLL04, LLS+09, LSH00, Jue04, KKP02, KCR04, LL03, LL04d, YC09a, ZLX99]. Pass [SK00, MT02]. passe MS05a, Mat02, MZ04, NH03, PK03, PT06, [Car00]. Passes [Coc03]. Passing [Vir03]. RM04, Sil01, AMW07, AJ01a, Bir07, BC05c, Passive [Sha01c, VV07, RW07]. CZ05, CKL05, DRS05, HH04, HH05, PC05a, Passive-Only [VV07]. Password PY05, WK06, Wri03]. Paradigm [BN00a, [BMN01, BMP00, CHVV03, CPP04, CS07b, CS02, Gol03, KD04, YC01, BKN04, Can01a]. CC01b, DG03, GL03, GMR05, Har01a, Paradigms [Des00b, Swa01, Hro05]. Har01b, Jab01, KOY01, LSH03a, LSH03b, Paradise [USE00b]. Paradox [Che01b]. MPS00, Mac01, MSJ02, Ngu05, SBEW01, Parallel [AHRH08, App07, AEMR09, SY06, WHL05, YS04, ZWCY02, CC01a, CPhX04, CTLL01, CNPQ03, CNB+02, CC04b, CCK04b, CYH05, DG06, FLZ02, Dam07, DM00b, JL08, KY02c, Lin01c, Fur05, GL06a, HTJ08, JM07, JPL04, Jua04, MFS+09, PS04a, RMH03b, SS01a, BF06a, KLY03, KJY05, KTC03, KCL03, Ku04, FP00, MRT10, OS07, RMPJ08]. parallelism KCC05, KHKL05, LLH06, LFW04, LH03, [KVN+09]. Parallelizable [BR02, M¨ol02]. LC04a, Pha06, Sco04, SLH03, Shi05, WLT03, parallelizing [Fis01a]. Parallizable XwWL08, YW04a, YWC05, YS02, YPKL08, [LKKY03a, LKKY03b]. parameter ZDW06]. Password-Authenticated 56

[BMP00, DG03, KOY01, MPS00, Mac01, LWK00, MM01b, NFQ03, PWGP03, MSJ02, Ngu05, DG06, HTJ08]. PBTW07, SKKS00, SW00a, SB01, Siv06, Password-Based SL00, SGPH98, WBRF00, WWCW00, WS02, [CPP04, CS07b, GL03, SBEW01, SY06, XH03, YEP+06, Zea00, AKNRT04, BVP+04, YS04, GL06a, KHKL05, Pha06, ZDW06]. BZP05, CKL+09, CRSP09, GC00a, HM02a, password-guessing [Shi05]. Passwords JRB+06, LW05a, NTW07, SK03, YGZ05]. [GL01, KOY01, Per03, Smi01c, Ano03d, FZ06, performance-friendly [CRSP09]. periodic KOY09, NS05a, RD09, YWWD08, vOT08]. [XQ07]. Periods [KKH03]. Perl [Sal03b]. Patarin [Bih00]. Patent Permutation [DMS00, HSR+01, IYK02, [MP00, Sav05a, Sav05b]. Path KKG03, KO03, LSY01, DP02, IYK03]. [GXT+08, CCD+04, Dew08, ZSN05]. Permutations [BPR+08, CHL02, KO00, path-based [CCD+04]. Path-quality MP03, KKKP05, WV00]. Persistent [GXT+08]. Pattern [AGT01, ST06]. Person [KJR05, LLT+04, [ABM08, BDhKB09, BLP06, BCCN01, PK01, BS01b, KN03, Li05, LST+05, PY08]. LS01a, TIGD01, Buh06, LYGL07]. Personal [Bar05, EHMS00, SEK01, SEK02, Pattern-based [BLP06]. Patterns Tyn05, UP05, Wal09]. Personalised [DD02, MP06, WCJ09, jLC07]. Pavol [TNG04]. personalized [GPC08]. [Sal03b]. pay [Joy03a]. pay-as-you-watch Perspective [LL01]. Perspectives [Joy03a]. payload [KC09a]. Payment [BMV06, SM08]. Perturbation [MV01, RMCG01, YKMY01, Has02, HP00, [HWH08, ZY08]. Pervasive SH00]. PC [BSW01, Ste05c]. PCIXCC [BDhKB09, JW05, LKHL09, Lut03, Lut03]. [AV04]. PCKS#7 [Dav01c]. PCPs [FS08]. PET [MS05a]. Peter [For04, Uzu04]. PCs [BDET00]. PDA [GW08]. PDF Petersburg [GKS05]. petitions [Cal00b]. [ISO05, CNB+02, ISO05]. PDF/A [ISO05]. Petri [LKJL01, AADK05]. PGP PDF/A-1 [ISO05]. Pearson [Puz04]. [McL06, Ano00h, BCH+00, Dav01b, Dav01c, Pebbling [DNW05]. Pedersen [GJKR03]. JKS02, Luc06, Opp01]. PGV [BRS02]. Peer [Art04, HR02, RH02, ATS04, LLY06, pharaohs [Pin06]. Phase MPHD06, PI06, WCJ05, Yi04]. [CDF01, Igl02, KLB+02a, Che07a, Che08a]. Peer-assisted [Art04]. Peer-to-Peer Phase-Conjugate [Igl02]. phase-shift [HR02, RH02, ATS04, MPHD06, PI06, [Che08a]. Phil [Bar00a]. Philadelphia WCJ05]. PeerAccess [WZB05]. Peinado [IEE08]. Philip [McL06]. Philosophy [YRY05a]. PEM [Dav01b]. Penguin [Cop04b]. phishing [Bel04]. Phone [Bau01a, Bau01b, Bau01c, Bau02b, Bau03a, [CAC03, Fox00]. Photonic [TWNA08]. Bau03b, Gua05, Oue05, Ste05a]. Photonic-based [TWNA08]. Photons Pennsylvania [IEE05a, IEE08]. People [Bar00c]. Physical [CGMM02, LR07, [ASW+01, CG05, Lov01]. perceptions YKLM02a, GVC+08, UHA+09]. Physicist [WDCJ09]. Perceptual [PBM+07]. [BZ02]. physicists [RP00]. Physics Perceptually [EFY+05]. Perfect [MYC01, Sch06b, BEZ00, BEZ01, Duw03]. [AJO08, CLLL00, DN02b, DSS01, Sun00a, physiological [RFR07a, RFR07b, RFR07c]. DM07a, SC02c, SY06, ZD05]. Perfectly Pi [OS08]. PIC [Fin02]. pick [Cla00b]. [DMS00, KSR02, SNR04]. Perform [Kin00]. Picks [PM00]. PicoDBMS [PBVB01]. Performance PicoDMBS [BBPV00]. Picturing [Pau03]. [ACM01b, BH00a, DPR01, Dra00, EYCP00, Piecewise [LLL+01]. Pigeon [Pem01b]. FZH05, Int00, Ken02a, Ken02b, Kra05, piling [Kuk01]. piling-up [Kuk01]. PIN 57

[BZ03]. Pioneer [Coc03]. PIPE [CBD+05]. policy-based [BFG08]. policy-compliant Pipelined [MD05, Mis06]. PIR [BIM00]. [RVS09]. Polish [Kap05]. Politics Pirates [KY01d]. PISN [Cho08a, DL98, Jan08a, DL07]. Poll [ECM00a, ECM00b]. Pittsburgh [IEE05a]. [Gen01]. polyalphabetic [GPG06]. Pixel Polygonal [Ben00, BB00a, BGI08, SP04]. [LS08, WCJ09, BCD06, LYGL07, WWTH08]. polymorphic [CSW05]. Polynomial pixel-pairs [LYGL07]. Pixel-Value [AF03, BIP05, BDG+01, Bul09, CU01, [LS08, WWTH08]. PKC CJ03a, CH07c, CLZ02, DS05a, Gon06, HR00, [BDZ04, Des02, Kim01, NP02a, Vau05a, KL05, KY01c, KTT07, LW02, May04, Pli01, IZ00, KI01a, KI01b, ZC04]. PKC’98 RMH03b, Sat06, LFW04, MRST06, SZP02]. [HPC02]. PKCS Polynomial-Time [Clu03, Man01, RSA00c, RSA00b, RSA00d, [CLZ02, KL05, Pli01, MRST06]. RSA00e, RSA01, RSA02, RSA03b]. Polynomials [BLST01, DS08, FL06, Jam00, PKCS#1 [CJNP00]. PKCS#11 [DKS08]. JJ00d, Lan04a, CHH01, FP09, GS09]. Pon PKCS#7 [Dav01b]. PKI [QCB05b]. Pool [BTTF02]. Popular [AL06, CZ05, KGL04, Ahm08, ES00b, [RR08, CAC06]. Port [Kra02b]. Portable ES00a, Gar03a, Gut02a, Han00, Hoo05, [Hei07, Wan04a]. Portfolio [Ano02e]. NDJB01, Ort00, St.00]. PKIX [FL01b]. Portland [ACM00, BCDH09]. Possessing PKP [JJ01]. PKWare [Bar00a]. Place [CC08]. Possession [Tee06]. Possibility [USE01b, USE01a, GS07b, IEE09a]. [SF07, BGI+01, DOPS04]. Possible [Mur01]. placement [GJJ05, JEZ04]. Plain [Col03]. Post [BBD09, BLRS09, Ber09b, HHG06, Plaintext [DN02a, Fur02b, GK05, HLM03, BBD09, BD08]. Post-Quantum [BBD09, Jol01, Kel02, KM01c, KI01a, MF01, CKN06]. BLRS09, Ber09b, HHG06, BD08, BBD09]. Plaintexts [BR00a]. Plan postage [Ble07]. Poster [TSO00, RN00b]. [CAC06, CGP+02, Gan08]. plane [WL02]. Potential [Kid02]. Potentially [Wal01]. Planning [WCZ05]. plans [Ark05]. POTSHARDS [SGMV09]. Power [AKS06, Platform Ano00d, Ava03, BI05b, BNPS02, Cry00, [Bau02b, MMH02, PZDH09, ARJ08, ISTE08]. DPV01, DBS+06, Gir06, Has01b, HM02c, Platforms [AIK+01]. Play HBF09, IIT03, JP02a, JQY01, KBM09, [WD01a, You04]. Playing [Shp05, BR04]. KLY02, MOP06, Mas04, MS01, MMMT09, Please [Per03]. Pluggable [Sei00b]. plus Mes00, Mes01, MG08, OS00, OS06, OOP03,¨ [Cop04b]. Podolsky [HR13]. PODS PSG+09, Sha01c, Sma03b, WS05, WC01a, [ACM03c, ACM05b]. poetry [MAaT06]. vW01, CBSU06, CO09b, Geb04, LGKY10, pogromca [Kap05]. Point Mit02a, OS08, WLH06, XH05, ZYW07]. [GLV01, M¨ol02, NS05c, USE00b, WW06]. Power-Analysis [OOP03].¨ power-attacks point-sampled [WW06]. Points [Geb04]. power-aware [CBSU06]. [BGI08, Gau02, Cla00b]. poised [CH00]. Power-Sum [KLY02]. Power-Up [HBF09]. Poisoning [Kle07]. Poland Pp [Eag05, Pag03, Top02]. PPC [ASW+01]. [AUW01, Bih03]. Polarization [HR05]. PPK [YDKM06]. pq [KOMM01]. Poles [KS04]. Policies [AEV+07, ZP05, PQCrypto [BD08]. Practical BNP08, LJY04, Mad00c, RN00a, RN00b]. [Ano01c, AR01, Ash03, ACJT00, BDK+09, Policy BF05, BLMS00, CS03a, Cap01, CDR01, [Bla01c, HQ05, Ano00e, BFG08, BZP05, CJT02, Chi08a, Chi08b, Chi08c, Chi08d, DFM04, Gor05, RVS09, Uni00b, RR04]. CS03b, DK01, Dre00, FS03b, GSS03, GIS05, 58

GH02, HQR01, HJW01, Ina02a, Ina02b, Prime [ACS02, Bai01a, Har07a, Pau02a, IIT03, Kan01, LMV05, LCD07, Lut03, WS03, JL03, dW02]. Prime-detecting LWK05a, MM02, MSU05, OM09, PBD00, [Har07a]. Primer [KLB+02b, Lad06]. Pel06, Poi02, Poo03, Roy00b, Sug01, Wei04, Primes YSS+01, Bro05b, DKL+00a, Har05a, [Ano03f, SZ01, HLLL03, Ste08, AKS02]. KSW06, Luc06, Mos06, MSV04, Sha01a]. Primitive [CFS05, IYK02, IMM01, ST01a, Practice [AL06, BDZ04, Des02, IZ00, ST02, IYK03]. Primitives Kim01, Mao04, NP02a, PY06, SB07, Vau05a, [BDFP02, CHL02, FGMO01, Gol01d, Ngu05, YDKM06, KXTZ09, Sta02a, Sta06, Sti95, RR00, BDFP05, Gar05, JZCW05, RAL07]. Sti02, Sti06c, Lut03, Spr03]. practices Princeton [Gen01]. principal [ZL04b]. [CF05, Ste02]. practitioners [PP09]. Principle [CZK05]. Principles pragmatic [BMW02b]. Prague [MJ04]. [ACM03c, ACM05b, DK02, DK07, KL08, Pre [Adl03, AA08]. pre-processing [AA08]. MAA07, SB07, Sta02a, Sta06]. Print Precise [Wal01]. Precision [Kra02b]. Printed [SLT01]. Printer [HZSL05, SR06, LMC+03, MN14]. [Bar00a]. Priority [WWL+02]. Privacy Precomputation [SLG+05]. [Ano00i, AEV+07, BBDP01, BSSM+07, predecryption [RSP05]. Predict [Dic03]. CDM+05, Cho08a, DL98, DL07, DKFX05, predictable [Bel08]. Predicting DN04, GS02a, GMM08, HY01, KS05c, [AG09, BGPGS05]. Prediction Knu07, LP00, MP00, Pap05, PBD05, PP06b, [AKS06, SLG+05]. predictive [vOT08]. Por06, PGT07, RW03b, RK05, Ros07, predistribution Sal03a, SE09, Tom06, YWD08, Bel04, Bjo05, [HMvdLM07, JRR09, TP07]. Preface BA06, Bra01a, CLR09, CKN06, HJW05, [CGM07]. Prefix [FXAM04, RW07]. JRS09, KXTZ09, LL05b, Lev01, LCS09, Prefix-preserving [FXAM04, RW07]. NS05b, Pin02, Pin03, Ros06b, SIR04, Tyn05, Prehistory [Ifr00]. Preliminary WK05, ZYLG05, ZSM05, MS05a, Jan08a]. [KS00b, KKS00b]. Prentice [For04]. Privacy-Enabled [Por06]. Prentice-Hall [For04]. Preparations privacy-enhanced [ZSM05]. [FJ04]. Prepared [ASW+01]. Privacy-Enhancing [SE09]. Preprocessing [BIM00, CKK03]. presence Privacy-Preserving [DN04, KS05c, [BIW08, GXT+08, Miˇs08, VS08]. YWD08, BA06, HJW05, Pin02, Pin03]. Preservation Private [AF04a, AFI06, BDF+01a, BIM00, [Che01b, Dur01, Bro05a, ISO05, LG04]. BY03, BSW09, BJLS02, BGW05, ISW03, Preserve [NNT05]. Preserving [DN04, KO00, OS05, SDMN06, ST01c, Wal03, KS05c, LP00, M¨ol03a, YWD08, AKSX04, Yek07, BD00b, Cal00b, HLLL03, KY00, BR06, BSSM+07, BA06, FXAM04, GA03, KPS02, PLJ05b, Sun02, YRS+09, ZY08, HJW05, LCK04, Pin02, Pin03, RW07, HJ07]. ECM00a, ECM00b]. Private-Key President [Gen00a]. Press [Imr03, Kat05b, [BY03, KY00, PLJ05b, Sun02]. prize Pag03, Puc03, Rot07, Top02, Spr03]. [Fox00, Coc02b, MNT+00]. PRNG Pressure [HWH01]. pretty [vOWK07]. [HSS04, Mur02, SF07]. Proactive Prevent [FOBH05]. Preventing [CS07b, [DBS01, FMY01, JS05, ZSV05]. CCL09, HSW09, IY05, RG05, DMS07]. Probabilistic Prevention [CCW02, CPD06, DJ01, DJ06, Kuh00, [JT05, PZ01, PZ02a, Gei03, Smi03]. Price Lee03b, CP07, DLMM05, Gol99, JZCW05, [AS01a, Bra01b]. Primality [BT02, Che03]. KY00, MRST06, PBMB01, dH08, Neu04]. 59

Probability [KMT01, MNT+00, DLP+09]. Processing [ISSZ08, KLB+02b, PCK02, Probing [ISW03]. Problem AA08, AA04a, Ayo06, YPSZ01]. Processor [AL00a, AF03, Cap01, CU01, Che04b, [Ano02e, BBGM08, EP05, FBWC02, FZH05, CJ03a, CGK+02, Cou01, CLZ02, DIS02, GC01b, Int00, KBD03, KPMF02, TYLL02, DHR00, FL06, Gen03, GV05, GPP08, KK02, ST03a, SHL07]. Processors LNS02, NBD01, Wag02, BKW03, CGHG06, [TLYL04, CW02, CRSP09, Geb04, LJ05a, CJT04, DLMM05, HGNS03, Hsu05a, LHY05, YGZ05, YLT06, ZYLG05]. Procurement LD01, Luk01, Pei09, Shp05, SCL05, WL02, [Lad06]. produce [Zir07]. producing Whi09, Yas08, KM04a]. problem-solving [SOIG07]. product [KSWH00, Sun02]. [Whi09]. Problems [BI05a, Can06b, Hro03, Products MV03a, OP01a, TvdKB+01, VDKP05, [ACS02, Ano02d, Ano02e, Knu07, Ano00c]. HL05d, KXD00, LMTV05, LMC+03, RSS04]. profession [Wal04]. professional Procedure [LY07]. Procedures [Dew08, vT00]. proficiency [Dew08]. [DJ06, BBK+03b]. Proceedings Profile [PJH01, RSA00c]. Profiles [ACM00, ACM02, ACM04a, ACM05a, [MV01, PJK01]. Program [H¨of01, Bec02, AAC+01, Bon03, EBC+00, FMA02, FLA+03, GGH+08, Kov03, KH03, CS08b]. SM07b, USE00c, USE00b, USE00a, USE00d, Programmable USE01b, USE01c, USE01a, USE02a, USE02c, [Dam07, GC01a, HV04, Smi02]. USE02b, WKP03, Yun02a, ACM05c, Programmer ACM07, ACM08, ACM09, AUW01, AJ01b, [Wil01b, Bon00, Che00a, DKK07]. BS03, Bel00, B+02, Boy01, Buc00a, BC01, Programmers [Coc01a, Wei04, Gou09]. HA00, Hon01, IEE00a, IEE01a, IZ00, Kil01a, Programming [ASW+01, Ano02d, Coc03, MS05b, Oka00, PPV96, Pfi01, Pre00, QS00, LMHCETR06, Res01a, Res01b, Swa01, RD01, Roy00a, SMP+09, ST01d, VY01, Uri01, AJ01a, AJ01b, CW07, Nis03a, VM03]. ACM01a, ACM03a, ACM03b, ACM03c, Programs [BGI+01, Ark05, SLTB+06]. ACM04b, ACM05b, ACM06, ACM10, AL06, Progress [KK06, KFSS00, RD01, Roy00a, BDZ04, BS01b, Bih03, BCDH09, BD08, CV04, DV05, JM03, MMV06, MS02c]. CC04a, CV04, Chr00, Des02, DFPS06, Project [Fri01, IY00, MNT+00, Pau02a, FLY06, Fra01, Fra04, HR06, HYZ05b, IEE02, Salxx, Gou09, LR01, Lov01, MWM01, IEE03, IEE04, IEE05b, IEE07, IEE08, Sha01a, Coc01a, Coc02b, IY00, Pre02b]. IEE09b, JYZ04, Jef08, JM03, Joy03b, JQ04, projects [Gha07]. Prolog [Bla01a, Bla01b]. KJR05, KGL04, Kim01, Kim02, KN03, Promise [Ano02f]. promises [Pau02a]. Knu02, KP01, KNP01, KM07, Lai03, Lee04b, promote [WK05]. Promotes [Bar00b]. LLT+04, MMV06, MJ04, May09, MS02c]. Prone [MLC01]. Proof Proceedings [Men05, Nac01, NP02a, Nao04, [Abe01, Abe04, AS01b, Ano09c, ARC+01, Oka04, Pat03b, Pre02c, RS05, Sch01d, BDP02, Cor02, GK05, SOIG07, SPMLS02, Sma05, Syv02, TBJ02, Vau05a, Won01, Tee06, BR05, Chi08b, Chi08c, Chi08d, YDKM06, ZJ04, Zhe02b, ZYH03, BCKK05, GM04, HSD+05, LMW05, PBD07]. Cra05a, DV05, DWML05, DKU05, GKS05, proof-of-compliance [LMW05]. IKY05, Kil05, Li05, LST+05, Men07, Poi06, Proof-of-Concept [ARC+01]. proofing Sho05a, Son00, dCdVSG05]. Process [CT02]. Proofs [Kwo03b, MNT+00, BDFP02, HL06, [BBM00, BP02, CS02, DFS04, DNW05, Fis05, MRST06, VKS09]. Processes Gen04a, KL05, Lee03b, MV03a, Nie02b, [BDP02, ALV02, BDNN02, Whi09]. BGB09, BR04, Gol99, HG05b, SV08b, dH08]. 60

Propagation [LJL05, QPV05]. Properties Fis01b, FGM00a, GMP01a, GMV01, Gor02a, [ABC+05, BM01c, KY01b, LLL+01, MS02a, JP07, JW05, KS00a, KY03, KL08, Kra03, NNT05, SM00a, BD04a, CDL06, FGM03]. K¨us02, MS02a, MNP01, PBD00, PR08, Property PZDH09, Rot01, Shy02, SC01, Tee06, [LPZ06, Qu01, Uni00h, WY02, BR06, JRS09]. AA04b, AKNRT04, Bar06a, Bau05, Bel07b, Proposal [DPVR00, Mac00]. Proposed BDSV08, BFGT08, BP05, BLP06, BD04a, [Coc02a, GM00b, HPC02, KI01a, You01, BR05, Can01a, Can06a, CP07, CKRT08, YG01c, JK01a, ZDW06]. Protect CWJT01, CH07a, Cho08b, Chr00, Chr01, [ETZ00, BBN+09, WK05]. protected CJM00, Coh03, CC05d, CDL06, DFG00, [CYH05, PKH05, ZCL05]. Protecting GJ03, GJ04, GUQ01, Gut04c, HM02a, [Des00c, EHMS00, KY01d, Kra01, LKM+05, JW01, KS05a, LPV+09, LLL04, LLY06, LW05b, ML05, NN03, Sha01c, vW01, LLS+09, Mea04, MT07, MRST06, Mon03, Bro05b, LJY04, LS05b, ZYLG05]. MP07, PR05, PQ03a, PQ06, Puc06, SV08a, Protection [CGJ+02, DKFX05, ECG+07, SL05a, SR00, SW00b, SY06, WLH06, YS04, FBWC02, MV01, MG08, PP06b, Rot01, ZLX99, ZL04b, PDMS09, Puc03]. SS01b, VHP01, WY02, XFZ01, ZTP05, ProtoMon [JT05]. Provability [GOR02b]. CL08, CGL+08a, CGL+08b, CGL+08c, Provable [HM02b, HLL+01, HSL+02, CT02, Gor05, HLC07, KA09, Kov03, KH03, KSHY01, PBD05, SLL+00, BGP09]. Kwo03a, LL05b, Per05b]. Protections Provably [AO00, ACJT00, BMP00, BCP01, [JT01a]. Protocol BCP07, CHKO08, DG03, DG06, HLvA02, [Ano01a, Bel01, BPST02, BGM09, BL02, HvAL09, HL07, HS07, JMV02, M¨ol03a, CK02a, CJ03d, CWY05, Cim02, ECM00b, NSNK05, NSS02, VMSV05, WLH06, XS03, Fre03, GJKR03, GL00, HS07, JP02b, ZCL05, BKN04, CCMT09]. provenance JRFH01, JT05, KLN+06, Kak06, Kra05, [HSW09]. Provers [MV03a]. Provide Ku02, LCK01, Mea01, MSU05, NS01b, [AB01, Sch01a]. Providence [IEE07, Sil01]. Rub00, RMCG01, SK00, Tan07b, TZT09a, Provider [LDM04, HILM02]. providers TZT09b, WHL05, YSR01, Asl04b, BP03a, [MV03b]. Provides [OT03b]. Providing BC05b, Bla01b, BDFP05, BK05, CS04, [BACS02, BDS+09a, DeL07, Lin07, Par04]. CCK04a, CC04b, CYY05, CC05c, CYH05, Proving [Che03, FS01c, GN01, Tee06]. Che04a, CLC08, CJ03b, CJ04, CL09, CJL05, Provision [Kha05]. Proxy DP04, GM04, GTZ04, HTJ08, HWWM03, [AH05, BCL05a, DKFX05, LCK03, LCZ05b, HLTJ09, HHC05, KH08, KKL09, KTC03, PL01, RdS01, Sha03d, ZJ09, AFGH06, LC03, LF03, LKKY03a, LKKY03b, LW04, CCH04, DY09a, HWW03, HW04, HWH05, LHL04a, LKY05b, LKY05c, LHC08, LSH03a, HW05, HC04b, KHL09, LL05b, LHH05, LC05b, Luk01, MS03a, Par04, Pau01, RG06, LCZ05c, LW05c, PKH05, Sha05b, SHT05, Shi05, SW05a, SIR04, TM06, Tsa06, Tse07, TYH04, YTH04, ZCL05]. proxy-enabled WK05, WLT05a, WHHT08, YW05, YWL05, [DY09a]. proxy-protected YTWY05, YC09a, YS02, YSH03, YRY05b, [PKH05, ZCL05]. psBGP [vOWK07]. YRY05c, YPKL08, ZWWL01, ZL04c, Pseudo ZDW06, ZYW07, LSH03b]. Protocols [BH05, FWW04, Gen00b, LLL+01, LHL+08, [AADK05, AL00a, AAFG01, BP04, Bla01a, MP03, SXY01, TZT09a, TZT09b, WP03, Bla02a, Bor01, BMN01, BM03c, Bra01b, XYXYX11, BG09, CFY+10, GB09, MFK+06, BLDT09, CKPS01, CT08a, CCMR02, NR04, PLSvdLE10, PSP+08, RGX06, SH11, CCMR05, Cir01, CNV06, DJ06, DFG01, SM11, SL09, WW08, XSWC10, YZEE09]. 61

Pseudo-Random [LLL+01, MP03, WP03, GS01, Gor05, GMW01, HCD08a, HCD08b, XYXYX11, Gen00b, SXY01, CFY+10, HHG06, HW04, HL04, Iwa08, IM06, Jan08b, MFK+06, NR04, PLSvdLE10, RGX06, SH11, JXW05, JZCW05, KPS02, Kob00, KW00, SM11, SL09, WW08, XSWC10]. Kos01c, LF03, LHL04b, LKY05b, LCK04, Pseudo-Ransom [BH05]. Lin01a, LLW08b, LS01c, Lop06, LWK05a, Pseudo-signatures [FWW04]. MWS08, M¨ul01b, PI06, PC09, SNI00, SRJ01, pseudonoise [HG05a]. pseudonym [CG06]. Sha04b, Sha05b, Shp04a, SLC05, Sun00b, pseudoprimes [ZT03]. Pseudorandom SZP02, SC05c, TO01, TLH05, Tsa05, TJC03, [BCGH11, CDI05, DN02a, DI05, DP02, VS01, WDLN09, War00, Wu01, WH03, Fin06, Flu02b, FIPR05, GM02a, IYK02, WL04b, hY08, YRS+09, ZSM05, AL06, LMHCETR06, Nie02c, RSN+01, Aam03, BDZ04, Ben02, CZ05, Des02, GL05, KGL04, BGPGS05, IYK03, KSF00]. Kim01, NP02a, Vau05a, YDKM06]. Pseudorandomness Public-Key [GM02c, IK00, IK01, KYHC01, LLH01, [Ano01n, AEAQ05, BC05a, BBM00, Lee03b, MV00, Shp03, Gol99]. Psychology BBDP01, BLM01, BST02, CHK03, CHK05, [MYC01]. PUB [Nat00]. Public CCM01, CS02, CS03b, DPV04, DJ01, [ANS05, AUW01, APV05, Ano01n, AEAQ05, DFK+03, ESG+05, ES00a, FL06, GHW01, AF03, BC05a, BDG+01, BDZ04, Bar00c, GC01b, HR05, IEE00b, Kat05b, KKIM01, BPS00, BBM00, BBDP01, BLM01, Bih00, KM01a, KLY02, KKY02, KY02c, KLC+00, BDTW01, BST02, CHK03, CHK05, KI01b, KM04b, Kos01a, Kos01b, KY01e, CDM+05, CHM+02, CHKO08, CJ03c, Kur01, LP03, Lin03, Lin00b, MR01b, MR01c, Chi08a, CCW02, CT09, CCM01, CS02, M¨ol03a, Mol03b, NSS02, OTU00, Poi02, CS03b, DPV04, DJ01, Des02, DY09b, RSA00a, ST01a, ST02, Sin01a, TSO00, DKXY02, DFK+03, ESG+05, ES00a, ED03, TT01, WHI01, YDKM06, AUW01, ED03, FL06, FL01b, GMLS02, GHW01, GC01b, HG05b, Pei09, BHM03, BBN+09, BD04b, GSB+04, Gut04b, HCDO02, HR05, HG05b, Cho06, FMY02, FP00, GMW01, HCD08a, HR04b, HJW01, HLC08, IEE00b, IZ00, HCD08b, HHG06, Iwa08, Jan08b, JXW05, Jou02, Kat05b, KKIM01, KM01a, Kim01, JZCW05, Kos01c, LF03, Lin01a, LS01c, KLY02, KKY02, KY02c, KLC+00, KI01b, Lop06, MWS08, M¨ul01b, SNI00, Shp04a, KM04b, Kos01a, Kos01b, KOMM01, KY01e, SLC05, Sun00b, TO01, ZSM05, GL05]. Kur01, LLL02, LP03, LV00, Len01, LPZ06, Public-Key-Based [YKMY01]. LXH07, Lin03, Lin00b, MR01b, MR01c, Publication [Top02, DGMS03]. M¨ol03a, Mol03b, M¨ul01a, NP02a, NBD01, Publications [Bee05]. publique [RSA09a]. NSS02, OTU00, PHK+01, Pei09, PR01, Poi02, publish [SL05b]. publish-subscribe PHM03, Qu01, RSA00a, RKZD02, ST01a, [SL05b]. Published [MS03b]. Publishing ST02, Sin01a, Smi01c, Ste01, TSO00, TT01]. [Ano02d]. puce [Car00]. PUFs [MKP09]. Public Purpose [Ano07b, Ano07a, ESG+05, GS07a, [Vau05a, WZW05, WHI01, WV00, Wya02, GPP08, SGK08, LJ05a]. Purposes YKMY01, YG01c, YDKM06, Zhe02a, AG09, [LS05a, FSGV01, PBV08]. Push [Pau03]. BHM03, BCL05a, BCW05, BBN+09, Ben01a, puzzle [LF03]. Puzzles BB79, Bra01a, BD04b, Cal00b, CCT08, [Ano01f, ANL01, CHS05]. CL02b, CWH00, CCH05, CJ05, CKRT08, Cho06, Cre00, DMT07, EKRMA01, EHKH04, Q [BFMR02, CH01b]. Q&A FMY02, FP00, Gal02, GH08, GKM+00, [Str01b, Win01]. QCQC [Wil99]. QCQS 62

[Wil99]. QDSL [CUS08]. QNX [Ano02d]. R [Che05b, Kat05b, Pag03, Spr03, Bih00]. QoS [JKRW01, Zea00]. QoS-aware [Zea00]. R&D [Mau05]. Rabbit [BVP+04]. Rabin QSIG [ECM00b]. QSIG-WTMAU [Bon01, Gen04b, Miy01]. race [Hil05]. [ECM00b]. Q’tron [YC07]. QUAD Rackoff [MP03, Pat03a]. radar [GG05b]. [BGP09]. Quadratic Radiations [SGM09]. radical [Web02]. [BT02, Coc01b, HJW01, SP05, CCS08, Radio [Sak01]. RadioGat´un [BDPV09]. HM00, H¨uh00, HP01, LD01]. Quality Radix [HKA+05, JY01]. Radix- [BW07, TL07, DMSW09, GXT+08, KC09a, [HKA+05, JY01]. rails [Fox00]. Rainbow WWTH08]. quality-conscious [DMSW09]. [DS05a]. Raises [MP00]. Raising [Cos03]. Quantifier [KS06b]. Quantifier-free ramp [IY06]. Ramping [Coc02b]. Random [KS06b]. Quantitative [Bai08, ME08a]. [Abe01, Abe04, BST03, BK06a, BF05, BB04, Quantization [DRL09, WC04, WC05]. BL08, CTY09, Chi08e, Dic03, DGP07a, Quantum DGP07b, DV08, EHK+03, Gra02b, GPR06, [AC02, ATSVY00, Ano02f, Ano02g, Ano02h, HSR+01, HBF09, Int03, JRR09, Kel05a, BYJK08, BOHL+05, BBD09, BZ02, Kel05b, LLL+01, LM02, Lys02, MP03, BBB+02, BB03, BGM09, BLMS00, BEM+07, Mir02, NNT05, NNAM10, Nie02b, Pas03, Coc03, DFS04, DPS05, DFSS08, Das08, Pat04, Ran55, Ran01, RSN+01, SFDF06, DMS00, Ell04, Ett02, GKK+09, GH02, TWNA08, TL07, Tip27, TZT09a, TZT09b, GW00, GRTZ02, HV09, Hay06, Imr03, Vav03, VKS09, WP03, XYXYX11, BK07, Ina02a, Ina02b, Kak06, KK06, KLB+02b, Bel08, BG08, BG09, BG07a, BGL+03, LB04, LW05b, Moo07, NA07, OTU00, Pal02, CFY+10, CJL06, CO09b, DGP09, Fis01a, PC09, Pot05, Ree01, RK05, Ser06, SR07, GVC+08, Gen00b, GB09, HG05a, Sti11, TO01, Wil99, Wri00, YI00, YI01, HLwWZ09, HMvdLM07, JAW+00, KH08, ZLG01, ABW09, Ano03g, Ano06d, BYJK04, KB39, KG09, LGKY10, MI09, MRT10, BCG+02, Ber09b, BEZ00, BEZ01, BLRS09, MFK+06, NR04, Pan07, PSG+09, DFSS05, Duw03, Eke02, GKK+07, Gav08, PLSvdLE10, PSP+08, PC00, Reg05, Reg09, Heg09, HHG06, IM06, JZ09, JRS09, JAW+00, RG09, RGX06, SH11, SM11, SS03, SXY01, Joy00, KK07, KH08, KKKP05, LQ08, May01, SR07, Sti11, SK01b, Sug03, SL09, UHA+09, NK06, Pin06, RP00, Ros00b, Sin99, Sin00, WW08, XSWC10, YZEE09, BH05]. Smo04, UHA+09, BZ02, BD08, BBD09]. Random-Error [LM02]. quantum-storage [DFSS05]. quarter random-self-reductions [Fis01a]. [Kob00]. quarter-century [Kob00]. Randomats [Sam01]. Randomization quarters [Cla00b]. QUARTZ [PCG01]. [Hro03, WHH05]. Quasi [MD05]. Quasi-Pipelined [MD05]. randomization-enhanced [WHH05]. Quasigroup [MSNH07]. Qu´ebec [ACM02]. Randomized [Sem00, Hro05]. Queen [Ree01, Ros00b, Sin99]. Randomness [DD00, DD04, DGH+04, Queenstown [Zhe02b]. queries FWW04, Gen06, HSS04, JG01, KLR09, [CKK03, Fis01a, GPC08]. Query [GA03, Kos01a, Kos01b, MT02, MSI10, SB00, PT08, PCK02, BKW03, PM08, YLC+09]. Sun00a, BBN+09, DOPS04, Kat05a, KW00, Query-preserving [GA03]. querying RSS04, SU07, Sug03]. Range [CW09]. [FJ04, UG08].¨ question [OC03]. Questions Rank [Sun00a, DW01, Sim02]. Ransom [Ett02, Joh00, Jac00]. Queues [WWL+02]. [BH05]. Rao [ZYR01]. rapid [OP01b]. queuing [CUS08]. quick [Dew08]. Rate [KT01, LZ09, PS02a, Sun02]. Rates [GH02]. Ratio [Di 01]. Rational [HT04]. 63 ratios [Zir07]. raw [CO09a]. RBAC MMZ00, OS01, PBC05, SVW00, TC01, [LSZ05, SN04, ZP05]. RBAC-Based VV07, WCZ05, WLT05b, CCH05, CJ05, [LSZ05]. RC4 [FMS01, Mir02, VV07]. RC6 CLK04, HW05, LKJL01, PSP+08, Sha04b, [GHJV00, GHJV01, IK00, IK01, KM00, SIR04, TJC03, Wu01, ZF05]. Recursive KM01b, RRY00, STK02]. RCES [LLCL08]. [WHHT08]. Recycling RCES/RSES [LLCL08]. re [DPS05, TR09a, TR09b]. Red [Sas07]. [AH05, AFGH06, KHL09, Sma06]. Red-Eye [Sas07]. redistribution [KB09]. re-encryption [AFGH06, KHL09]. Redondo [IEE00a]. Reduced re-signatures [AH05]. re-thinking [BDK02b, CC08, CS05c, FKSW00, HQ01, [Sma06]. Reachability [AL00a, MT07]. HSR+01, KKS00a, KS00b, KKS01, KML+02, REACT [OP01b]. Reactive [Shy02]. Real KM01b, KKS00b, MHL+02, NPV01, STK02, [BSW01, Dri02, GSB+04, JBR05, SP05, SKI01, YSD02, CV05, K¨uh01, SK01a, Thi03]. Sta05, YKMB08, GM04, HP01, Lie05, Pot05, Reduced-Round [FKSW00, KKS00a, SL07, SGPH98, YZDW07]. Real-Time KS00b, KKS01, KML+02, KKS00b, NPV01, [Dri02, GM04, YZDW07]. Reality [Coc01a]. YSD02, CV05, K¨uh01]. Reducibility Really [CZB+01, Wei00, Dav01c]. reap [DM00b]. Reducing [CH00]. reason [Lau08b]. reasoning [AL07, BIM00, SPHH06]. Reduction [IK03, IK06]. Rebalanced [SWH+09]. [CM05a, CH07c, Dhe03, Gro01, HGG07, Rebalanced-RSA [SWH+09]. rebels Kid02, PG05, ALV02, HG07, Sug03]. [Lev01]. Rebuild [Salxx]. Rebuilding reductions [Fis01a]. Redundancy [Sal05a]. Receipt [HS00]. Receipt-Free [AB01, BR00a, FM02b, YLR05]. [HS00]. Receipts [Cha04]. Receive [Coc03]. Redundant [MF01, Tan07a, PS04a]. Receiver [CCD07]. Receivers Redwood [KKP02]. Reed [KY02b]. [NNL01, SBB05]. recency [SW02]. recently Reference [JK01a]. Reception [Top02]. Recipes [BR09, CPS07, Pas03, RS00, Sal07, vT00]. [VM03]. Recipient [ANR01, Kur01]. Reference-Watermarking [BR09]. Recipients [Coc01a]. recoding [SSST06]. Refined [Sma03b]. Regarding [GMP01a]. Recognition [Ano02d, LLT+04, LST+05, Regex [BTTF02]. Region TZT09b, HS02b, Li05, MMJP03]. [BSNO00, Bur00]. Region-Based Recommendation [BSNO00]. register [HTW07]. Registers [Bar06b, BK06a, BK07, Dwo03, NIS03b]. [CGFSHG09]. Registration [HLM03]. Recommended [Kel05a, Kel05b]. regression [mSgFtL05]. regulation Reconciling [BNPW03, PGT07]. [Mat05]. Regulations Reconfigurable [Gen01, Mad00b, TMM01, Ano00g, Cla00b]. [FD01, FZH05, GC01b, KBD03, LZ04, Rehearsal [Ahm08]. reinforce [SWR05]. MKP09, MMH02, SJT09, SKG09, SRQL03, Rejewski [BCB+05, Kap05]. Related CMS08, DHL06, GC00a, HBC+08, Rhi03]. [BDF+01a, Can06b, CY08, FKSW00, Kil01b, Reconfiguration [PBTW07]. KLML05, Sat06, Buc00a, Gutxx, HAuR04, Reconsidered [Sho01]. Reconstructing Hen06a, Sch00b]. Related-Key [FKSW00]. [CDF01, FL06, PS01a]. Reconstruction Relation [ABC+05, NN06]. Relational [AF03, CF01b, CDF01, JJ00d, KY01c]. [AK02b, AHK03a, AHK03b, CKY07, GA03, Records [Dur01]. Recoverable PT08]. Relations [BN00a, Pau01, Uni00a, [NZCG05, NZS05, SGMV09, YY00]. Uni00f, Uni00e, SP03, Zha08]. Relationship Recovery [BDK+09, BM01c, CKM00, [Ngu05, GKM+00]. Relationships 64

[DKMR05, SKU+00]. relative DFCW00, JXW05, MH09, QS00, dCdVSG05]. [JRS09, M¨ul01b]. relaxes [Ano00c]. Researchers [Ano08b, Ano08c, Pau02b]. Relaxing [CKN03, PS05]. Relay Resettable [DPV04, MR01b]. Residue [DM07b, Zha00]. Release [TIGD01, YKLM02b, CNPQ03, FP00, LD01]. [CHKO08, Mao01, HGNS03]. Released Residues [Coc01b, Zhe01, CCS08]. [Bar00c, Ano01h]. Releases [Bar00c, AJ08]. Resiliency [Joh00]. Resilient Reliability [IKP+07, WK05]. Reliable [Che01c, DSS01, DFK+03, DP07, DP08, [MR03, MPHD06]. reloaded [SL06]. GSS08, KZ07, SM00b, KZ03, IR02]. Resist Remailers [Che01f]. Remainder [HM02c]. Resistance [Sch01b, YKLM03]. Remarks [HNZI02, M¨ol02, EBS01]. Resistant [BCW05, CL04d, SCS05c]. remedy [FZ06]. [Ano01f, ACJT00, ANL01, BGW05, Remember CDTT05, CNV06, Gir06, IKO05, LLS05a, [HSH+08a, HSH+08b, HSH+09]. Remote LWS05, LTM +00, LNL+08, KS09a, PC09, [CJT02, CWR09, Kra02b, LL05c, Rub01, WL04b, YS02, MS09c]. Resolution TK03, WKB08, CC01a, CL04d, CJT01, [SGM09]. resolving [Lin01b]. Resort DSGP06, FCZ05, Hsu05b, HL05b, KC05, [USE00b]. Resource [MRL+02, Tse07]. LHY02, LLH02, LKY05a, LHL03b, LC05a, Resource-Constrained [MRL+02]. MW06, SW06, SZS05, WLT05a, WC03b, resource-limited [Tse07]. Resources YW04b, YC09b, YRY05d]. remotely [Gutxx, You04, FOP06]. Response [K¨uh08, SR00]. Removal [LLS05a]. [JBR05, LW05a, XNK+05]. Removing [JL00]. rencontres [PPV96]. Responsibilities [Vix02]. Resting Renewable [TOEO00]. Repairing [Gut02a]. restricted [ASW00]. Restriction [DKFX05, GM00b, HL04, ZJ09, BKN04]. [CTH08]. Restudy [FWL08]. Results replace [Gav08]. Replacing [APV05, GM02c, OOP03,¨ RR08, Way02a, [FZ06, KAM08]. replication [BIW08]. YRS+09, CV05, CKRT08, DM07a, GMG00, Reply [WLW04]. Report [DFG01, Pem01b, PM08]. Rethinking [Bra01a, KMZ03]. Pre01, Sal01a, Sha03b, BCHJ05]. Retraining [jLC07]. Retreat [FKSW00]. Repository [Bar00b]. Representation Retrieval [BIM00, KO00, RE02, Yek07]. [BJvdB02, FSW01, JLMS03, JY01, RN00a, Retroactive [DBS01]. retrofitting RN00b, ZLK02, BDSV08, BA06, PS04a, [CGL+08a, CGL+08b, CGL+08c]. reunion SWR05]. Representations [OSSST04]. [LBA00]. Revealed [Gal03]. Reversal Representative [CTBA+01]. [Cap01, DIS02]. Reversal-Bounded Representatives [DIS02]. Reversals [MS02e]. Reverse [Uni00a, Uni00b, Uni00f, Uni00e, Uni00h]. [Coo02, EC05, Wue09]. Reversed [Ina02b]. Republic [MJ04, dL00]. Republiek [dL00]. reversibility [KC09a]. Reversible [Gol03]. repudiation [HLL04, LSA+07, SC05c]. Reversing reputation [KNS05, RCG+05]. [EC05, YWC08, YN01, CDFM05]. Review reputation-systems [KNS05]. Request [And04, Ano02i, Duw03, Eag05, Eva09, [RSA00b]. require [SV08b]. Required Fal07, Gas01, Gum04, Imr03, Irw03, Jan08a, [Sun00a, Lov01, Wan05]. Requirements Lee03a, Lee03b, Mar05a, Pag03, Pap05, [FIP01b, HWH01, Kin02, NIS01b, Mea04]. Puz04, Ree01, Rot07, See04, Spr03, Ter08, Rescue [ASW+01]. Reseacrh [Pip03]. TvdKB+01, Top02, Uzu04, Was08a, Her09b, Research [AJ01b, CZ05, CZK05, DFPS06, Kat05b, Lu07, MP01b, Nie02a, Nie04, Puc03, KGL04, LXM+05, RC06, Sch00e, TMMM05, Shp04a, Wal00]. Reviews 65

[For04, Kid00, Sal03b, Sty04]. Revised [BDPV09, HR04b, PB01]. Roadmap [Bla03, BC05c, Chr01, CCMR02, CCMR05, [Coc02b]. Roaming CSY09, CGP03, DR02c, GS02c, GH05, [CAC03, YWD08, SSM+08]. Robotic HH04, HH05, Joh03, Jue04, KKP02, KCR04, [Kum07]. Robots [Coc01a]. Robust LL03, LL04d, Mad00b, MS05a, Mat02, MZ04, [BB00a, BR09, CJ03d, CWY05, DDO+01, NH03, PC05a, PK03, PT06, RM04, Sil01, FCZ05, HH09, hKLS00, Lin00a, LHS05, Ytr06, AMW07, AJ01a, BK07, Bir07, CZ05, LLC06b, PJK01, SG07, SOHS01, SDFH00, CKL05, DRS05, Irw03, PY05, WK06, Wri03]. SDF01, VK07, WNY09, WL04b, WMDR08, Revisited [ABC+05, Ano02h, BM01b, YPSZ01, ZTP05, KA09, LCZ05c, LKZ+04, CDMP05, Knu00b, NS05c, OSSST04, Mit00, MB08, TND+09, YY05b]. Hes04b, OHB08b, ZZT05]. Revisiting Robustness [AEAQ05, Har01a, Har01b, JMV02]. [CS05c, HM01b, Rot01, AEH17, CKL+09]. Revocation [BDTW01, CL02a, Gen03, Rogaway [MW04]. Roger [GG05a]. Role GST04, NNL01, TT01, ZSM05, KT06, [SBG02, YT09, ZGLX05, Cer04a, Cra05b, KSW06, LHH05, SW02]. revoke [NN03]. Gor05, Mau04, You04]. Role-Based revolution [Bor00, Con00]. Revolutionary [YT09, ZGLX05, Cra05b]. Roles [CMB+05]. Rewriting [Cir01, HR04a]. [LLL+01, Vix02]. rollover [Gue09]. Roma RFC [BWBL02]. RFID [AAC+01]. Rome [IEE04]. Ronald [Coc03]. [And04, AL07, ACdM05, Ayo06, BLDT09, root [Pet05]. rootkit [Blu09]. Rootkits CCS08, CH07a, CL09, FW09, Fin03, [HB06]. Roots [Gon06, HCK09, CAC06]. KKJ+07, OS06, PLSvdLE10, Ros06b, SE09, Roseau [PY05]. Rosen [HR13]. Rotation TZT09a, TZT09b]. Rhee [K¨uh08]. Rhode [RBF08]. rotations [SK03]. Rothe [Fal07]. [IEE07]. RI [Sil01]. Right Rough [Naz02, WG05]. roughness [Lav09]. [Dhe03, GS07b, HKPR05]. rightful Round [III00, BP04, Bih00, BF00a, [CL08, Lin01b]. Rights [Bar00a, BNPW03, BDK02b, Che03, DPV04, DI05, Dra00, Dre00, Scr01, TMM01, Wya02, BA06, UP05]. FKSW00, GKKO07, GIKR02, HSR+01, Rijndael Kan01, KO04, KKS00a, KS00b, KKS01, [BB02, MP01a, SKU+00, Wer02, CKK+02, KML+02, KKS00b, LKHL09, Lin01c, MP03, CGBS01, DR00a, DR00b, DR01, DR02b, MHL+02, NPV01, RR00, Ros00a, STK02, FKS+00, FKL+01b, FKL+01a, FSW01, WBRF00, Wer02, YSD02, CV05, CLC08, FD01, GM00a, JmBdXgXm05, KY01b, CKL+03, DLP+09, GIKR01, HSL+02, KMT01, KV01, Luc00, MM01b, MMH02, K¨uh01, LKH+08, MR01b, Pha04, SW05a]. PSC+02, RDJ+01, SMTM01, SRQL03]. round- [CLC08]. Round-Complexity Rijndael-Like [PSC+02]. Ring [Ros00a]. Round-Optimal [KO04]. [BSS02, Nao02, WBL01, ZK02, Her07]. Rounds Rings [BLST01]. RIPEMD [BDK+09, CD01a, HSIR02, KM01b, Luc00, [DG02, WFLY04]. RISC Pat03a, Pat04, GM00a, SK01a]. Routing [Cor00a, Gro03, WWCW00]. RISC-Based [BGOY08, CL05, Ken02a, KB09, LAPS08, [Gro03]. Risk [WA07, Voi05]. Risks LHC08, MABI06, PS08a, RVS09, vOWK07]. [ES00a, Kuh02a, Ros07, Bel04, BJ02, ES00b, RSA [Joy03b, Men05, Nac01, Oka04, Poi06, Jan00, MN03, PvS01, Sch00c]. Rivest Pre02c, Shp04a, Wal00, Adl03, Ano01o, [BB79, Coc03, SP79]. RMI Ano02e, AR01, BI04, BS02, BLH06, Bar00c, [JRB+06, Mar02a]. RNS BM01a, BNPS02, BN02, Ber09a, BT02, [BI04, BKP09, NMSK01]. Road BM01b, BM03b, BD00b, BMK00, BJN00, 66

BF01c, Bon01, BCCN01, BP01b, CNS02, [Ano00f, NPV01, BDD03]. safety [HM01a]. CDL+00, CW02, Che01a, CKY05, CNPQ03, SAFKASI [WAF00]. Saga [Eva09]. CKN00, CJNP02, CS00, CS03c, CD01b, Salomon [Pap05]. Salsa20 [Ber07, Ber08]. DK01, DT03, Duj08, Duj09, DN00b, FS02, Salt [PKBD01]. Salzburg [DKU05]. FS01a, FMP03, FMY01, FOPS01, GMP01b, Samba [BH00a]. SAML [RR04]. Samos GS07a, Gir06, Gon06, Gro01, HN04, Her07, [KGL04]. sampled [WW06]. sampling HLLL03, HLH00, HLL03, Int00, Jan08b, [KB39, Sug03, Tip27]. San JS05, Jon08, JK02b, JK02c, JG01, Kal01, [ACM03a, ACM03b, ACM03c, ACM07, Kal03, Kat05b, Kat01, KKL09, Kin00, Joy03b, Men05, Nac01, Oka04, Poi06, Pre02c, KPR03, LS01a, MPS00, MLM03, Man01, Sch00a, Sch01c, Sch04a, Sch05a, USE00b, May02, May04, Miy01, Mol03b, MP01c, USE02a, USE02b, Cal00c]. sanity [Sko03]. NZCG05, NZS05, NS01b, Nit09, Nov01, sans [Car00]. Santa [Bel00, Bon03, Fra04, NMSK01, PS00, Riv03, RSA09a, ST01a, Kil01a, Men07, Sho05a, Yun02a]. Santiago Sch01b, Sei05, Sha03a, Shp01]. RSA [BS03]. Sanxin [LSZ05]. SAR [B+02]. [Shp04b, SZ01, Str02, SWH+09, TIGD01, SASAS [BS01c]. SAT [KLN+06]. Satan TT00, Ver06a, Wal01, Wal03, WQWZ01, [Mea04]. satellite [CC05c, HYS03]. Satisfy War00, WLHH05, Wie00, WS02, WY05, [PHM03]. satisfying [QPV05]. Saturation XC05, Yan07, hY08, YKLM02b, YKLM03, [Luc02a]. saving [Lev01]. Savings [CAC03]. YPKL08, YY00, You06, ZC09, Zhe01, SAX2 [TEM+01, Hei01]. Say [Sta05]. says ZWCY02, dW02]. RSA-based [Ano01e, Mad04]. SBLH [JK02a]. SBoxes [NZS05, BNPS02, GMP01b, KPR03, Ver06a, [WOL01]. SC-CFS [Ito01]. SC2000 HLL03, NZCG05, Sei05, WLHH05, WY05, [SYY+02, YSD02]. SC2001 [ACM01b]. YPKL08, YY00]. RSA-Encrypted Scalable [CPhX04, HKA+05, HLL05, KY03, [CD01b]. RSA-Primitive [ST01a]. KHYM08, SPGQ06, LLW08b, ST03a]. RSA(R) [Ano06b]. RSES [LLCL08]. RST Scalar [AHRH08, ADDS06, HM02c, OS01, [ZLZS07]. Rueppel [Ara02]. Rules [Bla01a, OT03b, DwWmW05, Mis06]. Scale Ano00c, Bla01b, GM04, Ste02, Wue09]. [BWE+00, CDR01, FGD01, BP03a, BH00a, Running [ZL04c]. Running-mode [ZL04c]. HMvdLM07, PS08a]. Scaling [BBPV00, Runtime [PBTW07]. Russia [GKS05]. Coc02b, SDFH00, SDF01, PBVB01]. Ryan [Puc03]. Rye [KJR05]. Ryu [KCC05]. Scambray [Gum04]. Scan [MYC01, BD03, KBD03]. SCAN-Based S [BZ02, Kat05b, Puc03, Bih00, BCDM00, [BD03]. Scaring [Ols00]. Scenarios [BF05]. Dav01b, Dav01c, FM02b, JmBdXgXm05, scene [SG07]. Sceptical [Pem01b]. LG09, Opp01, SMTM01, ZC00]. S-Box Schedule [MHM+02, XH05]. Scheduling [FM02b, SMTM01, JmBdXgXm05]. S-boxes [FMS01, XQ07]. Scheme [BCDM00, ZC00]. S/MIME [AR00, AK02a, ACJT00, AF03, BBC+09, [Dav01b, Dav01c, LG09, Opp01]. SAC BNPS02, BR09, BS01d, BMS03, CL01a, [AMW07, HH04, HH05, MZ04, NH03, PT06, CHK03, CGHG01, CC01b, CYH01, CTL04, HSR+01, HSS04, ST01d, VY01]. SAC’99 CC09, CH01b, CM05a, Coc01b, CFS01, [HA00]. SAFE CDM00, DS05a, DKFX05, FS01c, GJSS01, [Uni00a, Uni00e, Uni00d, Uni00g, Uni00h, GS02c, HS02a, HNZI02, HY01, HT06, HC08, ACS02, LBR00, Lys08, Oiw09]. Safe-Prime Igl02, JSJK01, KK02, KC02, KCD07, Kog02, [ACS02]. Safeguard [LXM+05]. KLL01, KT00, KT01, KD04, LD04, LHT09, Safeguarding [Sty04, Bar03]. LL05c, LXH07, LCD07, Miy01, M¨ul01a, 67

OKS06, PL01, RK06, Scr01, SOOI02, HLL05, Kin02, Kos01a, KS03, KOMM01, SWH05, SGGB00, SYLC05, SSNGS00, LZL+01, LP01, MV00, NIS03b, Nam02, Tad02, TC01, Tsa01, TT01, WQWZ01, NNL01, NN06, OP01a, Pat04, Pre01, ST01b, WZW05, WBD01, YWWS09, YG01a, SBZ02, SPMLS02, Sun00a, VMSV05, WCJ09, YLH05, ZJ09, AEEdR05, Asl04a, BCL05a, XS03, YWC08, YYDO01, Yek07, YYZ01, BCW05, BKN04, BBG+02, CL02b, CBB05, ZTP05, ZYR01, Abd01, AFGH06, BCD06, CC01a, CC05a, CL04b, CL04c, CL04d, CWH00, CC05b, CJT03, CDFM05, DD04, CCK04b, CYH04, CHY05a, CHY05b, CL00, DM00a, DFM04, Des00a, GGK03, HCD08a, CHC04, CCH04, CY05, CHC05, Che05a, HCD08b, HAuR04, He02, HKS00, HW03c, Che07a, Che08a, Che08b, CCS08, CKN06, HW04, HW05, HC04b, HL04, IY06, JPL04, CJT01, Chi08b, Chi08c, Chi08d, DSGP06, JXW05, KJY05, Kir01b, KT06, Kre05, DW01, FLZ02, FXAM04, FCZ05]. scheme K¨uh08, LWZH05, LWK05a, LW05c, MF07, [FWL08, FWTC05, Gen09a, GS09, Hes04a, M¨ul01b, NK06, PS02a, PKH05, Pha06, HPS01, HWW03, HWW04, Hsu05a, HWH05, QCB05a, QCB05b, SNI00, Sha03d, Sha05b]. Hsu05b, HLC07, HC04a, Hwa00, HYS03, schemes HLL04, Hwa05, HL05c, HL05d, HL05b, [SCL05, SC02c, SHT05, Tsa05, Wu01, XY04, JW06, JSW05, KC09a, KLY03, KRY05, YWC05, YCW+08, ZF05, ZCL05, vDKST06]. KSW06, KHL09, KCL03, Ku04, KC05, Schloss [IEE01b]. Schneider [Puc03]. KCC05, KHKL05, LHY02, LLH02, LHL03a, Schneier [Ano01e, Hei03, See04, Sty04]. LKY04, LL04a, LJY04, LL05a, LKY05a, Schnorr [BP02]. School [Coc02a]. Schools LKY05d, LL05b, LMC+03, LLH04, LTH05, [PM00]. Science [Bis03b, Coc03, IEE00a, LLCL08, LLH06, LHL03b, LH03, LC04a, IEE01a, IEE02, IEE03, IEE04, IEE05a, LYGL07, LCC05, LC04b, LC05a, LHH05, IEE06, IEE07, IEE08, IEE09b, Imr03, LCZ05b, LCZ05c, LCZ05a, LWK05b, Nie02d, Pag03, Sch06b, SM07b, Sin01b, MSP09, NC09, PW05, PBMB01, PCC03, CAC06, PRS04, Pot05, Six05]. Scientific PC05b, PS01a, Pei04, Sae02, Sco04, SM11, [CHT02, MH09, Lau08b]. Scientists Sha03c, Sha05a, SC05a, Sha05c, Sha05d, [Coc01a, MH09]. SCN [BC05c, CGP03]. SLH03, mSgFtL05, SCS05b, SC05c, SCS05c, Scots [Ree01, Ros00b, Sin99]. Scream SZS05, TLH05, Tsa08, TWL05, TYH04, [HCJ02]. Scribner [Gas01]. Scripts VK08, VS08, WLT03, Wan04b, WL05, [Uri01, Oue05, Rob02, Rob09]. scroll WK05, WJP07, WDLN09, WHH05, WC01b, [GB09, HHYW07]. SD [ECM00a]. SDK WH02a, WHLH03, WH03, WC03b, WL04b, [Ano02d, Bar00c]. SDL [HL06]. SEA WC05, XwWL08, XC05, YW04b, YTH04, [SPGQ06]. SEAL [Flu02b]. Seamless YW04a, YCH04, YWL05, YC09b, hY08, [OKE02]. Search YRY04, YRY05a, YY05a]. scheme [BI05a, Des00c, Eva09, FIPR05, KB07, LM02, [YRY05d, YY05b, YbJf04, ZC04, ZX04, TIGD01, WYY05a, WYY05d, FZ06, PM08]. ZC05, ZK05, ZW05a, ZAX05, ZC09, ZL05, Searchable [ABC+05, AFI06]. Searches dRMS05]. Schemes [PGT07]. Searching [AR01, BP02, BU02, BDDS03, BF05, [BSW09, GTTC03, OS05]. Seattle BGOY08, BDS09b, CM00, CD00a, CL04a, [ACM06, S+03, USE00a]. sec [KV01]. CGP08, CT08b, CPD06, CKN00, Cor02, Second CJNP02, Cou04, CS00, CS03b, CDG+05, [ACM03c, Bra01b, BD08, CZ05, GW01, CLZ02, DN00a, DN02b, Des00b, DS06, HTS02, JYZ04, KCR04, Kil05, KP01, NM09, DN00b, FF00, HSZI00, HWW05, HM02b, RD01, ACM00, Irw03, Rie03, Son00, Spr03]. 68

Second-Order [NM09]. Second-Price [McK04]. Secure [Bra01b]. Secord [Top02]. Secrecy [AR00, AO00, AF04b, AG01, AP09, Ano01o, [Bla02a, GH02, Imr03, Lau05, Ree01, ACJT00, AFI06, BCGH11, BDF+01a, RW03a, Sin01b, BDNN02, BLP06, BD04a, BST03, BCL+05b, Bar03, BI05a, BPR00, Mol05, Ros00b, Sin99, Sin00, SY06, ZYW07]. BMS03, BB04, BMP00, Bra01b, BCP02b, Secret BG07b, CC00, CKPS01, CM00, CG06, [ACS02, Alv00, Ano03e, BBDK00, BTW05, CK02b, CHK03, CHK05, CGP08, CW07, BI05b, BTW08, BP06, BM01b, CGHG06, CQS01, CHJ+01a, CHJ+01b, CDM00, CGH00a, CH01a, CLT07, Cha04, CTY09, CD01a, CS02, CS03b, CDG+05, CDI05, CC06, CS05b, CKN01, CDM00, CDF01, Des00b, DG03, DM00b, ES00b, FGMO01, CF02, CFS05, CDG+05, CDI05, Di 01, FB01, FP01, FOPS01, GPCS08,ˇ GIKR02, DKL00b, DS06, DN00b, DP07, EHMS00, GJKR03, Gen04a, GD05, HSZI00, HSZI01, FM02a, FS02, Fis01b, Gal03, Gas01, Hoe01, HSHI02, HSHI06, HRS02, Har07b, HKW06, HR05, HR04b, Jan06, Joh05, JLL02, Kah67a, HLvA02, HvAL09, HR04b, HL07, HLTJ09, Kah67b, Kah96, Kar01, Kin02, Kog02, KS03, Hut01, HLC08, IR01, Ito00, IFH01, JJ00a, LD04, LT04, LM02, May04, MN01, NABG03, JL00, JMV02, KMM+06, KY01a, KO04, NN06, OKS06, PZ01, PZ02b, PZ02a, RW03a, KLML05, KC02, KH05, KKL09, KI01b, RW03b, Rey01, RST01, Sin01b, Sun00a, Kos01a, Kos01b, Kra01, Kra05, KSR02, TL02, Top02, TC01, UW00, Ver06a, Wri05, LCK01, LLL02, LCK03, LWK00, Lin01c, ZYR01, ZP01, vW01, AJ08, AEEdR05, Lin03, Lin02, LL02, MKP09, Mar02a, Mar07, Ano02c, Ano08c, Bam02, BCB+05, Cal01, MV01, M¨ol03a, MJD01, NMO05, Nam02]. CC05a, CHY05a, CHY05b, CJL06, CNK04, Secure CDD00, DD04, DB04, DM00a, Di 03, DW01, [Nd05, NSNK05, NSS02, OKS06, OKE02, Duj08, FNRC05, FWTC05, FZ06, Gal02, OT03b, Opp01, PS08a, RVS09, RdS01, GIKR01, HT04]. secret ST01a, Sea05, SVDF07, SBG05, Smi02, [HJ07, HKS00, IY06, Kee05, KB09, Lam07, SKR02, SNR04, SBEW01, Sty04, Tad02, Lun09, MF07, MI09, Naf05, PS02a, PW05, VMSV05, Vau05b, VMC02, VM03, WLLL09, Ris06, Sch01e, SBZ04, SC05a, Smi01b, WBL01, WGL00, WHL05, XS03, YWL05, SC02c, Wan05, Win00, YCH04, ZSV05, ZYM05, Zho06, Aam03, Abd01, AEEdR05, dRMS05, vDKST06, Hil06]. Secret-Ballot AL07, AFGH06, BDS+09a, BDFP05, BCP07, [Cha04]. secret-code [DW01]. Secret-Key CLOS02, CCMT09, CC04b, CCK04b, [HR05, RW03a]. Secret-Sharing CRSP09, CHH+09, CCD06, CG05, DG06, [BI05b, CDM00, CDI05, DKL00b]. Secretly Dwi04, FMY02, Geb04, GIKR01, GCKL08, [CC08]. Secrets HSW09, HL03, HL06, HJW05, HBC+08, [BH06, BBD+02, CMS09, CP07, Che00b, Ino05, ISTE08, IKOS07, IY06, KOY09, Cop04b, Di 01, Gan01b, Gum04, KMS01, KG09, LL04c, LLH04, LHC08, LH03, LC04a, LKM+05, Lys08, Pag03, Puz04, Sch00d, LCZ05b, MT09, ML05, M¨ul01b, OS00, Swa01, Tee06, TEM+01, VGM04, AGKS07, PCSM07, PBMB01, PQ06, PLSvdLE10, Ano03c, Ano08b, Bam02, Bau00, Bau02a, PSP+08, RH03, RG09, RGX06, Sea09, Bau07, Cop05, Cop06, Cop10, DM07a, Di 03, SBG07, SGMV09, TKP+08, TCR03, Tse07, DW09, EC05, FS04, GD05, MSK03, Pau01, Ver01, VK08, WLH06, WWA01, YGZ05, Ste08, TCC02, DLMM05, Eva09]. Section YTWY05, hY08, YRY04, ZBP05, ZCL05, [Ano04b, Ano07a, BK06b, SGK08, TL02, ZCW04, vOWK07, Ano03b, Ano08d]. KP03]. Sector [Cro01, MV01]. Secur Secure 69

[Ano12, BS01a, BSB05, CHKO08, FIP02b]. Sch08, SJ00, Sch01f, See04, Sha05d, SLH03, Secured [BNPW03, Ito01, UP05]. Securely SLG+05, SL05a, Shp02, Sko03]. Security [HL05a, LLK05]. Securing [SEF+06, SEK01, SEK02, SK06, Sta03, SB07, [Abe01, Cal00a, CYH01, Dav01a, FR02, Ste05b, SBZ02, Sty04, SKI01, Sun05, Swi05, HHSS01, Her02, Hos06a, ISW03, LAPS08, Tan07b, TG07, TG04, TPPM07, Uni00a, LLS05b, Mes00, Mes01, RR04, SL05b, TV03, USE00d, USE01c, USE02b, Uni00c, Uni00e, Kwo02, Kwo03b, LPW06]. Security Uni00d, Uni00g, Uzu04, Vau02, VMC02, [AW05, AW08, Ahm07, AJ08, ADR02, WLT05a, WBL01, WWL+02, WA07, And07, And08b, Ano02b, Ano03b, Ano06c, YEP+06, YWD08, Zan01, ZWC02, ZDW06, AHKM02, Ayo06, BP07, BW07, Bam02, Zhe02b, ZYH03, ZS05, dLB07, AA04b, BPS00, BBM00, BKR00, BP02, BNPS02, Ano05c, AJ01a, AJ01b, BPS08, Bai08, Bau05, BY03, BPR05, BOHL+05, BBB+02, Bis03b, Bej06, Bel07b, BR04, BGP09, BFGT08, Bla02a, BF06b, BDTW01, BCHK07, Boy01, BFG08, Bjo05, Ble07, BJ02, BMW05, BG07a, BGM09, BLMS00, CGM07, CK02a, CKN03, Bru06, BMV06, Can01a, C+02, Cha07, Can06a, CGHG01, Cer04b, CC02b, CSW+08, Cha05b, CKL+09, Che00b, Che05b, CKRT08, Che05c, CM05a, CH07a, CSY09, Clu03, Chi08b, Chi08c, Chi08d, CJL06, CJM00, Coc01a, CK06, Cor00b, Cor02, CGP+02, Con09, Con04, CC05e, DP04, DKK07, DY01, CG05, Dr.00c, Dal01, DN02a, DKMR05, DFGH04, Des00a, DWML05, DKU05, DeL07, DJ06, Des00c, Dim07, DR02d, DMS07, Egh00, FXAM04, FR08, FOP06, DSS01, DK05, DS05b, DBS+06, Elb09, GH08, GJL06, GJJ05, Gha07, GJ03, Gor05, ELvS01, FIP01b, FBWC02, FW09, FLY06, GKS05, GMW01, GC05, Gut04c, HN04]. For04, FML+03, FMY01, GS02a, GSS03, security Gum04, Gut02b, Gut04a, Gutxx, HM00, [HCD08a, HCD08b, Har05a, Hei03, Hen01, HSZI01, Hei07, HM02b, Hir09, HLL+01, Hes04a, HM05, HSL+02, HL06, HG05b, HGNP+03, HQ05, HL05c, HL05d, ISO04, Ino05, JEZ04, Jan00, Kad07, KY00, KPS02, Ina02a, Ina02b, Int00, IKY05, IKP+07, Kim02, KVD07, Kov03, KH03, Kwo03a, JYZ04, JP07, JP02b, JSW05]. Security LC03, LL03, LJY04, LL05b, LPW06, [JG07, Jol01, JBR05, JK02b, JK02c, JMV02, LMC+03, LMW05, LLLZ06a, LLLZ06b, JQY01, Kan01, KM02, KSHY01, KL05, LHC08, MJ03, Mal06, Man08, Mau05, Ken02a, KB06, KMZ03, KDO01, KM05, Mau04, May01, MKKW00, MSK03, McG06, Koc02, KHL09, Kos01a, Kov01, KXD00, Men03, MS02d, MK05a, MPPM09, OP01b, Lad06, Lai03, Lan00a, Lan04b, LGS01, Pae03, PSG+09, PC05a, Pat02a, PY05, Lee04b, LKH+08, LKHL09, Leh06, Len01, PP06a, Pau03, PHS03, Pip03, Poi00, PS04c, LNS02, LL04d, LSH03a, LSH03b, Lin02, Rie00, RC05, Ros06b, RN00a, RN00b, SNI00, LXM+05, LWK05b, LP01, MJF07, MS02a, Sal05d, Sch03, Sch02, Sch04d, Sen03, SHL07, MS09b, MP03, MF01, MS05b, MV01, MN03, Shu06, SPHH06, Son00, SH00, Sta02a, Sta06, MP05, M¨ul01a, NIS01b, NDJB01, NNAM10, Ste02, Sun00b, SHT05, SLL+00, Tsa05, NP07, Oka00, OP01a, Ort00, PV06b, Uni00f, Vac06, Van03, Voi05, VS08, WAF00, PSC+02, Pat03a, Pat04, Pat02b, PD07, WDCJ09, WA06, Won01, WK06, Woo05, PC04, PP03, PTP07, PP07, Pho01, Pie05, XQ07, YW04a, YY05b, ZSZ01, ZW05b, Pli01, Poi02, PHM03, Poo03, PF03, PS05, ZSN05, dCdVSG05, vOWK07, vT05, AG09]. Puc03, Puc06, QCB05b, RR00, RR03b, Security RR05, RC01, Rot02a, Roy05, Rub01, RC06, [Ano02e, BC05c, BP01b, Chr00, Chr01, ST02, Sal03a, SJT09, Sch00d, Sch00e, Sch07, CCMR02, CCMR05, CGP03, JRB+06, 70

Lin02, RR04, Uni00h, ZL04c, Pap05]. [HT06, Bro05b, SPHH06]. Sensitivity Security-related [Gutxx]. [SDMN06, GSK09]. Sensor security-sensitive [SPHH06]. [AEAQ05, CS08b, DBS+06, Fin06, GPCS08,ˇ [TP07, KKJ+07]. Seeing [Wal03]. Seek LNL+08, NABG03, NNAM10, PZDH09, [Coc01a, PH03, Shp05]. seeking [Mos06]. ZYN08, AJS08, CCMT09, HMvdLM07, Seeks [CAC06]. Seems [Coc02a]. Selected JRR09, KXTZ09, KHYM08, LDH06, [BKP09, Bar00c, CCMR05, CSY09, GH05, LPV+09, LN04, Lop06, MWS08, MS09b, HA00, MS05a, Neu04, PT06, RSA00e, NC09, NLD08, PS08a, RAL07, TP07, ST01d, VY01, Ytr06, AMW07, Bir07, BC05c, WDLN09, ZSJN07, AMB06]. Sentry CZ05, CKL05, DRS05, HH04, HH05, PC05a, [Kum07]. Seoul Wil99, WK06, AMW07, HH04, HH05, MZ04, [CKL05, KCR04, Kim02, LL03, LL04d, NH03, PT06]. Selecting [Bur03, dB07]. May09, PC05a, PK03, Son00, Won01, WK06]. Selection [IBM00, JKK+01, RS00, SM08]. Separable [CD00a]. Separating Selective [CS07c, LS01a, LM02]. [MKKW00, Nie02b]. Separation Selective-ID [CS07c]. Selectively [Chi08e]. [BYJK08, GKK+09, Kel00, Lys02, Mur00, Self [GMM08, HW05, KY01d, LXH07, ZGLX05, BYJK04]. separations [GKK+07]. PS01b, PBC05, Sch06b, WHLH05, WLT05b, September ZKL01, BCL05a, BCW05, CSV07, CWH00, [AUW01, AAC+01, AJ01a, BCKK05, BC05c, CCH05, CJ05, Fis01a, HW04, HL04, Lee04a, CSY09, CGP03, DV05, DKU05, DFCW00, LL06, LS05b, LWK05a, PC05b, SH11, EBC+00, ELvS01, FLA+03, GKS05, QS00, Sha04b, Sha05b, TLH05, Tsa05, TJC03, RS05, SM07b, WKP03, dCdVSG05, AJ08]. WH03, Wyl05]. self-adaptive [SH11]. September19 [AJ01b]. September19-21 Self-Certified [LXH07, HW05, BCL05a, [AJ01b]. Sequence BCW05, CWH00, CCH05, CJ05, HW04, [HWH01, MS02e, WHLH05, ACTZ05,´ GB09, HL04, LL06, LWK05a, Sha04b, Sha05b, SL09, WG02, YZEE09]. Sequences TLH05, Tsa05, TJC03, WH03]. self-defense [ADD09, Bi09, XYXYX11, FSGV01, HG05a, [Wyl05]. Self-Enforcing [GMM08]. JZCW05]. Sequential Self-Escrowed [PS01b]. Self-Localization [GSS08, SNW00, RMH03a, WH02b]. Serial [WLT05b]. self-modifying [CSV07]. [CTLL01, KWP06, Uni00g, Mit00]. self-pairing [Lee04a, PC05b]. [BDK02b, ABK00, IK00, IK01, KKS00a, self-protecting [LS05b]. Self-Shrinking KKS01, KKS00b, Osv00, Pat01]. Server [WHLH05, ZKL01]. Self-Similarity [ANRS01, BMK00, Dew08, KO00, LWK00, [Sch06b]. Selling [Bla01c]. semantic NS01b, PS05, TMMM05, XS03, Zha00, [PBV08, SNI00, Sch00c, Coc01a]. BB05, LHL04b, LHL04a, LKY05b, LHL03b, Semantically [KI01b, ST01a]. Semantics NTW07, Tsa08, Tsa01, TWL05, YS04]. [Li01, Mar02b, BFG04, BFG05, SW02]. Server-Aided [NS01b]. Server-Assisted Semi [Fer00, Nak01, SY01b]. [XS03]. serverless [BDET00]. Servers Semi-Equivalent [Fer00]. Semi-fragile [BIM00, HS07, Jab01, KCD07, Mar02a, [SY01b]. Semiconductor TEM+01, LS05b, PT08]. Service [BACS02, [Coc02b, Igl02, UHA+09]. Seminal BH00a, CLK01a, DeL07, KZ01, Lan04a, [Cop04b]. semipublic [YC07]. Sender LDM04, Nik02a, Nik02b, PKBD01, CUS08, [CMB+05, Her09b, TJ01a]. Sensation HILM02, KWDB06, LB05, Mir05, MV03b, [Top02]. Sensible [Sch04c]. Sensibly SRJ01, SSM+08, UG08,¨ Coc02b, Hil06]. [See04, Sty04, Hei03, Sch03]. Sensitive Services 71

[ANS05, BCS02, DJLT01, ECM00a, ECM00b, FWTC05, GIKR01, HT04, HKS00, IY06, Knu07, Tsa01, Uni00b, WL07b, BDS+09a, LT04, MF07, PS02a, PW05, PS08a, SC05a, BFG04, BFG05, BFG08, CCCY01, HM05, SC02c, TL02, YCH04, YCYW07, ZSV05, JRB+06, MW06, MPPM09, MV03b, RR04, dRMS05, vDKST06]. shc [Gua05]. Sheets SBG07, SL05b, TWL05, WA06, BH00b]. [MNS01]. shell serving [LLK05]. Session [GL01, OHB08a, [Dwi04, Gua05, BS01a, BSB05]. Sheltering CS04, OHB08b, RN00b, Uni00a, Uni00b, [MYC01]. Shen [KTC03]. Shieh Uni00f, Uni00e, Uni00h, YWL05]. [McK04, CZ03, YWC05]. Shift Session-Aware [OHB08a, OHB08b]. [CGFSHG09, Che08a]. shifting [Cal00e]. Session-Key [GL01]. Sessions [KPR03]. shifts [Neu06]. Shin [K¨uh08, K¨uh08]. Set [BBGM08, GRW06, JRFH01, KS05c, Shines [Coc02b]. Shinko [Ano00d]. Ships WG05, aSM01, BDET00, Che07a, CC05d, [Ano02e]. Shops [Ano01c, YSS+01]. Shor DM00a, Elb08, Mar05b, Sta00]. Setback [KLB+02a]. Shores [KKP02]. Short [MYC01]. Sets [CFS05, EIG01, TW07]. [Ano01o, AFI06, BBS04, BGW05, DN00b, Setting Gra02b, LS01b, PM02, RR02, RW02, [BBM00, DLY08, LP01, PGT07, GMLS02]. Vau05b, GL05, WDLN09, Coc02b, Sch01e]. settings [Lee01]. setup [PS04c]. Seven short-term [WDLN09]. Shortcuts [Luc00]. seventh [AAC+01]. Several [Sha03a]. Shortened [Kur01]. shortest [KS00a, LD04, Tsa05, ZT03]. SFLASH [Pei09]. ShortPK [WDLN09]. Shoup [GM02b, SGB01]. SGI [Bar00c]. SGID [Luc02b, VMSV05]. show [GP00, Smi03]. [Tot00]. SHA [AD07, BC04a, GLG+02, Shows [Gen01, AJ08]. Shrinking HKR01, MP06, SK05a, TYLL02, WYY05d, [Gol01c, WHLH05, ZKL01]. SHS WYY05b, WYY05c]. SHA-0 [Ano08d, Ano12]. Shuffle [BC04a, WYY05d]. SHA-1 [GLG+02, [FS01c, NSNK05, Sas07]. Shuffles [Mir02]. HKR01, MP06, WYY05b, WYY05c]. SHA-2 Shuffling [PBD05]. shut [Gil07]. SiBIR [SK05a]. SHA-256 [TYLL02]. SHA-512 [IR02]. sic [IEE09a]. sichere [Lin02]. Side [AD07, GLG+02]. SHA1 [WYY05a]. [Ano01j, BU02, KSWH00, Law09a, LL01, SHACAL [KML+02]. Shacham [Hes04a]. M¨ol02, OT03a, OT03b, Sch06a, WC04, Shamir [BB79, SP79, Coc03, PW05, VS08]. CNPQ03, PSP+08, WL07a]. Side-Channel Shamir’s [LD04]. Shape [Gan01b, Gil07]. [BU02, Law09a, M¨ol02, CNPQ03, PSP+08]. Shapes [OMT02]. SHARC [DMSW09]. Side-Match [WC04]. Siena [BCKK05]. Share [CT08a, CDI05, FS04, AEEdR05]. sieve [CM05b, JL03]. sieves [Har07a]. Shared [ACS02, BH06, BBDK00, BT02, SIGABA [Lee03c]. SIGACT CGH00a, TEM+01, WP03, WS02, BF01c, [ACM03c, ACM05b, Raj06]. SIGART CYH04, GD05, HL05c, TYH04]. Shares [ACM03c, ACM05b]. Sight [Col03]. [TT01]. Sharing [BTW05, BI05b, BTW08, SIGMA [Kra03]. SIGMOD [ACM03a, BGHP02, CD00a, CLT07, CC08, CTY09, ACM03c, ACM05b, ACM04a, FMA02]. CDM00, CF02, CFS05, CDG+05, CDI05, SIGMOD-SIGACT-SIGART Di 01, Di 03, DS06, DP07, FM02a, FPS01, [ACM03c, ACM05b]. Sign FMY01, HNZI02, Kin02, Kog02, KS03, [BSC01b, BTTF02, Dav01c, Kra03, Dav01b]. LD04, MN01, NN06, OKS06, PZ01, PZ02b, Sign-and-Encrypt [BTTF02, Dav01c]. PZ02a, SZ01, Sun00a, TC01, TCC02, WN02, SIGn-and-MAc [Kra03]. Signal WBD01, ZP01, CGHG06, CC05a, CHY05a, [Ano02e, GG05b, Sha01e, CKL+09, CHY05b, CDD00, DD04, DM07a, DKL00b, LLLZ06a, LLLZ06b, SBS09, Kov01]. 72

Signalling [ECM00b]. signals [Ren09]. BMW02a, BLRS09, Cal00a, CKK03, Die00, Signature [ANS05, AAK09, AR00, ADR02, DMT07, Fan03, FWW04, FB01, GMLS02, Ano01c, Ano01g, Ano09b, Ano13, Ara02, HRL09, Her07, HLH00, JLL01, JL04, AR01, ACJT00, Bar06b, BNPS02, BGOY08, KKKL09, LV07, LG04, LG09, LS05b, MMJ05, BMS03, BDS09b, CM00, CD00a, CL04a, PLJ05a, PBV08, Sch01f, Sha01d, NZS05]. CK02a, CGP08, CH01a, Che02, CM05a, Signcryption Cor02, CFS01, CS00, DS05a, DKFX05, [Boy03, LXH07, MLM03, Zhe01]. Signed Eng00, FIP00, Gen00a, GJSS01, GS02c, [FL01b, OSSST04, Sch01a, SJ00]. Signer HYZ05a, HSZI00, Han00, HM02b, JSJK01, [DKFX05, CJT04, LL05b, WK05, IR02]. KC02, Kuh00, LZL+01, LP01, MV01, Miy01, Signer-Base [IR02]. signer-verified Nat00, NZCG05, PL01, PCK02, Pre01, RS01, [CJT04]. Signers SA02, ST01b, SOOI02, SWH05, SPMLS02, [LZL+01, Sae02, Sha03c, YTH04]. Str01a, SYLC05, SSNGS00, TNM00, Significant [SZ01, MS02b, Shp02]. Signing WQWZ01, WBD01, XYL09, YYDO01, [Ano00j, IR01, RR02, HWW04, WK05, YSS+01, YYZ01, YLH05, ZK02, ZJ09, WH02b]. signs [Gen00a, Lun09]. SIM Zhe01, AvdH00, BCL05a, BCW05, Cal00b, [AAKD09]. SIM-based [AAKD09]. similar CWH00, CL04b, CYH04, CCH05, CJ05, [Che08b]. Similarity [Sch06b]. CHC05, Che05a, CJT04, GGK03, HLL+02, [Imr03, Ree01]. Simple Hes04a, HPS01, HWW02, HWW03, HW04, [AKS06, CYH05, CJS01, CJ03d, CWY05, HWW04, HWH05, HW05, HC04a, HLL03, CC06, CS03c, DT03, FSW01, Gir06, HM02c, HC04b, HL04, Kwo02, Kwo03b, LH04, HLT01, MS01, Nam02, PBD05, RK06, YS02, LHY05, LL05b, LLH04, LTH05, LWZH05]. YW06, Dan02, GM04, KTC03, LKKY03a, signature LKKY03b, LFW04, XH05, YRY05d]. [LHH05, LCZ05b, LCZ05c, LCZ05a, LW05c, Simpler [Lin03]. Simplicity [MS01]. PKH05, PC05b, QCB05a, QCB05b, Sae02, Simplification [DJ01]. Simplifications Sha03c, Sha03d, Sha04b, Sha05a, Sha05b, [JS05]. Simplified [Bon01]. simplify Sha05d, SCL05, SHT05, TJC03, TYH04, [Sma06]. Simplifying [Gut04b]. Simply Wan04b, WK05, WLHH05, WHH05, Wu01, [Oni01]. Simply-Iterated [Oni01]. WHLH03, WH03, WY05, XC05, YTH04, Simulatability [HU05]. simulatable ZC05, ZF05, ZW05a, ZCL05, ZCW04, RR04]. [Lau05]. Simulation Signature-Based [CK02a]. [DKMR05, KL05, CPG+04]. Signature-Embedded [Ano01c, YSS+01]. Simulation-Based [DKMR05, KL05]. Signature-Tree [TNM00]. Simulations [WBRF00]. simultaneously signature/multisignature [Wu01]. [Wu01]. Singapore [BDZ04, TLC06]. Singh Signatures [Imr03, Ree01]. Single [GIS05, KO00, [AO00, AOS02, ABRW01, BN02, BGLS03, MM01b, MM01c, WLZZ05, SV08a]. BBS04, BSS02, BCCN01, CD00a, CL01b, Single-Chip [MM01b, MM01c]. CNV06, CZB+01, DK01, GMP01b, GM03, Single-Packet [WLZZ05]. Single-Server Gen04b, Gra02b, HSZI01, Her06, HM02b, [KO00]. Singular [AS08, Bai01b, BR09]. HS01b, HHGP+03, HLT01, IR01, IR02, JS05, SINOBIOMETRICS [LLT+04, Li05]. SIP KZ01, Kal01, LCK03, LS01a, Lys02, MR01a, [NTW07, PM00, SZ08]. Sir [Bud06]. Site Mad00a, MM02, MNFG02, PCG01, Ram01, [AEV+07, Coc02a]. Sites [Che01d, Ros07]. RR02, RdS01, WV01, XS03, Zho02, Ano00i, situation [AJ08]. six [Bel07a]. Sixth Ate04, AH05, BLH06, BB05, BMW02b, [Uni00a, Uni00b, Uni00f, Uni00e, Uni00h, 73

TLC06]. Size Sniff [Ano02e]. Snort [GC05]. SOAP [CS07c, CMJP03, HNZI02, Kal03]. Sizes [DJLT01]. Social [Ros07, Man08, AG09]. [Ano09d]. Skein [AEMR09]. Sketching Society [GL05, Kat05b, EY09, LWZH05, [MNS08, SLTB+06]. Sae02, Sha03c]. Socket [ZL04c]. Soft [Gra02a, HSL+02, SLL+00]. Skipjack-like [DV08]. Soft-Core [DV08]. Software [HSL+02, SLL+00]. SKLOIS [FLY06]. Sky [Ahm07, And07, Ano02e, Bar00b, BC04b, [MYC01]. SLAAC [CGBS01]. SLAAC-1V Coc01a, CS05a, DR02c, DF01, GH05, HCJ02, [CGBS01]. Slide [Fur02b]. Small HHM01, Hoe01, Joh03, Knu07, KSZ02, Lad06, [CCM05, ELvS01, Fin02, GPS06, MNT+00, Law09a, LSY01, LLLZ06a, LSVS09, LTM+00, May02, OT03b, RK06, SM02, Sch01e, MNT+00, MSNH07, MKY08, McG06, Nd05, SPGQ06, Wal03, YLC+09, Duj08, dW02]. PM00, PS01c, RM04, Sch01a, Sch00b, Ste00, Small-Project [MNT+00]. Smaller USE00b, VH09, VVS01, WHLH05, Wol04, [Bar00c]. Smart ZCC01, ARJ08, Ano00h, Ano00j, Bir07, [And04, Ano03a, Ano05b, AJ01b, Bel01, Che01e, CT02, CCD+04, CTT07, CC04c, BCST00, Car01, CL07, CJT02, DF01, DMS07, GPS05, HM04, HL06, Jen09, KA09, DFCW00, DJLT01, HBdJL01, Hen01, HQ05, Mat02, McA08, MCHN05, Pau03, Sch01d, Jac00, JSJK01, JY01, Lan00d, LSA+07, SS03, WL07a, WA06, Sal03b, Ano03b, Bol02]. MOP06, MV01, MG08, NFQ03, Poh01, QS00, Software-Efficient [HCJ02]. QS01, RE00, RE03, RS01, Sak01, SR01, Software-Hardware [PS01c]. Sha01c, SP02, TBDL01, VPG01, YKMY01, Software-Only [Hoe01]. Ano00k, Ano00l, Ano04f, AJ01a, Bor00, Software-Oriented [ZCC01]. BPR01, BCHJ05, BGL+03, Bur00, Cal00c, Software/Hardware [Nd05]. SOI CCCY01, Cha05a, Cla00b, Con00, CH00, [Ano02e, NFQ03]. SOISIC [Ano02e]. DMT07, DFH01, DFPST07, FCZ05, Fin03, Solaris [Ano06c, BH00b]. Solomon GMG00, GUQ01, HHSS01, Hsu05b, Hus01, [KY02b]. Solution [Cap01, CJT02, DHR00, Jua04, KLY03, LKY05a, Ler02, LC05a, LLS05b, Poh01, Str02, TvdKB+01, LSH00]. Lu07, MY01, Pha06, PB01, Pre07, SVDF07, Solutions [Ano04c, MV01, Jan00, MSK03, SLH03, Smi00, TIS07, VK08, WC03b, MV03b, St.00, Gum04]. Solve [CU01, GS03]. YW04b, YWWD08, Zaf00, BJvdB02, CL04d, Solving CCK04b, Che00a, DFPS06, FGL02, Gro03, [CJT04, GPP08, Wil01a, Bul09, Whi09]. HL05b, Ku04, KC05, LHY02, Pau02b, Some SKKS00, Sco04, SCF01, TV03, YW04a]. [AG01, BDF+01a, DJ01, DFG01, GM02c, smart-card [GMG00]. Smartcard HSS04, JMV02, KY01b, MT02, Max06, [HWH01, KRV01, RMCG01, Uri01, PQ03a, Rot01, Rot02b, Rot03, Wal01, Fur01, PBVB01, BBPV00, CGMM02, DM07b, HAuR04, He02, JK01a, RSS04, SHT05, ZF05]. HRS02, Ito01, KS02]. Smartcard-Based Someren [Ano03g]. Something [FL01b]. [RMCG01, CGMM02]. Smartcards sometimes [FNRC05]. Sons [And04]. [CMG+01, GN01, IFH01, MS01, Str01a, Sorry [San05]. sorts [Ano03g]. Soul UST01a, KSW06, Ano04c, RM02]. smarter [Bla01c]. Sound [BJP02, FR08]. Soundness [Car01, Cla00b]. Smartly [MS01]. Smooth [ABHS09, DPV04, MR01c, BPS08, Lau08a]. [PS02b, XYXYX11, GMR05]. SMS Source [Bar00c, Bol02, Gut00, HBF09, [Coc02b, ETMP05, LLS05b]. SMS-capable KLR09, PM00, RK06, TEM+01, Ano03d, [ETMP05]. SMV [ZWWL01]. snake BGL+03, CBB05, McA08, RVS09, SB05, [RD09]. snake-oil [RD09]. sneak [Ade09]. Bar00b, Lin02]. Sources 74

[KZ07, WLZZ05, KZ03]. Southampton [HLL+01, Kan01, PQ03b]. SPNs [CKL+03]. [Bla03]. Soviet [AJ08]. SP [BG07a, Hir09]. spot [Naf05]. Spread [BQR01]. Spring SP800 [SF07]. SP800-90 [SF07]. SPA [Pap05]. Spring-Verlag [Pap05]. Springer [FMP03, Nov01]. SPA-Based [Nov01]. [Fal07, Lee03a, Lee03b, Pho01]. Springs Space [BGH07, Lu02, MSNH07, NS05a]. [Wil99]. spying [Cas03, FNRC05]. Space-Bounded [Lu02]. Space-Efficient spymaster [Bud06]. spyware [Ste05c]. [BGH07]. Spain [BS03, DFPS06]. Spam SQL [Dew08, HILM02]. Squadron [OC03]. [CMB+05, DGN03, Vix02]. Spamming [HCK09, HQ01]. Squaring [Bel04]. SPARK [Jen09]. Sparse [BLST01, [CH07b, NSS02]. SRAM [HBF09]. SSC2 BDG+01, FS01b, GS03, BS02, BF06a]. [HQR01, ZCC01]. SSH [All03, BS01a, Spatial [MM01a, SGM09, SDFH00, Lin00a, BSB05, BKN04, Dwi04, H¨of01, Hos06b, SL09, YPPK09]. Spatial-Domain Kra02b, Naz02, Oue05, SWT07, Str02]. [SDFH00]. Spatio [CDTT05]. SSH-Connected [H¨of01]. SSHFS [Hos06b]. Spatio-Temporal [CDTT05]. speakables SSL [ASK05, BPST02, CHVV03, JRB+06, [BZ02]. Speaker [LM00]. Speaks [VN04]. KCD07, KPR03, Kra01, LLK05, LWK00, Spec [Bar00c]. Special Net04, OHB08b, OHB08a, SB01, SQ01, [Ano04b, Ano07b, Ano07a, BK06b, GIS05, Vau02, ZFK04]. SSL/TLS [BPST02, GS07a, GPP08, SGK08, KP03, FOP06]. CHVV03, KPR03, OHB08b, OHB08a]. SST Special-Purpose [Gau02]. St [GKS05, NH03, AS01a]. Stack [Ano07b, Ano07a, GS07a, GPP08, SGK08]. [Pot03]. Stage [Kak06, CHY05b]. stamp specialized [Wan04b]. Specific [CL00]. stamping [HHC05]. Stamps [HCK09, Zir07]. Specification [BCST00, [KZ01]. Stand [CAC03]. Standard ECM00a, LKJL01, RSA00c, Mea04]. [Ano08d, Ano09b, Ano12, Ano13, Bar00a, Specifications [IEE00b, BDFP05, BD04a]. BCP02a, FIP00, FIP01a, FS01a, Her09a, specificity [GSK09]. Specified Hug04, HLC08, IEE00b, MM01c, MP01a, [Tad02, He02, LWK05b, YY05a, ZX04]. Nat00, PM00, Pha04, RSA00b, RSA00d, Specifying [BJvdB02, Cir01, SBS09]. RSA01, RSA02, RSA03b, SM02, SK05a, [KGS07]. Spectr [GMM01]. Ano04e, BBK+03b, DRS05, GMR08, Sea09, Spectr-H64 [GMM01]. spectra [MS02b]. Tan01, AEH17, Ase02, Bar00c, III00, Bur03, Spectral [QPV05, SK07]. Spectrum CMR06, Coc02a, Coc02b, Cur05, DR01, [BQR01, LY07, PM00]. Speech DR02b, Dan01, FIP02b, GC01a, Har00, [MRL+02, AA04a, PY08]. Lan00a, Lan00b, Lan04a, Mor05, NIS00, Speech-Generated [MRL+02]. SB00, Sta00, Sye00, WBRF00, Wri01, YW06]. SpeechStudio [Ano02e]. Speed Standardized [Man01]. Standards [Ano00d, Ano02d, Gro01, JKRW01, [Ano01g, Bur06, CL07, Coc02b, Hus01, KMM+06, Lut02, SOTD00, SM02, Wie00, RSA00a, Tsa06]. Standing [Lan00b]. Star YKMY01, BGL+03, RW07, RMCG01]. [Pot05]. State Speeding [Osv00, SWH+09, TC05]. [And07, CR03, GST04, HBF09, Kar01, Speedup [YKLM02b, YKLM03]. Speedy MSNH07, Ris06, TL07, Mit00]. [Cre00]. spherical [LZP+04]. Spider State-transition [TL07]. statecraft [dL00]. [Tur04]. Spies Stateless [ANR01, NNL01, SK05b]. [Gan01b, Win05c, Hau06, NRR00]. SPIHT Stateless-Recipient [ANR01]. States [Che08a]. SPIN [MS02a]. Spline [SPK08]. [LB04, Jol01]. static [CW07]. Statistical Splitting [GMW05, LLK05]. SPN [Fil02, GHJV00, GHJV01, HNO+09, Jun05, 75

KK07, LZ01, LLL+01, MV03a, Neu04, [AJ08]. Strategies Pro01, RSN+01, BKW03, GSK09, Hey03]. [Cir01, KL05, SKQ01, Dwi04]. Strategy Statistically [Fis01b, HR07, HNO+09]. [DR02a, TPPM07, KC09a]. Stream Statistically-hiding [HR07]. [BCC01, BC05b, BSW09, BS00b, BL02, Statistically-Secret [Fis01b]. Statistics CF01b, Can06b, CJS01, CHJ02, CM03, [CKN01, CNK04, KLML05]. Status Cou03, CL02c, DF07, Fil00, FF01a, Gol01d, [Pre01, Sha03b]. statute [Cal00b]. STDM Gol01e, GBM02, HCJ02, HR00, HR04a, [WMDR08]. Stealing [Gan01b]. Steering Jam00, KHD01, MSNH07, PP06a, SM01, [HR13]. Stefan [AUW01]. Steganalysis Sar02, SXY01, WB02, Wu02, ZC00, ZCC01, [Pro01, Sal05b, GSK09, WW04]. BGP09, Ber07, BD00a, BG08, BVP+04, Steganografie [Sch09]. Steganographic DS09, DK08, KH08, Max06, MI09, MRT10, [CTL04, HR02, LL02, MJF07, RH02, RS00, PCS03, PCC03, SB05, WW08]. Wes01, KC09a, LYC02, WWTH08, YCL07]. Stream-Cipher [SXY01, WW08]. Streaming [OS05, CBB05]. Streams [BC05a, BGI08, CYH01, ChLYL09, CDR01, [AIP01, CO09a, YLC+09, ZCW04]. CW09, CTH08, Col03, CMB+08, CS05c, Strength [CB01, JX05, Oni01, CKL+09]. DIRR05, DRL09, FGD01, Fri07, Gal03, Strengthening [Loi00, MHM+02]. String HCBLETRG06, HLvA02, HvAL09, Hun05, [CPS07, DFS04, Pas03, Dam00, RG05]. HSKC01, LS08, PH03, Sal05b, Sch09, Strings [Vau05b]. Strong Sha01e, Shi08, SWR05, Wan05, WW06, [ADD09, BB00b, CS00, DKFX05, KCJ+01, CDS07, CO09a, Che07a, Che08a, GGS+09, KW00, LSH03a, LSH03b, Lu02, Pau09, JDJ01, KP00, LT04, WW04, WMS08, SBZ02, WHL05, Ano01m, CC04b, HRS08, Way02b, Way09, YCYW07]. stego [KC09a]. KTC03, Ku04, LL05b, SS03, ZT03, ZFK04]. stego-image [KC09a]. Steiner [WL02]. Strong-Password [LSH03a, LSH03b, Step WHL05, CC04b, KTC03, Ku04]. Strongly [DRL09, KKKL09, Ano04e, MP07, SL06]. [IY06]. Structural [BS01c, LBR00]. step-by-step [SL06]. Step-out [KKKL09]. Structure [DNP07, EIG01, H¨of01, HLL+01, Stepping [WRW02]. steps [Bih02]. MR02a, MR02b, GT02, HSL+02, MF07, Stereotypes [GO03]. Stern PS02a, SG07, SLL+00, XMST07]. [CGP08, CS05b]. sticker [GPX08]. Sticks Structured [BRTM09, CKK03]. [Sam01]. still [Ano00f, Rie00]. Stinson Structures [Spr03]. STL [Zol01]. STOC [Ano02e, DS06, GTTC03, HCDO02, KCP01, [ACM05c, ACM07, ACM08, ACM09]. K¨us02, MND+04, MFFT05, PSC+02, PQ03b, Stochastic [MG01]. Stock [Bar00a]. Stone Sun00a, XH03, Hen06a, IY06, SWR05]. [MLM03]. Stones [WRW02]. stop struggle [Bur02]. Stuart [Gum04]. [SSNGS00, Win05c]. Storage students [AA04b, PP09]. Studies [DFSS08, Din01, Din05, HR02, Har07b, [Pag03, LFHT07, SPHH06]. Study Hug04, MSTS04, RCBL00, Ric07, RH02, [BBGM08, Car02, DPR01, DP00, KKJ+07, Vad03, AFGH06, DFSS05, HGR07, LPM05, WCZ05, BKN04, BF06a, DY09a, KWDB06, SGMV09]. Store [CTBA+01]. Storing SKW+07, ZWWL01]. Sturgeon [ST06]. Story [Wei05, Wei00, Wei06]. Stuttgart [Eag05]. [Ben01b, Ben04, Bud00a, Gas01, Kah67a, style [BPS08, dH08]. Subcommittee Kah67b, Kah96, Kar01, Sch09, Bud02, DB04, [Uni00f, Uni00h]. Subdivision [LDD07]. Hau06, Hig08, HS01a, Win00]. strategic Subgroup [NBD01, KM04a]. Subgroups 76

[Gro05, GMR05]. subliminal [LH04]. Switzerland [CC04a, Vau05a]. Symbiosis subsampling [LLC06b]. subscribe [SL05b]. [DF01]. symbol [SVDF07]. Symbolic Subscriber [CFRR02]. subscription [Bor01, Jef08, Mar02b, May09, MT07, MP05, [MW06]. subscription-based [MW06]. ALV02]. symbols [Lun09]. Symmetric subsets [Sch01e]. substitute [Bih02]. [Ano01n, ABM00, BU02, BKM07, Substitution CvTMH01,ˇ CCM01, Des00b, EP05, FW09, [KKG03, GPX08, RBF08, WL04b]. Fil02, RR00, Ust01b, BMA00a, BMA00b, Substitution-Permutation [KKG03]. BMA00c, DW09, Lee01, PBMB01]. substructure [MRT10]. Subsystem Symmetric-Key [Ano01n, ABM00, CCM01, [HL07, MBS04]. Subtleties [Lai08]. EP05, RR00, BMA00a, BMA00b, BMA00c]. subverting [HB06]. Success [Ano06d]. symmetry [RBF08]. Symposium successful [KH03]. Succinct [BA06, FS08]. [ACM00, ACM01a, ACM02, ACM03b, Sued [Nic01]. Sufficient ACM03c, ACM04b, ACM05b, ACM05c, [IKO05, Kos01b, KO00, MN01]. Suffix ACM06, ACM07, ACM08, ACM09, ACM10, [ABM08]. SUID [Tot00]. SUID/SGID Ano00d, BS03, BCDH09, BC01, CGM07, [Tot00]. Suitable [AIK+01, CQS01, KTT07, IEE00a, IEE01a, IEE02, IEE03, IEE04, LKHL09, SP05, Wen03]. Suite IEE05a, IEE05b, IEE06, IEE07, IEE08, [RSN+01, SBEW01, YLT06]. Suited IEE09b, Jef08, KM07, MFS+09, SMP+09, [WWGP00]. Sum [Che04b, KLY02]. TLC06, USE00d, USE01c, USE02b, May09, Sum-of-Digits [Che04b]. Sums dCdVSG05]. synchronisation [CMdV06]. [CY08, Shp05]. Sunspots [CPS07]. Super Synchronization [GPCS08,ˇ SW02]. [Lam07, CAC06, Hos06b]. supercluster synchronize [Pau02b]. Synchronous [Pri00]. Supercomputer [Coc01a, Wal09]. [CH01b, Sar02]. synopses [YLC+09]. Supersingular [Gal01, RS02, Ver01]. Syntax [BWBL02, RSA00b, RSA00d]. Supervision [FDIR00]. Supplemental Synthesis [XFZ01, SOIG07, UBEP09]. [TBDL01]. Supplementary syslogs [ME08b]. System [ECM00a, ECM00b]. Supplies [Sha01c]. [Ano02d, Ano02e, ANR01, BIP05, BCST00, Support [ABM00, Gro03, LTM+00, Bih00, CCDP01, CHM+02, CSW+08, PZDH09, SBG02, Ano04e, Ano05c, BMA00a, CGJ+02, DJ01, DGP07a, DGP07b, DV08, BMA00b, BMA00c, ED03, mSgFtL05, EM03, FL01a, Ito01, Joh05, KC02, KHY04, SSM+08, WNQ08, ZYLG05]. Supporting LV00, LSZ05, LLS05b, LXM+05, MA00a, [CLK01a, SW02]. Suppression [GA05]. MA00b, Miy01, MFK+06, MFS+09, RH02, Sure [Tom06]. surface [Iwa08, LDD07]. SR01, Sha02, SOOI02, Ste05b, TK03, Surfaces [SPK08]. surveillance TZT09b, USE00a, WG05, WA07, YKMY01, [Che01f, LCS09]. Survey YKLM02b, ZYM05, AHK03a, AMRP00, [EPP+07, FDIR00, KM04b, LDH06, MSI10, Ano00j, ADH+07, AAKD09, Blu09, BDET00, ATS04, Ano00e, BEM+07, CF05, CDL06, Bul09, CC02b, CCH05, CJL06, CPG+04, EY09, LOP04, Mea04, M¨ul01b, OZL08, PC09, Coc01a, Cre00, CO09b, DZL01, DPT+02, Pre07, RH03, RAL07, Sch01f, UG08,¨ ZLZS07]. DIM08, DGP09, FP00, GG08, GSK09, Survivable [CLZ02]. Susan [Jan08a]. SVD GMG00, Gou09, HLL+02, Joy03a, KWDB06, [BBC+09, CYH+07, FWL08]. SVD-based KXD00, Kwo03a, LL04c, LKJL01, Lin00a, [CYH+07, FWL08]. SVGrid [ZBP05]. LK01, MKKW00, RCG+05, Sal00b, SCS05a, Sweden [BS01b, Joh03]. Swedish [Bec02]. SGMV09, SETB08, TKP+08, Wan04a, dB07]. Swiss [Boy03, Kid00]. Switching [CT03]. systematic [DW05, ZL04a]. Systemic 77

[KB06]. Systems TCP [CD01b, Ols00, SBB05]. TEA [ACM03c, ACM05b, ANRS01, Ano02e, [CV05, HSR+01, HSIR02, HHK+04, BCS02, BRTM09, CP02, ELvS01, Fel06, MHL+02, WN95]. Teaching GS03, GRW06, IEE01b, JQ04, KKP02, [McA08, Shu06, GV09, Jan08b]. Tech Ket06, Len01, LST+05, LLLZ06a, LJ05b, [Kir01a, TvdKB+01, Uni00c, Gra01, Ros04, Lut03, Mar02b, MMYH02, NABG03, RS05, Uni00f]. Technical Ril02, SM01, Sas07, SJT09, SXY01, USE00c, [BHM03, GS07b, Lan00c, Scr01, TL02, USE00b, Vav03, VHP01, WKP03, ARJ08, USE01b, USE01a, USE02c]. Technique And08b, Ano01n, Bid03, Ble07, CUS08, [CC02a, Pau09, PQ03b, SC02a, WC03a, CC05c, CCS08, CGL+08a, CGL+08b, vW01, CL00, Che08b, Pau03, Ren09, WC05]. CGL+08c, CCM01, CNPQ03, CHT02, CG05, Techniques [AIP01, BSW09, Bih03, CSK+08, DY09a, EY09, FMY02, FP00, HP00, BBPV00, BDP02, CC04a, Cra05a, DBS+06, HBC+08, Hut01, HYS03, JP06, KAM08, Dun06, Gal03, KLN+06, Ken02b, Knu02, KP01, KNP01, KP03, Kov03, KR03, KNS05, KO03, MKP09, NCRX04, PJK01, Pfi01, MBS04, MSP+08, NdM06, Nis03a, PBMB01, Pre00, Shi08, YKW01, AB09, BMW05, Par04, PI06, RW07, Sha01a, SK03, TOEO00, BR05, Che08a, DY01, DHMR07, DY09a, WAF00, XQ07, ZSV05, Ano02d, Lut03]. Gal02, ISO04, KP00, Man08, Pin02, Pin03, systems/ciphers [SK03]. Systolic PBVB01, SETB08, Swe08]. Technologie [KLY02, KKY02, MP01c]. [RSA09b]. Technologies [MS05a, PP06b, Sam09, SE09, VH09, Way01, Table [Ano03f, MFFT05, XFZ01, BZ03, Way02a, ZWC02, ATS04, PB01, TTZ01]. CC05b, Has00, Tsa08]. table-based [Has00]. Technology [CZK05, Cla00a, GS00, Tables [AJO08, KB39, RBF08]. tactics GSB+04, MP00, NFQ03, Pag03, TV03, [Cal00e]. Tag [KKJ+07, NNAM10]. tagging AL07, Ble07, Car01, Cas02, Che00a, ISO04, [BP05]. Tags [OS06, ACdM05, PLSvdLE10]. Jac00, KB00, LR01, Pau02a, Pau02b, Six05]. Taip ei [Lai03]. Taiwan [Lai03, Ano03a]. Tektronix [Ano02e]. TelCorreo [LM00]. Takagi [LKYL00]. Takagi-cryptosystem telegram [Tuc66]. Telelogic [Ano02e]. [LKYL00]. Takaragi [WHLH03]. take Telephone [KZ01]. telephones [CF05]. [Heg09, Per05b]. Taking Telephony [CDS07, Lai07, PM00]. Talb ot [Rot07]. [Ano02e, CFRR02, PM00, CGV09]. Talk [FGM00a, Lan00d]. Talking [Ano01p]. teleportation [BEZ00, BEZ01, Duw03]. tamer [Kap05]. Taming [Aba00, Lov01]. Telling [Gan01b]. template Tamp er [LTM+00, CT02]. [LLC06a, UBEP09]. Temp oral tamper-proofing [CT02]. tampering [CDTT05, KXTZ09]. Ten [ES00a]. Tenth [PS08b]. tandem [DPT+02]. Tang [USE01c]. Term [ABRW01, Dur01, BMV06, [YRY05d]. tank [Pau03]. tar [Str02]. ISO05, LG04, SGMV09, WDLN09]. targama [MAaT05]. target [BD04b]. Terminal [ECM00a, ECM00b]. Terminals Targets [MV01, Pau03]. Tarragona [Chi08a, ISTE08]. termination [BP05]. [DFPS06]. tasks [XQ07]. Tate terms [LMTV05]. Ternary [Jou02, SKG09]. TATSU [TSO00]. tattling [ADI09, DKL00b]. Terrorism [PP06b]. [CSK+08]. TC [DKU05]. TC-11 [DKU05]. terrorists [Mad04, Win05c]. TESLA TC-6 [DKU05]. TC11 [ELvS01]. TC8 [LN04]. Test [BT02, HSS04, Lan00b, LN08, [DFCW00]. TC8/WG8.8 [DFCW00]. TCB RSN+01, Way02a, DS00, GMG00, Kat05a, [SPHH06]. TCC [HR06, Kil05, Nao04]. KKKP05, RSS04]. testable [RMPJ08]. 78

Testing [III00, CGBS01, Fil02, Lut02, [Por06, SS04, BK00, Geb04]. threatened Lut03, SB00, WA06, Lut03]. Tests [Ano00i]. threats [CNPQ03]. Three [MT02, NM09, GT02, Gut04c, JPL04]. Text [BR00b, Kak06, LSH00, MAaT06, AJ08, [Lut02, PJH01, PM08]. textbook CLC08, FGM03, GPS05, LHL04b, LKY05b, [BJN00, PP09]. Thank [CMB+05]. Theft LLS+09, MF07, MAaTxx, SPHH06, YC09a, [CMS09, Ano01l, Phi06]. Their ZL04b]. Three-Key [BR00b]. Three-party [AGT01, CD00a, Gen04a, JKRW01, LLL+01, [LSH00, CLC08, LHL04b, LLS+09, YC09a]. WLZZ05, CM05b, Has01b, Pau02a, PW08, three-principal [ZL04b]. Three-Stage Sav04, SSST06, Sti11, TO01, WV00]. Them [Kak06]. Threshold [WD01a, Tee06]. Theorem [AC02, Eke02, [AF04b, AIP01, BTW05, BTW08, BDDS03, GN01, Sho00a, Sch01b, YKLM03]. BSS02, CCD07, CLT07, CDN01, DK01, theorems [MW04, Nyb01]. Theoretic DN03, DG03, FS01a, FP01, JL00, KY02a, [CB01, DHR00, Kat05b, Nie02b, VVS01, KS05b, Kin00, Kin02, Kog02, LZL+01, VDKP05, vW01, Mar05b, NR04, Shp99, LSC03, LCZ05a, LP01, MSJ02, Nie02c, Wag03]. Theoretical [SGB01, PRS04]. STY07, WQWZ01, Wan04b, WH03, XS03, Theoretically [AP09, DM00b]. Theory BCW05, BMW02a, CL02b, CC05a, CYH04, [ACM00, ACM01a, ACM02, ACM03b, CHY05a, Che05a, DG06, HWW02, HWW03, ACM04b, ACM05c, ACM06, ACM07, HW05, JLL01, JL04, LCC05, LCZ05c, ACM08, ACM09, ACM10, AL06, BDZ04, SCL05, TYH04, WHLH03, XC05, YTH04]. Bih03, Boy01, CC04a, Cra05a, Des02, Fal07, Throughput [HV04, LS01b]. thwarting HR06, Hay06, IZ00, Irw03, Kim01, Knu02, [WL07a]. thwarts [Ade09, SW05b]. TI Lai03, Lee04b, Lut03, MNT+00, Mao04, [GBKP01]. tib [MAaT07]. Tickets NP02a, Nao04, Oka00, PY06, Pfi01, Pre00, [FGL02, KS02]. Tie [SZS05]. tier [TW07]. Rot05, Roy05, Sch06b, Shp03, Spr03, TW02, Tight [CM05a,Di01].Time TW06b, Vau05a, Wal00, WG05, Yan00, [AK02a, App07, AJO08, BPST02, BS00b, YDKM06, Zhe02b, AUW01, AB09, Buc00a, BSW01, CU01, CJ03a, CNV06, CLZ02, Cas06, Cos00, DW05, Gar04, HHL+00, Dri02, GPCS08,ˇ HM02b, Ina02b, KL05, HW98, Joy00, Kil05, Laf00, Lam01, PPV96, Kuh02a, LP02a, Lan00b, LJL05, LDM04, Rot02b, Rot03, SCS05a, Sho05b, Ste08, Sti95, May04, Oec03, Pli01, QSR+02, RR02, Sti02, Sti06c, Tat05, TW05, Was08b, HR06, CAC03, CCK04b, CL00, DS02, GS07b, KXTZ09, Kil05, Nao04, Nie02a, Nie04]. GM04, HLTJ09, HHC05, LC04a, MRST06, There [Bar00b, GW00, Neu06]. thieves NS05a, YZDW07, hY08, DK08]. [NRR00]. Think [Pau03]. Thinking time-bound [hY08]. Time-Domain [See04, Sty04, CS07a, Hei03, Sch03, Sma06]. [Kuh02a]. Time-Free [CNV06]. Third [AL06, BS01b, CGP03, HR06, IKY05, Time-Limited [AK02a]. Time-Memory KNP01, MS02c, NIS00, Won01, WV01, [AJO08, Oec03, QSR+02]. CKL05, GKS05, IZ00, JZCW05, QS00, Time-Memory-Data [DK08]. CGH+00b]. third-order [JZCW05]. Thirty Time-Reversed [Ina02b]. time-space [ACM03b, ACM06, ACM00]. [NS05a]. time-stamping [HHC05]. Thirty-Eighth [ACM06]. Thirty-Fifth Time/Memory/Data [BS00b]. Timed [ACM03b]. Thiry [ACM02]. Thiry-Fourth [BN00b, CHKO08, JP07, LKJL01, Mao01, [ACM02]. Thorsteinson [For04]. Thou HGNS03, Zha06]. Timed-Release [MYC01]. Thought [MNT+00]. Thoughts [CHKO08, Mao01, HGNS03]. times [Joh00]. Threat [AJ08, CCK04b, Mol05]. Timestamp 79

[CC01b, FLZ02, SLH03, WLT03, YW04a]. [KY01d, KY01e, LLL02, NNL01, SNW00, Timestamp-Based TT01, WRW02, WLZZ05, WHI01]. tracings [CC01b, FLZ02, SLH03, WLT03, YW04a]. [RE02]. Track [Fox00, Joy03b, Nac01, Timestamping [MSTS04]. Timing Oka04, Poi06, PHM03, Pre02c, USE01b, [CKQ03, CWR09, Law09b, Sch01b, SWT07, USE02c, Men05, CAC03, CAC06]. Tracking ASK05, DKL+00a, KS09a, OS00]. [WCJ05, FNRC05, SZ08, TWM+09]. Trade timing-attack [KS09a]. Tiny [AJO08, CMS09, Oec03, PS01c, Uni00f]. [Bar00b, Min03, WN95, And03]. Tipsy Trade-Off [AJO08, Oec03]. Trade-Offs [TvdKB+01]. Tissue [MYC01]. Title [PS01c]. Tradeoff [LP02a, QSR+02, CW02, [ZYH03]. TLS [BPST02, CHVV03, HSD+05, Ino05, NS05a, DK08]. Tradeoffs JK02b, JK02c, KPR03, OHB08b, OHB08a, [BS00b, CTLL01, SRQL03, SU07]. Trading SBEW01, BFCZ08]. TMAC [KI03]. [PV06b, SWH+09]. Traffic TMS320C6x [WWGP00]. today [FGL02, Miˇs08, Fie09]. Trail [DR02a]. train [Lie05, Nis03a]. Together [WD01a]. Token [Pri00]. Training [Coc02a]. Traitor [Fri01, RSA00d, RSA01, CS04]. tokens [KY01d, KY01e, LLL02, SNW00, TT01, [WDCJ09]. Tokyo [Ano00d]. Told [ES00a]. WHI01]. Transacted [HBdJL01]. Tolerance [Ano04b, BK06b, ZL04a]. Transaction [RH02, AAKD09]. Tolerant [DS03, HSKC01, WL07b, BKW03, Transaction-Based [RH02]. transactional HGR07, Lin07, PI06, RMH04, YbJf04]. [ST06]. transactions [Cal00b, Cal00a]. Tolerating [KSR02, SKR02]. too Transcript [Sch05c, vT01]. took [IEE09a]. To ol [Ano01a, Ano01b, Ano01c, Ano01j, Ano01n, [Ano02d, Ano02e, Kil01b, GPG06]. To olkit Ano01f, Ano01o, Mal02, Nik02b]. Transfer [NIS01a, Sha01a]. To ols [CT08b, Din01, GKM+00, KKL09]. [Ano02d, Ano02e, Bar00b, Gol01b, Ken02b, Transferability [HSZI00]. Transfers Ust01b, Bai08, Cas02, CT02, GC05, [IKNP03]. Transform NCRX04, SETB08, Kat05b, Puc03]. toolset [ABM08, BBC+09, BR09, CPhX04, KC09b, [Jen09]. Top LKLK05, Nak01, SSFC09, VK07, BR06, [Cal01, Fox00, Jan06, MV00, AJ08, GPC08]. Che07a, OP01b, SR00, LPZ06]. top- [GPC08]. Top-Level [MV00]. Topics Transformation [CT09, HLL05, DSP01]. [HSS01, IEE01b, Joy03b, Men05, Nac01, Transformations Neu04, Oka04, Poi06, Pre02c]. topology [Fel06, KYHC01, LMTV05, Pag03]. [HJ07]. Tori [GV05, GPS06]. Toronto transforms [Laf00]. Transient [MS05a, VY01]. torsion [KM04a]. [Ric07, VS08]. Transistor [Coc02a]. torsion-subgroup [KM04a]. Torus Transistors [Bar00b]. Transit [RS03, RS08, vDW04]. Torus-Based [Con00, Cal00c]. Transition [Ase02, TL07]. [RS03, RS08, vDW04]. Toshiba [Pal02]. Transitioning [Ano09d]. Transitive Tossing [Lin01c]. totality [HRS08]. Touch [BN02]. Translation [GGS+09, PY06]. [Pau02a, JP06]. toughest [Min03]. tour Translation-based [GGS+09]. TransLink [Pet08]. Town [KJR05]. Trace [Cal00c]. Transmeta [GP00]. [Bor01, LNS02, NN03]. trace-and-revoke Transmission [NN03]. Traceability [MLC01, SNR04, SVDF07, Smi03]. [HLL03, HW05, WLHH05, WY05]. Transparent [CCDP01, Por01, Lin00a]. Traceable [LZL+01, CCH04]. traceback transport [Bor00]. Trap do or [CS04]. Tracing [BPR+08, Fis01b, KO03, KO00, Gen04a, 80

JSW05, PW08]. Trap do ors [GPV08]. Twenty-Eighth [B+02]. Twenty-first trapping [Min03]. Travel [Bur00]. [Lan00a]. Twenty-Fourth [ACM05b]. Traversal [JLMS03]. Trawling Twenty-Second [ACM03c]. [Knu00a, Knu00b]. treatise Twenty-seventh [AAC+01]. Twin [Bla00, MAaT03, MAaT04, MAaT07]. [Ram01]. TWIRL [Kal03, ST03b]. Two treatises [MAaT06, MAaT07]. Treatment [Ahm08, BDG+01, DIS02, FD01, Hen06b, [CL05, DK08]. Tree HSIR02, HSS01, HU05, HLT01, HL05b, [CC05d, GST04, JLMS03, KPT04, LKLK05, JZCW05, KCP01, KO04, KTC03, KI03, LM02, TNM00, Mon03, PCC03, WL02]. Lin01c, MR01a, MLM03, MAaT07, NS01c, Tree-Based [GST04, KPT04]. trees Ngu01, Pau02a, Sch05c, SK00, St.00, Ste05a, [Che02, Che07a, TC00]. trek [Pot05]. Ste01, TW07, WW05, XS03, YWWD08, Trends YYDO01, CLOS02, DHL06, GCKL08, [Ahm08, KB07, Ort00, NdM06, PRS04]. HW03c, JW01, LMTV05, MS09c, McN03, Tricks [Mit02b, All03]. triggered [HHJS04]. MCHN05, Pau01, Pha06, ZLX99, dB07]. tripartite [SW05a]. Triple Two-Block [KCP01]. two-channel [HSH+01, BR04, CGBS01, Cor00a, FZH05, [MS09c]. Two-factor [Hen06b, Sch05c, Kel05a, Kel05b, LMP+01]. Triple-DES St.00, Ste05a, YWWD08, dB07]. Two-Key [Cor00a, LMP+01]. Triples [FS01b]. [KI03]. two-level [DHL06]. Two-Party Tripwire [TvdKB+01]. trivial [KO00]. [KO04, Lin01c, MR01a, WW05, CLOS02, troubleshooting [HJW05]. True GCKL08, JW01, ZLX99]. Two-Pass [SK00]. [BST03, Cha04, DV08, EHK+03, HBF09, Two-tier [TW07]. Two-Way [DIS02]. Pan07, SFDF06, BG08, BG09, GB09, Hau06, TWOBLOCK [Yan05]. Twofish HLwWZ09, Ste05c, vT01, VKS09]. [BF00b, FKSW00, IK00, Kel00, Knu00a, Truecrypt [CSK+08]. truly [BGL+03]. Knu00b, Luc02a, Mur00, SKW+00]. Type Truncated [CS05b, KM02, LHL+02, [CKQ03, Dug04, H¨of01, KYHC01, PDMS09, SKU+00, SKI01, GS09]. Trust RMS05, Vir03, GG08, PQ06, Sha01d]. [CHSS02, HCDO02, Lin00b, LHL+08, Type-based [Dug04]. Type-Passing Mit02a, SMP+09, Dav01c, HHJS04, IY05, [Vir03]. typed [BG07b, FR08]. Types LCK04, LLW05, LMW05, LLW09]. Trusted [Gor02a, GJ04, RSA00e, BFM07, Lau05]. [DK01, WHI01, WV01, ARJ08, Gue09, Typical [BSC01a]. typing [GJ03]. Tzeng PS04c, ZYLG05]. Trusting [CKS09]. [QCB05a, Hsu05a, HL05d]. trustworthy [CCH05, SK03]. Truth [MNT+00]. Tseng [Hwa05, XY04, ZAX05]. U [DB04]. U-boat [DB04]. U.K. [CAC06]. TTM [GC00b]. Tuesday U.S [Uni01]. U.S. [Bol02, PM00, Uni00b]. [Uni00a, Uni00f, Uni00e]. tunable [LB05]. Ubiquitous [Sta03, LKZ+04]. Tunny [Sal01a]. Turin [AL06]. Turing UC-soundness [BPS08]. UCON [Bar00b, RSA03a, Adl03, Coc03, Cop04b, [LY05, PS04b]. UK Goo00, Pet08, Riv03, Sha03b]. Turkey [CZ05, Chr00, Chr01, CCMR02, CCMR05, [Bor00]. Turkish [DD02]. Turn [Tsa07]. KN03, Pat03b, RS05, Sma05, Hon01, Mat05]. Turning [DJLT01]. tutorial Ultimate [Dif01]. ultra [Can06a, Puc06, Rot02b, Rot03, vT00]. TV [Bam02, CH07a, DB04, Cal01, Win00]. [Smi03]. Tweakable [DS08, HR03, LRW02]. ultra-lightweight [CH07a]. ultra-secret Twentieth [Gan01b]. Twenty [Bam02]. Ultrafast [FF01a]. UltraSONIC [ACM03c, ACM05b, AAC+01, B+02, Lan00a]. [MMH02]. Ultrawideband [Bra06]. UMTS 81

[Cha05b, HL07]. Unauthorized [Ano02e]. [ASK05]. Unravelling [Ano03g]. Unbalanced [FMP03, May02, HLLL03]. unrecognizably [Wal04]. Unsolved Unbelievable [Len01]. Unborn [Pau02a]. [GG05a, Bel07a]. untold [DB04]. Unbounded [RW02, WvD02]. untraceability [CL09, LHY05, Par04]. Unbreakable [Ver06b, Mul02]. Uncertain Untraceable [ACdM05]. Untrusted [See04, Sty04, Hei03, Sch03]. UNCITRAL [BMK00, CGK+02, LSVS09, LLK05, ZBP05]. [MNFG02]. uncompletable [NS01a]. Unusual [GG05a]. Unveiled [Bar00a]. Unconditional unveils [Mad00c]. Update [HM01b, May01, Pas05, RW03b, WW05]. [Das08, TEM+01, Heg09]. Updated Unconditionally [Cho08a]. updating [LH03]. upgrade [HSZI00, HSZI01, HSHI02, HSHI06, CCD06]. [Pau02a, Pau02b]. Upgrades [Ano02e]. Uncovering [MNT+00]. Uncrackable upon [DFG01, PQ03a]. UPPAAL [Ano03d]. undeciphered [Rob02, Rob09]. [BBD+02]. Upper Undeniable [BP03b, DIRR05, KMT01]. Upset [Bra06]. [GMP01b, GM03, JSJK01, Miy01, WQWZ01, Upwards [FV03]. URSA [LKZ+04]. CHC05, LH04, LCZ05a, SSM+08]. US$54 [Duw03]. USA [ACM03b, ACM04b, undergraduate [AA04b, Gha07]. ACM05c, ACM06, ACM07, ACM09, BD08, undergraduates [DFGH04]. Des02, Fra04, HR06, IKY05, Joy03b, JQ04, Understanding [AN03, CPG+04, Cra05b, Jue04, KKP02, KJR05, Kil05, KP01, Men05, Elb09, Gor06, LG09, PP09, Sun05, Lun09]. Men07, Nac01, Nao04, Oka04, Poi06, Pre02c, undetachable [BMW02b]. Unexpectedly Sch01d, Sho05a, Sil01, YDKM06, ACM10, [Bar00a]. Unforgeable [BKY02, KY01a]. Bel00, Bon03, BCDH09, ELvS01, FMA02, Unhooking [Moo01]. Unicode [MJF07]. IEE01a, IEE05a, IEE05b, IEE08, IEE09b, Unified [CZB+01, HKA+05, MFS+09, Kil01a, MS05b, NIS00, Sch00a, Sch01c, S+03, SM03b, CCD06]. Uniform Sch04a, Sch04b, Sch05a, SMP+09, USE00c, [SPK08, TL07, SU07]. uniformity USE00b, USE00a, USE01b, USE01c, [Shp01, Shp04b]. Unify [Sma06]. USE01a, USE02c, Wil99, Yun02a]. usability Unimodular [CV03]. Unique [CG05, WDCJ09]. Usage [LY05, PS04b]. [Lam91, Lys02, TH01]. United Use [Bai01a, BWBL02, Bol02, BQR01, [DFCW00, Jol01]. Universal [BOHL+05, CPS07, Dre00, ISO05, Kra03, LCK04, Pau09, CR03, CJNP02, CS02, Ifr00, KKKP05, PBTW07, Str01a, WS05, Win01, CG05, KO03, Pli01, Sho00a, SP79, Cal00c, PS04c]. OS07, Sti11]. used [CDL06, MSV04]. useful universality [DS02]. Universally [SM03a]. Usenet [Coc01a]. USENIX [AF04b, BLDT09, CF01a, Can01a, CK02b, [Coc01a]. User CLOS02, DN02b, DN03, NMO05, RK05]. [Ano00k, BGP02, CL01b, CMB+05, DP00, Universally-Composable [AF04b]. FDIR00, Had00, HY01, KZ09, LSZ05, MR03, Universiteit [BBD09]. University OHB08a, PS01b, Poh01, Sas07, SSM+08, [Kat05b, Puc03, Rot07, Top02]. UNIX Str01a, Tsa01, WDCJ09, BBM00, CL04d, [CCDP01, Har01a, Har01b, H¨of01, Wit01, Chi08b, Chi08c, Chi08d, CF07, DSGP06, GSS03]. UNIX-Type [H¨of01]. Unknown Dea06, DLY08, GMLS02, HW03c, Hsu05b, [CT08a, Luc02b, CSW05, HJ07]. Unknowns HL05b, KC05, LAPS08, LHY02, LLH02, [CMB+05]. unleash [McN03]. Unleashing LKY04, LKY05a, LHL03b, LC05a, LK01, [Lop06]. unlinkability [WHH05]. OHB08b, Par04, SS03, SZS05, TWL05, Unpredictability [BS01d]. unprotected WLT05a, WC03b, YW04b, YS04, YRY04, 82

YRY05d, ZYLG05, vOT08]. User-Centered YZEE09, YC07, ZW05a, ZFK04]. utilising [CMB+05]. user-controlled [LAPS08]. [RFR07a, RFR07b, RFR07c]. utility user-drawn [vOT08]. user-friendly [Gua05]. Utilizing [Str02]. [SZS05, WLT05a]. user-level [SS03]. Users [LLS05b, CF05]. Uses [Bau01c, RSQL03]. V [Kat05b, Puz04, S+03]. v1.1 [RSA00d]. ushers [Bur00]. Using v1.5 [CJNP00]. v1.7 [RSA00b]. v2.0 [AS01a, AS01c, AADK05, AIP01, Ano01a, [Man01, RSA00e]. v2.1 [RSA02]. v2.11 Ano01c, Ano01n, ADDS06, BJP02, BH06, [RSA01]. V5 [Ito00]. V5.1a [CSK+08]. Vail BK06a, BBC+09, Bau01a, Bau01b, BP06, [BC01]. valid [Wan04b]. valid-signature BPST02, BR09, BT02, BMK00, BMP00, [Wan04b]. Validation [ABRW01, BLM01, BL02, Che01a, CLLL00, CGBS01, CCW02, KCJ+01, BG09, ME08b, VM03]. Validity CCM01, CC06, CH07c, Cir01, DI05, DPR01, [Zho02]. Valuable [PM00]. Value [BR09, DP00, DWN01, DGH+04, EFY+05, FJ03, GIS05, LS08, BMW02a, DK08, WWTH08]. FMP03, Fri01, GC01a, GL01, GSB+04, valued [DZL01, MS02b]. Vancouver HHGP+03, HQ05, HJW01, Jab01, JKK+01, [IEE02]. Varadharajan [CJT03]. JSJK01, KOY01, Kel05a, Kel05b, KM01a, Varadhrajan [MS03a]. variable [SV08a]. KLC+00, KTT07, Kra02b, KZ09, Lan04a, Variables [HR04a]. Variant Len01, LB04, LS05a, LXH07, LM02, LH07, [Luc02b, NSNK05, Ber08, Duj08, Duj09]. MS02a, MS09a, MLM03, MS03b, MMJ05, Variants [BDK+09, DG02, KS00b, CJ05, NNAM10, NZCG05, NM09, OT03a, Sha04b, TJC03]. Varieties [RS02]. Variety PHK+01, PJH01, PJK01, PCK02, PK01, [AOS02]. Vascular [BDhKB09]. vast Sho00b, SK05a, Sma03a, SVW00, SP04, [Wal04]. vault [SHL07]. Vector Ste01, ST01c, TSO00, TL07, TK03, TT01, [AS08, Che01c, DNP07, SBG02, WC04, VPG01, WY02, Wit01, WC03a, XFZ01, Pei09, mSgFtL05, WNQ08, WC05]. vectors YKMY01, YLLL02, YSS+01, ZWWL01, [LHL04a]. Vegas [ELvS01, IEE01a]. Vein Zhe01, ASW00, AL07, BCL05a, BCW05]. [BDhKB09]. Vendors [Pau03, MV03b]. using [BK07, CG06, CDS07, CWH00, Venona [Ben01b, Ben04]. venture [SW05b]. CL04d, CCK04b, CCH05, CHY05b, CKY05, Verenigde [dL00]. Veridicom [Ano02d]. CJ05, Che07a, CKY07, Che08a, Che08b, Verifiable [ANR01, Ate04, CD00a, CS03a, CJ04, CKK03, Cos00, DZL01, Dan02, CHS05, Cha04, JLL02, JG01, Lys02, DSGP06, DS09, DFG00, FWTC05, GC00a, NZCG05, NZS05, NSNK05, NN06, CHY05a, GMR05, Gen09b, GS09, HHSS01, HWW05, CDD00, GIKR01, KKL09, SC05a]. HAuR04, HTW07, Hir09, HW04, HLTJ09, Verifiably [BGLS03, Hes04a]. HY03, HL04, JRR09, Jua04, KOY09, KC09a, verifiably-encrypted [Hes04a]. KLY03, KB09, KKL09, KKJ+07, KSW06, Verification KR03, Ku04, KC05, LHY02, LLH02, LKY04, [AADK05, Ara02, BPST02, BP05, GMV01, LCP04, LL04c, LW04, LKY05a, LLW05, GL00, Gut02b, Gut04a, HWH01, Hoe01, LLW09, LFW04, LC05a, LLC06a, LWK05a, Str01a, BD04a, CC05b, CJL06, Coh03, DS00, MT07, Mic01, NS05a, Pae03, PS04a, PY08, HL05c, JW01, Ler02, MD04, MT07, MSP09, PCS03, PCC03, PC05b, Pha06, RC05, Sco04, PBD07, Tsa08, TYH04, Wan04b, Wu01, SBS09, Sha04b, Sha05b, SLH03, SHH07, YLC+09, ZLX99, ZL04b, CS08b, Uzu04]. Tan07a, TLH05, Tsa05, TJC03, VK08, Verified Wan04b, WK05, Wan05, WGL00, WH03, [BJP02, BFGT08, BFCZ08, CJT04]. verifier YW04a, YW05, YC09a, YRY04, YRY05b, [Bla01b, LKY05b]. verifier-based 83

[LKY05b]. Verifiers YC07, Bon00, Zol01]. Visualization [CL01a, He02, LV07, LWK05b, YY05a, ZX04]. [XYL09, MFS+09]. vital [Wal04, You04]. Verify [MS02a]. Verifying Viterbi [LBGZ01, LBGZ02]. Vladimirov [BFG08, BJvdB02, CJM00, HLT01, IR01, [Puz04]. VLDB [EBC+00, FLA+03]. PT08, RR02, BLH06, BLP06, HLH00, VLDP [B+02]. VLSI [KV01]. VMSS SV08a, Sha01d]. Verlag [SC05a]. Voice [Ano00l, PK01, VN04]. [Eag05, Lee03a, Lee03b, Pap05]. Version VoIP [Ano08c, SZ08, VAVY09, WCJ05]. vol [Bol02, HPC02, OST05, SKI01, Mis06]. [Kat05b, Lee03b]. volatile [SETB08]. Versions [HSR+01, NPV01, Ano00f, CV05]. Volume [Gol04]. Vortrag [Eke02]. Vote Versteckte [Sch09]. Versus [Che07b]. Voter [Cha04]. Voter-Verifiable [Mad00a, Rub00, WWL+02, ASW+01, [Cha04]. Voting BJLS02, DBS01, WPP05]. Vertically [Cha04, FPS01, HS00, Joh05, JLL02, [DN04]. Very KMO01, Rub01, CJT03, HJW05]. Voynich [AAC+01, B+02, CG03, EBC+00, FLA+03, [Rug04]. VPN [KMM+06]. VPNs [Dav01a]. H¨of01, PM02, PBMB01, Zir07]. Vestiges VQ [WJP07]. VQ-based [WJP07]. Vs [Top02]. VI [Sch04a]. via [AGKS07, [CTBA+01, Di 01, Di 03, SU07, WW04]. Ano00k, ACdM05, BDPV09, Car02, Che03, VSS [AF04b, CDF01, FM02a]. Vu [DP00]. CPG+04, Elb08, FBWC02, Fox00, HHYW07, vulnerabilities HLM03, JJ00a, KT06, ML05, PG05, RG05, [CSW05, DMS07, Swi05, XNK+05]. SB01, SLG+05, ZLG01, Lud05]. Victoria vulnerability [KHL09, SGA07, YRS+09]. [ACM08, IZ00]. Victorian [Top02]. victory [Hau03]. Vid [CAC06]. Video [BDF+01a, WA [ACM06]. WACs [Kov01]. Wagner BD03, CDTT05, EFY+05, ISSZ08, KBD03, [dVP06]. Wagstaff [Kat05b]. Wahab KJR05, KLL01, LHS05, MLC01, SC02a, [MAaT07]. Walking [Fox00]. Wallet BS01b, CO09a, JA02, KN03, UP05]. [ETZ00, JL04]. Walsh [MS02b]. Video-Based [KJR05, BS01b, KN03]. Walsingham [Bud06]. WAN [H¨of01]. videos [YZDW07]. Vienna [BZ02]. WAN - Cl us te r [H¨of01]. Wang [SZS05]. Vietnam [Lov01]. View Wants [Han00]. WAP [JRFH01]. War [Bar00a, Mah04, Sin09, Woo05]. Views [Bec02, Bud00a, Bud02, Hau03, Kov01, [Bar00a, Bar00b, Bar00c, Coc01a, Coc02a, MH09, OC03, AJ08, DB04, Ris06, Lov01]. Coc02b, Coc03]. Vigen`ere [DG00]. VII Warfare [HW01, WW04]. warrior [PC04]. [Sch04b]. VIII [IEE01b, Sch05a]. Virginia Wars [RR03b, Cal00d, Cal00e]. Warsaw [MS05b]. Virtual [Ano01c, HM01a, Pro00, [AUW01, Bih03]. washer [Ano01l]. YSS+01, BDS+09a, ML05, ZBP05]. Washington [S+03, USE00a, USE01c]. virtualization wasn’t [Bur02]. WaSP [Coc02b]. WASSA [CGL+08a, CGL+08b, CGL+08c]. [Ano05c]. Watch virtualization-based [MA00a, Sav05a, Sav05b, Ano01m, Joy03a]. [CGL+08a, CGL+08b, CGL+08c]. Virtues Waterlo o [HH04, HH05, ST01d]. [Tro08]. Virus [Gor06, Ano05c]. Visible Watermark [AS01b, GMV01, JX05, [HT06]. Vista [Fer06]. Visual KHY04, Kwo03a, Meh01, PBB02, RE02, [BDN00, BDDS03, BCD06, CCL09, CTY09, SY01a, CAC03, TH01, WY02, Zan01, AA08, CPD06, DD00, Kog02, KS03, RD09, WMS08, CL08, LYGL07, LLC06a]. YWC08, YC01, ZP05, ABDS01, CDFM05, Watermark-based [Kwo03a]. CDD07, DD04, HKS00, Lav09, PY08, Yan02, Watermark-Fingerprint [KHY04]. 84

Watermarked [ST01c]. Watermarking Wayness [KI01a, PV06b]. Ways [BB02]. [AS08, AK02b, AHK03b, AS01c, Arn01, WCC [Ytr06]. WDDL [MMMT09]. Weak ARC+01, BBC+09, BR09, BSC01a, BSC01b, [HG03, LS01c, RW03b, DW09, GG08, BSL02, BQR01, BSNO00, CC02a, CH01b, KOY09, KW00]. Weakening [ZD05]. CDTT05, CT09, CT02, CM02, CMB+08, Weakly [BS00a, CHS05]. Weakness DWN01, DNP07, EFY+05, EIG01, GW01, [SW05a, SZS05, YPKL08]. Weaknesses HT06, HH09, JKK+01, KCR04, hKLS00, [FMS01, He02, KCL03, KCC05, SGGB00]. KLL01, Kun01, KT00, LZ09, LLS05a, Weapons [RR03b]. Weather [WWL+02]. LKLK05, LZ01, LZP+04, LWS05, LPZ06, Web [Che01d, Mar05a, BFG05, BFG08, LJ05b, LSC03, LL01, LSKC05, MM01a, Hil06, Ano01c, Ano02e, Ano03d, AEV+07, MNS01, Nak01, OMT02, PJH01, PJK01, BFG04, BC04b, CCCY01, Coc01a, Coc02a, PR01, PBM+07, Qu01, Sam09, SOHS01, Coc02b, CZB+01, DeL07, DMSW09, SDFH00, SDF01, SSFC09, SC02a, SY01b, FSSF01, GS02a, GSVC02, HM05, JRB+06, Shi08, SP04, SLT01, SPK08, VVS01, VHP01, KCD07, LWK00, LLS05b, LXM+05, VK07, WCJ09, WH09, WNY09, WWL+02, MPPM09, PM00, RR04, Sam09, SSS06, WLT05b, XFZ01, YWWS09, ZTP05, Sch01a, SBG07, TMMM05, WA06, YSS+01]. ZWC02, AHK03a, AAPP07, BCKK05, Web-Based [Ano01c, Sch01a, YSS+01]. CC02b, Che08b, CYH+07, CCD+04, CS05a, Web-enabled [CCCY01]. webcam CC04c, CMB02, CKL05, DSP01, FWL08, [McN03]. WebFountain [Ano03d]. FMS05, GA03, HLC07, HHC05, JDJ01, Webrelay [Zha00]. Weight JA02, KA09, KP00, LDD07, Lin00a, Lin01b, [CH07c, GK02, WT02]. Weighted LLC06a, LLC06b, MB08, MCHN05]. [BTW05, BTW08, SC02c, YZ00]. Weil watermarking [BF01b, BF03, Jou02, Kir03]. Well [PK03, Ren09, mSgFtL05, WJP07, WNQ08, [WWGP00]. Welschenbach [Ter08]. Welsh Way02b, Way09, WC05, WMDR08, [Rot07]. went [AJ08]. WEP [SIR04]. were XMST07, YZDW07, YPSZ01, ZLZS07]. [Hau06]. Wesley [Puc03]. West Watermarks [Fra01, Jue04, Syv02, Wri03]. Westbridge [Ben00, BB00a, MLC01, Sug01, WC03a, [Ano02e]. Western [CZB+01]. Wet [CC09]. WC04, YLLL02, MB08, TND+09]. Weyl [Sug03]. WG [DFPS06]. WG11.1 Watershed [FBW01]. [ELvS01]. WG11.1/WG11.2 [ELvS01]. Watershed-from-Markers [FBW01]. WG11.2 [ELvS01]. WG8.8 [DFCW00]. WAV [XFZ01]. WAV- Tabl e [XFZ01]. Wheeler [ABM08, Bar05]. Where Wavelet [BR09, GW01, LKLK05, LZ01, [Bur06, Pem01a]. While [Tee06]. WHIM Nak01, VK07, AAPP07, AA08]. [JA02]. WHIRLPOOL [RB01]. Whisper wavelet-based [AAPP07, AA08]. [NABG03]. Whitehouse [Mad00c]. Wavelet-Domain [LZ01]. WAVE S Whitening [Oni01]. Whitfield [Jan08a]. [LBA00]. Way [BYJK08, BM01a, CHL02, Who [CZB+01, Urb01, Hau06, Neu06]. DIS02, DMS00, Fis01b, GKK+09, HNO+09, whole [CPG+04]. Wi HR05, KO03, KO00, LTW05, Sho00a, YZ00, [Puz04, Sty04, VGM04, FMA02, Bar03]. AK02a, AGGM06, AGGM10, BYJK04, Wi-Fi [Sty04, Bar03]. Wi-Foo CHY05b, CJ04, Cla00b, GKK+07, HR07, [Puz04, VGM04]. wicked [Lud05]. Wide HRS08, JZ09, KK07, KKKP05, KK03, [DR02a, SBB05]. Width [OT03b]. Width- LW04, LPM05, LQ08, LKJL01, Mic02a, [OT03b]. Wiener [Duj08, Duj09]. WIESS Poi00, Tsa08, YW05, YRY05b, ZW05a]. [USE00b]. Wiley [And04, Gra01, Kir01a]. 85

Will [Ort00, Cla00b, Fur05]. William MJ04, MS05a, Mat02, MZ04, NP02a, NH03, [Che05b, Pag03]. Williams [M¨ul01a]. PK03, PT06, RS05, RRS06, RM04, Sch00b, Window [OT03a, SSST06]. Windows Sch01d, TBJ02, USE00b, VY01, Vau05a, [USE00a, DGP07a, DGP07b, DGP09, Fer06, WKP03, Ytr06, AMW07, AJ01a, BCKK05, HB06, WD01a, Wit01]. Wins [Bar00b]. Bir07, CKL05, GKS05, HH04, HH05, HA00, Wired [Gil07, Pot07, SIR04]. Wireless ST01d]. World [AEAQ05, Bar03, BCH+00, ECM00b, Fin06, [Ber03, GG05a, HW01, Nik02a, Nik02b, KH05, KHD01, LNL+08, NNAM10, Pau03, Sch00d, Sty04, YKMB08, Ano03c, Ark05, PZDH09, Pot03, Puz04, Sin01a, Sty04, Bel07a, Che00b, Hei03, HHG06, Hus01, SYLC05, VGM04, YSR01, ZYN08, ZWCY02, KPS02, Kee05, Lie05, Lun09, Rob02, Rob09, Bad07, BP03a, BBG+02, CCMT09, Cha05b, Sch03, SL07, Bec02, Bud00a, Bud02, Hau03, GW08, GG05b, HLTJ09, JRR09, KXTZ09, Kov01, MH09, OC03, Sty04, See04]. Worlds KB09, LDH06, LPV+09, LFHT07, LW05a, [Wil01b]. Worm [LJL05, CSW05]. Worms Lin07, Lop06, MJF+08, Moo01, NC09, [ZGTG05]. Worst NLD08, PCSM07, Par04, Pat02a, Pat02b, [CCM05, HRS08, Mic02a, Mic02b, Pei09]. Pot07, SLP07, SZ08, TP07, Vac06, Van03, worst-case [HRS08, Mic02a, Mic02b, Pei09]. Wan04a, YTWY05, CS08b, ECM00a, worst-case/average-case [Mic02b]. Woz PDMS09]. Wiretapping [Bar00c]. WPA [OM09]. wrapped [HLC07]. [Cho08a, DL98, Jan08a, DL07]. WISA Wrapper [Ols00]. Write [BB02]. Writers [CSY09]. Within [Gor06]. Writing [HL03, Jan06, Kah67a, [MR02a, CHM+02, MR02b, You04]. Kah67b, Kah96, Gas01]. Writings [Cop04b]. Without [BCL+05b, Bla01c, BB04, BGH07, WS [JRB+06, RR04]. WS-Policy [RR04]. Har06, NA07, Ano03c, CH01a, CCK04b, WS-Security [JRB+06, RR04]. WSDL CYH04, CCH05, CTH08, CJ03c, CJ04, [Bar00c]. WTLS [Vau02]. WTMAU CDD07, CNV06, DK01, KG09, Ku04, LV07, [ECM00a, ECM00b]. WTMAU-SD LHL04b, LW04, LKY05b, LL06, Lin01a, [ECM00a]. Wu [BCW05, CHY05a, LCZ05b, Lys07, MP02, Mar07, PS04c, RG09, CWJT01, HL05c, MS03a, YY05b]. Wu-Lin Tsa08, WHI01, YW05, YRY05b, ZW05a]. [YY05b]. Wuhan [TTZ01]. WW [Sal00a]. Withstanding [DFS04]. Wits WWII [WD01b]. [Bud00a, Bud02]. WLAN [SSM+08]. WLAN/cellular [SSM+08]. Wo es X [For04]. X.509 [SJ05]. X9.31 [BTTF02]. Women [FF01b]. won [Hau03]. [Kel05a, Kel05b]. X9.62 [ANS05]. Xbox Worcester [KP01]. Word [HR00, SKU+00]. [Ste05b]. XCBC [GD02]. XECB [GD02]. Word-Oriented [HR00, SKU+00]. Xia [CJT04, Sha05a]. Xiamen [DWML05]. Wordlengths [PG05]. words Xiao [JW01, YY05a]. Xilinx [Ano02e]. [GS01, Max06, NS01a, VS01]. Work XIV [USE00c]. xix [Top02]. XL [CP03]. [DFG01, DNW05, Fox00]. Working XML [DFCW00, ELvS01, KB00]. workload [Hei01, TEM+01, AW05, AW08, Ano02e, [BGM04]. Works [Net04]. Workshop BNP08, CKK03, Dav01b, Dav01c, DGK+04, [ACM05a, Ano05c, AL06, BDZ04, BBD09, FJ04, FL01b, GA03, Her02, LC04b, PCK02, BD08, CZ05, Chr00, Chr01, CCMR02, RR04, UG08,¨ Uri01, UST01a]. XMT [SG07]. CCMR05, CSY09, DR02c, Des02, GH05, XrML [Bar00a]. XTEA IEE01b, IZ00, Joh03, JQ04, KKP02, KCR04, [CV05, HHK+04, MHL+02]. XTR KGL04, Kim01, KP01, KNP01, LST+05, [LW02, LV00, LNS02, Ver01]. REFERENCES 86

Yahalom [Pau01]. Yang Al-Akaidi:2004:FSP [McK04, CZ03, KJY05, WL05, YWC05]. Yang-Shieh [YWC05]. Yao [AA04a] Marwan Al-Akaidi. Frac- [BPS08, BDNN02, ZD05]. Yao-style tal speech processing.Cam- [BPS08]. Yarrow [KSF00, Mur02]. bridge University Press, Yarrow-160 [KSF00]. Yaschenko [Kat05b]. Cambridge, UK, 2004. ISBN YCH [SC05a]. YCN [Hwa00]. Year 0-521-81458-8 (hardcover), [Eva09, Naz02, Bur00]. Years 0-511-75454-X (e-book). x + [Ahm08, CM02, Ros04]. Yellow [JYZ04]. 214 pp. LCCN TK7882.S65 Yen [LLLZ06a, LLLZ06b]. Yen-Guo A43 2004; TK7882.S65 [LLLZ06a]. Yesterday [Coc02a]. Yi ALA. URL http://www. [Wag00]. Yi-Lam [Wag00]. Yokohama loc.gov/catdir/description/ [Mat02]. Yo o [KCC05, KHKL05]. Yo on cam032/2003055750.htm; [KCC05]. York http://www.loc.gov/catdir/ [HR06, IKY05, NIS00, Sch01d, YDKM06]. toc/cam032/2003055750. Young [FF01b]. You’re [ES00a, Nic01]. htm. You’ve [Nic01]. Yuck [Sas07]. Yuen Aly:2004:CSP [KH08]. [AA04b] Alaaeldin A. Aly and Shakil Z [Wue09]. Z-parameter [Wue09]. z10 Akhtar. Cryptography and [Web08]. z9 [ADH+07]. Zealand [Zhe02b]. security protocols course Zeilinger [Duw03]. Zero [AS01b, APV05, for undergraduate IT stu- BP04, Cou01, DPV04, DFS04, DDO+01, dents. SIGCSE Bul- HNO+09, IKOS07, LMS05, LHL+08, MR01b, letin (ACM Special Inter- MV03a, Pas05, Ros00a, Ros06a, CSW05, est Group on Computer Sci- Dam00, PBD07, KK07]. zero-day [CSW05]. ence Education), 36(2):44– Zero-Knowledge [AS01b, BP04, Cou01, 47, June 2004. CODEN DFS04, HNO+09, LHL+08, MR01b, MV03a, SIGSD3. ISSN 0097-8418 Pas05, Ros00a, Ros06a, IKOS07, Dam00, (print), 2331-3927 (elec- PBD07]. Zeta [Ver02]. Zhang [JW01, tronic). URL http:// YY05a]. Zhou [PKH05]. Zimmermann www.math.utah.edu/pub/ [McL06, Tuc66]. ZK [PBD05]. mirrors/ftp.ira.uka.de/ [HSM+02]. Zone [Kum07]. bibliography/Misc/DBLP/ 2004.bib. Agreste:2008:NAP References [AA08] Santa Agreste and Guido Andaloro. A new approach XXX:2002:CC to pre-processing digital im- age for wavelet-based water- [??02] ?? Codes Ciphers.Bounty mark. Journal of Compu- Books, 2002. ISBN 0- tational and Applied Math- 7537-0220-7. LCCN ???? ematics, 221(2):274–283, UK£7.99. November 15, 2008. CO- REFERENCES 87

DEN JCAMDI. ISSN 0377- 9743 (print), 1611-3349 0427 (print), 1879-1778 (electronic). URL http: (electronic). URL http:/ //link.springer-ny.com/ /www.sciencedirect.com/ link/service/series/0558/ science/article/pii/S0377042707005602. bibs/2020/20200013.htm; http://link.springer- Apers:2001:PTS ny.com/link/service/series/ [AAC+01] Peter M. G. Apers, Paolo 0558/papers/2020/20200013. Atzeni, Stefano Ceri, Ste- pdf. fano Paraboschi, Kotagiri Almgren:2000:HWC Ramamohanarao, and Rich- ard T. Snodgrass, editors. [AAG+00] Fredrik Almgren, Gun- Proceedings of the Twenty- nar Andersson, Torbj¨orn seventh International Con- Granlund, Lars Ivansson, ference on Very Large Data and Staffan Ulfberg. How Bases: Roma, Italy, 11– we cracked the Code Book 14th September, 2001.Mor- ciphers. Technical re- gan Kaufmann Publishers, port, ????, ????, October Los Altos, CA 94022, USA, 11, 2000. 40 pp. URL 2001. ISBN 1-55860-804- http://frode.home.cern. 4. LCCN QA76.9.D3 I559 ch/frode/crypto/codebook_ 2001. solution.pdf; http:// Al-Azzoni:2005:MVC www.simonsingh.com/cipher. htm. See [Sin99]. [AADK05] Issam Al-Azzoni, Dou- glas G. Down, and Ridha Ababneh:2009:CSE Khedri. Modeling and ver- ification of cryptographic [AAK09] Sufyan Ababneh, Rashid protocols using coloured Ansari, and Ashfaq Khokhar. Petri nets and design/CPN. Compensated signature em- Nordic Journal of Com- bedding for multimedia con- puting, 12(3):200–228, Fall tent authentication. Jour- 2005. CODEN NJCOFR. nal of Data and Information ISSN 1236-6064. Quality (JDIQ), 1(3):17:1– 17:??, December 2009. CO- Anshel:2001:NKA DEN ???? ISSN 1936-1955. [AAFG01] Iris Anshel, Michael An- Ashraf:2009:SBE shel, Benji Fisher, and Do- rian Goldfeld. New key [AAKD09] Manzur Ashraf, Syed Mah- agreement protocols in braid fuzul Aziz, M. Lutful Kabir, group cryptography. Lec- and Biswajit K. Dey. A ture Notes in Computer Sci- SIM-based electronic trans- ence, 2020:13–??, 2001. CO- action authentication sys- DEN LNCSD9. ISSN 0302- tem. International Journal REFERENCES 88

of Computer Systems Sci- Comput. Sci., pages 512– ence and Engineering,24 528. Springer-Verlag, Berlin, (4):??, July 2009. CODEN Germany / Heidelberg, Ger- CSSEEI. ISSN 0267-6192. many / London, UK / etc., 2001. URL http: Aamodt:2003:CSP //link.springer-ny.com/ [Aam03] Ken S. Aamodt. Acryp- link/service/series/0558/ tographically secure pseu- bibs/2045/20450512.htm; dorandom number genera- http://link.springer- tor. Ph.D. thesis, Purdue ny.com/link/service/series/ University, West Lafayette, 0558/papers/2045/20450512. IN, USA, December 2003. pdf. 147 pp. URL http:// Atallah:2009:ATC catalog.lib.purdue.edu/ Find/Record/1380784; [AB09] Mikhail J. Atallah and Ma- http://search.proquest. rina Blanton, editors. Algo- com/docview/305316022? rithms and theory of com- accountid=14677. putation handbook. General concepts and techniques. Agreste:2007:IAW Chapman and Hall/CRC applied algorithms and data [AAPP07] Santa Agreste, Guido An- structures series. Chapman daloro, Daniela Prestipino, and Hall/CRC, Boca Ra- and Luigia Puccio. An im- ton, FL, USA, second edi- age adaptive, wavelet-based tion, 2009. ISBN 1-58488- watermarking of digital im- 822-9 (print), 1-58488-823- ages. Journal of Computa- 7 (e-book). ???? pp. tional and Applied Mathe- LCCN QA76.9.A43 A432 matics, 210(1–2):13–21, De- 2009. URL http://www. cember 31, 2007. CODEN crcnetbase.com/isbn/9781584888239. JCAMDI. ISSN 0377-0427 (print), 1879-1778 (elec- Abadi:2000:TA tronic). URL http:// [Aba00] Mart´ın Abadi. Taming www.sciencedirect.com/ the adversary. In Bel- science/article/pii/S0377042706006431. lare [Bel00], pages 353–?? An:2001:DER ISBN 3-540-67907-3. ISSN 0302-9743 (print), 1611- [AB01] Jee Hea An and Mihir Bel- 3349 (electronic). LCCN lare. Does encryption with QA76.9.A25 C79 2000 Bar. redundancy provide authen- URL http://link.springer- ticity? In Advances in ny.com/link/service/series/ cryptology—EUROCRYPT 0558/bibs/1880/18800353. 2001 (Innsbruck),volume htm; http://link.springer- 2045 of Lecture Notes in ny.com/link/service/series/ REFERENCES 89

0558/papers/1880/18800353. Abdalla:2001:DAS pdf. [Abd01] Michel Ferreira Abdalla. Aiello:2004:JFK Design and analysis of se- cure encryption schemes. [ABB+04] William Aiello, Steven M. Vita thesis (Ph.D.), Univer- Bellovin, Matt Blaze, Ran sity of California, San Diego, Canetti, John Ioannidis, San Diego, CA, USA, 2001. Angelos D. Keromytis, and Omer Reingold. Just fast Ateniese:2001:ECV keying: Key agreement in [ABDS01] Giuseppe Ateniese, Carlo a hostile Internet. ACM Blundo, Alfredo De San- Transactions on Informa- tis, and Douglas R. Stin- tion and System Security, son. Extended capabili- 7(2):242–273, May 2004. ties for visual cryptogra- CODEN ATISBQ. ISSN phy. Theoretical Computer 1094-9224 (print), 1557- Science, 250(1–2):143–161, 7406 (electronic). January 6, 2001. CO- DEN TCSCDI. ISSN 0304- Abdalla:2005:SER 3975 (print), 1879-2294 (electronic). URL http: [ABC+05] Michel Abdalla, Mihir Bel- //www.elsevier.nl/gej- lare, Dario Catalano, Eike ng/10/41/16/186/20/29/ Kiltz, Tadayoshi Kohno, abstract.html; http: Tanja Lange, John Malone- //www.elsevier.nl/gej- Lee, Gregory Neven, Pas- ng/10/41/16/186/20/29/ cal Paillier, and Haixia Shi. article.pdf. Searchable encryption re- visited: Consistency prop- Abe:2001:SEP erties, relation to anony- mous IBE, and extensions. [Abe01] Masayuki Abe. Secur- In Shoup [Sho05a], pages ing“Encryption+Proof 205–?? ISBN 3-540- of Knowledge” in the ran- 28114-2. ISSN 0302-9743 dom oracle model. Lecture (print), 1611-3349 (elec- Notes in Computer Science, tronic). LCCN QA76.9.A25 2271:277–??, 2001. CO- C79 2005; QA76.9 .A25; DEN LNCSD9. ISSN 0302- QA76.9 C79 2005; QA76.9 9743 (print), 1611-3349 C794 2005; QA76.9; In- (electronic). URL http: ternet. URL http:/ //link.springer-ny.com/ /www.springerlink.com/ link/service/series/0558/ openurl.asp?genre=issue& bibs/2271/22710277.htm; issn=0302-9743&volume= http://link.springer- 3621. ny.com/link/service/series/ REFERENCES 90

0558/papers/2271/22710277. Anderson:2000:CS pdf. Abe:2004:CEP [ABK00] Ross Anderson, Eli Bi- ham, and Lars Knudsen. [Abe04] Masayuki Abe. Combin- The case for Serpent. In ing encryption and proof NIST [NIS00], pages 349– of knowledge in the ran- 353. ISBN ???? LCCN dom oracle model. The ???? URL http://www. Computer Journal, 47(1): cl.cam.ac.uk/ftp/users/ 58–??, January 2004. CO- rja14/serpentcase.pdf; DEN CMPJA6. ISSN http://www.cl.cam.ac. 0010-4620 (print), 1460- uk/ftp/users/rja14/slides- 2067 (electronic). URL bw.pdf; http://www.cl. http://www3.oup.co.uk/ cam.ac.uk/ftp/users/rja14/ computer_journal/hdb/Volume_ slides.pdf; http://www. 47/Issue_01/470058.sgm. cl.cam.ac.uk/~rja14/serpent. abs.html; http://www3. html. oup.co.uk/computer_journal/ hdb/Volume_47/Issue_01/ Austin:2000:ASF pdf/470058.pdf. [ABM00] Todd Austin, Jerome Burke, Abadi:2005:CFI and John McDonald. Ar- [ABEL05] Mart´ın Abadi, Mihai Budiu, chitectural support for fast Ulfar´ Erlingsson, and Jay symmetric-key cryptogra- Ligatti. Control-flow in- phy. ACM SIGPLAN tegrity. In Meadows and Notices, 35(11):178–189, Syverson [MS05b], pages November 2000. CODEN 340–353. ISBN 1-59593- SINODQ. ISSN 0362-1340 226-7. LCCN QA76.9.A25. (print), 1523-2867 (print), ACM order number 459050. 1558-1160 (electronic). Adao:2009:SCF Adjeroh:2008:BWT [ABHS09] Pedro Ad˜ao, Gergei Bana, Jonathan Herzog, and An- [ABM08] Donald Adjeroh, Tim Bell, dre Scedrov. Soundness and Amar Mukherjee. The and completeness of formal Burrows–Wheeler Trans- encryption: The cases of form: Data Compression, key cycles and partial in- Suffix Arrays, and Pattern formation leakage. Jour- Matching. Springer Sci- nal of Computer Security, ence+Business Media, LLC, 17(5):737–797, ???? 2009. Boston, MA, 2008. ISBN CODEN JCSIET. ISSN 0-387-78908-1, 0-387-78909- 0926-227X (print), 1875- X. xxii + 351 pp. LCCN 8924 (electronic). QA76.9.D33 A35 2008. REFERENCES 91

Abdalla:2001:ODH quantum information. Jour- nal of Mathematical Physics, [ABR01] Michel Abdalla, Mihir Bel- 50(4):042106, April 2009. lare, and Phillip Rogaway. CODEN JMAPAQ. ISSN The oracle Diffie–Hellman 0022-2488 (print), 1089- assumptions and an anal- 7658 (electronic), 1527- ysis of DHIES. Lecture 2427. URL http:// Notes in Computer Science, jmp.aip.org/resource/1/ 2020:143–??, 2001. CO- jmapaq/v50/i4/p042106_ DEN LNCSD9. ISSN 0302- s1. 9743 (print), 1611-3349 Adcock:2002:QGL (electronic). URL http: //link.springer-ny.com/ [AC02] Mark Adcock and Rich- link/service/series/0558/ ard Cleve. A quantum bibs/2020/20200143.htm; Goldreich–Levin theorem http://link.springer- with cryptographic appli- ny.com/link/service/series/ cations. Lecture Notes in 0558/papers/2020/20200143. Computer Science, 2285: pdf. 323–??, 2002. CODEN LNCSD9. ISSN 0302- Ansper:2001:ELT 9743 (print), 1611-3349 (electronic). URL http: [ABRW01] Arne Ansper, Ahto Bul- //link.springer-ny.com/ das, Meelis Roos, and Jan link/service/series/0558/ Willemson. Efficient long- bibs/2285/22850323.htm; term validation of digital http://link.springer- signatures. Lecture Notes ny.com/link/service/series/ in Computer Science, 1992: 0558/papers/2285/22850323. 402–??, 2001. CODEN pdf. LNCSD9. ISSN 0302- 9743 (print), 1611-3349 Ateniese:2005:URT (electronic). URL http: //link.springer-ny.com/ [ACdM05] Giuseppe Ateniese, Jan link/service/series/0558/ Camenisch, and Breno bibs/1992/19920402.htm; de Medeiros. Untraceable http://link.springer- RFID tags via insubvertible ny.com/link/service/series/ encryption. In Meadows and 0558/papers/1992/19920402. Syverson [MS05b], pages pdf. 92–101. ISBN 1-59593- 226-7. LCCN QA76.9.A25. Ambainis:2009:NEQ ACM order number 459050. Ateniese:2000:PPS [ABW09] Andris Ambainis, Jan Bouda, and Andreas Winter. Non- [ACJT00] Giuseppe Ateniese, Jan malleable encryption of Camenisch, Marc Joye, REFERENCES 92

and Gene Tsudik. A ing and Computing. Denver, practical and provably CO, November 10–16, 2001. secure coalition-resistant ACM Press and IEEE Com- group signature scheme. puter Society Press, New In Bellare [Bel00], pages York, NY 10036, USA and 255–?? ISBN 3-540- 1109 Spring Street, Suite 67907-3. ISSN 0302-9743 300, Silver Spring, MD (print), 1611-3349 (elec- 20910, USA, 2001. ISBN 1- tronic). LCCN QA76.9.A25 58113-293-X. LCCN ???? C79 2000 Bar. URL http: ACM:2002:PTF //link.springer-ny.com/ link/service/series/0558/[ACM02] ACM, editor. Proceed- bibs/1880/18800255.htm; ings of the Thiry-Fourth http://link.springer- Annual ACM Symposium ny.com/link/service/series/ on Theory of Computing, 0558/papers/1880/18800255. Montr´eal, Qu´ebec, Canada, pdf. May 19–21, 2002.ACM ACM:2000:PTS Press, New York, NY 10036, USA, 2002. ISBN 1-58113- [ACM00] ACM, editor. Proceedings 495-9. LCCN QA75.5 .A22 of the thirty second annual 2002. ACM order number ACM Symposium on The- 508020. ory of Computing: Port- land, Oregon, May 21–23, ACM:2003:PAS [2000]. ACM Press, New [ACM03a] ACM, editor. Proceedings York, NY 10036, USA, 2000. of the 2003 ACM SIGMOD ISBN 1-58113-184-4. ACM International Conference on order number 508000. Management of Data 2003, ACM:2001:PAA San Diego, California, June 09–12, 2003. ACM Press, [ACM01a] ACM, editor. Proceedings of the 33rd Annual ACM Sym- New York, NY 10036, USA, 2003. ISBN 1-58113-634-X. posium on Theory of Com- puting: Hersonissos, Crete, LCCN ???? Greece, July 6–8, 2001. ACM:2003:PTF ACM Press, New York, NY 10036, USA, 2001. ISBN 1- [ACM03b] ACM, editor. Proceedings 58113-349-9. LCCN QA76.6 of the Thirty-Fifth ACM .A13 2001. ACM order num- Symposium on Theory of ber 508010. Computing, San Diego, CA, ACM:2001:SHP USA, June 9–11, 2003. ACM Press, New York, NY [ACM01b] ACM, editor. SC2001: 10036, USA, 2003. ISBN High Performance Network- ???? LCCN QA75.5 .A22 REFERENCES 93

2003. ACM order number Middleware for Grid Com- 508030. puting, Grenoble, France, ACM:2003:PTS November 28–December 02, 2005. ACM Press, New [ACM03c] ACM, editor. Proceed- York, NY 10036, USA, 2005. ings of the Twenty-Second ISBN 1-59593-269-0. LCCN ACM SIGMOD-SIGACT- ???? SIGART Symposium on ACM:2005:PTF Principles of Database Sys- tems: PODS 2003: San [ACM05b] ACM, editor. Proceed- Diego, Calif., June 9–11, ings of the Twenty-Fourth 2003. ACM Press, New ACM SIGMOD-SIGACT- York, NY 10036, USA, SIGART Symposium on 2003. ISBN 1-58113-670- Principles of Database Sys- 6. LCCN QA76.9.D3 A296 tems: PODS 2005: Balti- 2003. ACM order number more, Maryland, June 13- 475030. 15, 2005. ACM Press, New ACM:2004:PAS York, NY 10036, USA, 2005. ISBN 1-59593-062- [ACM04a] ACM, editor. Proceedings 0. LCCN QA76.9.D3 A296 of the 2004 ACM SIGMOD 2005. ACM order number International Conference on 475050. Management of Data 2004, ACM:2005:SPA Paris, France, June 13– 18, 2004. ACM Press, New [ACM05c] ACM, editor. STOC ’05: York, NY 10036, USA, 2004. proceedings of the 37th An- ISBN 1-58113-859-8. LCCN nual ACM Symposium on QA76.9.D3. Theory of Computing: Bal- ACM:2004:PAA timore, Maryland, USA, May 22–24, 2005.ACM [ACM04b] ACM, editor. Proceedings Press, New York, NY 10036, of the 36th Annual ACM USA, 2005. ISBN 1-58113- Symposium on the Theory 960-8. LCCN QA75.5 A22 of Computing: Chicago, Illi- 2005. nois, USA, June 13–15, ACM:2006:PTE 2004. ACM Press, New York, NY 10036, USA, 2004. [ACM06] ACM, editor. Proceedings ISBN 1-58113-852-0. LCCN of the Thirty-Eighth Annual QA75.5 .A22 2004. ACM Symposium on Theory ACM:2005:MPI of Computing 2006, Seat- tle, WA, USA, May 21– [ACM05a] ACM, editor. MGC’05: 23, 2006. ACM Press, New Proceedings of the 3rd In- York, NY 10036, USA, 2006. ternational Workshop on ISBN 1-59593-134-1. LCCN REFERENCES 94

QA75.5 .A22 2006. URL tional Symposium on The- http://portal.acm.org/ ory of Computing: June 5– citation.cfm?id=1132516. 8, 2010, Cambridge, MA, ACM order number 508060. USA. ACM Press, New ACM:2007:SPA York, NY 10036, USA, 2010. ISBN 1-60558- [ACM07] ACM, editor. STOC ’07: 817-2. LCCN QA 76.6 proceedings of the 39th An- .A152 2010. URL http:/ nual ACM Symposium on /www.gbv.de/dms/tib-ub- Theory of Computing, San hannover/63314455x.. Diego, California, USA, June 11–13, 2007.ACM Algesheimer:2002:ECM Press, New York, NY 10036, [ACS02] Joy Algesheimer, Jan Ca- USA, 2007. ISBN 1-59593- menisch, and Victor Shoup. 631-9. LCCN QA75.5 .A22 Efficient computation mod- 2007. ulo a with ap- ACM:2008:SPA plication to the generation of shared safe-prime prod- [ACM08] ACM, editor. STOC ’08: ucts. In Yung [Yun02a], proceedings of the 40th An- pages 417–432. CODEN nual ACM Symposium on LNCSD9. ISBN 3-540- Theory of Computing, Vic- 44050-X (paperback). ISSN toria, British Columbia, 0302-9743 (print), 1611- Canada, May 17–20, 2008. 3349 (electronic). LCCN ACM Press, New York, NY QA76.9.A25 C79 2002. URL 10036, USA, 2008. ISBN 1- http://link.springer.de/ 60558-047-3. LCCN QA76.6 link/service/series/0558/ .A152 2008. bibs/2442/24420417.htm; ACM:2009:SPA http://link.springer. de/link/service/series/ [ACM09] ACM, editor. STOC ’09: 0558/papers/2442/24420417. proceedings of the 2009 pdf. ACM International Sympo- sium on Theory of Com- Alvarez:2005:EBS puting, Bethesda, Maryland, USA, May 31–June 2, 2009. [ACTZ05]´ Rafael Alvarez,´ Joan-Josep ACM Press, New York, NY Climent, Leandro Tortosa, 10036, USA, 2009. ISBN 1- and Antonio Zamora. An ef- 60558-613-7. LCCN QA75.5 ficient binary sequence gen- .A22 2009. erator with cryptographic ACM:2010:PAI applications. Applied Mathematics and Compu- [ACM10] ACM, editor. Proceedings tation, 167(1):16–27, Au- of the 2010 ACM Interna- gust 5, 2005. CODEN REFERENCES 95

AMHCBQ. ISSN 0096-3003 Avanzi:2006:ESM (print), 1873-5649 (elec- tronic). URL http:// [ADDS06] Roberto Avanzi, Vassil Dim- www.sciencedirect.com/ itrov, Christophe Doche, science/article/pii/S0096300304004709. and Francesco Sica. Ex- tending scalar multiplica- Ahmad:2007:ADE tion using double bases. Lecture Notes in Com- [AD07] Imtiaz Ahmad and A. Shoba puter Science, 4284:130– Das. Analysis and detec- 144, 2006. CODEN tion of errors in implementa- LNCSD9. ISSN 0302-9743 tion of SHA-512 algorithms (print), 1611-3349 (elec- on FPGAs. The Com- tronic). URL http://link. puter Journal, 50(6):728– springer.com/content/pdf/ 738, November 2007. CO- 10.1007/11935230_9.pdf. DEN CMPJA6. ISSN 0010- 4620 (print), 1460-2067 Adee:2009:CDT (electronic). URL http:/ /comjnl.oxfordjournals. [Ade09] S. Adee. Chip design org/cgi/content/abstract/ thwarts sneak attack on 50/6/728; http://comjnl. data. IEEE Spectrum,46 oxfordjournals.org/cgi/ (11):16, November 2009. content/full/50/6/728; CODEN IEESAM. ISSN http://comjnl.oxfordjournals. 0018-9235 (print), 1939- org/cgi/reprint/50/6/728. 9340 (electronic).

Anyanwu:2009:DCS Arnold:2007:CSE

[ADD09] Matthew N. Anyanwu, Lih- [ADH+07] T. W. Arnold, A. Dames, Yuan Deng, and Dipankar M. D. Hocker, M. D. Marik, Dasgupta. Design of cryp- N. A. Pellicciotti, and tographically strong gen- K. Werner. Cryptographic erator by linearly gener- system enhancements for ated sequences. Inter- the IBM System z9. IBM national Journal of Com- Journal of Research and De- puter Science and Security velopment, 51(1/2):87–??, (IJCSS), 3(3):186–200, June January /March 2007. CO- 2009. CODEN ???? ISSN DEN IBMJAE. ISSN 0018- 1985-1553. URL http: 8646 (print), 2151-8556 //www.cscjournals.org/ (electronic). URL http: csc/manuscript/Journals/ //www.research.ibm.com/ IJCSS/volume3/Issue3/IJCSS- journal/rd/511/arnold. 78.pdf. html. REFERENCES 96

Adikari:2009:HBT hanany, Ortal Arazi, and Hairong Qi. Revisiting [ADI09] Jithra Adikari, Vassil Dim- public-key cryptography for itrov, and Laurent Im- wireless sensor networks. bert. Hybrid binary-ternary Computer, 38(11):103–105, joint form and its applica- November 2005. CODEN tion in cryp- CPTRB4. ISSN 0018-9162 tography. In Bruguera (print), 1558-0814 (elec- et al. [BCDH09], pages 76– tronic). 83. ISBN 0-7695-3670-0, 1- 4244-4329-6. ISSN 1063- Alvarez:2005:SSS 6889. LCCN QA76.6 .S887 2009. URL http://www.ac. [AEEdR05] G. Alvarez, A. Hern´andez usc.es/arith19/. Encinas, L. Hern´andez Enci- nas, and A. Mart´ın del Rey. Adleman:2003:TLP A secure scheme to share [Adl03] Leonard M. Adleman. Tur- secret color images. Com- ing Lecture on pre RSA puter Physics Communica- days. World-Wide Web slide tions, 173(1–2):9–16, De- presentation, video, and au- cember 1, 2005. CODEN dio., 2003. URL http:// CPHCBZ. ISSN 0010-4655 www.acm.org/turingawardlecture/ (print), 1879-2944 (elec- RSA/. tronic). URL http:// www.sciencedirect.com/ An:2002:SJS science/article/pii/S0010465505004224. [ADR02] Jee Hea An, Yevgeniy Ahmed:2017:IRD Dodis, and Tal Rabin. On the security of joint signa- [AEH17] Kareem Ahmed and Ibrahim ture and encryption. Lec- El-Henawy. Increasing ro- ture Notes in Computer Sci- bustness of Data Encryp- ence, 2332:83–??, 2002. CO- tion Standard by integrat- DEN LNCSD9. ISSN 0302- ing DNA cryptography. In- 9743 (print), 1611-3349 ternational Journal of Com- (electronic). URL http: puter Applications, 39(2): //link.springer-ny.com/ 91–105, 2017. ISSN 1206- link/service/series/0558/ 212X (print), 1925-7074 bibs/2332/23320083.htm; (electronic). URL https: http://link.springer- //www.tandfonline.com/ ny.com/link/service/series/ doi/full/10.1080/1206212X. 0558/papers/2332/23320083. 2017.1289690. pdf. Atighehchi:2009:EPA Arazi:2005:RPK [AEMR09] K´evin Atighehchi, Adriana [AEAQ05] Benjamin Arazi, Itamar El- Enache, Traian Muntean, REFERENCES 97

and Gabriel Risterucci. An 476, September 2004. CO- efficient parallel algorithm DEN TCSCDI. ISSN 0304- for Skein hash functions. 3975 (print), 1879-2294 Report, ERISCS Research (electronic). Group, Universit´edela M´editerran´ee, Parc Scien- Abe:2004:ASF tifique de Luminy-Marseille, [AF04b] Masayuki Abe and Serge France, September 30, 2009. Fehr. Adaptively secure 11 pp. FeldmanVSSandap- Anton:2007:HEW plications to universally- composable threshold cryp- [AEV+07] Annie I. Ant´on, Julia B. tography. In Franklin Eart, Matthew W. Vail, [Fra04], pages 317–?? CO- Neha Jain, Carrie M. DEN LNCSD9. ISBN 3-540- Gheen, and Jack M. Frink. 22668-0. ISSN 0302-9743 HIPAA’s effect on Web site (print), 1611-3349 (elec- privacy policies. IEEE tronic). LCCN 10.1007/b99099. Security & Privacy, 5(1): URL http://www.springerlink. 45–52, January/February com/openurl.asp?genre= 2007. CODEN ???? ISSN issue&issn=0302-9743&volume= 1540-7993 (print), 1558- 3152; http://www.springerlink. 4046 (electronic). com/openurl.asp?genre= volume&id=doi:10.1007/ Augot:2003:PKE b99099. [AF03] Daniel Augot and Matthieu Atallah:2005:DEK Finiasz. A public key en- cryption scheme based on [AFB05] Mikhail J. Atallah, Keith B. the polynomial reconstruc- Frikken, and Marina Blan- tion problem. Lecture Notes ton. Dynamic and efficient in Computer Science, 2656: key management for access 229–240, 2003. CODEN hierarchies. In Meadows and LNCSD9. ISSN 0302-9743 Syverson [MS05b], pages (print), 1611-3349 (elec- 190–202. ISBN 1-59593- tronic). URL http://link. 226-7. LCCN QA76.9.A25. springer.com/content/pdf/ ACM order number 459050. 10.1007/3-540-39200-9_ Ateniese:2006:IPR 14.pdf. Abadi:2004:PA [AFGH06] Giuseppe Ateniese, Kevin Fu, Matthew Green, and Su- [AF04a] Mart´ın Abadi and C´edric san Hohenberger. Improved Fournet. Private authen- proxy re-encryption schemes tication. Theoretical Com- with applications to secure puter Science, 322(3):427– distributed storage. ACM REFERENCES 98

Transactions on Informa- Ralph Gross. Predict- tion and System Security, ing Social Security num- 9(1):1–30, February 2006. bers from public data. Pro- CODEN ATISBQ. ISSN ceedings of the National 1094-9224 (print), 1557- Academy of Sciences of 7406 (electronic). the United States of Amer- ica, 106(27):10975–10980, Attrapadung:2006:FSS July 7, 2009. CODEN [AFI06] Nuttapong Attrapadung, PNASA6. ISSN 0027-8424 Jun Furukawa, and Hi- (print), 1091-6490 (elec- deki Imai. Forward-secure tronic). URL http://www. and searchable broadcast pnas.org/content/early/ encryption with short ci- 2009/07/02/0904891106. phertexts and private keys. full.pdf. Lecture Notes in Com- puter Science, 4284:161– Akavia:2006:BOW 177, 2006. CODEN LNCSD9. ISSN 0302-9743 [AGGM06] Adi Akavia, Oded Goldre- (print), 1611-3349 (elec- ich, Shafi Goldwasser, and tronic). URL http://link. Dana Moshkovitz. On bas- springer.com/content/pdf/ ing one-way functions on 10.1007/11935230_11.pdf. NP-hardness. In ACM [ACM06], pages 701–710. Akkar:2001:IAS ISBN 1-59593-134-1. LCCN [AG01] M.-L. Akkar and C. Giraud. QA75.5 .A22 2006. URL An implementation of DES http://portal.acm.org/ and AES, secure against citation.cfm?id=1132516. some attacks. Lecture See erratum [AGGM10]. Notes in Computer Science, 2162:309–??, 2001. CO- Akavia:2010:EBO DEN LNCSD9. ISSN 0302- 9743 (print), 1611-3349 [AGGM10] Adi Akavia, Oded Goldre- (electronic). URL http: ich, Shafi Goldwasser, and //link.springer-ny.com/ Dana Moshkovitz. Erra- link/service/series/0558/ tum for: On basing one-way bibs/2162/21620309.htm; functions on NP-hardness. http://link.springer- In ACM [ACM10], pages ny.com/link/service/series/ 795–796. ISBN 1-60558- 0558/papers/2162/21620309. 817-2. LCCN QA 76.6 pdf. .A152 2010. URL http:/ Acquisti:2009:PSS /www.gbv.de/dms/tib-ub- hannover/63314455x..See [AG09] Alessandro Acquisti and [AGGM06]. REFERENCES 99

Alon:2007:GSE Agrawal:2003:SWR

[AGKS07] Noga Alon, Venkatesan Gu- [AHK03a] Rakesh Agrawal, Peter J. ruswami, Tali Kaufman, Haas, and Jerry Kiernan. A and Madhu Sudan. Guess- system for watermarking re- ing secrets efficiently via lational databases. In ACM list decoding. ACM Trans- [ACM03a], page 674. ISBN actions on Algorithms,3 1-58113-634-X. LCCN ???? (4):42:1–42:??, November Agrawal:2003:WRD 2007. CODEN ???? ISSN 1549-6325 (print), 1549- [AHK03b] Rakesh Agrawal, Peter J. 6333 (electronic). Haas, and Jerry Kier- nan. Watermarking re- Anagnostopoulos:2001:PAD lational data: framework, algorithms and analysis. [AGT01] Aris Anagnostopoulos, Mich- VLDB Journal: Very Large ael T. Goodrich, and Data Bases, 12(2):157–169, Roberto Tamassia. Per- August 2003. CODEN sistent authenticated dic- VLDBFR. ISSN 1066-8888 tionaries and their appli- (print), 0949-877X (elec- cations. Lecture Notes in tronic). Computer Science, 2200: 379–??, 2001. CODEN Armington:2002:BAI LNCSD9. ISSN 0302- [AHKM02] John Armington, Purdy Ho, 9743 (print), 1611-3349 Paul Koznek, and Rich- (electronic). URL http: ard Martinez. Biomet- //link.springer-ny.com/ ric authentication in infras- link/service/series/0558/ tructure security. Lecture bibs/2200/22000379.htm; Notes in Computer Science, http://link.springer- 2437:1–??, 2002. CODEN ny.com/link/service/series/ LNCSD9. ISSN 0302-9743 0558/papers/2200/22000379. (print), 1611-3349 (elec- pdf. tronic). URL http:// Ateniese:2005:PRS link.springer.de/link/ service/series/0558/bibs/ [AH05] Giuseppe Ateniese and Su- 2437/24370001.htm; http: san Hohenberger. Proxy //link.springer.de/link/ re-signatures: new defini- service/series/0558/papers/ tions, algorithms, and appli- 2437/24370001.pdf. cations. In Meadows and Ahmad:2007:CSS Syverson [MS05b], pages 310–319. ISBN 1-59593- [Ahm07] David Ahmad. The con- 226-7. LCCN QA76.9.A25. temporary software secu- ACM order number 459050. rity landscape. IEEE Se- REFERENCES 100

curity & Privacy, 5(3):75– Aoki:2001:CBB 77, May/June 2007. CO- DEN ???? ISSN 1540-7993 [AIK+01] Kazumaro Aoki, Tetsuya (print), 1558-4046 (elec- Ichikawa, Masayuki Kanda, tronic). Mitsuru Matsui, Shiho Mo- riai, Junko Nakajima, and Ahmad:2008:ATT Toshio Tokita. Camellia: [Ahm08] David Ahmad. Attack a 128-bit suit- trends: Two years of bro- able for multiple platforms ken crypto: Debian’s dress — design and analysis. Lec- rehearsal for a global PKI ture Notes in Computer Sci- compromise. IEEE Secu- ence, 2012:39–??, 2001. CO- rity & Privacy, 6(5):70–73, DEN LNCSD9. ISSN 0302- September/October 2008. 9743 (print), 1611-3349 CODEN ???? ISSN (electronic). URL http: 1540-7993 (print), 1558- //link.springer-ny.com/ 4046 (electronic). link/service/series/0558/ bibs/2012/20120039.htm; Ahmadi:2008:PFS http://link.springer- ny.com/link/service/series/ [AHRH08] O. Ahmadi, D. Hanker- 0558/papers/2012/20120039. son, and F. Rodr´ıguez- pdf. Henr´ıquez. Parallel formu- lations of scalar multipli- Applebaum:2004:CNS cation on Koblitz curves. J.UCS: Journal of Univer- [AIK04] B. Applebaum, Y. Ishai, sal Computer Science,14 and E. Kushilevitz. Cryp- (3):481–504, ???? 2008. tography in NC0.In CODEN ???? ISSN IEEE [IEE04], pages 166– 0948-6968. URL http:// 175. CODEN ASF- www.jucs.org/jucs_14_3/ PDV. ISBN 0-7695-2228- parallel_formulations_ 9. ISSN 0272-5428. LCCN of_scalar. QA276. URL http: Askarov:2008:CMF //ieeexplore.ieee.org/ iel5/9430/29918/01366236. [AHS08] Aslan Askarov, Daniel pdf?isnumber=29918&prod= Hedin, and Andrei Sabelfeld. CNF&arnumber=1366236&arSt= Cryptographically-masked +166&ared=+175&arAuthor= flows. Theoretical Computer Applebaum%2C+B.%3B+Ishai% Science, 402(2–3):82–101, 2C+Y.%3B+Kushilevitz%2C+ August 8, 2008. CODEN E.; http://ieeexplore. TCSCDI. ISSN 0304-3975 ieee.org/xpls/abs_all. (print), 1879-2294 (elec- jsp?isnumber=29918&arnumber= tronic). 1366236&count=64&index= REFERENCES 101

17. IEEE Computer Society er-Verlag, Berlin, Ger- Order Number P2228. many / Heidelberg, Ger- many / London, UK / etc., Applebaum:2006:C 2001. ISBN 3-540-42167- [AIK06] Benny Applebaum, Yuval X (paperback). LCCN Ishai, and Eyal Kushile- QA76.73.J38 J3635 2000; vitz. Cryptography in NC0. QA267.A1 L43 no.2041. SIAM Journal on Com- URL http://link.springer- puting, 36(4):845–888, ???? ny.com/link/service/series/ 2006. CODEN SMJCAT. 0558/tocs/t2041.htm. Also ISSN 0097-5397 (print), available via the World 1095-7111 (electronic). Wide Web. Attali:2001:SCP Al-Ibrahim:2001:AMS [AJ01b] Isabelle Attali and Thomas [AIP01] M. Al-Ibrahim and J. Piep- Jensen, editors. Smart card rzyk. Authenticating multi- programming and security: cast streams in lossy chan- International Conference on nels using threshold tech- Research in Smart Cards, niques. Lecture Notes in E-smart 2001, Cannes, Computer Science, 2094: France, September19-21, 239–??, 2001. CODEN 2001: proceedings,volume LNCSD9. ISSN 0302- 2140 of Lecture Notes in 9743 (print), 1611-3349 Computer Science. Spring- (electronic). URL http: er-Verlag, Berlin, Ger- //link.springer-ny.com/ many / Heidelberg, Ger- link/service/series/0558/ many / London, UK / bibs/2094/20940239.htm; etc., 2001. ISBN 3- http://link.springer- 540-42610-8 (paperback). ny.com/link/service/series/ LCCN TK7895.S62 I54 0558/papers/2094/20940239. 2001. URL http://link. . pdf springer-ny.com/link/service/ Attali:2001:JSC series/0558/tocs/t2140. htm. [AJ01a] Isabelle Attali and Tho- Aid:2008:NSA mas Jensen, editors. Java on smart cards: pro- [AJ08] Matthew M. Aid and Tho- gramming and security: mas R. Johnson. Na- first international workshop, tional Security Agency re- JavaCard 2000, Cannes, leases history of cold war France, September 14, 2000: intelligence activities: So- revised papers,volume viet strategic forces went 2041 of Lecture Notes in on alert three times during Computer Science. Spring- September–October 1962 be- REFERENCES 102

cause of apprehension over Abe:2002:KES Cuban situation, top secret codeword history of National [AK02a] Masayuki Abe and Masayuki Security Agency shows,vol- Kanda. A key escrow ume 260 of National Secu- scheme with time-limited rity Archive electronic brief- monitoring for one-way ing book. National Secu- communication. The Com- rity Archive, Washington, puter Journal, 45(6):661– DC, USA, 2008. LCCN 671, ???? 2002. CO- JZ5630. URL http:// DEN CMPJA6. ISSN www.gwu.edu/~nsarchiv/ 0010-4620 (print), 1460- NSAEBB/NSAEBB260/index. 2067 (electronic). URL htm. http://www3.oup.co.uk/ computer_journal/hdb/Volume_ Avoine:2008:CIT 45/Issue_06/450661.sgm. [AJO08] Gildas Avoine, Pascal Junod, abs.html; http://www3. and Philippe Oechslin. oup.co.uk/computer_journal/ Characterization and im- hdb/Volume_45/Issue_06/ provement of time-memory pdf/450661.pdf. trade-off based on perfect Agrawal:2002:WRD tables. ACM Transactions on Information and Sys- [AK02b] Rakesh Agrawal and Jerry tem Security, 11(4):17:1– Kiernan. Watermarking 17:??, July 2008. CODEN relational databases. In ATISBQ. ISSN 1094-9224 Bernstein et al. [B+02], (print), 1557-7406 (elec- pages 155–166. ISBN tronic). 1-55860-869-9. LCCN ???? URL http:// Al-Jarrah:2008:NKM www.vldb.org/conf/2002/ [AJS08] Omar Al-Jarrah and Ramzy S05P03.pdf. Saifan. A novel key man- Armknecht:2003:AAC agement algorithm in sensor networks. In Gabriele Kotsis [AK03] Frederik Armknecht and et al., editors, MoMM ’08: Matthias Krause. Algebraic Proceedings of the 6th Inter- attacks on combiners with national Conference on Ad- memory. In Boneh [Bon03], vances in Mobile Comput- pages 162–175. CODEN ing and Multimedia, 24–26 LNCSD9. ISBN 3-540- November 2008, Linz, Aus- 40674-3. ISSN 0302-9743 tria, pages 291–294. ACM (print), 1611-3349 (elec- Press, New York, NY 10036, tronic). LCCN QA76.9.A25 USA, 2008. ISBN 1-60558- C79 2003. URL http: 269-7. LCCN QA76.59 .I565 //link.springer-ny.com/ 2008. link/service/series/0558/ REFERENCES 103

tocs/t2729.htm; http: http://www.cse.iitk.ac. //www.springerlink.com/ in/news/primality.pdf. openurl.asp?genre=issue& issn=0302-9743&volume= Aciicmez:2006:PSB 2729; http://www.springerlink. com/openurl.asp?genre= [AKS06] Onur Acii¸cmez, C¸etin Kaya volume&id=doi:10.1007/ Ko¸c, and Jean-Pierre Seifert. b11817. On the power of sim- ple branch prediction anal- Akinwande:2009:AHC ysis. Technical report, School of EECS, Oregon [Aki09] M. Akinwande. Ad- State University, Corval- vances in homomorphic lis, OR 97331, USA, Oc- cryptosystems. J.UCS: tober 2006. URL http: Journal of Universal Com- //eprint.iacr.org/2006/ puter Science, 15(3):506– 351; http://eprint.iacr. ??, ???? 2009. CODEN org/2006/351.pdf. ???? ISSN 0948-6968. URL http://www.jucs. Agrawal:2004:OPE org/jucs_15_3/advances_ in_homomorphic_cryptosystems[AKSX04]. Rakesh Agrawal, Jerry Kier- nan, Ramakrishnan Srikant, Amir:2004:PGK and Yirong Xu. Order pre- [AKNRT04] Yair Amir, Yongdae Kim, serving encryption for nu- Cristina Nita-Rotaru, and meric data. In ACM Gene Tsudik. On the [ACM04a], pages 563–574. performance of group key ISBN 1-58113-859-8. LCCN agreement protocols. ACM QA76.9.D3. Transactions on Informa- Amadio:2000:RPC tion and System Security,7 (3):457–488, August 2004. [AL00a] Roberto M. Amadio and De- CODEN ATISBQ. ISSN nis Lugiez. On the reach- 1094-9224 (print), 1557- ability problem in crypto- 7406 (electronic). graphic protocols. Lecture Agrawal:2002:PP Notes in Computer Science, 1877:380–??, 2000. CO- [AKS02] Manindra Agrawal, Neeraj DEN LNCSD9. ISSN 0302- Kayal, and Nitin Saxena. 9743 (print), 1611-3349 PRIMES is in P. Report, (electronic). URL http: Department of Computer //link.springer-ny.com/ Science and Engineering, In- link/service/series/0558/ dian Institute of Technology bibs/1877/18770380.htm; Kanpur, Kanpur-208016, http://link.springer- India, August 6, 2002. URL ny.com/link/service/series/ REFERENCES 104

0558/papers/1877/18770380. European PKI Workshop: pdf. Theory and Practice, EU- ROPKI 2006, Turin, Italy, Aoki:2000:FIA June 19–20, 2006. Proceed- [AL00b] Kazumaro Aoki and Helger ings, volume 4043 of Lec- Lipmaa. Fast implementa- ture Notes in Computer tions of AES candidates. In Science. Springer-Verlag, NIST [NIS00], pages 106– Berlin, Germany / Heidel- 122. ISBN ???? LCCN ???? berg, Germany / London, URL http://csrc.nist. UK / etc., 2006. ISBN gov/encryption/aes/round2/ 3-540-35151-5 (softcover). conf3/aes3conf.htm; http: LCCN ???? //csrc.nist.gov/encryption/ Anshel:2007:RME aes/round2/conf3/papers/ [AL07] Michael Anshel and Sarah AES3Proceedings-1.pdf; Levitan. Reducing medi- http://csrc.nist.gov/ cal errors using secure RFID encryption/aes/round2/ technology. SIGCSE Bul- conf3/papers/AES3Proceedings- letin (ACM Special Inter- 2.pdf; http://csrc.nist. est Group on Computer Sci- gov/encryption/aes/round2/ ence Education), 39(2):157– conf3/papers/AES3Proceedings- 159, June 2007. CODEN 3.pdf; http://csrc.nist. SIGSD3. ISSN 0097-8418 gov/encryption/aes/round2/ (print), 2331-3927 (elec- conf3/papers/AES3Proceedings. tronic). URL http:// pdf. www.math.utah.edu/pub/ Atallah:2004:ALA mirrors/ftp.ira.uka.de/ bibliography/Misc/DBLP/ [AL04] Mikhail J. Atallah and Ste- 2007.bib. fano Lonardi. Augment- Allen:2003:EST ing LZ-77 with authentica- tion and integrity assurance [All03] Daniel R. Allen. Eleven capabilities. Concurrency SSH tricks. Linux Journal, and Computation: Prac- 2003(112):5, August 2003. tice and Experience, 16(11): CODEN LIJOFX. ISSN 1063–1076, September 2004. 1075-3583 (print), 1938- CODEN CCPEBO. ISSN 3827 (electronic). 1532-0626 (print), 1532- 0634 (electronic). Allman:2006:MAW Atzeni:2006:PKI [All06] Eric Allman. E-mail au- thentication: what, why, [AL06] Andrea S. Atzeni and An- how? ACM Queue: Tomor- tonio Lioy, editors. Public row’s Computing Today,4 Key Infrastructure: Third (9):30–34, November 2006. REFERENCES 105

CODEN AQCUAE. ISSN Alvarez:2000:CCE 1542-7730 (print), 1542- 7749 (electronic). [AMRP00] G. Alvarez, F. Montoya, M. Romera, and G. Pas- Alvarez:2000:SMC tor. Cryptanalysis of a [Alv00] David J. Alvarez. Secret chaotic encryption system. messages: codebreaking and Physics Letters A, 276(1- American diplomacy, 1930– 4):191–196, 2000. CODEN 1945. Modern war studies. PYLAAG. ISSN 0375-9601 University Press of Kansas, (print), 1873-2429 (elec- Lawrence, KS, USA, 2000. tronic). ISBN 0-7006-1013-8. xi + Alvarez:2004:KCC 292 pp. LCCN D810.C88 A48 2000. URL http: [AMRP04]´ G. Alvarez,´ F. Montoya, //www.h-net.org/review/ M. Romera, and G. Pas- . hrev-a0b6k4-aa tor. Keystream cryptanal- Amadio:2002:SRP ysis of a chaotic crypto- [ALV02] Roberto M. Amadio, De- graphic method. Com- nis Lugiez, and Vincent puter Physics Communica- Vanack`ere. On the sym- tions, 156(2):205–207, Jan- bolic reduction of processes uary 1, 2004. CODEN with cryptographic func- CPHCBZ. ISSN 0010-4655 tions. Theoretical Com- (print), 1879-2944 (elec- puter Science, 290(1):695– tronic). URL http:// 740, October 2002. CODEN www.sciencedirect.com/ TCSCDI. ISSN 0304-3975 science/article/pii/S0010465503004326. (print), 1879-2294 (elec- See [kWpLwW01, WLW04]. tronic). Adams:2007:SAC Abimbola:2006:NSI [AMW07] Carlisle Adams, Ali Miri, [AMB06] A. A. Abimbola, J. M. and Michael Wiener, ed- Munoz, and W. J. Buchanan. itors. Selected areas in NetHost-Sensor: Investigat- cryptography: 14th interna- ing the capture of end- tional workshop, SAC 2007, to-end encrypted intru- Ottawa, Canada, August sive data. Computers 16–17, 2007; revised se- &Security, 25(6):445–451, lected papers, volume 4876 September 2006. CODEN of Lecture Notes in Com- CPSEDU. ISSN 0167-4048 puter Science. Springer-Ver- (print), 1872-6208 (elec- lag, Berlin, Germany / Hei- tronic). URL https:// delberg, Germany / Lon- www.sciencedirect.com/ don, UK / etc., 2007. ISBN science/article/pii/S0167404806000605. 3-540-77360-6. LCCN ???? REFERENCES 106

Aljifri:2003:ILA Anderson:2007:SSS

[AN03] Hassan Aljifri and Diego S´anchez[And07] Ross Anderson. Software Navarro. International le- security: State of the art. gal aspects of cryptogra- IEEE Security & Privacy, phy: Understanding cryp- 5(1):8, January/February tography. Computers & 2007. CODEN ???? ISSN Security, 22(3):196–203, 1540-7993 (print), 1558- April 2003. CODEN 4046 (electronic). CPSEDU. ISSN 0167-4048 Anderson:2008:MMM (print), 1872-6208 (elec- tronic). URL https:// [And08a] M. Anderson. Media: The www.sciencedirect.com/ mash monsters. IEEE science/article/pii/S0167404803003055. Spectrum, 45(5):22–23, May 2008. CODEN IEESAM. Andem:2003:CTE ISSN 0018-9235 (print), 1939-9340 (electronic). [And03] Vikram Reddy Andem. A cryptanalysis of the Anderson:2008:SEG Tiny Encryption Algorithm. Master of science, Depart- [And08b] Ross Anderson. Secu- ment of Computer Science, rity engineering: a guide The University of Alabama, to building dependable dis- Tuscaloosa, AL, USA, 2003. tributed systems.JohnWi- ley and Sons, Inc., New viii + 60 pp. URL http:/ York, NY, USA, second edi- /citeseerx.ist.psu.edu/ tion, 2008. ISBN 0-470- viewdoc/summary?doi=10. 06852-3 (cloth). xl + 1040 1.1.93.5394. pp. LCCN QA76.9.A25 A54 Anderson:2004:BRR 2008. URL http://www. loc.gov/catdir/enhancements/ [And04] Dennis Anderson. Book fy0827/2008006392-d.html; review: RFID Handbook: http://www.loc.gov/catdir/ Fundamentals and Applica- enhancements/fy0827/2008006392- tions in Contactless Smart t.html. Cards and Identification by Aura:2001:RAC Klaus Finkenzeller, John Wiley & Sons, 2003, $125, [ANL01] Tuomas Aura, Pekka Nikan- ISBN 0-470-84402-7. ACM der, and Jussipekka Leiwo. Queue: Tomorrow’s Com- DOS-resistant authenti- puting Today, 2(3):74, May cation with client puz- 2004. CODEN AQCUAE. zles. Lecture Notes in ISSN 1542-7730 (print), Computer Science, 2133: 1542-7749 (electronic). 170–??, 2001. CODEN REFERENCES 107

LNCSD9. ISSN 0302- /www.sciencedirect.com/ 9743 (print), 1611-3349 science/article/pii/S1353485800040113. (electronic). URL http: //link.springer-ny.com/ Anonymous:2000:CCI link/service/series/0558/[Ano00d] Anonymous, editor. Cool bibs/2133/21330170.htm; Chips III: An International http://link.springer- Symposium on Low-Power ny.com/link/service/series/ and High-Speed Chips, Kikai- 0558/papers/2133/21330170. Shinko-Kaikan, Tokyo, Japan pdf. April 24–25, 2000. ????, Anonymous:2000:AIH ????, 2000.

[Ano00a] Anonymous. AES IP Anonymous:2000:CLI hardware encryptor intro- [Ano00e] Anonymous. Cryptography duced. Network Secu- and liberty 2000: an in- rity, 2000(9):6–7, Septem- ternational survey of en- ber 1, 2000. CODEN cryption policy. Electronic NTSCF5. ISSN 1353-4858 Privacy Information Cen- (print), 1872-9371 (elec- ter, Washington, DC, USA, tronic). URL http:// 2000. ISBN 1-893044-07-6. www.sciencedirect.com/ iv + 139 pp. LCCN ???? science/article/pii/S135348580009019X. Anonymous:2000:EES Anonymous:2000:AIah [Ano00f] Anonymous. European en- [Ano00b] Anonymous. Author in- cryption still safer than US dex. In Bellare [Bel00], versions. Network Security, pages 545–?? ISBN 3-540- 2000(3):3, March 1, 2000. 67907-3. ISSN 0302-9743 CODEN NTSCF5. ISSN (print), 1611-3349 (elec- 1353-4858 (print), 1872- tronic). LCCN QA76.9.A25 9371 (electronic). URL C79 2000 Bar. URL http: http://www.sciencedirect. //link.springer-ny.com/ com/science/article/pii/ link/service/series/0558/ S1353485800030051. papers/1880/1880auth.pdf. Anonymous:2000:GBE Anonymous:2000:CRR [Ano00g] Anonymous. Governments [Ano00c] Anonymous. China relaxes back down on encryp- rules on encryption prod- tion regulations. Net- ucts. Network Security, 2000 work Security, 2000(5):3– (4):4–5, April 1, 2000. CO- 4, May 1, 2000. CODEN DEN NTSCF5. ISSN 1353- NTSCF5. ISSN 1353-4858 4858 (print), 1872-9371 (print), 1872-9371 (elec- (electronic). URL http:/ tronic). URL http:// REFERENCES 108

www.sciencedirect.com/ (print), 1872-9371 (elec- science/article/pii/S135348580005008X. tronic). URL http:// www.sciencedirect.com/ Anonymous:2000:PESa science/article/pii/S1353485800090206. [Ano00h] Anonymous. PGP en- Anonymous:2000:VAS cryption software granted global export license. Net- [Ano00l] Anonymous. Voice authen- work Security, 2000(1):1, tication smart card. Net- January 2000. CODEN work Security, 2000(10):5, NTSCF5. ISSN 1353-4858 October 1, 2000. CODEN (print), 1872-9371 (elec- NTSCF5. ISSN 1353-4858 tronic). URL http:// (print), 1872-9371 (elec- www.sciencedirect.com/ tronic). URL http:// science/article/pii/S1353485800900242. www.sciencedirect.com/ science/article/pii/S1353485800100145. Anonymous:2000:PTD Anonymous:2001:AAPb [Ano00i] Anonymous. Privacy threat- ened by digital signatures. [Ano01a] Anonymous. An anony- Network Security, 2000(5): mous auction protocol us- 4, May 1, 2000. CODEN ing “money escrow” (tran- NTSCF5. ISSN 1353-4858 script of discussion). Lecture (print), 1872-9371 (elec- Notes in Computer Science, tronic). URL http:// 2133:223–??, 2001. CO- www.sciencedirect.com/ DEN LNCSD9. ISSN 0302- science/article/pii/S1353485800050091. 9743 (print), 1611-3349 (electronic). URL http: Anonymous:2000:SES //link.springer-ny.com/ [Ano00j] Anonymous. Signing and link/service/series/0558/ encryption software system bibs/2133/21330223.htm; launched. Network Security, http://link.springer- 2000(5):6, May 1, 2000. CO- ny.com/link/service/series/ DEN NTSCF5. ISSN 1353- 0558/papers/2133/21330223. 4858 (print), 1872-9371 pdf. (electronic). URL http:/ Anonymous:2001:ANT /www.sciencedirect.com/ science/article/pii/S1353485800050170[Ano01b]. Anonymous. Authentica- Anonymous:2000:UAS tion and naming (tran- script of discussion). Lec- [Ano00k] Anonymous. User authenti- ture Notes in Computer Sci- cation via smart card. Net- ence, 2133:20–??, 2001. CO- work Security, 2000(9):7, DEN LNCSD9. ISSN 0302- September 1, 2000. CODEN 9743 (print), 1611-3349 NTSCF5. ISSN 1353-4858 (electronic). URL http: REFERENCES 109

//link.springer-ny.com/ Schneier. Network Se- link/service/series/0558/ curity, 2001(10):4, Octo- bibs/2133/21330020.htm; ber 31, 2001. CODEN http://link.springer- NTSCF5. ISSN 1353-4858 ny.com/link/service/series/ (print), 1872-9371 (elec- 0558/papers/2133/21330020. tronic). URL http:// pdf. www.sciencedirect.com/ science/article/pii/S135348580101011X. Anonymous:2001:AWB Anonymous:2001:RAC [Ano01c] Anonymous. Authentication Web-based virtual shops [Ano01f] Anonymous. DOS-resistant using signature-embedded authentication with client marks — A practical anal- puzzles (transcript of dis- ysis — (transcript of dis- cussion). Lecture Notes cussion). Lecture Notes in Computer Science, 2133: in Computer Science, 2133: 178–??, 2001. CODEN 249–??, 2001. CODEN LNCSD9. ISSN 0302- LNCSD9. ISSN 0302- 9743 (print), 1611-3349 9743 (print), 1611-3349 (electronic). URL http: (electronic). URL http: //link.springer-ny.com/ //link.springer-ny.com/ link/service/series/0558/ link/service/series/0558/ bibs/2133/21330178.htm; bibs/2133/21330249.htm; http://link.springer- http://link.springer- ny.com/link/service/series/ ny.com/link/service/series/ 0558/papers/2133/21330178. 0558/papers/2133/21330249. pdf. pdf. Anonymous:2001:EDS Anonymous:2001:AIgb [Ano01g] Anonymous. Encryption [Ano01d] Anonymous. Author in- and stan- dex. In Kilian [Kil01a], dards. Technical report AD- pages 599–?? ISBN 3-540- a398 639, National Aero- 42456-3 (paperback). LCCN nautics and Space Admin- QA76.9.A25 C79 2001; istration, Ames Research QA267.A1 L43 no.2139. Center, Moffett Field, CA, UK£47.00. URL http: USA, 2001. 14 pp. //link.springer-ny.com/ link/service/series/0558/ Anonymous:2001:EER papers/2139/2139auth.pdf. [Ano01h] Anonymous. Encryption ex- Anonymous:2001:CCA pert released on bail. Net- work Security, 2001(8):2, [Ano01e] Anonymous. Censoring August 1, 2001. CODEN crypto not the answer says NTSCF5. ISSN 1353-4858 REFERENCES 110

(print), 1872-9371 (elec- www.sciencedirect.com/ tronic). URL http:// science/article/pii/S1353485801012028. www.sciencedirect.com/ science/article/pii/S1353485801008029. Anonymous:2001:MIT

Anonymous:2001:EMB [Ano01l] Anonymous. Massive iden- tity theft by NY dish [Ano01i] Anonymous. Encryption washer. Network Security, market bolstered by hack- 2001(4):2, April 1, 2001. ers. Network Security, 2001 CODEN NTSCF5. ISSN (7):4, July 1, 2001. CODEN 1353-4858 (print), 1872- NTSCF5. ISSN 1353-4858 9371 (electronic). URL (print), 1872-9371 (elec- http://www.sciencedirect. tronic). URL http:// com/science/article/pii/ www.sciencedirect.com/ S1353485801004020. science/article/pii/S1353485801007115. Anonymous:2001:NWS

Anonymous:2001:LBS [Ano01m] Anonymous. Netherlands to watch strong crypto. Net- [Ano01j] Anonymous. Looking on work Security, 2001(10):4, the bright side of black- October 31, 2001. CODEN box cryptography (tran- NTSCF5. ISSN 1353-4858 script of discussion). Lec- (print), 1872-9371 (elec- ture Notes in Computer Sci- tronic). URL http:// ence, 2133:54–??, 2001. CO- www.sciencedirect.com/ DEN LNCSD9. ISSN 0302- science/article/pii/S1353485801010121. 9743 (print), 1611-3349 (electronic). URL http: Anonymous:2001:PKC //link.springer-ny.com/ link/service/series/0558/[Ano01n] Anonymous. Public-key bibs/2133/21330054.htm; crypto-systems using symmetric- http://link.springer- key crypto-algorithms (tran- ny.com/link/service/series/ script of discussion). Lecture 0558/papers/2133/21330054. Notes in Computer Science, pdf. 2133:184–??, 2001. CO- DEN LNCSD9. ISSN 0302- Anonymous:2001:MLF 9743 (print), 1611-3349 (electronic). URL http: [Ano01k] Anonymous. Magic Lantern //link.springer-ny.com/ fries crypto keys. Network link/service/series/0558/ Security, 2001(12):2, De- bibs/2133/21330184.htm; cember 1, 2001. CODEN http://link.springer- NTSCF5. ISSN 1353-4858 ny.com/link/service/series/ (print), 1872-9371 (elec- 0558/papers/2133/21330184. tronic). URL http:// pdf. REFERENCES 111

Anonymous:2001:SCS 1353-4858 (print), 1872- 9371 (electronic). URL [Ano01o] Anonymous. Short certifi- http://www.sciencedirect. cation of secure RSA mod- com/science/article/pii/ ulus (transcript of discus- S1353485802003069. sion). Lecture Notes in Computer Science, 2133: Anonymous:2002:NSD 234–??, 2001. CODEN LNCSD9. ISSN 0302- [Ano02c] Anonymous. NASA se- 9743 (print), 1611-3349 cret data hacked. Net- (electronic). URL http: work Security, 2002(9):2–3, //link.springer-ny.com/ September 1, 2002. CODEN link/service/series/0558/ NTSCF5. ISSN 1353-4858 bibs/2133/21330234.htm; (print), 1872-9371 (elec- http://link.springer- tronic). URL http:// ny.com/link/service/series/ www.sciencedirect.com/ 0558/papers/2133/21330234. science/article/pii/S1353485802090025. pdf. Anonymous:2001:TAD Anonymous:2002:PPD

[Ano01p] Anonymous. Talking about [Ano02d] Anonymous. Products: digital copyright. IEEE Palm Digital Media’s eBook Spectrum, 38(6):9, June publishing tools; Veridi- 2001. CODEN IEESAM. com’s fingerprint authen- ISSN 0018-9235 (print), tication module; high- 1939-9340 (electronic). speed debugging tool for Macraigor Systems; QNX Anonymous:2002:DEC launches IDE for embed- [Ano02a] Anonymous. Data en- ded programming; Extreme cryption and cryptography. Networks’ network man- Academia Sinica, Insti- agement tools; Parascript’s tute of Information Science, handwriting recognition Taipei, 2002. ISSN 1016- SDK; system debugger tool 2364. i–ii, 349–391 pp. JISE from Compuware. Com- J. Inf. Sci. Eng. 18 (2002), puter, 35(8):74–??, Au- no. 3. gust 2002. CODEN CP- Anonymous:2002:IHB TRB4. ISSN 0018-9162 (print), 1558-0814 (elec- [Ano02b] Anonymous. The impor- tronic). URL http:/ tance of hardware-based /csdl.computer.org/dl/ cryptography for added se- mags/co/2002/08/r8074. curity. Network Security, htm; http://csdl.computer. 2002(3):5, March 31, 2002. org/dl/mags/co/2002/08/ CODEN NTSCF5. ISSN r8074.pdf. REFERENCES 112

Anonymous:2002:PSS tum computation and quan- tum cryptography,vol- [Ano02e] Anonymous. Products: ume 34(4) of Algorith- SOISIC ships design kit for mica. Springer-Verlag, SOI structures; systems and Berlin, Germany / Heidel- software development tools berg, Germany / London, from Telelogic; RSA Secu- UK / etc., 2002. CODEN rity’s Web access manage- ALGOEJ. ISSN 0178-4617 ment system; Altera’s free (print), 1432-0541 (elec- embedded processor portfo- tronic). 309–559 pp. lio; signal integrity measure- ment tools from tektronix; Anonymous:2002:QCR Oracle upgrades Java de- velopment tool; Xilinx de- [Ano02h] Anonymous. Quantum livers EDK for FPGA pro- cryptography revisited. Net- cessor; Westbridge’s tool work Security, 2002(8):14– to sniff unauthorized XML; 16, August 1, 2002. CODEN SpeechStudio’s telephony NTSCF5. ISSN 1353-4858 development tools. Com- (print), 1872-9371 (elec- puter, 35(12):118–119, De- tronic). URL http:// cember 2002. CODEN CP- www.sciencedirect.com/ TRB4. ISSN 0018-9162 science/article/pii/S1353485802080121. (print), 1558-0814 (elec- Anonymous:2002:RUB tronic). URL http:/ /csdl.computer.org/dl/ [Ano02i] Anonymous. Review of mags/co/2002/12/rz118. US bombes. IEEE An- htm; http://csdl.computer. nals of the History of Com- org/dl/mags/co/2002/12/ puting, 24(3):85–87, July– rz118.pdf. September 2002. CODEN IAHCEX. ISSN 1058- Anonymous:2002:PFQ 6180 (print), 1934-1547 [Ano02f] Anonymous. Promise from (electronic). URL http: the future — quantum cryp- //computer.org/annals/ tography. Network Se- an2002/a3letter_web/a3lettertoeditor_ curity, 2002(9):6, Septem- web.htm; http://dlib. ber 1, 2002. CODEN computer.org/an/books/ NTSCF5. ISSN 1353-4858 an2002/pdf/a3085.pdf; (print), 1872-9371 (elec- http://www.computer.org/ tronic). URL http:// annals/an2002/a3085abs. www.sciencedirect.com/ htm. science/article/pii/S1353485802090074. Anonymous:2003:TMC Anonymous:2002:QCQ [Ano03a] Anonymous. For Taiwan’s [Ano02g] Anonymous, editor. Quan- 22 million citizens, Java REFERENCES 113

Smart Cards are clamping Anonymous:2003:SEY down on health-care fraud. PC Magazine, 22(17):66–67, [Ano03e] Anonymous. Secret enough 2003. CODEN PCMGEP. for you? IEEE Spectrum,40 ISSN 0888-8507. (4):9, April 2003. CODEN Anonymous:2003:YCS IEESAM. ISSN 0018-9235 (print), 1939-9340 (elec- [Ano03b] Anonymous. Is your current tronic). security SECURE?: John Jessop, Cryptic Software. Anonymous:2003:TMP Network Security, 2003(4): 3, April 2003. CODEN [Ano03f] Anonymous. Table of NTSCF5. ISSN 1353-4858 Mersenne primes, 2003. (print), 1872-9371 (elec- URL http://mathworld. tronic). URL http:// wolfram.com/MersennePrime. www.sciencedirect.com/ html; http://primes. science/article/pii/S1353485803004069. utm.edu/mersenne/; http: //primes.utm.edu/top20/ Anonymous:2003:NAW page.php?id=4; http:/ /www.computerworld.com/ [Ano03c] Anonymous. Network s/article/9236570/Mathematician_ armies in a world with- Finding_17M_digit_prime_ out secrets. Network number_like_climbing_Everest; Security, 2003(3):14–15, http://www.mersenne.org/ March 2003. CODEN ; http://www.mersenne. NTSCF5. ISSN 1353-4858 org/prime.htm; http:/ (print), 1872-9371 (elec- /www.mersenne.org/report_ tronic). URL http:// milestones/; http:// www.sciencedirect.com/ www.mersenne.org/various/ science/article/pii/S1353485803003118. 57885161.htm; http:/ /www.perfsci.com/wall- Anonymous:2003:NUP art.asp; http://www. utm.edu/research/primes/ [Ano03d] Anonymous. News 2.0: Un- mersenne/index.html; crackable passwords; Web- http://www.utm.edu/research/ Fountain drinks down the primes/notes/3021377/. Web; embracing open source Mersenne primes are primes in India. ACM Queue: To- of the form M(n)=2p − morrow’s Computing Today, 1. The known members of 1(5):8, July/August 2003. this set in order of in- CODEN AQCUAE. ISSN creasing p (not of dis- 1542-7730 (print), 1542- covery), year of discov- 7749 (electronic). ery, and discoverer, are: REFERENCES 114

n p year discoverer Anonymous:2003:UCD 1 2 unknown unknown 2 3 unknown[Ano03g] unknown Anonymous. Unravel- 3 5 unknown unknown lingcryptodevelopments: 4 7 unknown unknown Dr Nicko van Someren, 5 13 1461 Anonymous founder and CTO of nCi- pher, sorts out fact from 6 17 1588 P. A. Cataldi fiction when it comes to 7 19 1588 P. A. Cataldi quantum encryption. Net- 8 31 1750 L. Euler work Security, 2003(9):7–8, 9 61 1883 I. M. Pervushin September 2003. CODEN 10 89 1911 R. E. Powers NTSCF5. ISSN 1353-4858 11 107 1913 E. Fauquembergue(print), 1872-9371 (elec- 12 127 1876 E. Lucas tronic). URL http:// 13 521 1952 R. M. Robinsonwww.sciencedirect.com/ 14 607 1952 R. M. Robinsonscience/article/pii/S1353485803009061. 15 1279 1952 R. M. Robinson Anonymous:2004:BB 16 2203 1952 R. M. Robinson 17 2281 1952[Ano04a] R. M. Robinson Anonymous. Biometrics 18 3217 1957 H. Riesel boom. IEEE Spectrum,41 19 4253 1961 A. Hurwitz (3):13, March 2004. CO- 20 4423 1961 A. Hurwitz DEN IEESAM. ISSN 0018- 9235 (print), 1939-9340 21 9689 1963 D. B. Gillies (electronic). 22 9941 1963 D. B. Gillies 23 11213 1963 D. B. Gillies Anonymous:2004:CPS 24 19937 1971 B. Tuckerman 25 21701 1978[Ano04b] L. C. Noll & Anonymous.L. Nickel Call for papers for special section on fault 26 23209 1979 L. C. Noll diagnosis and tolerance in 27 44497 1979 H. Nelson & D.cryptography. Slowinski IEEE Trans- 28 86243 1982 D. Slowinski actions on Computers,53 29 110503 1988 W. N. Colquitt(11):1504, & L. Welsch, November Jr. 2004. 30 132049 1983 D. Slowinski CODEN ITCOB4. ISSN 31 216091 1985 D. Slowinski 0018-9340 (print), 1557- 32 756839 1992 Slowinski & Gage9956 (electronic). URL 33 859433 1994 Slowinski & Gagehttp://ieeexplore.ieee. 34 1257787 1996 Slowinski & Gageorg/stamp/stamp.jsp?tp= 35 1398269 1996 Armengaud et&arnumber=1336771 al. (GIMPS) . 36 2976221 1997 Spence et al. (GIMPS)Anonymous:2004:CJL 37 3021377 1998 Clarkson, Woltman, Kurowski, and Slowinski (GIMPS) [Ano04c] Anonymous. Chipkarten: 38 6972593 1999 Hajratwala et al. (GIMPS) Java-L¨osung f¨ur Smart- 39 13466917 2001 M. Cameron (GIMPS) Cards. (German) [Chip 40 20996011 2003 M. Shafer (GIMPS) cards: Java solutions for 41 24036583 2004 Josh Findley (GIMPS) 42 25964951 2005 Martin Nowak (GIMPS) 43 30402457 2005 Curtis Cooper & Steven Boone (GIMPS) 44 32582657 2006 Curtis Cooper & Steven Boone (GIMPS) 45 37156667 2008 Hans-Michael Elvenich, George Woltman, Scott Kurowski (GIMP 46 42643801 2009 Odd Magnar Strindmo (GIMPS) 47 43112609 2008 Edson Smith, George Woltman, Scott Kurowski (GIMPS) 48 57885161 2013 Curtis Cooper, George Woltman, Scott Kurowski, and others 49 74207281 2016 Curtis Cooper (GIMPS) 50 77232917 2017 Jon Pace (GIMPS) 51 (??) 82589933 2018 P. Laroche, G. Woltman, A. Blosser, et al. (GIMPS) REFERENCES 115

SmartCards]. Elektronik, Anonymous:2005:SCB 53(4):6, 2004. CODEN EKRKAR. ISSN 0013-5658. [Ano05b] Anonymous. Smart card based authentication — Anonymous:2004:Cf any future? Comput- ers & Security, 24(3):188– [Ano04d] Anonymous. Codebuster. 191, May 2005. CODEN IEEE Spectrum, 41(5):59– CPSEDU. ISSN 0167-4048 60, May 2004. CODEN (print), 1872-6208 (elec- IEESAM. ISSN 0018-9235 tronic). URL https:// (print), 1939-9340 (elec- www.sciencedirect.com/ tronic). science/article/pii/S016740480500043X. Anonymous:2004:ISL Anonymous:2005:WAS

[Ano04e] Anonymous. IBM’s sup- [Ano05c] Anonymous. Workshop port for the Liberty Al- on architectural support liance brings standard con- for security and anti- vergence for federated iden- virus (WASSA). ACM tity a step closer. Net- SIGARCH Computer Ar- work Security, 2004(11):3, chitecture News, 33(1):??, 20, November 2004. CO- March 2005. CODEN DEN NTSCF5. ISSN 1353- CANED2. ISSN 0163-5964 4858 (print), 1872-9371 (print), 1943-5851 (elec- (electronic). URL http:/ tronic). /www.sciencedirect.com/ Anonymous:2006:JHD science/article/pii/S1353485804001515. [Ano06a] Anonymous. Just 12% of Anonymous:2004:NGJ handheld devices encrypted. Network Security, 2006(7): [Ano04f] Anonymous. New genera- 20, July 2006. CODEN tion Java smart cards. Card NTSCF5. ISSN 1353-4858 Technology Today, 16(3):10– (print), 1872-9371 (elec- 11, 2004. CODEN ???? tronic). URL http:// ISSN 0965-2590. www.sciencedirect.com/ Anonymous:2005:CEC science/article/pii/S1353485806704159. Anonymous:2006:RC [Ano05a] Anonymous. The case for elliptic curve cryptog- [Ano06b] Anonymous. RSA(R) Con- raphy. US National Se- ference 2007. IEEE Security curity Agency World-Wide & Privacy, 4(6):14, Novem- Web document, October ber/December 2006. CO- 2005. URL http://www. DEN ???? ISSN 1540-7993 nsa.gov/ia/industry/crypto_ (print), 1558-4046 (elec- elliptic_curve.cfm. tronic). REFERENCES 116

Anonymous:2006:SSD 9340 (print), 1557-9956 (electronic). [Ano06c] Anonymous. Solaris Secu- rity for Developers Guide. Anonymous:2008:KAD Sun Microsystems, 2550 [Ano08a] Anonymous. Kaspersky Garcia Avenue, Mountain asks for decryption help. View, CA 94043, USA, Network Security, 2008(7): 2006. ISBN 0-595-28558- 1–2, July 2008. CODEN 9. ???? pp. LCCN NTSCF5. ISSN 1353-4858 ???? URL http:// (print), 1872-9371 (elec- docs.sun.com/app/docs/ tronic). URL http:// doc/816-4863. www.sciencedirect.com/ Anonymous:2006:SQE science/article/pii/S1353485808700813. [Ano06d] Anonymous. Success for Anonymous:2008:RCB quantum encryption? Net- work Security, 2006(5): [Ano08b] Anonymous. Researchers 20, May 2006. CODEN crack bot net secrets. Net- NTSCF5. ISSN 1353-4858 work Security, 2008(5): (print), 1872-9371 (elec- 2, May 2008. CODEN tronic). URL http:// NTSCF5. ISSN 1353-4858 www.sciencedirect.com/ (print), 1872-9371 (elec- science/article/pii/S1353485806703920. tronic). URL http:// www.sciencedirect.com/ Anonymous:2007:CPSh science/article/pii/S1353485808700588. [Ano07a] Anonymous. Call for pa- Anonymous:2008:RES pers for special section on special-purpose hardware [Ano08c] Anonymous. Researchers for cryptography and crypt- encode secret messages analysis. IEEE Transactions in VoIP calls. Net- on Computers, 56(10):1439, work Security, 2008(7): October 2007. CODEN IT- 2, July 2008. CODEN COB4. ISSN 0018-9340 NTSCF5. ISSN 1353-4858 (print), 1557-9956 (elec- (print), 1872-9371 (elec- tronic). tronic). URL http:// www.sciencedirect.com/ Anonymous:2007:CPSf science/article/pii/S1353485808700837. [Ano07b] Anonymous. Call for pa- Anonymous:2008:SHS pers: Special-purpose hard- ware for cryptography and [Ano08d] Anonymous. Secure Hash cryptanalysis. IEEE Trans- Standard (SHS). Fed- actions on Computers,56 eral Information Process- (7):1008, July 2007. CO- ing Standards Publication DEN ITCOB4. ISSN 0018- FIPS Pub 180-3, National REFERENCES 117

Institute for Standards and www.sciencedirect.com/ Technology, Gaithersburg, science/article/pii/S1353485809700030. MD 20899-8900, USA, Oc- tober 2008. v + 27 Anonymous:2009:TCA pp. URL http://csrc. nist.gov/publications/ [Ano09d] Anonymous. The transition- fips/fips180-3/fips180- ing of cryptographic algo- 3_final.pdf. Superceded rithms and key sizes. Web by FIPS 180-4 [Ano12]. document, July 2, 2009. URL https://csrc.nist. Anonymous:2009:BG gov/csrc/media/projects/ key-management/documents/ [Ano09a] Anonymous. Breaking gsm. transitions/transitioning_ IEEE Spectrum, 46(12):13, cryptoalgos_070209.pdf. December 2009. CODEN IEESAM. ISSN 0018-9235 Anonymous:2012:SHS (print), 1939-9340 (elec- tronic). [Ano12] Anonymous. Secure Hash Standard (SHS). Fed- Anonymous:2009:DSS eral Information Process- [Ano09b] Anonymous. Digital Signa- ing Standards Publication ture Standard (DSS). Fed- FIPS Pub 180-4, National eral Information Process- Institute for Standards ing Standards Publication and Technology, Gaithers- FIPS Pub 186-3, National burg, MD 20899-8900, USA, Institute for Standards and March 2012. v + 30 pp. Technology, Gaithersburg, URL http://csrc.nist. MD 20899-8900, USA, June gov/publications/fips/ 2009. ix + 119 pp. fips180-4/fips-180-4.pdf; URL http://csrc.nist. http://csrc.nist.gov/ gov/publications/fips/ publications/PubsFIPS. fips186-3/fips_186-3.pdf. html#fips180-4. Superceded by FIPS 186-4 Anonymous:2013:DSS [Ano13]. Anonymous:2009:PCA [Ano13] Anonymous. Digital Signa- ture Standard (DSS). Fed- [Ano09c] Anonymous. Proof of con- eral Information Process- cept attack further dis- ing Standards Publication credits MD5. Network FIPS Pub 186-4, National Security, 2009(1):2, Jan- Institute for Standards uary 2009. CODEN and Technology, Gaithers- NTSCF5. ISSN 1353-4858 burg, MD 20899-8900, USA, (print), 1872-9371 (elec- July 2013. vii + 121 tronic). URL http:// pp. URL http://nvlpubs. REFERENCES 118

nist.gov/nistpubs/FIPS/ ANSI:2005:AXP NIST.FIPS.186-4.pdf. [ANS05] ANSI. ANSI X9.62:2005: Ateniese:2001:SRC Public Key Cryptography for the Financial Services In- [ANR01] Giuseppe Ateniese and dustry, The Elliptic Curve Cristina Nita-Rotaru. Stateless- Digital Signature Algorithm recipient certified E-mail (ECDSA).AmericanNa- system based on verifi- tional Standards Institute, able encryption. Lecture 1430 Broadway, New York, Notes in Computer Science, NY 10018, USA, 2005. 2271:182–??, 2001. CO- URL http://csrc.nist. DEN LNCSD9. ISSN 0302- gov/encryption/dss/ecdsa/ 9743 (print), 1611-3349 NISTReCur.pdf; http:/ (electronic). URL http: /webstore.ansi.org/ansidocstore/ //link.springer-ny.com/ product.asp?sku=ANSI+X9% link/service/series/0558/ 2E62%3A2005. bibs/2271/22710182.htm; Abe:2000:PSP http://link.springer- ny.com/link/service/series/[AO00] Masayuki Abe and Tatsuaki 0558/papers/2271/22710182. Okamoto. Provably se- pdf. cure partially blind signa- tures. In Bellare [Bel00], Amir:2001:FAA pages 271–?? ISBN 3-540- 67907-3. ISSN 0302-9743 [ANRS01] Yair Amir, Cristina Nita- (print), 1611-3349 (elec- Rotaru, and Jonathan R. tronic). LCCN QA76.9.A25 Stanton. Framework for C79 2000 Bar. URL http: authentication and ac- //link.springer-ny.com/ cess control of client-server link/service/series/0558/ group communication sys- bibs/1880/18800271.htm; tems. Lecture Notes in http://link.springer- Computer Science, 2233: ny.com/link/service/series/ 128–??, 2001. CODEN 0558/papers/1880/18800271. LNCSD9. ISSN 0302- pdf. 9743 (print), 1611-3349 Abe:2002:SVK (electronic). URL http: //link.springer-ny.com/ [AOS02] Masayuki Abe, Miyako link/service/series/0558/ Ohkubo, and Koutarou bibs/2233/22330128.htm; Suzuki. 1-out-of-n signa- http://link.springer- tures from a variety of ny.com/link/service/series/ keys. Lecture Notes in 0558/papers/2233/22330128. Computer Science, 2501: pdf. 415–??, 2002. CODEN REFERENCES 119

LNCSD9. ISSN 0302-9743 the ACM 2007 Doctoral Dis- (print), 1611-3349 (elec- sertation Award. tronic). URL http:// Alwen:2005:IFR link.springer.de/link/ service/series/0558/bibs/[APV05] Jo¨e Alwen, Giuseppe Per- 2501/25010415.htm; http: siano, and Ivan Visconti. //link.springer.de/link/ Impossibility and feasibil- service/series/0558/papers/ ity results for zero knowl- 2501/25010415.pdf. edge with public keys. In Shoup [Sho05a], pages Alomair:2009:ITS 135–?? ISBN 3-540- [AP09] B. Alomair and R. Pooven- 28114-2. ISSN 0302-9743 dran. Information theo- (print), 1611-3349 (elec- retically secure encryption tronic). LCCN QA76.9.A25 with almost free authen- C79 2005; QA76.9 .A25; tication. J.UCS: Journal QA76.9 C79 2005; QA76.9 of Universal Computer Sci- C794 2005; QA76.9; In- ence, 15(15):2937–??, ???? ternet. URL http:/ 2009. CODEN ???? ISSN /www.springerlink.com/ 0948-6968. URL http: openurl.asp?genre=issue& //www.jucs.org/jucs_15_ issn=0302-9743&volume= 15/information_theoretically_ 3621. secure_encryption. Abdalla:2000:NFS Appenzeller:2005:IBE [AR00] Michel Abdalla and Leonid [App05] Guido Appenzeller. Identity- Reyzin. A new forward- based encryption from al- secure digital signature gorithm to enterprise de- scheme. Lecture Notes in ployment. In Meadows and Computer Science, 1976: Syverson [MS05b], page 406. 116–??, 2000. CODEN ISBN 1-59593-226-7. LCCN LNCSD9. ISSN 0302- QA76.9.A25. ACM order 9743 (print), 1611-3349 number 459050. (electronic). URL http: //link.springer-ny.com/ Applebaum:2007:CCP link/service/series/0558/ [App07] Benny Applebaum. Cryp- bibs/1976/19760116.htm; tography in Constant Par- http://link.springer- allel Time. Ph.D. disserta- ny.com/link/service/series/ tion, Technion — Israel In- 0558/papers/1976/19760116. stitute of Technology, Haifa, pdf. Israel, 2007. URL http:// Arboit:2001:FLM www.acm.org/press-room/ news-releases/dd-award- [AR01] Genevi`eve Arboit and Jean- 07. Honorable Mention for Marc Robert. From REFERENCES 120

fixed-length messages to sis, and a proof-of-concept arbitrary-length messages implementation. Lecture practical RSA signature Notes in Computer Science, padding schemes. Lecture 2137:185–??, 2001. CO- Notes in Computer Science, DEN LNCSD9. ISSN 0302- 2020:44–??, 2001. CO- 9743 (print), 1611-3349 DEN LNCSD9. ISSN 0302- (electronic). URL http: 9743 (print), 1611-3349 //link.springer-ny.com/ (electronic). URL http: link/service/series/0558/ //link.springer-ny.com/ bibs/2137/21370185.htm; link/service/series/0558/ http://link.springer- bibs/2020/20200044.htm; ny.com/link/service/series/ http://link.springer- 0558/papers/2137/21370185. ny.com/link/service/series/ pdf. 0558/papers/2020/20200044. pdf. Aaraj:2008:ADH Araki:2002:NRS [ARJ08] Najwa Aaraj, Anand Raghu- [Ara02] Shunsuke Araki. A Nyberg– nathan, and Niraj K. Jha. Rueppel signature for mul- Analysis and design of a tiple messages and its batch hardware/software trusted verification. Lecture Notes platform module for embed- in Computer Science, 2433: ded systems. ACM Trans- 220–??, 2002. CODEN actions on Embedded Com- LNCSD9. ISSN 0302- puting Systems, 8(1):8:1– 9743 (print), 1611-3349 8:??, December 2008. CO- (electronic). URL http: DEN ???? ISSN 1539-9087 //link.springer-ny.com/ (print), 1558-3465 (elec- link/service/series/0558/ tronic). bibs/2433/24330220.htm; http://link.springer- Arkin:2005:CND ny.com/link/service/series/ 0558/papers/2433/24330220. [Ark05] William M. Arkin. Code pdf. names: deciphering US Atallah:2001:NLW military plans, programs, and operations in the 9/11 [ARC+01] Mikhail J. Atallah, Vic- world. Steerforth Press, tor Raskin, Michael Cro- Hanover, NH, USA, 2005. gan, Christian Hempel- ISBN 1-58642-083-6. 608 mann, Florian Kerschbaum, pp. LCCN UA23 .A689 Dina Mohamed, and Sanket 2005. URL http:// Naik. Natural language wa- www.loc.gov/catdir/toc/ termarking: Design, analy- ecip052/2004025039.html. REFERENCES 121

Arnold:2001:AWB tronic). URL https:// www.sciencedirect.com/ [Arn01] Michael Arnold. Audio wa- science/article/pii/S0167404804001191. termarking: Burying infor- mation in the data. Dr. Abe:2001:SPA Dobb’s Journal of Software [AS01a] Masayuki Abe and Koutarou Tools, 26(11):21–22, 24–26, Suzuki. M +1-stprice 28, November 2001. CO- auction using homomor- DEN DDJOEB. ISSN 1044- phic encryption. Lecture 789X. URL http://www. Notes in Computer Science, ddj.com/ftp/2001/2001_ 2274:115–??, 2001. CO- 11/watermk.txt; http: DEN LNCSD9. ISSN 0302- //www.ddj.com/ftp/2001/ 9743 (print), 1611-3349 2001_11/watermk.zip. (electronic). URL http: Agrawal:2003:MCA //link.springer-ny.com/ link/service/series/0558/ [ARR03] Dakshi Agrawal, Josyula R. bibs/2274/22740115.htm; Rao, and Pankaj Rohatgi. http://link.springer- Multi-channel attacks. In ny.com/link/service/series/ Walter et al. [WKP03], 0558/papers/2274/22740115. pages 2–16. CODEN pdf. LNCSD9. ISBN 3-540- 40833-9. ISSN 0302-9743 Adelsbach:2001:ZKW (print), 1611-3349 (elec- tronic). LCCN TK7895.E42. [AS01b] Andr´e Adelsbach and Ahmad- URL http://link.springer- Reza Sadeghi. Zero- ny.com/link/service/series/ knowledge watermark de- 0558/tocs/t2779.htm; tection and proof of own- http://www.springerlink. ership. Lecture Notes in com/openurl.asp?genre= Computer Science, 2137: issue&issn=0302-9743&volume= 273–??, 2001. CODEN 2779; http://www.springerlink. LNCSD9. ISSN 0302- com/openurl.asp?genre= 9743 (print), 1611-3349 volume&id=doi:10.1007/ (electronic). URL http: b13240. //link.springer-ny.com/ link/service/series/0558/ Artail:2004:PAC bibs/2137/21370273.htm; [Art04] Hassan A. Artail. Peer- http://link.springer- assisted carrying authenti- ny.com/link/service/series/ cation (PACA). Computers 0558/papers/2137/21370273. &Security, 23(6):478–488, pdf. September 2004. CODEN Agung:2001:ICI CPSEDU. ISSN 0167-4048 (print), 1872-6208 (elec- [AS01c] I. Wiseto Agung and Peter REFERENCES 122

Sweeney. Improvement and Aspiration to Implemen- comments on image water- tation. Springer-Verlag, marking using complemen- Berlin, Germany / Heidel- tary modulation. Lecture berg, Germany / London, Notes in Computer Science, UK / etc., 2003. ISBN 2195:411–??, 2001. CO- 1-85233-774-5. xiv + 159 DEN LNCSD9. ISSN 0302- pp. LCCN TK7882.B56A84 9743 (print), 1611-3349 2003. US$49.95. (electronic). URL http: Aciicmez:2005:IBB //link.springer-ny.com/ link/service/series/0558/[ASK05] Onur Acii¸cmez, Werner bibs/2195/21950411.htm; Schindler, and C¸etin K. http://link.springer- Ko¸c. Improving Brumley ny.com/link/service/series/ and Boneh on 0558/papers/2195/21950411. unprotected SSL implemen- pdf. tations. In Meadows and Syverson [MS05b], pages Agarwal:2008:DWS 139–146. ISBN 1-59593- [AS08] Rashmi Agarwal and M. S. 226-7. LCCN QA76.9.A25. Santhanam. Digital wa- ACM order number 459050. termarking in the singular Aciicmez:2007:MAC vector domain. Interna- tional Journal of Image and [ASK07] Onur Acii¸cmez, Jean-Pierre Graphics (IJIG), 8(3):351– Seifert, and C¸etin Kaya 368, July 2008. CODEN Ko¸c. Micro-architectural ???? ISSN 0219-4678. cryptanalysis. IEEE Se- curity & Privacy, 5(4):62– Asenjo:2002:AES 64, July/August 2007. CO- [Ase02] Juan C. Asenjo. The Ad- DEN ???? ISSN 1540-7993 vanced Encryption Stan- (print), 1558-4046 (elec- dard — implementation and tronic). transition to a new crypto- Aslan:2004:HSM graphic benchmark. Net- work Security, 2002(7):7– [Asl04a] Heba K. Aslan. A hybrid 9, July 1, 2002. CODEN scheme for multicast au- NTSCF5. ISSN 1353-4858 thentication over lossy net- (print), 1872-9371 (elec- works. Computers & Se- tronic). URL http:// curity, 23(8):705–713, De- www.sciencedirect.com/ cember 2004. CODEN science/article/pii/S1353485802070083. CPSEDU. ISSN 0167-4048 (print), 1872-6208 (elec- Ashburn:2003:PBA tronic). URL https:// [Ash03] Julian Ashburn. Prac- www.sciencedirect.com/ tical Biometrics: From science/article/pii/S0167404804001798. REFERENCES 123

Aslan:2004:LAA Allison:2001:LLE

[Asl04b] Heba K. Aslan. Logical [ASW+01] Dennis Allison, Randy analysis of AUTHMAC DH: Schrickel, Reid Womack, a new protocol for authenti- Jeremy C. Reed, Ashley cation and key distribution. Tate, and Paul Munsey. Let- Computers & Security,23 ters: Looking for early PPC (4):290–299, June 2004. CO- [People’s Computing Com- DEN CPSEDU. ISSN 0167- pany] people; being pre- 4048 (print), 1872-6208 pared for invasion; Better- (electronic). URL https:/ BASIC; Linux versus BSD; /www.sciencedirect.com/ Diffie–Hellman to the res- science/article/pii/S0167404804000215. cue; the future of program- ming. Dr. Dobb’s Jour- Blanchet-Sadri:2001:MSD nal of Software Tools,26 (6):10, 12, June 2001. CO- [aSM01] F. Bl anchet Sadri and DEN DDJOEB. ISSN 1044- C. Morgan. Multiset 789X. URL http://www. and set decipherable codes. ddj.com/. Computers and Mathemat- ics with Applications,41 Ateniese:2004:VED (10–11):1257–1262, May/ [Ate04] Giuseppe Ateniese. Ver- June 2001. CODEN ifiable encryption of dig- CMAPDK. ISSN 0898-1221 ital signatures and appli- (print), 1873-7668 (elec- cations. ACM Transac- tronic). URL http:// tions on Information and www.sciencedirect.com/ System Security, 7(1):1–20, science/article/pii/S0898122101000967. February 2004. CODEN ATISBQ. ISSN 1094-9224 Abdalla:2000:KMR (print), 1557-7406 (elec- tronic). [ASW00] Michel Abdalla, Yuval Shavitt, and Avishai Wool. Androutsellis-Theotokis:2004:SPP Key management for re- stricted multicast using [ATS04] Stephanos Androutsellis- broadcast encryption. IEEE/ Theotokis and Diomidis ACM Transactions on Net- Spinellis. A survey of peer- working, 8(4):443–454, 2000. to-peer content distribution CODEN IEANEP. ISSN technologies. ACM Comput- 1063-6692 (print), 1558- ing Surveys, 36(4):335–371, 2566 (electronic). URL December 2004. CODEN http://www.acm.org/pubs/ CMSVAN. ISSN 0360-0300 citations/journals/ton/ (print), 1557-7341 (elec- 2000-8-4/p443-abdalla/. tronic). REFERENCES 124

Aharonov:2000:QBE 8646 (print), 2151-8556 (electronic). URL http: [ATSVY00] Dorit Aharonov, Amnon //www.research.ibm.com/ Ta-Shma, Umesh V. Vazi- journal/rd/483/arnold. rani, and Andrew C. Yao. html; http://www.research. Quantum bit escrow. In ibm.com/journal/rd/483/ ACM [ACM00], pages 705– arnold.pdf. 714. ISBN 1-58113-184- 4. URL http://www. Avanzi:2003:CAD acm.org/pubs/articles/ [Ava03] Roberto M. Avanzi. Coun- proceedings/stoc/335305/ termeasures against differ- p705-aharonov/p705-aharonov. ential for pdf; http://www.acm. hyperelliptic curve cryp- org/pubs/citations/proceedings/ tosystems. In Walter stoc/335305/p705-aharonov/ et al. [WKP03], pages 366– . ACM order number 381. CODEN LNCSD9. 508000. ISBN 3-540-40833-9. ISSN Alster:2001:PKC 0302-9743 (print), 1611- 3349 (electronic). LCCN [AUW01] Kazimierz Alster, Jerzy Ur- TK7895.E42. URL http: banowicz, and Hugh C. //link.springer-ny.com/ Williams, editors. Public- link/service/series/0558/ key cryptography and com- tocs/t2779.htm; http: putational number theory: //www.springerlink.com/ proceedings of the inter- openurl.asp?genre=issue& national conference orga- issn=0302-9743&volume= nized by the Stefan Ba- 2779; http://www.springerlink. nach International Math- com/openurl.asp?genre= ematical Center, Warsaw, volume&id=doi:10.1007/ Poland, September 11-15, b13240. 2000.WalterdeGruyter, New York, NY, USA, 2001. Aalberts:2000:DSB ISBN 3-11-017046-9 (cloth). [AvdH00] Babette Aalberts and Si- LCCN QA268 .P83 2001. mone van der Hof. Digital Arnold:2004:IPN signature blindness: analy- sis of legislative approaches [AV04] T. W. Arnold and L. P. Van toward electronic authenti- Doorn. The IBM PCIXCC: cation.Number32inITeR, a new cryptographic copro- Nationaal programma infor- cessor for the IBM eServer. matietechnologie en recht. IBM Journal of Research Kluwer Academic Publish- and Development, 48(3/4): ers, Dordrecht, The Nether- 475–487, ???? 2004. CO- lands, 2000. ISBN 90-268- DEN IBMJAE. ISSN 0018- 3656-2. 77 pp. LCCN REFERENCES 125

K564.C6 A73 2000. In ceedings of the Twenty- English with summary in Eighth International Con- Dutch. ference on Very Large Data Abadi:2005:SAC Bases, Hong Kong SAR, China, 20–23 August 2002. [AW05] Mart´ın Abadi and Bog- Morgan Kaufmann Publish- dan Warinschi. Secu- ers, Los Altos, CA 94022, rity analysis of crypto- USA, 2002. ISBN 1-55860- graphically controlled ac- 869-9. LCCN ???? cess to XML documents. Blanton:2006:SRF In ACM [ACM05b], pages 108–117. ISBN 1-59593-062- [BA06] Marina Blanton and Mikhail 0. LCCN QA76.9.D3 A296 Atallah. Succinct repre- 2005. ACM order number sentation of flexible and 475050. privacy-preserving access rights. VLDB Journal: Very Abadi:2008:SAC Large Data Bases, 15(4): [AW08] Mart´ın Abadi and Bogdan 334–354, November 2006. Warinschi. Security analy- CODEN VLDBFR. ISSN sis of cryptographically con- 1066-8888 (print), 0949- trolled access to XML docu- 877X (electronic). ments. Journal of the ACM, Bagnulo:2002:PAA 55(2):6:1–6:29, May 2008. CODEN JACOAH. ISSN [BACS02] Marcelo Bagnulo, Bernardo 0004-5411 (print), 1557- Alarcos, Mar´ıa Calder´on, 735X (electronic). and Marifeli Sedano. Pro- viding authentication & Ayoade:2006:SIR authorization mechanisms for active service charg- [Ayo06] John Ayoade. Secu- ing. Lecture Notes in rity implications in RFID Computer Science, 2511: and authentication process- 337–??, 2002. CODEN ing framework. Comput- LNCSD9. ISSN 0302-9743 ers & Security, 25(3):207– (print), 1611-3349 (elec- 212, May 2006. CODEN tronic). URL http:// CPSEDU. ISSN 0167-4048 link.springer.de/link/ (print), 1872-6208 (elec- service/series/0558/bibs/ tronic). URL https:// 2511/25110337.htm; http: www.sciencedirect.com/ //link.springer.de/link/ science/article/pii/S0167404805001951. service/series/0558/papers/ Bernstein:2002:VPT 2511/25110337.pdf. Badra:2007:AWC [B+02] Philip A. Bernstein et al., editors. VLDP 2002: pro- [Bad07] Mohamad Badra. Alterna- REFERENCES 126

tive wireless client authenti- 0558/papers/2138/21380071. cation and key distribution. pdf. Network Security, 2007(7): 9–13, July 2007. CODEN Baigneres:2008:QSB NTSCF5. ISSN 1353-4858 [Bai08] Thomas Baign`eres. Quan- (print), 1872-9371 (elec- titative security of block ci- tronic). URL http:// phers : designs and crypt- www.sciencedirect.com/ analysis tools.Th`ese, . science/article/pii/S1353485807700648 Facult´einformatiqueet Baier:2001:ECP communications IC, Pro- gramme doctoral Informa- [Bai01a] H. Baier. Elliptic curves tique, Communications et of prime order over op- Information, Institut de timal extension fields for syst`emes de communica- use in cryptography. Lec- tion ISC (Laboratoire de ture Notes in Computer Sci- s´ecurit´e et de cryptographie ence, 2247:99–??, 2001. CO- LASEC), Ecole´ polytech- DEN LNCSD9. ISSN 0302- nique f´ed´erale de Lausanne 9743 (print), 1611-3349 EPFL, Lausanne, Switzer- (electronic). URL http: land, 2008. 243 pp. //link.springer-ny.com/ Bamford:2002:BSA link/service/series/0558/ bibs/2247/22470099.htm; [Bam02] James Bamford. Body of http://link.springer- secrets: anatomy of the ny.com/link/service/series/ ultra-secret National Secu- 0558/papers/2247/22470099. rity Agency. Anchor Books, pdf. New York, NY, USA, 2002. Baier:2001:ECS ISBN 0-385-49908-6. 763 pp. LCCN UB256.U6 B36 [Bai01b] Harald Baier. Efficient com- 2002. URL http://www. putation of singular mod- loc.gov/catdir/bios/random051/ uli with application in cryp- 2002284054.html; http: tography. Lecture Notes //www.loc.gov/catdir/description/ in Computer Science, 2138: random043/2002284054.html; 71–??, 2001. CODEN http://www.loc.gov/catdir/ LNCSD9. ISSN 0302- samples/random041/2002284054. 9743 (print), 1611-3349 html. (electronic). URL http: Banks:2005:TFC //link.springer-ny.com/ link/service/series/0558/[Ban05] William D. Banks. To- bibs/2138/21380071.htm; wards faster cryptosystems, http://link.springer- II. InGarrettandLie- ny.com/link/service/series/ man [GL05], pages 139– REFERENCES 127

152. ISBN 0-8218-3365- Brooks wins ACM Turing 0. LCCN QA76.9.A25 Award. Dr. Dobb’s Jour- P82 2005. URL http:// nal of Software Tools,25 www.loc.gov/catdir/toc/ (3):18, March 2000. CO- fy0612/2005048178.html. DEN DDJOEB. ISSN 1044-789X. URL http:// Bao:2004:CPK sourceforge.net/. [Bao04] Feng Bao. Cryptanalysis Baran:2000:NVR of a partially known cel- lular automata cryptosys- [Bar00c] Nicholas Baran. News and tem. IEEE Transactions views: RSA algorithm in on Computers, 53(11):1493– the public domain; Woz 1497, November 2004. CO- joins the Inventors Hall of DEN ITCOB4. ISSN Fame; entangled photons 0018-9340 (print), 1557- mean faster, smaller ICs; 9956 (electronic). URL BEHEMOTH mothballed; http://ieeexplore.ieee. Advanced Encryption Stan- org/stamp/stamp.jsp?tp= dard selected; SGI releases &arnumber=1336769. SDK as open source; WSDL Baran:2000:NVB spec released. Dr. Dobb’s Journal of Software Tools, [Bar00a] Nicholas Baran. News and 25(12):18, December 2000. views: 108-bit elliptic curve CODEN DDJOEB. ISSN cryptographic key found; 1044-789X. new algorithm cracks the Barr:2002:IC stock market; first complete Babbage printer unveiled; [Bar02] Thomas H. Barr. Invita- XrML view to be digital tion to Cryptology.Pren- rights standard; PKWare tice-Hall, Inc., Upper Saddle founder [phil katz] dies un- River, NJ 07458, USA, 2002. expectedly. Dr. Dobb’s ISBN 0-13-088976-8. xii + Journal of Software Tools, 396 pp. LCCN Z103 .B34 25(7):18, July 2000. CO- 2002. DEN DDJOEB. ISSN 1044- Barken:2003:HSY 789X. Baran:2000:NVM [Bar03] Lee Barken. How Secure is Your Wireless Network? [Bar00b] Nicholas Baran. News and Safeguarding Your Wi-Fi views: More on tiny tran- LAN. Prentice-Hall PTR, sistors; Open Source repos- Upper Saddle River, NJ itory launched; design con- 07458, USA, 2003. ISBN 0- test promotes new software 13-140206-4. xx + 199 pp. tools; and then there’s a LCCN QA76.9.A25B3775 decryption contest; Fred 2003. US$34.99. REFERENCES 128

Barron:2005:DWP delberg, Germany / Lon- don, UK / etc., 2009. ISBN [Bar05] David W. Barron. David 0-387-88757-1 (ebook), 0- Wheeler: a personal mem- 387-88756-3. xxxiii + 356 oir. The Computer Jour- pp. LCCN Z103 .B37 nal, 48(6):650–651, Novem- 2009eb. URL http:// ber 2005. CODEN CM- link.library.utoronto. PJA6. ISSN 0010-4620 ca/eir/EIRdetail.cfm?Resources\ (print), 1460-2067 (elec- _\_ID=896123&T=F. tronic). URL http:// comjnl.oxfordjournals. Bauer:2000:DSM org/cgi/content/full/48/ [Bau00] Friedrich Ludwig Bauer. 6/650; http://comjnl. Decrypted secrets: meth- oxfordjournals.org/cgi/ ods and maxims of cryptol- reprint/48/6/650. ogy. Springer-Verlag, Berlin, Germany / Heidelberg, Ger- Barkan:2006:CCP many / London, UK / etc., [Bar06a] Elad Pinhas Barkan. Crypt- second edition, 2000. ISBN analysis of ciphers and pro- 3-540-66871-3. xii + 470 pp. tocols. Thesis (Ph.D.), Fac- LCCN QA76.9.A25 B38513 ulty of Computer Science, 2000. Technion — Israel Institute Bauer:2001:PPGa of Technology, Haifa, Israel, 2006. vi + 176 pp. [Bau01a] Mick Bauer. Paranoid pen- guin GPG: The best free Barker:2006:ROA crypto you aren’t using, Part I of II. Linux Journal, [Bar06b] Elaine Barker. Recommen- 89:32–34, 36–37, Septem- dation for Obtaining As- ber 2001. CODEN LI- surances for Digital Signa- JOFX. ISSN 1075-3583 ture Applications. National (print), 1938-3827 (elec- Institute for Standards tronic). URL http:// and Technology, Gaithers- noframes.linuxjournal. burg, MD 20899-8900, USA, com/lj-issues/issue89/ November 2006. v + 33 pp. 4828.html. URL http://csrc.nist. gov/CryptoToolkit/dss/ Bauer:2001:PPGb SP800-89Nov2006.pdf.NIST [Bau01b] Mick Bauer. Paranoid pen- Special Publication 800-89. guin: GPG: the best free Bard:2009:AC crypto you aren’t using, Part II of II. Linux Jour- [Bar09] Gregory V. Bard. Algebraic nal, 90:46, 48, 50–52, 54– cryptanalysis. Springer-Ver- 55, October 2001. CODEN lag, Berlin, Germany / Hei- LIJOFX. ISSN 1075-3583 REFERENCES 129

(print), 1938-3827 (elec- 1075-3583 (print), 1938- tronic). 3827 (electronic). Bauer:2001:PPUb Bauer:2003:PPAb

[Bau01c] Mick Bauer. Paranoid pen- [Bau03b] Mick Bauer. Paranoid pen- guin: The 101 uses of guin: Authenticate with OpenSSH: Part II of II. LDAP, Part III. Linux Jour- Linux Journal, 82:52, 54, nal, 2003(113):13, Septem- 56, 58–59, February 2001. ber 2003. CODEN LI- CODEN LIJOFX. ISSN JOFX. ISSN 1075-3583 1075-3583 (print), 1938- (print), 1938-3827 (elec- 3827 (electronic). tronic). Bauer:2002:DSM Baudet:2005:DSP

[Bau02a] Friedrich Ludwig Bauer. [Bau05] Mathieu Baudet. Decid- Decrypted secrets: meth- ing security of protocols ods and maxims of cryptol- against off-line guessing at- ogy. Springer-Verlag, Berlin, tacks. In Meadows and Germany / Heidelberg, Ger- Syverson [MS05b], pages many / London, UK / etc., 16–25. ISBN 1-59593-226-7. third edition, 2002. ISBN 3- LCCN QA76.9.A25. ACM 540-42674-4. xii + 473 pp. order number 459050. LCCN QA76.9.A25 B38513 Bauer:2007:DSM 2002. [Bau07] Friedrich Ludwig Bauer. Bauer:2002:PPB Decrypted secrets: meth- ods and maxims of cryptol- [Bau02b] Mick Bauer. Paranoid pen- ogy. Springer-Verlag, Berlin, guin:BestCrypt:Cross- Germany / Heidelberg, Ger- platform filesystem encryp- many / London, UK / etc., tion. Linux Journal, 98: fourth edition, 2007. ISBN ??, June 2002. CODEN 3-540-24502-2. xii + 524 pp. LIJOFX. ISSN 1075-3583 LCCN QA76.9.A25 B38513 (print), 1938-3827 (elec- 2007. URL http://www. tronic). URL http:/ loc.gov/catdir/enhancements/ /www.linuxjournal.com/ fy0824/2006933429-d.html; article.php?sid=5938. http://www.loc.gov/catdir/ Bauer:2003:PPAa toc/fy0711/2006933429. html. [Bau03a] Mick Bauer. Paranoid pen- Bauer:2008:EHE guin: Authenticate with LDAP. Linux Journal, [Bau08] Friedrich L. Bauer. Erich 2003(112):12, August 2003. H¨uttenhain: Entziffer- CODEN LIJOFX. ISSN ung 1939–1945. (German) REFERENCES 130

[Erich H¨uttenhain: deci- curves. Lecture Notes in phering 1939–1945]. Infor- Computer Science, 1977: matik Spektrum, 31(3):??, 191–??, 2000. CODEN ???? 2008. CODEN IN- LNCSD9. ISSN 0302- SKDW. ISSN 0170-6012 9743 (print), 1611-3349 (print), 1432-122X (elec- (electronic). URL http: tronic). URL http://link. //link.springer-ny.com/ springer.com/article/10. link/service/series/0558/ 1007/s00287-008-0242-4. bibs/1977/19770191.htm; Blakley:1979:RSA http://link.springer- ny.com/link/service/series/ [BB79] G. R. Blakley and I. Borosh. 0558/papers/1977/19770191. Rivest–Shamir–Adleman pub- pdf. lic key cryptosystems do not always conceal messages. Barkan:2002:HMW Computers and Mathemat- ics with Applications, 5(3): [BB02] Elad Barkan and Eli Bi- 169–178, 1979. CODEN ham. In how many ways can CMAPDK. ISSN 0898-1221 you write rijndael? Lecture (print), 1873-7668 (elec- Notes in Computer Science, tronic). 2501:160–??, 2002. CODEN Benedens:2000:TBD LNCSD9. ISSN 0302-9743 (print), 1611-3349 (elec- [BB00a] Oliver Benedens and Christoph tronic). URL http:// Busch. Towards blind de- link.springer.de/link/ tection of robust water- service/series/0558/bibs/ marks in polygonal mod- 2501/25010160.htm; http: els. Computer Graphics Fo- //link.springer.de/link/ rum, 19(3):??, August 2000. service/series/0558/papers/ CODEN CGFODY. ISSN 2501/25010160.pdf. 0167-7055 (print), 1467- 8659 (electronic). URL aid= Bouda:2003:EQI 412& http://www. blackwellpublishers.co. uk/asp/journal.asp?ref= [BB03] Jan Bouda and Vladim´ır R. 0167-7055& iid=3& Buˇzek. Encryption of quan- amp; src=ard& vid= tum information. Inter- 19. national Journal of Foun- dations of Computer Sci- Buchmann:2000:ECC ence (IJFCS), 14(5):741– [BB00b] Johannes Buchmann and ??, October 2003. CODEN Harald Baier. Efficient IFCSEN. ISSN 0129-0541 construction of crypto- (print), 1793-6373 (elec- graphically strong elliptic tronic). REFERENCES 131

Boneh:2004:SIB openurl.asp?genre=article& issn=0178-4617&volume= [BB04] Dan Boneh and Xavier 34&issue=4&spage=372. Quan- Boyen. Secure identity tum computation and quan- based encryption with- tum cryptography. out random oracles. In Franklin [Fra04], pages 443– Basso:2009:NBB

?? CODEN LNCSD9. + ISBN 3-540-22668-0. ISSN [BBC 09] Alessandro Basso, Francesco 0302-9743 (print), 1611- Bergadano, Davide Cav- 3349 (electronic). LCCN agnino, Victor Pomponiu, 10.1007/b99099. URL and Annamaria Vernone. A novel block-based water- http://www.springerlink. marking scheme using the com/openurl.asp?genre= SVD transform. Algorithms issue&issn=0302-9743&volume= (Basel), 2(1):46–75, March 3152; http://www.springerlink. 2009. CODEN ALGOCH. com/openurl.asp?genre= ISSN 1999-4893 (electronic). volume&id=doi:10.1007/ URL b99099. https://www.mdpi. com/1999-4893/2/1/46. Bicakci:2005:ISA Behrmann:2002:UIS [BB05] Kemal Bicakci and Nazife Baykal. Improved server [BBD+02] Gerd Behrmann, Johan assisted signatures. Com- Bengtsson, Alexandre David, puter Networks (Amster- Kim G. Larsen, Paul Pet- dam, Netherlands: 1999), tersson, and Wang Yi. UP- 47(3):351–366, February 21, PAAL implementation se- 2005. CODEN ???? ISSN crets. Lecture Notes in 1389-1286 (print), 1872- Computer Science, 2469: 7069 (electronic). 3–??, 2002. CODEN LNCSD9. ISSN 0302-9743 Biham:2002:SQK (print), 1611-3349 (elec- [BBB+02] , Michel Boyer, tronic). URL http:// Gilles Brassard, Jeroen link.springer.de/link/ van de Graaf, and Tal service/series/0558/bibs/ Mor. Security of quan- 2469/24690003.htm; http: tum key distribution against //link.springer.de/link/ all collective attacks. Al- service/series/0558/papers/ gorithmica, 34(4):372–388, 2469/24690003.pdf. November 2002. CODEN Bernstein:2009:PQC ALGOEJ. ISSN 0178- 4617 (print), 1432-0541 [BBD09] Daniel J. (Daniel Julius) (electronic). URL http: Bernstein, Johannes Buch- //www.springerlink.com/ mann, and Erik Dahm´en, REFERENCES 132

editors. Post-quantum cryp- ny.com/link/service/series/ tography: [First Interna- 0558/papers/2248/22480566. tional Workshop on Post- pdf. . . . at the Katholieke Univer- Blumenthal:2002:SAD siteit Leuven in 2006]. [BBG+02] Uri Blumenthal, Milind M. Springer-Verlag, Berlin, Buddhikot, Juan A. Garay, Germany / Heidelberg, Ger- Scott C. Miller, Sarvar Pa- many / London, UK / tel, Luca Salgarelli, and etc., 2009. ISBN 3-540- Dorothy Stanley. A scheme 88701-6 (hardcover), 3-642- for authentication and dy- 10019-8 (softcover). LCCN namic in wire- QA76.9.A25 P67 2009. less networks. Bell Labs Beimel:2000:CFS Technical Journal, 7(2):37– 48, Summer 2002. CODEN [BBDK00] Amos Beimel, Mike Burmester, BLTJFD. ISSN 1089-7089 Yvo Desmedt, and Eyal (print), 1538-7305 (elec- Kushilevitz. Computing tronic). functions of a shared se- cret. SIAM Journal on Dis- Bartolini:2008:EIS crete Mathematics, 13(3): [BBGM08] S. Bartolini, I. Branovic, 324–345, 2000. CODEN R. Giorgi, and E. Martinelli. SJDMEC. ISSN 0895-4801 Effects of instruction-set ex- (print), 1095-7146 (elec- tensions on an embedded tronic). URL http:// processor: a case study epubs.siam.org/sam-bin/ on elliptic curve cryptogra- dbq/article/28881. phy over GF(2m). IEEE Bellare:2001:KPP Transactions on Computers, 57(5):672–685, May 2008. [BBDP01] Mihir Bellare, Alexandra CODEN ITCOB4. ISSN Boldyreva, Anand Desai, 0018-9340 (print), 1557- and David Pointcheval. 9956 (electronic). URL Key-privacy in public-key http://ieeexplore.ieee. encryption. Lecture Notes org/stamp/stamp.jsp?tp= in Computer Science, 2248: &arnumber=4358294. 566–??, 2001. CODEN Barkan:2003:ICO LNCSD9. ISSN 0302- 9743 (print), 1611-3349 [BBK03a] Elad Barkan, Eli Biham, (electronic). URL http: and Nathan Keller. In- //link.springer-ny.com/ stant ciphertext-only crypt- link/service/series/0558/ analysis of GSM encrypted bibs/2248/22480566.htm; communication. In Boneh http://link.springer- [Bon03], pages 600–616. REFERENCES 133

CODEN LNCSD9. ISBN UK£47.00. URL http: 3-540-40674-3. ISSN 0302- //link.springer-ny.com/ 9743 (print), 1611-3349 link/service/series/0558/ (electronic). LCCN QA76.9.A25 bibs/2139/21390292.htm; C79 2003. URL http: http://link.springer- //link.springer-ny.com/ ny.com/link/service/series/ link/service/series/0558/ 0558/papers/2139/21390292. tocs/t2729.htm; http: pdf. //www.springerlink.com/ openurl.asp?genre=issue& Bellare:2000:PKE issn=0302-9743&volume= [BBM00] Mihir Bellare, Alexandra 2729; http://www.springerlink. Boldyreva, and Silvio Mi- com/openurl.asp?genre= cali. Public-key encryp- volume&id=doi:10.1007/ tion in a multi-user set- b11817. ting: Security proofs and Bertoni:2003:EAD improvements. Lecture Notes in Computer Science, [BBK+03b] G.Bertoni,L.Breveglieri, 1807:259–??, 2000. CO- I. Koren, P. Maistri, and DEN LNCSD9. ISSN 0302- V. Piuri. Error analysis 9743 (print), 1611-3349 and detection procedures (electronic). URL http: for a hardware implemen- //link.springer-ny.com/ tation of the advanced en- link/service/series/0558/ cryption standard. IEEE bibs/1807/18070259.htm; Transactions on Computers, http://link.springer- 52(4):492–505, April 2003. ny.com/link/service/series/ CODEN ITCOB4. ISSN 0558/papers/1807/18070259. 0018-9340 (print), 1557- pdf. 9956 (electronic). URL http://ieeexplore.ieee. Bellare:2009:HPK org/stamp/stamp.jsp?tp= &arnumber=1190590. [BBN+09] Mihir Bellare, Zvika Brak- Bellare:2001:OCH erski, Moni Naor, Thomas Ristenpart, Gil Segev, Ho- [BBKN01] Mihir Bellare, Alexandra vav Shacham, and Scott Boldyreva, Lars Knudsen, Yilek. Hedged public-key and Chanathip Namprem- encryption: How to pro- pre. Online ciphers and tect against bad random- the hash-CBC construction. ness. In ????, editor, Ad- In Kilian [Kil01a], pages vances in Cryptology – ASI- 292–?? ISBN 3-540- ACRYPT 2009, pages 232– 42456-3 (paperback). LCCN 249. Springer-Verlag, Berlin, QA76.9.A25 C79 2001; Germany / Heidelberg, Ger- QA267.A1 L43 no.2139. many / London, UK / etc., REFERENCES 134

2009. ISBN ???? LCCN Street, Suite 300, Silver ???? URL ????. Spring, MD 20910, USA, Bobineau:2000:PSD 2001. ISBN 0-7695-1150-3; 0-7695-1152-X. ISSN 1063- [BBPV00] Christophe Bobineau, Luc 6889. LCCN QA76.9.C62 Bouganim, Philippe Pucheral, S95 2001. US$145. IEEE and Patrick Valduriez. Pi- order no. PR01150. coDMBS: Scaling down database techniques for Biham:2004:NCS the Smartcard. In El Abbadi et al. [EBC+00], [BC04a] Eli Biham and Rafi Chen. pages 11–20. ISBN 1- Near-collisions of SHA-0. In 55860-715-3. LCCN ???? Franklin [Fra04], pages 290– URL http://www.vldb. ?? CODEN LNCSD9. org/dblp/db/conf/vldb/ ISBN 3-540-22668-0. ISSN ChristopheBPV00.html. 0302-9743 (print), 1611- 3349 (electronic). LCCN Boneh:2004:SGS 10.1007/b99099. URL [BBS04] Dan Boneh, Xavier Boyen, http://www.springerlink. and Hovav Shacham. Short com/openurl.asp?genre= group signatures. In issue&issn=0302-9743&volume= Franklin [Fra04], pages 41– 3152; http://www.springerlink. ?? CODEN LNCSD9. com/openurl.asp?genre= ISBN 3-540-22668-0. ISSN volume&id=doi:10.1007/ 0302-9743 (print), 1611- b99099. 3349 (electronic). LCCN 10.1007/b99099. URL Blundo:2004:SIA http://www.springerlink. com/openurl.asp?genre= [BC04b] Carlo Blundo and Stelvio issue&issn=0302-9743&volume= Cimato. A software in- 3152; http://www.springerlink. frastructure for authenti- com/openurl.asp?genre= cated Web metering. Com- volume&id=doi:10.1007/ puter, 37(4):28–??, April b99099. 2004. CODEN CP- Burgess:2001:ISC TRB4. ISSN 0018-9162 (print), 1558-0814 (elec- [BC01] N. Burgess and L. Ci- tronic). URL http://csdl. miniera, editors. 15th computer.org/comp/mags/ IEEE Symposium on Com- co/2004/04/r4028abs.htm; puter Arithmetic: ARITH- http://csdl.computer. 15 2001: proceedings: Vail, org/dl/mags/co/2004/04/ Colorado, 11–13 June, r4028.htm; http://csdl. 2001. IEEE Computer So- computer.org/dl/mags/co/ ciety Press, 1109 Spring 2004/04/r4028.pdf. REFERENCES 135

Backes:2005:PKS of Lecture Notes in Com- puter Science. Springer-Ver- [BC05a] Michael Backes and Chris- lag, Berlin, Germany / Hei- tian Cachin. Public-key delberg, Germany / Lon- steganography with ac- don, UK / etc., 2005. CO- tive attacks. In Kil- DEN LNCSD9. ISBN 3-540- ian [Kil05], pages 210– 24301-1. ISSN 0302-9743 ?? CODEN LNCSD9. (print), 1611-3349 (elec- ISBN 3-540-24573-1 (soft- tronic). LCCN TK5105.59 cover). ISSN 0302-9743 .S385 2004. URL http:// (print), 1611-3349 (elec- springerlink.metapress. tronic). LCCN QA76.9.A25 com/openurl.asp?genre= T44 2005. URL http: issue&issn=0302-9743&volume= //www.springerlink.com/ 3352; http://www.springerlink. openurl.asp?genre=issue& com/openurl.asp?genre= issn=0302-9743&volume= issue&issn=0302-9743&volume= 3378; http://www.springerlink. 3352; http://www.springerlink. com/openurl.asp?genre= com/openurl.asp?genre= volume&id=doi:10.1007/ volume&id=doi:10.1007/ b106171. b105083. Bergadano:2005:DPL Brzezinski:2005:MRL [BC05b] Francesco Bergadano and [BCB+05] Zbigniew Brzezi´nski, Jan Sta- Davide Cavagnino. Dealing nislaw Ciechanowski, An- with packet loss in the in- toni Bohdanowicz, Witold teractive chained stream au- Zbirohowski-Ko´scia, et al. thentication protocol. Com- Marjan Rejewski 1905– puters & Security, 24(2): 1980: living with the 139–146, March 2005. CO- Enigma secret.Wydawnictwo DEN CPSEDU. ISSN 0167- Tekst Sp. z o.o., Bydgoszcz, 4048 (print), 1872-6208 Poland, 2005. ISBN 83- (electronic). URL https:/ 7208-117-4. 288 pp. LCCN /www.sciencedirect.com/ ???? Introduction by Pro- science/article/pii/S0167404804001877. fessor Zbigniew Brzezi´nski. Blundo:2005:SCN Bergadano:2001:CSA [BC05c] Carlo Blundo and Stelvio [BCC01] Francesco Bergadano, Da- Cimato, editors. Secu- vide Cavagnino, and Bruno rity in communication net- Crispo. Chained stream works: 4th international authentication. Lecture conference, SCN 2004, Notes in Computer Science, Amalfi, Italy, September 2012:144–??, 2001. CO- 8–10, 2004: Revised se- DEN LNCSD9. ISSN 0302- lected papers, volume 3352 9743 (print), 1611-3349 REFERENCES 136

(electronic). URL http: Blundo:2006:VCS //link.springer-ny.com/ link/service/series/0558/[BCD06] Carlo Blundo, Stelvio Cimato, bibs/2012/20120144.htm; and Alfredo De Santis. Vi- http://link.springer- sual cryptography schemes ny.com/link/service/series/ with optimal pixel expan- 0558/papers/2012/20120144. sion. Theoretical Computer pdf. Science, 369(1–3):169–182, December 15, 2006. CO- Bergadano:2002:IAM DEN TCSCDI. ISSN 0304- 3975 (print), 1879-2294 [BCC02] F. Bergadano, D. Cav- (electronic). agnino, and B. Crispo. Bruguera:2009:PIS Individual authentication in multiparty communi- [BCDH09] Javier D. Bruguera, Mar- cations. Computers & ius Cornea, Debjit Das- Security, 21(8):719–735, Sarma, and John Harrison, November 2002. CODEN editors. Proceedings of the CPSEDU. ISSN 0167-4048 19th IEEE Symposium on (print), 1872-6208 (elec- Computer Arithmetic, June tronic). URL https:// 8–10, 2009, Portland, Ore- www.sciencedirect.com/ gon, USA. IEEE Computer science/article/pii/S0167404802008131. Society Press, 1109 Spring Street, Suite 300, Silver Brier:2001:CRS Spring, MD 20910, USA, 2009. ISBN 0-7695-3670-0, [BCCN01] Eric Brier, Christophe 1-4244-4329-6. ISSN 1063- Clavier, Jean-S´ebastien Coron, 6889. LCCN QA76.6 .S887 and David Naccache. Crypt- 2009. URL http://www.ac. analysis of RSA signatures usc.es/arith19/. with fixed-pattern padding. Burnett:2000:EMG In Kilian [Kil01a], pages 433–?? ISBN 3-540- [BCDM00] L. Burnett, G. Carter, 42456-3 (paperback). LCCN E. Dawson, and W. Mil- QA76.9.A25 C79 2001; lan. Efficient methods for QA267.A1 L43 no.2139. generating MARS-like S- UK£47.00. URL http: boxes (abstract only). In //link.springer-ny.com/ NIST [NIS00], page 10. link/service/series/0558/ ISBN ???? LCCN ???? bibs/2139/21390433.htm; URL http://csrc.nist. http://link.springer- gov/encryption/aes/round2/ ny.com/link/service/series/ conf3/aes3conf.htm; http: 0558/papers/2139/21390433. //csrc.nist.gov/encryption/ pdf. aes/round2/conf3/papers/ REFERENCES 137

AES3Proceedings-1.pdf; bers on GPU. arxiv.org,?? http://csrc.nist.gov/ (??):??, December 22, 2011. encryption/aes/round2/ URL http://arxiv.org/ conf3/papers/AES3Proceedings- abs/1112.5239. 2.pdf; http://csrc.nist. gov/encryption/aes/round2/ Brown:2000:PCW

conf3/papers/AES3Proceedings- + 3.pdf; http://csrc.nist.[BCH 00] Michael Brown, Donny gov/encryption/aes/round2/ Cheung, Darrel Hanker- conf3/papers/AES3Proceedings. son, Julio Lopez Hernan- pdf. dez, Michael Kirkup, and Alfred Menezes. PGP Barnum:2002:AQM in constrained wireless de- vices. In USENIX [USE00d], [BCG+02] H. Barnum, C. Crepeau, page ?? ISBN 1-880446- D. Gottesman, A. Smith, 18-9. LCCN ???? URL and A. Tapp. Authen- http://www.usenix.org/ tication of quantum mes- publications/library/proceedings/ sages. In IEEE [IEE02], sec2000/brown.html. pages 449–458. CODEN ASFPDV. ISBN 0-7695- Breunesse:2005:FMS 1822-2. ISSN 0272-5428. LCCN QA267. URL http: [BCHJ05] C.-B. Breunesse, N. Cata˜no, //ieeexplore.ieee.org/ M. Huisman, and B. Ja- iel5/8411/26517/01181969. cobs. Formal methods for pdf?isnumber=26517&prod= smart cards: an experience CNF&arnumber=1181969&arSt= report. Science of Computer +449&ared=+458&arAuthor= Programming, 55(1–3):53– Barnum%2C+H.%3B+Crepeau% 80, March 2005. CODEN 2C+C.%3B+Gottesman%2C+ SCPGD4. ISSN 0167-6423 D.%3B+Smith%2C+A.%3B+Tapp% (print), 1872-7964 (elec- 2C+A.; http://ieeexplore. tronic). ieee.org/xpls/abs_all. jsp?isnumber=26517&arnumber= Boneh:2007:CCS 1181969&count=82&index= 45. IEEE Computer Society [BCHK07] Dan Boneh, Ran Canetti, Order Number PR01822. Shai Halevi, and Jonathan Katz. Chosen-ciphertext se- Bahi:2011:ECS curity from identity-based [BCGH11] Jacques M. Bahi, Rapha¨el encryption. SIAM Journal Couturier, Christophe Guyeux, on Computing, 36(5):1301– and Pierre-Cyrille H´eam. 1328, ???? 2007. CODEN Efficient and cryptograph- SMJCAT. ISSN 0097-5397 ically secure generation of (print), 1095-7111 (elec- chaotic pseudorandom num- tronic). REFERENCES 138

Butler:2006:FAK Barak:2005:SCA

[BCJ+06] Frederick Butler, Iliano [BCL+05b] Boaz Barak, Ran Canetti, Cervesato, Aaron D. Jag- Yehuda Lindell, Rafael Pass, gard, Andre Scedrov, and and Tal Rabin. Secure com- Christopher Walstad. For- putation without authenti- mal analysis of Kerberos cation. In Shoup [Sho05a], 5. Theoretical Computer pages 361–?? ISBN 3-540- Science, 367(1–2):57–87, 28114-2. ISSN 0302-9743 November 24, 2006. CO- (print), 1611-3349 (elec- DEN TCSCDI. ISSN 0304- tronic). LCCN QA76.9.A25 3975 (print), 1879-2294 C79 2005; QA76.9 .A25; (electronic). QA76.9 C79 2005; QA76.9 C794 2005; QA76.9; In- Barni:2005:DWI ternet. URL http:/ [BCKK05] Mauro Barni, Ingemar /www.springerlink.com/ Cox, Ton Kalker, and openurl.asp?genre=issue& Hyoung Joong Kim, edi- issn=0302-9743&volume= tors. Digital watermarking: 3621. 4th international workshop, Bresson:2001:PAG IWDW 2005, Siena, Italy, September 15–17, 2005: [BCP01] Emmanuel Bresson, Olivier proceedings, volume 3710 Chevassut, and David Pointcheval. of Lecture Notes in Com- Provably authenticated group puter Science. Springer-Ver- Diffie–Hellman key ex- lag, Berlin, Germany / Hei- change — the dynamic delberg, Germany / Lon- case. Lecture Notes in don, UK / etc., 2005. CO- Computer Science, 2248: DEN LNCSD9. ISBN 3-540- 290–??, 2001. CODEN 28768-X. ISSN 0302-9743 LNCSD9. ISSN 0302- (print), 1611-3349 (elec- 9743 (print), 1611-3349 tronic). LCCN ???? (electronic). URL http: //link.springer-ny.com/ Bao:2005:PSS link/service/series/0558/ [BCL05a] Haiyong Bao, Zhenfu Cao, bibs/2248/22480290.htm; and Rongxing Lu. Proxy http://link.springer- signature scheme using ny.com/link/service/series/ self-certified public keys. 0558/papers/2248/22480290. Applied Mathematics and pdf. Computation, 169(2):1380– Bresson:2002:DGD 1389, October 15, 2005. CODEN AMHCBQ. ISSN [BCP02a] Emmanuel Bresson, Olivier 0096-3003 (print), 1873- Chevassut, and David Pointcheval. 5649 (electronic). Dynamic group Diffie– REFERENCES 139

Hellman key exchange un- pp. LCCN TK7882.B56 G85 der standard assumptions. 2003. US$49.95. Lecture Notes in Computer Bresson:2007:PSA Science, 2332:321–??, 2002. CODEN LNCSD9. ISSN [BCP07] Emmanuel Bresson, Olivier 0302-9743 (print), 1611- Chevassut, and David Pointcheval. 3349 (electronic). URL Provably secure authenti- http://link.springer-ny. cated group Diffie–Hellman com/link/service/series/ key exchange. ACM Trans- 0558/bibs/2332/23320321. actions on Information and htm; http://link.springer- System Security, 10(3):10:1– ny.com/link/service/series/ 10:??, July 2007. CODEN 0558/papers/2332/23320321. ATISBQ. ISSN 1094-9224 pdf. (print), 1557-7406 (elec- tronic). Bresson:2002:GDH Bellavista:2002:JLD [BCP02b] Emmanuel Bresson, Olivier Chevassut, and David Pointcheval.[BCS02] Paolo Bellavista, Antonio Group Diffie–Hellman key Corradi, and Cesare Ste- exchange secure against dic- fanelli. Java for on-line dis- tionary attacks. Lecture tributed monitoring of het- Notes in Computer Science, erogeneous systems and ser- 2501:497–??, 2002. CODEN vices. The Computer Jour- LNCSD9. ISSN 0302-9743 nal, 45(6):595–607, ???? (print), 1611-3349 (elec- 2002. CODEN CMPJA6. tronic). URL http:// ISSN 0010-4620 (print), link.springer.de/link/ 1460-2067 (electronic). URL service/series/0558/bibs/ http://www3.oup.co.uk/ 2501/25010497.htm; http: computer_journal/hdb/Volume_ //link.springer.de/link/ 45/Issue_06/450595.sgm. service/series/0558/papers/ abs.html; http://www3. 2501/25010497.pdf. oup.co.uk/computer_journal/ hdb/Volume_45/Issue_06/ Bolle:2003:GB pdf/450595.pdf. + [BCP 03] Ruud Bolle, Jonathan Biham:2008:BA Connell, Sharatchandra Pankanti, Nalini Ratha, and [BCS08] E. Biham, Y. Carmeli, and Andrew Senior. Guide to A. Shamir. Bug attacks. biometrics. Springer-Ver- In ????, editor, Advances in lag, Berlin, Germany / Hei- Cryptology, Proceedings of delberg, Germany / Lon- CRYPTO 08, volume 5157, don, UK / etc., 2003. ISBN pages 221–240. Springer- 0-387-40089-3. 335 (est.) Verlag, Berlin, Germany / REFERENCES 140

Heidelberg, Germany / Lon- 0302-9743 (print), 1611- don, UK / etc., 2008. 3349 (electronic).

Betarte:2000:SSC Boneh:2000:CRP

[BCST00] Gustavo Betarte, Cristina [BD00b] Dan Boneh and Glenn Dur- Cornes, Nora Szasz, and Al- fee. Cryptanalysis of RSA varo Tasistro. Specifica- with private key d less than 0.292 tion of a smart card op- N . IEEE Transactions erating system. Lecture on Information Theory,46 Notes in Computer Science, (4):1339–1349, April 2000. 1956:77–??, 2000. CO- CODEN IETTAW. ISSN DEN LNCSD9. ISSN 0302- 0018-9448 (print), 1557- 9743 (print), 1611-3349 9654 (electronic). (electronic). URL http: Bourbakis:2003:SBC //link.springer-ny.com/ link/service/series/0558/[BD03] Nikolaos Bourbakis and bibs/1956/19560077.htm; Apostolos Dollas. SCAN- http://link.springer- based compression-encryption- ny.com/link/service/series/ hiding for video on de- 0558/papers/1956/19560077. mand. IEEE MultiMe- pdf. dia, 10(3):79–87, July– September 2003. CODEN Bao:2005:RWH IEMUE4. ISSN 1070-986X (print), 1941-0166 (elec- [BCW05] Haiyong Bao, Zhenfu Cao, tronic). URL http://csdl. and Shengbao Wang. Re- computer.org/comp/mags/ marks on Wu–Hsu’s thresh- mu/2003/03/u3079abs.htm; old signature scheme us- http://csdl.computer. ing self-certified public keys. org/dl/mags/mu/2003/03/ The Journal of Systems and u3079.htm; http://csdl. Software, 78(1):56–59, Oc- computer.org/dl/mags/mu/ tober 2005. CODEN JS- 2003/03/u3079.pdf. SODM. ISSN 0164-1212 (print), 1873-1228 (elec- Bozzano:2004:AVS tronic). [BD04a] Marco Bozzano and Giorgio Biham:2000:CAG Delzanno. Automatic verifi- cation of secrecy properties [BD00a] Eli Biham and Orr Dunkel- for linear logic specifications man. Cryptanalysis of the of cryptographic protocols. A5/1 GSM . Journal of Symbolic Com- Lecture Notes in Computer putation, 38(5):1375–1415, Science, 1977:43–51, 2000. November 2004. CODEN CODEN LNCSD9. ISSN JSYCEH. ISSN 0747-7171 REFERENCES 141

(print), 1095-855X (elec- 40674-3. ISSN 0302-9743 tronic). (print), 1611-3349 (elec- tronic). LCCN QA76.9.A25 Burmester:2004:HPK C79 2003. URL http: [BD04b] Mike Burmester and Yvo G. //link.springer-ny.com/ Desmedt. Is hierarchi- link/service/series/0558/ cal public-key certification tocs/t2729.htm; http: the next target for hack- //www.springerlink.com/ ers? Communications of openurl.asp?genre=issue& the Association for Com- issn=0302-9743&volume= puting Machinery, 47(8):68– 2729; http://www.springerlink. 74, August 2004. CODEN com/openurl.asp?genre= CACMA2. ISSN 0001-0782 volume&id=doi:10.1007/ (print), 1557-7317 (elec- b11817. tronic). Blundo:2003:COT

Buchmann:2008:PQC [BDDS03] C. Blundo, P. D’Arco, A. De [BD08] Johannes Buchmann and Santis, and D. R. Stin- Jintai Ding, editors. Post- son. Contrast optimal Quantum Cryptography: threshold visual cryptogra- Second International Work- phy schemes. SIAM Journal shop, PQCrypto 2008 Cincin- on Discrete Mathematics,16 nati, OH, USA, October (2):224–261, 2003. CODEN 17–19, 2008 Proceedings, SJDMEC. ISSN 0895-4801 volume 5299 of Lecture (print), 1095-7146 (elec- Notes in Computer Science. tronic). URL http:// Springer-Verlag, Berlin, epubs.siam.org/sam-bin/ Germany / Heidelberg, Ger- dbq/article/33668. many / London, UK / etc., Bolosky:2000:FSD 2008. ISBN 3-540-88403- 3. LCCN QA76.9.A25 P63 [BDET00] William J. Bolosky, John R. 2008. URL http://www. Douceur, David Ely, and springer.com/computer/ Marvin Theimer. Feasi- security+and+cryptology/ bility of a serverless dis- book/978-3-540-88402-6. tributed file system de- Biryukov:2003:CS ployed on an existing set of desktop PCs. ACM [BDD03] Alex Biryukov, Christophe SIGMETRICS Performance De Canni`ere, and Gustaf Evaluation Review, 28(1): Dellkrantz. Cryptanalysis of 34–43, June 2000. CO- Safer++. In Boneh [Bon03], DEN ???? ISSN 0163-5999 pages 195–211. CODEN (print), 1557-9484 (elec- LNCSD9. ISBN 3-540- tronic). REFERENCES 142

Bao:2001:SPD process algebras. Theo- retical Computer Science, + [BDF 01a] Feng Bao, Robert Deng, 283(2):271–304, June 2002. Peirong Feng, Yan Guo, and CODEN TCSCDI. ISSN Hongjun Wu. Secure and 0304-3975 (print), 1879- private distribution of online 2294 (electronic). video and some related cryp- tographic issues. Lecture Bodei:2005:APS Notes in Computer Science, [BDFP05] C. Bodei, P. Degano, R. Fo- 2119:190–??, 2001. CO- cardi, and C. Priami. Au- DEN LNCSD9. ISSN 0302- thentication primitives for 9743 (print), 1611-3349 secure protocol specifica- (electronic). URL http: tions. Future Generation //link.springer-ny.com/ Computer Systems, 21(5): link/service/series/0558/ 645–653, May 2005. CO- bibs/2119/21190190.htm; DEN FGSEVI. ISSN 0167- http://link.springer- 739X (print), 1872-7115 ny.com/link/service/series/ (electronic). 0558/papers/2119/21190190. pdf. Bao:2001:CTS

Boneh:2001:LBM [BDG+01] Feng Bao, Robert H. Deng, [BDF01b] Dan Boneh, Glenn Durfee, Willi Geiselmann, Claus and Matt Franklin. Lower Schnorr, Rainer Steinwandt, bounds for multicast mes- and Hongjun Wu. Crypt- sage authentication. Lecture analysis of two sparse poly- Notes in Computer Science, nomial based public key 2045:437–??, 2001. CO- cryptosystems. Lecture DEN LNCSD9. ISSN 0302- Notes in Computer Science, 9743 (print), 1611-3349 1992:153–164, 2001. CO- (electronic). URL http: DEN LNCSD9. ISSN 0302- //link.springer-ny.com/ 9743 (print), 1611-3349 link/service/series/0558/ (electronic). URL http: bibs/2045/20450437.htm; //link.springer-ny.com/ http://link.springer- link/service/series/0558/ ny.com/link/service/series/ bibs/1992/19920153.htm; 0558/papers/2045/20450437. http://link.springer- pdf. ny.com/link/service/series/ 0558/papers/1992/19920153. Bodei:2002:PAP pdf. [BDFP02] Chiara Bodei, Pierpaolo Bhattacharyya:2009:VPA Degano, Riccardo Focardi, and Corrado Priami. Prim- [BDhKB09] D. Bhattacharyya, P. Das, itives for authentication in T. h. Kim, and S. K. Bandy- REFERENCES 143

opadhyay. Vascular pattern 0558/papers/2355/23550016. analysis towards pervasive pdf. palm vein authentication. J.UCS: Journal of Univer- Biryukov:2009:KRA sal Computer Science,15 (5):1081–??, ???? 2009. CO- [BDK+09] Alex Biryukov, Orr Dunkel- DEN ???? ISSN 0948-6968. man, Nathan Keller, Dmitry URL http://www.jucs. Khovratovich, and Adi org/jucs_15_5/vascular_ Shamir. Key recovery at- pattern_analysis_towards. tacks of practical complex- Biham:2002:EDL ity on AES variants with up to 10 rounds. Report, Uni- [BDK02a] Eli Biham, Orr Dunkelman, versity of Luxembourg, Lux- and Nathan Keller. Enhanc- embourg; Ecole´ Normale ing differential-linear crypt- Sup´erieure, 45 rue d’Ulm, analysis. Lecture Notes in 75230 Paris, France. Ein- Computer Science, 2501: stein Institute of Mathe- 254–??, 2002. CODEN matics, Hebrew University, LNCSD9. ISSN 0302-9743 Jerusalem 91904, Israel; (print), 1611-3349 (elec- Computer Science depart- tronic). URL http:// ment, The Weizmann Insti- link.springer.de/link/ tute, Rehovot 76100, Israel, service/series/0558/bibs/ November 8, 2009. URL 2501/25010254.htm; http: http://eprint.iacr.org/ //link.springer.de/link/ 2009/374.pdf. service/series/0558/papers/ 2501/25010254.pdf. Blundo:2000:VCG Biham:2002:LCR [BDN00] Carlo Blundo, Alfredo De [BDK02b] Eli Biham, Orr Dunkel- Santis, and Moni Naor. Vi- man, and Nathan Keller. sual cryptography for grey of re- level images. Informa- duced round serpent. Lec- tion Processing Letters,75 ture Notes in Computer Sci- (6):255–259, November 30, ence, 2355:16–??, 2002. CO- 2000. CODEN IFPLAT. DEN LNCSD9. ISSN 0302- ISSN 0020-0190 (print), 9743 (print), 1611-3349 1872-6119 (electronic). URL (electronic). URL http: http://www.elsevier.nl/ //link.springer-ny.com/ gej-ng/10/23/20/64/31/ link/service/series/0558/ 27/abstract.html; http: bibs/2355/23550016.htm; //www.elsevier.nl/gej- http://link.springer- ng/10/23/20/64/31/27/article. ny.com/link/service/series/ pdf. REFERENCES 144

Bodei:2002:FLD drops.dagstuhl.de/opus/ volltexte/2009/1958. [BDNN02] C. Bodei, P. Degano, F. Nielson, and H. Riis Biryukov:2004:MLA Nielson. Flow logic for Dolev–Yao secrecy in cryp- [BDQ04] Alex Biryukov, Christophe tographic processes. Future De Canni`ere, and Micha¨el Generation Computer Sys- Quisquater. On multiple tems, 18(6):747–756, May linear approximations. In 2002. CODEN FGSEVI. Franklin [Fra04], pages 1– ISSN 0167-739X (print), ?? CODEN LNCSD9. 1872-7115 (electronic). ISBN 3-540-22668-0. ISSN 0302-9743 (print), 1611- Boreale:2002:PTC 3349 (electronic). LCCN 10.1007/b99099. URL [BDP02] Michele Boreale, Rocco http://www.springerlink. De Nicola, and Rosario com/openurl.asp?genre= Pugliese. Proof tech- issue&issn=0302-9743&volume= niques for cryptographic 3152; http://www.springerlink. processes. SIAM Journal com/openurl.asp?genre= on Computing, 31(3):947– volume&id=doi:10.1007/ 986, June 2002. CODEN b99099. SMJCAT. ISSN 0097-5397 (print), 1095-7111 (elec- Baldwin:2009:PSS tronic). URL http:// + epubs.siam.org/sam-bin/ [BDS 09a] Adrian Baldwin, Chris Dal- dbq/article/37786. ton, Simon Shiu, Krzysztof Kostienko, and Qasim Ra- Bertoni:2009:RPK jpoot. Providing secure ser- vices for a virtual infras- [BDPV09] Guido Bertoni, Joan Dae- tructure. Operating Systems men, Micha¨el Peeters, and Review, 43(1):44–51, Jan- Gilles Van Assche. The road uary 2009. CODEN OS- from Panama to Keccak via RED8. ISSN 0163-5980 RadioGat´un. In Helena (print), 1943-586X (elec- Handschuh, Stefan Lucks, tronic). Bart Preneel, and Phillip Rogaway, editors, Symmet- Buchmann:2009:HBD ric Cryptography,number 09031 in Dagstuhl Semi- [BDS09b] Johannes Buchmann, Erik nar Proceedings, page ?? Dahmen, and Michael Szydlo. Schloss Dagstuhl — Leibniz- Hash-based digital signa- Zentrum f¨ur Informatik, ture schemes. In Bernstein Germany, Dagstuhl, Ger- et al. [BBD09], pages 35–94. many, 2009. ISSN 1862- ISBN 3-540-88701-6 (hard- 4405. URL http:// cover), 3-642-10019-8 (soft- REFERENCES 145

cover). LCCN QA76.9.A25 Proceedings, volume 2947 P67 2009. of Lecture Notes in Com- Bertolotti:2008:ERA puter Science. Springer-Ver- lag, Berlin, Germany / Hei- [BDSV08] Ivan Cibrario Bertolotti, delberg, Germany / Lon- Luca Durante, Riccardo don, UK / etc., 2004. CO- Sisto, and Adriano Valen- DEN LNCSD9. ISBN 3-540- zano. Efficient representa- 21018-0. ISSN 0302-9743 tion of the attacker’s knowl- (print), 1611-3349 (elec- edge in cryptographic pro- tronic). LCCN QA76.9.A25 tocols analysis. Formal As- I567 2004. URL http: pects of Computing, 20(3): //link.springer-ny.com/ 303–348, May 2008. CO- link/service/series/0558/ DEN FACME5. ISSN 0934- tocs/t2947.htm; http: 5043 (print), 1433-299X //www.springerlink.com/ (electronic). URL http:// openurl.asp?genre=issue& link.springer.com/article/ issn=0302-9743&volume= 10.1007/s00165-008-0078- 2947; http://www.springerlink. 3. com/openurl.asp?genre= Boneh:2001:MFR volume&id=doi:10.1007/ b95631. [BDTW01] Dan Boneh, Xuhua Ding, Beckman:2002:CAB Gene Tsudik, and Chi Ming Wong. A method for fast [Bec02] Bengt Beckman. Codebreak- revocation of public key cer- ers: Arne Beurling and the tificates and security ca- Swedish crypto program dur- pabilities. In USENIX ing World War II.Amer- [USE01c], page ?? ISBN ican Mathematical Society, 1-880446-18-9, 1-880446-07- Providence, RI, USA, 2002. 3. LCCN QA76.9.A25 U565 ISBN 0-8218-2889-4. xviii 2001. URL http://www. + 259 pp. LCCN D810.C88 usenix.org/publications/ B413 2002. library/proceedings/sec01/ Beebe:2005:CBPd boneh.html. Bao:2004:PKC [Bee05] Nelson H. F. Beebe. A complete bibliography of [BDZ04] Feng Bao, Robert Deng, publications in Designs, and Jianying Zhou, editors. Codes, and Cryptography. Public Key Cryptography— Technical report, Univer- PKC 2004: 7th Interna- sity of Utah, Depart- tional Workshop on Prac- ment of Mathematics, Salt tice and Theory in Pub- Lake City, UT 84112-0090, lic Key Cryptography, Sin- USA, July 6, 2005. 107 gapore, March 1–4, 2004: pp. URL http://www. REFERENCES 146

math.utah.edu/pub/tex/ link/service/series/0558/ bib/index-table-d.html# bibs/2140/21400019.htm; designscodescryptogr. http://link.springer- ny.com/link/service/series/ Bejtlich:2006:EDS 0558/papers/2140/21400019. . [Bej06] Richard Bejtlich. Extrusion pdf detection: security monitor- Bellovin:2004:IRS ing for internal intrusions. Addison-Wesley, Reading, [Bel04] Steven M. Bellovin. Inside MA, USA, 2006. ISBN risks: Spamming, phish- 0-321-34996-2 (paperback). ing, authentication, and pri- xxviii + 385 pp. LCCN vacy. Communications of TK5105.59 .B43 2006. the Association for Comput- ing Machinery, 47(12):144, Bellare:2000:ACC December 2004. CODEN CACMA2. ISSN 0001-0782 [Bel00] Mihir Bellare, editor. Ad- (print), 1557-7317 (elec- vances in cryptology — tronic). CRYPTO 2000: 20th an- nual International Cryptol- Belfield:2007:SUC ogy Conference, Santa Bar- [Bel07a] Richard Belfield. The bara, California, USA, Au- six unsolved ciphers: in- gust 20–24, 2000: proceed- side the mysterious codes ings, volume 1880 of Lec- that have confounded the ture Notes in Computer world’s greatest cryptogra- Science. Springer-Verlag, phers. Ulysses, Berkeley, Berlin, Germany / Hei- CA, USA, 2007. ISBN 1- delberg, Germany / Lon- 56975-628-7 (paperback). ix don, UK / etc., 2000. + 281 + 16 pp. LCCN Z103 ISBN 3-540-67907-3. ISSN .B45 2007. 0302-9743 (print), 1611- 3349 (electronic). LCCN Bella:2007:FCS QA76.9.A25 C79 2000 Bar. [Bel07b] Giampaolo Bella. For- Bella:2001:MPS mal correctness of secu- rity protocols.Informa- [Bel01] Giampaolo Bella. Mecha- tion Security and Cryp- nising a protocol for smart tography. Springer-Verlag, cards. Lecture Notes in Berlin, Germany / Heidel- Computer Science, 2140: berg, Germany / London, 19–??, 2001. CODEN UK / etc., 2007. ISBN 3- LNCSD9. ISSN 0302- 540-68134-5, 3-540-68136-1 9743 (print), 1611-3349 (e-book). ISSN 1619-7100 (electronic). URL http: (print), 2197-845X (elec- //link.springer-ny.com/ tronic). xviii + 274 + 62 REFERENCES 147

pp. LCCN QA8.9-QA10.3; CODEN IBMSA7. ISSN TK5105.59.B45 2007. 0018-8670. URL http: Bello:2008:OPR //www.research.ibm.com/ journal/sj/403/benantar. [Bel08] L. Bello. openssl — html; http://www.research. predictable random number ibm.com/journal/sj/403/ generator. Debian security benantar.pdf. advisory 1571-1., 2008. Benson:2001:VS Bruss:2007:QCS [Ben01b] Robert L. Benson. The [BEM+07] Dagmar Bruss, G´abor Venona story. Report Erd´elyi, Tim Meyer, To- ????, Center for Cryptologic bias Riege, and J¨org Rothe. History, National Security Quantum cryptography: a Agency, Fort Meade, MD, survey. ACM Computing USA, ???? 2001. Surveys, 39(2):1–27, ???? 2007. CODEN CMSVAN. Benantar:2002:IPK ISSN 0360-0300 (print), [Ben02] Messaoud Benantar. In- 1557-7341 (electronic). troduction to the Pub- Benedens:2000:AIW lic Key Infrastructure for the Internet. Prentice- [Ben00] Oliver Benedens. Affine Hall PTR, Upper Saddle invariant watermarks for River, NJ 07458, USA, 3D polygonal and NURBS 2002. ISBN 0-13-060927- based models. Lecture 7. xii + 254 pp. LCCN Notes in Computer Science, QA76.9.A25 B45 2002. 1975:15–??, 2000. CO- US$54.99. URL http:// DEN LNCSD9. ISSN 0302- www.phptr.com/ptrbooks/ 9743 (print), 1611-3349 ptr_0130609277.html. (electronic). URL http: //link.springer-ny.com/ Benson:2004:VS link/service/series/0558/[Ben04] Robert L. Benson. The bibs/1975/19750015.htm; Venona story. Report, Cen- http://link.springer- ter for Cryptologic His- ny.com/link/service/series/ tory, National Security 0558/papers/1975/19750015. Agency, 9800 Savage Road, pdf. Suite 6886, Fort George Benantar:2001:IPK G. Meade, MD 20755-6886, January 15, 2004. 63 pp. [Ben01a] M. Benantar. The Inter- URL https://www.nsa. net public key infrastruc- gov/about/cryptologic- ture. IBM Systems Journal, heritage/historical-figures- 40(3):648–665, ???? 2001. publications/publications/ REFERENCES 148

coldwar/assets/files/venona_ ics, Statistics, and Com- story.pdf. puter Science (M/C 249), The University of Illinois Berson:2000:CE at Chicago, Chicago, IL [Ber00] Thomas A. Berson. Cryp- 60607-7045, December 25, 2007. URL tography everywhere. Lec- http://cr.yp. ture Notes in Computer Sci- to/snuffle/salsafamily- ence, 1976:72–??, 2000. CO- 20071225.pdf. DEN LNCSD9. ISSN 0302- Bernstein:2008:CVS 9743 (print), 1611-3349 (electronic). URL http: [Ber08] Daniel J. Bernstein. ChaCha, //link.springer-ny.com/ a variant of Salsa20. Re- link/service/series/0558/ port, Department of Mathe- bibs/1976/19760072.htm; matics, Statistics, and Com- http://link.springer- puter Science (M/C 249), ny.com/link/service/series/ The University of Illinois at 0558/papers/1976/19760072. Chicago, Chicago, IL 60607- pdf. 7045, January 28, 2008. URL http://cr.yp.to/ Berson:2003:CAB chacha/chacha-20080128. pdf. [Ber03] Tom Berson. Cryptog- raphy after the bubble: Bergmann:2009:DKR How to make an impact on the world. In Joye [Ber09a] Seth D. Bergmann. De- [Joy03b], page 226. CO- generate keys for RSA en- DEN LNCSD9. ISBN 3-540- cryption. SIGCSE Bul- 00847-0. ISSN 0302-9743 letin (ACM Special Inter- (print), 1611-3349 (elec- est Group on Computer Sci- tronic). LCCN QA76.9.A25 ence Education), 41(2):95– C822 2003. URL http: 98, June 2009. CODEN //link.springer-ny.com/ SIGSD3. ISSN 0097-8418 link/service/series/0558/ (print), 2331-3927 (elec- tocs/t2612.htm; http: tronic). //www.springerlink.com/ Bernstein:2009:IPQ openurl.asp?genre=issue& issn=0302-9743&volume= [Ber09b] Daniel J. Bernstein. In- 2612. troduction to post-quantum Bernstein:2007:SFS cryptography. In Bernstein et al. [BBD09], pages 1–14. [Ber07] Daniel J. Bernstein. The ISBN 3-540-88701-6 (hard- Salsa20 family of stream cover), 3-642-10019-8 (soft- ciphers. Report, De- cover). LCCN QA76.9.A25 partment of Mathemat- P67 2009. REFERENCES 149

Bouwmeester:2000:PQI http://csrc.nist.gov/ encryption/aes/round2/ [BEZ00] Dirk Bouwmeester, Ar- conf3/papers/AES3Proceedings- tur K. Ekert, and An- 2.pdf; http://csrc.nist. ton Zeilinger. The physics gov/encryption/aes/round2/ of quantum information: conf3/papers/AES3Proceedings- quantum cryptography, quan- 3.pdf; http://csrc.nist. tum teleportation, quantum gov/encryption/aes/round2/ computation. Springer-Ver- conf3/papers/AES3Proceedings. lag, Berlin, Germany / Hei- pdf. delberg, Germany / Lon- don, UK / etc., 2000. ISBN Biham:2000:IID 3-540-66778-4. xvi + 314 pp. [BF00b] Eli Biham and Vladimir LCCN QA76.889 .P47 2000. Furman. Improved im- Bouwmeester:2001:PQI possible differentials on Twofish. Lecture Notes in [BEZ01] Dirk Bouwmeester, Ar- Computer Science, 1977: tur Ekert, and Anton 80–??, 2000. CODEN Zeilinger, editors. The LNCSD9. ISSN 0302- physics of quantum infor- 9743 (print), 1611-3349 mation: Quantum cryptog- (electronic). URL http: raphy, quantum teleporta- //link.springer-ny.com/ tion, quantum computation. link/service/series/0558/ Physics and astronomy on- bibs/1977/19770080.htm; line library. Springer-Verlag, http://link.springer- Berlin, Germany / Heidel- ny.com/link/service/series/ berg, Germany / London, 0558/papers/1977/19770080. UK / etc., 2001. ISBN 3- pdf. 540-66778-4. xvi + 314 pp. LCCN QA76.889 .P47 2000. Babbage:2001:MHO

Biham:2000:IDR [BF01a] Steve Babbage and Laurent [BF00a] Eli Biham and Vladimir Frisch. On MISTY1 higher Furman. Impossible differ- order differential cryptanal- ential on 8-round MARS’ ysis. Lecture Notes in Com- core. In NIST [NIS00], puter Science, 2015:22–36, pages 186–194. ISBN 2001. CODEN LNCSD9. ???? LCCN ???? ISSN 0302-9743 (print), URL http://csrc.nist. 1611-3349 (electronic). gov/encryption/aes/round2/ Boneh:2001:IBE conf3/aes3conf.htm; http: //csrc.nist.gov/encryption/[BF01b] Dan Boneh and Matt aes/round2/conf3/papers/ Franklin. Identity-based en- AES3Proceedings-1.pdf; cryption from the Weil pair- REFERENCES 150

ing. In Kilian [Kil01a], In Shoup [Sho05a], pages pages 213–?? ISBN 3-540- 412–?? ISBN 3-540- 42456-3 (paperback). LCCN 28114-2. ISSN 0302-9743 QA76.9.A25 C79 2001; (print), 1611-3349 (elec- QA267.A1 L43 no.2139. tronic). LCCN QA76.9.A25 UK£47.00. URL http: C79 2005; QA76.9 .A25; //link.springer-ny.com/ QA76.9 C79 2005; QA76.9 link/service/series/0558/ C794 2005; QA76.9; In- bibs/2139/21390213.htm; ternet. URL http:/ http://link.springer- /www.springerlink.com/ ny.com/link/service/series/ openurl.asp?genre=issue& 0558/papers/2139/21390213. issn=0302-9743&volume= pdf. 3621. Boneh:2001:EGS Bisseling:2006:MSM

[BF01c] Dan Boneh and Matthew [BF06a] Rob H. Bisseling and Ildik´o Franklin. Efficient gener- Flesch. Mondriaan sparse ationofsharedRSAkeys. matrix partitioning for at- Journal of the ACM, 48(4): tacking cryptosystems by a 702–722, July 2001. CO- parallel block Lanczos algo- DEN JACOAH. ISSN 0004- rithm — a case study. Par- 5411 (print), 1557-735X allel Computing, 32(7–8): (electronic). 551–567, September 2006. CODEN PACOEJ. ISSN Boneh:2003:IBE 0167-8191 (print), 1872- 7336 (electronic). [BF03] Dan Boneh and Matthew Franklin. Identity-based Boldyreva:2006:SO encryption from the Weil pairing. SIAM Journal [BF06b] Alexandra Boldyreva and on Computing, 32(3):586– Marc Fischlin. On the secu- 615, June 2003. CODEN rity of OAEP. Lecture Notes SMJCAT. ISSN 0097-5397 in Computer Science, 4284: (print), 1095-7111 (elec- 210–225, 2006. CODEN tronic). URL http:// LNCSD9. ISSN 0302-9743 epubs.siam.org/sam-bin/ (print), 1611-3349 (elec- dbq/article/39852. tronic). URL http://link. springer.com/content/pdf/ Boldyreva:2005:ARO 10.1007/11935230_14.pdf. [BF05] Alexandra Boldyreva and Bhargavan:2008:CVI Marc Fischlin. Analysis of instanti- [BFCZ08] Karthikeyan Bhargavan, ation scenarios for OAEP C´edric Fournet, Ricardo and other practical schemes. Corin, and Eugen Zalinescu. REFERENCES 151

Cryptographically verified CODEN ATPSDT. ISSN implementations for tls.In 0164-0925 (print), 1558- ????, editor, ACM Con- 4593 (electronic). ference on Computer and Communications Security, Bhargavan:2008:VII pages 459–468. ACM Press, [BFGT08] Karthikeyan Bhargavan, New York, NY 10036, USA, C´edric Fournet, Andrew D. 2008. ISBN ???? LCCN Gordon, and Stephen Tse. ???? URL ????. Verified interoperable imple- Bhargavan:2004:SWS mentations of security pro- tocols. ACM Transactions [BFG04] Karthikeyan Bhargavan, on Programming Languages C´edric Fournet, and An- and Systems, 31(1):5:1–5:57, drew D. Gordon. A seman- December 2008. CODEN tics for Web services au- ATPSDT. ISSN 0164-0925 thentication. ACM SIG- (print), 1558-4593 (elec- PLAN Notices, 39(1):198– tronic). 209, January 2004. CODEN SINODQ. ISSN 0362-1340 Bugliesi:2007:DTA (print), 1523-2867 (print), [BFM07] Michele Bugliesi, Riccardo 1558-1160 (electronic). Focardi, and Matteo Maf- Bhargavan:2005:SWS fei. Dynamic types for authentication. Journal [BFG05] Karthikeyan Bhargavan, of Computer Security,15 C´edric Fournet, and An- (6):563–617, ???? 2007. drew D. Gordon. A seman- CODEN JCSIET. ISSN tics for web services authen- 0926-227X (print), 1875- tication. Theoretical Com- 8924 (electronic). puter Science, 340(1):102– 153, June 13, 2005. CODEN Biham:2002:DCQ TCSCDI. ISSN 0304-3975 [BFMR02] Eli Biham, Vladimir Fur- (print), 1879-2294 (elec- man, Michal Misztal, and tronic). Vincent Rijmen. Differential Bhargavan:2008:VPB cryptanalysis of Q. Lecture Notes in Computer Science, [BFG08] Karthikeyan Bhargavan, 2355:174–??, 2002. CO- C´edric Fournet, and An- DEN LNCSD9. ISSN 0302- drew D. Gordon. Verifying 9743 (print), 1611-3349 policy-based web services (electronic). URL http: security. ACM Transac- //link.springer-ny.com/ tions on Programming Lan- link/service/series/0558/ guages and Systems, 30(6): bibs/2355/23550174.htm; 30:1–30:59, October 2008. http://link.springer- REFERENCES 152

ny.com/link/service/series/ http://ieeexplore.ieee. 0558/papers/2355/23550174. org/stamp/stamp.jsp?tp= pdf. &arnumber=4753211. Brown:2007:SAN Blaszczyk:2009:EVT

[BG07a] Daniel R. L. Brown and [BG09] Marta Blaszczyk and Rich- Kristian Gjøsteen. A ard A. Guinee. Experimen- security analysis of the tal validation of a true ran- NIST SP 800-90 ellip- dom binary digit generator tic curve random number fusion with a pseudo ran- generator. In Menezes dom number generator for [Men07], pages 466–481. cryptographic module appli- ISBN 3-540-74142-9 (paper- cation. In IET Irish Sig- back). LCCN QA76.9.A25 nals and Systems Confer- C79 2007. URL http: ence (ISSC 2009), pages 1– //dl.acm.org/citation. 6. IEEE Computer Society cfm?id=1777777.1777815. Press, 1109 Spring Street, Suite 300, Silver Spring, MD Bugliesi:2007:SIT 20910, USA, 2009. URL [BG07b] Michele Bugliesi and Marco http://ieeexplore.ieee. Giunti. Secure implemen- org/stamp/stamp.jsp?tp= tations of typed channel &arnumber=5524689. abstractions. ACM SIG- Barthe:2009:FCC PLAN Notices, 42(1):251– 262, January 2007. CODEN [BGB09] Gilles Barthe, Benjamin SINODQ. ISSN 0362-1340 Gr´egoire, and Santiago Zanella (print), 1523-2867 (print), B´eguelin. Formal certifica- 1558-1160 (electronic). tion of code-based crypto- graphic proofs. ACM SIG- Blaszczyk:2008:NMT PLAN Notices, 44(1):90– 101, January 2009. CODEN [BG08] M. Blaszczyk and R. A. SINODQ. ISSN 0362-1340 Guinee. A novel mod- (print), 1523-2867 (print), elled true random binary 1558-1160 (electronic). number generator for key stream generation in cryp- Boneh:2007:SEI tographic applications. In MILCOM 2008. IEEE Mili- [BGH07] D. Boneh, C. Gentry, and tary Communications Con- M. Hamburg. Space-efficient ference, 2008, pages 1– identity based encryption 7. IEEE Computer Society without pairings. In IEEE Press, 1109 Spring Street, [IEE07], pages 647–657. Suite 300, Silver Spring, MD ISBN 0-7695-3010-9. ISSN 20910, USA, 2008. URL 0272-5428. LCCN QA76 REFERENCES 153

.S974 2007. URL http: 0558/papers/2139/21390001. //ieeexplore.ieee.org/ pdf. servlet/opac?punumber= 4389466. IEEE Com- Bogomjakov:2008:PMD puter Society order number [BGI08] Alexander Bogomjakov, Craig P3010. Gotsman, and Martin Isen- Bennett:2002:ESE burg. Points and meshes: Distortion-free steganogra- [BGHP02] Krista Bennett, Christian phy for polygonal meshes. Grothoff, Tzvetan Horozov, Computer Graphics Forum, and Ioana Patrascu. Effi- 27(2):637–642, April 2008. cient sharing of encrypted CODEN CGFODY. ISSN data. Lecture Notes in 0167-7055 (print), 1467- Computer Science, 2384: 8659 (electronic). 107–??, 2002. CODEN LNCSD9. ISSN 0302- Bertoni:2003:EAA 9743 (print), 1611-3349 (electronic). URL http: [BGK+03] Guido Bertoni, Jorge Gua- //link.springer-ny.com/ jardo, Sandeep Kumar, link/service/series/0558/ Gerardo Orlando, Christof bibs/2384/23840107.htm; Paar, and Thomas Wollinger. http://link.springer- Efficient GF (pm) arithmetic ny.com/link/service/series/ architectures for crypto- 0558/papers/2384/23840107. graphic applications. In pdf. Joye [Joy03b], pages 158– 175. CODEN LNCSD9. Barak:2001:IPO ISBN 3-540-00847-0. ISSN [BGI+01] Boaz Barak, Oded Gol- 0302-9743 (print), 1611- dreich, Rusell Impagliazzo, 3349 (electronic). LCCN Steven Rudich, Amit Sahai, QA76.9.A25 C822 2003. Salil Vadhan, and Ke Yang. URL http://link.springer- On the (im)possibility of ny.com/link/service/series/ obfuscating programs. In 0558/tocs/t2612.htm; Kilian [Kil01a], pages 1– http://www.springerlink. ?? ISBN 3-540-42456- com/openurl.asp?genre= 3 (paperback). LCCN issue&issn=0302-9743&volume= QA76.9.A25 C79 2001; 2612. QA267.A1 L43 no.2139. Bucci:2003:HSO UK£47.00. URL http: //link.springer-ny.com/ [BGL+03] M. Bucci, L. Germani, link/service/series/0558/ R. Luzzi, A. Trifiletti, and bibs/2139/21390001.htm; M. Varanonuovo. A high- http://link.springer- speed oscillator-based truly ny.com/link/service/series/ random number source for REFERENCES 154

cryptographic applications of the Bennett–Brassard on a smart card IC. IEEE Transactions on Computers, protocol against collec- 52(4):403–409, April 2003. tive attacks. Algorithms CODEN ITCOB4. ISSN (Basel), 2(2):790–807, June 0018-9340 (print), 1557- 2009. CODEN ALGOCH. 9956 (electronic). URL ISSN 1999-4893 (electronic). http://ieeexplore.ieee. URL https://www.mdpi. org/stamp/stamp.jsp?tp= com/1999-4893/2/2/790. &arnumber=1190581. Boneh:2005:EDF Boneh:2003:AVE [BGLS03] Dan Boneh, Craig Gen- [BGN05] Dan Boneh, Eu-Jin Goh, try, Ben Lynn, and Ho- and Kobbi Nissim. Eval- vav Shacham. Aggregate uating 2-DNF formulas and verifiably encrypted on ciphertexts. In Kil- signatures from bilinear ian [Kil05], pages 325– maps. Lecture Notes in ?? CODEN LNCSD9. Computer Science, 2656: ISBN 3-540-24573-1 (soft- 416–432, 2003. CODEN cover). ISSN 0302-9743 LNCSD9. ISSN 0302-9743 (print), 1611-3349 (elec- (print), 1611-3349 (elec- tronic). LCCN QA76.9.A25 tronic). URL http://link. T44 2005. URL http: springer.com/content/pdf/ //www.springerlink.com/ 10.1007/3-540-39200-9_ openurl.asp?genre=issue& 26.pdf. issn=0302-9743&volume= 3378; http://www.springerlink. Branovic:2004:WCE com/openurl.asp?genre= [BGM04] I. Branovic, R. Giorgi, volume&id=doi:10.1007/ and E. Martinelli. A b106171. workload characterization Boldyreva:2008:NMS of elliptic curve cryptog- raphy methods in embed- [BGOY08] Alexandra Boldyreva, Craig ded environments. ACM Gentry, Adam O’Neill, and SIGARCH Computer Ar- Dae Hyun Yum. New mul- chitecture News, 32(3):27– tiparty signature schemes 34, June 2004. CODEN for network routing appli- CANED2. ISSN 0163-5964 cations. ACM Transac- (print), 1943-5851 (elec- tions on Information and tronic). System Security, 12(1):3:1– 3:??, October 2008. CODEN Boyer:2009:SBB ATISBQ. ISSN 1094-9224 [BGM09] Michel Boyer, Ran Gelles, (print), 1557-7406 (elec- and Tal Mor. Security tronic). REFERENCES 155

Bergadano:2002:UAT 9.dvi; http://www.ams. org/mcom/2005-74-251/S0025- [BGP02] Francesco Bergadano, Daniele 5718-04-01698-9/S0025- Gunetti, and Claudia Pi- 5718-04-01698-9.pdf; cardi. User authentica- http://www.ams.org/mcom/ tion through keystroke dy- 2005-74-251/S0025-5718- namics. ACM Transactions 04-01698-9/S0025-5718- on Information and Sys- 04-01698-9.ps; http:/ tem Security, 5(4):367–397, /www.ams.org/mcom/2005- November 2002. CODEN 74-251/S0025-5718-04-01698- ATISBQ. ISSN 1094-9224 9/S0025-5718-04-01698- (print), 1557-7406 (elec- 9.tex; http://www.jstor. tronic). org/stable/pdfplus/4100190. Berbain:2009:QMS pdf. [BGP09] Cˆome Berbain, Henri Gilbert, Boneh:2005:CRB and Jacques Patarin. QUAD: [BGW05] Dan Boneh, Craig Gentry, a multivariate stream ci- and Brent Waters. Col- pher with provable security. lusion resistant broadcast Journal of Symbolic Com- encryption with short ci- putation, 44(12):1703–1723, phertexts and private keys. December 2009. CODEN In Shoup [Sho05a], pages JSYCEH. ISSN 0747-7171 258–?? ISBN 3-540- (print), 1095-855X (elec- 28114-2. ISSN 0302-9743 tronic). (print), 1611-3349 (elec- Blackburn:2005:PNP tronic). LCCN QA76.9.A25 C79 2005; QA76.9 .A25; [BGPGS05] Simon R. Blackburn, Domingo QA76.9 C79 2005; QA76.9 Gomez-Perez, Jaime Gutier- C794 2005; QA76.9; In- rez, and Igor E. Shparlin- ternet. URL http:/ ski. Predicting nonlinear /www.springerlink.com/ pseudorandom number gen- openurl.asp?genre=issue& erators. Mathematics of issn=0302-9743&volume= Computation, 74(251):1471– 3621. 1494, July 2005. CODEN Beck:2000:FSD MCMPAF. ISSN 0025-5718 (print), 1088-6842 (elec- [BH00a] Robert Beck and Steve tronic). URL http:// Holstead. FOKSTRAUT www.ams.org/mcom/2005- and Samba — dealing with 74-251/S0025-5718-04-01698- authentication and perfor- 9/home.html; http:// mance issues on a large-scale www.ams.org/mcom/2005- Samba service. In USENIX 74-251/S0025-5718-04-01698- [USE00c], page ?? ISBN 9/S0025-5718-04-01698- 1-880446-13-8. LCCN ???? REFERENCES 156

URL http://www.usenix. Backhouse:2003:TOT org/publications/library/ proceedings/lisa2000/beck.[BHM03] James Backhouse, Carol html. Hsu, and Aidan McDonnell. Technical opinion: Toward Bialaski:2000:SLN public-key infrastructure in- teroperability. Communi- [BH00b] Tom Bialaski and Mich- cations of the Association ael Haines. Solaris and for Computing Machinery, LDAP Naming Services: 46(6):98–100, June 2003. Deploying LDAP in the En- CODEN CACMA2. ISSN terprise. Sun BluePrints 0001-0782 (print), 1557- Program. Sun Microsys- 7317 (electronic). tems Press, Palo Alto, CA, USA, 2000. ISBN 0-13- Bajard:2004:FRI 030678-9. xxvii + 372 pp. LCCN QA76.76.O63B518 [BI04] J.-C. Bajard and L. Im- 2001. URL books/ldap. bert. A full RNS imple- pdf; http://www.sun. mentation of RSA. IEEE com/books/catalog/haines/ Transactions on Computers, . Part No. 806-2893-10 Oc- 53(6):769–774, June 2004. tober 2000. CODEN ITCOB4. ISSN 0018-9340 (print), 1557- Barak:2005:MAP 9956 (electronic). URL http://ieeexplore.ieee. [BH05] B. Barak and S. Halevi. org/stamp/stamp.jsp?tp= A model and architecture &arnumber=1288551. for pseudo-ransom genera- tion with applications to Barkol:2005:SCC /dev/random.InMead-[BI05a] Omer Barkol and Yuval ows and Syverson [MS05b], Ishai. Secure computa- pages 203–212. ISBN tion of constant-depth cir- 1-59593-226-7. LCCN cuits with applications to QA76.9.A25. ACM order database search problems. number 459050. In Shoup [Sho05a], pages Badra:2006:KEA 395–?? ISBN 3-540- 28114-2. ISSN 0302-9743 [BH06] Mohamad Badra and Ibrahim (print), 1611-3349 (elec- Hajjeh. Key-exchange au- tronic). LCCN QA76.9.A25 thentication using shared se- C79 2005; QA76.9 .A25; crets. Computer, 39(3):58– QA76.9 C79 2005; QA76.9 66, March 2006. CODEN C794 2005; QA76.9; In- CPTRB4. ISSN 0018-9162 ternet. URL http:/ (print), 1558-0814 (elec- /www.springerlink.com/ tronic). openurl.asp?genre=issue& REFERENCES 157

issn=0302-9743&volume= Cryptography. Springer 3621. undergraduate mathemat- Beimel:2005:PNS ics series. Springer-Verlag, Berlin, Germany / Heidel- [BI05b] Amos Beimel and Yuval berg, Germany / London, Ishai. On the power UK / etc., 2008. ISBN of nonlinear secret-sharing. 1-84800-273-4 (e-book), 1- SIAM Journal on Discrete 84800-272-6 (paperback). x Mathematics, 19(1):258– + 273 pp. LCCN QA268 280, 2005. CODEN SJD- .B496 2008eb. MEC. ISSN 0895-4801 Biham:2000:CPR (print), 1095-7146 (elec- tronic). URL http:// [Bih00] Eli Biham. Cryptanalysis epubs.siam.org/sam-bin/ of Patarin’s 2-round pub- dbq/article/41286. lic key system with S boxes (2R). Lecture Notes in Bi:2009:MCE Computer Science, 1807: [Bi09] Chengpeng Bi. A Monte 408–??, 2000. CODEN Carlo EM algorithm for LNCSD9. ISSN 0302- De Novo Motif discovery 9743 (print), 1611-3349 in biomolecular sequences. (electronic). URL http: IEEE/ACM Transactions //link.springer-ny.com/ on Computational Biology link/service/series/0558/ and Bioinformatics, 6(3): bibs/1807/18070408.htm; 370–386, July 2009. CO- http://link.springer- DEN ITCBCY. ISSN 1545- ny.com/link/service/series/ 5963 (print), 1557-9964 0558/papers/1807/18070408. (electronic). pdf.

Bidgoli:2003:EIS Biham:2002:HDE

[Bid03] Hossein Bidgoli, editor. En- [Bih02] Eli Biham. How to de- cyclopedia of information crypt or even substitute systems. Academic Press, DES-encrypted messages in 28 New York, NY, USA, 2003. 2 steps. Information Pro- ISBN 0-12-227240-4. various cessing Letters, 84(3):117– pp. LCCN QA76.15 .E516 124, November 15, 2002. 2003. US$1,200.00. Four CODEN IFPLAT. ISSN volumes. 0020-0190 (print), 1872- 6119 (electronic). Biggs:2008:CII Biham:2003:ACE [Big08] Norman Biggs. Codes: An introduction to Infor- [Bih03] Eli Biham, editor. Ad- mation Communication and vances in cryptology — EU- REFERENCES 158

ROCRYPT 2003: Interna- 0558/papers/1880/18800055. tional Conference on the pdf. Theory and Applications of Cryptographic Techniques, Bajard:2003:EMG Warsaw, Poland, May 4–8, [BINP03] J.-C. Bajard, L. Imbert, 2003: Proceedings,volume C. Negre, and T. Plantard. 2656 of Lecture Notes in Efficient multiplication in Computer Science. Spring- GF(p ) for elliptic curve er-Verlag, Berlin, Ger- k cryptography. In Bajard many / Heidelberg, Ger- and Schulte [BS03], pages many / London, UK / etc., 181–187. ISBN 0-7695- 2003. CODEN LNCSD9. 1894-X. ISSN 1063-6889. ISBN 3-540-14039-5 (pa- LCCN ???? URL http:// perback). ISSN 0302-9743 www.dec.usc.es/arith16/ (print), 1611-3349 (elec- . IEEE order no. PR01894. tronic). LCCN QA76.9.A25 E964 2003. URL http: Bajard:2005:AOP //link.springer-ny.com/ [BIP05] Jean-Claude Bajard, Lau- link/service/series/0558/ rent Imbert, and Tho- tocs/t2656.htm; http: mas Plantard. Arith- //www.springerlink.com/ metic operations in the openurl.asp?genre=issue& polynomial modular num- issn=0302-9743&volume= ber system. In IEEE 2656. Also available via the World Wide Web. [IEE05b], page ?? ISBN ???? LCCN ???? URL Beimel:2000:RSC http://arith17.polito. it/final/paper-168.pdf. [BIM00] Amos Beimel, Yuval Ishai, Biryukov:2007:FSE and Tal Malkin. Reduc- ing the servers computation [Bir07] Alex Biryukov, editor. in private information re- Fast software encryption: trieval: PIR with prepro- 14th international work- cessing. In Bellare [Bel00], shop, FSE 2007, Luxem- pages 55–?? ISBN 3-540- bourg, Luxembourg, March 67907-3. ISSN 0302-9743 26–28, 2007, revised se- (print), 1611-3349 (elec- lected papers, volume 4593 tronic). LCCN QA76.9.A25 of Lecture notes in com- C79 2000 Bar. URL http: puter science. Springer-Ver- //link.springer-ny.com/ lag, Berlin, Germany / Hei- link/service/series/0558/ delberg, Germany / Lon- bibs/1880/18800055.htm; don, UK / etc., 2007. http://link.springer- ISBN 3-540-74617-X (soft- ny.com/link/service/series/ cover). LCCN QA76.9.A25 REFERENCES 159

F77 2007. URL http: LCCN QA76.9.A25 B69 //www.springerlink.com/ 2002. US$44.95. openurl.asp?genre=book\ Blaser:2002:PCC %26isbn=978-3-540-74617- 1. [BJLS02] Markus Bl¨aser, Andreas Bishop:2003:ICJ Jakoby, Maciej Liskiewicz, and Bodo Siebert. Private [Bis03a] David Bishop. Introduction computation — k-connected to cryptography with Java versus 1-connected net- applets. Jones and Bartlett, works. In Yung [Yun02a], Boston, MA, USA, 2003. pages 194–209. CODEN ISBN 0-7637-2207-3. xvi + LNCSD9. ISBN 3-540- 370 pp. LCCN QA76.9.A25 44050-X (paperback). ISSN B565 2003. 0302-9743 (print), 1611- 3349 (electronic). LCCN Bishop:2003:CSA QA76.9.A25 C79 2002. URL [Bis03b] Matt Bishop. Computer http://link.springer-ny. Security: Art and Science. com/link/service/series/ Addison-Wesley, Reading, 0558/tocs/t2442.htm; MA, USA, 2003. ISBN http://www.springerlink. 0-201-44099-7 (hardcover). com/openurl.asp?genre= xli + 1084 pp. LCCN issue&issn=0302-9743&volume= QA76.9.A25 B56 2002. 2442. US$79.99, CAN$120.99. Boneh:2000:WTE Barkol:2008:CPR [BJN00] Dan Boneh, Antoine Joux, and Phong Q. Nguyen. [BIW08] Omer Barkol, Yuval Ishai, Why textbook ElGamal and and Enav Weinreb. Com- RSA encryption are inse- munication in the presence cure (extended abstract). of replication. In ACM In Advances in cryptology— [ACM08], pages 661–670. ASIACRYPT 2000 (Ky- ISBN 1-60558-047-3. LCCN oto), volume 1976 of Lec- QA76.6 .A152 2008. ture Notes in Comput. Boyce:2002:IAM Sci., pages 30–43. Spring- er-Verlag, Berlin, Ger- [BJ02] Joseph G. Boyce and many / Heidelberg, Ger- Dan W. Jennings. Infor- many / London, UK / mation assurance: manag- etc., 2000. URL http: ing organizational IT se- //link.springer-ny.com/ curity risks. Butterworth- link/service/series/0558/ Heinemann, Boston, MA, bibs/1976/19760030.htm; USA, 2002. ISBN 0-7506- http://link.springer- 7327-3. xxi + 261 pp. ny.com/link/service/series/ REFERENCES 160

0558/papers/1976/19760030. LNCSD9. ISSN 0302- pdf. 9743 (print), 1611-3349 (electronic). URL http: Bjorn:2005:BHM //link.springer-ny.com/ [Bjo05] Vance Bjorn. Biometrics hit link/service/series/0558/ the mainstream: an analy- bibs/2422/24220304.htm; sis of security and privacy http://link.springer- implications. In Meadows ny.com/link/service/series/ and Syverson [MS05b], page 0558/papers/2422/24220304. . 407. ISBN 1-59593-226-7. pdf LCCN QA76.9.A25. ACM Boni:2000:NGT order number 459050. [BK00] William Boni and Ger- Backes:2002:DCS ald L. Kovacich. Netspi- [BJP02] Michael Backes, Christian onage: the global threat to Jacobi, and Birgit Pfitz- information. Butterworth- mann. Deriving crypto- Heinemann, Boston, MA, graphically sound imple- USA, 2000. ISBN 0-7506- mentations using compo- 7257-9. xx + 260 pp. sition and formally veri- LCCN HV6773 .B665 2000. fied bisimulation. Lecture US$34.95. Notes in Computer Science, Burnside:2005:CCP 2391:310–??, 2002. CO- DEN LNCSD9. ISSN 0302- [BK05] Matthew Burnside and An- 9743 (print), 1611-3349 gelos D. Keromytis. The (electronic). URL http: case for crypto protocol //link.springer-ny.com/ awareness inside the OS ker- link/service/series/0558/ nel. ACM SIGARCH Com- bibs/2391/23910310.htm; puter Architecture News, http://link.springer- 33(1):58–64, March 2005. ny.com/link/service/series/ CODEN CANED2. ISSN 0558/papers/2391/23910310. 0163-5964 (print), 1943- pdf. 5851 (electronic).

Breunesse:2002:SVD Barker:2006:RRN

[BJvdB02] Cees-Bart Breunesse, Bart [BK06a] Elaine Barker and John Jacobs, and Joachim van den Kelsey. Recommendation Berg. Specifying and ver- for Random Number Gen- ifying a decimal represen- eration Using Determinis- tation in Java for Smart tic Random Bit Genera- Cards. Lecture Notes in tors. National Institute for Computer Science, 2422: Standards and Technology, 304–??, 2002. CODEN Gaithersburg, MD 20899- REFERENCES 161

8900, USA, 2006. viii + Yung [Yun02a], pages 354– 123 pp. URL http://csrc. 368. CODEN LNCSD9. nist.gov/publications/ ISBN 3-540-44050-X (pa- nistpubs/800-90/SP800- perback). ISSN 0302-9743 90_DRBG-June2006-final. (print), 1611-3349 (elec- pdf. tronic). LCCN QA76.9.A25 C79 2002. URL http:/ Breveglieri:2006:GEI /link.springer.de/link/ [BK06b] L. Breveglieri and I. Koren. service/series/0558/bibs/ Guest Editors’ introduction: 2442/24420354.htm; http: Special section on fault diag- //link.springer.de/link/ nosis and tolerance in cryp- service/series/0558/papers/ tography. IEEE Transac- 2442/24420354.pdf. tions on Computers, 55(9): Breveglieri:2007:OCA 1073–1074, September 2006. CODEN ITCOB4. ISSN [BKM07] L. Breveglieri, I. Koren, and 0018-9340 (print), 1557- P. Maistri. An operation- 9956 (electronic). URL centered approach to fault http://ieeexplore.ieee. detectioninsymmetric org/stamp/stamp.jsp?tp= cryptography ciphers. IEEE &arnumber=1668034. Transactions on Computers, Barker:2007:RRN 56(5):635–649, May 2007. CODEN ITCOB4. ISSN [BK07] Elaine Barker and John 0018-9340 (print), 1557- Kelsey. Recommendation 9956 (electronic). URL for random number gen- http://ieeexplore.ieee. eration using determinis- org/stamp/stamp.jsp?tp= tic random bit generators &arnumber=4118667. (revised). National In- Bellare:2004:BPR stitute for Standards and Technology, Gaithersburg, [BKN04] Mihir Bellare, Tadayoshi MD 20899-8900, USA, Kohno, and Chanathip March 2007. viii + 124 Namprempre. Breaking pp. URL http://csrc. and provably repairing the nist.gov/publications/ SSH authenticated encryp- nistpubs/800-90/SP800- tion scheme: a case study 90revised_March2007.pdf. of the encode-then-encrypt- and-MAC paradigm. ACM Barreto:2002:EAP Transactions on Informa- [BKLS02] PauloS.L.M.Barreto, tion and System Security, Hae Y. Kim, Ben Lynn, 7(2):206–241, May 2004. and Michael Scott. Effi- CODEN ATISBQ. ISSN cient algorithms for pairing- 1094-9224 (print), 1557- based cryptosystems. In 7406 (electronic). REFERENCES 162

Bajard:2009:SRB cryption. Lecture Notes in Computer Science, 2355: [BKP09] J. C. Bajard, M. Kaihara, 109–??, 2002. CODEN and T. Plantard. Selected LNCSD9. ISSN 0302- RNS bases for modular mul- 9743 (print), 1611-3349 tiplication. In Bruguera (electronic). URL http: et al. [BCDH09], pages 25– //link.springer-ny.com/ 31. ISBN 0-7695-3670-0, 1- link/service/series/0558/ 4244-4329-6. ISSN 1063- bibs/2355/23550109.htm; 6889. LCCN QA76.6 .S887 http://link.springer- 2009. URL http://www.ac. ny.com/link/service/series/ usc.es/arith19/. 0558/papers/2355/23550109. Bellare:2000:SCB pdf. [BKR00] Mihir Bellare, Joe Kilian, Broadfoot:2002:ASA and Phillip Rogaway. The security of the cipher block [BL02] Philippa Broadfoot and chaining message authen- Gavin Lowe. Analysing a tication code. Journal of stream authentication pro- Computer and System Sci- tocol using model check- ences, 61(3):362–399, De- ing. Lecture Notes in cember 2000. CODEN JC- Computer Science, 2502: SSBM. ISSN 0022-0000 146–??, 2002. CODEN (print), 1090-2724 (elec- LNCSD9. ISSN 0302-9743 tronic). URL http:// (print), 1611-3349 (elec- www.sciencedirect.com/ tronic). URL http:// science/article/pii/S002200009991694X. link.springer.de/link/ service/series/0558/bibs/ Blum:2003:NTL 2502/25020146.htm; http: [BKW03] Avrim Blum, Adam Kalai, //link.springer.de/link/ and Hal Wasserman. Noise- service/series/0558/papers/ tolerant learning, the par- 2502/25020146.pdf. ity problem, and the sta- Bucci:2008:FDR tistical query model. Jour- nal of the ACM, 50(4):506– [BL08] M. Bucci and R. Luzzi. Fully 519, July 2003. CODEN digital random bit genera- JACOAH. ISSN 0004-5411 tors for cryptographic ap- (print), 1557-735X (elec- plications. IEEE Transac- tronic). tions on Circuits and Sys- tems I: Regular Papers,55 Buonanno:2002:IUE (3):861–875, ???? 2008. [BKY02] Enrico Buonanno, Jonathan CODEN ???? ISSN Katz, and Moti Yung. In- 1549-8328 (print), 1558- cremental unforgeable en- 0806 (electronic). URL REFERENCES 163

http://ieeexplore.ieee. Blaze:2001:LYS org/stamp/stamp.jsp?tp= &arnumber=4432925. [Bla01c] Matt Blaze. Loaning your Black:2000:TDE soul to the devil: Influencing policy without selling out, [Bla00] Michael Andrew Black. A 2001. Unpublished invited treatise on data encryp- talk, Tenth USENIX Secu- tion and an example of rity Symposium, August 13– the black algorithm. The- 17, 2001, Washington, DC, sis (M.A.), University of USA. California, Santa Barbara, Santa Barbara, CA, USA, Blanchet:2002:SAS 2000. [Bla02a] Bruno Blanchet. From se- Blanchet:2001:ACP crecy to authenticity in se- curity protocols. Lecture [Bla01a] Bruno Blanchet. Abstract- Notes in Computer Science, ing cryptographic protocols 2477:342–??, 2002. CO- by Prolog rules. Lecture DEN LNCSD9. ISSN 0302- Notes in Computer Science, 9743 (print), 1611-3349 2126:433–??, 2001. CO- (electronic). URL http: DEN LNCSD9. ISSN 0302- //link.springer-ny.com/ 9743 (print), 1611-3349 link/service/series/0558/ (electronic). URL http: bibs/2477/24770342.htm; //link.springer-ny.com/ http://link.springer- link/service/series/0558/ ny.com/link/service/series/ bibs/2126/21260433.htm; 0558/papers/2477/24770342. http://link.springer- pdf. ny.com/link/service/series/ 0558/papers/2126/21260433. Blaze:2002:CI pdf. Blanchet:2001:ECP [Bla02b] Matt Blaze. Cryptography and insecurity. In USENIX [Bla01b] Bruno Blanchet. An effi- [USE02a], pages viii + 151. cient cryptographic proto- ISBN 1-880446-02-2. LCCN col verifier based on prolog QA76.76.O63 B736 2002. rules. In ????, editor, IEEE URL http://www.usenix. Computer Security Founda- org/publications/library/ tions Workshop, page 82. proceedings/bsdcon02/tech. IEEE Computer Society html. Unpublished in- Press, 1109 Spring Street, vited talk, BSDCON2002: Suite 300, Silver Spring, MD Growing the BSD Commu- 20910, USA, 2001. ISBN nity, February 11–14, 2002, ???? LCCN ???? URL ? Cathedral Hill Hotel, San ???. Francisco, CA. REFERENCES 164

Blaze:2003:FCI ogy, security, economics, volume 26 of Advances in in- [Bla03] Matt Blaze, editor. Fi- formation security. Spring- nancial cryptography: 6th er-Verlag, Berlin, Ger- International Conference, many / Heidelberg, Ger- FC 2002, Southampton, many / London, UK / etc., Bermuda, March 11–14, 2007. ISBN 0-387-29313- 2002: Revised Papers, 2 (hardcover). xxiii + 248 volume 2357 of Lecture pp. LCCN HE6125 .B545 Notes in Computer Science. 2007. URL http://www. Springer-Verlag, Berlin, loc.gov/catdir/enhancements/ Germany / Heidelberg, Ger- fy0824/2006933129-b.html; many / London, UK / etc., http://www.loc.gov/catdir/ 2003. CODEN LNCSD9. enhancements/fy0824/2006933129- ISBN 3-540-00646-X (soft- d.html; http://www.loc. cover). ISSN 0302-9743 gov/catdir/toc/fy0801/ (print), 1611-3349 (elec- 2006933129.html. tronic). LCCN HG1710 Bao:2006:CIB .F35 2002. URL http: //link.springer-ny.com/ [BLH06] Feng Bao, Cheng-Chi Lee, link/service/series/0558/ and Min-Shiang Hwang. tocs/t2357.htm; http: Cryptanalysis and improve- //www.springerlink.com/ ment on batch verifying openurl.asp?genre=issue& multiple RSA digital signa- issn=0302-9743&volume= tures. Applied Mathemat- 2357. ics and Computation, 172 Burmester:2009:UCR (2):1195–1200, January 15, 2006. CODEN AMHCBQ. [BLDT09] Mike Burmester, Tri Van ISSN 0096-3003 (print), Le, Breno De Medeiros, and 1873-5649 (electronic). Gene Tsudik. Universally composable RFID identifi- Berbecaru:2001:CPK cation and authentication [BLM01] Diana Berbecaru, Anto- protocols. ACM Transac- nio Lioy, and Marius Mar- tions on Information and ian. On the complex- System Security, 12(4):21:1– ity of public-key certifi- 21:??, April 2009. CODEN cate validation. Lecture ATISBQ. ISSN 1094-9224 Notes in Computer Science, (print), 1557-7406 (elec- 2200:183–??, 2001. CO- tronic). DEN LNCSD9. ISSN 0302- Bleumer:2007:EPS 9743 (print), 1611-3349 (electronic). URL http: [Ble07] Gerrit Bleumer. Electronic //link.springer-ny.com/ postage systems: technol- link/service/series/0558/ REFERENCES 165

bibs/2200/22000183.htm; Buchmann:2009:PQC http://link.springer- ny.com/link/service/series/[BLRS09] Johannes Buchmann, Rich- 0558/papers/2200/22000183. ard Lindner, Markus R¨uckert, pdf. and Michael Schneider. Post-quantum cryptogra- Brassard:2000:SAP phy: lattice signatures. Computing, 85(1–2):105– 125, June 2009. CODEN [BLMS00] Gilles Brassard, Norbert CMPTA2. ISSN 0010- L¨utkenhaus, Tal Mor, and 485X (print), 1436-5057 Barry C. Sanders. Security (electronic). URL http: aspects of practical quan- //www.springerlink.com/ tum cryptography. Lecture openurl.asp?genre=article& Notes in Computer Science, issn=0010-485X&volume= 1807:289–??, 2000. CO- 85&issue=1&spage=105. DEN LNCSD9. ISSN 0302- 9743 (print), 1611-3349 Banks:2001:CAS (electronic). URL http: //link.springer-ny.com/ [BLST01] William D. Banks, Daniel link/service/series/0558/ Lieman, Igor E. Shpar- bibs/1807/18070289.htm; linski, and Van Thuong http://link.springer- To. Cryptographic appli- ny.com/link/service/series/ cations of sparse polynomi- 0558/papers/1807/18070289. als over finite rings. Lecture pdf. Notes in Computer Science, 2015:206–??, 2001. CO- Bozga:2006:PBA DEN LNCSD9. ISSN 0302- 9743 (print), 1611-3349 (electronic). URL http: [BLP06] L. Bozga, Y. Lakhnech, and //link.springer-ny.com/ M. P´erin. Pattern-based ab- link/service/series/0558/ straction for verifying se- bibs/2015/20150206.htm; crecy in protocols. Inter- http://link.springer- national Journal on Soft- ny.com/link/service/series/ ware Tools for Technology 0558/papers/2015/20150206. Transfer: STTT, 8(1):57– pdf. 76, February 2006. CO- DEN ???? ISSN 1433- Blunden:2009:RAE 2779 (print), 1433-2787 (electronic). URL http: [Blu09] Bill Blunden. The rootkit //www.springerlink.com/ arsenal: escape and eva- openurl.asp?genre=article& sion in the dark corners of issn=1433-2779&volume= the system. Wordware Pub- 8&issue=1&spage=57. lishing, Plano, TX, USA, REFERENCES 166

2009. ISBN 1-59822-061- attacks on MACs based 6 (paperback). xxvii + on properties of crypto- 908 pp. LCCN QA76.9.A25 graphic APIs. Lecture B585 2009. Notes in Computer Science, 2260:63–??, 2001. CO- Batina:2001:AWD DEN LNCSD9. ISSN 0302- [BM01a] Lejla Batina and Geeke 9743 (print), 1611-3349 Muurling. Another way (electronic). URL http: of doing RSA cryptogra- //link.springer-ny.com/ phy in hardware. Lecture link/service/series/0558/ Notes in Computer Science, bibs/2260/22600063.htm; 2260:364–??, 2001. CO- http://link.springer- DEN LNCSD9. ISSN 0302- ny.com/link/service/series/ 9743 (print), 1611-3349 0558/papers/2260/22600063. (electronic). URL http: pdf. //link.springer-ny.com/ Basu:2003:AC link/service/series/0558/ bibs/2260/22600364.htm; [BM03a] Amit Basu and Steve http://link.springer- Muylle. Authentication in e- ny.com/link/service/series/ commerce. Communications 0558/papers/2260/22600364. of the Association for Com- pdf. puting Machinery, 46(12): Blomer:2001:LSE 159–166, December 2003. CODEN CACMA2. ISSN [BM01b] Johannes Bl¨omer and Alexan- 0001-0782 (print), 1557- der May. Low secret expo- 7317 (electronic). nent RSA revisited. Lec- ture Notes in Computer Sci- Blomer:2003:NPK ence, 2146:4–??, 2001. CO- [BM03b] Johannes Bl¨omer and Alexan- DEN LNCSD9. ISSN 0302- der May. New partial 9743 (print), 1611-3349 key exposure attacks on (electronic). URL http: RSA. In Boneh [Bon03], //link.springer-ny.com/ pages 27–43. CODEN link/service/series/0558/ LNCSD9. ISBN 3-540- bibs/2146/21460004.htm; 40674-3. ISSN 0302-9743 http://link.springer- (print), 1611-3349 (elec- ny.com/link/service/series/ tronic). LCCN QA76.9.A25 0558/papers/2146/21460004. C79 2003. URL http: pdf. //link.springer-ny.com/ Brincat:2001:KRA link/service/series/0558/ tocs/t2729.htm; http: [BM01c] Karl Brincat and Chris J. //www.springerlink.com/ Mitchell. Key recovery openurl.asp?genre=issue& REFERENCES 167

issn=0302-9743&volume= Review, 34(5):178–189, De- 2729; http://www.springerlink. cember 2000. CODEN OS- com/openurl.asp?genre= RED8. ISSN 0163-5980 volume&id=doi:10.1007/ (print), 1943-586X (elec- b11817. tronic). Boyd:2003:PAK Burke:2000:ASFc

[BM03c] Colin Boyd and Anish [BMA00c] Jerome Burke, John Mc- Mathuria. Protocols for Donald, and Todd Austin. Authentication and Key Architectural support for Establishment.Informa- fast symmetric-key cryptog- tion Security and Cryp- raphy. ACM SIGPLAN tography. Springer-Verlag, Notices, 35(11):178–189, Berlin, Germany / Heidel- November 2000. CODEN berg, Germany / London, SINODQ. ISSN 0362-1340 UK / etc., 2003. ISBN (print), 1523-2867 (print), 3-662-09527-0 (e-book), 3- 1558-1160 (electronic). 642-07716-1. ISSN 1619- 7100 (print), 2197-845X Boneh:2000:GRK (electronic). xxiv + 323 pp. [BMK00] Dan Boneh, Nagendra LCCN QA76.9.A25. URL Modadugu, and Michael http://www.springerlink. Kim. Generating RSA keys com/content/978-3-662- on a handheld using an 09527-0. untrusted server. Lecture Burke:2000:ASFa Notes in Computer Science, 1977:271–??, 2000. CO- [BMA00a] Jerome Burke, John Mc- DEN LNCSD9. ISSN 0302- Donald, and Todd Austin. 9743 (print), 1611-3349 Architectural support for (electronic). URL http: fast symmetric-key cryptog- //link.springer-ny.com/ raphy. ACM SIGARCH link/service/series/0558/ Computer Architecture News, bibs/1977/19770271.htm; 28(5):178–189, December http://link.springer- 2000. CODEN CANED2. ny.com/link/service/series/ ISSN 0163-5964 (print), 0558/papers/1977/19770271. 1943-5851 (electronic). pdf. Burke:2000:ASFb Biehl:2000:DFA

[BMA00b] Jerome Burke, John Mc- [BMM00] Ingrid Biehl, Bernd Meyer, Donald, and Todd Austin. and Volker M¨uller. Differ- Architectural support for ential fault attacks on el- fast symmetric-key cryptog- liptic curve cryptosystems. raphy. Operating Systems In Bellare [Bel00], pages REFERENCES 168

131–?? ISBN 3-540- http://link.springer-ny. 67907-3. ISSN 0302-9743 com/link/service/series/ (print), 1611-3349 (elec- 0558/bibs/1807/18070156. tronic). LCCN QA76.9.A25 htm; http://link.springer- C79 2000 Bar. URL http: ny.com/link/service/series/ //link.springer-ny.com/ 0558/papers/1807/18070156. link/service/series/0558/ pdf. bibs/1880/18800131.htm; http://link.springer- Boneh:2003:SSS ny.com/link/service/series/[BMS03] Dan Boneh, Ilya Mironov, 0558/papers/1880/18800131. and Victor Shoup. A se- pdf. cure signature scheme from Boyd:2001:ECB bilinear maps. In Joye [Joy03b], pages 98–110. CO- [BMN01] Colin Boyd, Paul Mon- DEN LNCSD9. ISBN 3-540- tague, and Khanh Nguyen. 00847-0. ISSN 0302-9743 Elliptic curve based pass- (print), 1611-3349 (elec- word authenticated key ex- tronic). LCCN QA76.9.A25 change protocols. Lecture C822 2003. URL http: Notes in Computer Science, //link.springer-ny.com/ 2119:487–??, 2001. CO- link/service/series/0558/ DEN LNCSD9. ISSN 0302- tocs/t2612.htm; http: 9743 (print), 1611-3349 //www.springerlink.com/ (electronic). URL http: openurl.asp?genre=issue& //link.springer-ny.com/ issn=0302-9743&volume= link/service/series/0558/ 2612. bibs/2119/21190487.htm; Buchmann:2006:PCL http://link.springer- ny.com/link/service/series/[BMV06] Johannes Buchmann, Alexan- 0558/papers/2119/21190487. der May, and Ulrich Vollmer. pdf. Perspectives for crypto- graphic long-term secu- Boyko:2000:PSP rity. Communications of the Association for Comput- [BMP00] Victor Boyko, Philip MacKen- ing Machinery, 49(9):50–55, zie, and Sarvar Patel. September 2006. CODEN Provably secure password- CACMA2. ISSN 0001-0782 authenticated key exchange (print), 1557-7317 (elec- using Diffie–Hellman. Lec- tronic). ture Notes in Computer Sci- ence, 1807:156–??, 2000. Borselius:2002:VTS CODEN LNCSD9. ISSN 0302-9743 (print), 1611- [BMW02a] Niklas Borselius, Chris J. 3349 (electronic). URL Mitchell, and Aaron Wil- REFERENCES 169

son. On the value of thresh- many / Heidelberg, Ger- old signatures. Operating many / London, UK / Systems Review, 36(4):30– etc., 2000. URL http: 35, October 2002. CODEN //link.springer-ny.com/ OSRED8. ISSN 0163-5980 link/service/series/0558/ (print), 1943-586X (elec- bibs/1976/19760531.htm; tronic). http://link.springer- ny.com/link/service/series/ Borselius:2002:PAU 0558/papers/1976/19760531. . [BMW02b] Niklas Borselius, Chris J. pdf Mitchell, and Aaron Wil- Boneh:2000:TC son. A pragmatic alter- native to undetachable sig- [BN00b] Dan Boneh and Moni natures. Operating Sys- Naor. Timed commitments. tems Review, 36(2):6–11, In Bellare [Bel00], pages April 2002. CODEN OS- 236–?? ISBN 3-540- RED8. ISSN 0163-5980 67907-3. ISSN 0302-9743 (print), 1943-586X (elec- (print), 1611-3349 (elec- tronic). tronic). LCCN QA76.9.A25 Boyen:2005:DCC C79 2000 Bar. URL http: //link.springer-ny.com/ [BMW05] Xavier Boyen, Qixiang Mei, link/service/series/0558/ and Brent Waters. Di- bibs/1880/18800236.htm; rect chosen ciphertext se- http://link.springer- curity from identity-based ny.com/link/service/series/ techniques. In Meadows and 0558/papers/1880/18800236. Syverson [MS05b], pages pdf. 320–329. ISBN 1-59593- 226-7. LCCN QA76.9.A25. Bellare:2002:TSB ACM order number 459050. Bellare:2000:AER [BN02] Mihir Bellare and Gregory Neven. Transitive signa- [BN00a] Mihir Bellare and Chanathip tures based on factoring Namprempre. Authenti- and RSA. Lecture Notes cated encryption: Relations in Computer Science, 2501: among notions and analysis 397–??, 2002. CODEN of the generic composition LNCSD9. ISSN 0302-9743 paradigm. In Advances in (print), 1611-3349 (elec- cryptology—ASIACRYPT tronic). URL http:// 2000 (Kyoto), volume 1976 link.springer.de/link/ of Lecture Notes in Comput. service/series/0558/bibs/ Sci., pages 531–545. Spring- 2501/25010397.htm; http: er-Verlag, Berlin, Ger- //link.springer.de/link/ REFERENCES 170

service/series/0558/papers/ data encryption. In Frey- 2501/25010397.pdf. tag et al. [FLA+03], pages 1133–1136. ISBN 0-12- Bouganim:2008:DAC 722442-4. LCCN ???? [BNP08] Luc Bouganim, Fran¸cois Dang URL http://www.vldb. Ngoc, and Philippe Pucheral. org/dblp/db/indices/a- Dynamic access-control poli- tree/b/Bouganim:Luc.html. cies on XML encrypted Bodycombe:1999:CC data. ACM Transactions on Information and Sys- [Bod99] David J. Bodycombe. Codes tem Security, 10(4):4:1–4:??, & ciphers. Robinson, Lon- January 2008. CODEN don, UK, 1999. ISBN 1- ATISBQ. ISSN 1094-9224 85487-897-2. vi + 122 pp. (print), 1557-7406 (elec- LCCN ???? tronic). Ben-Or:2005:UCS Bellare:2002:PRI [BOHL+05] Michael Ben-Or, Michal Horodecki, Debbie W. Le- [BNPS02] Mihir Bellare, Chanathip ung, Dominic Mayers, and Namprempre, David Pointcheval, Jonathan Oppenheim. The and Michael Semanko. The universal composable se- power of RSA inversion or- curity of quantum key acles and the security of distribution. In Kil- chaum’s RSA-based blind ian [Kil05], pages 386– signature scheme. Lecture ?? CODEN LNCSD9. Notes in Computer Science, ISBN 3-540-24573-1 (soft- 2339:319–??, 2002. CO- cover). ISSN 0302-9743 DEN LNCSD9. ISSN 0302- (print), 1611-3349 (elec- 9743 (print), 1611-3349 tronic). LCCN QA76.9.A25 (electronic). URL http: T44 2005. URL http: //link.springer-ny.com/ //www.springerlink.com/ link/service/series/0558/ openurl.asp?genre=issue& bibs/2339/23390319.htm; issn=0302-9743&volume= http://link.springer- 3378; http://www.springerlink. ny.com/link/service/series/ com/openurl.asp?genre= 0558/papers/2339/23390319. volume&id=doi:10.1007/ pdf. b106171. Bouganim:2003:CSD Bollinger:2002:UFO [BNPW03] Luc Bouganim, Fran¸cois Dang [Bol02] Terry Bollinger. Use of Free Ngoc, Philippe Pucheral, and Open-Source Software and Lilan Wu. Chip- (FOSS) in the U.S. Depart- secured data access: Rec- ment of Defense: Version: onciling access rights with 1.2. Mitre report MP 02 REFERENCES 171

W0000101, MITRE Corpo- ings, volume 2729 of Lec- ration, October 28, 2002. ture Notes in Computer 160 pp. URL http://www. Science. Springer-Verlag, egovos.org/pdf/dodfoss. Berlin, Germany / Heidel- pdf. berg, Germany / London, UK / etc., 2003. CO- Bondi:2000:CVB DEN LNCSD9. ISBN 3-540- [Bon00] Richard Bondi. Cryptogra- 40674-3. ISSN 0302-9743 phy for Visual Basic: a pro- (print), 1611-3349 (elec- grammer’s guide to the Mi- tronic). LCCN QA76.9.A25 crosoft CryptoAPI.John C79 2003. URL http: Wiley and Sons, Inc., New //link.springer-ny.com/ York, NY, USA, 2000. ISBN link/service/series/0558/ 0-471-38189-6 (paperback). tocs/t2729.htm; http: xx + 459 pp. LCCN //www.springerlink.com/ QA76.73.B3 B665 2000. openurl.asp?genre=issue& issn=0302-9743&volume= Boneh:2001:SOR 2729; http://www.springerlink. com/openurl.asp?genre= [Bon01] Dan Boneh. Simplified volume&id=doi:10.1007/ OAEP for the RSA and b11817. Rabin functions. In Kil- ian [Kil01a], pages 275– Boneh:2007:BLP ?? ISBN 3-540-42456- 3 (paperback). LCCN [Bon07] D. Boneh. A brief look QA76.9.A25 C79 2001; at pairings based cryptog- QA267.A1 L43 no.2139. raphy. In IEEE [IEE07], UK£47.00. URL http: pages 19–26. ISBN 0-7695- //link.springer-ny.com/ 3010-9. ISSN 0272-5428. link/service/series/0558/ LCCN QA76 .S974 2007. bibs/2139/21390275.htm; URL http://ieeexplore. http://link.springer- ieee.org/servlet/opac? ny.com/link/service/series/ punumber=4389466. IEEE 0558/papers/2139/21390275. Computer Society order pdf. number P3010. Boneh:2003:ACC Boone:2005:BHC

[Bon03] Dan Boneh, editor. Ad- [Boo05] J. V. Boone. Abriefhis- vances in Cryptology— tory of cryptology.Naval CRYPTO 2003: 23rd An- Institute Press, Annapolis, nual International Cryptol- MD, USA, 2005. ISBN ogy Conference Santa Bar- 1-59114-084-6. xi + 192 bara, California, USA, Au- pp. LCCN TK5102.85 gust 17–21, 2003 Proceed- .B66 2005. URL http:// REFERENCES 172

www.loc.gov/catdir/toc/ issn=0302-9743&volume= ecip055/2005000009.html. 2729; http://www.springerlink. com/openurl.asp?genre= Borras:2000:TRT volume&id=doi:10.1007/ [Bor00] Kevin Borras. A trans- b11817. port revolution: Turkey gets Barak:2007:DC the smart card bug. Toll- trans, pages 36–38, Septem- [BOV07] Boaz Barak, Shien Jin Ong, ber 2000. and Salil Vadhan. Deran- domization in cryptogra- Boreale:2001:STA phy. SIAM Journal on Com- [Bor01] Michele Boreale. Symbolic puting, 37(2):380–400, ???? trace analysis of crypto- 2007. CODEN SMJCAT. graphic protocols. Lecture ISSN 0097-5397 (print), Notes in Computer Science, 1095-7111 (electronic). 2076:667–??, 2001. CO- Boyd:2001:ACA DEN LNCSD9. ISSN 0302- 9743 (print), 1611-3349 [Boy01] Colin Boyd, editor. Ad- (electronic). URL http: vances in cryptology — ASI- //link.springer-ny.com/ ACRYPT 2001: 7th In- link/service/series/0558/ ternational Conference on bibs/2076/20760667.htm; the Theory and Applica- http://link.springer- tion of Cryptology and In- ny.com/link/service/series/ formation Security, Gold 0558/papers/2076/20760667. Coast, Australia, Decem- pdf. ber 9–13, 2001: proceed- ings, volume 2248 of Lec- Barak:2003:DC ture Notes in Computer [BOV03] Boaz Barak, Shien Jin Ong, Science. Springer-Verlag, and Salil Vadhan. De- Berlin, Germany / Hei- randomization in cryptog- delberg, Germany / Lon- raphy. In Boneh [Bon03], don, UK / etc., 2001. pages 299–315. CODEN ISBN 3-540-42987-5 (paper- LNCSD9. ISBN 3-540- back). LCCN QA76.9.A25 40674-3. ISSN 0302-9743 I555 2001. URL http: (print), 1611-3349 (elec- //link.springer-ny.com/ tronic). LCCN QA76.9.A25 link/service/series/0558/ C79 2003. URL http: tocs/t2248.htm. //link.springer-ny.com/ Boyen:2003:MIB link/service/series/0558/ tocs/t2729.htm; http: [Boy03] Xavier Boyen. Multipurpose //www.springerlink.com/ identity-based signcryption: openurl.asp?genre=issue& aSwissArmyknifefor REFERENCES 173

identity-based cryptogra- pp. LCCN TK5105.59.B87 phy. In Boneh [Bon03], 200. US$59.99. Includes pages 383–399. CODEN CD-ROM. LNCSD9. ISBN 3-540- Bellare:2002:GSI 40674-3. ISSN 0302-9743 (print), 1611-3349 (elec- [BP02] Mihir Bellare and Adriana tronic). LCCN QA76.9.A25 Palacio. GQ and Schnorr C79 2003. URL http: identification schemes: Proofs //link.springer-ny.com/ of security against imper- link/service/series/0558/ sonation under active and tocs/t2729.htm; http: concurrent attacks. In //www.springerlink.com/ Yung [Yun02a], pages 162– openurl.asp?genre=issue& 177. CODEN LNCSD9. issn=0302-9743&volume= ISBN 3-540-44050-X (pa- 2729; http://www.springerlink. perback). ISSN 0302-9743 com/openurl.asp?genre= (print), 1611-3349 (elec- volume&id=doi:10.1007/ tronic). LCCN QA76.9.A25 b11817. C79 2002. URL http: Bedi:2001:CNF //link.springer-ny.com/ link/service/series/0558/ [BP01a] S. S. Bedi and N. R. Pil- tocs/t2442.htm; http: lai. Cryptanalysis of the //www.springerlink.com/ nonlinear FeedForward gen- openurl.asp?genre=issue& erator. Lecture Notes in issn=0302-9743&volume= Computer Science, 2247: 2442. 188–??, 2001. CODEN LNCSD9. ISSN 0302- Barbancho:2003:CAC 9743 (print), 1611-3349 (electronic). URL http: [BP03a] A. M. Barbancho and //link.springer-ny.com/ A. Peinado. Cryptanal- link/service/series/0558/ ysis of anonymous chan- bibs/2247/22470188.htm; nel protocol for large-scale http://link.springer- area in wireless communica- ny.com/link/service/series/ tions. Computer Networks 0558/papers/2247/22470188. (Amsterdam, Netherlands: pdf. 1999), 43(6):777–785, De- cember 20, 2003. CODEN Burnett:2001:RSO ???? ISSN 1389-1286 (print), 1872-7069 (elec- [BP01b] Steve Burnett and Stephen tronic). Paine. RSA Security’s Of- ficial Guide to Cryptogra- Buchbinder:2003:LUB phy. McGraw-Hill, New York, NY, USA, 2001. ISBN [BP03b] Niv Buchbinder and Erez 0-07-213139-X. xxi + 419 Petrank. Lower and REFERENCES 174

upper bounds on ob- mination. Theoretical Com- taining history indepen- puter Science, 333(1–2):67– dence. In Boneh [Bon03], 90, March 1, 2005. CODEN pages 445–462. CODEN TCSCDI. ISSN 0304-3975 LNCSD9. ISBN 3-540- (print), 1879-2294 (elec- 40674-3. ISSN 0302-9743 tronic). (print), 1611-3349 (elec- tronic). LCCN QA76.9.A25 Beissinger:2006:CUM C79 2003. URL http: [BP06] Janet Beissinger and Vera //link.springer-ny.com/ Pless. The Cryptoclub: Us- link/service/series/0558/ ing Mathematics to Make tocs/t2729.htm; http: and Break Secret Codes.A. //www.springerlink.com/ K. Peters, Ltd., Wellesley, openurl.asp?genre=issue& MA, USA, 2006. ISBN issn=0302-9743&volume= 1-56881-223-X. xvi + 2729; http://www.springerlink. 199 pp. LCCN QA40.5 com/openurl.asp?genre= .B45 2006. URL http:// volume&id=doi:10.1007/ www.loc.gov/catdir/toc/ b11817. ecip067/2006002743.html. Bellare:2004:KEA Baer:2007:CIS [BP04] Mihir Bellare and Adriana Palacio. The knowledge-of- [BP07] Walter S. Baer and Andrew exponent assumptions and Parkinson. Cyberinsur- 3-round zero-knowledge pro- ance in IT security manage- tocols. In Franklin [Fra04], ment. IEEE Security & Pri- pages 273–?? CODEN vacy, 5(3):50–56, May/June LNCSD9. ISBN 3-540- 2007. CODEN ???? ISSN 22668-0. ISSN 0302-9743 1540-7993 (print), 1558- (print), 1611-3349 (elec- 4046 (electronic). tronic). LCCN 10.1007/b99099. Bellare:2000:AKE URL http://www.springerlink. com/openurl.asp?genre= [BPR00] Mihir Bellare, David Pointcheval, issue&issn=0302-9743&volume= and Phillip Rogaway. Au- 3152; http://www.springerlink. thenticated key exchange se- com/openurl.asp?genre= cure against dictionary at- volume&id=doi:10.1007/ tacks. Lecture Notes in b99099. Computer Science, 1807: Blanchet:2005:VCP 139–??, 2000. CODEN LNCSD9. ISSN 0302- [BP05] Bruno Blanchet and An- 9743 (print), 1611-3349 dreas Podelski. Verifica- (electronic). URL http: tion of cryptographic pro- //link.springer-ny.com/ tocols: tagging enforces ter- link/service/series/0558/ REFERENCES 175

bibs/1807/18070139.htm; nou, C. Rackoff, Y. Vahlis, http://link.springer- and B. Waters. On the im- ny.com/link/service/series/ possibility of basing identity 0558/papers/1807/18070139. based encryption on trap- pdf. door permutations. In IEEE [IEE08], pages 283–292. Borst:2001:CSC ISBN 0-7695-3436-8. ISSN [BPR01] Johan Borst, Bart Preneel, 0272-5428. LCCN QA76 and Vincent Rijmen. Cryp- .S95 2008. URL http: tography on smart cards. //ieeexplore.ieee.org/ Computer Networks (Ams- servlet/opac?punumber= terdam, Netherlands: 1999), 4690923. IEEE Com- 36(4):423–435, July 16, puter Society order number 2001. CODEN ???? ISSN P3436. 1389-1286 (print), 1872- Baudron:2000:ENS 7069 (electronic). URL http://www.elsevier.nl/ [BPS00] Olivier Baudron, David gej-ng/10/15/22/61/28/ Pointcheval, and Jacques 29/abstract.html; http: Stern. Extended notions of //www.elsevier.nl/gej- security for multicast public ng/10/15/22/61/28/29/article. key cryptosystems. Lecture pdf. Notes in Computer Science, 1853:499–511, 2000. CO- Bellare:2005:ISA DEN LNCSD9. ISSN 0302- [BPR05] Mihir Bellare, Krzysztof 9743 (print), 1611-3349 Pietrzak, and Phillip Ro- (electronic). URL http: gaway. Improved security //link.springer-ny.com/ analyses for CBC MACs. link/service/series/0558/ In Shoup [Sho05a], pages bibs/1853/18530499.htm; 527–454. ISBN 3-540- http://link.springer- 28114-2. ISSN 0302-9743 ny.com/link/service/series/ (print), 1611-3349 (elec- 0558/papers/1853/18530499. tronic). LCCN QA76.9.A25 pdf. C79 2005; QA76.9 .A25; Backes:2008:KDM QA76.9 C79 2005; QA76.9 C794 2005; QA76.9; In- [BPS08] Michael Backes, Birgit ternet. URL http:/ Pfitzmann, and Andre Sce- /www.springerlink.com/ drov. Key-dependent mes- openurl.asp?genre=issue& sage security under ac- issn=0302-9743&volume= tive attacks — BRSIM/UC- 3621. soundness of Dolev–Yao- Boneh:2008:IBI style encryption with key cycles. Journal of Com- [BPR+08] D. Boneh, P. Papakonstanti- puter Security, 16(5):497– REFERENCES 176

530, ???? 2008. CODEN 0558/papers/2195/21950630. JCSIET. ISSN 0926-227X pdf. (print), 1875-8924 (elec- tronic). Bellare:2000:ETE [BR00a] Mihir Bellare and Phillip Benerecetti:2002:VST Rogaway. Encode-then- encipher encryption: How [BPST02] Massimo Benerecetti, Mau- to exploit nonces or redun- rizio Panti, Luca Spalazzi, dancy in plaintexts for ef- and Simone Tacconi. Verifi- ficient cryptography. In cation of the SSL/TLS pro- Advances in cryptology— tocol using a model check- ASIACRYPT 2000 (Ky- able logic of belief and oto), volume 1976 of Lec- time. Lecture Notes in ture Notes in Comput. Computer Science, 2434: Sci., pages 317–330. Spring- 126–??, 2002. CODEN er-Verlag, Berlin, Ger- LNCSD9. ISSN 0302-9743 many / Heidelberg, Ger- (print), 1611-3349 (elec- many / London, UK / tronic). URL http:// etc., 2000. URL http: link.springer.de/link/ //link.springer-ny.com/ service/series/0558/bibs/ link/service/series/0558/ 2434/24340126.htm; http: bibs/1976/19760317.htm; //link.springer.de/link/ http://link.springer- service/series/0558/papers/ ny.com/link/service/series/ 2434/24340126.pdf. 0558/papers/1976/19760317. pdf. Brandao:2001:UEC Black:2000:CMA [BQR01] T. Brand˜ao, M. P. Queluz, and A. Rodrigues. On [BR00b] John Black and Phillip the use of error correc- Rogaway. CBC MACs tion codes in spread spec- for arbitrary-length mes- trum based image water- sages:the three-key con- marking. Lecture Notes structions. In Bellare in Computer Science, 2195: [Bel00], pages 197–?? ISBN 630–??, 2001. CODEN 3-540-67907-3. ISSN 0302- LNCSD9. ISSN 0302- 9743 (print), 1611-3349 9743 (print), 1611-3349 (electronic). LCCN QA76.9.A25 (electronic). URL http: C79 2000 Bar. URL http: //link.springer-ny.com/ //link.springer-ny.com/ link/service/series/0558/ link/service/series/0558/ bibs/2195/21950630.htm; bibs/1880/18800197.htm; http://link.springer- http://link.springer- ny.com/link/service/series/ ny.com/link/service/series/ REFERENCES 177

0558/papers/1880/18800197. curity of triple encryption. pdf. Cryptology ePrint Archive report 2004/331, 2004. URL Black:2001:CAF http://eprint.iacr.org/ [BR01] John Black and Phillip Ro- 2004/331. gaway. Ciphers with arbi- Bugliesi:2005:NIP trary finite domains. Lecture Notes in Computer Science, [BR05] Michele Bugliesi and Sabina 2271:114–??, 2001. CO- Rossi. Non-interference DEN LNCSD9. ISSN 0302- proof techniques for the 9743 (print), 1611-3349 analysis of cryptographic (electronic). URL http: protocols. Journal of Com- //link.springer-ny.com/ puter Security, 13(1):87– link/service/series/0558/ 113, ???? 2005. CODEN bibs/2271/22710114.htm; JCSIET. ISSN 0926-227X http://link.springer- (print), 1875-8924 (elec- ny.com/link/service/series/ tronic). 0558/papers/2271/22710114. Bellare:2006:MPP pdf. [BR06] Mihir Bellare and Thomas Black:2002:BCM Ristenpart. Multi-property- preserving hash domain ex- [BR02] John Black and Phillip Ro- tension and the EMD trans- gaway. A block-cipher mode form. In ????, editor, Ad- of operation for paralleliz- vances in Cryptology — able message authentica- ASIACRYPT 2006, pages tion. Lecture Notes in 299–314. Springer-Verlag, Computer Science, 2332: Berlin, Germany / Heidel- 384–??, 2002. CODEN berg, Germany / London, LNCSD9. ISSN 0302- UK / etc., 2006. ISBN ???? 9743 (print), 1611-3349 LCCN ???? URL ????. (electronic). URL http: //link.springer-ny.com/ Bhatnagar:2009:RRW link/service/series/0558/[BR09] Gaurav Bhatnagar and Bal- bibs/2332/23320384.htm; asubramanian Raman. Ro- http://link.springer- bust reference-watermarking ny.com/link/service/series/ scheme using wavelet packet 0558/papers/2332/23320384. transform and bidiagonal- pdf. singular value decomposi- Bellare:2004:CBG tion. International Jour- nal of Image and Graphics [BR04] M. Bellare and P. Rog- (IJIG), 9(3):449–477, July away. Code-based game- 2009. CODEN ???? ISSN playing proofs and the se- 0219-4678. REFERENCES 178

Brands:2001:RPK Charles River Media, Hing- ham, MA, USA, 2005. [Bra01a] Stefan A. Brands. Re- ISBN 1-58450-405-6 (pbk. thinking public key infras- with cd-rom). ???? pp. tructures and digital cer- LCCN HV8079.C65 B76 tificates: building in pri- 2005. URL http:// vacy. MIT Press, Cam- www.loc.gov/catdir/toc/ bridge, MA, USA, 2001. ecip0514/2005016674.html. ISBN 0-262-02491-8. xxi + 314 pp. LCCN TK5105.59 Browne:2005:DEP .B73 2000. [Bro05b] Graham T. Browne. Data Brandt:2001:CPS encryption: a practical guide to protecting sensitive [Bra01b] Felix Brandt. Cryp- information. Aaben Kryp- tographic protocols for tografi, Cranage, UK, 2005. secure second-price auc- ISBN 0-9549513-0-1. ???? tions. Lecture Notes in pp. LCCN ???? One CD- Computer Science, 2182: ROM. 154–??, 2001. CODEN LNCSD9. ISSN 0302- Black:2002:BBA 9743 (print), 1611-3349 [BRS02] John Black, Phillip Rog- (electronic). URL http: away, and Thomas Shrimp- //link.springer-ny.com/ ton. Black-box analy- link/service/series/0558/ sis of the block-cipher- bibs/2182/21820154.htm; based hash-function con- http://link.springer- structions from PGV. In ny.com/link/service/series/ Yung [Yun02a], pages 320– 0558/papers/2182/21820154. 335. CODEN LNCSD9. pdf. ISBN 3-540-44050-X (pa- Brackenridge:2006:IUU perback). ISSN 0302-9743 (print), 1611-3349 (elec- [Bra06] B. Brackenridge. Inven- tronic). LCCN QA76.9.A25 tion: Ultrawideband up- C79 2002. URL http:/ set. IEEE Spectrum,43 /link.springer.de/link/ (9):65–66, September 2006. service/series/0558/bibs/ CODEN IEESAM. ISSN 2442/24420320.htm; http: 0018-9235 (print), 1939- //link.springer.de/link/ 9340 (electronic). service/series/0558/papers/ 2442/24420320.pdf. Brown:2005:CEC Butler:2009:LIB [Bro05a] Christopher L. T. Brown. Computer evidence: col- [BRTM09] Kevin R. B. Butler, Sunam lection and preservation. Ryu, Patrick Traynor, and REFERENCES 179

Patrick D. McDaniel. Lever- Shamir. Cryptanalytic aging identity-based cryp- time/memory/data trade- tography for node ID assign- offs for stream ciphers. Lec- ment in structured P2P sys- ture Notes in Computer Sci- tems. IEEE Transactions ence, 1976:1–??, 2000. CO- on Parallel and Distributed DEN LNCSD9. ISSN 0302- Systems, 20(12):1803–1815, 9743 (print), 1611-3349 December 2009. CODEN (electronic). URL http: ITDSEO. ISSN 1045-9219 //link.springer-ny.com/ (print), 1558-2183 (elec- link/service/series/0558/ tronic). bibs/1976/19760001.htm; http://link.springer- Brustoloni:2006:LEN ny.com/link/service/series/ [Bru06] Jos´e Carlos Brustoloni. Lab- 0558/papers/1976/19760001. oratory experiments for net- pdf. work security instruction. Barrett:2001:SSS ACM Journal on Educa- tional Resources in Comput- [BS01a] Daniel J. Barrett and Rich- ing (JERIC), 6(4):5:1–5:??, ard E. Silverman. SSH: The December 2006. CODEN Secure Shell: The Defini- ???? ISSN 1531-4278. tive Guide. O’Reilly & As- Bierbrauer:2000:AIW sociates, Inc., 103a Mor- ris Street, Sebastopol, CA [BS00a] J¨urgen Bierbrauer and Hol- 95472, USA, Tel: +1 707 ger Schellwat. Almost inde- 829 0515, and 90 Sher- pendent and weakly biased man Street, Cambridge, MA arrays: Efficient construc- 02140, USA, Tel: +1 617 tions and cryptologic appli- 354 5800, 2001. ISBN 0- cations. In Bellare [Bel00], 596-00011-1. xv + 540 pp. pages 533–?? ISBN 3-540- LCCN QA76.76.O63 B369 67907-3. ISSN 0302-9743 2001. US$39.95. URL (print), 1611-3349 (elec- http://www.oreilly.com/ tronic). LCCN QA76.9.A25 catalog/9780596000110; C79 2000 Bar. URL http: http://www.oreilly.com/ //link.springer-ny.com/ catalog/sshtdg/; http:/ link/service/series/0558/ /www.snailbook.com/. bibs/1880/18800533.htm; Bigun:2001:AVB http://link.springer- ny.com/link/service/series/[BS01b] Josef Bigun and Fabrizio 0558/papers/1880/18800533. Smeraldi, editors. Audio- pdf. and video-based biomet- ric person authentication: Biryukov:2000:CTM Third International Confer- [BS00b] Alex Biryukov and Adi ence, AVBPA 2001, Halm- REFERENCES 180

stad, Sweden, June 6–8, link/service/series/0558/ 2001: Proceedings,volume bibs/2139/21390201.htm; 2091 of Lecture Notes in http://link.springer- Computer Science. Spring- ny.com/link/service/series/ er-Verlag, Berlin, Ger- 0558/papers/2139/21390201. many / Heidelberg, Ger- pdf. many / London, UK / etc., 2001. CODEN LNCSD9. Banks:2002:NSR ISBN 3-540-42216-1 (pa- [BS02] William D. Banks and perback). ISSN 0302-9743 Igor E. Shparlinski. On (print), 1611-3349 (elec- the number of sparse RSA tronic). LCCN TK7882.S65 exponents. Journal of .A944 2001; QA267.A1 L43 Number Theory, 95(2):340– no.2091. URL http:/ 350, August 2002. CO- /link.springer-ny.com/ DEN JNUTA9. ISSN 0022- link/service/series/0558/ 314X (print), 1096-1658 tocs/t2091.htm; http: (electronic). URL http:/ //www.springerlink.com/ /www.sciencedirect.com/ openurl.asp?genre=issue& science/article/pii/S0022314X01927751. issn=0302-9743&volume= 2091. Bajard:2003:ISC Biryukov:2001:SCS [BS03] Jean Claude Bajard and [BS01c] Alex Biryukov and Adi Michael Schulte, editors. Shamir. Structural crypt- 16th IEEE Symposium analysis of SASAS. Lec- on Computer Arithmetic: ture Notes in Computer Sci- ARITH-16 2003: proceed- ence, 2045:394–405, 2001. ings: Santiago de Com- CODEN LNCSD9. ISSN postela, Spain, June 15– 0302-9743 (print), 1611- 18, 2003. IEEE Computer 3349 (electronic). Society Press, 1109 Spring Street, Suite 300, Silver Boneh:2001:UBE Spring, MD 20910, USA, [BS01d] Dan Boneh and Igor E. Sh- 2003. ISBN 0-7695-1894- parlinski. On the unpre- X. ISSN 1063-6889. LCCN dictability of bits of the el- ???? URL http:// liptic curve Diffie–Hellman www.dec.usc.es/arith16/ scheme. In Kilian [Kil01a], . IEEE order no. PR01894. pages 201–?? ISBN 3-540- Barrett:2005:SSS 42456-3 (paperback). LCCN QA76.9.A25 C79 2001; [BSB05] Daniel J. Barrett, Rich- QA267.A1 L43 no.2139. ard E. Silverman, and UK£47.00. URL http: Robert G. Byrnes. SSH: The //link.springer-ny.com/ Secure Shell: The Defini- REFERENCES 181

tive Guide. O’Reilly & As- Notes in Computer Science, sociates, Inc., 103a Mor- 2195:780–??, 2001. CO- ris Street, Sebastopol, CA DEN LNCSD9. ISSN 0302- 95472, USA, Tel: +1 707 9743 (print), 1611-3349 829 0515, and 90 Sher- (electronic). URL http: man Street, Cambridge, //link.springer-ny.com/ MA 02140, USA, Tel: +1 link/service/series/0558/ 617 354 5800, second edi- bibs/2195/21950780.htm; tion, 2005. ISBN 0-596- http://link.springer- 00895-3. 672 (est.) pp. ny.com/link/service/series/ LCCN QA76.76.O63 B369 0558/papers/2195/21950780. 2001. US$39.95. URL pdf. http://www.oreilly.com/ catalog/9780596008956; Bounkong:2002:ICA http://www.oreilly.com/ [BSL02] St´ephane Bounkong, David catalog/sshtdg2/. Saad, and David Lowe. In- Bo:2001:EID dependent component anal- ysis for domain indepen- [BSC01a] Xiaochen Bo, Lincheng dent watermarking. Lecture Shen, and Wensen Chang. Notes in Computer Science, Evaluation of the image 2415:510–??, 2002. CO- degradation for a typical wa- DEN LNCSD9. ISSN 0302- termarking algorithm in the 9743 (print), 1611-3349 block-DCT domain. Lec- (electronic). URL http: ture Notes in Computer Sci- //link.springer-ny.com/ ence, 2229:52–??, 2001. CO- link/service/series/0558/ DEN LNCSD9. ISSN 0302- bibs/2415/24150510.htm; 9743 (print), 1611-3349 http://link.springer- (electronic). URL http: ny.com/link/service/series/ //link.springer-ny.com/ 0558/papers/2415/24150510. link/service/series/0558/ pdf. bibs/2229/22290052.htm; http://link.springer- Brisbane:2000:RBW ny.com/link/service/series/ [BSNO00] Gareth Brisbane, Rei Safavi- 0558/papers/2229/22290052. Naini, and Philip Ogun- pdf. bona. Region-based wa- Bo:2001:SCD termarking by distribution adjustment. Lecture Notes [BSC01b] Xiaochen Bo, Lincheng in Computer Science, 1975: Shen, and Wensen Chang. 54–??, 2000. CODEN Sign correlation detector for LNCSD9. ISSN 0302- blind image watermarking 9743 (print), 1611-3349 in the DCT domain. Lecture (electronic). URL http: REFERENCES 182

//link.springer-ny.com/ cam051/2004054519.html; link/service/series/0558/ http://www.loc.gov/catdir/ bibs/1975/19750054.htm; toc/cam051/2004054519. http://link.springer- html. ny.com/link/service/series/ Blake:2005:AEC 0558/papers/1975/19750054. pdf. [BSS05] Ian F. Blake, Gadiel Seroussi, and Nigel P. Smart. Ad- Bresson:2002:TRS vances in elliptic curve [BSS02] Emmanuel Bresson, Jacques cryptography, volume 317 Stern, and Michael Szydlo. of London Mathematical Threshold ring signatures Society Lecture Note Se- and applications to ad-hoc ries. Cambridge Univer- groups. In Yung [Yun02a], sity Press, Cambridge, UK, pages 465–480. CODEN second edition, April 2005. LNCSD9. ISBN 3-540- ISBN 0-521-60415-X. xvi + 44050-X (paperback). ISSN 281 pp. LCCN QA76.9.A25 0302-9743 (print), 1611- A375 2004. URL http: 3349 (electronic). LCCN //www.cambridge.org/us/ QA76.9.A25 C79 2002. URL academic/subjects/mathematics/ http://link.springer.de/ number-theory/advances- link/service/series/0558/ elliptic-curve-cryptography. bibs/2442/24420465.htm; Bhargav-Spantzel:2007:PPM http://link.springer. de/link/service/series/ [BSSM+07] Abhilasha Bhargav-Spantzel, 0558/papers/2442/24420465. Anna C. Squicciarini, Shi- pdf. mon Modi, Matthew Young, Elisa Bertino, and Ste- Blake:2004:AEC phen J. Elliott. Privacy pre- serving multi-factor authen- [BSS04] Ian F. Blake, G. (Gadiel) tication with biometrics. Seroussi, and Nigel P. (Nigel Paul) Smart, edi- Journal of Computer Se- curity, 15(5):529–560, ???? tors. Advances in ellip- 2007. CODEN JCSIET. tic curve cryptography,vol- ISSN 0926-227X (print), ume 317 of London Mathe- 1875-8924 (electronic). matical Society lecture note series. Cambridge Uni- Buchmann:2002:ICP versity Press, Cambridge, UK, 2004. ISBN 0-521- [BST02] Johannes Buchmann, Kouichi 60415-X. xvi + 281 pp. Sakurai, and Tsuyoshi Tak- LCCN QA76.9.A25 A375 agi. An IND-CCA2 public- 2004. URL http://www. key cryptosystem with fast loc.gov/catdir/description/ decryption. Lecture Notes REFERENCES 183

in Computer Science, 2288: 9743 (print), 1611-3349 51–??, 2002. CODEN (electronic). URL http: LNCSD9. ISSN 0302- //link.springer-ny.com/ 9743 (print), 1611-3349 link/service/series/0558/ (electronic). URL http: bibs/1978/19780001.htm; //link.springer-ny.com/ http://link.springer- link/service/series/0558/ ny.com/link/service/series/ bibs/2288/22880051.htm; 0558/papers/1978/19780001. http://link.springer- pdf. ny.com/link/service/series/ 0558/papers/2288/22880051. Bethencourt:2009:NTP pdf. [BSW09] John Bethencourt, Dawn Barak:2003:TRN Song, and Brent Waters. New techniques for private [BST03] Boaz Barak, Ronen Shaltiel, stream searching. ACM and Eran Tromer. True Transactions on Informa- random number genera- tion and System Security, tors secure in a changing 12(3):16:1–16:??, January environment. In Walter 2009. CODEN ATISBQ. et al. [WKP03], pages 166– ISSN 1094-9224 (print), 180. CODEN LNCSD9. 1557-7406 (electronic). ISBN 3-540-40833-9. ISSN 0302-9743 (print), 1611- Biehl:2002:NDP 3349 (electronic). LCCN [BT02] Ingrid Biehl and Tsuyoshi TK7895.E42. URL http: Takagi. A new distributed //link.springer-ny.com/ primality test for shared link/service/series/0558/ RSA keys using quadratic tocs/t2779.htm; http: fields. Lecture Notes in //www.springerlink.com/ Computer Science, 2384: openurl.asp?genre=issue& 1–??, 2002. CODEN issn=0302-9743&volume= LNCSD9. ISSN 0302- 2779; http://www.springerlink. 9743 (print), 1611-3349 com/openurl.asp?genre= (electronic). URL http: volume&id=doi:10.1007/ //link.springer-ny.com/ b13240. link/service/series/0558/ Biryukov:2001:RTC bibs/2384/23840001.htm; [BSW01] Alex Biryukov, , http://link.springer- and David Wagner. Real ny.com/link/service/series/ time cryptanalysis of A5/1 0558/papers/2384/23840001. on a PC. Lecture Notes pdf. in Computer Science, 1978: Boyer:2002:LDS 1–??, 2001. CODEN LNCSD9. ISSN 0302- [BTTF02] John Boyer, Andrew D. REFERENCES 184

Todd, Jason Trenough, and Black:2002:SCA Doug Farrell. Letters: Defective sign-and-encrypt [BU02] John Black and Hector Ur- and healthcare woes and tubia. Side-channel attacks J2EE cache and pool and on symmetric encryption Regex++. Dr. Dobb’s Jour- schemes: The case for au- nal of Software Tools,27 thenticated encryption. In (2):10, February 2002. CO- USENIX [USE02b], pages DEN DDJOEB. ISSN 1044- 327–338. ISBN 1-931971- 789X. URL http://www. 00-5. LCCN ???? URL ddj.com/. http://www.usenix.org/ publications/library/proceedings/ Beimel:2005:CIW sec02/black.html.

[BTW05] Amos Beimel, Tamir Tassa, Buchmann:2000:CTC and Enav Weinreb. Char- acterizing ideal weighted [Buc00a] Johannes Buchmann, edi- threshold secret sharing. In tor. Coding theory, cryp- Kilian [Kil05], pages 600– tography, and related ar- ?? CODEN LNCSD9. eas: proceedings of an In- ISBN 3-540-24573-1 (soft- ternational Conference on cover). ISSN 0302-9743 Coding Theory, Cryptogra- (print), 1611-3349 (elec- phy, and Related Areas, held tronic). LCCN QA76.9.A25 in Guanajuato, Mexico, in T44 2005. URL http: April 1998. Springer-Verlag, //www.springerlink.com/ Berlin, Germany / Heidel- openurl.asp?genre=issue& berg, Germany / London, issn=0302-9743&volume= UK / etc., 2000. ISBN 3378; http://www.springerlink. 3-540-66248-0 (softcover). com/openurl.asp?genre= LCCN TK5102.94 .I58 volume&id=doi:10.1007/ 1998. URL http://www. b106171. springer.com/mathematics/ numbers/book/978-3-540- Beimel:2008:CIW 66248-8. [BTW08] Amos Beimel, Tamir Tassa, Buchmann:2000:IC and Enav Weinreb. Char- acterizing ideal weighted [Buc00b] Johannes Buchmann. In- threshold secret sharing. troduction to Cryptogra- SIAM Journal on Discrete phy. Undergraduate texts Mathematics, 22(1):360– in mathematics. Springer- 397, ???? 2008. CODEN Verlag, Berlin, Germany / SJDMEC. ISSN 0895-4801 Heidelberg, Germany / Lon- (print), 1095-7146 (elec- don, UK / etc., 2000. ISBN tronic). 0-387-95034-6. xi + 281 REFERENCES 185

pp. LCCN QA268.B83 2001. National Security, 15(2):49– UK£29.50. ??, 2000. ISSN 0268-4527 Buchmann:2001:IC (print), 1743-9019 (elec- tronic). [Buc01] Johannes Buchmann. In- troduction to cryptogra- Budiansky:2002:BWC phy. Undergraduate texts [Bud02] Stephen Budiansky. Battle in mathematics. Springer- of wits: the complete story Verlag, Berlin, Germany / of codebreaking in World Heidelberg, Germany / Lon- War II. Simon and Schuster, don, UK / etc., 2001. ISBN New York, NY, USA, 2002. 0-387-95034-6 (hardcover). ISBN 0-7432-1734-9 (paper- xi + 281 pp. LCCN back). 436 + 16 pp. LCCN QA268.B83 2001. ???? US$16.00. Buchmann:2004:IC Budiansky:2006:HMS [Buc04] Johannes Buchmann. In- [Bud06] Stephen Budiansky. Her troduction to cryptogra- Majesty’s spymaster: Eliza- phy. Undergraduate texts beth I, Sir Francis Walsing- in mathematics. Springer- ham, and the birth of mod- Verlag, Berlin, Germany / ern espionage.Plume,New Heidelberg, Germany / Lon- York, NY, USA, 2006. ISBN don, UK / etc., second 0-452-28747-2. xvii + 235 + edition, 2004. ISBN 0- 387-20756-2 , 0-387-21156- 8 pp. LCCN DA358.W2 B83 2006. X. xvi + 335 pp. LCCN QA268.B83; QA268.B83 Buhan:2006:FBL 2004. [Buh06] Ileana Buhan. Feeling is be- Budiansky:2000:BWC lieving: a location limited [Bud00a] Stephen Budiansky. Bat- channel based on grip pat- tle of Wits: The Com- tern biometrics and crypt- plete Story of Codebreaking analysis. CTIT techni- in World War II. Free Press, cal report 06-29, Centre New York, NY, USA, 2000. for Telematics and Informa- ISBN 0-684-85932-7. 436 tion Technology, University pp. LCCN D810.C88 B83 of Twente, Enschede, The 2000. US$27.50, UK£20. Netherlands, 2006. 10 pp. Budiansky:2000:DBU Bulygin:2009:PSS [Bud00b] Stephen Budiansky. The [Bul09] Stanislav Bulygin. Polyno- difficult beginnings of US– mial system solving for de- British codebreaking co- coding linear codes and al- operation. Intelligence and gebraic cryptanalysis.Ph.D. REFERENCES 186

thesis (??), Technische http://www.nsa.gov/public_ Universit¨at Kaiserslautern, info/_files/cryptologic_ Kaiserslautern, Germany, histories/magic.pdf. 2009. Burmansson:2000:TCY Burr:2003:SAE [Bur00] Frank Burmansson. Travel [Bur03] William E. Burr. Select- cards in the year 2000: the ing the Advanced Encryp- Helsinki region ushers in the tion Standard. IEEE Se- smart card era. Urban pub- curity & Privacy, 1(2):43– lic transportation systems, 52, March/April 2003. CO- pages 229–238, Engineers DEN ???? ISSN 1540-7993 2000. (print), 1558-4046 (elec- Burnett:2001:CB tronic). URL http://dlib. computer.org/sp/books/ [Bur01] Steve Burnett. Crypto blun- sp2003/pdf/j2043.pdf; ders, 2001. URL http:// http://www.computer.org/ db.usenix.org/publications/ security/j2043abs.htm. library/proceedings/lisa2001/ tech/. Unpublished in- Burr:2006:CHS vited talk, LISA 2001: 15th Systems Administra- [Bur06] William E. Burr. Cryp- tion Conference, December tographic hash standards: 2–7, 2001, Town and Coun- Where do we go from here? try Resort Hotel, San Diego, IEEE Security & Privacy, CA. 4(2):88–91, March/April Burke:2002:IWA 2006. CODEN ???? ISSN 1540-7993 (print), 1558- [Bur02] Colin B. Burke. It wasn’t 4046 (electronic). all magic: the early strug- gle to automate cryptanaly- Boesgaard:2004:RNH sis, 1930s–1960s,volume6 of United States cryptologic [BVP+04] M. Boesgaard, M. Vester- history special series.Cen- ager, T. Pedersen, J. Chris- ter for Cryptologic History, tiansen, and O. Scavenius. National Security Agency, Rabbit: a new high perfor- Fort George G. Meade, MD, mance stream cipher. In USA, 2002. 344 pp. LCCN ????, editor, Proceedings of Z103.4. U6. URL http: Fast Software Encryption //archive.org/details/ 10, volume 2887, pages 307– NSA-WasntAllMagic_2002; 329. Springer-Verlag, Berlin, http://purl.fdlp.gov/ Germany / Heidelberg, Ger- GPO/gpo40404; http://purl. many / London, UK / etc., stanford.edu/jj264fh4943; 2004. REFERENCES 187

Baker:2007:ISU Bellare:2003:FSP

[BW07] Wade H. Baker and Linda [BY03] Mihir Bellare and Ben- Wallace. Is information se- net Yee. Forward-security curity under control?: In- in private-key cryptogra- vestigating quality in in- phy. In Joye [Joy03b], formation security manage- pages 1–18. CODEN ment. IEEE Security & LNCSD9. ISBN 3-540- Privacy, 5(1):36–44, Jan- 00847-0. ISSN 0302-9743 uary/February 2007. CO- (print), 1611-3349 (elec- DEN ???? ISSN 1540-7993 tronic). LCCN QA76.9.A25 (print), 1558-4046 (elec- C822 2003. URL http: tronic). //link.springer-ny.com/ Blake-Wilson:2002:RUE link/service/series/0558/ tocs/t2612.htm; http: [BWBL02] S. Blake-Wilson, D. Brown, //www.springerlink.com/ and P. Lambert. RFC openurl.asp?genre=issue& 3278: Use of Elliptic Curve issn=0302-9743&volume= Cryptography (ECC) al- 2612. gorithms in Cryptographic Message Syntax (CMS), Bar-Yossef:2004:ESQ April 2002. URL ftp: [BYJK04] Ziv Bar-Yossef, T. S. //ftp.internic.net/rfc/ Jayram, and Iordanis Kereni- rfc3278.txt; http:// dis. Exponential separa- www.math.utah.edu/pub/ tion of quantum and clas- rfc/rfc3278.txt. sical one-way communica- Butler:2000:NSA tion complexity. In ACM

+ [ACM04b], pages 128–137. [BWE 00] Randy Butler, Von Welch, ISBN 1-58113-852-0. LCCN Douglas Engert, Ian Fos- QA75.5 .A22 2004. ter, Steven Tuecke, John Volmer, and Carl Kessel- Bar-Yossef:2008:ESQ man. A national-scale au- thentication infrastructure. [BYJK08] Ziv Bar-Yossef, T. S. Computer, 33(12):60–66, Jayram, and Iordanis Kereni- December 2000. CODEN dis. Exponential separa- CPTRB4. ISSN 0018-9162 tion of quantum and classi- (print), 1558-0814 (elec- cal one-way communication tronic). URL http://dlib. complexity. SIAM Journal computer.org/co/books/ on Computing, 38(1):366– co2000/pdf/rz060.pdf; 384, ???? 2008. CODEN http://www.computer.org/ SMJCAT. ISSN 0097-5397 computer/co2000/rz060abs. (print), 1095-7111 (elec- htm. tronic). REFERENCES 188

Bertlmann:2002:QUB implementing directories in your organization.Aca- [BZ02] Reinhold A. Bertlmann and demic Press, New York, NY, Anton Zeilinger, editors. USA, 2002. ISBN 0-12- Quantum [Un]speakables: 160452-7. xxvi + 238 pp. From Bell to Quantum LCCN HD9696.25.A2 E58 Information: Conference 2002. US$49.95. in Commemoration of the Physicist John S. Bell, 10– Staff:2003:NTC 14 November 2000, Vienna. [CAC03] CACM Staff. News track: Springer-Verlag, Berlin, Cinematic watermark; eye- Germany / Heidelberg, Ger- opening education; roaming many / London, UK / etc., time; stand by me; savings 2002. ISBN 3-540-42756-2. bonds fade to net; phone LCCN ???? home. Communications of Bond:2003:DTA the Association for Com- puting Machinery, 46(7):9– [BZ03] Mike Bond and Piotr 10, July 2003. CODEN Zieli´nski. Decimalisation ta- CACMA2. ISSN 0001-0782 ble attacks for PIN crack- (print), 1557-7317 (elec- ing. Technical Report tronic). 560, University of Cam- bridge Computer Labo- Staff:2006:NTS ratory, Cambridge, UK, February 2003. 14 pp. [CAC06] CACM Staff. News track: URL http://www.cl.cam. Super game plan; E-learning ac.uk/TechReports/UCAM- roots disputed; Chinese his- CL-TR-560.pdf. tory; U.K. seeks popular science input; encryption Borders:2005:CHP commitment; Improve-ment [BZP05] Kevin Borders, Xin Zhao, news; vid kid. Communica- and Atul Prakash. CPOL: tions of the Association for high-performance policy Computing Machinery,49 evaluation. In Meadows and (11):9–10, November 2006. Syverson [MS05b], pages CODEN CACMA2. ISSN 147–157. ISBN 1-59593- 0001-0782 (print), 1557- 226-7. LCCN QA76.9.A25. 7317 (electronic). ACM order number 459050. CALACIT:2000:SID Carrington:2002:EDS [Cal00a] California Legislature.Assembly [C+02] Charles Carrington et al., Committee on Information editors. Enterprise direc- Technology. Securing the tory and security implemen- Internet: digital signatures tation guide: designing and and electronic transactions REFERENCES 189

in California. Sacramento, Calvocoressi:2001:TSU CA, August 4, 2000. various pp. [Cal01] Peter Calvocoressi. Top secret Ultra.MandM CADOJ:2000:DSE Baldwin, Cleobury Mor- timer, Kidderminster, Eng- [Cal00b] California.Dept.of Justice. land, 2001. ISBN 0-947712- Digital signature, election 41-0. 158 pp. LCCN petitions, public and pri- D810.C88 C34 2001. vate transactions: initiative statute. Elections Division, Canetti:2001:UCS October 13, 2000. 15 pp. Ti- [Can01a] R. Canetti. Universally tle and summary prepared composable security: a by the California Attorney new paradigm for crypto- General. Initiative #905. graphic protocols. In IEEE CAMTC:2000:TSC [IEE01a], pages 136–145. CODEN ASFPDV. ISBN [Cal00c] California.Metropolitan Trans- 0-7695-1390-5, 0-7695-1391- portation Commission. TransLink 3 (case), 0-7695-1392-1 (mi- smart card: universal tran- crofiche). ISSN 0272-5428. sit card for the San Fran- LCCN ???? cisco Bay Area. Tech- nical report, Metropoli- Canteaut:2001:CFD tan Transportation Com- [Can01b] A. Canteaut. Cryptographic mission, Oakland, CA, 2000. functions and design crite- 4 pp. ria for block ciphers. Lec- Caloyannides:2000:EWE ture Notes in Computer Sci- ence, 2247:1–??, 2001. CO- [Cal00d] M. A. Caloyannides. En- DEN LNCSD9. ISSN 0302- cryption wars: early bat- 9743 (print), 1611-3349 tles. IEEE Spectrum, 37(4): (electronic). URL http: 37–43, April 2000. CODEN //link.springer-ny.com/ IEESAM. ISSN 0018-9235 link/service/series/0558/ (print), 1939-9340 (elec- bibs/2247/22470001.htm; tronic). http://link.springer- ny.com/link/service/series/ Caloyannides:2000:EWS 0558/papers/2247/22470001. [Cal00e] M. A. Caloyannides. En- pdf. cryption wars: shifting tac- Canetti:2006:SCC tics. IEEE Spectrum, 37(5): 46–51, May 2000. CODEN [Can06a] Ran Canetti. Security IEESAM. ISSN 0018-9235 and composition of cryp- (print), 1939-9340 (elec- tographic protocols: a tu- tronic). torial (part I). ACM REFERENCES 190

SIGACT News, 37(3):67– Carter:2001:SCT 92, September 2006. CO- DEN SIGNDM. ISSN 0163- [Car01] Amy Carter. Smart card 5700 (print), 1943-5827 technology just got smarter. (electronic). URL http: Metro, 97(9), December //doi.acm.org/10.1145/ 2001. 1165555.1165570. Carlet:2002:LCC

Canteaut:2006:OPR [Car02] Claude Carlet. A larger class of cryptographic Boolean [Can06b] Anne Canteaut. Open prob- functions via a study of the lems related to algebraic at- Maiorana–McFarland con- tacks on stream ciphers. In struction. In Yung [Yun02a], Ytrehus [Ytr06], pages 120– pages 549–564. CODEN 134. ISBN 3-540-35481- LNCSD9. ISBN 3-540- 6. LCCN QA76.9.A25 I557 44050-X (paperback). ISSN 2005. 0302-9743 (print), 1611- 3349 (electronic). LCCN Caprara:2001:PSR QA76.9.A25 C79 2002. URL http://link.springer.de/ [Cap01] Alberto Caprara. On link/service/series/0558/ the practical solution of bibs/2442/24420549.htm; the reversal median prob- http://link.springer. lem. Lecture Notes in de/link/service/series/ Computer Science, 2149: 0558/papers/2442/24420549. 238–??, 2001. CODEN pdf. LNCSD9. ISSN 0302- Casey:2002:HCC 9743 (print), 1611-3349 (electronic). URL http: [Cas02] Eoghan Casey, editor. Hand- //link.springer-ny.com/ book of computer crime in- link/service/series/0558/ vestigation: forensic tools bibs/2149/21490238.htm; and technology.Academic http://link.springer- Press, New York, NY, ny.com/link/service/series/ USA, 2002. ISBN 0-12- 0558/papers/2149/21490238. 163103-6. xiv + 448 pp. pdf. LCCN HV8079.C65 H36 2002. US$39.95. Carriere:2000:PSC Cass:2003:LES [Car00] Bruno Carriere. Le passe [Cas03] Stephen Cass. Listen- sans contact: autopsie d’une ing in [electronic spying]. puce. La vie du rail et IEEE Spectrum, 40(4):32– des transports, pages 43–48, 37, April 2003. CODEN November 2000. IEESAM. ISSN 0018-9235 REFERENCES 191

(print), 1939-9340 (elec- 0558/papers/2178/21780233. tronic). pdf.

Casselman:2006:MTE Challal:2005:HHC [CBB05] Yacine Challal, Abdelmad- [Cas06] Bill Casselman. Math- jid Bouabdallah, and Hatem ematical theory of the Bettahar. H2A:Hybrid Enigma machine. Notices hash-chaining scheme for of the American Mathe- adaptive multicast source matical Society, 53(4):433, authentication of media- April 2006. CODEN AM- streaming. Computers NOAN. ISSN 0002-9920 &Security, 24(1):57–68, (print), 1088-9477 (elec- February 2005. CODEN tronic). URL http://www. CPSEDU. ISSN 0167-4048 mathaware.org/; http: (print), 1872-6208 (elec- //www.nationalarchives. tronic). URL https:// gov.uk/; http://www. www.sciencedirect.com/ turingarchive.org/browse. science/article/pii/S0167404804001816. php/C/30.Thefrontcover of this issue displays eight Cooper:2005:AAP

pages of Alan Turing’s de- + scription of the Enigma ma- [CBD 05] Brian F. Cooper, Mayank chine. The issue is a special Bawa,NeilDaswani,Sergio tribute to Kurt G¨odel for Marti, and Hector Garcia- the centenary of his birth. Molina. Authenticity and availability in PIPE net- Cobas:2001:CTA works. Future Generation Computer Systems, 21(3): [CB01] Juan David Gonz´alez Cobas 391–400, March 1, 2005. and Jos´eAntonioL´opez CODEN FGSEVI. ISSN Brugos. A complexity- 0167-739X (print), 1872- theoretic approach to the 7115 (electronic). design of good measures Chandramouli:2006:BPA of cryptographic strength. Lecture Notes in Computer [CBSU06] R. Chandramouli, S. Bap- Science, 2178:233–??, 2001. atla, K. P. Subbalakshmi, CODEN LNCSD9. ISSN and R. N. Uma. Bat- 0302-9743 (print), 1611- tery power-aware encryp- 3349 (electronic). URL tion. ACM Transactions on http://link.springer-ny. Information and System Se- com/link/service/series/ curity, 9(2):162–180, May 0558/bibs/2178/21780233. 2006. CODEN ATISBQ. htm; http://link.springer- ISSN 1094-9224 (print), ny.com/link/service/series/ 1557-7406 (electronic). REFERENCES 192

Cachin:2000:OFS Coulton. A novel wa- termarking technique for [CC00] Christian Cachin and Jan LUT based FPGA de- Camenisch. Optimistic signs. Lecture Notes in fair secure computation. Computer Science, 2438: In Bellare [Bel00], pages 1152–??, 2002. CODEN 93–?? ISBN 3-540- LNCSD9. ISSN 0302- 67907-3. ISSN 0302-9743 9743 (print), 1611-3349 (print), 1611-3349 (elec- (electronic). URL http: tronic). LCCN QA76.9.A25 //link.springer-ny.com/ C79 2000 Bar. URL http: link/service/series/0558/ //link.springer-ny.com/ bibs/2438/24381152.htm; link/service/series/0558/ http://link.springer- bibs/1880/18800093.htm; ny.com/link/service/series/ http://link.springer- 0558/papers/2438/24381152. ny.com/link/service/series/ pdf. 0558/papers/1880/18800093. pdf. Chan:2002:SLI

Chan:2001:CRP [CC02b] Chi-Kwong Chan and L. M. Cheng. Security of Lin’s [CC01a] Chi-Kwong Chan and L. M. image watermarking sys- Cheng. Cryptanalysis of tem. The Journal of Sys- a remote password authen- tems and Software, 62(3): tication scheme. Inter- 211–215, June 15, 2002. national Journal of Com- CODEN JSSODM. ISSN puter Mathematics, 78(3): 0164-1212 (print), 1873- 323–326, 2001. CODEN 1228 (electronic). IJCMAT. ISSN 0020-7160. Chan:2001:CTB Cachin:2004:ACE

[CC01b] Chi-Kwong Chan and L. M. [CC04a] Christian Cachin and Jan Cheng. Cryptanalysis of a Camenisch, editors. Ad- timestamp-based password vances in Cryptology— authentication scheme. Com- EUROCRYPT 2004: Inter- puters & Security, 21(1):74– national Conference on the 76, First Quarter 2001. CO- Theory and Applications of DEN CPSEDU. ISSN 0167- Cryptographic Techniques, 4048 (print), 1872-6208 Interlaken, Switzerland, (electronic). URL https:/ May 2–6, 2004: Proceed- /www.sciencedirect.com/ ings, volume 3027 of Lecture science/article/pii/S0167404802001104. Notes in Computer Science. Carline:2002:NWT Springer-Verlag, Berlin, Germany / Heidelberg, Ger- [CC02a] Dylan Carline and Paul many / London, UK / etc., REFERENCES 193

2004. CODEN LNCSD9. threshold multi-secret shar- ISBN 3-540-21935-8. ISSN ing. Applied Mathematics 0302-9743 (print), 1611- and Computation, 166(1):1– 3349 (electronic). LCCN 14, July 6, 2005. CODEN ???? URL http:/ AMHCBQ. ISSN 0096-3003 /link.springer-ny.com/ (print), 1873-5649 (elec- link/service/series/0558/ tronic). tocs/t3027.htm; http: //www.springerlink.com/ Chang:2005:ASN openurl.asp?genre=issue& [CC05b] Ya-Fen Chang and Chin- issn=0302-9743&volume= Chen Chang. Authentica- 3027; http://www.springerlink. tion schemes with no ver- com/openurl.asp?genre= ification table. Applied volume&id=doi:10.1007/ Mathematics and Computa- b97182. tion, 167(2):820–832, Au- Chang:2004:SES gust 15, 2005. CODEN AMHCBQ. ISSN 0096-3003 [CC04b] Ya-Fen Chang and Chin- (print), 1873-5649 (elec- Chen Chang. A se- tronic). cure and efficient strong- password authentication Chang:2005:EAP protocol. Operating Sys- [CC05c] Ya-Fen Chang and Chin- tems Review, 38(3):79–90, Chen Chang. An efficient July 2004. CODEN OS- for RED8. ISSN 0163-5980 mobile satellite communica- (print), 1943-586X (elec- tion systems. Operating tronic). Systems Review, 39(1):70– Cousot:2004:AIB 84, January 2005. CODEN OSRED8. ISSN 0163-5980 [CC04c] Patrick Cousot and Rad- (print), 1943-586X (elec- hia Cousot. An abstract tronic). interpretation-based frame- work for software water- Comon:2005:TAO marking. ACM SIGPLAN [CC05d] Hubert Comon and V´eronique Notices, 39(1):173–185, Jan- Cortier. Tree automata uary 2004. CODEN SIN- with one memory set con- ODQ. ISSN 0362-1340 straints and cryptographic (print), 1523-2867 (print), protocols. Theoretical Com- 1558-1160 (electronic). puter Science, 331(1):143– Chan:2005:STM 214, February 15, 2005. CODEN TCSCDI. ISSN [CC05a] Chao-Wen Chan and Chin- 0304-3975 (print), 1879- Chen Chang. A scheme for 2294 (electronic). REFERENCES 194

Crandall:2005:SAM scheme inspired by wet pa- per codes. Fundamenta In- [CC05e] Jedidiah R. Crandall and formaticae, 90(1–2):17–26, Frederic T. Chong. A se- January 2009. CODEN FU- curity assessment of the MAAJ. ISSN 0169-2968 Minos architecture. ACM (print), 1875-8681 (elec- SIGARCH Computer Ar- tronic). chitecture News, 33(1):48– 57, March 2005. CODEN Chan:2001:WEF CANED2. ISSN 0163-5964 (print), 1943-5851 (elec- tronic). [CCCY01] Alvin T. S. Chan, Jian- nong Cao, Henry Chan, Chuang:2006:USF and Gilbert Young. A Web-enabled framework for [CC06] J.-C. Chuang and C.-C. smart card applications in Chang. Using a simple health services. Com- and fast image compres- munications of the As- sion algorithm to hide se- sociation for Computing cret information. Inter- Machinery, 44(9):76–82, national Journal of Com- September 2001. CODEN puter Applications, 28(4): CACMA2. ISSN 0001-0782 329–333, 2006. ISSN 1206- (print), 1557-7317 (elec- 212X (print), 1925-7074 tronic). URL http://www. (electronic). URL https: acm.org/pubs/articles/ //www.tandfonline.com/ journals/cacm/2001-44- doi/full/10.1080/1206212X. 9/p76-chan/p76-chan.pdf; 2006.11441818. http://www.acm.org/pubs/ Chen:2008:SNI citations/journals/cacm/ 2001-44-9/p76-chan/. [CC08] Chien-Chang Chen and Yu- Wei Chien. Sharing numer- Collberg:2004:DPB ous images secretly with re- duced possessing load. Fun- [CCD+04] C. Collberg, E. Carter, damenta Informaticae,86 S. Debray, A. Huntwork, (4):447–458, October 2008. J. Kececioglu, C. Linn, CODEN FUMAAJ. ISSN and M. Stepp. Dynamic 0169-2968 (print), 1875- path-based software wa- 8681 (electronic). termarking. ACM SIG- Chang:2009:FDI PLAN Notices, 39(6):107– 118, May 2004. CODEN [CC09] Chin-Chen Chang and SINODQ. ISSN 0362-1340 Yung-Chen Chou. A fragile (print), 1523-2867 (print), digital image authentication 1558-1160 (electronic). REFERENCES 195

Cimato:2006:UMU Hsuan Huang. A trace- able proxy multisignature [CCD06] Stelvio Cimato, Antonella scheme based on the el- Cresti, and Paolo D’Arco. A liptic curve cryptosystem. unified model for uncondi- Applied Mathematics and tionally secure key distribu- Computation, 159(1):137– tion. Journal of Computer 145, November 25, 2004. Security, 14(1):45–64, ???? CODEN AMHCBQ. ISSN 2006. CODEN JCSIET. 0096-3003 (print), 1873- ISSN 0926-227X (print), 5649 (electronic). 1875-8924 (electronic). Chang:2005:DSM Chai:2007:EIB [CCH05] Ya-Fen Chang, Chin-Chen [CCD07] Zhenchuan Chai, Zhenfu Chang, and Hui-Feng Huang. Cao, and Xiaolei Dong. Digital signature with mes- Efficient ID-based multi- sage recovery using self- receiver threshold decryp- certified public keys without tion. International Jour- trustworthy system author- nal of Foundations of Com- ity. Applied Mathematics puter Science (IJFCS),18 and Computation, 161(1): (5):987–1004, October 2007. 211–227, February 4, 2005. CODEN IFCSEN. ISSN CODEN AMHCBQ. ISSN 0129-0541 (print), 1793- 0096-3003 (print), 1873- 6373 (electronic). 5649 (electronic). Cattaneo:2001:DIT Chang:2004:IDA [CCDP01] Giuseppe Cattaneo, Luigi [CCK04a] Ya-Fan Chang, Chin-Chen Catuogno, Aniello Del Chang, and Chia-Lin Kao. Sorbo, and Pino Persiano. An improvement on a de- The design and implemen- niable authentication pro- tation of a transparent tocol. Operating Systems cryptographic file system Review, 38(3):65–74, July for UNIX. In USENIX 2004. CODEN OSRED8. [USE01b], page ?? ISBN ISSN 0163-5980 (print), 1-880446-10-3. LCCN 1943-586X (electronic). QA76.8.U65 U84 2001. URL http://www.usenix.org/ Chang:2004:SOT publications/library/proceedings/ usenix01/freenix01/cattaneo.[CCK04b] Ya-Fen Chang, Chin-Chen html. Chang, and Jui-Yi Kuo. Chen:2004:TPM A secure one-time password authentication scheme using [CCH04] Tzer-Shyong Chen, Yu- Smart Cards without limit- Fang Chung, and Kuo- ing login times. Operating REFERENCES 196

Systems Review, 38(4):80– puter Journal, 48(4):437– 90, October 2004. CODEN 442, July 2005. CODEN OSRED8. ISSN 0163-5980 CMPJA6. ISSN 0010-4620 (print), 1943-586X (elec- (print), 1460-2067 (elec- tronic). tronic). URL http:// comjnl.oxfordjournals. Chang:2009:PCC org/cgi/content/abstract/ [CCL09] Chin-Chen Chang, Tzung- 48/4/437; http://comjnl. Her Chen, and Li-Jen Liu. oxfordjournals.org/cgi/ Preventing cheating in com- reprint/48/4/437. putational visual cryptogra- Christianson:2002:SPI phy. Fundamenta Informat- icae, 92(1–2):27–42, Jan- [CCMR02] Bruce Christianson, Bruno uary 2009. CODEN FU- Crispo, James A. Mal- MAAJ. ISSN 0169-2968 colm, and Michael Roe, (print), 1875-8681 (elec- editors. Security Pro- tronic). tocols: 9th International Workshop Cambridge, UK, Christianson:2001:PKC April 25–27, 2001. Re- vised Papers, volume 2467 [CCM01] Bruce Christianson, Bruno of Lecture Notes in Com- Crispo, and James A. Mal- puter Science. Springer-Ver- colm. Public-key crypto- lag, Berlin, Germany / Hei- systems using symmetric- delberg, Germany / Lon- key crypto-algorithms. Lec- don, UK / etc., 2002. CO- ture Notes in Computer Sci- DEN LNCSD9. ISBN 3-540- ence, 2133:182–??, 2001. 44263-4. ISSN 0302-9743 CODEN LNCSD9. ISSN (print), 1611-3349 (elec- 0302-9743 (print), 1611- tronic). LCCN QA76.9.A25 3349 (electronic). URL S443 2002. URL http: http://link.springer-ny. //link.springer-ny.com/ com/link/service/series/ link/service/series/0558/ 0558/bibs/2133/21330182. tocs/t2467.htm; http: htm; http://link.springer- //www.springerlink.com/ ny.com/link/service/series/ openurl.asp?genre=issue& 0558/papers/2133/21330182. issn=0302-9743&volume= pdf. 2467. Choi:2005:JMA Christianson:2005:SPI [CCM05] Hyung-Kyu Choi, Yoo C. [CCMR05] Bruce Christianson, Bruno Chung, and Soo-Mook Crispo, James A. Mal- Moon. Java memory alloca- colm, and Michael Roe, tion with lazy worst fit for editors. Security Proto- small objects. The Com- cols: 11th International REFERENCES 197

Workshop, Cambridge, UK, Caboara:2008:GBP April 2–4, 2003, Revised Selected Papers,volume[CCT08] Massimo Caboara, Fabrizio 3364 of Lecture Notes in Caruso, and Carlo Traverso. Computer Science. Spring- Gr¨obner bases for public er-Verlag, Berlin, Ger- key cryptography. In Jef- many / Heidelberg, Ger- frey [Jef08], pages 315–324. many / London, UK / etc., ISBN 1-59593-904-0. LCCN 2005. CODEN LNCSD9. ???? ISBN 3-540-28389-7. ISSN Choi:2002:IPP 0302-9743 (print), 1611- 3349 (electronic). LCCN [CCW02] Dug-Hwan Choi, Seungbok ???? URL http:/ Choi, and Dongho Won. /www.springerlink.com/ Improvement of probabilis- openurl.asp?genre=issue& tic public key cryptosys- issn=0302-9743&volume= tems using discrete loga- 3364. rithm. Lecture Notes in Computer Science, 2288: Castelluccia:2009:EPS 72–??, 2002. CODEN [CCMT09] Claude Castelluccia, Aldar LNCSD9. ISSN 0302- C-F. Chan, Einar Mykle- 9743 (print), 1611-3349 tun, and Gene Tsudik. Ef- (electronic). URL http: ficient and provably secure //link.springer-ny.com/ aggregation of encrypted link/service/series/0558/ data in wireless sensor net- bibs/2288/22880072.htm; works. ACM Transactions http://link.springer- on Sensor Networks, 5(3): ny.com/link/service/series/ 20:1–20:??, May 2009. CO- 0558/papers/2288/22880072. DEN ???? ISSN 1550-4859 pdf. (print), 1550-4867 (elec- Camenisch:2000:VEG tronic). [CD00a] Jan Camenisch and Ivan Chen:2008:NMA Damg˚ard. Verifiable en- [CCS08] Yalin Chen, Jue-Sam Chou, cryption, group encryp- and Hung-Min Sun. A tion, and their applications novel mutual authentication to separable group signa- scheme based on quadratic tures and signature shar- residues for RFID systems. ing schemes (extended ab- Computer Networks (Ams- stract). In Advances in terdam, Netherlands: 1999), cryptology—ASIACRYPT 52(12):2373–2380, August 2000 (Kyoto), volume 1976 22, 2008. CODEN ???? of Lecture Notes in Comput. ISSN 1389-1286 (print), Sci., pages 331–345. Spring- 1872-7069 (electronic). er-Verlag, Berlin, Ger- REFERENCES 198

many / Heidelberg, Ger- DEN LNCSD9. ISSN 0302- many / London, UK / 9743 (print), 1611-3349 etc., 2000. URL http: (electronic). URL http: //link.springer-ny.com/ //link.springer-ny.com/ link/service/series/0558/ link/service/series/0558/ bibs/1976/19760331.htm; bibs/2260/22600329.htm; http://link.springer- http://link.springer- ny.com/link/service/series/ ny.com/link/service/series/ 0558/papers/1976/19760331. 0558/papers/2260/22600329. pdf. pdf. Carpenter:2000:CB Cramer:2000:CVS

[CD00b] Mary Carpenter and Betty Paul[CDD00] Ronald Cramer, Ivan Damg˚ard, Dowse. The code breakers of and Stefan Dziembowski. 1942. Wellesley, ??(??):26– On the complexity of ver- 30, Winter 2000. ifiable secret sharing and multiparty computation. In Cramer:2001:SDL ACM [ACM00], pages 325– 334. ISBN 1-58113-184- [CD01a] Ronald Cramer and Ivan 4. URL http://www. Damg˚ard. Secure dis- acm.org/pubs/articles/ tributed linear algebra in a proceedings/stoc/335305/ constant number of rounds. p325-cramer/p325-cramer. In Kilian [Kil01a], pages pdf; http://www.acm. 119–?? ISBN 3-540- org/pubs/citations/proceedings/ 42456-3 (paperback). LCCN stoc/335305/p325-cramer/ QA76.9.A25 C79 2001; . ACM order number QA267.A1 L43 no.2139. 508000. UK£47.00. URL http: //link.springer-ny.com/ Ceselli:2005:MAI link/service/series/0558/[CDD+05] Alberto Ceselli, Ernesto bibs/2139/21390119.htm; Damiani, Sabrina De Capi- http://link.springer- tani Di Vimercati, Sushil Ja- ny.com/link/service/series/ jodia, Stefano Paraboschi, 0558/papers/2139/21390119. and Pierangela Samarati. pdf. Modeling and assessing in- Crouch:2001:LAR ference exposure in en- crypted databases. ACM [CD01b] P. A. Crouch and J. H. Transactions on Informa- Davenport. Lattice at- tion and System Security,8 tacks on RSA-encrypted (1):119–152, February 2005. IP and TCP. Lecture CODEN ATISBQ. ISSN Notes in Computer Science, 1094-9224 (print), 1557- 2260:329–??, 2001. CO- 7406 (electronic). REFERENCES 199

Cimato:2007:CVC Cramer:2005:CMS

[CDD07] S. Cimato, R. De Prisco, [CDG+05] Ronald Cramer, Vanesa and A. De Santis. Colored Daza, Ignacio Gracia, Jorge Jim´enez visual cryptography without Urroz, Gregor Leander, color darkening. Theoretical Jaume Mart´ı-Farr´e, and Computer Science, 374(1– Carles Padr´o. On codes, 3):261–276, April 20, 2007. matroids and secure multi- CODEN TCSCDI. ISSN party computation from lin- 0304-3975 (print), 1879- ear secret sharing schemes. 2294 (electronic). In Shoup [Sho05a], pages Cramer:2001:CRS 327–?? ISBN 3-540- 28114-2. ISSN 0302-9743 [CDF01] Ronald Cramer, Ivan Damg˚ard, (print), 1611-3349 (elec- and Serge Fehr. On the tronic). LCCN QA76.9.A25 cost of reconstructing a se- C79 2005; QA76.9 .A25; cret, or VSS with optimal QA76.9 C79 2005; QA76.9 reconstruction phase. In C794 2005; QA76.9; In- Kilian [Kil01a], pages 503– ternet. URL http:/ ?? ISBN 3-540-42456- /www.springerlink.com/ 3 (paperback). LCCN openurl.asp?genre=issue& QA76.9.A25 C79 2001; issn=0302-9743&volume= QA267.A1 L43 no.2139. 3621. UK£47.00. URL http: Cramer:2005:SCP //link.springer-ny.com/ link/service/series/0558/[CDI05] Ronald Cramer, Ivan Damg˚ard, bibs/2139/21390503.htm; and Yuval Ishai. Share http://link.springer- conversion, pseudorandom ny.com/link/service/series/ secret-sharing and applica- 0558/papers/2139/21390503. tions to secure computa- pdf. tion. In Kilian [Kil05], pages Cimato:2005:ICV 342–?? CODEN LNCSD9. ISBN 3-540-24573-1 (soft- [CDFM05] Stelvio Cimato, Alfredo De cover). ISSN 0302-9743 Santis, Anna Lisa Ferrara, (print), 1611-3349 (elec- and Barbara Masucci. Ideal tronic). LCCN QA76.9.A25 contrast visual cryptogra- T44 2005. URL http: phy schemes with revers- //www.springerlink.com/ ing. Information Process- openurl.asp?genre=issue& ing Letters, 93(4):199–206, issn=0302-9743&volume= February 28, 2005. CODEN 3378; http://www.springerlink. IFPLAT. ISSN 0020-0190 com/openurl.asp?genre= (print), 1872-6119 (elec- volume&id=doi:10.1007/ tronic). b106171. REFERENCES 200

Cavallar:2000:FBR secure multi-party computa- tion from any linear secret- [CDL+00] Stefania Cavallar, Bruce sharing scheme. Lecture Dodson, Arjen K. Lenstra, Notes in Computer Science, Walter Lioen, Peter L. 1807:316–??, 2000. CO- Montgomery, Brian Mur- DEN LNCSD9. ISSN 0302- phy, Herman te Riele, 9743 (print), 1611-3349 Karen Aardal, Jeff Gilchrist, (electronic). URL http: G´erard Guillerm, Paul //link.springer-ny.com/ Leyland, Jo¨el Marchand, link/service/series/0558/ Fran¸cois Morain, Alec Muf- bibs/1807/18070316.htm; fett, Chris Putnam, Craig http://link.springer- Putnam, and Paul Zimmer- ny.com/link/service/series/ mann. Factorization of a 0558/papers/1807/18070316. 512-bit RSA modulus. Lec- pdf. ture Notes in Computer Sci- Chawla:2005:TPP ence, 1807:1–18, 2000. CO- DEN LNCSD9. ISSN 0302- [CDM+05] Shuchi Chawla, Cynthia 9743 (print), 1611-3349 Dwork, Frank McSherry, (electronic). URL http: Adam Smith, and Hoeteck //link.springer-ny.com/ Wee. Toward privacy in link/service/series/0558/ public databases. In Kil- bibs/1807/18070001.htm; ian [Kil05], pages 363– http://link.springer- ?? CODEN LNCSD9. ny.com/link/service/series/ ISBN 3-540-24573-1 (soft- 0558/papers/1807/18070001. cover). ISSN 0302-9743 pdf. (print), 1611-3349 (elec- tronic). LCCN QA76.9.A25 Cortier:2006:SAP T44 2005. URL http: [CDL06] V´eronique Cortier, St´ephanie //www.springerlink.com/ Delaune, and Pascal Lafour- openurl.asp?genre=issue& cade. A survey of algebraic issn=0302-9743&volume= properties used in crypto- 3378; http://www.springerlink. graphic protocols. Journal com/openurl.asp?genre= of Computer Security, 14(1): volume&id=doi:10.1007/ 1–43, ???? 2006. CODEN b106171. JCSIET. ISSN 0926-227X Coron:2005:MDR (print), 1875-8924 (elec- [CDMP05] Jean-S´ebastien Coron, Yev- tronic). geniy Dodis, C´ecile Malin- Cramer:2000:GSM aud, and Prashant Puniya. Merkle–Damg˚ard revisited: [CDM00] Ronald Cramer, Ivan Damg˚ard, How to construct a hash and Ueli Maurer. General function. In Shoup [Sho05a], REFERENCES 201

pages 430–?? ISBN 3-540- LNCSD9. ISSN 0302- 28114-2. ISSN 0302-9743 9743 (print), 1611-3349 (print), 1611-3349 (elec- (electronic). URL http: tronic). LCCN QA76.9.A25 //link.springer-ny.com/ C79 2005; QA76.9 .A25; link/service/series/0558/ QA76.9 C79 2005; QA76.9 bibs/2200/22000156.htm; C794 2005; QA76.9; In- http://link.springer- ternet. URL http:/ ny.com/link/service/series/ /www.springerlink.com/ 0558/papers/2200/22000156. openurl.asp?genre=issue& pdf. issn=0302-9743&volume= 3621. Castiglione:2007:TAD Cramer:2001:MCT [CDS07] A. Castiglione, A. De San- tis, and C. Soriente. Taking [CDN01] Ronald Cramer, Ivan Damg˚ard, advantages of a disadvan- and Jesper B. Nielsen. Mul- tage: Digital forensics and tiparty computation from steganography using docu- threshold homomorphic en- ment metadata. The Jour- cryption. In Advances in nal of Systems and Software, cryptology—EUROCRYPT 80(5):750–764, May 2007. 2001 (Innsbruck),volume CODEN JSSODM. ISSN 2045 of Lecture Notes in 0164-1212 (print), 1873- Comput. Sci., pages 280– 1228 (electronic). 300. Springer-Verlag, Berlin, Germany / Heidelberg, Ger- Chen:2005:NVW many / London, UK / etc., 2001. URL http: [CDTT05] Zhenyong Chen, Junhui //link.springer-ny.com/ Deng, Long Tang, and Zesh- link/service/series/0558/ eng Tang. A novel video bibs/2045/20450280.htm; watermarking resistant to http://link.springer- spatio-temporal desynchro- ny.com/link/service/series/ nization. In Han et al. 0558/papers/2045/20450280. [HYZ05b], pages 532–?? pdf. ISBN 981-270-153-2. LCCN ???? URL http:// Chapman:2001:PEA eproceedings.worldscinet. [CDR01] Mark Chapman, George I. com/9812701532/9812701532. Davida, and Marc Rennhard. 0031.html. A practical and effective ap- Ceravolo:2004:ERH proach to large-scale auto- mated linguistic steganog- [Cer04a] P. Ceravolo. Extracting role raphy. Lecture Notes in hierarchies from authentica- Computer Science, 2200: tion data flows. Interna- 156–??, 2001. CODEN tional Journal of Computer REFERENCES 202

Systems Science and Engi- DEN LNCSD9. ISSN 0302- neering, 19(3):??, May 2004. 9743 (print), 1611-3349 CODEN CSSEEI. ISSN (electronic). URL http: 0267-6192. //link.springer-ny.com/ link/service/series/0558/ Certicom:2004:CCC bibs/1978/19780165.htm; [Cer04b] Code & Cipher: Cer- http://link.springer- ticom’s Bulletin of Se- ny.com/link/service/series/ curity and Cryptography, 0558/papers/1978/19780165. 2004. URL http://www. pdf. certicom.com/codeandcipher. Cramer:2002:OBB Certicom, 5520 Explorer Drive, 4th Floor Missis- [CF02] Ronald Cramer and Serge sauga, Ontario, L4W 5L1 Fehr. Optimal black-box Canada. Published quar- secret sharing over arbi- terly. trary Abelian groups. In Canetti:2001:UCC Yung [Yun02a], pages 272– 287. CODEN LNCSD9. [CF01a] Ran Canetti and Marc Fis- ISBN 3-540-44050-X (pa- chlin. Universally com- perback). ISSN 0302-9743 posable commitments. In (print), 1611-3349 (elec- Kilian [Kil01a], pages 19– tronic). LCCN QA76.9.A25 ?? ISBN 3-540-42456- C79 2002. URL http:/ 3 (paperback). LCCN /link.springer.de/link/ QA76.9.A25 C79 2001; service/series/0558/bibs/ QA267.A1 L43 no.2139. 2442/24420272.htm; http: UK£47.00. URL http: //link.springer.de/link/ //link.springer-ny.com/ service/series/0558/papers/ link/service/series/0558/ 2442/24420272.pdf. bibs/2139/21390019.htm; http://link.springer- Clarke:2005:AUM ny.com/link/service/series/[CF05] N. L. Clarke and S. M. 0558/papers/2139/21390019. Furnell. Authentication of . pdf users on mobile telephones Canteaut:2001:COR — a survey of attitudes and practices. Comput- [CF01b] Anne Canteaut and Eric Fil- ers & Security, 24(7):519– iol. Ciphertext only re- 527, October 2005. CODEN construction of stream ci- CPSEDU. ISSN 0167-4048 phers based on combina- (print), 1872-6208 (elec- tion generators. Lecture tronic). URL https:// Notes in Computer Science, www.sciencedirect.com/ 1978:165–??, 2001. CO- science/article/pii/S0167404805001446. REFERENCES 203

Clarke:2007:AUA Courtois:2001:HAM [CF07] N. L. Clarke and S. M. [CFS01] Nicolas T. Courtois, Matthieu Furnell. Advanced user Finiasz, and Nicolas Sendrier. authentication for mobile How to achieve a McEliece- devices. Computers & based digital signature Security, 26(2):109–119, scheme. Lecture Notes in March 2007. CODEN Computer Science, 2248: CPSEDU. ISSN 0167-4048 157–??, 2001. CODEN (print), 1872-6208 (elec- LNCSD9. ISSN 0302- tronic). URL https:// 9743 (print), 1611-3349 www.sciencedirect.com/ (electronic). URL http: science/article/pii/S0167404806001428. //link.springer-ny.com/ link/service/series/0558/ Cohen:2006:HEH bibs/2248/22480157.htm; [CFA+06] Henri Cohen, Gerhard Frey, http://link.springer- Roberto Avanzi, et al., ed- ny.com/link/service/series/ itors. Handbook of Ellip- 0558/papers/2248/22480157. tic and Hyperelliptic Curve pdf. Cryptography. Discrete Cramer:2005:BBS mathematics and its ap- plications. Chapman and [CFS05] Ronald Cramer, Serge Fehr, Hall/CRC, Boca Raton, FL, and Martijn Stam. Black- USA, 2006. ISBN 1-58488- box secret sharing from 518-1. xxxiv + 808 pp. primitive sets in alge- LCCN QA567.2.E44 H36 braic number fields. In 2006. URL http://www. Shoup [Sho05a], pages loc.gov/catdir/enhancements/ 344–?? ISBN 3-540- fy0647/2005041841-d.html. 28114-2. ISSN 0302-9743 Clarke:2002:ASA (print), 1611-3349 (elec- tronic). LCCN QA76.9.A25 [CFRR02] N. L. Clarke, S. M. Fur- C79 2005; QA76.9 .A25; nell, P. M. Rodwell, and QA76.9 C79 2005; QA76.9 P. L. Reynolds. Accep- C794 2005; QA76.9; In- tance of subscriber authen- ternet. URL http:/ tication methods for mobile /www.springerlink.com/ telephony devices. Comput- openurl.asp?genre=issue& ers & Security, 21(3):220– issn=0302-9743&volume= 228, June 1, 2002. CODEN 3621. CPSEDU. ISSN 0167-4048 Climent:2006:NEC (print), 1872-6208 (elec- tronic). URL https:// [CFVZ06] Joan-Josep Climent, Fran- www.sciencedirect.com/ cisco Ferr´andez, Jos´e-Francisco science/article/pii/S0167404802003048. Vicent, and Antonio Zamora. REFERENCES 204

A nonlinear elliptic curve com/openurl.asp?genre= cryptosystem based on ma- volume&id=doi:10.1007/ trices. Applied Mathemat- b13240. ics and Computation, 174 Cranor:2005:SUD (1):150–164, March 1, 2006. CODEN AMHCBQ. ISSN [CG05] Lorrie Faith Cranor and 0096-3003 (print), 1873- Simson Garfinkel. Security 5649 (electronic). and usability: designing se- Chang:2010:PRN cure systems that people can use. O’Reilly & Associates, [CFY+10] Weiling Chang, Binxing Inc., 103a Morris Street, Se- Fang, Xiaochun Yun, Shu- bastopol, CA 95472, USA, peng Wang, and Xiangzhan Tel: +1 707 829 0515, and Yu. A pseudo-random 90 Sherman Street, Cam- number generator based bridge, MA 02140, USA, on LZSS. In 2010 Data Tel: +1 617 354 5800, 2005. Compression Conference ISBN 0-596-00827-9 (paper- (DCC), page 524. IEEE back). xviii + 714 pp. LCCN Computer Society Press, QA76.9.A25; QA76.9.A25 1109 Spring Street, Suite S3533 2005; QA76.9.A25 300, Silver Spring, MD S43 2005eb; QA76.9.A25 20910, USA, 2010. URL S43 2005. US$44.95, http://ieeexplore.ieee. CDN$62.95, UK£31.95. org/stamp/stamp.jsp?tp= &arnumber=5453503. Candebat:2006:SPM Chodowiec:2003:VCF [CG06] Thibault Candebat and David Gray. Secure [CG03] Pawe l Chodowiec and Kris pseudonym management us- Gaj. Very compact FPGA ing mediated identity-based implementation of the AES encryption. Journal of Com- algorithm. In Walter puter Security, 14(3):249– et al. [WKP03], pages 319– 267, ???? 2006. CODEN 333. CODEN LNCSD9. JCSIET. ISSN 0926-227X ISBN 3-540-40833-9. ISSN (print), 1875-8924 (elec- 0302-9743 (print), 1611- tronic). 3349 (electronic). LCCN TK7895.E42. URL http: Chodowiec:2001:ETG //link.springer-ny.com/ link/service/series/0558/[CGBS01] Pawel Chodowiec, Kris Gaj, tocs/t2779.htm; http: Peter Bellows, and Brian //www.springerlink.com/ Schott. Experimental test- openurl.asp?genre=issue& ing of the Gigabit IPSec- issn=0302-9743&volume= compliant implementations 2779; http://www.springerlink. of Rijndael and Triple DES REFERENCES 205

using SLAAC-1V FPGA ac- bibs/1807/18070190.htm; celerator board. Lecture http://link.springer- Notes in Computer Science, ny.com/link/service/series/ 2200:220–??, 2001. CO- 0558/papers/1807/18070190. DEN LNCSD9. ISSN 0302- pdf. 9743 (print), 1611-3349 (electronic). URL http: Coppersmith:2000:ICT //link.springer-ny.com/ [CGH+00b] Don Coppersmith, Rosario link/service/series/0558/ Gennaro, Shai Halevi, Cha- bibs/2200/22000220.htm; ranjit Jutla, Stephen M. http://link.springer- Matyas, Jr., Mohammad ny.com/link/service/series/ Peyravian, David Safford, 0558/papers/2200/22000220. and Nevenko Zunic. IBM pdf. comments: Third AES Con- Caballero-Gil:2009:GBA ference April 13, 2000. In NIST [NIS00], pages 333– [CGFSHG09] P. Caballero-Gil, A. F´uster- 336. ISBN ???? LCCN ???? Sabater, and C. Hern´andez- URL http://csrc.nist. Goya. Graph-based ap- gov/encryption/aes/round2/ proach to the edit distance conf3/aes3conf.htm; http: cryptanalysis of irregularly //csrc.nist.gov/encryption/ clocked linear feedback shift aes/round2/conf3/papers/ registers. J.UCS: Journal AES3Proceedings-1.pdf; of Universal Computer Sci- http://csrc.nist.gov/ ence, 15(15):2981–??, ???? encryption/aes/round2/ 2009. CODEN ???? ISSN conf3/papers/AES3Proceedings- 0948-6968. URL http: 2.pdf; http://csrc.nist. //www.jucs.org/jucs_15_ gov/encryption/aes/round2/ 15/graph_based_approach_ conf3/papers/AES3Proceedings- to. 3.pdf; http://csrc.nist. Catalano:2000:CIS gov/encryption/aes/round2/ conf3/papers/AES3Proceedings. [CGH00a] Dario Catalano, Rosario pdf. Gennaro, and Shai Halevi. Computing inverses over Catalano:2001:BSP a shared secret modu- lus. Lecture Notes in [CGHG01] Dario Catalano, Rosario Computer Science, 1807: Gennaro, and Nick Howgrave- 190–??, 2000. CODEN Graham. The bit secu- LNCSD9. ISSN 0302- rity of Paillier’s encryp- 9743 (print), 1611-3349 tion scheme and its appli- (electronic). URL http: cations. In Advances in //link.springer-ny.com/ cryptology—EUROCRYPT link/service/series/0558/ 2001 (Innsbruck),volume REFERENCES 206

2045 of Lecture Notes in 0558/papers/2320/23200192. Comput. Sci., pages 229– pdf. 243. Springer-Verlag, Berlin, Germany / Heidelberg, Ger- Clarke:2002:UCP many / London, UK / etc., 2001. URL http: [CGK+02] Dwaine Clarke, Blaise //link.springer-ny.com/ Gassend, Thomas Kotwal, link/service/series/0558/ Matt Burnside, Marten van bibs/2045/20450229.htm; Dijk, Srinivas Devadas, and http://link.springer- Ronald Rivest. The un- ny.com/link/service/series/ trusted computer problem 0558/papers/2045/20450229. and camera-based authen- pdf. tication. Lecture Notes in Computer Science, 2414: Caballero-Gil:2006:SSB 114–??, 2002. CODEN LNCSD9. ISSN 0302- [CGHG06] P. Caballero-Gil and C. Hern´andez- 9743 (print), 1611-3349 Goya. Secret sharing based (electronic). URL http: on a hard-on-average prob- //link.springer-ny.com/ lem. Linear Algebra and link/service/series/0558/ its Applications, 414(2–3): bibs/2414/24140114.htm; 626–631, April 15, 2006. http://link.springer- CODEN LAAPAW. ISSN ny.com/link/service/series/ 0024-3795 (print), 1873- 0558/papers/2414/24140114. 1856 (electronic). pdf.

Crosby:2002:CHB Chen:2008:OVBa

[CGJ+02] Scott Crosby, Ian Goldberg, [CGL+08a] Xiaoxin Chen, Tal Garfinkel, Robert Johnson, Dawn E. Christopher Lewis, Pratap Song, and David Wagner. Subrahmanyam, Carl A. A cryptanalysis of the high- Waldspurger, Dan Boneh, bandwidth digital content Jeffrey Dwoskin, and Dan protection system. Lecture R. K. Ports. Overshadow: Notes in Computer Science, a virtualization-based ap- 2320:192–??, 2002. CO- proach to retrofitting pro- DEN LNCSD9. ISSN 0302- tection in commodity op- 9743 (print), 1611-3349 erating systems. ACM (electronic). URL http: SIGARCH Computer Ar- //link.springer-ny.com/ chitecture News, 36(1):2– link/service/series/0558/ 13, March 2008. CODEN bibs/2320/23200192.htm; CANED2. ISSN 0163-5964 http://link.springer- (print), 1943-5851 (elec- ny.com/link/service/series/ tronic). REFERENCES 207

Chen:2008:OVBb 0-7354-0477-1 (vol. 1), 0- 7354-0478-X (vol. 2). ISSN + [CGL 08b] Xiaoxin Chen, Tal Garfinkel, 0094-243X (print), 1551- E. Christopher Lewis, Pratap 7616 (electronic), 1935- Subrahmanyam, Carl A. 0465. LCCN Q183.9 Waldspurger, Dan Boneh, .I524 2007. URL http: Jeffrey Dwoskin, and Dan //proceedings.aip.org/ R. K. Ports. Overshadow: getpdf/servlet/GetPDFServlet? a virtualization-based ap- filetype=pdf& id= proach to retrofitting pro- APCPCS000963000002000935000001& tectionincommodityop- amp; idtype=cvips. erating systems. Operat- ing Systems Review, 42(2): Canovas:2002:DSB 2–13, March 2008. CODEN OSRED8. ISSN 0163-5980 [CGMM02] Oscar´ C´anovas, Antonio F. (print), 1943-586X (elec- G´omez, Humberto Mart´ınez, tronic). and Gregorio Mart´ınez. Dif- Chen:2008:OVBc ferent Smartcard-based ap- proaches to physical access [CGL+08c] Xiaoxin Chen, Tal Garfinkel, control. Lecture Notes in E. Christopher Lewis, Pratap Computer Science, 2437: Subrahmanyam, Carl A. 214–??, 2002. CODEN Waldspurger, Dan Boneh, LNCSD9. ISSN 0302-9743 Jeffrey Dwoskin, and Dan (print), 1611-3349 (elec- R. K. Ports. Overshadow: tronic). URL http:// a virtualization-based ap- link.springer.de/link/ proach to retrofitting pro- service/series/0558/bibs/ tection in commodity oper- 2437/24370214.htm; http: ating systems. ACM SIG- //link.springer.de/link/ PLAN Notices, 43(3):2–13, service/series/0558/papers/ March 2008. CODEN SIN- 2437/24370214.pdf. ODQ. ISSN 0362-1340 (print), 1523-2867 (print), Cox:2002:SP9 1558-1160 (electronic). [CGP+02] Russ Cox, Eric Grosse, Caballero-Gil:2007:PSC Rob Pike, Dave Presotto, [CGM07] Pino Caballero-Gil and and Sean Quinlan. Se- Gerasimos C. Meletiou. curity in Plan 9. In Preface of the symposium USENIX [USE02b], pages 15: Cryptology, informa- 3–16. ISBN 1-931971-00- tion security, and networks. 5. LCCN ???? URL In Simos and Maroulis http://plan9.bell-labs. [SM07b], pages 935–936. com/sys/doc/auth.pdf; ISBN 0-7354-0476-3 (set), http://www.usenix.org/ REFERENCES 208

publications/library/proceedings/ Chow:2009:ADN sec02/cox.html. [CGV09] Stanley T. Chow, Christophe Cimato:2003:SCN Gustave, and Dmitri Vi- nokurov. Authenticating [CGP03] Stelvio Cimato, Clemente displayed names in tele- Galdi, and Guiseppe Per- phony. Bell Labs Tech- siano, editors. Secu- nical Journal, 14(1):267– rity in communication net- 282, Spring 2009. CODEN works: Third International BLTJFD. ISSN 1089-7089 Conference, SCN 2002, (print), 1538-7305 (elec- Amalfi, Italy, September tronic). 11–13, 2002: Revised Pa- pers, volume 2576 of Lecture Crotch-Harvey:2000:OPR Notes in Computer Science. [CH00] Trevor Crotch-Harvey. Op- Springer-Verlag, Berlin, erators are poised to reap Germany / Heidelberg, Ger- smart card benefits. Inter- many / London, UK / etc., national railway journal and 2003. CODEN LNCSD9. rapid transit review: IRJ,40 ISBN 3-540-00420-3 (soft- (2):31–32, February 2000. cover). ISSN 0302-9743 (print), 1611-3349 (elec- Chang:2001:TFG tronic). LCCN TK5105.59 [CH01a] Chin-Chen Chang and Kuo- .S385 2002. URL http: Feng Hwang. Towards the //link.springer-ny.com/ forgery of a group signa- link/service/series/0558/ ture without knowing the tocs/t2576.htm; http: group center’s secret. Lec- //www.springerlink.com/ ture Notes in Computer Sci- openurl.asp?genre=issue& ence, 2229:47–??, 2001. CO- issn=0302-9743&volume= DEN LNCSD9. ISSN 0302- 2576. Also available via the 9743 (print), 1611-3349 World Wide Web. (electronic). URL http: Cayrel:2008:SIS //link.springer-ny.com/ link/service/series/0558/ [CGP08] P.-L. Cayrel, P. Gaborit, bibs/2229/22290047.htm; and E. Prouff. Secure im- http://link.springer- plementation of the Stern ny.com/link/service/series/ authentication and signa- 0558/papers/2229/22290047. ture schemes. Lecture Notes pdf. in Computer Science, 5189: Chen:2001:SFW 191–205, 2008. CODEN LNCSD9. ISSN 0302-9743 [CH01b] Minghua Chen and Yun (print), 1611-3349 (elec- He. A synchronous frag- tronic). ile watermarking scheme for REFERENCES 209

erroneous Q–DCT coeffi- weight polynomial form in- cients detection. Lecture tegers. In Kornerup and Notes in Computer Science, Muller [KM07], pages 230– 2195:812–??, 2001. CO- 239. ISBN 0-7695-2854- DEN LNCSD9. ISSN 0302- 6. ISSN 1063-6889. LCCN 9743 (print), 1611-3349 ???? URL http://www. (electronic). URL http: lirmm.fr/arith18/. //link.springer-ny.com/ Chaum:2004:VSB link/service/series/0558/ bibs/2195/21950812.htm; [Cha04] David Chaum. E-voting: http://link.springer- Secret-ballot receipts: True ny.com/link/service/series/ voter-verifiable elections. 0558/papers/2195/21950812. IEEE Security & Pri- pdf. vacy, 2(1):38–47, January/ February 2004. CODEN Chien:2007:SUL ???? ISSN 1540-7993 [CH07a] Hung-Yu Chien and Chen- (print), 1558-4046 (elec- Wei Huang. Security of tronic). URL http://csdl. ultra-lightweight RFID au- computer.org/comp/mags/ thentication protocols and sp/2004/01/j1038abs.htm; its improvements. Operat- http://csdl.computer. ing Systems Review, 41(4): org/dl/mags/sp/2004/01/ 83–86, July 2007. CODEN j1038.pdf. OSRED8. ISSN 0163-5980 Chan:2005:MCM (print), 1943-586X (elec- tronic). [Cha05a] Alvin T. S. Chan. Mobile cookies management on a Chung:2007:ASF smart card. Communica- [CH07b] Jaewook Chung and M. An- tions of the Association for war Hasan. Asymmetric Computing Machinery,48 squaring formulae. In Ko- (11):38–43, November 2005. rnerup and Muller [KM07], CODEN CACMA2. ISSN pages 113–122. ISBN 0- 0001-0782 (print), 1557- 7695-2854-6. ISSN 1063- 7317 (electronic). 6889. LCCN ???? URL Chandra:2005:BWS http://www.lirmm.fr/arith18/ . [Cha05b] Praphul Chandra. Bul- Chung:2007:MRA letproof wireless security: GSM, UMTS, 802.11 and [CH07c] Jaewook Chung and M. An- ad hoc security.Com- war Hasan. Montgomery re- munications engineering se- duction algorithm for modu- ries. Newnes Press, Amster- lar multiplication using low- dam, The Netherlands and REFERENCES 210

Boston, MA, USA, 2005. (1):147–155, November 25, ISBN 0-7506-7746-5 (pa- 2004. CODEN AMHCBQ. perback). xxxiii + 237 ISSN 0096-3003 (print), pp. LCCN TK5103.2 .C445 1873-5649 (electronic). 2005. URL http://books. elsevier.com/us/mk/us/ Chen:2005:EUG subindex.asp?isbn=0750677465[CHC05]. Tzer-Shyong Chen, Jen- Chakrabarti:2007:GCS Yan Huang, and Tzer-Long Chen. An efficient unde- [Cha07] Anirban Chakrabarti. Grid niable group-oriented signa- computing security. Spring- ture scheme. Applied Math- er-Verlag, Berlin, Ger- ematics and Computation, many / Heidelberg, Ger- 165(1):95–102, June 6, 2005. many / London, UK / etc., CODEN AMHCBQ. ISSN 2007. ISBN 3-540-44492- 0096-3003 (print), 1873- 0 (hardcover). xiv + 331 5649 (electronic). pp. LCCN QA76.9.C58 C53 2007. Chen:2000:JCT Chang:2001:NEA [Che00a] Zhiqun Chen. Java Card technology for Smart Cards: [CHC01] Chin-Chen Chang, Min- architecture and program- Shian Hwang, and Tung- mer’s guide. Java series. Ad- Shou Chen. A new encryp- dison-Wesley, Reading, MA, tion algorithm for image USA, 2000. ISBN 0-201- cryptosystems. The Jour- 70329-7. xxii + 368 pp. nal of Systems and Soft- LCCN QA76.73.J38 C478 ware, 58(2):83–91, Septem- 2000. ber 1, 2001. CODEN JS- SODM. ISSN 0164-1212 Cherry:2000:SLD (print), 1873-1228 (elec- [Che00b] S. Cherry. Secrets and tronic). URL http://www. lies: digital security in a elsevier.com/gej-ng/10/ networked world [books]. 29/11/68/33/27/abstract. IEEE Spectrum, 37(10):15– html. 16, October 2000. CODEN Chen:2004:MCK IEESAM. ISSN 0018-9235 [CHC04] Tzer-Shyong Chen, Kuo- (print), 1939-9340 (elec- Hsuan Huang, and Yu-Fang tronic). Chung. Modified cryp- Chen:2001:DEU tographic key assignment scheme for overcoming the [Che01a] Chaur-Chin Chen. Data en- incorrectness of the CHW cryption using MRF with scheme. Applied Mathemat- an RSA key. Lecture ics and Computation, 159 Notes in Computer Science, REFERENCES 211

2195:399–??, 2001. CO- Cherry:2001:HMH DEN LNCSD9. ISSN 0302- 9743 (print), 1611-3349 [Che01d] S. M. Cherry. Hyperencryp- (electronic). URL http: tion: Much hype about little //link.springer-ny.com/ that is new [web sites]. IEEE link/service/series/0558/ Spectrum, 38(4):87, April bibs/2195/21950399.htm; 2001. CODEN IEESAM. http://link.springer- ISSN 0018-9235 (print), ny.com/link/service/series/ 1939-9340 (electronic). 0558/papers/2195/21950399. Cherry:2001:HDS pdf. [Che01e] S. M. Cherry. Is hyperlink- Chen:2001:PDP ingtodecryptionsoftware illegal? IEEE Spectrum, [Che01b] Su-Shing Chen. The para- 38(8):64–65, August 2001. dox of digital preserva- CODEN IEESAM. ISSN tion. Computer, 34(3):24– 0018-9235 (print), 1939- 28, March 2001. CODEN 9340 (electronic). CPTRB4. ISSN 0018-9162 (print), 1558-0814 (elec- Cherry:2001:REM tronic). URL http://dlib. [Che01f] S. M. Cherry. Remailers computer.org/co/books/ elude e-mail surveillance. co2001/pdf/r3024.pdf; IEEE Spectrum, 38(11):69, http://www.computer.org/ November 2001. CODEN computer/co2001/r3024abs. IEESAM. ISSN 0018-9235 htm. (print), 1939-9340 (elec- tronic). Cheon:2001:NVR Chen:2002:SFS [Che01c] Jung Hee Cheon. Non- linear vector resilient func- [Che02] Yangjun Chen. Signature tions. In Kilian [Kil01a], files and signature trees. In- pages 458–?? ISBN 3-540- formation Processing Let- 42456-3 (paperback). LCCN ters, 82(4):213–221, May QA76.9.A25 C79 2001; 31, 2002. CODEN IF- QA267.A1 L43 no.2139. PLAT. ISSN 0020-0190 UK£47.00. URL http: (print), 1872-6119 (elec- //link.springer-ny.com/ tronic). link/service/series/0558/ Cheng:2003:PPO bibs/2139/21390458.htm; http://link.springer- [Che03] Qi Cheng. Primality ny.com/link/service/series/ proving via one round in 0558/papers/2139/21390458. ECPP and one iteration in pdf. AKS. In Boneh [Bon03], REFERENCES 212

pages 338–348. CODEN Chen:2005:TSS LNCSD9. ISBN 3-540- 40674-3. ISSN 0302-9743 [Che05a] Tzer-Shyong Chen. A (print), 1611-3349 (elec- threshold signature scheme tronic). LCCN QA76.9.A25 based on the elliptic curve C79 2003. URL http: cryptosystem. Applied //link.springer-ny.com/ Mathematics and Compu- link/service/series/0558/ tation, 162(3):1119–1134, tocs/t2729.htm; http: March 25, 2005. CODEN //www.springerlink.com/ AMHCBQ. ISSN 0096-3003 openurl.asp?genre=issue& (print), 1873-5649 (elec- issn=0302-9743&volume= tronic). 2729; http://www.springerlink. Cherry:2005:MDC com/openurl.asp?genre= volume&id=doi:10.1007/ [Che05b] S. Cherry. My dad’s b11817. computer: a conservation Chen:2004:IAM with Internet security ex- pert William R. Cheswick. [Che04a] Bi-Hui Chen. Improvement IEEE Spectrum, 42(8):55– of authenticated multiple- 56, August 2005. CODEN key agreement protocol. Op- IEESAM. ISSN 0018-9235 erating Systems Review,38 (print), 1939-9340 (elec- (3):35–41, July 2004. CO- tronic). DEN OSRED8. ISSN 0163- 5980 (print), 1943-586X Chess:2005:SAC (electronic). [Che05c] David M. Chess. Security Cheng:2004:BSD in autonomic computing. [Che04b] Qi Cheng. On the bounded ACM SIGARCH Computer sum-of-digits discrete log- Architecture News, 33(1):2– arithm problem in finite 5, March 2005. CODEN fields. In Franklin [Fra04], CANED2. ISSN 0163-5964 pages 201–?? CODEN (print), 1943-5851 (elec- LNCSD9. ISBN 3-540- tronic). 22668-0. ISSN 0302-9743 Chen:2007:CIS (print), 1611-3349 (elec- tronic). LCCN 10.1007/b99099.[Che07a] Wen-Yuan Chen. Color im- URL http://www.springerlink. age steganography scheme com/openurl.asp?genre= using set partitioning in hi- issue&issn=0302-9743&volume= erarchical trees coding, dig- 3152; http://www.springerlink. ital Fourier transform and com/openurl.asp?genre= adaptive phase modulation. volume&id=doi:10.1007/ Applied Mathematics and b99099. Computation, 185(1):432– REFERENCES 213

448, February 1, 2007. CO- gorithm, the HFE cryp- DEN AMHCBQ. ISSN tosystem and Ore’s ps- 0096-3003 (print), 1873- polynomials. In Computer 5649 (electronic). mathematics (Matsuyama, 2001), volume 9 of Lec- Cherry:2007:MEV ture Notes Ser. Comput., [Che07b] S. Cherry. Making every e- pages 36–45. World Scien- vote count. IEEE Spectrum, tific Publishing Co., Sin- 44(1):13–14, January 2007. gapore; Philadelphia, PA, CODEN IEESAM. ISSN USA; River Edge, NJ, USA, 0018-9235 (print), 1939- 2001. 9340 (electronic). Choi:2009:KDK Chen:2008:CIS [CHH+09] Seung Geol Choi, Javier Herranz, Dennis Hofheinz, [Che08a] Wen-Yuan Chen. Color im- Jung Yeon Hwang, Eike age steganography scheme Kiltz, Dong Hoon Lee, and using DFT, SPIHT codec, Moti Yung. The Kurosawa– and modified differential Desmedt key encapsulation phase-shift keying tech- is not chosen-ciphertext se- niques. Applied Mathe- cure. Information Process- matics and Computation, ing Letters, 109(16):897– 196(1):40–54, February 15, 901, July 31, 2009. CODEN 2008. CODEN AMHCBQ. IFPLAT. ISSN 0020-0190 ISSN 0096-3003 (print), (print), 1872-6119 (elec- 1873-5649 (electronic). tronic). Chen:2008:MWS Chien:2008:EPA [Che08b] Wen-Yuan Chen. Multiple- [Chi08a] H. Y. Chien. Efficient watermarking scheme of and practical approach the European Article Num- to authenticating public ber Barcode using similar terminals. International code division multiple access Journal of Computer Ap- technique. Applied Math- plications, 30(4):319–324, ematics and Computation, 2008. ISSN 1206-212X 197(1):243–261, March 15, (print), 1925-7074 (elec- 2008. CODEN AMHCBQ. tronic). URL https: ISSN 0096-3003 (print), //www.tandfonline.com/ 1873-5649 (electronic). doi/full/10.1080/1206212X. Coulter:2001:GAH 2008.11441911. Chien:2008:PAUa [CHH01] Robert S. Coulter, George Havas, and Marie Hen- [Chi08b] Hung-Yu Chien. Practi- derson. Giesbrecht’s al- cal anonymous user authen- REFERENCES 214

tication scheme with secu- DEN CMPJA6. ISSN 0010- rity proof. Computers & 4620 (print), 1460-2067 Security, 27(5–6):216–223, (electronic). URL http:/ October 2008. CODEN /comjnl.oxfordjournals. CPSEDU. ISSN 0167-4048 org/cgi/content/abstract/ (print), 1872-6208 (elec- 51/4/419; http://comjnl. tronic). URL https:// oxfordjournals.org/cgi/ www.sciencedirect.com/ content/full/51/4/419; science/article/pii/S0167404808000291. http://comjnl.oxfordjournals. org/cgi/reprint/51/4/419. Chien:2008:PAUb Coron:2001:GGC [Chi08c] Hung-Yu Chien. Practi- cal anonymous user authen- [CHJ+01a] Jean-S´ebastien Coron, He- tication scheme with secu- lena Handschuh, Marc rity proof. Computers & Joye, Pascal Paillier, David Security, 27(5–6):216–223, Pointcheval, and Christophe October 2008. CODEN Tymen. GEM: a Generic CPSEDU. ISSN 0167-4048 chosen-ciphertext secure (print), 1872-6208 (elec- Encryption Method. Lecture tronic). URL https:// Notes in Computer Science, www.sciencedirect.com/ 2271:263–??, 2001. CO- science/article/pii/S0167404808000291. DEN LNCSD9. ISSN 0302- 9743 (print), 1611-3349 Chien:2008:PAUc (electronic). URL http: [Chi08d] Hung-Yu Chien. Practi- //link.springer-ny.com/ cal anonymous user authen- link/service/series/0558/ tication scheme with secu- bibs/2271/22710263.htm; rity proof. Computers & http://link.springer- Security, 27(5–6):216–223, ny.com/link/service/series/ October 2008. CODEN 0558/papers/2271/22710263. CPSEDU. ISSN 0167-4048 pdf. (print), 1872-6208 (elec- Coron:2001:OCC tronic). URL https:// www.sciencedirect.com/ [CHJ+01b] Jean-S´ebastien Coron, He- science/article/pii/S0167404808000291. lena Handschuh, Marc Chien:2008:SCA Joye, Pascal Paillier, David Pointcheval, and Christophe [Chi08e] Hung-Yu Chien. Selec- Tymen. Optimal chosen- tively convertible authenti- ciphertext secure encryp- cated encryption in the ran- tion of arbitrary-length mes- dom oracle model. The sages. Lecture Notes in Computer Journal, 51(4): Computer Science, 2274: 419–434, July 2008. CO- 17–??, 2001. CODEN REFERENCES 215

LNCSD9. ISSN 0302- Canetti:2005:ASN 9743 (print), 1611-3349 (electronic). URL http: [CHK05] Ran Canetti, Shai Halevi, //link.springer-ny.com/ and Jonathan Katz. Adaptively- link/service/series/0558/ secure, non-interactive public- bibs/2274/22740017.htm; key encryption. In Kil- http://link.springer- ian [Kil05], pages 150– ny.com/link/service/series/ ?? CODEN LNCSD9. 0558/papers/2274/22740017. ISBN 3-540-24573-1 (soft- pdf. cover). ISSN 0302-9743 (print), 1611-3349 (elec- Coppersmith:2002:CSC tronic). LCCN QA76.9.A25 T44 2005. URL http: [CHJ02] Don Coppersmith, Shai //www.springerlink.com/ Halevi, and Charanjit Jutla. openurl.asp?genre=issue& Cryptanalysis of stream ci- issn=0302-9743&volume= phers with linear masking. 3378; http://www.springerlink. In Yung [Yun02a], pages com/openurl.asp?genre= 515–532. CODEN LNCSD9. volume&id=doi:10.1007/ ISBN 3-540-44050-X (pa- b106171. perback). ISSN 0302-9743 (print), 1611-3349 (elec- Cheon:2008:PST tronic). LCCN QA76.9.A25 [CHKO08] Jung Hee Cheon, Nicholas C79 2002. URL http:/ Hopper, Yongdae Kim, and /link.springer.de/link/ Ivan Osipkov. Provably Se- service/series/0558/bibs/ cure Timed-Release Pub- 2442/24420515.htm; http: lic Key Encryption. ACM //link.springer.de/link/ Transactions on Informa- service/series/0558/papers/ tion and System Security, 2442/24420515.pdf. 11(2):4:1–4:??, March 2008. CODEN ATISBQ. ISSN Canetti:2003:FSP 1094-9224 (print), 1557- [CHK03] Ran Canetti, Shai Halevi, 7406 (electronic). and Jonathan Katz. A Chang:2002:IBO forward-secure public-key encryption scheme. Lecture [CHL02] Yan-Cheng Chang, Chun- Notes in Computer Science, Yun Hsiao, and Chi-Jen 2656:255–271, 2003. CO- Lu. On the impossibilities DEN LNCSD9. ISSN 0302- of basing one-way permu- 9743 (print), 1611-3349 tations on central crypto- (electronic). URL http:// graphic primitives. Lecture link.springer.com/content/ Notes in Computer Science, pdf/10.1007/3-540-39200- 2501:110–??, 2002. CODEN 9_16.pdf. LNCSD9. ISSN 0302-9743 REFERENCES 216

(print), 1611-3349 (elec- analysis of a homomor- tronic). URL http:// phic public-key cryptosys- link.springer.de/link/ tem. Thesis (Ph.D.), Uni- service/series/0558/bibs/ versity of London, London, 2501/25010110.htm; http: UK, 2006. ???? pp. //link.springer.de/link/ service/series/0558/papers/ Choo:2008:PLP 2501/25010110.pdf. [Cho08a] Kim-Kwang Raymond Choo. Chao:2009:HCS Privacy on the line: The politics of wiretapping and [ChLYL09] Min-Wen Chao, Chao hung encryption, updated and ex- Lin, Cheng-Wei Yu, and panded edition. The Com- Tong-Yee Lee. A high capac- puter Journal, 51(6):744, ity 3D steganography algo- November 2008. CODEN rithm. IEEE Transactions CMPJA6. ISSN 0010-4620 on Visualization and Com- (print), 1460-2067 (elec- puter Graphics, 15(2):274– tronic). URL http:// 284, March/April 2009. CO- comjnl.oxfordjournals. DEN ITVGEA. ISSN 1077- org/cgi/content/full/51/ 2626 (print), 1941-0506 6/744; http://comjnl. (electronic), 2160-9306. oxfordjournals.org/cgi/ reprint/51/6/744. Chen:2002:CPK Chowdhury:2008:CBG [CHM+02] L. Chen, K. Harrison, A. Moss, D. Soldera, and [Cho08b] Milton M. Chowdhury. N. P. Smart. Certification of Cryptanalysis of braid group public keys within an iden- based protocols.Thesis tity based system. Lecture (MPhil), Faculty of Engi- Notes in Computer Science, neering and Physical Sci- 2433:322–??, 2002. CO- ences, University of Manch- DEN LNCSD9. ISSN 0302- ester, Manchester, UK, 9743 (print), 1611-3349 2008. 230 pp. (electronic). URL http: //link.springer-ny.com/ Christianson:2000:SPI link/service/series/0558/[Chr00] Bruce Christianson, edi- bibs/2433/24330322.htm; tor. Security protocols: http://link.springer- 7th International Work- ny.com/link/service/series/ shop, Cambridge, UK, April 0558/papers/2433/24330322. 19–21, 1999: Proceedings, pdf. volume 1796 of Lecture Choi:2006:CHP Notes in Computer Science. Springer-Verlag, Berlin, [Cho06] Su-Jeong Choi. Crypt- Germany / Heidelberg, Ger- REFERENCES 217

many / London, UK / etc., verifiable puzzles. In 2000. CODEN LNCSD9. Kilian [Kil05], pages 17– ISBN 3-540-67381-4 (soft- ?? CODEN LNCSD9. cover). ISSN 0302-9743 ISBN 3-540-24573-1 (soft- (print), 1611-3349 (elec- cover). ISSN 0302-9743 tronic). LCCN QA267.A1 (print), 1611-3349 (elec- L43 no.1796. URL http: tronic). LCCN QA76.9.A25 //link.springer-ny.com/ T44 2005. URL http: link/service/series/0558/ //www.springerlink.com/ tocs/t1796.htm; http: openurl.asp?genre=issue& //www.springerlink.com/ issn=0302-9743&volume= openurl.asp?genre=issue& 3378; http://www.springerlink. issn=0302-9743&volume= com/openurl.asp?genre= 1796. volume&id=doi:10.1007/ Christianson:2001:SPI b106171. Chen:2002:AMT [Chr01] Bruce Christianson, edi- tor. Security protocols: [CHSS02] L. Chen, K. Harrison, 8th International Workshop, D. Soldera, and N. P. Cambridge, UK, April 3– Smart. Applications of 5, 2000: Revised Papers, multiple trust authorities volume 2133 of Lecture in pairing based cryptosys- Notes in Computer Science. tems. Lecture Notes in Springer-Verlag, Berlin, Computer Science, 2437: Germany / Heidelberg, Ger- 260–??, 2002. CODEN many / London, UK / etc., LNCSD9. ISSN 0302-9743 2001. CODEN LNCSD9. (print), 1611-3349 (elec- ISBN 3-540-42566-7 (soft- tronic). URL http:// cover). ISSN 0302-9743 link.springer.de/link/ (print), 1611-3349 (elec- service/series/0558/bibs/ tronic). LCCN QA267.A1 2437/24370260.htm; http: L43 no.2133. URL http: //link.springer.de/link/ //link.springer-ny.com/ service/series/0558/papers/ link/service/series/0558/ 2437/24370260.pdf. tocs/t2133.htm; http: Cornea:2002:SCI //www.springerlink.com/ openurl.asp?genre=issue& [CHT02] Marius Cornea, John Har- issn=0302-9743&volume= rison, and Ping Tak Peter 2133. Tang. Scientific computing Canetti:2005:HAW on Itanium-based systems. Intel Corporation, Santa [CHS05] Ran Canetti, Shai Halevi, Clara, CA, USA, 2002. and Michael Steiner. Hard- ISBN 0-9712887-7-1. xvii + ness amplification of weakly 406 pp. LCCN QA76.8.I83 REFERENCES 218

C67 2002. US$69.95. Yang. An improvement on URL http://www.intel. the Lin–Wu (t, n) threshold com/intelpress/sum_scientific. verifiable multi-secret shar- htm. ing scheme. Applied Math- Churchhouse:2002:CCJ ematics and Computation, 163(1):169–178, April 5, [Chu02] Robert F. Churchhouse. 2005. CODEN AMHCBQ. Codes and Ciphers: Julius ISSN 0096-3003 (print), Caesar, the Enigma, and the 1873-5649 (electronic). Internet. Cambridge Uni- versity Press, Cambridge, Chang:2005:NMS UK, 2002. ISBN 0-521- [CHY05b] Ting-Yi Chang, Min-Shiang 81054-X (hardcover), 0-521- Hwang, and Wei-Pang 00890-5 (paperback). x + Yang. A new multi-stage 240 pp. LCCN Z103 .C48 secret sharing scheme using 2002. US$55.00 (hardcover), one-way function. Operating US$20.00 (paperback). Systems Review, 39(1):48– Canvel:2003:PIS 55, January 2005. CODEN OSRED8. ISSN 0163-5980 [CHVV03] Brice Canvel, Alain Hiltgen, (print), 1943-586X (elec- Serge Vaudenay, and Mar- tronic). tin Vuagnoux. Password interception in a SSL/TLS Cimato:2002:DAP channel. In Boneh [Bon03], pages 583–599. CODEN [Cim02] Stelvio Cimato. Design of LNCSD9. ISBN 3-540- an authentication protocol 40674-3. ISSN 0302-9743 for Gsm Javacards. Lecture (print), 1611-3349 (elec- Notes in Computer Science, tronic). LCCN QA76.9.A25 2288:355–??, 2002. CO- DEN LNCSD9. ISSN 0302- C79 2003. URL http: 9743 (print), 1611-3349 //link.springer-ny.com/ (electronic). URL link/service/series/0558/ http: tocs/t2729.htm; http: //link.springer-ny.com/ //www.springerlink.com/ link/service/series/0558/ openurl.asp?genre=issue& bibs/2288/22880355.htm; issn=0302-9743&volume= http://link.springer- 2729; http://www.springerlink. ny.com/link/service/series/ com/openurl.asp?genre= 0558/papers/2288/22880355. . volume&id=doi:10.1007/ pdf b11817. Cirstea:2001:SAP Chang:2005:ILW [Cir01] Horatiu Cirstea. Speci- [CHY05a] Ting-Yi Chang, Min-Shiang fying authentication pro- Hwang, and Wei-Pang tocols using rewriting and REFERENCES 219

strategies. Lecture Notes gust 15, 2003. CODEN JS- in Computer Science, 1990: SODM. ISSN 0164-1212 138–??, 2001. CODEN (print), 1873-1228 (elec- LNCSD9. ISSN 0302- tronic). 9743 (print), 1611-3349 (electronic). URL http: Chien:2003:NHA //link.springer-ny.com/ [CJ03c] Hung-Yu Chien and Jinn-Ke link/service/series/0558/ Jan. New hierarchical as- bibs/1990/19900138.htm; signment without public key http://link.springer- cryptography. Computers ny.com/link/service/series/ &Security, 22(6):523–526, 0558/papers/1990/19900138. September 2003. CODEN pdf. CPSEDU. ISSN 0167-4048 Cheon:2003:PTA (print), 1872-6208 (elec- tronic). URL https:// [CJ03a] Jung Hee Cheon and www.sciencedirect.com/ Byungheup Jun. A poly- science/article/pii/S0167404803006138. nomial time algorithm for the braid Diffie–Hellman Chien:2003:RSA conjugacy problem. In [CJ03d] Hung-Yu Chien and Jinn- Boneh [Bon03], pages 212– Ke Jan. Robust and sim- 225. CODEN LNCSD9. ple authentication protocol. ISBN 3-540-40674-3. ISSN The Computer Journal,46 0302-9743 (print), 1611- (2):193–201, February 2003. 3349 (electronic). LCCN CODEN CMPJA6. ISSN QA76.9.A25 C79 2003. URL 0010-4620 (print), 1460- http://link.springer-ny. 2067 (electronic). URL com/link/service/series/ http://www3.oup.co.uk/ 0558/tocs/t2729.htm; computer_journal/hdb/Volume_ http://www.springerlink. 46/Issue_02/460193.sgm. com/openurl.asp?genre= abs.html; http://www3. issue&issn=0302-9743&volume= oup.co.uk/computer_journal/ 2729; http://www.springerlink. hdb/Volume_46/Issue_02/ com/openurl.asp?genre= pdf/460193.pdf. volume&id=doi:10.1007/ b11817. Chien:2004:IAM Chien:2003:HAP [CJ04] Hung-Yu Chien and Jinn- [CJ03b] Hung-Yu Chien and Jinn- Ke Jan. Improved authen- Ke Jan. A hybrid authen- ticated multiple-key agree- tication protocol for large ment protocol without using mobile network. The Jour- conventional one-way func- nal of Systems and Soft- tion. Applied Mathematics ware, 67(2):123–130, Au- and Computation, 147(2): REFERENCES 220

491–497, January 12, 2004. issn=1570-7873&volume= CODEN AMHCBQ. ISSN 2&issue=4&spage=301. 0096-3003 (print), 1873- 5649 (electronic). Choie:2005:EIB

Chen:2005:EDS [CJL05] Young Ju Choie, Eunkyung Jeong, and Eunjeong Lee. [CJ05] Yi-Hwa Chen and Jinn- Efficient identity-based au- Ke Jan. Enhancement of thenticated key agreement digital signature with mes- protocol from pairings. sage recovery using self- Applied Mathematics and certified public keys and its Computation, 162(1):179– variants. Operating Sys- 188, March 4, 2005. CO- tems Review, 39(3):90–96, DEN AMHCBQ. ISSN July 2005. CODEN OS- 0096-3003 (print), 1873- RED8. ISSN 0163-5980 5649 (electronic). (print), 1943-586X (elec- Chin:2006:HSI tronic). [CJL06] Chong Siew Chin, Andrew Cornwall:2004:AAM Teoh Beng Jin, and David [CJK+04] Linda A. Cornwall, Jens Ngo Chek Ling. High se- Jensen, David P. Kelsey, curity Iris verification sys- Akos´ Frohner, Daniel Kouˇril, tem based on random secret Franck Bonnassieux, Sophie integration. Computer Vi- Nicoud, K´aroly L˜orentey, sion and Image Understand- Joni Hahkala, Mika Si- ing: CVIU, 102(2):169– lander, Roberto Cecchini, 177, May 2006. CODEN Vincenzo Ciaschini, Luca CVIUF4. ISSN 1077-3142 dell’Agnello, Fabio Spataro, (print), 1090-235X (elec- David O’Callaghan, Olle tronic). Mulmo, Gian Luca Vol- Clarke:2000:VSP pato, David Groep, Martijn Steenbakkers, and Andrew [CJM00] E. M. Clarke, S. Jha, and McNab. Authentication W. Marrero. Verifying se- and authorization mecha- curity protocols with Bru- nisms for multi-domain Grid tus. ACM Transactions on environments. Journal of Software Engineering and Grid Computing, 2(4):301– Methodology, 9(4):443–487, 311, December 2004. CO- October 2000. CODEN DEN ???? ISSN 1570- ATSMER. ISSN 1049-331X 7873 (print), 1572-9184 (print), 1557-7392 (elec- (electronic). URL http: tronic). URL http://www. //www.springerlink.com/ acm.org/pubs/articles/ openurl.asp?genre=article& journals/tosem/2000-9- REFERENCES 221

4/p443-clarke/p443-clarke. Chepyzhov:2001:SAF pdf; http://www.acm. org/pubs/citations/journals/[CJS01] Vladimor V. Chepyzhov, tosem/2000-9-4/p443-clarke/ Thomas Johansson, and . Ben Smeets. A simple al- gorithm for fast correla- Coron:2000:NAP tion attacks on stream ci- phers. Lecture Notes in [CJNP00] Jean-S´ebastien Coron, Marc Computer Science, 1978: Joye, David Naccache, and 181–??, 2001. CODEN Pascal Paillier. New at- LNCSD9. ISSN 0302- tacks on PKCS#1 v1.5 en- 9743 (print), 1611-3349 cryption. Lecture Notes (electronic). URL http: in Computer Science, 1807: //link.springer-ny.com/ 369–??, 2000. CODEN LNCSD9. ISSN 0302- link/service/series/0558/ bibs/1978/19780181.htm; 9743 (print), 1611-3349 http://link.springer- (electronic). URL http: ny.com/link/service/series/ //link.springer-ny.com/ 0558/papers/1978/19780181. link/service/series/0558/ pdf. bibs/1807/18070369.htm; http://link.springer- Chien:2001:MRL ny.com/link/service/series/ 0558/papers/1807/18070369.[CJT01] Hung-Yu Chien, Jinn-Ke pdf. Jan, and Yuh-Min Tseng. A modified remote lo- Coron:2002:UPS gin authentication scheme based on geometric ap- [CJNP02] Jean-S´ebastien Coron, Marc proach. The Journal of Sys- Joye, David Naccache, and tems and Software, 55(3): Pascal Paillier. Universal 287–290, January 15, 2001. padding schemes for RSA. CODEN JSSODM. ISSN In Yung [Yun02a], pages 0164-1212 (print), 1873- 226–241. CODEN LNCSD9. 1228 (electronic). URL ISBN 3-540-44050-X (pa- http://www.elsevier.nl/ perback). ISSN 0302-9743 gej-ng/10/29/11/54/27/ (print), 1611-3349 (elec- 29/abstract.html; http: tronic). LCCN QA76.9.A25 //www.elsevier.nl/gej- C79 2002. URL http:/ ng/10/29/11/54/27/29/article. /link.springer.de/link/ pdf. service/series/0558/bibs/ 2442/24420226.htm; http: Chien:2002:EPS //link.springer.de/link/ service/series/0558/papers/[CJT02] Hung-Yu Chien, Jinn-Ke 2442/24420226.pdf. Jan, and Yuh-Min Tseng. REFERENCES 222

An efficient and practical so- Yung [Yun02a], pages 143– lution to remote authentica- 161. CODEN LNCSD9. tion: Smart card. Comput- ISBN 3-540-44050-X (pa- ers & Security, 21(4):372– perback). ISSN 0302-9743 375, August 1, 2002. CO- (print), 1611-3349 (elec- DEN CPSEDU. ISSN 0167- tronic). LCCN QA76.9.A25 4048 (print), 1872-6208 C79 2002. URL http:/ (electronic). URL https:/ /link.springer.de/link/ /www.sciencedirect.com/ service/series/0558/bibs/ science/article/pii/S0167404802004157. 2442/24420143.htm; http: //link.springer.de/link/ Chien:2003:CMV service/series/0558/papers/ [CJT03] Hung-Yu Chien, Jinn- 2442/24420143.pdf. Ke Jan, and Yuh-Min Canetti:2002:UCN Tseng. Cryptanalysis on Mu–Varadharajan’s e- [CK02b] Ran Canetti and Hugo voting schemes. Applied Krawczyk. Universally com- Mathematics and Compu- posable notions of key ex- tation, 139(2–3):525–530, change and secure chan- July 15, 2003. CODEN nels. Lecture Notes in AMHCBQ. ISSN 0096-3003 Computer Science, 2332: (print), 1873-5649 (elec- 337–??, 2002. CODEN tronic). LNCSD9. ISSN 0302- 9743 (print), 1611-3349 Chien:2004:SIS (electronic). URL http: [CJT04] Hung-Yu Chien, Jinn-Ke //link.springer-ny.com/ Jan, and Yuh-Min Tseng. link/service/series/0558/ Solving the invalid signer- bibs/2332/23320337.htm; verified signature problem http://link.springer- and comments on Xia–You ny.com/link/service/series/ group signature. The Jour- 0558/papers/2332/23320337. nal of Systems and Software, pdf. 73(3):369–373, November/ Cook:2006:CEG December 2004. CODEN JSSODM. ISSN 0164-1212 [CK06] Debra Cook and Angelos (print), 1873-1228 (elec- Keromytis. CryptoGraphics: tronic). Exploiting Graphics Cards Canetti:2002:SAI for Security,volume25of Advances in information se- [CK02a] Ran Canetti and Hugo curity. Springer-Verlag, Krawczyk. Security analy- Berlin, Germany / Heidel- sis of IKE’s signature-based berg, Germany / London, key-exchange protocol. In UK / etc., 2006. ISBN 0- REFERENCES 223

387-29015-X. LCCN ???? sis for 2-round SPNs. Infor- US$99.00. URL http:// mation Processing Letters, www.loc.gov/catdir/enhancements/ 87(5):277–282, September fy0663/2006925092-d.html. 15, 2003. CODEN IF- PLAT. ISSN 0020-0190 Cheon:2002:IID (print), 1872-6119 (elec- [CKK+02] Jung Hee Cheon, MunJu tronic). Kim, Kwangjo Kim, Jung- Cox:2005:DWT Yeun Lee, and SungWoo Kang. Improved impossible [CKL05] I. J. (Ingemar J.) Cox, differential cryptanalysis of Ton Kalker, and Heung- Rijndael and Crypton. Lec- Kyu Lee, editors. Digital ture Notes in Computer Sci- watermarking: third inter- ence, 2288:39–??, 2002. CO- national workshop, IWDW DEN LNCSD9. ISSN 0302- 2004, Seoul, Korea, October 9743 (print), 1611-3349 30–November 1, 2004: re- (electronic). URL http: vised selected papers,volume //link.springer-ny.com/ 3304 of Lecture Notes in link/service/series/0558/ Computer Science. Spring- bibs/2288/22880039.htm; er-Verlag, Berlin, Ger- http://link.springer- many / Heidelberg, Ger- ny.com/link/service/series/ many / London, UK / etc., 0558/papers/2288/22880039. 2005. CODEN LNCSD9. pdf. ISBN 3-540-24839-0 (soft- cover). ISSN 0302-9743 Chung:2003:EPX (print), 1611-3349 (elec- tronic). LCCN QA76.9.A25 [CKK03] Yon Dohn Chung, Jong Wook I89 2004. URL http: Kim, and Myoung Ho Kim. //www.springerlink.com/ Efficient preprocessing of openurl.asp?genre=issue& XML queries using struc- issn=0302-9743&volume= tured signatures. Infor- 3304. mation Processing Letters, 87(5):257–264, September Chen:2009:SRP 15, 2003. CODEN IF- [CKL+09] Yingying Chen, Konstanti- PLAT. ISSN 0020-0190 nos Kleisouris, Xiaoyan Li, (print), 1872-6119 (elec- Wade Trappe, and Rich- tronic). ard P. Martin. A security Chun:2003:DLC and robustness performance analysis of localization al- [CKL+03] Kilsoo Chun, Seungjoo Kim, gorithms to signal strength Sangjin Lee, Soo Hak Sung, attacks. ACM Transac- and Seonhee Yoon. Differ- tions on Sensor Networks,5 ential and linear cryptanaly- (1):2:1–2:??, February 2009. REFERENCES 224

CODEN ???? ISSN Coron:2001:SSL 1550-4859 (print), 1550- 4867 (electronic). [CKN01] Jean-S´ebastien Coron, Paul Kocher, and David Nac- Coppersmith:2000:KRF cache. Statistics and se- cret leakage. Lecture Notes [CKM00] Don Coppersmith, Lars R. in Computer Science, 1962: Knudsen, and Chris J. 157–??, 2001. CODEN Mitchell. Key recovery LNCSD9. ISSN 0302- and forgery attacks on the 9743 (print), 1611-3349 MacDES MAC algorithm. (electronic). URL http: In Bellare [Bel00], pages //link.springer-ny.com/ 184–?? ISBN 3-540- link/service/series/0558/ 67907-3. ISSN 0302-9743 bibs/1962/19620157.htm; (print), 1611-3349 (elec- http://link.springer- tronic). LCCN QA76.9.A25 ny.com/link/service/series/ C79 2000 Bar. URL http: 0558/papers/1962/19620157. //link.springer-ny.com/ pdf. link/service/series/0558/ Canetti:2003:RCC bibs/1880/18800184.htm; http://link.springer- [CKN03] Ran Canetti, Hugo Kraw- ny.com/link/service/series/ czyk, and Jesper B. Nielsen. 0558/papers/1880/18800184. Relaxing chosen-ciphertext pdf. security. In Boneh [Bon03], pages 565–582. CODEN Coron:2000:FLA LNCSD9. ISBN 3-540- 40674-3. ISSN 0302-9743 [CKN00] Jean-S´ebastien Coron, Fran¸cois (print), 1611-3349 (elec- Koeune, and David Nac- tronic). LCCN QA76.9.A25 cache. From fixed-length C79 2003. URL http: to arbitrary-length RSA //link.springer-ny.com/ padding schemes. Lecture link/service/series/0558/ Notes in Computer Science, tocs/t2729.htm; http: 1976:90–??, 2000. CO- //www.springerlink.com/ DEN LNCSD9. ISSN 0302- openurl.asp?genre=issue& 9743 (print), 1611-3349 issn=0302-9743&volume= (electronic). URL http: 2729; http://www.springerlink. //link.springer-ny.com/ com/openurl.asp?genre= link/service/series/0558/ volume&id=doi:10.1007/ bibs/1976/19760090.htm; b11817. http://link.springer- Cheon:2006:KPC ny.com/link/service/series/ 0558/papers/1976/19760090.[CKN06] Jung Hee Cheon, Woo- pdf. Hwan Kim, and Hyun Soo REFERENCES 225

Nam. Known-plaintext //link.springer-ny.com/ cryptanalysis of the Domingo– link/service/series/0558/ Ferrer algebraic privacy ho- tocs/t2779.htm; http: momorphism scheme. In- //www.springerlink.com/ formation Processing Let- openurl.asp?genre=issue& ters, 97(3):118–123, Febru- issn=0302-9743&volume= ary 14, 2006. CODEN IF- 2779; http://www.springerlink. PLAT. ISSN 0020-0190 com/openurl.asp?genre= (print), 1872-6119 (elec- volume&id=doi:10.1007/ tronic). b13240.

Cachin:2001:SEA Chevalier:2008:CRS

[CKPS01] Christian Cachin, Klaus [CKRT08] Yannick Chevalier, Ralf Kursawe, Frank Petzold, K¨usters, Micha¨el Rusinow- and Victor Shoup. Se- itch, and Mathieu Turu- cure and efficient asyn- ani. Complexity results chronous broadcast proto- for security protocols with cols. In Kilian [Kil01a], Diffie–Hellman exponentia- pages 524–?? ISBN 3-540- tion and commuting pub- 42456-3 (paperback). LCCN lic key encryption. ACM QA76.9.A25 C79 2001; Transactions on Compu- QA267.A1 L43 no.2139. tational Logic, 9(4):24:1– UK£47.00. URL http: 24:??, August 2008. CO- //link.springer-ny.com/ DEN ???? ISSN 1529-3785 link/service/series/0558/ (print), 1557-945X (elec- bibs/2139/21390524.htm; tronic). http://link.springer- Cachin:2009:TC ny.com/link/service/series/ 0558/papers/2139/21390524.[CKS09] Christian Cachin, Idit Kei- pdf. dar, and Alexander Shraer. Trusting the cloud. ACM Cathalo:2003:NTT SIGACT News, 40(2):81– 86, June 2009. CODEN [CKQ03] Julien Cathalo, Fran¸cois SIGNDM. ISSN 0163-5700 Koeune, and Jean-Jacques (print), 1943-5827 (elec- Quisquater. A new type tronic). of timing attack: Appli- cation to GPS. In Wal- Chen:2005:CLR ter et al. [WKP03], pages 291–303. CODEN LNCSD9. [CKY05] Chien-Yuan Chen, Cheng- ISBN 3-540-40833-9. ISSN Yuan Ku, and David C. 0302-9743 (print), 1611- Yen. Cryptanalysis of large 3349 (electronic). LCCN RSA exponent by using the TK7895.E42. URL http: LLL algorithm. Applied REFERENCES 226

Mathematics and Compu- UK£47.00. URL http: tation, 169(1):516–525, Oc- //link.springer-ny.com/ tober 1, 2005. CODEN link/service/series/0558/ AMHCBQ. ISSN 0096-3003 bibs/2139/21390388.htm; (print), 1873-5649 (elec- http://link.springer- tronic). ny.com/link/service/series/ 0558/papers/2139/21390388. Chen:2007:CRA pdf.

[CKY07] Chien-Yuan Chen, Cheng- Chang:2001:CIU Yuan Ku, and David C. Yen. Cryptographic relational al- [CL01b] Chin-Chen Chang and Iuon- gebra for databases us- Chang Lin. Cryptanalysis ing the field authenticator. of the improved user effi- Computers and Mathemat- cient blind signatures. Lec- ics with Applications, 54(1): ture Notes in Computer Sci- 38–44, July 2007. CODEN ence, 2229:42–??, 2001. CO- CMAPDK. ISSN 0898-1221 DEN LNCSD9. ISSN 0302- (print), 1873-7668 (elec- 9743 (print), 1611-3349 tronic). URL http:// (electronic). URL http: www.sciencedirect.com/ //link.springer-ny.com/ science/article/pii/S0898122107001721. link/service/series/0558/ bibs/2229/22290042.htm; Chen:2000:IBD http://link.springer- [CL00] J. J.-R. Chen and Y. Liu. ny.com/link/service/series/ An ID-based digital mul- 0558/papers/2229/22290042. tisignatures scheme with pdf. time stamp technique. In- Camenisch:2002:DAA ternational Journal of Com- puter Systems Science and [CL02a] Jan Camenisch and Anna Engineering, 15(2):105–??, Lysyanskaya. Dynamic ac- March 2000. CODEN cumulators and application CSSEEI. ISSN 0267-6192. to efficient revocation of Camenisch:2001:IES anonymous credentials. In Yung [Yun02a], pages 61– [CL01a] Jan Camenisch and Anna 76. CODEN LNCSD9. Lysyanskaya. An iden- ISBN 3-540-44050-X (pa- tity escrow scheme with ap- perback). ISSN 0302-9743 pointed verifiers. In Kil- (print), 1611-3349 (elec- ian [Kil01a], pages 388– tronic). LCCN QA76.9.A25 ?? ISBN 3-540-42456- C79 2002. URL http: 3 (paperback). LCCN //link.springer-ny.com/ QA76.9.A25 C79 2001; link/service/series/0558/ QA267.A1 L43 no.2139. tocs/t2442.htm; http: REFERENCES 227

//www.springerlink.com/ (print), 1611-3349 (elec- openurl.asp?genre=issue& tronic). LCCN 10.1007/b99099. issn=0302-9743&volume= URL http://www.springerlink. 2442. com/openurl.asp?genre= issue&issn=0302-9743&volume= Cao:2002:TKE 3152; http://www.springerlink. [CL02b] Zhen Fu Cao and Ji Guo com/openurl.asp?genre= Li. A threshold key es- volume&id=doi:10.1007/ crow scheme based on El- b99099. Gamal public key cryptosys- Chang:2004:CGS tem. Chinese Journal of Computers = Chi suan chi [CL04b] Chin-Chen Chang and Yeu- hsueh pao, 25(4):346–350, Pong Lai. A convertible 2002. CODEN JIXUDT. group signature scheme. Op- ISSN 0254-4164. erating Systems Review,38 (4):58–65, October 2004. Crowley:2002:BLS CODEN OSRED8. ISSN [CL02c] Paul Crowley and Ste- 0163-5980 (print), 1943- fanLucks. Biasinthe 586X (electronic). LEVIATHAN stream ci- Chang:2004:IDM pher. Lecture Notes in Computer Science, 2355: [CL04c] Chin-Chen Chang and Iuon- 211–??, 2002. CODEN Chang Lin. An improve- LNCSD9. ISSN 0302- ment of delegated multisig- 9743 (print), 1611-3349 nature scheme with docu- (electronic). URL http: ment decomposition. Op- //link.springer-ny.com/ erating Systems Review,38 link/service/series/0558/ (4):52–57, October 2004. bibs/2355/23550211.htm; CODEN OSRED8. ISSN http://link.springer- 0163-5980 (print), 1943- ny.com/link/service/series/ 586X (electronic). 0558/papers/2355/23550211. pdf. Chang:2004:RFB

Camenisch:2004:SSA [CL04d] Chin-Chen Chang and Iuon- Chang Lin. Remarks [CL04a] Jan Camenisch and Anna on fingerprint-based remote Lysyanskaya. Signature user authentication scheme schemes and anonymous using Smart Cards. Operat- credentials from bilinear ing Systems Review, 38(4): maps. In Franklin [Fra04], 91–96, October 2004. CO- pages 56–?? CODEN DEN OSRED8. ISSN 0163- LNCSD9. ISBN 3-540- 5980 (print), 1943-586X 22668-0. ISSN 0302-9743 (electronic). REFERENCES 228

Camenisch:2005:FTO Sung Laih. ECC-based lightweight authentication [CL05] Jan Camenisch and Anna protocol with untraceability Lysyanskaya. A formal for low-cost RFID. Journal treatment of onion rout- of Parallel and Distributed ing. In Shoup [Sho05a], Computing, 69(10):848–853, pages 169–?? ISBN 3-540- October 2009. CODEN 28114-2. ISSN 0302-9743 JPDCER. ISSN 0743-7315 (print), 1611-3349 (elec- (print), 1096-0848 (elec- tronic). LCCN QA76.9.A25 tronic). C79 2005; QA76.9 .A25; QA76.9 C79 2005; QA76.9 Clark:2000:TNE C794 2005; QA76.9; In- [Cla00a] David Clark. Technology ternet. URL http:/ news: Encryption advances /www.springerlink.com/ to meet Internet challenges. openurl.asp?genre=issue& Computer, 33(8):20–24, Au- issn=0302-9743&volume= gust 2000. CODEN CP- 3621. TRB4. ISSN 0018-9162 Chandramouli:2007:ISS (print), 1558-0814 (elec- [CL07] Ramaswamy Chandramouli tronic). URL http://dlib. and Philip Lee. Infrastruc- computer.org/co/books/ ture standards for smart ID co2000/pdf/r8020.pdf. card deployment. IEEE Se- Clark:2000:LNC curity & Privacy, 5(2):92– 96, March/April 2007. CO- [Cla00b] Julie Clark. Looking for new DEN ???? ISSN 1540-7993 contactless points: Hong (print), 1558-4046 (elec- Kong’s Octopus smart card tronic). could get a lot smarter, but it will have to pick Chang:2008:AWM its way carefully through [CL08] Chin-Chen Chang and Pei- regulations and competition Yu Lin. Adaptive water- from other quarters first. mark mechanism for right- ITS international, 6(2):77– ful ownership protection. 78, March/April 2000. The Journal of Systems and Chen:2008:RCE Software, 81(7):1118–1129, July 2008. CODEN JS- [CLC08] Tzung-Her Chen, Wei-Bin SODM. ISSN 0164-1212 Lee, and Hsing-Bai Chen. (print), 1873-1228 (elec- A round- and computation- tronic). efficient three-party authen- Chien:2009:EBL ticated key exchange proto- col. The Journal of Sys- [CL09] Hung-Yu Chien and Chi- tems and Software, 81(9): REFERENCES 229

1581–1590, September 2008. Cho:2004:GKR CODEN JSSODM. ISSN 0164-1212 (print), 1873- [CLK04] Taenam Cho, Sang-Ho Lee, 1228 (electronic). and Won Kim. A group key recovery mechanism based Chang:2001:ASM on logical key hierarchy. Journal of Computer Se- [CLK01a] Kyung-Ah Chang, Byung- curity, 12(5):711–736, ???? Rae Lee, and Tai-Yun 2004. CODEN JCSIET. Kim. Authentication ser- ISSN 0926-227X (print), vice model supporting mul- 1875-8924 (electronic). tiple domains in distributed computing. Lecture Notes Cheon:2000:NBC in Computer Science, 2073: 413–??, 2001. CODEN [CLLL00] Dong Hyeon Cheon, Sang Jin LNCSD9. ISSN 0302- Lee, Jong In Lim, and 9743 (print), 1611-3349 Sung Jae Lee. New (electronic). URL http: block cipher DONUT us- //link.springer-ny.com/ ing pairwise perfect decor- link/service/series/0558/ relation. Lecture Notes in bibs/2073/20730413.htm; Computer Science, 1977: http://link.springer- 262–??, 2000. CODEN ny.com/link/service/series/ LNCSD9. ISSN 0302- 0558/papers/2073/20730413. 9743 (print), 1611-3349 pdf. (electronic). URL http: //link.springer-ny.com/ Chang:2001:FAM link/service/series/0558/ bibs/1977/19770262.htm; [CLK01b] Kyung-Ah Chang, Byung- http://link.springer- Rae Lee, and Tai-Yun Kim. ny.com/link/service/series/ Flexible authentication with 0558/papers/1977/19770262. multiple domains of elec- pdf. tronic commerce. Lecture Notes in Computer Science, Canetti:2002:UCT 2115:176–??, 2001. CO- DEN LNCSD9. ISSN 0302- [CLOS02] Ran Canetti, Yehuda Lin- 9743 (print), 1611-3349 dell, Rafail Ostrovsky, and (electronic). URL http: Amit Sahai. Universally //link.springer-ny.com/ composable two-party and link/service/series/0558/ multi-party secure computa- bibs/2115/21150176.htm; tion. In ACM [ACM02], http://link.springer- pages 494–503. ISBN 1- ny.com/link/service/series/ 58113-495-9. LCCN QA75.5 0558/papers/2115/21150176. .A22 2002. ACM order num- pdf. ber 508020. REFERENCES 230

Cormen:2001:IA ter et al. [WKP03], pages 411–425. CODEN LNCSD9. [CLR01] Thomas H. Cormen, Charles ISBN 3-540-40833-9. ISSN E. (Eric) Leiserson, and 0302-9743 (print), 1611- Ronald L. Rivest. In- 3349 (electronic). LCCN troduction to Algorithms. TK7895.E42. URL http: MIT Press, Cambridge, //link.springer-ny.com/ MA, USA, second edi- link/service/series/0558/ tion, 2001. ISBN 0-262- tocs/t2779.htm; http: 53196-8 (paperback), 0-262- //www.springerlink.com/ 03293-7 (hardcover), 0-07- openurl.asp?genre=issue& 013151-1 (McGraw-Hill), 0- issn=0302-9743&volume= 07-297054-5 (McGraw-Hill 2779; http://www.springerlink. with CD-ROM). xxi + 1180 com/openurl.asp?genre= pp. LCCN QA76.6 .I5858 volume&id=doi:10.1007/ 2001. b13240. Chen:2009:AKD Czumaj:2002:PTA [CLR09] Bee-Chung Chen, Kristen [CLZ02] Artur Czumaj, Andrzej Lin- Lefevre, and Raghu Ra- gas, and Hairong Zhao. makrishnan. Adversarial- Polynomial-time approxi- knowledge dimensions in mation schemes for the Eu- data privacy. VLDB Jour- clidean survivable network nal: Very Large Data Bases, design problem. Lecture 18(2):429–467, April 2009. Notes in Computer Science, CODEN VLDBFR. ISSN 2380:973–??, 2002. CO- 1066-8888 (print), 0949- DEN LNCSD9. ISSN 0302- 877X (electronic). 9743 (print), 1611-3349 Chang:2007:SIH (electronic). URL http: //link.springer-ny.com/ [CLT07] Chin-Chen Chang, Chih- link/service/series/0558/ Yang Lin, and Chun-Sen bibs/2380/23800973.htm; Tseng. Secret image hid- http://link.springer- ing and sharing based on ny.com/link/service/series/ the (t, n)-threshold. Funda- 0558/papers/2380/23800973. menta Informaticae, 76(4): pdf. 399–411, December 2007. CODEN FUMAAJ. ISSN Camenisch:2000:CSS 0169-2968 (print), 1875- [CM00] Jan Camenisch and Markus 8681 (electronic). Michels. Confirmer signa- Clulow:2003:SP ture schemes secure against adaptive adversaries (ex- [Clu03] Jolyon Clulow. On the secu- tended abstract). Lecture rity of PKCS #11. In Wal- Notes in Computer Science, REFERENCES 231

1807:243–??, 2000. CO- signature scheme with a DEN LNCSD9. ISSN 0302- tight security reduction. 9743 (print), 1611-3349 In Shoup [Sho05a], pages (electronic). URL http: 511–?? ISBN 3-540- //link.springer-ny.com/ 28114-2. ISSN 0302-9743 link/service/series/0558/ (print), 1611-3349 (elec- bibs/1807/18070243.htm; tronic). LCCN QA76.9.A25 http://link.springer- C79 2005; QA76.9 .A25; ny.com/link/service/series/ QA76.9 C79 2005; QA76.9 0558/papers/1807/18070243. C794 2005; QA76.9; In- pdf. ternet. URL http:/ /www.springerlink.com/ Cox:2002:FYE openurl.asp?genre=issue& [CM02] Ingemar J. Cox and Matt L. issn=0302-9743&volume= Miller. The first 50 3621. years of electronic wa- Cojocaru:2005:ISM termarking. EURASIP Journal on Applied Sig- [CM05b] Alina Cojocaru and Maruti Ram nal Processing, 2(1):126– Murty. An introduction to 132, January 2002. ISSN sieve methods and their ap- 1110-8657. URL http: plications. London Math- //delivery.acm.org/10. ematical Society student 1145/1290000/1283114/p126- texts. Cambridge Univer- cox.pdf. sity Press, Cambridge, UK, 2005. ISBN 0-521-84816- Courtois:2003:AAS 4 (hardcover), 0-521-61275- 6 (paperback). ???? pp. [CM03] Nicolas T. Courtois and LCCN ???? Willi Meier. Algebraic attacks on stream ci- Cox:2002:DW phers with linear feed- [CMB02] Ingemar J. Cox, Matthew L. back. Lecture Notes in Miller, and Jeffrey A. Computer Science, 2656: Bloom. Digital watermark- 345–359, 2003. CODEN ing. Morgan Kaufmann se- LNCSD9. ISSN 0302-9743 ries in multimedia informa- (print), 1611-3349 (elec- tion and systems. Morgan tronic). URL http://link. Kaufmann Publishers, San springer.com/content/pdf/ Francisco, CA, USA, 2002. 10.1007/3-540-39200-9_ ISBN 1-55860-714-5. xxv + 21.pdf. 542 pp. LCCN QA76.9.A25 Chevallier-Mames:2005:ECB C69 2002. Crawford:2005:FBS [CM05a] Benoˆıt Chevallier-Mames. An efficient CDH-based [CMB+05] Diane Crawford, Marius REFERENCES 232

Matioc, Steven M. Bellovin, andE.P.deVink. In- Richard Hubert, Andrew D. jective synchronisation: an Wolfe, Jr., David Foulser, extension of the authen- and Andrew R. Kilner. tication hierarchy. Theo- Forum: To block spam, retical Computer Science, demand sender authenti- 367(1–2):139–161, Novem- cation; not revolutionary ber 24, 2006. CODEN (thank goodness); how to TCSCDI. ISSN 0304-3975 know the known from the (print), 1879-2294 (elec- unknowns; user first in user- tronic). centered design. Commu- nications of the Association Campo:2001:JFC for Computing Machinery, [CMG+01] Celeste Campo, Andr´es 48(3):11–13, March 2005. Marm, Arturo Garc´ıa, Igna- CODEN CACMA2. ISSN cio D´ıaz, Peter T. Breuer, 0001-0782 (print), 1557- Carlos Delgado, and Car- 7317 (electronic). los Garc´ıa. JCCM: Flex- Cox:2008:DWS ible certificates for smart-

+ cards with Java card. Lec- [CMB 08] I. J. (Ingemar J.) Cox, ture Notes in Computer Sci- Matthew L. Miller, Jef- ence, 2140:34–??, 2001. CO- frey A. Bloom, Jessica DEN LNCSD9. ISSN 0302- Fridrich, and Ton Kalker. 9743 (print), 1611-3349 Digital Watermarking and (electronic). URL http: Steganography. The Morgan //link.springer-ny.com/ Kaufmann series in multi- link/service/series/0558/ media information and sys- bibs/2140/21400034.htm; tems; The Morgan Kauf- http://link.springer- mann series in computer se- ny.com/link/service/series/ curity. Morgan Kaufmann 0558/papers/2140/21400034. Publishers, Los Altos, CA pdf. 94022, USA, second edition, 2008. ISBN 0-12-372585-2 Chevallier-Mames:2003:FDS (casebound). xxviii + 593 pp. LCCN QA76.9.A25 C68 [CMJP03] Benoˆıt Chevallier-Mames, 2008. URL http://www. Marc Joye, and Pas- loc.gov/catdir/enhancements/ cal Paillierinst. Faster fy0808/2007040595-d.html; double-size modular mul- http://www.loc.gov/catdir/ tiplication from Euclidean toc/ecip081/2007040595. multipliers. In Walter html. et al. [WKP03], pages 214– 227. CODEN LNCSD9. Cremers:2006:ISE ISBN 3-540-40833-9. ISSN [CMdV06] C. J. F. Cremers, S. Mauw, 0302-9743 (print), 1611- REFERENCES 233

3349 (electronic). LCCN Cho:2008:DNP TK7895.E42. URL http: //link.springer-ny.com/ [CMS08] Young H. Cho and Will- link/service/series/0558/ iam H. Mangione-Smith. tocs/t2779.htm; http: Deep network packet fil- //www.springerlink.com/ ter design for reconfigurable openurl.asp?genre=issue& devices. ACM Transac- issn=0302-9743&volume= tions on Embedded Com- 2779; http://www.springerlink. puting Systems, 7(2):21:1– com/openurl.asp?genre= 21:??, February 2008. CO- volume&id=doi:10.1007/ DEN ???? ISSN 1539-9087 b13240. (print), 1558-3465 (elec- Chao:2000:CHC tronic).

[CMKT00] Jinhui Chao, Kazuto Mat- Caputo:2009:DIT suo, Hiroto Kawashiro, and Shigeo Tsujii. Construc- [CMS09] Deanna Caputo, Mar- tion of hyperelliptic curves cus Maloof, and Gregory with CM and its applica- Stephens. Detecting insider tion to cryptosystems. Lec- theft of trade secrets. IEEE ture Notes in Computer Sci- Security & Privacy, 7(6): ence, 1976:259–273, 2000. 14–21, November/December CODEN LNCSD9. ISSN 2009. CODEN ???? ISSN 0302-9743 (print), 1611- 1540-7993 (print), 1558- 3349 (electronic). 4046 (electronic). Cid:2006:AAA Crawford:2002:FEE [CMR06] Carlos Cid, Sean Murphy, and Matthew Robshaw. Al- [CNB+02] Diane Crawford, Srinivas gebraic Aspects of the Ad- Nedunuri, Adrian Bowyer, vanced Encryption Stan- Arnd Weber, Greg A. dard, volume 310 of Ad- Woods, and Mark Adler. vances in Information Se- Forum: Embrace the en- curity. Springer-Verlag, gineering metaphor; credit Berlin, Germany / Heidel- for crypto’s parallel develop- berg, Germany / London, ment; enough PDF: Give me UK / etc., 2006. ISBN HTML. Communications 0-387-24363-1. 125 pp. of the Association for Com- LCCN ???? URL http:// puting Machinery, 45(8):11– deposit.ddb.de/cgi-bin/ 14, August 2002. CODEN dokserv?id=2739239&prov= CACMA2. ISSN 0001-0782 M&dok\_var=1&dok\_ext= (print), 1557-7317 (elec- htm. tronic). REFERENCES 234

Coron:2004:SSL 2501/25010299.htm; http: //link.springer.de/link/ [CNK04] Jean-Sebastien Coron, David service/series/0558/papers/ Naccache, and Paul Kocher. 2501/25010299.pdf. Statistics and secret leak- age. ACM Transactions on Correia:2006:CAB Embedded Computing Sys- [CNV06] Miguel Correia, Nuno Fer- tems, 3(3):492–508, August reira Neves, and Paulo 2004. CODEN ???? ISSN Ver´ıssimo. From con- 1539-9087 (print), 1558- sensus to atomic broad- 3465 (electronic). cast: Time-free Byzantine- Ciet:2003:PFI resistant protocols without signatures. The Computer [CNPQ03] M. Ciet, M. Neve, E. Peeters, Journal, 49(1):82–96, Jan- and J.-J. Quisquater. Par- uary 2006. CODEN CM- allel FPGA implementation PJA6. ISSN 0010-4620 of RSA with residue num- (print), 1460-2067 (elec- ber systems — can side- tronic). URL http:// channel threats be avoided? comjnl.oxfordjournals. In MWSCAS ’03. Proceed- org/cgi/content/abstract/ ings of the 46th IEEE In- 49/1/82; http://comjnl. ternational Midwest Sympo- oxfordjournals.org/cgi/ sium on Circuits and Sys- content/full/49/1/82; tems, volume 2, pages 806– http://comjnl.oxfordjournals. 810. IEEE Computer So- org/cgi/reprint/49/1/82. ciety Press, 1109 Spring Street, Suite 300, Silver Cetin:2009:NSA Spring, MD 20910, USA, 2003. CODEN ???? ISSN [CO09a] Ozdemir Cetin and A. Tu- ???? ran Ozcerit. A new steganography algorithm Catalano:2002:HHL based on color histograms [CNS02] Dario Catalano, Phong Q. for data embedding into raw Nguyen, and Jacques Stern. video streams. Comput- The hardness of Hensel lift- ers & Security, 28(7):670– ing: The case of RSA and 682, October 2009. CODEN . Lecture CPSEDU. ISSN 0167-4048 Notes in Computer Science, (print), 1872-6208 (elec- 2501:299–??, 2002. CODEN tronic). URL https:// LNCSD9. ISSN 0302-9743 www.sciencedirect.com/ (print), 1611-3349 (elec- science/article/pii/S016740480900042X. tronic). URL http:// Czernik:2009:CRN link.springer.de/link/ service/series/0558/bibs/[CO09b] Pawel Czernik and Jakub REFERENCES 235

Olszyna. Cryptographic mers; evangelizing the Se- random number generators mantic Web; get your su- for low-power distributed percomputer software free; measurement system. Pro- Usenet creator Jim El- ceedings of the SPIE — The lis dies; DARPA funds International Society for FreeBSD security initia- Optical Engineering, 7502 tive. Dr. Dobb’s Journal (1):75022A, 2009. CODEN of Software Tools, 26(9): PSISDG. ISSN 0277-786X 18, September 2001. CO- (print), 1996-756X (elec- DEN DDJOEB. ISSN 1044- tronic). URL http://link. 789X. URL http://www. aip.org/link/?PSI/7502/ ddj.com/. 75022A/1. Photonics Appli- cations in Astronomy, Com- Cocks:2001:IBE munications, Industry, and [Coc01b] Clifford Cocks. An identity High-Energy Physics Exper- based encryption scheme iments 2009. based on quadratic residues. Cobb:2004:CD Lecture Notes in Computer Science, 2260:360–??, 2001. [Cob04] Chey Cobb. Cryptogra- CODEN LNCSD9. ISSN phy For Dummies.For 0302-9743 (print), 1611- dummies. John Wiley and 3349 (electronic). URL Sons, Inc., New York, NY, http://link.springer-ny. USA, 2004. ISBN 0- com/link/service/series/ 7645-4188-9. xx + 304 0558/bibs/2260/22600360. pp. LCCN TK5102.94 .C62 htm; http://link.springer- 2004. US$24.99. URL http: ny.com/link/service/series/ //www.loc.gov/catdir/bios/ 0558/papers/2260/22600360. wiley046/2003105686.html; pdf. http://www.loc.gov/catdir/ description/wiley039/2003105686. Cochran:2002:NVSb html; http://www.loc. gov/catdir/toc/wiley041/ [Coc02a] Shannon Cochran. News 2003105686.html. and views: School of Adap- Cochran:2001:NVS tive Computer Training; it seems like yesterday.. . [Coc01a] Shannon Cochran. News [10th anniversary of the and views: Scientists seek first Web site]; double-gate immersive reality; USENIX transistor breakthrough; names lifetime achievement 802.11g Standard proposed; recipients [the GNU Project 30th anniversary of the [In- and the Kerberos net- tel] 4004; DeCSS legal de- work authentication sys- cisions. Dr. Dobb’s Jour- tem]; robots need program- nal of Software Tools,27 REFERENCES 236

(2):18, February 2002. CO- verification of cryptographic DEN DDJOEB. ISSN 1044- protocols. Journal of Com- 789X. URL http://www. puter Security, 11(2):189– ddj.com/. 216, ???? 2003. CODEN JCSIET. ISSN 0926-227X Cochran:2002:NVW (print), 1875-8924 (elec- [Coc02b] Shannon Cochran. News tronic). and views: WaSP [Web Cole:2003:HPS Standards Project] buzzes off; Eclipse Project on [Col03] Eric Cole. Hiding in Plain the horizon; semiconduc- Sight: Steganography and tor roadmap: Ramping up, the Art of Covert Com- scaling down; AES [Ad- munication. John Wiley vanced Encryption Stan- and Sons, Inc., New York, dard]: Its finally official; NY, USA, 2003. ISBN 0- SMS [Short Message Ser- 471-44449-9. xviii + 335 vice] shines on; Berners-Lee pp. LCCN QA76.9.A25 awarded Japan Prize. Dr. C598 2003. US$35.00. Dobb’s Journal of Software Constantinou:2000:CSC Tools, 27(3):14, March 2002. CODEN DDJOEB. ISSN [Con00] Toulla Constantinou. Chicago 1044-789X. URL http:// smart: Chicago Transit Au- www.ddj.com/. thority (CTS) joins “smart card” revolution. Mass tran- Cochran:2003:NVC sit, 26(7):52–53, December [Coc03] Shannon Cochran. News 2000. and views: Cryptogra- Convery:2004:NSA phers [Ronald Rivest, Adi Shamir, and Leonard Adle- [Con04] Sean Convery. Network se- man] receive Turing Award; curity architectures.Net- computer-science pioneer working technology series. [John G. “Jack” Herriot] Cisco Press, Indianapolis, passes away; programming IN, USA, 2004. ISBN quantum computers; the de- 1-58705-115-X. xxxix + mography of the Internet. 739 pp. LCCN TK5105.59 Dr. Dobb’s Journal of Soft- .C5793 2004. Duplicate ware Tools, 28(7):14, July ISBN with [TCR03]. 2003. CODEN DDJOEB. ISSN 1044-789X. URL Conti:2009:GSH http://www.ddj.com/. [Con09] Greg Conti. Googling secu- Cohen:2003:FOV rity: how much does Google know about you? Addi- [Coh03] Ernie Cohen. First-order son-Wesley, Reading, MA, REFERENCES 237

USA, 2009. ISBN 0-321- puting, 26(4):38–45, Octo- 51866-7 (paperback). xxi + ber/December 2004. CO- 332 pp. LCCN QA76.9.A25 DEN IAHCEX. ISSN 1058- C6678 2009. URL http:// 6180 (print), 1934-1547 www.loc.gov/catdir/toc/ (electronic). URL http: ecip0824/2008032687.html. //csdl.computer.org/dl/ mags/an/2004/04/a4038. Cook:2002:REJ htm; http://csdl.computer. [Coo02] Jonathan J. Cook. Reverse org/dl/mags/an/2004/04/ execution of Java bytecode. a4038.pdf. The Computer Journal,45 Copeland:2004:ETS (6):608–619, ???? 2002. CODEN CMPJA6. ISSN [Cop04b] B. Jack Copeland, editor. 0010-4620 (print), 1460- The Essential Turing: Sem- 2067 (electronic). URL inal Writings in Comput- http://www3.oup.co.uk/ ing, Logic, Philosophy, Ar- computer_journal/hdb/Volume_ tificial Intelligence, and Ar- 45/Issue_06/450608.sgm. tificial Life, plus The Se- abs.html; http://www3. crets of Enigma.Oxford oup.co.uk/computer_journal/ University Press, Walton hdb/Volume_45/Issue_06/ Street, Oxford OX2 6DP, pdf/450608.pdf. UK, 2004. ISBN 0-19- 825079-7 (hardcover), 0-19- Coppersmith:2000:C 825080-0 (paperback). viii + 613 pp. LCCN QA29.T8 [Cop00] D. Coppersmith. Cryp- E77 2004. URL ftp:// tography. IBM Journal uiarchive.cso.uiuc.edu/ of Research and Develop- pub/etext/gutenberg/; ment, 44(1/2):246–250, Jan- http://www.loc.gov/catdir/ uary/March 2000. CO- toc/fy053/2004275594.html. DEN IBMJAE. ISSN 0018- 8646 (print), 2151-8556 Copeland:2005:CSB (electronic). URL http: [Cop05] B. Jack Copeland, editor. //www.research.ibm.com/ Colossus: the secrets of journal/rd/441/coppersmith. Bletchley Park’s codebreak- pdf. Special issue: reprints ing computers.OxfordUni- on Evolution of information versity Press, Walton Street, technology 1957–1999. Oxford OX2 6DP, UK, 2005. Copeland:2004:COO ISBN 0-19-284055-X. 344 (est.) pp. LCCN D810.C88 [Cop04a] B. Jack Copeland. Colos- C66 2006. sus: Its origins and orig- Copeland:2006:CSB inators. IEEE Annals of the History of Com- [Cop06] B. Jack Copeland, editor. REFERENCES 238

Colossus: the secrets of ISBN 3-540-67907-3. ISSN Bletchley Park’s codebreak- 0302-9743 (print), 1611- ing computers.OxfordUni- 3349 (electronic). LCCN versity Press, Walton Street, QA76.9.A25 C79 2000 Bar. Oxford OX2 6DP, UK, 2006. URL http://link.springer- ISBN 0-19-284055-X (hard- ny.com/link/service/series/ cover), 0-19-957814-1 (pa- 0558/bibs/1880/18800229. perback). xvi + 462 + 16 htm; http://link.springer- pp. LCCN D810.C88 C66 ny.com/link/service/series/ 2006. URL http://www. 0558/papers/1880/18800229. colossus-computer.com/. pdf. Copeland:2010:CSB Coron:2002:SPP [Cop10] B. Jack Copeland, editor. Colossus: the secrets of [Cor02] Jean-S´ebastien Coron. Secu- Bletchley Park’s codebreak- rity proof for partial-domain ing computers.OxfordUni- hash signature schemes. In versity Press, Walton Street, Yung [Yun02a], pages 613– Oxford OX2 6DP, UK, 2010. 626. CODEN LNCSD9. ISBN 0-19-284055-X (hard- ISBN 3-540-44050-X (pa- cover), 0-19-957814-1 (pa- perback). ISSN 0302-9743 perback). xvi + 462 + 16 (print), 1611-3349 (elec- pp. LCCN D810.C88 C66 tronic). LCCN QA76.9.A25 2010. URL http://www. C79 2002. URL http:/ colossus-computer.com/. /link.springer.de/link/ service/series/0558/bibs/ Corella:2000:FIT 2442/24420613.htm; http: [Cor00a] Francisco Corella. A fast //link.springer.de/link/ implementation of DES service/series/0558/papers/ andTriple-DESonPA- 2442/24420613.pdf. RISC 2.0. In USENIX [USE00b], page ?? ISBN Coron:2006:WC 1-880446-15-4. LCCN QA76.76.S95 W67 2000. [Cor06] J.-S. Coron. What is cryp- URL http://www.usenix. tography? IEEE Security org/publications/library/ & Privacy, 4(1):70–73, Jan- proceedings/osdi2000/wiess2000/ uary/February 2006. CO- corella.html. DEN ???? ISSN 1540- 7993 (print), 1558-4046 Coron:2000:ESF (electronic). URL http: [Cor00b] Jean-S´ebastien Coron. On //ieeexplore.ieee.org/ the exact security of full iel5/8013/33481/01588831. domain hash. In Bel- pdf; http://ieeexplore. lare [Bel00], pages 229–?? ieee.org/xpls/abs_all. REFERENCES 239

jsp?isnumber=33481&arnumber= Courtois:2003:FAA 1588831. [Cou03] Nicolas T. Courtois. Fast Cosgrave:2000:NTC algebraic attacks on stream [Cos00] John Cosgrave. Number ciphers with linear feed- theory and cryptography back. In Boneh [Bon03], (using Maple). In Cod- pages 176–194. CODEN ing theory and cryptogra- LNCSD9. ISBN 3-540- phy (Annapolis, MD, 1998), 40674-3. ISSN 0302-9743 pages 124–143. Springer- (print), 1611-3349 (elec- Verlag, Berlin, Germany / tronic). LCCN QA76.9.A25 Heidelberg, Germany / Lon- C79 2003. URL http: don, UK / etc., 2000. //link.springer-ny.com/ link/service/series/0558/ Costlow:2003:BIM tocs/t2729.htm; http: [Cos03] Terry Costlow. In brief: //www.springerlink.com/ Intelligent mail idea rais- openurl.asp?genre=issue& ing opponents’ ire. IEEE issn=0302-9743&volume= Distributed Systems On- 2729; http://www.springerlink. line, 4(9), 2003. CODEN com/openurl.asp?genre= ???? ISSN 1541-4922 volume&id=doi:10.1007/ (print), 1558-1683 (elec- b11817. tronic). URL http:// Courtois:2004:FSB dsonline.computer.org/ 0309/d/brief.htm. [Cou04] Nicolas T. Courtois. Feistel schemes and bi-linear crypt- Courtois:2001:EZK analysis: (extended ab- [Cou01] Nicolas T. Courtois. Ef- stract). In Franklin [Fra04], ficient zero-knowledge au- pages 23–?? CODEN thentication based on a lin- LNCSD9. ISBN 3-540- ear algebra problem Min- 22668-0. ISSN 0302-9743 Rank. Lecture Notes in (print), 1611-3349 (elec- Computer Science, 2248: tronic). LCCN 10.1007/b99099. 402–??, 2001. CODEN URL http://www.springerlink. LNCSD9. ISSN 0302- com/openurl.asp?genre= 9743 (print), 1611-3349 issue&issn=0302-9743&volume= (electronic). URL http: 3152; http://www.springerlink. //link.springer-ny.com/ com/openurl.asp?genre= link/service/series/0558/ volume&id=doi:10.1007/ bibs/2248/22480402.htm; b99099. http://link.springer- Courtois:2002:CBC ny.com/link/service/series/ 0558/papers/2248/22480402.[CP02] Nicolas T. Courtois and pdf. Josef Pieprzyk. Cryptanal- REFERENCES 240

ysis of block ciphers with ence, 389(3):512–527, De- overdefined systems of equa- cember 15, 2007. CODEN tions. Lecture Notes in TCSCDI. ISSN 0304-3975 Computer Science, 2501: (print), 1879-2294 (elec- 267–??, 2002. CODEN tronic). LNCSD9. ISSN 0302- 9743 (print), 1611-3349 Cimato:2006:PVC (electronic). URL http: [CPD06] S. Cimato, R. De Prisco, //eprint.iacr.org/2002/ and A. De Santis. Prob- 044/; http://link.springer. abilistic visual cryptogra- de/link/service/series/ phy schemes. The Com- 0558/bibs/2501/25010267. puter Journal, 49(1):97–107, htm; http://link.springer. January 2006. CODEN de/link/service/series/ CMPJA6. ISSN 0010-4620 0558/papers/2501/25010267. (print), 1460-2067 (elec- pdf. tronic). URL http:// Courtois:2003:AXA comjnl.oxfordjournals. org/cgi/content/abstract/ [CP03] Nicolas T. Courtois and 49/1/97; http://comjnl. Jacques Patarin. About oxfordjournals.org/cgi/ the XL algorithm over content/full/49/1/97; GF (2). In Joye [Joy03b], http://comjnl.oxfordjournals. pages 141–157. CODEN org/cgi/reprint/49/1/97. LNCSD9. ISBN 3-540- 00847-0. ISSN 0302-9743 Chow:2004:UDL (print), 1611-3349 (elec- + tronic). LCCN QA76.9.A25 [CPG 04] Jim Chow, Ben Pfaff, Tal C822 2003. URL http: Garfinkel, Kevin Christo- //link.springer-ny.com/ pher, and Mendel Rosen- link/service/series/0558/ blum. Understanding data tocs/t2612.htm; http: lifetime via whole system //www.springerlink.com/ simulation. In ????, edi- openurl.asp?genre=issue& tor, USENIX Security Sym- issn=0302-9743&volume= posium, page ?? USENIX, 2612. Berkeley, CA, USA, 2004. ISBN ???? LCCN ???? Chatzikokolakis:2007:FAP URL ????. [CP07] Konstantinos Chatzikoko- Chen:2004:SEP lakis and Catuscia Palamidessi. A framework for analyz- [CPhX04] Ling Chen, Yi Pan, and ing probabilistic protocols Xiao hua Xu. Scalable and its application to the and efficient parallel algo- Partial Secrets Exchange. rithms for Euclidean dis- Theoretical Computer Sci- tance transform on the REFERENCES 241

LARPBS model. IEEE 0272-5428. LCCN QA76 Transactions on Parallel .S974 2007. URL http: and Distributed Systems, //ieeexplore.ieee.org/ 15(11):975–982, Novem- servlet/opac?punumber= ber 2004. CODEN ITD- 4389466. IEEE Com- SEO. ISSN 1045-9219 puter Society order number (print), 1558-2183 (elec- P3010. tronic). URL http:// Ciet:2001:SFC csdl.computer.org/comp/ trans/td/2004/11/l0975abs.[CQS01] M. Ciet, J.-J. Quisquater, htm; http://csdl.computer. and F. Sica. A secure fam- org/dl/trans/td/2004/11/ ily of composite finite fields l0975.htm; http://csdl. suitable for fast implemen- computer.org/dl/trans/ tation of elliptic curve cryp- td/2004/11/l0975.pdf. tography. Lecture Notes in Computer Science, 2247: Catalano:2004:IIP 108–??, 2001. CODEN [CPP04] Dario Catalano, David LNCSD9. ISSN 0302- Pointcheval, and Thomas 9743 (print), 1611-3349 Pornin. IPAKE: Isomor- (electronic). URL http: phisms for Password-Based //link.springer-ny.com/ Authenticated Key Ex- link/service/series/0558/ change. In Franklin [Fra04], bibs/2247/22470108.htm; pages 477–?? CODEN http://link.springer- LNCSD9. ISBN 3-540- ny.com/link/service/series/ 22668-0. ISSN 0302-9743 0558/papers/2247/22470108. (print), 1611-3349 (elec- pdf. tronic). LCCN 10.1007/b99099. Canetti:2003:UCJ URL http://www.springerlink. com/openurl.asp?genre= [CR03] Ran Canetti and Tal Ra- issue&issn=0302-9743&volume= bin. Universal composi- 3152; http://www.springerlink. tion with joint state. In com/openurl.asp?genre= Boneh [Bon03], pages 265– volume&id=doi:10.1007/ 281. CODEN LNCSD9. b99099. ISBN 3-540-40674-3. ISSN 0302-9743 (print), 1611- Canetti:2007:CSH 3349 (electronic). LCCN [CPS07] R. Canetti, R. Pass, and QA76.9.A25 C79 2003. URL A. Shelat. Cryptogra- http://link.springer-ny. phy from sunspots: How com/link/service/series/ to use an imperfect ref- 0558/tocs/t2729.htm; erence string. In IEEE http://www.springerlink. [IEE07], pages 249–259. com/openurl.asp?genre= ISBN 0-7695-3010-9. ISSN issue&issn=0302-9743&volume= REFERENCES 242

2729; http://www.springerlink. Crenshaw:2000:SPK com/openurl.asp?genre= volume&id=doi:10.1007/ [Cre00] Scott Crenshaw. Speedy b11817. public key cryptography system. Network Security, Cramer:2005:ACE 2000(3):6, March 1, 2000. CODEN NTSCF5. ISSN [Cra05a] Ronald Cramer, editor. Ad- 1353-4858 (print), 1872- vances in cryptology: EU- 9371 (electronic). URL ROCRYPT 2005: 24th An- http://www.sciencedirect. nual International Confer- com/science/article/pii/ ence on the Theory and Ap- S1353485800030130. plications of Cryptographic Techniques, Aarhus, Den- Crowley:2001:MFL mark, May 22–26, 2005, proceedings, volume 3494 [Cro01] Paul Crowley. Mercy: a of Lecture Notes in Com- fast large block cipher for puter Science. Springer-Ver- disk sector encryption. Lec- lag, Berlin, Germany / Hei- ture Notes in Computer Sci- delberg, Germany / Lon- ence, 1978:49–??, 2001. CO- don, UK / etc., 2005. CO- DEN LNCSD9. ISSN 0302- DEN LNCSD9. ISBN 3-540- 9743 (print), 1611-3349 25910-4 (softcover). ISSN (electronic). URL http: 0302-9743 (print), 1611- //link.springer-ny.com/ 3349 (electronic). LCCN link/service/series/0558/ ???? URL http:/ bibs/1978/19780049.htm; /www.springerlink.com/ http://link.springer- openurl.asp?genre=issue& ny.com/link/service/series/ issn=0302-9743&volume= 0558/papers/1978/19780049. 3494; http://www.springerlink. pdf. com/openurl.asp?genre= volume&id=doi:10.1007/ Chhabra:2009:MSP b136415. [CRSP09] Siddhartha Chhabra, Brian Crampton:2005:UDR Rogers, Yan Solihin, and Milos Prvulovic. Making [Cra05b] Jason Crampton. Under- secure processors OS- and standing and developing performance-friendly. ACM role-based administrative Transactions on Architec- models. In Meadows and ture and Code Optimiza- Syverson [MS05b], pages tion, 5(4):16:1–16:??, March 158–167. ISBN 1-59593- 2009. CODEN ???? ISSN 226-7. LCCN QA76.9.A25. 1544-3566 (print), 1544- ACM order number 459050. 3973 (electronic). REFERENCES 243

CRI:2000:DPA ifiable encryption and de- cryption of discrete loga- [Cry00] Cryptography Research, rithms. In Boneh [Bon03], Inc. Differential power pages 126–144. CODEN analysis. Web page., LNCSD9. ISBN 3-540- 2000. URL http://www. 40674-3. ISSN 0302-9743 cryptography.com/dpa/index. (print), 1611-3349 (elec- html. tronic). LCCN QA76.9.A25 Cramer:2000:SSB C79 2003. URL http: //link.springer-ny.com/ [CS00] Ronald Cramer and Victor link/service/series/0558/ Shoup. Signature schemes tocs/t2729.htm; http: based on the strong RSA //www.springerlink.com/ assumption. ACM Trans- openurl.asp?genre=issue& actions on Information and issn=0302-9743&volume= System Security, 3(3):161– 2729; http://www.springerlink. 185, August 2000. CODEN com/openurl.asp?genre= ATISBQ. ISSN 1094-9224 volume&id=doi:10.1007/ (print), 1557-7406 (elec- b11817. tronic). Cramer:2003:DAP Cramer:2002:UHP [CS03b] Ronald Cramer and Vic- [CS02] Ronald Cramer and Vic- tor Shoup. Design and tor Shoup. Universal hash analysis of practical public- proofs and a paradigm for key encryption schemes adaptive chosen ciphertext secure against adaptive secure public-key encryp- chosen ciphertext attack. tion. Lecture Notes in SIAM Journal on Comput- Computer Science, 2332: ing, 33(1):167–226, Febru- 45–??, 2002. CODEN ary 2003. CODEN SMJ- LNCSD9. ISSN 0302- CAT. ISSN 0097-5397 9743 (print), 1611-3349 (print), 1095-7111 (elec- (electronic). URL http: tronic). URL http:// //link.springer-ny.com/ epubs.siam.org/sam-bin/ link/service/series/0558/ dbq/article/40377. bibs/2332/23320045.htm; Crepeau:2003:SBR http://link.springer- ny.com/link/service/series/[CS03c] Claude Cr´epeau and Alain 0558/papers/2332/23320045. Slakmon. Simple back- pdf. doors for RSA key gener- Camenisch:2003:PVE ation. In Joye [Joy03b], pages 403–416. CODEN [CS03a] Jan Camenisch and Vic- LNCSD9. ISBN 3-540- tor Shoup. Practical ver- 00847-0. ISSN 0302-9743 REFERENCES 244

(print), 1611-3349 (elec- 180–206, 2005. CODEN tronic). LCCN QA76.9.A25 LNCSD9. ISBN 3-540- C822 2003. URL http: 26547-3. ISSN 0302-9743 //link.springer-ny.com/ (print), 1611-3349 (elec- link/service/series/0558/ tronic). Information Se- tocs/t2612.htm; http: curity and Privacy 10th //www.springerlink.com/ Australasian Conference, openurl.asp?genre=issue& ACISP 2005, Brisbane, Aus- issn=0302-9743&volume= tralia, July 4–6, 2005. Pro- 2612. ceedings. Carrier:2004:STP Cvejic:2005:IRL

[CS04] Brian Carrier and Clay [CS05c] N. Cvejic and T. Sepp¨anen. Shields. The session token Increasing robustness of protocol for forensics and LSB audio steganography traceback. ACM Transac- by reduced distortion LSB tions on Information and coding. J.UCS: Jour- System Security, 7(3):333– nal of Universal Computer 362, August 2004. CODEN Science, 11(1):56–65, Jan- ATISBQ. ISSN 1094-9224 uary 28, 2005. CO- (print), 1557-7406 (elec- DEN ???? ISSN 0948- tronic). 6968. URL http:// www.jucs.org/jucs_11_1/ Collberg:2005:SWF increasing_robustness_ [CS05a] Christian Collberg and of_lsb. Tapas Ranjan Sahoo. Soft- Capaldi:2007:ADI ware watermarking in the frequency domain: Imple- [CS07a] Nicholas Capaldi and Miles mentation, analysis, and at- Smit. The art of decep- tacks. Journal of Com- tion: an introduction to crit- puter Security, 13(5):721– ical thinking.Prometheus 755, ???? 2005. CODEN Books, Amherst, NY, USA, JCSIET. ISSN 0926-227X 2007. ISBN 1-59102-532- (print), 1875-8924 (elec- X. 277 pp. LCCN BC177 tronic). .C345 2007. URL http:// www.loc.gov/catdir/toc/ Contini:2005:SAA ecip078/2007001612.html. [CS05b] Scott Contini and Igor E. Chakrabarti:2007:PBA Shparlinski. On Stern’s at- tack against secret trun- [CS07b] Saikat Chakrabarti and cated linear congruential Mukesh Singhal. Password- generators. Lecture Notes based authentication: Pre- in Computer Science, 3574: venting dictionary attacks. REFERENCES 245

Computer, 40(6):68–74, June Cusick:2009:CBF 2007. CODEN CPTRB4. ISSN 0018-9162 (print), [CS09] Thomas W. Cusick and 1558-0814 (electronic). Pantelimon St˘anic˘a. Cryp- tographic Boolean functions Chatterjee:2007:CSC and applications.Else- vier Academic Press, Am- [CS07c] S. Chatterjee and P. Sarkar. sterdam, The Netherlands, Constant size ciphertext 2009. ISBN 0-12-374890-9 HIBE in the augmented (hardcover). xii + 232 pp. selective-ID model and its LCCN QA10.3 .C87 2009. extensions. J.UCS: Jour- nal of Universal Com- Czeskis:2008:DED puter Science, 13(10):1367– 1395, ???? 2007. CO- [CSK+08] Alexei Czeskis, David J. DEN ???? ISSN St.Hilaire, Karl Koscher, 0948-6968. URL http: Steven D. Gribble, Ta- //www.jucs.org/jucs_13_ dayoshi Kohno, and Bruce 10/constant_size_ciphertext_ Schneier. Defeating en- hibe. crypted and deniable file systems: Truecrypt V5.1a Casey:2008:IFD and the case of the tattling [CS08a] Eoghan Casey and Gerasi- OS and applications. In mos J. Stellatos. The im- ????, editor, Proceedings of pact of full disk encryption the 3rd Conference on Hot on digital forensics. Operat- Topics in Security, 2008, ing Systems Review, 42(3): page ?? ????, ????, 2008. 93–98, April 2008. CODEN ISBN ???? LCCN ???? OSRED8. ISSN 0163-5980 URL ????. (print), 1943-586X (elec- Cai:2007:CSM tronic). [CSV07] Hongxu Cai, Zhong Shao, Chang:2008:DAP and Alexander Vaynberg. Certified self-modifying code. [CS08b] Katharine Chang and Kang G. ACM SIGPLAN Notices,42 Shin. Distributed Authenti- (6):66–77, June 2007. CO- cation of Program Integrity DEN SINODQ. ISSN 0362- Verification in Wireless Sen- 1340 (print), 1523-2867 sor Networks. ACM Trans- (print), 1558-1160 (elec- actions on Information and tronic). System Security, 11(3):14:1– 14:??, March 2008. CODEN Crandall:2005:DUV ATISBQ. ISSN 1094-9224 (print), 1557-7406 (elec- [CSW05] Jedidiah R. Crandall, Zhen- tronic). dong Su, and S. Felix REFERENCES 246

Wu. On deriving un- DEN LNCSD9. ISBN 3- known vulnerabilities from 642-00305-2 (print), 3-642- zero-day polymorphic and 00306-0 (e-book). ISSN metamorphic worm exploits. 0302-9743 (print), 1611- In Meadows and Syverson 3349 (electronic). LCCN [MS05b], pages 235–248. ???? URL http:/ ISBN 1-59593-226-7. LCCN /www.springerlink.com/ QA76.9.A25. ACM order content/978-3-642-00306- number 459050. 6. Chen:2008:CCS Collberg:2002:WTP [CSW+08] L. Chen, W. Susilo, H. Wang, [CT02] C. S. Collberg and C. Thom- D. S. Wong, E. Daw- borson. Watermarking, son, X. Lai, M. Mambo, tamper-proofing, and ob- A.Miyaji,Y.Mu,D.Pointcheval, fuscation — tools for soft- B. Preneel, and N. Smart. ware protection. IEEE Cryptography in computer Transactions on Software system security. J.UCS: Engineering, 28(8):735–746, Journal of Universal Com- August 2002. CODEN puter Science, 14(3):314– IESEDJ. ISSN 0098- 317, ???? 2008. CODEN 5589 (print), 1939-3520 ???? ISSN 0948-6968. (electronic). URL http: URL http://www.jucs. //ieeexplore.ieee.org/ org/jucs_14; http:// stamp/stamp.jsp?arnumber= www.jucs.org/jucs_14_3# 1027797. ; http://www.jucs.org/ Coron:2003:NAS jucs_14_3/cryptography_ in_computer_system. [CT03] Jean-S´ebastien Coron and Alexei Tchulkine. A Chung:2009:ISA new algorithm for switch- [CSY09] Kyo-Il Chung, Kiwook ing from arithmetic to Sohn, and Moti Yung, ed- Boolean masking. In Wal- itors. Information Se- ter et al. [WKP03], pages curity Applications: 9th 89–97. CODEN LNCSD9. International Workshop, ISBN 3-540-40833-9. ISSN WISA 2008, Jeju Island, 0302-9743 (print), 1611- Korea, September 23–25, 3349 (electronic). LCCN 2008, Revised Selected Pa- TK7895.E42. URL http: pers, volume 5379 of Lec- //link.springer-ny.com/ ture Notes in Computer link/service/series/0558/ Science. Springer-Verlag, tocs/t2779.htm; http: Berlin, Germany / Heidel- //www.springerlink.com/ berg, Germany / London, openurl.asp?genre=issue& UK / etc., 2009. CO- issn=0302-9743&volume= REFERENCES 247

2779; http://www.springerlink. Crawford:2001:FPV com/openurl.asp?genre= + volume&id=doi:10.1007/ [CTBA 01] Diane Crawford, Tho- b13240. mas Tiahrt, Moti Ben-Ari, Matt West, Hans A. von Chen:2008:BUK Spakovsky, and Deborah Phillips. Forum: Partic- [CT08a] L. Chen and Q. Tang. Bi- ipatory vs. representative lateral unknown key-share democracy; why store every- attacks in key agreement thing?; Emulex hoax; cor- protocols. J.UCS: Journal rection. Communications of Universal Computer Sci- of the Association for Com- ence, 14(3):416–440, ???? puting Machinery, 44(4):13– 2008. CODEN ???? ISSN 15, April 2001. CODEN 0948-6968. URL http:// CACMA2. ISSN 0001-0782 www.jucs.org/jucs_14_3/ (print), 1557-7317 (elec- bilateral_unknown_key_ tronic). URL http://www. share. acm.org/pubs/citations/ journals/cacm/2001-44- Chu:2008:EOT 4/p13-crawford/.See [Sch00c, PvS01]. [CT08b] C.-K. Chu and W.-G. Tzeng. Efficient k-out-of-n Chiang:2008:CPB oblivious transfer schemes. J.UCS: Journal of Univer- [CTH08] Yung-Kuei Chiang, Piyu sal Computer Science,14 Tsai, and Feng-Long Huang. (3):397–415, ???? 2008. Codebook partition based CODEN ???? ISSN steganography without mem- 0948-6968. URL http:// ber restriction. Fundamenta www.jucs.org/jucs_14_3/ Informaticae, 82(1–2):15– efficient_k_out_of. 27, July 2008. CODEN FUMAAJ. ISSN 0169-2968 Chou:2009:ATI (print), 1875-8681 (elec- tronic). [CT09] Chang-Min Chou and Din- Chang:2004:ASS Chang Tseng. Affine- transformation-invariant pub- [CTL04] Chin-Chen Chang, Piyu lic fragile watermarking for Tsai, and Min-Hui Lin. 3D model authentication. An adaptive steganographic IEEE Computer Graphics scheme for color images. and Applications, 29(2): Fundamenta Informaticae, 72–79, March/April 2009. 62(3–4):275–289, March CODEN ICGADZ. ISSN 2004. CODEN FUMAAJ. 0272-1716 (print), 1558- ISSN 0169-2968 (print), 1756 (electronic). 1875-8681 (electronic). REFERENCES 248

Cheung:2001:TPS (print), 1875-8681 (elec- tronic). [CTLL01] O. Y. H. Cheung, K. H. Tsoi,P.H.W.Leong,and Cheng:2001:NPT M. P. Leong. Tradeoffs in parallel and serial imple- [CU01] Qi Cheng and Shigenori mentations of the interna- Uchiyama. Nonuniform tional data encryption al- polynomial time algorithm gorithm IDEA. Lecture to solve decisional Diffie– Notes in Computer Science, Hellman problem in fi- 2162:333–??, 2001. CO- nite fields under conjec- DEN LNCSD9. ISSN 0302- ture. Lecture Notes in 9743 (print), 1611-3349 Computer Science, 2271: (electronic). URL http: 290–??, 2001. CODEN //link.springer-ny.com/ LNCSD9. ISSN 0302- link/service/series/0558/ 9743 (print), 1611-3349 bibs/2162/21620333.htm; (electronic). URL http: http://link.springer- //link.springer-ny.com/ ny.com/link/service/series/ link/service/series/0558/ 0558/papers/2162/21620333. bibs/2271/22710290.htm; pdf. http://link.springer- ny.com/link/service/series/ Collberg:2007:DGB 0558/papers/2271/22710290. . [CTT07] Christian S. Collberg, Clark pdf Thomborson, and Gregg M. Curtin:2005:BFC Townsend. Dynamic graph- based software fingerprint- [Cur05] Matt Curtin. Brute force: ing. ACM Transactions cracking the Data Encryp- on Programming Languages tion Standard.Coperni- and Systems, 29(6):35:1– cus (a division of Springer- 35:67, October 2007. CO- Verlag New York, Inc.), 175 DEN ATPSDT. ISSN Fifth Avenue, New York, 0164-0925 (print), 1558- NY 10010, USA, 2005. ISBN 4593 (electronic). 0-387-20109-2. x + 291 pp. LCCN QA76.9.A25 Chen:2009:FCV C873 2005. [CTY09] Tzung-Her Chen, Kai- Chaitanya:2008:QQM Hsiang Tsao, and Yan-Ting Yang. Friendly color vi- [CUS08] Shiva Chaitanya, Bhuvan sual secret sharing by ran- Urgaonkar, and Anand Siva- dom grids. Fundamenta In- subramaniam. QDSL: a formaticae, 96(1–2):61–70, queuing model for systems January 2009. CODEN FU- with differential service lev- MAAJ. ISSN 0169-2968 els. ACM SIGMETRICS REFERENCES 249

Performance Evaluation Re- issn=0302-9743&volume= view, 36(1):289–300, June 2729; http://www.springerlink. 2008. CODEN ???? ISSN com/openurl.asp?genre= 0163-5999 (print), 1557- volume&id=doi:10.1007/ 9484 (electronic). b11817.

Canteaut:2002:DCH Canteaut:2004:PCI [CV04] Anne Canteaut and Ka- [CV02] Anne Canteaut and Mar- paleeswaran Viswanathan, ion Videau. Degree of com- editors. Progress in cryp- position of highly nonlin- tology: INDOCRYPT 2004: ear functions and applica- 5th International Confer- tions to higher order differ- ence on Cryptology in In- ential cryptanalysis. Lecture dia, Chennai, India, De- Notes in Computer Science, cember 20–22, 2004: Pro- 2332:518–??, 2002. CO- ceedings, volume 3348 of DEN LNCSD9. ISSN 0302- Lecture Notes in Computer 9743 (print), 1611-3349 Science. Springer-Verlag, (electronic). URL http: Berlin, Germany / Heidel- //link.springer-ny.com/ berg, Germany / London, link/service/series/0558/ UK / etc., 2004. CO- bibs/2332/23320518.htm; DEN LNCSD9. ISBN 3-540- http://link.springer- 24130-2. ISSN 0302-9743 ny.com/link/service/series/ (print), 1611-3349 (elec- 0558/papers/2332/23320518. tronic). LCCN QA76.9.A25 pdf. I5535 2004. URL http:// Cary:2003:MAC springerlink.metapress. com/openurl.asp?genre= [CV03] Matthew Cary and Rama- issue&issn=0302-9743&volume= rathnam Venkatesan. A 3348; http://www.springerlink. message authentication code com/openurl.asp?genre= based on unimodular matrix issue&issn=0302-9743&volume= groups. In Boneh [Bon03], 3348; http://www.springerlink. pages 500–512. CODEN com/openurl.asp?genre= LNCSD9. ISBN 3-540- volume&id=doi:10.1007/ 40674-3. ISSN 0302-9743 b104579. (print), 1611-3349 (elec- Castro:2005:NRG tronic). LCCN QA76.9.A25 C79 2003. URL http: [CV05] Julio C´esar Hern´andez Cas- //link.springer-ny.com/ tro and Pedro Isasi Vi˜nuela. link/service/series/0558/ New results on the ge- tocs/t2729.htm; http: netic cryptanalysis of TEA //www.springerlink.com/ and reduced-round versions openurl.asp?genre=issue& of XTEA. New Genera- REFERENCES 250

tion Computing, 23(3):233– ming with static analysis. 243, 2005. CODEN NG- Addison-Wesley software se- COE5. ISSN 0288-3635 curity series. Addison-Wes- (print), 1882-7055 (elec- ley, Reading, MA, USA, tronic). URL http:/ 2007. ISBN 0-321-42477-8 /www.springerlink.com/ (paperback). xxix + 587 content/e018uh040400kh87/ pp. LCCN QA76.9.A25 . C443 2007. URL http:// Canda:2001:SBC www.loc.gov/catdir/toc/ ecip0713/2007010226.html. ˇ ˇ [CvTMH01] Val´er Canda, Tran van Cheng:2009:NAS Trung, Spyros Magliveras, and Tam´as Horv´ath. Sym- [CW09] Yu-Ming Cheng and Chung- metric block ciphers based Ming Wang. A novel ap- on group bases. Lecture proach to steganography in Notes in Computer Science, high-dynamic-range images. 2012:89–105, 2001. CO- IEEE MultiMedia, 16(3):70– DEN LNCSD9. ISSN 0302- 80, July/September 2009. 9743 (print), 1611-3349 CODEN IEMUE4. ISSN (electronic). URL http: 1070-986X (print), 1941- //link.springer-ny.com/ 0166 (electronic). link/service/series/0558/ Chang:2000:ELD bibs/2012/20120089.htm; http://link.springer- [CWH00] Yuh-Shihng Chang, Tzong- ny.com/link/service/series/ Chen Wu, and Shih-Chan 0558/papers/2012/20120089. Huang. ElGamal-like dig- pdf. ital signature and mul- tisignature schemes using Chang:2002:ATI self-certified public keys. The Journal of Systems [CW02] Fu-Chi Chang and Chia- and Software, 50(2):99–105, Jiu Wang. Architectural February 15, 2000. CO- tradeoff in implementing DEN JSSODM. ISSN RSA processors. ACM 0164-1212 (print), 1873- SIGARCH Computer Ar- 1228 (electronic). URL chitecture News, 30(1):5– 11, March 2002. CODEN http://www.elsevier.nl/ CANED2. ISSN 0163-5964 gej-ng/10/29/11/49/27/ (print), 1943-5851 (elec- 26/article.pdf; http: tronic). //www.elsevier.nl/gej- ng/10/29/11/49/27/abstract. Chess:2007:SPS html. Chien:2001:CCW [CW07] Brian Chess and Jacob West. Secure program- [CWJT01] Hung-Yu Chien, Tzong- REFERENCES 251

Chen Wu, Jinn-Ke Jan, and hdb/Volume_48/Issue_01/ Yuh-Min Tseng. Cryptanal- pdf/bxh061.pdf. ysis of Chang–Wu’s group- oriented authentication and Choie:2002:ICH key exchange protocols. In- formation Processing Let- [CY02] Y. Choie and D. Yun. Iso- ters, 80(2):113–117, Octo- morphism classes of hyper- ber 31, 2001. CODEN IF- elliptic curves of genus 2 PLAT. ISSN 0020-0190 over Fq. Lecture Notes (print), 1872-6119 (elec- in Computer Science, 2384: tronic). URL http://www. 190–??, 2002. CODEN elsevier.com/gej-ng/10/ LNCSD9. ISSN 0302- 23/20/80/37/33/abstract. 9743 (print), 1611-3349 html. (electronic). URL http: //link.springer-ny.com/ Crosby:2009:OLR link/service/series/0558/ bibs/2384/23840190.htm; [CWR09] Scott A. Crosby, Dan S. http://link.springer- Wallach, and Rudolf H. ny.com/link/service/series/ Riedi. Opportunities and 0558/papers/2384/23840190. limits of remote timing at- pdf. tacks. ACM Transactions on Information and System Chen:2005:ENB Security, 12(3):17:1–17:??, January 2009. CODEN [CY05] Yen-Cheng Chen and Lo- ATISBQ. ISSN 1094-9224 Yao Yeh. An efficient (print), 1557-7406 (elec- nonce-based authentication tronic). scheme with key agreement. Applied Mathematics and Chien:2005:NRS Computation, 169(2):982– 994, October 15, 2005. CO- [CWY05] Hung-Yu Chien, Ren-Chiun DEN AMHCBQ. ISSN Wang, and Chou-Chen 0096-3003 (print), 1873- Yang. Note on robust and 5649 (electronic). simple authentication proto- col. The Computer Journal, Chang:2008:EBD 48(1):27–29, January 2005. CODEN CMPJA6. ISSN [CY08] Mei-Chu Chang and Chui Zhi 0010-4620 (print), 1460- Yao. An explicit bound on 2067 (electronic). URL double exponential sums re- http://www3.oup.co.uk/ lated to Diffie–Hellman dis- computer_journal/hdb/Volume_ tributions. SIAM Journal 48/Issue_01/bxh061.sgm. on Discrete Mathematics, abs.html; http://www3. 22(1):348–359, ???? 2008. oup.co.uk/computer_journal/ CODEN SJDMEC. ISSN REFERENCES 252

0895-4801 (print), 1095- Mathematics with Appli- 7146 (electronic). cations, 49(5–6):703–714, April/May 2005. CODEN Chang:2001:NSS CMAPDK. ISSN 0898-1221 [CYH01] Chin-Chen Chang, Jyh- (print), 1873-7668 (elec- Chiang Yeh, and Ju-Yuan tronic). URL http:// Hsiao. A novel scheme www.sciencedirect.com/ for securing image steganog- science/article/pii/S0898122105000842. raphy. Lecture Notes in Chung:2007:SBW Computer Science, 2195: 804–??, 2001. CODEN [CYH+07] Kuo-Liang Chung, Wei- LNCSD9. ISSN 0302- Ning Yang, Yong-Huai 9743 (print), 1611-3349 Huang, Shih-Tung Wu, and (electronic). URL http: Yu-Chiao Hsu. On SVD- //link.springer-ny.com/ based watermarking algo- link/service/series/0558/ rithm. Applied Mathemat- bibs/2195/21950804.htm; ics and Computation, 188 http://link.springer- (1):54–57, May 1, 2007. ny.com/link/service/series/ CODEN AMHCBQ. ISSN 0558/papers/2195/21950804. 0096-3003 (print), 1873- pdf. 5649 (electronic). Chang:2004:TSSb Chang:2005:CIA

[CYH04] Ting-Yi Chang, Chou- [CYY05] Ting-Yi Chang, Chou-Chan Chen Yang, and Min-Shiang Yang, and Ya-Wen Yang. Hwang. A threshold sig- Cryptanalysis of the im- nature scheme for group proved authenticated key communications without a agreement protocol. Applied shared distribution center. Mathematics and Compu- Future Generation Com- tation, 171(2):771–774, De- puter Systems, 20(6):1013– cember 15, 2005. CODEN 1021, August 2004. CODEN AMHCBQ. ISSN 0096-3003 FGSEVI. ISSN 0167-739X (print), 1873-5649 (elec- (print), 1872-7115 (elec- tronic). tronic). Chen:2003:AEY Chang:2005:SAK [CZ03] Ke-Fei Chen and Sheng [CYH05] Ting-Yi Chang, Wei-Pang Zhong. Attacks on the Yang, and Min-Shiang (enhanced) Yang–Shieh au- Hwang. Simple authenti- thentication. Computers cated key agreement and &Security, 22(8):725–727, protected password change December 2003. CODEN protocol. Computers and CPSEDU. ISSN 0167-4048 REFERENCES 253

(print), 1872-6208 (elec- OOSD. Communications of tronic). URL https:// the Association for Com- www.sciencedirect.com/ puting Machinery, 44(2):11– science/article/pii/S0167404803000129. 13, February 2001. CODEN See erratum [McK04]. CACMA2. ISSN 0001-0782 (print), 1557-7317 (elec- Chadwick:2005:PKI tronic). URL http://www. [CZ05] David Chadwick and Gansen acm.org/pubs/citations/ Zhao, editors. Public journals/cacm/2001-44- key infrastructure: Sec- 2/p11-crawford/.See ond European PKI Work- [Sch00c]. shop: Research and Ap- Cheng:2005:RIC plications, EuroPKI 2005, Canterbury, UK, June 30– [CZK05] Xiaorong Cheng, Huilan July 1, 2005: revised se- Zhao, and Jitian Kou. Re- lected papers, volume 3545 search and improvement on of Lecture Notes in Com- computer intrusion detec- puter Science. Springer-Ver- tion technology based on lag, Berlin, Germany / Hei- immune principle. In Han delberg, Germany / Lon- et al. [HYZ05b], pages 167– don, UK / etc., 2005. CO- ?? ISBN 981-270-153-2. DEN LNCSD9. ISBN 3-540- LCCN ???? URL http:// 28062-6. ISSN 0302-9743 eproceedings.worldscinet. (print), 1611-3349 (elec- com/9812701532/9812701532. tronic). LCCN QA76.9.A25 0031.html. E976 2005. URL http: Dodis:2003:CAA //www.springerlink.com/ openurl.asp?genre=issue& [DA03] Yevgeniy Dodis and Jee Hea issn=0302-9743&volume= An. Concealment and its ap- 3545. plications to authenticated encryption. Lecture Notes Crawford:2001:FHC in Computer Science, 2656: [CZB+01] Diane Crawford, Mick Zraly, 312–329, 2003. CODEN Hal Berghel, Ken Pugh, LNCSD9. ISSN 0302-9743 Mat H. West, Conrad Weis- (print), 1611-3349 (elec- ert, Terry Steyaert, and tronic). URL http://link. Richard Johnson. Fo- springer.com/content/pdf/ rum: How can the Web 10.1007/3-540-39200-9_ advance Western democ- 19.pdf. racies? who needs dig- Dale:2001:BSA ital signatures; misinfor- mation and the Emulex [Dal01] Richard Dale. Biometric se- hoax; OOSCD not really curity: It’s all about identi- so unified; go back to non- fication and authentication. REFERENCES 254

Dr. Dobb’s Journal of Soft- February 2001. CODEN ware Tools, 26(11):93–94, LOGNEM. ISSN 1044-6397. 96, November 2001. CO- URL http://www.usenix. DEN DDJOEB. ISSN 1044- org/publications/login/ 789X. URL http://www. 2001-02/pdfs/danielyan. ddj.com/. pdf. Damgaard:2000:ECZ Danas:2002:CUS [Dam00] Ivan Damg˚ard. Efficient [Dan02] George Danas. On a cryp- concurrent zero-knowledge tosystem using simple con- in the auxiliary string tinued fractions. Math. Sci. model. In ????, editor, Res. J., 6(3):168–173, 2002. Advances in cryptology— ISSN 1537-5978. EUROCRYPT 2000 (Bruges), Das:2008:BQC pages 418–430. Springer- Verlag, Berlin, Germany / [Das08] S. R. Das. Breaking quan- Heidelberg, Germany / Lon- tum cryptography’s 150- don, UK / etc., 2000. ISBN kilometer limit [update]. ???? LCCN ???? URL ??? IEEE Spectrum, 45(9):15, ?. September 2008. CODEN IEESAM. ISSN 0018-9235 Damaj:2007:PAD (print), 1939-9340 (elec- [Dam07] Issam W. Damaj. Parallel tronic). algorithms development for Davis:2001:ISV programmable devices with application from cryptogra- [Dav01a] Carlton R. Davis. IPSec: phy. International Jour- Securing VPNs.Mc- nal of Parallel Program- Graw-Hill, New York, NY, ming, 35(6):529–572, De- USA, 2001. ISBN 0-07- cember 2007. CODEN 212757-0. xix + 404 pp. IJPPE5. ISSN 0885-7458 LCCN TK5105.567 D38 (print), 1573-7640 (elec- 200. US$49.99. tronic). URL http:/ Davis:2001:DSA /www.springerlink.com/ openurl.asp?genre=article&[Dav01b] Don Davis. Defective Sign issn=0885-7458&volume= & Encrypt in S/MIME, 35&issue=6&spage=529. PKCS#7, MOSS, PEM, PGP, and XML. In Danielyan:2001:AAE USENIX [USE01a], page ?? [Dan01] Edgar Danielyan. AES: ISBN 1-880446-09-X. LCCN Advanced Encryption Stan- QA76.8.U65 U84 2001. URL dard is coming. ;lo- http://www.usenix.org/ gin: the USENIX Associ- publications/library/proceedings/ ation newsletter, 26(1):??, usenix01/davis.html. REFERENCES 255

Davis:2001:DSE thentication system. Net- work Security, 2007(7):17– [Dav01c] Don Davis. Defective sign- 20, July 2007. CODEN and-encrypt: Can you really NTSCF5. ISSN 1353-4858 trust S/MIME, PCKS#7, (print), 1872-9371 (elec- PGP, and XML? Dr. Dobb’s tronic). URL http:// Journal of Software Tools, www.sciencedirect.com/ 26(11):30, November 2001. science/article/pii/S1353485807700661. CODEN DDJOEB. ISSN 1044-789X. URL http:// Desmedt:2001:ERD www.ddj.com/. [DBS01] Yvo Desmedt, Mike Burmester, Davis:2007:AAA and Jennifer Seberry. Equi- tability in retroactive data [Dav07] Adrian Davis. Authenti- confiscation versus proac- cation across the airwaves. tive key escrow. Lecture Network Security, 2007(2): Notes in Computer Science, 13–19, February 2007. CO- 1992:277–??, 2001. CO- DEN NTSCF5. ISSN 1353- DEN LNCSD9. ISSN 0302- 4858 (print), 1872-9371 9743 (print), 1611-3349 (electronic). URL http:/ (electronic). URL http: /www.sciencedirect.com/ //link.springer-ny.com/ science/article/pii/S1353485807700193. link/service/series/0558/ DeBrosse:2004:SBU bibs/1992/19920277.htm; http://link.springer- [DB04] Jim DeBrosse and Colin B. ny.com/link/service/series/ Burke. The secret in Build- 0558/papers/1992/19920277. ing 26: the untold story of pdf. America’s ultra war against the U-boat Enigma codes. Doyle:2006:SCK Random House, New York, NY, USA, 2004. ISBN 0- [DBS+06] Barry Doyle, Stuart Bell, 375-50807-4, 1-58836-353-8, Alan F. Smeaton, Kealan 0-375-75995-6. xxix + 272 McCusker, and Noel E. pp. LCCN D810.C88 D43 O’Connor. Security consid- 2004. URL http://www. erations and key negotiation loc.gov/catdir/samples/ techniques for power con- random045/2003058494.html; strained sensor networks. http://www.randomhouse. The Computer Journal,49 com/catalog/display.pperl? (4):443–453, July 2006. CO- isbn=9781588363534. DEN CMPJA6. ISSN 0010- deBorde:2007:STF 4620 (print), 1460-2067 (electronic). URL http:/ [dB07] Duncan de Borde. Se- /comjnl.oxfordjournals. lecting a two-factor au- org/cgi/content/abstract/ REFERENCES 256

49/4/443; http://comjnl. 0558/papers/1770/17700626. oxfordjournals.org/cgi/ pdf. content/full/49/4/443; http://comjnl.oxfordjournals. Dalkilic:2002:CPF org/cgi/reprint/49/4/443. [DD02] Mehmet Emin Dalkili¸cand diVimercati:2005:CSE G¨okhan Dalkili¸c. On the cryptographic patterns and [dCdVSG05] Sabrina de Capitani di frequencies in Turkish lan- Vimercati, Paul Syverson, guage. Lecture Notes in and Dieter Gollmann, edi- Computer Science, 2457: tors. Computer security — 144–??, 2002. CODEN ESORICS 2005: 10th Eu- LNCSD9. ISSN 0302-9743 ropean symposium on re- (print), 1611-3349 (elec- search in computer secu- tronic). URL http:// rity, Milan, Italy, Septem- link.springer.de/link/ ber 12–14, 2005: proceed- service/series/0558/bibs/ ings, volume 3679 of Lec- 2457/24570144.htm; http: ture Notes in Computer //link.springer.de/link/ Science. Springer-Verlag, service/series/0558/papers/ Berlin, Germany / Heidel- 2457/24570144.pdf. berg, Germany / London, DeBonis:2004:RSS UK / etc., 2005. CO- DEN LNCSD9. ISBN 3-540- [DD04] Annalisa De Bonis and Al- 28963-1. ISSN 0302-9743 fredo De Santis. Random- (print), 1611-3349 (elec- ness in secret sharing and vi- tronic). LCCN ???? sual cryptography schemes. Theoretical Computer Sci- DeBonis:2000:RVC ence, 314(3):351–374, April 10, 2004. CODEN TC- [DD00] Annalisa De Bonis and Al- SCDI. ISSN 0304-3975 fredo De Santis. Ran- (print), 1879-2294 (elec- domness in visual cryptog- tronic). raphy. Lecture Notes in Computer Science, 1770: Diene:2006:DLE 626–??, 2000. CODEN LNCSD9. ISSN 0302- [DDG+06] Adama Diene, Jintai Ding, 9743 (print), 1611-3349 Jason E. Gower, Timo- (electronic). URL http: thy J. Hodges, and Zhi- //link.springer-ny.com/ jun Yin. Dimension of link/service/series/0558/ the linearization equations bibs/1770/17700626.htm; of the Matsumoto–Imai http://link.springer- cryptosystems. In Ytre- ny.com/link/service/series/ hus [Ytr06], pages 242–251. REFERENCES 257

ISBN 3-540-35481-6. LCCN http://link.springer- QA76.9.A25 I557 2005. ny.com/link/service/series/ 0558/papers/2139/21390566. Dolev:2000:NC pdf. [DDN00] Danny Dolev, Cynthia Dean:2006:IMB Dwork, and Moni Naor. Nonmalleable cryptogra- [Dea06] Roger Dean. Identity man- phy. SIAM Journal on agement — back to the user. Computing, 30(2):391–437, Network Security, 2006(12): April 2000. CODEN SMJ- 4–7, December 2006. CO- CAT. ISSN 0097-5397 DEN NTSCF5. ISSN 1353- (print), 1095-7111 (elec- 4858 (print), 1872-9371 tronic). URL http:// (electronic). URL http:/ epubs.siam.org/sam-bin/ /www.sciencedirect.com/ dbq/article/29156. science/article/pii/S1353485806704603. Dolev:2003:NC DeLooze:2007:PWS

[DDN03] Danny Dolev, Cynthia [DeL07] Lori DeLooze. Provid- Dwork, and Moni Naor. ing Web service security Nonmalleable cryptography. in a federated environ- SIAM Review, 45(4):727– ment. IEEE Security & 784, December 2003. CO- Privacy, 5(1):73–75, Jan- DEN SIREAD. ISSN 0036- uary/February 2007. CO- 1445 (print), 1095-7200 DEN ???? ISSN 1540-7993 (electronic). URL http:// (print), 1558-4046 (elec- epubs.siam.org/sam-bin/ tronic). dbq/article/42985. Desai:2000:ESS DeSantis:2001:RNI [Des00a] Anand Desai. Encryption [DDO+01] Alfredo De Santis, Giovanni schemes: security notions, Di Crescenzo, Rafail Os- designs and analyses. Vita trovsky, Giuseppe Persiano, thesis (Ph.D.), University of and Amit Sahai. Robust California, San Diego, San non-interactive zero knowl- Diego, CA, USA, 2000. edge. In Kilian [Kil01a], Desai:2000:NPC pages 566–?? ISBN 3-540- 42456-3 (paperback). LCCN [Des00b] Anand Desai. New para- QA76.9.A25 C79 2001; digms for constructing sym- QA267.A1 L43 no.2139. metric encryption schemes UK£47.00. URL http: secure against chosen-ciphertext //link.springer-ny.com/ attack. In Bellare [Bel00], link/service/series/0558/ pages 394–?? ISBN 3-540- bibs/2139/21390566.htm; 67907-3. ISSN 0302-9743 REFERENCES 258

(print), 1611-3349 (elec- many / London, UK / etc., tronic). LCCN QA76.9.A25 2002. CODEN LNCSD9. C79 2000 Bar. URL http: ISBN 3-540-00324-X (soft- //link.springer-ny.com/ cover). ISSN 0302-9743 link/service/series/0558/ (print), 1611-3349 (elec- bibs/1880/18800394.htm; tronic). LCCN QA76.9.A25 http://link.springer- I567 2003. URL http: ny.com/link/service/series/ //link.springer-ny.com/ 0558/papers/1880/18800394. link/service/series/0558/ pdf. tocs/t2567.htm; http: //www.springerlink.com/ Desai:2000:SAN openurl.asp?genre=issue& issn=0302-9743&volume= [Des00c] Anand Desai. The se- 2567. Also available via the curity of all-or-nothing World Wide Web. encryption: Protecting against exhaustive key Dewson:2008:BSS search. In Bellare [Bel00], [Dew08] Robin Dewson. Beginning pages 359–?? ISBN 3-540- SQL Server 2008 for devel- 67907-3. ISSN 0302-9743 opers: from novice to pro- (print), 1611-3349 (elec- fessional; [the quick and ef- tronic). LCCN QA76.9.A25 ficient path to proficiency in C79 2000 Bar. URL http: SQL Server 2008].Theex- //link.springer-ny.com/ pert’s voice in SQL Server. link/service/series/0558/ Apress, Berkeley, CA, USA, bibs/1880/18800359.htm; 2008. ISBN 1-59059-958-6. http://link.springer- xxiv + 471 pp. LCCN ???? ny.com/link/service/series/ 0558/papers/1880/18800359. Dhem:2001:HSS pdf. [DF01] Jean-Fran¸cois Dhem and Desmedt:2002:PKC Nathalie Feyt. Hard- ware and software sym- [Des02] Yvo G. Desmedt, editor. biosis helps smart card Public Key Cryptography— evolution. IEEE Micro, PKC 2003: 6th Interna- 21(6):14–25, November/ tional Workshop on Prac- December 2001. CODEN tice and Theory in Public IEMIDZ. ISSN 0272-1732 Key Cryptography Miami, (print), 1937-4143 (elec- FL, USA, January 6–8, tronic). URL http://dlib. 2003. Proceedings,volume computer.org/mi/books/ 2567 of Lecture Notes in mi2001/m6014abs.htm; Computer Science. Spring- http://dlib.computer.org/ er-Verlag, Berlin, Ger- mi/books/mi2001/pdf/m6014. many / Heidelberg, Ger- pdf. REFERENCES 259

Delgado:2007:SCD ence. ACM Transactions on Software Engineering and [DF07] Oscar Delgado and Am- Methodology, 9(4):488–528, paro F´uster. Stream ci- October 2000. CODEN pher design for MANets. ATSMER. ISSN 1049-331X In Simos and Maroulis (print), 1557-7392 (elec- [SM07b], pages 965–968. tronic). URL http://www. ISBN 0-7354-0476-3 (set), acm.org/pubs/articles/ 0-7354-0477-1 (vol. 1), 0- journals/tosem/2000-9- 7354-0478-X (vol. 2). ISSN 4/p488-durante/p488-durante. 0094-243X (print), 1551- pdf; http://www.acm. 7616 (electronic), 1935- org/pubs/citations/journals/ 0465. LCCN Q183.9 tosem/2000-9-4/p488-durante/ .I524 2007. URL http: . //proceedings.aip.org/ Durante:2001:CWR getpdf/servlet/GetPDFServlet? filetype=pdf& id= [DFG01] Antonio Durante, Riccardo APCPCS000963000002000965000001& Focardi, and Roberto Gor- amp; idtype=cvips. rieri. CVS at work: a re- port on new failures upon Domingo-Ferrer:2000:SCR some cryptographic proto- [DFCW00] Josep Domingo-Ferrer, David cols. Lecture Notes in Chan, and Anthony Wat- Computer Science, 2052: son, editors. Smart card re- 287–??, 2001. CODEN search and advanced appli- LNCSD9. ISSN 0302- cations: IFIP TC8/WG8.8 9743 (print), 1611-3349 Fourth Working Confer- (electronic). URL http: ence on Smart Card Re- //link.springer-ny.com/ search and Advanced Appli- link/service/series/0558/ cations, September 20–22, bibs/2052/20520287.htm; 2000, Bristol, United King- http://link.springer- dom,volume52ofIFIP. ny.com/link/service/series/ Kluwer Academic Publish- 0558/papers/2052/20520287. ers, Dordrecht, The Nether- pdf. lands, 2000. ISBN 0-7923- DePalma:2004:CCS 7953-5. LCCN TK7895.S62 I34 2000. [DFGH04] Paul De Palma, Charles Durante:2000:CAC Frank, Suzanne Gladfelter, and Joshua Holden. Cryp- [DFG00] Antonio Durante, Riccardo tography and computer se- Focardi, and Roberto Gor- curity for undergraduates. rieri. A compiler for an- SIGCSE Bulletin (ACM alyzing cryptographic pro- Special Interest Group on tocols using noninterfer- Computer Science Educa- REFERENCES 260

tion), 36(1):94–95, March Ferrara, and Barbara Ma- 2004. CODEN SIGSD3. succi. Cryptographic key ISSN 0097-8418 (print), assignment schemes for any 2331-3927 (electronic). access control policy. In- formation Processing Let- Domingo-Ferrer:2001:CDS ters, 92(4):199–205, Novem- [DFH01] Josep Domingo-Ferrer and ber 30, 2004. CODEN IF- Pieter Hartel. Current direc- PLAT. ISSN 0020-0190 tions in smart cards. Com- (print), 1872-6119 (elec- puter Networks (Amster- tronic). dam, Netherlands: 1999), Domingo-Ferrer:2006:SCR 36(4):377–379, July 16, 2001. CODEN ???? ISSN [DFPS06] Josep Domingo-Ferrer, Joachim 1389-1286 (print), 1872- Posegga, and Daniel Schreck- 7069 (electronic). URL ling, editors. Smart Card http://www.elsevier.nl/ Research and Advanced Ap- gej-ng/10/15/22/61/28/ plications: 7th IFIP WG 25/abstract.html; http: 8.8/11.2 International Con- //www.elsevier.nl/gej- ference, CARDIS 2006, ng/10/15/22/61/28/25/article. Tarragona, Spain, April pdf. 19–21, 2006. Proceedings, volume 3928 of Lecture Dodis:2003:IRP Notes in Computer Science. [DFK+03] Yevgeniy Dodis, Matt Springer-Verlag, Berlin, Franklin, Jonathan Katz, Germany / Heidelberg, Ger- Atsuko Miyaji, and Moti many / London, UK / etc., Yung. Intrusion-resilient 2006. CODEN LNCSD9. public-key encryption. In ISBN 3-540-33311-8. ISSN Joye [Joy03b], pages 19– 0302-9743 (print), 1611- 32. CODEN LNCSD9. 3349 (electronic). LCCN ISBN 3-540-00847-0. ISSN ???? URL http:/ 0302-9743 (print), 1611- /www.springerlink.com/ 3349 (electronic). LCCN openurl.asp?genre=issue& QA76.9.A25 C822 2003. issn=0302-9743&volume= URL http://link.springer- 3928. ny.com/link/service/series/ Domingo-Ferrer:2007:ASC 0558/tocs/t2612.htm; http://www.springerlink. [DFPST07] Josep Domingo-Ferrer, Joachim com/openurl.asp?genre= Posegga, Francesc Seb´e, and issue&issn=0302-9743&volume= Vicen¸c Torra. Advances in 2612. smart cards. Computer Net- works (Amsterdam, Nether- DeSantis:2004:CKA lands: 1999), 51(9):2219– [DFM04] Alfredo De Santis, Anna Lisa 2222, June 20, 2007. CO- REFERENCES 261

DEN ???? ISSN 1389-1286 2008. CODEN SMJCAT. (print), 1872-7069 (elec- ISSN 0097-5397 (print), tronic). 1095-7111 (electronic). Damgaard:2004:ZKP Dalkilic:2000:ICA [DFS04] Ivan Damg˚ard, Serge Fehr, and Louis Salvail. Zero- [DG00] Mehmet E. Dalkilic and knowledge proofs and string Cengiz Gungor. An in- commitments withstand- teractive cryptanalysis al- ing quantum attacks. In gorithm for the Vigen`ere Franklin [Fra04], pages 254– cipher. Lecture Notes in ?? CODEN LNCSD9. Computer Science, 1909: ISBN 3-540-22668-0. ISSN 341–??, 2000. CODEN 0302-9743 (print), 1611- LNCSD9. ISSN 0302- 3349 (electronic). LCCN 9743 (print), 1611-3349 10.1007/b99099. URL (electronic). URL http: http://www.springerlink. //link.springer-ny.com/ com/openurl.asp?genre= link/service/series/0558/ issue&issn=0302-9743&volume= bibs/1909/19090341.htm; 3152; http://www.springerlink. http://link.springer- com/openurl.asp?genre= ny.com/link/service/series/ volume&id=doi:10.1007/ 0558/papers/1909/19090341. . b99099 pdf. Damgard:2005:CBQ [DFSS05] I. B. Damgard, S. Fehr, Debaert:2002:RRI L. Salvail, and C. Schaffner. Cryptography in the bounded [DG02] Christophe Debaert and quantum-storage model. In Henri Gilbert. The RIPEMD IEEE [IEE05a], pages 449– and RIPEMD improved 458. ISBN 0-7695-2468-0, variants of MD4 are not col- 0-7695-2362-5. ISSN 0272- lision free. Lecture Notes 5428. LCCN QA76 .S979 in Computer Science, 2355: 2005. IEEE Computer So- 52–??, 2002. CODEN ciety order number P2468. LNCSD9. ISSN 0302- 9743 (print), 1611-3349 Damgaard:2008:CBQ (electronic). URL http: [DFSS08] Ivan B. Damg˚ard, Serge //link.springer-ny.com/ Fehr, Louis Salvail, and link/service/series/0558/ Christian Schaffner. Cryp- bibs/2355/23550052.htm; tography in the bounded- http://link.springer- quantum-storage model. ny.com/link/service/series/ SIAM Journal on Comput- 0558/papers/2355/23550052. ing, 37(6):1865–1890, ???? pdf. REFERENCES 262

DiRaimondo:2003:PST Hugo Krawczyk, and Tal Rabin. Randomness ex- [DG03] Mario Di Raimondo and traction and key deriva- Rosario Gennaro. Provably tion using the CBC, Cas- secure threshold password- cade and HMAC modes. authenticated key exchange. In Franklin [Fra04], pages Lecture Notes in Com- 494–?? CODEN LNCSD9. puter Science, 2656:507– ISBN 3-540-22668-0. ISSN 523, 2003. CODEN 0302-9743 (print), 1611- LNCSD9. ISSN 0302-9743 3349 (electronic). LCCN (print), 1611-3349 (elec- 10.1007/b99099. URL tronic). URL http://link. http://www.springerlink. springer.com/content/pdf/ com/openurl.asp?genre= 10.1007/3-540-39200-9_ issue&issn=0302-9743&volume= 32.pdf. 3152; http://www.springerlink. DiRaimondo:2005:NAD com/openurl.asp?genre= volume&id=doi:10.1007/ [DG05] Mario Di Raimondo and b99099. Rosario Gennaro. New ap- proaches for deniable au- Devanbu:2004:FAX thentication. In Mead- [DGK+04] Premkumar Devanbu, Mich- ows and Syverson [MS05b], ael Gertz, April Kwong, pages 112–121. ISBN Charles Martel, Glen Nuck- 1-59593-226-7. LCCN olls, and Stuart G. Stub- QA76.9.A25. ACM order blebine. Flexible authenti- number 459050. cation of XML documents. DiRaimondo:2006:PST Journal of Computer Se- curity, 12(6):841–864, ???? [DG06] Mario Di Raimondo and 2004. CODEN JCSIET. Rosario Gennaro. Provably ISSN 0926-227X (print), secure threshold password- 1875-8924 (electronic). authenticated key exchange. Journal of Computer and Devanbu:2003:ADP System Sciences, 72(6):978– 1001, September 2006. CO- [DGMS03] Premkumar Devanbu, Mich- DEN JCSSBM. ISSN 0022- ael Gertz, Charles Martel, 0000 (print), 1090-2724 and Stuart G. Stubblebine. (electronic). URL http:/ Authentic data publication /www.sciencedirect.com/ over the Internet. Jour- science/article/pii/S002200000600033X. nal of Computer Security, Dodis:2004:REK 11(3):291–314, ???? 2003. CODEN JCSIET. ISSN [DGH+04] Yevgeniy Dodis, Rosario 0926-227X (print), 1875- Gennaro, Johan H˚astad, 8924 (electronic). REFERENCES 263

Dwork:2003:MBF In CCS ’07: Proceedings of the 14th ACM conference [DGN03] Cynthia Dwork, Andrew on computer and communi- Goldberg, and Moni Naor. cations security, page ???? On memory-bound func- ACM Press, New York, NY tions for fighting spam. In 10036, USA, 2007. ISBN 1- Boneh [Bon03], pages 426– 59593-703-X. LCCN ???? 444. CODEN LNCSD9. ISBN 3-540-40674-3. ISSN Dorrendorf:2009:CRN 0302-9743 (print), 1611- [DGP09] Leo Dorrendorf, Zvi Gut- 3349 (electronic). LCCN terman, and Benny Pinkas. QA76.9.A25 C79 2003. URL Cryptanalysis of the ran- http://link.springer-ny. dom number generator of com/link/service/series/ the Windows operating sys- 0558/tocs/t2729.htm; tem. ACM Transactions http://www.springerlink. on Information and System com/openurl.asp?genre= Security, 13(1):10:1–10:32, issue&issn=0302-9743&volume= October 2009. CODEN 2729; http://www.springerlink. ATISBQ. ISSN 1094-9224 com/openurl.asp?genre= (print), 1557-7406 (elec- volume&id=doi:10.1007/ tronic). b11817. Dorrendorf:2007:CRNa denHartog:2008:TMC

[DGP07a] Leo Dorrendorf, Zvi Gut- [dH08] Jerry den Hartog. To- terman, and Benny Pinkas. wards mechanized correct- Cryptanalysis of the ran- ness proofs for crypto- dom number generator of graphic algorithms: Axiom- the Windows operating atization of a probabilis- system. Technical re- tic Hoare style logic. Sci- port 2007/419, Cryptol- ence of Computer Program- ogy ePrint Archive, Interna- ming, 74(1–2):52–63, De- tional Association for Cryp- cember 1, 2008. CODEN tologic Research, San Jose, SCPGD4. ISSN 0167-6423 CA, USA, 2007. URL http: (print), 1872-7964 (elec- //eprint.iacr.org/2007/ tronic). 419. Dhem:2003:EMR Dorrendorf:2007:CRNb [Dhe03] Jean-Fran¸cois Dhem. Effi- [DGP07b] Leo Dorrendorf, Zvi Gut- cient modular reduction al- terman, and Benny Pinkas. gorithm in and its appli- Cryptanalysis of the random cation to “left to right” number generator of the modular multiplication in. Windows operating system. In Walter et al. [WKP03], REFERENCES 264

pages 203–213. CODEN Dodis:2000:CSG LNCSD9. ISBN 3-540- 40833-9. ISSN 0302-9743 [DHR00] Yevgeniy Dodis, Shai Halevi, (print), 1611-3349 (elec- and Tal Rabin. A cryp- tronic). LCCN TK7895.E42. tographic solution to a URL http://link.springer- game theoretic problem. ny.com/link/service/series/ In Bellare [Bel00], pages 0558/tocs/t2779.htm; 112–?? ISBN 3-540- http://www.springerlink. 67907-3. ISSN 0302-9743 com/openurl.asp?genre= (print), 1611-3349 (elec- issue&issn=0302-9743&volume= tronic). LCCN QA76.9.A25 2779; http://www.springerlink. C79 2000 Bar. URL http: com/openurl.asp?genre= //link.springer-ny.com/ volume&id=doi:10.1007/ link/service/series/0558/ b13240. bibs/1880/18800112.htm; http://link.springer- Deng:2006:OOC ny.com/link/service/series/ 0558/papers/1880/18800112. [DHL06] Yan-Xiang Deng, Chao- pdf. Jang Hwang, and Jiang- DiCrescenzo:2001:SOS Lung Liu. An object- oriented cryptosystem based [Di 01] Giovanni Di Crescenzo. on two-level reconfigurable Sharing one secret vs. shar- computing architecture. ing many secrets: Tight The Journal of Systems bounds for the max im- and Software, 79(4):466– provement ratio. Lecture 479, April 2006. CODEN Notes in Computer Science, JSSODM. ISSN 0164-1212 2136:292–??, 2001. CO- (print), 1873-1228 (elec- DEN LNCSD9. ISSN 0302- tronic). 9743 (print), 1611-3349 (electronic). URL http: Daza:2007:CTM //link.springer-ny.com/ link/service/series/0558/ [DHMR07] Vanesa Daza, Javier Her- bibs/2136/21360292.htm; ranz, Paz Morillo, and Carla http://link.springer- R`afols. Cryptographic tech- ny.com/link/service/series/ niques for mobile ad-hoc 0558/papers/2136/21360292. networks. Computer Net- pdf. works (Amsterdam, Nether- DiCrescenzo:2003:SOS lands: 1999), 51(18):4938– 4950, December 19, 2007. [Di 03] Giovanni Di Crescenzo. CODEN ???? ISSN Sharing one secret vs. shar- 1389-1286 (print), 1872- ing many secrets. Theo- 7069 (electronic). retical Computer Science, REFERENCES 265

295(1–3):123–140, February com/openurl.asp?genre= 24, 2003. CODEN TC- volume&id=doi:10.1007/ SCDI. ISSN 0304-3975 b13240. (print), 1879-2294 (elec- Dierickx:2000:EGD tronic). [Die00] J¨urgen Dierickx. Euro- Damgaard:2005:CRM pean guidelines for dig- [DI05] Ivan Damg˚ard and Yu- ital signatures. Net- val Ishai. Constant- work Security, 2000(3):3–4, round multiparty compu- March 1, 2000. CODEN tation using a black-box NTSCF5. ISSN 1353-4858 pseudorandom generator. (print), 1872-9371 (elec- In Shoup [Sho05a], pages tronic). URL http:// 378–?? ISBN 3-540- www.sciencedirect.com/ 28114-2. ISSN 0302-9743 science/article/pii/S1353485800030063. (print), 1611-3349 (elec- Diffie:2001:UC tronic). LCCN QA76.9.A25 C79 2005; QA76.9 .A25; [Dif01] Whitfield Diffie. Ulti- QA76.9 C79 2005; QA76.9 mate cryptography. Com- C794 2005; QA76.9; In- munications of the As- ternet. URL http:/ sociation for Computing /www.springerlink.com/ Machinery, 44(3):84–86, openurl.asp?genre=issue& March 2001. CODEN issn=0302-9743&volume= CACMA2. ISSN 0001-0782 3621. (print), 1557-7317 (elec- Dichtl:2003:HPO tronic). URL http://www. acm.org/pubs/citations/ [Dic03] Markus Dichtl. How to journals/cacm/2001-44- predict the output of a 3/p84-diffie/. hardware random num- ber generator. In Walter Dimitriadis:2007:IMC et al. [WKP03], pages 181– 188. CODEN LNCSD9. [Dim07] Christos K. Dimitriadis. Im- ISBN 3-540-40833-9. ISSN proving mobile core net- 0302-9743 (print), 1611- work security with hon- 3349 (electronic). LCCN eynets. IEEE Security & TK7895.E42. URL http: Privacy, 5(4):40–47, July/ //link.springer-ny.com/ August 2007. CODEN ???? link/service/series/0558/ ISSN 1540-7993 (print), tocs/t2779.htm; http: 1558-4046 (electronic). //www.springerlink.com/ Dimitrov:2008:DBN openurl.asp?genre=issue& issn=0302-9743&volume= [DIM08] Vassil Dimitrov, Laurent 2779; http://www.springerlink. Imbert, and Pradeep K. REFERENCES 266

Mishra. The double- Ding:2005:ECB base number system and its application to elliptic [Din05] Yan Zong Ding. Error curve cryptography. Math- correction in the bounded ematics of Computation, storage model. In Kil- 77(262):1075–1104, April ian [Kil05], pages 578– 2008. CODEN MCM- ?? CODEN LNCSD9. PAF. ISSN 0025-5718 ISBN 3-540-24573-1 (soft- (paper), 1088-6842 (elec- cover). ISSN 0302-9743 tronic). URL http:// (print), 1611-3349 (elec- www.ams.org/mcom/2008- tronic). LCCN QA76.9.A25 77-262/S0025-5718-07-02048- T44 2005. URL http: 0/home.html; http:// //www.springerlink.com/ www.ams.org/mcom/2008- openurl.asp?genre=issue& 77-262/S0025-5718-07-02048- issn=0302-9743&volume= 0/S0025-5718-07-02048- 3378; http://www.springerlink. 0.dvi; http://www.ams. com/openurl.asp?genre= org/mcom/2008-77-262/S0025- volume&id=doi:10.1007/ 5718-07-02048-0/S0025- b106171. 5718-07-02048-0.pdf; Dedic:2005:ULB http://www.ams.org/mcom/ 2008-77-262/S0025-5718- [DIRR05] Nenad Dedi´c, Gene Itkis, 07-02048-0/S0025-5718- Leonid Reyzin, and Scott 07-02048-0.ps. Russell. Upper and lower bounds on black- box steganography: Ex- Ding:2001:OTB tended abstract. In Kil- ian [Kil05], pages 227– [Din01] Yan Zong Ding. Oblivi- ?? CODEN LNCSD9. ous transfer in the bounded ISBN 3-540-24573-1 (soft- storage model. In Kil- cover). ISSN 0302-9743 ian [Kil01a], pages 155– (print), 1611-3349 (elec- ?? ISBN 3-540-42456- tronic). LCCN QA76.9.A25 3 (paperback). LCCN T44 2005. URL http: QA76.9.A25 C79 2001; //www.springerlink.com/ QA267.A1 L43 no.2139. openurl.asp?genre=issue& UK£47.00. URL http: issn=0302-9743&volume= //link.springer-ny.com/ 3378; http://www.springerlink. link/service/series/0558/ com/openurl.asp?genre= bibs/2139/21390155.htm; volume&id=doi:10.1007/ http://link.springer- b106171. ny.com/link/service/series/ Dang:2002:EPT 0558/papers/2139/21390155. pdf. [DIS02] Zhe Dang, Oscar H. Ibarra, REFERENCES 267

and Zhi-Wei Sun. On the nal of Automated Reason- emptiness problem for two- ing, 36(1–2):85–124, Jan- way NFA with one reversal- uary 2006. CODEN JA- bounded counter. Lecture REEW. ISSN 0168-7433 Notes in Computer Science, (print), 1573-0670 (elec- 2518:103–??, 2002. CODEN tronic). URL http://link. LNCSD9. ISSN 0302-9743 springer.com/article/10. (print), 1611-3349 (elec- 1007/s10817-005-9017-7. tronic). URL http:// Donsez:2001:TMA link.springer.de/link/ service/series/0558/bibs/[DJLT01] Didier Donsez, S´ebastien 2518/25180103.htm; http: Jean, Sylvain Lecomte, and //link.springer.de/link/ Olivier Thomas. Turn- service/series/0558/papers/ ing multi-applications smart 2518/25180103.pdf. cards services available from anywhere at anytime: a Damgaard:2001:GSS SOAP /MOM approach in the context of Java [DJ01] Ivan Damg˚ard and Mads cards. Lecture Notes in Jurik. A generalisation, Computer Science, 2140: a simplification and some 83–??, 2001. CODEN applications of Paillier’s LNCSD9. ISSN 0302- probabilistic public-key sys- 9743 (print), 1611-3349 tem. Lecture Notes in (electronic). URL http: Computer Science, 1992: //link.springer-ny.com/ 119–??, 2001. CODEN link/service/series/0558/ LNCSD9. ISSN 0302- bibs/2140/21400083.htm; 9743 (print), 1611-3349 http://link.springer- (electronic). URL http: ny.com/link/service/series/ //link.springer-ny.com/ 0558/papers/2140/21400083. link/service/series/0558/ pdf. bibs/1992/19920119.htm; http://link.springer- Damgaard:2001:PTR ny.com/link/service/series/ [DK01] Ivan Damg˚ard and Ma- 0558/papers/1992/19920119. ciej Koprowski. Practi- pdf. cal threshold RSA signa- Delaune:2006:DPS tures without a trusted dealer. Lecture Notes in [DJ06] St´ephanie Delaune and Flo- Computer Science, 2045: rent Jacquemard. Decision 152–??, 2001. CODEN procedures for the security LNCSD9. ISSN 0302- of protocols with probabilis- 9743 (print), 1611-3349 tic encryption against offline (electronic). URL http: dictionary attacks. Jour- //link.springer-ny.com/ REFERENCES 268

link/service/series/0558/ Delfs:2007:ICP bibs/2045/20450152.htm; http://link.springer- [DK07] Hans Delfs and Helmut ny.com/link/service/series/ Knebl. Introduction to 0558/papers/2045/20450152. Cryptography: Principles pdf. and Applications,volume1 of Information Security and Delfs:2002:ICP Cryptography. Springer-Ver- [DK02] Hans Delfs and Helmut lag, Berlin, Germany / Hei- Knebl. Introduction to delberg, Germany / Lon- Cryptography: Principles don, UK / etc., second edi- and Applications.Infor- tion, 2007. ISBN 3-540- mation Security and Cryp- 49243-7 (hardcover), 3-540- tography. Springer-Verlag, 49244-5. ISSN 1619-7100 Berlin, Germany / Heidel- (print), 2197-845X (elec- berg, Germany / London, tronic). xvi + 367 pp. LCCN UK / etc., 2002. ISBN QA76.9A25 D44 2007; 3-642-87126-7 (e-book), 3- QA76.9.D35. URL http: 642-87128-3. ISSN 1619- //www.springerlink.com/ 7100 (print), 2197-845X content/gm2886. (electronic). xiv + 310 pp. Dunkelman:2008:TIV LCCN QA76.9.A25. URL http://www.springerlink. [DK08] Orr Dunkelman and Nathan com/content/978-3-642- Keller. Treatment of the ini- 87126-9. tial value in Time-Memory- Data Tradeoff attacks on Dodis:2005:CCS stream ciphers. Information [DK05] Yevgeniy Dodis and Jonathan Processing Letters, 107(5): Katz. Chosen-ciphertext se- 133–137, August 16, 2008. curity of multiple encryp- CODEN IFPLAT. ISSN tion. In Kilian [Kil05], pages 0020-0190 (print), 1872- 188–?? CODEN LNCSD9. 6119 (electronic). ISBN 3-540-24573-1 (soft- Du:2005:BRS cover). ISSN 0302-9743 (print), 1611-3349 (elec- [DKFX05] Xiaozhen Du, Weidong Kou, tronic). LCCN QA76.9.A25 Kai Fan, and Yuxia Xiao. T44 2005. URL http: Breaking and repairing of //www.springerlink.com/ a strong proxy signature openurl.asp?genre=issue& scheme with proxy signer issn=0302-9743&volume= privacy protection. In Han 3378; http://www.springerlink. et al. [HYZ05b], pages 100– com/openurl.asp?genre= ?? ISBN 981-270-153-2. volume&id=doi:10.1007/ LCCN ???? URL http:// b106171. eproceedings.worldscinet. REFERENCES 269

com/9812701532/9812701532. //www.elsevier.nl/gej- 0031.html. ng/10/41/16/180/21/34/ Daswani:2007:FSW abstract.html; http: //www.elsevier.nl/gej- [DKK07] Neil Daswani, Christoph ng/10/41/16/180/21/34/ Kern, and Anita Kesa- article.pdf. van. Foundations of secu- rity: what every program- Dodis:2009:CAI mer needs to know.The [DKL09] Yevgeniy Dodis, Yael Tau- Expert’s voice in security. man Kalai, and Shachar Apress, Berkeley, CA, USA, Lovett. On cryptography 2007. ISBN 1-59059-784-2 with auxiliary input. In (paperback). xxvii + 290 ACM [ACM09], pages 621– pp. LCCN QA76.76.P76 630. ISBN 1-60558-613-7. D37 2007. LCCN QA75.5 .A22 2009. Dhem:2000:PIT Datta:2005:RBN [DKL+00a] Jean-Fran¸cois Dhem, Fran¸cois Koeune, Philippe-Alexandre [DKMR05] Anupam Datta, Ralf K¨usters, Leroux, Patrick Mestr, John C. Mitchell, and Ajith Jean-Jacques Quisquater, Ramanathan. On the re- and Jean-Louis Willems. lationships between notions A practical implementation of simulation-based security. of the timing attack. In In Kilian [Kil05], pages 476– ????, editor, Smart Card ?? CODEN LNCSD9. Research and Applications, ISBN 3-540-24573-1 (soft- volume 1820, pages 167– cover). ISSN 0302-9743 182. Springer-Verlag, Berlin, (print), 1611-3349 (elec- Germany / Heidelberg, Ger- tronic). LCCN QA76.9.A25 many / London, UK / etc., T44 2005. URL http: 2000. ISBN ???? LCCN //www.springerlink.com/ ???? URL ????. openurl.asp?genre=issue& issn=0302-9743&volume= Ding:2000:SSC 3378; http://www.springerlink. [DKL00b] Cunsheng Ding, David R. com/openurl.asp?genre= Kohel, and San Ling. volume&id=doi:10.1007/ Secret-sharing with a class b106171. of ternary codes. Theo- Delaune:2008:FAP retical Computer Science, 246(1–2):285–298, Septem- [DKS08] St´ephanie Delaune, Steve ber 6, 2000. CODEN Kremer, and Graham Steel. TCSCDI. ISSN 0304- Formal analysis of PKCS#11. 3975 (print), 1879-2294 In ????, editor, IEEE Com- (electronic). URL http: puter Security Foundations REFERENCES 270

Symposium, pages 331–344. 0558/papers/2332/23320065. IEEE Computer Society pdf. Press, 1109 Spring Street, Suite 300, Silver Spring, MD Diffie:1998:PLP 20910, USA, 2008. ISBN [DL98] Whitfield Diffie and Su- ???? LCCN ???? URL ? san Eva Landau. Privacy . ??? on the Line: the Politics Dittmann:2005:CMS of Wiretapping and Encryp- tion. MIT Press, Cam- [DKU05] Jana Dittmann, Stefan bridge, MA, USA, 1998. Katzenbeisser, and Andreas ISBN 0-262-04167-7 (hard- Uhl, editors. Communica- cover). ix + 342 pp. LCCN tions and multimedia secu- KF9670 .D54 1998. rity: 9th IFIP TC-6 TC- 11 International Confer- deLeeuw:2000:CSD ence, CMS 2005, Salzburg, Austria, September 19–21, [dL00] Karl de Leeuw. Cryptol- 2005: proceedings,volume ogy and statecraft in the 3677 of Lecture Notes in Dutch Republic [Cryptolo- Computer Science. Spring- gie en buitenlands beleid in er-Verlag, Berlin, Ger- de Republiek der Verenigde many / Heidelberg, Ger- Nederlanden].Ph.D.the- many / London, UK / etc., sis, Universiteit van Am- 2005. CODEN LNCSD9. sterdam, Amsterdam, The ISBN 3-540-28791-4. ISSN Netherlands, 2000. viii + 0302-9743 (print), 1611- 190 pp. The work in this 3349 (electronic). LCCN thesis has been carried out ???? under the auspices of the research school IPA (Insti- Dodis:2002:KIP tute for Programming re- [DKXY02] Yevgeniy Dodis, Jonathan search and Algorithmics). In Katz, Shouhuai Xu, and Dutch and English. Moti Yung. Key-insulated Diffie:2007:PLP public key cryptosystems. Lecture Notes in Computer [DL07] Whitfield Diffie and Su- Science, 2332:65–??, 2002. san Eva Landau. Privacy CODEN LNCSD9. ISSN on the line: the politics 0302-9743 (print), 1611- of wiretapping and encryp- 3349 (electronic). URL tion. MIT Press, Cam- http://link.springer-ny. bridge, MA, USA, updated com/link/service/series/ and expanded edition, 2007. 0558/bibs/2332/23320065. ISBN 0-262-04240-1. 400 htm; http://link.springer- (est.) pp. LCCN UB256.U6 ny.com/link/service/series/ D54 2007. URL http:// REFERENCES 271

www.loc.gov/catdir/toc/ article&issn=0010-485X& ecip073/2006035514.html. volume=85&issue=1&spage= 85. deLeeuw:2007:HIS Dodis:2008:OFE [dLB07] Karl de Leeuw and J. A. Bergstra, editors. The [DLY08] Y. Dodis, P. J. Lee, and History of Information Se- D. H. Yum. Optimistic curity: a Comprehensive fair exchange in a multi- Handbook. Elsevier, Am- user setting. J.UCS: Jour- sterdam, The Netherlands, nal of Universal Computer 2007. ISBN 0-444-51608-5 Science, 14(3):318–346, ???? (hardcover). xi + 887 pp. 2008. CODEN ???? ISSN LCCN Z103 .H63 2007. 0948-6968. URL http:// www.jucs.org/jucs_14_3/ DelLungo:2005:GSP optimistic_fair_exchange_ [DLMM05] Alberto Del Lungo, Guy in. Louchard, Claudio Marini, DeSantis:2000:SSS and Franco Montagna. The Guessing Secrets problem: [DM00a] Alfredo De Santis and Bar- a probabilistic approach. bara Masucci. On secret Journal of Algorithms,55 set schemes. Information (2):142–176, May 2005. CO- Processing Letters, 74(5– DEN JOALDV. ISSN 0196- 6):243–251, June 30, 2000. 6774 (print), 1090-2678 CODEN IFPLAT. ISSN (electronic). URL http:/ 0020-0190 (print), 1872- /www.sciencedirect.com/ 6119 (electronic). URL science/article/pii/S0196677404000422. http://www.elsevier.nl/ gej-ng/10/23/20/63/28/ Daemen:2009:CAE 34/abstract.html; http: //www.elsevier.nl/gej- [DLP+09] Joan Daemen, Mario Lam- ng/10/23/20/63/28/34/article. berger, Norbert Pram- pdf. staller, Vincent Rijmen, and Frederik Vercauteren. Com- Dodis:2000:PRI putational aspects of the expected differential proba- [DM00b] Yevgeniy Dodis and Sil- bility of 4-round AES and vio Micali. Parallel re- AES-like ciphers. Comput- ducibility for information- ing, 85(1–2):85–104, June theoretically secure compu- 2009. CODEN CMPTA2. tation. In Bellare [Bel00], ISSN 0010-485X (print), pages 74–?? ISBN 3-540- 1436-5057 (electronic). URL 67907-3. ISSN 0302-9743 http://www.springerlink. (print), 1611-3349 (elec- com/openurl.asp?genre= tronic). LCCN QA76.9.A25 REFERENCES 272

C79 2000 Bar. URL http: quantum one-way permu- //link.springer-ny.com/ tation. Lecture Notes in link/service/series/0558/ Computer Science, 1807: bibs/1880/18800074.htm; 300–??, 2000. CODEN http://link.springer- LNCSD9. ISSN 0302- ny.com/link/service/series/ 9743 (print), 1611-3349 0558/papers/1880/18800074. (electronic). URL http: pdf. //link.springer-ny.com/ link/service/series/0558/ DeSantis:2007:NRN bibs/1807/18070300.htm; [DM07a] Alfredo De Santis and Bar- http://link.springer- bara Masucci. New results ny.com/link/service/series/ on non-perfect sharing of 0558/papers/1807/18070300. multiple secrets. The Jour- pdf. nal of Systems and Soft- Dowd:2007:ASS ware, 80(2):216–223, Febru- ary 2007. CODEN JS- [DMS07] Mark Dowd, John McDon- SODM. ISSN 0164-1212 ald, and Justin Schuh. The (print), 1873-1228 (elec- art of software security as- tronic). sessment: identifying and preventing software vulner- Drimer:2007:KYE abilities. Addison-Wes- ley, Reading, MA, USA, [DM07b] Saar Drimer and Steven J. 2007. ISBN 0-321-44442-6 Murdoch. Keep your (paperback). xxi + 1174 enemies close: Distance pp. LCCN QA76.9.A25 bounding against Smart- D75 2007. URL http:// card relay attacks. Re- www.loc.gov/catdir/toc/ port ??, Computer Labo- ecip0618/2006023446.html. ratory, University of Cam- bridge, Cambridge, UK, Denev:2009:SFQ May 15, 2007. 16 pp. [DMSW09] Dimitar Denev, Arturas URL http://www.cl.cam. Mazeika, Marc Spaniol, and ac.uk/~sd410/papers/sc_ Gerhard Weikum. SHARC: relay.bib. Also published framework for quality- in USENIX Security Sym- conscious Web archiving. posium, August 2007, pages Proceedings of the VLDB 87–102. Endowment, 2(1):586–597, Dumais:2000:PCQ August 2009. CODEN ???? ISSN 2150-8097. [DMS00] Paul Dumais, Dominic May- Ding:2007:ESD ers, and Louis Salvail. Per- fectly concealing quantum [DMT07] Xuhua Ding, Daniele Maz- bit commitment from any zocchi, and Gene Tsudik. REFERENCES 273

Equipping smart devices http://link.springer- with public key signatures. ny.com/link/service/series/ ACM Transactions on In- 0558/papers/1976/19760014. ternet Technology (TOIT),7 pdf. (1):3:1–3:??, February 2007. Damgaard:2002:EPF CODEN ???? ISSN 1533-5399 (print), 1557- [DN02a] Ivan Damg˚ard and Jes- 6051 (electronic). per Buus Nielsen. Expand- ing pseudorandom func- Damgaard:2000:INC tions; or: From known- [DN00a] Ivan Damg˚ard and Jes- plaintext security to chosen- per Buus Nielsen. Im- plaintext security. In proved non-committing en- Yung [Yun02a], pages 449– cryption schemes based on a 464. CODEN LNCSD9. general complexity assump- ISBN 3-540-44050-X (pa- tion. In Bellare [Bel00], perback). ISSN 0302-9743 pages 432–?? ISBN 3-540- (print), 1611-3349 (elec- 67907-3. ISSN 0302-9743 tronic). LCCN QA76.9.A25 (print), 1611-3349 (elec- C79 2002. URL http: tronic). LCCN QA76.9.A25 //link.springer-ny.com/ C79 2000 Bar. URL http: link/service/series/0558/ //link.springer-ny.com/ tocs/t2442.htm; http: link/service/series/0558/ //www.springerlink.com/ bibs/1880/18800432.htm; openurl.asp?genre=issue& http://link.springer- issn=0302-9743&volume= ny.com/link/service/series/ 2442. 0558/papers/1880/18800432. Damgaard:2002:PHP pdf. [DN02b] Ivan Damg˚ard and Jes- Durfee:2000:CRS per Buus Nielsen. Per- fect hiding and perfect bind- [DN00b] Glenn Durfee and Phong Q. ing universally composable Nguyen. Cryptanalysis of commitment schemes with the RSA schemes with short constant expansion factor. secret exponent from Asi- In Yung [Yun02a], pages acrypt ’99. Lecture Notes 581–596. CODEN LNCSD9. in Computer Science, 1976: ISBN 3-540-44050-X (pa- 14–29, 2000. CODEN perback). ISSN 0302-9743 LNCSD9. ISSN 0302- (print), 1611-3349 (elec- 9743 (print), 1611-3349 tronic). LCCN QA76.9.A25 (electronic). URL http: C79 2002. URL http:/ //link.springer-ny.com/ /link.springer.de/link/ link/service/series/0558/ service/series/0558/bibs/ bibs/1976/19760014.htm; 2442/24420565.htm; http: REFERENCES 274

//link.springer.de/link/ 10.1007/b99099. URL service/series/0558/bibs/ http://www.springerlink. 2442/24420581.htm; http: com/openurl.asp?genre= //link.springer.de/link/ issue&issn=0302-9743&volume= service/series/0558/papers/ 3152; http://www.springerlink. 2442/24420565.pdf; http: com/openurl.asp?genre= //link.springer.de/link/ volume&id=doi:10.1007/ service/series/0558/papers/ b99099. 2442/24420581.pdf. Doncel:2007:ODS Damgaard:2003:UCE [DNP07] Victor Rodriguez Doncel, [DN03] Ivan Damg˚ard and Jes- Nikos Nikolaidis, and Ioan- per Buus Nielsen. Uni- nis Pitas. An optimal versally composable effi- detector structure for the cient multiparty computa- Fourier descriptors domain tion from threshold homo- watermarking of 2D vec- morphic encryption. In tor graphics. IEEE Trans- Boneh [Bon03], pages 247– actions on Visualization 264. CODEN LNCSD9. and Computer Graphics, ISBN 3-540-40674-3. ISSN 13(5):851–863, September/ 0302-9743 (print), 1611- October 2007. CODEN 3349 (electronic). LCCN ITVGEA. ISSN 1077-2626 QA76.9.A25 C79 2003. URL (print), 1941-0506 (elec- http://link.springer-ny. tronic), 2160-9306. com/link/service/series/ Dwork:2003:MFM 0558/tocs/t2729.htm; http://www.springerlink. [DNRS03] Cynthia Dwork, Moni Naor, com/openurl.asp?genre= Omer Reingold, and Larry issue&issn=0302-9743&volume= Stockmeyer. Magic func- 2729; http://www.springerlink. tions: In memoriam: Bernard com/openurl.asp?genre= M. Dwork 1923–1998. Jour- volume&id=doi:10.1007/ nal of the ACM, 50(6):852– b11817. 921, November 2003. CO- DEN JACOAH. ISSN 0004- Dwork:2004:PPD 5411 (print), 1557-735X [DN04] Cynthia Dwork and Kobbi (electronic). Nissim. Privacy-preserving Dwork:2005:PPW datamining on vertically partitioned databases. In [DNW05] Cynthia Dwork, Moni Naor, Franklin [Fra04], pages 528– and Hoeteck Wee. Peb- ?? CODEN LNCSD9. bling and proofs of work. ISBN 3-540-22668-0. ISSN In Shoup [Sho05a], pages 0302-9743 (print), 1611- 37–?? ISBN 3-540- 3349 (electronic). LCCN 28114-2. ISSN 0302-9743 REFERENCES 275

(print), 1611-3349 (elec- CNF&arnumber=1366239&arSt= tronic). LCCN QA76.9.A25 +196&ared=+205&arAuthor= C79 2005; QA76.9 .A25; Dodis%2C+Y.%3B+Shien+Jin+ QA76.9 C79 2005; QA76.9 Ong%3B+Prabhakaran%2C+ C794 2005; QA76.9; In- M.%3B+Sahai%2C+A.; http: ternet. URL http:/ //ieeexplore.ieee.org/ /www.springerlink.com/ xpls/abs_all.jsp?isnumber= openurl.asp?genre=issue& 29918&arnumber=1366239& issn=0302-9743&volume= count=64&index=20. IEEE 3621. Computer Society Order Dodis:2005:GIF Number P2228. Dhamija:2000:DVU [DOP05] Yevgeniy Dodis, Roberto Oliveira, and Krzysztof [DP00] Rachna Dhamija and Adrian Pietrzak. On the generic in- Perrig. D´ej`aVu—A security of the full domain user study: Using im- hash. In Shoup [Sho05a], ages for authentication. pages 449–?? ISBN 3-540- In USENIX [USE00d], 28114-2. ISSN 0302-9743 page ?? ISBN 1-880446- (print), 1611-3349 (elec- 18-9. LCCN ???? URL tronic). LCCN QA76.9.A25 http://www.usenix.org/ C79 2005; QA76.9 .A25; publications/library/proceedings/ QA76.9 C79 2005; QA76.9 sec2000/dhamija.html. C794 2005; QA76.9; In- ternet. URL http:/ DeMatteis:2002:PP /www.springerlink.com/ [DP02] A. De Matteis and S. Pag- openurl.asp?genre=issue& nutti. Pseudorandom per- issn=0302-9743&volume= mutation. Journal of 3621. Computational and Applied Dodis:2004:IPC Mathematics, 142(2):367– 375, May 15, 2002. CODEN [DOPS04] Y. Dodis, Shien Jin Ong, M. Prabhakaran, and A. Sa- JCAMDI. ISSN 0377-0427 (print), 1879-1778 (elec- hai. On the (im)possibility tronic). URL of cryptography with im- http:// perfect randomness. In www.sciencedirect.com/ . IEEE [IEE04], pages 196– science/article/pii/S0377042701004253 205. CODEN ASF- Dandalis:2004:ACE PDV. ISBN 0-7695-2228- 9. ISSN 0272-5428. LCCN [DP04] Andreas Dandalis and Vik- QA276. URL http: tor K. Prasanna. An adap- //ieeexplore.ieee.org/ tive cryptographic engine iel5/9430/29918/01366239. for Internet protocol secu- pdf?isnumber=29918&prod= rity architectures. ACM REFERENCES 276

Transactions on Design Au- (electronic). URL http: tomation of Electronic Sys- //link.springer-ny.com/ tems, 9(3):333–353, July link/service/series/0558/ 2004. CODEN ATASFO. bibs/1965/19650125.htm; ISSN 1084-4309 (print), http://link.springer- 1557-7309 (electronic). ny.com/link/service/series/ 0558/papers/1965/19650125. Dziembowski:2007:IRS pdf. [DP07] S. Dziembowski and K. Pietrzak. Damgaard:2005:QCN Intrusion-resilient secret sharing. In IEEE [IEE07], [DPS05] Ivan Damg˚ard, Thomas Brochmann pages 227–237. ISBN 0- Pedersen, and Louis Sal- 7695-3010-9. ISSN 0272- vail. A quantum cipher with 5428. LCCN QA76 .S974 near optimal key-recycling. 2007. URL http:// In Shoup [Sho05a], pages ieeexplore.ieee.org/servlet/ 494–?? ISBN 3-540- opac?punumber=4389466. 28114-2. ISSN 0302-9743 IEEE Computer Society or- (print), 1611-3349 (elec- der number P3010. tronic). LCCN QA76.9.A25 Dziembowski:2008:LRC C79 2005; QA76.9 .A25; QA76.9 C79 2005; QA76.9 [DP08] S. Dziembowski and K. Pietrzak. C794 2005; QA76.9; In- Leakage-resilient cryptogra- ternet. URL http:/ phy. In IEEE [IEE08], pages /www.springerlink.com/ 293–302. ISBN 0-7695- openurl.asp?genre=issue& 3436-8. ISSN 0272-5428. issn=0302-9743&volume= LCCN QA76 .S95 2008. 3621. URL http://ieeexplore. Delbourg:2002:JBC ieee.org/servlet/opac? punumber=4690923. IEEE [DPT+02] D. Delbourg, G. Penillault, Computer Society order T. K. Tuong, M. Decourt, number P3436. N. Borome, H. Harroch, Dandalis:2001:CSP B. Lessellier, B. Waast, and J. P. Mouffron. A Java- [DPR01] Andreas Dandalis, Vik- based control system for tor K. Prasanna, and Jose the Orsay tandem acceler- D. P. Rolim. A com- ator. Pramana: Journal parative study of perfor- of Physics, 59(6):1025–1034, mance of AES final candi- 2002. CODEN PRAMCI. dates using FPGAs. Lecture ISSN 0304-4289. Notes in Computer Science, Daemen:2001:BCP 1965:125–??, 2001. CO- DEN LNCSD9. ISSN 0302- [DPV01] Joan Daemen, Michael 9743 (print), 1611-3349 Peeters, and Gilles Van REFERENCES 277

Assche. Bitslice ciphers KULeuven, Belgium, Octo- and power analysis at- ber 27, 2000. 30 pp. URL tacks. Lecture Notes in http://gro.noekeon.org/ Computer Science, 1978: Noekeon-spec.pdf. 134–??, 2001. CODEN LNCSD9. ISSN 0302- Daemen:2000:BCR 9743 (print), 1611-3349 [DR00a] Joan Daemen and Vincent (electronic). URL http: Rijmen. The block cipher //link.springer-ny.com/ Rijndael. In Quisquater link/service/series/0558/ and Schneier [QS00], pages bibs/1978/19780134.htm; 288–296. ISBN 3-540-67923- http://link.springer- 5. LCCN TK7895.S62 C36 ny.com/link/service/series/ 1998. 0558/papers/1978/19780134. pdf. Daemen:2000:RA Crescenzo:2004:CRR [DR00b] Joan Daemen and Vincent Rijmen. Rijndael for AES. [DPV04] Giovanni Di Crescenzo, In NIST [NIS00], pages 343– Giuseppe Persiano, and 347. ISBN ???? LCCN ???? Ivan Visconti. Constant- URL http://csrc.nist. round resettable zero knowl- gov/encryption/aes/round2/ edge with concurrent sound- conf3/aes3conf.htm; http: ness in the bare public- //csrc.nist.gov/encryption/ key model. In Franklin aes/round2/conf3/papers/ [Fra04], pages 237–?? CO- AES3Proceedings-1.pdf; DEN LNCSD9. ISBN 3-540- http://csrc.nist.gov/ 22668-0. ISSN 0302-9743 encryption/aes/round2/ (print), 1611-3349 (elec- conf3/papers/AES3Proceedings- tronic). LCCN 10.1007/b99099. 2.pdf; http://csrc.nist. URL http://www.springerlink. gov/encryption/aes/round2/ com/openurl.asp?genre= conf3/papers/AES3Proceedings- issue&issn=0302-9743&volume= 3.pdf; http://csrc.nist. 3152; http://www.springerlink. gov/encryption/aes/round2/ com/openurl.asp?genre= conf3/papers/AES3Proceedings. volume&id=doi:10.1007/ pdf. b99099. Daemen:2000:NPN DDJ:2000:DDE [DPVR00] Joan Daemen, Micha¨el [Dr.00c] Dr.Dobb’s Journal. Dr. Peeters, Gilles Van Assche, Dobb’s essential books on and Vincent Rijmen. Nessie cryptography and security. proposal: NOEKEON. Re- CD-ROM containing PDF port, Proton World Inter- files., 2000. URL http: national and ESAT Cosic //www.ddj.com/cdrom/; REFERENCES 278

http://www.digitalriver. mation Security and Cryp- com/dr/v2/ec_MAIN.Entry10? tography. Springer-Verlag, SP=10023&PN=1&V1=163454& Berlin, Germany / Heidel- xid=2823. Includes twelve berg, Germany / London, books on cryptography. UK / etc., 2002. ISBN 3- 642-07646-7, 3-662-04722-5 Daemen:2001:AAR (e-book). ISSN 1619-7100 [DR01] Joan Daemen and Vincent (print), 2197-845X (elec- Rijmen. Algorithm al- tronic). xvii + 238 pp. ley: Rijndael: The Ad- LCCN QA76.9.A25. URL vanced Encryption Stan- http://www.springerlink. dard. Dr. Dobb’s Jour- com/content/978-3-662- nal of Software Tools, 26(3): 04722-4. 137–139, March 2001. CO- Daemen:2002:FSE DEN DDJOEB. ISSN 1044- 789X. URL http://www. [DR02c] Joan Daemen and Vin- ddj.com/ftp/2001/2001_ cent Rijmen, editors. Fast 03/aa0301.txt; http: Software Encryption: 9th //www.esat.kuleuven.ac. International Workshop, be/~rijmen/rijndael/. FSE 2002, Leuven, Bel- gium, February 4–6, 2002. Daemen:2002:AWT Revised Papers,volume 2365 of Lecture Notes in [DR02a] Joan Daemen and Vincent Computer Science. Spring- Rijmen. AES and the wide er-Verlag, Berlin, Ger- trail design strategy. Lecture many / Heidelberg, Ger- Notes in Computer Science, many / London, UK / etc., 2332:108–??, 2002. CO- 2002. CODEN LNCSD9. DEN LNCSD9. ISSN 0302- ISBN 3-540-44009-7 (soft- 9743 (print), 1611-3349 cover). ISSN 0302-9743 (electronic). URL http: (print), 1611-3349 (elec- //link.springer-ny.com/ tronic). LCCN QA76.9.A25 link/service/series/0558/ F77 2002b. URL http: bibs/2332/23320108.htm; //link.springer-ny.com/ http://link.springer- link/service/series/0558/ ny.com/link/service/series/ tocs/t2365.htm; http: 0558/papers/2332/23320108. //www.springerlink.com/ pdf. openurl.asp?genre=issue& Daemen:2002:DRA issn=0302-9743&volume= 2365. [DR02b] Joan Daemen and Vincent Ding:2002:HEE Rijmen. The Design of Rijn- dael: AES – The Advanced [DR02d] Yan Zong Ding and Mich- Encryption Standard.Infor- ael O. Rabin. Hyper- REFERENCES 279

encryption and everlasting http://www.usenix.org/ security. Lecture Notes in publications/library/proceedings/ Computer Science, 2285: sec2000/invitedtalks.html. 1–??, 2002. CODEN Unpublished invited talk LNCSD9. ISSN 0302- at Ninth USENIX Security 9743 (print), 1611-3349 Symposium. (electronic). URL http: //link.springer-ny.com/ Driscoll:2002:BER link/service/series/0558/[Dri02] Kevin Driscoll. BeepBeep: bibs/2285/22850001.htm; Embedded real-time encryp- http://link.springer- tion. Lecture Notes in ny.com/link/service/series/ Computer Science, 2365: 0558/papers/2285/22850001. 164–??, 2002. CODEN pdf. LNCSD9. ISSN 0302- 9743 (print), 1611-3349 Dray:2000:NPA (electronic). URL http: [Dra00] Jim Dray. NIST perfor- //link.springer-ny.com/ mance analysis of the final link/service/series/0558/ round Java AES candidates. bibs/2365/23650164.htm; In NIST [NIS00], pages 149– http://link.springer- 160. ISBN ???? LCCN ???? ny.com/link/service/series/ URL http://csrc.nist. 0558/papers/2365/23650164. gov/encryption/aes/round2/ pdf. conf3/aes3conf.htm; http: Diqun:2009:QSP //csrc.nist.gov/encryption/ aes/round2/conf3/papers/ [DRL09] Yan Diqun, Wang Rangding, AES3Proceedings-1.pdf; and Zhang Liguang. Quan- http://csrc.nist.gov/ tization step parity-based encryption/aes/round2/ steganography for MP3 au- conf3/papers/AES3Proceedings- dio. Fundamenta Infor- 2.pdf; http://csrc.nist. maticae, 97(1–2):1–14, Jan- gov/encryption/aes/round2/ uary 2009. CODEN FU- conf3/papers/AES3Proceedings- MAAJ. ISSN 0169-2968 3.pdf; http://csrc.nist. (print), 1875-8681 (elec- gov/encryption/aes/round2/ tronic). conf3/papers/AES3Proceedings. pdf. delRey:2005:SSS

Dreyfus:2000:PUC [dRMS05] A. Mart´ın del Rey, J. Pereira Mateus, and G. Rodr´ıguez [Dre00] Suelette Dreyfus. The S´anchez. A secret shar- practical use of cryptog- ing scheme based on cellu- raphy in human rights lar automata. Applied Math- groups, 2000. URL ematics and Computation, REFERENCES 280

170(2):1356–1364, Novem- //ieeexplore.ieee.org/ ber 15, 2005. CODEN stamp/stamp.jsp?arnumber= AMHCBQ. ISSN 0096-3003 841116. (print), 1873-5649 (elec- Dodis:2002:NUO tronic). URL http:// www.sciencedirect.com/ [DS02] Y. Dodis and J. Spencer. science/article/pii/S0096300305000718. On the (non)universality oftheone-timepad. In Dobbertin:2005:AES IEEE [IEE02], pages 376– [DRS05] Hans Dobbertin, Vincent 385. CODEN ASF- Rijmen, and Aleksandra PDV. ISBN 0-7695-1822- Sowa, editors. Advanced en- 2. ISSN 0272-5428. LCCN cryption standard — AES: QA267. URL http: 4th international confer- //ieeexplore.ieee.org/ ence, AES 2004, Bonn, iel5/8411/26517/01181962. Germany, May 10–12, pdf?isnumber=26517&prod= 2004, revised selected and CNF&arnumber=1181962&arSt= invited papers,volume +376&ared=+385&arAuthor= 3373 of Lecture Notes in Dodis%2C+Y.%3B+Spencer% Computer Science. Spring- 2C+J.; http://ieeexplore. er-Verlag, Berlin, Ger- ieee.org/xpls/abs_all. many / Heidelberg, Ger- jsp?isnumber=26517&arnumber= many / London, UK / etc., 1181962&count=82&index= 2005. CODEN LNCSD9. 38. IEEE Computer Society ISBN 3-540-26557-0. ISSN Order Number PR01822. 0302-9743 (print), 1611- DArco:2003:FTD 3349 (electronic). LCCN ???? URL http:/ [DS03] Paolo D’Arco and Dou- /www.springerlink.com/ glas R. Stinson. Fault openurl.asp?genre=issue& tolerant and distributed issn=0302-9743&volume= broadcast encryption. In 3373. Joye [Joy03b], pages 263– 280. CODEN LNCSD9. Devanbu:2000:CVT ISBN 3-540-00847-0. ISSN [DS00] P. T. Devanbu and S. G. 0302-9743 (print), 1611- Stubblebine. Cryptographic 3349 (electronic). LCCN verification of test cover- QA76.9.A25 C822 2003. age claims. IEEE Trans- URL http://link.springer- actions on Software En- ny.com/link/service/series/ gineering, 26(2):178–192, 0558/tocs/t2612.htm; February 2000. CODEN http://www.springerlink. IESEDJ. ISSN 0098- com/openurl.asp?genre= 5589 (print), 1939-3520 issue&issn=0302-9743&volume= (electronic). URL http: 2612. REFERENCES 281

Ding:2005:RNM Dinur:2008:CAT

[DS05a] J. Ding and D. Schmidt. [DS08] Itai Dinur and Adi Shamir. Rainbow, a new multivari- Cube attacks on tweak- able polynomial signature able black box polyno- scheme. Lecture Notes in mials. Technical report, Computer Science, 3531: Computer Science Depart- 164–175, 2005. CODEN ment, The Weizmann In- LNCSD9. ISSN 0302-9743 stitute, Rehobot 76100, Is- (print), 1611-3349 (elec- rael, September 13, 2008. tronic). URL http://cryptome. org/cube-attacks.pdf. Dodis:2005:ESE Deepthi:2009:DIA [DS05b] Yevgeniy Dodis and Adam Smith. Entropic secu- [DS09] P. P. Deepthi and P. S. rity and the encryption of Sathidevi. Design, imple- high entropy messages. In mentation and analysis of Kilian [Kil05], pages 556– hardware efficient stream ?? CODEN LNCSD9. ciphers using LFSR based ISBN 3-540-24573-1 (soft- hash functions. Comput- cover). ISSN 0302-9743 ers & Security, 28(3–4):229– (print), 1611-3349 (elec- 241, May/June 2009. CO- tronic). LCCN QA76.9.A25 DEN CPSEDU. ISSN 0167- T44 2005. URL http: 4048 (print), 1872-6208 //www.springerlink.com/ (electronic). URL https:/ openurl.asp?genre=issue& /www.sciencedirect.com/ issn=0302-9743&volume= science/article/pii/S0167404808001193. 3378; http://www.springerlink. com/openurl.asp?genre= Das:2006:NRU volume&id=doi:10.1007/ b106171. [DSGP06] Manik Lal Das, Ashutosh Saxena, Ved P. Gulati, and Ding:2006:SSS Deepak B. Phatak. A novel remote user authen- [DS06] Cunsheng Ding and Arto tication scheme using bi- Salomaa. Secret sharing linear pairings. Comput- schemes with nice access ers & Security, 25(3):184– structures. Fundamenta In- 189, May 2006. CODEN formaticae, 73(1–2):51–63, CPSEDU. ISSN 0167-4048 October 2006. CODEN FU- (print), 1872-6208 (elec- MAAJ. ISSN 0169-2968 tronic). URL https:// (print), 1875-8681 (elec- www.sciencedirect.com/ tronic). science/article/pii/S0167404805001525. REFERENCES 282

Djurovic:2001:DWF (electronic). LCCN QA76.9.A25 C822 2003. URL http: [DSP01] Igor Djurovic, Srdjan Stankovic, //link.springer-ny.com/ and Ioannis Pitas. Dig- link/service/series/0558/ ital watermarking in the tocs/t2612.htm; http: fractional Fourier transfor- //www.springerlink.com/ mation domain. Journal openurl.asp?genre=issue& of Network and Computer issn=0302-9743&volume= Applications, 24(2):167–173, 2612. April 2001. CODEN JN- CAF3. ISSN 1084-8045 Duggan:2004:TBC (print), 1095-8592 (elec- [Dug04] Dominic Duggan. Type- tronic). URL http:// based cryptographic oper- www.sciencedirect.com/ ations. Journal of Com- science/article/pii/S1084804500901280. puter Security, 12(3–4):485– Dodis:2001:PAS 550, ???? 2004. CODEN JCSIET. ISSN 0926-227X [DSS01] Yevgeniy Dodis, Amit Sa- (print), 1875-8924 (elec- hai, and Adam Smith. On tronic). perfect and adaptive se- curity in exposure-resilient Dujella:2008:VWA cryptography. Lecture Notes in Computer Science, 2045: [Duj08] Andrej Dujella. A vari- 301–??, 2001. CODEN ant of Wiener’s attack on LNCSD9. ISSN 0302- RSA with small secret ex- 9743 (print), 1611-3349 ponent. ACM Communica- (electronic). URL http: tions in Computer Algebra, //link.springer-ny.com/ 42(1–2):50–51, March/June link/service/series/0558/ 2008. CODEN ???? ISSN bibs/2045/20450301.htm; 1932-2232 (print), 1932- http://link.springer- 2240 (electronic). ny.com/link/service/series/ Dujella:2009:VWA 0558/papers/2045/20450301. pdf. [Duj09] Andrej Dujella. A vari- Ding:2003:SIB ant of Wiener’s attack on RSA. Computing, 85(1– [DT03] Xuhua Ding and Gene 2):77–83, June 2009. CO- Tsudik. Simple identity- DEN CMPTA2. ISSN 0010- based cryptography with 485X (print), 1436-5057 mediated RSA. In Joye (electronic). URL http: [Joy03b], pages 193–210. //www.springerlink.com/ CODEN LNCSD9. ISBN openurl.asp?genre=article& 3-540-00847-0. ISSN 0302- issn=0010-485X&volume= 9743 (print), 1611-3349 85&issue=1&spage=77. REFERENCES 283

Dunkelman:2006:TCB Dawson:2005:PCM

[DV05] Ed Dawson and Serge Vau- [Dun06] Orr Dunkelman. Techniques denay, editors. Progress in for cryptanalysis of block ci- cryptology — MYCRYPT phers. Thesis (ph.d.), Fac- 2005: first international ulty of Computer Science, conference on cryptology in Technion — Israel Institute Malaysia, Kuala Lumpur, of Technology, Haifa, Israel, Malaysia, September 28–30, 2006. x + 204 pp. 2005, proceedings,volume 3715 of Lecture Notes in Duranti:2001:LTP Computer Science. Spring- er-Verlag, Berlin, Ger- [Dur01] Luciana Duranti. The long- many / Heidelberg, Ger- term preservation of au- many / London, UK / etc., thentic electronic records. 2005. CODEN LNCSD9. In Apers et al. [AAC+01], ISBN 3-540-28938-0. ISSN pages 625–628. ISBN 0302-9743 (print), 1611- 1-55860-804-4. LCCN 3349 (electronic). LCCN QA76.9.D3 I559 2001. URL ???? http://www.vldb.org/conf/ Drutarovsky:2008:CSC 2001/P625.pdf. [DV08] M. Drutarovsky and M. Var- Duwell:2003:BRB chola. Cryptographic sys- temonachipbasedonAc- [Duw03] Armond Duwell. Book re- tel ARM7 soft-core with em- view: The physics of quan- bedded true random number tum information: quantum generator. In 2008. DDECS cryptography, quantum tele- 2008. 11th IEEE Work- portation, quantum compu- shop on Design and Diag- tation: D. Bouwmeester, nostics of Electronic Cir- A. Ekert and A. Zeilinger cuits and Systems, pages 1– (Eds.); Germany, 2000, 6. IEEE Computer Society 314pp, US$54, ISBN 3- Press, 1109 Spring Street, 540-66778-4. Studies in Suite 300, Silver Spring, MD History and Philosophy of 20910, USA, 2008. URL Modern Physics, 34(2):331– http://ieeexplore.ieee. 334, June 2003. CODEN org/stamp/stamp.jsp?tp= ???? ISSN 1355-2198 &arnumber=4538778. (print), 1879-2502 (elec- Levy-dit-Vehel:2006:WC tronic). URL http:// www.sciencedirect.com/ [dVP06] Fran¸coise Levy dit Ve- science/article/pii/S1355219803000121. hel and Ludovic Perret. See [BEZ01]. On the Wagner–Magyarik REFERENCES 284

cryptosystem. In Ytre- cryptography from weak se- hus [Ytr06], pages 316–329. crets. In ACM [ACM09], ISBN 3-540-35481-6. LCCN pages 601–610. ISBN 1- QA76.9.A25 I557 2005. 60558-613-7. LCCN QA75.5 .A22 2009. Du:2001:OKS Dwivedi:2004:ISS [DW01] Wei Zhang Du and Xin Mei Wang. One kind of secret- [Dwi04] Himanshu Dwivedi. Im- code encryption scheme plementing SSH: strategies based on maximum rank for optimizing the secure distance codes. Chinese shell. John Wiley and Sons, Journal of Computers = Chi Inc., New York, NY, USA, suan chi hsueh pao, 24(6): 2004. ISBN 0-471-45880- 650–653, 2001. CODEN 5. xxvi + 376 pp. LCCN JIXUDT. ISSN 0254-4164. QA76.76.O63 D895 2004. UK£24.50. URL ftp:// deWeger:2002:CRS uiarchive.cso.uiuc.edu/ [dW02] Benne de Weger. Crypt- pub/etext/gutenberg/; analysis of RSA with small http://www.loc.gov/catdir/ prime difference. Applicable bios/wiley046/2004297174. algebra in engineering, com- html; http://www.loc. munication and computing, gov/catdir/description/ 13(1):17–28, 2002. CODEN wiley041/2004297174.html; AAECEW. ISSN 0938-1279 http://www.loc.gov/catdir/ (print), 1432-0622 (elec- toc/wiley041/2004297174. tronic). html. Desmedt:2005:CNS Ding:2005:CTC [DWML05] Yvo G. Desmedt, Huaxiong [DW05] Cunsheng Ding and Xuesong Wang, Yi Mu, and Yongqing Wang. A coding theory Li, editors. Cryptology and construction of new system- network security: 4th inter- atic authentication codes. national conference, CANS Theoretical Computer Sci- 2005, Xiamen, China, De- ence, 330(1):81–99, Jan- cember 14–16, 2005: pro- uary 31, 2005. CODEN ceedings, volume 3810 of TCSCDI. ISSN 0304-3975 Lecture Notes in Computer (print), 1879-2294 (elec- Science. Springer-Verlag, tronic). Berlin, Germany / Heidel- Dodis:2009:NME berg, Germany / London, UK / etc., 2005. CO- [DW09] Yevgeniy Dodis and Daniel DEN LNCSD9. ISBN 3-540- Wichs. Non-malleable ex- 30849-0. ISSN 0302-9743 tractors and symmetric key (print), 1611-3349 (elec- REFERENCES 285

tronic). LCCN QA76.9.A25 NNAF method for the effi- I5534 2004. URL http: cient computation of scalar //www.springerlink.com/ multiplication in elliptic openurl.asp?genre=issue& curve cryptography. Applied issn=0302-9743&volume= Mathematics and Compu- 3810. tation, 167(1):81–93, Au- Dittmann:2001:UCW gust 5, 2005. CODEN AMHCBQ. ISSN 0096-3003 [DWN01] Jana Dittmann, Petra (print), 1873-5649 (elec- Wohlmacher, and Klara tronic). Nahrstedt. Using cryp- tographic and watermark- Dawu:2001:TES ing algorithms. IEEE Mul- [DY01] Gu Dawu and Wang Yi. On tiMedia, 8(4):54–65, Oc- the techniques of enhanc- tober 2001. CODEN ing the security of block ci- IEMUE4. ISSN 1070-986X phers. Operating Systems (print), 1941-0166 (elec- Review, 35(4):94–96, Octo- tronic). URL http://dlib. ber 2001. CODEN OS- computer.org/mu/books/ RED8. ISSN 0163-5980 mu2001/pdf/u4054.pdf; (print), 1943-586X (elec- http://www.computer.org/ tronic). multimedia/mu2001/u4054abs. htm. Deng:2009:SCA Dworkin:2003:DRB [DY09a] Robert H. Deng and Yan- [Dwo03] Morris Dworkin. DRAFT jiang Yang. A study of recommendation for block content authentication in cipher modes of opera- proxy-enabled multimedia tion: The CCM mode for delivery systems: Model, authentication and confi- techniques, and applica- dentiality. NIST Special tions. ACM Transactions Publication 800-38C, Na- on Multimedia Computing, tional Institute for Stan- Communications, and Ap- dards and Technology, plications, 5(4):28:1–28:??, Gaithersburg, MD 20899- October 2009. CODEN 8900, USA, September ???? ISSN 1551-6857 2003. URL http://csrc. (print), 1551-6865 (elec- nist.gov/publications/ tronic). drafts/Draft_SP_800-38C_ Ding:2009:MPK 9-04-2003.pdf. Ding:2005:NME [DY09b] Jintai Ding and Bo-Yin Yang. Multivariate pub- [DwWmW05] Yong Ding, Kwok wo Wong, lic key cryptography. In andYuminWang.Aw- Bernstein et al. [BBD09], REFERENCES 286

pages 198–242. ISBN 3-540- International Conference on 88701-6 (hardcover), 3-642- Very Large Data Bases, 10019-8 (softcover). LCCN September 10–14, 2000, QA76.9.A25 P67 2009. Cairo, Egypt. Morgan Kauf- mann Publishers, Los Altos, Dai:2001:CDE CA 94022, USA, 2000. ISBN [DZL01] Qiong Dai, Xiao Xiang Zou, 1-55860-715-3. LCCN ???? and Zhu Kai Luo. Cracking Eghlidos:2001:IRL a data encryption and de- cryption system using multi- [EBS01] Taraneh Eghlidos, Albrecht valued logic array. Chi- Beutelspacher, and Babak nese Journal of Computers Sadeghiyan. Improving = Chi suan chi hsueh pao, the resistance of DES 24(6):654–656, 2001. CO- and DES-like cryptosystems DEN JIXUDT. ISSN 0254- against differential crypt- 4164. analysis. Atti Sem. Mat. Fis. Univ. Modena, 49(1): Eagleton:2005:BRD 147–169, 2001. CODEN AS- [Eag05] Catherine Eagleton. Book MMAK. ISSN 0041-8986. review: David A. King, The Eilam:2005:RSR Ciphers of the Monks: A Forgotten Number-Notation [EC05] Eldad Eilam and Elliot J. of the Middle Ages. Boethius, Chikofsky. Reversing: se- 44. Stuttgart: FranzSteiner crets of reverse engineer- Verlag, 2001. Pp. 506. ISBN ing. John Wiley and Sons, 3-515-07640-9. DM 199.49, Inc., New York, NY, USA, EUR 102.00 (hardcover). 2005. ISBN 0-7645-7481-7 British Journal for the His- (paperback). xxviii + 589 tory of Science, 38(3):359– pp. LCCN QA76.758 .E35 360, September 2005. CO- 2005. URL http://www. DEN BJHSAT. ISSN 0007- loc.gov/catdir/enhancements/ 0874 (print), 1474-001X fy0628/2005921595-b.html; (electronic). URL http: http://www.loc.gov/catdir/ //www.jstor.org/stable/ enhancements/fy0628/2005921595- 4028680. d.html; http://www.loc. gov/catdir/enhancements/ ElAbbadi:2000:VPI fy0628/2005921595-t.html. + [EBC 00] Amr El Abbadi, Mich- English:2007:MAC ael L. Brodie, Sharma Chakravarthy, Umeshwar [ECG+07] Jennifer English, David Dayal, Nabil Kamel, Gunter Coe, Rhonda Gaede, David Schlageter, and Kyu-Young Hyde, and Jeffrey Kulick. Whang, editors. VLDB MEMS-assisted cryptogra- 2000, Proceedings of 26th phy for CPI protection. REFERENCES 287

IEEE Security & Privacy, port for group collabora- 5(4):14–21, July/August tion. ACM Transactions 2007. CODEN ???? ISSN on Information and Sys- 1540-7993 (print), 1558- tem Security, 6(4):547–565, 4046 (electronic). November 2003. CODEN ATISBQ. ISSN 1094-9224 ECMA:2000:EPIa (print), 1557-7406 (elec- [ECM00a] ECMA. ECMA-305: Pri- tronic). vate Integrated Services Net- Echizen:2005:PAV work (PISN) — Specifi- cation, Functional Model [EFY+05] Isao Echizen, Yasuhiro and Information Flows Fujii, Takaaki Yamada, — Wireless Terminal Au- Satoru Tezuka, and Hi- thentication Supplementary roshi Yoshiura. Perceptu- Services (WTMAU-SD). ally adaptive video water- ECMA (European Associ- marking using motion esti- ation for Standardizing In- mation. International Jour- formation and Communi- nal of Image and Graphics cation Systems), Geneva, (IJIG), 5(1):89–??, January Switzerland, June 2000. 2005. CODEN ???? ISSN URL http://www.ecma. 0219-4678. ch/ecma1/STAND/ECMA-305. HTM. Eghlidos:2000:SLB ECMA:2000:EPIb [Egh00] Taraneh Eghlidos. On the [ECM00b] ECMA. ECMA-306: Pri- security of DES and DES- vate Integrated Services Net- like block ciphers against work (PISN) — Inter- differential cryptanalysis. Exchange Signalling Pro- Shaker Verlag, Aachen, Ger- tocol — Wireless Termi- many, 2000. ISBN 3-8265- nal Authentication Supple- 7951-8. xvi + 178 pp. LCCN mentary Services (QSIG- ???? WTMAU).ECMA(Euro- Elmallah:2008:LK pean Association for Stan- dardizing Information and [EGK08] Ehab S. Elmallah, Mo- Communication Systems), hamed G. Gouda, and Geneva, Switzerland, June Sandeep S. Kulkarni. Loga- 2000. URL http://www. rithmic keying. ACM Trans- ecma.ch/ecma1/STAND/ECMA- actions on Autonomous and 306.HTM. Adaptive Systems (TAAS), Ellison:2003:PKS 3(4):18:1–18:??, November 2008. CODEN ???? ISSN [ED03] Carl Ellison and Steve 1556-4665 (print), 1556- Dohrmann. Public-key sup- 4703 (electronic). REFERENCES 288

Epstein:2003:DIT keys with personal entropy. Future Generation Com- + [EHK 03] Michael Epstein, Laszlo puter Systems, 16(4):311– Hars, Raymond Krasin- 318, February 2000. CO- ski, Martin Rosner, and DEN FGSEVI. ISSN 0167- Hao Zheng. Design and 739X (print), 1872-7115 implementation of a true (electronic). URL http: random number genera- //www.counterpane.com/ tor based on digital cir- personal-entropy.pdf; cuit artifacts. In Walter http://www.elsevier.com/ et al. [WKP03], pages 152– gej-ng/10/19/19/41/27/ 165. CODEN LNCSD9. 26/abstract.html. ISBN 3-540-40833-9. ISSN 0302-9743 (print), 1611- Eggers:2001:DWC 3349 (electronic). LCCN [EIG01] Joachim J. Eggers, Wolf- TK7895.E42. URL http: Dietrich Ihlenfeldt, and //link.springer-ny.com/ Bernd Girod. Digital water- link/service/series/0558/ marking of chemical struc- tocs/t2779.htm; http: ture sets. Lecture Notes //www.springerlink.com/ in Computer Science, 2137: openurl.asp?genre=issue& 200–??, 2001. CODEN issn=0302-9743&volume= LNCSD9. ISSN 0302- 2779; http://www.springerlink. 9743 (print), 1611-3349 com/openurl.asp?genre= (electronic). URL http: volume&id=doi:10.1007/ //link.springer-ny.com/ b13240. link/service/series/0558/ Ernst:2004:FBH bibs/2137/21370200.htm; http://link.springer- [EHKH04] M. Ernst, B. Henhapl, ny.com/link/service/series/ S. Klupsch, and S. Huss. 0558/papers/2137/21370200. FPGA based hardware ac- pdf. celeration for elliptic curve public key cryptosystems. Ekert:2002:BTQ The Journal of Systems [Eke02] Artur Ekert. 29. The Bell and Software, 70(3):299– Theorem in quantum cryp- 313, March 2004. CODEN tography: Vortrag am 14. JSSODM. ISSN 0164-1212 November 2000. In Bertl- (print), 1873-1228 (elec- mann and Zeilinger [BZ02], tronic). page ?? ISBN 3-540-42756- Ellison:2000:PSK 2. LCCN ???? Ekeraa:2009:DCM [EHMS00] Carl Ellison, Chris Hall, Randy Milbert, and Bruce [Eke09] Martin Eker˚a. Differen- Schneier. Protecting secret tial cryptanalysis of MD5. REFERENCES 289

Ph.D. thesis (??), Skolan f¨or curity & Privacy, 2(4):57– datavetenskap och kommu- 61, July/August 2004. CO- nikation, Kungliga Tekniska DEN ???? ISSN 1540- h¨ogskolan, Stockholm, Swe- 7993 (print), 1558-4046 den, 2009. 113 pp. (electronic). URL http: //csdl.computer.org/dl/ El-Kassar:2001:GPK mags/sp/2004/04/j4057. [EKRMA01] A. N. El-Kassar, Mohamed htm; http://csdl.computer. Rizk,N.M.Mirza,and org/dl/mags/sp/2004/04/ Y. A. Awad. El-Gamal j4057.pdf. public key cryptosystem in the domain of Gaussian in- Eloff:2001:AIS tegers. Int. J. Appl. Math., 7(4):405–412, 2001. ISSN [ELvS01] Jan H. P. Eloff, Les 1311-1728. Labuschagne, and Rossouw von Solms, editors. Ad- Elbirt:2008:AAI vances in Information Secu- [Elb08] A. J. Elbirt. Acceler- rity Management and Small ated AES implementations Systems Security: IFIP via generalized instruction TC11 WG11.1/WG11.2 set extensions. Journal Eighth Annual Working of Computer Security,16 Conference on Informa- (3):265–288, ???? 2008. tion Security Management CODEN JCSIET. ISSN and Small Systems Se- 0926-227X (print), 1875- curity, September 27–28, 8924 (electronic). 2001, Las Vegas, Nevada, USA,volume72ofInterna- Elbirt:2009:UAC tional Federation for Infor- [Elb09] Adam J. Elbirt. Un- mation Processing. Kluwer derstanding and Applying Academic Publishers, Dor- Cryptography and Data Se- drecht, The Netherlands, curity. CRC Press, 2000 2001. ISBN 0-7923-7506- N.W. Corporate Blvd., 8. LCCN QA76.9.A25 I465 Boca Raton, FL 33431- 2001. UK£97.00. 9868, USA, 2009. ISBN 1- Everitt:2003:JBI 4200-6160-7. xxvii + 637 pp. LCCN QA76.9.A25 [EM03] R. A. J. Everitt and P. W. E43 2009. URL http:// McOwan. Java-based In- www.loc.gov/catdir/toc/ ternet biometric authentica- ecip0821/2008028154.html. tion system. IEEE Trans- actions on Pattern Analysis Elliott:2004:QC and Machine Intelligence, [Ell04] Chip Elliott. Quantum 25(9):1166–1171, 2003. CO- cryptography. IEEE Se- DEN ???? ISSN 0162-8828. REFERENCES 290

English:2000:MNDb Sandeep Kumar, and Leif Uhsadel. A survey of [Eng00] Marie English. Micro news: lightweight cryptography Digital-signature legislation. implementations. IEEE De- IEEE Micro, 20(4):4, July/ sign & Test of Comput- August 2000. CODEN ers, 24(6):522–533, Novem- IEMIDZ. ISSN 0272-1732 ber/December 2007. ISSN (print), 1937-4143 (elec- 0740-7475 (print), 1558- tronic). 1918 (electronic). England:2002:AOO Erickson:2001:EDD [EP02] Paul England and Mar- cus Peinado. Authenti- [Eri01] Jonathan Erickson. Edito- cated operation of open rial: From the Department computing devices. Lecture of Dumb Ideas. Dr. Dobb’s Notes in Computer Science, Journal of Software Tools, 2384:346–??, 2002. CO- 26(3):8, March 2001. CO- DEN LNCSD9. ISSN 0302- DEN DDJOEB. ISSN 1044- 9743 (print), 1611-3349 789X. URL http://www. (electronic). URL http: ddj.com/. //link.springer-ny.com/ link/service/series/0558/ bibs/2384/23840346.htm; Erickson:2002:EDD http://link.springer- ny.com/link/service/series/[Eri02] Jonathan Erickson. Edito- 0558/papers/2384/23840346. rial: Deciphering the doors pdf. of knowledge. Dr. Dobb’s Journal of Software Tools, Elbirt:2005:ILD 27(4):8, April 2002. CO- [EP05] Adam J. Elbirt and Christof DEN DDJOEB. ISSN 1044- Paar. An instruction- 789X. URL http://www. level distributed processor ddj.com/. for symmetric-key cryptog- raphy. IEEE Transac- Erickson:2003:HAE tions on Parallel and Dis- tributed Systems, 16(5):468– [Eri03] Jon (Jon Mark) Erickson. 480, May 2005. CODEN Hacking: the art of exploita- ITDSEO. ISSN 1045-9219 tion. No Starch Press, San (print), 1558-2183 (elec- Francisco, CA, USA, 2003. tronic). ISBN 1-59327-007-0. xi + Eisenbarth:2007:SLC 241 pp. LCCN QA76.9.A25 E75 2003. URL http:// [EPP+07] Thomas Eisenbarth, Christof www.loc.gov/catdir/toc/ Paar, Axel Poschmann, ecip047/2003017498.html. REFERENCES 291

Erickson:2008:HAE Shantz, Vipul Gupta, Nils Gura, Leonard Rarick, and [Eri08] Jon Erickson. Hacking: Lawrence Spracklen. Ac- the art of exploitation.No celerating next-generation Starch Press, San Francisco, public-key cryptosystems CA, USA, second edition, on general-purpose CPUs. 2008. ISBN 1-59327-144- IEEE Micro, 25(2):52–59, 1. x + 472 pp. LCCN March/April 2005. CODEN QA76.9.A25 E75 2008. IEMIDZ. ISSN 0272-1732 URL http://proquest. (print), 1937-4143 (elec- safaribooksonline.com/ tronic). URL http://csdl. 9781593271442. computer.org/comp/mags/ Ellison:2000:TRP mi/2005/02/m2052abs.htm; http://csdl.computer. [ES00a] C. Ellison and B. Schneier. org/dl/mags/mi/2005/02/ Ten risks of PKI: What m2052.pdf. you’re not being told about public-key infrastructure. Enck:2005:EOF Computer Security Journal, [ETMP05] William Enck, Patrick 16(1):1–7, ???? 2000. CO- Traynor, Patrick McDaniel, DEN CSJLDR. ISSN 0277- and Thomas La Porta. Ex- 0865. ploiting open functionality Ellison:2000:IRRa in SMS-capable cellular net- works. In Meadows and [ES00b] Carl Ellison and Bruce Syverson [MS05b], pages Schneier. Inside risks: 393–404. ISBN 1-59593- risks of PKI: Secure email. 226-7. LCCN QA76.9.A25. Communications of the ACM order number 459050. Association for Comput- Ettinger:2002:QQC ing Machinery, 43(1):160, January 2000. CODEN [Ett02] Mark Ettinger. 20 ques- CACMA2. ISSN 0001-0782 tions, quantum computers, (print), 1557-7317 (elec- and cryptography. Los tronic). URL http://www. Alamos Science, 27:46–51, acm.org/pubs/articles/ 2002. CODEN LASCDI. journals/cacm/2000-43- ISSN 0273-7116. 1/p160-ellison/p160-ellison. Ebringer:2000:PAP pdf; http://www.acm. org/pubs/citations/journals/[ETZ00] Tim Ebringer, Peter Thorne, cacm/2000-43-1/p160-ellison/ and Yuliang Zheng. Para- . sitic authentication to pro- Eberle:2005:ANG tect your E-wallet. Com- puter, 33(10):54–60, Octo- [ESG+05] Hans Eberle, Sheueling ber 2000. CODEN CP- REFERENCES 292

TRB4. ISSN 0018-9162 ISBN ???? LCCN ???? (print), 1558-0814 (elec- URL http://csrc.nist. tronic). URL http://dlib. gov/encryption/aes/round2/ computer.org/co/books/ conf3/aes3conf.htm; http: co2000/pdf/rx054.pdf; //csrc.nist.gov/encryption/ http://www.computer.org/ aes/round2/conf3/papers/ computer/co2000/rx054abs. AES3Proceedings-1.pdf; htm. http://csrc.nist.gov/ Evans:2009:BRS encryption/aes/round2/ conf3/papers/AES3Proceedings- [Eva09] James Evans. Book review: 2.pdf; http://csrc.nist. The saga of the Antikythera gov/encryption/aes/round2/ mechanism, Decoding the conf3/papers/AES3Proceedings- Heavens: a 2000-Year-Old 3.pdf; http://csrc.nist. Computer and the Century- gov/encryption/aes/round2/ Long Search to Discover its conf3/papers/AES3Proceedings. Secrets. Journal for the pdf. History of Astronomy,40 (3):362–364, August 2009. Faliszewski:2007:BRB CODEN JHSAA2. ISSN 0021-8286 (print), 1753- [Fal07] Piotr Faliszewski. Book re- 8556 (electronic). view: Complexity Theory and Cryptology: An Intro- Edman:2009:AES duction to Cryptocomplex- ity,byJ¨org Rothe, Springer, [EY09] Matthew Edman and B¨ulent 2005, 484 pages. ACM Yener. On anonymity in an SIGACT News, 38(2):20– electronic society: a survey 22, June 2007. CODEN of anonymous communica- SIGNDM. ISSN 0163- tion systems. ACM Comput- 5700 (print), 1943-5827 ing Surveys, 42(1):5:1–5:35, (electronic). URL http: December 2009. CODEN //doi.acm.org/10.1145/ CMSVAN. ISSN 0360-0300 1272729.1272736.See (print), 1557-7341 (elec- [Rot05]. tronic).

Elbirt:2000:FIP Fan:2003:ILC

[EYCP00] A. J. Elbirt, W. Yip, [Fan03] Chun-I Fan. Improved low- B. Chetwynd, and C. Paar. computation partially blind An FPGA implementation signatures. Applied Math- and performance evaluation ematics and Computation, of the AES block cipher can- 145(2–3):853–867, Decem- didate algorithm finalists. In ber 25, 2003. CODEN NIST [NIS00], pages 13–27. AMHCBQ. ISSN 0096-3003 REFERENCES 293

(print), 1873-5649 (elec- the network via the net- tronic). work processor. Intel Tech- nology Journal, 6(3):40–49, Faugere:2009:IBC August 15, 2002. ISSN [Fau09] Jean-Charles Faug`ere. In- 1535-766X. URL http: teractions between com- //developer.intel.com/ puter algebra (Gr¨obner technology/itj/2002/volume06issue03/ bases) and cryptology. In art02_security/p01_abstract. May [May09], pages 383– htm; http://developer. 384. ISBN 1-60558-609-9. intel.com/technology/itj/ LCCN ???? 2002/volume06issue03/art02_ Ford:2001:SEC security/vol6iss3_art02. pdf. [FB01] Warwick Ford and Mich- aelS.Baum. Secure elec- Fan:2005:RRA tronic commerce: building the infrastructure for digital [FCZ05] Chun-I Fan, Yung-Cheng signatures and encryption. Chan, and Zhi-Kai Zhang. Prentice-Hall PTR, Upper Robust remote authenti- Saddle River, NJ 07458, cation scheme with smart USA, second edition, 2001. cards. Computers & ISBN 0-13-203795-5 (paper- Security, 24(8):619–628, back). xxv + 612 pp. LCCN November 2005. CODEN QA76.9.A25 F655 2000. CPSEDU. ISSN 0167-4048 (print), 1872-6208 (elec- Felkel:2001:ICW tronic). URL https:// [FBW01] Petr Felkel, Mario Bruckschwaiger, www.sciencedirect.com/ . and Rainer Wegenkittl. Im- science/article/pii/S0167404805000477 plementation and complex- Fischer:2001:TMR ity of the watershed-from- markers algorithm com- [FD01] V. Fischer and M. Dru- puted as a minimal cost tarovsk´y. Two methods forest. Computer Graphics of Rijndael implementa- Forum, 20(3):??, Septem- tion in reconfigurable hard- ber 2001. CODEN CG- ware. Lecture Notes in FODY. ISSN 0167-7055 Computer Science, 2162: (print), 1467-8659 (elec- 77–??, 2001. CODEN tronic). LNCSD9. ISSN 0302- 9743 (print), 1611-3349 Feghali:2002:SAP (electronic). URL http: [FBWC02] Wajdi Feghali, Brad Bur- //link.springer-ny.com/ res, Gilbert Wolrich, and link/service/series/0558/ Douglas Carrigan. Secu- bibs/2162/21620077.htm; rity: Adding protection to http://link.springer- REFERENCES 294

ny.com/link/service/series/ Fischlin:2000:ENM 0558/papers/2162/21620077. pdf. [FF00] Marc Fischlin and Roger Fischlin. Efficient non- Furnell:2000:ASS malleable commitment schemes. In Bellare [Bel00], pages [FDIR00] S. M. Furnell, P. S. Dow- 413–?? ISBN 3-540- land, H. M. Illingworth, 67907-3. ISSN 0302-9743 and P. L. Reynolds. Au- (print), 1611-3349 (elec- thentication and supervi- tronic). LCCN QA76.9.A25 sion: a survey of user at- C79 2000 Bar. URL http: titudes. Computers & Se- //link.springer-ny.com/ curity, 19(6):529–539, Oc- link/service/series/0558/ tober 1, 2000. CODEN bibs/1880/18800413.htm; CPSEDU. ISSN 0167-4048 http://link.springer- (print), 1872-6208 (elec- ny.com/link/service/series/ tronic). URL https:// 0558/papers/1880/18800413. www.sciencedirect.com/ pdf. science/article/pii/S0167404800060272. Filiol:2001:NUS Felke:2006:ATH [FF01a] Eric Filiol and Caroline [Fel06] Patrick Felke. On the affine Fontaine. A new ul- transformations of HFE- trafast stream cipher de- cryptosystems and systems sign: COS ciphers. Lec- with branches. In Ytre- ture Notes in Computer Sci- hus [Ytr06], pages 229–241. ence, 2260:85–??, 2001. CO- ISBN 3-540-35481-6. LCCN DEN LNCSD9. ISSN 0302- QA76.9.A25 I557 2005. 9743 (print), 1611-3349 (electronic). URL http: Ferguson:2000:SEK //link.springer-ny.com/ link/service/series/0558/ [Fer00] N. Ferguson. Semi-equivalent bibs/2260/22600085.htm; keys in MARS. In ????, ed- http://link.springer- itor, Third AES Candidate ny.com/link/service/series/ Conference, page ?? ????, 0558/papers/2260/22600085. ????, April 2000. ISBN ???? pdf. LCCN ???? Flannery:2001:CYW Ferguson:2006:ACE [FF01b] Sarah Flannery and David [Fer06] Niels Ferguson. AES-CBC Flannery. In Code: a + Elephant diffuser: A [Young Women’s] Mathe- disk encryption algorithm matical Journey. Algo- for Windows Vista. Un- nquin Books of Chapel Hill, known, 2006. Chapel Hill, NC, USA, 2001. REFERENCES 295

ISBN 1-56512-377-8. ix + Computer Science, 1853: 341 pp. LCCN QA29.F6 A3 354–??, 2000. CODEN 2003. US$13.95. LNCSD9. ISSN 0302- Fridrich:2001:DLS 9743 (print), 1611-3349 (electronic). URL http: [FGD01] Jessica Fridrich, Miroslav //link.springer-ny.com/ Goljan, and Rui Du. Detect- link/service/series/0558/ ing LSB steganography in bibs/1853/18530354.htm; color and gray-scale images. http://link.springer- IEEE MultiMedia, 8(4):22– ny.com/link/service/series/ 28, October 2001. CODEN 0558/papers/1853/18530354. IEMUE4. ISSN 1070-986X pdf. (print), 1941-0166 (elec- tronic). URL http://dlib. Focardi:2000:MAT computer.org/mu/books/ [FGM00b] Riccardo Focardi, Roberto mu2001/pdf/u4022.pdf; Gorrieri, and Fabio Mar- http://www.computer.org/ tinelli. Message authen- multimedia/mu2001/u4022abs. tication through non in- htm. terference. Lecture Notes Frenkiel:2002:CCS in Computer Science, 1816: [FGL02] Michel Frenkiel, Paul Gri- 258–??, 2000. CODEN son, and Philippe Laluyaux. LNCSD9. ISSN 0302- Clip Card: Smart Card 9743 (print), 1611-3349 based traffic tickets. Lecture (electronic). URL http: Notes in Computer Science, //link.springer-ny.com/ 2456:313–??, 2002. CODEN link/service/series/0558/ LNCSD9. ISSN 0302-9743 bibs/1816/18160258.htm; (print), 1611-3349 (elec- http://link.springer- tronic). URL http:// ny.com/link/service/series/ link.springer.de/link/ 0558/papers/1816/18160258. service/series/0558/bibs/ pdf. 2456/24560313.htm; http: Focardi:2003:CTA //link.springer.de/link/ service/series/0558/papers/[FGM03] Riccardo Focardi, Roberto 2456/24560313.pdf. Gorrieri, and Fabio Mar- Focardi:2000:ITN tinelli. A comparison of three authentication prop- [FGM00a] Riccardo Focardi, Roberto erties. Theoretical Com- Gorrieri, and Fabio Mar- puter Science, 291(3):285– tinelli. Invited talk: Non 327, January 6, 2003. CO- interference for the anal- DEN TCSCDI. ISSN 0304- ysis of cryptographic pro- 3975 (print), 1879-2294 tocols. Lecture Notes in (electronic). REFERENCES 296

Fitzi:2001:MCP link/service/series/0558/ bibs/1977/19770031.htm; [FGMO01] Matthias Fitzi, Juan A. http://link.springer- Garay, Ueli Maurer, and ny.com/link/service/series/ Rafail Ostrovsky. Minimal 0558/papers/1977/19770031. complete primitives for se- pdf. cure multi-party computa- tion. In Kilian [Kil01a], Filiol:2002:NST pages 80–?? ISBN 3-540- 42456-3 (paperback). LCCN [Fil02] Eric Filiol. A new statis- QA76.9.A25 C79 2001; tical testing for symmetric QA267.A1 L43 no.2139. ciphers and hash functions. UK£47.00. URL http: Technical report, ESAT //link.springer-ny.com/ — Virology and Cryptol- link/service/series/0558/ ogy Lab, B.P. 18 35998 bibs/2139/21390080.htm; Rennes, FRANCE, July 23, http://link.springer- 2002. 14 pp. URL http: ny.com/link/service/series/ //eprint.iacr.org/2002/ 0558/papers/2139/21390080. 099/. Cryptology ePrint pdf. Archive, Report 2002/099. Field:2009:BCB Finley:2002:BSE [Fie09] J. V. Field. British crypt- [Fin02] Brian Elliott Finley. BOEL: analysis : the breaking a small Embedded Linux of ‘fish’ traffic. In Sci- with PIC libraries. Em- entific research in World bedded Linux Journal,8: War II: what scientists 44–46, March/April 2002. did in the war [MH09], CODEN ???? ISSN page ?? ISBN 0-203-88318- 1534-083X. URL http:/ 7 (e-book), 0-7103-1340-3 /embedded.linuxjournal. (hardcover). LCCN Q141 com/magazine/issue08/; .H195 2009. URL http:// http://www.linuxdevices. www.loc.gov/catdir/toc/ com/articles/AT2829528599. ecip0824/2008033118.html. html. Filiol:2000:DAS Finkenzeller:2003:RHF [Fil00] Eric Filiol. Decimation at- [Fin03] Klaus Finkenzeller. RFID tack of stream ciphers. Lec- handbook: fundamentals ture Notes in Computer Sci- and applications in contact- ence, 1977:31–??, 2000. CO- less smart cards and iden- DEN LNCSD9. ISSN 0302- tification. John Wiley and 9743 (print), 1611-3349 Sons, Inc., New York, NY, (electronic). URL http: USA, second edition, 2003. //link.springer-ny.com/ ISBN 0-470-84402-7. xviii REFERENCES 297

+ 427 pp. LCCN TS160 fips/fips197/fips-197. .F5513 2003. URL ftp:// pdf. uiarchive.cso.uiuc.edu/ pub/etext/gutenberg/; FIPS:2001:SRC http://www.loc.gov/catdir/ [FIP01b] FIPS. Security Require- description/wiley039/2002192439. ments for Cryptographic html; http://www.loc. Modules. National In- gov/catdir/toc/wiley031/ stitute for Standards and 2002192439.html. Technology, Gaithersburg, Finnigin:2006:CPN MD 20899-8900, USA, May 25, 2001. viii + 61 pp. [Fin06] Kevin M. Finnigin. Crypt- URL http://csrc.nist. analysis of pseudorandom gov/publications/fips/ number generators in wire- fips140-2/fips1402.pdf; less sensor networks. Mas- http://csrc.nist.gov/ ter’s thesis, Department of publications/fips/fips140- Electrical and Computer 2/fips1402annexa.pdf; Engineering, Air Force Insti- http://csrc.nist.gov/publications/ tute of Technology, Wright- fips/fips140-2/fips1402annexb. Patterson AFB, OH, USA, pdf; http://csrc.nist. 2006. gov/publications/fips/ FIPS:2000:DSS fips140-2/fips1402annexc. pdf; http://csrc.nist. [FIP00] FIPS. Digital Signature gov/publications/fips/ Standard (DSS). National fips140-2/fips1402annexd. Institute for Standards and pdf. Annex A: Approved Technology, Gaithersburg, Security Functions (19 May MD 20899-8900, USA, Jan- 2005); Annex B: Ap- uary 27, 2000. ii + 74 proved Protection Profiles pp. URL http://csrc. (04 November 2004); Annex nist.gov/publications/ C: Approved Random Num- fips/fips186-2/fips186- ber Generators (31 January 2-change1.pdf. 2005); Annex D: Approved Key Establishment Tech- FIPS:2001:AES niques (30 June 2005). Su- persedes FIPS PUB 140-1, [FIP01a] FIPS. Advanced Encryption 1994 January 11. Standard (AES). National Institute for Standards FIPS:2002:KHM and Technology, Gaithers- burg, MD 20899-8900, USA, [FIP02a] FIPS. The Keyed-Hash November 26, 2001. iv + Message Authentication Code 47 pp. URL http://csrc. (HMAC). National Institute nist.gov/publications/ for Standards and Tech- REFERENCES 298

nology, Gaithersburg, MD equivalence queries with 20899-8900, USA, March applications to random- 6, 2002. vii + 13 pp. self-reductions. Theo- URL http://csrc.nist. retical Computer Science, gov/publications/fips/ 268(2):199–219, October fips198/fips-198a.pdf. 17, 2001. CODEN TC- SCDI. ISSN 0304-3975 FIPS:2002:SHS (print), 1879-2294 (elec- [FIP02b] FIPS. Secure Hash Stan- tronic). URL http: dard. National Insti- //www.elsevier.nl/gej- tute for Standards and ng/10/41/16/217/31/29/ Technology, Gaithersburg, abstract.html; http: MD 20899-8900, USA, Au- //www.elsevier.nl/gej- gust 1, 2002. iv + 79 ng/10/41/16/217/31/29/ pp. URL http://csrc. article.pdf. nist.gov/publications/ fips/fips180-2/fips180- Fischlin:2001:ICN . 2.pdf [Fis01b] Marc Fischlin. On the im- Freedman:2005:KSO possibility of constructing non-interactive statistically- [FIPR05] Michael J. Freedman, Yu- secret protocols from any val Ishai, Benny Pinkas, and trapdoor one-way func- Omer Reingold. Keyword tion. Lecture Notes in search and oblivious pseu- Computer Science, 2271: dorandom functions. In 79–??, 2001. CODEN Kilian [Kil05], pages 303– LNCSD9. ISSN 0302- ?? CODEN LNCSD9. 9743 (print), 1611-3349 ISBN 3-540-24573-1 (soft- (electronic). URL http: cover). ISSN 0302-9743 //link.springer-ny.com/ (print), 1611-3349 (elec- link/service/series/0558/ tronic). LCCN QA76.9.A25 bibs/2271/22710079.htm; T44 2005. URL http: http://link.springer- //www.springerlink.com/ ny.com/link/service/series/ openurl.asp?genre=issue& 0558/papers/2271/22710079. issn=0302-9743&volume= pdf. 3378; http://www.springerlink. com/openurl.asp?genre= Fischlin:2005:CEN volume&id=doi:10.1007/ b106171. [Fis05] Marc Fischlin. Communication- efficient non-interactive proofs Fischlin:2001:CLP of knowledge with online ex- [Fis01a] Marc Fischlin. Crypto- tractors. In Shoup [Sho05a], graphic limitations on par- pages 152–?? ISBN 3-540- allelizing membership and 28114-2. ISSN 0302-9743 REFERENCES 299

(print), 1611-3349 (elec- Ferguson:2001:ICRb tronic). LCCN QA76.9.A25 C79 2005; QA76.9 .A25; [FKL+01a] N. Ferguson, J. Kelsey, QA76.9 C79 2005; QA76.9 S. Lucks, B. Schneier, C794 2005; QA76.9; In- M. Stay, D. Wagner, ternet. URL http:/ and D. Whiting. Im- /www.springerlink.com/ proved cryptanalysis of Ri- openurl.asp?genre=issue& jndael. In Schneier [Sch01d], issn=0302-9743&volume= pages 19–?? CODEN 3621. LNCSD9. ISBN 3-540- Faugere:2003:ACH 41728-1. ISSN 0302-9743 (print), 1611-3349 (elec- [FJ03] Jean-Charles Faug`ere and tronic). LCCN QA267.A1 Antoine Joux. Algebraic L43 no. 1978. URL http: cryptanalysis of Hidden //www.counterpane.com/ Field Equation (HFE) cryp- rijndael.html; http: tosystems using Gr¨obner //www.counterpane.com/ bases. In Boneh [Bon03], rijndael.ps.zip. pages 44–60. CODEN LNCSD9. ISBN 3-540- Ferguson:2001:ICRa 40674-3. ISSN 0302-9743 [FKL+01b] Niels Ferguson, John Kelsey, (print), 1611-3349 (elec- Stefan Lucks, Bruce Schneier, tronic). LCCN QA76.9.A25 Mike Stay, David Wagner, C79 2003. URL http: and Doug Whiting. Im- //link.springer-ny.com/ proved cryptanalysis of Ri- link/service/series/0558/ jndael. Lecture Notes in tocs/t2729.htm; http: Computer Science, 1978: //www.springerlink.com/ 213–??, 2001. CODEN openurl.asp?genre=issue& LNCSD9. ISSN 0302- issn=0302-9743&volume= 9743 (print), 1611-3349 2729; http://www.springerlink. (electronic). URL http: com/openurl.asp?genre= //link.springer-ny.com/ volume&id=doi:10.1007/ link/service/series/0558/ b11817. bibs/1978/19780213.htm; Feng:2004:PEX http://link.springer- ny.com/link/service/series/ [FJ04] L. Feng and W. Jonker. 0558/papers/1978/19780213. Preparations for encrypted pdf. XML metadata querying. International Journal of Ferguson:2000:ICR Computer Systems Science and Engineering, 19(3): [FKS+00] Niels Ferguson, John Kelsey, ??, May 2004. CODEN Bruce Schneier, Mike Stay, CSSEEI. ISSN 0267-6192. David Wagner, and Doug REFERENCES 300

Whiting. Improved crypt- //link.springer-ny.com/ analysis of Rijndael (ab- link/service/series/0558/ stract only). In NIST bibs/2259/22590038.htm; [NIS00], page 9. ISBN http://link.springer- ???? LCCN ???? ny.com/link/service/series/ URL http://csrc.nist. 0558/papers/2259/22590038. gov/encryption/aes/round2/ pdf. conf3/aes3conf.htm; http: //csrc.nist.gov/encryption/ Fox:2001:PPK aes/round2/conf3/papers/ [FL01b] Barbara Fox and Brian AES3Proceedings-1.pdf; LaMacchia. Panel: Public http://csrc.nist.gov/ key infrastructure: PKIX, encryption/aes/round2/ signed XML or something conf3/papers/AES3Proceedings- else? Lecture Notes in 2.pdf; http://csrc.nist. Computer Science, 1962: gov/encryption/aes/round2/ 327–??, 2001. CODEN conf3/papers/AES3Proceedings- LNCSD9. ISSN 0302- 3.pdf; http://csrc.nist. 9743 (print), 1611-3349 gov/encryption/aes/round2/ (electronic). URL http: conf3/papers/AES3Proceedings. //link.springer-ny.com/ pdf. link/service/series/0558/ Ferguson:2000:TRR bibs/1962/19620327.htm; http://link.springer- [FKSW00] N. Ferguson, J. Kelsey, ny.com/link/service/series/ B. Schneier, and D. Wagner. 0558/papers/1962/19620327. A Twofish retreat: Related- pdf. key attacks against reduced- Faure:2006:NPK round Twofish. Twofish technical report 6, Coun- [FL06] C´edric Faure and Pierre terpane Systems, 101 East Loidreau. A new public- Minnehaha Parkway, Min- key cryptosystem based on neapolis, MN 55419, Febru- the problem of reconstruct- ary 14, 2000. ???? pp. ing p-polynomials. In Ytre- hus [Ytr06], pages 304–315. Fluhrer:2001:AES ISBN 3-540-35481-6. LCCN [FL01a] Scott Fluhrer and Stefan QA76.9.A25 I557 2005. Lucks. Analysis of the E0 Freytag:2003:VPI encryption system. Lec- ture Notes in Computer Sci- [FLA+03] Johann Christoph Frey- ence, 2259:38–48, 2001. CO- tag, Peter C. Lockemann, DEN LNCSD9. ISSN 0302- Serge Abiteboul, Michael J. 9743 (print), 1611-3349 Carey, Patricia G. Selinger, (electronic). URL http: and Andreas Heuer, edi- REFERENCES 301

tors. VLDB 2003: Proceed- Feng:2006:ISC ings of 29th International Conference on Very Large [FLY06] Dengguo Feng, Dongdai Data Bases, September 9– Lin, and Moti Yung, ed- 12, 2003, Berlin, Germany. itors. Information Secu- Morgan Kaufmann Publish- rity and Cryptology: First ers, Los Altos, CA 94022, SKLOIS Conference, CISC USA, 2003. ISBN 0-12- 2005, Beijing, China, De- 722442-4. LCCN ???? cember 15–17, 2005. Pro- ceedings, volume 3822 of Fluhrer:2002:CMB Lecture Notes in Computer [Flu02a] Scott R. Fluhrer. Crypt- Science. Springer-Verlag, analysis of the mercy block Berlin, Germany / Heidel- cipher. Lecture Notes in berg, Germany / London, Computer Science, 2355: UK / etc., 2006. CO- 28–??, 2002. CODEN DEN LNCSD9. ISBN 3-540- LNCSD9. ISSN 0302- 30855-5 (softcover). ISSN 9743 (print), 1611-3349 0302-9743 (print), 1611- (electronic). URL http: 3349 (electronic). LCCN //link.springer-ny.com/ ???? URL http:/ link/service/series/0558/ /www.springerlink.com/ bibs/2355/23550028.htm; openurl.asp?genre=issue& http://link.springer- issn=0302-9743&volume= ny.com/link/service/series/ 3822. 0558/papers/2355/23550028. Fan:2002:ETB pdf. [FLZ02] Lei Fan, Jian-Hua Li, and Fluhrer:2002:CSP Hong-Wen Zhu. An en- [Flu02b] Scott R. Fluhrer. Crypt- hancement of timestamp- analysis of the SEAL based password authentica- 3.0 pseudorandom function tion scheme. Computers family. Lecture Notes in &Security, 21(7):665–667, Computer Science, 2355: November 2002. CODEN 135–??, 2002. CODEN CPSEDU. ISSN 0167-4048 LNCSD9. ISSN 0302- (print), 1872-6208 (elec- 9743 (print), 1611-3349 tronic). URL https:// (electronic). URL http: www.sciencedirect.com/ //link.springer-ny.com/ science/article/pii/S0167404802011185. link/service/series/0558/ Fehr:2002:LVD bibs/2355/23550135.htm; http://link.springer- [FM02a] Serge Fehr and Ueli Mau- ny.com/link/service/series/ rer. Linear VSS and 0558/papers/2355/23550135. distributed commitments pdf. based on secret sharing REFERENCES 302

and pairwise checks. In Li, Robert Mullins, and Yung [Yun02a], pages 565– George Taylor. Secu- 580. CODEN LNCSD9. rity evaluation of asyn- ISBN 3-540-44050-X (pa- chronous circuits. In Wal- perback). ISSN 0302-9743 ter et al. [WKP03], pages (print), 1611-3349 (elec- 137–151. CODEN LNCSD9. tronic). LCCN QA76.9.A25 ISBN 3-540-40833-9. ISSN C79 2002. URL http:/ 0302-9743 (print), 1611- /link.springer.de/link/ 3349 (electronic). LCCN service/series/0558/bibs/ TK7895.E42. URL http: 2442/24420565.htm; http: //link.springer-ny.com/ //link.springer.de/link/ link/service/series/0558/ service/series/0558/papers/ tocs/t2779.htm; http: 2442/24420565.pdf. //www.springerlink.com/ openurl.asp?genre=issue& Fuller:2002:LRA issn=0302-9743&volume= [FM02b] Joanne Fuller and Will- 2779; http://www.springerlink. iam Millan. On linear re- com/openurl.asp?genre= dundancy in the AES S- volume&id=doi:10.1007/ box. Report 2002/111, b13240. Cryptology ePrint Archive, 2002. URL http://eprint. Fouque:2003:AUR iacr.org/2002/111.ps; http://eprint.iacr.org/ [FMP03] Pierre-Alain Fouque, Gwena¨elle 2002/111.ps.gz; http:/ Martinet, and Guillaume /eprint.iacr.org/2002/ Poupard. Attacking un- 111/. balanced RSA–CRT us- ing SPA. In Walter Franklin:2002:PAS et al. [WKP03], pages 254– [FMA02] Michael Franklin, Bongki 268. CODEN LNCSD9. Moon, and Anastassia Aila- ISBN 3-540-40833-9. ISSN maki, editors. Proceedings of 0302-9743 (print), 1611- the ACM SIGMOD Interna- 3349 (electronic). LCCN tional Conference on Man- TK7895.E42. URL http: agement of Data, June 3–6, //link.springer-ny.com/ 2002, Madison, WI, USA. link/service/series/0558/ ACM Press, New York, NY tocs/t2779.htm; http: 10036, USA, 2002. ISBN //www.springerlink.com/ ???? LCCN ???? ACM or- openurl.asp?genre=issue& der number 475020. issn=0302-9743&volume= Fournier:2003:SEA 2779; http://www.springerlink. com/openurl.asp?genre= [FML+03] Jacques J. A. Fournier, volume&id=doi:10.1007/ Simon Moore, Huiyun b13240. REFERENCES 303

Fluhrer:2001:WKS 387-24425-5; 0-387-26090-0. ???? pp. LCCN QA76.575 [FMS01] Scott Fluhrer, Itsik Mantin, .F885 2005. and Adi Shamir. Weak- Frankel:2001:ASA nesses in the key scheduling algorithm of RC4. In Serge [FMY01] Yair Frankel, Philip D. Vaudenay and Amr M. MacKenzie, and Moti Yung. Youssef, editors, Selected ar- Adaptive security for the eas in cryptography: 8th additive-sharing based proac- Annual International Work- tive RSA. Lecture Notes shop, SAC 2001, Toronto, in Computer Science, 1992: Ontario, Canada, August 240–??, 2001. CODEN 16–17, 2001: revised pa- LNCSD9. ISSN 0302- pers, volume 2259 of Lec- 9743 (print), 1611-3349 ture Notes in Computer Sci- (electronic). URL http: ence, pages 1–24. Spring- //link.springer-ny.com/ er-Verlag, Berlin, Ger- link/service/series/0558/ many / Heidelberg, Ger- bibs/1992/19920240.htm; many / London, UK / etc., http://link.springer- 2001. ISBN 3-540-43066- ny.com/link/service/series/ 0. LCCN QA76.9.A25 0558/papers/1992/19920240. S22 2001. URL http: pdf. //dl.acm.org/citation. cfm?id=694759; http: Frankel:2002:ASD //link.springer-ny.com/ link/service/series/0558/[FMY02] Yair Frankel, Philip MacKen- tocs/t2259.htm; http: zie, and Moti Yung. Adap- //www.crypto.com/papers/ tively secure distributed others/rc4_ksaproc.pdf; public-key systems. The- http://www.loc.gov/catdir/ oretical Computer Science, enhancements/fy0817/2002511206- 287(2):535–561, September d.html. 2002. CODEN TCSCDI. ISSN 0304-3975 (print), Furht:2005:MEW 1879-2294 (electronic).

[FMS05] Borivoje (Borko) Furht, Fair:2005:CST Edin Muharemagic, and Daniel Socek. Multimedia [FNRC05] Ted Fair, Michael Nord- encryption and watermark- felt, Sandra Ring, and Eric ing,volume28ofMulti- Cole. Cyber spying: tracking media systems and appli- your family’s (sometimes) cations. Springer-Verlag, secret online lives.Syn- Berlin, Germany / Heidel- gress Publishing, Inc., Rock- berg, Germany / London, land, MA, USA, 2005. xxiii UK / etc., 2005. ISBN 0- + 439 pp. URL ftp:// REFERENCES 304

uiarchive.cso.uiuc.edu/ link/service/series/0558/ pub/etext/gutenberg/; bibs/2139/21390260.htm; http://site.ebrary.com/ http://link.springer- lib/ucsc/Doc?id=10074965. ny.com/link/service/series/ 0558/papers/2139/21390260. Foster:2005:BOA pdf. [FOBH05] James C. Foster, Vitaly Os- ipov, Nish Bhalla, and Niels Forbes:2004:BRN Heinen, editors. Buffer [For04] Scott Forbes. Book re- Overflow Attacks: Detect, views: A.NETGoldMine: Exploit, Prevent.Syngress .NET Security and Cryptog- Publishing, Inc., Rockland, raphy, by Peter Thorstein- MA, USA, 2005. ISBN 1- son and G. Gnana Arun 932266-67-4. xxii + 497 Ganesh (Prentice-Hall 2004, pp. LCCN QA76.9.A25 B83 ISBN 0-13-100851-X). IEEE 2005. Foreword by Dave Ai- Security & Privacy, 2(4): tel. 10, July/August 2004. CO- Frincke:2006:ESI DEN ???? ISSN 1540- 7993 (print), 1558-4046 [FOP06] D. Frincke, S. Oudekirk, (electronic). URL http: and B. Popovsky. Edito- //csdl.computer.org/dl/ rial: Special issue on re- mags/sp/2004/04/j4010. sources for the computer se- htm. curity and information as- surance curriculum: Issue Forte:2009:DM 1. ACM Journal on Educa- tional Resources in Comput- [For09] Dario Forte. The death of ing (JERIC), 6(3):1:1–1:??, MD5. Network Security, September 2006. CODEN 2009(2):18–20, February ???? ISSN 1531-4278. 2009. CODEN NTSCF5. ISSN 1353-4858 (print), Fujisaki:2001:ROS 1872-9371 (electronic). URL [FOPS01] Eiichiro Fujisaki, Tatsuaki http://www.sciencedirect. Okamoto, David Pointcheval, com/science/article/pii/ and Jacques Stern. RSA– S1353485809700200. OAEP is secure under the Fox:2000:NTFb RSA assumption. In Kil- ian [Kil01a], pages 260– [Fox00] Robert Fox. News track: ?? ISBN 3-540-42456- Flying the rails; logging on- 3 (paperback). LCCN line hours at work; top prize: QA76.9.A25 C79 2001; embedded encryption; Dig- QA267.A1 L43 no.2139. ital Nose knows; walking UK£47.00. URL http: again via chip implant; cell- //link.springer-ny.com/ phone-free class; another REFERENCES 305

node in the crowd. Commu- ny.com/link/service/series/ nications of the Association 0558/papers/2248/22480351. for Computing Machinery, pdf. 43(5):9, May 2000. CODEN CACMA2. ISSN 0001-0782 Faugere:2009:EAD (print), 1557-7317 (elec- [FP09] Jean-Charles Faug`ere and tronic). URL http://www. Ludovic Perret. An effi- acm.org/pubs/citations/ cient algorithm for decom- journals/cacm/2000-43- posing multivariate polyno- 5/p9-fox/. mials and its applications Freking:2000:MMR to cryptography. Jour- nal of Symbolic Computa- [FP00] W. L. Freking and K. K. tion, 44(12):1676–1689, De- Parhi. Modular multipli- cember 2009. CODEN cation in the residue num- JSYCEH. ISSN 0747-7171 ber system with application (print), 1095-855X (elec- to massively-parallel public- tronic). key cryptography systems. In Conference Record of Fouque:2001:SDC the Thirty-Fourth Asilomar [FPS01] Pierre-Alain Fouque, Guil- Conference on Signals, Sys- laume Poupard, and Jacques tems and Computers, 2000, Stern. Sharing decryp- volume 2, pages 1339–1343. tion in the context of vot- IEEE Computer Society ing or lotteries. Lecture Press, 1109 Spring Street, Notes in Computer Science, Suite 300, Silver Spring, MD 1962:90–??, 2001. CO- 20910, USA, 2000. CODEN DEN LNCSD9. ISSN 0302- ???? ISSN ???? 9743 (print), 1611-3349 Fouque:2001:TCS (electronic). URL http: [FP01] Pierre-Alain Fouque and //link.springer-ny.com/ David Pointcheval. Thresh- link/service/series/0558/ old cryptosystems secure bibs/1962/19620090.htm; against chosen-ciphertext http://link.springer- attacks. Lecture Notes in ny.com/link/service/series/ Computer Science, 2248: 0558/papers/1962/19620090. 351–??, 2001. CODEN pdf. LNCSD9. ISSN 0302- Fernandes:2002:SAL 9743 (print), 1611-3349 (electronic). URL http: [FR02] Savio Fernandes and KLM //link.springer-ny.com/ Reddy. Securing applica- link/service/series/0558/ tions on Linux with PAM. bibs/2248/22480351.htm; Linux Journal, 102:??, Oc- http://link.springer- tober 2002. CODEN LI- REFERENCES 306

JOFX. ISSN 1075-3583 issn=0302-9743&volume= (print), 1938-3827 (elec- 1962. tronic). URL http:/ Franklin:2004:ACC /www.linuxjournal.com/ article.php?sid=5940. [Fra04] Matt Franklin, editor. Ad- vances in Cryptology — Fournet:2008:CSI CRYPTO 2004: 24th An- nual International Cryptol- [FR08] C´edric Fournet and Tamara ogy Conference, Santa Bar- Rezk. Cryptographically bara, California, USA, Au- sound implementations for gust 15–19, 2004. Proceed- typed information-flow se- ings, volume 3152 of Lecture curity. ACM SIGPLAN No- Notes in Computer Science. tices, 43(1):323–335, Jan- Springer-Verlag, Berlin, uary 2008. CODEN SIN- Germany / Heidelberg, Ger- ODQ. ISSN 0362-1340 many / London, UK / etc., (print), 1523-2867 (print), 2004. CODEN LNCSD9. 1558-1160 (electronic). ISBN 3-540-22668-0. ISSN 0302-9743 (print), 1611- Frankel:2001:FCI 3349 (electronic). LCCN 10.1007/b99099. URL [Fra01] Yair Frankel, editor. Fi- http://www.springerlink. nancial cryptography: 4th com/openurl.asp?genre= International Conference, issue&issn=0302-9743&volume= FC 2000, Anguilla, British 3152; http://www.springerlink. West Indies, February 20– com/openurl.asp?genre= 24, 2000: Proceedings, volume&id=doi:10.1007/ volume 1962 of Lecture b99099. Notes in Computer Science. Fremberg:2003:MAP Springer-Verlag, Berlin, Germany / Heidelberg, Ger- [Fre03] Daniel Fremberg. The many / London, UK / etc., Mithra authentication pro- 2001. CODEN LNCSD9. tocol. Dr. Dobb’s Jour- ISBN 3-540-42700-7 (soft- nal of Software Tools,28 cover). ISSN 0302-9743 (5):44, 46–48, May 2003. (print), 1611-3349 (elec- CODEN DDJOEB. ISSN tronic). LCCN QA267.A1 1044-789X. URL http:/ L43 no.1962; HG1710 /www.ddj.com/documents/ .F35 2000. URL http: s=7927/ddj0305d/. //link.springer-ny.com/ Friberg:2001:UCH link/service/series/0558/ tocs/t1962.htm; http: [Fri01] Paul Friberg. Using a cryp- //www.springerlink.com/ tographic hardware token openurl.asp?genre=issue& with Linux: The OpenSSL REFERENCES 307

project’s new engine. Linux http://www.counterpane. Journal, 89:??, Septem- com/ipsec.html; http: ber 2001. CODEN LI- //www.counterpane.com/ JOFX. ISSN 1075-3583 ipsec.pdf. (print), 1938-3827 (elec- tronic). URL http:/ Fouque:2001:FDT /www.linuxjournal.com/ [FS01a] Pierre-Alain Fouque and articles/style/0006.html. Jacques Stern. Fully dis- Web only. tributed threshold RSA Frith:2007:SAO under standard assump- tions. Lecture Notes in [Fri07] David Frith. Steganogra- Computer Science, 2248: phy approaches, options, 310–??, 2001. CODEN and implications. Net- LNCSD9. ISSN 0302- work Security, 2007(8):4– 9743 (print), 1611-3349 7, August 2007. CODEN (electronic). URL http: NTSCF5. ISSN 1353-4858 //link.springer-ny.com/ (print), 1872-9371 (elec- link/service/series/0558/ tronic). URL http:// bibs/2248/22480310.htm; www.sciencedirect.com/ http://link.springer- science/article/pii/S1353485807700715. ny.com/link/service/series/ 0558/papers/2248/22480310. Frykholm:2000:CAB pdf. [Fry00] Niklas Frykholm. Coun- Friedlander:2001:DDH termeasures against buffer overflow attacks. Tech- [FS01b] John B. Friedlander and nical report, RSA Data Igor E. Shparlinski. On Security, Inc., Redwood the distribution of Diffie– City, CA, USA, Novem- Hellman triples with sparse ber 30, 2000. URL exponents. SIAM Journal http://www.rsasecurity. on Discrete Mathematics,14 com/rsalabs/technotes/ (2):162–169, 2001. CODEN buffer/buffer_overflow. SJDMEC. ISSN 0895-4801 html. (print), 1095-7146 (elec- tronic). URL http:// Ferguson:2000:CEI epubs.siam.org/sam-bin/ [FS00] N. Ferguson and B. Schneier. dbq/article/36174. A cryptographic evaluation Furukawa:2001:ESP of IPsec. Technical re- port, Counterpane Internet [FS01c] Jun Furukawa and Kazue Security, 3031 Tisch Way, Sako. An efficient scheme Suite 100PE, San Jose, CA for proving a shuffle. In 95128, USA, 2000. URL Kilian [Kil01a], pages 368– REFERENCES 308

?? ISBN 3-540-42456- Sons, Inc., New York, NY, 3 (paperback). LCCN USA, 2003. ISBN 0-471- QA76.9.A25 C79 2001; 22894-X (hardcover), 0-471- QA267.A1 L43 no.2139. 22357-3 (paperback). xx + UK£47.00. URL http: 410 pp. LCCN QA76.9.A25 //link.springer-ny.com/ F466 2003. URL http: link/service/series/0558/ //www.counterpane.com/ bibs/2139/21390368.htm; book-practical.html; http://link.springer- http://www.loc.gov/catdir/ ny.com/link/service/series/ bios/wiley044/2003276249. 0558/papers/2139/21390368. html; http://www.loc. pdf. gov/catdir/description/ wiley036/2003276249.html; Fischer:2002:NFC http://www.loc.gov/catdir/ [FS02] Wieland Fischer and Jean- toc/wiley032/2003276249. Pierre Seifert. Note on html. fast computation of secret Fundulaki:2004:SYD RSA exponents. Lecture [FS04] Irini Fundulaki and Arnaud Notes in Computer Science, Sahuguet. “share your data, 2384:136–??, 2002. CO- keep your secrets”. In ACM DEN LNCSD9. ISSN 0302- [ACM04a], pages 945–946. 9743 (print), 1611-3349 ISBN 1-58113-859-8. LCCN (electronic). URL http: QA76.9.D3. //link.springer-ny.com/ link/service/series/0558/ Fortnow:2008:IIC bibs/2384/23840136.htm; [FS08] Lance Fortnow and Rahul http://link.springer- Santhanam. Infeasibility ny.com/link/service/series/ of instance compression and 0558/papers/2384/23840136. succinct PCPs for NP. In pdf. ACM [ACM08], pages 133– Ferguson:2003:CEI 142. ISBN 1-60558-047-3. LCCN QA76.6 .A152 2008. [FS03a] Niels Ferguson and Bruce Schneier. A cryptographic Fuster-Sabater:2001:EAG evaluation of IPsec. Un- [FSGV01] A. F´uster-Sabater and L. J. known, 2003. URL https:/ Garc´ıa-Villalba. An effi- /www.schneier.com/paper- cient algorithm to generate ipsec.html. binary sequences for cryp- Ferguson:2003:PC tographic purposes. The- oretical Computer Science, [FS03b] Niels Ferguson and Bruce 259(1–2):679–688, May 28, Schneier. Practical Cryp- 2001. CODEN TC- tography. John Wiley and SCDI. ISSN 0304-3975 REFERENCES 309

(print), 1879-2294 (elec- analysis of some modern tronic). URL http: blockciphers. Thesis (Mas- //www.elsevier.nl/gej- ter’s), Faculty of Computer ng/10/41/16/202/21/54/ Science, Technion — Is- abstract.html; http: rael Institute of Technology, //www.elsevier.nl/gej- Haifa, Israel, 2001. 75 pp. ng/10/41/16/202/21/54/ article.pdf. Furman:2002:DCN Fu:2001:DCA [Fur02a] Vladimir Furman. Differ- ential cryptanalysis of Nim- [FSSF01] Kevin Fu, Emil Sit, Kendra bus. Lecture Notes in Smith, and Nick Feam- Computer Science, 2355: ster. The dos and don’ts of 187–??, 2002. CODEN client authentication on the LNCSD9. ISSN 0302- Web. In USENIX [USE01c], 9743 (print), 1611-3349 page ?? ISBN 1-880446- (electronic). URL http: 18-9, 1-880446-07-3. LCCN //link.springer-ny.com/ QA76.9.A25 U565 2001. link/service/series/0558/ URL http://www.usenix. bibs/2355/23550187.htm; org/publications/library/ http://link.springer- proceedings/sec01/fu.html. ny.com/link/service/series/ 0558/papers/2355/23550187. Ferguson:2001:SAR pdf. [FSW01] Niels Ferguson, Richard Furuya:2002:SAK Schroeppel, and Doug Whit- ing. A simple alge- [Fur02b] Soichi Furuya. Slide attacks braic representation of Ri- with a known-plaintext jndael. Lecture Notes in cryptanalysis. Lecture Notes Computer Science, 2259: in Computer Science, 2288: 103–??, 2001. CODEN 214–??, 2002. CODEN LNCSD9. ISSN 0302- LNCSD9. ISSN 0302- 9743 (print), 1611-3349 9743 (print), 1611-3349 (electronic). URL http: (electronic). URL http: //link.springer-ny.com/ //link.springer-ny.com/ link/service/series/0558/ link/service/series/0558/ bibs/2259/22590103.htm; bibs/2288/22880214.htm; http://link.springer- http://link.springer- ny.com/link/service/series/ ny.com/link/service/series/ 0558/papers/2259/22590103. 0558/papers/2288/22880214. pdf. pdf. Furman:2001:CSM Furnell:2005:AOW

[Fur01] Vladimir Furman. Crypt- [Fur05] Steven Furnell. Authenti- REFERENCES 310

cating ourselves: will we Germany / Heidelberg, Ger- ever escape the password? many / London, UK / etc., Network Security, 2005(3): 2009. ISBN 0-387-76481- 8–13, March 2005. CODEN X (e-book), 0-387-76480-1 NTSCF5. ISSN 1353-4858 (hardcover). LCCN TK6553 (print), 1872-9371 (elec- .R45 2008eb. URL http: tronic). URL http:// //www.springerlink.com/ www.sciencedirect.com/ content/q1160h1036371331/ science/article/pii/S1353485805002126. . Fouque:2003:DAW Fan:2008:RSB [FV03] Pierre-Alain Fouque and [FWL08] Ming-Quan Fan, Hong-Xia Frederic Valette. The Wang, and Sheng-Kun Li. doubling attack — why Restudy on SVD-based wa- upwards is better than termarking scheme. Applied downwards. In Walter Mathematics and Com- et al. [WKP03], pages 269– putation, 203(2):926–930, 280. CODEN LNCSD9. September 15, 2008. CO- ISBN 3-540-40833-9. ISSN DEN AMHCBQ. ISSN 0302-9743 (print), 1611- 0096-3003 (print), 1873- 3349 (electronic). LCCN 5649 (electronic). TK7895.E42. URL http: //link.springer-ny.com/ Feng:2005:NMS link/service/series/0558/ [FWTC05] Jen-Bang Feng, Hsien-Chu tocs/t2779.htm; http: Wu, Chwei-Shyong Tsai, //www.springerlink.com/ and Yen-Ping Chu. A new openurl.asp?genre=issue& multi-secret images sharing issn=0302-9743&volume= scheme using Lagrange’s in- 2779; http://www.springerlink. terpolation. The Journal com/openurl.asp?genre= of Systems and Software, volume&id=doi:10.1007/ 76(3):327–339, June 2005. b13240. CODEN JSSODM. ISSN Feldhofer:2009:HIS 0164-1212 (print), 1873- 1228 (electronic). [FW09] Martin Feldhofer and Jo- hannes Wolkerstorfer. Hard- Fitzi:2004:PSB ware implementation of symmetric algorithms for [FWW04] Matthias Fitzi, Stefan Wolf, RFID security. In Paris Kit- and J¨urg Wullschleger. sos and Yan Zhang, editors, Pseudo-signatures, broad- RFID Security: Techniques, cast, and multi-party com- Protocols and System-on- putation from correlated Chip Design, pages 373– randomness. In Franklin 415. Springer-Verlag, Berlin, [Fra04], pages 562–?? CO- REFERENCES 311

DEN LNCSD9. ISBN 3-540- high performance recon- 22668-0. ISSN 0302-9743 figurable Triple DES pro- (print), 1611-3349 (elec- cessor. In Han et al. tronic). LCCN 10.1007/b99099. [HYZ05b], pages 110–?? URL http://www.springerlink. ISBN 981-270-153-2. LCCN com/openurl.asp?genre= ???? URL http:// issue&issn=0302-9743&volume= eproceedings.worldscinet. 3152; http://www.springerlink. com/9812701532/9812701532. com/openurl.asp?genre= 0031.html. volume&id=doi:10.1007/ Gross-Amblard:2003:QPW b99099. [GA03] David Gross-Amblard. Query- Fan:2004:PPI preserving watermarking of [FXAM04] Jinliang Fan, Jun Xu, relational databases and Mostafa H. Ammar, and XML documents. In Sue B. Moon. Prefix- ACM [ACM03c], pages 191– preserving IP address anonymiza- 201. ISBN 1-58113-670- tion: measurement-based 6. LCCN QA76.9.D3 A296 security evaluation and 2003. ACM order number a new cryptography-based 475030. scheme. Computer Net- Gang:2005:CNI works (Amsterdam, Nether- lands: 1999), 46(2):253– [GA05] Litao Gang and Ali N. 272, October 7, 2004. CO- Akansu. Cover noise inter- DEN ???? ISSN 1389-1286 ference suppression in multi- (print), 1872-7069 (elec- media data hiding. Interna- tronic). tional Journal of Image and Graphics (IJIG), 5(1):191– Furnell:2006:RPS ??, January 2005. CODEN ???? ISSN 0219-4678. [FZ06] Steven Furnell and Leith Zekri. Replacing passwords: Galbraith:2001:SCC in search of the secret rem- [Gal01] Steven D. Galbraith. Su- edy. Network Security, 2006 persingular curves in cryp- (1):4–8, January 2006. CO- tography. Lecture Notes DEN NTSCF5. ISSN 1353- in Computer Science, 2248: 4858 (print), 1872-9371 495–??, 2001. CODEN (electronic). URL http:/ LNCSD9. ISSN 0302- /www.sciencedirect.com/ 9743 (print), 1611-3349 . science/article/pii/S135348580670321X (electronic). URL http: Fu:2005:DHP //link.springer-ny.com/ link/service/series/0558/ [FZH05] Yongzhi Fu, Xuejie Zhang, bibs/2248/22480495.htm; and Lin Hao. Design of http://link.springer- REFERENCES 312

ny.com/link/service/series/ Washington, DC, USA, 0558/papers/2248/22480495. 2001. ISBN 1-57488-367-4, pdf. 1-57488-473-5, 1-61234-207- 8. xi + 324 pp. LCCN JF Galbreath:2002:CID 1525 .I6G36 2001X ROBA; [Gal02] Nicholas Galbreath. Cryp- JF1525.I6 G36 2001. tography for Internet and Ganti:2008:PAL database applications: de- veloping secret and public [Gan08] Ashwin Ganti. Plan 9 au- key techniques with Java. thentication in Linux. Op- John Wiley and Sons, Inc., erating Systems Review,42 New York, NY, USA, 2002. (5):27–33, July 2008. CO- ISBN 0-471-21029-3. 400 DEN OSRED8. ISSN 0163- pp. LCCN QA76.9.A25 G35 5980 (print), 1943-586X 2002. (electronic). Gallo:2003:SST Garrett:2001:MBC [Gal03] Vince Gallo. Secret steganography techniques [Gar01] Paul B. Garrett. Making, revealed. Network Security, breaking codes: an introduc- 2003(2):4–8, February 2003. tion to cryptology.Pren- CODEN NTSCF5. ISSN tice-Hall, Inc., Upper Saddle 1353-4858 (print), 1872- River, NJ 07458, USA, 2001. 9371 (electronic). URL ISBN 0-13-030369-0. xix + http://www.sciencedirect. 524 pp. LCCN QA268 .G37 com/science/article/pii/ 2001. S1353485803002095. Garfinkel:2003:EBI Ganger:2001:AC [Gar03a] Simson L. Garfinkel. Email- [Gan01a] G. R. Ganger. Au- based identification and au- thentication confidences. thentication: An alterna- In IEEE [IEE01b], page tive to PKI? IEEE Secu- 169. ISBN 0-7695-1040- rity & Privacy, 1(6):20–26, X. US$135.00. URL http: November/December 2003. //computer.org/CSPRESS/ CODEN ???? ISSN 1540- CATALOG/pr01040.htm. IEEE 7993 (print), 1558-4046 catalog number PR01040. (electronic). URL http:// Gannon:2001:SST csdl.computer.org/comp/ mags/sp/2003/06/j6020abs. [Gan01b] James Gannon. Steal- htm; http://csdl.computer. ing Secrets, Telling Lies: org/dl/mags/sp/2003/06/ How Spies and Codebreak- j6020.htm; http://csdl. ers Helped Shape the Twen- computer.org/dl/mags/sp/ tieth Century. Brassey’s, 2003/06/j6020.pdf. REFERENCES 313

Garman:2003:KDG 32(2):5–6, June 2001. CO- DEN SIGNDM. ISSN 0163- [Gar03b] Jason Garman. Kerberos: 5700 (print), 1943-5827 the definitive guide. O’Reilly (electronic). See [Kah67a, & Associates, Inc., 103a Kah67b, Kah74, Kah96]. Morris Street, Sebastopol, CA 95472, USA, Tel: +1 Gaudry:2002:CCS 707 829 0515, and 90 Sher- [Gau02] Pierrick Gaudry. A com- man Street, Cambridge, MA parison and a combination 02140, USA, Tel: +1 617 of SST and AGM algo- 354 5800, 2003. ISBN 0- rithms for counting points 596-00403-6. xiv + 253 pp. of elliptic curves in char- LCCN TK5105.59 .G375 acteristic 2. Lecture Notes 2003. URL http://www. in Computer Science, 2501: oreilly.com/catalog/9780596004033. 311–??, 2002. CODEN Garrett:2004:MCT LNCSD9. ISSN 0302-9743 (print), 1611-3349 (elec- [Gar04] Paul B. Garrett. The mathe- tronic). URL http:// matics of coding theory: in- link.springer.de/link/ formation, compression, er- service/series/0558/bibs/ ror correction, and finite 2501/25010311.htm; http: fields. Prentice-Hall, Inc., //link.springer.de/link/ Upper Saddle River, NJ service/series/0558/papers/ 07458, USA, 2004. ISBN 0- 2501/25010311.pdf. 13-101967-8. x + 398 pp. LCCN QA275 .G26 2003. Gavinsky:2008:CIC Garrett:2005:CP [Gav08] Dmitry Gavinsky. Classical interaction cannot replace [Gar05] Paul Garrett. Crypto- a quantum message. In graphic primitives. In Gar- ACM [ACM08], pages 95– rettandLieman[GL05], 102. ISBN 1-60558-047-3. pages 1–62. ISBN 0-8218- LCCN QA76.6 .A152 2008. 3365-0. LCCN QA76.9.A25 P82 2005. URL http:// Guinee:2009:NTR www.loc.gov/catdir/toc/ [GB09] R. A. Guinee and M. Blaszczyk. fy0612/2005048178.html. A novel true random bi- Gasarch:2001:BRBa nary sequence generator based on a chaotic dou- [Gas01] William Gasarch. Book re- ble scroll oscillator combina- view: The Codebreakers: tion with a pseudo random the Story of Secret Writ- generator for cryptographic ing, by David Kahn. Scrib- applications. In ICITST ner. ACM SIGACT News, 2009. International Con- REFERENCES 314

ference for Internet Tech- Gaj:2000:CHP nology and Secured Trans- actions, 2009, pages 1– [GC00a] Kris Gaj and Pawel Chodowiec. 6. IEEE Computer Society Comparison of the hard- Press, 1109 Spring Street, ware performance of the Suite 300, Silver Spring, MD AES candidates using re- 20910, USA, 2009. URL configurable hardware. In http://ieeexplore.ieee. NIST [NIS00], pages 40–56. org/stamp/stamp.jsp?tp= ISBN ???? LCCN ???? &arnumber=5402536. URL http://csrc.nist. gov/encryption/aes/round2/ Guajardo:2001:EIE conf3/aes3conf.htm; http: //csrc.nist.gov/encryption/ [GBKP01] Jorge Guajardo, Rainer aes/round2/conf3/papers/ Bl¨umel, Uwe Krieger, and AES3Proceedings-1.pdf; Christof Paar. Efficient http://csrc.nist.gov/ implementation of elliptic encryption/aes/round2/ curve cryptosystems on the conf3/papers/AES3Proceedings- TI MSP430x33x family of 2.pdf; http://csrc.nist. microcontrollers. Lecture gov/encryption/aes/round2/ Notes in Computer Sci- conf3/papers/AES3Proceedings- ence, 1992:365–382, 2001. 3.pdf; http://csrc.nist. CODEN LNCSD9. ISSN gov/encryption/aes/round2/ 0302-9743 (print), 1611- conf3/papers/AES3Proceedings. 3349 (electronic). pdf. Golic:2002:LCB Goubin:2000:CTC

[GBM02] Jovan Dj. Goli´c, Vittorio [GC00b] Louis Goubin and Nicolas T. Bagini, and Guglielmo Mor- Courtois. Cryptanalysis gari. Linear cryptanaly- of the TTM cryptosystem. sis of Bluetooth stream ci- Lecture Notes in Computer pher. Lecture Notes in Science, 1976:44–57, 2000. Computer Science, 2332: CODEN LNCSD9. ISSN 238–??, 2002. CODEN 0302-9743 (print), 1611- LNCSD9. ISSN 0302- 3349 (electronic). 9743 (print), 1611-3349 Gaj:2001:FIF (electronic). URL http: //link.springer-ny.com/ [GC01a] Kris Gaj and Pawel Chodowiec. link/service/series/0558/ Fast implementation and bibs/2332/23320238.htm; fair comparison of the fi- http://link.springer- nal candidates for Advanced ny.com/link/service/series/ Encryption Standard us- 0558/papers/2332/23320238. ing field programmable gate pdf. arrays. In Topics in REFERENCES 315

cryptology—CT-RSA 2001 34–43, July 2005. CODEN (San Francisco, CA),vol- OSRED8. ISSN 0163-5980 ume 2020 of Lecture Notes (print), 1943-586X (elec- in Comput. Sci., pages 84– tronic). 99. Springer-Verlag, Berlin, Germany / Heidelberg, Ger- Gordon:2008:CFS many / London, UK / [GCKL08] Dov S. Gordon, Hazay Car- etc., 2001. URL http: mit, Jonathan Katz, and //link.springer-ny.com/ Yehuda Lindell. Complete link/service/series/0558/ fairness in secure two-party bibs/2020/20200084.htm; computation. In ACM http://link.springer- [ACM08], pages 413–422. ny.com/link/service/series/ ISBN 1-60558-047-3. LCCN 0558/papers/2020/20200084. QA76.6 .A152 2008. pdf. Gligor:2002:FEA Goodman:2001:EER [GD02] Virgil D. Gligor and Pom- [GC01b] James Goodman and Anan- piliu Donescu. Fast en- tha Chandrakasan. An cryption and authentica- energy efficient reconfig- tion: XCBC encryption urable public-key cryptog- and XECB authentication raphy processor architec- modes. Lecture Notes in ture. Lecture Notes in Computer Science, 2355: Computer Science, 1965: 92–??, 2002. CODEN 175–??, 2001. CODEN LNCSD9. ISSN 0302- LNCSD9. ISSN 0302- 9743 (print), 1611-3349 9743 (print), 1611-3349 (electronic). URL http: (electronic). URL http: //link.springer-ny.com/ //link.springer-ny.com/ link/service/series/0558/ link/service/series/0558/ bibs/2355/23550092.htm; bibs/1965/19650175.htm; http://link.springer- http://link.springer- ny.com/link/service/series/ ny.com/link/service/series/ 0558/papers/2355/23550092. 0558/papers/1965/19650175. pdf. pdf. Gennaro:2005:SMS Guerrero:2005:ECB [GD05] Rosario Gennaro and Mario [GC05] Jorge Herrer´ıas Guerrero Di Raimondo. Secure mul- and Roberto G´omez C´ardenas. tiplication of shared secrets An example of communica- in the exponent. Informa- tion between security tools: tion Processing Letters,96 IPTables — Snort. Operat- (2):71–79, October 31, 2005. ing Systems Review, 39(3): CODEN IFPLAT. ISSN REFERENCES 316

0020-0190 (print), 1872- pages 469–?? ISBN 3-540- 6119 (electronic). 67907-3. ISSN 0302-9743 (print), 1611-3349 (elec- Gebotys:2004:DSC tronic). LCCN QA76.9.A25 C79 2000 Bar. URL http: [Geb04] Catherine H. Gebotys. De- //link.springer-ny.com/ sign of secure cryptography link/service/series/0558/ against the threat of power- bibs/1880/18800469.htm; attacks in DSP-embedded http://link.springer- processors. ACM Transac- ny.com/link/service/series/ tions on Embedded Comput- 0558/papers/1880/18800469. ing Systems, 3(1):92–113, pdf. February 2004. CODEN ???? ISSN 1539-9087 Gengler:2001:PPS (print), 1558-3465 (elec- tronic). [Gen01] Barbara Gengler. - ton poll shows 56% favour Geier:2003:LCC crypto regulations. Net- work Security, 2001(11):5– [Gei03] M. J. Geier. Lights, camera, 6, November 30, 2001. CO- controls! [dvd copying pre- DEN NTSCF5. ISSN 1353- vention]. IEEE Spectrum,40 4858 (print), 1872-9371 (5):28–31, May 2003. CO- (electronic). URL http:/ DEN IEESAM. ISSN 0018- /www.sciencedirect.com/ 9235 (print), 1939-9340 science/article/pii/S1353485801011126. (electronic). Gentry:2003:CBE Gengler:2000:UPC [Gen03] Craig Gentry. Certificate- [Gen00a] Barbara Gengler. US Pres- based encryption and the ident Clinton signs Digi- certificate revocation prob- tal Signature Bill. Net- lem. Lecture Notes in work Security, 2000(9):7–8, Computer Science, 2656: September 1, 2000. CODEN 272–293, 2003. CODEN NTSCF5. ISSN 1353-4858 LNCSD9. ISSN 0302-9743 (print), 1872-9371 (elec- (print), 1611-3349 (elec- tronic). URL http:// tronic). URL http://link. www.sciencedirect.com/ springer.com/content/pdf/ science/article/pii/S1353485800090231. 10.1007/3-540-39200-9_ 17.pdf. Gennaro:2000:IPR Gennaro:2004:MTC [Gen00b] Rosario Gennaro. An im- proved pseudo-random gen- [Gen04a] Rosario Gennaro. Multi- erator based on discrete trapdoor commitments and log. In Bellare [Bel00], their applications to proofs REFERENCES 317

of knowledge secure un- Gentry:2009:FHEa der concurrent man-in- the-middle attacks. In [Gen09a] Craig Gentry. A fully homo- Franklin [Fra04], pages 220– morphic encryption scheme. ?? CODEN LNCSD9. Ph.d. thesis, Department ISBN 3-540-22668-0. ISSN of Computer Science, Stan- 0302-9743 (print), 1611- ford University, Stanford, 3349 (electronic). LCCN CA, USA, 2009. x + 199 10.1007/b99099. URL pp. URL http://crypto. http://www.springerlink. stanford.edu/craig/; com/openurl.asp?genre= http://crypto.stanford. issue&issn=0302-9743&volume= edu/craig/craig-thesis. 3152; http://www.springerlink. pdf. com/openurl.asp?genre= Gentry:2009:FHEb volume&id=doi:10.1007/ b99099. [Gen09b] Craig Gentry. Fully ho- Gentry:2004:HCR momorphic encryption us- ing ideal lattices. In ACM [Gen04b] Craig Gentry. How to com- [ACM09], pages 169–178. press Rabin ciphertexts and ISBN 1-60558-613-7. LCCN signatures (and more). In QA75.5 .A22 2009. Franklin [Fra04], pages 179– Giuliani:2001:GLI ?? CODEN LNCSD9. ISBN 3-540-22668-0. ISSN [GG01] Kenneth J. Giuliani and 0302-9743 (print), 1611- Guang Gong. Generating 3349 (electronic). LCCN large instances of the Gong– 10.1007/b99099. URL Harn cryptosystem. Lecture http://www.springerlink. Notes in Computer Science, com/openurl.asp?genre= 2260:317–??, 2001. CO- issue&issn=0302-9743&volume= DEN LNCSD9. ISSN 0302- 3152; http://www.springerlink. 9743 (print), 1611-3349 com/openurl.asp?genre= (electronic). URL http: volume&id=doi:10.1007/ //link.springer-ny.com/ b99099. link/service/series/0558/ bibs/2260/22600317.htm; Gennaro:2006:RC http://link.springer- [Gen06] Rosario Gennaro. Random- ny.com/link/service/series/ ness in cryptography. IEEE 0558/papers/2260/22600317. Security & Privacy, 4(2):64– pdf. 67, March/April 2006. CO- Goldstone:2005:FCR DEN ???? ISSN 1540-7993 (print), 1558-4046 (elec- [GG05a] Lawrence Goldstone and tronic). Nancy Bazelon Goldstone. REFERENCES 318

The Friar and the Cipher: Goldwasser:2008:CAP Roger Bacon and the Un- + solved Mystery of the Most [GGH 08] Shafi Goldwasser, Dan Gut- Unusual Manuscript in the freund, Alexander Healy, World. Doubleday, New Tali Kaufman, and Guy N. York, NY, USA, 2005. ISBN Rothblum. A (de)constructive 0-7679-1473-2. xi + 320 approach to program check- pp. LCCN Z105.5.V65 G65 ing. In ACM [ACM08], 2005. URL http://www. pages 143–152. ISBN 1- loc.gov/catdir/bios/random056/ 60558-047-3. LCCN QA76.6 2004050164.html; http: .A152 2008. //www.loc.gov/catdir/description/ Gennaro:2003:LBE random051/2004050164.html; http://www.loc.gov/catdir/[GGK03] Rosario Gennaro, Yael Gert- enhancements/fy0618/2004050164- ner, and Jonathan Katz. s.html. Lower bounds on the ef- ficiency of encryption and Golomb:2005:SDG digital signature schemes. In ACM [ACM03b], pages 417– [GG05b] Solomon W. (Solomon Wolf) 425. ISBN ???? LCCN Golomb and Guang Gong. QA75.5 .A22 2003. ACM or- Signal design for good cor- der number 508030. relation for wireless com- Gennaro:2005:BEG munication, cryptography, and radar. Cambridge Uni- [GGKT05] Rosario Gennaro, Yael Gert- versity Press, Cambridge, ner, Jonathan Katz, and UK, 2005. ISBN 0-521- Luca Trevisan. Bounds 82104-5 (hardcover). xviii + on the efficiency of generic 438 pp. LCCN TK5102.92 cryptographic constructions. .G65 2005. URL http:// SIAM Journal on Com- www.loc.gov/catdir/toc/ puting, 35(1):217–246, ???? ecip057/2005002719.html. 2005. CODEN SMJCAT. ISSN 0097-5397 (print), Gambino:2008:ITW 1095-7111 (electronic). Grothoff:2009:TBS [GG08] Nicola Gambino and Rich- ard Garner. The identity [GGS+09] Christian Grothoff, Krista type weak factorisation sys- Grothoff, Ryan Stutsman, tem. Theoretical Computer Ludmila Alkhutova, and Science, 409(1):94–109, De- Mikhail Atallah. Translation- cember 6, 2008. CODEN based steganography. Jour- TCSCDI. ISSN 0304-3975 nal of Computer Security, (print), 1879-2294 (elec- 17(3):269–303, ???? 2009. tronic). CODEN JCSIET. ISSN REFERENCES 319

0926-227X (print), 1875- UK / etc., 2005. CO- 8924 (electronic). DEN LNCSD9. ISBN 3-540- 26541-4. ISSN 0302-9743 Gilbert:2002:SCL (print), 1611-3349 (elec- [GH02] Gerald Gilbert and Mich- tronic). LCCN QA76.9.A25 ael Hamrick. Secrecy, F77 2005. URL http: computational loads and //www.springerlink.com/ rates in practical quan- openurl.asp?genre=issue& tum cryptography. Al- issn=0302-9743&volume= gorithmica, 34(4):314–339, 3557. November 2002. CODEN Galindo:2008:SPK ALGOEJ. ISSN 0178- [GH08] David Galindo and Javier 4617 (print), 1432-0541 Herranz. On the secu- (electronic). URL http: rity of public key cryptosys- //www.springerlink.com/ tems with a double decryp- openurl.asp?genre=article& tion mechanism. Infor- issn=0178-4617&volume= mation Processing Letters, 34&issue=4&spage=314. Quan- 108(5):279–283, November tum computation and quan- 15, 2008. CODEN IF- tum cryptography. PLAT. ISSN 0020-0190 Gross:2004:MNh (print), 1872-6119 (elec- tronic). [GH04] Benedict H. Gross and Joe Harris. The Magic of Num- Ghafarian:2007:IPU bers. Pearson Education, [Gha07] Ahmad Ghafarian. Ideas for Upper Saddle River, NJ, projects in undergraduate USA, 2004. ISBN 0-13- information assurance and 177721-1. xiv + 287 pp. security courses. SIGCSE LCCN QA39.3 .G76 2003. Bulletin (ACM Special In- Gilbert:2005:FSE terest Group on Computer Science Education), 39(3): [GH05] Henri Gilbert and He- 322, September 2007. CO- lena Handschuh, editors. DEN SIGSD3. ISSN 0097- Fast Software Encryption: 8418 (print), 2331-3927 12th International Work- (electronic). Proceedings of shop, FSE 2005, Paris, the 12th Annual SIGCSE France, February 21–23, Conference on Innovation 2005, Revised Selected Pa- and Technology in Com- pers, volume 3557 of Lec- puter Science Education ture Notes in Computer (ITiCSE’07). Science. Springer-Verlag, Gonzales:2000:LBC Berlin, Germany / Heidel- berg, Germany / London, [GHdGSS00] Octavio A. Gonzales, Gun- REFERENCES 320

hee Han, Jos´e Pineda [Sch01d], page ?? CO- de Gyvez, and Edgar DEN LNCSD9. ISBN 3-540- S´anchez-Sinencio. Lorenz- 41728-1. ISSN 0302-9743 based chaotic cryptosys- (print), 1611-3349 (elec- tem: a monolithic imple- tronic). LCCN QA267.A1 mentation. IEEE Trans. L43 no. 1978. URL http: Circuits Systems I Fund. //link.springer-ny.com/ Theory Appl., 47(8):1243– link/service/series/0558/ 1247, 2000. CODEN IT- tocs/t1978.htm; http: CAEX. ISSN 1057-7122 //www.springerlink.com/ (print), 1558-1268 (elec- openurl.asp?genre=issue& tronic). issn=0302-9743&volume= 1978. Gilbert:2000:SAR Gaudry:2006:ACM [GHJV00] Henri Gilbert, Helena Hand- [GHK+06] P. Gaudry, T. Houtmann, schuh, Antoine Joux, and D. Kohel, C. Ritzenthaler, Serge Vaudenay. A statis- and A. Weng. The 2-adic tical attack on RC6 (ab- CM method for genus 2 stract only). In NIST curves with application to [NIS00], page 10. ISBN cryptography. Lecture Notes ???? LCCN ???? in Computer Science, 4284: URL http://csrc.nist. 114–129, 2006. CODEN gov/encryption/aes/round2/ LNCSD9. ISSN 0302-9743 conf3/aes3conf.htm; http: (print), 1611-3349 (elec- //csrc.nist.gov/encryption/ tronic). URL http://link. aes/round2/conf3/papers/ springer.com/content/pdf/ AES3Proceedings-1.pdf; 10.1007/11935230_8.pdf. http://csrc.nist.gov/ encryption/aes/round2/ Grabner:2005:ALC conf3/papers/AES3Proceedings-[GHPT05] Peter J. Grabner, Clemens 2.pdf; http://csrc.nist. Heuberger, Helmut Prodinger, gov/encryption/aes/round2/ and J¨org M. Thuswaldner. conf3/papers/AES3Proceedings- Analysis of linear combi- 3.pdf; http://csrc.nist. nation algorithms in cryp- gov/encryption/aes/round2/ tography. ACM Transac- conf3/papers/AES3Proceedings. tions on Algorithms, 1(1): pdf. 123–142, July 2005. CO- Gilbert:2001:SAR DEN ???? ISSN 1549-6325 (print), 1549-6333 (elec- [GHJV01] H. Gilbert, H. Handschuh, tronic). A. Joux, and Serge Vau- Gong:2001:GPK denay. A statistical at- tack on RC6. In Schneier [GHW01] Guang Gong, Lein Harn, REFERENCES 321

and Huapeng Wu. The com/openurl.asp?genre= GH public-key cryptosys- issue&issn=0302-9743&volume= tem. Lecture Notes in 2442. Computer Science, 2259: Gillespie:2007:WSC 284–??, 2001. CODEN LNCSD9. ISSN 0302- [Gil07] Tarleton Gillespie. Wired 9743 (print), 1611-3349 shut: copyright and the (electronic). URL http: shape of digital culture. //link.springer-ny.com/ MIT Press, Cambridge, link/service/series/0558/ MA, USA, 2007. ISBN bibs/2259/22590284.htm; 0-262-07282-3. 420 (est.) http://link.springer- pp. LCCN K1447.15 ny.com/link/service/series/ .G55 2007. URL http:// 0558/papers/2259/22590284. www.loc.gov/catdir/toc/ pdf. ecip0620/2006030129.html. Gennaro:2001:RCV Giraud:2006:RIR [GIKR01] Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, and [Gir06] C. Giraud. An RSA imple- Tal Rabin. The round com- mentation resistant to fault plexity of verifiable secret attacks and to simple power sharing and secure multi- analysis. IEEE Transac- cast. In ACM [ACM01a], tions on Computers, 55(9): pages 580–589. ISBN 1- 1116–1120, September 2006. 58113-349-9. LCCN QA76.6 CODEN ITCOB4. ISSN .A13 2001. ACM order num- 0018-9340 (print), 1557- ber 508010. 9956 (electronic). URL http://ieeexplore.ieee. Gennaro:2002:RSM org/stamp/stamp.jsp?tp= [GIKR02] Rosario Gennaro, Yuval &arnumber=1668039. Ishai, Eyal Kushilevitz, and Gebhardt:2005:NPV Tal Rabin. On 2-round se- cure multiparty computa- [GIS05] M. Gebhardt, G. Illies, and tion. In Yung [Yun02a], W. Schindler. A note on pages 178–193. CODEN the practical value of sin- LNCSD9. ISBN 3-540- gle hash function collisions 44050-X (paperback). ISSN for special file formats. In 0302-9743 (print), 1611- NIST Cryptographic Hash 3349 (electronic). LCCN Workshop 2005, page ?? QA76.9.A25 C79 2002. URL ????, ????, 2005. ISBN http://link.springer-ny. ???? LCCN ???? com/link/service/series/ URL http://csrc.nist. 0558/tocs/t2442.htm; gov/pki/HashWorkshop/2005/ http://www.springerlink. Oct31_Presentations/Illies_ REFERENCES 322

NIST_05.pdf. 18 slides + protocol. In Joye [Joy03b], 15-page paper. pages 373–390. CODEN LNCSD9. ISBN 3-540- Gordon:2003:ATS 00847-0. ISSN 0302-9743 [GJ03] Andrew D. Gordon and (print), 1611-3349 (elec- Alan Jeffrey. Authentic- tronic). LCCN QA76.9.A25 ity by typing for secu- C822 2003. URL http: rity protocols. Journal //link.springer-ny.com/ of Computer Security,11 link/service/series/0558/ (4):451–519, ???? 2003. tocs/t2612.htm; http: CODEN JCSIET. ISSN //www.springerlink.com/ 0926-227X (print), 1875- openurl.asp?genre=issue& 8924 (electronic). issn=0302-9743&volume= 2612. Gordon:2004:TEA Gallagher:2006:HSB [GJ04] Andrew D. Gordon and Alan Jeffrey. Types and ef- [GJL06] Tom Gallagher, Bryan Jef- fects for asymmetric cryp- fries, and Lawrence Lan- tographic protocols. Jour- dauer. Hunting security nal of Computer Security, bugs. Secure software de- 12(3–4):435–483, ???? 2004. velopment series. Microsoft CODEN JCSIET. ISSN Press, Redmond, WA, USA, 0926-227X (print), 1875- 2006. ISBN 0-7356-2187- 8924 (electronic). X. xxv + 559 pp. LCCN QA76.9.A25 G356 2006. Ganapathy:2005:APA Gentry:2001:CNS [GJJ05] Vinod Ganapathy, Trent Jaeger, and Somesh Jha. [GJSS01] Craig Gentry, Jakob Jon- Automatic placement of au- sson, Jacques Stern, and thorization hooks in the Michael Szydlo. Cryptanal- Linux security modules ysis of the NTRU Signa- framework. In Meadows and ture Scheme (NSS) from Syverson [MS05b], pages Eurocrypt 2001. Lecture 330–339. ISBN 1-59593- Notes in Computer Sci- 226-7. LCCN QA76.9.A25. ence, 2248:1–??, 2001. CO- ACM order number 459050. DEN LNCSD9. ISSN 0302- Gennaro:2003:SAP 9743 (print), 1611-3349 (electronic). URL http: [GJKR03] Rosario Gennaro, Stanis- //link.springer-ny.com/ law Jarecki, Hugo Kraw- link/service/series/0558/ czyk, and Tal Rabin. Secure bibs/2248/22480001.htm; applications of Pedersen’s http://link.springer- distributed key generation ny.com/link/service/series/ REFERENCES 323

0558/papers/2248/22480001. cover). ISSN 0302-9743 pdf. (print), 1611-3349 (elec- tronic). LCCN QA76.9.A25 Gomulkiewicz:2002:HWA T44 2005. URL http: [GK02] Marcin Gomulkiewicz and //www.springerlink.com/ Miroslaw Kuty lowski. Ham- openurl.asp?genre=issue& ming weight attacks on issn=0302-9743&volume= cryptographic hardware — 3378; http://www.springerlink. breaking masking defense. com/openurl.asp?genre= Lecture Notes in Computer volume&id=doi:10.1007/ Science, 2502:90–??, 2002. b106171. CODEN LNCSD9. ISSN Gavinsky:2007:ESO 0302-9743 (print), 1611- [GKK+07] Dmitry Gavinsky, Julia 3349 (electronic). URL Kempe, Iordanis Kereni- http://link.springer.de/ dis, Ran Raz, and Ronald link/service/series/0558/ de Wolf. Exponential sep- bibs/2502/25020090.htm; arations for one-way quan- http://link.springer. tum communication com- de/link/service/series/ plexity, with applications 0558/papers/2502/25020090. to cryptography. In ACM pdf. [ACM07], pages 516–525. Goldsmith:2004:CAI ISBN 1-59593-631-9. LCCN QA75.5 .A22 2007. [GK04] Clair W. Goldsmith and Rob Kolstad. A conversa- Gavinsky:2009:ESO tion about identity manage- [GKK+09] Dmitry Gavinsky, Julia ment. ;login: the USENIX Kempe, Iordanis Kereni- Association newsletter,29 dis, Ran Raz, and Ronald (5):??, October 2004. CO- de Wolf. Exponential sepa- DEN LOGNEM. ISSN ration for one-way quantum 1044-6397. URL http:// communication complexity, www.usenix.org/publications/ with applications to cryp- login/2004-10/pdfs/interview. tography. SIAM Journal pdf. on Computing, 38(5):1695– Goldwasser:2005:PPK 1708, ???? 2009. CODEN SMJCAT. ISSN 0097-5397 [GK05] Shafi Goldwasser and Dmitriy (print), 1095-7111 (elec- Kharchenko. Proof of tronic). plaintext knowledge for the Garay:2007:RCA Ajtai–Dwork cryptosystem. In Kilian [Kil05], pages 529– [GKKO07] J. A. Garay, J. Katz, Chiu- ?? CODEN LNCSD9. Yuen Koo, and R. Ostro- ISBN 3-540-24573-1 (soft- vsky. Round complexity REFERENCES 324

of authenticated broadcast Gorodetsky:2005:CNS with a dishonest major- ity. In IEEE [IEE07], pages [GKS05] Vladimir Gorodetsky, Igor 658–668. ISBN 0-7695- Kotenko, and Victor Sko- 3010-9. ISSN 0272-5428. rmin, editors. Com- LCCN QA76 .S974 2007. puter network security: URL http://ieeexplore. third international work- ieee.org/servlet/opac? shop on mathematical meth- punumber=4389466. IEEE ods, models, and archi- Computer Society order tectures for computer net- number P3010. work security, MMM-ACNS 2005, St. Petersburg, Rus- Gertner:2000:RBP sia, September 24–28, 2005, proceedings, volume 3685 + [GKM 00] Y. Gertner, S. Kannan, of Lecture Notes in Com- T. Malkin, O. Reingold, and puter Science. Springer-Ver- M. Viswanathan. The re- lag, Berlin, Germany / Hei- lationship between public delberg, Germany / Lon- key encryption and obliv- don, UK / etc., 2005. CO- ious transfer. In IEEE DEN LNCSD9. ISBN 3-540- [IEE00a], pages 325–335. 29113-X. ISSN 0302-9743 CODEN ASFPDV. ISBN (print), 1611-3349 (elec- 0-7695-0850-2, 0-7695-0851- tronic). LCCN ???? 0 (case), 0-7695-0852-9 (mi- crofiche). ISSN 0272- Goubault-Larrecq:2000:MAC 5428. LCCN TK7885.A1 [GL00] Jean Goubault-Larrecq. A S92 2000. IEEE Com- method for automatic cryp- puter Society order number tographic protocol verifi- PR00850. cation. Lecture Notes in Guneysu:2008:CC Computer Science, 1800: 977–??, 2000. CODEN [GKN+08] T. Guneysu, T. Kasper, LNCSD9. ISSN 0302- M. Novotny, C. Paar, and 9743 (print), 1611-3349 A. Rupp. Cryptanaly- (electronic). URL http: sis with COPACOBANA. //link.springer-ny.com/ IEEE Transactions on Com- link/service/series/0558/ puters, 57(11):1498–1513, bibs/1800/18000977.htm; November 2008. CO- http://link.springer- DEN ITCOB4. ISSN ny.com/link/service/series/ 0018-9340 (print), 1557- 0558/papers/1800/18000977. 9956 (electronic). URL pdf. http://ieeexplore.ieee. Goldreich:2001:SKG org/stamp/stamp.jsp?tp= &arnumber=4515858. [GL01] Oded Goldreich and Yehuda REFERENCES 325

Lindell. Session-key genera- ciety, Providence, RI, USA, tion using human passwords 2005. ISBN 0-8218-3365- only. In Kilian [Kil01a], 0. LCCN QA76.9.A25 pages 408–?? ISBN 3-540- P82 2005. URL http:// 42456-3 (paperback). LCCN www.loc.gov/catdir/toc/ QA76.9.A25 C79 2001; fy0612/2005048178.html. QA267.A1 L43 no.2139. UK£47.00. URL http: Gennaro:2006:FPB //link.springer-ny.com/ link/service/series/0558/[GL06a] Rosario Gennaro and Yehuda bibs/2139/21390408.htm; Lindell. A framework for http://link.springer- password-based authenti- ny.com/link/service/series/ cated key exchange. ACM 0558/papers/2139/21390408. Transactions on Informa- pdf. tion and System Security, 9(2):181–234, May 2006. Gennaro:2003:FPB CODEN ATISBQ. ISSN 1094-9224 (print), 1557- [GL03] Rosario Gennaro and Yehuda 7406 (electronic). Lindell. A framework for password-based au- Goshi:2006:ADM thenticated key exchange. Lecture Notes in Com- [GL06b] Justin Goshi and Richard E. puter Science, 2656:524– Ladner. Algorithms for dy- 543, 2003. CODEN namic multicast key distri- LNCSD9. ISSN 0302-9743 bution. ACM Journal of (print), 1611-3349 (elec- Experimental Algorithmics, tronic). URL http://link. 11:1.4:1–1.4:??, ???? 2006. springer.com/content/pdf/ CODEN ???? ISSN 1084- 10.1007/3-540-39200-9_ 6654. 33.pdf. Gassend:2004:IAI Garrett:2005:PKC [GLC+04] Blaise Gassend, Daihyun [GL05] Paul Garrett and Daniel Lim, Dwaine Clarke, Marten Lieman, editors. Public- vanDijk,andSrinivasDe- key cryptography: Amer- vadas. Identification and ican Mathematical Society authentication of integrated short course, January 13– circuits. Concurrency and 14, 2003, Baltimore, Mary- Computation: Practice and land,volume62ofPro- Experience, 16(11):1077– ceedings of symposia in ap- 1098, September 2004. CO- plied mathematics [AMS DEN CCPEBO. ISSN short course lecture notes]. 1532-0626 (print), 1532- American Mathematical So- 0634 (electronic). REFERENCES 326

Grembowski:2002:CAH Gilbert:2000:CAR

+ [GLG 02] Tim Grembowski, Roar [GM00a] Henri Gilbert and Marine Lien,KrisGaj,Nghi Minier. A collision attack Nguyen, Peter Bellows, on 7 rounds of Rijndael. In Jaroslav Flidr, Tom Lehman, NIST [NIS00], pages 230– and Brian Schott. Com- 241. ISBN ???? LCCN ???? parative analysis of the URL http://csrc.nist. hardware implementations gov/encryption/aes/round2/ of hash functions SHA- conf3/aes3conf.htm; http: 1 and SHA-512. Lecture //csrc.nist.gov/encryption/ Notes in Computer Science, aes/round2/conf3/papers/ 2433:75–??, 2002. CO- AES3Proceedings-1.pdf; DEN LNCSD9. ISSN 0302- http://csrc.nist.gov/ 9743 (print), 1611-3349 encryption/aes/round2/ (electronic). URL http: conf3/papers/AES3Proceedings- //link.springer-ny.com/ 2.pdf; http://csrc.nist. link/service/series/0558/ gov/encryption/aes/round2/ bibs/2433/24330075.htm; conf3/papers/AES3Proceedings- http://link.springer- 3.pdf; http://csrc.nist. ny.com/link/service/series/ gov/encryption/aes/round2/ 0558/papers/2433/24330075. conf3/papers/AES3Proceedings. pdf. pdf. Gallant:2001:FPM Girault:2000:CCP [GLV01] Robert P. Gallant, Robert J. Lambert, and Scott A. Van- [GM00b] Marc Girault and Jean- stone. Faster point multipli- Fran¸cois Misarsky. Crypt- cation on elliptic curves with analysis of countermeasures efficient endomorphisms. In proposed for repairing ISO Kilian [Kil01a], pages 190– 9796-1. Lecture Notes in ?? ISBN 3-540-42456- Computer Science, 1807: 3 (paperback). LCCN 81–??, 2000. CODEN QA76.9.A25 C79 2001; LNCSD9. ISSN 0302- QA267.A1 L43 no.2139. 9743 (print), 1611-3349 UK£47.00. URL http: (electronic). URL http: //link.springer-ny.com/ //link.springer-ny.com/ link/service/series/0558/ link/service/series/0558/ bibs/2139/21390190.htm; bibs/1807/18070081.htm; http://link.springer- http://link.springer- ny.com/link/service/series/ ny.com/link/service/series/ 0558/papers/2139/21390190. 0558/papers/1807/18070081. pdf. pdf. REFERENCES 327

Gennaro:2002:CPG LNCSD9. ISSN 0302- 9743 (print), 1611-3349 [GM02a] Rosario Gennaro and Daniele (electronic). URL http: Micciancio. Cryptanalysis of //link.springer-ny.com/ a pseudorandom generator link/service/series/0558/ based on braid groups. Lec- bibs/2355/23550248.htm; ture Notes in Computer Sci- http://link.springer- ence, 2332:1–??, 2002. CO- ny.com/link/service/series/ DEN LNCSD9. ISSN 0302- 0558/papers/2355/23550248. 9743 (print), 1611-3349 pdf. (electronic). URL http: //link.springer-ny.com/ Galbraith:2003:IAU link/service/series/0558/ bibs/2332/23320001.htm; [GM03] Steven D. Galbraith and http://link.springer- Wenbo Mao. Invisibility ny.com/link/service/series/ and anonymity of undeni- 0558/papers/2332/23320001. able and confirmer signa- pdf. tures. In Joye [Joy03b], pages 80–97. CODEN Gilbert:2002:CS LNCSD9. ISBN 3-540- [GM02b] Henri Gilbert and Ma- 00847-0. ISSN 0302-9743 rine Minier. Cryptanaly- (print), 1611-3349 (elec- sis of SFLASH. Lecture tronic). LCCN QA76.9.A25 Notes in Computer Science, C822 2003. URL http: 2332:288–??, 2002. CO- //link.springer-ny.com/ DEN LNCSD9. ISSN 0302- link/service/series/0558/ 9743 (print), 1611-3349 tocs/t2612.htm; http: (electronic). URL http: //www.springerlink.com/ //link.springer-ny.com/ openurl.asp?genre=issue& link/service/series/0558/ issn=0302-9743&volume= bibs/2332/23320288.htm; 2612. http://link.springer- Gorrieri:2004:SFR ny.com/link/service/series/ 0558/papers/2332/23320288.[GM04] Roberto Gorrieri and Fabio pdf. Martinelli. A simple frame- work for real-time cryp- Gilbert:2002:NRP tographic protocol analy- [GM02c] Henri Gilbert and Marine sis with compositional proof Minier. New results on rules. Science of Computer the pseudorandomness of Programming, 50(1–3):23– some blockcipher construc- 49, March 2004. CODEN tions. Lecture Notes in SCPGD4. ISSN 0167-6423 Computer Science, 2355: (print), 1872-7964 (elec- 248–??, 2002. CODEN tronic). REFERENCES 328

Giuliano:2000:ISC Data collection with self- enforcing privacy. ACM [GMG00] Genevieve Giuliano, James E. Transactions on Informa- Moore II, and Jacque- tion and System Security, line Golob. Integrated 12(2):9:1–9:??, December smart-card fare system: re- 2008. CODEN ATISBQ. sults from field operational ISSN 1094-9224 (print), test. Transportation re- 1557-7406 (electronic). search record, pages 138– 146, No 2000. Galbraith:2001:CNR Galbraith:2002:PKS [GMP01a] Steven D. Galbraith, Wenbo [GMLS02] S. Galbraith, J. Malone-Lee, Mao, and Kenneth G. Pater- and N. P. Smart. Public key son. A cautionary note re- signatures in the multi-user garding cryptographic pro- setting. Information Pro- tocolsbasedoncomposite cessing Letters, 83(5):263– integers. Report HPL-2001- 266, September 15, 2002. 284, HP Laboratories Bris- CODEN IFPLAT. ISSN tol, Bristol, UK, November 0020-0190 (print), 1872- 8, 2001. URL http://www. 6119 (electronic). hpl.hp.com/techreports/ 2001/HPL-2001-284.html. Goots:2001:FEA Galbraith:2001:RBU [GMM01] Nick D. Goots, Alexan- der A. Moldovyan, and [GMP01b] Steven D. Galbraith, Wenbo Nick A. Moldovyan. Fast en- Mao, and Kenneth G. Pa- cryption algorithm Spectr- terson. RSA-based unde- H64. Lecture Notes in niable signatures for gen- Computer Science, 2052: eral moduli. Lecture Notes 275–??, 2001. CODEN in Computer Science, 2271: LNCSD9. ISSN 0302- 200–??, 2001. CODEN 9743 (print), 1611-3349 LNCSD9. ISSN 0302- (electronic). URL http: 9743 (print), 1611-3349 //link.springer-ny.com/ (electronic). URL http: link/service/series/0558/ //link.springer-ny.com/ bibs/2052/20520275.htm; link/service/series/0558/ http://link.springer- bibs/2271/22710200.htm; ny.com/link/service/series/ http://link.springer- 0558/papers/2052/20520275. ny.com/link/service/series/ pdf. 0558/papers/2271/22710200. pdf. Golle:2008:DCS Gentry:2005:PAK [GMM08] Philippe Golle, Frank Mc- Sherry, and Ilya Mironov. [GMR05] Craig Gentry, Philip Macken- REFERENCES 329

zie, and Zulfikar Ramzan. putational number theory Password authenticated key (Warsaw, 2000), pages 71– exchange using hidden 75. Walter de Gruyter, New smooth subgroups. In York, NY, USA, 2001. Meadows and Syverson [MS05b], pages 299–309. Ge:2005:CCO ISBN 1-59593-226-7. LCCN [GMW05] Gennian Ge, Ying Miao, QA76.9.A25. ACM order and Lihua Wang. Combina- number 459050. torial constructions for op- Galindo:2008:ICB timal splitting authentica- tion codes. SIAM Journal [GMR08] David Galindo, Paz Mo- on Discrete Mathematics,18 rillo, and Carla R`afols. Im- (4):663–678, 2005. CODEN proved certificate-based en- SJDMEC. ISSN 0895-4801 cryption in the standard (print), 1095-7146 (elec- model. The Journal of tronic). URL http:// Systems and Software,81 epubs.siam.org/sam-bin/ (7):1218–1226, July 2008. dbq/article/43546. CODEN JSSODM. ISSN 0164-1212 (print), 1873- Gore:2001:CMT 1228 (electronic). [GN01] Rajeev Prabhakar Gor´e Gopalakrishnan:2001:PWV and Phuong ThˆeNguyˆen. CardS4: Modal theorem [GMV01] K. Gopalakrishnan, Nasir proving on Java smart- Memon, and Poorvi L. Vora. cards. Lecture Notes in Protocols for watermark Computer Science, 2140: verification. IEEE Mul- 111–??, 2001. CODEN tiMedia, 8(4):66–70, Oc- LNCSD9. ISSN 0302- tober 2001. CODEN 9743 (print), 1611-3349 IEMUE4. ISSN 1070-986X (electronic). URL (print), 1941-0166 (elec- http: //link.springer-ny.com/ tronic). URL http://dlib. link/service/series/0558/ computer.org/mu/books/ bibs/2140/21400111.htm; mu2001/pdf/u4066.pdf; http://link.springer- http://www.computer.org/ ny.com/link/service/series/ multimedia/mu2001/u4066abs. 0558/papers/2140/21400111. htm. pdf. Grosek:2001:SPK Gratzer:2006:CLE [GMW01] Otokar Groˇsek, Spyros S. Magliveras, and Wandi Wei. [GN06] Vanessa Gratzer and David On the security of a public- Naccache. Cryptography, key cryptosystem. In Public- law enforcement, and mo- key cryptography and com- bile communications. IEEE REFERENCES 330

Security & Privacy, 4(6): 0937-5511. Springer-Verlag, 67–70, November/December Berlin, Germany / Heidel- 2006. CODEN ???? ISSN berg, Germany / London, 1540-7993 (print), 1558- UK / etc., 1999. ISBN 4046 (electronic). 3-540-64766-X. xv + 182 pp. LCCN QA76.9.A25 G64 Gutmann:2005:WHC 1999. URL http://www. [GNP05] P. Gutmann, D. Naccache, loc.gov/catdir/enhancements/ and C. C. Palmer. When fy0815/98050548-d.html; hashes collide [applied cryp- http://www.loc.gov/catdir/ tography]. IEEE Secu- enhancements/fy0815/98050548- rity & Privacy, 3(3):68– t.html. 71, May/June 2005. CO- Goldreich:2001:FCBb DEN ???? ISSN 1540- 7993 (print), 1558-4046 [Gol01a] Oded Goldreich. Foun- (electronic). URL http: dations of Cryptography: //ieeexplore.ieee.org/ Basic Applications,vol- iel5/8013/31002/01439506. ume 2. Cambridge Univer- pdf; http://ieeexplore. sity Press, Cambridge, UK, ieee.org/xpls/abs_all. 2001. ISBN 0-521-83084-2 jsp?isnumber=31002&arnumber= (hardcover). xii + 373–798 1439506&count=20&index= pp. LCCN QA268.G5745 13. 2001. US$54.95 (hardcover). Gaj:2003:FME See also volume 2 [Gol04]. [GO03] Kris Gaj and Arkadiusz Goldreich:2001:FCBa Orlowski. Facts and myths of Enigma: Breaking stereo- [Gol01b] Oded Goldreich. Founda- types. Lecture Notes in tions of Cryptography: Ba- Computer Science, 2656: sic Tools, volume 1. Cam- 106–122, 2003. CODEN bridge University Press, LNCSD9. ISSN 0302-9743 Cambridge, UK, 2001. ISBN (print), 1611-3349 (elec- 0-521-03536-8 (paperback ), tronic). URL http://link. 0-521-79172-3 (hardcover). springer.com/content/pdf/ xix + 372 pp. LCCN QA268 10.1007/3-540-39200-9_ .G5745 2001. US$54.95 7.pdf. (hardcover). See also vol- ume 2 [Gol04]. Goldreich:1999:MCP Golic:2001:CAS [Gol99] Oded Goldreich. Modern cryptography, probabilistic [Gol01c] Jovan D. Goli´c. Correla- proofs, and pseudorandom- tion analysis of the shrink- ness,volume17ofAlgo- ing generator. In Kil- rithms and combinatorics, ian [Kil01a], pages 440– REFERENCES 331

?? ISBN 3-540-42456- Golic:2003:DNP 3 (paperback). LCCN QA76.9.A25 C79 2001; [Gol03] Jovan D. Goli´c. DeKaRT: QA267.A1 L43 no.2139. a new paradigm for key- UK£47.00. URL http: dependent reversible cir- //link.springer-ny.com/ cuits. In Walter et al. link/service/series/0558/ [WKP03], pages 98–112. bibs/2139/21390440.htm; CODEN LNCSD9. ISBN http://link.springer- 3-540-40833-9. ISSN 0302- ny.com/link/service/series/ 9743 (print), 1611-3349 0558/papers/2139/21390440. (electronic). LCCN TK7895.E42. pdf. URL http://link.springer- ny.com/link/service/series/ Golic:2001:HCC 0558/tocs/t2779.htm; http://www.springerlink. [Gol01d] Jovan Dj. Goli´c. How com/openurl.asp?genre= to construct cryptographic issue&issn=0302-9743&volume= primitives from stream ci- 2779; http://www.springerlink. phers. Computers & Se- com/openurl.asp?genre= curity, 20(1):79–89, Jan- volume&id=doi:10.1007/ uary 31, 2001. CODEN b13240. CPSEDU. ISSN 0167-4048 Goldreich:2004:FCV (print), 1872-6208 (elec- tronic). URL https:// [Gol04] Oded Goldreich. Foun- www.sciencedirect.com/ dations of Cryptography: science/article/pii/S0167404801010252. Volume 2: Basic Appli- cations. Cambridge Uni- Golic:2001:MOS versity Press, Cambridge, UK, 2004. ISBN 0- [Gol01e] Jovan Dj. Golic. Modes 521-83084-2. 373–798 of operation of stream ci- pp. LCCN QA268 .G5745 phers. Lecture Notes in 2001. URL http://www. Computer Science, 2012: loc.gov/catdir/description/ 233–??, 2001. CODEN cam021/00049362.html; LNCSD9. ISSN 0302- http://www.loc.gov/catdir/ 9743 (print), 1611-3349 toc/cam023/00049362.html. (electronic). URL http: See also volume 1 [Gol01b]. //link.springer-ny.com/ Goldstein:2008:BHO link/service/series/0558/ bibs/2012/20120233.htm; [Gol08] Emmanuel Goldstein. The http://link.springer- best of 2600: a hacker ny.com/link/service/series/ odyssey. John Wiley and 0558/papers/2012/20120233. Sons, Inc., New York, NY, pdf. USA, 2008. ISBN 0-470- REFERENCES 332

29419-1 (cloth). xvi + 871 (print), 1611-3349 (elec- pp. LCCN QA76.9.A25 tronic). URL http:// G643 2008. URL http:// link.springer.de/link/ www.loc.gov/catdir/enhancements/ service/series/0558/bibs/ fy0833/2008018567-d.html; 2421/24210099.htm; http: http://www.loc.gov/catdir/ //link.springer.de/link/ enhancements/fy0833/2008018567- service/series/0558/papers/ t.html. 2421/24210099.pdf. Gonda:2006:NMR Gurgens:2002:APF [Gon06] J. Gonda. The number of [GOR02b] Sigrid G¨urgens, Peter Ochsen- the modulo n roots of the schl¨ager, and Carsten Rudolph. polynomial xv — xv and Authenticity and provabil- the RSA. J.UCS: Journal ity — A formal frame- of Universal Computer Sci- work. Lecture Notes in ence, 12(9):1215–1228, ???? Computer Science, 2437: 2006. CODEN ???? ISSN 227–??, 2002. CODEN 0948-6968. URL http:// LNCSD9. ISSN 0302-9743 www.jucs.org/jucs_12_9/ (print), 1611-3349 (elec- the_number_of_the. tronic). URL http:// Good:2000:TAE link.springer.de/link/ service/series/0558/bibs/ [Goo00] I. J. Good. Turing’s antic- 2437/24370227.htm; http: ipation of empirical Bayes //link.springer.de/link/ in connection with the service/series/0558/papers/ cryptanalysis of the naval 2437/24370227.pdf. Enigma. Journal of Statisti- cal Computation and Simu- Gorman:2005:NSC lation, 66(2):101–111, 2000. CODEN JSCSAT. ISSN [Gor05] Sean P. Gorman. Net- 0094-9655 (print), 1563- works, security, and com- 5163 (electronic). 50th An- plexity: the role of public niversary of the Department policy in critical infrastruc- of Statistics, Virginia Tech, ture protection.EdwardEl- Part II (Blacksburg, VA, gar Publishers, Northhamp- 1999). ton, MA, USA, 2005. ISBN 1-84376-952-2. 153 (est.) Gordon:2002:TCP pp. LCCN QA76.9.A25 [Gor02a] Andrew D. Gordon. Types G657 2005. for cryptographic proto- Gordon:2006:UAV cols. Lecture Notes in Computer Science, 2421: [Gor06] Sarah Gordon. Understand- 99–??, 2002. CODEN ing the adversary: Virus LNCSD9. ISSN 0302-9743 writers and beyond. IEEE REFERENCES 333

Security & Privacy, 4(5): ISBN 1-60558-085-6. LCCN 67–70, September/October ???? 2006. CODEN ???? ISSN 1540-7993 (print), 1558- Ganeriwal:2008:STS 4046 (electronic). [GPCS08]ˇ Saurabh Ganeriwal, Christina Goulding:2009:ESA P¨opper, Srdjan Capkun,ˇ [Gou09] Tom Goulding. An en- and Mani B. Srivastava. Se- cryption system in assem- cure time synchronization bly language: a game- in sensor networks. ACM like project for novice pro- Transactions on Informa- grammers. SIGCSE Bul- tion and System Security, letin (ACM Special Inter- 11(4):23:1–23:??, July 2008. est Group on Computer Sci- CODEN ATISBQ. ISSN ence Education), 41(4):40– 1094-9224 (print), 1557- 44, December 2009. CO- 7406 (electronic). DEN SIGSD3. ISSN 0097- 8418 (print), 2331-3927 Garcia-Pasquel:2006:GCT (electronic). [GPG06] Jes´us Adolfo Garc´ıa-Pasquel Geppert:2000:TMS and Jos´e Galaviz. Ganz´ua: a cryptanalysis tool for [GP00] L. Geppert and Tekla S. monoalphabetic and polyal- Perry. Transmeta’s magic phabetic ciphers. ACM show [microprocessor chips]. Journal on Educational IEEE Spectrum, 37(5):26– Resources in Computing 33, May 2000. CODEN (JERIC), 6(3):4:1–4:??, Septem- IEESAM. ISSN 0018-9235 ber 2006. CODEN ???? (print), 1939-9340 (elec- ISSN 1531-4278. tronic). Gupta:2008:FAT Guneysu:2008:SPH

[GPC08] Manish Gupta, Amit Pathak, [GPP08] Tim G¨uneysu, Christof and Soumen Chakrabarti. Paar, and Jan Pelzl. Special- Fast algorithms for top- purpose hardware for solv- k personalized PageRank ing the elliptic curve discrete queries. In ACM, editor, logarithm problem. ACM International World Wide Transactions on Reconfig- Web Conference Proceed- urable Technology and Sys- ing of the 17th interna- tems (TRETS), 1(2):8:1– tional conference on World 8:??, June 2008. CODEN Wide Web, pages 1225– ???? ISSN 1936-7406 1226. ACM Press, New (print), 1936-7414 (elec- York, NY 10036, USA, 2008. tronic). REFERENCES 334

Gutterman:2006:ALR hard lattices and new cryp- tographic constructions. In [GPR06] Zvi Gutterman, Benny ACM [ACM08], pages 197– Pinkas, and Tzachy Rein- 206. ISBN 1-60558-047-3. man. Analysis of the LCCN QA76.6 .A152 2008. Linux random number gen- erator. Report, The Hebrew Geng:2008:DSA University of Jerusalem [GPX08] Xiutang Geng, Linqiang and University of Haifa, Pan, and Jin Xu. A DNA Jerusalem and Haifa, Is- sticker algorithm for bit- rael, March 6, 2006. 18 pp. substitution in a block ci- URL http://www.pinkas. pher. Journal of Parallel net/PAPERS/gpr06.pdf. and Distributed Computing, Granger:2005:HSN 68(9):1201–1206, September 2008. CODEN JPDCER. [GPS05] R. Granger, D. Page, ISSN 0743-7315 (print), and M. Stam. Hardware 1096-0848 (electronic). and software normal ba- sis arithmetic for pairing- Galbraith:2004:EDD based cryptography in char- acteristic three. IEEE [GR04] Steven D. Galbraith and Transactions on Computers, Victor Rotger. Easy deci- 54(7):852–860, July 2005. sion Diffie–Hellman groups. CODEN ITCOB4. ISSN LMS Journal of Computa- 0018-9340 (print), 1557- tion and Mathematics,7: 9956 (electronic). URL 201–??, 2004. CODEN ???? http://ieeexplore.ieee. ISSN 1461-1570. org/stamp/stamp.jsp?tp= Grasser:1998:FC &arnumber=1432668. [Gra98] R. Scott Grasser. FIND- Granger:2006:SCA someone.com. Butterworth- [GPS06] R. Granger, D. Page, and Heinemann, Boston, MA, M. Stam. On small char- USA, 1998. ISBN 0- acteristic algebraic tori in 7506-7020-7. xvii + 137 pairing-based cryptography. pp. LCCN HV6762.U5 G73 LMS Journal of Computa- 1998. US$39.95. tion and Mathematics, 9:64– Graff:2001:CCW 85, 2006. CODEN ???? ISSN 1461-1570. [Gra01] Jon Graff. Cryptography and Gentry:2008:THL e-commerce: a Wiley tech brief. Wiley tech brief series. [GPV08] Craig Gentry, Chris Peik- John Wiley and Sons, Inc., ert, and Vinod Vaikun- New York, NY, USA, 2001. tanathan. Trapdoors for ISBN 0-471-40574-4 (paper- REFERENCES 335

back). xviii + 222 pp. LCCN (electronic). URL http: QA76.9.A25 G68 2001. //link.springer-ny.com/ link/service/series/0558/ Granboulan:2002:FDC bibs/1962/19620332.htm; [Gra02a] Louis Granboulan. Flaws http://link.springer- in differential cryptanaly- ny.com/link/service/series/ sis of Skipjack. Lecture 0558/papers/1962/19620332. Notes in Computer Science, pdf. 2355:328–??, 2002. CO- Grossschadl:2001:HSR DEN LNCSD9. ISSN 0302- 9743 (print), 1611-3349 [Gro01] Johann Großsch¨adl. High- (electronic). URL http: speed RSA hardware based //link.springer-ny.com/ on Barret’s modular re- link/service/series/0558/ duction method. Lecture bibs/2355/23550328.htm; Notes in Computer Science, http://link.springer- 1965:191–??, 2001. CO- ny.com/link/service/series/ DEN LNCSD9. ISSN 0302- 0558/papers/2355/23550328. 9743 (print), 1611-3349 pdf. (electronic). URL http: //link.springer-ny.com/ Granboulan:2002:SSR link/service/series/0558/ [Gra02b] Louis Granboulan. Short bibs/1965/19650191.htm; signatures in the random or- http://link.springer- acle model. Lecture Notes ny.com/link/service/series/ in Computer Science, 2501: 0558/papers/1965/19650191. 364–??, 2002. CODEN pdf. LNCSD9. ISSN 0302-9743 Grossschadl:2003:ASL (print), 1611-3349 (elec- tronic). URL http:// [Gro03] Johann Großsch¨adl. Archi- link.springer.de/link/ tectural support for long in- service/series/0558/bibs/ teger modulo arithmetic on 2501/25010364.htm; http: RISC-based Smart Cards. //link.springer.de/link/ The International Journal service/series/0558/papers/ of High Performance Com- 2501/25010364.pdf. puting Applications, 17(2): 135–146, Summer 2003. CO- Grigg:2001:FCL DEN IHPCFL. ISSN 1094- [Gri01] Ian Grigg. Financial cryp- 3420 (print), 1741-2846 tography in 7 layers. Lecture (electronic). Notes in Computer Science, Groth:2005:CS 1962:332–??, 2001. CO- DEN LNCSD9. ISSN 0302- [Gro05] Jens Groth. Cryptography 9743 (print), 1611-3349 in subgroups of Z∗n.In REFERENCES 336

Kilian [Kil05], pages 50– 4031329. IEEE Com- ?? CODEN LNCSD9. puter Society Order Number ISBN 3-540-24573-1 (soft- P2720. cover). ISSN 0302-9743 Geppert:2000:T (print), 1611-3349 (elec- tronic). LCCN QA76.9.A25 [GS00] L. Geppert and W. Sweet. T44 2005. URL http: Technology 2000. IEEE //www.springerlink.com/ Spectrum, 37(1):26–31, Jan- openurl.asp?genre=issue& uary 2000. CODEN issn=0302-9743&volume= IEESAM. ISSN 0018-9235 3378; http://www.springerlink. (print), 1939-9340 (elec- com/openurl.asp?genre= tronic). volume&id=doi:10.1007/ GonzalezVasco:2001:CPK b106171. Gisin:2002:QC [GS01] Mar´ıa Isabel Gonz´alez Vasco and Rainer Stein- [GRTZ02] Nicolas Gisin, Gr´egoire Ri- wandt. Clouds over a pub- bordy, Wolfgang Tittel, and lic key cryptosystem based Hugo Zbinden. Quantum on Lyndon words. Informa- cryptography. Reviews of tion Processing Letters,80 Modern Physics, 74(1):145– (5):239–242, 2001. CODEN 195, January 2002. CO- IFPLAT. ISSN 0020-0190 DEN RMPHAT. ISSN (print), 1872-6119 (elec- 0034-6861 (print), 1538- tronic). 4527 (electronic), 1539- Garfinkel:2002:WSP 0756. URL http://link. aps.org/doi/10.1103/RevModPhys.[GS02a] Simson Garfinkel and Gene 74.145; http://rmp.aps. Spafford. Web Security, Pri- org/abstract/RMP/v74/i1/ vacy & Commerce. O’Reilly p145_1. & Associates, Inc., 103a Morris Street, Sebastopol, Gentry:2006:EES CA 95472, USA, Tel: +1 [GRW06] Craig Gentry, Zulfikar 707 829 0515, and 90 Sher- Ramzan, and David P. man Street, Cambridge, Woodruff. Explicit exclu- MA 02140, USA, Tel: +1 sive set systems with ap- 617 354 5800, second edi- plications to broadcast en- tion, 2002. ISBN 0-596- cryption. In IEEE [IEE06], 00045-6. xxviii + 756 pages 27–38. ISBN 0-7695- pp. LCCN TK5105.59 .G37 2720-5, 0-7695-2362-5. ISSN 2002 Stacks. US$44.95. 0272-5428. LCCN QA76 URL http://safari.oreilly. .S974 2006. URL http: com/0596000456; http: //ieeexplore.ieee.org/ //www.oreilly.com/catalog/ servlet/opac?punumber= websec2. REFERENCES 337

Gentry:2002:HIB (print), 1611-3349 (elec- tronic). LCCN TK7895.E42. [GS02b] Craig Gentry and Alice Sil- URL http://link.springer- verberg. Hierarchical ID- ny.com/link/service/series/ based cryptography. Lecture 0558/tocs/t2779.htm; Notes in Computer Science, http://www.springerlink. 2501:548–??, 2002. CODEN com/openurl.asp?genre= LNCSD9. ISSN 0302-9743 issue&issn=0302-9743&volume= (print), 1611-3349 (elec- 2779; http://www.springerlink. tronic). URL http:// com/openurl.asp?genre= link.springer.de/link/ volume&id=doi:10.1007/ service/series/0558/bibs/ b13240. 2501/25010548.htm; http: //link.springer.de/link/ Geiselmann:2007:SPH service/series/0558/papers/[GS07a] Willi Geiselmann and Rainer . 2501/25010548.pdf Steinwandt. Special-purpose Gentry:2002:CRN hardware in cryptanaly- sis: The case of 1,024-bit [GS02c] Craig Gentry and Mike RSA. IEEE Security & Szydlo. Cryptanalysis of Privacy, 5(1):63–66, Jan- the revised NTRU signa- uary/February 2007. CO- ture scheme. Lecture Notes DEN ???? ISSN 1540-7993 in Computer Science, 2332: (print), 1558-4046 (elec- 299–??, 2002. CODEN tronic). LNCSD9. ISSN 0302- 9743 (print), 1611-3349 Goodell:2007:TOR (electronic). URL http: //link.springer-ny.com/ [GS07b] Geoffrey Goodell and Paul link/service/series/0558/ Syverson. Technical opinion: bibs/2332/23320299.htm; Therightplaceattheright http://link.springer- time. Communications of ny.com/link/service/series/ the Association for Comput- 0558/papers/2332/23320299. ing Machinery, 50(5):113– pdf. 117, May 2007. CODEN CACMA2. ISSN 0001-0782 Geiselmann:2003:HSS (print), 1557-7317 (elec- tronic). [GS03] Willi Geiselmann and Rainer Steinwandt. Hardware to Grassl:2009:CAS solve sparse systems of lin- ear equations over GF(2). [GS09] Markus Grassl and Rainer In Walter et al. [WKP03], Steinwandt. Cryptanalysis pages 51–61. CODEN of an authentication scheme LNCSD9. ISBN 3-540- using truncated polynomi- 40833-9. ISSN 0302-9743 als. Information Process- REFERENCES 338

ing Letters, 109(15):861– Garfinkel:2003:PUI 863, July 16, 2009. CODEN IFPLAT. ISSN 0020-0190 [GSS03] Simson Garfinkel, Gene (print), 1872-6119 (elec- Spafford, and Alan Schwartz. tronic). Practical Unix & Internet Security. O’Reilly & As- sociates, Inc., 103a Mor- Guida:2004:DUP ris Street, Sebastopol, CA 95472, USA, Tel: +1 707 + [GSB 04] Richard Guida, Robert 829 0515, and 90 Sher- Stahl, Thomas Bunt, Gary man Street, Cambridge, Secrest, and Joseph Moor- MA 02140, USA, Tel: +1 cones. Deploying and us- 617 354 5800, third edi- ing public key technol- tion, 2003. ISBN 0-596- ogy: Lessons learned in 00323-4. xxix + 954 pp. real life. IEEE Secu- LCCN QA76.76.O63 G38 rity & Privacy, 2(4):67–71, 2003. US$54.95. URL July/August 2004. CO- http://www.oreilly.com/ DEN ???? ISSN 1540- catalog/puis3. 7993 (print), 1558-4046 (electronic). URL http: Gaubatz:2008:SCD //csdl.computer.org/dl/ [GSS08] G. Gaubatz, E. Savas, mags/sp/2004/04/j4067. and B. Sunar. Sequential htm; http://csdl.computer. circuit design for embed- org/dl/mags/sp/2004/04/ ded cryptographic applica- j4067.pdf. tions resilient to adversar- ial faults. IEEE Trans- Geetha:2009:BIS actions on Computers,57 (1):126–138, January 2008. [GSK09] S. Geetha, Siva S. Si- CODEN ITCOB4. ISSN vatha Sindhu, and N. Ka- 0018-9340 (print), 1557- maraj. Blind image ste- 9956 (electronic). URL ganalysis based on con- http://ieeexplore.ieee. tent independent statistical org/stamp/stamp.jsp?tp= measures maximizing the &arnumber=4358236. specificity and sensitivity Goodrich:2004:ETB of the system. Comput- ers & Security, 28(7):683– [GST04] Michael T. Goodrich, Jonathan Z. 697, October 2009. CODEN Sun, and Roberto Tamas- CPSEDU. ISSN 0167-4048 sia. Efficient tree-based (print), 1872-6208 (elec- revocation in groups of tronic). URL https:// low-state devices. In www.sciencedirect.com/ Franklin [Fra04], pages 511– science/article/pii/S0167404809000285. ?? CODEN LNCSD9. REFERENCES 339

ISBN 3-540-22668-0. ISSN ny.com/link/service/series/ 0302-9743 (print), 1611- 0558/papers/1880/18800333. 3349 (electronic). LCCN pdf. 10.1007/b99099. URL http://www.springerlink. Gennaro:2000:LBE com/openurl.asp?genre= [GT00] R. Gennaro and L. Tre- issue&issn=0302-9743&volume= visan. Lower bounds on the 3152; http://www.springerlink. efficiency of generic cryp- com/openurl.asp?genre= tographic constructions. volume&id=doi:10.1007/ In IEEE [IEE00a], pages b99099. 305–313. CODEN ASF- Giles:2002:ADW PDV. ISBN 0-7695-0850- 2, 0-7695-0851-0 (case), 0- [GSVC02] James Giles, Reiner Sailer, 7695-0852-9 (microfiche). Dinesh Verma, and Suresh ISSN 0272-5428. LCCN Chari. Authentication for TK7885.A1 S92 2000. IEEE distributed Web caches. Computer Society order Lecture Notes in Computer number PR00850. Science, 2502:126–??, 2002. CODEN LNCSD9. ISSN Guttman:2002:ATS 0302-9743 (print), 1611- 3349 (electronic). URL [GT02] Joshua D. Guttman and http://link.springer.de/ F. Javier Thayer. Authen- link/service/series/0558/ tication tests and the struc- bibs/2502/25020126.htm; ture of bundles. Theo- http://link.springer. retical Computer Science, de/link/service/series/ 283(2):333–380, June 2002. 0558/papers/2502/25020126. CODEN TCSCDI. ISSN pdf. 0304-3975 (print), 1879- 2294 (electronic). Garay:2000:LLB Goodrich:2002:EDD [GSW00] Juan A. Garay, Jessica Stad- don, and Avishai Wool. [GTH02] Michael T. Goodrich, Roberto Long-lived broadcast en- Tamassia, and Jasminka cryption. In Bellare [Bel00], Hasi´c. An efficient dy- pages 333–?? ISBN 3-540- namic and distributed cryp- 67907-3. ISSN 0302-9743 tographic accumulator. Lec- (print), 1611-3349 (elec- ture Notes in Computer Sci- tronic). LCCN QA76.9.A25 ence, 2433:372–??, 2002. C79 2000 Bar. URL http: CODEN LNCSD9. ISSN //link.springer-ny.com/ 0302-9743 (print), 1611- link/service/series/0558/ 3349 (electronic). URL bibs/1880/18800333.htm; http://link.springer-ny. http://link.springer- com/link/service/series/ REFERENCES 340

0558/bibs/2433/24330372. of abstract protocol analy- htm; http://link.springer- sis: Message authentication. ny.com/link/service/series/ Journal of Computer Se- 0558/papers/2433/24330372. curity, 12(6):865–891, ???? pdf. 2004. CODEN JCSIET. ISSN 0926-227X (print), Goodrich:2003:ADS 1875-8924 (electronic). [GTTC03] Michael T. Goodrich, Roberto Guar:2005:PPL Tamassia, Nikos Trian- dopoulos, and Robert Co- [Gua05] Nalneesh Guar. Paranoid hen. Authenticated data penguin: Limitations of structures for graph and shc, a shell encryption util- geometric searching. In ity. Linux Journal, 2005 Joye [Joy03b], pages 295– (138):11, October 2005. CO- 313. CODEN LNCSD9. DEN LIJOFX. ISSN 1075- ISBN 3-540-00847-0. ISSN 3583 (print), 1938-3827 0302-9743 (print), 1611- (electronic). 3349 (electronic). LCCN Guette:2009:ATK QA76.9.A25 C822 2003. URL http://link.springer-[Gue09] Gilles Guette. Automat- ny.com/link/service/series/ ing trusted key rollover in 0558/tocs/t2612.htm; DNSSEC. Journal of Com- http://www.springerlink. puter Security, 17(6):839– com/openurl.asp?genre= 854, ???? 2009. CODEN issue&issn=0302-9743&volume= JCSIET. ISSN 0926-227X 2612. (print), 1875-8924 (elec- Goodrich:2008:NFI tronic). Guizzo:2006:BIC [GTY08] Michael T. Goodrich, Roberto Tamassia, and Danfeng (Daphne)[Gui06] Erico Guizzo. Britain’s Yao. Notarized federated ID identity crisis [biometric id management and authenti- cards]. IEEE Spectrum, cation. Journal of Com- 43(1):42–43, January 2006. puter Security, 16(4):399– CODEN IEESAM. ISSN 418, ???? 2008. CODEN 0018-9235 (print), 1939- JCSIET. ISSN 0926-227X 9340 (electronic). (print), 1875-8924 (elec- tronic). Gumz:2004:BRH

Guttman:2004:FAP [Gum04] Joy Gumz. Book review: Hacking Exposed: Network [GTZ04] Joshua D. Guttman, F. Javier Security Secrets and Solu- Thayer, and Lenore D. tions, 4th ed., by Stuart Mc- Zuck. The faithfulness Clure, Joel Scambray, and REFERENCES 341

George Kurtz, McGraw- gust 2002. CODEN CP- Hill, 2003, $49.99, ISBN 0- TRB4. ISSN 0018-9162 07-222742-7. ACM Queue: (print), 1558-0814 (elec- Tomorrow’s Computing To- tronic). URL http:/ day, 1(10):88, February /csdl.computer.org/dl/ 2004. CODEN AQCUAE. mags/co/2002/08/r8041. ISSN 1542-7730 (print), htm; http://csdl.computer. 1542-7749 (electronic). org/dl/mags/co/2002/08/ r8041.pdf; http://www. Guillou:2001:CAP computer.org/computer/ . [GUQ01] L. C. Guillou, M. Ugon, and co2002/r8041abs.htm J-J. Quisquater. Crypto- Gutmann:2002:DVC graphic authentication pro- tocols for smart cards. Com- [Gut02b] Peter Gutmann. The De- puter Networks (Amster- sign and Verification of a dam, Netherlands: 1999), Cryptographic Security Ar- 36(4):437–451, July 16, chitecture. PhD thesis, De- 2001. CODEN ???? ISSN partment of Computer Sci- 1389-1286 (print), 1872- ence, University of Auck- 7069 (electronic). URL land, Private Bag 92019, http://www.elsevier.nl/ Auckland, New Zealand, gej-ng/10/15/22/61/28/ 2002. URL http:// 30/abstract.html; http: www.cryptoengines.com/ //www.elsevier.nl/gej- ~peter/06_random.pdf; ng/10/15/22/61/28/30/article. http://www.cs.auckland. pdf. ac.nz/~pgut001/; http: Gutmann:2000:OSC //www.cs.auckland.ac.nz/ ~pgut001/pubs/thesis.html. [Gut00] Peter Gutmann. An open- Published in book form source cryptographic co- [Gut04a]. processor. In USENIX [USE00d], page ?? ISBN Gutmann:2004:CSA 1-880446-18-9. LCCN ???? URL http://www.usenix. [Gut04a] Peter Gutmann. Crypto- org/publications/library/ graphic Security Architec- proceedings/sec2000/gutmann. ture: Design and Verifi- html. cation. Springer-Verlag, Gutmann:2002:CFP Berlin, Germany / Heidel- berg, Germany / London, [Gut02a] Peter Gutmann. Cover UK / etc., 2004. ISBN 0- feature: PKI: It’s not 387-95387-6. xviii + 320 dead, just resting. Com- pp. LCCN QA76.9.A25 G88 puter, 35(8):41–49, Au- 2002. REFERENCES 342

Gutmann:2004:SPK 66–?? ISBN 3-540- 28114-2. ISSN 0302-9743 [Gut04b] Peter Gutmann. Simpli- (print), 1611-3349 (elec- fying public key manage- tronic). LCCN QA76.9.A25 ment. Computer, 37(2):101– C79 2005; QA76.9 .A25; ??, February 2004. CODEN QA76.9 C79 2005; QA76.9 CPTRB4. ISSN 0018-9162 C794 2005; QA76.9; In- (print), 1558-0814 (elec- ternet. URL http:/ tronic). URL http://csdl. /www.springerlink.com/ computer.org/comp/mags/ openurl.asp?genre=issue& co/2004/02/r2101abs.htm; issn=0302-9743&volume= http://csdl.computer. 3621. org/dl/mags/co/2004/02/ Garera:2009:CTG r2101.htm; http://csdl. computer.org/dl/mags/co/ [GV09] Sujata Garera and Jorge 2004/02/r2101.pdf. Vasconcelos. Challenges in Guttman:2004:ATD teaching a graduate course in applied cryptography. [Gut04c] Joshua D. Guttman. Au- SIGCSE Bulletin (ACM thentication tests and dis- Special Interest Group on joint encryption: A design Computer Science Educa- method for security pro- tion), 41(2):103–107, June tocols. Journal of Com- 2009. CODEN SIGSD3. puter Security, 12(3–4):409– ISSN 0097-8418 (print), 433, ???? 2004. CODEN 2331-3927 (electronic). JCSIET. ISSN 0926-227X (print), 1875-8924 (elec- Gassend:2008:CPR tronic). [GVC+08] Blaise Gassend, Marten Van Gutmann:20xx:ESR Dijk, Dwaine Clarke, Emina Torlak, Srinivas Devadas, [Gutxx] Peter Gutmann. Encryp- and Pim Tuyls. Controlled tion and security-related re- physical random functions sources. World-Wide Web and applications. ACM site., 20xx. URL http:// Transactions on Informa- www.cs.auckland.ac.nz/~ tion and System Security,10 pgut001/links.html. (4):3:1–3:??, January 2008. CODEN ATISBQ. ISSN Granger:2005:DLP 1094-9224 (print), 1557- [GV05] R. Granger and F. Ver- 7406 (electronic). cauteren. On the dis- Gisin:2000:LCQ crete logarithm problem on algebraic tori. In [GW00] Nicolas Gisin and Stefan Shoup [Sho05a], pages Wolf. Linking classical and REFERENCES 343

quantum key agreement: 1539-9087 (print), 1558- Is there “Bound Informa- 3465 (electronic). tion”? In Bellare [Bel00], pages 482–?? ISBN 3-540- Goldberg:2008:PQM 67907-3. ISSN 0302-9743 [GXT+08] Sharon Goldberg, David (print), 1611-3349 (elec- Xiao, Eran Tromer, Boaz tronic). LCCN QA76.9.A25 Barak, and Jennifer Rex- C79 2000 Bar. URL http: ford. Path-quality monitor- //link.springer-ny.com/ ing in the presence of adver- link/service/series/0558/ saries. ACM SIGMETRICS bibs/1880/18800482.htm; Performance Evaluation Re- http://link.springer- view, 36(1):193–204, June ny.com/link/service/series/ 2008. CODEN ???? ISSN 0558/papers/1880/18800482. 0163-5999 (print), 1557- pdf. 9484 (electronic). Guoxiang:2001:IFB Heys:2000:SAC [GW01] Song Guoxiang and Wang [HA00] Howard Heys and Carlisle Weiwei. Image-feature Adams, editors. Se- based second generation wa- lected areas in cryptogra- termarking in wavelet do- phy: 6th annual interna- main. Lecture Notes in tional workshop, SAC’99, Computer Science, 2251: Kingston, Ontario, Canada, 16–??, 2001. CODEN August 9–10, 1999: pro- LNCSD9. ISSN 0302- ceedings, volume 1758 of 9743 (print), 1611-3349 Lecture Notes in Computer (electronic). URL http: Science. Springer-Verlag, //link.springer-ny.com/ Berlin, Germany / Hei- link/service/series/0558/ delberg, Germany / Lon- bibs/2251/22510016.htm; don, UK / etc., 2000. http://link.springer- ISBN 3-540-67185-4. ISSN ny.com/link/service/series/ 0302-9743 (print), 1611- 0558/papers/2251/22510016. 3349 (electronic). LCCN pdf. QA267.A1 L43 no.1758. Gebotys:2008:EAW Contents: A universal en- cryption standard / Helena [GW08] Catherine H. Gebotys and Handschuh and Serge Vau- Brian A. White. EM analy- denay — Yarrow-160: notes sis of a wireless Java-based on the design and analysis PDA. ACM Transactions on of the Yarrow cryptographic Embedded Computing Sys- pseudorandom number gen- tems, 7(4):44:1–44:??, July erator / John Kelsey, Bruce 2008. CODEN ???? ISSN Schneier, and Niels Fergu- REFERENCES 344

son — Elliptic curve pseu- skaya . . . [et al.] — Uncon- dorandom sequence genera- ditionally secure proactive tors / Guang Gong, Thomas secret sharing scheme with A. Berson, and Douglas R. combinatorial structures / Stinson — Adaptive-attack Douglas R. Stinson and R. norm for decorrelation and Wei — Protecting a mobile super-pseudorandomness / agent’s route against collu- Serge Vaudenay — Guess- sions / Dirk Westhoff . . . [et work and variation distance al.] — Photuris: design cri- as measures of cipher se- teria / William Allen Simp- curity / John O. Pliam son. — Modeling linear char- Haddad:2000:AUA acteristics of substitution- permutation networks / [Had00] Ibrahim F. Haddad. Apache Liam Keliher, Henk Mei- user authentication. Linux jer, and Stafford Tavares Journal, 78:??, October — Strong linear depen- 2000. CODEN LIJOFX. dence and unbiased distri- ISSN 1075-3583 (print), bution of non-propagative 1938-3827 (electronic). vectors / Yuliang Zheng and Xian-Mo Zhang — Secu- Hancock:2000:EWP rity of E2 against truncated differential cryptanalysis / [Han00] Bill Hancock. Not every- Shiho Moriai . . . [et al..] one wants PKI — NSF — Key-schedule cryptanal- opts for digital signature ysis of DEAL / John Kelsey alternative. Computers and Bruce Schneier — Ef- &Security, 19(4):301–302, ficient evaluation of secu- April 1, 2000. CODEN rity against generalized in- CPSEDU. ISSN 0167-4048 terpolation attack / Kazu- (print), 1872-6208 (elec- maro Aoki — Efficient im- tronic). URL https:// plementation of cryptosys- www.sciencedirect.com/ tems based on non-maximal science/article/pii/S0167404800040098. imaginary quadratic or- Harvey:2000:EMA ders / Detlef Huhnlein — Improving and extending [Har00] Ian Harvey. The ef- the Lim/Lee exponentia- fects of multiple algorithms tion algorithm / Biljana in the Advanced Encryp- Cubaleska, Andreas Rieke, tion Standard. In NIST and Thomas Hermann — [NIS00], pages 269–278. Software optimization of ISBN ???? LCCN ???? decorrelation module / Fab- URL http://csrc.nist. rice Noilhan — Pseudonym gov/encryption/aes/round2/ systems / Anna Lysyan- conf3/aes3conf.htm; http: REFERENCES 345

//csrc.nist.gov/encryption/ Harris:2005:GHE aes/round2/conf3/papers/ AES3Proceedings-1.pdf; [Har05b] Shon Harris, editor. Gray http://csrc.nist.gov/ hat hacking: the ethical encryption/aes/round2/ hacker’s handbook. All-in- conf3/papers/AES3Proceedings- one. Osborne/McGraw-Hill, 2.pdf; http://csrc.nist. Berkeley, CA, USA, 2005. gov/encryption/aes/round2/ ISBN 0-07-225709-1 (paper- conf3/papers/AES3Proceedings- back). xx + 434 pp. LCCN 3.pdf; http://csrc.nist. QA76.9.A25 G743 2005. gov/encryption/aes/round2/ conf3/papers/AES3Proceedings. Hars:2006:MIA pdf. [Har06] Laszlo Hars. Modular Hare:2001:RUPa inverse algorithms with- [Har01a] Chris Hare. Revisiting out multiplications for UNIX password controls – cryptographic applications. part 1. Sys Admin: The EURASIP Journal on Em- Journal for UNIX Systems bedded Systems, 2006:1–13, Administrators, 10(10):30, 2006. CODEN ???? ISSN 32–34, October 2001. CO- 1687-3955 (print), 1687- DEN SYADE7. ISSN 1061- 3963 (electronic). URL 2688. URL http://www. http://downloads.hindawi. samag.com/. com/journals/es/2006/032192. pdf. Article ID 32192. Hare:2001:RUPb Harman:2007:PDS [Har01b] Chris Hare. Revisiting UNIX password controls – [Har07a] G. (Glyn) Harman. Prime- part 2. Sys Admin: The detecting sieves.Lon- Journal for UNIX Systems don Mathematical Society Administrators, 10(11):35– monographs. Princeton Uni- 38, November 2001. CO- versity Press, Princeton, DEN SYADE7. ISSN 1061- NJ, USA, 2007. ISBN 0-691- 2688. 12437-X. ???? pp. LCCN Harrington:2005:NSP QA246 .H375 2007. URL http://www.loc.gov/catdir/ [Har05a] Jan L. Harrington. Net- enhancements/fy0731/2007061051- work security: a practical d.html; http://www.loc. approach. Elsevier, Am- gov/catdir/enhancements/ sterdam, The Netherlands, fy0731/2007061051-t.html; 2005. ISBN 0-12-311633- http://www.loc.gov/catdir/ 3. xv + 365 pp. LCCN enhancements/fy0734/2007061051- TK5105.59 .H357 2005. b.html. REFERENCES 346

Hars:2007:DIH curve cryptosystems. IEEE Transactions on Comput- [Har07b] Laszlo Hars. Discryp- ers, 50(10):1071–1083, 2001. tion: Internal hard-disk en- CODEN ITCOB4. ISSN cryption for secure stor- 0018-9340 (print), 1557- age. Computer, 40(6):103– 9956 (electronic). 105, June 2007. CODEN CPTRB4. ISSN 0018-9162 Hassler:2002:JCP (print), 1558-0814 (elec- tronic). [Has02] Vesna Hassler. Java card for e-payment applications. Hasan:2000:LTB Artech House computer se- curity series. Artech House [Has00] M. Anwarul Hasan. Look- Inc., Norwood, MA, USA, up table-based large finite 2002. ISBN 1-58053-291- field multiplication in mem- 8. xvii + 362 pp. LCCN ory constrained cryptosys- QA76.73.J38 J3638 2002. tems. IEEE Transactions on Computers, 49(7):749– Haufler:2003:CVH 758, 2000. CODEN IT- COB4. ISSN 0018-9340 [Hau03] Hervie Haufler. Codebreak- (print), 1557-9956 (elec- ers’ victory: how the Allied tronic). cryptographers won World War II. New American Li- Hasan:2001:ECM brary, New York, NY, USA, 2003. ISBN 0-451-20979-6. [Has01a] M. A. Hasan. Efficient 344 pp. LCCN D810.C88 computation of multiplica- H38 2003. tive inverses for crypto- graphic applications. In Haufler:2006:SWN Burgess and Ciminiera [BC01], pages 66–72. ISBN [Hau06] Hervie Haufler. The spies 0-7695-1150-3; 0-7695-1152- who never were: the true X. ISSN 1063-6889. LCCN story of the Nazi spies who QA76.9.C62 S95 2001. were actually Allied double agents. NAL Caliber, New US$145. URL http://www. York, NY, USA, 2006. ISBN acsel-lab.com/arithmetic/ 0-451-21751-9 (paperback). arith15/papers/ARITH15_ ???? pp. LCCN D810.S7 Hasan.pdf. IEEE order no. PR01150. H37 2006. URL http:// www.loc.gov/catdir/toc/ Hasan:2001:PAA ecip0517/2005022622.html. [Has01b] M. A. Hasan. Power anal- Hayat:2004:CSE ysis attacks and algorith- mic approaches to their [HAuR04] Khawaja Amer Hayat, countermeasures for Koblitz Umar Waqar Anis, and REFERENCES 347

S. Tauseef ur Rehman. Huffmire:2008:DSS Cryptanalysis of some en- + cryption/cipher schemes us- [HBC 08] Ted Huffmire, Brett Broth- ing related key attack. erton, Nick Callegari, Jonathan SIGCSE Bulletin (ACM Valamehr, Jeff White, Ryan Special Interest Group on Kastner, and Tim Sher- Computer Science Edu- wood. Designing secure sys- cation), 36(4):85–87, De- tems on reconfigurable hard- cember 2004. CODEN ware. ACM Transactions on SIGSD3. ISSN 0097-8418 Design Automation of Elec- (print), 2331-3927 (elec- tronic Systems, 13(3):44:1– tronic). NOTE FROM 44:??, July 2008. CODEN ACM: It has been deter- ATASFO. ISSN 1084-4309 mined that the authors of (print), 1557-7309 (elec- this article plagiarized the tronic). contents from a previously Hartel:2001:TMS published paper. Therefore ACM has shut off access to [HBdJL01] Pieter H. Hartel, Michael J. this paper. Butler, Eduard de Jong, and Mark Longley. Trans- Hayashi:2006:QIT acted memory for smart [Hay06] Masahito Hayashi. Quan- cards. Lecture Notes in tum Information Theory: Computer Science, 2021: An Introduction. Springer- 478–??, 2001. CODEN Verlag, Berlin, Germany / LNCSD9. ISSN 0302- Heidelberg, Germany / Lon- 9743 (print), 1611-3349 don, UK / etc., 2006. (electronic). URL http: ISBN 3-540-30265-4. LCCN //link.springer-ny.com/ ???? URL http://www. link/service/series/0558/ springer.com/dal/home? bibs/2021/20210478.htm; SGWID=1-102-22-100724694- http://link.springer- 0. ny.com/link/service/series/ 0558/papers/2021/20210478. Hoglund:2006:RSW pdf. [HB06] Greg Hoglund and James Holcomb:2009:PSS Butler. Rootkits: subverting the Windows kernel. Addi- [HBF09] D. E. Holcomb, W. P. son-Wesley, Reading, MA, Burleson, and K. Fu. Power- USA, 2006. ISBN 0-321- up SRAM state as an 29431-9 (paperback). xxiii + identifying fingerprint and 324 pp. LCCN QA76.9.A25 source of true random num- H637 2006. URL http:// bers. IEEE Transactions www.loc.gov/catdir/toc/ on Computers, 58(9):1198– ecip0512/2005013061.html. 1210, September 2009. CO- REFERENCES 348

DEN ITCOB4. ISSN scheme with ID-based ac- 0018-9340 (print), 1557- cess control in a hierachy. 9956 (electronic). URL Fundamenta Informaticae, http://ieeexplore.ieee. 84(3–4):353–361, Septem- org/stamp/stamp.jsp?tp= ber 2008. CODEN FU- &arnumber=4674345. MAAJ. ISSN 0169-2968 Humphries:2002:IC (print), 1875-8681 (elec- tronic). [HC02] Jeffrey W. Humphries and Martin C. Carlisle. In- Hernandez-Castro:2006:SGG troduction to Cryptogra- [HCBLETRG06] Julio C. Hernandez-Castro, phy. ACM Journal on Ignacio Blasco-Lopez, Juan M. Educational Resources in Estevez-Tapiador, and Ar- Computing (JERIC), 2(3): turo Ribagorda-Garnacho. 2, September 2002. CODEN Steganography in games: ???? ISSN 1531-4278. a general methodology Huang:2004:NDE and its application to the [HC04a] Hui-Feng Huang and Chin- game of go. Computers Chen Chang. A new design &Security, 25(1):64–71, of efficient partially blind February 2006. CODEN signature scheme. The Jour- CPSEDU. ISSN 0167-4048 nal of Systems and Software, (print), 1872-6208 (elec- 73(3):397–403, November/ tronic). URL https:// December 2004. CODEN www.sciencedirect.com/ JSSODM. ISSN 0164-1212 science/article/pii/S0167404805002002. (print), 1873-1228 (elec- Han:2008:PBPa tronic). [HCD08a] Song Han, Elizabeth Chang, Hwang:2004:NMP and Tharam Dillon. Pairing- [HC04b] Shin-Jia Hwang and Chiu- based public-key encryption Chin Chen. New multi- schemes with backward- proxy multi-signature schemes. and-forward security. In- Applied Mathematics and ternational Journal of Com- Computation, 147(1):57–67, puter Systems Science and January 5, 2004. CODEN Engineering, 23(1):??, Jan- AMHCBQ. ISSN 0096-3003 uary 2008. CODEN (print), 1873-5649 (elec- CSSEEI. ISSN 0267-6192. tronic). Han:2008:PBPb Huang:2008:NCK [HCD08b] Song Han, Elizabeth Chang, [HC08] Hui-Feng Huang and Chin- and Tharam Dillon. Pairing- Chen Chang. A novel cryp- based public-key encryption tographic key assignment schemes with backward- REFERENCES 349

and-forward security. In- Han:2009:ICS ternational Journal of Com- puter Systems Science and [HCK09] Dong-Guk Han, Dooho Engineering, 23(4):??, July Choi, and Howon Kim. 2008. CODEN CSSEEI. Improved computation of ISSN 0267-6192. square roots in specific fi- nite fields. IEEE Trans- Henderson:2002:MTS actions on Computers,58 (2):188–196, February 2009. [HCDO02] Marie Henderson, Robert CODEN ITCOB4. ISSN Coulter, Ed Dawson, and 0018-9340 (print), 1557- Eiji Okamoto. Modelling 9956 (electronic). URL trust structures for public http://ieeexplore.ieee. key infrastructures. Lec- org/stamp/stamp.jsp?tp= ture Notes in Computer Sci- &arnumber=4663058. ence, 2384:56–??, 2002. CO- DEN LNCSD9. ISSN 0302- He:2002:WSM 9743 (print), 1611-3349 [He02] Wei-Hua He. Weak- (electronic). URL http: nesses in some multisigna- //link.springer-ny.com/ ture schemes for specified link/service/series/0558/ group of verifiers. Infor- bibs/2384/23840056.htm; mation Processing Letters, http://link.springer- 83(2):95–99, July 31, 2002. ny.com/link/service/series/ CODEN IFPLAT. ISSN 0558/papers/2384/23840056. 0020-0190 (print), 1872- pdf. 6119 (electronic). Halevi:2002:SSE Heger:2009:CTQ

[HCJ02] Shai Halevi, Don Copper- [Heg09] M. Heger. Cryptographers smith, and Charanjit Jutla. take on quantum comput- Scream: a software-efficient ers — [update]. IEEE stream cipher. Lecture Spectrum, 46(1):14, January Notes in Computer Science, 2009. CODEN IEESAM. 2365:195–??, 2002. CO- ISSN 0018-9235 (print), DEN LNCSD9. ISSN 0302- 1939-9340 (electronic). 9743 (print), 1611-3349 Heijl:2001:DXS (electronic). URL http: //link.springer-ny.com/ [Hei01] Danny Heijl. The Delphi link/service/series/0558/ XML SAX2 component and bibs/2365/23650195.htm; MSXML 3.0. Dr. Dobb’s http://link.springer- Journal of Software Tools, ny.com/link/service/series/ 26(9):42, 46, 48, 50, 52, 0558/papers/2365/23650195. 54, September 2001. CO- pdf. DEN DDJOEB. ISSN 1044- REFERENCES 350

789X. URL http://www. Henderson:2006:CBG ddj.com/ftp/2001/2001_ 09/xmlsax2.txt; http: [Hen06a] Roger William Henderson. //www.ddj.com/ftp/2001/ Cryptanalysis of braid group 2001_09/xmlsax2.zip.See cryptosystem and related correction [TEM+01]. combinatorial structures. Thesis (Ph.D.), University Heiser:2003:BCB of London, London, UK, 2006. ???? pp. [Hei03] Jay G. Heiser. Beyond cryp- tography: Bruce Schneier’s Henry:2006:TFA beyond fear: thinking sen- [Hen06b] Paul A. Henry. Two-factor sibly about security in an authentication — a look be- uncertain world. Computers hind the headlines. Net- &Security, 22(8):673–674, work Security, 2006(4):18– December 2003. CODEN 19, April 2006. CODEN CPSEDU. ISSN 0167-4048 NTSCF5. ISSN 1353-4858 (print), 1872-6208 (elec- (print), 1872-9371 (elec- tronic). URL https:// tronic). URL http:// www.sciencedirect.com/ www.sciencedirect.com/ science/article/pii/S0167404803000051. science/article/pii/S1353485806703609. Heikkila:2007:ESC Herzberg:2002:SX

[Hei07] Faith M. Heikkila. En- [Her02] Amir Herzberg. Securing cryption: Security consid- XML. Dr. Dobb’s Jour- erations for portable me- nal of Software Tools,27 dia devices. IEEE Secu- (3):56, 59–62, March 2002. rity & Privacy, 5(4):22–27, CODEN DDJOEB. ISSN July/August 2007. CO- 1044-789X. URL http: DEN ???? ISSN 1540-7993 //www.ddj.com/ftp/2002/ (print), 1558-4046 (elec- 2002_03/secxml.txt. tronic). Herranz:2006:DIB

Hendry:2001:SCS [Her06] Javier Herranz. Determinis- tic identity-based signatures [Hen01] Mike Hendry. Smart card for partial aggregation. The security and applications. Computer Journal, 49(3): The Artech House telecom- 322–330, May 2006. CO- munications library. Artech DEN CMPJA6. ISSN 0010- House Inc., Norwood, MA, 4620 (print), 1460-2067 USA, second edition, 2001. (electronic). URL http:/ ISBN 1-58053-156-3. xviii + /comjnl.oxfordjournals. 305 pp. LCCN TK7895.S62 org/cgi/content/abstract/ H46 2001. 49/3/322; http://comjnl. REFERENCES 351

oxfordjournals.org/cgi/ Gentry, Lynn and Shacham. content/full/49/3/322; Information Processing Let- http://comjnl.oxfordjournals. ters, 89(3):111–114, Febru- org/cgi/reprint/49/3/322. ary 14, 2004. CODEN IF- PLAT. ISSN 0020-0190 Herranz:2007:IBR (print), 1872-6119 (elec- [Her07] Javier Herranz. Identity- tronic). based ring signatures from RSA. Theoretical Computer Hess:2004:GAR Science, 389(1–2):100–117, December 10, 2007. CO- [Hes04b] Florian Hess. The GHS at- DEN TCSCDI. ISSN 0304- tack revisited. LMS Journal 3975 (print), 1879-2294 of Computation and Mathe- (electronic). matics, 7:167–??, 2004. CO- DEN ???? ISSN 1461-1570. Heron:2009:AES Heys:2003:ASC [Her09a] Simon Heron. Advanced En- cryption Standard (AES). [Hey03] H. M. Heys. Analysis of the Network Security, 2009(12): statistical cipher feedback 8–12, December 2009. CO- mode of block ciphers. IEEE DEN NTSCF5. ISSN 1353- 4858 (print), 1872-9371 Transactions on Computers, 52(1):77–92, January 2003. (electronic). URL http:/ CODEN ITCOB4. ISSN /www.sciencedirect.com/ 0018-9340 (print), 1557- science/article/pii/S1353485810700064. 9956 (electronic). URL Herzberg:2009:DBE http://ieeexplore.ieee. org/stamp/stamp.jsp?tp= [Her09b] Amir Herzberg. DNS-based &arnumber=1159755. email sender authentica- tion mechanisms: a crit- Hassler:2000:OFA ical review. Computers &Security, 28(8):731–742, [HF00] Vesna Hassler and Oliver November 2009. CODEN Fodor. OpenCard Frame- CPSEDU. ISSN 0167-4048 work application develop- (print), 1872-6208 (elec- ment. Dr. Dobb’s Journal of tronic). URL https:// Software Tools, 25(2):70, 72, www.sciencedirect.com/ 74–76, February 2000. CO- science/article/pii/S0167404809000492. DEN DDJOEB. ISSN 1044- Hess:2004:SVE 789X. URL http://www. ddj.com/ftp/2000/2000_ [Hes04a] F. Hess. On the security 02/ocfjava.txt; http: of the verifiably-encrypted //www.ddj.com/ftp/2000/ signature scheme of Boneh, 2000_02/ocfjava.zip. REFERENCES 352

Horvitz:2003:WKA 3365-0. LCCN QA76.9.A25 P82 2005. URL http:// [HG03] Omer Horvitz and Virgil www.loc.gov/catdir/toc/ Gligor. authentic- fy0612/2005048178.html. ity and the computational completeness of formal en- Howgrave-Graham:2007:HLR cryption. In Boneh [Bon03], [HG07] Nick Howgrave-Graham. pages 530–547. CODEN A hybrid lattice-reduction LNCSD9. ISBN 3-540- and meet-in-the-middle at- 40674-3. ISSN 0302-9743 tack against NTRU. In (print), 1611-3349 (elec- Menezes [Men07], pages tronic). LCCN QA76.9.A25 150–169. ISBN 3-540-74142- C79 2003. URL http: 9 (paperback). LCCN //link.springer-ny.com/ QA76.9.A25 C79 2007. URL link/service/series/0558/ http://portal.acm.org/ tocs/t2729.htm; http: citation.cfm?id=1777777. //www.springerlink.com/ 1777791. openurl.asp?genre=issue& Hasenplaugh:2007:FMR issn=0302-9743&volume= 2729; http://www.springerlink.[HGG07] William Hasenplaugh, Gun- com/openurl.asp?genre= nar Gaubatz, and Vinodh volume&id=doi:10.1007/ Gopal. Fast modular re- b11817. duction. In Kornerup and Horan:2005:NRN Muller [KM07], pages 225– 229. ISBN 0-7695-2854- [HG05a] D. M. Horan and R. A. 6. ISSN 1063-6889. LCCN Guinee. A novel ran- ???? URL http://www. dom number generator lirmm.fr/arith18/. based on pseudonoise se- Howgrave-Graham:2003:IDF quences. IEE Confer- ence Publications, 2005 [HGNP+03] Nick Howgrave-Graham, (CP511):431–436, 2005. Phong Q. Nguyen, David CODEN ???? ISSN Pointcheval, John Proos, ???? URL http://link. Joseph H. Silverman, Ari aip.org/link/abstract/ Singer, and William Whyte. IEECPS/v2005/iCP511/p431/ The impact of decryp- s1. tion failures on the se- Howgrave-Graham:2005:PKC curity of NTRU encryp- tion. In Boneh [Bon03], [HG05b] Nick Howgrave-Graham. pages 226–246. CODEN Public-key cryptography LNCSD9. ISBN 3-540- and proofs of security. In 40674-3. ISSN 0302-9743 Garrett and Lieman [GL05], (print), 1611-3349 (elec- pages 73–89. ISBN 0-8218- tronic). LCCN QA76.9.A25 REFERENCES 353

C79 2003. URL http: Hendricks:2007:LOB //link.springer-ny.com/ link/service/series/0558/[HGR07] James Hendricks, Gre- tocs/t2729.htm; http: gory R. Ganger, and Mich- //www.springerlink.com/ ael K. Reiter. Low- openurl.asp?genre=issue& overhead Byzantine fault- issn=0302-9743&volume= tolerant storage. Operating 2729; http://www.springerlink. Systems Review, 41(6):73– com/openurl.asp?genre= 86, December 2007. CO- volume&id=doi:10.1007/ DEN OSRED8. ISSN 0163- b11817. 5980 (print), 1943-586X (electronic). Howgrave-Graham:2003:HNP Handschuh:2004:SAC [HGNS03] Nick A. Howgrave-Graham, Phong Q. Nguyen, and [HH04] Helena Handschuh and Igor E. Shparlinski. Hid- M. Anwar Hasan, editors. den number problem with Selected Areas in Cryp- hidden multipliers, timed- tography: 11th interna- release crypto, and noisy tional workshop, SAC 2004, exponentiation. Math- Waterloo, Canada, August ematics of Computation, 9–10, 2004: Revised se- 72(243):1473–1485, July lected papers, volume 3357 2003. CODEN MCM- of Lecture Notes in Com- PAF. ISSN 0025-5718 puter Science. Springer-Ver- (paper), 1088-6842 (elec- lag, Berlin, Germany / Hei- tronic). URL http: delberg, Germany / Lon- //www.ams.org/journal- don, UK / etc., 2004. CO- getitem?pii=S0025-5718- DEN LNCSD9. ISBN 3-540- 03-01495-9; http://www. 24327-5. ISSN 0302-9743 ams.org/mcom/2003-72-243/ (print), 1611-3349 (elec- S0025-5718-03-01495-9/ tronic). LCCN QA76.9.A25 S0025-5718-03-01495-9. S22 2004. URL http: dvi; http://www.ams. //www.springerlink.com/ org/mcom/2003-72-243/S0025- openurl.asp?genre=issue& 5718-03-01495-9/S0025- issn=0302-9743&volume= 5718-03-01495-9.pdf; 3357; http://www.springerlink. http://www.ams.org/mcom/ com/openurl.asp?genre= 2003-72-243/S0025-5718- volume&id=doi:10.1007/ 03-01495-9/S0025-5718- b105103. 03-01495-9.ps; http:/ Handschuh:2005:SAC /www.ams.org/mcom/2003- 72-243/S0025-5718-03-01495-[HH05] Helena Handschuh and 9/S0025-5718-03-01495- M. Anwar Hasan, editors. 9.tex. Selected areas in cryptog- REFERENCES 354

raphy: 11th international AMHCBQ. ISSN 0096-3003 workshop, SAC 2004, Wa- (print), 1873-5649 (elec- terloo, Canada, August 9– tronic). 10, 2004: Revised se- Hoffstein:2006:NNE lected papers, volume 3357 of Lecture Notes in Com- [HHG06] J. Hoffstein and N. Howgrave- puter Science. Springer-Ver- Graham. NTRUEncrypt lag, Berlin, Germany / Hei- and NTRUSign: efficient delberg, Germany / Lon- public-key algorithms for a don, UK / etc., 2005. CO- post-quantum world. In DEN LNCSD9. ISBN 3-540- PQCrypto 2006: Interna- 24327-5. ISSN 0302-9743 tional Workshop on Post- (print), 1611-3349 (elec- Quantum Cryptography, tronic). LCCN QA76.9.A25 pages 141–158. Springer- S22 2004. URL http:// Verlag, Berlin, Germany / springerlink.metapress. Heidelberg, Germany / Lon- com/openurl.asp?genre= don, UK / etc., 2006. ISBN issue&issn=0302-9743&volume= ???? LCCN ???? 3357; http://www.springerlink. Hoffstein:2003:NDS com/openurl.asp?genre= issue&issn=0302-9743&volume=[HHGP+03] Jeffrey Hoffstein, Nick 3357. Howgrave-Graham, Jill Pipher, Hung:2009:FBA Joseph H. Silverman, and William Whyte. NTRUSIGN: [HH09] Kuo Lung Hung and Shin- Digital signatures using Wei He. Feature based affine the NTRU lattice. In invariant watermarking ro- Joye [Joy03b], pages 122– bust to geometric distor- 140. CODEN LNCSD9. tions. Fundamenta Infor- ISBN 3-540-00847-0. ISSN maticae, 92(1–2):131–143, 0302-9743 (print), 1611- January 2009. CODEN FU- 3349 (electronic). LCCN MAAJ. ISSN 0169-2968 QA76.9.A25 C822 2003. (print), 1875-8681 (elec- URL http://link.springer- tronic). ny.com/link/service/series/ Hwang:2005:TSP 0558/tocs/t2612.htm; http://www.springerlink. [HHC05] Min-Shiang Hwang, Kuo- com/openurl.asp?genre= Feng Hwang, and Chin- issue&issn=0302-9743&volume= Chen Chang. A time- 2612. stamping protocol for digi- Hess:2004:CTT tal watermarking. Applied Mathematics and Computa- [HHJS04] Adam Hess, Jason Holt, tion, 169(2):1276–1284, Oc- Jared Jacobson, and Kent E. tober 15, 2005. CODEN Seamons. Content-triggered REFERENCES 355

trust negotiation. ACM Hernandez, and Alfred Transactions on Informa- Menezes. Software imple- tion and System Security,7 mentation of elliptic curve (3):428–456, August 2004. cryptography over binary CODEN ATISBQ. ISSN fields. Lecture Notes in 1094-9224 (print), 1557- Computer Science, 1965: 7406 (electronic). 1–??, 2001. CODEN LNCSD9. ISSN 0302- Hong:2004:DCT 9743 (print), 1611-3349 [HHK+04] Seokhie Hong, Deukjo (electronic). URL http: Hong, Youngdai Ko, Donghoon //link.springer-ny.com/ Chang, Wonil Lee, and link/service/series/0558/ Sangjin Lee. Differential bibs/1965/19650001.htm; cryptanalysis of TEA and http://link.springer- XTEA. Lecture Notes in ny.com/link/service/series/ Computer Science, 2971: 0558/papers/1965/19650001. 402–417, 2004. CODEN pdf. LNCSD9. ISSN 0302- 9743 (print), 1611-3349 Hamann:2001:SBA (electronic). URL http: [HHSS01] E.-M. Hamann, H. Henn, //www.springerlink.com/ T. Sch¨ack, and F. Seliger. content/n4exvw35x7g8t6pb/ Securing e-business appli- . cations using smart cards. Hankerson:2000:CTC IBM Systems Journal,40 (3):635–647, ???? 2001. [HHL+00] Darrel R. Hankerson, Gary CODEN IBMSA7. ISSN Hoffman,D.A.Leonard, 0018-8670. URL http: Charles C. Lindner, K. T. //www.research.ibm.com/ Phelps,C.A.Rodger,and journal/sj/403/hamann. J. R. Wall. Coding the- html; http://www.research. ory and cryptography: the ibm.com/journal/sj/403/ essentials, volume 234 of hamann.pdf. Monographs and textbooks in pure and applied mathe- Han:2007:FIE matics. Marcel Dekker, Inc., New York, NY, USA, sec- [HHYW07] Fengling Han, Jiankun Hu, ond edition, 2000. ISBN Xinghuo Yu, and Yi Wang. 0-8247-0465-7. x + 350 Fingerprint images en- pp. LCCN QA268 .C675 cryption via multi-scroll 2000. URL http://lccn. chaotic attractors. Applied loc.gov/00060106. Mathematics and Computa- tion, 185(2):931–939, Febru- Hankerson:2001:SIE ary 15, 2007. CODEN [HHM01] Darrel Hankerson, Julio L´opez AMHCBQ. ISSN 0096-3003 REFERENCES 356

(print), 1873-5649 (elec- NTSCF5. ISSN 1353-4858 tronic). (print), 1872-9371 (elec- tronic). URL http:// Higgins:2008:NSC www.sciencedirect.com/ [Hig08] Peter M. Higgins. Num- science/article/pii/S1353485806703610. ber story: from counting Hacigumus:2002:ESE to cryptography.Coper- nicus, New York, NY, [HILM02] Hakan Hacig¨um¨u¸s, Bala USA, 2008. ISBN 1- Iyer, Chen Li, and Sharad 84800-000-6 (hardcover), 1- Mehrotra. Executing 84800-001-4 (ebook). 323 SQL over encrypted data pp. LCCN QA241 .H48 in the database-service- 2008. URL http:// provider model. In Franklin www.loc.gov/catdir/toc/ et al. [FMA02], pages 216– fy0804/2007936363.html. 227. ISBN ???? LCCN ???? ACM order number 475020. Hill:2000:KII Hirose:2009:SAD [Hil00] Paul B. Hill. Ker- [Hir09] S. Hirose. Security analy- beros interoperability is- sis of DRBG using HMAC sues. In USENIX [USE00a], in NIST SP 800-90. In page ?? ISBN 1- Chung et al. [CSY09], 880446-19-7. LCCN ???? pages 278–291. CODEN URL http://db.usenix. LNCSD9. ISBN 3-642- org/publications/library/ 00305-2 (print), 3-642- proceedings/lisa-nt2000/ 00306-0 (e-book). ISSN hill.html. 0302-9743 (print), 1611- Hilley:2005:CRM 3349 (electronic). LCCN ???? URL http:/ [Hil05] Sarah Hilley. Crypto race /www.springerlink.com/ for mathematical infinity. content/978-3-642-00306- Network Security, 2005(4): 6. 10–11, April 2005. CODEN NTSCF5. ISSN 1353-4858 Hinkelmann:2007:CUN (print), 1872-9371 (elec- [HJ07] Markus Hinkelmann and tronic). URL http:// Andreas Jakoby. Commu- www.sciencedirect.com/ nications in unknown net- science/article/pii/S1353485805702233. works: Preserving the se- Hilley:2006:SSD cret of topology. Theoretical Computer Science, 384(2– [Hil06] Sarah Hilley. Secret Ser- 3):184–200, October 1, 2007. vice dismantles web forums. CODEN TCSCDI. ISSN Network Security, 2006(4): 0304-3975 (print), 1879- 20, April 2006. CODEN 2294 (electronic). REFERENCES 357

Huhnlein:2001:TPN http://arith17.polito. it/final/paper-109.pdf. [HJW01] Detlef H¨uhnlein, Michael J. Jacobson,Jr.,andDamian Kim:2000:RMW Weber. Towards prac- [hKLS00] Tae hoon Kim, Jehee Lee, tical non-interactive pub- and Sung Yong Shin. Ro- lic key cryptosystems us- bust motion watermark- ing non-maximal imaginary ing based on multireso- quadratic orders (extended lution analysis. Compu- abstract). Lecture Notes ter Graphics Forum, 19(3): in Computer Science, 2012: ??, August 2000. CO- 275–287, 2001. CODEN DEN CGFODY. ISSN LNCSD9. ISSN 0302- 0167-7055 (print), 1467- 9743 (print), 1611-3349 8659 (electronic). URL aid= (electronic). URL http: 411& http://www. //link.springer-ny.com/ blackwellpublishers.co. link/service/series/0558/ uk/asp/journal.asp?ref= bibs/2012/20120275.htm; 0167-7055& iid=3& http://link.springer- amp; src=ard& vid= ny.com/link/service/series/ 19. 0558/papers/2012/20120275. Heuberger:2005:AGE pdf. [HKPR05] Clemens Heuberger, Rajen- Huang:2005:ASE dra Katti, Helmut Prodinger, [HJW05] Qiang Huang, David Jao, and Xiaoyu Ruan. The and Helen J. Wang. Ap- alternating greedy expan- plications of secure elec- sion and applications to tronic voting to auto- computing digit expansions mated privacy-preserving from left-to-right in cryp- troubleshooting. In Mead- tography. Theoretical Com- ows and Syverson [MS05b], puter Science, 341(1–3):55– pages 68–80. ISBN 1-59593- 72, September 5, 2005. 226-7. LCCN QA76.9.A25. CODEN TCSCDI. ISSN ACM order number 459050. 0304-3975 (print), 1879- 2294 (electronic). Harris:2005:IUS Handschuh:2001:ASE [HKA+05] David Harris, Ram Krish- namurthy, Mark Anders, [HKR01] Helena Handschuh, Lars R. Sanu Mathew, and Steven Knudsen, and Matthew J. Hsu. An improved uni- Robshaw. Analysis of fied scalable radix-2 Mont- SHA-1 in encryption mode. gomery multiplier. In IEEE In Topics in cryptology— [IEE05b], page ?? ISBN CT-RSA 2001 (San Fran- ???? LCCN ???? URL cisco, CA), volume 2020 of REFERENCES 358

Lecture Notes in Comput. Horwitz:2002:THI Sci., pages 70–83. Spring- er-Verlag, Berlin, Ger- [HL02] Jeremy Horwitz and Ben many / Heidelberg, Ger- Lynn. Toward hierarchi- many / London, UK / cal identity-based encryp- etc., 2001. URL http: tion. Lecture Notes in //link.springer-ny.com/ Computer Science, 2332: link/service/series/0558/ 466–??, 2002. CODEN bibs/2020/20200070.htm; LNCSD9. ISSN 0302- http://link.springer- 9743 (print), 1611-3349 ny.com/link/service/series/ (electronic). URL http: 0558/papers/2020/20200070. //link.springer-ny.com/ pdf. link/service/series/0558/ bibs/2332/23320466.htm; Hofmeister:2000:COS http://link.springer- ny.com/link/service/series/ [HKS00] Thomas Hofmeister, Matthias 0558/papers/2332/23320466. Krause, and Hans U. Si- pdf. mon. Contrast-optimal k out of n secret sharing Howard:2003:WSC schemes in visual cryptog- [HL03] Michael Howard and David raphy. Theoretical Com- LeBlanc. Writing secure puter Science, 240(2):471– code. Microsoft Press, Red- 485, June 17, 2000. CO- mond, WA, USA, second DEN TCSCDI. ISSN 0304- edition, 2003. ISBN 0- 3975 (print), 1879-2294 7356-1722-8. xxviii + 768 (electronic). URL http: pp. LCCN QA76.9.A25 //www.elsevier.nl/gej- H698 2003. ng/10/41/16/174/23/31/ abstract.html; http: Hwang:2004:REL //www.elsevier.nl/gej- [HL04] Shin-Jia Hwang and Yun- ng/10/41/16/174/23/31/ Hua Lee. Repairing article.pdf. ElGamal-like multi-signature Hiltgen:2006:SIB schemes using self-certified public keys. Applied Math- [HKW06] Alain Hiltgen, Thorsten ematics and Computation, Kramp, and Thomas Weigold. 156(1):73–83, August 25, Secure Internet banking au- 2004. CODEN AMHCBQ. thentication. IEEE Secu- ISSN 0096-3003 (print), rity & Privacy, 4(2):21–29, 1873-5649 (electronic). March/April 2006. CO- Hohenberger:2005:HSO DEN ???? ISSN 1540-7993 (print), 1558-4046 (elec- [HL05a] Susan Hohenberger and tronic). Anna Lysyanskaya. How to REFERENCES 359

securely outsource crypto- Chih Liao. Security of graphic computations. In Tzeng–Hwang’s authenti- Kilian [Kil05], pages 264– cated encryption scheme ?? CODEN LNCSD9. based on elliptic curve dis- ISBN 3-540-24573-1 (soft- crete logarithm problems. cover). ISSN 0302-9743 Applied Mathematics and (print), 1611-3349 (elec- Computation, 168(1):717– tronic). LCCN QA76.9.A25 721, September 1, 2005. T44 2005. URL http: CODEN AMHCBQ. ISSN //www.springerlink.com/ 0096-3003 (print), 1873- openurl.asp?genre=issue& 5649 (electronic). issn=0302-9743&volume= Howard:2006:SDL 3378; http://www.springerlink. com/openurl.asp?genre= [HL06] Michael Howard and Steve volume&id=doi:10.1007/ Lipner. The security de- b106171. velopment lifecycle: SDL, Hwang:2005:TAU a process for developing demonstrably more secure [HL05b] Kuo-Feng Hwang and I- software. Secure soft- En Liao. Two attacks ware development series. on a user friendly remote Microsoft Press, Redmond, authentication scheme with WA, USA, 2006. ISBN 0- Smart Cards. Operating 7356-2214-0. xxii + 320 Systems Review, 39(2):94– pp. LCCN QA76.76.D47 96, April 2005. CODEN H74 2006. OSRED8. ISSN 0163-5980 (print), 1943-586X (elec- Huang:2007:EPS tronic). [HL07] Chung-Ming Huang and Hwang:2005:SHW Jian-Wei Li. Efficient and provably secure IP multime- [HL05c] Shin-Jia Hwang and Hao- dia subsystem authentica- Chih Liao. Security of tion for UMTS. The Com- Hsu–Wu’s authenticated en- puter Journal, 50(6):739– cryption scheme with (t, n) 757, November 2007. CO- shared verification. Applied DEN CMPJA6. ISSN 0010- Mathematics and Computa- 4620 (print), 1460-2067 tion, 167(1):281–285, Au- (electronic). URL http:/ gust 5, 2005. CODEN /comjnl.oxfordjournals. AMHCBQ. ISSN 0096-3003 org/cgi/content/abstract/ (print), 1873-5649 (elec- 50/6/739; http://comjnl. tronic). oxfordjournals.org/cgi/ content/full/50/6/739; Hwang:2005:STH http://comjnl.oxfordjournals. [HL05d] Shin-Jia Hwang and Hao- org/cgi/reprint/50/6/739. REFERENCES 360

Hu:2007:DWD Donghyeon Cheon, and Inho Cho. Provable security [HLC07] Ming-Chiang Hu, Der- against differential and lin- Chyuan Lou, and Ming- ear cryptanalysis for the Chang Chang. Dual- SPN structure. Lecture wrapped digital watermark- Notes in Computer Science, ing scheme for image copy- 1978:273–??, 2001. CO- right protection. Comput- DEN LNCSD9. ISSN 0302- ers & Security, 26(4):319– 9743 (print), 1611-3349 330, June 2007. CODEN (electronic). URL http: CPSEDU. ISSN 0167-4048 //link.springer-ny.com/ (print), 1872-6208 (elec- link/service/series/0558/ tronic). URL https:// bibs/1978/19780273.htm; www.sciencedirect.com/ http://link.springer- science/article/pii/S0167404806002070. ny.com/link/service/series/ Hwang:2008:CPK 0558/papers/1978/19780273. pdf. [HLC08] Y. H. Hwang, J. K. Liu, and S. S. Chow. Certifi- Han:2002:DMA

cateless public key encryp- + tion secure against malicious [HLL 02] Hong Han, Xian Liang Lu, KGC attacks in the stan- Jun Lu, Chen Bo, and dard model. J.UCS: Jour- Ren Li Yong. Data mining nal of Universal Computer aided signature discovery in Science, 14(3):463–480, ???? network-based intrusion de- 2008. CODEN ???? ISSN tection system. Operating 0948-6968. URL http:// Systems Review, 36(4):7–13, October 2002. CODEN OS- www.jucs.org/jucs_14_3/ certificateless_public_ RED8. ISSN 0163-5980 (print), 1943-586X (elec- key_encryption. tronic). Hwang:2000:CBV Hwang:2003:TRB [HLH00] Min-Shiang Hwang, Iuon- Chung Lin, and Kuo-Feng [HLL03] Min-Shiang Hwang, Cheng- Hwang. Cryptanalysis of Chi Lee, and Yan-Chi Lai. the batch verifying multiple Traceability on RSA-based RSA digital signatures. In- partially signature with low formatica (Vilnius), 11(1): computation. Applied Math- 15–18, 2000. ISSN 0868- ematics and Computation, 4952. 145(2–3):465–468, Decem- Hong:2001:PSA ber 25, 2003. CODEN AMHCBQ. ISSN 0096-3003 [HLL+01] Seokhie Hong, Sangjin Lee, (print), 1873-5649 (elec- Jongin Lim, Jaechul Sung, tronic). REFERENCES 361

Hwang:2004:KAS Herzog:2003:PAK

[HLL04] Min-Shiang Hwang, Li-Hua [HLM03] Jonathan Herzog, Moses Li, and Cheng-Chi Lee. A Liskov, and Silvio Mi- key authentication scheme cali. Plaintext aware- with non-repudiation. Op- ness via key registra- erating Systems Review,38 tion. In Boneh [Bon03], (3):75–78, July 2004. CO- pages 548–564. CODEN DEN OSRED8. ISSN 0163- LNCSD9. ISBN 3-540- 5980 (print), 1943-586X 40674-3. ISSN 0302-9743 (electronic). (print), 1611-3349 (elec- Hwang:2005:GTS tronic). LCCN QA76.9.A25 C79 2003. URL http: [HLL05] Jung Yeon Hwang, Dong Hoon //link.springer-ny.com/ Lee, and Jongin Lim. link/service/series/0558/ Generic transformation for tocs/t2729.htm; http: scalable broadcast encryp- //www.springerlink.com/ tion schemes. In Shoup openurl.asp?genre=issue& [Sho05a], pages 276–?? issn=0302-9743&volume= ISBN 3-540-28114-2. ISSN 2729; http://www.springerlink. 0302-9743 (print), 1611- com/openurl.asp?genre= 3349 (electronic). LCCN volume&id=doi:10.1007/ QA76.9.A25 C79 2005; b11817. QA76.9 .A25; QA76.9 C79 2005; QA76.9 C794 2005; Hwang:2001:TSB QA76.9; Internet. URL http://www.springerlink. [HLT01] Min-Shiang Hwang, Cheng- com/openurl.asp?genre= Chi Lee, and Yuan-Liang issue&issn=0302-9743&volume= Tang. Two simple batch ver- 3621. ifying multiple digital sig- Hong:2003:BBP natures. Lecture Notes in Computer Science, 2229: [HLLL03] Hyun-Soo Hong, Ho-Kyu 233–??, 2001. CODEN Lee, Hyang-Sook Lee, and LNCSD9. ISSN 0302- Hee-Jung Lee. The better 9743 (print), 1611-3349 bound of private key in RSA (electronic). URL http: with unbalanced primes. //link.springer-ny.com/ Applied Mathematics and link/service/series/0558/ Computation, 139(2–3):351– bibs/2229/22290233.htm; 362, July 15, 2003. CODEN http://link.springer- AMHCBQ. ISSN 0096-3003 ny.com/link/service/series/ (print), 1873-5649 (elec- 0558/papers/2229/22290233. tronic). pdf. REFERENCES 362

Huang:2009:OSW CODEN CSFOEH. ISSN 0960-0779 (print), 1873- [HLTJ09] Y. L. Huang, P. H. Lu, J. D. 2887 (electronic). Tygar, and A. D. Joseph. OSNP: Secure wireless au- Hamdy:2000:SCB thentication protocol using one-time key. Computers [HM00] Safuat Hamdy and Bodo &Security, 28(8):803–815, M¨oller. Security of cryp- November 2009. CODEN tosystems based on class CPSEDU. ISSN 0167-4048 groups of imaginary quadratic (print), 1872-6208 (elec- orders. Lecture Notes in Computer Science, 1976: tronic). URL https:// 234–247, 2000. CODEN www.sciencedirect.com/ LNCSD9. ISSN 0302-9743 science/article/pii/S0167404809000558. (print), 1611-3349 (elec- Hopper:2002:PSS tronic). [HLvA02] Nicholas J. Hopper, John Hartel:2001:FSJ Langford, and Luis von Ahn. Provably secure [HM01a] Pieter H. Hartel and Luc steganography: (extended Moreau. Formalizing the abstract). In Yung [Yun02a], safety of Java, the Java pages 77–92. CODEN Virtual Machine, and Java LNCSD9. ISBN 3-540- card. ACM Computing Sur- 44050-X (paperback). ISSN veys, 33(4):517–558, De- 0302-9743 (print), 1611- cember 2001. CODEN 3349 (electronic). LCCN CMSVAN. ISSN 0360-0300 QA76.9.A25 C79 2002. URL (print), 1557-7341 (elec- http://link.springer.de/ tronic). link/service/series/0558/ Hirt:2001:RFU bibs/2442/24420077.htm; http://link.springer. [HM01b] Martin Hirt and Ueli Mau- de/link/service/series/ rer. Robustness for free 0558/papers/2442/24420077. in unconditional multi-party pdf. computation. In Kil- Hu:2009:TRN ian [Kil01a], pages 101– ?? ISBN 3-540-42456- [HLwWZ09] Yue Hu, Xiaofeng Liao, 3 (paperback). LCCN Kwok wo Wong, and QA76.9.A25 C79 2001; Qing Zhou. A true QA267.A1 L43 no.2139. random number generator UK£47.00. URL http: basedonmousemovement //link.springer-ny.com/ and chaotic cryptography. link/service/series/0558/ Chaos, solitons & frac- bibs/2139/21390101.htm; tals, 40(5):2286–2293, 2009. http://link.springer- REFERENCES 363

ny.com/link/service/series/ DEN LNCSD9. ISSN 0302- 0558/papers/2139/21390101. 9743 (print), 1611-3349 pdf. (electronic). URL http: //link.springer-ny.com/ Harbitter:2002:MAP link/service/series/0558/ [HM02a] Alan Harbitter and Daniel A. bibs/2384/23840214.htm; Menasc´e. A methodology for http://link.springer- analyzing the performance ny.com/link/service/series/ of authentication protocols. 0558/papers/2384/23840214. ACM Transactions on In- pdf. formation and System Secu- Hoglund:2004:ESH rity, 5(4):458–491, Novem- ber 2002. CODEN ATISBQ. [HM04] Greg Hoglund and Gary Mc- ISSN 1094-9224 (print), Graw. Exploiting software: 1557-7406 (electronic). how to break code. Addison- Wesley, Reading, MA, USA, Hevia:2002:PSG 2004. ISBN 0-201-78695- [HM02b] Alejandro Hevia and Daniele 8 (paperback). xxxv + Micciancio. The provable se- 471 pp. LCCN QA76.9.A25 curity of graph-based one- H635 2004. URL http:// time signatures and exten- www.loc.gov/catdir/toc/ sions to algebraic signature ecip0411/2003025556.html. schemes. Lecture Notes Hollar:2005:EWS in Computer Science, 2501: 379–??, 2002. CODEN [HM05] Rickland Hollar and Rich- LNCSD9. ISSN 0302-9743 ard Murphy. Enter- (print), 1611-3349 (elec- prise Web services secu- tronic). URL http:// rity. Charles River Me- link.springer.de/link/ dia, Hingham, MA, USA, service/series/0558/bibs/ 2005. ISBN 1-58450-413- 2501/25010379.htm; http: 7 (pbk. with CD-ROM). //link.springer.de/link/ ???? pp. LCCN TK5105.59 service/series/0558/papers/ .H66 2005. URL http:// 2501/25010379.pdf. www.loc.gov/catdir/toc/ ecip0515/2005018419.html. Hitchcock:2002:NEC Holenstein:2004:CCB [HM02c] Yvonne Hitchcock and Paul Montague. A new ellip- [HMS04] Thomas Holenstein, Ueli tic curve scalar multiplica- Maurer, and Johan Sj¨odin. tion algorithm to resist sim- Complete classification of ple power analysis. Lecture bilinear hard-core functions. Notes in Computer Science, In Franklin [Fra04], pages 2384:214–??, 2002. CO- 73–?? CODEN LNCSD9. REFERENCES 364

ISBN 3-540-22668-0. ISSN bits. Journal of the ACM, 0302-9743 (print), 1611- 51(2):187–230, March 2004. 3349 (electronic). LCCN CODEN JACOAH. ISSN 10.1007/b99099. URL 0004-5411 (print), 1557- http://www.springerlink. 735X (electronic). com/openurl.asp?genre= issue&issn=0302-9743&volume= Harnik:2006:CNI 3152; http://www.springerlink.[HN06] Danny Harnik and Moni com/openurl.asp?genre= Naor. On the compress- volume&id=doi:10.1007/ ibility of NP instances and b99099. cryptographic applications. Hankerson:2004:GEC In IEEE [IEE06], pages 719– 728. ISBN 0-7695-2720- [HMV04] Darrel Hankerson, Alfred J. 5, 0-7695-2362-5. ISSN Menezes, and Scott Van- 0272-5428. LCCN QA76 stone. Guide to Ellip- .S974 2006. URL http: tic Curve Cryptography. //ieeexplore.ieee.org/ Springer-Verlag, Berlin, servlet/opac?punumber= Germany / Heidelberg, Ger- 4031329. IEEE Com- many / London, UK / puter Society Order Number etc., 2004. ISBN 0-387- P2720. 95273-X. xx + 311 pp. LCCN QA76.9.A25 H37 Haitner:2009:SHC 2003. US$59.95. [HNO+09] Iftach Haitner, Minh-Huyen Huang:2007:MPK Nguyen, Shien Jin Ong, [HMvdLM07] Dijiang Huang, Manish Omer Reingold, and Salil Mehta, Appie van de Vadhan. Statistically hid- Liefvoort, and Deep Medhi. ing commitments and sta- Modeling pairwise key es- tistical zero-knowledge ar- tablishment for random key guments from any one-way predistribution in large- function. SIAM Journal scale sensor networks. IEEE/ on Computing, 39(3):1153– ACM Transactions on Net- 1218, ???? 2009. CODEN working, 15(5):1204–1215, SMJCAT. ISSN 0097-5397 October 2007. CODEN (print), 1095-7111 (elec- IEANEP. ISSN 1063-6692 tronic). (print), 1558-2566 (elec- Hanaoka:2002:HNI tronic). [HNZI02] Goichiro Hanaoka, Tsuyoshi Haastad:2004:SAR Nishioka, Yuliang Zheng, [HN04] Johan H˚astad and Mats and Hideki Imai. A hier- N˚aslund. The security of archical non-interactive key- all RSA and discrete log sharing scheme with low REFERENCES 365

memory size and high resis- LNCSD9. ISSN 0302- tance against collusion at- 9743 (print), 1611-3349 tacks. The Computer Jour- (electronic). URL http: nal, 45(3):293–303, ???? //link.springer-ny.com/ 2002. CODEN CMPJA6. link/service/series/0558/ ISSN 0010-4620 (print), bibs/2074/20740801.htm; 1460-2067 (electronic). URL http://link.springer- http://www3.oup.co.uk/ ny.com/link/service/series/ computer_journal/hdb/Volume_ 0558/papers/2074/20740801. 45/Issue_03/450293.sgm. pdf. abs.html; http://www3. oup.co.uk/computer_journal/ Honary:2001:CCI hdb/Volume_45/Issue_03/ pdf/450293.pdf. [Hon01] Bahram Honary, editor. Cryptography and coding: Hoepman:2001:SKA 8th IMA international con- ference, Cirencester, UK, [Hoe01] Jaap-Henk Hoepman. Se- December 17–19, 2001: pro- cret key authentication ceedings, volume 2260 of with software-only verifi- Lecture Notes in Computer cation. Lecture Notes in Science. Springer-Verlag, Computer Science, 1962: Berlin, Germany / Heidel- 313–??, 2001. CODEN berg, Germany / London, LNCSD9. ISSN 0302- UK / etc., 2001. ISBN 3- 9743 (print), 1611-3349 540-43026-1. ISSN 0302- (electronic). URL http: 9743 (print), 1611-3349 //link.springer-ny.com/ (electronic). LCCN QA268 link/service/series/0558/ .C76 2001. URL http: bibs/1962/19620313.htm; //link.springer-ny.com/ http://link.springer- link/service/series/0558/ ny.com/link/service/series/ tocs/t2260.htm. 0558/papers/1962/19620313. pdf. Hook:2005:BCP Hofinger:2001:LBE [Hoo05] David Hook. Beginning [H¨of01] Siegfried H¨ofinger. Load cryptography and PKI in balancing for the elec- Java. John Wiley and tronic structure program Sons, Inc., New York, NY, GREMLIN in a very het- USA, 2005. ISBN 0- erogeneous SSH-connected 7645-9633-0. xxvi + 448 WAN-cluster of UNIX-type pp. LCCN QA76.9.A25 hosts. Lecture Notes in H645 2005. URL http:// Computer Science, 2074: www.loc.gov/catdir/toc/ 801–??, 2001. CODEN ecip0511/2005011272.html. REFERENCES 366

Hoskins:2006:SO Han:2002:CMV

[Hos06a] Matthew E. Hoskins. Se- [HPC02] Daewan Han, Sangwoo curing openSSH. Linux Park, and Seongtaek Chee. Journal, 2006(147):??, July Cryptanalysis of the modi- 2006. CODEN LIJOFX. fied version of the hash func- ISSN 1075-3583 (print), tion proposed at PKC’98. 1938-3827 (electronic). Lecture Notes in Computer Science, 2365:252–??, 2002. Hoskins:2006:SSE CODEN LNCSD9. ISSN 0302-9743 (print), 1611- [Hos06b] Matthew E. Hoskins. SSHFS: 3349 (electronic). URL super easy file access over http://link.springer-ny. SSH. Linux Journal, 2006 com/link/service/series/ (146):??, June 2006. CO- 0558/bibs/2365/23650252. DEN LIJOFX. ISSN 1075- htm; http://link.springer- 3583 (print), 1938-3827 ny.com/link/service/series/ (electronic). 0558/papers/2365/23650252. pdf. Horn:2000:APF Hoffstein:2001:NNL

[HP00] G¨unther Horn and Bart Pre- [HPS01] J. Hoffstein, J. Pipher, and neel. Authentication and J. H. Silverman. NSS: payment in future mobile An NTRU lattice-based sig- systems. Journal of Com- nature scheme. In Pfitz- puter Security, 8(2–3):183– mann [Pfi01], pages 211– 207, ???? 2000. CODEN 228. ISBN 3-540-42070- JCSIET. ISSN 0926-227X 3. LCCN QA76.9.A25 (print), 1875-8924 (elec- E964 2001; QA76.9.A25 tronic). E96 2001. URL http: //link.springer-ny.com/ Huhnlein:2001:ICB link/service/series/0558/ tocs/t2045.htm; http: [HP01] Detlef H¨uhnlein and Sachar //link.springer.de/link/ Paulus. On the imple- service/series/0558/tocs/ mentation of cryptosystems t2045.htm. based on real quadratic Hoffstein:2008:IMC number fields (extended ab- stract). Lecture Notes in [HPS08] Jeffrey Hoffstein, Jill Cather- Computer Science, 2012: ine Pipher, and Joseph H. 288–302, 2001. CODEN Silverman. An Introduction LNCSD9. ISSN 0302-9743 to Mathematical Cryptogra- (print), 1611-3349 (elec- phy, volume 666 of Under- tronic). graduate texts in mathemat- REFERENCES 367

ics. Springer-Verlag, Berlin, 25–??, 2001. CODEN Germany / Heidelberg, Ger- LNCSD9. ISSN 0302- many / London, UK / etc., 9743 (print), 1611-3349 2008. ISBN 0-387-77993-0 (electronic). URL http: (hardcover). xv + 523 pp. //link.springer-ny.com/ LCCN QA268 .H64 2008. link/service/series/0558/ bibs/2259/22590025.htm; He:2001:SAR http://link.springer- [HQ01] Yeping He and Sihan Qing. ny.com/link/service/series/ Square attack on reduced 0558/papers/2259/22590025. Camellia cipher. Lecture pdf. Notes in Computer Science, Hawkes:2000:EMC 2229:238–??, 2001. CO- DEN LNCSD9. ISSN 0302- [HR00] Philip Hawkes and Gre- 9743 (print), 1611-3349 gory G. Rose. Exploiting (electronic). URL http: multiples of the connection //link.springer-ny.com/ polynomial in word-oriented link/service/series/0558/ stream ciphers. Lecture bibs/2229/22290238.htm; Notes in Computer Science, http://link.springer- 1976:303–??, 2000. CO- ny.com/link/service/series/ DEN LNCSD9. ISSN 0302- 0558/papers/2229/22290238. 9743 (print), 1611-3349 pdf. (electronic). URL http: //link.springer-ny.com/ Hu:2005:USA link/service/series/0558/ [HQ05] Ruo Hu and Xingsan Qian. bibs/1976/19760303.htm; Using smart agent-based http://link.springer- method to implement dy- ny.com/link/service/series/ namic information security 0558/papers/1976/19760303. policy. In Han et al. pdf. [HYZ05b], pages 131–?? Hand:2002:MPP ISBN 981-270-153-2. LCCN ???? URL http:// [HR02] Steven Hand and Timo- eproceedings.worldscinet. thy Roscoe. Mnemosyne: com/9812701532/9812701532. Peer-to-peer steganographic 0031.html. storage. Lecture Notes in Hawkes:2001:PCS Computer Science, 2429: 130–??, 2002. CODEN [HQR01] Philip Hawkes, Frank Quick, LNCSD9. ISSN 0302-9743 and Gregory G. Rose. A (print), 1611-3349 (elec- practical cryptanalysis of tronic). URL http:// SSC2. Lecture Notes in link.springer.de/link/ Computer Science, 2259: service/series/0558/bibs/ REFERENCES 368

2429/24290130.htm; http: volume&id=doi:10.1007/ //link.springer.de/link/ b99099. service/series/0558/papers/ 2429/24290130.pdf. Hsiao:2004:FCP

Halevi:2003:TEM [HR04b] Chun-Yuan Hsiao and Leonid Reyzin. Finding colli- [HR03] Shai Halevi and Phillip Rog- sions on a public road, or away. A tweakable encipher- do secure hash functions ing mode. In Boneh [Bon03], need secret coins? In pages 482–499. CODEN Franklin [Fra04], pages 92– LNCSD9. ISBN 3-540- ?? CODEN LNCSD9. 40674-3. ISSN 0302-9743 ISBN 3-540-22668-0. ISSN (print), 1611-3349 (elec- 0302-9743 (print), 1611- tronic). LCCN QA76.9.A25 3349 (electronic). LCCN C79 2003. URL http: 10.1007/b99099. URL //link.springer-ny.com/ http://www.springerlink. link/service/series/0558/ com/openurl.asp?genre= tocs/t2729.htm; http: issue&issn=0302-9743&volume= //www.springerlink.com/ 3152; http://www.springerlink. openurl.asp?genre=issue& com/openurl.asp?genre= issn=0302-9743&volume= volume&id=doi:10.1007/ 2729; http://www.springerlink. b99099. com/openurl.asp?genre= Holenstein:2005:OWS volume&id=doi:10.1007/ b11817. [HR05] Thomas Holenstein and Re- Hawkes:2004:RVC nato Renner. One-way secret-key agreement and [HR04a] Philip Hawkes and Gre- applications to circuit po- gory G. Rose. Rewrit- larization and immuniza- ing variables: The com- tion of public-key encryp- plexity of fast algebraic at- tion. In Shoup [Sho05a], tacks on stream ciphers. In pages 478–?? ISBN 3-540- Franklin [Fra04], pages 390– 28114-2. ISSN 0302-9743 ?? CODEN LNCSD9. (print), 1611-3349 (elec- ISBN 3-540-22668-0. ISSN tronic). LCCN QA76.9.A25 0302-9743 (print), 1611- C79 2005; QA76.9 .A25; 3349 (electronic). LCCN QA76.9 C79 2005; QA76.9 10.1007/b99099. URL C794 2005; QA76.9; In- http://www.springerlink. ternet. URL http:/ com/openurl.asp?genre= /www.springerlink.com/ issue&issn=0302-9743&volume= openurl.asp?genre=issue& 3152; http://www.springerlink. issn=0302-9743&volume= com/openurl.asp?genre= 3621. REFERENCES 369

Halevi:2006:TCT aps.org/doi/10.1103/PhysRevLett. 111.250403; http://www. [HR06] Shai Halevi and Tal Ra- scientificcomputing.com/ bin, editors. Theory of news/2014/03/einsteins- Cryptography: Third The- entanglement-produces- ory of Cryptography Confer- quantum-encryption; http: ence, TCC 2006, New York, //www.swinburne.edu.au/ NY, USA, March 4–7, 2006. engineering/caous/news_ Proceedings, volume 3876 and_events/mulitipartite% of Lecture Notes in Com- 20EPR%20steering%20paper. puter Science. Springer-Ver- htm. lag, Berlin, Germany / Hei- delberg, Germany / Lon- Harn:2009:DDB don, UK / etc., 2006. CO- [HRL09] Lein Harn, Jian Ren, and DEN LNCSD9. ISBN 3-540- Changlu Lin. Design of 32731-2 (softcover). ISSN DL-based certificateless dig- 0302-9743 (print), 1611- ital signatures. The Jour- 3349 (electronic). LCCN nal of Systems and Software, ???? URL http:/ 82(5):789–793, May 2009. /www.springerlink.com/ CODEN JSSODM. ISSN openurl.asp?genre=issue& 0164-1212 (print), 1873- issn=0302-9743&volume= 1228 (electronic). 3876. Haitner:2007:SHC Hromkovic:2003:AHP

[HR07] Iftach Haitner and Omer [Hro03] Juraj Hromkoviˇc. Algorith- Reingold. Statistically- mics for Hard Problems: In- hiding commitment from troduction to Combinatorial any one-way function. In Optimization, Randomiza- ACM [ACM07], pages 1–10. tion, Approximation, and ISBN 1-59593-631-9. LCCN Heuristics. Texts in the- QA75.5 .A22 2007. oretical computer science. He:2013:GME Springer-Verlag, Berlin, Germany / Heidelberg, Ger- [HR13] Q. Y. He and M. D. many / London, UK / etc., Reid. Genuine multi- second edition, 2003. ISBN partite Einstein–Podolsky– 3-540-44134-4. xiii + 544 Rosen steering. Physi- pp. LCCN QA76.58 .H76 cal Review Letters, 111(25): 2003. URL http://www. 250403, December 2013. loc.gov/catdir/enhancements/ CODEN PRLTAO. ISSN fy0817/2002032405-d.html; 0031-9007 (print), 1079- http://www.loc.gov/catdir/ 7114 (electronic), 1092- enhancements/fy0817/2002032405- 0145. URL http://link. t.html. REFERENCES 370

Hromkovic:2005:DAR 0558/papers/2422/24220319. pdf. [Hro05] Juraj Hromkoviˇc. Design and analysis of random- Hemaspaandra:2008:EDA ized algorithms: introduc- [HRS08] Lane A. Hemaspaandra, tion to design paradigms. J¨org Rothe, and Amitabh Texts in theoretical com- Saxena. Enforcing and puter science. Springer-Ver- defying associativity, com- lag, Berlin, Germany / Hei- mutativity, totality, and delberg, Germany / Lon- strong noninvertibility for don, UK / etc., 2005. ISBN worst-case one-way func- 3-540-23949-9. xii + 274 pp. tions. Theoretical Com- LCCN QA274 .H76 2005. puter Science, 401(1–3):27– Hromkovic:2009:AAH 35, July 23, 2008. CODEN TCSCDI. ISSN 0304-3975 [Hro09] Juraj Hromkovic. Algo- (print), 1879-2294 (elec- rithmic adventures: from tronic). knowledge to magic. Spring- er-Verlag, Berlin, Ger- Hirt:2000:ERF many / Heidelberg, Ger- many / London, UK / [HS00] Martin Hirt and Kazue etc., 2009. ISBN 3- Sako. Efficient receipt- 540-85986-1. xiii + 363 free voting based on ho- pp. LCCN QA76.9.A43 momorphic encryption. In H76 2009. URL http: Advances in cryptology— //site.ebrary.com/lib/ EUROCRYPT 2000 (Bruges), upcatalunya/docDetail. volume 1807 of Lecture action?docID=10313472. Notes in Comput. Sci., pages 539–556. Spring- Haneberg:2002:MSS er-Verlag, Berlin, Ger- [HRS02] Dominik Haneberg, Wolf- many / Heidelberg, Ger- gang Reif, and Kurt Stenzel. many / London, UK / A method for secure Smart- etc., 2000. URL http: card applications. Lecture //link.springer-ny.com/ Notes in Computer Science, link/service/series/0558/ 2422:319–??, 2002. CO- bibs/1807/18070539.htm; DEN LNCSD9. ISSN 0302- http://link.springer- 9743 (print), 1611-3349 ny.com/link/service/series/ (electronic). URL http: 0558/papers/1807/18070539. //link.springer-ny.com/ pdf. link/service/series/0558/ Hinsley:2001:CIS bibs/2422/24220319.htm; http://link.springer- [HS01a] F. H. (Francis Harry) Hins- ny.com/link/service/series/ ley and Alan Stripp, editors. REFERENCES 371

Codebreakers: the inside Han:2002:HEF story of Bletchley Park.Ox- ford University Press, Wal- [HS02b] Guo Ping Han and Kai Quan ton Street, Oxford OX2 Shi. Half-encryption and 6DP, UK, 2001. ISBN 0-19- full-encryption of fuzzy 280132-5. xxi + 321 + 8 pp. recognition. J. Fuzzy Math., LCCN D810.C88 C63 2001. 10(2):385–397, 2002. ISSN 1066-8950. Hoffstein:2001:MAD Hwang:2007:PEA [HS01b] Jeffrey Hoffstein and Joseph H. Silverman. MiniPASS: Au- [HS07] Ren-Junn Hwang and Sheng- thentication and digital sig- Hua Shiau. Provably ef- natures in a constrained en- ficient authenticated key vironment. Lecture Notes agreement protocol for in Computer Science, 1965: multi-servers. The Com- 328–??, 2001. CODEN puter Journal, 50(5):602– LNCSD9. ISSN 0302- 615, September 2007. CO- 9743 (print), 1611-3349 DEN CMPJA6. ISSN 0010- (electronic). URL http: 4620 (print), 1460-2067 //link.springer-ny.com/ (electronic). URL http:/ link/service/series/0558/ /comjnl.oxfordjournals. bibs/1965/19650328.htm; org/cgi/content/abstract/ http://link.springer- 50/5/602; http://comjnl. ny.com/link/service/series/ oxfordjournals.org/cgi/ 0558/papers/1965/19650328. content/full/50/5/602; pdf. http://comjnl.oxfordjournals. org/cgi/reprint/50/5/602. Halevy:2002:LBE He:2005:MCP [HS02a] Dani Halevy and Adi Shamir. The LSD broad- [HSD+05] Changhua He, Mukund cast encryption scheme. In Sundararajan, Anupam Yung [Yun02a], pages 47– Datta, Ante Derek, and 60. CODEN LNCSD9. John C. Mitchell. A mod- ISBN 3-540-44050-X (pa- ular correctness proof of perback). ISSN 0302-9743 IEEE 802.11i and TLS. (print), 1611-3349 (elec- In Meadows and Syver- tronic). LCCN QA76.9.A25 son [MS05b], pages 2–15. C79 2002. URL http:/ ISBN 1-59593-226-7. LCCN /link.springer.de/link/ QA76.9.A25. ACM order service/series/0558/bibs/ number 459050. 2442/24420047.htm; http: Hong:2001:KIA //link.springer.de/link/ service/series/0558/papers/[HSH+01] Deukjo Hong, Jaechul Sung, 2442/24420047.pdf. Seokhie Hong, Wonil Lee, REFERENCES 372

Sangjin Lee, Jongin Lim, member: cold-boot attacks and Okyeon Yi. Known- on encryption keys. In IV attacks on triple modes ????, editor, Usenix Secu- of operation of block ci- rity, page ?? USENIX, phers. Lecture Notes in Berkeley, CA, USA, 2008. Computer Science, 2248: ISBN ???? LCCN ???? 208–??, 2001. CODEN URL ????. LNCSD9. ISSN 0302- Halderman:2009:LWR 9743 (print), 1611-3349 (electronic). URL http: [HSH+09] J. Alex Halderman, Seth D. //link.springer-ny.com/ Schoen, Nadia Heninger, link/service/series/0558/ William Clarkson, William bibs/2248/22480208.htm; Paul, Joseph A. Calandrino, http://link.springer- Ariel J. Feldman, Jacob Ap- ny.com/link/service/series/ pelbaum, and Edward W. 0558/papers/2248/22480208. Felten. Lest we remember: pdf. cold-boot attacks on encryp- Halderman:2008:LWRa tion keys. Communications of the Association for Com- [HSH+08a] J. Alex Halderman, Seth D. puting Machinery, 52(5):91– Schoen, Nadia Heninger, 98, May 2009. CODEN William Clarkson, William CACMA2. ISSN 0001-0782 Paul, Joseph A. Calandrino, (print), 1557-7317 (elec- Ariel J. Feldman, Jacob Ap- tronic). pelbaum, and Edward W. Felten. Lest we remem- Hanaoka:2002:USA ber: Cold boot attacks on [HSHI02] Goichiro Hanaoka, Junji encryption keys. Techni- Shikata, Yumiko Hanaoka, cal report, Princeton Uni- and Hideki Imai. Uncondi- versity, Princeton, NJ, USA, tionally secure anonymous February 21, 2008. 22 encryption and group au- pp. URL http://citp. thentication. Lecture Notes princeton.edu.nyud.net/ in Computer Science, 2501: pub/coldboot.pdf. 81–??, 2002. CODEN Halderman:2008:LWRb LNCSD9. ISSN 0302-9743 (print), 1611-3349 (elec- [HSH+08b] J. Alex Halderman, Seth D. tronic). URL http:// Schoen, Nadia Heninger, link.springer.de/link/ William Clarkson, William service/series/0558/bibs/ Paul, Joseph A. Calan- 2501/25010081.htm; http: drino, Ariel J. Feldman, Ja- //link.springer.de/link/ cob Appelbaum, and Ed- service/series/0558/papers/ ward W. Felten. Lest we re- 2501/25010081.pdf. REFERENCES 373

Hanaoka:2006:USA 2105:427–??, 2001. CO- DEN LNCSD9. ISSN 0302- [HSHI06] Goichiro Hanaoka, Junji 9743 (print), 1611-3349 Shikata, Yumiko Hanaoka, (electronic). URL http: and Hideki Imai. Uncondi- //link.springer-ny.com/ tionally secure anonymous link/service/series/0558/ encryption and group au- bibs/2105/21050427.htm; thentication. The Com- http://link.springer- puter Journal, 49(3):310– ny.com/link/service/series/ 321, May 2006. CODEN 0558/papers/2105/21050427. CMPJA6. ISSN 0010-4620 pdf. (print), 1460-2067 (elec- tronic). URL http:// Hong:2002:PSR comjnl.oxfordjournals. + org/cgi/content/abstract/[HSL 02] Seokhie Hong, Jaechul 49/3/310; http://comjnl. Sung, Sangjin Lee, Jongin oxfordjournals.org/cgi/ Lim, and Jongsu Kim. Prov- content/full/49/3/310; able security for 13 round http://comjnl.oxfordjournals. Skipjack-like structure. In- org/cgi/reprint/49/3/310. formation Processing Let- ters, 82(5):243–246, June Hernandez:2002:GCT 15, 2002. CODEN IF- PLAT. ISSN 0020-0190 [HSIR02] Julio C´esar Hern´andez, (print), 1872-6119 (elec- Jos´eMar´ıa Sierra, Pe- tronic). dro Isasi, and Arturo Rib- agorda. Genetic cryp- Hong:2002:IDC toanalysis of two rounds TEA. Lecture Notes in [HSM+02] Deukjo Hong, Jaechul Sung, Computer Science, 2331: Shiho Moriai, SangjinLee, 1024–1031, 2002. CO- and Jongin Lim. Impos- DEN LNCSD9. ISSN 0302- sible differential cryptanal- 9743 (print), 1611-3349 ysis of Zodiac. Lecture (electronic). URL http: Notes in Computer Science, //www.springerlink.com/ 2355:300–??, 2002. CO- content/0pa8nj982jewn9ev/ DEN LNCSD9. ISSN 0302- . 9743 (print), 1611-3349 Hwang:2001:LCT (electronic). URL http: //link.springer-ny.com/ [HSKC01] Ren-Junn Hwang, Timo- link/service/series/0558/ thy K. Shih, Chuan-Ho Kao, bibs/2355/23550300.htm; and Tsung-Ming Chang. http://link.springer- Lossy compression toler- ny.com/link/service/series/ ant steganography. Lecture 0558/papers/2355/23550300. Notes in Computer Science, pdf. REFERENCES 374

Hernandez:2001:DTR Hernandez:2004:STN

[HSR+01] Julio C´esar Hern´andez, [HSS04] Julio C. Hernandez, Jos´eMar´ıa Jos´eMar´ıa Sierra, Ar- Sierra, and Andre Seznec. turo Ribagorda, Benjam´ın The SAC test: a new ran- Ramos, and J. C. Mex- domness test, with some ap- Perera. Distinguishing TEA plications to PRNG anal- from a random permuta- ysis. Lecture Notes in tion: Reduced round ver- Computer Science, 2004: sions of TEA do not have 960–967, 2004. CODEN the SAC or do not generate LNCSD9. ISSN 0302- random numbers. Lecture 9743 (print), 1611-3349 Notes in Computer Science, (electronic). URL http: 2260:374–377, 2001. CO- //www.springerlink.com/ DEN LNCSD9. ISSN 0302- content/an44921nlaa5bf0g/ 9743 (print), 1611-3349 . (electronic). URL http: Hsu:2005:CIT //link.springer-ny.com/ link/service/series/0558/ [Hsu05a] Chien-Lung Hsu. Crypt- bibs/2260/22600374.htm; analysis and improvement of http://link.springer- the Tzeng–Hwang authen- ny.com/link/service/series/ ticated encryption scheme 0558/papers/2260/22600374. based on elliptic curve dis- pdf. crete logarithm problem. Applied Mathematics and Hess:2001:TTH Computation, 167(2):882– 890, August 15, 2005. CO- [HSS01] Florian Hess, Gadiel Seroussi, DEN AMHCBQ. ISSN and Nigel P. Smart. Two 0096-3003 (print), 1873- topics in hyperelliptic cryp- 5649 (electronic). tography. Lecture Notes in Computer Science, 2259: Hsu:2005:UFR 181–??, 2001. CODEN LNCSD9. ISSN 0302- [Hsu05b] Chien-Lung Hsu. A user 9743 (print), 1611-3349 friendly remote authenti- (electronic). URL http: cation scheme with smart //link.springer-ny.com/ cards against impersonation link/service/series/0558/ attacks. Applied Mathemat- bibs/2259/22590181.htm; ics and Computation, 170 http://link.springer- (1):135–143, November 1, ny.com/link/service/series/ 2005. CODEN AMHCBQ. 0558/papers/2259/22590181. ISSN 0096-3003 (print), pdf. 1873-5649 (electronic). REFERENCES 375

Hasan:2009:PHF (electronic). URL http: //link.springer-ny.com/ [HSW09] Ragib Hasan, Radu Sion, link/service/series/0558/ and Marianne Winslett. bibs/2274/22740064.htm; Preventing history forgery http://link.springer- with secure provenance. ny.com/link/service/series/ ACM Transactions on Stor- 0558/papers/2274/22740064. age, 5(4):12:1–12:??, De- pdf. cember 2009. CODEN ???? ISSN 1553-3077 (print), Halpern:2004:RSS 1553-3093 (electronic). [HT04] Joseph Halpern and Vanessa Hanaoka:2000:USD Teague. Rational secret [HSZI00] Goichiro Hanaoka, Junji sharing and multiparty com- Shikata, Yuliang Zheng, putation: extended ab- and Hideki Imai. Un- stract. In ACM [ACM04b], conditionally secure digital pages 623–632. ISBN 1- signature schemes admit- 58113-852-0. LCCN QA75.5 ting transferability. Lecture .A22 2004. Notes in Computer Science, Huang:2006:CSV 1976:130–??, 2000. CO- DEN LNCSD9. ISSN 0302- [HT06] Biao-Bing Huang and Shao- 9743 (print), 1611-3349 Xian Tang. A contrast- (electronic). URL http: sensitive visible watermark- //link.springer-ny.com/ ing scheme. IEEE Multi- link/service/series/0558/ Media, 13(2):60–66, April/ bibs/1976/19760130.htm; June 2006. CODEN http://link.springer- IEMUE4. ISSN 1070-986X ny.com/link/service/series/ (print), 1941-0166 (elec- 0558/papers/1976/19760130. tronic). pdf. Hanaoka:2001:EUS Hongfeng:2008:ECP [HSZI01] Goichiro Hanaoka, Junji [HTJ08] Zhu Hongfeng, Liu Tian- Shikata, Yuliang Zheng, and hua, and Liu Jie. EV- Hideki Imai. Efficient and C2C-PAKE: An improved unconditionally secure digi- client-to-client password- tal signatures and a security authenticated key exchange analysis of a multireceiver protocol. International authentication code. Lec- Journal of Computer Sys- ture Notes in Computer Sci- tems Science and Engineer- ence, 2274:64–??, 2001. CO- ing, 23(3):??, May 2008. DEN LNCSD9. ISSN 0302- CODEN CSSEEI. ISSN 9743 (print), 1611-3349 0267-6192. REFERENCES 376

Hamalainen:2002:GPS T44 2005. URL http: //www.springerlink.com/ [HTS02] Antti H¨am¨al¨ainen, Matti openurl.asp?genre=issue& Tommiska, and Jorma issn=0302-9743&volume= Skytt¨a. 6.78 gigabits per 3378; http://www.springerlink. second implementation of com/openurl.asp?genre= the IDEA cryptographic al- volume&id=doi:10.1007/ gorithm. Lecture Notes in b106171. Computer Science, 2438: Hughes:2002:LAA 760–??, 2002. CODEN LNCSD9. ISSN 0302- [Hug02] James Hughes. A lin- 9743 (print), 1611-3349 ear algebraic attack on the (electronic). URL http: AAFG1 braid group cryp- //link.springer-ny.com/ tosystem. Lecture Notes link/service/series/0558/ in Computer Science, 2384: bibs/2438/24380760.htm; 176–??, 2002. CODEN http://link.springer- LNCSD9. ISSN 0302- ny.com/link/service/series/ 9743 (print), 1611-3349 0558/papers/2438/24380760. (electronic). URL http: pdf. //link.springer-ny.com/ link/service/series/0558/ Hines:2007:AIF bibs/2384/23840176.htm; [HTW07] Stephen Roderick Hines, http://link.springer- Gary Tyson, and David ny.com/link/service/series/ Whalley. Addressing in- 0558/papers/2384/23840176. struction fetch bottlenecks pdf. by using an instruction Hughes:2004:ISE register file. ACM SIG- PLAN Notices, 42(7):165– [Hug04] Jim Hughes. IEEE stan- 174, July 2007. CODEN dard for encrypted stor- SINODQ. ISSN 0362-1340 age. Computer, 37(11):110– (print), 1523-2867 (print), ??, November 2004. CO- 1558-1160 (electronic). DEN CPTRB4. ISSN 0018- 9162 (print), 1558-0814 Hofheinz:2005:CTN (electronic). URL http: [HU05] Dennis Hofheinz and Do- //csdl.computer.org/dl/ minique Unruh. Comparing mags/co/2004/11/ry110. two notions of simulatabil- htm; http://csdl.computer. ity. In Kilian [Kil05], pages org/dl/mags/co/2004/11/ 86–?? CODEN LNCSD9. ry110.pdf. ISBN 3-540-24573-1 (soft- Huhnlein:2000:EIC cover). ISSN 0302-9743 (print), 1611-3349 (elec- [H¨uh00] Detlef H¨uhnlein. Efficient tronic). LCCN QA76.9.A25 implementation of cryp- REFERENCES 377

tosystems based on non- many / London, UK / etc., maximal imaginary quadratic second edition, 2004. ISBN orders. Lecture Notes in 0-387-95490-2. xxi + 487 Computer Science, 1758: pp. LCCN QA567 .H897 147–162, 2000. CODEN 2004. URL http://www. LNCSD9. ISSN 0302-9743 loc.gov/catdir/enhancements/ (print), 1611-3349 (elec- fy0814/2002067016-d.html; tronic). http://www.loc.gov/catdir/ enhancements/fy0814/2002067016- Hunt:2005:JFE t.html. With appendices [Hun05] K. Hunt. A Java framework by Stefan Theisen, Otto for experimentation with Forster, and Ruth Law- steganography. SIGCSE rence. Bulletin (ACM Special In- Huth:2001:SCS terest Group on Computer [Hut01] Michael R. A. Huth. Secure Science Education), 37(1): communicating systems: de- 282–286, 2005. CODEN sign, analysis, and imple- SIGSD3. ISSN 0097-8418 mentation. Cambridge Uni- (print), 2331-3927 (elec- versity Press, Cambridge, tronic). UK, 2001. ISBN 0-521- Husemann:2001:SSC 80731-X (hardcover). x + 283 pp. LCCN TK5102.85 [Hus01] Dirk Husemann. Stan- .H88 2001. US$40.00. dards in the smart card world. Computer Networks Hodjat:2004:HTP (Amsterdam, Netherlands: [HV04] Alireza Hodjat and In- 1999), 36(4):473–487, July grid Verbauwhede. High- 16, 2001. CODEN ???? throughput programmable ISSN 1389-1286 (print), cryptocoprocessor. IEEE 1872-7069 (electronic). URL Micro, 24(3):34–45, May/ http://www.elsevier.nl/ June 2004. CODEN gej-ng/10/15/22/61/28/ IEMIDZ. ISSN 0272-1732 32/abstract.html; http: (print), 1937-4143 (elec- //www.elsevier.nl/gej- tronic). URL http:/ ng/10/15/22/61/28/32/article. /csdl.computer.org/dl/ pdf. mags/mi/2004/03/m3034. htm; http://csdl.computer. Husemoller:2004:EC org/dl/mags/mi/2004/03/ [Hus04] Dale Husem¨oller. Elliptic m3034.pdf. curves, volume 111 of Grad- Hallgren:2009:QC uate texts in mathemat- ics. Springer-Verlag, Berlin, [HV09] Sean Hallgren and Ul- Germany / Heidelberg, Ger- rich Vollmer. Quantum REFERENCES 378

computing. In Bernstein LCCN QA76.9.A25 H88 et al. [BBD09], pages 15–34. 2001. US$39.95. ISBN 3-540-88701-6 (hard- Hardy:2003:AAC cover), 3-642-10019-8 (soft- cover). LCCN QA76.9.A25 [HW03a] Darel W. Hardy and Carol L. P67 2009. Walker. Applied algebra: codes, ciphers, and discrete Hopper:2009:PSS algorithms. Prentice-Hall, [HvAL09] N. Hopper, L. von Ahn, and Inc., Upper Saddle River, J. Langford. Provably se- NJ 07458, USA, 2003. ISBN cure steganography. IEEE 0-13-067464-8. x + 420 pp. Transactions on Computers, LCCN QA268 .H365 2003. 58(5):662–676, May 2009. Hellekalek:2003:EEC CODEN ITCOB4. ISSN 0018-9340 (print), 1557- [HW03b] Peter Hellekalek and Ste- 9956 (electronic). URL fan Wegenkittl. Empir- http://ieeexplore.ieee. ical evidence concerning org/stamp/stamp.jsp?tp= AES. ACM Transactions &arnumber=4663056. on Modeling and Computer Simulation, 13(4):322–333, Hardy:1998:ITN October 2003. CODEN ATMCEZ. ISSN 1049- [HW98] G. H. (Godfrey Harold) 3301 (print), 1558-1195 Hardy and Edward Mait- (electronic). URL http: land Wright. An introduc- //random.mat.sbg.ac.at/ tion to the theory of num- ftp/pub/publications/peter/ bers. Oxford science pub- aes_sub.ps; http://random. lications. Clarendon Press, mat.sbg.ac.at/~peter/slides_ Oxford, UK, fifth edition, YACC04.pdf. 1998. ISBN 0-19-853171-0 (paperback). xvi + 426 pp. Hsu:2003:CIT LCCN QA241 .H28 1998. [HW03c] Chien-Lung Hsu and Tzong- Hutchinson:2001:IWC Sun Wu. Cryptanalyses and improvements of two cryp- [HW01] William Hutchinson and tographic key assignment Matthew Warren. In- schemes for dynamic access formation Warfare: Cor- control in a user hierarchy. porate Attack and De- Computers & Security,22 fense in a Digital World. (5):453–456, July 2003. CO- Computer Weekly profes- DEN CPSEDU. ISSN 0167- sional series. Butterworth- 4048 (print), 1872-6208 Heinemann, Boston, MA, (electronic). URL https:/ USA, 2001. ISBN 0-7506- /www.sciencedirect.com/ 4944-5. xx + 204 pp. science/article/pii/S0167404803005145. REFERENCES 379

Hsu:2004:EPS CODEN AMHCBQ. ISSN 0096-3003 (print), 1873- [HW04] Chien-Lung Hsu and Tzong- 5649 (electronic). Sun Wu. Efficient proxy signature schemes using Henderson:2001:IEV self-certified public keys. [HWH01] Neil J. Henderson, Neil M. Applied Mathematics and White, and Pieter H. Hartel. Computation, 152(3):807– iButton enrolment and veri- 820, May 13, 2004. CODEN fication requirements for the AMHCBQ. ISSN 0096-3003 pressure sequence smart- (print), 1873-5649 (elec- card biometric. Lecture tronic). Notes in Computer Science, Hsu:2005:SCT 2140:124–??, 2001. CO- DEN LNCSD9. ISSN 0302- [HW05] Chien-Lung Hsu and Tzong- 9743 (print), 1611-3349 Sun Wu. Self-certified (electronic). URL http: threshold proxy signature //link.springer-ny.com/ schemes with message re- link/service/series/0558/ covery, nonrepudiation, and bibs/2140/21400124.htm; traceability. Applied Math- http://link.springer- ematics and Computation, ny.com/link/service/series/ 164(1):201–225, May 5, 0558/papers/2140/21400124. 2005. CODEN AMHCBQ. pdf. ISSN 0096-3003 (print), 1873-5649 (electronic). Hsu:2005:NPM

Hwang:2000:CYK [HWH05] Chien-Lung Hsu, Tzong- Sun Wu, and Wei-Hua He. [Hwa00] Min-Shiang Hwang. Crypt- New proxy multi-signature analysis of YCN key assign- scheme. Applied Mathemat- ment scheme in a hierarchy. ics and Computation, 162 Information Processing Let- (3):1201–1206, March 25, ters, 73(3-4):97–101, 2000. 2005. CODEN AMHCBQ. CODEN IFPLAT. ISSN ISSN 0096-3003 (print), 0020-0190 (print), 1872- 1873-5649 (electronic). 6119 (electronic). Hu:2008:NNP Hwang:2005:ITA [HWH08] Yupu Hu, Baocang Wang, [Hwa05] Shin-Jia Hwang. Improve- and Wencai He. NTRUSign ment of Tseng et al.’s with a new perturbation. authenticated encryption IEEE Transactions on In- scheme. Applied Mathe- formation Theory, 54(7): matics and Computation, 3216–3221, July 2008. CO- 165(1):1–4, June 6, 2005. DEN IETTAW. ISSN REFERENCES 380

0018-9448 (print), 1557- 0096-3003 (print), 1873- 9654 (electronic). 5649 (electronic).

Hardy:2009:AAC Hsu:2004:GOS

[HWR09] Darel W. Hardy, Carol L. [HWW04] Chien-Lung Hsu, Tzong- Walker, and Fred Richman. Sun Wu, and Tzong-Chen Applied algebra: codes, ci- Wu. Group-oriented sig- phers, and discrete algo- nature scheme with dis- rithms. Discrete mathe- tinguished signing author- matics and its applications. ities. Future Generation CRC Press, 2000 N.W. Cor- Computer Systems, 20(5): porate Blvd., Boca Raton, 865–873, June 15, 2004. FL 33431-9868, USA, sec- CODEN FGSEVI. ISSN ond edition, 2009. ISBN 0167-739X (print), 1872- 1-4200-7142-4 (hardcover). 7115 (electronic). 410 pp. LCCN QA268 .H365 2009. Harkins:2005:ESU Hsu:2002:IGT [HWW05] Ryan Harkins, Eric We- [HWW02] Chien-Lung Hsu, Tzong- ber, and Andrew West- Sun Wu, and Tzong-Chen meyer. Encryption schemes Wu. Improvements of gener- using finite frames and alization of threshold signa- Hadamard arrays. Experi- ture and authenticated en- mental Mathematics, 14(4): cryption for group commu- 423–433, ???? 2005. CO- nications. Information Pro- DEN ???? ISSN 1058- cessing Letters, 81(1):41–45, 6458 (print), 1944-950X January 16, 2002. CODEN (electronic). URL http:// IFPLAT. ISSN 0020-0190 projecteuclid.org/euclid. (print), 1872-6119 (elec- em/1136926973. tronic). URL http://www. Hsu:2003:IMA elsevier.com/gej-ng/10/ 23/20/85/27/33/abstract. [HWWM03] Chien-Lung Hsu, Tzong- html. Sun Wu, Tzong-Chen Wu, Hsu:2003:ITP and Chris Mitchell. Im- provement of modified au- [HWW03] Chien-Lung Hsu, Tzong- thenticated key agreement Sun Wu, and Tzong-Chen protocol. Applied Math- Wu. Improvement of thresh- ematics and Computation, old proxy signature scheme. 142(2–3):305–308, Octo- Applied Mathematics and ber 10, 2003. CODEN Computation, 136(2–3):315– AMHCBQ. ISSN 0096-3003 321, March 15, 2003. CO- (print), 1873-5649 (elec- DEN AMHCBQ. ISSN tronic). REFERENCES 381

Hirose:2001:UAS Hwang:2003:ASM [HY01] Shouichi Hirose and Susumu [HYS03] Min-Shiang Hwang, Chao- Yoshida. A user au- Chen Yang, and Cheng- thentication scheme with Yeh Shiu. An authenti- identity and location pri- cation scheme for mobile vacy. Lecture Notes in satellite communication sys- Computer Science, 2119: tems. Operating Systems 235–??, 2001. CODEN Review, 37(4):42–47, Octo- LNCSD9. ISSN 0302- ber 2003. CODEN OS- 9743 (print), 1611-3349 RED8. ISSN 0163-5980 (electronic). URL http: (print), 1943-586X (elec- //link.springer-ny.com/ tronic). link/service/series/0558/ bibs/2119/21190235.htm; Han:2005:PJIb http://link.springer- [HYZ05a] Yiliang Han, Xiaoyuan ny.com/link/service/series/ Yang, and Jian Zhang. 0558/papers/2119/21190235. Joint signature and en- pdf. cryption on elliptic curve. Hwang:2003:CAL In Proceedings of the 11th Joint International Com- [HY03] Min-Shiang Hwang and puter Conference — JICC Wei-Pang Yang. Control- 2005 [HYZ05b], pages 135– ling access in large par- ?? ISBN 981-270-153-2. tially ordered hierarchies LCCN ???? URL http:// using cryptographic keys. eproceedings.worldscinet. The Journal of Systems and com/9812701532/9812701532. Software, 67(2):99–107, Au- 0031.html. gust 15, 2003. CODEN JS- Han:2005:PJI SODM. ISSN 0164-1212 (print), 1873-1228 (elec- [HYZ05b] Yiliang Han, Xiaoyuan tronic). Yang, and Jian Zhang, ed- itors. Proceedings of the Yeh:2008:STB 11th Joint International [hY08] Jyh haw Yeh. A secure time- Computer Conference — bound hierarchical key as- JICC 2005. World Scien- signment scheme based on tific Publishing Co., Sin- RSA public key cryptosys- gapore; Philadelphia, PA, tem. Information Process- USA; River Edge, NJ, USA, ing Letters, 105(4):117–120, 2005. ISBN 981-270-153-2. February 15, 2008. CODEN LCCN ???? URL http:// IFPLAT. ISSN 0020-0190 eproceedings.worldscinet. (print), 1872-6119 (elec- com/9812701532/9812701532. tronic). 0031.html. REFERENCES 382

Huang:2005:EMP security/final-comments. ps. [HZSL05] Liusheng Huang, Hong Zhong, Hong Shen, and IEEE:2000:ASF Yonglong Luo. An efficient multiple-precision division [IEE00a] IEEE, editor. 41st An- algorithm. In Hong Shen nual Symposium on Foun- and Koji Nakano, editors, dations of Computer Sci- Sixth International Confer- ence: proceedings: 12–14 ence on Parallel and Dis- November, 2000, Redondo tributed Computing, Appli- Beach, California. IEEE cations and Technologies, Computer Society Press, 2005. PDCAT 2005: 5– 1109 Spring Street, Suite 8 December 2005, Dalian, 300, Silver Spring, MD China, pages 971–974. IEEE 20910, USA, 2000. CO- Computer Society Press, DEN ASFPDV. ISBN 0- 1109 Spring Street, Suite 7695-0850-2, 0-7695-0851-0 300, Silver Spring, MD (case), 0-7695-0852-9 (mi- 20910, USA, 2005. ISBN crofiche). ISSN 0272- 0-7695-2405-2. LCCN 5428. LCCN TK7885.A1 QA76.58 .I5752 2005. The S92 2000. IEEE Com- authors an integer- puter Society order number division algorithm that runs PR00850. three to five times faster IEEE:2000:IPH than Knuth’s 1981 original. However, there is an error [IEE00b] IEEE. The IEEE P1363 in the renormalization algo- home page: Standard speci- rithm that is corrected in fications for public-key cryp- [MN14], while retaining the tography. World-Wide Web speedup. site., 2000. URL http:// grouper.ieee.org/groups/ IBM-MARS-Team:2000:MAS 1363/index.html. [IBM00] IBM MARS Team. MARS IEEE:2001:ISF and the AES selection criteria. Technical re- [IEE01a] IEEE, editor. 42nd IEEE port, IBM Corporation, Symposium on Foundations San Jose, CA, USA, May of Computer Science: pro- 15, 2000. URL http: ceedings: October 14–17, //www.research.ibm.com/ 2001, Las Vegas, Nevada, security/final-comments. USA. IEEE Computer So- doc; http://www.research. ciety Press, 1109 Spring ibm.com/security/final- Street, Suite 300, Silver comments.pdf; http:/ Spring, MD 20910, USA, /www.research.ibm.com/ 2001. CODEN ASFPDV. REFERENCES 383

ISBN 0-7695-1390-5, 0- ings: 44th Annual IEEE 7695-1391-3 (case), 0-7695- Symposium on Founda- 1392-1 (microfiche). ISSN tions of Computer Science, 0272-5428. LCCN ???? FOCS 2003, 11–14 Octo- IEEE:2001:EIW ber 2003, Cambridge, Mas- sachusetts. IEEE Computer [IEE01b] IEEE, editor. Eighth IEEE Society Press, 1109 Spring Workshop on Hot Top- Street, Suite 300, Silver ics in Operating Systems Spring, MD 20910, USA, (HotOS-VIII). May 20–23, 2003. CODEN ASFPDV. 2001, Schloss Elmau, Ger- ISBN 0-7695-2040-5. ISSN many. IEEE Computer So- 0272-5428. LCCN QA76 ciety Press, 1109 Spring .S979 2003. URL http: Street, Suite 300, Silver //ieeexplore.ieee.org/ Spring, MD 20910, USA, iel5/8767/27770/01238173. 2001. ISBN 0-7695-1040- pdf; http://ieeexplore. X. US$135.00. URL http: ieee.org/xpl/RecentCon. //computer.org/CSPRESS/ jsp?punumber=8767&conhome= CATALOG/pr01040.htm. IEEE 1000292. IEEE Com- catalog number PR01040. puter Society Order Number PR02040. IEEE:2002:PAI [IEE02] IEEE, editor. Proceed- IEEE:2004:PAI ings of the 43rd Annual IEEE Symposium on Foun- [IEE04] IEEE, editor. Proceedings: dations of Computer Sci- 45th Annual IEEE Sym- ence, FOCS 2002, Van- posium on Foundations of couver, BC, Canada, 16– Computer Science: FOCS 19 November 2002. IEEE 2004, 17–19 October, 2004, Computer Society Press, Rome, Italy. IEEE Com- 1109 Spring Street, Suite puter Society Press, 1109 300, Silver Spring, MD Spring Street, Suite 300, 20910, USA, 2002. CODEN Silver Spring, MD 20910, ASFPDV. ISBN 0-7695- USA, 2004. CODEN 1822-2. ISSN 0272-5428. ASFPDV. ISBN 0-7695- LCCN QA267. URL http: 2228-9. ISSN 0272-5428. //ieeexplore.ieee.org/ LCCN QA276. URL http: iel5/8411/26517/01181875. //ieeexplore.ieee.org/ pdf. IEEE Computer iel5/9430/29918/01366212. Society Order Number pdf; http://ieeexplore. PR01822. ieee.org/servlet/opac? IEEE:2003:PAI punumber=9430. IEEE Computer Society Order [IEE03] IEEE, editor. Proceed- Number P2228. REFERENCES 384

IEEE:2005:AIS .S974 2006. URL http: //ieeexplore.ieee.org/ [IEE05a] IEEE, editor. 46th Annual servlet/opac?punumber= IEEE Symposium on Foun- 4031329. IEEE Com- dations of Computer Sci- puter Society Order Number ence: FOCS 2005: 23–25 P2720. October, 2005, Pittsburgh, IEEE:2007:PAI Pennsylvania, USA. IEEE Computer Society Press, [IEE07] IEEE, editor. Proceedings of 1109 Spring Street, Suite the 48th Annual IEEE Sym- 300, Silver Spring, MD posium on Foundations of 20910, USA, 2005. ISBN Computer Science: [FOCS 0-7695-2468-0, 0-7695-2362- 2007]: October 20–23, 2007, 5. ISSN 0272-5428. LCCN Providence, Rhode Island. QA76 .S979 2005. IEEE IEEE Computer Society Computer Society order Press, 1109 Spring Street, number P2468. Suite 300, Silver Spring, IEEE:2005:PIS MD 20910, USA, 2007. ISBN 0-7695-3010-9. ISSN [IEE05b] IEEE, editor. Proceedings 0272-5428. LCCN QA76 of the 17th IEEE Sympo- .S974 2007. URL http: sium on Computer Arith- //ieeexplore.ieee.org/ metic, ARITH-17, June servlet/opac?punumber= 27–29, 2005, Cape Cod, 4389466. IEEE Com- Massachusetts, USA. IEEE puter Society order number Computer Society Press, P3010. 1109 Spring Street, Suite IEEE:2008:PAI 300, Silver Spring, MD 20910, USA, 2005. ISBN [IEE08] IEEE, editor. Proceedings ???? LCCN ???? of the 49th Annual IEEE IEEE:2006:AIS Symposium on Foundations of Computer Science: Octo- [IEE06] IEEE, editor. 47th An- ber 25–23, 2008, Philadel- nual IEEE Symposium on phia, Pennsylvania, USA. Foundations of Computer IEEE Computer Society Science: FOCS 2006: 21– Press, 1109 Spring Street, 24 October, 2006, Berke- Suite 300, Silver Spring, ley, California. IEEE Com- MD 20910, USA, 2008. puter Society Press, 1109 ISBN 0-7695-3436-8. ISSN Spring Street, Suite 300, 0272-5428. LCCN QA76 Silver Spring, MD 20910, .S95 2008. URL http: USA, 2006. ISBN 0-7695- //ieeexplore.ieee.org/ 2720-5, 0-7695-2362-5. ISSN servlet/opac?punumber= 0272-5428. LCCN QA76 4690923. IEEE Com- REFERENCES 385

puter Society order number 9743 (print), 1611-3349 P3436. (electronic). URL http: IEEE:2009:ISI //link.springer-ny.com/ link/service/series/0558/ [IEE09a] IEEE, editor. ICM ’09: 21th bibs/2041/20410073.htm; [sic] International Confer- http://link.springer- ence on Microelectronics ny.com/link/service/series/ (ICM 2009): took place 0558/papers/2041/20410073. from Dec 19, 2009 to Dec pdf. 22, 2009 in Marrakech, Mo- rocco. IEEE Computer So- Ifrah:2000:UHN ciety Press, 1109 Spring Street, Suite 300, Silver [Ifr00] Georges Ifrah. The Univer- Spring, MD 20910, USA, sal History of Numbers from 2009. ISBN 1-4244-5814- Prehistory to the Invention 5, 1-4244-5816-1. LCCN of the Computer.JohnWi- TK7870 2009. URL http: ley and Sons, Inc., New //ieeexplore.ieee.org/ York, NY, USA, 2000. ISBN servlet/opac?punumber= 0-471-37568-3. xxii + 633 5412667. pp. LCCN QA141.I3713 2000. US$39.95. Trans- IEEE:2009:PAI lated from the French edi- [IEE09b] IEEE, editor. Proceedings tion, Histoire universelle des of the 50th Annual IEEE chiffres, by David Bellos, E. Symposium on Foundations F. Harding, Sophie Wood, of Computer Science: Oc- and Ian Monk. tober 25–27, 2009, Atlanta, Iglesias:2002:NSB Georgia, USA. IEEE Com- puter Society Press, 1109 [Igl02] A. Iglesias. A new scheme Spring Street, Suite 300, Sil- based on semiconductor ver Spring, MD 20910, USA, lasers with phase-conjugate 2009. ISBN 0-7695-3850- feedback for cryptographic 9. LCCN QA76 .S95 2009. communications. Lecture IEEE Computer Society or- Notes in Computer Science, der number P3850. 2510:135–??, 2002. CODEN Itoi:2001:SIS LNCSD9. ISSN 0302-9743 (print), 1611-3349 (elec- [IFH01] Naomaru Itoi, Tomoko tronic). URL http:// Fukuzawa, and Peter Hon- link.springer.de/link/ eyman. Secure Internet service/series/0558/bibs/ smartcards. Lecture Notes 2510/25100135.htm; http: in Computer Science, 2041: //link.springer.de/link/ 73–??, 2001. CODEN service/series/0558/papers/ LNCSD9. ISSN 0302- 2510/25100135.pdf. REFERENCES 386

Bassham:2000:ETA issn=0302-9743&volume= 2779; http://www.springerlink. [III00] Lawrence E. Bassham III. com/openurl.asp?genre= Efficiency testing of ANSI volume&id=doi:10.1007/ C implementations of round b13240. 2 candidate algorithms Iwata:2000:PAF for the Advanced Encryp- tion Standard. In NIST [IK00] Tetsu Iwata and Kaoru [NIS00], pages 136–148. Kurosawa. On the pseu- ISBN ???? LCCN ???? dorandomness of AES final- URL http://csrc.nist. ists—RC6,Serpent,MARS gov/encryption/aes/round2/ and Twofish (abstract only). conf3/aes3conf.htm; http: In NIST [NIS00], page 9. //csrc.nist.gov/encryption/ ISBN ???? LCCN ???? aes/round2/conf3/papers/ URL http://csrc.nist. AES3Proceedings-1.pdf; gov/encryption/aes/round2/ http://csrc.nist.gov/ conf3/aes3conf.htm; http: encryption/aes/round2/ //csrc.nist.gov/encryption/ conf3/papers/AES3Proceedings- aes/round2/conf3/papers/ 2.pdf; http://csrc.nist. AES3Proceedings-1.pdf; gov/encryption/aes/round2/ http://csrc.nist.gov/ conf3/papers/AES3Proceedings- encryption/aes/round2/ 3.pdf; http://csrc.nist. conf3/papers/AES3Proceedings- gov/encryption/aes/round2/ 2.pdf; http://csrc.nist. conf3/papers/AES3Proceedings. gov/encryption/aes/round2/ pdf. conf3/papers/AES3Proceedings- 3.pdf; http://csrc.nist. Itoh:2003:PCA gov/encryption/aes/round2/ [IIT03] Kouichi Itoh, Tetsuya Izu, conf3/papers/AES3Proceedings. and Masahiko Takenaka. pdf. A practical countermeasure Iwata:2001:PAF against address-bit differen- tial power analysis. In Wal- [IK01] Tetsu Iwata and Kaoru ter et al. [WKP03], pages Kurosawa. On the pseu- 382–396. CODEN LNCSD9. dorandomness of the AES ISBN 3-540-40833-9. ISSN finalists — RC6 and Ser- 0302-9743 (print), 1611- pent. Lecture Notes in 3349 (electronic). LCCN Computer Science, 1978: TK7895.E42. URL http: 231–??, 2001. CODEN //link.springer-ny.com/ LNCSD9. ISSN 0302- link/service/series/0558/ 9743 (print), 1611-3349 tocs/t2779.htm; http: (electronic). URL http: //www.springerlink.com/ //link.springer-ny.com/ openurl.asp?genre=issue& link/service/series/0558/ REFERENCES 387

bibs/1978/19780231.htm; Ichikawa:2000:HEA http://link.springer- ny.com/link/service/series/[IKM00] Tetsuya Ichikawa, Tomomi 0558/papers/1978/19780231. Kasuya, and Mitsuru Mat- pdf. sui. Hardware evaluation of the AES finalists. In Impagliazzo:2003:LRA NIST [NIS00], pages 279– 285. ISBN ???? LCCN ???? [IK03] R. Impagliazzo and B. M. URL http://csrc.nist. Kapron. Logics for rea- gov/encryption/aes/round2/ soning about cryptographic conf3/aes3conf.htm; http: constructions. In IEEE //csrc.nist.gov/encryption/ [IEE03], pages 372–383. aes/round2/conf3/papers/ CODEN ASFPDV. ISBN AES3Proceedings-1.pdf; 0-7695-2040-5. ISSN 0272- http://csrc.nist.gov/ 5428. LCCN QA76 .S979 encryption/aes/round2/ 2003. URL http:// conf3/papers/AES3Proceedings- ieeexplore.ieee.org/iel5/ 2.pdf; http://csrc.nist. 8767/27770/01238211.pdf? gov/encryption/aes/round2/ isnumber=27770&prod=CNF& conf3/papers/AES3Proceedings- arnumber=1238211&arSt=+ 3.pdf; http://csrc.nist. 372&ared=+383&arAuthor= gov/encryption/aes/round2/ Impagliazzo%2C+R.%3B+Kapron% conf3/papers/AES3Proceedings. 2C+B.M.; http://ieeexplore. pdf. ieee.org/xpls/abs_all. Ishai:2003:EOT jsp?isnumber=27770&arnumber= 1238211&count=66&index= [IKNP03] Yuval Ishai, Joe Kil- 38. IEEE Computer Society ian, Kobbi Nissim, and Order Number PR02040. Erez Petrank. Extend- ing oblivious transfers effi- Impagliazzo:2006:LRA ciently. In Boneh [Bon03], pages 145–161. CODEN [IK06] Russell Impagliazzo and LNCSD9. ISBN 3-540- Bruce M. Kapron. Logics 40674-3. ISSN 0302-9743 for reasoning about crypto- (print), 1611-3349 (elec- graphic constructions. Jour- tronic). LCCN QA76.9.A25 nal of Computer and Sys- C79 2003. URL http: tem Sciences, 72(2):286– //link.springer-ny.com/ 320, March 2006. CODEN link/service/series/0558/ JCSSBM. ISSN 0022-0000 tocs/t2729.htm; http: (print), 1090-2724 (elec- //www.springerlink.com/ tronic). URL http:// openurl.asp?genre=issue& www.sciencedirect.com/ issn=0302-9743&volume= science/article/pii/S0022000005000929. 2729; http://www.springerlink. REFERENCES 388

com/openurl.asp?genre= from secure multiparty com- volume&id=doi:10.1007/ putation. In ACM [ACM07], b11817. pages 21–30. ISBN 1-59593- Ishai:2005:SCC 631-9. LCCN QA75.5 .A22 2007. [IKO05] Yuval Ishai, Eyal Kushile- Ishai:2008:CCC vitz, and Rafail Ostro- vsky. Sufficient conditions [IKOS08] Yuval Ishai, Eyal Kushile- for collision-resistant hash- vitz, Rafail Ostrovsky, and ing. In Kilian [Kil05], pages Amit Sahai. Cryptogra- 445–?? CODEN LNCSD9. phy with constant computa- ISBN 3-540-24573-1 (soft- tional overhead. In ACM cover). ISSN 0302-9743 [ACM08], pages 433–442. (print), 1611-3349 (elec- ISBN 1-60558-047-3. LCCN tronic). LCCN QA76.9.A25 QA76.6 .A152 2008. T44 2005. URL http: //www.springerlink.com/ Iyer:2007:TAA openurl.asp?genre=issue& [IKP+07] Ravishankar K. Iyer, Zbig- issn=0302-9743&volume= niew Kalbarczyk, Karthik 3378; http://www.springerlink. Pattabiraman, William Healey, com/openurl.asp?genre= Wen-Mei W. Hwu, Peter volume&id=doi:10.1007/ Klemperer, and Reza Fari- b106171. var. Toward application- Ishai:2006:CA aware security and relia- bility. IEEE Security & [IKOS06] Yuval Ishai, Eyal Kushile- Privacy, 5(1):57–62, Jan- vitz, Rafail Ostrovsky, and uary/February 2007. CO- Amit Sahai. Cryptogra- DEN ???? ISSN 1540-7993 phy from anonymity. In (print), 1558-4046 (elec- IEEE [IEE06], pages 239– tronic). 248. ISBN 0-7695-2720- 5, 0-7695-2362-5. ISSN Ioannidis:2005:ACN 0272-5428. LCCN QA76 .S974 2006. URL http: [IKY05] John Ioannidis, Angelos //ieeexplore.ieee.org/ Keromytis, and Moti Yung, servlet/opac?punumber= editors. Applied Cryptogra- 4031329. IEEE Com- phy and Network Security: puter Society Order Number Third International Con- P2720. ference, ACNS 2005, New Ishai:2007:ZKS York, NY, USA, June 7–10, 2005, proceedings,volume [IKOS07] Yuval Ishai, Eyal Kushile- 3531 of Lecture Notes in vitz, Rafail Ostrovsky, and Computer Science. Spring- Amit Sahai. Zero-knowledge er-Verlag, Berlin, Ger- REFERENCES 389

many / Heidelberg, Ger- http://link.springer- many / London, UK / etc., ny.com/link/service/series/ 2005. CODEN LNCSD9. 0558/papers/2052/20520230. ISBN 3-540-26223-7 (soft- pdf. cover). ISSN 0302-9743 (print), 1611-3349 (elec- Imrey:2003:BRC tronic). LCCN TK5102.85 [Imr03] Lee Imrey. Book re- .A26 2005. URL http: view: The Code Book: The //www.springerlink.com/ Science of Secrecy from openurl.asp?genre=issue& Ancient Egypt to Quan- issn=0302-9743&volume= tum Cryptography by Si- 3531; http://www.springerlink. mon Singh, Delacorte Press, com/openurl.asp?genre= 2000, $15.00, ISBN 0-385- volume&id=doi:10.1007/ 49532-3. ACM Queue: To- b137093. morrow’s Computing To- Izmerly:2006:CCA day, 1(9):76, December/ January 2003. CODEN [IM06] Oleg Izmerly and Tal Mor. AQCUAE. ISSN 1542-7730 Chosen ciphertext attacks (print), 1542-7749 (elec- on lattice-based public key tronic). encryption and modern (non-quantum) cryptogra- Inamori:2002:SPB phy in a quantum environ- ment. Theoretical Com- [Ina02a] Hitoshi Inamori. Security puter Science, 367(3):308– of practical BB84 quan- 323, December 1, 2006. tum key distribution. Al- CODEN TCSCDI. ISSN gorithmica, 34(4):366–371, 0304-3975 (print), 1879- November 2002. CODEN 2294 (electronic). ALGOEJ. ISSN 0178- 4617 (print), 1432-0541 Izotov:2001:COC (electronic). URL http: [IMM01] Boris V. Izotov, Alexan- //www.springerlink.com/ der A. Moldovyan, and openurl.asp?genre=article& Nick A. Moldovyan. Con- issn=0178-4617&volume= trolled operations as a cryp- 34&issue=4&spage=366. Quan- tographic primitive. Lecture tum computation and quan- Notes in Computer Science, tum cryptography. 2052:230–??, 2001. CO- Inamori:2002:SPT DEN LNCSD9. ISSN 0302- 9743 (print), 1611-3349 [Ina02b] Hitoshi Inamori. Security of (electronic). URL http: practical time-reversed EPR //link.springer-ny.com/ quantum key distribution. link/service/series/0558/ Algorithmica, 34(4):340– bibs/2052/20520230.htm; 365, November 2002. CO- REFERENCES 390

DEN ALGOEJ. ISSN 0178- Itkis:2001:FSS 4617 (print), 1432-0541 (electronic). URL http: [IR01] Gene Itkis and Leonid //www.springerlink.com/ Reyzin. Forward-secure sig- openurl.asp?genre=article& natures with optimal sign- issn=0178-4617&volume= ing and verifying. In Kil- 34&issue=4&spage=340. Quan- ian [Kil01a], pages 332– tum computation and quan- ?? ISBN 3-540-42456- tum cryptography. 3 (paperback). LCCN QA76.9.A25 C79 2001; Inoue:2005:EST QA267.A1 L43 no.2139. UK£47.00. URL http: [Ino05] Koji Inoue. Energy-security //link.springer-ny.com/ tradeoff in a secure cache link/service/series/0558/ architecture against buffer bibs/2139/21390332.htm; overflow attacks. ACM http://link.springer- SIGARCH Computer Ar- ny.com/link/service/series/ chitecture News, 33(1):81– 0558/papers/2139/21390332. 89, March 2005. CODEN pdf. CANED2. ISSN 0163-5964 (print), 1943-5851 (elec- Itkis:2002:SSB tronic). [IR02] Gene Itkis and Leonid Intel:2000:IIP Reyzin. SiBIR: Signer- Base Intrusion-Resilient sig- [Int00] Intel Corporation. Intel natures. In Yung [Yun02a], Itanium processor: High pages 499–514. CODEN performance on security LNCSD9. ISBN 3-540- algorithms (RSA decryp- 44050-X (paperback). ISSN tion kernel). Technical 0302-9743 (print), 1611- report, Intel Corporation, 3349 (electronic). LCCN Santa Clara, CA, USA, QA76.9.A25 C79 2002. URL 2000. 8 pp. URL http: http://link.springer.de/ //developer.intel.com/ link/service/series/0558/ design/ia-64/downloads/ bibs/2442/24420499.htm; itaniumssl_seg_103.htm. http://link.springer. de/link/service/series/ Intel:2003:IRN 0558/papers/2442/24420499. [Int03] Intel Corporation. The In- pdf. tel random number genera- Irwin:2003:BRBb tor. World-Wide Web doc- ument., 2003. URL http: [Irw03] Robert J. Irwin. Book re- //developer.intel.com/ view: Coding Theory and design/chipsets/rng/docs. Cryptography: the Essen- htm. tials, second edition, re- REFERENCES 391

vised and expanded by D.R. ing Zhao. Compressed- Hankerson, et al. Mar- domain video processing cel Dekker, 2000. ACM for adaptation, encryption, SIGACT News, 34(4):17– and authentication. IEEE 21, December 2003. CO- MultiMedia, 15(2):38–50, DEN SIGNDM. ISSN 0163- April/June 2008. CODEN 5700 (print), 1943-5827 IEMUE4. ISSN 1070-986X (electronic). See [HHL+00]. (print), 1941-0166 (elec- tronic). ISO:2004:IIIb Inoue:2008:FAC [ISO04] ISO. ISO/IEC 10118- 3:2004: Information tech- [ISTE08] Hiroaki Inoue, Junji Sakai, nology — Security tech- Sunao Torii, and Masato niques — Hash-functions — Edahiro. FIDES: an ad- Part 3: Dedicated hash- vanced chip multiprocessor functions. International Or- platform for secure next ganization for Standardiza- generation mobile termi- tion, Geneva, Switzerland, nals. ACM Transactions on February 2004. 94 pp. URL Embedded Computing Sys- http://www.iso.org/iso/ tems, 8(1):1:1–1:??, Decem- en/CatalogueDetailPage. ber 2008. CODEN ???? CatalogueDetail?CSNUMBER= ISSN 1539-9087 (print), 39876. 1558-3465 (electronic).

ISO:2005:IDM Ishai:2003:PCS

[ISO05] ISO. ISO 19005-1:2005, [ISW03] Yuval Ishai, Amit Sahai, Document management— and David Wagner. Pri- Electronic document file for- vate circuits: Securing hard- mat for long-term preservation— ware against probing at- Part 1: Use of PDF 1.4 tacks. In Boneh [Bon03], (PDF/A-1). International pages 463–481. CODEN Organization for Standard- LNCSD9. ISBN 3-540- ization, Geneva, Switzer- 40674-3. ISSN 0302-9743 land, 2005. URL http:// (print), 1611-3349 (elec- www.aiim.org/documents/ tronic). LCCN QA76.9.A25 standards/ISO_19005-1_ C79 2003. URL http: (E).doc; http://www. //link.springer-ny.com/ . aiim.org/pdf_a/ link/service/series/0558/ Iqbal:2008:CDV tocs/t2729.htm; http: //www.springerlink.com/ [ISSZ08] Razib Iqbal, Shervin Shir- openurl.asp?genre=issue& mohammadi, Abdulmo- issn=0302-9743&volume= taleb El Saddik, and Jiy- 2729; http://www.springerlink. REFERENCES 392

com/openurl.asp?genre= Japanese electronic govern- volume&id=doi:10.1007/ ment. Lecture Notes in b11817. Computer Science, 1976: Itoi:2000:SCI 399–??, 2000. CODEN LNCSD9. ISSN 0302- [Ito00] Naomaru Itoi. Secure co- 9743 (print), 1611-3349 processor integration with (electronic). URL http: Kerberos V5. In USENIX //link.springer-ny.com/ [USE00d], page ?? ISBN link/service/series/0558/ 1-880446-18-9. LCCN ???? bibs/1976/19760399.htm; URL http://www.usenix. http://link.springer- org/publications/library/ ny.com/link/service/series/ proceedings/sec2000/itoi. 0558/papers/1976/19760399. html. pdf. Itoi:2001:SCS Irwin:2005:PAI [Ito01] Naomaru Itoi. SC-CFS: [IY05] Keith Irwin and Ting Yu. Smartcard secured crypto- Preventing attribute infor- graphic file system. In mation leakage in auto- USENIX [USE01c], page ?? mated trust negotiation. ISBN 1-880446-18-9, 1- In Meadows and Syver- 880446-07-3. LCCN QA76.9.A25 son [MS05b], pages 36–45. U565 2001. URL http:// ISBN 1-59593-226-7. LCCN www.usenix.org/publications/ QA76.9.A25. ACM order library/proceedings/sec01/ number 459050. itoi.html. Iwamoto:2006:SSR Iwami:2008:AIA [IY06] Mitsugu Iwamoto and Hiro- [Iwa08] Maki Iwami. An attack suke Yamamoto. Strongly on improved algebraic sur- secure ramp secret shar- face public-key cryptosys- ing schemes for general ac- tem (abstract only). ACM cess structures. Informa- Communications in Com- tion Processing Letters,97 puter Algebra, 42(1–2):71– (2):52–57, January 31, 2006. 74, March/June 2008. CO- CODEN IFPLAT. ISSN DEN ???? ISSN 1932-2232 0020-0190 (print), 1872- (print), 1932-2240 (elec- 6119 (electronic). tronic). Iwata:2002:NCP Imai:2000:CPC [IYK02] Tetsu Iwata, Tomonobu [IY00] Hideki Imai and Atsuhiro Yoshino, and Kaoru Kuro- Yamagishi. CRYPTREC sawa. Non-cryptographic Project — for pseudoran- evaluation project for the dom permutation. Lecture REFERENCES 393

Notes in Computer Science, 3349 (electronic). LCCN 2365:149–??, 2002. CO- QA267.A1 L43 no.1751. DEN LNCSD9. ISSN 0302- 9743 (print), 1611-3349 Judge:2002:WWM (electronic). URL http: //link.springer-ny.com/ [JA02] Paul Judge and Mostafa link/service/series/0558/ Ammar. WHIM: water- bibs/2365/23650149.htm; marking multicast video http://link.springer- with a hierarchy of inter- ny.com/link/service/series/ mediaries. Computer Net- 0558/papers/2365/23650149. works (Amsterdam, Nether- pdf. lands: 1999), 39(6):699– 712, August 21, 2002. CO- Iwata:2003:NCP DEN ???? ISSN 1389-1286 (print), 1872-7069 (elec- [IYK03] Tetsu Iwata, Tomonobu tronic). URL http://www. Yoshino, and Kaoru Kuro- elsevier.com/gej-ng/10/ sawa. Non-cryptographic 15/22/96/53/27/abstract. primitive for pseudorandom html. permutation. Theoretical Jablon:2001:PAU Computer Science, 306(1– 3):139–154, September 5, [Jab01] David P. Jablon. Pass- 2003. CODEN TCSCDI. word authentication using ISSN 0304-3975 (print), multiple servers. Lecture 1879-2294 (electronic). Notes in Computer Science, 2020:344–??, 2001. CO- Imai:2000:PKC DEN LNCSD9. ISSN 0302- 9743 (print), 1611-3349 [IZ00] Hideki Imai and Yuliang (electronic). URL http: Zheng, editors. Public key //link.springer-ny.com/ cryptography: third Interna- link/service/series/0558/ tional Workshop on Practice bibs/2020/20200344.htm; and Theory in Public Key http://link.springer- Cryptosystems, PKC 2000, ny.com/link/service/series/ Melbourne, Victoria, Aus- 0558/papers/2020/20200344. tralia, January 18–20, 2000: pdf. proceedings, volume 1751 of Lecture Notes in Com- Jackson:2000:SCQ puter Science. Springer-Ver- lag, Berlin, Germany / Hei- [Jac00] Chris Jackson. Smart card delberg, Germany / Lon- questions move from tech- don, UK / etc., 2000. nology to applications. Rail- ISBN 3-540-66967-1. ISSN way gazette international, 0302-9743 (print), 1611- 156(3):167–168, March 2000. REFERENCES 394

Jambunathan:2000:CCP curity Standards / Lech Janczewski. Ch. 5. Manag- [Jam00] K. Jambunathan. On choice ing Security in the World of connection-polynomials Wide Web: Architecture, for LFSR-based stream ci- Services and Techniques / phers. Lecture Notes in Fredj Dridi and Gustaf Neu- Computer Science, 1977: mann — Pt. III. Cryptogra- 9–??, 2000. CODEN phy and Technical Security LNCSD9. ISSN 0302- Standards. Ch. 6. Cryptog- 9743 (print), 1611-3349 raphy: Protecting Confiden- (electronic). URL http: tiality, Integrity and Avail- //link.springer-ny.com/ ability of Data / Henry link/service/series/0558/ B. Wolfe. Ch. 7. Founda- bibs/1977/19770009.htm; tions for Cryptography / Di- http://link.springer- eter Gollmann. Ch. 8. Devel- ny.com/link/service/series/ opments in Security Mech- 0558/papers/1977/19770009. anism Standards / Chris pdf. Mitchell — Pt. IV. Security Janczewski:2000:IIS and the Law. Ch. 9. Elec- tronic Mail, Employee Pri- [Jan00] Lech Janczewski. Internet vacy and the Workplace / and intranet security man- Charles Prysby and Nicole agement: risks and solu- Prysby. Ch. 10. Protect- tions. Idea Group Pub., ing Personal Privacy in Cy- Hershey, PA, USA, 2000. berspace: The Limitations ISBN 1-878289-71-3. 302 of Third Generation Data pp. LCCN TK5105.875.I57 Protection Laws Such as the I684 2000. Contents: Pt. New Zealand Privacy Act I. State of the Art. Ch. 1993 / Gehan Gunasekara. 1. Security Risk Assessment and Electronic Commerce: Janeczko:2006:TSH A Cross-Industry Analysis / [Jan06] Paul B. Janeczko. Top Se- Jonathan W. Palmer, Jamie cret: a Handbook of Codes, Kliewer and Mark Sweat. Ciphers and Secret Writing. Ch. 2. Securing the Internet Candlewick Press, Cam- in New Zealand: Threats bridge, MA, USA, 2006. and Solutions / Jairo A. ISBN 0-439-87560-9. 144 Gutierrez — Pt. II. Man- (est.) pp. LCCN ???? aging Intranet and Inter- net Security. Ch. 3. De- Jankowski:2008:BRBb veloping Trust for Elec- tronic Commerce / Dieter [Jan08a] Richard Jankowski. Book Fink. Ch. 4. Managing Se- review: Privacy on the Line: curity Functions Using Se- The Politics of Wiretap- REFERENCES 395

ping and Encryption,by Security and Incident Re- Whitfield Diffie and Susan sponse. Addison-Wesley, Landau. ACM SIGACT Reading, MA, USA, 2005. News, 39(4):30–32, De- ISBN 0-321-24069-3 (paper- cember 2008. CODEN back). xxx + 650 pp. LCCN SIGNDM. ISSN 0163-5700 HV8079.C65 J66 2005. (print), 1943-5827 (elec- Johnson:2001:IHS tronic). See [DL98, DL07]. [JDJ01] Neil F. Johnson, Zoran Jankvist:2008:TMH Duric, and Sushil Jajo- [Jan08b] Uffe Thomas Jankvist. A dia. Information hiding: teaching module on the his- steganography and water- tory of public-key cryptog- marking: attacks and coun- raphy and RSA. BSHM termeasures, volume 1 of Bulletin: Journal of the Advances in information se- British Society for the His- curity. Kluwer Academic tory of Mathematics,23 Publishers, Dordrecht, The (3):157–168, 2008. CO- Netherlands, 2001. ISBN DEN ???? ISSN 1749- 0-7923-7204-2. xx + 137 8430 (print), 1749-8341 pp. LCCN QA76.9.A25 J25 (electronic). URL http: 2001. //www.tandfonline.com/ Jeffrey:2008:PAM doi/full/10.1080/17498430802304032. [Jef08] David Jeffrey, editor. Pro- Jennewein:2000:FCQ ceedings of the 21st an- [JAW+00] Thomas Jennewein, Ul- nual meeting of the Interna- rich Achleitner, Gregor tional Symposium on Sym- Weihs, Harald Weinfurter, bolic Computation, ISSAC and Anton Zeilinger. A 2008, July 20–23, 2008, fast and compact quan- Hagenberg, Austria.ACM tum random number gen- Press, New York, NY 10036, erator. Review of Sci- USA, 2008. ISBN 1-59593- entific Instruments, 71(4): 904-0. LCCN ???? 1675–1680, 2000. CODEN Jennings:2009:SLL RSINAK. ISSN 1089-7623, 0034-6748. URL http:// [Jen09] Trevor J. Jennings. SPARK: link.aip.org/link/?RSI/ the Libre language and 71/1675/1. toolset for high-assurance software engineering. ACM Jones:2005:RDF SIGADA Ada Letters,29 [JBR05] Keith J. (Keith John) Jones, (3):9–10, December 2009. Richard Bejtlich, and Cur- CODEN AALEE5. ISSN tis W. Rose. Real Dig- 1094-3641 (print), 1557- ital Forensics: Computer 9476 (electronic). REFERENCES 396

Jaeger:2004:CAA Jakobsson:2000:MMS

[JEZ04] Trent Jaeger, Antony Ed- [JJ00a] Markus Jakobsson and Ari wards, and Xiaolan Zhang. Juels. Mix and match: Consistency analysis of au- Secure function evaluation thorization hook placement via ciphertexts. Lecture in the Linux security mod- Notes in Computer Science, ules framework. ACM 1976:162–??, 2000. CO- Transactions on Informa- DEN LNCSD9. ISSN 0302- tion and System Security, 9743 (print), 1611-3349 7(2):175–205, May 2004. (electronic). URL http: CODEN ATISBQ. ISSN //link.springer-ny.com/ 1094-9224 (print), 1557- link/service/series/0558/ 7406 (electronic). bibs/1976/19760162.htm; http://link.springer- Juels:2001:RKG ny.com/link/service/series/ 0558/papers/1976/19760162. [JG01] Ari Juels and Jorge Gua- pdf. jardo. RSA key gener- ation with verifiable ran- Jaulmes:2000:CCA domness. Lecture Notes in Computer Science, 2274: [JJ00b] Eliane´ Jaulmes and An- 357–??, 2001. CODEN toine Joux. A chosen- LNCSD9. ISSN 0302- ciphertext attack against 9743 (print), 1611-3349 NTRU. In Bellare [Bel00], (electronic). URL http: pages 20–?? ISBN 3-540- //link.springer-ny.com/ 67907-3. ISSN 0302-9743 link/service/series/0558/ (print), 1611-3349 (elec- bibs/2274/22740357.htm; tronic). LCCN QA76.9.A25 http://link.springer- C79 2000 Bar. URL http: ny.com/link/service/series/ //link.springer-ny.com/ 0558/papers/2274/22740357. link/service/series/0558/ pdf. bibs/1880/18800020.htm; http://link.springer- Johnson:2007:EIS ny.com/link/service/series/ 0558/papers/1880/18800020. [JG07] M. Eric Johnson and Eric pdf. Goetz. Embedding infor- mation security into the or- Jaulmes:2000:NC ganization. IEEE Secu- rity & Privacy, 5(3):16– [JJ00c] Eliane´ Jaulmes and An- 24, May/June 2007. CO- toine Joux. A NICE crypt- DEN ???? ISSN 1540-7993 analysis. Lecture Notes in (print), 1558-4046 (elec- Computer Science, 1807: tronic). 382–??, 2000. CODEN REFERENCES 397

LNCSD9. ISSN 0302- relation attack on LILI-128. 9743 (print), 1611-3349 Information Processing Let- (electronic). URL http: ters, 81(3):127–132, Febru- //link.springer-ny.com/ ary 14, 2002. CODEN IF- link/service/series/0558/ PLAT. ISSN 0020-0190 bibs/1807/18070382.htm; (print), 1872-6119 (elec- http://link.springer- tronic). URL http://www. ny.com/link/service/series/ elsevier.com/gej-ng/10/ 0558/papers/1807/18070382. 23/20/85/34/28/abstract. pdf. html. Johansson:2000:FCA Jakimoski:2001:ASR [JJ00d] Thomas Johansson and [JK01a] Goce Jakimoski and Ljupˇco Fredrik J¨onsson. Fast cor- Kocarev. Analysis of relation attacks through re- some recently proposed construction of linear poly- chaos-based encryption al- nomials. In Bellare [Bel00], gorithms. Physics Letters pages 300–?? ISBN 3-540- A, 291(6):381–384, 2001. 67907-3. ISSN 0302-9743 CODEN PYLAAG. ISSN (print), 1611-3349 (elec- 0375-9601 (print), 1873- tronic). LCCN QA76.9.A25 2429 (electronic). C79 2000 Bar. URL http: Jakimoski:2001:CCB //link.springer-ny.com/ link/service/series/0558/[JK01b] Goce Jakimoski and Ljupˇco bibs/1880/18800300.htm; Kocarev. Chaos and cryp- http://link.springer- tography: block encryption ny.com/link/service/series/ ciphers based on chaotic 0558/papers/1880/18800300. maps. IEEE Trans. Circuits pdf. Systems I Fund. Theory Jaulmes:2001:CPN Appl., 48(2):163–169, 2001. CODEN ITCAEX. ISSN [JJ01] Eliane´ Jaulmes and An- 1057-7122 (print), 1558- toine Joux. Cryptanalysis of 1268 (electronic). PKP: a new approach. Lec- Jakimovski:2002:CS ture Notes in Computer Sci- ence, 1992:165–172, 2001. [JK02a] Goce Jakimovski and Ljupˇco CODEN LNCSD9. ISSN Kocarev. Cryptanalysis of 0302-9743 (print), 1611- SBLH. Lecture Notes in 3349 (electronic). Computer Science, 2355: Jonsson:2002:FCA 144–??, 2002. CODEN LNCSD9. ISSN 0302- [JJ02] Fredrik J¨onsson and Tho- 9743 (print), 1611-3349 mas Johansson. A fast cor- (electronic). URL http: REFERENCES 398

//link.springer-ny.com/ Jang:2001:BWA link/service/series/0558/ + bibs/2355/23550144.htm; [JKK 01] Yongwon Jang, Intaek Kim, http://link.springer- Hwan Il Kang, Kab Il ny.com/link/service/series/ Kim, and Seung-Soo Han. 0558/papers/2355/23550144. Blind watermarking algo- pdf. rithm using complex block selection method. Lecture Jonsson:2002:SRE Notes in Computer Science, 2195:996–??, 2001. CO- [JK02b] Jakob Jonsson and Bur- DEN LNCSD9. ISSN 0302- ton S. Kaliski Jr. On 9743 (print), 1611-3349 the security of RSA en- (electronic). URL http: cryption in TLS. Lecture //link.springer-ny.com/ Notes in Computer Science, link/service/series/0558/ 2442:127–??, 2002. CODEN bibs/2195/21950996.htm; LNCSD9. ISSN 0302-9743 http://link.springer- (print), 1611-3349 (elec- ny.com/link/service/series/ tronic). URL http:// 0558/papers/2195/21950996. link.springer.de/link/ pdf. service/series/0558/bibs/ 2442/24420127.htm; http: Jung:2001:EMO //link.springer.de/link/ [JKRW01] Oliver Jung, Sven Kuhn, service/series/0558/papers/ Christoph Ruland, and Kai 2442/24420127.pdf. Wollenweber. Enhanced Jonsson:2002:SRT modes of operation for the encryption in high-speed [JK02c] Jakob Jonsson and Bur- networks and their impact ton S. Kaliski, Jr. On on QoS. Lecture Notes the security of RSA en- in Computer Science, 2119: cryption in TLS. In 344–??, 2001. CODEN Yung [Yun02a], pages 127– LNCSD9. ISSN 0302- 142. CODEN LNCSD9. 9743 (print), 1611-3349 ISBN 3-540-44050-X (pa- (electronic). URL http: perback). ISSN 0302-9743 //link.springer-ny.com/ (print), 1611-3349 (elec- link/service/series/0558/ tronic). LCCN QA76.9.A25 bibs/2119/21190344.htm; C79 2002. URL http:/ http://link.springer- /link.springer.de/link/ ny.com/link/service/series/ service/series/0558/bibs/ 0558/papers/2119/21190344. 2442/24420017.htm; http: pdf. //link.springer.de/link/ Jallad:2002:ICC service/series/0558/papers/ 2442/24420017.pdf. [JKS02] Kahil Jallad, Jonathan REFERENCES 399

Katz, and Bruce Schneier. link/service/series/0558/ Implementation of chosen- bibs/1807/18070221.htm; ciphertext attacks against http://link.springer- PGP and GnuPG. In ny.com/link/service/series/ Lynn Batten and Jennifer 0558/papers/1807/18070221. Seberry, editors, Informa- pdf. tion security and privacy: Joux:2003:IGN 7th Australasian confer- ence, ACISP 2002, Mel- [JL03] Antoine Joux and Reynald bourne, Australia, July 3– Lercier. Improvements to 5, 2002: proceedings,vol- the general number field ume 2384, page ?? Spring- sieve for discrete logarithms er-Verlag, Berlin, Ger- in prime fields. A compari- many / Heidelberg, Ger- son with the Gaussian inte- many / London, UK / etc., ger method. Mathematics of 2002. ISBN 3-540-43861- Computation, 72(242):953– 0. LCCN QA76.9.A25 967, April 2003. CODEN A278 2002. URL http: MCMPAF. ISSN 0025- //link.springer-ny.com/ 5718 (paper), 1088-6842 link/service/series/0558/ (electronic). URL http: bibs/2433/24330090.htm; //www.ams.org/journal- http://link.springer- getitem?pii=S0025-5718- ny.com/link/service/series/ 02-01482-5; http://www. 0558/papers/2433/24330090. ams.org/mcom/2003-72-242/ pdf; http://link.springer- S0025-5718-02-01482-5/ ny.com/link/service/series/ S0025-5718-02-01482-5. 0558/tocs/t2384.htm; dvi; http://www.ams. http://www.counterpane. org/mcom/2003-72-242/S0025- com/pgp-attack.html. 5718-02-01482-5/S0025- 5718-02-01482-5.pdf; Jarecki:2000:AST http://www.ams.org/mcom/ 2003-72-242/S0025-5718- [JL00] Stanislaw Jarecki and Anna 02-01482-5/S0025-5718- Lysyanskaya. Adaptively 02-01482-5.ps; http:/ secure threshold cryptogra- /www.ams.org/mcom/2003- phy: Introducing concur- 72-242/S0025-5718-02-01482- rency, removing erasures 5/S0025-5718-02-01482- (extended abstract). Lecture 5.tex. Notes in Computer Science, Juang:2004:FBT 1807:221–??, 2000. CO- DEN LNCSD9. ISSN 0302- [JL04] Wen-Shenq Juang and 9743 (print), 1611-3349 Horng-Twu Liaw. Fair (electronic). URL http: blind threshold signatures //link.springer-ny.com/ in wallet with observers. REFERENCES 400

The Journal of Systems Juang:2002:VMA and Software, 72(1):25–31, June 2004. CODEN JS- [JLL02] Wen-Shenq Juang, Chin- SODM. ISSN 0164-1212 Laung Lei, and Horng-Twu (print), 1873-1228 (elec- Liaw. A verifiable multi- tronic). authority secret election al- lowing abstention from vot- Jeong:2008:PKE ing. The Computer Journal, 45(6):672–682, ???? 2002. [JL08] I. R. Jeong and D. H. CODEN CMPJA6. ISSN Lee. Parallel key exchange. 0010-4620 (print), 1460- J.UCS: Journal of Univer- 2067 (electronic). URL sal Computer Science,14 http://www3.oup.co.uk/ (3):377–396, ???? 2008. computer_journal/hdb/Volume_ CODEN ???? ISSN 45/Issue_06/450672.sgm. 0948-6968. URL http:// abs.html; http://www3. www.jucs.org/jucs_14_3/ oup.co.uk/computer_journal/ parallel_key_exchange. hdb/Volume_45/Issue_06/ pdf/450672.pdf. Lee:2007:RKD Jakobsson:2003:FMT [jLC07] Hyoung joo Lee and Sung- zoon Cho. Retraining a [JLMS03] Markus Jakobsson, Tom keystroke dynamics-based Leighton, Silvio Micali, and authenticator with impos- Michael Szydlo. Frac- tor patterns. Comput- tal Merkle tree represen- ers & Security, 26(4):300– tation and traversal. In 310, June 2007. CODEN Joye [Joy03b], pages 314– CPSEDU. ISSN 0167-4048 326. CODEN LNCSD9. (print), 1872-6208 (elec- ISBN 3-540-00847-0. ISSN tronic). URL https:// 0302-9743 (print), 1611- www.sciencedirect.com/ 3349 (electronic). LCCN science/article/pii/S0167404806002057. QA76.9.A25 C822 2003. URL http://link.springer- Juang:2001:FBT ny.com/link/service/series/ 0558/tocs/t2612.htm; [JLL01] W.-S. Juang, C.-L. Lei, http://www.springerlink. and H.-T. Liaw. Fair com/openurl.asp?genre= blind threshold signatures issue&issn=0302-9743&volume= based on discrete logarithm. 2612. International Journal of Johansson:2003:PCI Computer Systems Science and Engineering, 16(6):??, [JM03] Thomas Johansson and November 2001. CODEN Subhamoy Maitra, editors. CSSEEI. ISSN 0267-6192. Progress in Cryptology— REFERENCES 401

INDOCRYPT 2003: 4th provement. Applied Math- International Conference ematics and Computation, on Cryptology in India, 170(2):958–975, Novem- NewDelhi,India,Decem- ber 15, 2005. CODEN ber 8–10, 2003: Proceed- AMHCBQ. ISSN 0096-3003 ings, volume 2904 of Lec- (print), 1873-5649 (elec- ture Notes in Computer tronic). Science. Springer-Verlag, Berlin, Germany / Heidel- Joux:2002:BAA berg, Germany / London, UK / etc., 2003. CO- [JMV02] Antoine Joux, Gwena¨elle DEN LNCSD9. ISBN 3-540- Martinet, and Fr´ed´eric 20609-4. ISSN 0302-9743 Valette. Blockwise-adaptive (print), 1611-3349 (elec- attackers: Revisiting the tronic). LCCN QA76.9.A25 (in)security of some prov- I5535 2003. URL http: ably secure encryption //link.springer-ny.com/ modes: CBC, GEM, IACBC. link/service/series/0558/ In Yung [Yun02a], pages tocs/t2904.htm; http: 17–30. CODEN LNCSD9. //www.springerlink.com/ ISBN 3-540-44050-X (pa- openurl.asp?genre=issue& perback). ISSN 0302-9743 issn=0302-9743&volume= (print), 1611-3349 (elec- 2904; http://www.springerlink. tronic). LCCN QA76.9.A25 com/openurl.asp?genre= C79 2002. URL http:/ volume&id=doi:10.1007/ /link.springer.de/link/ b94593. service/series/0558/bibs/ Jakobsson:2007:DPD 2442/24420017.htm; http: //link.springer.de/link/ [JM07] Markus Jakobsson and service/series/0558/papers/ Steven Myers. Delayed 2442/24420017.pdf. password disclosure. ACM SIGACT News, 38(3):56– Jao:2009:EGB 75, September 2007. CO- DEN SIGNDM. ISSN 0163- [JMV09] David Jao, Stephen D. 5700 (print), 1943-5827 Miller, and Ramarathnam (electronic). URL http: Venkatesan. Expander //doi.acm.org/10.1145/ graphs based on GRH with 1324215.1324228. an application to elliptic Jing-mei:2005:CRB curve cryptography. Journal of Number Theory, 129(6): [JmBdXgXm05] Liu Jing-mei, Wei Bao- 1491–1504, June 2009. CO- dian, Cheng Xiang-guo, and DEN JNUTA9. ISSN 0022- Wang Xin-mei. Cryptanaly- 314X (print), 1096-1658 sis of Rijndael S-box and im- (electronic). URL http:/ REFERENCES 402

/www.sciencedirect.com/ F77 2003. URL http: science/article/pii/S0022314X09000213. //link.springer-ny.com/ link/service/series/0558/ Johnson:2000:AFR tocs/t2887.htm; http: //www.springerlink.com/ [Joh00] Don Johnson. AES and openurl.asp?genre=issue& future resiliency: More issn=0302-9743&volume= thoughts and questions. In 2887; http://www.springerlink. NIST [NIS00], pages 257– com/openurl.asp?genre= 268. ISBN ???? LCCN ???? volume&id=doi:10.1007/ URL http://csrc.nist. b93938. gov/encryption/aes/round2/ conf3/aes3conf.htm; http: Johnson:2005:OSV //csrc.nist.gov/encryption/[Joh05] Thomas K. Johnson. An aes/round2/conf3/papers/ open-secret voting system. AES3Proceedings-1.pdf; Computer, 38(3):100–??, http://csrc.nist.gov/ March 2005. CODEN CP- encryption/aes/round2/ TRB4. ISSN 0018-9162 conf3/papers/AES3Proceedings- (print), 1558-0814 (elec- 2.pdf; http://csrc.nist. tronic). URL http:/ gov/encryption/aes/round2/ /csdl.computer.org/dl/ conf3/papers/AES3Proceedings- mags/co/2005/03/r3100. 3.pdf; http://csrc.nist. htm; http://csdl.computer. gov/encryption/aes/round2/ org/dl/mags/co/2005/03/ conf3/papers/AES3Proceedings. r3100.pdf. pdf. Jolish:2001:EDP Johansson:2003:FSE [Jol01] Barak D. Jolish. The en- [Joh03] Thomas Johansson, edi- cryption debate in plain- tor. Fast Software En- text: National security and cryption: 10th Interna- encryption in the United tional Workshop, FSE 2003, States and Israel. Lecture Lund, Sweden, February Notes in Computer Science, 24–26, 2003: Revised Pa- 1962:202–??, 2001. CO- pers, volume 2887 of Lec- DEN LNCSD9. ISSN 0302- ture Notes in Computer 9743 (print), 1611-3349 Science. Springer-Verlag, (electronic). URL http: Berlin, Germany / Heidel- //link.springer-ny.com/ berg, Germany / London, link/service/series/0558/ UK / etc., 2003. CO- bibs/1962/19620202.htm; DEN LNCSD9. ISBN 3-540- http://link.springer- 20449-0. ISSN 0302-9743 ny.com/link/service/series/ (print), 1611-3349 (elec- 0558/papers/1962/19620202. tronic). LCCN QA76.9.A25 pdf. REFERENCES 403

Jones:2008:RAA com/openurl.asp?genre= volume&id=doi:10.1007/ [Jon08] Josh Jones. The RSA algo- b99099. rithm (abstract only). ACM Communications in Com- Joux:2009:AC puter Algebra, 42(1–2):74, [Jou09] Antoine Joux. Algorith- March/June 2008. CO- mic Cryptanalysis. Chap- DEN ???? ISSN 1932-2232 man and Hall/CRC cryp- (print), 1932-2240 (elec- tography and network secu- tronic). rity. CRC Press, 2000 N.W. Joux:2002:WTP Corporate Blvd., Boca Ra- ton, FL 33431-9868, USA, [Jou02] Antoine Joux. The Weil 2009. ISBN 1-4200-7002-9 and Tate pairings as build- (hardcover). 501 pp. LCCN ing blocks for public key QA76.9.A43; QA76.9.A43 cryptosystems. Lecture J693 2009. Notes in Computer Science, Joyner:2000:CTC 2369:20–??, 2002. CO- DEN LNCSD9. ISSN 0302- [Joy00] David Joyner, editor. Cod- 9743 (print), 1611-3349 ing theory and cryptography: (electronic). URL http: from Enigma and Geheim- //link.springer-ny.com/ schreiber to quantum the- link/service/series/0558/ ory. Springer-Verlag, Berlin, bibs/2369/23690020.htm; Germany / Heidelberg, Ger- http://link.springer- many / London, UK / etc., ny.com/link/service/series/ 2000. ISBN 3-540-66336- 0558/papers/2369/23690020. 3 (softcover), 3-642-59663- pdf. 0 (e-book). LCCN QA268 .C67 1999. UK£44.50. URL Joux:2004:MIH http://frode.home.cern. [Jou04] Antoine Joux. Multicolli- ch/frode/pubs/cryptoday. sions in iterated hash func- pdf. Proceedings of the tions. application to cas- Conference on Coding The- caded constructions. In ory, Cryptography and Franklin [Fra04], pages 306– Number Theory held at the ?? CODEN LNCSD9. U.S. Naval Academy during ISBN 3-540-22668-0. ISSN October 25–26, 1998. 0302-9743 (print), 1611- Joye:2003:CPY 3349 (electronic). LCCN 10.1007/b99099. URL [Joy03a] Marc Joye. Cryptanalysis of http://www.springerlink. a pay-as-you-watch system. com/openurl.asp?genre= Information Processing Let- issue&issn=0302-9743&volume= ters, 88(3):119–120, Novem- 3152; http://www.springerlink. ber 15, 2003. CODEN IF- REFERENCES 404

PLAT. ISSN 0020-0190 ny.com/link/service/series/ (print), 1872-6119 (elec- 0558/papers/2339/23390178. tronic). pdf.

Joye:2003:TCC Jaulmes:2002:SHG [Joy03b] Marc Joye, editor. Topics in cryptology, CT-RSA 2003: [JP02b] Eliane´ Jaulmes and Guil- the Cryptographers’ Track laume Poupard. On at the RSA Conference the security of homage 2003, San Francisco, CA, group authentication pro- USA, April 13–17, 2003: tocol. Lecture Notes in Proceedings, volume 2612 Computer Science, 2339: of Lecture Notes in Com- 106–??, 2002. CODEN puter Science. Springer-Ver- LNCSD9. ISSN 0302- lag, Berlin, Germany / Hei- 9743 (print), 1611-3349 delberg, Germany / Lon- (electronic). URL http: don, UK / etc., 2003. CO- //link.springer-ny.com/ DEN LNCSD9. ISBN 3-540- link/service/series/0558/ 00847-0. ISSN 0302-9743 bibs/2339/23390106.htm; (print), 1611-3349 (elec- http://link.springer- tronic). LCCN QA76.9.A25 ny.com/link/service/series/ C822 2003. URL http: 0558/papers/2339/23390106. //link.springer-ny.com/ pdf. link/service/series/0558/ tocs/t2612.htm; http: Joye:2003:GFA //www.springerlink.com/ openurl.asp?genre=issue& [JP03] Marc Joye and Pascal issn=0302-9743&volume= Paillier. GCD-free algo- 2612. rithms for computing mod- ular inverses. In Walter Jakobsson:2002:MAL et al. [WKP03], pages 243– [JP02a] Markus Jakobsson and 253. CODEN LNCSD9. David Pointcheval. Mu- ISBN 3-540-40833-9. ISSN tual authentication for low- 0302-9743 (print), 1611- power mobile devices. Lec- 3349 (electronic). LCCN ture Notes in Computer Sci- TK7895.E42. URL http: ence, 2339:178–??, 2002. //link.springer-ny.com/ CODEN LNCSD9. ISSN link/service/series/0558/ 0302-9743 (print), 1611- tocs/t2779.htm; http: 3349 (electronic). URL //www.springerlink.com/ http://link.springer-ny. openurl.asp?genre=issue& com/link/service/series/ issn=0302-9743&volume= 0558/bibs/2339/23390178. 2779; http://www.springerlink. htm; http://link.springer- com/openurl.asp?genre= REFERENCES 405

volume&id=doi:10.1007/ and Embedded Systems— b13240. CHES 2004: 6th Inter- Jain:2006:TMB national Workshop Cam- bridge, MA, USA, August [JP06] A. K. Jain and S. Pankanti. 11–13, 2004. Proceedings, A touch of money [biomet- volume 3156 of Lecture ric authentication systems]. Notes in Computer Science. IEEE Spectrum, 43(7):22– Springer-Verlag, Berlin, 27, July 2006. CODEN Germany / Heidelberg, Ger- IEESAM. ISSN 0018-9235 many / London, UK / etc., (print), 1939-9340 (elec- 2004. CODEN LNCSD9. tronic). ISBN 3-540-22666-4. ISSN 0302-9743 (print), 1611- Jakubowska:2007:MCT 3349 (electronic). LCCN [JP07] Gizela Jakubowska and Wo- ???? URL http:/ jciech Penczek. Modelling /link.springer-ny.com/ and checking timed authen- link/service/series/0558/ tication of security proto- tocs/t3156.htm; http: cols. Fundamenta Infor- //www.springerlink.com/ maticae, 79(3–4):363–378, openurl.asp?genre=issue& February 2007. CODEN issn=0302-9743&volume= FUMAAJ. ISSN 0169-2968 3156; http://www.springerlink. (print), 1875-8681 (elec- com/openurl.asp?genre= tronic). volume&id=doi:10.1007/ b99451. Jiang:2004:FAP Joye:2001:PMA [JPL04] Rui Jiang, Li Pan, and Jian- Hua Li. Further analysis [JQY01] Marc Joye, Jean-Jacques of password authentication Quisquater, and Moti Yung. schemes based on authen- On the power of misbehav- tication tests. Computers ing adversaries and secu- &Security, 23(6):469–477, rity analysis of the origi- September 2004. CODEN nal EPOC. Lecture Notes CPSEDU. ISSN 0167-4048 in Computer Science, 2020: (print), 1872-6208 (elec- 208–??, 2001. CODEN tronic). URL https:// LNCSD9. ISSN 0302- www.sciencedirect.com/ 9743 (print), 1611-3349 science/article/pii/S0167404804001038. (electronic). URL http: Joye:2004:CHE //link.springer-ny.com/ link/service/series/0558/ [JQ04] Marc Joye and Jean- bibs/2020/20200208.htm; Jacques Quisquater, editors. http://link.springer- Cryptographic Hardware ny.com/link/service/series/ REFERENCES 406

0558/papers/2020/20200208. 87–89, 91, June 2001. CO- pdf. DEN DDJOEB. ISSN 1044- 789X. URL http://www. Joye:2001:OAD ddj.com/. [JQYY01] Marc Joye, Jean-Jacques Jaworski:2009:RKP Quisquater, Sung-Ming Yen, and Moti Yung. Observ- [JRR09] J. Jaworski, M. Ren, and ability analysis — detect- K. Rybarczyk. Ran- ing when improved cryp- dom key predistribution for tosystems fail. Lecture wireless sensor networks Notes in Computer Science, using deployment knowl- 2271:17–??, 2001. CO- edge. Computing, 85(1– DEN LNCSD9. ISSN 0302- 2):57–76, June 2009. CO- 9743 (print), 1611-3349 DEN CMPTA2. ISSN 0010- (electronic). URL http: 485X (print), 1436-5057 //link.springer-ny.com/ (electronic). URL http: link/service/series/0558/ //www.springerlink.com/ bibs/2271/22710017.htm; openurl.asp?genre=article& http://link.springer- issn=0010-485X&volume= ny.com/link/service/series/ 85&issue=1&spage=57. 0558/papers/2271/22710017. pdf. Jain:2009:PQR Juric:2006:CPW [JRS09] Rahul Jain, Jaikumar Rad- hakrishnan, and Pranab [JRB+06] Matjaz B. Juric, Ivan Roz- Sen. A property of quan- man, Bostjan Brumen, Mat- tum relative entropy with jaz Colnaric, and Marjan an application to privacy Hericko. Comparison of in quantum communication. performance of Web ser- Journal of the ACM, 56(6): vices, WS-Security, RMI, 33:1–33:32, September 2009. and RMI–SSL. The Jour- CODEN JACOAH. ISSN nal of Systems and Software, 0004-5411 (print), 1557- 79(5):689–700, May 2006. 735X (electronic). CODEN JSSODM. ISSN 0164-1212 (print), 1873- Jarecki:2005:FSP 1228 (electronic). [JS05] Stanislaw Jarecki and Nitesh Jin:2001:WCS Saxena. Further sim- plifications in proactive [JRFH01] Liang Jin, Shi Ren, Liang RSA signatures. In Kil- Feng, and Gao Zheng Hua. ian [Kil05], pages 510– WAP clients and set pro- ?? CODEN LNCSD9. tocol. Dr. Dobb’s Journal ISBN 3-540-24573-1 (soft- of Software Tools, 26(6):85, cover). ISSN 0302-9743 REFERENCES 407

(print), 1611-3349 (elec- Protections against differ- tronic). LCCN QA76.9.A25 ential analysis for elliptic T44 2005. URL http: curve cryptography. Lecture //www.springerlink.com/ Notes in Computer Science, openurl.asp?genre=issue& 2162:377–??, 2001. CO- issn=0302-9743&volume= DEN LNCSD9. ISSN 0302- 3378; http://www.springerlink. 9743 (print), 1611-3349 com/openurl.asp?genre= (electronic). URL http: volume&id=doi:10.1007/ //link.springer-ny.com/ b106171. link/service/series/0558/ Jongkook:2001:NUS bibs/2162/21620377.htm; http://link.springer- [JSJK01] Lee Jongkook, Ryu Shiry- ny.com/link/service/series/ ong, Kim Jeungseop, and 0558/papers/2162/21620377. Yoo Keeyoung. A new un- pdf. deniable signature scheme using smart cards. Lecture Joye:2001:CEN Notes in Computer Science, 2260:387–??, 2001. CO- [JT01b] Marc Joye and Christophe DEN LNCSD9. ISSN 0302- Tymen. Compact encod- 9743 (print), 1611-3349 ing of non-adjacent forms (electronic). URL http: with applications to elliptic //link.springer-ny.com/ curve cryptography. Lecture link/service/series/0558/ Notes in Computer Science, bibs/2260/22600387.htm; 1992:353–??, 2001. CO- http://link.springer- DEN LNCSD9. ISSN 0302- ny.com/link/service/series/ 9743 (print), 1611-3349 0558/papers/2260/22600387. (electronic). URL http: pdf. //link.springer-ny.com/ link/service/series/0558/ Jiang:2005:SAI bibs/1992/19920353.htm; [JSW05] Zhengtao Jiang, Xi Sun, and http://link.springer- Yumin Wang. Security anal- ny.com/link/service/series/ ysis and improvement of a 0558/papers/1992/19920353. double-trapdoor encryption pdf. scheme. Applied Mathemat- Joglekar:2005:PEM ics and Computation, 169 (1):41–50, October 1, 2005. [JT05] S. P. Joglekar and S. R. CODEN AMHCBQ. ISSN Tate. ProtoMon: Embedded 0096-3003 (print), 1873- monitors for cryptographic 5649 (electronic). protocol intrusion detection and prevention. J.UCS: Joye:2001:PAD Journal of Universal Com- [JT01a] M. Joye and C. Tymen. puter Science, 11(1):83–??, REFERENCES 408

January 28, 2005. CO- volume&id=doi:10.1007/ DEN ???? ISSN 0948-6968. b98935. URL http://www.jucs. Junod:2005:SCB org/jucs_11_1/protomon_ embedded_monitors_for. [Jun05] Pascal Junod. Statistical cryptanalysis of block ci- Juang:2004:EPA phers.Th`ese sciences, Fac- [Jua04] Wen-Shenq Juang. Ef- ult´eInformatiqueetcom- ficient password authenti- munications IC, Section des cated key agreement us- syst`emes de communication ing smart cards. Comput- (Institut de syst`emes de ers & Security, 23(2):167– communication), EPF Lau- 173, March 2004. CODEN sanne, Lausanne, Switzer- CPSEDU. ISSN 0167-4048 land, 2005. 267 pp. URL (print), 1872-6208 (elec- http://library.epfl.ch/ tronic). URL https:// theses/?nr=3179. www.sciencedirect.com/ Jutla:2001:EMA science/article/pii/S0167404804000252. [Jut01] Charanjit S. Jutla. En- Juels:2004:FCI cryption modes with almost [Jue04] Ari Juels, editor. Finan- free message integrity. In cial Cryptography: 8th In- Advances in cryptology— ternational Conference, FC EUROCRYPT 2001 (Inns- 2004, Key West, FL, USA, bruck), volume 2045 of February 9–12, 2004: Re- Lecture Notes in Comput. vised Papers, volume 3110 Sci., pages 529–544. Spring- of Lecture Notes in Com- er-Verlag, Berlin, Ger- puter Science. Springer-Ver- many / Heidelberg, Ger- lag, Berlin, Germany / Hei- many / London, UK / delberg, Germany / Lon- etc., 2001. URL http: don, UK / etc., 2004. CO- //link.springer-ny.com/ DEN LNCSD9. ISBN 3-540- link/service/series/0558/ 22420-3. ISSN 0302-9743 bibs/2045/20450529.htm; (print), 1611-3349 (elec- http://link.springer- tronic). LCCN HG1710 ny.com/link/service/series/ .F35 2004. URL http: 0558/papers/2045/20450529. //link.springer-ny.com/ pdf. link/service/series/0558/ Ji:2001:CAF tocs/t3110.htm; http: //www.springerlink.com/ [JW01] Dongyao Ji and Yuming openurl.asp?genre=issue& Wang. Comments on “An issn=0302-9743&volume= approach to the formal ver- 3110; http://www.springerlink. ification of the two-party com/openurl.asp?genre= cryptographic protocols” by REFERENCES 409

Zhang, Li and Xiao. Operat- et al. [HYZ05b], pages 147– ing Systems Review, 35(1): ?? ISBN 981-270-153-2. 6–7, January 2001. CODEN LCCN ???? URL http:// OSRED8. ISSN 0163-5980 eproceedings.worldscinet. (print), 1943-586X (elec- com/9812701532/9812701532. tronic). See [ZLX99]. 0031.html. Jiang:2005:RNP Juels:2005:APD [JXW05] Zhengtao Jiang, Mingsen [JW05] Ari Juels and Stephen A. Xiang, and Yumin Wang. A Weis. Authenticating per- research on new public-key vasive devices with hu- encryption schemes. Applied man protocols. In Shoup Mathematics and Compu- [Sho05a], pages 293–?? tation, 169(1):51–61, Oc- ISBN 3-540-28114-2. ISSN tober 1, 2005. CODEN 0302-9743 (print), 1611- AMHCBQ. ISSN 0096-3003 3349 (electronic). LCCN (print), 1873-5649 (elec- QA76.9.A25 C79 2005; tronic). QA76.9 .A25; QA76.9 C79 2005; QA76.9 C794 2005; Joye:2001:NMM QA76.9; Internet. URL [JY01] Marc Joye and Sung-Ming http://www.springerlink. Yen. New minimal modi- com/openurl.asp?genre= fied radix-r representation issue&issn=0302-9743&volume= with applications to smart 3621. cards. Lecture Notes in Jeng:2006:EKM Computer Science, 2274: 375–??, 2001. CODEN [JW06] Fuh-Gwo Jeng and Chung- LNCSD9. ISSN 0302- Ming Wang. An efficient 9743 (print), 1611-3349 key-management scheme for (electronic). URL http: hierarchical access control //link.springer-ny.com/ based on elliptic curve cryp- link/service/series/0558/ tosystem. The Journal of bibs/2274/22740375.htm; Systems and Software,79 http://link.springer- (8):1161–1167, August 2006. ny.com/link/service/series/ CODEN JSSODM. ISSN 0558/papers/2274/22740375. 0164-1212 (print), 1873- pdf. 1228 (electronic). Jakobsson:2004:ACN Jin:2005:EAW [JYZ04] Markus Jakobsson, Moti [JX05] Cong Jin and Kaihua Xu. Yung, and Jianying Zhou, Estimation and application editors. Applied Cryptog- of the watermark embed- raphy and Network Secu- ding strength. In Han rity: Second International REFERENCES 410

Conference, ACNS 2004, on third-order LFSR se- Yellow Mountain, China, quences. Applied Mathemat- June 8–11, 2004: Proceed- ics and Computation, 171 ings, volume 3089 of Lec- (2):900–911, December 15, ture Notes in Computer 2005. CODEN AMHCBQ. Science. Springer-Verlag, ISSN 0096-3003 (print), Berlin, Germany / Heidel- 1873-5649 (electronic). berg, Germany / London, Kamel:2009:RSW UK / etc., 2004. CO- DEN LNCSD9. ISBN 3-540- [KA09] Ibrahim Kamel and Qutaiba 22217-0. ISSN 0302-9743 Albluwi. A robust soft- (print), 1611-3349 (elec- ware watermarking for copy- tronic). LCCN TK5102.94 right protection. Computers .A28 2004. URL http: &Security, 28(6):395–409, //link.springer-ny.com/ September 2009. CODEN link/service/series/0558/ CPSEDU. ISSN 0167-4048 tocs/t3089.htm; http: (print), 1872-6208 (elec- //www.springerlink.com/ tronic). URL https:// openurl.asp?genre=issue& www.sciencedirect.com/ issn=0302-9743&volume= science/article/pii/S016740480900008X. 3089; http://www.springerlink. Kadrich:2007:ES com/openurl.asp?genre= volume&id=doi:10.1007/ [Kad07] Mark Kadrich. Endpoint se- b98360. curity. Addison Wesley Pro- Jain:2009:NBC fessional, Indianapolis, IN, USA, 2007. ISBN 0-321- [JZ09] Rahul Jain and Shengyu 43695-4 (paperback). ???? Zhang. New bounds on clas- pp. LCCN QA76.9.A25 sical and quantum one-way K325 2007. communication complexity. Kahn:1967:CSSa Theoretical Computer Sci- ence, 410(26):2463–2477, [Kah67a] David Kahn. The Code- June 6, 2009. CODEN breakers: the Story of Se- TCSCDI. ISSN 0304-3975 cret Writing. MacMillan (print), 1879-2294 (elec- Publishing Company, New tronic). York, NY, USA, 1967. xvi + 1164 pp. LCCN Z103 .K28. Jiang:2005:TMD URL http://www.cl.cam. [JZCW05] Zhengtao Jiang, Yang Zhan, ac.uk/~fapp2/steganography/ Dan Chen, and Yumin bibliography/1000.html. Wang. Two methods Kahn:1967:CSSb of directly constructing probabilistic public-key en- [Kah67b] David Kahn. The Code- cryption primitives based breakers: the Story of Se- REFERENCES 411

cret Writing. Weidenfeld Kaliski:2003:TRK and Nicolson, London, UK, 1967. xvi + 1164 pp. LCCN [Kal03] Burton S. Kaliski. TWIRL Z103 .K28 1967. and RSA . Web re- port, RSA Data Security, Kahn:1974:C Inc., Redwood City, CA, [Kah74] David Kahn. The Code- USA, May 6, 2003. URL breakers. Weidenfeld and https://web.archive.org/ Nicolson, London, UK, web/20170417095741/https: abridged edition, 1974. //www.emc.com/emc-plus/ ISBN 0-297-76785-2. xvi + -labs/historical/twirl- 576 pp. LCCN Z103 .K28 and-rsa-key-size.htm. 1974. Kayem:2008:RCK Kahn:1996:CSS [KAM08] Anne V. D. M. Kayem, Se- [Kah96] David Kahn. The Code- lim G. Akl, and Patrick breakers: the Story of Se- Martin. On replacing cryp- cret Writing. Scribner, New tographic keys in hierarchi- York, NY, USA, revised edi- cal key management sys- tion, 1996. ISBN 0-684- tems. Journal of Com- 83130-9. xviii + 1181 pp. puter Security, 16(3):289– LCCN Z103 .K28 1996. See 309, ???? 2008. CODEN [Tuc66]. JCSIET. ISSN 0926-227X (print), 1875-8924 (elec- Kak:2006:TSQ tronic). [Kak06] Subhash Kak. A three- stage quantum cryptogra- Kanda:2001:PSE phy protocol. Founda- [Kan01] Masayuki Kanda. Prac- tions of Physics Letters, tical security evaluation 19(3):293–296, June 2006. against differential and lin- CODEN FPLEET. ISSN ear cryptanalyses for Feis- 0894-9875 (print), 1572- tel ciphers with SPN round 9524 (electronic). function. Lecture Notes Kaliski:2001:RDS in Computer Science, 2012: 324–338, 2001. CODEN [Kal01] Burton S. Kaliski, Jr. RSA LNCSD9. ISSN 0302- digital signatures. Dr. 9743 (print), 1611-3349 Dobb’s Journal of Software (electronic). URL http: Tools, 26(5):30, 32–33, 35– //link.springer-ny.com/ 36, May 2001. CODEN link/service/series/0558/ DDJOEB. ISSN 1044- bibs/2012/20120324.htm; 789X. URL http://www. http://link.springer- ddj.com/. ny.com/link/service/series/ REFERENCES 412

0558/papers/2012/20120324. Katos:2005:RTB pdf. [Kat05a] Vasilios Katos. A random- Kapera:2005:MRP ness test for block ciphers. Applied Mathematics and [Kap05] Zdzis law Jan Kapera. Mar- Computation, 162(1):29–35, ian Rejewski pogromca Enigmy. March 4, 2005. CODEN (Polish) [Marian Rejewski AMHCBQ. ISSN 0096-3003 tamer of Enigma],volume2 (print), 1873-5649 (elec- of Biblioteczka Enigmy. tronic). Enigma Press, Krak´ow, Poland, 2005. ISBN 83- Katz:2005:CBR 86110-60-0. 96 pp. LCCN D810.C88 R455 2005. [Kat05b] Jonathan Katz. Compar- ative book review: Cryp- Karski:2001:SSS tography: An Introduction, by V. V. Yaschenko (Amer- [Kar01] Jan Karski. Story of a ican Mathematical Soci- Secret State. Houghton- ety, 2002); Cryptanalysis Mifflin, Boston, MA, USA, of Number Theoretic Ci- 2001. ISBN 1-931541-39-6 phers,byS.S.Wagstaff, (hardcover). vi + 391 pp. Jr. (Chapman & Hall/CRC LCCN D802.P6 K3 2001. Press, 2003); RSA and Public-Key Cryptography, Kariya:2002:GM by R. A. Mollin (Chapman & Hall/CRC Press, 2003); [Kar02] S. Kariya. Getting the Foundations of Cryptogra- message. IEEE Spectrum, phy, vol. 1: Basic Tools,by 39(8):56–57, August 2002. O. Goldreich, (Cambridge CODEN IEESAM. ISSN University Press, 2001). 0018-9235 (print), 1939- ACM SIGACT News,36 9340 (electronic). (2):14–19, June 2005. CO- DEN SIGNDM. ISSN 0163- Katzenbeisser:2001:RAR 5700 (print), 1943-5827 (electronic). URL http: [Kat01] Stefan Katzenbeisser. Re- //doi.acm.org/10.1145/ cent advances in RSA cryp- 1067309.1067316.See tography, volume 3 of Ad- [Gol01b, Wag03, Mol03b]. vances in information se- curity. Kluwer Academic Kendall:1939:TRS Publishers, Dordrecht, The Netherlands, 2001. ISBN [KB39] Maurice G. (Maurice George) 0-7923-7438-X. xiii + 140 Kendall and Bernard Babing- pp. LCCN QA76.9.A25 K38 ton Smith. Tables of random 2001. sampling numbers,volume REFERENCES 413

XXIV of Tracts of comput- multicast routing in wire- ers .... Cambridge Univer- less networks. Com- sity Press, Cambridge, UK, puter Networks (Amster- 1939. x + 60 pp. LCCN dam, Netherlands: 1999), QA47 .T7 no.24. 53(1):98–109, January 16, 2009. CODEN ???? ISSN Kovacich:2000:HTC 1389-1286 (print), 1872- [KB00] Gerald L. Kovacich and 7069 (electronic). William C. Boni. High- Kachris:2003:RLB technology-crime investiga- tor’s handbook: working in [KBD03] C. Kachris, N. Bourbakis, the global information en- and A. Dollas. A recon- vironment. Butterworth- figurable logic-based pro- Heinemann, Boston, MA, cessor for the SCAN im- USA, 2000. ISBN 0-7506- age and video encryption 7086-X. xix + 298 pp. algorithm. International LCCN HV8079.C65 K68 Journal of Parallel Pro- 2000. US$39.95. gramming, 31(6):489–506, Kiely:2006:SSM December 2003. CODEN IJPPE5. ISSN 0885-7458 [KB06] Laree Kiely and Terry V. (print), 1573-7640 (elec- Benzel. Systemic secu- tronic). URL http:// rity management. IEEE ipsapp007.kluweronline. Security & Privacy, 4(6): com/content/getfile/4773/ 74–77, November/December 37/6/abstract.htm; http: 2006. CODEN ???? ISSN //ipsapp007.kluweronline. 1540-7993 (print), 1558- com/content/getfile/4773/ 4046 (electronic). 37/6/fulltext.pdf; http: //www.springerlink.com/ Kamvar:2007:DTM openurl.asp?genre=article& [KB07] Maryam Kamvar and Shumeet issn=0885-7458&volume= Baluja. Deciphering trends 31&issue=6&spage=489. in mobile search. Computer, Keller:2009:ECC 40(8):58–62, August 2007. CODEN CPTRB4. ISSN [KBM09] Maurice Keller, Andrew 0018-9162 (print), 1558- Byrne, and William P. Mar- 0814 (electronic). nane. Elliptic curve cryp- Kim:2009:DCA tography on FPGA for low- power applications. ACM [KB09] Jongtack Kim and Sae- Transactions on Reconfig- woong Bahk. Design of urable Technology and Sys- certification authority us- tems (TRETS), 2(1):2:1– ing secret redistribution and 2:??, March 2009. CO- REFERENCES 414

DEN ???? ISSN 1936-7406 uary 2005. CODEN OS- (print), 1936-7414 (elec- RED8. ISSN 0163-5980 tronic). (print), 1943-586X (elec- tronic). claffy:2001:IMM Kieu:2009:HSI [kc01] kc claffy. Internet measure- ment: Myths about Internet [KC09a] The Duc Kieu and Chin- data, 2001. URL http:// Chen Chang. A high db.usenix.org/publications/ stego-image quality stegano- library/proceedings/lisa2001/ graphic scheme with re- tech/. Unpublished in- versibility and high pay- vited talk, LISA 2001: load using multiple embed- 15th Systems Administra- ding strategy. The Jour- tion Conference, December nal of Systems and Soft- 2–7, 2001, Town and Coun- ware, 82(10):1743–1752, Oc- try Resort Hotel, San Diego, tober 2009. CODEN JS- CA. SODM. ISSN 0164-1212 (print), 1873-1228 (elec- Kim:2002:SMA tronic). [KC02] Seongyeol Kim and Ily- Kieu:2009:IAB ong Chung. A secure mo- bile agent system applying [KC09b] The Duc Kieu and Chin- identity-based digital signa- Chen Chang. An im- ture scheme. Lecture Notes age authentication based in Computer Science, 2510: on discrete Fourier trans- 588–??, 2002. CODEN form. Fundamenta Infor- LNCSD9. ISSN 0302-9743 maticae, 97(4):369–379, De- (print), 1611-3349 (elec- cember 2009. CODEN FU- tronic). URL http:// MAAJ. ISSN 0169-2968 link.springer.de/link/ (print), 1875-8681 (elec- service/series/0558/bibs/ tronic). 2510/25100588.htm; http: //link.springer.de/link/ Ku:2005:WYR service/series/0558/papers/[KCC05] Wei-Chi Ku, Min-Hung Chi- 2510/25100588.pdf. ang, and Shen-Tien Chang. Ku:2005:CFR Weaknesses of Yoon–Ryu– Yoo’s hash-based password [KC05] Wei-Chi Ku and Shuai-Min authentication scheme. Op- Chen. Cryptanalysis of a erating Systems Review,39 flexible remote user authen- (1):85–89, January 2005. tication scheme using Smart CODEN OSRED8. ISSN Cards. Operating Systems 0163-5980 (print), 1943- Review, 39(1):90–96, Jan- 586X (electronic). REFERENCES 415

Kim:2007:SBE Operating Systems Review, 37(4):19–25, October 2003. [KCD07] Jin-Ha Kim, Gyu Sang CODEN OSRED8. ISSN Choi, and Chita R. Das. 0163-5980 (print), 1943- An SSL back-end forward- 586X (electronic). ing scheme in cluster-based Web servers. IEEE Trans- Kang:2001:NHO actions on Parallel and Dis- tributed Systems, 18(7):946– [KCP01] Ju-Sung Kang, Seongtaek 957, July 2007. CODEN Chee, and Choonsik Park. ITDSEO. ISSN 1045-9219 A note on the higher or- (print), 1558-2183 (elec- der differential attack of tronic). block ciphers with two- block structures. Lecture Kim:2001:SAC Notes in Computer Sci- [KCJ+01] Seungjoo Kim, Jung Hee ence, 2015:1–??, 2001. CO- Cheon, Marc Joye, Seon- DEN LNCSD9. ISSN 0302- gan Lim, Masahiro Mambo, 9743 (print), 1611-3349 Dongho Won, and Yu- (electronic). URL http: liang Zheng. Strong adap- //link.springer-ny.com/ tive chosen-ciphertext at- link/service/series/0558/ tacks with memory dump bibs/2015/20150001.htm; (or: The importance of http://link.springer- the order of decryption ny.com/link/service/series/ and validation). Lecture 0558/papers/2015/20150001. Notes in Computer Science, pdf. 2260:114–??, 2001. CO- Kalker:2004:DWS DEN LNCSD9. ISSN 0302- 9743 (print), 1611-3349 [KCR04] Ton Kalker, Ingemar J. (electronic). URL http: Cox, and Yong Man Ro, //link.springer-ny.com/ editors. Digital Water- link/service/series/0558/ marking: Second Interna- bibs/2260/22600114.htm; tional Workshop, IWDW http://link.springer- 2003, Seoul, Korea, Oc- ny.com/link/service/series/ tober 20–22, 2003: Re- 0558/papers/2260/22600114. vised Papers, volume 2939 pdf. of Lecture Notes in Com- puter Science. Springer-Ver- Ku:2003:WLL lag, Berlin, Germany / Hei- [KCL03] Wei-Chi Ku, Chien-Ming delberg, Germany / Lon- Chen, and Hui-Lung Lee. don, UK / etc., 2004. CO- Weaknesses of Lee–Li– DEN LNCSD9. ISBN 3-540- Hwang’s hash-based pass- 21061-X. ISSN 0302-9743 word authentication scheme. (print), 1611-3349 (elec- REFERENCES 416

tronic). LCCN QA76.9.A25 Keefe:2005:CDS I89 2003. URL http: //link.springer-ny.com/ [Kee05] Patrick Radden Keefe. link/service/series/0558/ Chatter: dispatches from tocs/t2939.htm; http: the secret world of global //www.springerlink.com/ eavesdropping. Random openurl.asp?genre=issue& House, New York, NY, issn=0302-9743&volume= USA, 2005. ISBN 1- 2939; http://www.springerlink. 4000-6034-6. xvii + 300 com/openurl.asp?genre= pp. LCCN JK468.I6 K37 volume&id=doi:10.1007/ 2005. URL http://www. b95658. loc.gov/catdir/bios/random051/ 2004058481.html; http: Kurosawa:2004:NPH //www.loc.gov/catdir/description/ random051/2004058481.html. [KD04] Kaoru Kurosawa and Yvo Desmedt. A new para- Kelsey:2000:KST digm of hybrid encryption [Kel00] J. Kelsey. Key separa- scheme. In Franklin [Fra04], tion in Twofish. Twofish pages 426–?? CODEN technical report 7, Coun- LNCSD9. ISBN 3-540- terpane Systems, 101 East 22668-0. ISSN 0302-9743 Minnehaha Parkway, Min- (print), 1611-3349 (elec- neapolis, MN 55419, April tronic). LCCN 10.1007/b99099. 7, 2000. ???? pp. URL URL http://www.springerlink. http://www.counterpane. com/openurl.asp?genre= com/-tr7.html. issue&issn=0302-9743&volume= 3152; http://www.springerlink. Kelsey:2002:CIL com/openurl.asp?genre= volume&id=doi:10.1007/ [Kel02] John Kelsey. Compres- b99099. sion and information leak- age of plaintext. Lecture King:2001:SAD Notes in Computer Science, 2365:263–276, 2002. CO- [KDO01] Christopher M. King, Cur- DEN LNCSD9. ISSN 0302- tis E. Dalton, and T. Ertam 9743 (print), 1611-3349 Osmano˘glu. Security Ar- (electronic). URL http: chitecture: Design, Deploy- //link.springer-ny.com/ ment and Operations.Mc- link/service/series/0558/ Graw-Hill, New York, NY, bibs/2365/23650263.htm; USA, 2001. ISBN 0-07- http://link.springer- 213385-6. xxii + 481 ny.com/link/service/series/ pp. LCCN QA76.9.A25 K54 0558/papers/2365/23650263. 2001. pdf. REFERENCES 417

Kellar:2005:NRR Kenyon:2002:HPD [Ken02b] Tony Kenyon. High Per- [Kel05a] Sharon S. Kellar. NIST- formance Data Network De- Recommended Random Num- sign: Design Techniques ber Generator Based on and Tools. Digital Press, 12 ANSI X9.31 Appendix A.2.4 Crosby Drive, Bedford, MA Using the 3-Key Triple DES 01730, USA, 2002. ISBN 1- and AES Algorithms.Na- 55558-207-9. xiii + 623 pp. tional Institute for Stan- LCCN TK5105.5 .K45 2002. dards and Technology, US$54.99. Gaithersburg, MD 20899- 8900, USA, January 31, Kettani:2006:CBN 2005. 4 pp. URL http:// [Ket06] Houssain Kettani. On the csrc.nist.gov/cryptval/ conversion between number rng/931rngext.pdf. systems. IEEE transac- tions on circuits and sys- Keller:2005:NRR tems. 2, Analog and digi- talsignalprocessing, 53(11): [Kel05b] Sharon S. Keller. NIST- 1255–1258, November 2006. Recommended Random Num- CODEN ICSPE5. ISSN ber Generator Based on 1057-7130 (print), 1558- ANSI X9.31 Appendix A.2.4 125X (electronic). Using the 3-Key Triple DES and AES Algorithms.Na- Kelsey:2000:CPL tional Institute for Stan- [KFSS00] J. Kelsey, N. Ferguson, dards and Technology, B. Schneier, and M. Stay. Gaithersburg, MD 20899- Cryptanalytic progress: Lessons 8900, USA, January 31, for AES. In ????, edi- 2005. 4 pp. URL http:// tor, Third AES Candidate csrc.nist.gov/cryptval/ Conference, page ?? ????, rng/931rngext.pdf. ????, April 2000. ISBN ???? LCCN ???? Kenyon:2002:DNR Kiltz:2009:DCC [Ken02a] Tony Kenyon. Data Net- [KG09] Eike Kiltz and David works: Routing, Security, Galindo. Direct chosen- and Performance Optimiza- ciphertext secure identity- tion. Digital Press, 12 based key encapsulation Crosby Drive, Bedford, MA without random oracles. 01730, USA, 2002. ISBN Theoretical Computer Sci- 1-55558-271-0. xvi + 807 ence, 410(47–49):5093–5111, pp. LCCN TK5105.543 November 6, 2009. CODEN .K46 2002. US$59.99. TCSCDI. ISSN 0304-3975 REFERENCES 418

(print), 1879-2294 (elec- Kovacich:2003:MHC tronic). [KH03] Gerald L. Kovacich and Ed- Katsikas:2004:PKI ward P. Halibozek. The [KGL04] Sokratis K. Katsikas, Ste- manager’s handbook for cor- fanos Gritzalis, and Javier porate security: establish- Lopez, editors. Public Key ing and managing a suc- Infrastructure: First Euro- cessful assets protection pean PKI Workshop: Re- program. Butterworth- search and Applications, Heinemann, Boston, MA, EuroPKI 2004, Samos Is- USA, 2003. ISBN 0-7506- land, Greece, June 25–26, 7487-3. xxi + 463 pp. 2004: Proceedings,volume LCCN HV8290 .K68 2003. 3093 of Lecture Notes in US$49.95. Computer Science. Spring- Kim:2005:SMA er-Verlag, Berlin, Ger- many / Heidelberg, Ger- [KH05] Byung-Gi Kim and Sang- many / London, UK / Sun Hong. Secure mu- etc., 2004. CODEN tual authentication for LNCSD9. ISBN 3-540- ad hoc wireless networks. 22216-2. ISSN 0302-9743 The Journal of Super- (print), 1611-3349 (elec- computing, 33(1):123–132, tronic). LCCN QA76.9.A25 July 2005. CODEN JO- E973 2004. URL http: SUED. ISSN 0920-8542 //link.springer-ny.com/ (print), 1573-0484 (elec- link/service/series/0558/ tronic). URL http:/ tocs/t3093.htm; http: /www.springerlink.com/ //www.springerlink.com/ openurl.asp?genre=article& openurl.asp?genre=issue& issn=0920-8542&volume= issn=0302-9743&volume= 33&issue=1&spage=123. 3093; http://www.springerlink. Kato:2008:QSC com/openurl.asp?genre= volume&id=doi:10.1007/ [KH08] Kentaro Kato and Osamu b98201. Hirota. A quantum stream cipher by Yuen 2000 proto- Kaps:2007:CSD col with nonlinear random [KGS07] Jens-Peter Kaps, Gunnar number generator. Proceed- Gaubatz, and Berk Sunar. ings of the SPIE — The In- Cryptography on a speck of ternational Society for Op- dust. Computer, 40(2):38– tical Engineering, 7092(1): 44, February 2007. CODEN 70920H, 2008. CODEN CPTRB4. ISSN 0018-9162 PSISDG. ISSN 0277-786X (print), 1558-0814 (elec- (print), 1996-756X (elec- tronic). tronic). URL http://link. REFERENCES 419

aip.org/link/?PSI/7092/ AMHCBQ. ISSN 0096-3003 70920H/1. Quantum Com- (print), 1873-5649 (elec- munications and Quantum tronic). Imaging VI. Koo:2009:SVN Khaw:2005:EDA [KHL09] Woo Kwon Koo, Jung Yeon [Kha05] L. T. Khaw. Of encryp- Hwang, and Dong Hoon tion and devices: The anti- Lee. Security vulnerabil- circumvention provision of ity in a non-interactive ID- the Malaysian Copyright based proxy re-encryption Act 1987. European intel- scheme. Information Pro- lectual property review,27 cessing Letters, 109(23–24): (2):53–64, 2005. ISSN 0142- 1260–1262, November 15, 0461. 2009. CODEN IFPLAT. Komninos:2001:ESC ISSN 0020-0190 (print), 1872-6119 (electronic). [KHD01] N. Komninos, Bahram Honary, and Michael Dar- Kirovski:2004:DWF nell. An efficient stream ci- pher Alpha1 for mobile and [KHY04] Darko Kirovski, Henrique, wireless devices. Lecture and Yacov Yacobi. A Notes in Computer Science, dual watermark-fingerprint 2260:294–??, 2001. CO- system. IEEE MultiMe- DEN LNCSD9. ISSN 0302- dia, 11(3):59–73, July/ 9743 (print), 1611-3349 September 2004. CO- (electronic). URL http: DEN IEMUE4. ISSN 1070- //link.springer-ny.com/ 986X (print), 1941-0166 link/service/series/0558/ (electronic). URL http: bibs/2260/22600294.htm; //csdl.computer.org/dl/ http://link.springer- mags/mu/2004/03/u3059. ny.com/link/service/series/ htm; http://csdl.computer. 0558/papers/2260/22600294. org/dl/mags/mu/2004/03/ pdf. u3059.pdf. Kwon:2005:CLK Kausar:2008:SEK [KHKL05] Jeoung Ok Kwon, Jung Yeon [KHYM08] Firdous Kausar, Sajid Hus- Hwang, Changwook Kim, sain, Laurence T. Yang, and and Dong Hoon Lee. Crypt- Ashraf Masood. Scalable analysis of Lee–Kim–Yoo and efficient key manage- password-based key agree- ment for heterogeneous sen- ment scheme. Applied Math- sor networks. The Jour- ematics and Computation, nal of Supercomputing,45 168(2):858–865, Septem- (1):44–65, July 2008. CO- ber 15, 2005. CODEN DEN JOSUED. ISSN 0920- REFERENCES 420

8542 (print), 1573-0484 0558/papers/1992/19920019. (electronic). URL http: pdf. //www.springerlink.com/ Kurosawa:2003:TTK openurl.asp?genre=article& issn=0920-8542&volume= [KI03] Kaoru Kurosawa and Tetsu 45&issue=1&spage=44. Iwata. TMAC: Two-key CBC MAC. In Joye Kobara:2001:NCP [Joy03b], pages 33–49. CO- DEN LNCSD9. ISBN 3-540- [KI01a] Kazukuni Kobara and Hi- 00847-0. ISSN 0302-9743 deki Imai. New chosen- (print), 1611-3349 (elec- plaintext attacks on the tronic). LCCN QA76.9.A25 one-wayness of the modi- C822 2003. URL http: fied McEliece PKC proposed //link.springer-ny.com/ at Asiacrypt 2000. Lecture link/service/series/0558/ Notes in Computer Science, tocs/t2612.htm; http: 2274:237–??, 2001. CO- //www.springerlink.com/ DEN LNCSD9. ISSN 0302- openurl.asp?genre=issue& 9743 (print), 1611-3349 issn=0302-9743&volume= (electronic). URL http: 2612. //link.springer-ny.com/ link/service/series/0558/ Kidwell:2000:SNC bibs/2274/22740237.htm; [Kid00] Peggy A. Kidwell. The Swiss http://link.springer- Nema cipher machine [re- ny.com/link/service/series/ views]. IEEE Annals of 0558/papers/2274/22740237. the History of Computing, pdf. 22(2):80, April–June 2000. Kobara:2001:SSM CODEN IAHCEX. ISSN 1058-6180 (print), 1934- [KI01b] Kazukuni Kobara and Hi- 1547 (electronic). deki Imai. Semantically Kida:2002:PGR secure McEliece public-key cryptosystems — conver- [Kid02] Masanari Kida. Potential sions for McEliece PKC. good reduction of elliptic Lecture Notes in Computer curves. Journal of Sym- Science, 1992:19–35, 2001. bolic Computation, 34(3): CODEN LNCSD9. ISSN 173–180, September 2002. 0302-9743 (print), 1611- CODEN JSYCEH. ISSN 3349 (electronic). URL 0747-7171 (print), 1095- http://link.springer-ny. 855X (electronic). com/link/service/series/ Kilian:2001:ACC 0558/bibs/1992/19920019. htm; http://link.springer-[Kil01a] Joe Kilian, editor. Advances ny.com/link/service/series/ in cryptology — CRYPTO REFERENCES 421

2001: 21st Annual Inter- 3378 of Lecture Notes in national Cryptology Confer- Computer Science. Spring- ence, Santa Barbara, Cali- er-Verlag, Berlin, Ger- fornia, USA, August 19–23, many / Heidelberg, Ger- 2001: proceedings,volume many / London, UK / etc., 2139 of Lecture Notes in 2005. CODEN LNCSD9. Computer Science. Spring- ISBN 3-540-24573-1 (soft- er-Verlag, Berlin, Ger- cover). ISSN 0302-9743 many / Heidelberg, Ger- (print), 1611-3349 (elec- many / London, UK / tronic). LCCN QA76.9.A25 etc., 2001. ISBN 3-540- T44 2005. URL http: 42456-3 (paperback). LCCN //www.springerlink.com/ QA76.9.A25 C79 2001; openurl.asp?genre=issue& QA267.A1 L43 no.2139. issn=0302-9743&volume= UK£47.00. URL http: 3378; http://www.springerlink. //link.springer-ny.com/ com/openurl.asp?genre= link/service/series/0558/ volume&id=doi:10.1007/ tocs/t2139.htm. b106171. Kiltz:2001:TBC Kim:2001:PKC [Kil01b] E. Kiltz. A tool box of [Kim01] Kwangjo Kim, editor. Pub- cryptographic functions re- lic key cryptography: 4th lated to the Diffie–Hellman International Workshop on function. Lecture Notes Practice and Theory in in Computer Science, 2247: Public Key Cryptosystems, 339–??, 2001. CODEN PKC 2001, Cheju Island, LNCSD9. ISSN 0302- Korea, February 13–15, 9743 (print), 1611-3349 2001: Proceedings,volume (electronic). URL http: 1992 of Lecture Notes in //link.springer-ny.com/ Computer Science. Spring- link/service/series/0558/ er-Verlag, Berlin, Ger- bibs/2247/22470339.htm; many / Heidelberg, Ger- http://link.springer- many / London, UK / etc., ny.com/link/service/series/ 2001. CODEN LNCSD9. 0558/papers/2247/22470339. ISBN 3-540-41658-7 (soft- pdf. cover). ISSN 0302-9743 (print), 1611-3349 (elec- Kilian:2005:TCS tronic). LCCN QA76.9.A25 [Kil05] Joe Kilian, editor. Theory of I567 2001; QA267.A1 L43 cryptography: Second theory no.1992. URL http:/ of cryptography conference, /link.springer-ny.com/ TCC 2005, Cambridge, link/service/series/0558/ MA, USA, February 10–12, tocs/t1992.htm; http: 2005, proceedings,volume //www.springerlink.com/ REFERENCES 422

openurl.asp?genre=issue& 0558/papers/1976/19760359. issn=0302-9743&volume= pdf. 1992. King:2001:CMF Kim:2002:ISC [Kin01] David A. King. The ci- [Kim02] Kwangjo Kim, editor. In- phers of the monks: a for- formation security and cryp- gotten number-notation of tology — ICISC 2001: 4th the Middle Ages,volume44 International Conference, of Boethius: Texte und Ab- Seoul, Korea, December handlungen zur Geschichte 6–7, 2001: Proceedings, der Mathematik der Natur- volume 2288 of Lecture wissenschaften. F. Steiner, Notes in Computer Science. Stuttgart, Germany, 2001. Springer-Verlag, Berlin, ISBN 3-515-07640-9. 506 Germany / Heidelberg, Ger- pp. LCCN QA141.2 .K56 many / London, UK / etc., 2001. 2002. CODEN LNCSD9. ISBN 3-540-43319-8 (pa- King:2002:RGI perback). ISSN 0302-9743 (print), 1611-3349 (elec- [Kin02] Brian King. Require- ments for group indepen- tronic). LCCN QA76.9.A25 dent linear threshold se- I32 2001. URL http: cret sharing schemes. Lec- //link.springer-ny.com/ ture Notes in Computer Sci- link/service/series/0558/ ence, 2384:89–??, 2002. CO- tocs/t2288.htm; http: DEN LNCSD9. ISSN 0302- //www.springerlink.com/ 9743 (print), 1611-3349 openurl.asp?genre=issue& (electronic). URL issn=0302-9743&volume= http: //link.springer-ny.com/ 2288. link/service/series/0558/ King:2000:IMP bibs/2384/23840089.htm; [Kin00] Brian King. Improved meth- http://link.springer- ods to perform threshold ny.com/link/service/series/ RSA. Lecture Notes in 0558/papers/2384/23840089. . Computer Science, 1976: pdf 359–??, 2000. CODEN Kirkby:2001:CCW LNCSD9. ISSN 0302- 9743 (print), 1611-3349 [Kir01a] Andrea Kirkby. Cryptog- (electronic). URL http: raphy and e-commerce: a //link.springer-ny.com/ Wiley tech brief. Net- link/service/series/0558/ work Security, 2001(4):9, bibs/1976/19760359.htm; April 1, 2001. CODEN http://link.springer- NTSCF5. ISSN 1353-4858 ny.com/link/service/series/ (print), 1872-9371 (elec- REFERENCES 423

tronic). URL http:// as a block encryption al- www.sciencedirect.com/ gorithm. Physics Letters science/article/pii/S1353485801004160. A, 289(4-5):199–206, 2001. CODEN PYLAAG. ISSN Kirtland:2001:INC 0375-9601 (print), 1873- 2429 (electronic). [Kir01b] Joseph Kirtland. Identifi- cation numbers and check Kanade:2005:AVB digit schemes. Class- room resource materials. [KJR05] Takeo Kanade, Anil Jain, Mathematical Association and Nalini K. Ratha, of America, Washington, editors. Audio- and DC, USA, 2001. ISBN Video-Based Biometric Per- 0-88385-720-0. xi + 174 son Authentication: 5th pp. LCCN QA241 .K576 International Conference, 2001. URL http://www. AVBPA 2005, Hilton Rye loc.gov/catdir/description/ Town, NY, USA, July cam021/00108052.html; 20–22, 2005. Proceedings, http://www.loc.gov/catdir/ volume 3546 of Lecture toc/cam027/00108052.html. Notes in Computer Science. Springer-Verlag, Berlin, Montgomery:2003:FEC Germany / Heidelberg, Ger- many / London, UK / etc., [Kir03] Peter L. Montgomery Kirsten 2005. CODEN LNCSD9. Eisentr¨ager, Kristin Lauter. ISBN 3-540-27887-7. ISSN Fast elliptic curve arith- 0302-9743 (print), 1611- metic and improved Weil 3349 (electronic). LCCN pairing evaluation. In TK7882.S65 I565 2005. Joye [Joy03b], pages 343– Kim:2005:IYA 354. CODEN LNCSD9. ISBN 3-540-00847-0. ISSN [KJY05] Kee-Won Kim, Jun-Cheol 0302-9743 (print), 1611- Jeon, and Kee-Young Yoo. 3349 (electronic). LCCN An improvement on Yang QA76.9.A25 C822 2003. et al.’s password authen- URL http://link.springer- tication schemes. Applied ny.com/link/service/series/ Mathematics and Com- 0558/tocs/t2612.htm; putation, 170(1):207–215, http://www.springerlink. November 1, 2005. CODEN com/openurl.asp?genre= AMHCBQ. ISSN 0096-3003 issue&issn=0302-9743&volume= (print), 1873-5649 (elec- 2612. tronic). Kocarev:2001:LMB Kim:2002:NIS [KJ01] Ljupˇco Kocarev and Goce [KK02] Myungsun Kim and Kwangjo Jakimoski. Logistic map Kim. A new identification REFERENCES 424

scheme based on the bi- Knowledge and quantum linear Diffie–Hellman prob- one-way functions. Theoret- lem. Lecture Notes in ical Computer Science, 378 Computer Science, 2384: (1):101–116, June 3, 2007. 362–??, 2002. CODEN CODEN TCSCDI. ISSN LNCSD9. ISSN 0302- 0304-3975 (print), 1879- 9743 (print), 1611-3349 2294 (electronic). (electronic). URL http: Karri:2003:PBC //link.springer-ny.com/ link/service/series/0558/[KKG03] Ramesh Karri, Grigori bibs/2384/23840362.htm; Kuznetsov, and Michael http://link.springer- Goessel. Parity-based ny.com/link/service/series/ concurrent error detection 0558/papers/2384/23840362. of substitution-permutation pdf. network block ciphers. In Walter et al. [WKP03], Klein:2003:FOW pages 113–124. CODEN [KK03] Andreas Klein and Mar- LNCSD9. ISBN 3-540- tin Kutrib. Fast one-way 40833-9. ISSN 0302-9743 cellular automata. Theo- (print), 1611-3349 (elec- retical Computer Science, tronic). LCCN TK7895.E42. 295(1–3):233–250, February URL http://link.springer- 24, 2003. CODEN TC- ny.com/link/service/series/ SCDI. ISSN 0304-3975 0558/tocs/t2779.htm; (print), 1879-2294 (elec- http://www.springerlink. tronic). com/openurl.asp?genre= issue&issn=0302-9743&volume= Kawachi:2006:PQC 2779; http://www.springerlink. com/openurl.asp?genre= [KK06] A. Kawachi and T. Koshiba. volume&id=doi:10.1007/ Progress in quantum com- b13240. putational cryptography. J.UCS: Journal of Univer- Kwon:2003:EEC sal Computer Science,12 [KKH03] Soonhak Kwon, Chang Hoon (6):691–709, ???? 2006. Kim, and Chun Pyo Hong. CODEN ???? ISSN Efficient exponentiation for 0948-6968. URL http: a class of finite fields //www.jucs.org/jucs_12_ GF(2n) determined by 6/progress_in_quantum_ Gauss periods. In Wal- computational. ter et al. [WKP03], pages Kashefi:2007:SZK 228–242. CODEN LNCSD9. ISBN 3-540-40833-9. ISSN [KK07] Elham Kashefi and Iordanis 0302-9743 (print), 1611- Kerenidis. Statistical Zero 3349 (electronic). LCCN REFERENCES 425

TK7895.E42. URL http: 0094-243X (print), 1551- //link.springer-ny.com/ 7616 (electronic), 1935- link/service/series/0558/ 0465. LCCN Q183.9 tocs/t2779.htm; http: .I524 2007. URL http: //www.springerlink.com/ //proceedings.aip.org/ openurl.asp?genre=issue& getpdf/servlet/GetPDFServlet? issn=0302-9743&volume= filetype=pdf& id= 2779; http://www.springerlink. APCPCS000963000002000571000001& com/openurl.asp?genre= amp; idtype=cvips. volume&id=doi:10.1007/ b13240. Klonowski:2009:SGS Khachatrian:2001:FMI [KKKL09] Marek Klonowski, Lukasz Krzywiecki, Miroslaw Kuty- [KKIM01] Gurgen H. Khachatrian, lowski, and Anna Lauks. Melsik K. Kuregian, Karen R. Step-out group signatures. Ispiryan, and James L. Computing, 85(1–2):137– Massey. Fast multiplica- 151, June 2009. CODEN tion of integers for public- CMPTA2. ISSN 0010- key applications. Lecture 485X (print), 1436-5057 Notes in Computer Science, (electronic). URL http: 2259:245–??, 2001. CO- //www.springerlink.com/ DEN LNCSD9. ISSN 0302- openurl.asp?genre=article& 9743 (print), 1611-3349 issn=0010-485X&volume= (electronic). URL http: 85&issue=1&spage=137. //link.springer-ny.com/ link/service/series/0558/ Kawachi:2005:UTQ bibs/2259/22590245.htm; http://link.springer- [KKKP05] Akinori Kawachi, Hiro- ny.com/link/service/series/ tada Kobayashi, Takeshi 0558/papers/2259/22590245. Koshiba, and Raymond H. pdf. Putra. Universal test for quantum one-way permuta- Ko:2007:SRT tions. Theoretical Computer [KKJ+07] Hoon Ko, Jiyeon Kim, Science, 345(2–3):370–385, Jongjin Jung, Susan Joe, November 22, 2005. CO- Yongjun Lee, and Yoon- DEN TCSCDI. ISSN 0304- seok Chang. A study 3975 (print), 1879-2294 on the RFID tag en- (electronic). cryption using fast SEED. Kim:2009:SVN In Simos and Maroulis [SM07b], pages 571–574. [KKL09] Soongohn Kim, Seoksoo ISBN 0-7354-0476-3 (set), Kim, and Geuk Lee. Secure 0-7354-0477-1 (vol. 1), 0- verifiable non-interactive 7354-0478-X (vol. 2). ISSN oblivious transfer protocol REFERENCES 426

using RSA and bit commit- MARS and Serpent (ab- ment on distributed envi- stract only). In NIST ronment. Future Genera- [NIS00], page 10. ISBN tion Computer Systems,25 ???? LCCN ???? (3):352–357, March 2009. URL http://csrc.nist. CODEN FGSEVI. ISSN gov/encryption/aes/round2/ 0167-739X (print), 1872- conf3/aes3conf.htm; http: 7115 (electronic). //csrc.nist.gov/encryption/ aes/round2/conf3/papers/ Kaliski:2002:CHE AES3Proceedings-1.pdf; [KKP02] Burton S. Kaliski Jr., http://csrc.nist.gov/ C¸etin K. Ko¸c, and Christof encryption/aes/round2/ Paar, editors. Cryp- conf3/papers/AES3Proceedings- tographic Hardware and 2.pdf; http://csrc.nist. Embedded Systems—CHES gov/encryption/aes/round2/ 2002: 4th International conf3/papers/AES3Proceedings- Workshop Redwood Shores, 3.pdf; http://csrc.nist. CA, USA, August 13–15, gov/encryption/aes/round2/ 20. Revised Papers,volume conf3/papers/AES3Proceedings. 2523 of Lecture Notes in pdf. Computer Science. Spring- er-Verlag, Berlin, Ger- Kohno:2000:PCR many / Heidelberg, Ger- many / London, UK / etc., [KKS00b] Tadayoshi Kohno, John 2002. CODEN LNCSD9. Kelsey, and Bruce Schneier. ISBN 3-540-00409-2 (soft- Preliminary cryptanalysis of cover). ISSN 0302-9743 reduced-round Serpent. In (print), 1611-3349 (elec- NIST [NIS00], pages 195– tronic). LCCN TK7895.E42 214. ISBN ???? LCCN ???? C454 2002. URL http: URL http://csrc.nist. //link.springer-ny.com/ gov/encryption/aes/round2/ link/service/series/0558/ conf3/aes3conf.htm; http: tocs/t2523.htm; http: //csrc.nist.gov/encryption/ //www.springerlink.com/ aes/round2/conf3/papers/ openurl.asp?genre=issue& AES3Proceedings-1.pdf; issn=0302-9743&volume= http://csrc.nist.gov/ 2523. Also available via the encryption/aes/round2/ World Wide Web. conf3/papers/AES3Proceedings- Kelsey:2000:ABA 2.pdf; http://csrc.nist. gov/encryption/aes/round2/ [KKS00a] John Kelsey, Tadayoshi conf3/papers/AES3Proceedings- Kohno, and Bruce Schneier. 3.pdf; http://csrc.nist. Amplified boomerang at- gov/encryption/aes/round2/ tacks against reduced-round conf3/papers/AES3Proceedings. REFERENCES 427

pdf. Lindell. Handling expected polynomial-time strategies Kelsey:2001:ABA in simulation-based secu- [KKS01] J. Kelsey, T. Kohno, and rity proofs. In Kil- B. Schneier. Amplified ian [Kil05], pages 128– boomerang attacks against ?? CODEN LNCSD9. reduced-round MARS and ISBN 3-540-24573-1 (soft- Serpent. In Schneier cover). ISSN 0302-9743 [Sch01d], page ?? CO- (print), 1611-3349 (elec- DEN LNCSD9. ISBN 3-540- tronic). LCCN QA76.9.A25 41728-1. ISSN 0302-9743 T44 2005. URL http: (print), 1611-3349 (elec- //www.springerlink.com/ tronic). LCCN QA267.A1 openurl.asp?genre=issue& L43 no. 1978. URL http: issn=0302-9743&volume= //link.springer-ny.com/ 3378; http://www.springerlink. link/service/series/0558/ com/openurl.asp?genre= tocs/t1978.htm; http: volume&id=doi:10.1007/ //www.springerlink.com/ b106171. openurl.asp?genre=issue& Katz:2008:IMC issn=0302-9743&volume= 1978. [KL08] Jonathan Katz and Yehuda Kim:2002:IDS Lindell. Introduction to modern cryptography: Prin- [KKY02] Nam-Yeun Kim, Dae-Ghon ciples and Protocols. Chap- Kho, and Kee-Young Yoo. man and Hall/CRC cryp- Inversion/division systolic tography and network secu- architecture for public-key rity. Chapman and Hall/CRC, cryptosystems in GF(2m Boca Raton, FL, USA, ). Lecture Notes in 2008. ISBN 1-58488- Computer Science, 2433: 551-3. xviii + 534 pp. 289–??, 2002. CODEN LCCN QA76.9.A25 K36 LNCSD9. ISSN 0302- 2008. URL http://www. 9743 (print), 1611-3349 loc.gov/catdir/enhancements/ (electronic). URL http: fy0807/2007017861-d.html; //link.springer-ny.com/ http://www.loc.gov/catdir/ link/service/series/0558/ toc/ecip0716/2007017861. bibs/2433/24330289.htm; html. http://link.springer- Knill:2002:FPE ny.com/link/service/series/ 0558/papers/2433/24330289.[KLB+02a] Emanuel Knill, Raymond pdf. Laflamme, Howard N. Bar- num, Diego A. Dalvit, Katz:2005:HEP Jacek J. Dziarmaga, James E. [KL05] Jonathan Katz and Yehuda Gubernatis, Leonid Gurvits, REFERENCES 428

Gerardo Ortiz, Lorenza link/service/series/0558/ Viola, and Wojciech H. bibs/1880/18800166.htm; Zurek. From factoring http://link.springer- to phase estimation: a ny.com/link/service/series/ discussion of Shor’s algo- 0558/papers/1880/18800166. rithm. LosAlamosSci- pdf. ence, 27:38–45, 2002. CO- DEN LASCDI. ISSN Klein:2007:BDC 0273-7116. URL http: [Kle07] Amit Klein. BIND 9 DNS //library.lanl.gov/cgi- cache poisoning. Report, bin/getfile?27-05.pdf. Trusteer, Ltd., 3 Hayet- Knill:2002:QIP zira Street, Ramat Gan 52521, Israel, 2007. 21 [KLB+02b] Emanuel Knill, Raymond pp. URL http://www. Laflamme, Howard N. Bar- trusteer.com/docs/BIND_ num, Diego A. Dalvit, 9_DNS_Cache_Poisoning. Jacek J. Dziarmaga, James E. pdf. Gubernatis, Leonid Gurvits, Kong:2001:AVW Gerardo Ortiz, Lorenza Viola, and Wojciech H. [KLL01] Xiangwei Kong, Yu Liu, Zurek. Quantum informa- and Huajian Liu. Adap- tion processing: a hands-on tive video watermarking primer. Los Alamos Sci- scheme. Lecture Notes in ence, 27:2–37, 2002. CO- Computer Science, 2195: DEN LASCDI. ISSN 933–??, 2001. CODEN 0273-7116. URL http: LNCSD9. ISSN 0302- //library.lanl.gov/cgi- 9743 (print), 1611-3349 bin/getfile?27-07.pdf. (electronic). URL http: //link.springer-ny.com/ Ko:2000:NPK link/service/series/0558/ [KLC+00] Ki Hyoung Ko, Sang Jin bibs/2195/21950933.htm; Lee, Jung Hee Cheon, http://link.springer- Jae Woo Han, Ju sung ny.com/link/service/series/ Kang, and Choonsik Park. 0558/papers/2195/21950933. New public-key cryptosys- pdf. tem using braid groups. Kiltz:2005:SCM In Bellare [Bel00], pages 166–?? ISBN 3-540- [KLML05] Eike Kiltz, Gregor Lean- 67907-3. ISSN 0302-9743 der, and John Malone-Lee. (print), 1611-3349 (elec- Secure computation of the tronic). LCCN QA76.9.A25 mean and related statistics. C79 2000 Bar. URL http: In Kilian [Kil05], pages 283– //link.springer-ny.com/ ?? CODEN LNCSD9. REFERENCES 429

ISBN 3-540-24573-1 (soft- Lee, and Kee-Young Yoo. cover). ISSN 0302-9743 Efficient power-sum systolic (print), 1611-3349 (elec- architectures for public-key tronic). LCCN QA76.9.A25 cryptosystems in GF(2m T44 2005. URL http: ). Lecture Notes in //www.springerlink.com/ Computer Science, 2387: openurl.asp?genre=issue& 153–??, 2002. CODEN issn=0302-9743&volume= LNCSD9. ISSN 0302- 3378; http://www.springerlink. 9743 (print), 1611-3349 com/openurl.asp?genre= (electronic). URL http: volume&id=doi:10.1007/ //link.springer-ny.com/ b106171. link/service/series/0558/ Kacprzak:2006:CBS bibs/2387/23870153.htm; http://link.springer- [KLN+06] Magdalena Kacprzak, Alessio ny.com/link/service/series/ Lomuscio, Artur Niewiadom- 0558/papers/2387/23870153. ski, Wojciech Penczek, pdf. Franco Raimondi, and Ma- ciej Szreter. Comparing Kim:2003:IBP BDD and SAT based tech- [KLY03] Hyun-Sung Kim, Sung- niques for model checking Woon Lee, and Kee-Young Chaum’s dining cryptogra- Yoo. ID-based password phers protocol. Fundamenta authentication scheme us- Informaticae, 72(1–3):215– ing smart cards and finger- 234, September 2006. CO- prints. Operating Systems DEN FUMAAJ. ISSN Review, 37(4):32–41, Octo- 0169-2968 (print), 1875- ber 2003. CODEN OS- 8681 (electronic). RED8. ISSN 0163-5980 Kalai:2009:SEU (print), 1943-586X (elec- tronic). [KLR09] Y. T. Kalai, Xin Li, and A. Rao. 2-source extrac- Knudsen:2000:CRA tors under computational assumptions and cryptogra- [KM00] Lars Knudsen and Willi phy with defective random- Meier. Correlations in ness. In IEEE [IEE09b], RC6 (abstract only). In pages 617–626. ISBN 0- NIST [NIS00], page 9. 7695-3850-9. LCCN QA76 ISBN ???? LCCN ???? .S95 2009. IEEE Com- URL http://csrc.nist. puter Society order number gov/encryption/aes/round2/ P3850. conf3/aes3conf.htm; http: Kim:2002:EPS //csrc.nist.gov/encryption/ aes/round2/conf3/papers/ [KLY02] Nam-Yeun Kim, Won-Ho AES3Proceedings-1.pdf; REFERENCES 430

http://csrc.nist.gov/ openurl.asp?genre=issue& encryption/aes/round2/ issn=0302-9743&volume= conf3/papers/AES3Proceedings- 1978. 2.pdf; http://csrc.nist. Knudsen:2001:CPL gov/encryption/aes/round2/ conf3/papers/AES3Proceedings-[KM01c] Lars R. Knudsen and 3.pdf; http://csrc.nist. John Erik Mathiassen. A gov/encryption/aes/round2/ chosen-plaintext linear at- conf3/papers/AES3Proceedings. tack on DES. Lecture pdf. Notes in Computer Science, 1978:262–??, 2001. CO- Kim:2001:NPK DEN LNCSD9. ISSN 0302- 9743 (print), 1611-3349 [KM01a] Hwankoo Kim and Sang- (electronic). URL http: Jae Moon. New public- //link.springer-ny.com/ key cryptosystem using di- link/service/series/0558/ visor class groups. Lec- bibs/1978/19780262.htm; ture Notes in Computer Sci- http://link.springer- ence, 2119:74–??, 2001. CO- ny.com/link/service/series/ DEN LNCSD9. ISSN 0302- 0558/papers/1978/19780262. 9743 (print), 1611-3349 pdf. (electronic). URL http: //link.springer-ny.com/ Kanda:2002:SCA link/service/series/0558/[KM02] Masayuki Kanda and Tsu- bibs/2119/21190074.htm; tomu Matsumoto. Secu- http://link.springer- rity of Camellia against ny.com/link/service/series/ truncated differential crypt- 0558/papers/2119/21190074. analysis. Lecture Notes in . pdf Computer Science, 2355: Knudsen:2001:CRR 286–??, 2002. CODEN LNCSD9. ISSN 0302- [KM01b] L. Knudsen and W. Meier. 9743 (print), 1611-3349 Correlations in RC6 with a (electronic). URL http: reduced number of rounds. //link.springer-ny.com/ In Schneier [Sch01d], page ?? link/service/series/0558/ CODEN LNCSD9. ISBN bibs/2355/23550286.htm; 3-540-41728-1. ISSN 0302- http://link.springer- 9743 (print), 1611-3349 ny.com/link/service/series/ (electronic). LCCN QA267.A1 0558/papers/2355/23550286. L43 no. 1978. URL http: pdf. //link.springer-ny.com/ Koblitz:2004:OTS link/service/series/0558/ tocs/t1978.htm; http: [KM04a] Neal Koblitz and Alfred J. //www.springerlink.com/ Menezes. Obstacles to REFERENCES 431

the torsion-subgroup at- curity levels. Report ??, tack on the decision Diffie– Department of Mathemat- Hellman Problem. Math- ics, Box 354350, Univer- ematics of Computation, sity of Washington, Seattle, 73(248):2027–2041, Octo- WA 98195, USA, May 11, ber 2004. CODEN MCM- 2005. URL http://www. PAF. ISSN 0025-5718 mathnet.or.kr/mathnet/ (paper), 1088-6842 (elec- preprint_file/cacr/2005/ tronic). URL http:// cacr2005-08.pdf. www.ams.org/mcom/2004- 73-248/S0025-5718-04-01637- Kornerup:2007:PIS 0/home.html; http:// [KM07] Peter Kornerup and Jean- www.ams.org/mcom/2004- Michel Muller, editors. Pro- 73-248/S0025-5718-04-01637- ceedings of the 18th IEEE 0/S0025-5718-04-01637- Symposium on Computer 0.dvi; http://www.ams. Arithmetic, June 25–27, org/mcom/2004-73-248/S0025- 2007, Montpellier, France. 5718-04-01637-0/S0025- IEEE Computer Society 5718-04-01637-0.pdf; Press, 1109 Spring Street, http://www.ams.org/mcom/ Suite 300, Silver Spring, 2004-73-248/S0025-5718- MD 20910, USA, 2007. 04-01637-0/S0025-5718- ISBN 0-7695-2854-6. ISSN 04-01637-0.ps; http:/ 1063-6889. LCCN ???? /www.ams.org/mcom/2004- URL http://www.lirmm. 73-248/S0025-5718-04-01637- fr/arith18/. 0/S0025-5718-04-01637- 0.tex. Kim:2002:ABA Koblitz:2004:SPK [KML+02] Jongsung Kim, Dukjae [KM04b] Neal Koblitz and Alfred J. Moon, Wonil Lee, Seokhie Menezes. A survey of public- Hong, Sangjin Lee, and key cryptosystems. SIAM Seokwon Jung. Am- Review, 46(4):599–634, De- plified cember 2004. CODEN against reduced-round SHA- SIREAD. ISSN 0036-1445 CAL. Lecture Notes in (print), 1095-7200 (elec- Computer Science, 2501: tronic). URL http:// 243–??, 2002. CODEN epubs.siam.org/sam-bin/ LNCSD9. ISSN 0302-9743 dbq/article/43919. (print), 1611-3349 (elec- Koblitz:2005:PBC tronic). URL http:// link.springer.de/link/ [KM05] Neal Koblitz and Alfred service/series/0558/bibs/ Menezes. Pairing-based 2501/25010243.htm; http: cryptography at high se- //link.springer.de/link/ REFERENCES 432

service/series/0558/papers/ Klarlund:2001:MIS 2501/25010243.pdf. [KMS01] Nils Klarlund, Anders Møller, and Michael I. Kakarountas:2006:HSF Schwartzbach. MONA im- plementation secrets. Lec- + [KMM 06] Athanasios P. Kakaroun- ture Notes in Computer Sci- tas, Haralambos Michail, ence, 2088:182–??, 2001. Athanasios Milidonis, Costas E. CODEN LNCSD9. ISSN Goutis, and George Theodor- 0302-9743 (print), 1611- idis. High-speed FPGA 3349 (electronic). URL implementation of secure http://link.springer-ny. hash algorithm for IPSec com/link/service/series/ and VPN applications. The 0558/bibs/2088/20880182. Journal of Supercomput- htm; http://link.springer- ing, 37(2):179–195, Au- ny.com/link/service/series/ gust 2006. CODEN JO- 0558/papers/2088/20880182. SUED. ISSN 0920-8542 pdf. (print), 1573-0484 (elec- tronic). URL http:/ Klimov:2002:ANC /www.springerlink.com/ [KMS02] Alexander Klimov, Anton openurl.asp?genre=article& Mityagin, and Adi Shamir. issn=0920-8542&volume= Analysis of neural cryptog- 37&issue=2&spage=179. raphy. Lecture Notes in Computer Science, 2501: Katz:2001:CCA 288–??, 2002. CODEN LNCSD9. ISSN 0302-9743 [KMO01] Jonathan Katz, Steven My- (print), 1611-3349 (elec- ers, and Rafail Ostrovsky. tronic). URL http:// Cryptographic counters and link.springer.de/link/ applications to electronic service/series/0558/bibs/ voting. Lecture Notes in 2501/25010288.htm; http: Computer Science, 2045: //link.springer.de/link/ 78–??, 2001. CODEN service/series/0558/papers/ LNCSD9. ISSN 0302- 2501/25010288.pdf. 9743 (print), 1611-3349 Keliher:2001:IUB (electronic). URL http: //link.springer-ny.com/ [KMT01] Liam Keliher, Henk Meijer, link/service/series/0558/ and Stafford Tavares. Im- bibs/2045/20450078.htm; proving the upper bound http://link.springer- on the maximum average ny.com/link/service/series/ linear hull probability for 0558/papers/2045/20450078. Rijndael. Lecture Notes pdf. in Computer Science, 2259: REFERENCES 433

112–??, 2001. CODEN many / London, UK / etc., LNCSD9. ISSN 0302- 2003. CODEN LNCSD9. 9743 (print), 1611-3349 ISBN 3-540-40302-7 (soft- (electronic). URL http: cover). ISSN 0302-9743 //link.springer-ny.com/ (print), 1611-3349 (elec- link/service/series/0558/ tronic). LCCN TK7882.S65 bibs/2259/22590112.htm; A944 2003. URL http: http://link.springer- //link.springer-ny.com/ ny.com/link/service/series/ link/service/series/0558/ 0558/papers/2259/22590112. tocs/t2688.htm; http: pdf. //www.springerlink.com/ openurl.asp?genre=issue& Kim:2003:RCC issn=0302-9743&volume= [KMZ03] Seungjoo Kim, Masahiro 2688. Mambo, and Yuliang Zheng. Kol:2008:GEI Rethinking chosen-ciphertext security under Kerckhoffs’ [KN08] Gillat Kol and Moni Naor. assumption. In Joye Games for exchanging infor- [Joy03b], pages 227–243. mation. In ACM [ACM08], CODEN LNCSD9. ISBN pages 423–432. ISBN 1- 3-540-00847-0. ISSN 0302- 60558-047-3. LCCN QA76.6 9743 (print), 1611-3349 .A152 2008. (electronic). LCCN QA76.9.A25 Koc:2001:CHEb C822 2003. URL http: //link.springer-ny.com/ [KNP01] C¸etin K. Ko¸c, David Nac- link/service/series/0558/ cache, and Christof Paar, tocs/t2612.htm; http: editors. Cryptographic hard- //www.springerlink.com/ ware and embedded systems openurl.asp?genre=issue& — CHES 2001: Third Inter- issn=0302-9743&volume= national Workshop, Paris, 2612. France, May 14–16, 2001: Kittler:2003:AVB Proceedings, volume 2162 of Lecture Notes in Com- [KN03] Josef Kittler and Mark S. puter Science and Lec- Nixon, editors. Audio-and ture Notes in Artificial In- video-based biometric person telligence. Springer-Verlag, authentication: 4th Interna- Berlin, Germany / Heidel- tional Conference, AVBPA berg, Germany / London, 2003, Guildford, UK, June UK / etc., 2001. CO- 9–11, 2003: Proceedings, DEN LNCSD9. ISBN 3-540- volume 2688 of Lecture 42521-7. ISSN 0302-9743 Notes in Computer Science. (print), 1611-3349 (elec- Springer-Verlag, Berlin, tronic). LCCN TK7895.E42 Germany / Heidelberg, Ger- C454 2001; QA267.A1 L43 REFERENCES 434

no.2162. URL http:/ Cryptographic Techniques, /link.springer-ny.com/ Amsterdam, The Nether- link/service/series/0558/ lands, April 28–May 2, tocs/t2162.htm; http: 2002. Proceedings,volume //www.springerlink.com/ 2332 of Lecture Notes in openurl.asp?genre=issue& Computer Science. Spring- issn=0302-9743&volume= er-Verlag, Berlin, Ger- 2162. many / Heidelberg, Ger- Krukow:2005:FCR many / London, UK / etc., 2002. CODEN LNCSD9. [KNS05] Karl Krukow, Mogens ISBN 3-540-43553-0 (soft- Nielsen, and Vladimiro Sas- cover). ISSN 0302-9743 sone. A framework for (print), 1611-3349 (elec- concrete reputation-systems tronic). LCCN QA76.9.A25 with applications to history- E964 2002. URL http: based access control. In //link.springer-ny.com/ Meadows and Syverson link/service/series/0558/ [MS05b], pages 260–269. tocs/t2332.htm; http: ISBN 1-59593-226-7. LCCN //www.springerlink.com/ QA76.9.A25. ACM order openurl.asp?genre=issue& number 459050. issn=0302-9743&volume= Knudsen:2000:TT 2332. Knutson:2007:BPS [Knu00a] L. Knudsen. Trawling Twofish. Reports in in- [Knu07] Tina R. Knutson. Building formatics, University of privacy into software prod- Bergen, Bergen, Norway, ucts and services. IEEE Se- April 2000. ???? pp. curity & Privacy, 5(3):72– 74, May/June 2007. CO- Knudsen:2000:TTR DEN ???? ISSN 1540-7993 [Knu00b] L. Knudsen. Trawl- (print), 1558-4046 (elec- ing Twofish — revisited. tronic). In ????, editor, Third Kushilevitz:2000:OWT AES Candidate Conference, page ?? ????, ????, April [KO00] Eyal Kushilevitz and Rafail 2000. ISBN ???? LCCN Ostrovsky. One-way trap- ???? door permutations are suffi- Knudsen:2002:ACE cient for non-trivial single- server private information [Knu02] Lars Knudsen, editor. Ad- retrieval. Lecture Notes vances in Cryptology— in Computer Science, 1807: EUROCRYPT 2002: Inter- 104–??, 2000. CODEN national Conference on the LNCSD9. ISSN 0302- Theory and Applications of 9743 (print), 1611-3349 REFERENCES 435

(electronic). URL http: com/openurl.asp?genre= //link.springer-ny.com/ issue&issn=0302-9743&volume= link/service/series/0558/ 3152; http://www.springerlink. bibs/1807/18070104.htm; com/openurl.asp?genre= http://link.springer- volume&id=doi:10.1007/ ny.com/link/service/series/ b99099. 0558/papers/1807/18070104. Koblitz:2000:TQC pdf. Komano:2003:EUP [Kob00] Neal Koblitz. Towards a quarter-century of public [KO03] Yuichi Komano and Kazuo key cryptography. Kluwer Ohta. Efficient univer- Academic Publishers, Dor- sal padding techniques drecht, The Netherlands, for multiplicative trap- 2000. ISBN 0-7923-7802-4. door one-way permuta- 179 pp. LCCN QA76.9.A25 tion. In Boneh [Bon03], T69 2000. A special issue pages 366–382. CODEN of Designs, codes, and cryp- LNCSD9. ISBN 3-540- tography, an international 40674-3. ISSN 0302-9743 journal, volume 19, no. 2/3 (print), 1611-3349 (elec- (2000). tronic). LCCN QA76.9.A25 C79 2003. URL http: Kocher:2002:IS //link.springer-ny.com/ link/service/series/0558/[Koc02] Paul Kocher. Illusions tocs/t2729.htm; http: of security, 2002. URL //www.springerlink.com/ http://www.usenix.org/ openurl.asp?genre=issue& publications/library/proceedings/ issn=0302-9743&volume= sec02/tech.html. Unpub- 2729; http://www.springerlink. lished. com/openurl.asp?genre= Koga:2002:GFR volume&id=doi:10.1007/ b11817. [Kog02] Hiroki Koga. A gen- eral formula of the (t, n)- Katz:2004:ROS threshold visual secret shar- [KO04] Jonathan Katz and Rafail ing scheme. Lecture Notes Ostrovsky. Round-optimal in Computer Science, 2501: secure two-party computa- 328–??, 2002. CODEN tion. In Franklin [Fra04], LNCSD9. ISSN 0302-9743 pages 335–?? CODEN (print), 1611-3349 (elec- LNCSD9. ISBN 3-540- tronic). URL http:// 22668-0. ISSN 0302-9743 link.springer.de/link/ (print), 1611-3349 (elec- service/series/0558/bibs/ tronic). LCCN 10.1007/b99099. 2501/25010328.htm; http: URL http://www.springerlink. //link.springer.de/link/ REFERENCES 436

service/series/0558/papers/ etc., 2001. URL http: 2501/25010328.pdf. //link.springer-ny.com/ link/service/series/0558/ Kurosawa:2001:ICP bibs/1992/19920087.htm; [KOMM01] Kaoru Kurosawa, Wakaha http://link.springer- Ogata, Toshihiko Mat- ny.com/link/service/series/ suo, and Shuichi Mak- 0558/papers/1992/19920087. ishima. IND–CCA pub- pdf. lic key schemes equivalent to factoring n = pq. Lec- Koshiba:2001:SRS ture Notes in Computer Sci- ence, 1992:36–??, 2001. CO- [Kos01b] Takeshi Koshiba. On suf- DEN LNCSD9. ISSN 0302- ficient randomness for se- 9743 (print), 1611-3349 cure public-key cryptosys- (electronic). URL http: tems. Lecture Notes in //link.springer-ny.com/ Computer Science, 2274: link/service/series/0558/ 34–??, 2001. CODEN bibs/1992/19920036.htm; LNCSD9. ISSN 0302- http://link.springer- 9743 (print), 1611-3349 ny.com/link/service/series/ (electronic). URL http: 0558/papers/1992/19920036. //link.springer-ny.com/ pdf. link/service/series/0558/ bibs/2274/22740034.htm; Kornblum:2009:IBD http://link.springer- [Kor09] Jesse D. Kornblum. Imple- ny.com/link/service/series/ menting BitLocker drive en- 0558/papers/2274/22740034. cryption for forensic analy- pdf. sis. Digital Investigation,5 (3):75–84, ???? 2009. URL Koskinen:2001:NIK ????. [Kos01c] Jukka A. Koskinen. Non- Koshiba:2001:NAS injective knapsack public- [Kos01a] Takeshi Koshiba. A new key cryptosystems. The- aspect for security no- oretical Computer Science, tions: Secure random- 255(1–2):401–422, March ness in public-key encryp- 28, 2001. CODEN TC- tion schemes. In Public SCDI. ISSN 0304-3975 key cryptography (Cheju Is- (print), 1879-2294 (elec- land, 2001), volume 1992 of tronic). URL http:/ Lecture Notes in Comput. /www.elsevier.nl../40/ Sci., pages 87–103. Spring- abstract.html; http: er-Verlag, Berlin, Ger- //www.elsevier.nl/gej- many / Heidelberg, Ger- ng/10/41/16/197/21/40/ many / London, UK / article.pdf. REFERENCES 437

Kovach:2001:BCB 0558/papers/2045/20450475. pdf. [Kov01] Karen Kovach. Breaking codes, breaking barriers: the Katz:2009:ESA WACs of the Signal Se- [KOY09] Jonathan Katz, Rafail Os- curity Agency, World War trovsky, and Moti Yung. Ef- II. History Office, Of- ficient and secure authen- ficeoftheChiefofStaff, ticated key exchange using US Army Intelligence and weak passwords. Journal Security Command, Fort of the ACM, 57(1):3:1–3:39, Belvoir, VA, USA, 2001. vi November 2009. CODEN + 49 pp. LCCN UA565.W6 JACOAH. ISSN 0004-5411 K68 2001. (print), 1557-735X (elec- Kovacich:2003:ISS tronic). Katzenbeisser:2000:IHT [Kov03] Gerald L. Kovacich. The information systems secu- [KP00] Stefan Katzenbeisser and rity officer’s guide: es- Fabien A. P. Petitcolas, ed- tablishing and managing itors. Information hiding an information protection techniques for steganogra- program. Butterworth- phy and digital watermark- Heinemann, Boston, MA, ing. Artech House com- USA, second edition, 2003. puter security series. Artech ISBN 0-7506-7656-6. xxviii House Inc., Norwood, MA, + 361 pp. LCCN QA76.9.A25 USA, 2000. ISBN 1-58053- K68 2003. US$39.95. 035-4. xviii + 220 pp. LCCN QA76.9.A25 I54144 2000. Katz:2001:EPA Koc:2001:CHEa [KOY01] Jonathan Katz, Rafail Os- trovsky, and Moti Yung. Ef- [KP01] C¸etin K. Ko¸candChristof ficient password-authenticated Paar, editors. Cryptographic key exchange using human- hardware and embedded sys- memorable passwords. Lec- tems — CHES 2000: Second ture Notes in Computer Sci- International Workshop, ence, 2045:475–??, 2001. Worcester, MA, USA, Au- CODEN LNCSD9. ISSN gust 17–18, 2000: Proceed- 0302-9743 (print), 1611- ings, volume 1965 of Lecture 3349 (electronic). URL Notes in Computer Science. http://link.springer-ny. Springer-Verlag, Berlin, com/link/service/series/ Germany / Heidelberg, Ger- 0558/bibs/2045/20450475. many / London, UK / etc., htm; http://link.springer- 2001. CODEN LNCSD9. ny.com/link/service/series/ ISBN 3-540-41455-X (soft- REFERENCES 438

cover). ISSN 0302-9743 0558/papers/2438/24380750. (print), 1611-3349 (elec- pdf. tronic). LCCN TK7895.E42 Klima:2003:ARB C454 2000. URL http: //link.springer-ny.com/ [KPR03] Vlastimil Kl´ıma, Ondrej link/service/series/0558/ Pokorn´y, and Tom´aˇs Rosa. tocs/t1965.htm; http: Attacking RSA-based ses- //www.springerlink.com/ sions in SSL/TLS. In Wal- openurl.asp?genre=issue& ter et al. [WKP03], pages issn=0302-9743&volume= 426–440. CODEN LNCSD9. 1965. ISBN 3-540-40833-9. ISSN Koc:2003:GEI 0302-9743 (print), 1611- 3349 (electronic). LCCN [KP03] C. K. Koc and C. Paar. TK7895.E42. URL http: Guest editors’ introduction //link.springer-ny.com/ to the special section on link/service/series/0558/ cryptographic hardware and tocs/t2779.htm; http: embedded systems. IEEE //www.springerlink.com/ Transactions on Computers, openurl.asp?genre=issue& 52(4):401–402, April 2003. issn=0302-9743&volume= CODEN ITCOB4. ISSN 2779; http://www.springerlink. 0018-9340 (print), 1557- com/openurl.asp?genre= 9956 (electronic). URL volume&id=doi:10.1007/ http://ieeexplore.ieee. b13240. org/stamp/stamp.jsp?tp= Kaufman:2002:NSP &arnumber=1190580. Kerins:2002:FPE [KPS02] Charlie Kaufman, Ra- dia Perlman, and Michael [KPMF02] Tim Kerins, Emanuel Popovici, Speciner. Network security: William Marnane, and private communication in a Patrick Fitzpatrick. Fully public world. Prentice Hall parameterizable elliptic curve series in computer network- cryptography processor over ing and distributed systems. GF(2). Lecture Notes in Prentice-Hall PTR, Upper Computer Science, 2438: Saddle River, NJ 07458, 750–??, 2002. CODEN USA, second edition, 2002. LNCSD9. ISSN 0302- ISBN 0-13-046019-2. xxvi + 9743 (print), 1611-3349 713 pp. LCCN QA76.9.A25 (electronic). URL http: K39 2002. //link.springer-ny.com/ Kim:2004:TBG link/service/series/0558/ bibs/2438/24380750.htm; [KPT04] Yongdae Kim, Adrian Per- http://link.springer- rig, and Gene Tsudik. Tree- ny.com/link/service/series/ based group key agreement. REFERENCES 439

ACM Transactions on In- 222–??, 2002. CODEN formation and System Se- LNCSD9. ISSN 0302- curity, 7(1):60–96, February 9743 (print), 1611-3349 2004. CODEN ATISBQ. (electronic). URL http: ISSN 1094-9224 (print), //link.springer-ny.com/ 1557-7406 (electronic). link/service/series/0558/ bibs/2332/23320222.htm; Krishna:2003:BUP http://link.springer- [KR03] Shankara Narayanan Kr- ny.com/link/service/series/ ishna and Raghavan Rama. 0558/papers/2332/23320222. Breaking DES using P sys- pdf. tems. Theoretical Computer Krause:2002:USP Science, 299(1–3):495–508, April 18, 2003. CODEN [Kra02b] Rory Krause. Using TCSCDI. ISSN 0304-3975 SSH port forwarding to (print), 1879-2294 (elec- print at remote locations. tronic). Linux Journal, 94:60–62, 64, February 2002. CODEN Krawczyk:2001:OEA LIJOFX. ISSN 1075-3583 [Kra01] Hugo Krawczyk. The or- (print), 1938-3827 (elec- der of encryption and au- tronic). URL http:// thentication for protecting noframes.linuxjournal. communications (or: How com/lj-issues/issue94/ secure is SSL?). In Kil- article.php?sid=5462. ian [Kil01a], pages 310– Krawczy:2003:SSM ?? ISBN 3-540-42456- 3 (paperback). LCCN [Kra03] Hugo Krawczy. SIGMA: QA76.9.A25 C79 2001; The “SIGn-and-MAc” ap- QA267.A1 L43 no.2139. proach to authenticated UK£47.00. URL http: Diffie–Hellman and its //link.springer-ny.com/ use in the IKE proto- link/service/series/0558/ cols. In Boneh [Bon03], bibs/2139/21390310.htm; pages 400–425. CODEN http://link.springer- LNCSD9. ISBN 3-540- ny.com/link/service/series/ 40674-3. ISSN 0302-9743 0558/papers/2139/21390310. (print), 1611-3349 (elec- pdf. tronic). LCCN QA76.9.A25 Krause:2002:BBC C79 2003. URL http: //link.springer-ny.com/ [Kra02a] Matthias Krause. BDD- link/service/series/0558/ based cryptanalysis of keystream tocs/t2729.htm; http: generators. Lecture Notes //www.springerlink.com/ in Computer Science, 2332: openurl.asp?genre=issue& REFERENCES 440

issn=0302-9743&volume= Koeune:2002:FIL 2729; http://www.springerlink. + com/openurl.asp?genre= [KRS 02] Fran¸cois Koeune, Gael volume&id=doi:10.1007/ Rouvroy, Fran¸cois-Xavier b11817. Standaert, Jean-Jacques Quisquater, Jean-Pierre Krawczyk:2005:HHP David, and Jean-Didier Legat. An FPGA im- [Kra05] Hugo Krawczyk. HMQV: plementation of the lin- a high-performance secure ear cryptanalysis. Lecture Diffie–Hellman protocol. Notes in Computer Science, In Shoup [Sho05a], pages 2438:845–??, 2002. CO- 546–?? ISBN 3-540- DEN LNCSD9. ISSN 0302- 28114-2. ISSN 0302-9743 9743 (print), 1611-3349 (print), 1611-3349 (elec- (electronic). URL http: tronic). LCCN QA76.9.A25 //link.springer-ny.com/ C79 2005; QA76.9 .A25; link/service/series/0558/ QA76.9 C79 2005; QA76.9 bibs/2438/24380845.htm; C794 2005; QA76.9; In- http://link.springer- ternet. URL http:/ ny.com/link/service/series/ /www.springerlink.com/ 0558/papers/2438/24380845. openurl.asp?genre=issue& pdf. issn=0302-9743&volume= 3621. Kehr:2001:ISM Kramer:2007:LCC [KRV01] Roger Kehr, Michael Rohs, and Harald Vogt. Issues in [Kra07] Simon Kramer. Logical smartcard middleware. Lec- concepts in cryptography. ture Notes in Computer Sci- ACM SIGACT News,38 ence, 2041:90–??, 2001. CO- (4):65–66, December 2007. DEN LNCSD9. ISSN 0302- CODEN SIGNDM. ISSN 9743 (print), 1611-3349 0163-5700 (print), 1943- (electronic). URL http: 5827 (electronic). URL //link.springer-ny.com/ http://doi.acm.org/10. link/service/series/0558/ 1145/1345189.1345205. bibs/2041/20410090.htm; Kreitz:2005:OBE http://link.springer- ny.com/link/service/series/ [Kre05] Gunnar Kreitz. Optimiza- 0558/papers/2041/20410090. tion of broadcast encryp- pdf. tion schemes. Examensar- Kim:2005:CLL bete, Numerisk analys och datalogi, Kungliga Tekniska [KRY05] Kee-Won Kim, Eun-Kyung h¨ogskolan, Stockholm, Swe- Ryu, and Kee-Young Yoo. den, 2005. 61 pp. Cryptanalysis of Lee–Lee REFERENCES 441

authenticated key agree- Kuramitsu:2002:ETC ment scheme. Applied Math- ematics and Computation, [KS02] K. Kuramitsu and K. Saka- 163(1):193–198, April 5, mura. Electronic tick- 2005. CODEN AMHCBQ. ets on contactless Smart- ISSN 0096-3003 (print), card database. Lecture 1873-5649 (electronic). Notes in Computer Science, 2453:392–??, 2002. CO- Katz:2000:CCA DEN LNCSD9. ISSN 0302- [KS00a] Jonathan Katz and Bruce 9743 (print), 1611-3349 Schneier. A chosen cipher- (electronic). URL http: text attack against several //link.springer-ny.com/ E-mail encryption proto- link/service/series/0558/ cols. In USENIX [USE00d], bibs/2453/24530392.htm; page ?? ISBN 1-880446- http://link.springer- 18-9. LCCN ???? URL ny.com/link/service/series/ http://www.usenix.org/ 0558/papers/2453/24530392. publications/library/proceedings/ pdf. sec2000/katz.html. Krause:2003:DOC Kelsey:2000:MAP [KS03] Matthias Krause and Hans Ul- [KS00b] John Kelsey and Bruce rich Simon. Determining Schneier. MARS at- the optimal contrast for se- tacks! preliminary crypt- cret sharing schemes in vi- analysis of reduced-round sual cryptography. Com- MARS variants. In NIST binatorics, Probability and [NIS00], pages 169–185. Computing, 12(3):285–299, ISBN ???? LCCN ???? May 2003. CODEN CP- URL http://csrc.nist. COFG. ISSN 0963-5483 gov/encryption/aes/round2/ (print), 1469-2163 (elec- conf3/aes3conf.htm; http: tronic). URL http:// //csrc.nist.gov/encryption/ journals.cambridge.org/ aes/round2/conf3/papers/ action/displayIssue?jid= AES3Proceedings-1.pdf; CPC&volumeId=12&issueId= http://csrc.nist.gov/ 03. Combinatorics, proba- encryption/aes/round2/ bility and computing (Ober- conf3/papers/AES3Proceedings- wolfach, 2001). 2.pdf; http://csrc.nist. Kozaczuk:2004:EHP gov/encryption/aes/round2/ conf3/papers/AES3Proceedings-[KS04] W ladyslaw Kozaczuk and 3.pdf; http://csrc.nist. Jerzy Straszak. Enigma: gov/encryption/aes/round2/ how the Poles broke the Nazi conf3/papers/AES3Proceedings. code. Hippocrene Books, pdf. New York, NY, USA, 2004. REFERENCES 442

ISBN 0-7818-0941-X. viii + openurl.asp?genre=issue& 163 pp. LCCN D810.C88 issn=0302-9743&volume= K67 2004. URL http:// 3621. www.loc.gov/catdir/toc/ Klivans:2006:CHL fy051/2004040636.html. [KS06a] Adam R. Klivans and Katz:2005:MIA Alexander A. Sherstov. Cryptographic hardness for [KS05a] Jonathan Katz and Ji Sun learning intersections of Shin. Modeling insider at- halfspaces. In IEEE [IEE06], tacks on group key-exchange pages 553–562. ISBN 0- protocols. In Meadows and 7695-2720-5, 0-7695-2362-5. Syverson [MS05b], pages ISSN 0272-5428. LCCN 180–189. ISBN 1-59593- QA76 .S974 2006. URL 226-7. LCCN QA76.9.A25. http://ieeexplore.ieee. ACM order number 459050. org/servlet/opac?punumber= Kiltz:2005:TCL 4031329. IEEE Com- puter Society Order Number [KS05b] Eike Kiltz and Hans Ul- P2720. rich Simon. Threshold cir- cuit lower bounds on cryp- Kurkowski:2006:QFF tographic functions. Jour- [KS06b] Miroslaw Kurkowski and nal of Computer and Sys- Marian Srebrny. A quantifier- tem Sciences, 71(2):185– free first-order knowledge 212, August 2005. CODEN logic of authentication. Fun- JCSSBM. ISSN 0022-0000 damenta Informaticae,72 (print), 1090-2724 (elec- (1–3):263–282, September tronic). URL http:// 2006. CODEN FUMAAJ. www.sciencedirect.com/ ISSN 0169-2968 (print), science/article/pii/S0022000005000292. 1875-8681 (electronic). Kissner:2005:PPS Kasper:2009:FTA [KS05c] Lea Kissner and Dawn Song. [KS09a] Emilia K¨asper and Peter Privacy-preserving set oper- Schwabe. Faster and timing- ations. In Shoup [Sho05a], attack resistant AES–GCM. pages 241–?? ISBN 3-540- In ????, editor, Cryp- 28114-2. ISSN 0302-9743 tographic Hardware and (print), 1611-3349 (elec- Embedded Systems–CHES tronic). LCCN QA76.9.A25 2009, pages 1–17. Springer- C79 2005; QA76.9 .A25; Verlag, Berlin, Germany / QA76.9 C79 2005; QA76.9 Heidelberg, Germany / Lon- C794 2005; QA76.9; In- don, UK / etc., 2009. ISBN ternet. URL http:/ ???? LCCN ???? URL ??? /www.springerlink.com/ ?. REFERENCES 443

Klivans:2009:CHL tors / Guang Gong, Thomas A. Berson, and Douglas R. [KS09b] Adam R. Klivans and Stinson — Adaptive-attack Alexander A. Sherstov. norm for decorrelation and Cryptographic hardness for super-pseudorandomness / learning intersections of Serge Vaudenay — Guess- halfspaces. Journal of work and variation distance Computer and System Sci- as measures of cipher se- ences, 75(1):2–12, Jan- curity / John O. Pliam uary 2009. CODEN JC- — Modeling linear char- SSBM. ISSN 0022-0000 acteristics of substitution- (print), 1090-2724 (elec- permutation networks / tronic). URL http:// Liam Keliher, Henk Mei- www.sciencedirect.com/ jer, and Stafford Tavares science/article/pii/S0022000008000706. — Strong linear depen- Kelsey:2000:YND dence and unbiased distri- bution of non-propagative [KSF00] John Kelsey, Bruce Schneier, vectors / Yuliang Zheng and and Niels Ferguson. Yarrow- Xian-Mo Zhang — Secu- 160: Notes on the design rity of E2 against truncated and analysis of the Yarrow differential cryptanalysis / cryptographic pseudoran- Shiho Moriai . . . [et al..] dom number generator. In — Key-schedule cryptanal- Heys and Adams [HA00], ysis of DEAL / John Kelsey pages 13–33. ISBN 3-540- and Bruce Schneier — Ef- 67185-4. ISSN 0302-9743 ficient evaluation of secu- (print), 1611-3349 (elec- rity against generalized in- tronic). LCCN QA267.A1 terpolation attack / Kazu- L43 no.1758. URL http: maro Aoki — Efficient im- //www.counterpane.com/ plementation of cryptosys- yarrow-notes.html; http: tems based on non-maximal //www.schneier.com/paper- imaginary quadratic or- yarrow.html.Contents:A ders / Detlef Huhnlein — universal encryption stan- Improving and extending dard / Helena Handschuh the Lim/Lee exponentia- and Serge Vaudenay — tion algorithm / Biljana Yarrow-160: notes on the Cubaleska, Andreas Rieke, design and analysis of the and Thomas Hermann — Yarrow cryptographic pseu- Software optimization of dorandom number genera- decorrelation module / Fab- tor / John Kelsey, Bruce rice Noilhan — Pseudonym Schneier, and Niels Fergu- systems / Anna Lysyan- son — Elliptic curve pseu- skaya . . . [et al.] — Uncon- dorandom sequence genera- ditionally secure proactive REFERENCES 444

secret sharing scheme with http://link.springer- combinatorial structures / ny.com/link/service/series/ Douglas R. Stinson and R. 0558/papers/2384/23840497. Wei — Protecting a mobile pdf. agent’s route against collu- sions / Dirk Westhoff . . . [et Kogan:2006:PRS al.] — Photuris: design cri- [KSW06] Noam Kogan, Yuval Shavitt, teria / William Allen Simp- and Avishai Wool. A prac- son. tical revocation scheme for Kang:2001:PSK broadcast encryption using smartcards. ACM Trans- [KSHY01] Ju-Sung Kang, Sang-Uk actions on Information and Shin, Dowon Hong, and System Security, 9(3):325– Okyeon Yi. Provable secu- 351, August 2006. CODEN rity of KASUMI and 3GPP ATISBQ. ISSN 1094-9224 encryption mode f8. Lecture (print), 1557-7406 (elec- Notes in Computer Science, tronic). 2248:255–271, 2001. CO- DEN LNCSD9. ISSN 0302- Kelsey:2000:SCC 9743 (print), 1611-3349 (electronic). URL http: [KSWH00] John Kelsey, Bruce Schneier, //link.springer-ny.com/ David Wagner, and Chris link/service/series/0558/ Hall. Side channel crypt- bibs/2248/22480255.htm; analysis of product ciphers. http://link.springer- Journal of Computer Secu- ny.com/link/service/series/ rity, 8(2–3):141–158, ???? 0558/papers/2248/22480255. 2000. CODEN JCSIET. pdf. ISSN 0926-227X (print), 1875-8924 (electronic). Kumar:2002:APS Konstantinou:2002:SLE [KSR02] M. V. N. Ashwin Kumar, K. Srinathan, and C. Pandu [KSZ02] Elisavet Konstantinou, Yian- Rangan. Asynchronous per- nis Stamatiou, and Chris- fectly secure computation tos Zaroliagis. A soft- tolerating generalized ad- ware library for elliptic versaries. Lecture Notes curve cryptography. Lecture in Computer Science, 2384: Notes in Computer Science, 497–??, 2002. CODEN 2461:625–??, 2002. CO- LNCSD9. ISSN 0302- DEN LNCSD9. ISSN 0302- 9743 (print), 1611-3349 9743 (print), 1611-3349 (electronic). URL http: (electronic). URL http: //link.springer-ny.com/ //link.springer-ny.com/ link/service/series/0558/ link/service/series/0558/ bibs/2384/23840497.htm; bibs/2461/24610625.htm; REFERENCES 445

http://link.springer- Kogan:2006:IER ny.com/link/service/series/ 0558/papers/2461/24610625.[KT06] Noam Kogan and Tamir pdf. Tassa. Improved efficiency for revocation schemes via Kuribayashi:2000:WSB Newton interpolation. ACM Transactions on Informa- [KT00] Minoru Kuribayashi and tion and System Secu- Hatsukazu Tanaka. A wa- rity, 9(4):461–486, Novem- termarking scheme based ber 2006. CODEN ATISBQ. on the characteristic of ad- ISSN 1094-9224 (print), dition among DCT coeffi- 1557-7406 (electronic). cients. Lecture Notes in Ku:2003:TSA Computer Science, 1975: 1–??, 2000. CODEN [KTC03] Wei-Chi Ku, Hao-Chuan LNCSD9. ISSN 0302- Tsai, and Shuai-Min Chen. 9743 (print), 1611-3349 Two simple attacks on (electronic). URL http: Lin–Shen–Hwang’s strong- //link.springer-ny.com/ password authentication link/service/series/0558/ protocol. Operating Sys- bibs/1975/19750001.htm; tems Review, 37(4):26–31, http://link.springer- October 2003. CODEN OS- ny.com/link/service/series/ RED8. ISSN 0163-5980 0558/papers/1975/19750001. (print), 1943-586X (elec- pdf. tronic). Kobayashi:2007:AIG Kuribayashi:2001:NAF [KTT07] Katsuki Kobayashi, Nao- [KT01] M. Kuribayashi and H. Tanaka. fumi Takagi, and Kazuyoshi A new anonymous finger- Takagi. An algorithm for printing scheme with high inversion in GF(2m)suit- enciphering rate. Lecture able for implementation us- Notes in Computer Science, ing a polynomial multi- 2247:30–??, 2001. CO- ply instruction on GF(2). DEN LNCSD9. ISSN 0302- In Kornerup and Muller 9743 (print), 1611-3349 [KM07], pages 105–112. (electronic). URL http: ISBN 0-7695-2854-6. ISSN //link.springer-ny.com/ 1063-6889. LCCN ???? link/service/series/0558/ URL http://www.lirmm. bibs/2247/22470030.htm; fr/arith18/. http://link.springer- Ku:2002:IIB ny.com/link/service/series/ 0558/papers/2247/22470030.[Ku02] Wei-Chi Ku. An im- pdf. proved ID-based authenti- REFERENCES 446

cation and key distribution (print), 1611-3349 (elec- protocol. Lecture Notes tronic). in Computer Science, 2344: 375–??, 2002. CODEN Kuhn:2002:OTD LNCSD9. ISSN 0302-9743 [Kuh02a] Markus Kuhn. Opti- (print), 1611-3349 (elec- cal time-domain eavesdrop- tronic). URL http:// ping risks of CRT displays. link.springer.de/link/ In IEEE, editor, Proceed- service/series/0558/bibs/ ings: 2002 IEEE Sympo- 2344/23440375.htm; http: sium on Security and Pri- //link.springer.de/link/ vacy, 12-15 May, 2002, service/series/0558/papers/ Berkeley, California, pages . 2344/23440375.pdf 3–18. IEEE Computer So- Ku:2004:HBS ciety Press, 1109 Spring Street, Suite 300, Silver [Ku04] Wei-Chi Ku. A hash-based Spring, MD 20910, USA, strong-password authentica- 2002. ISBN 0-7695-1543- tion scheme without using 6. LCCN QA76.9.A25 I34 Smart Cards. Operating 2002. URL http://www.cl. Systems Review, 38(1):29– cam.ac.uk/~mgk25/ieee02- 34, January 2004. CODEN optical.pdf. IEEE Com- OSRED8. ISSN 0163-5980 puter Society Order Number (print), 1943-586X (elec- PR01543. tronic). Kuhn:2002:ICM Kuhn:2000:PCL [K¨uh02b] Ulrich K¨uhn. Improved [Kuh00] Markus G. Kuhn. Prob- cryptanalysis of MISTY1. abilistic counting of large Lecture Notes in Computer digital signature collec- Science, 2365:61–??, 2002. tions. In USENIX [USE00d], CODEN LNCSD9. ISSN page ?? ISBN 1-880446- 0302-9743 (print), 1611- 18-9. LCCN ???? URL 3349 (electronic). URL http://www.usenix.org/ http://link.springer-ny. publications/library/proceedings/ com/link/service/series/ sec2000/kuhn.html. 0558/bibs/2365/23650061. htm; http://link.springer- Kuhn:2001:CRR ny.com/link/service/series/ [K¨uh01] Ulrich K¨uhn. Crypt- 0558/papers/2365/23650061. analysis of reduced-round pdf. MISTY. Lecture Notes in Kuhn:2008:BSS Computer Science, 2045: 325–329, 2001. CODEN [K¨uh08] Ulrich K¨uhn. Breaking the LNCSD9. ISSN 0302-9743 Shin–Shin–Rhee remotely REFERENCES 447

keyed encryption schemes. Kurosawa:2001:MRP Information Processing Let- ters, 105(6):236–240, March [Kur01] Kaoru Kurosawa. Multi- 16, 2008. CODEN IF- recipient public-key encryp- PLAT. ISSN 0020-0190 tion with shortened cipher- (print), 1872-6119 (elec- text. Lecture Notes in tronic). Computer Science, 2274: 48–??, 2001. CODEN Kukorelly:2001:PAL LNCSD9. ISSN 0302- 9743 (print), 1611-3349 [Kuk01] Zsolt Kukorelly. The piling- (electronic). URL http: up approximation in lin- //link.springer-ny.com/ ear cryptanalysis. IEEE link/service/series/0558/ Transactions on Informa- bibs/2274/22740048.htm; tion Theory, 47(7):2812– http://link.springer- 2823, July 2001. CODEN ny.com/link/service/series/ IETTAW. ISSN 0018-9448 0558/papers/2274/22740048. (print), 1557-9654 (elec- pdf. tronic). Kusters:2002:DCP Kumagai:2007:RSK [K¨us02] Ralf K¨usters. On the de- cidability of cryptographic [Kum07] J. Kumagai. A robotic protocols with open-ended sentry for korea’s demilita- data structures. Lecture rized zone. IEEE Spectrum, Notes in Computer Science, 44(3):16–17, March 2007. 2421:515–??, 2002. CODEN CODEN IEESAM. ISSN LNCSD9. ISSN 0302-9743 0018-9235 (print), 1939- (print), 1611-3349 (elec- 9340 (electronic). tronic). URL http:// Kundur:2001:WDI link.springer.de/link/ service/series/0558/bibs/ [Kun01] Deepa Kundur. Water- 2421/24210515.htm; http: marking with diversity: In- //link.springer.de/link/ sights and implications. service/series/0558/papers/ IEEE MultiMedia, 8(4):46– 2421/24210515.pdf. 52, October 2001. CODEN Kuo:2001:AOS IEMUE4. ISSN 1070-986X (print), 1941-0166 (elec- [KV01] H. Kuo and I. Verbauwhede. tronic). URL http://dlib. Architectural optimization computer.org/mu/books/ for a 1.82gbits/sec VLSI im- mu2001/pdf/u4046.pdf; plementation of the AES http://www.computer.org/ Rijndael algorithm. Lec- multimedia/mu2001/u4046abs. ture Notes in Computer Sci- htm. ence, 2162:51–??, 2001. CO- REFERENCES 448

DEN LNCSD9. ISSN 0302- Koshiba:2000:SEP 9743 (print), 1611-3349 (electronic). URL http: [KW00] Takeshi Koshiba and Os- //link.springer-ny.com/ amu Watanabe. Strong link/service/series/0558/ encryption of public key bibs/2162/21620051.htm; cryptosystems based on http://link.springer- weak randomness hypothe- ny.com/link/service/series/ ses. S¯urikaisekikenky¯usho 0558/papers/2162/21620051. K¯oky¯uroku, 1148(1148):118– pdf. 123, 2000. Theoretical foun- dations of computer science: toward a paradigm for com- Komninos:2007:ALS puting in the 21st century (Japanese) (Kyoto, 2000). [KVD07] Nikos Komninos, Dim- itrios D. Vergados, and Knudsen:2002:IC Christos Douligeris. Au- [KW02] Lars Knudsen and David thentication in a layered se- Wagner. Integral crypt- curity approach for mobile analysis. Lecture Notes in ad hoc networks. Comput- Computer Science, 2365: ers & Security, 26(5):373– 112–??, 2002. CODEN 380, August 2007. CODEN LNCSD9. ISSN 0302- CPSEDU. ISSN 0167-4048 9743 (print), 1611-3349 (print), 1872-6208 (elec- (electronic). URL http: tronic). URL https:// //link.springer-ny.com/ www.sciencedirect.com/ link/service/series/0558/ science/article/pii/S0167404807000041. bibs/2365/23650112.htm; http://link.springer- Kejariwal:2009:ELL ny.com/link/service/series/ 0558/papers/2365/23650112. [KVN+09] Arun Kejariwal, Alexan- pdf. der V. Veidenbaum, Alexan- Karlof:2003:HMM dru Nicolau, Milind Girkar, Xinmin Tian, and Hideki [KW03] Chris Karlof and David Saito. On the exploita- Wagner. Hidden Markov tion of loop-level paral- model cryptanalysis. In lelism in embedded appli- Walter et al. [WKP03], cations. ACM Transac- pages 17–34. CODEN tions on Embedded Com- LNCSD9. ISBN 3-540- puting Systems, 8(2):10:1– 40833-9. ISSN 0302-9743 10:??, January 2009. CO- (print), 1611-3349 (elec- DEN ???? ISSN 1539-9087 tronic). LCCN TK7895.E42. (print), 1558-3465 (elec- URL http://link.springer- tronic). ny.com/link/service/series/ REFERENCES 449

0558/tocs/t2779.htm; Kwon:2003:EDS http://www.springerlink. com/openurl.asp?genre= [Kwo03b] Taekyoung Kwon. Erratum issue&issn=0302-9743&volume= to: “Digital signature al- 2779; http://www.springerlink. gorithm for securing digi- com/openurl.asp?genre= tal identities”: [Inform. Pro- volume&id=doi:10.1007/ cess. Lett. 82 (2002) 247– b13240. 252]. Information Process- ing Letters, 88(4):201–202, Keromytis:2006:COS November 30, 2003. CO- [KWDB06] Angelos D. Keromytis, Ja- DEN IFPLAT. ISSN 0020- son L. Wright, Theo De 0190 (print), 1872-6119 Raadt, and Matthew Burn- (electronic). See [Kwo02]. side. Cryptography as an Kumar:2006:ODS operating system service: a case study. ACM Transac- [KWP06] Sandeep Kumar, T. Wollinger, tions on Computer Systems, and C. Paar. Optimum 24(1):1–38, February 2006. digit serial GF(2m)multi- CODEN ACSYEC. ISSN pliers for curve-based cryp- 0734-2071 (print), 1557- tography. IEEE Transac- 7333 (electronic). tions on Computers, 55(10): 1306–1311, October 2006. Kwon:2002:DSA CODEN ITCOB4. ISSN 0018-9340 (print), 1557- [Kwo02] Taekyoung Kwon. Digital 9956 (electronic). URL signature algorithm for se- http://ieeexplore.ieee. curing digital identities. In- org/stamp/stamp.jsp?tp= formation Processing Let- &arnumber=1683761. ters, 82(5):247–252, June 15, 2002. CODEN IFPLAT. Wong:2001:MCC ISSN 0020-0190 (print), [kWpLwW01] Wai kit Wong, Lap piu 1872-6119 (electronic). See Lee, and Kwok wo Wong. erratum [Kwo03b]. A modified chaotic cryp- Kwok:2003:WBC tographic method. Com- puter Physics Communica- [Kwo03a] Sai Ho Kwok. Watermark- tions, 138(3):234–236, Au- based copyright protection gust 15, 2001. CODEN system security. Commu- CPHCBZ. ISSN 0010-4655 nications of the Associa- (print), 1879-2944 (elec- tion for Computing Machin- tronic). URL http:// ery, 46(10):98–101, October www.sciencedirect.com/ 2003. CODEN CACMA2. science/article/pii/S001046550100220X. ISSN 0001-0782 (print), See comment and reply 1557-7317 (electronic). [AMRP04,´ WLW04]. REFERENCES 450

Kun:2000:SMA Katz:2001:UEC [KY01a] Jonathan Katz and Moti [KXD00] Yang Kun, Guo Xin, and Yung. Unforgeable en- Liu Dayou. Security in mo- cryption and chosen cipher- bile agent system: problems text secure modes of op- and approaches. Operating eration. Lecture Notes in Systems Review, 34(1):21– Computer Science, 1978: 28, January 2000. CODEN 284–??, 2001. CODEN OSRED8. ISSN 0163-5980 LNCSD9. ISSN 0302- (print), 1943-586X (elec- 9743 (print), 1611-3349 tronic). (electronic). URL http: //link.springer-ny.com/ Kamat:2009:TPW link/service/series/0558/ bibs/1978/19780284.htm; [KXTZ09] Pandurang Kamat, Wenyuan http://link.springer- Xu, Wade Trappe, and ny.com/link/service/series/ Yanyong Zhang. Tempo- 0558/papers/1978/19780284. ral privacy in wireless sensor pdf. networks: Theory and prac- tice. ACM Transactions on Kavut:2001:SCP Sensor Networks, 5(4):28:1– [KY01b] Sel¸cuk Kavut and Melek D. 28:??, November 2009. CO- Y¨ucel. On some crypto- DEN ???? ISSN 1550-4859 graphic properties of Ri- (print), 1550-4867 (elec- jndael. Lecture Notes in tronic). Computer Science, 2052: 300–??, 2001. CODEN Katz:2000:CCS LNCSD9. ISSN 0302- 9743 (print), 1611-3349 [KY00] Jonathan Katz and Moti (electronic). URL http: Yung. Complete char- //link.springer-ny.com/ acterization of security link/service/series/0558/ notions for probabilistic bibs/2052/20520300.htm; private-key encryption. In http://link.springer- ACM [ACM00], pages 245– ny.com/link/service/series/ 254. ISBN 1-58113-184- 0558/papers/2052/20520300. 4. URL http://www. pdf. acm.org/pubs/articles/ Kiayias:2001:PRB proceedings/stoc/335305/ p245-katz/p245-katz.pdf; [KY01c] Aggelos Kiayias and Moti http://www.acm.org/pubs/ Yung. Polynomial recon- citations/proceedings/ struction based cryptogra- stoc/335305/p245-katz/. phy. Lecture Notes in ACM order number 508000. Computer Science, 2259: REFERENCES 451

129–??, 2001. CODEN http://link.springer- LNCSD9. ISSN 0302- ny.com/link/service/series/ 9743 (print), 1611-3349 0558/papers/2274/22740172. (electronic). URL http: pdf. //link.springer-ny.com/ link/service/series/0558/ Katz:2002:TCB bibs/2259/22590129.htm; [KY02a] Jonathan Katz and Moti http://link.springer- Yung. Threshold cryp- ny.com/link/service/series/ tosystems based on fac- 0558/papers/2259/22590129. toring. Lecture Notes in pdf. Computer Science, 2501: Kiayias:2001:SPP 192–??, 2002. CODEN LNCSD9. ISSN 0302-9743 [KY01d] Aggelos Kiayias and Moti (print), 1611-3349 (elec- Yung. Self protecting pi- tronic). URL http:// rates and black-box traitor link.springer.de/link/ tracing. In Kilian [Kil01a], service/series/0558/bibs/ pages 63–?? ISBN 3-540- 2501/25010192.htm; http: 42456-3 (paperback). LCCN //link.springer.de/link/ QA76.9.A25 C79 2001; service/series/0558/papers/ QA267.A1 L43 no.2139. 2501/25010192.pdf. UK£47.00. URL http: Kiayias:2002:CHB //link.springer-ny.com/ link/service/series/0558/[KY02b] Aggelos Kiayias and Moti bibs/2139/21390063.htm; Yung. Cryptographic hard- http://link.springer- ness based on the de- ny.com/link/service/series/ coding of Reed–Solomon 0558/papers/2139/21390063. codes. Lecture Notes in pdf. Computer Science, 2380: 232–??, 2002. CODEN Kurosawa:2001:LCI LNCSD9. ISSN 0302- [KY01e] Kaoru Kurosawa and Takuya 9743 (print), 1611-3349 Yoshida. Linear code im- (electronic). URL http: plies public-key traitor trac- //link.springer-ny.com/ ing. Lecture Notes in link/service/series/0558/ Computer Science, 2274: bibs/2380/23800232.htm; 172–??, 2001. CODEN http://link.springer- LNCSD9. ISSN 0302- ny.com/link/service/series/ 9743 (print), 1611-3349 0558/papers/2380/23800232. (electronic). URL http: pdf. //link.springer-ny.com/ Kim:2002:PAA link/service/series/0558/ bibs/2274/22740172.htm; [KY02c] Hyun-Sung Kim and Kee- REFERENCES 452

Young Yoo. Parallel al- ?? ISBN 1-4244-5814- gorithm and architecture 5, 1-4244-5816-1. LCCN for public-key cryptosys- TK7870 2009. URL http: tem. Lecture Notes in //ieeexplore.ieee.org/ Computer Science, 2510: servlet/opac?punumber= 145–??, 2002. CODEN 5412667. LNCSD9. ISSN 0302-9743 Kang:2001:PMT (print), 1611-3349 (elec- tronic). URL http:// [KYHC01] Ju-Sung Kang, Okyeon Yi, link.springer.de/link/ Dowon Hong, and Hyun- service/series/0558/bibs/ sook Cho. Pseudorandom- 2510/25100145.htm; http: ness of MISTY-type trans- //link.springer.de/link/ formations and the block service/series/0558/papers/ cipher KASUMI. Lecture 2510/25100145.pdf. Notes in Computer Science, Katz:2003:SPA 2119:60–??, 2001. CO- DEN LNCSD9. ISSN 0302- [KY03] Jonathan Katz and Moti 9743 (print), 1611-3349 Yung. Scalable protocols for (electronic). URL http: authenticated group key ex- //link.springer-ny.com/ change. In Boneh [Bon03], link/service/series/0558/ pages 110–125. CODEN bibs/2119/21190060.htm; LNCSD9. ISBN 3-540- http://link.springer- 40674-3. ISSN 0302-9743 ny.com/link/service/series/ (print), 1611-3349 (elec- 0558/papers/2119/21190060. tronic). LCCN QA76.9.A25 pdf. C79 2003. URL http: //link.springer-ny.com/ Kabatnik:2001:LSD link/service/series/0558/ tocs/t2729.htm; http: [KZ01] M. Kabatnik and A. Zu- //www.springerlink.com/ genmaier. Location stamps openurl.asp?genre=issue& for digital signatures: a issn=0302-9743&volume= new service for mobile tele- 2729; http://www.springerlink. phone networks. Lecture com/openurl.asp?genre= Notes in Computer Science, volume&id=doi:10.1007/ 2094:20–??, 2001. CO- b11817. DEN LNCSD9. ISSN 0302- Kamal:2009:FIN 9743 (print), 1611-3349 (electronic). URL http: [KY09] A. A. Kamal and A. M. //link.springer-ny.com/ Youssef. An FPGA imple- link/service/series/0558/ mentation of the NTRU- bibs/2094/20940020.htm; Encrypt cryptosystem. In http://link.springer- IEEE [IEE09a], pages 209– ny.com/link/service/series/ REFERENCES 453

0558/papers/2094/20940020. and palmprint. Interna- pdf. tional Journal of Image and Graphics (IJIG), 9(2):251– Kamp:2003:DEB 270, April 2009. CODEN [KZ03] J. Kamp and D. Zucker- ???? ISSN 0219-4678. man. Deterministic extrac- Ladd:2006:SPS tors for bit-fixing sources [Lad06] David Ladd. A soft- and exposure-resilient cryp- ware procurement and se- tography. In IEEE [IEE03], curity primer. IEEE Secu- pages 92–101. CODEN rity & Privacy, 4(6):71–73, ASFPDV. ISBN 0-7695- November/December 2006. 2040-5. ISSN 0272-5428. CODEN ???? ISSN LCCN QA76 .S979 2003. 1540-7993 (print), 1558- URL http://ieeexplore. 4046 (electronic). ieee.org/iel5/8767/27770/ 01238184.pdf?isnumber= Lafe:2000:CAT 27770&prod=CNF&arnumber= 1238184&arSt=+92&ared=+ [Laf00] Olu Lafe. Cellular au- 101&arAuthor=Kamp%2C+J. tomata transforms: theory %3B+Zuckerman%2C+D.; and applications in multi- http://ieeexplore.ieee. media compression, encryp- org/xpls/abs_all.jsp?isnumber= tion and modeling,volume 27770&arnumber=1238184& MMSA16 of Multimedia sys- count=66&index=11. IEEE tems and applications se- Computer Society Order ries. Kluwer Academic Number PR02040. Publishers, Dordrecht, The Netherlands, 2000. ISBN Kamp:2007:DEB 0-7923-7857-1. xii + 177 pp. LCCN QA267.5.C45 [KZ07] Jesse Kamp and David L34 2000. Zuckerman. Determin- istic extractors for bit- Laih:2003:ACA fixing sources and exposure- [Lai03] Chi Sung Laih, editor. resilient cryptography. SIAM Advances in Cryptology— Journal on Computing,36 ASIACRYPT 2003: 9th In- (5):1231–1247, ???? 2007. ternational Conference on CODEN SMJCAT. ISSN the Theory and Applica- 0097-5397 (print), 1095- tion of Cryptology and In- 7111 (electronic). formation Security, Taipei, Kumar:2009:UAU Taiwan, November 30– December 4, 2003: Pro- [KZ09] Ajay Kumar and David ceedings, volume 2894 of Zhang. User authentica- Lecture Notes in Computer tion using fusion of face Science. Springer-Verlag, REFERENCES 454

Berlin, Germany / Heidel- 33(3):267–273, ???? 1991. berg, Germany / London, CODEN ???? ISSN 0017- UK / etc., 2003. CO- 0895 (print), 1469-509X DEN LNCSD9. ISBN 3-540- (electronic). 20592-6. ISSN 0302-9743 (print), 1611-3349 (elec- Lam:2001:CCN tronic). LCCN QA76.9.A25 I555 2003. URL http: [Lam01] Kwok Yan Lam. Cryp- //link.springer-ny.com/ tography and computational link/service/series/0558/ number theory,volume20 tocs/t2894.htm; http: of Progress in computer //www.springerlink.com/ science and applied logic. openurl.asp?genre=issue& Birkh¨auser Verlag, Basel, issn=0302-9743&volume= Switzerland, 2001. ISBN 3- 2894; http://www.springerlink. 7643-6510-2, 0-8176-6510-2. com/openurl.asp?genre= viii + 378 pp. LCCN QA268 volume&id=doi:10.1007/ .C77 2001. b94617. Lambert:2007:SLG Laird:2007:THL [Lam07] David Lambert. Super lit- [Lai07] Cameron Laird. Taking a tle giant book of secret codes. hard-line approach to en- Sterling Pub. Co., New cryption. Computer, 40(3): York, NY, USA, 2007. ISBN 13–15, March 2007. CO- 1-4027-3739-4 (paperback). DEN CPTRB4. ISSN 287 pp. LCCN Z103.3 .L36 0018-9162 (print), 1558- 2007. URL http://www. 0814 (electronic). loc.gov/catdir/enhancements/ fy0738/2007276461-d.html. Lai:2008:JIA Landau:2000:CST [Lai08] Charlie Lai. Java insecurity: Accounting for subtleties [Lan00a] Susan Landau. Com- that can compromise code. munications security for IEEE Software, 25(1):13– the Twenty-first Century: 19, January/February 2008. The Advanced Encryp- CODEN IESOEG. ISSN tion Standard. Notices of 0740-7459 (print), 0740- the American Mathemati- 7459 (electronic). cal Society, 47(4):450–459, Lamont:1991:UFC April 2000. CODEN AM- NOAN. ISSN 0002-9920 [Lam91] P. J. C. Lamont. Unique fac- (print), 1088-9477 (elec- torization in Cayley arith- tronic). URL http://www. metics and cryptology. Glas- ams.org/notices/200004/ gow Mathematical Journal, fea-landau.pdf. REFERENCES 455

Landau:2000:STT 0558/papers/1878/18780363. pdf. [Lan00b] Susan Landau. Standing the test of time: The Data Landau:2004:PNS Encryption Standard. No- [Lan04a] Susan Landau. Polynomi- tices of the American Math- als in the nation’s service: ematical Society, 47(3):341– Using algebra to design the 349, March 2000. CODEN Advanced Encrypted Stan- AMNOAN. ISSN 0002-9920 dard. American Mathemati- (print), 1088-9477 (elec- cal Monthly, 111(2):89–117, tronic). http://www.ams.org/notices/200003/fea-February 2004. CODEN landau.pdf. AMMYAE. ISSN 0002-9890 (print), 1930-0972 (elec- Landau:2000:TOD tronic). URL http:// [Lan00c] Susan Landau. Technical research.sun.com/people/ opinion: designing cryp- slandau/maa1.pdf; http: tography for the new cen- //www.esat.kuleuven.ac. tury. Communications of be/~rijmen/rijndael; the Association for Com- http://www.rsasecurity. puting Machinery, 43(5): com/rsalabs/faq3-1.html. 115, May 2000. CODEN Landau:2004:SLE CACMA2. ISSN 0001-0782 (print), 1557-7317 (elec- [Lan04b] Susan Landau. Secu- tronic). URL http://www. rity, liberty, and elec- acm.org/pubs/citations/ tronic communications. In journals/cacm/2000-43- Franklin [Fra04], pages 355– 5/p115-landau/. ?? CODEN LNCSD9. ISBN 3-540-22668-0. ISSN Lanet:2000:ITS 0302-9743 (print), 1611- 3349 (electronic). LCCN [Lan00d] Jean-Louis Lanet. Invited 10.1007/b99099. URL talk: Are smart cards the http://www.springerlink. ideal domain for applying com/openurl.asp?genre= formal methods? Lecture issue&issn=0302-9743&volume= Notes in Computer Science, 3152; http://www.springerlink. 1878:363–??, 2000. CO- com/openurl.asp?genre= DEN LNCSD9. ISSN 0302- volume&id=doi:10.1007/ 9743 (print), 1611-3349 b99099. (electronic). URL http: Lakshminarayanan:2008:SUC //link.springer-ny.com/ link/service/series/0558/[LAPS08] Karthik Lakshminarayanan, bibs/1878/18780363.htm; Daniel Adkins, Adrian Per- http://link.springer- rig, and Ion Stoica. Secur- ny.com/link/service/series/ ing user-controlled routing REFERENCES 456

infrastructures. IEEE/ACM IAHCEX. ISSN 1058-6180 Transactions on Network- (print), 1934-1547 (elec- ing, 16(3):549–561, June tronic). 2008. CODEN IEANEP. ISSN 1063-6692 (print), Lavoue:2009:LRM 1558-2566 (electronic). [Lav09] Guillaume Lavou´e. A lo- cal roughness measure for Laud:2005:STS 3D meshes and its appli- [Lau05] Peeter Laud. Secrecy types cation to visual masking. for a simulatable crypto- ACM Transactions on Ap- graphic library. In Mead- plied Perception, 5(4):21:1– ows and Syverson [MS05b], 21:??, January 2009. CO- pages 26–35. ISBN 1-59593- DEN ???? ISSN 1544-3558 226-7. LCCN QA76.9.A25. (print), 1544-3965 (elec- ACM order number 459050. tronic). Laud:2008:CSC Lawton:2005:MAH [Lau08a] Peeter Laud. On the [Law05] George Lawton. E-mail au- computational soundness of thentication is here, but cryptographically masked has it arrived yet? Com- flows. ACM SIGPLAN No- puter, 38(11):17–19, Novem- tices, 43(1):337–348, Jan- ber 2005. CODEN CP- uary 2008. CODEN SIN- TRB4. ISSN 0018-9162 ODQ. ISSN 0362-1340 (print), 1558-0814 (elec- (print), 1523-2867 (print), tronic). URL http://csdl. 1558-1160 (electronic). computer.org/comp/mags/ co/2005/11/ry017.pdf. Laughlin:2008:CRC Lawson:2009:SCA [Lau08b] Robert B. Laughlin. The crime of reason: and the [Law09a] Nate Lawson. Side-channel closing of the scientific attacks on cryptographic mind. Basic Books, New software. IEEE Secu- York, NY, USA, 2008. ISBN rity & Privacy, 7(6):65–68, 0-465-00507-1. 186 (est.) pp. November/December 2009. LCCN JC598 .L38 2008. CODEN ???? ISSN 1540-7993 (print), 1558- Lavington:2006:FCD 4046 (electronic). [Lav06] Simon Lavington. In the Lawson:2009:TAG footsteps of Colossus: a de- scription of Oedipus. IEEE [Law09b] Nate Lawson. Timing attack Annals of the History of in Google Keyczar library. Computing, 28(2):44–55, Web site., 2009. URL http: April/June 2006. CODEN //rdist.root.org/2009/ REFERENCES 457

05/28/timing-attack-in- Leveiller:2001:CNF google-keyczar-library. Li:2004:QAU [LBGZ01] Sabine Leveiller, Joseph Boutros, Philippe Guil- [LB04] Xiaoyu Li and Howard Bar- lot, and Gilles Z´emor. num. Quantum authentica- Cryptanalysis of nonlin- tion using entangled states. ear filter generators with International Journal of {0, 1}-metric Viterbi de- Foundations of Computer coding. Lecture Notes in Science (IJFCS), 15(4):609– Computer Science, 2260: ??, August 2004. CODEN 402–??, 2001. CODEN IFCSEN. ISSN 0129-0541 LNCSD9. ISSN 0302- (print), 1793-6373 (elec- 9743 (print), 1611-3349 tronic). (electronic). URL http: //link.springer-ny.com/ Lindskog:2005:DIT link/service/series/0558/ [LB05] Stefan Lindskog and Anna bibs/2260/22600402.htm; Brunstr¨om. Design and http://link.springer- implementation of a tun- ny.com/link/service/series/ able encryption service 0558/papers/2260/22600402. for networked applications. pdf. Technical report 2005:03, Chalmers tekniska h¨ogskola, Leveiller:2002:CNF G¨oteborg, Sweden, 2005. 17 pp. [LBGZ02] Sabine Leveiller, Joseph Lee:2000:UBN Boutros, Philippe Guil- lot, and Gilles Z´emor. [LBA00] J. A. N. Lee, C. Burke, Cryptanalysis of nonlin- and D. Anderson. The ear filter generators with US Bombes, NCR, Joseph {0, 1}-metric Viterbi de- Desch, and 600 WAVES: coding. Lecture Notes in the first reunion of the Computer Science, 2288: US Naval Computing Ma- 50–??, 2002. CODEN chine Laboratory. IEEE An- LNCSD9. ISSN 0302- nals of the History of Com- 9743 (print), 1611-3349 puting, 22(3):27–41, July/ (electronic). URL http: September 2000. CODEN //link.springer-ny.com/ IAHCEX. ISSN 1058- link/service/series/0558/ 6180 (print), 1934-1547 bibs/2288/22880050.htm; (electronic). URL http: http://link.springer- //ieeexplore.ieee.org/ ny.com/link/service/series/ iel5/85/18655/00859524. 0558/papers/2288/22880050. pdf. pdf. REFERENCES 458

Laufer:2000:SSC Lu:2004:XMS

[LBR00] Konstantin L¨aufer, Ger- [LC04b] Eric Jui-Lin Lu and Rai- ald Baumgartner, and Vin- Fu Chen. An XML mul- cent F. Russo. Safe struc- tisignature scheme. Applied tural conformance for Java. Mathematics and Compu- The Computer Journal,43 tation, 149(1):1–14, Febru- (6):469–481, ???? 2000. ary 5, 2004. CODEN CODEN CMPJA6. ISSN AMHCBQ. ISSN 0096-3003 0010-4620 (print), 1460- (print), 1873-5649 (elec- 2067 (electronic). URL tronic). http://www3.oup.co.uk/ Lu:2005:ERU computer_journal/hdb/Volume_ 43/Issue_06/430469.sgm. [LC05a] Rongxing Lu and Zhenfu abs.html; http://www3. Cao. Efficient remote user oup.co.uk/computer_journal/ authentication scheme using hdb/Volume_43/Issue_06/ smart card. Computer Net- pdf/430469.pdf. works (Amsterdam, Nether- lands: 1999), 49(4):535– Laih:2003:COP 540, November 15, 2005. [LC03] C. S. Laih and S. Y. Chiou. CODEN ???? ISSN Cryptanalysis of an op- 1389-1286 (print), 1872- timized protocol for mo- 7069 (electronic). bile network authentication Lu:2005:NDA and security. Information Processing Letters, 85(6): [LC05b] Rongxing Lu and Zhenfu 339–341, March 31, 2003. Cao. A new deniable au- CODEN IFPLAT. ISSN thentication protocol from 0020-0190 (print), 1872- bilinear pairings. Applied 6119 (electronic). Mathematics and Com- putation, 168(2):954–961, Lin:2004:SOT September 15, 2005. CO- [LC04a] Min-Hui Lin and Chin- DEN AMHCBQ. ISSN Chen Chang. A secure 0096-3003 (print), 1873- one-time password authen- 5649 (electronic). tication scheme with low- Long:2005:DTC computation for mobile communications. Operating [LCC05] Yu Long, Zhenfu Cao, and Systems Review, 38(2):76– Kefei Chen. A dynamic 84, April 2004. CODEN threshold commercial key OSRED8. ISSN 0163-5980 escrow scheme based on (print), 1943-586X (elec- conic. Applied Mathemat- tronic). ics and Computation, 171 REFERENCES 459

(2):972–982, December 15, 00847-0. ISSN 0302-9743 2005. CODEN AMHCBQ. (print), 1611-3349 (elec- ISSN 0096-3003 (print), tronic). LCCN QA76.9.A25 1873-5649 (electronic). C822 2003. URL http: //link.springer-ny.com/ Lu:2007:NPL link/service/series/0558/ [LCD07] Rongxing Lu, Zhenfu Cao, tocs/t2612.htm; http: and Xiaolei Dong. A new //www.springerlink.com/ practical limited identity- openurl.asp?genre=issue& based encryption scheme. issn=0302-9743&volume= Fundamenta Informaticae, 2612. 80(4):461–474, December Levi:2004:UNC 2007. CODEN FUMAAJ. ISSN 0169-2968 (print), [LCK04] Albert Levi, M. Ufuk 1875-8681 (electronic). Caglayan, and Cetin K. Koc. Use of nested certifi- Lee:2001:SEK cates for efficient, dynamic, and trust preserving pub- [LCK01] Byung-Rae Lee, Kyung-Ah lic key infrastructure. ACM Chang, and Tai-Yun Kim. Transactions on Informa- A secure and efficient key tion and System Security, escrow protocol for mobile 7(1):21–59, February 2004. communications. Lecture CODEN ATISBQ. ISSN Notes in Computer Science, 1094-9224 (print), 1557- 2073:433–??, 2001. CO- 7406 (electronic). DEN LNCSD9. ISSN 0302- 9743 (print), 1611-3349 Lee:2004:DEB (electronic). URL http: //link.springer-ny.com/ [LCP04] Chang-Doo Lee, Bong-Jun link/service/series/0558/ Choi, and Kyoo-Seok Park. bibs/2073/20730433.htm; Design and evaluation of a http://link.springer- block encryption algorithm ny.com/link/service/series/ using dynamic-key mecha- 0558/papers/2073/20730433. nism. Future Generation pdf. Computer Systems, 20(2): 327–338, February 16, 2004. Lee:2003:APS CODEN FGSEVI. ISSN 0167-739X (print), 1872- [LCK03] Jung-Yeun Lee, Jung Hee 7115 (electronic). Cheon, and Seungjoo Kim. An analysis of proxy sig- Lim:2009:OPG natures: Is a secure chan- nel necessary? In Joye [LCS09] Sun Sun Lim, Hichang [Joy03b], pages 68–79. CO- Cho, and Milagros Rivera DEN LNCSD9. ISBN 3-540- Sanchez. Online privacy, REFERENCES 460

government surveillance and Lu:2005:RTP national ID cards. Commu- nications of the Association [LCZ05c] RongXing Lu, ZhenFu Cao, for Computing Machinery, and HaoJin Zhu. A robust 52(12):116–120, December (k, n) + 1 threshold proxy 2009. CODEN CACMA2. signature scheme based on ISSN 0001-0782 (print), factoring. Applied Math- 1557-7317 (electronic). ematics and Computation, 166(1):35–45, July 6, 2005. Li:2008:CAM CODEN AMHCBQ. ISSN 0096-3003 (print), 1873- [LCX08] Zhongwen Li, Qiong Chen, 5649 (electronic). and Yang Xiang. A cross- authentication model and Li:2001:CCB implementation. Interna- tional Journal of Computer [LD01] Zi Chen Li and Yi Qi Dai. Systems Science and Engi- Cryptoanalysis of cryptosys- neering, 23(3):??, May 2008. tems based on the quadratic CODEN CSSEEI. ISSN residue problem. J. Ts- 0267-6192. inghua Univ., 41(7):80–82, 2001. CODEN QDXKE8. Lu:2005:TUS ISSN 1000-0054. [LCZ05a] Rong Xing Lu, Zhen Fu Lai:2004:SGS Cao, and Yuan Zhou. Threshold undeniable sig- [LD04] Chun-Pong Lai and Cun- nature scheme based on sheng Ding. Several gen- conic. Applied Mathemat- eralizations of Shamir’s se- ics and Computation, 162 cret sharing scheme. Inter- (1):165–177, March 4, 2005. national Journal of Foun- CODEN AMHCBQ. ISSN dations of Computer Sci- 0096-3003 (print), 1873- ence (IJFCS), 15(2):445– 5649 (electronic). ??, April 2004. CODEN IFCSEN. ISSN 0129-0541 Lu:2005:PBM (print), 1793-6373 (elec- tronic). [LCZ05b] RongXing Lu, ZhenFu Cao, and Yuan Zhou. Lavoue:2007:SSW Proxy blind multi-signature scheme without a secure [LDD07] Guillaume Lavou´e, Flo- channel. Applied Mathemat- rence Denis, and Florent ics and Computation, 164 Dupont. Subdivision surface (1):179–187, May 5, 2005. watermarking. Computers CODEN AMHCBQ. ISSN and Graphics, 31(3):480– 0096-3003 (print), 1873- 492, June 2007. CODEN 5649 (electronic). COGRD2. ISSN 0097-8493 REFERENCES 461

(print), 1873-7684 (elec- News, 34(4):15–17, De- tronic). URL http:// cember 2003. CODEN www.sciencedirect.com/ SIGNDM. ISSN 0163-5700 science/article/pii/S0097849307000507. (print), 1943-5827 (elec- tronic). See [Buc01, Buc04]. Law:2006:SBB [LDH06] Yee Wei Law, Jeroen Lee:2003:BRBb Doumen, and Pieter Har- [Lee03b] Andrew C. Lee. Book re- tel. Survey and bench- view: Modern Cryptogra- mark of block ciphers for phy, Probabilistic Proofs and wireless sensor networks. Pseudorandomness Algo- ACM Transactions on Sen- rithms and Combinatorics, sor Networks, 2(1):65–93, vol 17, by Oded Goldre- February 2006. CODEN ich. Springer Verlag, 1999. ???? ISSN 1550-4859 ACM SIGACT News, 34(4): (print), 1550-4867 (elec- 32–34, December 2003. CO- tronic). DEN SIGNDM. ISSN 0163- Lindquist:2004:JCS 5700 (print), 1943-5827 (electronic). See [Gol99]. [LDM04] T. Lindquist, M. Diarra, and B. Millard. A Java cryp- Lee:2003:CS tography service provider [Lee03c] Michael Lee. Cryptanaly- implementing one-time pad sis of the SIGABA. Master (INIDP04). Proceedings of of Science in Computer Sci- the Annual Hawaii Interna- ence, Department of Com- tional Conference on Sys- puter Science, University tem Sciences, CONF37:189, of California, Santa Bar- 2004. CODEN ???? ISSN bara, Santa Barbara, CA, 1060-3425. USA, June 2003. viii + 49 Lee:2001:AES pp. URL ucsb.curby.net/ [Lee01] Jee Hea Lee. Authenticated broadcast/thesis/thesis. encryption in the symmet- pdf. ric and asymmetric settings. Lee:2004:SPM Vita thesis (Ph.D.), Univer- sity of California, San Diego, [Lee04a] Hyang-Sook Lee. A self- San Diego, CA, USA, 2001. pairing map and its ap- plications to cryptography. Lee:2003:BRBa Applied Mathematics and [Lee03a] Andrew C. Lee. Book re- Computation, 151(3):671– view: Introduction to Cryp- 678, April 15, 2004. CO- tography, by Johannes A. DEN AMHCBQ. ISSN Buchmann. Springer Ver- 0096-3003 (print), 1873- lag, 2001. ACM SIGACT 5649 (electronic). REFERENCES 462

Lee:2004:ACA Lenstra:2001:USM

[Lee04b] Pil Joong Lee, editor. Ad- [Len01] Arjen K. Lenstra. Unbe- vances in cryptology, ASI- lievable security. matching ACRYPT 2004: 10th In- AES security using pub- ternational Conference on lic key systems. Lecture the Theory and Applica- Notes in Computer Science, tion of Cryptology and In- 2248:67–??, 2001. CO- formation Security, Jeju Is- DEN LNCSD9. ISSN 0302- land, Korea, December 5–9, 9743 (print), 1611-3349 2004: Proceedings,volume (electronic). URL http: 3329 of Lecture Notes in //link.springer-ny.com/ Computer Science. Spring- link/service/series/0558/ er-Verlag, Berlin, Ger- bibs/2248/22480067.htm; many / Heidelberg, Ger- http://link.springer- many / London, UK / etc., ny.com/link/service/series/ 2004. CODEN LNCSD9. 0558/papers/2248/22480067. ISBN 3-540-23975-8 (pa- pdf. perback). ISSN 0302-9743 Leroy:2002:BVJ (print), 1611-3349 (elec- tronic). LCCN QA76.9.A25 [Ler02] Xavier Leroy. Bytecode veri- I555 2004; QA75.5 .L48 fication on Java smart cards. no. 3329. URL http:// Software—Practice and Ex- springerlink.metapress. perience, 32(4):319–340, com/openurl.asp?genre= April 10, 2002. CODEN issue&issn=0302-9743&volume= SPEXBL. ISSN 0038-0644 3329; http://www.springerlink. (print), 1097-024X (elec- com/openurl.asp?genre= tronic). URL http://www3. volume&id=doi:10.1007/ interscience.wiley.com/ b104116. cgi-bin/abstract/91016433/ Lehtinen:2006:CSB START; http://www3.interscience. wiley.com/cgi-bin/fulltext? [Leh06] Rick Lehtinen. Computer ID=91016433&PLACEBO=IE. Security Basics. O’Reilly pdf. & Associates, Inc., 103a Levy:2001:CHC Morris Street, Sebastopol, CA 95472, USA, Tel: +1 [Lev01] Steven Levy. Crypto: how 707 829 0515, and 90 Sher- the code rebels beat the gov- man Street, Cambridge, MA ernment, saving privacy in 02140, USA, Tel: +1 617 the digital age. Viking, New 354 5800, second edition, York, NY, USA, 2001. ISBN 2006. ISBN 0-596-00669-1. 0-670-85950-8, 0-14-024432- 306 (est.) pp. LCCN ???? 8. viii + 356 pp. LCCN EUR 38.00. QA76.9.A25 L49 2001. REFERENCES 463

Levy:2002:C 802.11 wireless LAN. Com- puters & Security, 26(5): [Lev02] Stephen Levy. Crypto.Pen- 401–409, August 2007. CO- guin, London, UK and New DEN CPSEDU. ISSN 0167- York, NY, USA, 2002. ISBN 4048 (print), 1872-6208 0-14-024432-8. 368 pp. (electronic). URL https:/ LCCN ???? /www.sciencedirect.com/ Lewand:2000:CM science/article/pii/S0167404807000053. Liaw:2004:SPA [Lew00] Robert Edward Lewand. Cryptological Mathematics. [LFW04] Horng-Twu Liaw, Shiou- Mathematical Association Wei Fan, and Wei-Chen of America, Washington, Wu. A simple password au- DC, USA, 2000. ISBN 0- thentication using a poly- 88385-719-7. xiv + 1999 pp. nomial. Operating Systems LCCN QA268 .L48 2000. Review, 38(4):74–79, Octo- UK£19.95. URL http:// ber 2004. CODEN OS- www.loc.gov/catdir/description/ RED8. ISSN 0163-5980 cam041/00105256.html; (print), 1943-586X (elec- http://www.loc.gov/catdir/ tronic). toc/cam041/00105256.html. Lekkas:2004:CNL Lee:2003:PKB [LG04] Dimitris Lekkas and Dim- [LF03] M. C. Lee and Chun-Kan itris Gritzalis. Cumula- Fung. A public-key based tive notarization for long- authentication and key es- term preservation of dig- tablishment protocol cou- ital signatures. Comput- pled with a client puz- ers & Security, 23(5):413– zle. Journal of the Amer- 424, July 2004. CODEN ican Society for Informa- CPSEDU. ISSN 0167-4048 tion Science and Technol- (print), 1872-6208 (elec- ogy: JASIST, 54(9):810– tronic). URL https:// 823, July 2003. CODEN www.sciencedirect.com/ JASIEF. ISSN 1532-2882 science/article/pii/S0167404804001014. (print), 1532-2890 (elec- tronic). Levi:2009:ULM

Lei:2007:CSA [LG09] Albert Levi and Can Berk G¨uder. Understanding [LFHT07] Jun Lei, Xiaoming Fu, Di- the limitations of S/MIME eter Hogrefe, and Jianrong digital signatures for e- Tan. Comparative stud- mails: a GUI based ap- ies on authentication and proach. Computers & key exchange methods for Security, 28(3–4):105–120, REFERENCES 464

May/June 2009. CODEN Lin:2003:PAS CPSEDU. ISSN 0167-4048 (print), 1872-6208 (elec- [LH03] Chun-Li Lin and Tzonelih tronic). URL https:// Hwang. A password authen- www.sciencedirect.com/ tication scheme with secure science/article/pii/S0167404808000783. password updating. Com- puters & Security, 22(1):68– Lan:2010:RNG 72, January 2003. CODEN CPSEDU. ISSN 0167-4048 [LGKY10] Jingjing Lan, Wang Ling (print), 1872-6208 (elec- Goh, Zhi Hui Kong, and tronic). URL https:// Kiat Seng Yeo. A random www.sciencedirect.com/ number generator for low science/article/pii/S0167404803001147. power cryptographic appli- Lee:2004:CUS cation. In 2010 Interna- tional SoC Design Confer- [LH04] Narn-Yih Lee and Pei-Hsiu ence (ISOCC), pages 328– Ho. Convertible undeni- 331. IEEE Computer So- able signature with sub- ciety Press, 1109 Spring liminal channels. Applied Street, Suite 300, Sil- Mathematics and Compu- ver Spring, MD 20910, tation, 158(1):169–175, Oc- USA, 2010. URL http: tober 25, 2004. CODEN //ieeexplore.ieee.org/ AMHCBQ. ISSN 0096-3003 stamp/stamp.jsp?tp=&arnumber= (print), 1873-5649 (elec- 5682906. tronic).

Lang:2001:CMS Lyda:2007:UEA

[LGS01] Ulrich Lang, Dieter Goll- [LH07] Robert Lyda and James mann, and Rudolf Schreiner. Hamrock. Using entropy Cryptography and middle- analysis to find encrypted ware security. Lecture and packed malware. IEEE Notes in Computer Science, Security & Privacy, 5(2):40– 2229:408–??, 2001. CO- 45, March/April 2007. CO- DEN LNCSD9. ISSN 0302- DEN ???? ISSN 1540-7993 9743 (print), 1611-3349 (print), 1558-4046 (elec- (electronic). URL http: tronic). //link.springer-ny.com/ Li:2008:ISS link/service/series/0558/ bibs/2229/22290408.htm; [LHC08] Chua-Ta Li, Min-Shiang http://link.springer- Hwang, and Yen-Ping Chu. ny.com/link/service/series/ Improving the security of a 0558/papers/2229/22290408. secure anonymous routing pdf. protocol with authenticated REFERENCES 465

key exchange for ad hoc net- logarithms. Applied Math- works. International Jour- ematics and Computation, nal of Computer Systems 139(2–3):343–349, July 15, Science and Engineering,23 2003. CODEN AMHCBQ. (3):??, May 2008. CODEN ISSN 0096-3003 (print), CSSEEI. ISSN 0267-6192. 1873-5649 (electronic). Lu:2005:NPS Lin:2003:NRU

[LHH05] Eric Jui-Lin Lu, Min-Shiang [LHL03b] Iuon-Chang Lin, Min- Hwang, and Cheng-Jian Shiang Hwang, and Li- Huang. A new proxy sig- Hua Li. A new remote nature scheme with revoca- user authentication scheme tion. Applied Mathematics for multi-server architec- and Computation, 161(3): ture. Future Generation 799–806, February 25, 2005. Computer Systems, 19(1): CODEN AMHCBQ. ISSN 13–22, January 2003. CO- 0096-3003 (print), 1873- DEN FGSEVI. ISSN 0167- 5649 (electronic). 739X (print), 1872-7115 (electronic). Lee:2002:TDC Lee:2004:SAA [LHL+02] Seonhee Lee, Seokhie Hong, Sangjin Lee, Jongin Lim, [LHL04a] Cheng-Chi Lee, Min-Shiang and Seonhee Yoon. Trun- Hwang, and I-En Liao. A cated differential cryptanal- server assisted authentica- ysis of Camellia. Lecture tion protocol for detecting Notes in Computer Science, error vectors. Operating 2288:32–??, 2002. CO- Systems Review, 38(2):93– DEN LNCSD9. ISSN 0302- 96, April 2004. CODEN 9743 (print), 1611-3349 OSRED8. ISSN 0163-5980 (electronic). URL http: (print), 1943-586X (elec- //link.springer-ny.com/ tronic). link/service/series/0558/ bibs/2288/22880032.htm; Lee:2004:ETP http://link.springer- [LHL04b] Tian-Fu Lee, Tzonelih ny.com/link/service/series/ Hwang, and Chun-Li Lin. 0558/papers/2288/22880032. Enhanced three-party en- pdf. crypted key exchange with- Lee:2003:NKA out server public keys. Com- puters & Security, 23(7): [LHL03a] Cheng-Chi Lee, Min-Shiang 571–577, October 2004. CO- Hwang, and Li-Hua Li. DEN CPSEDU. ISSN 0167- A new key authentication 4048 (print), 1872-6208 scheme based on discrete (electronic). URL https:/ REFERENCES 466

/www.sciencedirect.com/ Lee:2002:FRU science/article/pii/S0167404804001762. [LHY02] Cheng-Chi Lee, Min-Shiang Lu:2008:PTZ Hwang, and Wei-Peng Yang. A flexible remote user au- [LHL+08] Li Lu, Jinsong Han, Yun- thentication scheme using hao Liu, Lei Hu, Jin-Peng Smart Cards. Operating Huai, Lionel Ni, and Jian Systems Review, 36(3):46– Ma. Pseudo trust: Zero- 52, July 2002. CODEN knowledge authentication in OSRED8. ISSN 0163-5980 anonymous P2Ps. IEEE (print), 1943-586X (elec- Transactions on Parallel tronic). and Distributed Systems, 19(10):1325–1337, October 2008. CODEN ITDSEO. Lee:2005:NBS ISSN 1045-9219 (print), 1558-2183 (electronic). [LHY05] Cheng-Chi Lee, Min-Shiang Hwang, and Wei-Pang Liu:2005:DBV Yang. A new blind signature based on the discrete loga- [LHS05] Hongmei Liu, Jiwu Huang, rithm problem for untrace- and Yun Q. Shi. DWT- ability. Applied Mathemat- based video data hiding ro- ics and Computation, 164 bust to MPEG compression (3):837–841, May 25, 2005. and frame loss. Interna- CODEN AMHCBQ. ISSN tional Journal of Image and 0096-3003 (print), 1873- Graphics (IJIG), 5(1):111– 5649 (electronic). ??, January 2005. CODEN ???? ISSN 0219-4678. Li:2001:NSA Lee:2009:NCA [Li01] Yifa Li. A new semantics of [LHT09] Cheng-Chi Lee, Min-Shiang authentication logic. Lecture Hwang, and Shiang-Feng Notes in Computer Science, Tzeng. A new convert- 2229:476–??, 2001. CO- ible authenticated encryp- DEN LNCSD9. ISSN 0302- tion scheme based on the 9743 (print), 1611-3349 ElGamal cryptosystem. In- (electronic). URL http: ternational Journal of Foun- //link.springer-ny.com/ dations of Computer Sci- link/service/series/0558/ ence (IJFCS), 20(2):351– bibs/2229/22290476.htm; 359, April 2009. CODEN http://link.springer- IFCSEN. ISSN 0129-0541 ny.com/link/service/series/ (print), 1793-6373 (elec- 0558/papers/2229/22290476. tronic). pdf. REFERENCES 467

Li:2005:ABPa ISSN 0164-1212 (print), 1873-1228 (electronic). URL [Li05] S. Z. Li, editor. Advances in http://www.elsevier.nl/ biometric person authentica- gej-ng/10/29/11/49/27/ tion: 5th Chinese conference 27/article.pdf; http: on biometric recognition, //www.elsevier.nl/gej- SINOBIOMETRICS 2004, ng/10/29/11/49/27/abstract. Guangzhou, China, Decem- html. ber 13–14, 2004, proceed- ings, volume 3338 of Lecture Linn:2000:TMM Notes in Computer Science. [Lin00b] John Linn. Trust models Springer-Verlag, Berlin, and management in public- Germany / Heidelberg, Ger- key infrastructures. Tech- many / London, UK / etc., nical report, RSA Data Se- 2005. CODEN LNCSD9. curity, Inc., Redwood City, ISBN 3-540-24029-2 (soft- CA,USA,November6, cover). ISSN 0302-9743 2000. 13 pp. URL ftp: (print), 1611-3349 (elec- //ftp.rsasecurity.com/ tronic). LCCN TK7882.B56 pub/pdfs/PKIPaper.pdf. C4 2004. URL http:/ /www.springerlink.com/ Lin:2001:HKA openurl.asp?genre=issue& issn=0302-9743&volume= [Lin01a] Chu-Hsing Lin. Hierarchi- 3338. cal key assignment with- out public-key cryptogra- Lieman:2005:CRW phy. Computers & Secu- [Lie05] Daniel Lieman. Cryptog- rity, 20(7):612–619, Octo- raphy in the real world ber 31, 2001. CODEN today. In Garrett and CPSEDU. ISSN 0167-4048 Lieman [GL05], pages 63– (print), 1872-6208 (elec- 72. ISBN 0-8218-3365- tronic). URL https:// 0. LCCN QA76.9.A25 www.sciencedirect.com/ P82 2005. URL http:// science/article/pii/S0167404801007118. www.loc.gov/catdir/toc/ Lin:2001:DWM fy0612/2005048178.html. Lin:2000:RTI [Lin01b] Phen-Lan Lin. Digital wa- termarking models for re- [Lin00a] Phen-Lan Lin. Robust solving rightful ownership transparent image water- and authenticating legiti- marking system with spa- mate customer. The Jour- tial mechanisms. The Jour- nal of Systems and Software, nal of Systems and Software, 55(3):261–271, January 15, 50(2):107–116, February 15, 2001. CODEN JSSODM. 2000. CODEN JSSODM. ISSN 0164-1212 (print), REFERENCES 468

1873-1228 (electronic). URL secure public-key encryp- http://www.elsevier.nl/ tion under general assump- gej-ng/10/29/11/54/27/ tions. Lecture Notes in 27/abstract.html; http: Computer Science, 2656: //www.elsevier.nl/gej- 241–254, 2003. CODEN ng/10/29/11/54/27/27/article. LNCSD9. ISSN 0302-9743 pdf. (print), 1611-3349 (elec- tronic). URL http://link. Lindell:2001:PCT springer.com/content/pdf/ [Lin01c] Yehuda Lindell. Parallel 10.1007/3-540-39200-9_ coin-tossing and constant- 15.pdf. round secure two-party com- Lin:2007:PFT putation. In Kilian [Kil01a], pages 171–?? ISBN 3-540- [Lin07] Jenn-Wei Lin. Provid- 42456-3 (paperback). LCCN ing fault-tolerant authen- QA76.9.A25 C79 2001; tication and authorization QA267.A1 L43 no.2139. in wireless mobile IP net- UK£47.00. URL http: works. The Journal of //link.springer-ny.com/ Systems and Software,80 link/service/series/0558/ (2):149–163, February 2007. bibs/2139/21390171.htm; CODEN JSSODM. ISSN http://link.springer- 0164-1212 (print), 1873- ny.com/link/service/series/ 1228 (electronic). 0558/papers/2139/21390171. Lee:2005:IEC pdf. [LJ05a] B. K. Lee and L. K. John. Lingmann:2002:DSK Implications of executing compression and encryp- [Lin02] Thomas Lingmann. Daten- tion applications on general verschl¨usselung: sichere purpose processors. IEEE Kommunikation mit Linux Transactions on Computers, und BSD: Security mit Open 54(7):917–922, July 2005. Source. (German) [Data en- CODEN ITCOB4. ISSN coding: Secure communica- 0018-9340 (print), 1557- tion with Linux and BSD: 9956 (electronic). URL Security with Open Source]. http://ieeexplore.ieee. C&L,B¨oblingen, Germany, org/stamp/stamp.jsp?tp= 2002. ISBN 3-932311-87-8 &arnumber=1432674. (??invalid checksum??). 476 (est.) pp. LCCN ???? Licks:2005:GAI Lindell:2003:SCC [LJ05b] Vinicius Licks and Ramiro Jordan. Geometric attacks [Lin03] Yehuda Lindell. A sim- on image watermarking sys- pler construction of CCA2- tems. IEEE MultiMedia,12 REFERENCES 469

(3):68–78, July/September Sung, and Sangjin Lee. Se- 2005. CODEN IEMUE4. curity analysis of the full- ISSN 1070-986X (print), round DDO-64 block cipher. 1941-0166 (electronic). The Journal of Systems and Software, 81(12):2328–2335, Li:2005:AWP December 2008. CODEN [LJL05] Zhitang Li, Huijun Jiang, JSSODM. ISSN 0164-1212 and Hanju Li. Active (print), 1873-1228 (elec- worm propagation model tronic). with discrete time. In Han Lee:2009:SAF et al. [HYZ05b], pages 122– ?? ISBN 981-270-153-2. [LKHL09] C. Lee, J. Kim, S. Hong, LCCN ???? URL http:// and Y.-S. Lee. Security eproceedings.worldscinet. analysis of the full-round com/9812701532/9812701532. CHESS-64 cipher suitable 0031.html. for pervasive computing en- vironments. J.UCS: Jour- Lee:2004:SSP nal of Universal Computer [LJY04] Jung-Seuk Lee, Jun-Cheol Science, 15(5):1007–??, ???? Jeon, and Kee-Young Yoo. 2009. CODEN ???? ISSN A security scheme for pro- 0948-6968. URL http: tecting security policies in //www.jucs.org/jucs_15_ firewall. Operating Sys- 5/security_analysis_of_ tems Review, 38(2):69–72, the. April 2004. CODEN OS- Lim:2001:SAW RED8. ISSN 0163-5980 (print), 1943-586X (elec- [LKJL01] Shin-Young Lim, Jeong-Ho tronic). Ko, Eun-Ah Jun, and Gang- Soo Lee. Specification and Ludwig:2001:FSE analysis of n-way key re- covery system by Extended [LK01] Stefan Ludwig and Winfried Cryptographic Timed Petri Kalfa. File system encryp- Net. The Journal of Systems tion with integrated user and Software, 58(2):93–106, management. Operating September 1, 2001. CODEN Systems Review, 35(4):88– JSSODM. ISSN 0164-1212 93, October 2001. CODEN (print), 1873-1228 (elec- OSRED8. ISSN 0163-5980 tronic). URL http://www. (print), 1943-586X (elec- elsevier.com/gej-ng/10/ tronic). 29/11/68/33/28/abstract. Lee:2008:SAF html. Lee:2003:PSAa [LKH+08] Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul [LKKY03a] Sung-Woon Lee, Woo-Hun REFERENCES 470

Kim, Hyun-Sung Kim, and gor, Jeffrey Dwoskin, and Kee-Young Yoo. Paralliz- Zhenghong Wang. Architec- able simple authenticated ture for protecting critical key agreement protocol. Op- secrets in microprocessors. erating Systems Review,37 ACM SIGARCH Computer (2):13–18, April 2003. CO- Architecture News, 33(2):2– DEN OSRED8. ISSN 0163- 13, May 2005. CODEN 5980 (print), 1943-586X CANED2. ISSN 0163-5964 (electronic). (print), 1943-5851 (elec- tronic). Lee:2003:PSAb Lee:2004:CUA [LKKY03b] Sung-Woon Lee, Woo-Hun Kim, Hyun-Sung Kim, and [LKY04] Sung-Woon Lee, Hyun-Sung Kee-Young Yoo. Paralliz- Kim, and Kee-Young Yoo. able simple authenticated Cryptanalysis of a user au- key agreement protocol. Op- thentication scheme using erating Systems Review,37 hash functions. Operating (3):17–22, July 2003. CO- Systems Review, 38(1):24– DEN OSRED8. ISSN 0163- 28, January 2004. CODEN 5980 (print), 1943-586X OSRED8. ISSN 0163-5980 (electronic). (print), 1943-586X (elec- tronic). Lee:2005:NIW Lee:2005:ENB [LKLK05] Joong-Jae Lee, Won Kim, Na-Young Lee, and Gye- [LKY05a] Sung-Woon Lee, Hyun-Sung Young Kim. A new Kim, and Kee-Young Yoo. incremental watermarking Efficient nonce-based re- based on dual-tree com- mote user authentication plex wavelet transform. scheme using smart cards. The Journal of Super- Applied Mathematics and computing, 33(1):133–140, Computation, 167(1):355– July 2005. CODEN JO- 361, August 5, 2005. CO- SUED. ISSN 0920-8542 DEN AMHCBQ. ISSN (print), 1573-0484 (elec- 0096-3003 (print), 1873- tronic). URL http:/ 5649 (electronic). /www.springerlink.com/ openurl.asp?genre=article& Lee:2005:EVB issn=0920-8542&volume= [LKY05b] Sung-Woon Lee, Hyun- 33&issue=1&spage=133. Sung Kim, and Kee-Young Lee:2005:APC Yoo. Efficient verifier- based key agreement proto- [LKM+05] Ruby B. Lee, Peter C. S. col for three parties without Kwan, John P. McGre- server’s public key. Applied REFERENCES 471

Mathematics and Computa- (print), 1611-3349 (elec- tion, 167(2):996–1003, Au- tronic). gust 15, 2005. CODEN AMHCBQ. ISSN 0096-3003 Luo:2004:UUR (print), 1873-5649 (elec- [LKZ+04] Haiyun Luo, Jiejun Kong, tronic). Petros Zerfos, Songwu Lu, Lee:2005:IHA and Lixia Zhang. URSA: ubiquitous and robust ac- [LKY05c] Sung-Woon Lee, Hyun-Sung cess control for mobile ad Kim, and Kee-Young Yoo. hoc networks. IEEE/ACM Improvement of HWWM- Transactions on Network- authenticated key agree- ing, 12(6):1049–1063, De- ment protocol. Applied cember 2004. CODEN Mathematics and Compu- IEANEP. ISSN 1063-6692 tation, 162(3):1315–1320, (print), 1558-2566 (elec- March 25, 2005. CODEN tronic). AMHCBQ. ISSN 0096-3003 (print), 1873-5649 (elec- Lu:2001:DWC tronic). [LL01] Chun-Shien Lu and Hong- Lee:2005:ILL Yuan Mark Liao. Digital watermarking: a communi- [LKY05d] Sung-Woon Lee, Hyun- cations with side informa- Sung Kim, and Kee-Young tion perspective. Lecture Yoo. Improvement of Lee Notes in Computer Science, and Lee’s authenticated key 2195:927–??, 2001. CO- agreement scheme. Applied DEN LNCSD9. ISSN 0302- Mathematics and Compu- 9743 (print), 1611-3349 tation, 162(3):1049–1053, (electronic). URL http: March 25, 2005. CODEN //link.springer-ny.com/ AMHCBQ. ISSN 0096-3003 link/service/series/0558/ (print), 1873-5649 (elec- bibs/2195/21950927.htm; tronic). http://link.springer- ny.com/link/service/series/ Lim:2000:GTC 0558/papers/2195/21950927. [LKYL00] Seongan Lim, Seungjoo pdf. Kim, Ikkwon Yie, and Lou:2002:SMS Hongsub Lee. A gener- alized Takagi-cryptosystem [LL02] Der-Chyuan Lou and Jiang- with a modulus of the form Lung Liu. Steganographic prqs. Lecture Notes in method for secure commu- Computer Science, 1977: nications. Computers & Se- 283–294, 2000. CODEN curity, 21(5):449–460, Oc- LNCSD9. ISSN 0302-9743 tober 1, 2002. CODEN REFERENCES 472

CPSEDU. ISSN 0167-4048 ISSN 0096-3003 (print), (print), 1872-6208 (elec- 1873-5649 (electronic). tronic). URL https:// www.sciencedirect.com/ Lee:2004:CIB science/article/pii/S0167404802005151[LL04b]. Wei-Bin Lee and Kuan- Chieh Liao. Construct- Lee:2003:ISC ing identity-based cryp- [LL03] Pil Joong Lee and Chae Hoon tosystems for discrete log- Lim, editors. Informa- arithm based cryptosys- tion security and cryptol- tems. Journal of Net- ogy — ICISC 2002: 5th work and Computer Ap- International Conference, plications, 27(4):191–199, Seoul, Korea, November November 2004. CODEN 28–29, 2002: Revised Pa- JNCAF3. ISSN 1084-8045 pers, volume 2587 of Lec- (print), 1095-8592 (elec- ture Notes in Computer tronic). URL http:// Science. Springer-Verlag, www.sciencedirect.com/ Berlin, Germany / Heidel- science/article/pii/S1084804504000268. berg, Germany / London, Lee:2004:DIS UK / etc., 2003. CO- DEN LNCSD9. ISBN 3-540- [LL04c] Wongoo Lee and Jaekwang 00716-4. ISSN 0302-9743 Lee. Design and imple- (print), 1611-3349 (elec- mentation of secure e-mail tronic). LCCN QA76.9.A25 system using elliptic curve I32 2002. URL http: cryptosystem. Future Gen- //link.springer-ny.com/ eration Computer Systems, link/service/series/0558/ 20(2):315–326, February 16, tocs/t2587.htm; http: 2004. CODEN FGSEVI. //www.springerlink.com/ ISSN 0167-739X (print), openurl.asp?genre=issue& 1872-7115 (electronic). issn=0302-9743&volume= 2587. Also available via the Lim:2004:ISC World Wide Web. [LL04d] Jong In Lim and Dong Hoon Lee:2004:FIM Lee, editors. Information Security and Cryptology— [LL04a] Narn-Yih Lee and Ming- ICISC 2003: 6th Interna- Feng Lee. Further improve- tional Conference, Seoul, ment on the modified au- Korea, November 27–28, thenticated key agreement 2003: Revised Papers, scheme. Applied Mathe- volume 2971 of Lecture matics and Computation, Notes in Computer Science. 157(3):729–733, October 15, Springer-Verlag, Berlin, 2004. CODEN AMHCBQ. Germany / Heidelberg, Ger- REFERENCES 473

many / London, UK / etc., ther cryptanalysis of a re- 2004. CODEN LNCSD9. mote login authentication ISBN 3-540-21376-7. ISSN scheme based on geomet- 0302-9743 (print), 1611- ric approach. In Han 3349 (electronic). LCCN et al. [HYZ05b], pages 143– ???? URL http:/ ?? ISBN 981-270-153-2. /link.springer-ny.com/ LCCN ???? URL http:// link/service/series/0558/ eproceedings.worldscinet. tocs/t2971.htm; http: com/9812701532/9812701532. //www.springerlink.com/ 0031.html. openurl.asp?genre=issue& Lee:2006:ISC issn=0302-9743&volume= 2971; http://www.springerlink.[LL06] Wei-Bin Lee and Kuan- com/openurl.asp?genre= Chieh Liao. Improved volume&id=doi:10.1007/ self-certified group-oriented b96249. cryptosystem without a combiner. The Journal Lee:2005:CMA of Systems and Software, [LL05a] Keon-Jik Lee and Byeong- 79(4):502–506, April 2006. Jik Lee. Cryptanaly- CODEN JSSODM. ISSN sis of the modified au- 0164-1212 (print), 1873- thenticated key agreement 1228 (electronic). scheme. Applied Mathemat- Lu:2006:FBW ics and Computation, 170 (1):280–284, November 1, [LLC06a] Wei Lu, Hongtao Lu, and 2005. CODEN AMHCBQ. Fu-Lai Chung. Feature ISSN 0096-3003 (print), based watermarking using 1873-5649 (electronic). watermark template match. Applied Mathematics and Lee:2005:SSP Computation, 177(1):377– [LL05b] Narn-Yih Lee and Ming- 386, June 1, 2006. CODEN Feng Lee. The security of AMHCBQ. ISSN 0096-3003 a strong proxy signature (print), 1873-5649 (elec- scheme with proxy signer tronic). privacy protection. Applied Lu:2006:RDI Mathematics and Computa- tion, 161(3):807–812, Febru- [LLC06b] Wei Lu, Hongtao Lu, and ary 25, 2005. CODEN Fu-Lai Chung. Robust AMHCBQ. ISSN 0096-3003 digital image watermark- (print), 1873-5649 (elec- ing based on subsampling. tronic). Applied Mathematics and Computation, 181(2):886– Li:2005:FCR 893, October 15, 2006. CO- [LL05c] Ying Li and Jintao Li. Fur- DEN AMHCBQ. ISSN REFERENCES 474

0096-3003 (print), 1873- (print), 1943-586X (elec- 5649 (electronic). tronic). Li:2008:CRR Li:2004:CES

[LLCL08] Shujun Li, Chengqing Li, [LLH04] Li-Hua Li, Chi-Yu Liu, and Guanrong Chen, and Kwok- Min-Shiang Hwang. Crypt- Tung Lo. Cryptanalysis of analysis of an efficient secure the RCES/RSES image en- group signature scheme. Op- cryption scheme. The Jour- erating Systems Review,38 nal of Systems and Software, (4):66–69, October 2004. 81(7):1130–1143, July 2008. CODEN OSRED8. ISSN CODEN JSSODM. ISSN 0163-5980 (print), 1943- 0164-1212 (print), 1873- 586X (electronic). 1228 (electronic). Liao:2006:PAS Lee:2001:PBG [LLH06] I-En Liao, Cheng-Chi Lee, [LLH01] Eonkyung Lee, Sang Jin and Min-Shiang Hwang. Lee, and Sang Geun Hahn. A password authentication Pseudorandomness from scheme over insecure net- braid groups. In Kil- works. Journal of Computer ian [Kil01a], pages 486– and System Sciences, 72(4): ?? ISBN 3-540-42456- 727–740, June 2006. CO- 3 (paperback). LCCN DEN JCSSBM. ISSN 0022- QA76.9.A25 C79 2001; 0000 (print), 1090-2724 QA267.A1 L43 no.2139. (electronic). URL http:/ UK£47.00. URL http: /www.sciencedirect.com/ //link.springer-ny.com/ science/article/pii/S0022000005001157. link/service/series/0558/ Lesniewski-Laas:2005:SSS bibs/2139/21390486.htm; http://link.springer- [LLK05] Chris Lesniewski-Laas and ny.com/link/service/series/ M. Frans Kaashoek. SSL 0558/papers/2139/21390486. splitting: Securely serving pdf. data from untrusted caches. Computer Networks (Ams- Lee:2002:RUA terdam, Netherlands: 1999), [LLH02] Cheng-Chi Lee, Li-Hua Li, 48(5):763–779, August 5, and Min-Shiang Hwang. A 2005. CODEN ???? ISSN remote user authentication 1389-1286 (print), 1872- scheme using hash func- 7069 (electronic). tions. Operating Systems Li:2001:SPD Review, 36(4):23–29, Octo- ber 2002. CODEN OS- [LLL+01] Shujun Li, Qi Li, Wen- RED8. ISSN 0163-5980 minLi,XuanqinMou, REFERENCES 475

and Yuanlong Cai. Sta- cated key agreement proto- tistical properties of digi- cols from multi-linear forms. tal piecewise linear chaotic Applied Mathematics and maps and their roles in Computation, 159(2):317– cryptography and pseudo- 331, December 6, 2004. CO- random coding. Lecture DEN AMHCBQ. ISSN Notes in Computer Science, 0096-3003 (print), 1873- 2260:205–??, 2001. CO- 5649 (electronic). DEN LNCSD9. ISSN 0302- 9743 (print), 1611-3349 Li:2006:ESY (electronic). URL http: [LLLZ06a] Chengqing Li, Shujun Li, //link.springer-ny.com/ Der-Chyuan Lou, and Dan link/service/series/0558/ Zhang. Erratum to “On the bibs/2260/22600205.htm; security of the Yen-Guo’s http://link.springer- domino signal encryption ny.com/link/service/series/ algorithm (DSEA)” [The 0558/papers/2260/22600205. Journal of Systems and Soft- pdf. ware 79 (2006) 253–258]. Lee:2002:SEC The Journal of Systems and Software, 79(12):1789, De- [LLL02] Hyung-Woo Lee, Sung- cember 2006. CODEN JS- MinLee,andIm-Yeong SODM. ISSN 0164-1212 Lee. Secure electronic copy- (print), 1873-1228 (elec- right distribution with pub- tronic). See [LLLZ06b]. lic key based traitor trac- Li:2006:SYG ing. Lecture Notes in Computer Science, 2455: [LLLZ06b] Chengqing Li, Shujun Li, 324–??, 2002. CODEN Der-Chyuan Lou, and Dan LNCSD9. ISSN 0302- Zhang. On the security 9743 (print), 1611-3349 of the Yen–Guo’s domino (electronic). URL http: signal encryption algorithm //link.springer-ny.com/ (DSEA). The Journal of link/service/series/0558/ Systems and Software,79 bibs/2455/24550324.htm; (2):253–258, February 2006. http://link.springer- CODEN JSSODM. ISSN ny.com/link/service/series/ 0164-1212 (print), 1873- 0558/papers/2455/24550324. 1228 (electronic). See erra- pdf. tum [LLLZ06a]. Lee:2004:MPA Lindell:2002:CAB

[LLL04] Young-Ran Lee, Hyang- [LLR02] Yehuda Lindell, Anna Lysyan- Sook Lee, and Ho-Kyu skaya, and Tal Rabin. On Lee. Multi-party authenti- the composition of authenti- REFERENCES 476

cated Byzantine agreement. Liu:2005:SWA In ACM [ACM02], pages 514–523. ISBN 1-58113-495- [LLS05b] Sanya Liu, Zhenyu Liu, and 9. LCCN QA75.5 .A22 2002. Zhongren Su. Securing Web ACM order number 508020. application system: a so- lutionbasedonSMSfor Lindell:2006:CAB identifying users. In Han et al. [HYZ05b], pages 104– [LLR06] Yehuda Lindell, Anna Lysyan- ?? ISBN 981-270-153-2. skaya, and Tal Rabin. On LCCN ???? URL http:// the composition of authenti- eproceedings.worldscinet. cated Byzantine Agreement. com/9812701532/9812701532. Journal of the ACM, 53(6): 0031.html. 881–917, November 2006. Lee:2009:CET CODEN JACOAH. ISSN 0004-5411 (print), 1557- [LLS+09] Tian-Fu Lee, Jenn-Long 735X (electronic). Liu, Mei-Jiun Sung, Shiueng- Bien Yang, and Chia-Mei Lian:2007:MDE Chen. Communication- efficient three-party proto- [LLRW07] S. Lian, Z. Liu, Z. Ren, cols for authentication and and Z. Wang. Multi- key agreement. Comput- media data encryption in ers and Mathematics with block-based codecs. Inter- Applications, 58(4):641–648, national Journal of Com- August 2009. CODEN puter Applications, 29(1): CMAPDK. ISSN 0898-1221 18–24, 2007. ISSN 1206- (print), 1873-7668 (elec- 212X (print), 1925-7074 tronic). URL http:// (electronic). URL https: www.sciencedirect.com/ //www.tandfonline.com/ science/article/pii/S0898122109003757. doi/full/10.1080/1206212X. Li:2004:ABP 2007.11441828. [LLT+04] Stan Z. Li, Jianhuang Lai, Lee:2005:IWR Tieniu Tan, Guocan Feng, and Yunhong Wang, ed- [LLS05a] Choong-Hoon Lee, Heung- itors. Advances in Bio- Kyu Lee, and Youngho Suh. metric Person Authentica- Image watermarking resis- tion: 5th Chinese Confer- tant to combined geometric ence on Biometric Recog- and removal attacks. Inter- nition, SINOBIOMETRICS national Journal of Image 2004, Guangzhou, China, and Graphics (IJIG), 5(1): December 13–14, 2004: Pro- 37–??, January 2005. CO- ceedings, volume 3338 of DEN ???? ISSN 0219-4678. Lecture Notes in Computer REFERENCES 477

Science. Springer-Verlag, Liu:2008:SAM Berlin, Germany / Heidel- berg, Germany / London, [LLW08b] Hongjun Liu, Ping Luo, and UK / etc., 2004. CO- Daoshun Wang. A scalable DEN LNCSD9. ISBN 3-540- authentication model based 24029-2. ISSN 0302-9743 on public keys. Journal (print), 1611-3349 (elec- of Network and Computer tronic). LCCN TK7882.B56 Applications, 31(4):375–386, C4 2004. URL http:/ November 2008. CODEN /www.springerlink.com/ JNCAF3. ISSN 1084-8045 openurl.asp?genre=issue& (print), 1095-8592 (elec- issn=0302-9743&volume= tronic). URL http:// 3338; http://www.springerlink. www.sciencedirect.com/ com/openurl.asp?genre= science/article/pii/S1084804508000106. volume&id=doi:10.1007/ Li:2009:ATN b104239. [LLW09] Jiangtao Li, Ninghui Li, and Li:2005:ATN William H. Winsborough. Automated trust negotia- [LLW05] Jiangtao Li, Ninghui Li, and tion using cryptographic William H. Winsborough. credentials. ACM Trans- Automated trust negotia- actions on Information and tion using cryptographic System Security, 13(1):2:1– credentials. In Meadows and 2:??, October 2009. CODEN Syverson [MS05b], pages ATISBQ. ISSN 1094-9224 46–57. ISBN 1-59593-226-7. (print), 1557-7406 (elec- LCCN QA76.9.A25. ACM tronic). order number 459050. Lee:2006:DCK Liu:2008:DEA [LLY06] Patrick P. C. Lee, John C. S. Lui, and David K. Y. Yau. [LLW08a] Hongjun Liu, Ping Luo, Distributed collaborative and Daoshun Wang. A key agreement and authenti- distributed expansible au- cation protocols for dynamic thentication model based peer groups. IEEE/ACM on Kerberos. Journal of Transactions on Network- Network and Computer Ap- ing, 14(2):263–276, April plications, 31(4):472–486, 2006. CODEN IEANEP. November 2008. CODEN ISSN 1063-6692 (print), JNCAF3. ISSN 1084-8045 1558-2566 (electronic). (print), 1095-8592 (elec- Linares:2000:SAM tronic). URL http:// www.sciencedirect.com/ [LM00] Leandro Rodr´ıguez Li˜nares science/article/pii/S1084804508000027. and Carmen Garc´ıa Ma- REFERENCES 478

teo. A speaker authen- 62, March/June 2008. CO- tication module in Tel- DEN ???? ISSN 1932-2232 Correo. Lecture Notes in (print), 1932-2240 (elec- Computer Science, 1902: tronic). 375–??, 2000. CODEN LNCSD9. ISSN 0302- Li:2003:SCE 9743 (print), 1611-3349 [LMC+03] Shujun Li, Xuanqin Mou, (electronic). URL http: Yuanlong Cai, Zhen Ji, and //link.springer-ny.com/ Jihong Zhang. On the se- link/service/series/0558/ curity of a chaotic encryp- bibs/1902/19020375.htm; tion scheme: problems with http://link.springer- computerized chaos in fi- ny.com/link/service/series/ nite computing precision. 0558/papers/1902/19020375. Computer Physics Com- pdf. munications, 153(1):52–58, Lorenz:2002:SSG June 1, 2003. CODEN CPHCBZ. ISSN 0010-4655 [LM02] U. Lorenz and B. Monien. (print), 1879-2944 (elec- The secret of selective tronic). URL http:// game tree search, when us- www.sciencedirect.com/ ing random-error evalua- science/article/pii/S0010465502008755. tions. Lecture Notes in Computer Science, 2285: Lamenca-Martinez:2006:LNP 203–??, 2002. CODEN [LMHCETR06] Carlos Lamenca-Martinez, LNCSD9. ISSN 0302- Julio Cesar Hernandez- 9743 (print), 1611-3349 Castro, Juan M. Estevez- (electronic). URL http: Tapiador, and Arturo Rib- //link.springer-ny.com/ agorda. Lamar: a new pseu- link/service/series/0558/ dorandom number genera- bibs/2285/22850203.htm; tor evolved by means of ge- http://link.springer- netic programming. Lecture ny.com/link/service/series/ Notes in Computer Science, 0558/papers/2285/22850203. 4193:850–859, 2006. CO- pdf. DEN LNCSD9. ISSN 0302- Lavasani:2008:IFA 9743 (print), 1611-3349 (electronic). URL http: [LM08] Ahmad Lavasani and Reza //www.springerlink.com/ Mohammadi. Implement- content/c60q42qt2m035685/ ing a feasible attack against . ECC2K-130 certicom chal- Leitold:2001:MTN lenge (abstract only). ACM Communications in Com- [LMP+01] Herbert Leitold, Wolfgang puter Algebra, 42(1–2):61– Mayerwieser, Udo Payer, REFERENCES 479

Karl Christian Posch, Rein- Applied Mathematics and hard Posch, and Johannes Computation, 184(1):63–72, Wolkerstorfer. A 155 Mbps January 1, 2007. CODEN Triple-DES network encryp- AMHCBQ. ISSN 0096-3003 tor. Lecture Notes in (print), 1873-5649 (elec- Computer Science, 1965: tronic). 164–??, 2001. CODEN LNCSD9. ISSN 0302- Laskari:2005:TTC 9743 (print), 1611-3349 (electronic). URL http: [LMTV05] E. C. Laskari, G. C. Mele- //link.springer-ny.com/ tiou, D. K. Tasoulis, and link/service/series/0558/ M. N. Vrahatis. Trans- bibs/1965/19650164.htm; formations of two crypto- http://link.springer- graphic problems in terms ny.com/link/service/series/ of matrices. SIGSAM 0558/papers/1965/19650164. Bulletin (ACM Special In- pdf. terest Group on Symbolic and Algebraic Manipula- Lepinski:2005:FZK tion), 39(4):127–130, De- [LMS05] Matt Lepinski, Silvio Mi- cember 2005. CODEN cali, and Abhi Shelat. Fair- SIGSBZ. ISSN 0163-5824 zero knowledge. In Kil- (print), 1557-9492 (elec- ian [Kil05], pages 245– tronic). ?? CODEN LNCSD9. ISBN 3-540-24573-1 (soft- Lu:2005:CCA cover). ISSN 0302-9743 (print), 1611-3349 (elec- [LMV05] Yi Lu, Willi Meier, and tronic). LCCN QA76.9.A25 Serge Vaudenay. The T44 2005. URL http: conditional correlation at- //www.springerlink.com/ tack: a practical attack openurl.asp?genre=issue& on Bluetooth encryption. issn=0302-9743&volume= In Shoup [Sho05a], pages 3378; http://www.springerlink. 97–?? ISBN 3-540- com/openurl.asp?genre= 28114-2. ISSN 0302-9743 volume&id=doi:10.1007/ (print), 1611-3349 (elec- b106171. tronic). LCCN QA76.9.A25 Laskari:2007:AEC C79 2005; QA76.9 .A25; QA76.9 C79 2005; QA76.9 [LMSV07] E. C. Laskari, G. C. Mele- C794 2005; QA76.9; In- tiou, Y. C. Stamatiou, and ternet. URL http:/ M. N. Vrahatis. Apply- /www.springerlink.com/ ing evolutionary computa- openurl.asp?genre=issue& tion methods for the crypt- issn=0302-9743&volume= analysis of Feistel ciphers. 3621. REFERENCES 480

Li:2005:BPC on Information and Sys- tem Security, 11(4):22:1– [LMW05] Ninghui Li, John C. Mitchell, 22:??, July 2008. CODEN and William H. Winsbor- ATISBQ. ISSN 1094-9224 ough. Beyond proof-of- (print), 1557-7406 (elec- compliance: security anal- tronic). ysis in trust management. Journal of the ACM, 52(3): Lotspiech:2002:CFB 474–514, May 2005. CO- DEN JACOAH. ISSN 0004- [LNP02] Jeffrey Lotspiech, Stefan 5411 (print), 1557-735X Nusser, and Florian Pe- (electronic). stoni. Cover feature: Broad- cast encryption’s bright fu- Liu:2004:MBA ture. Computer, 35(8):57– 63, August 2002. CO- [LN04] Donggang Liu and Peng DEN CPTRB4. ISSN 0018- Ning. Multilevel µTESLA: 9162 (print), 1558-0814 Broadcast authentication (electronic). URL http: for distributed sensor net- //csdl.computer.org/dl/ works. ACM Transac- mags/co/2002/08/r8057. tions on Embedded Com- htm; http://csdl.computer. puting Systems, 3(4):800– org/dl/mags/co/2002/08/ 836, November 2004. CO- r8057.pdf; http://www. DEN ???? ISSN 1539-9087 computer.org/computer/ (print), 1558-3465 (elec- co2002/r8057abs.htm. tronic). Li:2002:HNP Levieil:2008:CTC [LNS02] Wen-Ching W. Li, Mats [LN08] Eric Levieil and David Nac- N¨aslund, and Igor E. Shpar- cache. Cryptographic test linski. Hidden number prob- correction. IEEE Secu- lem with the trace and bit rity & Privacy, 6(2):69–71, security of XTR and LUC. March/April 2008. CO- In Yung [Yun02a], pages DEN ???? ISSN 1540-7993 433–448. CODEN LNCSD9. (print), 1558-4046 (elec- ISBN 3-540-44050-X (pa- tronic). perback). ISSN 0302-9743 Liu:2008:ARL (print), 1611-3349 (elec- tronic). LCCN QA76.9.A25 [LNL+08] Donggang Liu, Peng Ning, C79 2002. URL http: An Liu, Cliff Wang, and //link.springer-ny.com/ Wenliang Kevin Du. Attack- link/service/series/0558/ resistant location estima- tocs/t2442.htm; http: tion in wireless sensor net- //www.springerlink.com/ works. ACM Transactions openurl.asp?genre=issue& REFERENCES 481

issn=0302-9743&volume= agricultural development in 2442. Laos. the cleanup project re- Loidreau:2000:SMC quired deciphering decades- old computer files. Scien- [Loi00] Pierre Loidreau. Strength- tific American, 285(2):66– ening McEliece cryptosys- 71, August 2001. CODEN tem. Lecture Notes in SCAMAC. ISSN 0036-8733 Computer Science, 1976: (print), 1946-7087 (elec- 585–598, 2000. CODEN tronic). URL http://www. LNCSD9. ISSN 0302-9743 sciam.com/2001/0801issue/ (print), 1611-3349 (elec- 2001/0801issue/0801hargrove. tronic). html. Lopez:2004:AAI Lindell:2000:PPD [LP00] Yehuda Lindell and Benny [LOP04] Javier Lopez, Rolf Oppliger, Pinkas. Privacy preserv- and G¨unther Pernul. Au- ing data mining. In Bel- thentication and authoriza- lare [Bel00], pages 36–?? tion infrastructures (AAIs): ISBN 3-540-67907-3. ISSN a comparative survey. Com- 0302-9743 (print), 1611- puters & Security, 23(7): 3349 (electronic). LCCN 578–590, October 2004. CO- QA76.9.A25 C79 2000 Bar. DEN CPSEDU. ISSN 0167- URL http://link.springer- 4048 (print), 1872-6208 ny.com/link/service/series/ (electronic). URL https:/ 0558/bibs/1880/18800036. /www.sciencedirect.com/ htm; http://link.springer- science/article/pii/S0167404804001828. ny.com/link/service/series/ Lopez:2006:UPK 0558/papers/1880/18800036. pdf. [Lop06] Javier Lopez. Unleashing public-key cryptography in Lysyanskaya:2001:AST wireless sensor networks. [LP01] Anna Lysyanskaya and Journal of Computer Se- Chris Peikert. Adaptive se- curity, 14(5):469–482, ???? curity in the threshold set- 2006. CODEN JCSIET. ting: From cryptosystems to ISSN 0926-227X (print), signature schemes. Lecture 1875-8924 (electronic). Notes in Computer Science, Lovering:2001:TKF 2248:331–??, 2001. CO- DEN LNCSD9. ISSN 0302- [Lov01] Daniel Lovering. Tam- 9743 (print), 1611-3349 ing the killing fields of (electronic). URL http: Laos: Live bombs from //link.springer-ny.com/ the Vietnam War continue link/service/series/0558/ to kill people and hamper bibs/2248/22480331.htm; REFERENCES 482

http://link.springer- the public-key encryption ny.com/link/service/series/ based on braid groups. 0558/papers/2248/22480331. Lecture Notes in Com- pdf. puter Science, 2656:477– 490, 2003. CODEN Labbe:2002:AIF LNCSD9. ISSN 0302-9743 [LP02a] Anna Labb´e and Annie (print), 1611-3349 (elec- P´erez. AES implementa- tronic). URL http://link. tion on FPGA: Time — springer.com/content/pdf/ flexibility tradeoff. Lecture 10.1007/3-540-39200-9_ Notes in Computer Science, 30.pdf. 2438:836–??, 2002. CO- DEN LNCSD9. ISSN 0302- Li:2005:MCK 9743 (print), 1611-3349 (electronic). URL http: [LPM05] Mingyan Li, Radha Pooven- //link.springer-ny.com/ dran, and David A. Mc- link/service/series/0558/ Grew. Minimizing center bibs/2438/24380836.htm; key storage in hybrid one- http://link.springer- way function based group ny.com/link/service/series/ key management with com- 0558/papers/2438/24380836. munication constraints. In- pdf. formation Processing Let- ters, 93(4):191–198, Febru- Luccio:2002:AC ary 28, 2005. CODEN IF- PLAT. ISSN 0020-0190 [LP02b] Fabrizio Luccio and Linda (print), 1872-6119 (elec- Pagli. From algorithms tronic). to cryptography. Lecture Notes in Computer Science, Law:2009:EEL 2286:15–??, 2002. CO- DEN LNCSD9. ISSN 0302- [LPV+09] Yee Wei Law, Marimuthu 9743 (print), 1611-3349 Palaniswami, Lodewijk Van (electronic). URL http: Hoesel, Jeroen Doumen, //link.springer-ny.com/ Pieter Hartel, and Paul link/service/series/0558/ Havinga. Energy-efficient bibs/2286/22860015.htm; link-layer jamming attacks http://link.springer- against wireless sensor net- ny.com/link/service/series/ work MAC protocols. ACM 0558/papers/2286/22860015. Transactions on Sensor pdf. Networks, 5(1):6:1–6:??, Lee:2003:CPK February 2009. CODEN ???? ISSN 1550-4859 [LP03] Eonkyung Lee and Je Hong (print), 1550-4867 (elec- Park. Cryptanalysis of tronic). REFERENCES 483

Lemke:2006:ESC USA, 2001. ISBN 0-12- 449968-6. xxv + 342 [LPW06] Kerstin Lemke, Christof pp. LCCN HD69.P75 L538 Paar, and Marko Wolf, ed- 2001. US$44.95. itors. Embedded security in Lemke-Rust:2007:MAP cars: securing current and future automotive IT appli- [LR07] Kerstin Lemke-Rust. Mod- cations. Springer-Verlag, els and Algorithms for Phys- Berlin, Germany / Heidel- ical Cryptanalysis,volume4 berg, Germany / London, of IT-Security.Europ¨aischer UK / etc., 2006. ISBN 3- Universit¨atsverlag, Bochum, 540-28384-6. x + 273 pp. Germany, 2007. ISBN 3- LCCN TL275.E53 2006. 89966-272-5. ISSN 1864- 1709. xiv + 232 pp. LCCN Li:2006:PMW ???? EUR 24.90. [LPZ06] Li Li, Zhigeng Pan, and Liskov:2002:TBC David Zhang. A pub- lic mesh watermarking al- [LRW02] Moses Liskov, Ronald L. gorithm based on addition Rivest, and David Wagner. property of Fourier Trans- Tweakable block ciphers. form. International Jour- In Yung [Yun02a], pages nal of Image and Graphics 31–46. CODEN LNCSD9. (IJIG), 6(1):35–??, January ISBN 3-540-44050-X (pa- 2006. CODEN ???? ISSN perback). ISSN 0302-9743 0219-4678. (print), 1611-3349 (elec- tronic). LCCN QA76.9.A25 Li:2008:DEO C79 2002. URL http:/ /link.springer.de/link/ [LQ08] Lvzhou Li and Daowen Qiu. service/series/0558/bibs/ Determining the equivalence 2442/24420031.htm; http: for one-way quantum finite //link.springer.de/link/ automata. Theoretical Com- service/series/0558/papers/ puter Science, 403(1):42–51, 2442/24420031.pdf. August 20, 2008. CODEN TCSCDI. ISSN 0304-3975 Lenstra:2001:SFR (print), 1879-2294 (elec- [LS01a] Arjen K. Lenstra and tronic). Igor E. Shparlinski. Se- Lientz:2001:BTP lective forgery of RSA sig- natures with fixed-pattern [LR01] Bennet P. Lientz and padding. Lecture Notes Kathryn P. Rea. Break- in Computer Science, 2274: through technology project 228–??, 2001. CODEN management.Academic LNCSD9. ISSN 0302- Press, New York, NY, 9743 (print), 1611-3349 REFERENCES 484

(electronic). URL http: Louisiana, USA, March 16– //link.springer-ny.com/ 18, 2005, pages 13–19. In- link/service/series/0558/ ternational Society for Com- bibs/2274/22740228.htm; puters and Their Applica- http://link.springer- tions, Cary, NC, USA, 2005. ny.com/link/service/series/ ISBN 1-880843-54-4. LCCN 0558/papers/2274/22740228. QA76.76.A65 I83 2005. pdf. Liang:2005:FAG Lindemann:2001:ICT [LS05b] Zhenkai Liang and R. Sekar. [LS01b] Mark Lindemann and Sean W. Fast and automated gen- Smith. Improving DES eration of attack signa- coprocessor throughput for tures: a basis for build- short operations. In ing self-protecting servers. USENIX [USE01c], page ?? In Meadows and Syverson ISBN 1-880446-18-9, 1- [MS05b], pages 213–222. 880446-07-3. LCCN QA76.9.A25 ISBN 1-59593-226-7. LCCN U565 2001. URL http:// QA76.9.A25. ACM order www.usenix.org/publications/ number 459050. library/proceedings/sec01/ Liu:2008:GPV lindemann.html. Loidreau:2001:WKM [LS08] Jen-Chang Liu and Ming- Hong Shih. Generaliza- [LS01c] Pierre Loidreau and Nico- tions of pixel-value differ- las Sendrier. Weak keys encing steganography for in the McEliece public- data hiding in images. Fun- key cryptosystem. IEEE damenta Informaticae,83 Transactions on Informa- (3):319–335, August 2008. tion Theory, 47(3):1207– CODEN FUMAAJ. ISSN 1211, March 2001. CODEN 0169-2968 (print), 1875- IETTAW. ISSN 0018-9448 8681 (electronic). (print), 1557-9654 (elec- tronic). Lopez:2007:SCB + Li:2005:ULC [LSA 07] Andr´es Mar´ın L´opez, Daniel D´ıaz S´anchez, Florina Almen´arez, [LS05a] Chung-Chih Li and Bo Sun. Carlos Garc´ıa Rubio, and Using linear congruential Celeste Campo. Smart card- generators for cryptographic based agents for fair non- purposes. In Gongzhu Hu, repudiation. Computer Net- editor, Computers and their works (Amsterdam, Nether- applications: proceedings of lands: 1999), 51(9):2288– the ISCA 20th international 2298, June 20, 2007. CO- conference ; New Orleans, DEN ???? ISSN 1389-1286 REFERENCES 485

(print), 1872-7069 (elec- curity enhancement for Op- tronic). timal Strong-Password Au- thentication Protocol. Op- Lin:2003:DBI erating Systems Review,37 [LSC03] S. D. Lin, S. C. Shie, and (3):12–16, July 2003. CO- C. F. Chen. A DCT-based DEN OSRED8. ISSN 0163- image watermarking with 5980 (print), 1943-586X threshold embedding. In- (electronic). ternational Journal of Com- Lu:2005:BIW puter Applications, 25(2): 130–135, 2003. ISSN 1206- [LSKC05] Haiping Lu, Yun Q. Shi, 212X (print), 1925-7074 Alex C. Kot, and Lihui (electronic). URL https: Chen. Binary image wa- //www.tandfonline.com/ termarking through blurring doi/full/10.1080/1206212X. and biased binarization. In- 2003.11441694. ternational Journal of Im- Lin:2000:TPE age and Graphics (IJIG), 5(1):67–??, January 2005. [LSH00] Chun-Li Lin, Hung-Min CODEN ???? ISSN 0219- Sun, and Tzonelih Hwang. 4678. Three-party encrypted key Li:2005:ABPb exchange: attacks and a so- lution. Operating Systems [LST+05] Stan Z. Li, Zhenan Sun, Tie- Review, 34(4):12–20, Octo- niu Tan, Sharath Pankanti, ber 2000. CODEN OS- G´erard Chollet, and David RED8. ISSN 0163-5980 Zhang, editors. Advances in (print), 1943-586X (elec- biometric person authenti- tronic). cation: International Work- Lin:2003:SEOa shop on Biometric Recog- nition Systems, IWBRS [LSH03a] Chih-Wei Lin, Jau-Ji Shen, 2005, Beijing, China, Oc- and Min-Shiang Hwang. Se- tober 22–23, 2005: pro- curity enhancement for Op- ceedings, volume 3781 of timal Strong-Password Au- Lecture Notes in Computer thentication protocol. Op- Science. Springer-Verlag, erating Systems Review,37 Berlin, Germany / Heidel- (2):7–12, April 2003. CO- berg, Germany / London, DEN OSRED8. ISSN 0163- UK / etc., 2005. CO- 5980 (print), 1943-586X DEN LNCSD9. ISBN 3-540- (electronic). 29431-7. ISSN 0302-9743 (print), 1611-3349 (elec- Lin:2003:SEOb tronic). LCCN TK7882.B56 [LSH03b] Chih-Wei Lin, Jau-Ji Shen, I58 2005. URL http: and Min-Shiang Hwang. Se- //www.springerlink.com/ REFERENCES 486

openurl.asp?genre=issue& ???? URL http:// issn=0302-9743&volume= eproceedings.worldscinet. 3781. com/9812701532/9812701532. . Liang:2009:AIE 0031.html Lin:2004:SIS [LSVS09] Zhenkai Liang, Weiqing Sun, V. N. Venkatakrish- [LT04] Chang-Chou Lin and Wen- nan, and R. Sekar. Alca- Hsiang Tsai. Secret im- traz: An isolated environ- age sharing with steganog- ment for experimenting with raphy and authentication. untrusted software. ACM The Journal of Systems Transactions on Informa- and Software, 73(3):405– tion and System Security, 414, November/December 12(3):14:1–14:37, January 2004. CODEN JSSODM. 2009. CODEN ATISBQ. ISSN 0164-1212 (print), ISSN 1094-9224 (print), 1873-1228 (electronic). 1557-7406 (electronic). Li:2005:ISS Lee:2001:EPI [LTH05] Li-Hua Li, Shiang-Feng Tzeng, and Min-Shiang [LSY01] Ruby B. Lee, Zhijie Shi, Hwang. Improvement of and Xiao Yang. Effi- signature scheme based on cient permutation instruc- factoring and discrete loga- tions for fast software cryp- rithms. Applied Mathemat- tography. IEEE Micro, ics and Computation, 161 21(6):56–69, November/ (1):49–54, February 4, 2005. December 2001. CODEN CODEN AMHCBQ. ISSN IEMIDZ. ISSN 0272-1732 0096-3003 (print), 1873- (print), 1937-4143 (elec- 5649 (electronic). tronic). URL http://dlib. computer.org/mi/books/ Lie:2000:ASC mi2001/m6056abs.htm; [LTM+00] David Lie, Chandramohan http://dlib.computer.org/ Thekkath, Mark Mitchell, mi/books/mi2001/pdf/m6056. Patrick Lincoln, Dan Boneh, pdf. John Mitchell, and Mark Liu:2005:RBU Horowitz. Architectural support for copy and tam- [LSZ05] Linlan Liu, Jian Shu, and per resistant software. ACM Jianxiang Zheng. The SIGPLAN Notices, 35(11): RBAC-based user autho- 168–177, November 2000. rization in Sanxin ERP CODEN SINODQ. ISSN system. In Han et al. 0362-1340 (print), 1523- [HYZ05b], pages 155–?? 2867 (print), 1558-1160 ISBN 981-270-153-2. LCCN (electronic). REFERENCES 487

Lin:2005:HAO works (Amsterdam, Nether- lands: 1999), 51(9):2234– [LTW05] Henry Lin, Luca Trevisan, 2248, June 20, 2007. CO- and Hoeteck Wee. On DEN ???? ISSN 1389-1286 hardness amplification of (print), 1872-7069 (elec- one-way functions. In tronic). Kilian [Kil05], pages 34– ?? CODEN LNCSD9. Lucks:2000:ASR ISBN 3-540-24573-1 (soft- cover). ISSN 0302-9743 [Luc00] Stefan Lucks. Attacking (print), 1611-3349 (elec- seven rounds of Rijndael un- tronic). LCCN QA76.9.A25 der 192-bit and 256-bit keys. T44 2005. URL http: In NIST [NIS00], pages 215– //www.springerlink.com/ 229. ISBN ???? LCCN ???? openurl.asp?genre=issue& URL http://csrc.nist. issn=0302-9743&volume= gov/encryption/aes/round2/ 3378; http://www.springerlink. conf3/aes3conf.htm; http: com/openurl.asp?genre= //csrc.nist.gov/encryption/ volume&id=doi:10.1007/ aes/round2/conf3/papers/ b106171. AES3Proceedings-1.pdf; http://csrc.nist.gov/ Lu:2002:HEA encryption/aes/round2/ [Lu02] Chi-Jen Lu. Hyper- conf3/papers/AES3Proceedings- encryption against space- 2.pdf; http://csrc.nist. bounded adversaries from gov/encryption/aes/round2/ on-line strong extractors. In conf3/papers/AES3Proceedings- Yung [Yun02a], pages 257– 3.pdf; http://csrc.nist. 271. CODEN LNCSD9. gov/encryption/aes/round2/ ISBN 3-540-44050-X (pa- conf3/papers/AES3Proceedings. perback). ISSN 0302-9743 pdf. (print), 1611-3349 (elec- Lucks:2002:SAB tronic). LCCN QA76.9.A25 C79 2002. URL http:/ [Luc02a] Stefan Lucks. The sat- /link.springer.de/link/ uration attack — A bait service/series/0558/bibs/ for Twofish. Lecture Notes 2442/24420257.htm; http: in Computer Science, 2355: //link.springer.de/link/ 1–??, 2002. CODEN service/series/0558/papers/ LNCSD9. ISSN 0302- 2442/24420257.pdf. 9743 (print), 1611-3349 Lu:2007:NSC (electronic). URL http: //link.springer-ny.com/ [Lu07] HongQian Karen Lu. Net- link/service/series/0558/ work smart card review and bibs/2355/23550001.htm; analysis. Computer Net- http://link.springer- REFERENCES 488

ny.com/link/service/series/ Lukyanov:2001:PFA 0558/papers/2355/23550001. pdf. [Luk01] Dmitro O. Luk’yanov. On the problem of the forma- Lucks:2002:VCS tion of an authentication [Luc02b] Stefan Lucks. A vari- protocol for on-line cryp- ant of the Cramer–Shoup tosystems. V¯ısn. Ki¨ıv. cryptosystem for groups of Un¯ıv. Ser. F¯ız.-Mat. Nauki, unknown order. Lecture 2:269–276, 2001. Notes in Computer Science, Lunde:2009:BCU 2501:27–??, 2002. CODEN LNCSD9. ISSN 0302-9743 [Lun09] Paul Lunde, editor. The (print), 1611-3349 (elec- book of codes: understand- tronic). URL http:// ing the world of hidden link.springer.de/link/ messages: an illustrated service/series/0558/bibs/ guide to signs, symbols, 2501/25010027.htm; http: ciphers, and secret lan- //link.springer.de/link/ guages. University of Cali- service/series/0558/papers/ fornia Press, Berkeley, CA, 2501/25010027.pdf. 2009. ISBN 0-520-26013-9. Lucas:2006:PGE 279 pp. LCCN Z103 .B56 2009. URL http://www. [Luc06] Michael Lucas. PGP and loc.gov/catdir/enhancements/ GPG: email for the prac- fy1002/2009281679-b.html; tical paranoid.NoStarch http://www.loc.gov/catdir/ Press, San Francisco, CA, enhancements/fy1002/2009281679- USA, 2006. ISBN 1- d.html. 59327-071-2. 216 (est.) Lutz:2002:BBS pp. LCCN TK5102.85 .L83 2006. URL http:// [Lut02] Michael J. Lutz. Book- www.loc.gov/catdir/toc/ shelf: Balancing speed and ecip061/2005028824.html; complexity with compilers; http://www.nostarch.com/ advanced cryptology text; pgp.htm. computer architecture ba- Ludvig:2005:PWF sics; mutation testing com- pendium. Computer, 35(4): [Lud05] Michal Ludvig. VIA 89, April 2002. CODEN PadLock-wicked fast en- CPTRB4. ISSN 0018-9162 cryption. Linux Jour- (print), 1558-0814 (elec- nal, 2005(133):4, May 2005. tronic). URL http://dlib. CODEN LIJOFX. ISSN computer.org/co/books/ 1075-3583 (print), 1938- co2002/pdf/r4089.pdf; 3827 (electronic). http://www.computer.org/ REFERENCES 489

computer/co2002/r4089abs. Lu:2004:FCA htm. [LV04] Yi Lu and Serge Vau- Lutz:2003:BLF denay. Faster correla- [Lut03] Michael J. Lutz. Book- tion attack on Bluetooth shelf: Laying the founda- keystream generator E0. In tion for pervasive comput- Franklin [Fra04], pages 407– ing [Pervasive Computing]; ?? CODEN LNCSD9. integrated approach to data ISBN 3-540-22668-0. ISSN handling [Exploratory Data 0302-9743 (print), 1611- Mining and Data Clean- 3349 (electronic). LCCN ing]; making theory practi- 10.1007/b99099. URL cal [Modern Cryptography: http://www.springerlink. Theory and Practice]; de- com/openurl.asp?genre= tailed look at systems test- issue&issn=0302-9743&volume= ing [Testing of Digital Sys- 3152; http://www.springerlink. tems]. Computer, 36(10): com/openurl.asp?genre= 102, October 2003. CO- volume&id=doi:10.1007/ DEN CPTRB4. ISSN 0018- b99099. 9162 (print), 1558-0814 Laguillaumie:2007:MDV (electronic). URL http: //csdl.computer.org/dl/ [LV07] Fabien Laguillaumie and mags/co/2003/10/rx102. Damien Vergnaud. Multi- htm; http://www.computer. designated verifiers signa- org/computer/co2003/rx102. tures: anonymity without pdf. encryption. Information Processing Letters, 102(2– Lenstra:2000:XPK 3):127–132, April 30, 2007. [LV00] Arjen K. Lenstra and CODEN IFPLAT. ISSN Eric R. Verheul. The 0020-0190 (print), 1872- XTR public key system. 6119 (electronic). In Bellare [Bel00], pages Lange:2002:PIE 1–?? ISBN 3-540- 67907-3. ISSN 0302-9743 [LW02] Tanja Lange and Arne Win- (print), 1611-3349 (elec- terhof. Polynomial in- tronic). LCCN QA76.9.A25 terpolation of the ellip- C79 2000 Bar. URL http: tic curve and XTR dis- //link.springer-ny.com/ crete logarithm. Lecture link/service/series/0558/ Notes in Computer Science, bibs/1880/18800001.htm; 2387:137–??, 2002. CO- http://link.springer- DEN LNCSD9. ISSN 0302- ny.com/link/service/series/ 9743 (print), 1611-3349 0558/papers/1880/18800001. (electronic). URL http: pdf. //link.springer-ny.com/ REFERENCES 490

link/service/series/0558/ Lyuu:2005:CIH bibs/2387/23870137.htm; http://link.springer- [LW05c] Yuh-Dauh Lyuu and Ming- ny.com/link/service/series/ Luen Wu. Cryptanalysis 0558/papers/2387/23870137. of and improvement on the pdf. Hwang–Chen multi-proxy multi-signature schemes. Lee:2004:IAK Applied Mathematics and [LW04] Narn-Yih Lee and Chien- Computation, 167(1):729– Nan Wu. Improved authen- 739, August 5, 2005. CO- tication key exchange pro- DEN AMHCBQ. ISSN tocol without using one-way 0096-3003 (print), 1873- hash function. Operating 5649 (electronic). Systems Review, 38(2):85– Lin:2000:PAS 92, April 2004. CODEN OSRED8. ISSN 0163-5980 [LWK00] Xiaodong Lin, Johnny W. (print), 1943-586X (elec- Wong, and Weidong Kou. tronic). Performance analysis of se- cure Web server based on Liang:2005:PAC SSL. Lecture Notes in [LW05a] Wei Liang and Wenye Computer Science, 1975: Wang. On performance 249–??, 2000. CODEN analysis of challenge/response LNCSD9. ISSN 0302- based authentication in 9743 (print), 1611-3349 wireless networks. Com- (electronic). URL http: puter Networks (Amster- //link.springer-ny.com/ dam, Netherlands: 1999), link/service/series/0558/ 48(2):267–288, June 6, 2005. bibs/1975/19750249.htm; CODEN ???? ISSN http://link.springer- 1389-1286 (print), 1872- ny.com/link/service/series/ 7069 (electronic). 0558/papers/1975/19750249. pdf. Loepp:2005:PIC Lv:2005:PCA [LW05b] Susan Loepp and William Wootters. Protecting In- [LWK05a] Jiqiang Lv, Xinmei Wang, formation: From Classical and Kwangjo Kim. Prac- Error Correction to Quan- tical convertible authenti- tum Cryptography.Cam- cated encryption schemes bridge University Press, using self-certified public Cambridge, UK, 2005. ISBN keys. Applied Mathemat- 0-521-82740-X (hardcover), ics and Computation, 169 0-521-53476-3 (paperback). (2):1285–1297, October 15, ???? pp. LCCN ???? 2005. CODEN AMHCBQ. REFERENCES 491

ISSN 0096-3003 (print), Lin:2005:NIB 1873-5649 (electronic). [LWZH05] Chih-Yin Lin, Tzong-Chen Lv:2005:SMS Wu, Fangguo Zhang, and Jing-Jang Hwang. New [LWK05b] Jiqiang Lv, Xinmei Wang, identity-based society ori- and Kwangjo Kim. Se- ented signature schemes curity of a multisignature from pairings on elliptic scheme for specified group curves. Applied Mathe- of verifiers. Applied Math- matics and Computation, ematics and Computation, 160(1):245–260, January 5, 166(1):58–63, July 6, 2005. 2005. CODEN AMHCBQ. CODEN AMHCBQ. ISSN ISSN 0096-3003 (print), 0096-3003 (print), 1873- 1873-5649 (electronic). 5649 (electronic). Li:2007:PBS Lin:2009:DMG [LXH07] F. Li, X. Xin, and Y. Hu. [LWL09] Song Lin, Biao Wang, and A pairing-based signcryp- Zhoujun Li. Digital mul- tion scheme using self- tisignature on the general- certified public keys. In- ternational Journal of Com- ized conic curve over Zn. Computers & Security,28 puter Applications, 29(3): (1–2):100–104, February/ 278–282, 2007. ISSN 1206- March 2009. CODEN 212X (print), 1925-7074 CPSEDU. ISSN 0167-4048 (electronic). URL https: (print), 1872-6208 (elec- //www.tandfonline.com/ tronic). URL https:// doi/full/10.1080/1206212X. . www.sciencedirect.com/ 2007.11441857 science/article/pii/S0167404808000801. Lixin:2005:FLA

Li:2005:IWR [LXM+05] Xu Lixin, Zhang Xincheng, He Min, Wu Xianglin, and [LWS05] Haifeng Li, Shuxun Wang, Qingyun Ru. A four-layer and Weiwei Song. Im- architecture for Web appli- age watermarking resistant cation system security as- to global geometrical at- surance: a safeguard mech- tacks. In Han et al. anism research. In Han [HYZ05b], pages 911–?? et al. [HYZ05b], pages 87– ISBN 981-270-153-2. LCCN ?? ISBN 981-270-153-2. ???? URL http:// LCCN ???? URL http:// eproceedings.worldscinet. eproceedings.worldscinet. com/9812701532/9812701532. com/9812701532/9812701532. 0031.html. 0031.html. REFERENCES 492

Li:2005:AAU (print), 1873-5649 (elec- tronic). [LY05] Zude Li and Xiaojun Ye. Attribute analysis of usage Lysyanskaya:2002:USV control (UCON). In Han [Lys02] Anna Lysyanskaya. Unique et al. [HYZ05b], pages 59– signatures and verifiable ?? ISBN 981-270-153-2. random functions from the LCCN ???? URL http:// DH–DDH separation. In eproceedings.worldscinet. Yung [Yun02a], pages 597– com/9812701532/9812701532. 612. CODEN LNCSD9. 0031.html. ISBN 3-540-44050-X (pa- Li:2007:NBA perback). ISSN 0302-9743 (print), 1611-3349 (elec- [LY07] Weihai Li and Yuan Yuan. tronic). LCCN QA76.9.A25 A new blind attack pro- C79 2002. URL http:/ cedure for DCT-based im- /link.springer.de/link/ age encryption with spec- service/series/0558/bibs/ trum learning. Interna- 2442/24420597.htm; http: tional Journal of Image and //link.springer.de/link/ Graphics (IJIG), 7(3):481– service/series/0558/papers/ 496, July 2007. CODEN 2442/24420597.pdf. ???? ISSN 0219-4678. Lou:2002:ESA Lysyanskaya:2007:AI

[LYC02] D-C Lou, T-L Yin, and M-C [Lys07] Anna Lysyanskaya. Authen- Chang. An efficient stegano- tication without identifica- graphic approach. Interna- tion. IEEE Security & Pri- tional Journal of Computer vacy, 5(3):69–71, May/June Systems Science and Engi- 2007. CODEN ???? ISSN neering, 17(4/5):??, July/ 1540-7993 (print), 1558- September 2002. CODEN 4046 (electronic). CSSEEI. ISSN 0267-6192. Lysyanskaya:2008:CHK Liu:2007:IFW [Lys08] Anna Lysyanskaya. Cryp- [LYGL07] Shao-Hui Liu, Hong-Xun tography: How to keep Yao, Wen Gao, and Yong- secrets safe. Scientific Liang Liu. An image frag- American, 299(3):88–95, ile watermark scheme based September 2008. CO- on chaotic image pattern DEN SCAMAC. ISSN and pixel-pairs. Applied 0036-8733 (print), 1946- Mathematics and Computa- 7087 (electronic). URL tion, 185(2):869–882, Febru- http://www.nature.com/ ary 15, 2007. CODEN scientificamerican/journal/ AMHCBQ. ISSN 0096-3003 v299/n3/full/scientificamerican0908- REFERENCES 493

88.html; http://www. Li:2001:GOT nature.com/scientificamerican/ journal/v299/n3/pdf/scientificamerican0908-[LZL+01] Zi-Chen Li, Jun-Mei Zhang, 88.pdf. Jun Luo, William Song, and Yi-Qi Dai. Group- Leung:2001:WDI oriented (t, n) threshold dig- ital signature schemes with [LZ01] K. H. Leung and Bing Zeng. traceable signers. Lecture Wavelet-domain image wa- Notes in Computer Science, termarking based on sta- 2040:57–??, 2001. CO- tistical metrics. Lecture DEN LNCSD9. ISSN 0302- Notes in Computer Science, 9743 (print), 1611-3349 2195:788–??, 2001. CO- (electronic). URL http: DEN LNCSD9. ISSN 0302- //link.springer-ny.com/ 9743 (print), 1611-3349 link/service/series/0558/ (electronic). URL http: bibs/2040/20400057.htm; //link.springer-ny.com/ http://link.springer- link/service/series/0558/ ny.com/link/service/series/ bibs/2195/21950788.htm; 0558/papers/2040/20400057. http://link.springer- pdf. ny.com/link/service/series/ 0558/papers/2195/21950788. Li:2004:WMS pdf. [LZP+04] Li Li, David Zhang, Zhi- Li:2004:CAB geng Pan, Jiaoying Shi, Kun Zhou, and Kai Ye. Water- [LZ04] Hua Li and Chang N. marking 3D mesh by spher- Zhang. A cellular automata ical parameterization. Com- based reconfigurable archi- puters and Graphics, 28(6): tecture for hybrid cryptosys- 981–989, December 2004. tems. The Computer Jour- CODEN COGRD2. ISSN nal, 47(3):320–328, May 0097-8493 (print), 1873- 2004. CODEN CMPJA6. 7684 (electronic). ISSN 0010-4620 (print), 1460-2067 (electronic). Michener:2000:IWM

Lao:2009:ORA [MA00a] John R. Michener and Tolga Acar. Internet [LZ09] Yuanwei Lao and Yuan F. watch: Managing system Zheng. Optimal rate alloca- and active-content integrity. tion for logo watermarking. Computer, 33(7):108–110, International Journal of Im- July 2000. CODEN CP- age and Graphics (IJIG),9 TRB4. ISSN 0018-9162 (1):1–25, January 2009. CO- (print), 1558-0814 (elec- DEN ???? ISSN 0219-4678. tronic). URL http://dlib. REFERENCES 494

computer.org/co/books/ of Arabic origins of cryptol- co2000/pdf/r7108.pdf. ogy. KFCRIS & KACST, Riyadh, Saudi Arabia, 2003. Michener:2000:MSA ISBN 9960-890-08-2. 204 pp. LCCN ???? [MA00b] John R. Michener and Tolga Acar. Managing system Mrayati:2004:IAD and active-content integrity. Computer, 33(7):108–110, [MAaT04] M. Mrayati, Y. Meer Alam, July 2000. CODEN CP- and M. H. at Tayyan, ed- TRB4. ISSN 0018-9162 itors. Ibn ’ad-Durayhim’s (print), 1558-0814 (elec- treatise on cryptanalysis, tronic). volume 3 of Arabic ori- gins of cryptology.KFCRIS Masuda:2002:CDC & KACST, Riyadh, Saudi Arabia, 2004. ISBN 9960- [MA02] Naoki Masuda and Kazuyuki 890-20-0. 127 pp. LCCN Aihara. Cryptosystems with ???? discretized chaotic maps. IEEE Trans. Circuits Sys- Mrayati:2005:IDB tems I Fund. Theory Appl., [MAaT05] M. Mrayati, Y. Meer Alam, 49(1):28–40, 2002. CODEN and M. H. at Tayyan, ITCAEX. ISSN 1057-7122 editors. Ibn Dunaynir’s (print), 1558-1268 (elec- book: Expositive chapters on tronic). cryptanalysis : (Maqasid al- Maurer:2007:ICP fusul al-mutargima an hall at-targama), volume 4 of [MAA07] Ueli Maurer, Martin Abadi, Arabic origins of cryptol- and Ross Anderson. In- ogy. KFCRIS & KACST, troduction to Cryptogra- Riyadh, Saudi Arabia, 2005. phy: Principles and Ap- ISBN 9960-890-44-9. xii + plications. Springer-Ver- 189 pp. LCCN ???? lag, Berlin, Germany / Hei- delberg, Germany / Lon- Mrayati:2006:TTC don, UK / etc., 2007. [MAaT06] M. Mrayati, Y. Meer Alam, ISBN 3-540-49244-5, 3-642- and M. H. at Tayyan, ed- 08040-5. 371 pp. LCCN itors. Three treatises on QA76.9.A25.D447 2007eb. cryptanalysis of poetry,vol- Mrayati:2003:AKT ume 5 of Arabic origins of cryptology.KFCRIS [MAaT03] M. Mrayati, Y. Meer Alam, & KACST, Riyadh, Saudi and M. H. at Tayyan, ed- Arabia, 2006. ISBN 9960- itors. Al-Kindi’s treatise 890-56-2. x + 167 pp. LCCN on cryptanalysis,volume1 ???? REFERENCES 495

Mrayati:2007:TTC posal for NESSIE. Re- port ??, ????, ????, Septem- [MAaT07] M. Mrayati, Y. Meer Alam, ber 2000. andM.H.atTayyan,edi- tors. Two treatises on crypt- MacKenzie:2001:MEP analysis: the two essays the [Mac01] Philip MacKenzie. More ef- treatise of ibn Wahab al-Ka ficient password-authenticated tib, volume 6 of Arabic ori- key exchange. Lecture gins of cryptology.KFCRIS Notes in Computer Science, & KACST, Riyadh, Saudi 2020:361–??, 2001. CO- Arabia, 2007. ISBN 9960- DEN LNCSD9. ISSN 0302- 893-58-8. xii + 125 pp. 9743 (print), 1611-3349 LCCN ???? (electronic). URL http: Mrayati:20xx:AET //link.springer-ny.com/ link/service/series/0558/ [MAaTxx] M. Mrayati, Y. Meer Alam, bibs/2020/20200361.htm; and M. H. at Tayyan, ed- http://link.springer- itors. Analysis and editing ny.com/link/service/series/ of three Arabic manuscripts: 0558/papers/2020/20200361. Al-Kindi, Ibn-Adlan, Ibn- pdf. Al-Durahim. Origins of Arab cryptography and Mohay:2003:CIF cryptanalysis. KFCRIS & KACST, Riyadh, Saudi [MAC+03] George M. Mohay, Alison Arabia, 20xx. ISBN ???? Anderson, Byron Collie, ???? pp. LCCN ???? Intro- Olivier de Vel, and Rod duction by Chaker Faham. McKemmish, editors. Com- puter and intrusion foren- McDaniel:2006:OAI sics. Artech House com- [MABI06] Patrick McDaniel, William puter security series. Artech Aiello, Kevin Butler, and House Inc., Norwood, MA, John Ioannidis. Origin au- USA, 2003. ISBN 1-58053- thentication in interdomain 369-8. xxi + 395 pp. LCCN routing. Computer Net- QA76.9.A25 C628 2003. works (Amsterdam, Nether- Madsen:2000:HCI lands: 1999), 50(16):2953– 2980, November 14, 2006. [Mad00a] Wayne Madsen. Health care CODEN ???? ISSN industry debate: Electronic 1389-1286 (print), 1872- versus digital signatures. 7069 (electronic). Network Security, 2000(12): Machado:2000:NCP 5, December 1, 2000. CO- DEN NTSCF5. ISSN 1353- [Mac00] Alexis Warner Machado. 4858 (print), 1872-9371 The Nimbus cipher: a pro- (electronic). URL http:/ REFERENCES 496

/www.sciencedirect.com/ Iran–Contra to 9/11.Na- science/article/pii/S1353485800120136. tion Books, New York, NY, USA, 2004. ISBN 1-56025- Madsen:2000:RDU 649-4. xi + 403 pp. LCCN [Mad00b] Wayne Madsen. Revised JK468.I6 M333 2004. draft US crypto export Malcolm:2002:LAM regulations leaked. Net- work Security, 2000(3):8, [Mal02] James Malcolm. Lightweight March 1, 2000. CODEN authentication in a mobile NTSCF5. ISSN 1353-4858 network (transcript of dis- (print), 1872-9371 (elec- cussion). Lecture Notes tronic). URL http:// in Computer Science, 2467: www.sciencedirect.com/ 217–??, 2002. CODEN science/article/pii/S1353485800880241. LNCSD9. ISSN 0302-9743 (print), 1611-3349 (elec- Madsen:2000:WUN tronic). URL http:// [Mad00c] Wayne Madsen. White- link.springer.de/link/ house unveils new cyber- service/series/0558/bibs/ crime, crypto export poli- 2467/24670217.htm; http: cies. Network Security, 2000 //link.springer.de/link/ (8):7, August 1, 2000. CO- service/series/0558/papers/ DEN NTSCF5. ISSN 1353- 2467/24670217.pdf. 4858 (print), 1872-9371 Maloof:2006:MLD (electronic). URL http:/ /www.sciencedirect.com/ [Mal06] Marcus A. Maloof, editor. science/article/pii/S135348580008017X. Machine learning and data mining for computer secu- Madsen:2004:FFD rity: methods and appli- [Mad04] Wayne Madsen. Former cations.Advanceinfor- FBI Director says encryp- mation knowledge process- tion fuels terrorists. Net- ing. Springer-Verlag, Berlin, work Security, 2004(4):1, Germany / Heidelberg, Ger- 3, April 2004. CODEN many / London, UK / etc., NTSCF5. ISSN 1353-4858 2006. ISBN 1-84628-029- (print), 1872-9371 (elec- X. xvi + 210 pp. LCCN tronic). URL http:// QA76.9.A25 M29 2006. www.sciencedirect.com/ Manger:2001:CCA science/article/pii/S1353485804000595. Mahle:2004:DDI [Man01] James Manger. A chosen ciphertext attack on RSA [Mah04] Melissa Boyle Mahle. De- optimal asymmetric encryp- nial and deception: an in- tion padding (OAEP) as sider’s view of the CIA from standardized in PKCS #1 REFERENCES 497

v2.0. In Kilian [Kil01a], link/service/series/0558/ pages 230–?? ISBN 3-540- bibs/2259/22590342.htm; 42456-3 (paperback). LCCN http://link.springer- QA76.9.A25 C79 2001; ny.com/link/service/series/ QA267.A1 L43 no.2139. 0558/papers/2259/22590342. UK£47.00. URL http: pdf. //link.springer-ny.com/ link/service/series/0558/ Mao:2004:MCT bibs/2139/21390230.htm; [Mao04] Wenbo Mao. Modern Cryp- http://link.springer- tography: Theory and Prac- ny.com/link/service/series/ tice. Prentice-Hall PTR, 0558/papers/2139/21390230. Upper Saddle River, NJ pdf. 07458, USA, 2004. ISBN 0- Mann:2002:HI 13-066943-1, 0-13-288741-X (on-demand digital reprint). [Man02] Charles C. Mann. Home- xxxviii + 707 pp. LCCN land insecurity. The At- ???? US$54.99. lantic, ??(??):??, September Marques:2002:BSJ 2002. URL http://www. theatlantic.com/issues/ [Mar02a] Paulo Marques. Building 2002/09/mann.htm. secure Java RMI servers. Mann:2008:HHS Dr. Dobb’s Journal of Soft- ware Tools, 27(11):36, 38, [Man08] Ian Mann. Hacking the 40–42, 44, November 2002. human: social engineer- CODEN DDJOEB. ISSN ing techniques and security 1044-789X. URL http:/ countermeasures.Gower, /www.ddj.com/documents/ Aldershot, England, 2008. s=7644/ddj0211d/. ISBN 0-566-08773-1. vii + 254 pp. LCCN HM668 Martinelli:2002:SSA .M36 2008. URL http:// [Mar02b] Fabio Martinelli. Sym- www.loc.gov/catdir/toc/ bolic semantics and anal- ecip0817/2008019977.html. ysis for crypto-CCS with Mao:2001:TRC (almost) generic inference systems. Lecture Notes in [Mao01] Wenbo Mao. Timed-release Computer Science, 2420: cryptography. Lecture Notes 519–??, 2002. CODEN in Computer Science, 2259: LNCSD9. ISSN 0302-9743 342–??, 2001. CODEN (print), 1611-3349 (elec- LNCSD9. ISSN 0302- tronic). URL http:// 9743 (print), 1611-3349 link.springer.de/link/ (electronic). URL http: service/series/0558/bibs/ //link.springer-ny.com/ 2420/24200519.htm; http: REFERENCES 498

//link.springer.de/link/ 2008. CODEN ???? ISSN service/series/0558/papers/ 1540-7993 (print), 1558- 2420/24200519.pdf. 4046 (electronic). Mares:2005:BRA Martin:2008:IBE

[Mar05a] Peter Mares. Book review: [Mar08b] Luther Martin. Identity- Art of Java Web Develop- based encryption comes of ment,byN.Ford. The age. Computer, 41(8):93– Computer Journal, 48(2): 95, August 2008. CODEN 253, March 2005. CO- CPTRB4. ISSN 0018-9162 DEN CMPJA6. ISSN (print), 1558-0814 (elec- 0010-4620 (print), 1460- tronic). 2067 (electronic). URL http://www3.oup.co.uk/ Mastroeni:2004:APA computer_journal/free_ [Mas04] Isabella Mastroeni. Al- pdf/bxh071.pdf; http: gebraic power analysis //www3.oup.co.uk/computer_ by abstract interpretation. journal/hdb/Volume_48/ Higher-Order and Symbolic Issue_02/bxh071.sgm.abs. Computation, 17(4):297– html. 345, December 2004. CO- Martin:2005:STA DEN LSCOEX. ISSN 1388- 3690 (print), 2212-0793 [Mar05b] Thomas Martin. A set the- (electronic). URL http: oretic approach to broadcast //www.springerlink.com/ encryption. Thesis (Ph.D.), openurl.asp?genre=article& University of London, Lon- issn=1388-3690&volume= don, UK, 2005. 235 pp. 17&issue=4&spage=297. Martin:2007:SCE Matsui:2002:FSE

[Mar07] Keye Martin. Secure com- [Mat02] Mitsuru Matsui, editor. munication without encryp- Fast software encryption: tion? IEEE Security & 8th International Work- Privacy, 5(2):68–71, March/ shop, FSE 2001, Yokohama, April 2007. CODEN ???? Japan, April 2–4, 2001: ISSN 1540-7993 (print), Revised Papers,volume 1558-4046 (electronic). 2355 of Lecture Notes in Martin:2008:CCI Computer Science. Spring- er-Verlag, Berlin, Ger- [Mar08a] Luther Martin. Crypto cor- many / Heidelberg, Ger- ner: Identity-based encryp- many / London, UK / etc., tion and beyond. IEEE 2002. CODEN LNCSD9. Security & Privacy, 6(5): ISBN 3-540-43869-6 (soft- 62–64, September/October cover). ISSN 0302-9743 REFERENCES 499

(print), 1611-3349 (elec- Maughan:2005:HSC tronic). LCCN QA76.9.A25 F77 2002. URL http: [Mau05] Douglas Maughan. Home- //link.springer-ny.com/ land security: cyber security link/service/series/0558/ R&D initiatives. In Mead- tocs/t2355.htm; http: ows and Syverson [MS05b], //www.springerlink.com/ page 1. ISBN 1-59593-226-7. openurl.asp?genre=issue& LCCN QA76.9.A25. ACM issn=0302-9743&volume= order number 459050. . 2355 Maximov:2006:SWC Mathieson:2005:UCR [Max06] Alexander Maximov. Some [Mat05] SA Mathieson. UK crypto words on cryptanalysis of regulation option dies. Net- stream ciphers.Depart- work Security, 2005(6): ment of Information Tech- 2, June 2005. CODEN nology, Lund University, NTSCF5. ISSN 1353-4858 Lund, Sweden, 2006. ISBN (print), 1872-9371 (elec- 91-7167-039-4. xiv + 242 pp. tronic). URL http:// LCCN ???? www.sciencedirect.com/ science/article/pii/S1353485805702415. Mayers:2001:USQ Maurer:2001:C [May01] Dominic Mayers. Uncon- ditional security in quan- [Mau01] Ueli Maurer. Cryptogra- tum cryptography. Jour- phy 2000  10. Lecture nal of the ACM, 48(3):351– Notes in Computer Science, 406, May 2001. CODEN 2000:63–85, 2001. CO- JACOAH. ISSN 0004-5411 DEN LNCSD9. ISSN 0302- (print), 1557-735X (elec- 9743 (print), 1611-3349 tronic). URL http://www. (electronic). URL http: acm.org/pubs/citations/ //link.springer-ny.com/ journals/jacm/2001-48- link/service/series/0558/ 3/p351-mayers/. bibs/2000/20000063.htm; http://link.springer- May:2002:CUR ny.com/link/service/series/ 0558/papers/2000/20000063.[May02] Alexander May. Cryptanal- pdf. ysis of unbalanced RSA with small CRT-exponent. In Maurer:2004:RCD Yung [Yun02a], pages 242– [Mau04] Ueli Maurer. The role of 256. CODEN LNCSD9. cryptography in database ISBN 3-540-44050-X (pa- security. In ACM [ACM04a], perback). ISSN 0302-9743 pages 5–10. ISBN 1-58113- (print), 1611-3349 (elec- 859-8. LCCN QA76.9.D3. tronic). LCCN QA76.9.A25 REFERENCES 500

C79 2002. URL http:/ 352 pp. LCCN QA76.9.A25 /link.springer.de/link/ M44 2001. US $29.95; CDN service/series/0558/bibs/ $44.95; UK£22.99. 2442/24420242.htm; http: //link.springer.de/link/ Mohanty:2008:IWB service/series/0558/papers/[MB08] Saraju P. Mohanty and 2442/24420242.pdf. Bharat K. Bhargava. In- May:2004:CRS visible watermarking based on creation and robust [May04] Alexander May. Computing insertion-extraction of im- the RSA secret key is de- age adaptive watermarks. terministic polynomial time ACM Transactions on Mul- equivalent to factoring. In timedia Computing, Com- Franklin [Fra04], pages 213– munications, and Appli- ?? CODEN LNCSD9. cations, 5(2):12:1–12:??, ISBN 3-540-22668-0. ISSN November 2008. CODEN 0302-9743 (print), 1611- ???? ISSN 1551-6857 3349 (electronic). LCCN (print), 1551-6865 (elec- 10.1007/b99099. URL tronic). http://www.springerlink. com/openurl.asp?genre= McKinnon:2004:CCS issue&issn=0302-9743&volume= [MBS04] A. David McKinnon, David E. 3152; http://www.springerlink. Bakken, and John C. com/openurl.asp?genre= Shovic. A configurable cryp- volume&id=doi:10.1007/ tography subsystem in a b99099. middleware framework for May:2009:PIS embedded systems. Com- puter Networks (Amster- [May09] John P. May, editor. Pro- dam, Netherlands: 1999), ceedings of the 2009 interna- 46(6):771–795, December tional symposium on Sym- 20, 2004. CODEN ???? bolic and algebraic compu- ISSN 1389-1286 (print), tation, KIAS, Seoul, Ko- 1872-7069 (electronic). rea, July 28–31, 2009.ACM Press, New York, NY 10036, Montenegro:2004:CBI USA, 2009. ISBN 1-60558- 609-9. LCCN ???? [MC04] Gabriel Montenegro and Mel:2001:CD Claude Castelluccia. Crypto- based identifiers (CBIDs): [MB01] H. X. Mel and Doris M. Concepts and applications. Baker. Cryptography De- ACM Transactions on In- crypted. Addison-Wesley, formation and System Se- Reading, MA, USA, 2001. curity, 7(1):97–127, Febru- ISBN 0-201-61647-5. xx + ary 2004. CODEN ATISBQ. REFERENCES 501

ISSN 1094-9224 (print), McKenna:2004:EAE 1557-7406 (electronic). [McK04] Brian McKenna. Erra- McAndrew:2008:TCO tum to “Attacks on the (enhanced) Yang–Shieh au- [McA08] Alasdair McAndrew. Teach- thentication” [Comput Se- ing cryptography with open- cur 22(8) (2003) 725–727]. source software. SIGCSE Computers & Security,23 Bulletin (ACM Special In- (1):85, February 2004. CO- terest Group on Computer DEN CPSEDU. ISSN 0167- Science Education), 40(1): 4048 (print), 1872-6208 325–329, March 2008. CO- (electronic). URL https:/ DEN SIGSD3. ISSN 0097- /www.sciencedirect.com/ 8418 (print), 2331-3927 science/article/pii/S0167404804000082. (electronic). Proceedings of See [CZ03]. SIGCSE 08. McLaughlin:2006:PZW McGraw:2006:SSB [McL06] Laurianne McLaughlin. Philip [McG06] Gary McGraw. Software se- ZimmermannonWhat’s curity: building security in. Next after PGP? IEEE Se- Addison-Wesley software se- curity & Privacy, 4(1):10– curity series. Addison-Wes- 13, January/February 2006. ley, Reading, MA, USA, CODEN ???? ISSN 1540- 2006. ISBN 0-321-35670- 7993 (print), 1558-4046 5 (paperback). xxxvi + (electronic). URL http: 408 pp. LCCN QA76.9.A25 //ieeexplore.ieee.org/ M4286 2006. URL http:// iel5/8013/33481/01588818. www.loc.gov/catdir/toc/ pdf; http://ieeexplore. ecip062/2005031598.html. ieee.org/xpls/abs_all. jsp?isnumber=33481&arnumber= Myles:2005:ETS 1588818. McNichol:2003:HTM [MCHN05] Ginger Myles, Christian Collberg, Zachary Heide- [McN03] Tom McNichol. How two priem, and Armand Nav- math geeks with a lava lamp abi. The evaluation of two and a webcam are about to software watermarking algo- unleash chaos on the Inter- rithms. Software—Practice net. Wired, 11(8):??, August and Experience, 35(10):923– 2003. CODEN WREDEM. 938, August 2005. CODEN ISSN 1059-1028 (print), SPEXBL. ISSN 0038-0644 1078-3148 (electronic). URL (print), 1097-024X (elec- http://www.lavarnd.org; tronic). http://www.wired.com/ REFERENCES 502

wired/archive/11.08/random. 41–50, April 2008. CODEN html. OSRED8. ISSN 0163-5980 Martin:2004:AMC (print), 1943-586X (elec- tronic). [MD04] Cynthia E. Martin and Jef- frey H. Dunn. Authenti- Meadows:2001:OIF cation mechanisms for call [Mea01] Catherine Meadows. Open control message integrity issues in formal methods and origin verification. Bell for Labs Technical Journal,8 analysis. Lecture Notes in (4):71–91, Winter 2004. CO- Computer Science, 2052: DEN BLTJFD. ISSN 1089- 21–??, 2001. CODEN 7089 (print), 1538-7305 LNCSD9. ISSN 0302- (electronic). 9743 (print), 1611-3349 Macchetti:2005:QPH (electronic). URL http: //link.springer-ny.com/ [MD05] Marco Macchetti and Luigi link/service/series/0558/ Dadda. Quasi-pipelined bibs/2052/20520021.htm; hash circuits. In IEEE http://link.springer- [IEE05b], page ?? ISBN ny.com/link/service/series/ ???? LCCN ???? URL 0558/papers/2052/20520021. http://arith17.polito. pdf. it/final/paper-149.pdf. Meadows:2004:OSM McCamant:2008:QIF [Mea04] Catherine Meadows. Order- [ME08a] Stephen McCamant and ing from Satan’s menu: a MichaelD.Ernst.Quantita- survey of requirements spec- tive information flow as net- ification for formal analy- work flow capacity. ACM sis of cryptographic proto- SIGPLAN Notices, 43(6): cols. Science of Computer 193–205, June 2008. CO- Programming, 50(1–3):3– DEN SINODQ. ISSN 0362- 22, March 2004. CODEN 1340 (print), 1523-2867 SCPGD4. ISSN 0167-6423 (print), 1558-1160 (elec- (print), 1872-7964 (elec- tronic). tronic). Monteiro:2008:AVM Mehrabi:2001:DW

[ME08b] Steena D. S. Monteiro and [Meh01] Hamid Reza Mehrabi. Dig- Robert F. Erbacher. An au- ital watermark. Lecture thentication and validation Notes in Computer Science, mechanism for analyzing 2163:49–??, 2001. CO- syslogs forensically. Operat- DEN LNCSD9. ISSN 0302- ing Systems Review, 42(3): 9743 (print), 1611-3349 REFERENCES 503

(electronic). URL http: volume&id=doi:10.1007/ //link.springer-ny.com/ b105222. link/service/series/0558/ Menezes:2007:ACC bibs/2163/21630049.htm; http://link.springer- [Men07] A. J. (Alfred J.) Menezes, ny.com/link/service/series/ editor. Advances in cryptol- 0558/papers/2163/21630049. ogy — CRYPTO 2007: 27th pdf. Annual International Cryp- tology Conference, Santa Mena:2003:IDM Barbara, CA, USA, Au- [Men03] Jes´us Mena. Investiga- gust 19–23, 2007: proceed- tive data mining for se- ings, volume 4622 of Lec- curity and criminal de- ture notes in computer sci- tection. Butterworth- ence, 0302-9743. Springer- Heinemann, Boston, MA, Verlag, Berlin, Germany / USA, 2003. ISBN 0-7506- Heidelberg, Germany / Lon- 7613-2. xvi + 452 pp. don, UK / etc., 2007. LCCN QA76.9.D343 M44 ISBN 3-540-74142-9 (paper- 2003. US$49.95. back). LCCN QA76.9.A25 C79 2007. URL http: Menezes:2005:TCC //www.springerlink.com/ [Men05] Alfred Menezes, editor. Top- openurl.asp?genre=issue& ics in cryptology CT-RSA issn=0302-9743&volume= 2005: The cryptographers’ 4622. track at the RSA Confer- Messerges:2000:SAF ence 2005, San Francisco, CA, USA, February 14–18, [Mes00] Thomas Messerges. Se- 2005. Proceedings,volume curing the AES finalists 3376 of Lecture Notes in against power analysis at- Computer Science. Spring- tacks (abstract only). In er-Verlag, Berlin, Ger- NIST [NIS00], page 10. many / Heidelberg, Ger- ISBN ???? LCCN ???? many / London, UK / etc., URL http://csrc.nist. 2005. CODEN LNCSD9. gov/encryption/aes/round2/ ISBN 3-540-24399-2 (soft- conf3/aes3conf.htm; http: cover). ISSN 0302-9743 //csrc.nist.gov/encryption/ (print), 1611-3349 (elec- aes/round2/conf3/papers/ tronic). LCCN QA76.9.A25 AES3Proceedings-1.pdf; R753 2005. URL http: http://csrc.nist.gov/ //www.springerlink.com/ encryption/aes/round2/ openurl.asp?genre=issue& conf3/papers/AES3Proceedings- issn=0302-9743&volume= 2.pdf; http://csrc.nist. 3376; http://www.springerlink. gov/encryption/aes/round2/ com/openurl.asp?genre= conf3/papers/AES3Proceedings- REFERENCES 504

3.pdf; http://csrc.nist. 0558/papers/2012/20120014. gov/encryption/aes/round2/ pdf. conf3/papers/AES3Proceedings. pdf. Marti-Farre:2007:NSS

Messerges:2001:SAF [MF07] Jaume Mart´ı-Farr´e. A note on secret sharing schemes [Mes01] Thomas S. Messerges. Se- with three homogeneous ac- curing the AES finalists cess structure. Informa- against power analysis at- tion Processing Letters, 102 tacks. Lecture Notes in (4):133–137, May 16, 2007. Computer Science, 1978: CODEN IFPLAT. ISSN 150–??, 2001. CODEN 0020-0190 (print), 1872- LNCSD9. ISSN 0302- 6119 (electronic). 9743 (print), 1611-3349 (electronic). URL http: Matula:2005:TLS //link.springer-ny.com/ [MFFT05] David Matula, Alex Fit- link/service/series/0558/ Florea, and Mitchell Thorn- bibs/1978/19780150.htm; ton. Table lookup struc- http://link.springer- tures for multiplicative in- ny.com/link/service/series/ verses modulo 2k. In IEEE 0558/papers/1978/19780150. [IEE05b], page ?? ISBN pdf. ???? LCCN ???? URL McGrew:2001:AAE http://arith17.polito. it/final/paper-160.pdf. [MF01] David A. McGrew and Scott R. Fluhrer. Attacks Mueller:2006:SMG on additive encryption of re- + dundant plaintext and im- [MFK 06] Maik Mueller, Michael Frei- plications on Internet se- drich, Klaus Kiefer, Ralf curity. In Selected ar- Miko, and Juergen Schnei- eas in cryptography (Wa- der. System and method for terloo, ON, 2000),volume generating pseudo-random 2012 of Lecture Notes in numbers. United States Comput. Sci., pages 14– Patent 7,894,602., March 28. Springer-Verlag, Berlin, 31, 2006. URL http: Germany / Heidelberg, Ger- www.google.com/patents/ many / London, UK / US7894602. etc., 2001. URL http: Muller:2009:BPE //link.springer-ny.com/ link/service/series/0558/[MFS+09] Christoph M¨uller, Steffen bibs/2012/20120014.htm; Frey, Magnus Strengert, http://link.springer- Carsten Dachsbacher, and ny.com/link/service/series/ Thomas Ertl. Best paper REFERENCES 505

of EGPGV — Eurograph- http://ieeexplore.ieee. ics Symposium on Parallel org/stamp/stamp.jsp?tp= Graphics and Visualization, &arnumber=4585359. Guest Editor Jean Favre: a Mukherjee:2002:CAB compute unified system ar- chitecture for graphics clus- [MGC02] Monalisa Mukherjee, Niloy ters incorporating data lo- Ganguly, and P. Pal Chaud- cality. IEEE Transactions huri. Cellular automata on Visualization and Com- based authentication (CAA). puter Graphics, 15(4):605– Lecture Notes in Computer 617, July/August 2009. CO- Science, 2493:259–??, 2002. DEN ITVGEA. ISSN 1077- CODEN LNCSD9. ISSN 2626 (print), 1941-0506 0302-9743 (print), 1611- (electronic), 2160-9306. 3349 (electronic). URL http://link.springer.de/ Minier:2001:SCC link/service/series/0558/ bibs/2493/24930259.htm; [MG01] Marine Minier and Henri http://link.springer. Gilbert. Stochastic crypt- de/link/service/series/ analysis of Crypton. Lecture 0558/papers/2493/24930259. Notes in Computer Science, pdf. 1978:121–??, 2001. CO- DEN LNCSD9. ISSN 0302- Molland:2004:ICA 9743 (print), 1611-3349 [MH04] H˚avard Molland and Tor (electronic). URL http: Helleseth. An improved cor- //link.springer-ny.com/ relation attack against ir- link/service/series/0558/ regular clocked and filtered bibs/1978/19780121.htm; keystream generators. In http://link.springer- Franklin [Fra04], pages 373– ny.com/link/service/series/ ?? CODEN LNCSD9. 0558/papers/1978/19780121. ISBN 3-540-22668-0. ISSN pdf. 0302-9743 (print), 1611- Muresan:2008:PCA 3349 (electronic). LCCN 10.1007/b99099. URL [MG08] R. Muresan and S. Gre- http://www.springerlink. gori. Protection circuit com/openurl.asp?genre= against differential power issue&issn=0302-9743&volume= analysis attacks for smart 3152; http://www.springerlink. cards. IEEE Transac- com/openurl.asp?genre= tions on Computers, 57(11): volume&id=doi:10.1007/ 1540–1549, November 2008. b99099. CODEN ITCOB4. ISSN Ma:2005:NCD 0018-9340 (print), 1557- 9956 (electronic). URL [MH05] Yiping Ma and Jiqing REFERENCES 506

Han. A new capability de- 0558/papers/2365/23650049. scription for audio infor- pdf. mation hiding. In Han et al. [HYZ05b], pages 65– May:2002:SKS ?? ISBN 981-270-153-2. [MHM+02] Lauren May, Matt Hen- LCCN ???? URL http:// ricksen, William Millan, eproceedings.worldscinet. Gary Carter, and Ed Daw- com/9812701532/9812701532. son. Strengthening the key 0031.html. schedule of the AES. Lecture Maas:2009:SRW Notes in Computer Science, 2384:226–??, 2002. CO- [MH09] Ad Maas and Hans Hooi- DEN LNCSD9. ISSN 0302- jmaijers. Scientific re- 9743 (print), 1611-3349 search in World War II: (electronic). URL http: what scientists did in the //link.springer-ny.com/ war. Routledge studies link/service/series/0558/ in modern history. Rout- bibs/2384/23840226.htm; ledge/Taylor and Francis, http://link.springer- New York, NY, 2009. ISBN ny.com/link/service/series/ 0-203-88318-7 (e-book), 0- 0558/papers/2384/23840226. 7103-1340-3 (hardcover). xii pdf. + 240 pp. LCCN Q141 .H195 2009. URL http:// Mihaljevic:2009:ASC www.loc.gov/catdir/toc/ [MI09] Miodrag J. Mihaljevi´cand ecip0824/2008033118.html. Hideki Imai. An approach for stream ciphers design Moon:2002:IDC based on joint computing [MHL+02] Dukjae Moon, Kyungdeok over random and secret Hwang, Wonil Lee, Sangjin data. Computing, 85(1–2): Lee, and Jongin Lim. Im- 153–168, June 2009. CO- possible differential crypt- DEN CMPTA2. ISSN 0010- analysis of reduced round 485X (print), 1436-5057 XTEA and TEA. Lec- (electronic). URL http: ture Notes in Computer Sci- //www.springerlink.com/ ence, 2365:49–??, 2002. CO- openurl.asp?genre=article& DEN LNCSD9. ISSN 0302- issn=0010-485X&volume= 9743 (print), 1611-3349 85&issue=1&spage=153. (electronic). URL http: Micciancio:2001:ILB //link.springer-ny.com/ link/service/series/0558/[Mic01] Daniele Micciancio. Improv- bibs/2365/23650049.htm; ing lattice based cryptosys- http://link.springer- tems using the Hermite nor- ny.com/link/service/series/ mal form. Lecture Notes REFERENCES 507

in Computer Science, 2146: ters, 86(6):329–333, June 126–145, 2001. CODEN 30, 2003. CODEN IF- LNCSD9. ISSN 0302-9743 PLAT. ISSN 0020-0190 (print), 1611-3349 (elec- (print), 1872-6119 (elec- tronic). tronic). Micciancio:2002:GCK Minkel:2003:CTT [Mic02a] D. Micciancio. Generalized [Min03] J. R. Minkel. Could trap- compact knapsacks, cyclic ping tiny ions crack the lattices, and efficient one- toughest codes? IEEE Spec- way functions from worst- trum, 40(3):31–32, March case complexity assump- 2003. CODEN IEESAM. tions. In IEEE [IEE02], ISSN 0018-9235 (print), pages 356–365. CODEN 1939-9340 (electronic). ASFPDV. ISBN 0-7695- Mironov:2002:RSO 1822-2. ISSN 0272-5428. LCCN QA267. URL http: [Mir02] Ilya Mironov. (not so) ran- //ieeexplore.ieee.org/ dom shuffles of RC4. In iel5/8411/26517/01181960. Yung [Yun02a], pages 304– pdf?isnumber=26517&prod= 319. CODEN LNCSD9. CNF&arnumber=1181960&arSt= ISBN 3-540-44050-X (pa- +356&ared=+365&arAuthor= perback). ISSN 0302-9743 Micciancio%2C+D.; http: (print), 1611-3349 (elec- //ieeexplore.ieee.org/ tronic). LCCN QA76.9.A25 xpls/abs_all.jsp?isnumber= C79 2002. URL http: 26517&arnumber=1181960& //link.springer-ny.com/ count=82&index=36. IEEE link/service/series/0558/ Computer Society Order tocs/t2442.htm; http: Number PR01822. //www.springerlink.com/ Micciancio:2002:ICH openurl.asp?genre=issue& issn=0302-9743&volume= [Mic02b] Daniele Micciancio. Im- 2442. proved cryptographic hash Mirkovic:2005:IDS functions with worst-case/ average-case connection. In [Mir05] Jelena Mirkovic, editor. In- ACM [ACM02], pages 609– ternet denial of service: at- 618. ISBN 1-58113-495-9. tack and defense mecha- LCCN QA75.5 .A22 2002. nisms. The Radia Perl- ACM order number 508020. man series in computer net- Millen:2003:FD working and security. Pren- tice-Hall PTR, Upper Sad- [Mil03] Jonathan Millen. On the dle River, NJ 07458, USA, freedom of decryption. In- 2005. ISBN 0-13-147573- formation Processing Let- 8 (paperback). xxii + REFERENCES 508

372 pp. LCCN TK5105.59 Mitra:2002:TAD .I5455 2004. URL http:// www.loc.gov/catdir/toc/ [Mit02a] Ananda Mitra. Trust, au- ecip0422/2004020335.html. thenticity, and discursive Mishra:2006:PCS power in cyberspace. Com- munications of the Associ- [Mis06] P. M. Mishra. Pipelined ation for Computing Ma- computation of scalar mul- chinery, 45(3):27–29, March tiplication in elliptic curve 2002. CODEN CACMA2. cryptosystems (extended ISSN 0001-0782 (print), version). IEEE Transac- 1557-7317 (electronic). tions on Computers, 55(8): 1000–1010, August 2006. Mitrakas:2002:CCI CODEN ITCOB4. ISSN 0018-9340 (print), 1557- [Mit02b] Andreas Mitrakas. Citi- 9956 (electronic). URL zen centric identity manage- http://ieeexplore.ieee. ment: Chip tricks? Net- org/stamp/stamp.jsp?tp= work Security, 2002(7):15– &arnumber=1650197. 16, July 1, 2002. CODEN Misic:2008:TEC NTSCF5. ISSN 1353-4858 (print), 1872-9371 (elec- [Miˇs08] Jelena Miˇsi´c. Traffic and tronic). URL http:// energy consumption of an www.sciencedirect.com/ IEEE 802.15.4 network in science/article/pii/S1353485802070101. the presence of authenti- cated, ECC Diffie–Hellman Miyazaki:2001:ISG ephemeral key exchange. Computer Networks (Ams- [Miy01] Takeru Miyazaki. An terdam, Netherlands: 1999), improved scheme of the 52(11):2227–2236, August 8, Gennaro-Krawczyk-Rabin 2008. CODEN ???? ISSN undeniable signature sys- 1389-1286 (print), 1872- tem based on RSA. Lecture 7069 (electronic). Notes in Computer Science, 2015:135–??, 2001. CO- Mitchell:2000:MSN DEN LNCSD9. ISSN 0302- [Mit00] Chris J. Mitchell. Mak- 9743 (print), 1611-3349 ing serial number based au- (electronic). URL http: thentication robust against //link.springer-ny.com/ loss of state. Operating link/service/series/0558/ Systems Review, 34(3):56– bibs/2015/20150135.htm; 59, July 2000. CODEN http://link.springer- OSRED8. ISSN 0163-5980 ny.com/link/service/series/ (print), 1943-586X (elec- 0558/papers/2015/20150135. tronic). pdf. REFERENCES 509

MacDonald:2003:CDS grid. In ACM [ACM01b], page ?? ISBN 1-58113-293- [MJ03] Matthew MacDonald and X. LCCN ???? URL http:/ Erik Johansson. C# data /www.sc2001.org/papers/ security handbook.Wrox pap.pap192.pdf. Press, Chicago, IL, USA, 2003. ISBN 1-86100-801-5 Mabry:2007:USE (paperback). vii + 356 pp. [MJF07] Frank J. Mabry, John R. LCCN ???? James, and Aaron J. Fer- Maltoni:2004:BAE guson. Unicode stegano- graphic exploits: Maintain- [MJ04] Davide Maltoni and Anil K. ing enterprise border secu- Jain, editors. Biomet- rity. IEEE Security & Pri- ric Authentication: ECCV vacy, 5(5):32–39, Septem- 2004 International Work- ber/October 2007. CO- shop, BioAW 2004, Prague, DEN ???? ISSN 1540-7993 Czech Republic, May 15th, (print), 1558-4046 (elec- 2004: Proceedings,volume tronic). 3087 of Lecture Notes in Computer Science. Spring- Mandviwalla:2008:MBW er-Verlag, Berlin, Ger- + many / Heidelberg, Ger- [MJF 08] Munir Mandviwalla, Abhi- many / London, UK / etc., jit Jain, Julie Fesenmaier, 2004. CODEN LNCSD9. Jeff Smith, Paul Weinberg, ISBN 3-540-22499-8. ISSN and Greg Meyers. Munici- 0302-9743 (print), 1611- pal broadband wireless net- 3349 (electronic). LCCN works. Communications of TK7882.P3E27 2004. URL the Association for Com- http://link.springer-ny. puting Machinery, 51(2):72– com/link/service/series/ 80, February 2008. CODEN 0558/tocs/t3087.htm; CACMA2. ISSN 0001-0782 http://www.springerlink. (print), 1557-7317 (elec- com/openurl.asp?genre= tronic). issue&issn=0302-9743&volume= Moffie:2005:AAS 3087; http://www.springerlink. com/openurl.asp?genre= [MK05a] Micha Moffie and David volume&id=doi:10.1007/ Kaeli. ASM: application b99174. security monitor. ACM Moore:2001:AGK SIGARCH Computer Archi- tecture News, 33(5):21–26, [MJD01] Patrick C. Moore, Wilbur R. December 2005. CODEN Johnson, and Richard J. De- CANED2. ISSN 0163-5964 try. Adapting Globus and (print), 1943-5851 (elec- Kerberos for a secure ASCI tronic). REFERENCES 510

Moyle:2005:CLD Software issues in digital forensics. Operating Sys- [MK05b] Ed Moyle and Diana Kel- tems Review, 42(3):29–40, ley. Cryptographic libraries April 2008. CODEN OS- for developers.Charles RED8. ISSN 0163-5980 River Media, Hingham, MA, (print), 1943-586X (elec- USA, 2005. ISBN 1- tronic). 58450-409-9. ???? pp. LCCN QA76.76.D47 M72 McGregor:2005:PCK 2005. URL http:// www.loc.gov/catdir/toc/ [ML05] John P. McGregor and ecip0519/2005026626.html. Ruby B. Lee. Protect- ing cryptographic keys and Mazieres:2000:SKM computations via virtual se- cure coprocessing. ACM [MKKW00] David Mazi`eres, Mich- SIGARCH Computer Ar- ael Kaminsky, M. Frans chitecture News, 33(1):16– Kaashoek, and Emmett 26, March 2005. CODEN Witchel. Separating key CANED2. ISSN 0163-5964 management from file sys- (print), 1943-5851 (elec- tem security. Operating Sys- tronic). tems Review, 34(2):19–20, April 2000. CODEN OS- Miaou:2001:BCW RED8. ISSN 0163-5980 (print), 1943-586X (elec- [MLC01] Shaou-Gang Miaou, Tzung- tronic). Shian Lee, and Chih-Ming Chen. BCH coded wa- Majzoobi:2009:TDI termarks for error-prone [MKP09] Mehrdad Majzoobi, Fari- transmission of MPEG naz Koushanfar, and Mio- video. Lecture Notes in drag Potkonjak. Tech- Computer Science, 2195: niques for design and im- 654–??, 2001. CODEN plementation of secure re- LNCSD9. ISSN 0302- configurable PUFs. ACM 9743 (print), 1611-3349 Transactions on Reconfig- (electronic). URL http: urable Technology and Sys- //link.springer-ny.com/ tems (TRETS), 2(1):5:1– link/service/series/0558/ 5:??, March 2009. CO- bibs/2195/21950654.htm; DEN ???? ISSN 1936-7406 http://link.springer- (print), 1936-7414 (elec- ny.com/link/service/series/ tronic). 0558/papers/2195/21950654. pdf. McDonald:2008:SID Malone-Lee:2003:TBO [MKY08] J. Todd McDonald, Yong C. Kim, and Alec Yasinsac. [MLM03] John Malone-Lee and Wenbo REFERENCES 511

Mao. Two birds one 9743 (print), 1611-3349 stone: Signcryption using (electronic). URL http: RSA. In Joye [Joy03b], //link.springer-ny.com/ pages 211–225. CODEN link/service/series/0558/ LNCSD9. ISBN 3-540- bibs/2162/21620065.htm; 00847-0. ISSN 0302-9743 http://link.springer- (print), 1611-3349 (elec- ny.com/link/service/series/ tronic). LCCN QA76.9.A25 0558/papers/2162/21620065. C822 2003. URL http: pdf. //link.springer-ny.com/ link/service/series/0558/ McLoone:2001:SCF tocs/t2612.htm; http: [MM01c] M´aire McLoone and John V. //www.springerlink.com/ McCanny. Single-chip openurl.asp?genre=issue& FPGA implementation of issn=0302-9743&volume= the advanced encryption 2612. standard algorithm. Lecture Maitra:2001:SDD Notes in Computer Science, [MM01a] S. Maitra and D. P. Mukher- 2147:152–??, 2001. CO- jee. Spatial domain digi- DEN LNCSD9. ISSN 0302- tal watermarking with buyer 9743 (print), 1611-3349 authentication. Lecture (electronic). URL http: Notes in Computer Science, //link.springer-ny.com/ 2247:149–??, 2001. CO- link/service/series/0558/ DEN LNCSD9. ISSN 0302- bibs/2147/21470152.htm; 9743 (print), 1611-3349 http://link.springer- (electronic). URL http: ny.com/link/service/series/ //link.springer-ny.com/ 0558/papers/2147/21470152. link/service/series/0558/ pdf. bibs/2247/22470149.htm; Mana:2002:PMD http://link.springer- ny.com/link/service/series/[MM02] Antonio Ma˜na and So- 0558/papers/2247/22470149. nia Matamoros. Practi- pdf. cal mobile digital signa- McLoone:2001:HPS tures. Lecture Notes in Computer Science, 2455: [MM01b] M. McLoone and J. V. 224–??, 2002. CODEN McCanny. High perfor- LNCSD9. ISSN 0302- mance single-chip FPGA 9743 (print), 1611-3349 Rijndael algorithm imple- (electronic). URL http: mentations. Lecture Notes //link.springer-ny.com/ in Computer Science, 2162: link/service/series/0558/ 65–??, 2001. CODEN bibs/2455/24550224.htm; LNCSD9. ISSN 0302- http://link.springer- REFERENCES 512

ny.com/link/service/series/ link/service/series/0558/ 0558/papers/2455/24550224. bibs/2438/24380770.htm; pdf. http://link.springer- ny.com/link/service/series/ Moldovyan:2007:IC 0558/papers/2438/24380770. [MM07a] Nick Moldovyan and Alex pdf. Moldovyan. Innovative Milenkovic:2005:UIB cryptography.CharlesRiver Media programming se- [MMJ05] Milena Milenkovi´c, Aleksan- ries. Charles River Media, dar Milenkovi´c, and Emil Boston, MA, USA, sec- Jovanov. Using instruction ond edition, 2007. ISBN block signatures to counter 1-58450-467-6 (paperback). code injection attacks. ACM xiii + 386 pp. LCCN SIGARCH Computer Ar- QA76.9.A25 M665 2007. chitecture News, 33(1):108– URL http://www.loc.gov/ 117, March 2005. CODEN catdir/toc/ecip0611/2006009839. CANED2. ISSN 0163-5964 html. (print), 1943-5851 (elec- Mullen:2007:FFA tronic). [MM07b] Gary L. Mullen and Carl Maltoni:2003:HFR Mummert. Finite Fields and Applications,volume41 [MMJP03] Davide Maltoni, Dario of Student mathematical li- Maio, Anil K. Jain, and brary. American Mathemat- Salil Prabhakar. Hand- ical Society, Providence, RI, book of fingerprint recogni- USA, 2007. ISBN 0-8218- tion. Springer professional 4418-0 (paperback). ix + computing. Springer-Verlag, 175 pp. LCCN QA247.3 Berlin, Germany / Heidel- .M85 2007. berg, Germany / London, UK / etc., 2003. ISBN 0- Moreira:2002:RCE 387-95431-7. xii + 348 pp. [MMH02] Emmanuel A. Moreira, LCCN HV6074 .H25 2003. Paul L. McAlpine, and Si- US$59.95. Includes DVD- mon D. Haynes. Rijn- ROM. dael cryptographic engine McEvoy:2009:IWH on the UltraSONIC recon- figurable platform. Lecture [MMMT09] Robert P. McEvoy, Colin C. Notes in Computer Science, Murphy, William P. Mar- 2438:770–??, 2002. CO- nane, and Michael Tunstall. DEN LNCSD9. ISSN 0302- Isolated WDDL: a hiding 9743 (print), 1611-3349 countermeasure for differen- (electronic). URL http: tial power analysis on FP- //link.springer-ny.com/ GAs. ACM Transactions REFERENCES 513

on Reconfigurable Technol- Instrumentation Engineers ogy and Systems (TRETS), (SPIE), Bellingham, WA, 2(1):3:1–3:??, March 2009. USA, 2002. URL http:// CODEN ???? ISSN www.itu.int/itudoc/itu- 1936-7406 (print), 1936- t/workshop/security/present/ 7414 (electronic). s5p4.pdf. Maitra:2006:PCI Maclean:2000:OIG

[MMV06] Subhamoy Maitra, C. E. Veni [MMZ00] Abby Maclean, Stephen M. Madhavan, and Ramarath- Matyas, and Nevenko Zu- nam Venkatesan, editors. nic. Organization imple- Progress in Cryptology — mentation guidelines for re- INDOCRYPT 2005: 6th covery of encrypted infor- International Conference mation. Computers & Se- on Cryptology in India, curity, 19(1):69–81, Jan- Bangalore, India, Decem- uary 1, 2000. CODEN ber 10–12, 2005. Proceed- CPSEDU. ISSN 0167-4048 ings, volume 3797 of Lec- (print), 1872-6208 (elec- ture Notes in Computer tronic). URL https:// Science. Springer-Verlag, www.sciencedirect.com/ Berlin, Germany / Heidel- science/article/pii/S0167404800863658. berg, Germany / London, UK / etc., 2006. CO- Mizuki:2001:NSN DEN LNCSD9. ISBN 3-540- [MN01] Takaaki Mizuki and Takao 30805-9 (softcover). ISSN Nishizeki. Necessary and 0302-9743 (print), 1611- sufficient numbers of cards 3349 (electronic). LCCN for sharing secret keys on hi- ???? URL http:/ erarchical groups. Lecture /www.springerlink.com/ Notes in Computer Science, openurl.asp?genre=issue& 2223:196–??, 2001. CO- issn=0302-9743&volume= DEN LNCSD9. ISSN 0302- 3797. 9743 (print), 1611-3349 Matsumoto:2002:IAG (electronic). URL http: [MMYH02] T. Matsumoto, H. Mat- //link.springer-ny.com/ sumoto, K. Yamada, and link/service/series/0558/ S. Hoshino. Impact of ar- bibs/2223/22230196.htm; tificial gummy fingers on http://link.springer- fingerprint systems. In ny.com/link/service/series/ Proceedings of SPIE: Opti- 0558/papers/2223/22230196. cal Security and Counterfeit pdf. Deterrence Techniques IV, Mercuri:2003:IRS 2002, volume 4677, page ?? Society of Photo-optical [MN03] Rebecca T. Mercuri and Pe- REFERENCES 514

ter G. Neumann. Inside issn=0178-4617&volume= risks: Security by obscu- 39&issue=1&spage=21. rity. Communications of the Association for Comput- Martinez-Nadal:2002:CUM ing Machinery, 46(11):160, November 2003. CODEN [MNFG02] Apol·l`onia Mart´ınez-Nadal CACMA2. ISSN 0001-0782 and Josep Llu´ıs Ferrer- (print), 1557-7317 (elec- Gomila. Comments to tronic). the UNCITRAL model Mukhopadhyay:2014:EMP law on electronic signa- tures. Lecture Notes in [MN14] Debapriyay Mukhopadhyay Computer Science, 2433: and Subhas C. Nandy. Ef- 229–??, 2002. CODEN ficient multiple-precision in- LNCSD9. ISSN 0302- teger division algorithm. In- 9743 (print), 1611-3349 formation Processing Let- (electronic). URL http: ters, 114(3):152–157, March //link.springer-ny.com/ 2014. CODEN IFPLAT. link/service/series/0558/ ISSN 0020-0190 (print), bibs/2433/24330229.htm; 1872-6119 (electronic). URL http://link.springer- http://www.sciencedirect. ny.com/link/service/series/ com/science/article/pii/ 0558/papers/2433/24330229. S0020019013002627.This pdf. paper provides a correction to the algorithm presented Meyer:2001:FIC in [HZSL05], and also sup- plies a complicated correct- [MNP01] Andreas Meyer, Stefan Neis, ness proof. and Thomas Pfahler. First Martel:2004:GMA implementation of crypto- graphic protocols based on [MND+04] Charles Martel, Glen Nuck- algebraic number fields. Lec- olls, Premkumar Devanbu, ture Notes in Computer Sci- Michael Gertz, April Kwong, ence, 2119:84–??, 2001. CO- and Stuart G. Stubblebine. DEN LNCSD9. ISSN 0302- A general model for au- 9743 (print), 1611-3349 thenticated data structures. (electronic). URL http: Algorithmica, 39(1):21–41, //link.springer-ny.com/ January 2004. CODEN link/service/series/0558/ ALGOEJ. ISSN 0178- bibs/2119/21190084.htm; 4617 (print), 1432-0541 http://link.springer- (electronic). URL http: ny.com/link/service/series/ //www.springerlink.com/ 0558/papers/2119/21190084. openurl.asp?genre=article& pdf. REFERENCES 515

Monsignori:2001:WMS (electronic). URL http: //dlib.computer.org/co/ [MNS01] M. Monsignori, P. Nesi, and books/co2000/pdf/r2004. M. B. Spinu. Watermark- pdf. ing music sheets. Lecture Notes in Computer Science, Mykletun:2006:AIO 2195:646–??, 2001. CO- DEN LNCSD9. ISSN 0302- [MNT06] Einar Mykletun, Maithili 9743 (print), 1611-3349 Narasimha, and Gene Tsudik. (electronic). URL http: Authentication and in- //link.springer-ny.com/ tegrity in outsourced databases. link/service/series/0558/ ACM Transactions on Stor- bibs/2195/21950646.htm; age, 2(2):107–138, May http://link.springer- 2006. CODEN ???? ISSN ny.com/link/service/series/ 1553-3077 (print), 1553- 0558/papers/2195/21950646. 3093 (electronic). pdf. Mollin:2001:IC Mironov:2008:SAE [Mol01] Richard A. Mollin. An [MNS08] Ilya Mironov, Moni Naor, Introduction to Cryptogra- and Gil Segev. Sketching in phy. The CRC Press series adversarial environments. In on discrete mathematics and ACM [ACM08], pages 651– its applications. Chapman 660. ISBN 1-60558-047-3. and Hall/CRC, Boca Raton, LCCN QA76.6 .A152 2008. FL, USA, 2001. ISBN 1- 58488-127-5. xiii + 373 pp. MacAndrew:2000:LPT LCCN QA268 .M65 2000. [MNT+00] Tim MacAndrew, Robert H. UK£29.99. Norman, Jeff Templon, Moller:2002:PEC Kevin W. Wall, Shari Law- rence Pfleeger, Joseph C. [M¨ol02] Bodo M¨oller. Parallelizable Sligo, Christopher Jack, elliptic curve point multipli- and Terry Ritter. Let- cation method with resis- ters: Probability theory and tance against side-channel software engineering; food attacks. Lecture Notes in for thought; uncovering er- Computer Science, 2433: roneous assumptions; Ein- 402–??, 2002. CODEN stein’s Nobel Prize; small- LNCSD9. ISSN 0302- project process improve- 9743 (print), 1611-3349 ment; the truth about cryp- (electronic). URL http: tography. Computer, 33(2): //link.springer-ny.com/ 4–8, February 2000. CO- link/service/series/0558/ DEN CPTRB4. ISSN 0018- bibs/2433/24330402.htm; 9162 (print), 1558-0814 http://link.springer- REFERENCES 516

ny.com/link/service/series/ Mollin:2007:IC 0558/papers/2433/24330402. pdf. [Mol07] Richard A. Mollin. An introduction to cryptogra- Moller:2003:PSP phy. Discrete mathemat- [M¨ol03a] Bodo M¨oller. Provably ics and its applications. Chapman and Hall/CRC, secure public-key encryp- Boca Raton, FL, USA, sec- tion for length-preserving Chaumian mixes. In ond edition, 2007. ISBN 1-58488-618-8. x + 413 Joye [Joy03b], pages 244– pp. LCCN QA268 .M65 262. CODEN LNCSD9. 2007. URL ISBN 3-540-00847-0. ISSN http://www. 0302-9743 (print), 1611- loc.gov/catdir/enhancements/ 3349 (electronic). LCCN fy0664/2006049639-d.html. QA76.9.A25 C822 2003. Monniaux:2003:ACP URL http://link.springer- ny.com/link/service/series/[Mon03] David Monniaux. Abstract- 0558/tocs/t2612.htm; ing cryptographic proto- http://www.springerlink. cols with tree automata. com/openurl.asp?genre= Science of Computer Pro- issue&issn=0302-9743&volume= gramming, 47(2–3):177–202, 2612. May/June 2003. CODEN SCPGD4. ISSN 0167-6423 Mollin:2003:RPK (print), 1872-7964 (elec- [Mol03b] Richard A. Mollin. RSA and tronic). Public-Key Cryptography. Moore:2001:UMW Chapman and Hall/CRC, Boca Raton, FL, USA, 2003. [Moo01] Samuel K. Moore. Un- ISBN 1-58488-338-3. xii hooking medicine [wire- + 291 pp. LCCN QA268 less networking]. IEEE .M655 2003. US$79.95. Spectrum, 38(1):107–108, January 2001. CODEN Mollin:2005:CGS IEESAM. ISSN 0018-9235 [Mol05] Richard A. Mollin. Codes: (print), 1939-9340 (elec- the guide to secrecy from tronic). ancient to modern times. Moore:2007:CQK Chapman and Hall/CRC, Boca Raton, FL, USA, [Moo07] Samuel K. Moore. Com- 2005. ISBN 1-58488- mercializing quantum keys. 470-3. xx + 678 pp. IEEE Spectrum, 44(3):15– LCCN QA76.9.A25 M67 17, March 2007. CODEN 2005. URL http://www. IEESAM. ISSN 0018-9235 loc.gov/catdir/enhancements/ (print), 1939-9340 (elec- fy0647/2005041403-d.html. tronic). REFERENCES 517

Mangard:2006:PAA uration. Linux Journal, 2006(143):3, March 2006. [MOP06] Stephan Mangard, Elisa- CODEN LIJOFX. ISSN beth Oswald, and Tho- 1075-3583 (print), 1938- mas Popp. Power Anal- 3827 (electronic). ysis Attacks and Counter- measures for Cryptographic Merton:2000:NBG Smart Cards, volume 450 of Advances in Information [MP00] Orren Merton and Linda Dai- Security. Springer-Verlag, ley Paulson. News briefs: Berlin, Germany / Heidel- Gamers jump into broad- berg, Germany / London, band technology; Intel has UK / etc., 2006. ISBN 0- new chip design for hand- 387-30857-1. 250 (est) pp. helds; patent expiration be- LCCN ???? URL http:// gins new encryption era; deposit.ddb.de/cgi-bin/ privacy organization raises dokserv?id=2739575&prov= privacy concerns. Com- M&dok_var=1&dok_ext=htm. puter, 33(11):16–19, Novem- Morris:2003:KKL ber 2000. CODEN CP- TRB4. ISSN 0018-9162 [Mor03] James Morris. Kernel ko- (print), 1558-0814 (elec- rner: The Linux kernel tronic). URL http://dlib. cryptographic API. Linux computer.org/co/books/ Journal, 108:??, April 2003. co2000/pdf/ry016.pdf. CODEN LIJOFX. ISSN 1075-3583 (print), 1938- McMillan:2001:JIA 3827 (electronic). Moritz:2005:KAE [MP01a] Scott McMillan and Cameron Patterson. JBitsTM im- [Mor05] Hannes Moritz. Krypto- plementations of the Ad- analyse des Advanced En- vanced Encryption Stan- cryption Standard. (Ger- dard (Rijndael). Lecture man) [cryptanalysis of the Notes in Computer Science, Advanced Encryption Stan- 2147:162–??, 2001. CO- dard]. Diplom-Arbeit, Tech- DEN LNCSD9. ISSN 0302- nische Universit¨at Wien, 9743 (print), 1611-3349 Wien, Austria, 2005. iii + (electronic). URL http: 116 pp. //link.springer-ny.com/ Moses:2006:DSD link/service/series/0558/ bibs/2147/21470162.htm; [Mos06] Phil Moses. Demons http://link.springer- seeking dæmons—a prac- ny.com/link/service/series/ tical approach to harden- 0558/papers/2147/21470162. ing your openSSH config- pdf. REFERENCES 518

Mihailescu:2001:BRE bibs/1992/19920416.htm; http://link.springer- [MP01b] Preda Mihailescu and F. Pap- ny.com/link/service/series/ palardi. Book review: Ellip- 0558/papers/1992/19920416. tic curves in cryptography. pdf. Mathematics of Compu- tation, 70(236):1755–1759, Malkhi:2002:ACE October 2001. CODEN [MP02] Dahlia Malkhi and Elan MCMPAF. ISSN 0025-5718 Pavlov. Anonymity without (print), 1088-6842 (elec- ‘cryptography’ (extended tronic). URL http:// abstract). Lecture Notes www.ams.org/mcom/2001- in Computer Science, 2339: 70-236/S0025-5718-01-01400- 117–??, 2002. CODEN 4/bookrev-S0025-5718-01- LNCSD9. ISSN 0302- 01400-4.html; http:/ 9743 (print), 1611-3349 /www.ams.org/mcom/2001- (electronic). URL http: 70-236/S0025-5718-01-01400- //link.springer-ny.com/ 4/S0025-5718-01-01400- link/service/series/0558/ 4.dvi; http://www.ams. bibs/2339/23390117.htm; org/mcom/2001-70-236/S0025- http://link.springer- 5718-01-01400-4/S0025- ny.com/link/service/series/ 5718-01-01400-4.pdf; 0558/papers/2339/23390117. http://www.ams.org/mcom/ pdf. 2001-70-236/S0025-5718- 01-01400-4/S0025-5718- Maurer:2003:SMR 01-01400-4.ps; http:/ /www.ams.org/mcom/2001- [MP03] Ueli Maurer and Krzysztof 70-236/S0025-5718-01-01400- Pietrzak. The security of 4/S0025-5718-01-01400- many-round Luby–Rackoff 4.tex. pseudo-random permuta- tions. Lecture Notes in Moshopoulos:2001:NSA Computer Science, 2656: [MP01c] Nikos K. Moshopoulos and 544–561, 2003. CODEN K. Z. Pekmestzi. A novel LNCSD9. ISSN 0302-9743 systolic architecture for an (print), 1611-3349 (elec- efficient RSA implementa- tronic). URL http://link. tion. Lecture Notes in springer.com/content/pdf/ Computer Science, 1992: 10.1007/3-540-39200-9_ 416–??, 2001. CODEN 34.pdf. LNCSD9. ISSN 0302- Micciancio:2005:ASS 9743 (print), 1611-3349 (electronic). URL http: [MP05] Daniele Micciancio and //link.springer-ny.com/ Saurabh Panjwani. Adap- link/service/series/0558/ tive security of symbolic en- REFERENCES 519

cryption. In Kilian [Kil05], Transactions on Network- pages 169–?? CODEN ing, 16(4):803–813, August LNCSD9. ISBN 3-540- 2008. CODEN IEANEP. 24573-1 (softcover). ISSN ISSN 1063-6692 (print), 0302-9743 (print), 1611- 1558-2566 (electronic). 3349 (electronic). LCCN QA76.9.A25 T44 2005. URL Mislove:2006:EBO http://www.springerlink. [MPHD06] Alan Mislove, Ansley Post, com/openurl.asp?genre= Andreas Haeberlen, and Pe- issue&issn=0302-9743&volume= ter Druschel. Experiences 3378; http://www.springerlink. in building and operating com/openurl.asp?genre= ePOST, a reliable peer-to- volume&id=doi:10.1007/ peer application. Operating b106171. Systems Review, 40(4):147– Matusiewicz:2006:FGD 159, October 2006. CODEN OSRED8. ISSN 0163-5980 [MP06] Krystian Matusiewicz and (print), 1943-586X (elec- Josef Pieprzyk. Finding tronic). good differential patterns for attacks on SHA-1. In Moralis:2009:KSA Ytrehus [Ytr06], pages 164– [MPPM09] Athanasios Moralis, Vassi- 177. ISBN 3-540-35481- liki Pouli, Symeon Papavas- 6. LCCN QA76.9.A25 I557 siliou, and Vasilis Maglaris. 2005. A Kerberos security ar- Munilla:2007:HMF chitecture for Web ser- vices based instrumenta- [MP07] J. Munilla and A. Peinado. tion grids. Future Gen- HB-MP: a further step in eration Computer Systems, the HB-family of lightweight 25(7):804–818, July 2009. authentication protocols. CODEN FGSEVI. ISSN Computer Networks (Ams- 0167-739X (print), 1872- terdam, Netherlands: 1999), 7115 (electronic). 51(9):2262–2267, June 20, 2007. CODEN ???? ISSN MacKenzie:2000:PAK 1389-1286 (print), 1872- [MPS00] Philip MacKenzie, Sarvar 7069 (electronic). Patel, and Ram Swami- Micciancio:2008:OCC nathan. Password-authenticated key exchange based on [MP08] Daniele Micciancio and RSA. Lecture Notes in Saurabh Panjwani. Optimal Computer Science, 1976: communication complexity 599–??, 2000. CODEN of generic multicast key LNCSD9. ISSN 0302- distribution. IEEE/ACM 9743 (print), 1611-3349 REFERENCES 520

(electronic). URL http: MacKenzie:2001:TPG //link.springer-ny.com/ link/service/series/0558/[MR01a] Philip MacKenzie and Mich- bibs/1976/19760599.htm; ael K. Reiter. Two-party http://link.springer- generation of DSA signa- ny.com/link/service/series/ tures. In Kilian [Kil01a], 0558/papers/1976/19760599. pages 137–?? ISBN 3-540- pdf. 42456-3 (paperback). LCCN QA76.9.A25 C79 2001; Micali:2005:OEC QA267.A1 L43 no.2139. [MPSW05] Silvio Micali, Chris Peikert, UK£47.00. URL http: Madhu Sudan, and David A. //link.springer-ny.com/ Wilson. Optimal error cor- link/service/series/0558/ rection against computa- bibs/2139/21390137.htm; tionally bounded noise. In http://link.springer- Kilian [Kil05], pages 1– ny.com/link/service/series/ ?? CODEN LNCSD9. 0558/papers/2139/21390137. ISBN 3-540-24573-1 (soft- pdf. cover). ISSN 0302-9743 Micali:2001:MRR (print), 1611-3349 (elec- tronic). LCCN QA76.9.A25 [MR01b] Silvio Micali and Leonid T44 2005. URL http: Reyzin. Min-round reset- //www.springerlink.com/ table zero-knowledge in the openurl.asp?genre=issue& public-key model. Lecture issn=0302-9743&volume= Notes in Computer Science, 3378; http://www.springerlink. 2045:373–??, 2001. CO- com/openurl.asp?genre= DEN LNCSD9. ISSN 0302- volume&id=doi:10.1007/ 9743 (print), 1611-3349 b106171. (electronic). URL http: //link.springer-ny.com/ Monrose:2000:KDB link/service/series/0558/ [MR00] Fabian Monrose and Aviel D. bibs/2045/20450373.htm; Rubin. Keystroke dy- http://link.springer- namics as a biometric for ny.com/link/service/series/ authentication. Future 0558/papers/2045/20450373. Generation Computer Sys- pdf. tems, 16(4):351–359, Febru- Micali:2001:SPK ary 2000. CODEN FG- SEVI. ISSN 0167-739X [MR01c] Silvio Micali and Leonid (print), 1872-7115 (elec- Reyzin. Soundness in the tronic). URL http://www. public-key model. In Kil- elsevier.com/gej-ng/10/ ian [Kil01a], pages 542– 19/19/41/27/30/abstract. ?? ISBN 3-540-42456- html. 3 (paperback). LCCN REFERENCES 521

QA76.9.A25 C79 2001; //www.isg.rhul.ac.uk/~ QA267.A1 L43 no.2139. mrobshaw/aes-crypto.pdf. UK£47.00. URL http: //link.springer-ny.com/ Matyas:2003:TRU link/service/series/0558/ bibs/2139/21390542.htm; [MR03] V´aclav Maty´as, Jr. and http://link.springer- Zdenek Riha. Toward re- ny.com/link/service/series/ liable user authentication 0558/papers/2139/21390542. through biometrics. IEEE pdf. Security & Privacy, 1(3):45– 49, May/June 2003. CO- Murphy:2002:EASa DEN ???? ISSN 1540-7993 (print), 1558-4046 (elec- [MR02a] S. Murphy and M. J. B. tronic). URL http://dlib. Robshaw. Essential al- computer.org/sp/books/ gebraic structure within sp2003/pdf/j3045.pdf; the AES. Report, In- http://www.computer.org/ formation Security Group, security/j3045abs.htm. Royal Holloway, Univer- sity of London, Egham, Micciancio:2009:LBC Surrey, TW20 0EX, UK, 2002. 16 pp. URL http: [MR09] Daniele Micciancio and //www.isg.rhul.ac.uk/~ Oded Regev. Lattice-based mrobshaw/aes-crypto.pdf. cryptography. In Bern- stein et al. [BBD09], pages Murphy:2002:EASb 147–192. ISBN 3-540- 88701-6 (hardcover), 3-642- [MR02b] Sean Murphy and Matthew 10019-8 (softcover). LCCN J. B. Robshaw. Es- QA76.9.A25 P67 2009. sential algebraic structure within the AES. In Monrose:2002:TSG Yung [Yun02a], pages 1– 16. CODEN LNCSD9. [MRL+02] Fabian Monrose, Michael ISBN 3-540-44050-X (pa- Reiter, Qi Li, Daniel P. Lo- perback). ISSN 0302-9743 presti, and Chilin Shih. To- (print), 1611-3349 (elec- ward speech-generated cryp- tronic). LCCN QA76.9.A25 tographic keys on resource- C79 2002. URL http:/ constrained devices. In /link.springer.de/link/ USENIX [USE02b], pages service/series/0558/bibs/ 283–296. ISBN 1-931971- 2442/24420001.htm; http: 00-5. LCCN ???? URL //link.springer.de/link/ http://www.usenix.org/ service/series/0558/papers/ publications/library/proceedings/ 2442/24420001.pdf; http: sec02/monrose.html. REFERENCES 522

Mitchell:2006:PPT 9743 (print), 1611-3349 (electronic). URL http: [MRST06] John C. Mitchell, Ajith //link.springer-ny.com/ Ramanathan, Andre Sce- link/service/series/0558/ drov, and Vanessa Teague. bibs/1965/19650078.htm; A probabilistic polynomial- http://link.springer- time process calculus for the ny.com/link/service/series/ analysis of cryptographic 0558/papers/1965/19650078. protocols. Theoretical Com- pdf. puter Science, 353(1–3): 118–164, March 14, 2006. Maggi:2002:USV CODEN TCSCDI. ISSN 0304-3975 (print), 1879- [MS02a] Paolo Maggi and Riccardo 2294 (electronic). Sisto. Using SPIN to verify security properties of cryp- Moghadam:2010:DRN tographic protocols. Lecture Notes in Computer Science, [MRT10] I. Zarei Moghadam, A. S. 2318:187–??, 2002. CO- Rostami, and M. R. Tan- DEN LNCSD9. ISSN 0302- hatalab. Designing a ran- 9743 (print), 1611-3349 dom number generator with (electronic). URL http: novel parallel LFSR sub- //link.springer-ny.com/ structure for key stream link/service/series/0558/ ciphers. In 2010 In- bibs/2318/23180187.htm; ternational Conference on http://link.springer- Computer Design and Ap- ny.com/link/service/series/ plications (ICCDA),vol- 0558/papers/2318/23180187. ume 5, pages V5–598–V5– pdf. 601. IEEE Computer So- ciety Press, 1109 Spring Maitra:2002:CSB Street, Suite 300, Sil- ver Spring, MD 20910, [MS02b] Subhamoy Maitra and USA, 2010. URL http: Palash Sarkar. Cryp- //ieeexplore.ieee.org/ tographically significant stamp/stamp.jsp?tp=&arnumber= Boolean functions with 5541188. five valued Walsh spec- Mayer-Sommer:2001:SAS tra. Theoretical Computer Science, 276(1–2):133–146, [MS01] Rita Mayer-Sommer. Smartly April 6, 2002. CODEN analyzing the simplicity and TCSCDI. ISSN 0304-3975 the power of simple power (print), 1879-2294 (elec- analysis on smartcards. Lec- tronic). URL http:/ ture Notes in Computer Sci- /www.elsevier.com/gej- ence, 1965:78–??, 2001. CO- ng/10/41/16/247/27/33/ DEN LNCSD9. ISSN 0302- abstract.html. REFERENCES 523

Menezes:2002:PCI 2002512977.html; http: //www.loc.gov/catdir/description/ [MS02c] A. J. (Alfred J.) Menezes wiley036/2002512977.html; and Palash Sarkar, edi- http://www.loc.gov/catdir/ tors. Progress in cryptol- toc/wiley031/2002512977. ogy: INDOCRYPT 2002: html. Third International Confer- Muthukrishnan:2002:IAS ence on Cryptology in India, Hyderabad, India, Decem- [MS02e] S. Muthukrishnan and ber 16–18, 2002: Proceed- S. Cenk Sahinalp. An im- ings, volume 2551 of Lecture proved algorithm for se- Notes in Computer Science. quence comparison with Springer-Verlag, Berlin, block reversals. Lecture Germany / Heidelberg, Ger- Notes in Computer Science, many / London, UK / etc., 2286:319–??, 2002. CO- 2002. CODEN LNCSD9. DEN LNCSD9. ISSN 0302- ISBN 3-540-00263-4 (soft- 9743 (print), 1611-3349 cover). ISSN 0302-9743 (electronic). URL http: (print), 1611-3349 (elec- //link.springer-ny.com/ tronic). LCCN QA76.9.A25 link/service/series/0558/ I5535 2002. URL http: bibs/2286/22860319.htm; //link.springer-ny.com/ http://link.springer- link/service/series/0558/ ny.com/link/service/series/ tocs/t2551.htm; http: 0558/papers/2286/22860319. //www.springerlink.com/ pdf. openurl.asp?genre=issue& issn=0302-9743&volume= Markowitch:2003:CWV 2551. Also available via the World Wide Web. [MS03a] Olivier Markowitch and Shahrokh Saeednia. Crypt- Mitnick:2002:ADC analysis of the Wu–Varadhrajan fair exchange protocol. In- [MS02d] Kevin D. (Kevin David) formation Processing Let- Mitnick and William L. ters, 87(3):169–171, August Simon. The art of de- 16, 2003. CODEN IF- ception: controlling the PLAT. ISSN 0020-0190 human element of secu- (print), 1872-6119 (elec- rity. John Wiley and Sons, tronic). Inc., New York, NY, USA, 2002. ISBN 0-471-23712- Miklau:2003:CAP 4, 0-7645-4280-X (paper- back). xvi + 352 pp. [MS03b] Gerome Miklau and Dan LCCN QA76.9.A25 M585 Suciu. Controlling ac- 2002. URL http://www. cess to published data loc.gov/catdir/bios/wiley043/ using cryptography. In REFERENCES 524

Freytag et al. [FLA+03], sistencies for blind image pages 898–909. ISBN 0- forensics. Image and Vi- 12-722442-4. LCCN ???? sion Computing, 27(10): URL http://www.vldb. 1497–1503, 2009. CO- org/dblp/db/indices/a- DEN IVCODK. ISSN tree/m/Miklau:Gerome.html. 0262-8856. URL http:/ /www.sciencedirect.com/ Martin:2005:PET science/article/pii/S0262885609000146. [MS05a] David Martin and Andrei Special Section: Computer Serjantov, editors. Pri- Vision Methods for Ambient vacy Enhancing Technolo- Intelligence. gies: 4th International Manulis:2009:SMF Workshop, PET 2004, Toronto, Canada, May 26– [MS09b] Mark Manulis and J¨org 28, 2004. Revised Selected Schwenk. Security model Papers, volume 3424 of Lec- and framework for informa- ture Notes in Computer tion aggregation in sensor Science. Springer-Verlag, networks. ACM Transac- Berlin, Germany / Heidel- tions on Sensor Networks,5 berg, Germany / London, (2):13:1–13:??, March 2009. UK / etc., 2005. CO- CODEN ???? ISSN DEN LNCSD9. ISBN 3-540- 1550-4859 (print), 1550- 26203-2. ISSN 0302-9743 4867 (electronic). (print), 1611-3349 (elec- tronic). LCCN QA76.9.A25 Mashatan:2009:ITC P49 2004. [MS09c] Atefeh Mashatan and Dou- Meadows:2005:CPA glas R. Stinson. Interac- [MS05b] Catherine Meadows and tive two-channel message Paul Syverson, editors. CCS authentication based on ’05: proceedings of the 12th Interactive–Collision Resis- ACM Conference on Com- tant hash functions. In- puter and Communications ternational Journal of In- Security: November 7–11, formation Security, 8(1):49– 2005, Alexandria, Virginia, 60, February 2009. CO- USA. ACM Press, New DEN ???? ISSN 1615-5262 York, NY 10036, USA, 2005. (print), 1615-5270 (elec- ISBN 1-59593-226-7. LCCN tronic). URL http://link. QA76.9.A25. ACM order springer.com/article/10. number 459050. 1007/s10207-008-0063-0. Mahdian:2009:UNI Myers:2009:BEC [MS09a] Babak Mahdian and Stanislav [MS09d] S. Myers and A. Shelat. Bit Saic. Using noise incon- encryption is complete. In REFERENCES 525

IEEE [IEE09b], pages 607– QA76.9.A25 C79 2002. URL 616. ISBN 0-7695-3850- http://link.springer-ny. 9. LCCN QA76 .S95 2009. com/link/service/series/ IEEE Computer Society or- 0558/bibs/2455/24550224. der number P3850. htm; http://link.springer- Shen:2005:NIW ny.com/link/service/series/ 0558/papers/2455/24550224. [mSgFtL05] Rui min Shen, Yong gang pdf; http://link.springer. Fu, and Hong tao Lu. A de/link/service/series/ novel image watermarking 0558/bibs/2442/24420385. scheme based on support htm; http://link.springer. vector regression. The Jour- de/link/service/series/ nal of Systems and Software, 0558/papers/2442/24420385. 78(1):1–8, October 2005. pdf. CODEN JSSODM. ISSN 0164-1212 (print), 1873- McClure:2003:HEN 1228 (electronic). [MSK03] Stuart McClure, Joel Scam- Marton:2010:RDC bray, and George Kurtz. [MSI10] Kinga Marton, Alin Su- Hacking exposed: network ciu, and Iosif Ignat. Ran- security secrets and solu- domness in digital cryp- tions. Osborne/McGraw- tography: a survey. Ro- Hill, Berkeley, CA, USA, manian Journal of Infor- fourth edition, 2003. ISBN mation Science and Tech- 0-07-222742-7. xxiv + 737 nology, 13(3):219–240, ???? pp. LCCN TK5105359 2010. CODEN ???? ISSN .M48 2003. URL ftp:// 1453-8245. URL http:www. uiarchive.cso.uiuc.edu/ imt.ro/romjist/Volum13/ pub/etext/gutenberg/; Number13_3/pdf/KMarton. http://www.loc.gov/catdir/ pdf. bios/mh051/2004351501. html; http://www.loc. MacKenzie:2002:TPA gov/catdir/description/ mh051/2004351501.html; [MSJ02] Philip MacKenzie, Tho- http://www.loc.gov/catdir/ mas Shrimpton, and Markus toc/mh051/2004351501.html. Jakobsson. Threshold password-authenticated key Matsumoto:2007:FSC exchange: (extended ab- stract). In Yung [Yun02a], [MSNH07] Makoto Matsumoto, Mut- pages 385–400. CODEN suo Saito, Takuji Nishimura, LNCSD9. ISBN 3-540- and Mariko Hagita. A 44050-X (paperback). ISSN fast stream cipher with huge 0302-9743 (print), 1611- state space and quasigroup 3349 (electronic). LCCN filter for software. In Adams REFERENCES 526

et al. [AMW07], pages 246– com/openurl.asp?genre= 263. ISBN 3-540-77360-6. issue&issn=0302-9743&volume= LCCN ???? 3152; http://www.springerlink. Miltchev:2008:DAC com/openurl.asp?genre= volume&id=doi:10.1007/ [MSP+08] Stefan Miltchev, Jonathan M. b99099. Smith, Vassilis Prevelakis, Myasnikov:2005:PAB Angelos Keromytis, and Sotiris Ioannidis. Decentral- [MSU05] Alexei Myasnikov, Vladimir ized access control in dis- Shpilrain, and Alexander tributed file systems. ACM Ushakov. A practical at- Computing Surveys, 40(3): tack on a braid group 10:1–10:30, August 2008. based cryptographic proto- CODEN CMSVAN. ISSN col. In Shoup [Sho05a], 0360-0300 (print), 1557- pages 86–?? ISBN 3-540- 7341 (electronic). 28114-2. ISSN 0302-9743 (print), 1611-3349 (elec- Mouratidis:2009:PMD tronic). LCCN QA76.9.A25 C79 2005; QA76.9 .A25; [MSP09] Kyriakos Mouratidis, Dim- QA76.9 C79 2005; QA76.9 itris Sacharidis, and Hwee- C794 2005; QA76.9; In- hwa Pang. Partially mate- ternet. URL http:/ rialized digest scheme: an /www.springerlink.com/ efficient verification method openurl.asp?genre=issue& for outsourced databases. issn=0302-9743&volume= VLDB Journal: Very Large 3621. Data Bases, 18(1):363–381, January 2009. CODEN Muzereau:2004:EBD VLDBFR. ISSN 1066-8888 [MSV04] A. Muzereau, N. P. Smart, (print), 0949-877X (elec- and F. Vercauteren. The tronic). equivalence between the Moran:2004:NIT DHP and DLP for elliptic curves used in practical ap- [MSTS04] Tal Moran, Ronen Shaltiel, plications. LMS Journal and Amnon Ta-Shma. Non- of Computation and Math- interactive timestamping in ematics, 7:50–??, 2004. CO- the bounded storage model. DEN ???? ISSN 1461-1570. In Franklin [Fra04], pages Marsaglia:2002:SDP 460–?? CODEN LNCSD9. ISBN 3-540-22668-0. ISSN [MT02] George Marsaglia and Wai Wan 0302-9743 (print), 1611- Tsang. Some difficult- 3349 (electronic). LCCN to-pass tests of random- 10.1007/b99099. URL ness. Journal of Statisti- http://www.springerlink. cal Software, 7(3):1–8, 2002. REFERENCES 527

CODEN JSSOBK. ISSN cryptography (Cheju Island, ???? URL http://www. 2001), volume 1992 of Lec- jstatsoft.org/v07/i03; ture Notes in Comput. Sci., http://www.jstatsoft. pages 1–18. Springer-Verlag, org/v07/i03/tuftests.c; Berlin, Germany / Heidel- http://www.jstatsoft. berg, Germany / London, org/v07/i03/tuftests.pdf; UK / etc., 2001. URL http: http://www.jstatsoft. //link.springer-ny.com/ org/v07/i03/updates. link/service/series/0558/ bibs/1992/19920001.htm; Meseguer:2007:SRA http://link.springer- [MT07] Jos´e Meseguer and Prasanna ny.com/link/service/series/ Thati. Symbolic reacha- 0558/papers/1992/19920001. bility analysis using nar- pdf. rowing and its application to verification of crypto- Muller:2001:SIC graphic protocols. Higher- Order and Symbolic Com- [M¨ul01b] Siguna M¨uller. A survey of putation, 20(1–2):123–160, IND-CCA secure public-key June 2007. CODEN encryption schemes relative LSCOEX. ISSN 1388- to factoring. In Public-key 3690 (print), 2212-0793 cryptography and computa- (electronic). URL http: tional number theory (War- //www.springerlink.com/ saw, 2000), pages 181–196. openurl.asp?genre=article& Walter de Gruyter, New issn=1388-3690&volume= York, NY, USA, 2001. 20&issue=1&spage=123. Mullins:2002:MUC Ma:2009:NAS [Mul02] J. Mullins. Making unbreak- [MT09] Di Ma and Gene Tsudik. able code. IEEE Spectrum, A new approach to secure 39(5):40–45, May 2002. CO- logging. ACM Transac- DEN IEESAM. ISSN 0018- tions on Storage, 5(1):2:1– 9235 (print), 1939-9340 2:??, March 2009. CO- (electronic). DEN ???? ISSN 1553-3077 (print), 1553-3093 (elec- Mullins:2006:CC tronic). Muller:2001:SWB [Mul06] J. Mullins. Chaotic commu- nication. IEEE Spectrum, [M¨ul01a] Siguna M¨uller. On the 43(1):11–12, January 2006. security of a Williams CODEN IEESAM. ISSN based public key encryp- 0018-9235 (print), 1939- tion scheme. In Public key 9340 (electronic). REFERENCES 528

Munro:2008:DE Murton:2006:CGH

[Mun08] Ken Munro. Desktop en- [Mur06] Daniel Murton. Crypto cryption. Network Se- goes to the heart. Net- curity, 2008(12):4–6, De- work Security, 2006(5): cember 2008. CODEN 19, May 2006. CODEN NTSCF5. ISSN 1353-4858 NTSCF5. ISSN 1353-4858 (print), 1872-9371 (elec- (print), 1872-9371 (elec- tronic). URL http:// tronic). URL http:// www.sciencedirect.com/ www.sciencedirect.com/ science/article/pii/S1353485808701387. science/article/pii/S1353485806703907. Moriai:2000:PTL Murphy:2000:KST [MV00] Shiho Moriai and Serge [Mur00] S. Murphy. The key separa- Vaudenay. On the pseu- tion of Twofish. Comments dorandomness of top-level on AES round 2 submitted schemes of block ciphers. to NIST., March 2000. Lecture Notes in Computer Science, 1976:289–??, 2000. Murray:2001:CDC CODEN LNCSD9. ISSN 0302-9743 (print), 1611- [Mur01] Eric Murray. Changes in de- 3349 (electronic). URL ployment of cryptography, http://link.springer-ny. and possible causes, 2001. com/link/service/series/ URL http://www.usenix. 0558/bibs/1976/19760289. org/publications/library/ htm; http://link.springer- proceedings/sec01/murray/ ny.com/link/service/series/ index.htm. Unpublished in- 0558/papers/1976/19760289. vited talk, Tenth USENIX pdf. Security Symposium, Au- gust 13–17, 2001, Washing- Meister:2001:PPG ton, DC, USA. [MV01] Gisela Meister and Michael Murray:2002:IYP Vogel. Protection profiles and generic security targets [Mur02] Mark R. V. Murray. An im- for smart cards as secure plementation of the Yarrow signature creation devices PRNG for FreeBSD. In — existing solutions for the USENIX [USE02a], pages payment sector. Lecture 47–53. ISBN 1-880446-02-2. Notes in Computer Science, LCCN QA76.76.O63 B736 2140:179–??, 2001. CO- 2002. URL http://www. DEN LNCSD9. ISSN 0302- usenix.org/publications/ 9743 (print), 1611-3349 library/proceedings/bsdcon02/ (electronic). URL http: murray.html. //link.springer-ny.com/ REFERENCES 529

link/service/series/0558/ dan Warinschi. Com- bibs/2140/21400179.htm; pleteness theorems for the http://link.springer- Abadi–Rogaway language ny.com/link/service/series/ of encrypted expressions. 0558/papers/2140/21400179. Journal of Computer Se- pdf. curity, 12(1):99–129, ???? 2004. CODEN JCSIET. Micciancio:2003:SZK ISSN 0926-227X (print), [MV03a] Daniele Micciancio and 1875-8924 (electronic). Salil P. Vadhan. Statis- Ma:2006:ADS tical zero-knowledge proofs with efficient provers: Lat- [MW06] Mingchao Ma and Steve tice problems and more. In Woodhead. Authentication Boneh [Bon03], pages 282– delegation for subscription- 298. CODEN LNCSD9. based remote network ser- ISBN 3-540-40674-3. ISSN vices. Computers & 0302-9743 (print), 1611- Security, 25(5):371–378, 3349 (electronic). LCCN July 2006. CODEN QA76.9.A25 C79 2003. URL CPSEDU. ISSN 0167-4048 http://link.springer-ny. (print), 1872-6208 (elec- com/link/service/series/ tronic). URL https:// 0558/tocs/t2729.htm; www.sciencedirect.com/ http://www.springerlink. science/article/pii/S0167404806000575. com/openurl.asp?genre= issue&issn=0302-9743&volume= Morelli:2001:JAH 2729; http://www.springerlink. [MWM01] Ralph Morelli, Ralph Walde, com/openurl.asp?genre= and Gregg Marcuccio. A volume&id=doi:10.1007/ Java API for historical ci- b11817. phers: an object-oriented Morrow:2003:DIB design project. SIGCSE [MV03b] Monique Morrow and Ka- Bulletin (ACM Special In- teel Vijayananda. Develop- terest Group on Computer ing IP-based services: so- Science Education), 33(1): lutions for service providers 307–311, March 2001. CO- and vendors. Morgan Kauf- DEN SIGSD3. ISSN 0097- mann Publishers, Los Altos, 8418 (print), 2331-3927 CA 94022, USA, 2003. ISBN (electronic). 1-55860-779-X. xxi + 313 Malan:2008:IPK pp. LCCN TK5105.5 .M72 2003. US$49.95. [MWS08] David J. Malan, Matt Micciancio:2004:CTA Welsh, and Michael D. Smith. Implementing [MW04] Daniele Micciancio and Bog- public-key infrastructure for REFERENCES 530

sensor networks. ACM Morelos-Zaragoza:2002:AEC Transactions on Sensor Networks, 4(4):22:1–22:??, [MZ02] Robert Morelos-Zaragoza. August 2008. CODEN ???? The Art of Error Correct- ISSN 1550-4859 (print), ing Coding. John Wiley 1550-4867 (electronic). and Sons, Inc., New York, NY, USA, 2002. ISBN 0- MRaihi:2001:CAS 471-49581-6. xvi + 221 pp. LCCN ???? UK£45.00, [MY01] David M’Ra¨ıhi and Moti US$95.00. URL http:// Yung. E-commerce applica- www.loc.gov/catdir/description/ tions of smart cards. Com- wiley035/2002280749.html; puter Networks (Amster- http://www.loc.gov/catdir/ dam, Netherlands: 1999), toc/wiley023/2002280749. 36(4):453–472, July 16, html. 2001. CODEN ???? ISSN 1389-1286 (print), 1872- Matsui:2004:SAC 7069 (electronic). URL [MZ04] Mitsuru Matsui and Robert http://www.elsevier.nl/ Zuccherato, editors. Selected gej-ng/10/15/22/61/28/ Areas in Cryptography: 31/abstract.html; http: 10th Annual International //www.elsevier.nl/gej- Workshop, SAC 2003, Ot- ng/10/15/22/61/28/31/article. tawa, Canada, August 14– pdf. 15, 2003, Revised Papers, McCook:2001:NSS volume 3006 of Lecture Notes in Computer Science. [MYC01] Alison McCook, Philip Springer-Verlag, Berlin, Yam, and Graham P. Germany / Heidelberg, Ger- Collins. News scan: The not many / London, UK / etc., so sheltering sky; computer: 2004. CODEN LNCSD9. Hack job; tissue engineer- ISBN 3-540-21370-8. ISSN ing: Fat into cartilage; psy- 0302-9743 (print), 1611- chology: Holier than thou; 3349 (electronic). LCCN astronomy: Otherworldly ???? URL http:/ ocean; physics: Microscopic /link.springer-ny.com/ maelstrom; medicine: Fe- link/service/series/0558/ tal cell setback. Scien- tocs/t3006.htm; http: tific American, 284(5):24– //www.springerlink.com/ 25, May 2001. CODEN openurl.asp?genre=issue& SCAMAC. ISSN 0036-8733 issn=0302-9743&volume= (print), 1946-7087 (elec- 3006; http://www.springerlink. tronic). URL http://www. com/openurl.asp?genre= sciam.com/2001/0501issue/ volume&id=doi:10.1007/ 0501inbrief.html. b96837. REFERENCES 531

Nagy:2007:AQK (print), 1611-3349 (elec- tronic). LCCN QA267.A1 [NA07] Naya Nagy and Selim G. L43 no.2020; QA76.9.A25 Akl. Authenticated quan- R753 2001. URL http: tum key distribution with- //link.springer-ny.com/ out classical communica- link/service/series/0558/ tion. Parallel Process- tocs/t2020.htm; http: ing Letters, 17(3):323–335, //www.springerlink.com/ September 2007. CODEN openurl.asp?genre=issue& PPLTEE. ISSN 0129-6264 issn=0302-9743&volume= (print), 1793-642X (elec- 2020. tronic). Naftali:2005:BSS Naik:2003:DSW [Naf05] Timothy J. Naftali. Blind spot: the secret history of [NABG03] Vinayak Naik, Anish Arora, American counterterrorism. Sandip Bapat, and Mo- Basic Books, New York, hamed Gouda. Dependable NY, USA, 2005. ISBN 0- systems: Whisper: Local se- 465-09281-0 (hardcover). xv cret maintenance in sensor + 399 pp. LCCN HV6432 networks. IEEE Distributed .N34 2005. URL http:// Systems Online, 4(9), 2003. www.loc.gov/catdir/toc/ CODEN ???? ISSN 1541- ecip057/2005003248.html. 4922 (print), 1558-1683 (electronic). URL http:/ Nakai:2001:SFW /dsonline.computer.org/ [Nak01] Yuichi Nakai. Semi frag- . 0309/f/gaep.htm ile watermarking based on Naccache:2001:TCC wavelet transform. Lecture Notes in Computer Science, [Nac01] David Naccache, editor. 2195:796–??, 2001. CO- Topics in cryptology, CT- DEN LNCSD9. ISSN 0302- RSA 2001: the Cryptogra- 9743 (print), 1611-3349 phers’ Track at RSA Con- (electronic). URL http: ference 2001, San Fran- //link.springer-ny.com/ cisco, CA, USA, April 8–12, link/service/series/0558/ 2001: Proceedings,volume bibs/2195/21950796.htm; 2020 of Lecture Notes in http://link.springer- Computer Science. Spring- ny.com/link/service/series/ er-Verlag, Berlin, Ger- 0558/papers/2195/21950796. many / Heidelberg, Ger- pdf. many / London, UK / etc., Namprempre:2002:SCB 2001. CODEN LNCSD9. ISBN 3-540-41898-9 (pa- [Nam02] Chanathip Namprempre. perback). ISSN 0302-9743 Secure channels based on REFERENCES 532

authenticated encryption DEN LNCSD9. ISBN 3-540- schemes: a simple charac- 40674-3. ISSN 0302-9743 terization. Lecture Notes (print), 1611-3349 (elec- in Computer Science, 2501: tronic). LCCN QA76.9.A25 515–??, 2002. CODEN C79 2003. URL http: LNCSD9. ISSN 0302-9743 //link.springer-ny.com/ (print), 1611-3349 (elec- link/service/series/0558/ tronic). URL http:// tocs/t2729.htm; http: link.springer.de/link/ //www.springerlink.com/ service/series/0558/bibs/ openurl.asp?genre=issue& 2501/25010515.htm; http: issn=0302-9743&volume= //link.springer.de/link/ 2729; http://www.springerlink. service/series/0558/papers/ com/openurl.asp?genre= 2501/25010515.pdf. volume&id=doi:10.1007/ b11817. Naor:2002:DRA Naor:2004:TCF [Nao02] Moni Naor. Deniable [Nao04] Moni Naor, editor. Theory ring authentication. In of Cryptography: First The- Yung [Yun02a], pages 481– ory of Cryptography Con- 498. CODEN LNCSD9. ference, TCC 2004, Cam- ISBN 3-540-44050-X (pa- bridge, MA, USA, Febru- perback). ISSN 0302-9743 ary 19–21, 2004: Proceed- (print), 1611-3349 (elec- ings, volume 2951 of Lec- tronic). LCCN QA76.9.A25 ture Notes in Computer C79 2002. URL http:/ Science. Springer-Verlag, /link.springer.de/link/ Berlin, Germany / Heidel- service/series/0558/bibs/ berg, Germany / London, 2442/24420210.htm; http: UK / etc., 2004. CO- //link.springer.de/link/ DEN LNCSD9. ISBN 3-540- service/series/0558/bibs/ 21000-8. ISSN 0302-9743 2442/24420481.htm; http: (print), 1611-3349 (elec- //link.springer.de/link/ tronic). LCCN QA76.9.A25 service/series/0558/papers/ C6676 2004. URL http: 2442/24420210.pdf; http: //link.springer-ny.com/ //link.springer.de/link/ link/service/series/0558/ service/series/0558/papers/ tocs/t2951.htm; http: 2442/24420481.pdf. //www.springerlink.com/ Naor:2003:CAC openurl.asp?genre=issue& issn=0302-9743&volume= [Nao03] Moni Naor. On crypto- 2951; http://www.springerlink. graphic assumptions and com/openurl.asp?genre= challenges. In Boneh volume&id=doi:10.1007/ [Bon03], pages 96–109. CO- b95566. REFERENCES 533

NIST:2000:FPD 0558/papers/2229/22290352. pdf. [Nat00] National Institute of Stan- dards and Technology. FIPS Nghiem:2009:FBI PUB 186-2: Digital Signa- ture Standard (DSS).Na-[NC09] Thao P. Nghiem and Tae Ho tional Institute for Stan- Cho. A fuzzy-based inter- dards and Technology, leaved multi-hop authenti- Gaithersburg, MD 20899- cation scheme in wireless 8900, USA, January 27, sensor networks. Journal 2000. URL http://www. of Parallel and Distributed itl.nist.gov/fipspubs/ Computing, 69(5):441–450, fip186-2.pdf. May 2009. CODEN JPD- CER. ISSN 0743-7315 Nazario:2002:RYS (print), 1096-0848 (elec- tronic). [Naz02] Jose Nazario. A rough year for SSH. Linux Journal, 95: Ning:2004:TTA ??, March 2002. CODEN LIJOFX. ISSN 1075-3583 [NCRX04] Peng Ning, Yun Cui, Dou- (print), 1938-3827 (elec- glas S. Reeves, and Ding- tronic). URL http:// bang Xu. Techniques and noframes.linuxjournal. tools for analyzing intru- com/lj-issues/issue95/ sion alerts. ACM Trans- article.php?sid=5672.Web actions on Information and only. System Security, 7(2):274– 318, May 2004. CODEN Nieto:2001:PKC ATISBQ. ISSN 1094-9224 (print), 1557-7406 (elec- [NBD01] Juan Manuel Gonz´alez Ni- tronic). eto, Colin Boyd, and Ed Dawson. A public Nedjah:2005:SHC key cryptosystem based on the subgroup membership [Nd05] N. Nedjah and L. de, problem. Lecture Notes Macedo, Mourelle. Soft- in Computer Science, 2229: ware/hardware co-design of 352–??, 2001. CODEN efficient and secure crypto- LNCSD9. ISSN 0302- graphic hardware. J.UCS: 9743 (print), 1611-3349 Journal of Universal Com- (electronic). URL http: puter Science, 11(1):66–??, //link.springer-ny.com/ January 28, 2005. CO- link/service/series/0558/ DEN ???? ISSN 0948-6968. bibs/2229/22290352.htm; URL http://www.jucs. http://link.springer- org/jucs_11_1/software_ ny.com/link/service/series/ hardware_co_design. REFERENCES 534

Nash:2001:PIM gust 27, 2004. URL http:// developer.netscape.com/ [NDJB01] Andrew Nash, William Du- tech/security/ssl/howitworks. ane, Celia Joseph, and html; http://web.archive. Derek Brink. PKI: Imple- org/web/20040827080204/ menting and Managing E- . This is a tutorial of how the Security. McGraw-Hill, New Secure Sockets Layer (SSL) York, NY, USA, 2001. ISBN protocol works. 0-07-213123-3. xxii + 513 pp. LCCN QA76.9.A25 P5 Neuenschwander:2004:PSM 2001. US$49.99. [Neu04] Daniel Neuenschwander. Nedjah:2004:ECH Probabilistic and Statisti- cal Methods in Cryptology: [NdM04] Nadia Nedjah and Luiza An Introduction by Selected de Macedo Mourelle, ed- Topics, volume 3028 of Lec- itors. Embedded crypto- ture Notes in Computer graphic hardware: method- Science. Springer-Verlag, ologies and architectures. Berlin, Germany / Heidel- Nova Science Publishers, berg, Germany / London, New York, NY, USA, UK / etc., 2004. CO- 2004. ISBN 1-59454-012- DEN LNCSD9. ISBN 3- 8 (hardcover). ix + 295 540-22001-1. ISSN 0302- pp. LCCN TK5102.94 9743 (print), 1611-3349 .E49 2004. URL http:// (electronic). x + 158 www.loc.gov/catdir/toc/ pp. LCCN QA76 A1 ecip0417/2004008204.html. L43 3028. URL http: Nedjah:2006:NTC //link.springer-ny.com/ link/service/series/0558/ [NdM06] Nadia Nedjah and Luiza tocs/t3028.htm; http: de Macedo Mourelle, edi- //www.springerlink.com/ tors. New trends in cryp- openurl.asp?genre=issue& tographic systems.Nova issn=0302-9743&volume= Science Publishers, Haup- 3028; http://www.springerlink. pauge, NY, USA, 2006. com/openurl.asp?genre= ISBN 1-59454-977-X. ???? volume&id=doi:10.1007/ pp. LCCN TK7895.E42 b97045. N42 2006. URL http:// Neuenschwander:2006:IMM www.loc.gov/catdir/toc/ ecip066/2006001583.html. [Neu06] Mike Neuenschwander. Iden- Netscape:2004:HSW tity management market shifts — who’s out there? [Net04] Netscape Communications, Network Security, 2006(12): Inc. How SSL works. World- 7–10, December 2006. CO- wide Web document., Au- DEN NTSCF5. ISSN 1353- REFERENCES 535

4858 (print), 1872-9371 and other cryptographic (electronic). URL http:/ primitives. In Kilian [Kil05], /www.sciencedirect.com/ pages 457–?? CODEN science/article/pii/S1353485806704615. LNCSD9. ISBN 3-540- 24573-1 (softcover). ISSN Neve:2003:STF 0302-9743 (print), 1611- [NFQ03] Amaury N`eve, Denis Flan- 3349 (electronic). LCCN dre, and Jean-Jacques QA76.9.A25 T44 2005. URL Quisquater. SOI tech- http://www.springerlink. nology for future high- com/openurl.asp?genre= performance smart cards. issue&issn=0302-9743&volume= IEEE Micro, 23(3):58–67, 3378; http://www.springerlink. May/June 2003. CODEN com/openurl.asp?genre= IEMIDZ. ISSN 0272-1732 volume&id=doi:10.1007/ (print), 1937-4143 (elec- b106171. tronic). URL http://csdl. Nordholt:2002:NFC computer.org/comp/mags/ [NH02] Jane E. Nordholt and mi/2003/03/m3058abs.htm; Richard J. Hughes. A http://csdl.computer. new face for cryptogra- org/dl/mags/mi/2003/03/ phy. Los Alamos Sci- m3058.pdf. ence, 27:68–85, 2002. CO- Nguyen:2001:TFLb DEN LASCDI. ISSN 0273-7116. URL http: [Ngu01] Phong Q. Nguyen. The //library.lanl.gov/cgi- two faces of lattices in cryp- bin/getfile?27-08.pdf. tology. Lecture Notes in Computer Science, 2259: Nyberg:2003:SAC 313–??, 2001. CODEN [NH03] Kaisa Nyberg and Howard LNCSD9. ISSN 0302- Heys, editors. Selected areas 9743 (print), 1611-3349 in cryptography: 9th annual (electronic). URL http: International Workshop, //link.springer-ny.com/ SAC 2002, St. John’s, New- link/service/series/0558/ foundland, Canada, Au- bibs/2259/22590313.htm; gust 15–16, 2002: Re- http://link.springer- vised Papers, volume 2595 ny.com/link/service/series/ of Lecture Notes in Com- 0558/papers/2259/22590313. puter Science. Springer-Ver- pdf. lag, Berlin, Germany / Hei- Nguyen:2005:RBP delberg, Germany / Lon- don, UK / etc., 2003. CO- [Ngu05] Minh-Huyen Nguyen. The DEN LNCSD9. ISBN 3-540- relationship between password- 00622-2. ISSN 0302-9743 authenticated key exchange (print), 1611-3349 (elec- REFERENCES 536

tronic). LCCN QA76.9.A25 5718-02-01454-0.pdf; S22 2002. URL http: http://www.ams.org/mcom/ //link.springer-ny.com/ 2002-71-239/S0025-5718- link/service/series/0558/ 02-01454-0/S0025-5718- tocs/t2595.htm; http: 02-01454-0.ps; http:/ //www.springerlink.com/ /www.ams.org/mcom/2002- openurl.asp?genre=issue& 71-239/S0025-5718-02-01454- issn=0302-9743&volume= 0/S0025-5718-02-01454- 2595. Also available via the 0.tex. World Wide Web. Nielsen:2002:SRO Nicholson:2001:YBC [Nie02b] Jesper Buus Nielsen. Sepa- [Nic01] John Nicholson. You’ve rating random oracle proofs been cracked . . . and from complexity theoretic now you’re sued. ;lo- proofs: The non-committing gin: the USENIX Asso- encryption case. In Yung ciation newsletter, 26(2): [Yun02a], pages 111–126. ??, April 2001. CODEN CODEN LNCSD9. ISBN LOGNEM. ISSN 1044-6397. 3-540-44050-X (paperback). URL http://www.usenix. ISSN 0302-9743 (print), org/publications/login/ 1611-3349 (electronic). LCCN 2001-04/pdfs/nicholson. QA76.9.A25 C79 2002. URL pdf. http://link.springer.de/ link/service/series/0558/ Niederreiter:2002:BRC bibs/2442/24420111.htm; [Nie02a] Harald Niederreiter. Book http://link.springer. review: Cryptography and de/link/service/series/ computational number the- 0558/papers/2442/24420111. ory. Mathematics of Com- pdf. putation, 71(239):??, July Nielsen:2002:TPF 2002. CODEN MCM- PAF. ISSN 0025-5718 [Nie02c] Jesper Buus Nielsen. A (paper), 1088-6842 (elec- threshold pseudorandom tronic). URL http:// function construction and www.ams.org/mcom/2002- its applications. In Yung 71-239/S0025-5718-02-01454- [Yun02a], pages 401–416. 0/bookrev-S0025-5718-02- CODEN LNCSD9. ISBN 01454-0.html; http:/ 3-540-44050-X (paperback). /www.ams.org/mcom/2002- ISSN 0302-9743 (print), 71-239/S0025-5718-02-01454- 1611-3349 (electronic). LCCN 0/S0025-5718-02-01454- QA76.9.A25 C79 2002. URL 0.dvi; http://www.ams. http://link.springer-ny. org/mcom/2002-71-239/S0025- com/link/service/series/ 5718-02-01454-0/S0025- 0558/tocs/t2442.htm; REFERENCES 537

http://www.springerlink. 04-01695-3/S0025-5718- com/openurl.asp?genre= 04-01695-3.ps; http:/ issue&issn=0302-9743&volume= /www.ams.org/mcom/2004- 2442. 73-247/S0025-5718-04-01695- Nievergelt:2002:FLM 3/S0025-5718-04-01695- 3.tex. [Nie02d] Yves Nievergelt. Founda- Nikander:2002:DSAa tions of Logic and Math- ematics: Applications to [Nik02a] Pekka Nikander. Denial-of- Computer Science and Cryp- service, address ownership, tography. Birkh¨auser Verlag, and early authentication in Basel, Switzerland, 2002. the IPv6 world. Lecture ISBN 0-8176-4249-8 , 3- Notes in Computer Science, 7643-4249-8. xvi + 415 2467:12–??, 2002. CODEN pp. LCCN QA9 .N53 LNCSD9. ISSN 0302-9743 2002. URL http://www. (print), 1611-3349 (elec- loc.gov/catdir/enhancements/ tronic). URL http:// fy0812/2001052551-d.html; link.springer.de/link/ http://www.loc.gov/catdir/ service/series/0558/bibs/ enhancements/fy0812/2001052551- 2467/24670012.htm; http: t.html. //link.springer.de/link/ service/series/0558/papers/ Niederreiter:2004:BRC 2467/24670012.pdf. [Nie04] H. Niederreiter. Book re- Nikander:2002:DSAb view: Cryptographic appli- cations of analytic num- [Nik02b] Pekka Nikander. Denial ber theory. Mathematics of of service, address owner- Computation, 73(247):1581– ship, and early authentica- 1582, July 2004. CODEN tion in the IPv6 world (tran- MCMPAF. ISSN 0025-5718 script of discussion). Lecture (print), 1088-6842 (elec- Notes in Computer Science, tronic). URL http:// 2467:22–??, 2002. CODEN www.ams.org/mcom/2004- LNCSD9. ISSN 0302-9743 73-247/S0025-5718-04-01695- (print), 1611-3349 (elec- 3/home.html; http:// tronic). URL http:// www.ams.org/mcom/2004- link.springer.de/link/ 73-247/S0025-5718-04-01695- service/series/0558/bibs/ 3/S0025-5718-04-01695- 2467/24670022.htm; http: 3.dvi; http://www.ams. //link.springer.de/link/ org/mcom/2004-73-247/S0025- service/series/0558/papers/ 5718-04-01695-3/S0025- 2467/24670022.pdf. 5718-04-01695-3.pdf; NIST:2000:TAE http://www.ams.org/mcom/ 2004-73-247/S0025-5718- [NIS00] NIST, editor. The Third REFERENCES 538

Advanced Encryption Stan- Nisley:2003:ELH dard Candidate Conference, April 13–14, 2000, New [Nis03a] E. Nisley. Ed looks at York, NY, USA. National the Institute for Standards and and examines what it means Technology, Gaithersburg, for embedded systems devel- MD 20899-8900, USA, 2000. opers programming in Java ISBN ???? LCCN ???? today. Dr. Dobb’s Jour- URL http://csrc.nist. nal of Software Tools,28 gov/encryption/aes/round2/ (11):73–75, 2003. CODEN conf3/aes3conf.htm; http: DDJOEB. ISSN 1044-789X. //csrc.nist.gov/encryption/ NIST:2003:RKE aes/round2/conf3/papers/ AES3Proceedings-1.pdf; [NIS03b] NIST. Recommenda- http://csrc.nist.gov/ tion on key establish- encryption/aes/round2/ ment schemes. NIST conf3/papers/AES3Proceedings- Special Publication 800- 2.pdf; http://csrc.nist. 56, National Institute for gov/encryption/aes/round2/ Standards and Technology, conf3/papers/AES3Proceedings- Gaithersburg, MD 20899- 3.pdf; http://csrc.nist. 8900, USA, January 2003. gov/encryption/aes/round2/ URL http://csrc.nist. conf3/papers/AES3Proceedings. gov/CryptoToolkit/kms/ pdf. keyschemes-Jan03.pdf. Nitaj:2009:CRCo NIST:2001:CT [Nit09] Abderrahmane Nitaj. Crypt- [NIS01a] NIST. Cryptographic analysis of RSA with con- toolkit. World-Wide Web strained keys. International document, 2001. URL Journal of Number The- http://csrc.nist.gov/CryptoToolkit/ ory (IJNT), 5(2):311–325, . March 2009. ISSN 1793- 0421 (print), 1793-7310 NIST:2001:SRC (electronic). URL https: //www.worldscientific. [NIS01b] NIST. Security require- com/doi/10.1142/S1793042109002122. ments for cryptographic Nagaj:2006:OQE modules. Federal Informa- tion Processing Standards [NK06] Daniel Nagaj and Iordanis Publication FIPS PUB 140- Kerenidis. On the opti- 2, National Institute for mality of quantum encryp- Standards and Technology, tion schemes. Journal of Gaithersburg, MD 20899- Mathematical Physics,47 8900, USA, May 25, 2001. (9):092102, September 2006. REFERENCES 539

CODEN JMAPAQ. ISSN ian [Kil05], pages 426– 0022-2488 (print), 1089- ?? CODEN LNCSD9. 7658 (electronic), 1527- ISBN 3-540-24573-1 (soft- 2427. URL http:// cover). ISSN 0302-9743 jmp.aip.org/resource/1/ (print), 1611-3349 (elec- jmapaq/v47/i9/p092102_ tronic). LCCN QA76.9.A25 s1. T44 2005. URL http: Ning:2008:MAA //www.springerlink.com/ openurl.asp?genre=issue& [NLD08] Peng Ning, An Liu, and issn=0302-9743&volume= Wenliang Du. Mitigat- 3378; http://www.springerlink. ing DoS attacks against com/openurl.asp?genre= broadcast authentication in volume&id=doi:10.1007/ wireless sensor networks. b106171. ACM Transactions on Sen- Nozaki:2001:IRA sor Networks, 4(1):1:1–1:??, January 2008. CODEN [NMSK01] H. Nozaki, M. Motoyama, ???? ISSN 1550-4859 A. Shimbo, and S. Kawa- (print), 1550-4867 (elec- mura. Implementation of tronic). RSA algorithm based on RNS Montgomery multipli- Nigrini:2009:DDU cation. Lecture Notes in Computer Science, 2162: [NM09] Mark J. Nigrini and Steven J. 364–??, 2001. CODEN Miller. Data diagnostics LNCSD9. ISSN 0302- using second-order tests of 9743 (print), 1611-3349 Benford’s Law. Audit- (electronic). URL http: ing: A Journal of Prac- //link.springer-ny.com/ tice & Theory, 28(2):305– link/service/series/0558/ 324, November 2009. CO- bibs/2162/21620364.htm; DEN ???? ISSN 0278-0380 http://link.springer- (print), 1558-7991 (elec- ny.com/link/service/series/ tronic). URL http:// 0558/papers/2162/21620364. aaapubs.org/loi/ajpt; pdf. http://link.aip.org/link/ AJPTXX/v28/i2/p305/s1. Northcutt:2002:NID Nagao:2005:UCS [NN02] Stephen Northcutt and Judy Novak. Network in- [NMO05] Waka Nagao, Yoshifumi trusion detection.NewRid- Manabe, and Tatsuaki ers Publishing, Carmel, IN, Okamoto. A universally USA, third edition, 2002. composable secure chan- ISBN 0-7357-1265-4. xvii + nel based on the KEM– 490 pp. LCCN TK5105.59 DEM framework. In Kil- .N475 2003. REFERENCES 540

Naor:2003:CFP Suite 300, Silver Spring, MD 20910, USA, 2010. URL [NN03] Dalit Naor and Moni Naor. http://ieeexplore.ieee. Cover feature: Protect- org/stamp/stamp.jsp?tp= ing cryptographic keys: &arnumber=5701989. the trace-and-revoke ap- Naor:2001:RTS proach. Computer, 36(7): 47–53, July 2003. CO- [NNL01] Dalit Naor, Moni Naor, and DEN CPTRB4. ISSN 0018- Jeff Lotspiech. Revoca- 9162 (print), 1558-0814 tion and tracing schemes (electronic). URL http: for stateless receivers. In //csdl.computer.org/dl/ Kilian [Kil01a], pages 41– mags/co/2003/07/r7047. ?? ISBN 3-540-42456- htm; http://csdl.computer. 3 (paperback). LCCN org/dl/mags/co/2003/07/ QA76.9.A25 C79 2001; r7047.pdf; http://www. QA267.A1 L43 no.2139. computer.org/computer/ UK£47.00. URL http: co2003/r7047abs.htm. //link.springer-ny.com/ link/service/series/0558/ Nikov:2006:RBV bibs/2139/21390041.htm; [NN06] Ventzislav Nikov and Svetla http://link.springer- Nikova. On a relation be- ny.com/link/service/series/ tween verifiable secret shar- 0558/papers/2139/21390041. ing schemes and a class of pdf. error-correcting codes. In Naor:2005:ECH Ytrehus [Ytr06], pages 275– 290. ISBN 3-540-35481- [NNT05] Moni Naor, Asaf Nussboim, 6. LCCN QA76.9.A25 I557 and Eran Tromer. Effi- 2005. ciently constructible huge Navin:2010:ETU graphs that preserve first order properties of ran- [NNAM10] A. H. Navin, Z. Navadad, dom graphs. In Kil- B. Aasadi, and M. Mir- ian [Kil05], pages 66– nia. Encrypted tag by using ?? CODEN LNCSD9. data-oriented random num- ISBN 3-540-24573-1 (soft- ber generator to increase cover). ISSN 0302-9743 security in wireless sensor (print), 1611-3349 (elec- network. In 2010 Interna- tronic). LCCN QA76.9.A25 tional Conference on Com- T44 2005. URL http: putational Intelligence and //www.springerlink.com/ Communication Networks openurl.asp?genre=issue& (CICN), pages 335–338. issn=0302-9743&volume= IEEE Computer Society 3378; http://www.springerlink. Press, 1109 Spring Street, com/openurl.asp?genre= REFERENCES 541

volume&id=doi:10.1007/ //www.springerlink.com/ b106171. openurl.asp?genre=issue& Novak:2001:SBA issn=0302-9743&volume= 2274. [Nov01] Roman Novak. SPA-based Nguyen:2002:AIN adaptive chosen-ciphertext attack on RSA implemen- [NP02b] Phong Q. Nguyen and tation. Lecture Notes in David Pointcheval. Anal- Computer Science, 2274: ysis and improvements of 252–??, 2001. CODEN NTRU encryption paddings. LNCSD9. ISSN 0302- In Yung [Yun02a], pages 9743 (print), 1611-3349 210–225. CODEN LNCSD9. (electronic). URL http: ISBN 3-540-44050-X (pa- //link.springer-ny.com/ perback). ISSN 0302-9743 link/service/series/0558/ (print), 1611-3349 (elec- bibs/2274/22740252.htm; tronic). LCCN QA76.9.A25 http://link.springer- C79 2002. URL http:/ ny.com/link/service/series/ /link.springer.de/link/ 0558/papers/2274/22740252. service/series/0558/bibs/ pdf. 2442/24420210.htm; http: Naccache:2002:PKC //link.springer.de/link/ service/series/0558/papers/ [NP02a] David Naccache and Pas- 2442/24420210.pdf. cal Paillier, editors. Public key cryptography: 4th [i.e., Nichols:2007:MFD 5th] International Workshop [NP07] Elizabeth A. Nichols and on Practice and Theory in Gunnar Peterson. A met- Public Key Cryptosystems, rics framework to drive ap- PKC 2002, Paris, France, plication security improve- February 12–14, 2002: Pro- ment. IEEE Security & ceedings, volume 2274 of Privacy, 5(2):88–91, March/ Lecture Notes in Computer April 2007. CODEN ???? Science. Springer-Verlag, ISSN 1540-7993 (print), Berlin, Germany / Heidel- 1558-4046 (electronic). berg, Germany / London, UK / etc., 2002. CO- Nakahara:2001:LCR DEN LNCSD9. ISBN 3-540- 43168-3. ISSN 0302-9743 [NPV01] Jorge Nakahara, Jr., Bart (print), 1611-3349 (elec- Preneel, and Joos Vande- tronic). LCCN QA76.9.A25 walle. Linear cryptanal- I567 2002. URL http: ysis of reduced-round ver- //link.springer-ny.com/ sions of the SAFER block link/service/series/0558/ cipher family. Lecture tocs/t2274.htm; http: Notes in Computer Science, REFERENCES 542

1978:244–??, 2001. CO- retical Computer Science, DEN LNCSD9. ISSN 0302- 255(1–2):151–162, March 9743 (print), 1611-3349 28, 2001. CODEN TC- (electronic). URL http: SCDI. ISSN 0304-3975 //link.springer-ny.com/ (print), 1879-2294 (elec- link/service/series/0558/ tronic). URL http:/ bibs/1978/19780244.htm; /www.elsevier.nl../28/ http://link.springer- abstract.html; http: ny.com/link/service/series/ //www.elsevier.nl/gej- 0558/papers/1978/19780244. ng/10/41/16/197/21/28/ pdf. article.pdf.

Naor:2004:NTC Nguyen:2001:ISA

[NR04] Moni Naor and Omer Rein- [NS01b] Phong Q. Nguyen and gold. Number-theoretic Igor E. Shparlinski. On constructions of efficient the insecurity of a server- pseudo-random functions. aided RSA protocol. Lec- Journal of the ACM,51 ture Notes in Computer Sci- (2):231–262, March 2004. ence, 2248:21–??, 2001. CO- CODEN JACOAH. ISSN DEN LNCSD9. ISSN 0302- 0004-5411 (print), 1557- 9743 (print), 1611-3349 735X (electronic). (electronic). URL http: //link.springer-ny.com/ Nichols:2000:DYD link/service/series/0558/ [NRR00] Randall K. Nichols, Daniel J. bibs/2248/22480021.htm; Ryan, and Julie J. C. H. http://link.springer- Ryan. Defending your dig- ny.com/link/service/series/ ital assets: against hackers, 0558/papers/2248/22480021. crackers, spies and thieves. pdf. McGraw-Hill, New York, Nguyen:2001:TFLa NY, USA, 2000. ISBN 0-07- 212285-4. xxxv + 858 pp. [NS01c] Phong Q. Nguyen and LCCN QA76.9.A25 N528 Jacques Stern. The two 2000. US$59.99. URL http: faces of lattices in cryp- //corpitk.earthweb.com/ tology. Lecture Notes in reference/0072122854.html. Computer Science, 2146: Neraud:2001:CFD 146–??, 2001. CODEN LNCSD9. ISSN 0302- [NS01a] Jean N´eraud and Carla 9743 (print), 1611-3349 Selmi. On codes with (electronic). URL http: a finite deciphering de- //link.springer-ny.com/ lay: constructing uncom- link/service/series/0558/ pletable words. Theo- bibs/2146/21460146.htm; REFERENCES 543

http://link.springer- of Universal Computer Sci- ny.com/link/service/series/ ence, 11(6):986–1010, ???? 0558/papers/2146/21460146. 2005. CODEN ???? ISSN pdf. 0948-6968. URL http:// www.jucs.org/jucs_11_6/ Narayanan:2005:FDA a_provably_secure_and. [NS05a] Arvind Narayanan and Vi- Nishioka:2002:DAF taly Shmatikov. Fast dictio- nary attacks on passwords [NSS02] Mototsugu Nishioka, Hisayoshi using time-space tradeoff. Satoh, and Kouichi Saku- In Meadows and Syver- rai. Design and analysis of son [MS05b], pages 364–372. fast provably secure public- ISBN 1-59593-226-7. LCCN key cryptosystems based on QA76.9.A25. ACM order a modular squaring. Lec- number 459050. ture Notes in Computer Sci- ence, 2288:81–??, 2002. CO- Narayanan:2005:ODG DEN LNCSD9. ISSN 0302- [NS05b] Arvind Narayanan and Vi- 9743 (print), 1611-3349 taly Shmatikov. Obfus- (electronic). URL http: cated databases and group //link.springer-ny.com/ privacy. In Meadows and link/service/series/0558/ Syverson [MS05b], pages bibs/2288/22880081.htm; 102–111. ISBN 1-59593- http://link.springer- 226-7. LCCN QA76.9.A25. ny.com/link/service/series/ ACM order number 459050. 0558/papers/2288/22880081. pdf. Nguyen:2005:FPL Nahum:2007:ESS [NS05c] P. Nguyen and D. Stehle. Floating-point LLL revis- [NTW07] Erich M. Nahum, John ited. Lecture Notes in Tracey, and Charles P. Computer Science, 3494: Wright. Evaluating SIP 215–233, 2005. CODEN server performance. ACM LNCSD9. ISSN 0302-9743 SIGMETRICS Performance (print), 1611-3349 (elec- Evaluation Review, 35(1): tronic). 349–350, June 2007. CO- DEN ???? ISSN 0163-5999 Nguyen:2005:PSE (print), 1557-9484 (elec- [NSNK05] L. Nguyen, R. Safavi-Naini, tronic). and K. Kurosawa. A prov- Nyberg:2001:CTC ably secure and efficient ver- ifiable shuffle based on a [Nyb01] Kaisa Nyberg. Correlation variant of the Paillier cryp- theorems in cryptanalysis. tosystem. J.UCS: Journal Discrete Applied Mathemat- REFERENCES 544

ics, 111(1-2):177–188, 2001. 2003. URL http://www. CODEN DAMADU. ISSN loc.gov/catdir/bios/random051/ 0166-218X (print), 1872- 2002044826.html; http: 6771 (electronic). //www.loc.gov/catdir/description/ random0414/2002044826. Nenadic:2005:RBC html; http://www.loc. [NZCG05] A. Nenadic, N. Zhang, gov/catdir/samples/random045/ B. Cheetham, and C. Goble. 2002044826.html. RSA-based certified deliv- Oechslin:2003:MFC ery of E-goods using veri- [Oec03] Philippe Oechslin. Mak- fiable and recoverable sig- ing a faster cryptana- nature encryption. J.UCS: lytic time-memory trade- Journal of Universal Com- off. In Boneh [Bon03], puter Science, 11(1):175– pages 617–630. CODEN 192, January 28, 2005. LNCSD9. ISBN 3-540- CODEN ???? ISSN 40674-3. ISSN 0302-9743 0948-6968. URL http: (print), 1611-3349 (elec- //www.jucs.org/jucs_11_ tronic). LCCN QA76.9.A25 1/rsa_based_certified_ C79 2003. URL http: delivery. //link.springer-ny.com/ Nenadic:2005:RBV link/service/series/0558/ tocs/t2729.htm; http: [NZS05] Aleksandra Nenadi´c, Ning //www.springerlink.com/ Zhang, and Qi Shi. RSA- openurl.asp?genre=issue& based Verifiable and Recov- issn=0302-9743&volume= erable Encryption of Sig- 2729; http://www.springerlink. natures and its application com/openurl.asp?genre= in certified e-mail delivery. volume&id=doi:10.1007/ Journal of Computer Se- b11817. curity, 13(5):757–777, ???? Oppliger:2008:STSb 2005. CODEN JCSIET. ISSN 0926-227X (print), [OHB08a] Rolf Oppliger, Ralf Hauser, 1875-8924 (electronic). and David Basin. SSL/TLS session-aware user authenti- Olson:2003:QHK cation. Computer, 41(3):59– [OC03] Lynne Olson and Stanley 65, March 2008. CODEN Cloud. A question of honor: CPTRB4. ISSN 0018-9162 the Ko´sciuszko Squadron: (print), 1558-0814 (elec- forgotten heroes of World tronic). War II. Knopf, New York, Oppliger:2008:STSa NY, USA, 2003. ISBN 0- 375-41197-6. xii + 495 [OHB08b] Rolf Oppliger, Ralf Hauser, pp. LCCN D786 .O57 and David Basin. SSL/TLS REFERENCES 545

session-aware user authenti- RSA 2004: The Cryptog- cation revisited. Computers raphers’ Track at the RSA &Security, 27(3–4):64–70, Conference 2004, San Fran- May/June 2008. CODEN cisco, CA, USA, Febru- CPSEDU. ISSN 0167-4048 ary 23–27, 2004: Proceed- (print), 1872-6208 (elec- ings, volume 2964 of Lec- tronic). URL https:// ture Notes in Computer www.sciencedirect.com/ Science. Springer-Verlag, science/article/pii/S0167404808000102. Berlin, Germany / Heidel- berg, Germany / London, Oiwa:2009:IMS UK / etc., 2004. CO- [Oiw09] Yutaka Oiwa. Implemen- DEN LNCSD9. ISBN 3-540- tation of the memory-safe 20996-4. ISSN 0302-9743 full ANSI-C compiler. ACM (print), 1611-3349 (elec- SIGPLAN Notices, 44(6): tronic). LCCN QA76.9.A25 259–269, June 2009. CO- C822 2004. URL http: DEN SINODQ. ISSN 0362- //link.springer-ny.com/ 1340 (print), 1523-2867 link/service/series/0558/ (print), 1558-1160 (elec- tocs/t2964.htm; http: tronic). //www.springerlink.com/ openurl.asp?genre=issue& Okamoto:2000:ACA issn=0302-9743&volume= 2964; http://www.springerlink. [Oka00] Tatsuaki Okamoto, editor. com/openurl.asp?genre= Advances in cryptology — volume&id=doi:10.1007/ ASIACRYPT 2000: 6th In- b95630. ternational Conference on the Theory and Applica- Ohzahata:2002:FAM tion of Cryptology and In- formation Security, Kyoto, [OKE02] Satoshi Ohzahata, Shige- Japan, December 3–7, 2000: tomo Kimura, and Yoshi- proceedings, volume 1976 hiko Ebihara. A fast au- of Lecture Notes in Com- thentication method for se- puter Science. Springer-Ver- cure and seamless hand- lag, Berlin, Germany / Hei- off. Lecture Notes in delberg, Germany / Lon- Computer Science, 2344: don, UK / etc., 2000. 243–??, 2002. CODEN ISBN 3-540-41404-5 (soft- LNCSD9. ISSN 0302-9743 cover). LCCN QA76.9.A25 (print), 1611-3349 (elec- I555 2000. tronic). URL http:// Okamoto:2004:TCC link.springer.de/link/ service/series/0558/bibs/ [Oka04] Tatsuaki Okamoto, editor. 2344/23440243.htm; http: Topics in Cryptology—CT- //link.springer.de/link/ REFERENCES 546

service/series/0558/papers/ Ohkuma:2001:BCH 2344/23440243.pdf. [OMSK01] Kenji Ohkuma, Hirofumi Ogata:2006:OSS Muratani, Fumihiko Sano, and Shinichi Kawamura. The block cipher hiero- [OKS06] Wakaha Ogata, Kaoru crypt. Lecture Notes in Kurosawa, and Douglas R. Computer Science, 2012: Stinson. Optimum se- 72–??, 2001. CODEN cret sharing scheme secure LNCSD9. ISSN 0302- against cheating. SIAM 9743 (print), 1611-3349 Journal on Discrete Math- (electronic). URL http: ematics, 20(1):79–95, Jan- //link.springer-ny.com/ uary 2006. CODEN SJD- link/service/series/0558/ MEC. ISSN 0895-4801 bibs/2012/20120072.htm; (print), 1095-7146 (elec- http://link.springer- tronic). ny.com/link/service/series/ 0558/papers/2012/20120072. Olson:2000:SCT pdf.

[Ols00] Adam Olson. Scaring crack- Ohbuchi:2002:FDA ers away with TCP wrapper. [OMT02] Ryutarou Ohbuchi, Akio Sys Admin: The Journal for Mukaiyama, and Shigeo UNIX Systems Administra- Takahashi. A frequency- tors, 9(10):67–71, October domain approach to water- 2000. CODEN SYADE7. marking 3D shapes. Compu- ISSN 1061-2688. URL ter Graphics Forum, 21(3): http://www.samag.com/. 373–382, September 2002. CODEN CGFODY. ISSN Ohigashi:2009:PMF 0167-7055 (print), 1467- 8659 (electronic). [OM09] Toshihiro Ohigashi and Onions:2001:SSI Masakatu Morii. A practi- cal message falsification at- [Oni01] Paul Onions. On the tack on WPA. Technical re- strength of simply-iterated port, Hiroshima University, Feistel ciphers with whiten- 1-4-2 Kagamiyama, Higashi- ing keys. Lecture Notes Hiroshima, 739-8511 Japan, in Computer Science, 2020: July 15, 2009. URL 63–??, 2001. CODEN http://jwis2009.nsysu. LNCSD9. ISSN 0302- edu.tw/location/paper/ 9743 (print), 1611-3349 A%20Practical%20Message% (electronic). URL http: 20Falsification%20Attack% //link.springer-ny.com/ 20on%20WPA.pdf. link/service/series/0558/ REFERENCES 547

bibs/2020/20200063.htm; http://link.springer- http://link.springer- ny.com/link/service/series/ ny.com/link/service/series/ 0558/papers/1992/19920104. 0558/papers/2020/20200063. pdf. pdf. Okamoto:2001:RRE Ors:2003:PAA [OP01b] Tatsuaki Okamoto and ¨ ¨ [OOP03] Sıddıka Berna Ors, Elisa- David Pointcheval. RE- beth Oswald, and Bart Pre- ACT: rapid enhanced- neel. Power-analysis attacks security asymmetric cryp- on an FPGA — first ex- tosystem transform. Lec- perimental results. In Wal- ture Notes in Computer Sci- ter et al. [WKP03], pages ence, 2020:159–175, 2001. 35–50. CODEN LNCSD9. CODEN LNCSD9. ISSN ISBN 3-540-40833-9. ISSN 0302-9743 (print), 1611- 0302-9743 (print), 1611- 3349 (electronic). 3349 (electronic). LCCN TK7895.E42. URL http: Oppliger:2001:SMP //link.springer-ny.com/ link/service/series/0558/[Opp01] Rolf Oppliger. Secure tocs/t2779.htm; http: messaging with PGP and //www.springerlink.com/ S/MIME.ArtechHouse openurl.asp?genre=issue& computer security series. issn=0302-9743&volume= Artech House Inc., Nor- 2779; http://www.springerlink. wood, MA, USA, 2001. com/openurl.asp?genre= ISBN 1-58053-161-X. xxiii volume&id=doi:10.1007/ + 305 pp. LCCN TK5102.85 b13240. .O67 2001. URL http: //www.artechhouse.com/ Okamoto:2001:GPN Detail.aspx?strIsbn=978- [OP01a] Tatsuaki Okamoto and 1-58053-161-0. David Pointcheval. The Oppliger:2005:CC gap-problems: a new class of problems for the se- [Opp05] Rolf Oppliger. Contempo- curity of cryptographic rary cryptography.Artech schemes. Lecture Notes House computer security in Computer Science, 1992: series. Artech House Inc., 104–??, 2001. CODEN Norwood, MA, USA, 2005. LNCSD9. ISSN 0302- ISBN 1-58053-642-5. xxv + 9743 (print), 1611-3349 503 pp. LCCN Z103 .O66 (electronic). URL http: 2005. URL http://www. //link.springer-ny.com/ artechhouse.com/Detail. link/service/series/0558/ aspx?strIsbn=978-1-58053- bibs/1992/19920104.htm; 642-4. REFERENCES 548

Ortiz:2000:ITW http://link.springer- ny.com/link/service/series/ [Ort00] Sixto Ortiz Jr. Indus- 0558/papers/2162/21620126. try trends: Will PKI be- pdf. come a key to online secu- rity? Computer, 33(12): Ostrovsky:2005:PSS 13–15, December 2000. CO- [OS05] Rafail Ostrovsky and Will- DEN CPTRB4. ISSN 0018- iam E. Skeith III. Pri- 9162 (print), 1558-0814 vate searching on streaming (electronic). URL http: data. In Shoup [Sho05a], //dlib.computer.org/co/ pages 223–?? ISBN 3-540- books/co2000/pdf/rz013. 28114-2. ISSN 0302-9743 pdf. (print), 1611-3349 (elec- tronic). LCCN QA76.9.A25 Okeya:2000:PAB C79 2005; QA76.9 .A25; [OS00] Katsuyuki Okeya and Kouichi QA76.9 C79 2005; QA76.9 Sakurai. Power analy- C794 2005; QA76.9; In- sis breaks elliptic curve ternet. URL http:/ cryptosystems even secure /www.springerlink.com/ against the timing at- openurl.asp?genre=issue& tack. Lecture Notes in issn=0302-9743&volume= Computer Science, 1977: 3621. 178–190, 2000. CODEN Oren:2006:PAR LNCSD9. ISSN 0302-9743 [OS06] Yossi Oren and Adi Shamir. (print), 1611-3349 (elec- Power analysis of RFID tronic). tags. Technical report, Fac- Okeya:2001:EEC ulty of Mathematics and Computer Science, Weiz- [OS01] K. Okeya and K. Sakurai. mann Institute, POB 26, Efficient elliptic curve cryp- Rehovot 76100, Israel, 2006. tosystems from a scalar mul- URL http://www.wisdom. tiplication algorithm with weizmann.ac.il/~yossio/ recovery of the y-coordinate rfid/. on a Montgomery-form el- Obimbo:2007:PAD liptic curve. Lecture Notes in Computer Science, 2162: [OS07] Charlie Obimbo and Behzad 126–??, 2001. CODEN Salami. A parallel algo- LNCSD9. ISSN 0302- rithm for determining the 9743 (print), 1611-3349 inverse of a matrix for use (electronic). URL http: in blockcipher encryption/ //link.springer-ny.com/ decryption. The Journal of link/service/series/0558/ Supercomputing, 39(2):113– bibs/2162/21620126.htm; 130, February 2007. CO- REFERENCES 549

DEN JOSUED. ISSN 0920- 3152; http://www.springerlink. 8542 (print), 1573-0484 com/openurl.asp?genre= (electronic). URL http: volume&id=doi:10.1007/ //www.springerlink.com/ b99099. openurl.asp?genre=article& Osvik:2005:CAC issn=0920-8542&volume= 39&issue=2&spage=113. [OST05] Dag Arne Osvik, Adi Shamir, and Eran Tromer. Oury:2008:PP Cache attacks and coun- [OS08] Nicolas Oury and Wouter termeasures: the case of AES: (extended version). Swierstra. The power of Pi. ACM SIGPLAN No- Technical report, Depart- tices, 43(9):39–50, Septem- ment of Computer Sci- ence and Applied Mathe- ber 2008. CODEN SIN- ODQ. ISSN 0362-1340 matics, Weizmann Institute of Science, Rehovot 76100, (print), 1523-2867 (print), Israel, October 8, 2005. 1558-1160 (electronic). URL http://www.wisdom. Overbeck:2009:CBC weizmann.ac.il/~tromer/ papers/cache.pdf. [OS09] Raphael Overbeck and Nico- las Sendrier. Code-based Osvik:2006:CAC cryptography. In Bern- [OST06] Dag Arne Osvik, Adi stein et al. [BBD09], pages Shamir, and Eran Tromer. 95–146. ISBN 3-540- Cache attacks and coun- 88701-6 (hardcover), 3-642- termeasures: the case of 10019-8 (softcover). LCCN AES. In ????, editor, Topics QA76.9.A25 P67 2009. in Cryptology — CT-RSA, Okeya:2004:SBR pages 1–20. Springer-Verlag, Berlin, Germany / Heidel- [OSSST04] Katsuyuki Okeya, Katja berg, Germany / London, Schmidt-Samoa, Christian UK / etc., 2006. ISBN ???? Spahn, and Tsuyoshi Tak- LCCN ???? URL ????. agi. Signed binary rep- Osvik:2000:SS resentations revisited. In Franklin [Fra04], pages 123– [Osv00] Dag Arne Osvik. Speed- ?? CODEN LNCSD9. ingupSerpent.InNIST ISBN 3-540-22668-0. ISSN [NIS00], pages 317–329. 0302-9743 (print), 1611- ISBN ???? LCCN ???? 3349 (electronic). LCCN URL http://csrc.nist. 10.1007/b99099. URL gov/encryption/aes/round2/ http://www.springerlink. conf3/aes3conf.htm; http: com/openurl.asp?genre= //csrc.nist.gov/encryption/ issue&issn=0302-9743&volume= aes/round2/conf3/papers/ REFERENCES 550

AES3Proceedings-1.pdf; LNCSD9. ISBN 3-540- http://csrc.nist.gov/ 00847-0. ISSN 0302-9743 encryption/aes/round2/ (print), 1611-3349 (elec- conf3/papers/AES3Proceedings- tronic). LCCN QA76.9.A25 2.pdf; http://csrc.nist. C822 2003. URL http: gov/encryption/aes/round2/ //link.springer-ny.com/ conf3/papers/AES3Proceedings- link/service/series/0558/ 3.pdf; http://csrc.nist. tocs/t2612.htm; http: gov/encryption/aes/round2/ //www.springerlink.com/ conf3/papers/AES3Proceedings. openurl.asp?genre=issue& pdf. issn=0302-9743&volume= 2612. Okeya:2003:MFC Okada:2001:IEC [OT03a] Katsuyuki Okeya and Tsuyoshi Takagi. A more flexible [OTIT01] Souichi Okada, Naoya Torii, countermeasure against side Kouichi Itoh, and Masahiko channel attacks using win- Takenaka. Implementa- dow method. In Walter tion of elliptic curve cryp- et al. [WKP03], pages 397– tographic coprocessor over m 410. CODEN LNCSD9. GF(2 )onanFPGA. Lec- ISBN 3-540-40833-9. ISSN ture Notes in Computer Sci- 0302-9743 (print), 1611- ence, 1965:25–??, 2001. CO- 3349 (electronic). LCCN DEN LNCSD9. ISSN 0302- TK7895.E42. URL http: 9743 (print), 1611-3349 //link.springer-ny.com/ (electronic). URL http: link/service/series/0558/ //link.springer-ny.com/ tocs/t2779.htm; http: link/service/series/0558/ //www.springerlink.com/ bibs/1965/19650025.htm; openurl.asp?genre=issue& http://link.springer- issn=0302-9743&volume= ny.com/link/service/series/ 2779; http://www.springerlink. 0558/papers/1965/19650025. com/openurl.asp?genre= pdf. volume&id=doi:10.1007/ Okamoto:2000:QPK b13240. Okeya:2003:WNM [OTU00] Tatsuaki Okamoto, Keisuke Tanaka, and Shigenori [OT03b] Katsuyuki Okeya and Tsuyoshi Uchiyama. Quantum Takagi. The width-w public-key cryptosystems. NAF method provides small In Bellare [Bel00], pages memory and fast elliptic 147–?? ISBN 3-540- scalar multiplications se- 67907-3. ISSN 0302-9743 cure against side channel (print), 1611-3349 (elec- attacks. In Joye [Joy03b], tronic). LCCN QA76.9.A25 pages 328–342. CODEN C79 2000 Bar. URL http: REFERENCES 551

//link.springer-ny.com/ ber 31, 2003. CODEN IF- link/service/series/0558/ PLAT. ISSN 0020-0190 bibs/1880/18800147.htm; (print), 1872-6119 (elec- http://link.springer- tronic). ny.com/link/service/series/ Page:2003:BRW 0558/papers/1880/18800147. pdf. [Pag03] Sophie Page. Book review: William R. Newman and Ouellette:2005:PPM Anthony Grafton (eds.), Se- [Oue05] John Ouellette. Para- crets of Nature: Astrology noid penguin: Managing and Alchemy in Early Mod- SSH for scripts and cron ern Europe. Transforma- jobs. Linux Journal, 2005 tions: Studies in the History (137):13, September 2005. of Science and Technology. CODEN LIJOFX. ISSN Cambridge, MA and Lon- 1075-3583 (print), 1938- don: MIT Press, 2001. Pp. 3827 (electronic). 443. ISBN 0-262-14075-6. £34.50 (hardcover). British Overbeck:2006:EGA Journal for the History [Ove06] Raphael Overbeck. Extend- of Science, 36(1):87–127, ing Gibson’s attacks on the March 2003. CODEN GPT cryptosystem. In Ytre- BJHSAT. ISSN 0007- hus [Ytr06], pages 178–188. 0874 (print), 1474-001X ISBN 3-540-35481-6. LCCN (electronic). URL http: QA76.9.A25 I557 2005. //www.jstor.org/stable/ 4028320. Onieva:2008:MNS Palmer:2002:TMQ [OZL08] Jose A. Onieva, Jianying [Pal02] Chlo¨e Palmer. Toshiba Zhou, and Javier Lopez. makes quantum crypto Multiparty nonrepudiation: breakthrough. Network asurvey. ACM Comput- Security, 2002(1):6, Jan- ing Surveys, 41(1):5:1–5:43, uary 1, 2002. CODEN December 2008. CODEN NTSCF5. ISSN 1353-4858 CMSVAN. ISSN 0360-0300 (print), 1872-9371 (elec- (print), 1557-7341 (elec- tronic). URL http:// tronic). www.sciencedirect.com/ . Paeng:2003:SCU science/article/pii/S1353485802001150 Panditaratne:2007:TRN [Pae03] Seong-Hun Paeng. On the security of cryptosystem us- [Pan07] Vidura Panditaratne. True ing automorphism groups. random number genera- Information Processing Let- tor goes online. World- ters, 88(6):293–298, Decem- Wide Web document, July REFERENCES 552

18, 2007. URL http:// (print), 1611-3349 (elec- pressesc.com/01184778212_ tronic). LCCN QA76.9.A25 qrbgs; http://qrbg.irb. C79 2003. URL http: hr/; http://random.irb. //link.springer-ny.com/ hr/. link/service/series/0558/ tocs/t2729.htm; http: Papanikolaou:2005:BRBa //www.springerlink.com/ [Pap05] Nikolaos Papanikolaou. Book openurl.asp?genre=issue& review: Data Privacy and issn=0302-9743&volume= Security, by David Sa- 2729; http://www.springerlink. lomon; Spring-Verlag, 2003, com/openurl.asp?genre= $51.48, Hardcover. ACM volume&id=doi:10.1007/ SIGACT News, 36(2):8– b11817. 13, June 2005. CODEN Pass:2005:UCN SIGNDM. ISSN 0163- 5700 (print), 1943-5827 [Pas05] Rafael Pass and abhi (electronic). URL http: shelat. Unconditional //doi.acm.org/10.1145/ characterizations of non- 1067309.1067315.See interactive zero-knowledge. [Sal03a]. In Shoup [Sho05a], pages 118–?? ISBN 3-540- Park:2004:APP 28114-2. ISSN 0302-9743 (print), 1611-3349 (elec- [Par04] Chang-Seop Park. Au- tronic). LCCN QA76.9.A25 thentication protocol pro- C79 2005; QA76.9 .A25; viding user anonymity and QA76.9 C79 2005; QA76.9 untraceability in wireless C794 2005; QA76.9; In- mobile communication sys- ternet. URL http:/ tems. Computer Net- /www.springerlink.com/ works (Amsterdam, Nether- openurl.asp?genre=issue& lands: 1999), 44(2):267– issn=0302-9743&volume= 273, February 5, 2004. CO- 3621. DEN ???? ISSN 1389-1286 (print), 1872-7069 (elec- Patterson:2001:DFI tronic). [Pat01] Cameron Patterson. A dy- Pass:2003:DCR namic FPGA implementa- tion of the Serpent block [Pas03] Rafael Pass. On deniabil- cipher. Lecture Notes in ity in the common reference Computer Science, 1965: string and random oracle 141–155, 2001. CODEN model. In Boneh [Bon03], LNCSD9. ISSN 0302- pages 316–337. CODEN 9743 (print), 1611-3349 LNCSD9. ISBN 3-540- (electronic). URL http: 40674-3. ISSN 0302-9743 //link.springer-ny.com/ REFERENCES 553

link/service/series/0558/ 2729; http://www.springerlink. bibs/1965/19650141.htm; com/openurl.asp?genre= http://link.springer- volume&id=doi:10.1007/ ny.com/link/service/series/ b11817. 0558/papers/1965/19650141. Paterson:2003:CCI pdf. [Pat03b] Kenneth G. Paterson, edi- Patiyoot:2002:MSE tor. Cryptography and Cod- [Pat02a] D. Patiyoot. Migration ing: 9th IMA International /evolution of security to- Conference, Cirencester, wards wireless ATM. Op- UK, December 16–18, 2003: erating Systems Review,36 Proceedings, volume 2898 (1):23–30, January 2002. of Lecture Notes in Com- CODEN OSRED8. ISSN puter Science. Springer-Ver- 0163-5980 (print), 1943- lag, Berlin, Germany / Hei- 586X (electronic). delberg, Germany / Lon- don, UK / etc., 2003. CO- Patiyoot:2002:SIW DEN LNCSD9. ISBN 3-540- 20663-9. ISSN 0302-9743 [Pat02b] Danai Patiyoot. Security is- (print), 1611-3349 (elec- sues for wireless ATM net- tronic). LCCN QA268 works. Operating Systems .C76 2003. URL http: Review, 36(1):31–57, Jan- //link.springer-ny.com/ uary 2002. CODEN OS- link/service/series/0558/ RED8. ISSN 0163-5980 tocs/t2898.htm; http: (print), 1943-586X (elec- //www.springerlink.com/ tronic). openurl.asp?genre=issue& Patarin:2003:LRR issn=0302-9743&volume= 2898; http://www.springerlink. [Pat03a] Jacques Patarin. Luby– com/openurl.asp?genre= Rackoff: 7 rounds are volume&id=doi:10.1007/ enough for security. In b93924. Boneh [Bon03], pages 513– Patarin:2004:SRF 529. CODEN LNCSD9. ISBN 3-540-40674-3. ISSN [Pat04] Jacques Patarin. Security 0302-9743 (print), 1611- of random Feistel schemes 3349 (electronic). LCCN with 5 or more rounds. In QA76.9.A25 C79 2003. URL Franklin [Fra04], pages 106– http://link.springer-ny. ?? CODEN LNCSD9. com/link/service/series/ ISBN 3-540-22668-0. ISSN 0558/tocs/t2729.htm; 0302-9743 (print), 1611- http://www.springerlink. 3349 (electronic). LCCN com/openurl.asp?genre= 10.1007/b99099. URL issue&issn=0302-9743&volume= http://www.springerlink. REFERENCES 554

com/openurl.asp?genre= Smart Card technology; new issue&issn=0302-9743&volume= optical clock could synchro- 3152; http://www.springerlink. nize chips; blind, deaf en- com/openurl.asp?genre= gineer develops computer- volume&id=doi:10.1007/ ized Braille machine. Com- b99099. puter, 35(12):25–27, Decem- Paulson:2001:RBS ber 2002. CODEN CP- TRB4. ISSN 0018-9162 [Pau01] Lawrence C. Paulson. Re- (print), 1558-0814 (elec- lations between secrets: two tronic). URL http:/ formal analyses of the Ya- /csdl.computer.org/dl/ halom protocol. Journal mags/co/2002/12/rz025. of Computer Security,9 htm; http://csdl.computer. (3):197–216, ???? 2001. org/dl/mags/co/2002/12/ CODEN JCSIET. ISSN rz025.pdf. 0926-227X (print), 1875- 8924 (electronic). Paulson:2003:NBV Paulson:2002:NBPb [Pau03] Linda Dailey Paulson. News [Pau02a] Linda Dailey Paulson. News briefs: Vendors push wire- briefs: Project promises ac- less LAN security; picturing cessible technology for the a new encryption technique; disabled; two efforts aim think tank targets better to upgrade mobile mem- software. Computer, 36(1): ory; new haptics approach 28–30, January 2003. CO- lets parents-to-be “touch” DEN CPTRB4. ISSN 0018- their unborn children; prime 9162 (print), 1558-0814 breakthrough may improve (electronic). URL http: encryption. Computer,35 //csdl.computer.org/dl/ (10):26, October 2002. CO- mags/co/2003/01/r1028. DEN CPTRB4. ISSN 0018- htm; http://csdl.computer. 9162 (print), 1558-0814 org/dl/mags/co/2003/01/ (electronic). URL http: r1028.pdf. //csdl.computer.org/dl/ mags/co/2002/10/rx026. Paulson:2009:NBT htm; http://csdl.computer. org/dl/mags/co/2002/10/ [Pau09] Linda Dailey Paulson. News rx026.pdf; http://www. briefs: Technique makes cse.iitk.ac.in/news/primality. strong encryption easier to html. use. Computer, 42(4):24– Paulson:2002:NBR 27, April 2009. CODEN CPTRB4. ISSN 0018-9162 [Pau02b] Linda Dailey Paulson. News (print), 1558-0814 (elec- briefs: Researchers upgrade tronic). REFERENCES 555

Praca:2001:SCS Park:2000:CAP

[PB01] Denis Praca and Claude [PBD00] DongGook Park, Colin Barral. From smart cards Boyd, and Ed Dawson. to smart objects: the road Classification of authenti- to new smart technolo- cation protocols: a prac- gies. Computer Networks tical approach. Lecture (Amsterdam, Netherlands: Notes in Computer Science, 1999), 36(4):381–389, July 1975:194–??, 2000. CO- 16, 2001. CODEN ???? DEN LNCSD9. ISSN 0302- ISSN 1389-1286 (print), 9743 (print), 1611-3349 1872-7069 (electronic). URL (electronic). URL http: http://www.elsevier.nl/ //link.springer-ny.com/ gej-ng/10/15/22/61/28/ link/service/series/0558/ 26/abstract.html; http: bibs/1975/19750194.htm; //www.elsevier.nl/gej- http://link.springer- ng/10/15/22/61/28/26/article. ny.com/link/service/series/ pdf. 0558/papers/1975/19750194. pdf. Piva:2002:MCW Peng:2005:SES [PBB02] Alessandro Piva, Franco [PBD05] Kun Peng, Colin Boyd, and Bartolini, and Mauro Barni. Ed Dawson. Simple and ef- Managing copyright: Wa- ficient shuffling with prov- termark and cryptography able correctness and ZK pri- algorithms. IEEE Dis- vacy. In Shoup [Sho05a], tributed Systems Online,3 pages 188–?? ISBN 3-540- (5):??, 2002. CODEN 28114-2. ISSN 0302-9743 ???? ISSN 1541-4922 (print), 1611-3349 (elec- (print), 1558-1683 (elec- tronic). LCCN QA76.9.A25 tronic). URL http:// C79 2005; QA76.9 .A25; dsonline.computer.org/ QA76.9 C79 2005; QA76.9 0205/features/w3piva.htm. C794 2005; QA76.9; In- Piva:2005:SRA ternet. URL http:/ /www.springerlink.com/ [PBC05] Alessandro Piva, Franco openurl.asp?genre=issue& Bartolini, and Roberto issn=0302-9743&volume= Caldelli. Self recovery au- 3621. thentication of images in Peng:2007:BZK the DWT domain. Interna- tional Journal of Image and [PBD07] Kun Peng, Colin Boyd, and Graphics (IJIG), 5(1):149– Ed Dawson. Batch zero- ??, January 2005. CODEN knowledge proof and verifi- ???? ISSN 0219-4678. cation and its applications. REFERENCES 556

ACM Transactions on In- implementation. J.UCS: formation and System Se- Journal of Universal Com- curity, 10(2):6:1–6:??, May puter Science, 13(3):349– 2007. CODEN ATISBQ. 362, ???? 2007. CO- ISSN 1094-9224 (print), DEN ???? ISSN 0948- 1557-7406 (electronic). 6968. URL http://www. jucs.org/jucs_13_3/the_ Prattichizzo:2007:PIH use_of_runtime. [PBM+07] Domenico Prattichizzo, Mauro Poulos:2008:TSE Barni, Gloria Menegaz, Alessandro Formaglio, Hong Z. [PBV08] Marios Poulos, George Tan, and Seungmoon Choi. Bokos, and Fotios Vaioulis. Perceptual issues in hap- Towards the semantic ex- tic digital watermarking. traction of digital signa- IEEE MultiMedia, 14(3):84– tures for librarian image- 91, July/September 2007. identification purposes. Jour- CODEN IEMUE4. ISSN nal of the American Soci- 1070-986X (print), 1941- ety for Information Science 0166 (electronic). and Technology: JASIST, Papadimitriou:2001:PSE 59(5):708–718, March 2008. CODEN JASIEF. ISSN [PBMB01] S. Papadimitriou, T. Boun- 1532-2882 (print), 1532- tis, S. Mavroudi, and 2890 (electronic). A. Bezerianos. A proba- bilistic symmetric encryp- Pucheral:2001:PSD tion scheme for very fast se- cure communication based [PBVB01] Philippe Pucheral, Luc on chaotic systems of dif- Bouganim, Patrick Val- ference equations. Interna- duriez, and Christophe tional journal of bifurcation Bobineau. PicoDBMS: Scal- and chaos in applied sci- ing down database tech- ences and engineering,11 niques for the smartcard. (12):3107–3115, 2001. CO- VLDB Journal: Very Large DEN IJBEE4. ISSN 0218- Data Bases, 10(2–3):120– 1274. 132, September 2001. CO- Perez:2007:URR DEN VLDBFR. ISSN 1066- 8888 (print), 0949-877X [PBTW07] O. P´erez, Y. Berviller, (electronic). URL http:/ C. Tanougast, and S. We- /link.springer.de/link/ ber. The use of runtime re- service/journals/00778/ configuration on FPGA cir- bibs/1010002/10100120. cuits to increase the perfor- htm; http://link.springer. mance of the AES algorithm de/link/service/journals/ REFERENCES 557

00778/papers/1010002/10100120. DEN LNCSD9. ISBN 3-540- pdf. 26226-1 (softcover). ISSN 0302-9743 (print), 1611- Petrie:2000:NBI 3349 (electronic). LCCN [PC00] C. Petrie and J. Connelly. ???? URL http:/ A noise-based IC random /www.springerlink.com/ number generator for ap- openurl.asp?genre=issue& plications in cryptography. issn=0302-9743&volume= IEEE Journal of Solid- 3506; http://www.springerlink. State Circuits, 47(5):615– com/openurl.asp?genre= 621, ???? 2000. CODEN volume&id=doi:10.1007/ IJSCBC. ISSN 0018-9200 b137120. (print), 1558-173X (elec- Park:2005:NDS tronic). [PC05b] Je Hong Park and Seong- Peikari:2004:SW taek Chee. A note on dig- ital signature scheme using [PC04] Cyrus Peikari and Anton a self-pairing map. Applied Chuvakin. Security war- Mathematics and Compu- rior. O’Reilly & Associates, tation, 169(1):472–475, Oc- Inc., 103a Morris Street, Se- tober 1, 2005. CODEN bastopol, CA 95472, USA, AMHCBQ. ISSN 0096-3003 Tel: +1 707 829 0515, and (print), 1873-5649 (elec- 90 Sherman Street, Cam- tronic). bridge, MA 02140, USA, Tel: +1 617 354 5800, 2004. Perlner:2009:QRP ISBN 0-596-00545-8. xvii + 531 pp. LCCN TK5105.59 [PC09] Ray A. Perlner and David A. .P44985 2004. Cooper. Quantum resis- tant public key cryptogra- Park:2005:ISC phy: a survey. In Sea- + [PC05a] Choonsik Park and Seong- mons et al. [SMP 09], pages taek Chee, editors. Infor- 85–93. ISBN 1-60558-474- mation security and cryp- 6. LCCN QA76.9.A25 tology: ICISC 2004: 7th S954 2009. URL http:// international conference, portal.acm.org/toc.cfm? Seoul, Korea, December 2– id=1527017&coll=portal& 3, 2004. Revised selected pa- dl=ACM. pers, volume 3506 of Lec- Park:2003:ESA ture Notes in Computer Science. Springer-Verlag, [PCC03] Yongsu Park, Tae-Sun Berlin, Germany / Heidel- Chung, and Yookun Cho. berg, Germany / London, An efficient stream authen- UK / etc., 2005. CO- tication scheme using tree REFERENCES 558

chaining. Information Pro- Park:2003:EMS cessing Letters, 86(1):1–8, April 15, 2003. CODEN [PCS03] Jung Min Park, Edwin K. P. IFPLAT. ISSN 0020-0190 Chong, and Howard Jay (print), 1872-6119 (elec- Siegel. Efficient multicast tronic). stream authentication using erasure codes. ACM Trans- Patarin:2001:QBL actions on Information and System Security, 6(2):258– [PCG01] Jacques Patarin, Nicolas 285, May 2003. CODEN Courtois, and Louis Goubin. ATISBQ. ISSN 1094-9224 QUARTZ, 128-bit long dig- (print), 1557-7406 (elec- ital signatures. Lecture tronic). Notes in Computer Science, Pan:2007:IBS 2020:282–??, 2001. CO- DEN LNCSD9. ISSN 0302- [PCSM07] Jianping Pan, Lin Cai, 9743 (print), 1611-3349 Xuemin (Sherman) Shen, (electronic). URL http: and Jon W. Mark. Identity- //link.springer-ny.com/ based secure collaboration link/service/series/0558/ in wireless ad hoc networks. bibs/2020/20200282.htm; Computer Networks (Ams- http://link.springer- terdam, Netherlands: 1999), ny.com/link/service/series/ 51(3):853–865, February 21, 0558/papers/2020/20200282. 2007. CODEN ???? ISSN pdf. 1389-1286 (print), 1872- 7069 (electronic). Park:2002:XQP Peeters:2007:CES [PCK02] Sangwon Park, Yoonra Choi, and Hyoung-Joo Kim. [PD07] Johan Peeters and Paul XML query processing using Dyson. Cost-effective secu- signature and DTD. Lecture rity. IEEE Security & Pri- Notes in Computer Science, vacy, 5(3):85–87, May/June 2455:162–??, 2002. CO- 2007. CODEN ???? ISSN DEN LNCSD9. ISSN 0302- 1540-7993 (print), 1558- 9743 (print), 1611-3349 4046 (electronic). (electronic). URL http: Petrakos:2009:CTA //link.springer-ny.com/ link/service/series/0558/[PDMS09] Nikolaos Petrakos, George W. bibs/2455/24550162.htm; Dinolt, James Bret Mich- http://link.springer- ael, and Pantelimon Stan- ny.com/link/service/series/ ica. Cube-type algebraic 0558/papers/2455/24550162. attacks on Wireless En- pdf. cryption Protocols. Com- REFERENCES 559

puter, 42(10):103–105, Oc- NTSCF5. ISSN 1353-4858 tober 2009. CODEN CP- (print), 1872-9371 (elec- TRB4. ISSN 0018-9162 tronic). URL http:// (print), 1558-0814 (elec- www.sciencedirect.com/ tronic). science/article/pii/S1353485801004172.

Peinado:2004:CLK Pemble:2001:SPA

[Pei04] A. Peinado. Cryptanalysis [Pem01b] Matthew Pemble. A scep- of LHL-key authentication tical pigeon amongst the scheme. Applied Mathemat- crypto cats: Report on ics and Computation, 152 the Edinburgh Financial (3):721–724, May 13, 2004. Cryptographic Engineering CODEN AMHCBQ. ISSN Conference, 2001. Net- 0096-3003 (print), 1873- work Security, 2001(7):7– 5649 (electronic). 9, July 1, 2001. CODEN Peikert:2009:PKC NTSCF5. ISSN 1353-4858 (print), 1872-9371 (elec- [Pei09] Chris Peikert. Public- tronic). URL http:// key cryptosystems from the www.sciencedirect.com/ worst-case shortest vector science/article/pii/S1353485801007152. problem: extended abstract. In ACM [ACM09], pages Perrine:2003:ECP 333–342. ISBN 1-60558-613- 7. LCCN QA75.5 .A22 2009. [Per03] Tom Perrine. The end of crypt() passwords . . . Pelzl:2006:PAC please? ;login: the USENIX Association newsletter,28 [Pel06] Jan Pelzl. Practical As- (6):??, December 2003. CO- pects of Curve-based Cryp- DEN LOGNEM. ISSN tography and Cryptanaly- 1044-6397. URL sis.Europ¨aischer Uni- http:// versit¨atsverlag, Bochum, www.usenix.org/publications/ Germany, 2006. ISBN login/2003-12/pdfs/perrine. . 3-89966-189-3. 208 pp. pdf LCCN ???? EUR 24.90. Perlman:2005:EMD URL http://verlag.rub. de/g9783899661897.html. [Per05a] Radia Perlman. The Pemble:2001:CEW ephemerizer: Making data disappear. Technical re- [Pem01a] Matthew Pemble. Confi- port, Sun Labs, 16 Net- dentiality: From encryp- work Circle, Menlo Park, tion, to where? Net- CA 94025, USA, 2005. work Security, 2001(4):10– 20 pp. URL http:/ 11, April 1, 2001. CODEN /www.research.sun.com/ REFERENCES 560

techrep/2005/smll-tr02005- Potter:2003:S 140.pdf. [PF03] Bruce Potter and Bob Fleck. Perry:2005:DCP 802.11 Security. O’Reilly & Associates, Inc., 103a [Per05b] Tekla S. Perry. DVD Morris Street, Sebastopol, copy protection: take 2. CA 95472, USA, Tel: +1 IEEE Spectrum, 42(1):38– 707 829 0515, and 90 Sher- 39, January 2005. CODEN man Street, Cambridge, MA IEESAM. ISSN 0018-9235 02140, USA, Tel: +1 617 (print), 1939-9340 (elec- 354 5800, 2003. ISBN 0- tronic). 596-00290-4. xiii + 176 pp. LCCN TK5105.78 Petullo:2003:IEH .P68 2003. US$34.95, CDN$54.95, UK£24.95. [Pet03] Mike Petullo. Implementing URL http://www.oreilly. encrypted home directories. com/catalog/80211security/ Linux Journal, 2003(112): . 1, August 2003. CODEN Pfitzmann:2001:ACE LIJOFX. ISSN 1075-3583 (print), 1938-3827 (elec- [Pfi01] Birgit Pfitzmann, editor. tronic). Advances in cryptology: EUROCRYPT 2001: In- Petullo:2005:EYR ternational Conference on the Theory and Applica- [Pet05] Mike Petullo. Encrypt your tion of Cryptographic Tech- root filesystem. Linux Jour- niques, Innsbruck, Austria, nal, 2005(129):4, January May 6–10, 2001: proceed- 2005. CODEN LIJOFX. ings, volume 2045 of Lec- ISSN 1075-3583 (print), ture Notes in Computer 1938-3827 (electronic). Science. Springer-Verlag, Berlin, Germany / Hei- Petzold:2008:ATG delberg, Germany / Lon- don, UK / etc., April 25, [Pet08] Charles Petzold. The anno- 2001. ISBN 3-540-42070- tated Turing: a guided tour 3. LCCN QA76.9.A25 through Alan Turing’s his- E964 2001; QA76.9.A25 toric paper on computabil- E96 2001. URL http: ity and the Turing Machine. //link.springer-ny.com/ John Wiley and Sons, Inc., link/service/series/0558/ New York, NY, USA, 2008. tocs/t2045.htm; http: ISBN 0-470-22905-5 (paper- //link.springer.de/link/ back). xii + 372 pp. LCCN service/series/0558/tocs/ QA267 .P48 2008. t2045.htm. REFERENCES 561

Phatak:2005:FMR vanced Encryption Stan- dard (AES). Informa- [PG05] Dhananjay Phatak and Tom tion Processing Letters,91 Goff. Fast modular reduc- (1):33–38, July 16, 2004. tion for large wordlengths CODEN IFPLAT. ISSN via one linear and one 0020-0190 (print), 1872- cyclic convolution. In IEEE 6119 (electronic). [IEE05b], page ?? ISBN ???? LCCN ???? URL Phan:2006:CTP http://arith17.polito. [Pha06] Raphael C.-W. Phan. Crypt- it/final/paper-156.pdf. analysis of two password- Power:2007:SBB based authentication schemes using smart cards. Com- [PGT07] E. Michael Power, Jonathan puters & Security, 25(1):52– Gilhen, and Roland L. 54, February 2006. CODEN Trope. Setting bound- CPSEDU. ISSN 0167-4048 aries at borders: Reconcil- (print), 1872-6208 (elec- ing laptop searches and pri- tronic). URL https:// vacy. IEEE Security & Pri- www.sciencedirect.com/ vacy, 5(2):72–75, March/ science/article/pii/S0167404805001938. April 2007. CODEN ???? ISSN 1540-7993 (print), Philpott:2006:ITD 1558-4046 (electronic). [Phi06] Andrew Philpott. Iden- Provos:2003:HSI tity theft — dodging the own-goals. Network Se- [PH03] Niels Provos and Peter curity, 2006(1):11–13, Jan- Honeyman. Hide and uary 2006. CODEN seek: An introduction to NTSCF5. ISSN 1353-4858 steganography. IEEE Se- (print), 1872-9371 (elec- curity & Privacy, 1(3):32– tronic). URL http:// 44, May/June 2003. CO- www.sciencedirect.com/ DEN ???? ISSN 1540-7993 science/article/pii/S1353485806703233. (print), 1558-4046 (elec- tronic). URL http://dlib. Paeng:2001:NPK computer.org/sp/books/ [PHK+01] Seong-Hun Paeng, Kil-Chan sp2003/pdf/j3032.pdf; Ha, Jae Heon Kim, Seong- http://www.computer.org/ taek Chee, and Choonsik security/j3032abs.htm. Park. New public key cryp- Phan:2004:IDC tosystem using finite non Abelian groups. In Kil- [Pha04] Raphael C.-W. Phan. Im- ian [Kil01a], pages 470– possible differential crypt- ?? ISBN 3-540-42456- analysis of 7-round Ad- 3 (paperback). LCCN REFERENCES 562

QA76.9.A25 C79 2001; puter science. Springer-Ver- QA267.A1 L43 no.2139. lag, Berlin, Germany / Hei- UK£47.00. URL http: delberg, Germany / Lon- //link.springer-ny.com/ don, UK / etc., 2003. ISBN link/service/series/0558/ 3-540-43101-2. xx + 677 pp. bibs/2139/21390470.htm; LCCN QA76.9.A25 P536 http://link.springer- 2003. US$69.95. ny.com/link/service/series/ Pathak:2006:BFT 0558/papers/2139/21390470. pdf. [PI06] Vivek Pathak and Liviu Iftode. Byzantine fault tol- Polk:2003:IIC erant public key authentica- [PHM03] William T. Polk, Nelson E. tion in peer-to-peer systems. Hastings, and Ambarish Computer Networks (Ams- Malpani. IEEE Internet terdam, Netherlands: 1999), computing: Security track: 50(4):579–596, March 15, Public key infrastructures 2006. CODEN ???? ISSN that satisfy security goals. 1389-1286 (print), 1872- IEEE Distributed Systems 7069 (electronic). Online, 4(7), 2003. CO- Pietrzak:2005:CDI DEN ???? ISSN 1541-4922 (print), 1558-1683 (elec- [Pie05] Krzysztof Pietrzak. Com- tronic). URL http:// position does not imply dsonline.computer.org/ adaptive security. In 0307/f/wp4sec.htm. Shoup [Sho05a], pages 55–?? ISBN 3-540- Phoha:2001:SDI 28114-2. ISSN 0302-9743 (print), 1611-3349 (elec- [Pho01] Vir V. Phoha, editor. The tronic). LCCN QA76.9.A25 Springer Dictionary of In- C79 2005; QA76.9 .A25; ternet Security. Springer- QA76.9 C79 2005; QA76.9 Verlag, Berlin, Germany / C794 2005; QA76.9; In- Heidelberg, Germany / Lon- ternet. URL http:/ don, UK / etc., 2001. ISBN /www.springerlink.com/ 0-387-95261-6. 288 (est.) openurl.asp?genre=issue& pp. LCCN TK5105.59 .P56 issn=0302-9743&volume= 2002. US$39.95. 3621. Pieprzyk:2003:FCS Pinkas:2002:CTP [PHS03] Josef Pieprzyk, Thomas [Pin02] Benny Pinkas. Cryp- Hardjono, and Jennifer Se- tographic techniques for berry. Fundamentals of privacy-preserving data min- computer security. Mono- ing. ACM SIGKDD Explo- graphs in theoretical com- rations Newsletter, 4(2):12– REFERENCES 563

19, December 2002. CO- (print), 1872-6208 (elec- DEN ???? ISSN 1931-0145 tronic). URL https:// (print), 1931-0153 (elec- www.sciencedirect.com/ tronic). science/article/pii/S0167404803001044.

Pinkas:2003:CTP Park:2001:NDW [Pin03] Benny Pinkas. Cryp- tographic techniques for [PJH01] Ji Hwan Park, Sook Ee privacy-preserving data min- Jeong, and Young Huh. ing. Report HPL-2003- A new digital watermark- 22, Trusted Systems Lab- ing for text document im- oratory, HP Laboratories ages using diagonal pro- Palo Alto, Palo Alto, file. Lecture Notes in CA, USA, January 29, Computer Science, 2195: 2003. URL http://www. 748–??, 2001. CODEN hpl.hp.com/techreports/ LNCSD9. ISSN 0302- 2003/HPL-2003-22.html. 9743 (print), 1611-3349 To be published in SIGKDD (electronic). URL http: Explorations, Volume 4, Is- //link.springer-ny.com/ sue 2. link/service/series/0558/ bibs/2195/21950748.htm; Pincock:2006:CHC http://link.springer- [Pin06] Stephen Pincock. Code- ny.com/link/service/series/ breaker: the history of codes 0558/papers/2195/21950748. and ciphers, from the an- pdf. cient pharaohs to quan- tum cryptography.Walker, Park:2001:RFW New York, NY, USA, 2006. ISBN 0-8027-1547-8. 176 [PJK01] Ji Hwan Park, Sook Ee pp. LCCN Z104 .P56 Jeong, and Chang Soo Kim. 2006. URL http://www. Robust and fragile water- loc.gov/catdir/enhancements/ marking techniques for doc- fy0730/2007310362-b.html; uments using bi-directional http://www.loc.gov/catdir/ diagonal profiles. Lecture enhancements/fy0730/2007310362- Notes in Computer Science, d.html. 2229:483–??, 2001. CO- Piper:2003:RCS DEN LNCSD9. ISSN 0302- 9743 (print), 1611-3349 [Pip03] Fred Piper. Reseacrh in (electronic). URL http: cryptography and security //link.springer-ny.com/ mechanisms. Computers link/service/series/0558/ &Security, 22(1):22–25, bibs/2229/22290483.htm; January 2003. CODEN http://link.springer- CPSEDU. ISSN 0167-4048 ny.com/link/service/series/ REFERENCES 564

0558/papers/2229/22290483. //www.springerlink.com/ pdf. openurl.asp?genre=issue& issn=0302-9743&volume= Poh:2001:HBP 2613. Also available via the World Wide Web. [PK01] Norman Poh and Jerzy Ko- rczak. Hybrid biometric Park:2001:CSC person authentication us- ing face and voice fea- [PKBD01] DongGook Park, JungJoon tures. Lecture Notes in Kim, Colin Boyd, and Computer Science, 2091: Ed Dawson. Crypto- 348–??, 2001. CODEN graphic salt: a counter- LNCSD9. ISSN 0302- measure against denial-of- 9743 (print), 1611-3349 service attacks. Lecture (electronic). URL http: Notes in Computer Science, //link.springer-ny.com/ 2119:334–??, 2001. CO- link/service/series/0558/ DEN LNCSD9. ISSN 0302- bibs/2091/20910348.htm; 9743 (print), 1611-3349 http://link.springer- (electronic). URL http: ny.com/link/service/series/ //link.springer-ny.com/ 0558/papers/2091/20910348. link/service/series/0558/ pdf. bibs/2119/21190334.htm; http://link.springer- Petitcolas:2003:DWF ny.com/link/service/series/ 0558/papers/2119/21190334. [PK03] Fabien A. P. Petitcolas and pdf. Hyoung Joong Kim, edi- tors. Digital watermark- Park:2005:CZA ing: First International [PKH05] Je Hong Park, Bo Gyeong Workshop, IWDW 2002, Kang, and Jae Woo Han. Seoul, Korea, November Cryptanalysis of Zhou et 21–22, 2002: Revised Pa- al.’s proxy-protected sig- pers, volume 2613. Spring- nature schemes. Applied er-Verlag, Berlin, Ger- Mathematics and Compu- many / Heidelberg, Ger- tation, 169(1):192–197, Oc- many / London, UK / etc., tober 1, 2005. CODEN 2003. CODEN LNCSD9. AMHCBQ. ISSN 0096-3003 ISBN 3-540-01217-6 (soft- (print), 1873-5649 (elec- cover). ISSN 0302-9743 tronic). (print), 1611-3349 (elec- tronic). LCCN QA76.9.A25 Park:2001:DNP I939 2002. URL http: //link.springer-ny.com/ [PL01] Hee-Un Park and Im- link/service/series/0558/ Yeong Lee. A digital tocs/t2613.htm; http: nominative proxy signature REFERENCES 565

scheme for mobile commu- ISSN 0096-3003 (print), nication. Lecture Notes 1873-5649 (electronic). in Computer Science, 2229: 451–??, 2001. CODEN Pon:2005:OPK LNCSD9. ISSN 0302- [PLJ05b] Shun-Fu Pon, Erl-Huei Lu, 9743 (print), 1611-3349 and Albert B. Jeng. One (electronic). URL http: private-key for all DL-based //link.springer-ny.com/ cryptosystems. Applied link/service/series/0558/ Mathematics and Com- bibs/2229/22290451.htm; putation, 170(1):666–672, http://link.springer- November 1, 2005. CODEN ny.com/link/service/series/ AMHCBQ. ISSN 0096-3003 0558/papers/2229/22290451. (print), 1873-5649 (elec- . pdf tronic).

Pliam:2001:PTU Peris-Lopez:2010:CSP

[Pli01] John O. Pliam. A [PLSvdLE10] Pedro Peris-Lopez, Enrique polynomial-time univer- San Mill´an, Jan C. A. sal security amplifier in van der Lubbe, and Luis A. the class of block ci- Entrena. Cryptographically phers. Lecture Notes in secure pseudo-random bit Computer Science, 2012: generator for RFID tags. In 169–??, 2001. CODEN 2010 International Confer- LNCSD9. ISSN 0302- ence for Internet Technol- 9743 (print), 1611-3349 ogy and Secured Transac- (electronic). URL http: tions (ICITST), pages 1– //link.springer-ny.com/ 6. IEEE Computer Society link/service/series/0558/ Press, 1109 Spring Street, bibs/2012/20120169.htm; Suite 300, Silver Spring, MD http://link.springer- 20910, USA, 2010. URL ny.com/link/service/series/ http://ieeexplore.ieee. 0558/papers/2012/20120169. org/stamp/stamp.jsp?tp= pdf. &arnumber=5678035. Pon:2005:MDS Pfleeger:2007:IBC

[PLJ05a] Shun-Fu Pon, Erl-Huei Lu, [PLW07] Shari Lawrence Pfleeger, and Albert B. Jeng. Meta- Martin Libicki, and Mich- He digital signatures based ael Webber. I’ll buy that! on factoring and discrete cybersecurity in the Inter- logarithms. Applied Math- net marketplace. IEEE Se- ematics and Computation, curity & Privacy, 5(3):25– 165(1):171–176, June 6, 31, May/June 2007. CO- 2005. CODEN AMHCBQ. DEN ???? ISSN 1540-7993 REFERENCES 566

(print), 1558-4046 (elec- Peyravian:2000:MBB tronic). [PMRZ00] Mohammad Peyravian, Ste- Paulson:2000:NBU phen M. Matyas, Allen Ro- ginsky, and Nevenko Zunic. [PM00] Linda Dailey Paulson and Multiparty biometric-based Orren Merton. News briefs: authentication. Comput- U.S. picks new encryption ers & Security, 19(4):369– standard; better software 374, April 1, 2000. CODEN with open source; taking a CPSEDU. ISSN 0167-4048 SIP of Internet telephony; (print), 1872-6208 (elec- schools may hold valuable tronic). URL https:// spectrum; getting a feel for www.sciencedirect.com/ the Web. Computer, 33(12): science/article/pii/S0167404800040256. 20–23, December 2000. CO- DEN CPTRB4. ISSN 0018- Pohlmann:2001:SCA 9162 (print), 1558-0814 [Poh01] Norbert Pohlmann. Smart (electronic). URL http: cards: The authenticated //dlib.computer.org/co/ solution for e-business user. books/co2000/pdf/rz020. Network Security, 2001(4): pdf. 12–15, April 1, 2001. CO- Piper:2002:CVS DEN NTSCF5. ISSN 1353- 4858 (print), 1872-9371 [PM02] Fred Piper and Sean Mur- (electronic). URL http:/ phy. Cryptography: a /www.sciencedirect.com/ Very Short Introduction, science/article/pii/S1353485801004184. volume 68 of Very short in- Pointcheval:2000:CCS troductions.OxfordUniver- sity Press, Walton Street, [Poi00] David Pointcheval. Chosen- Oxford OX2 6DP, UK, 2002. ciphertext security for any ISBN 0-19-280315-8. 142 one-way cryptosystem. Lec- pp. LCCN Z103 .P56 2002. ture Notes in Computer Sci- UK£6.99. ence, 1751:129–146, 2000. CODEN LNCSD9. ISSN Pang:2008:AQR 0302-9743 (print), 1611- [PM08] HweeHwa Pang and Kyri- 3349 (electronic). akos Mouratidis. Authenti- Pointcheval:2002:PSP cating the query results of text search engines. Proceed- [Poi02] David Pointcheval. Prac- ings of the VLDB Endow- tical security in public- ment, 1(1):126–137, August key cryptography. Lec- 2008. CODEN ???? ISSN ture Notes in Computer Sci- 2150-8097. ence, 2288:1–??, 2002. CO- REFERENCES 567

DEN LNCSD9. ISSN 0302- http://www.loc.gov/catdir/ 9743 (print), 1611-3349 toc/els051/2004315747. (electronic). URL http: html. //link.springer-ny.com/ link/service/series/0558/ Pornin:2001:THE bibs/2288/22880001.htm; http://link.springer- [Por01] T. Pornin. Transparent ny.com/link/service/series/ harddisk encryption. Lec- 0558/papers/2288/22880001. ture Notes in Computer Sci- pdf. ence, 2162:273–??, 2001. CODEN LNCSD9. ISSN Pointcheval:2006:TCC 0302-9743 (print), 1611- [Poi06] David Pointcheval, editor. 3349 (electronic). URL Topics in Cryptology — CT- http://link.springer-ny. RSA 2006: The Cryptog- com/link/service/series/ raphers’ Track at the RSA 0558/bibs/2162/21620273. Conference 2006, San Jose, htm; http://link.springer- CA, USA, February 13–17, ny.com/link/service/series/ 2006, proceedings,volume 0558/papers/2162/21620273. 3860 of Lecture Notes in pdf. Computer Science. Spring- er-Verlag, Berlin, Ger- Porras:2006:PEG many / Heidelberg, Ger- many / London, UK / etc., [Por06] Phillip A. Porras. Privacy- 2006. CODEN LNCSD9. enabled global threat mon- ISBN 3-540-31033-9. ISSN itoring. IEEE Security 0302-9743 (print), 1611- & Privacy, 4(6):60–63, 3349 (electronic). LCCN November/December 2006. ???? URL http:/ CODEN ???? ISSN /www.springerlink.com/ 1540-7993 (print), 1558- openurl.asp?genre=issue& 4046 (electronic). issn=0302-9743&volume= 3860. Potter:2003:WAO Poole:2003:NSP [Pot03] Bruce Potter. Wireless au- [Poo03] Owen Poole. Network Se- thentication options for up curity: a Practical Guide. anddowntheStack. Net- Butterworth-Heinemann, Boston, work Security, 2003(6):4– MA, USA, 2003. ISBN 5, June 2003. CODEN 0-7506-5033-8. xi + 212 NTSCF5. ISSN 1353-4858 pp. LCCN TK5105.59 .P66 (print), 1872-9371 (elec- 2003. US$47.95. URL http: tronic). URL http:// //www.loc.gov/catdir/description/ www.sciencedirect.com/ els051/2004315747.html; science/article/pii/S135348580300607X. REFERENCES 568

Potter:2005:QCS 0-13-035548-8. xxix + 746 pp. LCCN QA76.9.A25 P45 [Pot05] Bruce Potter. Quantum 2003. crypto: Star trek or real sci- Paul:2006:SSC ence? Network Security, 2005(7):4–5, July 2005. CO- [PP06a] Souradyuti Paul and Bart DEN NTSCF5. ISSN 1353- Preneel. On the (in)security 4858 (print), 1872-9371 of stream ciphers based on (electronic). URL http:/ arrays and modular addi- /www.sciencedirect.com/ tion. Lecture Notes in science/article/pii/S1353485805702579. Computer Science, 4284: Potter:2006:CKM 69–83, 2006. CODEN LNCSD9. ISSN 0302-9743 [Pot06] Bruce Potter. Crypto- (print), 1611-3349 (elec- graphic key management for tronic). URL http://link. the masses. Network Se- springer.com/content/pdf/ curity, 2006(12):13–14, De- 10.1007/11935230_5.pdf. cember 2006. CODEN NTSCF5. ISSN 1353-4858 Popp:2006:CTT (print), 1872-9371 (elec- [PP06b] Robert Popp and John tronic). URL http:// Poindexter. Countering www.sciencedirect.com/ terrorism through informa- science/article/pii/S1353485806704639. tion and privacy protec- Potter:2007:CWW tion technologies. IEEE Security & Privacy, 4(6): [Pot07] Bruce Potter. Converg- 18–27, November/December ing wired and wireless au- 2006. CODEN ???? ISSN thentication. Network Se- 1540-7993 (print), 1558- curity, 2007(10):18–20, Oc- 4046 (electronic). tober 2007. CODEN NTSCF5. ISSN 1353-4858 Pfleeger:2007:SC (print), 1872-9371 (elec- [PP07] Charles P. Pfleeger and tronic). URL http:// Shari Lawrence Pfleeger. Se- www.sciencedirect.com/ curity in computing.Pren- science/article/pii/S135348580770096X. tice-Hall, Inc., Upper Sad- Pfleeger:2003:SC dle River, NJ 07458, USA, fourth edition, 2007. ISBN [PP03] Charles P. Pfleeger and 0-13-239077-9 (hardcover). Shari Lawrence Pfleeger. Se- xxiii + 845 pp. LCCN curity in computing.Pren- QA76.9.A25 P45 2006. URL tice-Hall PTR, Upper Sad- http://www.loc.gov/catdir/ dle River, NJ 07458, USA, toc/ecip0619/2006026798. third edition, 2003. ISBN html. REFERENCES 569

Paar:2009:UCT Jacques Quisquater. A differential fault attack [PP09] Christof Paar and Jan Pelzl. technique against SPN Understanding cryptogra- structures, with applica- phy: a textbook for students tion to the AES and and practitioners. Springer- KHAZAD. In Walter Verlag, Berlin, Germany / et al. [WKP03], pages 77– Heidelberg, Germany / Lon- 88. CODEN LNCSD9. don, UK / etc., 2009. ISBN ISBN 3-540-40833-9. ISSN 3-642-04100-0 (hardcover), 0302-9743 (print), 1611- 3-642-04101-9 (paperback). 3349 (electronic). LCCN xviii + 372 pp. LCCN TK7895.E42. URL http: A76.9.A25 P437 2009. //link.springer-ny.com/ Pellikaan:1996:AGC link/service/series/0558/ tocs/t2779.htm; http: [PPV96] R. Pellikaan, M. Perret, //www.springerlink.com/ and S. G. Vladut, edi- openurl.asp?genre=issue& tors. Arithmetic, geom- issn=0302-9743&volume= etry, and coding theory: 2779; http://www.springerlink. proceedings of the inter- com/openurl.asp?genre= national conference held volume&id=doi:10.1007/ at Centre international de b13240. rencontres math´ematiques Pereira:2006:IBS (CIRM), Luminy, France, June 28–July 2, 1993.Wal- [PQ06] Olivier Pereira and Jean- ter de Gruyter, New York, Jacques Quisquater. On NY, USA, 1996. ISBN 3- the impossibility of build- 11-014616-9. LCCN QA268 ing secure Cliques-type au- .A75 1996. UK£102.45. thenticated group key agree- Pereira:2003:SAU ment protocols. Journal of Computer Security,14 [PQ03a] Olivier Pereira and Jean- (2):197–246, ???? 2006. Jacques Quisquater. Some CODEN JCSIET. ISSN attacks upon authenticated 0926-227X (print), 1875- group key agreement pro- 8924 (electronic). tocols. Journal of Com- puter Security, 11(4):555– Picard:2001:NNF 580, ???? 2003. CODEN [PR01] Justin Picard and Arnaud JCSIET. ISSN 0926-227X Robert. Neural networks (print), 1875-8924 (elec- functions for public key wa- tronic). termarking. Lecture Notes Piret:2003:DFA in Computer Science, 2137: 142–??, 2001. CODEN [PQ03b] Gilles Piret and Jean- LNCSD9. ISSN 0302- REFERENCES 570

9743 (print), 1611-3349 delberg, Germany / Lon- (electronic). URL http: don, UK / etc., 2000. //link.springer-ny.com/ ISBN 3-540-67517-5. ISSN link/service/series/0558/ 0302-9743 (print), 1611- bibs/2137/21370142.htm; 3349 (electronic). LCCN http://link.springer- QA267.A1 L43 no.1807. ny.com/link/service/series/ 0558/papers/2137/21370142. Preneel:2001:NES pdf. [Pre01] Bart Preneel. New Eu- Pass:2005:NIC ropean Schemes for Sig- nature, Integrity and En- [PR05] Rafael Pass and Alon Rosen. cryption (NESSIE): a sta- New and improved construc- tus report. Lecture Notes tions of non-malleable cryp- in Computer Science, 2274: tographic protocols. In 297–??, 2001. CODEN ACM [ACM05c], pages 533– LNCSD9. ISSN 0302- 542. ISBN 1-58113-960-8. 9743 (print), 1611-3349 LCCN QA75.5 A22 2005. (electronic). URL http: //link.springer-ny.com/ Pass:2008:NIC link/service/series/0558/ [PR08] Rafael Pass and Alon Rosen. bibs/2274/22740297.htm; New and improved construc- http://link.springer- tions of nonmalleable cryp- ny.com/link/service/series/ tographic protocols. SIAM 0558/papers/2274/22740297. Journal on Computing,38 pdf. (2):702–752, ???? 2008. Preneel:2002:NEA CODEN SMJCAT. ISSN 0097-5397 (print), 1095- [Pre02a] Bart Preneel. NESSIE: 7111 (electronic). a European approach to Preneel:2000:ACE evaluate cryptographic al- gorithms. Lecture Notes [Pre00] Bart Preneel, editor. Ad- in Computer Science, 2355: vances in cryptology: EU- 267–??, 2002. CODEN ROCRYPT 2000: Inter- LNCSD9. ISSN 0302- national Conference on 9743 (print), 1611-3349 the Theory and Applica- (electronic). URL http: tion of Cryptographic Tech- //link.springer-ny.com/ niques, Bruges, Belgium, link/service/series/0558/ May 14–18, 2000: pro- bibs/2355/23550267.htm; ceedings, volume 1807 of http://link.springer- Lecture Notes in Computer ny.com/link/service/series/ Science. Springer-Verlag, 0558/papers/2355/23550267. Berlin, Germany / Hei- pdf; https://www.cosic. REFERENCES 571

esat.kuleuven.be/publications/ Preneel:2007:SRD article-82.ps. [Pre07] Bart Preneel. A survey of re- Preneel:2002:NPT cent developments in cryp- tographic algorithms for [Pre02b] Bart Preneel. The NESSIE smart cards. Computer Net- Project: Towards new works (Amsterdam, Nether- cryptographic algorithms. lands: 1999), 51(9):2223– Report ??, Katholieke 2233, June 20, 2007. CO- Univ. Leuven, Dept. Elec- DEN ???? ISSN 1389-1286 trical Engineering-ESAT, (print), 1872-7069 (elec- Kasteelpark Arenberg 10, tronic). B-3001 Leuven-Heverlee, Price:2000:NCH Belgium, November 25, 2002. URL http://www. [Pri00] Dick Price. News: CAIDA stork.eu.org/papers/03_ helps train network engi- nessiev2.pdf. neers, 109-bit cryptographic key cracked, LosLobos– Preneel:2002:TCC Linux supercluster. IEEE Concurrency, 8(2):4–7, April/ [Pre02c] Bart Preneel, editor. Top- June 2000. CODEN ics in cryptology, CT-RSA IECMFX. ISSN 1092-3063 2002: the Cryptographers’ (print), 1558-0849 (elec- Track at RSA Conference tronic). URL http://dlib. 2002, San Jose, CA, USA, computer.org/pd/books/ February 18–22, 2002: Pro- pd2000/pdf/p2004.pdf. ceedings, volume 2271 of Lecture Notes in Computer Provos:2000:EVM Science. Springer-Verlag, Berlin, Germany / Heidel- [Pro00] Niels Provos. Encrypt- berg, Germany / London, ing virtual machine. In UK / etc., 2002. CO- USENIX [USE00d], page ?? DEN LNCSD9. ISBN 3-540- ISBN 1-880446-18-9. LCCN 43224-8. ISSN 0302-9743 ???? URL http://www. (print), 1611-3349 (elec- usenix.org/publications/ tronic). LCCN QA76.9.A25 library/proceedings/sec2000/ R753 2002. URL http: provos.html. //link.springer-ny.com/ Provos:2001:DAS link/service/series/0558/ tocs/t2271.htm; http: [Pro01] Niels Provos. Defending //www.springerlink.com/ against statistical steganal- openurl.asp?genre=issue& ysis. In USENIX [USE01c], issn=0302-9743&volume= page ?? ISBN 1-880446- 2271. 18-9, 1-880446-07-3. LCCN REFERENCES 572

QA76.9.A25 U565 2001. scheme. IEEE Trans. Cir- URL http://www.usenix. cuits Systems I Fund. The- org/publications/library/ ory Appl., 48(5):624–635, proceedings/sec01/provos. 2001. CODEN ITCAEX. html. ISSN 1057-7122 (print), Paun:2004:CTT 1558-1268 (electronic).

[PRS04] Gheorghe P˘aun, Grzegorz Pfitzmann:2001:SEC Rozenberg, and Arto Salo- maa, editors. Current trends [PS01b] Birgit Pfitzmann and Ahmad- in theoretical computer sci- Reza Sadeghi. Self-escrowed ence: the challenge of the cash against user black- new century. World Sci- mailing. Lecture Notes in entific Publishing Co., Sin- Computer Science, 1962: gapore; Philadelphia, PA, 42–??, 2001. CODEN USA; River Edge, NJ, USA, LNCSD9. ISSN 0302- 2004. ISBN 981-238-783- 9743 (print), 1611-3349 8 (set), 981-238-966-0 (vol. (electronic). URL http: 1), 981-238-965-2 (vol. 2). //link.springer-ny.com/ ???? pp. LCCN QA76 .C878 link/service/series/0558/ 2004. bibs/1962/19620042.htm; Poupard:2000:FER http://link.springer- ny.com/link/service/series/ [PS00] Guillaume Poupard and 0558/papers/1962/19620042. Jacques Stern. Fair encryp- pdf. tion of RSA keys. Lecture Notes in Computer Science, Pornin:2001:SHT 1807:172–??, 2000. CO- DEN LNCSD9. ISSN 0302- [PS01c] Thomas Pornin and Jacques 9743 (print), 1611-3349 Stern. Software-hardware (electronic). URL http: trade-offs: Application to //link.springer-ny.com/ A5/1 cryptanalysis. Lecture link/service/series/0558/ Notes in Computer Science, bibs/1807/18070172.htm; 1965:318–??, 2001. CO- http://link.springer- DEN LNCSD9. ISSN 0302- ny.com/link/service/series/ 9743 (print), 1611-3349 0558/papers/1807/18070172. (electronic). URL http: pdf. //link.springer-ny.com/ Parker:2001:RKC link/service/series/0558/ bibs/1965/19650318.htm; [PS01a] Andrew T. Parker and http://link.springer- Kevin M. Short. Re- ny.com/link/service/series/ constructing the keystream 0558/papers/1965/19650318. from a chaotic encryption pdf. REFERENCES 573

Padro:2002:LBI http://ieeexplore.ieee. org/stamp/stamp.jsp?tp= [PS02a] Carles Padr´oandGerm´an &arnumber=1336767. S´aez. Lower bounds on Park:2004:UUC the information rate of se- cret sharing schemes with [PS04b] Jaehong Park and Ravi homogeneous access struc- Sandhu. The UCONABC us- ture. Information Pro- age control model. ACM cessing Letters, 83(6):345– Transactions on Informa- 351, September 30, 2002. tion and System Security,7 CODEN IFPLAT. ISSN (1):128–174, February 2004. 0020-0190 (print), 1872- CODEN ATISBQ. ISSN 6119 (electronic). 1094-9224 (print), 1557- 7406 (electronic). Pomerance:2002:SOC Prabhakaran:2004:NNS [PS02b] Carl Pomerance and Igor E. Shparlinski. Smooth or- [PS04c] Manoj Prabhakaran and ders and cryptographic ap- Amit Sahai. New notions plications. Lecture Notes of security: achieving uni- in Computer Science, 2369: versal composability with- 338–??, 2002. CODEN out trusted setup. In ACM LNCSD9. ISSN 0302- [ACM04b], pages 242–251. 9743 (print), 1611-3349 ISBN 1-58113-852-0. LCCN (electronic). URL http: QA75.5 .A22 2004. //link.springer-ny.com/ link/service/series/0558/ Prabhakaran:2005:RES bibs/2369/23690338.htm; [PS05] Manoj Prabhakaran and http://link.springer- Amit Sahai. Relaxing en- ny.com/link/service/series/ vironmental security: Mon- 0558/papers/2369/23690338. itored functionalities and pdf. client-server computation. Page:2004:PCA In Kilian [Kil05], pages 104– ?? CODEN LNCSD9. [PS04a] D. Page and N. P. Smart. ISBN 3-540-24573-1 (soft- Parallel cryptographic arith- cover). ISSN 0302-9743 metic using a redundant (print), 1611-3349 (elec- Montgomery representa- tronic). LCCN QA76.9.A25 tion. IEEE Transactions T44 2005. URL http: on Computers, 53(11):1474– //www.springerlink.com/ 1482, November 2004. CO- openurl.asp?genre=issue& DEN ITCOB4. ISSN issn=0302-9743&volume= 0018-9340 (print), 1557- 3378; http://www.springerlink. 9956 (electronic). URL com/openurl.asp?genre= REFERENCES 574

volume&id=doi:10.1007/ Lim. On the security b106171. of Rijndael-like structures Phan:2006:FDB against differential and lin- ear cryptanalysis. Lecture [PS06] R. C.-W. Phan and M. U. Notes in Computer Science, Siddiqi. A framework for de- 2501:176–??, 2002. CODEN scribing block cipher crypt- LNCSD9. ISSN 0302-9743 analysis. IEEE Transac- (print), 1611-3349 (elec- tions on Computers, 55(11): tronic). URL http:// 1402–1409, November 2006. link.springer.de/link/ CODEN ITCOB4. ISSN service/series/0558/bibs/ 0018-9340 (print), 1557- 2501/25010176.htm; http: 9956 (electronic). URL //link.springer.de/link/ http://ieeexplore.ieee. service/series/0558/papers/ org/stamp/stamp.jsp?tp= 2501/25010176.pdf. &arnumber=1705449. Pareschi:2009:PAC Park:2008:SRB [PSG+09] F.Pareschi,G.Scotti,L.Gi- [PS08a] Taejoon Park and Kang G. ancane,R.Rovatti,G.Setti, Shin. Secure routing based and A. Trifiletti. Power on distributed key sharing in analysis of a chaos-based large-scale sensor networks. random number genera- ACM Transactions on Em- tor for cryptographic se- bedded Computing Systems, curity. In 2009. ISCAS 7(2):20:1–20:??, February 2009. IEEE International 2008. CODEN ???? ISSN Symposium on Circuits and 1539-9087 (print), 1558- Systems, pages 2858–2861. 3465 (electronic). IEEE Computer Society Pavlou:2008:FAD Press, 1109 Spring Street, Suite 300, Silver Spring, MD [PS08b] Kyriacos E. Pavlou and 20910, USA, 2009. URL Richard T. Snodgrass. Foren- http://ieeexplore.ieee. sic analysis of database tam- org/stamp/stamp.jsp?tp= pering. ACM Transactions &arnumber=5118398. on Database Systems, 33(4): Petit:2008:BCB 30:1–30:??, November 2008. CODEN ATDSD3. ISSN [PSP+08] C. Petit, F. Standaert, 0362-5915 (print), 1557- O. Pereira, T. Malkin, and 4644 (electronic). M. Yung. A block cipher Park:2002:SRL based pseudo random num- ber generator secure against [PSC+02] Sangwoo Park, Soo Hak side-channel key recovery. In Sung, Seongtaek Chee, E- ????, editor, ASIAN ACM Joong Yoon, and Jongin Symposium on Information, REFERENCES 575

Computer and Communica- Pfleeger:2007:GEI tions Security (ASIACCS), pages 56–65. ACM Press, [PTP07] Shari Lawrence Pfleeger, New York, NY 10036, USA, Roland L. Trope, and 2008. ISBN ???? LCCN Charles C. Palmer. Guest ???? Editors’ introduction: Man- aging organizational secu- Preneel:2006:SAC rity. IEEE Security & Pri- vacy, 5(3):13–15, May/June [PT06] Bart Preneel and Stafford 2007. CODEN ???? ISSN Tavares, editors. Selected 1540-7993 (print), 1558- Areas in Cryptography: 4046 (electronic). 12th International Work- shop, SAC 2005, Kingston, Pucella:2003:JRB ON, Canada, August 11–12, 2005, Revised Selected Pa- [Puc03] Riccardo Pucella. Joint pers, volume 3897 of Lec- review of Foundations of ture Notes in Computer Cryptography: Basic Tools, Science. Springer-Verlag, by O. Goldreich. Cambridge Berlin, Germany / Heidel- University Press, and Mod- berg, Germany / London, elling and Analysis of Secu- UK / etc., 2006. CO- rity Protocols,byP.Ryan DEN LNCSD9. ISBN 3-540- and S. Schneider. Addison 33108-5 (softcover). ISSN Wesley. ACM SIGACT 0302-9743 (print), 1611- News, 34(4):26–31, De- 3349 (electronic). LCCN cember 2003. CODEN ???? URL http:/ SIGNDM. ISSN 0163-5700 /www.springerlink.com/ (print), 1943-5827 (elec- openurl.asp?genre=issue& tronic). See [Gol01b]. issn=0302-9743&volume= Pucella:2006:SCC 3897. [Puc06] Riccardo Pucella. Secu- Pang:2008:VCR rity and composition of [PT08] Hweehwa Pang and Kian- cryptographic protocols: a Lee Tan. Verifying Com- tutorial (Part I). ACM pleteness of Relational SIGACT News, 37(3):67– Query Answers from On- 92, September 2006. CO- line Servers. ACM Trans- DEN SIGNDM. ISSN actions on Information and 0163-5700 (print), 1943- System Security, 11(2):5:1– 5827 (electronic). 5:??, March 2008. CODEN Pucella:2007:Ib ATISBQ. ISSN 1094-9224 (print), 1557-7406 (elec- [Puc07] Riccardo Pucella. Introduc- tronic). tion. ACM SIGACT News, REFERENCES 576

38(4):64, December 2007. (print), 1611-3349 (elec- CODEN SIGNDM. ISSN tronic). URL http://link. 0163-5700 (print), 1943- springer.com/content/pdf/ 5827 (electronic). URL 10.1007/11935230_17.pdf. http://doi.acm.org/10. 1145/1345189.1345204. Phillips:2001:GRI Puzmanova:2004:RWF [PvS01] Deborah M. Phillips and Hans A. von Spakovsky. [Puz04] Rita Puzmanova. Review Gauging the risks of In- of Wi-Foo: The Secrets ternet elections. Com- of Wireless Hacking by munications of the As- Andrew Vladimirov, Kon- sociation for Computing stantin V. Gravrilenko, and Machinery, 44(1):73, Jan- Andrei A. Mikhailovsky. uary 2001. CODEN Pearson Education, 2004, CACMA2. ISSN 0001-0782 ISBN 0-321-20217-1. ACM (print), 1557-7317 (elec- Queue: Tomorrow’s Com- tronic). URL http://www. puting Today, 2(8):70, Novem- acm.org/pubs/citations/ ber 2004. CODEN AQCUAE. journals/cacm/2001-44- ISSN 1542-7730 (print), 1/p73-phillips/. See cor- 1542-7749 (electronic). rection [CTBA+01]. Page:2006:FAP Pang:2005:NMS [PV06a] D. Page and F. Vercauteren. [PW05] Liao-Jun Pang and Yu- A fault attack on pairing- Min Wang. A new based cryptography. IEEE (tn) multi-secret sharing Transactions on Computers, scheme based on Shamir’s 55(9):1075–1080, September secret sharing. Applied 2006. CODEN ITCOB4. Mathematics and Computa- ISSN 0018-9340 (print), tion, 167(2):840–848, Au- 1557-9956 (electronic). URL gust 15, 2005. CODEN http://ieeexplore.ieee. AMHCBQ. ISSN 0096-3003 org/stamp/stamp.jsp?tp= (print), 1873-5649 (elec- &arnumber=1668035. tronic). URL http:// Paillier:2006:TOW www.sciencedirect.com/ [PV06b] Pascal Paillier and Jorge L. science/article/pii/S0096300304005338. Villar. Trading one-wayness Peikert:2008:LTF against chosen-ciphertext security in factoring-based [PW08] Chris Peikert and Brent Wa- encryption. Lecture Notes ters. Lossy trapdoor func- in Computer Science, 4284: tions and their applications. 252–266, 2006. CODEN In ACM [ACM08], pages LNCSD9. ISSN 0302-9743 187–196. ISBN 1-60558-047- REFERENCES 577

3. LCCN QA76.6 .A152 3349 (electronic). LCCN 2008. HG1710 .F35 2005; HG1710 Pelzl:2003:HCC .F35 2005eb; HG1710; In- ternet. URL http:/ [PWGP03] Jan Pelzl, Thomas Wollinger, /www.springerlink.com/ Jorge Guajardo, and Christof openurl.asp?genre=issue& Paar. Hyperelliptic curve issn=0302-9743&volume= cryptosystems: Closing the 3570. performance gap to ellip- Paterson:2006:LTT tic curves. In Walter et al. [WKP03], pages 351– [PY06] Kenneth G. Paterson and 365. CODEN LNCSD9. Arnold K. L. Yau. Lost ISBN 3-540-40833-9. ISSN in translation: Theory and 0302-9743 (print), 1611- practice in cryptography. 3349 (electronic). LCCN IEEE Security & Privacy,4 TK7895.E42. URL http: (3):69–72, May/June 2006. //link.springer-ny.com/ CODEN ???? ISSN link/service/series/0558/ 1540-7993 (print), 1558- tocs/t2779.htm; http: 4046 (electronic). //www.springerlink.com/ openurl.asp?genre=issue& Palanivel:2008:MPA issn=0302-9743&volume= [PY08] S. Palanivel and B. Yeg- 2779; http://www.springerlink. nanarayana. Multimodal com/openurl.asp?genre= person authentication us- volume&id=doi:10.1007/ ing speech, face and vi- b13240. sual speech. Computer Vi- Patrick:2005:FCD sion and Image Understand- ing: CVIU, 109(1):44–55, [PY05] Andrew S. Patrick and Moti January 2008. CODEN Yung, editors. Financial CVIUF4. ISSN 1077-3142 cryptography and data secu- (print), 1090-235X (elec- rity: 9th international con- tronic). ference, FC 2005, Roseau, The Commonwealth of Do- Pieprzyk:2001:CPS minica, February 28–March 3, 2005: revised papers, [PZ01] J. Pieprzyk and X.-M. volume 3570 of Lecture Zhang. Cheating preven- Notes in Computer Science. tion in secret sharing over Springer-Verlag, Berlin, GF(pt). Lecture Notes in Germany / Heidelberg, Ger- Computer Science, 2247: many / London, UK / etc., 79–??, 2001. CODEN 2005. CODEN LNCSD9. LNCSD9. ISSN 0302- ISBN 3-540-26656-9. ISSN 9743 (print), 1611-3349 0302-9743 (print), 1611- (electronic). URL http: REFERENCES 578

//link.springer-ny.com/ Pecho:2009:APW link/service/series/0558/ bibs/2247/22470079.htm; [PZDH09] P. Pecho, F. Zboril, Jr., http://link.springer- M. Drahansky, and P. Hanacek. ny.com/link/service/series/ Agent platform for wire- 0558/papers/2247/22470079. less sensor network with pdf. support for cryptographic protocols. J.UCS: Jour- Pieprzyk:2002:CPL nal of Universal Computer Science, 15(5):992–??, ???? [PZ02a] Josef Pieprzyk and Xian-Mo 2009. CODEN ???? ISSN Zhang. Cheating preven- 0948-6968. URL http:// tion in linear secret shar- www.jucs.org/jucs_15_5/ ing. Lecture Notes in agent_platform_for_wireless. Computer Science, 2384: 121–??, 2002. CODEN Peng:2009:DIE LNCSD9. ISSN 0302- [PZL09] Jun Peng, Du Zhang, and 9743 (print), 1611-3349 Xiaofeng Liao. A digital (electronic). URL http: image encryption algorithm //link.springer-ny.com/ based on hyper-chaotic cel- link/service/series/0558/ lular neural network. Fun- bibs/2384/23840121.htm; damenta Informaticae,90 http://link.springer- (3):269–282, March 2009. ny.com/link/service/series/ CODEN FUMAAJ. ISSN 0558/papers/2384/23840121. 0169-2968 (print), 1875- pdf. 8681 (electronic). Pieprzyk:2002:CCI Qian:2005:CLT

[PZ02b] Josef Pieprzyk and Xian- [QCB05a] Haifeng Qian, ZhenFu Mo Zhang. Constructions Cao, and Haiyong Bao. of cheating immune secret Cryptanalysis of Li–Tzeng– sharing. Lecture Notes in Hwang’s improved signature Computer Science, 2288: schemes based on factor- 226–??, 2002. CODEN ing and discrete logarithms. LNCSD9. ISSN 0302- Applied Mathematics and 9743 (print), 1611-3349 Computation, 166(3):501– (electronic). URL http: 505, July 26, 2005. CODEN //link.springer-ny.com/ AMHCBQ. ISSN 0096-3003 link/service/series/0558/ (print), 1873-5649 (elec- bibs/2288/22880226.htm; tronic). http://link.springer- Qian:2005:SPL ny.com/link/service/series/ 0558/papers/2288/22880226.[QCB05b] Haifeng Qian, Zhenfu Cao, pdf. and Haiyong Bao. Security REFERENCES 579

of Pon–Lu–Jeng’s Meta-He Magnetic analysis (EMA): digital signature schemes. Measures and counter- Applied Mathematics and measures for smart cards. Computation, 170(1):724– Lecture Notes in Computer 730, November 1, 2005. CO- Science, 2140:200–??, 2001. DEN AMHCBQ. ISSN CODEN LNCSD9. ISSN 0096-3003 (print), 1873- 0302-9743 (print), 1611- 5649 (electronic). 3349 (electronic). URL http://link.springer-ny. Quisquater:2005:SCC com/link/service/series/ [QPV05] Micha¨el Quisquater, Bart 0558/bibs/2140/21400200. Preneel, and Joos Vande- htm; http://link.springer- walle. Spectral charac- ny.com/link/service/series/ terization of cryptographic 0558/papers/2140/21400200. Boolean functions satisfy- pdf. ing the (extended) propaga- tion criterion of degree l and Quisquater:2002:CTM order k. Information Pro- [QSR+02] Jean-Jacques Quisquater, cessing Letters, 93(1):25–28, Fran¸cois-Xavier Standaert, January 16, 2005. CODEN Gael Rouvroy, Jean-Pierre IFPLAT. ISSN 0020-0190 David, and Jean-Didier (print), 1872-6119 (elec- Legat. A cryptanalytic tronic). time-memory tradeoff: First Quisquater:2000:SCR FPGA implementation. Lec- ture Notes in Computer Sci- [QS00] J.-J. Quisquater and Bruce ence, 2438:780–??, 2002. Schneier, editors. Smart CODEN LNCSD9. ISSN card research and applica- 0302-9743 (print), 1611- tions: third international 3349 (electronic). URL conference, CARDIS’98, http://link.springer-ny. Louvain-la-Neuve, Belgium, com/link/service/series/ September 1998: proceed- 0558/bibs/2438/24380780. ings, volume 1820 of Lec- htm; http://link.springer- ture Notes in Computer ny.com/link/service/series/ Science. Springer-Verlag, 0558/papers/2438/24380780. Berlin, Germany / Hei- pdf. delberg, Germany / Lon- don, UK / etc., 2000. Qu:2001:KPW ISBN 3-540-67923-5. LCCN TK7895.S62 C36 1998. [Qu01] Gang Qu. Keyless pub- lic watermarking for intel- Quisquater:2001:EAE lectual property authenti- [QS01] Jean-Jacques Quisquater cation. Lecture Notes in and David Samyde. Electro- Computer Science, 2137: REFERENCES 580

96–??, 2001. CODEN Ramesh:2001:TAE LNCSD9. ISSN 0302- 9743 (print), 1611-3349 [Ram01] D. Ramesh. A twin algo- (electronic). URL http: rithm for efficient generation //link.springer-ny.com/ of digital signatures. Lecture link/service/series/0558/ Notes in Computer Science, bibs/2137/21370096.htm; 2247:267–??, 2001. CO- http://link.springer- DEN LNCSD9. ISSN 0302- ny.com/link/service/series/ 9743 (print), 1611-3349 0558/papers/2137/21370096. (electronic). URL http: pdf. //link.springer-ny.com/ link/service/series/0558/ Raikhel:2000:DF bibs/2247/22470267.htm; [Rai00] Eugene Raikhel. Decod- http://link.springer- ing the forecast. Scien- ny.com/link/service/series/ tific American, 283(3s):20– 0558/papers/2247/22470267. ??, March 2000. CODEN pdf. SCAMAC. ISSN 0036-8733 Rand:1955:MRD (print), 1946-7087 (elec- tronic). [Ran55] Rand Corporation. AMil- Rajsbaum:2006:ASNb lion Random Digits With 100,000 Normal Deviates. [Raj06] Sergio Rajsbaum. ACM Free Press, Glencoe, IL, SIGACT news distributed USA, 1955. ISBN 0-02- computing column 24. ACM 925790-5. xxv + 400 + 200 SIGACT News, 37(4):58– pp. LCCN QA276.5 .R3. 84, December 2006. CO- Reprinted in 1966 and 2001 DEN SIGNDM. ISSN 0163- [Ran01]. See also [Tip27]. 5700 (print), 1943-5827 (electronic). URL http: Rand:2001:MRD //doi.acm.org/10.1145/ [Ran01] Rand Corporation. AMil- 1189056.1189074. lion Random Digits With Roman:2007:SCP 100,000 Normal Deviates. [RAL07] Rodrigo Roman, Cristina Rand Corporation, Santa Alcaraz, and Javier Lopez. Monica, CA, USA, 2001. A survey of cryptographic ISBN 0-8330-3047-7. xxv primitives and implementa- + 400 + 200 pp. LCCN tions for hardware-constrained QA276.25 .M55 2001. See sensor network nodes. Mo- also [Ran55]. bile Networks and Applica- Rijmen:2001:WHF tions, 12(4):231–244, Au- gust 2007. CODEN ???? [RB01] Vincent Rijmen and Paulo ISSN 1383-469X. S. L. M. Barreto. The REFERENCES 581

WHIRLPOOL hash func- Computer Science, 1991: tion. World-Wide Web doc- 229–??, 2001. CODEN ument, 2001. URL http: LNCSD9. ISSN 0302- //paginas.terra.com.br/ 9743 (print), 1611-3349 informatica/paulobarreto/ (electronic). URL http: WhirlpoolPage.html; http: //link.springer-ny.com/ //planeta.terra.com.br/ link/service/series/0558/ informatica/paulobarreto/ bibs/1991/19910229.htm; whirlpool.zip. http://link.springer- ny.com/link/service/series/ Rogaway:2003:OBC 0558/papers/1991/19910229. [RBB03] Phillip Rogaway, Mihir Bel- pdf. lare, and John Black. OCB: Rogers:2005:NSE a block-cipher mode of op- eration for efficient authen- [RC05] Russ Rogers and Bryan ticated encryption. ACM Cunningham, editors. Net- Transactions on Informa- work security evaluation us- tion and System Security,6 ing the NSA IEM.Syngress (3):365–403, August 2003. Publishing, Inc., Rockland, CODEN ATISBQ. ISSN MA, USA, 2005. ISBN 1- 1094-9224 (print), 1557- 59749-035-0. xxvi + 437 7406 (electronic). pp. LCCN TK5105.59 .N33 2005. Rijmen:2008:RSA Rubin:2006:CSE [RBF08] Vincent Rijmen, Paulo S. L. M. Barreto, and D´ecio [RC06] Bradley S. Rubin and Don- L. Gazzoni Filho. Ro- ald Cheung. Computer secu- tation symmetry in alge- rity education and research: braically generated cryp- Handle with care. IEEE tographic substitution ta- Security & Privacy, 4(6): bles. Information Process- 56–59, November/December ing Letters, 106(6):246–250, 2006. CODEN ???? ISSN June 15, 2008. CODEN 1540-7993 (print), 1558- IFPLAT. ISSN 0020-0190 4046 (electronic). (print), 1872-6119 (elec- tronic). Reed:2000:ANA Roth:2001:EJA [RCBL00] Benjamin C. Reed, Ed- ward G. Chron, Ran- [RC01] Volker Roth and Vania dal C. Burns, and Darrell Conan. Encrypting Java D. E. Long. Authenticat- archives and its applica- ing network-attached stor- tion to mobile agent se- age. IEEE Micro, 20(1):49– curity. Lecture Notes in 57, January/February 2000. REFERENCES 582

CODEN IEMIDZ. ISSN Renaud:2009:VPC 0272-1732 (print), 1937- 4143 (electronic). URL [RD09] Karen Renaud and An- http://dlib.computer.org/ tonella De Angeli. Vi- mi/books/mi2000/pdf/m1049. sual passwords: cure-all or pdf; http://www.computer. snake-oil? Communications org/micro/mi2000/m1049abs. of the Association for Com- htm. puting Machinery, 52(12): 135–140, December 2009. Rubin:2005:ARS CODEN CACMA2. ISSN

+ 0001-0782 (print), 1557- [RCG 05] Shai Rubin, Mihai Christodor- 7317 (electronic). escu, Vinod Ganapathy, Jonathon T. Giffin, Louis Rudra:2001:ERE Kruger, Hao Wang, and Nicholas Kidd. An auc- [RDJ+01] A. Rudra, P. K. Dubey, tioning reputation system C. S. Jutla, V. Kumar, based on anomaly. In J. R. Rao, and P. Ro- Meadows and Syverson hatgi. Efficient Rijndael [MS05b], pages 270–279. encryption implementation ISBN 1-59593-226-7. LCCN with composite field arith- QA76.9.A25. ACM order metic. Lecture Notes in number 459050. Computer Science, 2162: 171–??, 2001. CODEN Rangan:2001:PCI LNCSD9. ISSN 0302- 9743 (print), 1611-3349 [RD01] C. Pandu Rangan and (electronic). URL http: C. Ding, editors. Progress in //link.springer-ny.com/ cryptology: INDOCRYPT link/service/series/0558/ 2001: Second Interna- bibs/2162/21620171.htm; tional Conference on Cryp- http://link.springer- tology in India, Chennai, ny.com/link/service/series/ India, December 16–20, 0558/papers/2162/21620171. 2001: proceedings,volume pdf. 2247 of Lecture Notes in Computer Science. Spring- Romao:2001:SMA er-Verlag, Berlin, Ger- many / Heidelberg, Ger- [RdS01] Artur Rom˜ao and Miguel Mira many / London, UK / etc., da Silva. Secure mobile 2001. ISBN 3-540-43010- agent digital signatures with 5. LCCN QA76.9.A25 proxy certificates. Lecture I5535 2001. URL http: Notes in Computer Science, //link.springer-ny.com/ 2033:206–??, 2001. CO- link/service/series/0558/ DEN LNCSD9. ISSN 0302- tocs/t2247.htm. 9743 (print), 1611-3349 REFERENCES 583

(electronic). URL http: USA, third edition, 2003. //link.springer-ny.com/ 1120 pp. link/service/series/0558/ bibs/2033/20330206.htm; Reeds:2001:BRB http://link.springer- [Ree01] Jim Reeds. Book review: ny.com/link/service/series/ TheCodeBook:theEvolu- 0558/papers/2033/20330206. tion of Secrecy from Mary pdf. Queen Of Scots to Quan- Rankl:2000:SCH tum Cryptography,bySi- mon Singh. Anchor Books. [RE00] W. (Wolfgang) Rankl and ACM SIGACT News, 32(2): W. Effing. Smart card hand- 6–11, June 2001. CODEN book. John Wiley and Sons, SIGNDM. ISSN 0163-5700 Inc., New York, NY, USA, (print), 1943-5827 (elec- second edition, 2000. ISBN tronic). See [Sin99]. 0-471-98875-8. xxviii + 746 Reese:2003:ELD pp. LCCN TK7895.S62 R3613 2000. [Ree03] R. A. Reese. Extreme Riley:2002:CBR lawsuits [digital copyright]. IEEE Spectrum, 40(5):23– [RE02] K. Jonathan Riley and 25, May 2003. CODEN John P. Eakins. Content- IEESAM. ISSN 0018-9235 based retrieval of histori- (print), 1939-9340 (elec- cal watermark images: I- tronic). tracings. Lecture Notes in Computer Science, 2383: Regev:2003:NLB 253–??, 2002. CODEN [Reg03] Oded Regev. New lat- LNCSD9. ISSN 0302- tice based cryptographic 9743 (print), 1611-3349 constructions. In ACM (electronic). URL http: [ACM03b], pages 407–416. //link.springer-ny.com/ ISBN ???? LCCN QA75.5 link/service/series/0558/ .A22 2003. ACM order num- bibs/2383/23830253.htm; ber 508030. http://link.springer- ny.com/link/service/series/ Regev:2004:NLB 0558/papers/2383/23830253.[Reg04] Oded Regev. New lattice- . pdf based cryptographic con- Rankl:2003:SCH structions. Journal of the ACM, 51(6):899–942, [RE03] W. (Wolfgang) Rankl and November 2004. CODEN W. Effing. Smart Card JACOAH. ISSN 0004-5411 Handbook. John Wiley and (print), 1557-735X (elec- Sons, Inc., New York, NY, tronic). REFERENCES 584

Regev:2005:LLE Rescorla:2001:IOPb

[Reg05] Oded Regev. On lat- [Res01b] Eric Rescorla. An intro- tices, , duction to OpenSSL pro- random linear codes, and gramming, Part II of II. cryptography. In ACM Linux Journal, 92:??, De- [ACM05c], pages 84–93. cember 2001. CODEN LI- ISBN 1-58113-960-8. LCCN JOFX. ISSN 1075-3583 QA75.5 A22 2005. (print), 1938-3827 (elec- tronic). URL http:/ Regev:2009:LLE /www.linuxjournal.com/ [Reg09] Oded Regev. On lat- article.php?sid=5487.Web tices, learning with errors, only. random linear codes, and Reynard:2001:SCB cryptography. Journal of the ACM, 56(6):34:1–34:40, [Rey01] Robert Reynard. Se- September 2009. CODEN cret code breaker online. JACOAH. ISSN 0004-5411 World-Wide Web docu- (print), 1557-735X (elec- ment, September 2001. URL tronic). http://codebreaker.dids. com/. Ren:2009:CWT Rodwell:2007:NIBa [Ren09] Jian Ren. A cryptographic watermarking technique for [RFR07a] P. M. Rodwell, S. M. Fur- multimedia signals. Ad- nell, and P. L. Reynolds. vances in Computational A non-intrusive biometric Mathematics, 31(1–3):267– authentication mechanism 281, October 2009. CODEN utilising physiological char- ACMHEX. ISSN 1019-7168 acteristics of the human (print), 1572-9044 (elec- head. Computers & Secu- tronic). URL http://link. rity, 26(7–8):468–478, De- springer.com/article/10. cember 2007. CODEN 1007/s10444-008-9096-1. CPSEDU. ISSN 0167-4048 (print), 1872-6208 (elec- Rescorla:2001:IOPa tronic). URL https:// [Res01a] Eric Rescorla. An intro- www.sciencedirect.com/ . duction to OpenSSL pro- science/article/pii/S0167404807001095 gramming, Part I of II. Rodwell:2007:NIBb Linux Journal, 89:74, 76–78, 80, 82–83, September 2001. [RFR07b] P. M. Rodwell, S. M. Fur- CODEN LIJOFX. ISSN nell, and P. L. Reynolds. 1075-3583 (print), 1938- A non-intrusive biometric 3827 (electronic). authentication mechanism REFERENCES 585

utilising physiological char- tocol. ACM SIGSOFT Soft- acteristics of the human ware Engineering Notes,31 head. Computers & Secu- (3):1–7, May 2006. CODEN rity, 26(7–8):468–478, De- SFENDP. ISSN 0163-5948 cember 2007. CODEN (print), 1943-5843 (elec- CPSEDU. ISSN 0167-4048 tronic). (print), 1872-6208 (elec- tronic). URL https:// Ren:2009:FCS www.sciencedirect.com/ science/article/pii/S0167404807001095[RG09]. Yanli Ren and Dawu Gu. Fully CCA2 secure iden- Rodwell:2007:NIBc tity based broadcast encryp- [RFR07c] P. M. Rodwell, S. M. Fur- tion without random ora- nell, and P. L. Reynolds. cles. Information Process- A non-intrusive biometric ing Letters, 109(11):527– authentication mechanism 533, May 16, 2009. CODEN utilising physiological char- IFPLAT. ISSN 0020-0190 acteristics of the human (print), 1872-6119 (elec- head. Computers & Secu- tronic). rity, 26(7–8):468–478, De- cember 2007. CODEN Rose:2006:CSP CPSEDU. ISSN 0167-4048 (print), 1872-6208 (elec- [RGX06] Gregory Gordon Rose, tronic). URL https:// Alexander Gantman, and www.sciencedirect.com/ Lu Xiao. Cryptographically science/article/pii/S0167404807001095. secure pseudo-random num- ber generator. United States Ringenburg:2005:PFS Patent 8,019,802., August 23, 2006. URL http: [RG05] Michael F. Ringenburg and www.google.com/patents/ Dan Grossman. Prevent- US8019802. ing format-string attacks via automatic and effi- Rojas:2000:FCH cient dynamic checking. In Meadows and Syverson [RH00] Ra´ul Rojas and Ulf Hasha- [MS05b], pages 354–363. gen, editors. The first com- ISBN 1-59593-226-7. LCCN puters: history and architec- QA76.9.A25. ACM order tures. History of comput- number 459050. ing. MIT Press, Cambridge, Rotondi:2006:CHA MA, USA, 2000. ISBN 0- 262-18197-5 (hardcover), 0- [RG06] Guido Rotondi and Gian- 585-35535-5 (electronic). xii piero Guerrera. A consistent + 457 pp. LCCN QA76.17 history authentication pro- .F57 2000. REFERENCES 586

Roscoe:2002:TBC vice attachments. Com- puter, 40(4):102–104, April [RH02] Timothy Roscoe and Steven 2007. CODEN CPTRB4. Hand. Transaction-based ISSN 0018-9162 (print), charging in mnemosyne: a 1558-0814 (electronic). peer-to-peer steganographic storage system. Lecture Riezenman:2000:CSB Notes in Computer Science, 2376:335–??, 2002. CODEN [Rie00] M. J. Riezenman. Cellular LNCSD9. ISSN 0302-9743 security: better, but foes (print), 1611-3349 (elec- still lurk. IEEE Spectrum, tronic). URL http:// 37(6):39–42, June 2000. link.springer.de/link/ CODEN IEESAM. ISSN service/series/0558/bibs/ 0018-9235 (print), 1939- 2376/23760335.htm; http: 9340 (electronic). //link.springer.de/link/ Riebeck:2003:SCC service/series/0558/papers/ 2376/23760335.pdf. [Rie03] H. Riebeck. A second coffin Rafaeli:2003:SKM for chernobyl. IEEE Spec- trum, 40(3):30–31, March [RH03] Sandro Rafaeli and David 2003. CODEN IEESAM. Hutchison. A survey of ISSN 0018-9235 (print), key management for secure 1939-9340 (electronic). group communication. ACM Computing Surveys, 35(3): Rila:2002:DAB 309–329, September 2003. CODEN CMSVAN. ISSN [Ril02] Luciano Rila. Denial of ac- 0360-0300 (print), 1557- cess in biometrics-based au- 7341 (electronic). thentication systems. Lec- ture Notes in Computer Sci- Rhinelander:2003:DIE ence, 2437:19–??, 2002. CO- [Rhi03] Jason P. Rhinelander. De- DEN LNCSD9. ISSN 0302- sign and implementation 9743 (print), 1611-3349 of encryption algorithms (electronic). URL http:/ in a coarse grain reconfig- /link.springer.de/link/ urable environment. Thesis service/series/0558/bibs/ (M. Eng.), Memorial Uni- 2437/24370019.htm; http: versity of Newfoundland, //link.springer.de/link/ St. Johns, Newfoundland, service/series/0558/papers/ Canada, 2003. 2437/24370019.pdf. Rich:2007:ATS Risen:2006:SWS [Ric07] Donald Rich. Authentica- [Ris06] James Risen. State of war: tion in transient storage de- the secret history of the CIA REFERENCES 587

and the Bush administra- ISSN 0018-9340 (print), tion. Free Press, New York, 1557-9956 (electronic). URL NY, USA, 2006. ISBN 0- http://ieeexplore.ieee. 7432-7066-5. 240 pp. LCCN org/stamp/stamp.jsp?tp= ???? &arnumber=1683760. Rivest:2003:TLE Reddy:2002:AAM [Riv03] Ronald L. Rivest. Turing Lecture on early RSA days. [RKZD02] Prakash Reddy, Venky Kr- World-Wide Web slide pre- ishnan, Kan Zhang, and De- sentation, video, and audio., varaj Das. Authentication 2003. URL http://www. and authorization of mo- acm.org/turingawardlecture/ bile clients in public data RSA/. networks. Lecture Notes in Computer Science, 2437: Renner:2005:UCP 115–??, 2002. CODEN [RK05] Renato Renner and Robert LNCSD9. ISSN 0302-9743 K¨onig. Universally com- (print), 1611-3349 (elec- posable privacy amplifica- tronic). URL http:// tion against quantum ad- link.springer.de/link/ versaries. In Kilian [Kil05], service/series/0558/bibs/ pages 407–?? CODEN 2437/24370115.htm; http: LNCSD9. ISBN 3-540- //link.springer.de/link/ 24573-1 (softcover). ISSN service/series/0558/papers/ 0302-9743 (print), 1611- 2437/24370115.pdf. 3349 (electronic). LCCN QA76.9.A25 T44 2005. URL Riedl:2002:FSH http://www.springerlink. com/openurl.asp?genre= [RM02] Reinhard Riedl and Nico issue&issn=0302-9743&volume= Maibaum. FASME — from 3378; http://www.springerlink. Smartcards to holistic IT- com/openurl.asp?genre= architectures for interstate volume&id=doi:10.1007/ e-government. Lecture Notes b106171. in Computer Science, 2456: Ruan:2006:NSC 173–??, 2002. CODEN LNCSD9. ISSN 0302-9743 [RK06] X. Ruan and R. S. Katti. A (print), 1611-3349 (elec- new source coding scheme tronic). URL http:// with small expected length link.springer.de/link/ and its application to sim- service/series/0558/bibs/ ple data encryption. IEEE 2456/24560173.htm; http: Transactions on Computers, //link.springer.de/link/ 55(10):1300–1305, October service/series/0558/papers/ 2006. CODEN ITCOB4. 2456/24560173.pdf. REFERENCES 588

Roy:2004:FSE bibs/2200/22000446.htm; http://link.springer- [RM04] Bimal Roy and Willi Meier, ny.com/link/service/series/ editors. Fast Software En- 0558/papers/2200/22000446. cryption: 11th Interna- pdf. tional Workshop, FSE 2004: Delhi, India, February 5– Reyhani-Masoleh:2003:LCS 7, 2004: Revised Papers, [RMH03a] Arash Reyhani-Masoleh volume 3017 of Lecture and M. Anwar Hasan. Notes in Computer Science. Low complexity sequen- Springer-Verlag, Berlin, tial normal basis multipli- Germany / Heidelberg, Ger- ers over GF(2m). In Ba- many / London, UK / etc., jard and Schulte [BS03], 2004. CODEN LNCSD9. pages 188–195. ISBN ISBN 3-540-22171-9. ISSN 0-7695-1894-X. ISSN 0302-9743 (print), 1611- 1063-6889. LCCN ???? 3349 (electronic). LCCN URL http://www.acsel- ???? URL http:/ lab.com/arithmetic/arith16/ /link.springer-ny.com/ papers/ARITH16_Reyhani- link/service/series/0558/ Masoleh.pdf. IEEE order tocs/t3017.htm; http: no. PR01894. //www.springerlink.com/ Reyhani-Masoleh:2003:LCB openurl.asp?genre=issue& issn=0302-9743&volume= [RMH03b] Arash Reyhani-Masoleh 3017; http://www.springerlink. and M. Anwar Hasan. com/openurl.asp?genre= On low complexity bit volume&id=doi:10.1007/ parallel polynomial basis b98177. multipliers. In Walter Ruiz:2001:SPS et al. [WKP03], pages 189– 202. CODEN LNCSD9. [RMCG01] Antonio Ruiz, Gregorio ISBN 3-540-40833-9. ISSN Mart´ınez, Oscar C´anovas, 0302-9743 (print), 1611- and Antonio F. G´omez. 3349 (electronic). LCCN SPEED protocol: Smartcard- TK7895.E42. URL http: based payment with en- //link.springer-ny.com/ crypted electronic deliv- link/service/series/0558/ ery. Lecture Notes in tocs/t2779.htm; http: Computer Science, 2200: //www.springerlink.com/ 446–??, 2001. CODEN openurl.asp?genre=issue& LNCSD9. ISSN 0302- issn=0302-9743&volume= 9743 (print), 1611-3349 2779; http://www.springerlink. (electronic). URL http: com/openurl.asp?genre= //link.springer-ny.com/ volume&id=doi:10.1007/ link/service/series/0558/ b13240. REFERENCES 589

Reyhani-Masoleh:2004:TFT Systems Review, 34(2):34, April 2000. CODEN OS- [RMH04] Arash Reyhani-Masoleh and RED8. ISSN 0163-5980 M. Anwar Hasan. To- (print), 1943-586X (elec- wards fault-tolerant crypto- tronic). graphic computations over finite fields. ACM Trans- Ryutov:2000:RESb actions on Embedded Com- [RN00b] Tatyana Ryutov and Clif- puting Systems, 3(3):593– ford Neuman. Representa- 613, August 2004. CO- tion and evaluation of secu- DEN ???? ISSN 1539-9087 rity policies (poster session). (print), 1558-3465 (elec- Operating Systems Review, tronic). 34(2):41, April 2000. CO- Rahaman:2008:CTB DEN OSRED8. ISSN 0163- 5980 (print), 1943-586X [RMPJ08] H. Rahaman, J. Mathew, (electronic). D. K. Pradhan, and A. M. Jabir. C-testable bit paral- Robinson:2002:LLE lel multipliers over GF(2m). [Rob02] Andrew Robinson. Lost ACM Transactions on De- languages: the enigma of sign Automation of Elec- the world’s undeciphered tronic Systems, 13(1):5:1– scripts. McGraw-Hill, New 5:??, January 2008. CODEN York, NY, USA, 2002. ISBN ATASFO. ISSN 1084-4309 0-07-135743-2 (hardcover). (print), 1557-7309 (elec- 352 pp. LCCN P211 .R59 tronic). 2002. URL http://www. Ryabko:2005:NTA loc.gov/catdir/bios/mh041/ 2001051412.html; http: [RMS05] B. Y. Ryabko, V. A. //www.loc.gov/catdir/description/ Monarev, and Y. I. Shokin. mh021/2001051412.html; A new type of attack on http://www.loc.gov/catdir/ block ciphers. Problems of toc/fy022/2001051412.html. Information Transmission, 41(4):385–394, ???? 2005. Robinson:2009:LLE CODEN PRITA9. ISSN [Rob09] Andrew Robinson. Lost 0032-9460 (print), 1608- languages: the enigma of 3253 (electronic). the world’s undeciphered Ryutov:2000:RESa scripts. Thames and Hud- son, London, UK, 2009. [RN00a] Tatyana Ryutov and Clif- ISBN 0-500-51453-4 (hard- ford Neuman. Representa- cover), 0-500-28816-X (pa- tion and evaluation of se- perback). 352 pp. LCCN curity policies. Operating CN120 .R63 2009. REFERENCES 590

Rosen:2000:NRC Berlin, Germany / Heidel- berg, Germany / London, [Ros00a] Alon Rosen. A note on UK / etc., 2006. ISBN the round-complexity of 3-642-06949-5, 3-540-32939- concurrent zero-knowledge. 0 (e-book). ISSN 1619- In Bellare [Bel00], pages 7100 (print), 2197-845X 451–?? ISBN 3-540- (electronic). xiii + 184 67907-3. ISSN 0302-9743 pp. LCCN QA76.9.A25 (print), 1611-3349 (elec- R657 2006. URL http: tronic). LCCN QA76.9.A25 //www.springerlink.com/ C79 2000 Bar. URL http: content/uu1171. With //link.springer-ny.com/ Additional Background by link/service/series/0558/ Oded Goldreich. bibs/1880/18800451.htm; http://link.springer- Rosenberg:2006:RAS ny.com/link/service/series/ [Ros06b] Beth Rosenberg, editor. 0558/papers/1880/18800451. RFID: applications, secu- pdf. rity, and privacy. Addison- Rosenblatt:2000:CBE Wesley, Reading, MA, USA, 2006. ISBN 0-321-29096-8. [Ros00b] A. Rosenblatt. The code li + 555 pp. LCCN TS160 book: the evolution of se- .G37 2005. URL http:// crecyfromMaryQueenof www.loc.gov/catdir/toc/ Scots to quantum cryptog- ecip059/2005006610.html. raphy [books]. IEEE Spec- trum, 37(10):10–14, October Rosenblum:2007:WAC 2000. CODEN IEESAM. ISSN 0018-9235 (print), [Ros07] David Rosenblum. What 1939-9340 (electronic). anyone can know: The pri- vacy risks of social net- Ross:2004:TCN working sites. IEEE Se- [Ros04] P. E. Ross. 10 tech compa- curity & Privacy, 5(3):40– nies for the next 10 years. 49, May/June 2007. CO- IEEE Spectrum, 41(11):52, DEN ???? ISSN 1540-7993 November 2004. CODEN (print), 1558-4046 (elec- IEESAM. ISSN 0018-9235 tronic). (print), 1939-9340 (elec- Roth:2001:RSC tronic). [Rot01] Volker Roth. On the ro- Rosen:2006:CZK bustness of some crypto- [Ros06a] Alon Rosen. Concurrent graphic protocols for mo- Zero-Knowledge.Informa- bile agent protection. Lec- tion Security and Cryp- ture Notes in Computer Sci- tography. Springer-Verlag, ence, 2240:1–??, 2001. CO- REFERENCES 591

DEN LNCSD9. ISSN 0302- (print), 1557-7341 (elec- 9743 (print), 1611-3349 tronic). (electronic). URL http: //link.springer-ny.com/ Rothe:2005:CTC link/service/series/0558/[Rot05] J¨org Rothe. Complexity bibs/2240/22400001.htm; Theory and Cryptology: an http://link.springer- Introduction to Cryptocom- ny.com/link/service/series/ plexity. Texts in theoret- 0558/papers/2240/22400001. ical computer science: an . pdf EATCS series. Springer- Roth:2002:JSA Verlag, Berlin, Germany / Heidelberg, Germany / Lon- [Rot02a] Volker Roth. Java secu- don, UK / etc., 2005. ISBN rity architecture and ex- 3-540-22147-6, 3-540-28520- tensions. Dr. Dobb’s 2 (e-book). xi + 478 Journal of Software Tools, pp. LCCN QA76.9.A25 27(4):34, 36–38, April R672 2005. URL http:/ 2002. CODEN DDJOEB. /www.myilibrary.com?id= ISSN 1044-789X. URL 133022; http://www.springerlink. http://www.ddj.com/ftp/ com/openurl.asp?genre= 2002/2002_04/jca.txt; book\%26isbn=978-3-540- http://www.ddj.com/ftp/ 22147-0. 2002/2002_04/jca.zip. Rothe:2007:BRB Rothe:2002:SFC [Rot07] J¨org Rothe. Book review: [Rot02b] J¨org Rothe. Some facets Complexity and Cryptogra- of complexity theory and phy: An Introduction,by cryptography: a five-lecture John Talbot and Dominic tutorial. ACM Comput- Welsh, Cambridge Univer- ing Surveys, 34(4):504–549, sity Press, 2006, 292 pages. December 2002. CODEN ACM SIGACT News,38 CMSVAN. ISSN 0360-0300 (2):16–20, June 2007. CO- (print), 1557-7341 (elec- DEN SIGNDM. ISSN 0163- tronic). 5700 (print), 1943-5827 (electronic). URL http: Rothe:2003:SFC //doi.acm.org/10.1145/ .See [Rot03] J¨org Rothe. Some facets 1272729.1272735 [TW06a]. of complexity theory and cryptography: a five-lecture Roy:2000:PCI tutorial. ACM Comput- ing Surveys, 34(4):504–549, [Roy00a] Bimal Roy, editor. Progress December 2003. CODEN in cryptology: INDOCRYPT CMSVAN. ISSN 0360-0300 2000: First International REFERENCES 592

Conference in Cryptology Rieffel:2000:IQC in India, Calcutta, In- dia, December 10–13, 2000: [RP00] Eleanor Rieffel and Wolf- proceedings, volume 1977 gang Polak. An introduction of Lecture Notes in Com- to quantum computing for puter Science. Springer-Ver- non-physicists. ACM Com- lag, Berlin, Germany / Hei- puting Surveys, 32(3):300– delberg, Germany / Lon- 335, September 2000. CO- don, UK / etc., 2000. DEN CMSVAN. ISSN 0360- ISBN 3-540-41452-5. LCCN 0300 (print), 1557-7341 QA267.A1 L43 no.1977. (electronic). URL http:// www.acm.org/pubs/articles/ Roychowdhury:2000:PCJ journals/surveys/2000- 32-3/p300-rieffel/p300- [Roy00b] Vwani P. Roychowdhury. rieffel.pdf; http:// Practical cryptography: July www.acm.org/pubs/citations/ 24–27, 2000, Engineering journals/surveys/2000- 819.311. Los Angeles, CA, 32-3/p300-rieffel/. USA, 2000. (various) pp. Ramzan:2000:RSS Roy:2005:ACA [RR00] Zulfikar Ramzan and Leonid [Roy05] Bimal Roy, editor. Ad- Reyzin. On the round vances in cryptology: ASI- security of symmetric-key ACRYPT 2005: 11th In- cryptographic primitives. ternational Conference on In Bellare [Bel00], pages the Theory and Applica- 376–?? ISBN 3-540- tion of Cryptology and In- 67907-3. ISSN 0302-9743 formation Security, Chen- (print), 1611-3349 (elec- nai, India, December 4– tronic). LCCN QA76.9.A25 8, 2005, volume 3788 of C79 2000 Bar. URL http: Lecture Notes in Computer //link.springer-ny.com/ Science. Springer-Verlag, link/service/series/0558/ Berlin, Germany / Heidel- bibs/1880/18800376.htm; berg, Germany / London, http://link.springer- UK / etc., 2005. CO- ny.com/link/service/series/ DEN LNCSD9. ISBN 3-540- 0558/papers/1880/18800376. 30684-6. ISSN 0302-9743 pdf. (print), 1611-3349 (elec- Reyzin:2002:BTB tronic). LCCN QA76.9.A25 I555 2005. URL http: [RR02] Leonid Reyzin and Natan //www.springerlink.com/ Reyzin. Better than BiBa: openurl.asp?genre=issue& Short one-time signatures issn=0302-9743&volume= with fast signing and ver- 3788. ifying. Lecture Notes in REFERENCES 593

Computer Science, 2384: IN, USA, 2004. ISBN 0-672- 144–??, 2002. CODEN 32651-5 (paperback). xiv + LNCSD9. ISSN 0302- 378 pp. LCCN TK5105.59 9743 (print), 1611-3349 .R68 2004. (electronic). URL http: Rittinghouse:2005:IIM //link.springer-ny.com/ link/service/series/0558/[RR05] John Rittinghouse and bibs/2384/23840144.htm; James Ransome. IM In- http://link.springer- stant Messaging Security. ny.com/link/service/series/ Elsevier, Amsterdam, The 0558/papers/2384/23840144. Netherlands, 2005. ISBN pdf. 1-55558-338-5. 432 (est.) pp. LCCN ???? URL Ratner:2003:NGI http://books.elsevier. [RR03a] Daniel Ratner and Mark com/us/mk/us/subindex. Ratner. Nanotechnology: a asp?isbn=1555583385. gentle introduction to the Rechberger:2008:NRN next big idea. Prentice-Hall PTR, Upper Saddle River, [RR08] C. Rechberger and V. Ri- NJ 07458, USA, 2003. ISBN jmen. New results on 0-13-101400-5. xiv + 188 pp. NMAC/HMAC when in- LCCN T174.7 .R38 2003. stantiated with popular hash functions. J.UCS: Ratner:2003:NHS Journal of Universal Com- [RR03b] Daniel Ratner and Mark puter Science, 14(3):347– Ratner. Nanotechnology and 376, ???? 2008. CO- Homeland Security: New DEN ???? ISSN 0948- Weapons for New Wars. 6968. URL http://www. Prentice-Hall PTR, Upper jucs.org/jucs_14_3/new_ Saddle River, NJ 07458, results_on_nmac. USA, 2003. ISBN 0-13- Rechberger:2006:NCW 145307-6. 176 (est.) pp. LCCN UA927.R38 2004. [RRS06] Christian Rechberger, Vin- US$24.95. cent Rijmen, and Nicolas Rosenberg:2004:SWS Sklavos. The NIST Crypto- graphic Workshop on Hash [RR04] Jonathan B. Rosenberg and Functions. IEEE Security David L. Remy. Se- & Privacy, 4(1):54–56, Jan- curing Web services with uary/February 2006. CO- WS-Security: demystifying DEN ???? ISSN 1540- WS-Security, WS-Policy, 7993 (print), 1558-4046 SAML, XML Signature, and (electronic). URL http: XML Encryption.SAMS //ieeexplore.ieee.org/ Publishing, Indianapolis, iel5/8013/33481/01588827. REFERENCES 594

pdf; http://ieeexplore. bibs/1975/19750030.htm; ieee.org/xpls/abs_all. http://link.springer- jsp?isnumber=33481&arnumber= ny.com/link/service/series/ 1588827; http://www. 0558/papers/1975/19750030. csrc.nist.gov/pki/HashWorkshop/ pdf. . Romer:2001:ILA Rivest:2000:RA [RRY00] Ronald L. Rivest, M. J. B. [RS01] Tanja R¨omer and Jean- Robshaw, and Yiqun Lisa Pierre Seifert. Informa- Yin. RC6 as the AES. In tion leakage attacks against NIST [NIS00], pages 337– smart card implementations 342. ISBN ???? LCCN ???? of the elliptic curve digital URL http://csrc.nist. signature algorithm. Lecture gov/encryption/aes/round2/ Notes in Computer Science, conf3/aes3conf.htm; http: 2140:211–??, 2001. CO- //csrc.nist.gov/encryption/ DEN LNCSD9. ISSN 0302- aes/round2/conf3/papers/ 9743 (print), 1611-3349 AES3Proceedings-1.pdf; (electronic). URL http: http://csrc.nist.gov/ //link.springer-ny.com/ encryption/aes/round2/ link/service/series/0558/ conf3/papers/AES3Proceedings- bibs/2140/21400211.htm; 2.pdf; http://csrc.nist. http://link.springer- gov/encryption/aes/round2/ ny.com/link/service/series/ conf3/papers/AES3Proceedings- 0558/papers/2140/21400211. 3.pdf; http://csrc.nist. pdf. gov/encryption/aes/round2/ Rubin:2002:SAV conf3/papers/AES3Proceedings. pdf. [RS02] Karl Rubin and Alice Silver- Rosenbaum:2000:SFR berg. Supersingular Abelian varieties in cryptology. In [RS00] Ren´e Rosenbaum and Hei- Yung [Yun02a], pages 336– drun Schumann. A stegano- 353. CODEN LNCSD9. graphic framework for ref- ISBN 3-540-44050-X (pa- erence colour based encod- perback). ISSN 0302-9743 ing and cover image se- (print), 1611-3349 (elec- lection. Lecture Notes in tronic). LCCN QA76.9.A25 Computer Science, 1975: C79 2002. URL http:/ 30–??, 2000. CODEN /link.springer.de/link/ LNCSD9. ISSN 0302- service/series/0558/bibs/ 9743 (print), 1611-3349 2442/24420336.htm; http: (electronic). URL http: //link.springer.de/link/ //link.springer-ny.com/ service/series/0558/papers/ link/service/series/0558/ 2442/24420336.pdf. REFERENCES 595

Rubin:2003:TBC August 29–September 1, 2005. Proceedings,volume [RS03] Karl Rubin and Alice Silver- 3659 of Lecture Notes in berg. Torus-based cryptog- Computer Science. Spring- raphy. In Boneh [Bon03], er-Verlag, Berlin, Ger- pages 349–365. CODEN many / Heidelberg, Ger- LNCSD9. ISBN 3-540- many / London, UK / etc., 40674-3. ISSN 0302-9743 2005. CODEN LNCSD9. (print), 1611-3349 (elec- ISBN 3-540-28474-5. ISSN tronic). LCCN QA76.9.A25 0302-9743 (print), 1611- C79 2003. URL http: 3349 (electronic). LCCN //link.springer-ny.com/ ???? URL http:/ link/service/series/0558/ /www.springerlink.com/ tocs/t2729.htm; http: openurl.asp?genre=issue& //www.springerlink.com/ issn=0302-9743&volume= openurl.asp?genre=issue& 3659. issn=0302-9743&volume= 2729; http://www.springerlink. Rubin:2008:CFF com/openurl.asp?genre= [RS08] K. Rubin and A. Silver- volume&id=doi:10.1007/ berg. Compression in finite b11817. fields and torus-based cryp- Riley:2004:HAE tography. SIAM Journal on Computing, 37(5):1401– [RS04] Joseph Riley and Michael J. 1428, ???? 2008. CODEN Schulte. A hardware acceler- SMJCAT. ISSN 0097-5397 ator for elliptic curve cryp- m (print), 1095-7111 (elec- tography over GF(2 ). In- tronic). ternational Journal of Com- puter Research, ??(??):??, RSA:2000:PKC 2004. ISSN 1535-6698. URL http://mesa.ece. [RSA00a] RSA. Public-key cryptog- wisc.edu/publications/ raphy standards. World- cp_2004-10.pdf.Spe- Wide Web site., 2000. URL cial Issue on Cryptographic http://www.rsasecurity. Hardware and Embedded com/rsalabs/pkcs/. Systems. RSA:2000:PVCa Rao:2005:CHE [RSA00b] RSA Laboratories. PKCS [RS05] Josyula R. Rao and Berk #10 v1.7: Certification Re- Sunar, editors. Crypto- quest Syntax Standard.RSA graphic Hardware and Em- Data Security, Inc., Red- bedded Systems — CHES wood City, CA, USA, May 2005: 7th International 26, 2000. 10 pp. URL Workshop, Edinburgh, UK, http://www.rsasecurity. REFERENCES 596

com/rsalabs/pkcs/pkcs- Redwood City, CA, USA, 10/index.html. November 1, 2001. 374 pp. URL http://www. RSA:2000:PCP rsasecurity.com/rsalabs/ [RSA00c] RSA Laboratories. PKCS pkcs/pkcs-11/index.html. #15: Conformance Pro- RSA:2002:PVR file Specification.RSA Data Security, Inc., Red- [RSA02] RSA Laboratories. PKCS wood City, CA, USA, Au- #1 v2.1: RSA Cryptog- gust 1, 2000. 8 pp. URL raphy Standard.RSA http://www.rsasecurity. Data Security, Inc., Red- com/rsalabs/pkcs/pkcs- wood City, CA, USA, June 15/index.html. 14, 2002. 61 pp. URL RSA:2000:PVCb http://www.rsasecurity. com/rsalabs/pkcs/pkcs- [RSA00d] RSA Laboratories. PKCS 1/index.html. #15 v1.1: Cryptographic Token Information Syn- Rivest:2003:TAL tax Standard.RSAData Security, Inc., Redwood [RSA03a] Ronald L. Rivest, Adi City, CA, USA, June 6, Shamir, and Leonard M. 2000. 81 pp. URL Adleman. 2002 Turing http://www.rsasecurity. Award Lecture. World- com/rsalabs/pkcs/pkcs- Wide Web document., June 15/index.html. 7, 2003. URL http://www. acm.org/awards/turing_ RSA:2000:PVS citations/rivest-shamir- adleman.html. Collection [RSA00e] RSA Laboratories. PKCS of three slide presentations: #9 v2.0: Selected Ob- “Pre RSA Days” (Adle- ject Classes and Attribute man), “Early RSA Days” Types. RSA Data Secu- (Rivest), “Turing Lecture rity, Inc., Redwood City, on Cryptology: A Status CA, USA, February 25, Report” (Shamir). 2000. 34 pp. URL http://www.rsasecurity. RSA:2003:PEC com/rsalabs/pkcs/pkcs- 9/index.html. [RSA03b] RSA Laboratories. PKCS RSA:2001:PVC #13: Elliptic Curve Cryp- tography Standard.RSA [RSA01] RSA Laboratories. PKCS Data Security, Inc., Red- #11 v2.11: Cryptographic wood City, CA, USA, Token Interface Standard. 2003. URL http://www. RSA Data Security, Inc., rsasecurity.com/rsalabs/ REFERENCES 597

pkcs/pkcs-13/index.html. Banks, Alan Heckert, James Still under development. Dray, and San Vo. A Statistical Test Suite For Rousseau:2009:CCP Random and Pseudoran- [RSA09a] Christiane Rousseau and dom Number Generators Yvan Saint-Aubin. La cryp- for Cryptographic Applica- tographiea ` cle publique: tions. National Institute for le code RSA (1978). In Standards and Technology, Math´ematiques et Tech- Gaithersburg, MD 20899- nologie [RSA09b], pages 8900, USA, April 2001. xi + 213–244. ISBN 0-387- 153 pp. URL http://csrc. 69213-4. LCCN ???? nist.gov/rng/rng2.html; URL http://d-nb.info/ http://csrc.nist.gov/ 997902213/34; http:/ rng/SP800-22b.pdf; http: /nbn-resolving.de/urn: //csrc.nist.gov/rng/sts- nbn:de:1111-20091103138; 1.5.tar; http://csrc. http://www.springerlink. nist.gov/rng/sts.data. com/content/r61844. tar; http://csrc.nist. gov/rng/StsGui.zip; http: Rousseau:2009:MT //www.cs.sunysb.edu/~algorith/ [RSA09b] Christiane Rousseau and implement/rng/distrib/ Yvan Saint-Aubin, editors. SP800-22b.pdf.NIST Math´ematiques et Technolo- Special Publication 800-22, gie. Springer Undergrad- with revisions dated May 15, uate Texts in Mathemat- 2001. ics and Technology. Spring- Rogers:2005:MPH er-Verlag, Berlin, Ger- many / Heidelberg, Ger- [RSP05] Brian Rogers, Yan Solihin, many / London, UK / etc., and Milos Prvulovic. Mem- 2009. ISBN 0-387-69213- ory predecryption: hid- 4. ???? pp. LCCN ???? ing the latency overhead of URL http://d-nb.info/ memory encryption. ACM 997902213/34; http:/ SIGARCH Computer Ar- /nbn-resolving.de/urn: chitecture News, 33(1):27– nbn:de:1111-20091103138; 33, March 2005. CODEN http://www.springerlink. CANED2. ISSN 0163-5964 com/content/r61844. (print), 1943-5851 (elec- tronic). Rukhin:2001:STS Rouvroy:2003:EUF [RSN+01] Andrew Rukhin, Juan Soto, James Nechvatal, Miles [RSQL03] G. Rouvroy, F.-X. Stan- Smid, Elaine Barker, Ste- daert, J.-J. Quisquater, and fan Leigh, Mark Leven- J.-D. Legat. Efficient uses of son, Mark Vangel, David FPGAs for implementations REFERENCES 598

of DES and its experimental Rubin:2000:KVL linear cryptanalysis. IEEE Transactions on Computers, [Rub00] Aviel D. Rubin. Ker- 52(4):473–482, April 2003. berosversustheLeighton- CODEN ITCOB4. ISSN Micali protocol. Dr. 0018-9340 (print), 1557- Dobb’s Journal of Software 9956 (electronic). URL Tools, 25(11):21–22, 24, 26, http://ieeexplore.ieee. November 2000. CODEN org/stamp/stamp.jsp?tp= DDJOEB. ISSN 1044-789X. &arnumber=1190588. Rubin:2001:SCR

Ryabko:2004:NTR [Rub01] Avi Rubin. Security con- siderations for remote elec- [RSS04] B. Ya. Ryabko, V. S. Stog- tronic voting over the Inter- nienko, and Y. I. Shokin. A net. ;login: the USENIX As- new test for randomness and sociation newsletter, 26(1): its application to some cryp- ??, February 2001. CODEN tographic problems. Jour- LOGNEM. ISSN 1044-6397. nal of Statistical Planning URL http://www.usenix. and Inference, 123(2):365– org/publications/login/ 376, July 1, 2004. CODEN 2001-02/pdfs/rubin.pdf. JSPIDN. ISSN 0378-3758 (print), 1873-1171 (elec- Rugg:2004:CMV tronic). URL http:// www.sciencedirect.com/ [Rug04] Gordon Rugg. Cryptogra- science/article/pii/S0378375803001496. phy: The mystery of the Voynich Manuscript. Sci- Rivest:2001:HLS entific American, 291(1): 104–109, July 2004. CO- DEN SCAMAC. ISSN [RST01] Ronald L. Rivest, Adi 0036-8733 (print), 1946- Shamir, and Yael Tauman. 7087 (electronic). URL How to leak a secret. Lecture http://www.nature.com/ Notes in Computer Science, scientificamerican/journal/ 2248:552–??, 2001. CO- v291/n1/pdf/scientificamerican0704- DEN LNCSD9. ISSN 0302- 104.pdf. 9743 (print), 1611-3349 (electronic). URL http: Rupp:2009:CAC //link.springer-ny.com/ link/service/series/0558/[Rup09] Andy Rupp. Computational bibs/2248/22480552.htm; aspects of cryptography and http://link.springer- cryptanalysis, volume 6 of ny.com/link/service/series/ IT-Security.Europ¨aischer 0558/papers/2248/22480552. Universit¨atsverlag, Berlin, pdf. Germany, 2009. ISBN 3- REFERENCES 599

89966-337-3. xviii + 245 pp. tronic). URL http://link. LCCN ???? springer.com/content/pdf/ Raghavan:2009:SPC 10.1007/3-540-39200-9_ 35.pdf. [RVS09] Barath Raghavan, Patric Renner:2003:UAP Verkaik, and Alex C. Sno- eren. Secure and policy- [RW03b] Renato Renner and Ste- compliant source routing. fan Wolf. Unconditional IEEE/ACM Transactions authenticity and privacy on Networking, 17(3):764– from an arbitrarily weak se- 777, June 2009. CODEN cret. In Boneh [Bon03], IEANEP. ISSN 1063-6692 pages 78–95. CODEN (print), 1558-2566 (elec- LNCSD9. ISBN 3-540- tronic). 40674-3. ISSN 0302-9743 (print), 1611-3349 (elec- Russell:2002:HFU tronic). LCCN QA76.9.A25 C79 2003. URL http: [RW02] Alexander Russell and Hong //link.springer-ny.com/ Wang. How to fool an un- link/service/series/0558/ bounded adversary with a tocs/t2729.htm; http: short key. Lecture Notes //www.springerlink.com/ in Computer Science, 2332: openurl.asp?genre=issue& 133–??, 2002. CODEN issn=0302-9743&volume= LNCSD9. ISSN 0302- 2729; http://www.springerlink. 9743 (print), 1611-3349 com/openurl.asp?genre= (electronic). URL http: volume&id=doi:10.1007/ //link.springer-ny.com/ b11817. link/service/series/0558/ bibs/2332/23320133.htm; Ramaswamy:2007:HSP http://link.springer- [RW07] Ramaswamy Ramaswamy ny.com/link/service/series/ and Tilman Wolf. High- 0558/papers/2332/23320133. speed prefix-preserving IP pdf. address anonymization for Renner:2003:NBS passive measurement sys- tems. IEEE/ACM Trans- [RW03a] Renato Renner and Stefan actions on Networking,15 Wolf. New bounds in secret- (1):26–39, February 2007. key agreement: The gap be- CODEN IEANEP. ISSN tween formation and secrecy 1063-6692 (print), 1558- extraction. Lecture Notes 2566 (electronic). in Computer Science, 2656: Schmalz:2003:MDI 562–577, 2003. CODEN LNCSD9. ISSN 0302-9743 [S+03] Mark S. Schmalz et al., (print), 1611-3349 (elec- editors. Mathematics of REFERENCES 600

data/image coding, com- cards. IEEE Micro, 21(6): pression, and encryption 4–6, November/December V, with applications: 9–10 2001. CODEN IEMIDZ. July 2002, Seattle, Wash- ISSN 0272-1732 (print), ington, USA, volume 4793 1937-4143 (electronic). URL of SPIE proceedings series. http://dlib.computer.org/ SPIE, Bellingham, Wash., mi/books/mi2001/m6004abs. USA, 2003. ISBN 0-8194- htm; http://dlib.computer. 4560-6. ISSN 0277-786X org/mi/books/mi2001/pdf/ (print), 1996-756X (elec- m6004.pdf. tronic). LCCN TA1637 .M382 2003; TA1637 .M38 Sale:2000:CGL 2002; TA1637 .M38 2003; [Sal00a] Anthony E. Sale. Colossus TA1637 .M38 2003eb; TA1637; and the German Lorenz ci- TS510 .S63; Internet. URL pher — code breaking in http://link.spie.org/PSISDG/ WW II. Lecture Notes 4793/1; http://uclibs. in Computer Science, 1807: . org/PID/39661 417–??, 2000. CODEN Saini:2002:JMD LNCSD9. ISSN 0302- 9743 (print), 1611-3349 [SA02] S. P. Saini and F. Ahmad. (electronic). URL http: Java model of DSA (Dig- //link.springer-ny.com/ ital Signature Algorithm). link/service/series/0558/ IETE Technical Review,19 bibs/1807/18070417.htm; (4):189–194, 2002. CODEN http://link.springer- ITREEI. ISSN 0256-4602. ny.com/link/service/series/ Saeednia:2002:IBS 0558/papers/1807/18070417. pdf. [Sae02] Shahrokh Saeednia. An identity-based society ori- Sale:2000:CBP ented signature scheme with anonymous signers. Infor- [Sal00b] Anthony E. Sale. The mation Processing Letters, Colossus of Bletchley Park: 83(6):295–299, September the German cipher sys- 30, 2002. CODEN IF- tem. In Rojas and Hasha- PLAT. ISSN 0020-0190 gen [RH00], pages 351–364. (print), 1872-6119 (elec- ISBN 0-262-18197-5 (hard- tronic). cover), 0-585-35535-5 (elec- tronic). LCCN QA76.17 Sakamura:2001:GEI .F57 2000. [Sak01] Ken Sakamura. Guest ed- Sale:2001:GRT itor’s introduction: Ra- dio frequency identifica- [Sal01a] Tony Sale. General report tion and noncontact smart on Tunny: The Newmanry REFERENCES 601

history. Technical report, URL http://www.usenix. March 2001. URL http: org/publications/login/ //www.codesandciphers. 2003-04/openpdfs/bookreviews. org.uk/documents/newman/ pdf. newman.pdf. Sale:2005:RCB Salus:2001:CA [Sal05a] Anthony E. Sale. The [Sal01b] Peter Salus. 2001: a commu- rebuilding of Colossus at nications anniversary, 2001. Bletchley Park. IEEE An- URL http://db.usenix. nals of the History of Com- org/publications/library/ puting, 27(3):61–69, July/ proceedings/lisa2001/tech/ September 2005. CODEN . Unpublished invited talk, IAHCEX. ISSN 1058-6180 LISA 2001: 15th Systems (print), 1934-1547 (elec- Administration Conference, tronic). December 2–7, 2001, Town Sallee:2005:MBM and Country Resort Hotel, San Diego, CA. [Sal05b] Phil Sallee. Model-based methods for steganography Salomon:2003:DPS and steganalysis. Interna- tional Journal of Image and [Sal03a] David Salomon. Data Pri- Graphics (IJIG), 5(1):167– vacy and Security. Spring- ??, January 2005. CODEN er-Verlag, Berlin, Ger- ???? ISSN 0219-4678. many / Heidelberg, Ger- many / London, UK / etc., Salomon:2005:CDC 2003. ISBN 0-387-00311- [Sal05c] David Salomon. Coding for 8. xiv + 465 pp. LCCN data and computer commu- QA76.9.A25 S265 2003. nications. Springer-Verlag, US$59.95. URL http:// Berlin, Germany / Heidel- www.booksbydavidsalomon. berg, Germany / London, com/. UK / etc., 2005. ISBN Salus:2003:BRBb 0-387-21245-0. xv + 548 pp. LCCN TK5102.94 [Sal03b] Peter H. Salus. Book re- .S35 2005. URL http:/ views: The bookworm: Re- /www.DavidSalomon.name/ views of Pavol Cerven’s Codes/Codes.html; http: Crackproof Your Software //www.ecs.csun.edu/~dsalomon/ and of Jenness and Cozens’s . Extending and Embedding Salomon:2005:FCS Perl. ;login: the USENIX Association newsletter,28 [Sal05d] David Salomon. Foun- (2):??, April 2003. CODEN dations of computer se- LOGNEM. ISSN 1044-6397. curity. Springer-Verlag, REFERENCES 602

Berlin, Germany / Hei- org.uk/lorenz/rebuild. delberg, Germany / Lon- htm. don, UK / etc., 2005. Samid:2001:ESR ISBN 1-84628-193-8, 1- 84628-341-8. xxi + 368 [Sam01] Gideon Samid. Encryption pp. LCCN QA76.9.A25 sticks (randomats). Lecture S2656 2005. URL http: Notes in Computer Science, //www.springer.com/sgw/ 2229:150–??, 2001. CO- cda/frontpage/0,11855, DEN LNCSD9. ISSN 0302- 4-40007-22-65173048-0, 9743 (print), 1611-3349 00.html; http://www. (electronic). URL http: springer.com/sgw/cda/pageitems/ //link.springer-ny.com/ document/cda_downloaddocument/ link/service/series/0558/ 0,11855,0-0-45-166687- bibs/2229/22290150.htm; p65173048,00.pdf; http: http://link.springer- //www.springer.com/sgw/ ny.com/link/service/series/ cda/pageitems/document/ 0558/papers/2229/22290150. cda_downloaddocument/0, pdf. 11855,0-0-45-166688-p65173048, 00.pdf; http://www.springer. Samtani:2009:WTO com/sgw/cda/pageitems/ [Sam09] Rajan Samtani. Web tech- document/cda_downloaddocument/ nologies: Ongoing innova- 0,11855,0-0-45-166689- tion in digital watermark- p65173048,00.pdf. ing. Computer, 42(3):92– 94, March 2009. CODEN Salomon:2007:DCC CPTRB4. ISSN 0018-9162 (print), 1558-0814 (elec- [Sal07] David Salomon. Data Com- tronic). pression: The Complete Reference. Springer-Verlag, Santini:2005:WSI Berlin, Germany / Heidel- berg, Germany / London, [San05] Simone Santini. We are UK / etc., 2007. ISBN 1- sorry to inform you .... 84628-602-6. xxv + 1092 pp. Computer, 38(12):128, 126– LCCN ???? With contri- 127, December 2005. CO- butions by Giovanni Motta DEN CPTRB4. ISSN and David Bryant. 0018-9162 (print), 1558- 0814 (electronic). Sale:20xx:CRP Sarkar:2002:FCM

[Salxx] Tony Sale. The Colossus re- [Sar02] Palash Sarkar. The filter- build project. World-Wide combiner model for mem- Web site., 20xx. URL http: oryless synchronous stream //www.codesandciphers. ciphers. In Yung [Yun02a], REFERENCES 603

pages 533–548. CODEN (print), 1872-6119 (elec- LNCSD9. ISBN 3-540- tronic). 44050-X (paperback). ISSN 0302-9743 (print), 1611- Savage:2005:IPWa 3349 (electronic). LCCN [Sav05a] P. R. Savage. Invention: QA76.9.A25 C79 2002. URL Patent watch. IEEE Spec- http://link.springer.de/ trum, 42(1):70–71, January link/service/series/0558/ 2005. CODEN IEESAM. bibs/2442/24420533.htm; ISSN 0018-9235 (print), http://link.springer. 1939-9340 (electronic). de/link/service/series/ 0558/papers/2442/24420533. Savage:2005:IPWb pdf. [Sav05b] P. R. Savage. Inventions: Sasse:2007:REB Patent watch. IEEE Spec- [Sas07] M. Angela Sasse. Red-eye trum, 42(3):64, March 2005. blink, bendy shuffle, and CODEN IEESAM. ISSN the yuck factor: a user ex- 0018-9235 (print), 1939- perience of biometric air- 9340 (electronic). port systems. IEEE Se- curity & Privacy, 5(3):78– Soto:2000:RTA 81, May/June 2007. CO- [SB00] Juan Soto and Lawrence E. DEN ???? ISSN 1540-7993 Bassham. Randomness test- (print), 1558-4046 (elec- ing of the Advanced En- tronic). cryption Standard finalist Satoh:2006:DPI candidates. NIST inter- nal report 6483, National [Sat06] Takakazu Satoh. On de- Institute for Standards grees of polynomial inter- and Technology, Gaithers- polations related to ellip- burg, MD 20899-8900, USA, tic curve cryptography. In April 2000. URL http:/ Ytrehus [Ytr06], pages 155– /csrc.nist.gov/rng/aes- 163. ISBN 3-540-35481- report-final.doc. 6. LCCN QA76.9.A25 I557 2005. Shacham:2001:ISH Savelli:2004:NDC [SB01] Hovav Shacham and Dan [Sav04] A. Savelli. On numerically Boneh. Improving SSL decipherable codes and their handshake performance via homophonic partitions. In- batching. Lecture Notes formation Processing Let- in Computer Science, 2020: ters, 90(3):103–108, May 28–??, 2001. CODEN 16, 2004. CODEN IF- LNCSD9. ISSN 0302- PLAT. ISSN 0020-0190 9743 (print), 1611-3349 REFERENCES 604

(electronic). URL http: ISBN 1-932415-82-3. LCCN //link.springer-ny.com/ TK5105.59 .I57 2005. link/service/series/0558/ Stallings:2007:CSP bibs/2020/20200028.htm; http://link.springer- [SB07] William Stallings and Lawrie ny.com/link/service/series/ Brown. Computer Secu- 0558/papers/2020/20200028. rity: Principles and Prac- pdf. tice. Prentice-Hall, Inc., Up- per Saddle River, NJ 07458, Scott:2004:CP USA, 2007. ISBN 0-13- 600424-5. ???? pp. LCCN [SB04] Michael Scott and Paulo ???? S. L. M. Barreto. Com- pressed pairings. In Sherwood:2005:MTR Franklin [Fra04], pages 140– [SBB05] Rob Sherwood, Bobby ?? CODEN LNCSD9. Bhattacharjee, and Ryan ISBN 3-540-22668-0. ISSN Braud. Misbehaving TCP 0302-9743 (print), 1611- receivers can cause Internet- 3349 (electronic). LCCN wide congestion collapse. 10.1007/b99099. URL In Meadows and Syverson http://www.springerlink. [MS05b], pages 383–392. com/openurl.asp?genre= ISBN 1-59593-226-7. LCCN issue&issn=0302-9743&volume= QA76.9.A25. ACM order 3152; http://www.springerlink. number 459050. com/openurl.asp?genre= Steiner:2001:SPB volume&id=doi:10.1007/ b99099. [SBEW01] Michael Steiner, Peter Buh- Stoklosa:2005:CIC ler, Thomas Eirich, and Michael Waidner. Secure [SB05] Janusz Stoklosa and Jaroslaw password-based cipher suite Bubicz. Compound in- for TLS. ACM Transac- versive congruential gener- tions on Information and ator as a source of keys System Security, 4(2):134– for stream ciphers. In 157, May 2001. CODEN Hamid R. Arabnia, Liwen ATISBQ. ISSN 1094-9224 He, and Youngsong Mun, (print), 1557-7406 (elec- editors, Proceedings of the tronic). 2005 International Confer- Smeraldi:2002:SVF ence on Security and Man- agement, SAM ’05: Las Ve- [SBG02] Fabrizio Smeraldi, Josef Bi- gas, Nevada, USA, June gun, and Wulfram Gerstner. 20-23, 2005, pages 473– Support vector features and 478. CSREA Press, Las the role of dimensionality in Vegas, NV, USA, 2005. face authentication. Lecture REFERENCES 605

Notes in Computer Science, Security, 28(5):310–324, 2388:249–??, 2002. CO- July 2009. CODEN DEN LNCSD9. ISSN 0302- CPSEDU. ISSN 0167-4048 9743 (print), 1611-3349 (print), 1872-6208 (elec- (electronic). URL http: tronic). URL https:// //link.springer-ny.com/ www.sciencedirect.com/ link/service/series/0558/ science/article/pii/S0167404808000953. bibs/2388/23880249.htm; http://link.springer- Steinfeld:2002:NSA ny.com/link/service/series/[SBZ02] Ron Steinfeld, Joonsang 0558/papers/2388/23880249. Baek, and Yuliang Zheng. pdf. On the necessity of strong Shehab:2005:SCM assumptions for the security of a class of asymmetric en- [SBG05] Mohamed Shehab, Elisa cryption schemes. Lecture Bertino, and Arif Ghafoor. Notes in Computer Science, Secure collaboration in 2384:241–??, 2002. CO- mediator-free environments. DEN LNCSD9. ISSN 0302- In Meadows and Syver- 9743 (print), 1611-3349 son [MS05b], pages 58–67. (electronic). URL http: ISBN 1-59593-226-7. LCCN //link.springer-ny.com/ QA76.9.A25. ACM order link/service/series/0558/ number 459050. bibs/2384/23840241.htm; http://link.springer- Shehab:2007:WSD ny.com/link/service/series/ [SBG07] Mohamed Shehab, Kamal 0558/papers/2384/23840241. Bhattacharya, and Arif pdf. Ghafoor. Web services dis- Seredynski:2004:CAC covery in secure collabora- tion environments. ACM [SBZ04] Franciszek Seredynski, Pas- Transactions on Internet cal Bouvry, and Albert Y. Technology (TOIT), 8(1): Zomaya. Cellular automata 5:1–5:??, November 2007. computations and secret CODEN ???? ISSN key cryptography. Par- 1533-5399 (print), 1557- allel Computing, 30(5–6): 6051 (electronic). 753–766, May/June 2004. CODEN PACOEJ. ISSN Shaikh:2009:SAU 0167-8191 (print), 1872- [SBS09] Siraj A. Shaikh, Vicky J. 7336 (electronic). Bush, and Steve A. Schnei- Syverson:2001:LAP der. Specifying authenti- cation using signal events [SC01] Paul Syverson and Iliano in CSP. Computers & Cervesato. The logic of au- REFERENCES 606

thentication protocols. Lec- Sun:2002:WDC ture Notes in Computer Sci- ence, 2171:63–??, 2001. CO- [SC02c] Hung-Min Sun and Bor- DEN LNCSD9. ISSN 0302- Liang Chen. Weighted 9743 (print), 1611-3349 decomposition construction (electronic). URL http: for perfect secret sharing //link.springer-ny.com/ schemes. Computers and link/service/series/0558/ Mathematics with Appli- bibs/2171/21710063.htm; cations, 43(6–7):877–887, http://link.springer- March/April 2002. CODEN ny.com/link/service/series/ CMAPDK. ISSN 0898-1221 0558/papers/2171/21710063. (print), 1873-7668 (elec- pdf. tronic). URL http:// www.sciencedirect.com/ Shen:2002:NDW science/article/pii/S0898122101003285.

[SC02a] Kuan-Ting Shen and Ling- Shao:2005:NEV Hwei Chen. A new digi- tal watermarking technique [SC05a] Jun Shao and Zhenfu Cao. for video. Lecture Notes A new efficient (tn)veri- in Computer Science, 2314: fiable multi-secret sharing 269–??, 2002. CODEN (VMSS) based on YCH LNCSD9. ISSN 0302- scheme. Applied Mathe- 9743 (print), 1611-3349 matics and Computation, (electronic). URL http: 168(1):135–140, Septem- //link.springer-ny.com/ ber 1, 2005. CODEN link/service/series/0558/ AMHCBQ. ISSN 0096-3003 bibs/2314/23140269.htm; (print), 1873-5649 (elec- http://link.springer- tronic). URL http:// ny.com/link/service/series/ www.sciencedirect.com/ 0558/papers/2314/23140269. science/article/pii/S0096300304005922. pdf. Stephanides:2005:GAK Stoll:2002:MMC [SC05b] George Stephanides and [SC02b] Michael Stoll and John E. Nicolae Constantinescu. Cremona. Minimal mod- The GN-authenticated key els for 2-coverings of ellip- agreement. Applied Math- tic curves. LMS Journal ematics and Computation, of Computation and Mathe- 170(1):531–544, Novem- matics, 5:220–??, 2002. CO- ber 1, 2005. CODEN DEN ???? ISSN 1461-1570. AMHCBQ. ISSN 0096-3003 URL http://www.lms.ac. (print), 1873-5649 (elec- uk/jcm/5/lms2002-013/. tronic). REFERENCES 607

Sun:2005:IPK Schneier:2000:AAR

[SC05c] Da-Zhi Sun and Zhen-Fu [Sch00b] Bruce Schneier. Abstracts Cao. Improved public key of AES-related papers from authentication scheme for the Fast Software Encryp- non-repudiation. Applied tion Workshop (FSE) 2000. Mathematics and Com- In NIST [NIS00], pages 9– putation, 168(2):927–932, 10. ISBN ???? LCCN ???? September 15, 2005. CO- URL http://csrc.nist. DEN AMHCBQ. ISSN gov/encryption/aes/round2/ 0096-3003 (print), 1873- conf3/aes3conf.htm; http: 5649 (electronic). //csrc.nist.gov/encryption/ aes/round2/conf3/papers/ Siegelin:2001:SCD AES3Proceedings-1.pdf; http://csrc.nist.gov/ [SCF01] C. Siegelin, L. Castillo, and encryption/aes/round2/ U. Finger. Smart Cards: conf3/papers/AES3Proceedings- Distributed computing with 2.pdf; http://csrc.nist. $5 devices. Parallel Pro- gov/encryption/aes/round2/ cessing Letters, 11(1):57– conf3/papers/AES3Proceedings- ??, March 2001. CODEN 3.pdf; http://csrc.nist. PPLTEE. ISSN 0129-6264 gov/encryption/aes/round2/ (print), 1793-642X (elec- conf3/papers/AES3Proceedings. tronic). pdf.

Schmalz:2000:MAD Schneier:2000:IRS [Sch00c] Bruce Schneier. Inside [Sch00a] Mark S. Schmalz, editor. risks: semantic network at- Mathematics and applica- tacks. Communications of tions of data/image cod- the Association for Comput- ing, compression, and en- ing Machinery, 43(12):168, cryption III: 2 August 2000, December 2000. CODEN San Diego, USA,volume CACMA2. ISSN 0001-0782 4122 of SPIE proceedings (print), 1557-7317 (elec- series. Society of Photo- tronic). URL http://www. optical Instrumentation En- acm.org/pubs/citations/ gineers (SPIE), Bellingham, journals/cacm/2000-43- WA, USA, 2000. ISBN 0- 12/p168-schneier/.See 8194-3767-0. LCCN TA1637 letters [CZB+01, CTBA+01]. .M378 2000. Earlier con- ferences have title: Math- Schneier:2000:SLD ematics of data/image cod- ing, compression, and en- [Sch00d] Bruce Schneier. Secrets and cryption. Lies: Digital Security in a REFERENCES 608

Networked World.JohnWi- 9743 (print), 1611-3349 ley and Sons, Inc., New (electronic). URL http: York, NY, USA, 2000. ISBN //link.springer-ny.com/ 0-471-25311-1. xv + 412 link/service/series/0558/ pp. LCCN QA76.9.A25 bibs/1965/19650109.htm; S352 2000. US$29.99. http://link.springer- Schneier:2000:SRF ny.com/link/service/series/ 0558/papers/1965/19650109. [Sch00e] Bruce Schneier. Security re- pdf. search and the future. Dr. Dobb’s Journal of Software Schmalz:2001:MDI Tools, 25(12 (supplement)): [Sch01c] Mark S. Schmalz, edi- 33–35, December 2000. CO- tor. Mathematics of data/ DEN DDJOEB. ISSN 1044- image coding, compression, 789X. and encryption IV, with Scharinger:2001:ASK applications: 30–31 July, [Sch01a] Josef Scharinger. Ap- 2001, San Diego, [Cali- plication of signed Kol- fornia] USA, volume 4475 mogorov hashes to pro- of SPIE proceedings series. vide integrity and authen- Society of Photo-optical ticity in Web-based soft- Instrumentation Engineers ware distribution. Lecture (SPIE), Bellingham, WA, Notes in Computer Science, USA, 2001. ISBN 0-8194- 2178:257–??, 2001. CO- 4189-9. LCCN TA1637 DEN LNCSD9. ISSN 0302- .M375 2001. Previous con- 9743 (print), 1611-3349 ference has title: Mathe- (electronic). URL http: matics and applications of //link.springer-ny.com/ data/image coding, com- link/service/series/0558/ pression, and encryption III. bibs/2178/21780257.htm; Schneier:2001:FSE http://link.springer- ny.com/link/service/series/[Sch01d] Bruce Schneier, editor. Fast 0558/papers/2178/21780257. software encryption: 7th In- pdf. ternational Workshop, FSE 2000, New York, NY, USA, Schindler:2001:TAA April 10–12, 2000: Pro- [Sch01b] Werner Schindler. A tim- ceedings, volume 1978 of ing attack against RSA Lecture Notes in Computer with the Chinese Remain- Science. Springer-Verlag, der Theorem. Lecture Berlin, Germany / Heidel- Notes in Computer Science, berg, Germany / London, 1965:109–??, 2001. CO- UK / etc., 2001. CO- DEN LNCSD9. ISSN 0302- DEN LNCSD9. ISBN 3-540- REFERENCES 609

41728-1. ISSN 0302-9743 phy and information se- (print), 1611-3349 (elec- curity. Computers & tronic). LCCN QA267.A1 Security, 21(8):674–676, L43 no. 1978. URL http: November 2002. CODEN //link.springer-ny.com/ CPSEDU. ISSN 0167-4048 link/service/series/0558/ (print), 1872-6208 (elec- tocs/t1978.htm; http: tronic). URL https:// //www.springerlink.com/ www.sciencedirect.com/ openurl.asp?genre=issue& science/article/pii/S0167404802008015. issn=0302-9743&volume= 1978. Schneier:2003:BFT Schnorr:2001:SGH [Sch03] Bruce Schneier. Beyond fear: thinking sensibly about [Sch01e] C. P. Schnorr. Small generic security in an uncertain hardcore subsets for the dis- world. Copernicus (a divi- crete logarithm: Short se- sion of Springer-Verlag New cret DL-keys. Informa- York, Inc.), 175 Fifth Av- tion Processing Letters,79 enue, New York, NY 10010, (2):93–98, June 30, 2001. USA, 2003. ISBN 0-387- CODEN IFPLAT. ISSN 02620-7. 295 pp. LCCN 0020-0190 (print), 1872- HV6432 .S36 2003. 6119 (electronic). URL http://www.elsevier.nl/ Schmalz:2004:MDIa gej-ng/10/23/20/80/31/ [Sch04a] Mark S. Schmalz, editor. 31/abstract.html; http: Mathematics of data/image //www.elsevier.nl/gej- coding, compression, and ng/10/23/20/80/31/31/article. encryption VI, with appli- pdf. cations:5and7August Schnorr:2001:SDE 2003, San Diego, Califor- nia, USA, volume 5208 [Sch01f] Claus Peter Schnorr. Secu- of SPIE proceedings series. rity of DL-encryption and Society of Photo-optical signatures against generic Instrumentation Engineers attacks—a survey. In (SPIE), Bellingham, WA, Public-key cryptography and USA, 2004. ISBN 0-8194- computational number the- 5081-2. ISSN 0277-786X ory (Warsaw, 2000), pages (print), 1996-756X (elec- 257–282. Walter de Gruyter, tronic). LCCN TA1637 New York, NY, USA, 2001. .M375 2005. Schultz:2002:GBC Schmalz:2004:MDIb

[Sch02] E. Eugene Schultz. The [Sch04b] Mark S. Schmalz, edi- gap between cryptogra- tor. Mathematics of data/ REFERENCES 610

image coding, compres- encryption VIII, with appli- sion, and encryption VII, cations: 1–3 August, 2005, with applications: 4–5 Au- San Diego, California, USA, gust, 2004, Denver, Col- volume 5915 of Proceedings orado, USA, volume 5561 of SPIE. Society of Photo- of SPIE proceedings series. optical Instrumentation En- Society of Photo-optical gineers (SPIE), Bellingham, Instrumentation Engineers WA, USA, 2005. ISBN 0- (SPIE), Bellingham, WA, 8194-5920-8. ISSN 0277- USA, 2004. ISBN 0-8194- 786X (print), 1996-756X 5499-0. ISSN 0277-786X (electronic). LCCN TA1637 (print), 1996-756X (elec- .M375 2005; TA1637; Inter- tronic). LCCN TA1637 net. URL http://uclibs. .M375 2004. URL http:/ org/PID/98054. /uclibs.org/PID/57292. Schneier:2005:AE Schneier:2004:SA [Sch05b] B. Schneier. Authentication [Sch04c] Bruce Schneier. Sensi- and expiration. IEEE Secu- ble authentication. ACM rity & Privacy, 3(1):88, Jan- Queue: Tomorrow’s Com- uary/February 2005. CO- puting Today, 1(10):74–78, DEN ???? ISSN 1540- February 2004. CODEN 7993 (print), 1558-4046 AQCUAE. ISSN 1542-7730 (electronic). URL http: (print), 1542-7749 (elec- //ieeexplore.ieee.org/ tronic). iel5/8013/30310/01392710. pdf; http://ieeexplore. Schultz:2004:GBC ieee.org/xpls/abs_all. jsp?isnumber=30310&arnumber= [Sch04d] E. Eugene Schultz. The gap 1392710&count=17&index= between cryptography and 16. information security: has it narrowed? Comput- Schneier:2005:TFA ers & Security, 23(7):531– [Sch05c] Bruce Schneier. Two-factor 532, October 2004. CODEN authentication: too little, CPSEDU. ISSN 0167-4048 too late. Communications (print), 1872-6208 (elec- of the Association for Com- tronic). URL https:// puting Machinery, 48(4): www.sciencedirect.com/ 136, April 2005. CODEN science/article/pii/S0167404804002287. CACMA2. ISSN 0001-0782 Schmalz:2005:MDI (print), 1557-7317 (elec- tronic). [Sch05a] Mark S. Schmalz, editor. Schramm:2006:AMS Mathematics of data/image coding, compression, and [Sch06a] Kai Schramm. Advanced REFERENCES 611

Methods in Side Channel LCCN QA76.9.A25.S35145 Cryptanalysis.Europ¨aischer 2008. Universit¨atsverlag, Bochum, Germany, 2006. ISBN Schmeh:2009:VBF 3-89966-187-7. 170 pp. [Sch09] Klaus Schmeh. Ver- LCCN ???? EUR 22.90. steckte Botschaften: die URL http://verlag.rub. faszinierende Geschichte der de/g9783899661873.html. Steganografie. (German) Schroeder:2006:NTS [Hidden Messages. The Fas- cinating Story of Steganog- [Sch06b] Manfred Robert Schroeder. raphy]. Telepolis. Heise, Number Theory in Science Hannover, Germany, 2009. and Communication: With ISBN 3-936931-54-2 (paper- Applications in Cryptogra- back). xi + 234 pp. LCCN phy, Physics, Digital In- ???? SFR 32.00; EUR formation, Computing, and 18.00. Self-Similarity, volume 7 of Su:2005:IBT Springer Series in Informa- tion Sciences. Springer-Ver- [SCL05] Pin-Chang Su, Henry Ker- lag, Berlin, Germany / Hei- Chang Chang, and Erl-Huei delberg, Germany / Lon- Lu. ID-based threshold don, UK / etc., fourth digital signature schemes edition, 2006. ISBN 3- on the elliptic curve dis- 540-26598-8, 3-540-26596-1. crete logarithm problem. ISSN 0720-678X. xxvi + 367 Applied Mathematics and pp. LCCN QA241. Computation, 164(3):757– Schneier:2007:NCS 772, May 25, 2005. CODEN AMHCBQ. ISSN 0096-3003 [Sch07] Bruce Schneier. Nonsecurity (print), 1873-5649 (elec- considerations in security tronic). decisions. IEEE Security & Privacy, 5(3):88, May/June Scott:2004:CIB 2007. CODEN ???? ISSN 1540-7993 (print), 1558- [Sco04] Michael Scott. Cryptanal- 4046 (electronic). ysis of an ID-based pass- word authentication scheme Schneier:2008:SS using Smart Cards and fin- gerprints. Operating Sys- [Sch08] Bruce Schneier. Schneier tems Review, 38(2):73–75, on Security. John Wiley April 2004. CODEN OS- and Sons, Inc., New York, RED8. ISSN 0163-5980 NY, USA, 2008. ISBN 0- (print), 1943-586X (elec- 470-39535-4. viii + 328 pp. tronic). REFERENCES 612

Screamer:2001:MDR Mathematics and Computa- tion, 167(1):572–575, Au- [Scr01] Beale Screamer. Microsoft’s gust 5, 2005. CODEN digital rights management AMHCBQ. ISSN 0096-3003 scheme — technical details. (print), 1873-5649 (elec- Report, Microsoft Corpora- tronic). tion, Redmond, WA, USA, October 20, 2001. URL Sebe:2001:OIW http://cryptome.org/ms- drm.htm. [SDF01] Francesc Seb´eandJosep Domingo-Ferrer. Oblivi- Shen:2005:NCB ous image watermarking ro- [SCS05a] Victor R. L. Shen, Tzer- bust against scaling and ge- Shyong Chen, and Kai- ometric distortions. Lecture Quan Shai. A novel cryp- Notes in Computer Science, tosystem based on grey sys- 2200:420–??, 2001. CO- tem theory and genetic al- DEN LNCSD9. ISSN 0302- gorithm. Applied Math- 9743 (print), 1611-3349 ematics and Computation, (electronic). URL http: 170(2):1290–1302, Novem- //link.springer-ny.com/ ber 15, 2005. CODEN link/service/series/0558/ AMHCBQ. ISSN 0096-3003 bibs/2200/22000420.htm; (print), 1873-5649 (elec- http://link.springer- tronic). ny.com/link/service/series/ 0558/papers/2200/22000420. Sun:2005:CCL pdf.

[SCS05b] Da-Zhi Sun, Zhen-Fu Cao, Sebe:2000:SDI and Yu Sun. Com- ment: cryptanalysis of Lee– [SDFH00] Francesc Seb´e, Josep Domingo- Hwang–Li’s key authentica- Ferrer, and Jordi Herrera. tion scheme. Applied Math- Spatial-domain image wa- ematics and Computation, termarking robust against 164(3):675–678, May 25, compression, filtering, crop- 2005. CODEN AMHCBQ. ping and scaling. Lec- ISSN 0096-3003 (print), ture Notes in Computer Sci- 1873-5649 (electronic). See ence, 1975:44–??, 2000. CO- [ZK05]. DEN LNCSD9. ISSN 0302- Sun:2005:RNK 9743 (print), 1611-3349 (electronic). URL http: [SCS05c] Da-Zhi Sun, Zhen-Fu Cao, //link.springer-ny.com/ and Yu Sun. Remarks link/service/series/0558/ on a new key authentica- bibs/1975/19750044.htm; tion scheme based on dis- http://link.springer- crete logarithms. Applied ny.com/link/service/series/ REFERENCES 613

0558/papers/1975/19750044. Seacord:2005:SCC pdf. [Sea05] Robert C. Seacord. Se- Smith:2006:CNS cure coding in C and C++. Addison-Wesley, [SDMN06] Adam Smith, Cynthia Reading, MA, USA, 2005. Dwork, Frank McSherry, ISBN 0-321-33572-4 (paper- and Kobbi Nissim. Cal- back). xxiv + 341 pp. ibrating noise to sensitiv- LCCN QA76.9.A25 S368 ity in private data analy- 2005. URL http://www. sis. In Theory of Cryp- cert.org/books/secure- tography Conference (TCC) coding/; http://www. 2006 conference proceedings, loc.gov/catdir/toc/ecip0513/ page ?? ????, ????, 2006. 2005015012.html. Smith:2001:ADB Seacord:2009:CCS

[SE01] Michael Smith and Ralph [Sea09] Robert C. Seacord. The Erskine, editors. Action CERT C secure coding This Day: Bletchley Park standard. Addison-Wesley, from the breaking of the Reading, MA, USA, 2009. Enigma Code to the birth of ISBN 0-321-56321-2 (paper- the modern computer.Ban- back). xxxiii + 682 pp. tam Doubleday Dell Pub- LCCN QA76.73.C15 S4155 lishing Group Inc., 666 Fifth 2008. Avenue, New York, NY 10130, USA, 2001. ISBN Seetharaman:2004:BRB 0-593-04910-1. xv + 543 [See04] Priya Seetharaman. Book pp. LCCN D810.C88 A28 review: Beyond Fear— 2001. UK£25.00. URL Thinking Sensibly About http://frode.home.cern. Security in an Uncertain ch/frode/crypto/ActionContents. World, by Bruce Schneier. html. The Computer Journal,47 Spiekermann:2009:ACR (3):397, May 2004. CO- DEN CMPJA6. ISSN [SE09] Sarah Spiekermann and 0010-4620 (print), 1460- Sergei Evdokimov. Au- 2067 (electronic). URL thentication: Critical RFID http://www3.oup.co.uk/ privacy-enhancing technolo- computer_journal/free_ gies. IEEE Security & Pri- pdf/470397.pdf; http: vacy, 7(2):56–62, March/ //www3.oup.co.uk/computer_ April 2009. CODEN ???? journal/hdb/Volume_47/ ISSN 1540-7993 (print), Issue_03/470397.sgm.abs. 1558-4046 (electronic). html. REFERENCES 614

Smith:2006:SID QA76.9.A25. ACM order number 459050. + [SEF 06] Matthew Smith, Mich- Speed:2001:PIS ael Engel, Thomas Friese, Bernd Freisleben, Gre- [SEK01] Timothy Speed, Juanita El- gory A. Koenig, and Will- lis, and Steffano Korper. iam Yurcik. Security issues The Personal Internet Se- in on-demand grid and clus- curity Guidebook: Keeping ter computing. In Turner Hackers and Crackers out et al. [TLC06], pages 24–?? of Your Home.Academic ISBN 0-7695-2585-7. LCCN Press, New York, NY, USA, QA76.9.C58. IEEE Com- 2001. ISBN 0-12-656561-9. puter Society Order Number xxiv + 202 pp. LCCN ???? P2585. US$44.95. Seifried:2000:C Speed:2002:PIS

[Sei00a] Kurt Seifried. Crypto 101. [SEK02] Timothy Speed, Juanita El- Sys Admin: The Journal lis, and Steffano Korper. for UNIX Systems Admin- The Personal Internet Se- istrators, 9(5):16, 20, 22, curity Guidebook: Keeping 24, 26–27, May 2000. CO- Hackers and Crackers out of DEN SYADE7. ISSN 1061- Your Home. The Korper 2688. URL http://www. and Ellis e-commerce books samag.com/. series. Academic Press, New York, NY, USA, 2002. ISBN Seifried:2000:PPA 0-12-656561-9. xxiv + 202 pp. LCCN TK5105.59 [Sei00b] Kurt Seifried. PAM — Plug- .S6423 2002. US$44.95. gable Authentication Mod- ules. Sys Admin: The Jour- Selcuk:2000:BEL nal for UNIX Systems Ad- [Sel00] Ali Aydın Sel¸cuk. On bias ministrators, 9(9):8, 10, 12, estimation in linear crypt- 14, September 2000. CO- analysis. Lecture Notes in DEN SYADE7. ISSN 1061- Computer Science, 1977:52– 2688. URL http://www. 66, 2000. CODEN LNCSD9. samag.com/. ISSN 0302-9743 (print), Seifert:2005:ACR 1611-3349 (electronic). Semanko:2000:CAA [Sei05] Jean-Pierre Seifert. On au- thenticated computing and [Sem00] Michael Semanko. L- RSA-based authentication. collision attacks against ran- In Meadows and Syver- domized MACs. In Bel- son [MS05b], pages 122–127. lare [Bel00], pages 216–?? ISBN 1-59593-226-7. LCCN ISBN 3-540-67907-3. ISSN REFERENCES 615

0302-9743 (print), 1611- April 2008. CODEN OS- 3349 (electronic). LCCN RED8. ISSN 0163-5980 QA76.9.A25 C79 2000 Bar. (print), 1943-586X (elec- URL http://link.springer- tronic). ny.com/link/service/series/ 0558/bibs/1880/18800216. Shumow:2007:PBD htm; http://link.springer-[SF07] Dan Shumow and Niels Fer- ny.com/link/service/series/ guson. On the possibil- 0558/papers/1880/18800216. ity of a back door in the pdf. NIST SP800-90 Dual EC Sennewald:2003:ESM Prng. Web slide show., Au- gust 21, 2007. URL http: [Sen03] Charles A. Sennewald. //rump2007.cr.yp.to/15- Effective security man- shumow.pdf. agement. Butterworth- Heinemann, Boston, MA, Simka:2006:MTR USA, 2003. ISBN 0-7506- [SFDF06] M. Simka, V. Fischer, 7454-7. xx + 395 pp. M. Drutarovsky, and J. Fay- LCCN HV8290 .S46 2003. olle. Model of a true random US$49.95. number generator aimed at Sergienko:2006:QCC cryptographic application. In ISCAS 2006: 2006 IEEE [Ser06] Alexander V. Sergienko, ed- International Symposium on itor. Quantum communi- Circuits and Systems: Cir- cations and cryptography. cuits and systems: at cross- Taylor and Francis, Boca roads of life and technol- Raton, FL, USA, 2006. ogy: proceedings: May 21– ISBN 0-8493-3684-8. 232 24: Kos International Con- pp. LCCN TK5102.94 .Q36 vention Centre (KICC), Is- 2005. URL http://www. land of Kos, Greece, pages loc.gov/catdir/enhancements/ 5619–5623. IEEE Computer fy0648/2005050636-d.html; Society Press, 1109 Spring http://www.loc.gov/catdir/ Street, Suite 300, Silver toc/fy0713/2005050636. Spring, MD 20910, USA, html. 2006. ISBN 0-7803-9390-2. Sutherland:2008:AVO LCCN ???? URL http: [SETB08] Iain Sutherland, Jon Evans, //www.ieeexplore.ieee. Theodore Tryfonas, and org/xpl/RecentCon.jsp? Andrew Blyth. Acquir- punumber=11145. IEEE cat- ing volatile operating sys- alog number 06CH37717C. tem data tools and tech- Sakr:2007:RCB niques. Operating Sys- tems Review, 42(3):65–73, [SG07] Ziad Sakr and Nicolas D. REFERENCES 616

Georganas. Robust content- 0558/papers/2200/22000280. based MPEG-4 XMT scene pdf. structure authentication Steinwandt:2000:WHS and multimedia content lo- cation. ACM Transactions [SGGB00] Rainer Steinwandt, Markus on Multimedia Computing, Grassl, Willi Geiselmann, Communications, and Ap- and Thomas Beth. Weak- plications, 3(3):18:1–18:??, nesses in the SL2(F2n ) August 2007. CODEN ???? hashing scheme. In Bel- ISSN 1551-6857 (print), lare [Bel00], pages 287–299. 1551-6865 (electronic). ISBN 3-540-67907-3. ISSN 0302-9743 (print), 1611- Sutton:2007:FBF 3349 (electronic). LCCN QA76.9.A25 C79 2000 Bar. [SGA07] Michael Sutton, Adam URL http://link.springer- Greene, and Pedram Amini. ny.com/link/service/series/ Fuzzing: brute force vulner- 0558/bibs/1880/18800287. ability discovery. Addison- htm; http://link.springer- Wesley, Reading, MA, USA, ny.com/link/service/series/ 2007. ISBN 0-321-44611- 0558/papers/1880/18800287. 9 (paperback). xxvii + pdf. 543 pp. LCCN QA76.9.A25 Steinwandt:2008:GEI S89 2007. URL http:// www.loc.gov/catdir/toc/ [SGK08] Rainer Steinwandt, Willi ecip0713/2007011463.html. Geiselmann, and C¸etinKaya Ko¸c. Guest Editors’ in- Steinwandt:2001:TDB troduction to the special section on special-purpose [SGB01] Rainer Steinwandt, Willi hardware for cryptography Geiselmann, and Thomas and cryptanalysis. IEEE Beth. A theoretical DPA- Transactions on Computers, based cryptanalysis of the 57(11):1441–1442, Novem- NESSIE candidates FLASH ber 2008. CODEN ITCOB4. and SFLASH. Lecture ISSN 0018-9340 (print), Notes in Computer Science, 1557-9956 (electronic). URL 2200:280–??, 2001. CO- http://ieeexplore.ieee. DEN LNCSD9. ISSN 0302- org/stamp/stamp.jsp?tp= 9743 (print), 1611-3349 &arnumber=4633726. (electronic). URL http: Sauvage:2009:ERF //link.springer-ny.com/ link/service/series/0558/[SGM09] Laurent Sauvage, Sylvain bibs/2200/22000280.htm; Guilley, and Yves Math- http://link.springer- ieu. Electromagnetic ra- ny.com/link/service/series/ diations of FPGAs: High REFERENCES 617

spatial resolution cartogra- securitybasedonpayment. phy and attack on a cryp- Operating Systems Review, tographic module. ACM 34(4):48–55, October 2000. Transactions on Reconfig- CODEN OSRED8. ISSN urable Technology and Sys- 0163-5980 (print), 1943- tems (TRETS), 2(1):4:1– 586X (electronic). 4:??, March 2009. CO- DEN ???? ISSN 1936-7406 Shirase:2005:AEC (print), 1936-7414 (elec- [SH05] Masaaki Shirase and Ya- tronic). sushi Hibino. An archi- Storer:2009:PSR tecture for elliptic curve cryptography computation. [SGMV09] Mark W. Storer, Kevin M. ACM SIGARCH Computer Greenan, Ethan L. Miller, Architecture News, 33(1): and Kaladhar Voruganti. 124–133, March 2005. CO- POTSHARDS — a se- DEN CANED2. ISSN cure, recoverable, long- 0163-5964 (print), 1943- term archival storage sys- 5851 (electronic). tem. ACM Transactions on Storage, 5(2):5:1–5:??, June Seyedzadeh:2011:IEA 2009. CODEN ???? ISSN [SH11] Seyed Mohammad Seyedzadeh 1553-3077 (print), 1553- and Yasaman Hashemi. 3093 (electronic). Image encryption algo- Stone:1998:PCC rithm based on Choquet Fuzzy Integral with self- [SGPH98] Jonathan Stone, Mich- adaptive pseudo-random ael Greenwald, Craig Par- number generator. In 2011 tridge, and James Hughes. 11th International Confer- Performance of checksums ence on Intelligent Systems and CRC’s over real data. Design and Applications IEEE/ACM Transactions (ISDA), pages 642–647. on Networking, 6(5):529– IEEE Computer Society 543, October 1998. CODEN Press, 1109 Spring Street, IEANEP. ISSN 1063-6692 Suite 300, Silver Spring, MD (print), 1558-2566 (elec- 20910, USA, 2011. URL tronic). URL http://www. http://ieeexplore.ieee. acm.org/pubs/citations/ org/stamp/stamp.jsp?tp= journals/ton/1998-6-5/ &arnumber=6121728. p529-stone/. Shailer:2001:PMT Sonntag:2000:MAS [Sha01a] David M. Shailer. The [SH00] Michael Sonntag and Rudolf project manager’s toolkit: H¨ormanseder. Mobile agent practical checklists for sys- REFERENCES 618

tems development. Butterworth- digital signatures. Com- Heinemann, Boston, MA, puter Networks (Amster- USA, 2001. ISBN 0- dam, Netherlands: 1999), 7506-5035-4. xiii + 244 37(3–4):383–389, November pp. LCCN QA76.9.S88 S53 5, 2001. CODEN ???? ISSN 2001. US$39.95. 1389-1286 (print), 1872- Shamir:2001:NDC 7069 (electronic). URL http://www.elsevier.nl/ [Sha01b] A. Shamir. New directions gej-ng/10/15/22/67/34/ in cryptography. Lecture 35/abstract.html. Notes in Computer Science, 2162:159–??, 2001. CO- Sharp:2001:IKB DEN LNCSD9. ISSN 0302- [Sha01e] Toby Sharp. An implemen- 9743 (print), 1611-3349 tation of key-based digital (electronic). URL http: signal steganography. Lec- //link.springer-ny.com/ ture Notes in Computer Sci- link/service/series/0558/ ence, 2137:13–??, 2001. CO- bibs/2162/21620159.htm; DEN LNCSD9. ISSN 0302- http://link.springer- 9743 (print), 1611-3349 ny.com/link/service/series/ (electronic). URL http: 0558/papers/2162/21620159. //link.springer-ny.com/ pdf. link/service/series/0558/ Shamir:2001:PSC bibs/2137/21370013.htm; http://link.springer- [Sha01c] Adi Shamir. Protecting ny.com/link/service/series/ smart cards from passive 0558/papers/2137/21370013. power analysis with de- pdf. tached power supplies. Lec- ture Notes in Computer Sci- Shapiro:2002:CCM ence, 1965:71–??, 2001. CO- DEN LNCSD9. ISSN 0302- [Sha02] Jonathan S. Shapiro. CPCMS: 9743 (print), 1611-3349 a configuration manage- (electronic). URL http: ment system based on //link.springer-ny.com/ cryptographic names. In link/service/series/0558/ USENIX [USE02c], page ?? bibs/1965/19650071.htm; ISBN 1-880446-01-4. LCCN http://link.springer- QA76.8.U65 P765 2002. ny.com/link/service/series/ URL http://www.usenix. 0558/papers/1965/19650071. org/publications/library/ pdf. proceedings/usenix02/tech/ freenix/shapiro.html. Shao:2001:BVM Shamir:2003:RS [Sha01d] Zuhua Shao. Batch ver- ifying multiple DSA-type [Sha03a] Adi Shamir. RSA short- REFERENCES 619

cuts. In Joye [Joy03b], page (print), 1872-6119 (elec- 327. CODEN LNCSD9. tronic). ISBN 3-540-00847-0. ISSN 0302-9743 (print), 1611- Shaltiel:2004:RDE 3349 (electronic). LCCN QA76.9.A25 C822 2003. [Sha04a] Ronen Shaltiel. Recent de- URL http://link.springer- velopments in extractors. ny.com/link/service/series/ In P˘aun et al. [PRS04], 0558/tocs/t2612.htm; page ?? ISBN 981-238- http://www.springerlink. 783-8 (set), 981-238-966-0 com/openurl.asp?genre= (vol. 1), 981-238-965-2 (vol. issue&issn=0302-9743&volume= 2). LCCN QA76 .C878 2612. 2004. URL http://www. Shamir:2003:TLC cs.haifa.ac.il/~ronen/ online_papers/online_papers. [Sha03b] Adi Shamir. Turing Lec- html; http://www.cs. ture on cryptology: a haifa.ac.il/~ronen/online_ status report. World- papers/survey.ps. Wide Web slide presenta- tion, video, and audio., Shao:2004:IDS 2003. URL http://www. acm.org/turingawardlecture/ [Sha04b] Zuhua Shao. Improve- RSA/. ment of digital signature Shao:2003:CIB with message recovery us- ing self-certified public keys [Sha03c] Zuhua Shao. Cryptanalysis and its variants. Applied of “an identity-based society Mathematics and Compu- oriented signature scheme tation, 159(2):391–399, De- with anonymous signers”. cember 6, 2004. CODEN Information Processing Let- AMHCBQ. ISSN 0096-3003 ters, 86(6):295–298, June (print), 1873-5649 (elec- 30, 2003. CODEN IF- tronic). PLAT. ISSN 0020-0190 (print), 1872-6119 (elec- Shao:2005:CXY tronic).

Shao:2003:PSS [Sha05a] Zuhua Shao. Cryptanalysis of Xia–You group signature [Sha03d] Zuhua Shao. Proxy signa- scheme. The Journal of Sys- ture schemes based on fac- tems and Software, 75(1–2): toring. Information Process- 89–94, February 15, 2005. ing Letters, 85(3):137–143, CODEN JSSODM. ISSN February 14, 2003. CODEN 0164-1212 (print), 1873- IFPLAT. ISSN 0020-0190 1228 (electronic). REFERENCES 620

Shao:2005:IEP &Security, 28(1–2):85–93, February/March 2009. CO- [Sha05b] Zuhua Shao. Improvement DEN CPSEDU. ISSN 0167- of efficient proxy signature 4048 (print), 1872-6208 schemes using self-certified (electronic). URL https:/ public keys. Applied Math- /www.sciencedirect.com/ ematics and Computation, science/article/pii/S0167404808000965. 168(1):222–234, Septem- ber 1, 2005. CODEN Shepherd:2001:CDC AMHCBQ. ISSN 0096-3003 (print), 1873-5649 (elec- [She01] Simon Shepherd. Cryptog- tronic). raphy: diffusing the con- fusion, volume 5 of Com- Shao:2005:NKA munications systems, tech- niques, and applications se- [Sha05c] Zuhua Shao. A new key ries. Research Studies authentication scheme for Press, Philadelphia, PA, cryptosystems based on dis- USA, 2001. ISBN 0-86380- crete logarithms. Applied 270-2. xiv + 152 pp. LCCN Mathematics and Computa- QA268.S44 2001. tion, 167(1):143–152, Au- gust 5, 2005. CODEN Sung:2007:CIB AMHCBQ. ISSN 0096-3003 (print), 1873-5649 (elec- [SHH07] Jaechul Sung, Deukjo Hong, tronic). and Seokhie Hong. Crypt- analysis of an involutional Shao:2005:SMD block cipher using cellular [Sha05d] Zuhua Shao. Security of automata. Information Pro- Meta-He digital signature cessing Letters, 104(5):183– scheme based on factor- 185, November 30, 2007. ing and discrete logarithms. CODEN IFPLAT. ISSN Applied Mathematics and 0020-0190 (print), 1872- Computation, 170(2):976– 6119 (electronic). 984, November 15, 2005. Shim:2005:LPG CODEN AMHCBQ. ISSN 0096-3003 (print), 1873- [Shi05] Kyungah Shim. Off- 5649 (electronic). line password-guessing at- Hwang:2009:KDB tacks on the generalized key agreement and pass- [sHCP09] Seong seob Hwang, Sung- word authentication proto- zoon Cho, and Sunghoon col. Applied Mathematics Park. Keystroke dynamics- and Computation, 169(1): based authentication for 511–515, October 1, 2005. mobile devices. Computers CODEN AMHCBQ. ISSN REFERENCES 621

0096-3003 (print), 1873- (electronic). URL http: 5649 (electronic). //www.research.ibm.com/ journal/rd/515/shimizu. Shih:2008:DWS html. [Shi08] Frank Y. Shih. Digital Wa- Shoup:2000:CTU termarking and Steganog- [Sho00a] Victor Shoup. A com- raphy: Fundamentals and position theorem for uni- Techniques.Taylorand versal one-way hash func- Francis, Boca Raton, FL, tions. Lecture Notes in USA, 2008. ISBN 1- Computer Science, 1807: 4200-4757-4. 180 pp. 445–??, 2000. CODEN LCCN QA76.9.A25 S467 LNCSD9. ISSN 0302- 2008. URL http://www. 9743 (print), 1611-3349 loc.gov/catdir/enhancements/ (electronic). URL http: fy0745/2007034224-d.html; //link.springer-ny.com/ http://www.loc.gov/catdir/ link/service/series/0558/ toc/ecip0725/2007034224. bibs/1807/18070445.htm; . html http://link.springer- Sierra:2004:LCC ny.com/link/service/series/ 0558/papers/1807/18070445. [SHJR04] Jos´e M. Sierra, Julio C. pdf. Hern´andez, Narayana Ja- yaram, and Arturo Rib- Shoup:2000:UHF agorda. Low computational [Sho00b] Victor Shoup. Using cost integrity for block ci- hash functions as a hedge phers. Future Generation against chosen ciphertext Computer Systems, 20(5): attack. Lecture Notes in 857–863, June 15, 2004. Computer Science, 1807: CODEN FGSEVI. ISSN 275–??, 2000. CODEN 0167-739X (print), 1872- LNCSD9. ISSN 0302- 7115 (electronic). 9743 (print), 1611-3349 Shimizu:2007:CBE (electronic). URL http: //link.springer-ny.com/ [SHL07] K. Shimizu, H. P. Hof- link/service/series/0558/ stee, and J. S. Liberty. bibs/1807/18070275.htm; Cell Broadband Engine pro- http://link.springer- cessor vault security ar- ny.com/link/service/series/ chitecture. IBM Jour- 0558/papers/1807/18070275. nal of Research and De- pdf. velopment, 51(5):521–??, Shoup:2001:OR September 2007. CODEN IBMJAE. ISSN 0018- [Sho01] Victor Shoup. OAEP recon- 8646 (print), 2151-8556 sidered. In Kilian [Kil01a], REFERENCES 622

pages 239–259. ISBN 3-540- sity Press, Cambridge, UK, 42456-3 (paperback). LCCN 2005. ISBN 0-521-85154- QA76.9.A25 C79 2001; 8 (hardcover), 0-521-61725- QA267.A1 L43 no.2139. 1 (paperback). xvi + 517 pp. UK£47.00. URL http: LCCN QA241 .V53 2005. //link.springer-ny.com/ Shparlinski:1999:NTM link/service/series/0558/ bibs/2139/21390239.htm; [Shp99] Igor E. Shparlinski. Num- http://link.springer- ber theoretic methods in ny.com/link/service/series/ cryptography: complexity 0558/papers/2139/21390239. lower bounds,volume17 pdf. of Progress in computer science and applied logic. Shoup:2005:ACC Birkh¨auser Verlag, Basel, [Sho05a] Victor Shoup, editor. Ad- Switzerland, 1999. ISBN 3- vances in cryptology: CRYPTO 7643-5888-2 (Basel), 0-8176- 2005: 25th Annual Inter- 5888-2 (Boston). viii + 180 national Cryptology Confer- pp. LCCN QA267.7 .S57 ence, Santa Barbara, Cali- 1999. fornia, USA, August 14–18, Shparlinski:2001:UDR 2005: proceedings,volume 3621 of Lecture Notes in [Shp01] Igor E. Shparlinski. On Computer Science. Spring- the uniformity of distri- er-Verlag, Berlin, Ger- bution of the RSA pairs. many / Heidelberg, Ger- Mathematics of Computa- many / London, UK / tion, 70(234):801–808, April etc., 2005. ISBN 3-540- 2001. CODEN MCM- 28114-2. ISSN 0302-9743 PAF. ISSN 0025-5718 (print), 1611-3349 (elec- (paper), 1088-6842 (elec- tronic). LCCN QA76.9.A25 tronic). URL http: C79 2005; QA76.9 .A25; //www.ams.org/journal- QA76.9 C79 2005; QA76.9 getitem?pii=S0025-5718- C794 2005; QA76.9; In- 00-01274-6; http://www. ternet. URL http:/ ams.org/mcom/2001-70-234/ /www.springerlink.com/ S0025-5718-00-01274-6/ openurl.asp?genre=issue& S0025-5718-00-01274-6. issn=0302-9743&volume= dvi; http://www.ams. 3621. org/mcom/2001-70-234/S0025- Shoup:2005:CIN 5718-00-01274-6/S0025- 5718-00-01274-6.pdf; [Sho05b] Victor Shoup. Acom- http://www.ams.org/mcom/ putational introduction to 2001-70-234/S0025-5718- number theory and alge- 00-01274-6/S0025-5718- bra. Cambridge Univer- 00-01274-6.ps; http:/ REFERENCES 623

/www.ams.org/mcom/2001- 3/S0025-5718-04-01695- 70-234/S0025-5718-00-01274- 3.dvi; http://www.ams. 6/S0025-5718-00-01274- org/mcom/2004-73-247/S0025- 6.tex. 5718-04-01695-3/S0025- Shparlinski:2002:SMS 5718-04-01695-3.pdf; http://www.ams.org/mcom/ [Shp02] Igor E. Shparlinski. Secu- 2004-73-247/S0025-5718- rity of most significant bits 04-01695-3/S0025-5718- 2 of gx . Information Pro- 04-01695-3.ps; http:/ cessing Letters, 83(2):109– /www.ams.org/mcom/2004- 113, July 31, 2002. CODEN 73-247/S0025-5718-04-01695- IFPLAT. ISSN 0020-0190 3/S0025-5718-04-01695- (print), 1872-6119 (elec- 3.tex. tronic). Shparlinski:2004:UDD

Shparlinski:2003:CAA [Shp04b] Igor E. Shparlinski. On the uniformity of distribution [Shp03] Igor E. Shparlinski. Cryp- of the decryption exponent tographic Applications of in fixed encryption expo- Analytic Number Theory: nent RSA. Information Pro- Complexity Lower Bounds cessing Letters, 92(3):143– and Pseudorandomness,vol- 147, November 15, 2004. ume 22 of Progress in com- CODEN IFPLAT. ISSN puter science and applied 0020-0190 (print), 1872- logic. Birkh¨auser Verlag, 6119 (electronic). Basel, Switzerland, 2003. ISBN 3-7643-6654-0 , 0- Shparlinski:2005:PHS 8176-6654-0. viii + 411 pp. LCCN QA267.7 .S55 2003. [Shp05] Igor E. Shparlinski. Playing “hide-and-seek” with num- Shparlinski:2004:BRR bers: the hidden number [Shp04a] Igor Shparlinski. Book re- problem, lattices, and ex- view: RSA and public-key ponential sums. In Garrett cryptography. Mathemat- and Lieman [GL05], pages ics of Computation, 73(247): 153–177. ISBN 0-8218- 1582, July 2004. CODEN 3365-0. LCCN QA76.9.A25 MCMPAF. ISSN 0025- P82 2005. URL http:// 5718 (paper), 1088-6842 www.loc.gov/catdir/toc/ . (electronic). URL http:/ fy0612/2005048178.html /www.ams.org/mcom/2004- Sun:2005:SSP 73-247/S0025-5718-04-01695- 3/home.html; http:// [SHT05] Hung-Min Sun, Bin-Tsan www.ams.org/mcom/2004- Hsieh, and Shin-Mu Tseng. 73-247/S0025-5718-04-01695- On the security of some REFERENCES 624

proxy blind signature schemes. Notes in Computer Science The Journal of Systems and Lecture Notes in Ar- and Software, 74(3):297– tificial Intelligence. Spring- 302, February 1, 2005. CO- er-Verlag, Berlin, Ger- DEN JSSODM. ISSN many / Heidelberg, Ger- 0164-1212 (print), 1873- many / London, UK / etc., 1228 (electronic). 2001. CODEN LNCSD9. ISBN 3-540-42488-1 (pa- Shumba:2006:THL perback). ISSN 0302-9743 [Shu06] Rose Shumba. Teach- (print), 1611-3349 (elec- ing hands-on Linux host tronic). LCCN QA268 computer security. ACM .C35 2001; QA267.A1 L43 Journal on Educational no.2146. URL http:/ Resources in Computing /link.springer-ny.com/ (JERIC), 6(3):5:1–5:??, Septem- link/service/series/0558/ ber 2006. CODEN ???? tocs/t2146.htm; http: ISSN 1531-4278. //www.springerlink.com/ Shyamasundar:2002:ACP openurl.asp?genre=issue& issn=0302-9743&volume= [Shy02] R. K. Shyamasundar. An- 2146. alyzing cryptographic pro- tocols in a reactive frame- Silverman:2005:ECC work. Lecture Notes in Computer Science, 2294: [Sil05] Joseph H. Silverman. El- 46–??, 2002. CODEN liptic curves and cryptog- LNCSD9. ISSN 0302- raphy. In Garrett and 9743 (print), 1611-3349 Lieman [GL05], pages 91– (electronic). URL http: 112. ISBN 0-8218-3365- //link.springer-ny.com/ 0. LCCN QA76.9.A25 link/service/series/0558/ P82 2005. URL http:// bibs/2294/22940046.htm; www.loc.gov/catdir/toc/ http://link.springer- fy0612/2005048178.html. ny.com/link/service/series/ 0558/papers/2294/22940046. Simon:2002:CRE pdf. [Sim02] Denis Simon. Computing Silverman:2001:CLI the rank of elliptic curves [Sil01] Joseph H. Silverman, edi- over number fields. LMS tor. Cryptography and lat- Journal of Computation and tices: International Con- Mathematics, 5:7–17, 2002. ference, CaLC 2001, Prov- CODEN ???? ISSN idenceRI,USA,March 1461-1570. URL http: 29–30, 2001: Revised Pa- //www.lms.ac.uk/jcm/5/ pers, volume 2146 of Lecture lms2000-006/. REFERENCES 625

Singh:1999:CBE Singh:2001:SSS

[Sin99] Simon Singh. The code [Sin01b] Simon Singh. The Science of book: the evolution of se- Secrecy: The Secret History crecy from Mary, Queen of of Codes and Codebreaking. Scots, to quantum cryptog- Fourth Estate, London, UK, raphy. Doubleday, New 2001. ISBN 1-84115-435-0. York, NY, USA, 1999. ISBN xi + 224 pp. LCCN Z103 0-385-49531-5. xiii + 402 .S57 2000. UK£14.99. pp. LCCN Z103 .S56 Singh:2002:CBH 1999. US$24.95. See also [AAG+00]. [Sin02] Simon Singh. The Code Book: How to Make It, Singh:2000:CBE Break It, Hack It, or Crack It. Delacorte Press, New [Sin00] Simon Singh. The code York, NY, USA, 2002. ISBN book: the evolution of se- 0-385-72913-8. 263 (est.) crecy from Ancient Egypt to pp. LCCN TK5102.92 .S56 quantum cryptography.An- 2002. chor Press/Doubleday, Gar- Sinkov:2009:ECM den City, NY, USA, 2000. ISBN 0-385-49532-3. xvii + [Sin09] Abraham Sinkov. Ele- 411 pp. LCCN Z103 .S56 mentary cryptanalysis: a 1999. US$15.00. See also mathematical view,vol- [AAG+00]. ume 22 of Anneli lax new mathematical library. Singh:2001:DPK Mathematical Association of America, Washington, [Sin01a] A. K. Singh. Deploy- DC, USA, second edition, ment of public-key infras- 2009. ISBN 0-88385-647- tructure in wireless data 6. xiv + 212 pp. LCCN networks. Lecture Notes ???? URL http://www. in Computer Science, 2094: loc.gov/catdir/enhancements/ 217–??, 2001. CODEN fy0914/2009927623-d.html; LNCSD9. ISSN 0302- http://www.loc.gov/catdir/ 9743 (print), 1611-3349 enhancements/fy0914/2009927623- (electronic). URL http: t.html. Revised and up- //link.springer-ny.com/ dated by Todd Feil. link/service/series/0558/ Stubblefield:2004:KRA bibs/2094/20940217.htm; http://link.springer- [SIR04] Adam Stubblefield, John ny.com/link/service/series/ Ioannidis, and Aviel D. Ru- 0558/papers/2094/20940217. bin. A key recovery at- pdf. tack on the 802.11b wired REFERENCES 626

equivalent privacy protocol many / Heidelberg, Ger- (WEP). ACM Transac- many / London, UK / tions on Information and etc., 2000. URL http: System Security, 7(2):319– //link.springer-ny.com/ 332, May 2004. CODEN link/service/series/0558/ ATISBQ. ISSN 1094-9224 bibs/1976/19760073.htm; (print), 1557-7406 (elec- http://link.springer- tronic). ny.com/link/service/series/ 0558/papers/1976/19760073. Sivonen:2006:MPF pdf. [Siv06] Timo Sivonen. Measur- Sucurovic:2005:JCX ing performance of FreeBSD disk encryption. ;login: [SJ05] S. Sucurovic and Z. Jo- the USENIX Association vanovic. Java cryptogra- newsletter, 31(5):40–45, Oc- phy & X.509 authentica- tober 2006. CODEN tion. Dr. Dobb’s Journal of LOGNEM. ISSN 1044- Software Tools, 30(2):40–42, 6397. URL https://www. 2005. CODEN DDJOEB. usenix.org/publications/ ISSN 1044-789X. login/october-2006-volume- Schaumont:2009:GEI 31-number-5/measuring- [SJT09] Patrick R. Schaumont, performance-freebsd-disk- Alex K. Jones, and Steve encryption. Trimberger. Guest Editors’ Six:2005:HGS introduction to security in reconfigurable systems de- [Six05] J. M. Six. Hidden gems sign. ACM Transactions [science and technology mu- on Reconfigurable Technol- seums]. IEEE Spectrum, ogy and Systems (TRETS), 42(1):70–71, January 2005. 2(1):1:1–1:??, March 2009. CODEN IEESAM. ISSN CODEN ???? ISSN 0018-9235 (print), 1939- 1936-7406 (print), 1936- 9340 (electronic). 7414 (electronic). Schnorr:2000:SSE Song:2000:TPA [SJ00] Claus Peter Schnorr and [SK00] Boyeon Song and Kwangjo Markus Jakobsson. Secu- Kim. Two-pass authenti- rity of signed ElGamal en- cated key agreement pro- cryption. In Advances in tocol with key confirma- cryptology—ASIACRYPT tion. Lecture Notes in 2000 (Kyoto), volume 1976 Computer Science, 1977: of Lecture Notes in Comput. 237–??, 2000. CODEN Sci., pages 73–89. Spring- LNCSD9. ISSN 0302- er-Verlag, Berlin, Ger- 9743 (print), 1611-3349 REFERENCES 627

(electronic). URL http: CPSEDU. ISSN 0167-4048 //link.springer-ny.com/ (print), 1872-6208 (elec- link/service/series/0558/ tronic). URL https:// bibs/1977/19770237.htm; www.sciencedirect.com/ http://link.springer- science/article/pii/S0167404803007065. ny.com/link/service/series/ 0558/papers/1977/19770237. Sklavos:2005:ISH pdf. [SK05a] N. Sklavos and O. Koufopavlou. Seki:2001:DCR Implementation of the SHA- 2 hash family standard us- [SK01a] Haruki Seki and Toshinobu ing FPGAs. The Journal Kaneko. Differential crypt- of Supercomputing, 31(3): analysis of reduced rounds 227–248, March 2005. CO- of GOST. Lecture Notes DEN JOSUED. ISSN 0920- in Computer Science, 2012: 8542 (print), 1573-0484 315–323, 2001. CODEN (electronic). URL http: LNCSD9. ISSN 0302-9743 //www.springerlink.com/ (print), 1611-3349 (elec- openurl.asp?genre=article& tronic). issn=0920-8542&volume= 31&issue=3&spage=227. Stojanovski:2001:CBRa Stavrou:2005:CAS [SK01b] T. Stojanovski and L. Ko- carev. Chaos-based ran- [SK05b] Angelos Stavrou and Ange- dom number generators- los D. Keromytis. Coun- part I: analysis [cryptogra- tering DoS attacks with phy]. IEEE Transactions stateless multipath overlays. on Circuits and Systems I: In Meadows and Syver- Fundamental Theory and son [MS05b], pages 249–259. Application, 48(3):281–288, ISBN 1-59593-226-7. LCCN March 2001. CODEN IT- QA76.9.A25. ACM order CAEX. ISSN 1057-7122 number 459050. (print), 1558-1268 (elec- tronic). Stabell-Kulo:2006:ESC Sklavos:2003:DDR [SK06] Tage Stabell-Kulø. From the Editor: Security com- [SK03] N. Sklavos and O. Koufopavlou. munity — blurring the line Data dependent rotations, between authentication and a trustworthy approach for identification. IEEE Dis- future encryption systems/ tributed Systems Online,7 ciphers: low cost and high (2):1–5, February 2006. CO- performance. Computers DEN ???? ISSN 1541-4922 &Security, 22(7):585–588, (print), 1558-1683 (elec- October 2003. CODEN tronic). URL http://csdl. REFERENCES 628

computer.org/comp/mags/ http://link.springer- ds/2006/02/o2002.pdf. ny.com/link/service/series/ 0558/papers/2248/22480193. Saldamli:2007:SME pdf. [SK07] Gokay Saldamli and Cetin K. Sano:2000:PEA Koc. Spectral modular ex- ponentiation. In Kornerup [SKKS00] Fumihiko Sano, Masanobu and Muller [KM07], pages Koike, Shinichi Kawamura, 123–132. ISBN 0-7695-2854- and Masue Shiba. Perfor- 6. ISSN 1063-6889. LCCN mance evaluation of AES ???? URL http://www. finalists on the high-end lirmm.fr/arith18/. Smart Card. In NIST Shu:2009:RCA [NIS00], pages 82–93. ISBN ???? LCCN ???? [SKG09] Chang Shu, Soonhak Kwon, URL http://csrc.nist. and K. Gaj. Reconfigurable gov/encryption/aes/round2/ computing approach for conf3/aes3conf.htm; http: Tate pairing cryptosystems //csrc.nist.gov/encryption/ over binary fields. IEEE aes/round2/conf3/papers/ Transactions on Computers, AES3Proceedings-1.pdf; 58(9):1221–1237, September http://csrc.nist.gov/ 2009. CODEN ITCOB4. encryption/aes/round2/ ISSN 0018-9340 (print), conf3/papers/AES3Proceedings- 1557-9956 (electronic). URL 2.pdf; http://csrc.nist. http://ieeexplore.ieee. gov/encryption/aes/round2/ org/stamp/stamp.jsp?tp= conf3/papers/AES3Proceedings- &arnumber=4815221. 3.pdf; http://csrc.nist. Sugita:2001:SRV gov/encryption/aes/round2/ conf3/papers/AES3Proceedings. [SKI01] Makoto Sugita, Kazukuni pdf. Kobara, and Hideki Imai. Security of reduced version Skolnikoff:2003:SS of the block cipher Camellia against truncated and im- [Sko03] Eugene B. Skolnikoff. Secu- possible differential crypt- rity and sanity. IEEE Spec- analysis. Lecture Notes in trum, 40(4):13–14, April Computer Science, 2248: 2003. CODEN IEESAM. 193–??, 2001. CODEN ISSN 0018-9235 (print), LNCSD9. ISSN 0302- 1939-9340 (electronic). 9743 (print), 1611-3349 Schindler:2001:IDC (electronic). URL http: //link.springer-ny.com/ [SKQ01] Werner Schindler, Fran¸cois link/service/series/0558/ Koeune, and Jean-Jacques bibs/2248/22480193.htm; Quisquater. Improving REFERENCES 629

divide and conquer at- ferential, impossible differ- tacks against cryptosys- ential cryptanalyses against tems by better error de- word-oriented block ciphers tection/correction strate- like RIJNDAEL, E2. In gies. Lecture Notes in NIST [NIS00], pages 242– Computer Science, 2260: 256. ISBN ???? LCCN ???? 245–??, 2001. CODEN URL http://csrc.nist. LNCSD9. ISSN 0302- gov/encryption/aes/round2/ 9743 (print), 1611-3349 conf3/aes3conf.htm; http: (electronic). URL http: //csrc.nist.gov/encryption/ //link.springer-ny.com/ aes/round2/conf3/papers/ link/service/series/0558/ AES3Proceedings-1.pdf; bibs/2260/22600245.htm; http://csrc.nist.gov/ http://link.springer- encryption/aes/round2/ ny.com/link/service/series/ conf3/papers/AES3Proceedings- 0558/papers/2260/22600245. 2.pdf; http://csrc.nist. pdf. gov/encryption/aes/round2/ conf3/papers/AES3Proceedings- Srinathan:2002:ASC 3.pdf; http://csrc.nist. gov/encryption/aes/round2/ [SKR02] K. Srinathan, M. V. N. Ash- conf3/papers/AES3Proceedings. win Kumar, and C. Pandu pdf. Rangan. Asynchronous se- cure communication tolerat- Schneier:2000:CTA ing mixed adversaries. Lec- ture Notes in Computer Sci- [SKW+00] Bruce Schneier, John Kelsey, ence, 2501:224–??, 2002. Doug Whiting, David Wag- CODEN LNCSD9. ISSN ner, and Niels Ferguson. 0302-9743 (print), 1611- CommentsonTwofishas 3349 (electronic). URL an AES candidate. In http://link.springer.de/ NIST [NIS00], pages 355– link/service/series/0558/ 356. ISBN ???? LCCN ???? bibs/2501/25010224.htm; URL http://csrc.nist. http://link.springer. gov/encryption/aes/round2/ de/link/service/series/ conf3/aes3conf.htm; http: 0558/papers/2501/25010224. //csrc.nist.gov/encryption/ pdf. aes/round2/conf3/papers/ Sugita:2000:RAD AES3Proceedings-1.pdf; http://csrc.nist.gov/ [SKU+00] Makoto Sugita, Kazukuni encryption/aes/round2/ Kobara, Kazuhiro Uehara, conf3/papers/AES3Proceedings- Shuji Kubota, and Hideki 2.pdf; http://csrc.nist. Imai. Relationships among gov/encryption/aes/round2/ differential, truncated dif- conf3/papers/AES3Proceedings- REFERENCES 630

3.pdf; http://csrc.nist. conf3/papers/AES3Proceedings. gov/encryption/aes/round2/ pdf. conf3/papers/AES3Proceedings. pdf. Shim:2005:SFA

Scharwaechter:2007:AAE [SL05a] Kyungah Shim and Young- Ran Lee. Security flaws [SKW+07] Hanno Scharwaechter, David in authentication and key Kammler, Andreas Wieferink, establishment protocols for Manuel Hohenauer, King- mobile communications. shuk Karuri, Jianjiang Applied Mathematics and Ceng, Rainer Leupers, Gerd Computation, 169(1):62–74, Ascheid, and Heinrich Meyr. October 1, 2005. CODEN ASIP architecture explo- AMHCBQ. ISSN 0096-3003 ration for efficient IPSec (print), 1873-5649 (elec- encryption: a case study. tronic). ACM Transactions on Em- bedded Computing Systems, 6(2):12:1–12:??, May 2007. Srivatsa:2005:SPS CODEN ???? ISSN 1539-9087 (print), 1558- [SL05b] Mudhakar Srivatsa and Ling 3465 (electronic). Liu. Securing publish- subscribe overlay services Sterbenz:2000:PAC with EventGuard. In Mead- ows and Syverson [MS05b], [SL00] Andreas Sterbenz and Pe- pages 289–298. ISBN ter Lipp. Performance of 1-59593-226-7. LCCN the AES candidate algo- QA76.9.A25. ACM order rithms in Java. In NIST number 459050. [NIS00], pages 161–168. ISBN ???? LCCN ???? Skoudis:2006:CHR URL http://csrc.nist. gov/encryption/aes/round2/[SL06] Ed Skoudis and Tom Lis- conf3/aes3conf.htm; http: ton. Counter hack reloaded: //csrc.nist.gov/encryption/ a step-by-step guide to com- aes/round2/conf3/papers/ puter attacks and effec- AES3Proceedings-1.pdf; tive defenses. Prentice- http://csrc.nist.gov/ Hall PTR, Upper Saddle encryption/aes/round2/ River, NJ 07458, USA, sec- conf3/papers/AES3Proceedings- ond edition, 2006. ISBN 2.pdf; http://csrc.nist. 0-13-148104-5 (paperback). gov/encryption/aes/round2/ ???? pp. LCCN TK5105.59 conf3/papers/AES3Proceedings- .S57 2006. URL http:// 3.pdf; http://csrc.nist. www.loc.gov/catdir/toc/ gov/encryption/aes/round2/ ecip0519/2005027164.html. REFERENCES 631

Stamp:2007:ACB SIGARCH Computer Ar- chitecture News, 33(2):14– [SL07] Mark Stamp and Rich- 24, May 2005. CODEN ard M. Low. Applied crypt- CANED2. ISSN 0163-5964 analysis: breaking ciphers in (print), 1943-5851 (elec- the real world. Wiley-In- tronic). terscience, New York, NY, USA, 2007. ISBN 0-470- Shen:2003:SET 11486-X. xix + 401 pp. LCCN QA76.9.A25 S687 [SLH03] Jau-Ji Shen, Chih-Wei Lin, 2007. and Min-Shiang Hwang. Se- curity enhancement for the Sun:2009:CPR timestamp-based password [SL09] Fuyan Sun and Shutang authentication scheme us- Liu. Cryptographic pseudo- ing smart cards. Comput- random sequence from the ers & Security, 22(7):591– spatial chaotic map. Chaos, 595, October 2003. CODEN solitons & fractals, 41(5): CPSEDU. ISSN 0167-4048 2216–2219, ???? 2009. (print), 1872-6208 (elec- CODEN CSFOEH. ISSN tronic). URL https:// 0960-0779 (print), 1873- www.sciencedirect.com/ 2887 (electronic). science/article/pii/S0167404803007090. Su:2005:KPK Sung:2000:PSS [SLC05] Pin-Chang Su, Erl-Huei [SLL+00] Jaechul Sung, Sangjin Lu, and Henry Ker-Chang Lee, Jongin Lim, Seokhie Chang. A knapsack public- Hong, and Sangjoon Park. key cryptosystem based on Provable security for the elliptic curve discrete loga- Skipjack-like structure against rithm. Applied Mathematics differential cryptanalysis and Computation, 168(1): and linear cryptanalysis. 40–46, September 1, 2005. Lecture Notes in Com- CODEN AMHCBQ. ISSN puter Science, 1976:274– 0096-3003 (print), 1873- 288, 2000. CODEN 5649 (electronic). LNCSD9. ISSN 0302-9743 (print), 1611-3349 (elec- Shi:2005:HEC tronic). + [SLG 05] Weidong Shi, Hsien-Hsin S. Salido:2007:EBE Lee, Mrinmoy Ghosh, Chenghuai Lu, and Alexandra Boldyreva. [SLP07] Javier Salido, Loukas La- High efficiency counter zos, and Radha Poovendran. mode security architec- Energy and bandwidth- ture via prediction and efficient key distribution in precomputation. ACM wireless ad hoc networks: a REFERENCES 632

cross-layer approach. IEEE/ tion of nonlinear Boolean ACM Transactions on Net- functions with important working, 15(6):1527–1540, cryptographic properties. December 2007. CODEN Lecture Notes in Computer IEANEP. ISSN 1063-6692 Science, 1807:485–??, 2000. (print), 1558-2566 (elec- CODEN LNCSD9. ISSN tronic). 0302-9743 (print), 1611- 3349 (electronic). URL Song:2001:DWF http://link.springer-ny. [SLT01] Y. J. Song, R. Z. Liu, com/link/service/series/ and T. N. Tan. Digi- 0558/bibs/1807/18070485. tal watermarking for for- htm; http://link.springer- gery detection in printed ny.com/link/service/series/ materials. Lecture Notes 0558/papers/1807/18070485. in Computer Science, 2195: pdf. 403–??, 2001. CODEN Sarkar:2000:NBC LNCSD9. ISSN 0302- 9743 (print), 1611-3349 [SM00b] Palash Sarkar and Sub- (electronic). URL http: hamoy Maitra. Nonlinearity //link.springer-ny.com/ bounds and constructions link/service/series/0558/ of resilient Boolean func- bibs/2195/21950403.htm; tions. In Bellare [Bel00], http://link.springer- pages 515–?? ISBN 3-540- ny.com/link/service/series/ 67907-3. ISSN 0302-9743 0558/papers/2195/21950403. (print), 1611-3349 (elec- pdf. tronic). LCCN QA76.9.A25 C79 2000 Bar. URL http: Solar-Lezama:2006:CSF //link.springer-ny.com/ [SLTB+06] Armando Solar-Lezama, link/service/series/0558/ Liviu Tancau, Rastislav bibs/1880/18800515.htm; Bodik, Sanjit Seshia, and http://link.springer- Vijay Saraswat. Combinato- ny.com/link/service/series/ rial sketching for finite pro- 0558/papers/1880/18800515. grams. ACM SIGPLAN pdf. Notices, 41(11):404–415, Sebag-Montefiore:2000:EBC November 2006. CODEN SINODQ. ISSN 0362-1340 [SM00c] Hugh Sebag-Montefiore. (print), 1523-2867 (print), Enigma: the battle for the 1558-1160 (electronic). code. John Wiley and Sarkar:2000:CNB Sons, Inc., New York, NY, USA, 2000. ISBN 0-471- [SM00a] Palash Sarkar and Sub- 40738-0 (cloth). x + 422 hamoy Maitra. Construc- pp. LCCN D810.C88 S43 REFERENCES 633

2000. URL http://www. Sarkar:2003:EIC loc.gov/catdir/bios/wiley043/ 00043920.html; http:/ [SM03a] P. Sarkar and S. Maitra. /www.loc.gov/catdir/description/ Efficient implementation wiley035/00043920.html; of cryptographically use- http://www.loc.gov/catdir/ ful “large” Boolean func- toc/onix06/00043920.html. tions. IEEE Transactions on Computers, 52(4):410– Sarkar:2001:EIL 417, April 2003. CO- [SM01] P. Sarkar and S. Maitra. DEN ITCOB4. ISSN Efficient implementation of 0018-9340 (print), 1557- “large” stream cipher sys- 9956 (electronic). URL tems. Lecture Notes in http://ieeexplore.ieee. Computer Science, 2162: org/stamp/stamp.jsp?tp= 319–??, 2001. CODEN &arnumber=1190582. LNCSD9. ISSN 0302- Satoh:2003:UHA 9743 (print), 1611-3349 (electronic). URL http: [SM03b] Akashi Satoh and Sumio //link.springer-ny.com/ Morioka. Unified hard- link/service/series/0558/ ware architecture for 128- bibs/2162/21620319.htm; bit block ciphers AES http://link.springer- and Camellia. In Walter ny.com/link/service/series/ et al. [WKP03], pages 304– 0558/papers/2162/21620319. 318. CODEN LNCSD9. pdf. ISBN 3-540-40833-9. ISSN 0302-9743 (print), 1611- Satoh:2002:SHS 3349 (electronic). LCCN [SM02] Akashi Satoh and Sumio TK7895.E42. URL http: Morioka. Small and high- //link.springer-ny.com/ speed hardware architec- link/service/series/0558/ tures for the 3GPP stan- tocs/t2779.htm; http: dard cipher KASUMI. Lec- //www.springerlink.com/ ture Notes in Computer Sci- openurl.asp?genre=issue& ence, 2433:48–??, 2002. CO- issn=0302-9743&volume= DEN LNCSD9. ISSN 0302- 2779; http://www.springerlink. 9743 (print), 1611-3349 com/openurl.asp?genre= (electronic). URL http: volume&id=doi:10.1007/ //link.springer-ny.com/ b13240. link/service/series/0558/ Sebag-Montefiore:2005:EBC bibs/2433/24330048.htm; http://link.springer- [SM05] Hugh Sebag-Montefiore. ny.com/link/service/series/ Enigma: the battle for the 0558/papers/2433/24330048. code. John Wiley and Sons, pdf. Inc., New York, NY, USA, REFERENCES 634

2005. ISBN 0-471-49035-0. December 2008. CODEN 352 + 16 pp. LCCN ???? CMSVAN. ISSN 0360-0300 (print), 1557-7341 (elec- Sebag-Montefiore:2007:EBC tronic). [SM07a] Hugh Sebag-Montefiore. Seyedzadeh:2011:IES Enigma: the battle for the code. Barnes and Noble, [SM11] S. M. Seyedzadeh and New York, NY, USA, 2007. S. Mirzakuchaki. Image ISBN 0-7607-9118-X. x encryption scheme based + 422 + 16 pp. LCCN on Choquet fuzzy inte- D810.C88 S43 2007. gral with pseudo-random Simos:2007:CMS keystream generator. In 2011 International Sympo- [SM07b] Theodore E. Simos and sium on Artificial Intelli- George Maroulis, editors. gence and Signal Process- ComputationinModern ing (AISP), pages 101–106. Science and Engineering: IEEE Computer Society Proceedings of the [Fifth] Press, 1109 Spring Street, International Conference Suite 300, Silver Spring, MD on Computational Meth- 20910, USA, 2011. URL ods in Science and En- http://ieeexplore.ieee. gineering 2007 (ICCMSE org/stamp/stamp.jsp?tp= 2007), Corfu, Greece, 25– &arnumber=5960982. 30 September 2007,volume Smart:2001:CDF 2A, 2B of AIP Conference Proceedings (#963).Amer- [Sma01] N. P. Smart. A comparison ican Institute of Physics, of different finite fields for el- Woodbury, NY, USA, 2007. liptic curve cryptosystems. ISBN 0-7354-0476-3 (set), Computers and Mathemat- 0-7354-0477-1 (vol. 1), 0- ics with Applications, 42(1- 7354-0478-X (vol. 2). ISSN 2):91–100, 2001. CODEN 0094-243X (print), 1551- CMAPDK. ISSN 0898-1221 7616 (electronic), 1935- (print), 1873-7668 (elec- 0465. LCCN Q183.9 .I524 tronic). 2007. URL http://www. Smart:2003:ACU springer.com/physics/atoms/ book/978-0-7354-0478-6. [Sma03a] Nigel P. Smart. Ac- Smith-Miles:2008:CDP cess control using pairing based cryptography. In [SM08] Kate A. Smith-Miles. Cross- Joye [Joy03b], pages 111– disciplinary perspectives on 121. CODEN LNCSD9. meta-learning for algorithm ISBN 3-540-00847-0. ISSN selection. ACM Comput- 0302-9743 (print), 1611- ing Surveys, 41(1):6:1–6:25, 3349 (electronic). LCCN REFERENCES 635

QA76.9.A25 C822 2003. 0302-9743 (print), 1611- URL http://link.springer- 3349 (electronic). LCCN ny.com/link/service/series/ ???? URL http:/ 0558/tocs/t2612.htm; /www.springerlink.com/ http://www.springerlink. openurl.asp?genre=issue& com/openurl.asp?genre= issn=0302-9743&volume= issue&issn=0302-9743&volume= 3796. 2612. Small:2006:USR Smart:2003:AGR [Sma06] Mike Small. Unify and [Sma03b] Nigel P. Smart. An analy- simplify: re-thinking iden- sis of Goubin’s refined power tity management. Net- analysis attack. In Wal- work Security, 2006(7):11– ter et al. [WKP03], pages 14, July 2006. CODEN 281–290. CODEN LNCSD9. NTSCF5. ISSN 1353-4858 ISBN 3-540-40833-9. ISSN (print), 1872-9371 (elec- 0302-9743 (print), 1611- tronic). URL http:// 3349 (electronic). LCCN www.sciencedirect.com/ TK7895.E42. URL http: science/article/pii/S1353485806704111. //link.springer-ny.com/ link/service/series/0558/ Smith:2000:ABS tocs/t2779.htm; http: [Smi00] Tim Smith. Authentication //www.springerlink.com/ by biometric smart card. openurl.asp?genre=issue& Network Security, 2000(6): issn=0302-9743&volume= 5, June 1, 2000. CODEN 2779; http://www.springerlink. NTSCF5. ISSN 1353-4858 com/openurl.asp?genre= (print), 1872-9371 (elec- volume&id=doi:10.1007/ tronic). URL http:// b13240. www.sciencedirect.com/ Smart:2005:CCI science/article/pii/S1353485800060116. [Sma05] Nigel P. Smart, editor. Smith:2001:IK Cryptography and Coding: 10th IMA international [Smi01a] David Smith. Implement- Conference, Cirencester, ing Kerberos. Sys Ad- UK, December 19–21, 2005. min: The Journal for UNIX Proceedings, volume 3796 Systems Administrators,10 of Lecture Notes in Com- (12):28, 30, 32, 34–38, De- puter Science. Springer-Ver- cember 2001. CODEN lag, Berlin, Germany / Hei- SYADE7. ISSN 1061-2688. delberg, Germany / Lon- Smith:2001:ECB don, UK / etc., 2005. CO- DEN LNCSD9. ISBN 3-540- [Smi01b] Michael Smith. The Em- 30276-X (softcover). ISSN peror’s Codes: Bletchley REFERENCES 636

Park and the breaking of Smith:2008:CFI Japan’s secret ciphers.Ban- tam Doubleday Dell Pub- [Smi08] Don Smith. The chal- lishing Group Inc., 666 Fifth lenge of federated iden- Avenue, New York, NY tity management. Net- 10130, USA, 2001. ISBN work Security, 2008(4):7– 0-553-81320-X (paperback). 9, April 2008. CODEN 410 + 14 pp. LCCN ???? NTSCF5. ISSN 1353-4858 UK£7.99. (print), 1872-9371 (elec- Smith:2001:APP tronic). URL http:// www.sciencedirect.com/ [Smi01c] Richard E. Smith. Authen- science/article/pii/S1353485808700515. tication: From Passwords to Public Keys. Addison- Smolin:2004:EDE Wesley, Reading, MA, USA, [Smo04] J. A. Smolin. The early 2001. ISBN 0-201-61599-1. days of experimental quan- 549 pp. LCCN QA76.9.A25 tum cryptography. IBM S65 2002. US$44.99. Journal of Research and Smith:2002:OAP Development, 48(1):47–??, ???? 2004. CODEN IB- [Smi02] Sean W. Smith. Out- MJAE. ISSN 0018-8646 bound authentication for (print), 2151-8556 (elec- programmable secure co- tronic). URL processors. Lecture Notes http:/ in Computer Science, 2502: /www.research.ibm.com/ 72–??, 2002. CODEN journal/rd/481/smolin. . LNCSD9. ISSN 0302-9743 pdf (print), 1611-3349 (elec- Seamons:2009:IPS tronic). URL http:// link.springer.de/link/ [SMP+09] Kent Seamons, Neal McBur- service/series/0558/bibs/ nett, Tim Polk, et al., edi- 2502/25020072.htm; http: tors. IDtrust2009: proceed- //link.springer.de/link/ ings of the 8th Symposium service/series/0558/papers/ on Identity and Trust on 2502/25020072.pdf. the Internet: April 14–16, 2009, Gaitherburg, Mary- Smith:2003:FTT land, USA. ACM Press, [Smi03] B. Smith. Fort TV [TV show New York, NY 10036, USA, e-mail transmission preven- 2009. ISBN 1-60558-474- tion]. IEEE Spectrum,40 6. LCCN QA76.9.A25 (5):30–32, May 2003. CO- S954 2009. URL http:// DEN IEESAM. ISSN 0018- portal.acm.org/toc.cfm? 9235 (print), 1939-9340 id=1527017&coll=portal& (electronic). dl=ACM. REFERENCES 637

Satoh:2001:CRH September 2007. CODEN CSSEEI. ISSN 0267-6192. [SMTM01] Akashi Satoh, Sumio Morioka, Sakai:2000:NDS Kohji Takano, and Seiji Munetoh. A compact Ri- [SNI00] Hideaki Sakai, Noriko Naka- jndael hardware architec- mura, and Yoshihide Igarashi. ture with S-box optimiza- A new definition of se- tion. Lecture Notes in mantic security for public- Computer Science, 2248: key encryption schemes. 239–??, 2001. CODEN S¯urikaisekikenky¯usho K¯oky¯uroku, LNCSD9. ISSN 0302- 1148:112–117, 2000. Theo- 9743 (print), 1611-3349 retical foundations of com- (electronic). URL http: puter science: toward a //link.springer-ny.com/ paradigm for computing in link/service/series/0558/ the 21st century (Japanese) bibs/2248/22480239.htm; (Kyoto, 2000). http://link.springer- Srinathan:2004:OPS ny.com/link/service/series/ 0558/papers/2248/22480239.[SNR04] K. Srinathan, Arvind Narayanan, pdf. and C. Pandu Rangan. Optimal perfectly secure Strembeck:2004:IAE message transmission. In [SN04] Mark Strembeck and Gustaf Franklin [Fra04], pages 545– Neumann. An integrated ?? CODEN LNCSD9. approach to engineer and ISBN 3-540-22668-0. ISSN enforce context constraints 0302-9743 (print), 1611- in RBAC environments. 3349 (electronic). LCCN ACM Transactions on In- 10.1007/b99099. URL formation and System Secu- http://www.springerlink. rity, 7(3):392–427, August com/openurl.asp?genre= 2004. CODEN ATISBQ. issue&issn=0302-9743&volume= ISSN 1094-9224 (print), 3152; http://www.springerlink. 1557-7406 (electronic). com/openurl.asp?genre= volume&id=doi:10.1007/ Schlager:2007:EAA b99099. Safavi-Naini:2000:STT [SN07] Christian Schl¨ager and Tho- mas Nowey. On the effects [SNW00] Reihaneh Safavi-Naini and of authentication and au- Yejing Wang. Sequential thorisation infrastructures traitor tracing. In Bel- on e-commerce activities. lare [Bel00], pages 316–?? International Journal of ISBN 3-540-67907-3. ISSN Computer Systems Science 0302-9743 (print), 1611- and Engineering, 22(5):??, 3349 (electronic). LCCN REFERENCES 638

QA76.9.A25 C79 2000 Bar. 0558/papers/2247/22470127. URL http://link.springer- pdf. ny.com/link/service/series/ 0558/bibs/1880/18800316. Sanchez:2001:RNM htm; http://link.springer-[SOHS01] David S´anchez, Agust´ın Or- ny.com/link/service/series/ fila, Julio C´esar Hern´andez, 0558/papers/1880/18800316. and Jos´eMar´ıa Sierra. Ro- pdf. bust new method in fre- quency domain watermark- Safavi-Naini:2001:BAG ing. Lecture Notes in Computer Science, 2200: [SNW01] Rei Safavi-Naini and Huax- 166–??, 2001. CODEN iong Wang. Broadcast LNCSD9. ISSN 0302- authentication for group 9743 (print), 1611-3349 communication. Theoreti- (electronic). URL http: cal Computer Science, 269 //link.springer-ny.com/ (1–2):1–21, October 28, link/service/series/0558/ 2001. CODEN TC- bibs/2200/22000166.htm; SCDI. ISSN 0304-3975 http://link.springer- (print), 1879-2294 (elec- ny.com/link/service/series/ tronic). URL http: 0558/papers/2200/22000166. //www.elsevier.nl/gej- pdf. ng/10/41/16/219/27/27/ abstract.html; http: Slind:2007:PPS //www.elsevier.nl/gej- ng/10/41/16/219/27/27/ [SOIG07] Konrad Slind, Scott Owens, article.pdf. Juliano Iyoda, and Mike Gordon. Proof produc- Safavi-Naini:2001:LAC ing synthesis of arithmetic and cryptographic hard- [SNWX01] R. Safavi-Naini, H. Wang, ware. Formal Aspects of and C. Xing. Linear au- Computing, 19(3):343–362, thentication codes: Bounds August 2007. CODEN and constructions. Lecture FACME5. ISSN 0934-5043 Notes in Computer Science, (print), 1433-299X (elec- 2247:127–??, 2001. CO- tronic). URL http://link. DEN LNCSD9. ISSN 0302- springer.com/article/10. 9743 (print), 1611-3349 1007/s00165-007-0028-5. (electronic). URL http: Song:2000:ISC //link.springer-ny.com/ link/service/series/0558/[Son00] JooSeok Song, editor. In- bibs/2247/22470127.htm; formation security and cryp- http://link.springer- tology — ICISC’99: sec- ny.com/link/service/series/ ond international confer- REFERENCES 639

ence, Seoul, Korea, De- aes/round2/conf3/papers/ cember 9–10, 1999: pro- AES3Proceedings-1.pdf; ceedings, volume 1787 of http://csrc.nist.gov/ Lecture Notes in Computer encryption/aes/round2/ Science. Springer-Verlag, conf3/papers/AES3Proceedings- Berlin, Germany / Hei- 2.pdf; http://csrc.nist. delberg, Germany / Lon- gov/encryption/aes/round2/ don, UK / etc., 2000. conf3/papers/AES3Proceedings- ISBN 3-540-67380-6 (soft- 3.pdf; http://csrc.nist. cover). ISSN 0302-9743 gov/encryption/aes/round2/ (print), 1611-3349 (elec- conf3/papers/AES3Proceedings. tronic). LCCN QA267.A1 pdf. L43 no.1787. Smith:1979:UFM Shigetomi:2002:ALS [SOOI02] Rie Shigetomi, Akira Ot- [SP79] Donald R. Smith and suka, Takahide Ogawa, and James T. Palmer. Univer- Hideki Imai. An anonymous sal fixed messages and the loan system based on group Rivest–Shamir–Adleman cryp- signature scheme. Lecture tosystem. Mathematika,26 Notes in Computer Science, (1):44–52, 1979. CODEN 2433:244–??, 2002. CO- MTKAAB. ISSN 0025-5793. DEN LNCSD9. ISSN 0302- Shelfer:2002:SCE 9743 (print), 1611-3349 (electronic). URL http: [SP02] Katherine M. Shelfer and //link.springer-ny.com/ J. Drew Procaccino. Smart link/service/series/0558/ card evolution. Commu- bibs/2433/24330244.htm; nications of the Associa- http://link.springer- tion for Computing Machin- ny.com/link/service/series/ ery, 45(7):83–88, July 2002. 0558/papers/2433/24330244. CODEN CACMA2. ISSN pdf. 0001-0782 (print), 1557- Satoh:2000:HSM 7317 (electronic).

[SOTD00] Akashi Satoh, Nobuyuki Sumii:2003:LRE Ooba, Kohji Takano, and Edward D’Avignon. High- [SP03] Eijiro Sumii and Ben- speed MARS hardware. In jamin C. Pierce. Logical re- NIST [NIS00], pages 305– lations for encryption. Jour- 316. ISBN ???? LCCN ???? nal of Computer Security, URL http://csrc.nist. 11(4):521–554, ???? 2003. gov/encryption/aes/round2/ CODEN JCSIET. ISSN conf3/aes3conf.htm; http: 0926-227X (print), 1875- //csrc.nist.gov/encryption/ 8924 (electronic). REFERENCES 640

Solachidis:2004:WPL Standaert:2006:SSE

[SP04] Vassilios Solachidis and [SPGQ06] Fran¸cois-Xavier Standaert, Ioannis Pitas. Watermark- Gilles Piret, Neil Ger- ing polygonal lines using shenfeld, and Jean-Jacques Fourier descriptors. IEEE Quisquater. SEA: A scal- Computer Graphics and able encryption algorithm Applications, 24(3):44–51, for small embedded appli- May/June 2004. CODEN cations. Lecture Notes in ICGADZ. ISSN 0272-1716 Computer Science, 3928: (print), 1558-1756 (elec- 222–236, 2006. CO- tronic). URL http://csdl. DEN LNCSD9. ISBN 3- computer.org/comp/mags/ 540-33311-8 (print), 3-540- cg/2004/03/g3044abs.htm; 33312-6 (e-book). ISSN http://csdl.computer. 0302-9743 (print), 1611- org/dl/mags/cg/2004/03/ 3349 (electronic). URL g3044.htm; http://csdl. http://link.springer.com/ computer.org/dl/mags/cg/ chapter/10.1007/11733447_ 2004/03/g3044.pdf. 16.

Schielzeth:2005:RQN Singaravelu:2006:RTC

[SP05] Daniel Schielzeth and Mich- [SPHH06] Lenin Singaravelu, Calton ael E. Pohst. On real Pu, Hermann H¨artig, and quadratic number fields Christian Helmuth. Re- suitable for cryptography. ducing TCB complexity for Experimental Mathematics, security-sensitive applica- 14(2):189–197, ???? 2005. tions: three case stud- CODEN ???? ISSN 1058- ies. Operating Systems Re- 6458 (print), 1944-950X view, 40(4):161–174, Octo- (electronic). URL http:// ber 2006. CODEN OS- projecteuclid.org/euclid. RED8. ISSN 0163-5980 em/1128100131. (print), 1943-586X (elec- tronic). Shahruz:2002:DNC Sun:2008:BWN [SPG02] S. M. Shahruz, A. K. Pradeep, and R. Guru- [SPK08] Shusen Sun, Zhigeng Pan, moorthy. Design of a and Tae-Wan Kim. Blind novel cryptosystem based on watermarking of non-uniform chaotic oscillators and feed- B-spline surfaces. Interna- back inversion. Journal of tional Journal of Image and Sound and Vibration, 250 Graphics (IJIG), 8(3):439– (4):762–771, 2002. CODEN 454, July 2008. CODEN JSVIAG. ISSN 0022-460X. ???? ISSN 0219-4678. REFERENCES 641

Stern:2002:FAP (electronic). URL http: //link.springer-ny.com/ [SPMLS02] Jacques Stern, David Pointcheval, link/service/series/0558/ John Malone-Lee, and bibs/2229/22290155.htm; Nigel P. Smart. Flaws in http://link.springer- applying proof methodolo- ny.com/link/service/series/ gies to signature schemes. 0558/papers/2229/22290155. In Yung [Yun02a], pages pdf. 93–110. CODEN LNCSD9. ISBN 3-540-44050-X (pa- Shin:2000:ANT perback). ISSN 0302-9743 [SR00] Sang Uk Shin and Kyung Hyune (print), 1611-3349 (elec- Rhee. All-or-nothing trans- tronic). LCCN QA76.9.A25 form and remotely keyed C79 2002. URL http:/ encryption protocols. In /link.springer.de/link/ Public key cryptography service/series/0558/bibs/ (Melbourne, 2000),volume 2442/24420093.htm; http: 1751 of Lecture Notes in //link.springer.de/link/ Comput. Sci., pages 178– service/series/0558/papers/ 195. Springer-Verlag, Berlin, 2442/24420093.pdf. Germany / Heidelberg, Ger- many / London, UK / etc., Springer:2003:BRB 2000. [Spr03] William M. Springer II. Sanchez-Reillo:2001:IBA Book review: Cryptogra- [SR01] Raul Sanchez-Reillo. In- phy: Theory and Prac- cluding biometric authen- tice, second edition by Dou- tication in a smart card glas R. Stinson. CRC Press. operating system. Lecture ACM SIGACT News,34 Notes in Computer Science, (4):22–25, December 2003. 2091:342–??, 2001. CO- CODEN SIGNDM. ISSN DEN LNCSD9. ISSN 0302- 0163-5700 (print), 1943- 9743 (print), 1611-3349 5827 (electronic). See [Sti95, (electronic). URL http: Sti02, Sti06c]. //link.springer-ny.com/ Song:2001:ANL link/service/series/0558/ bibs/2091/20910342.htm; [SQ01] Zhimin Song and Sihan http://link.springer- Qing. Applying NCP logic ny.com/link/service/series/ to the analysis of SSL 0558/papers/2091/20910342. 3.0. Lecture Notes in pdf. Computer Science, 2229: StDenis:2006:BMI 155–??, 2001. CODEN LNCSD9. ISSN 0302- [SR06] Tom St Denis and Greg 9743 (print), 1611-3349 Rose. BigNum Math: Imple- REFERENCES 642

menting Cryptographic Mul- design tradeoffs. In Wal- tiple Precision Arithmetic. ter et al. [WKP03], pages Syngress Publishing, Inc., 334–350. CODEN LNCSD9. Rockland, MA, USA, 2006. ISBN 3-540-40833-9. ISSN ISBN 1-59749-112-8. xviii 0302-9743 (print), 1611- + 296 pp. LCCN QA402.5 3349 (electronic). LCCN .S73 2006. US$49.95. URL TK7895.E42. URL http: http://www.oreilly.com/ //link.springer-ny.com/ catalog/1597491128/index. link/service/series/0558/ html. tocs/t2779.htm; http: Stipcevic:2007:QRN //www.springerlink.com/ openurl.asp?genre=issue& [SR07] M. Stip¸cevi´c and B. Medved issn=0302-9743&volume= Rogina. Quantum random 2779; http://www.springerlink. number generator. Review com/openurl.asp?genre= of Scientific Instruments,78 volume&id=doi:10.1007/ (045104):9, 2007. CODEN b13240. RSINAK. ISSN 1089-7623, Sarkar:2001:PAE 0034-6748. URL http:/ /qrbg.irb.hr/0609043v2. [SS01a] P. Sarkar and P. J. Schel- pdf. arXiv:quant-ph/0609043v2. lenberg. A parallel algo- rithm for extending crypto- Samarati:2001:AMP graphic hash functions. Lec- ture Notes in Computer Sci- [SRJ01] Pierangela Samarati, Mich- ence, 2247:40–??, 2001. CO- ael K. Reiter, and Sushil DEN LNCSD9. ISSN 0302- Jajodia. An authoriza- 9743 (print), 1611-3349 tion model for a public (electronic). URL http: key management service. //link.springer-ny.com/ ACM Transactions on In- link/service/series/0558/ formation and System Secu- bibs/2247/22470040.htm; rity, 4(4):453–482, Novem- http://link.springer- ber 2001. CODEN ATISBQ. ny.com/link/service/series/ ISSN 1094-9224 (print), 0558/papers/2247/22470040. 1557-7406 (electronic). pdf. Standaert:2003:EIR Stubblebine:2001:AAF [SRQL03] Fran¸cois-Xavier Standaert, [SS01b] Stuart G. Stubblebine and Gael Rouvroy, Jean-Jacques Paul F. Syverson. Au- Quisquater, and Jean-Didier thentic attributes with fine- Legat. Efficient implemen- grained anonymity protec- tation of Rijndael encryp- tion. Lecture Notes in tion in reconfigurable hard- Computer Science, 1962: ware: Improvements and 276–??, 2001. CODEN REFERENCES 643

LNCSD9. ISSN 0302- (3):411–433, July 2009. CO- 9743 (print), 1611-3349 DEN ???? ISSN 0219-4678. (electronic). URL http: Shi:2008:UAU //link.springer-ny.com/ link/service/series/0558/[SSM+08] Minghui Shi, Xuemin (Sher- bibs/1962/19620276.htm; man) Shen, Jon W. Mark, http://link.springer- Dongmei Zhao, and Yixin ny.com/link/service/series/ Jiang. User authentica- 0558/papers/1962/19620276. tion and undeniable billing pdf. support for agent-based roaming service in WLAN/ Seznec:2003:HUL cellular integrated mobile networks. Computer Net- [SS03] Andr´e Seznec and Nico- works (Amsterdam, Nether- las Sendrier. HAVEGE: a lands: 1999), 52(9):1693– user-level software heuris- 1702, June 26, 2008. CO- tic for generating empiri- DEN ???? ISSN 1389-1286 cally strong random num- (print), 1872-7069 (elec- bers. ACM Transactions tronic). on Modeling and Computer Simulation, 13(4):334–346, Susilo:2000:NEF October 2003. CODEN [SSNGS00] Willy Susilo, Rei Safavi- ATMCEZ. ISSN 1049-3301 Naini, Marc Gysin, and (print), 1558-1195 (elec- Jennifer Seberry. A new tronic). and efficient fail-stop sig- nature scheme. The Com- Swiderski:2004:TM puter Journal, 43(5):430– 437, ???? 2000. CO- [SS04] Frank Swiderski and Win- dow Snyder. Threat model- DEN CMPJA6. ISSN 0010-4620 (print), 1460- ing. Microsoft Press, Red- 2067 (electronic). URL mond, WA, USA, 2004. ISBN 0-7356-1991-3 (paper- http://www3.oup.co.uk/ back). xv + 259 pp. LCCN computer_journal/hdb/Volume_ QA76.9.A25 S934 2004. 43/Issue_05/430430.sgm. abs.html; http://www3. Seddik:2009:IWB oup.co.uk/computer_journal/ hdb/Volume_43/Issue_05/ [SSFC09] Hassen Seddik, Mounir pdf/430430.pdf. Sayadi, Farhat Fnaiech, and Scambray:2006:HEW Mohamed Cheriet. Image watermarking based on the [SSS06] Joel Scambray, Mike Shema, Hessenberg transform. In- and Caleb Sima. Hack- ternational Journal of Im- ing exposed: Web applica- age and Graphics (IJIG),9 tions. McGraw-Hill, New REFERENCES 644

York, NY, USA, second edi- (electronic). URL http: tion, 2006. ISBN 0-07- //link.springer-ny.com/ 226299-0 (paperback). xxix link/service/series/0558/ + 520 pp. LCCN TK5105.59 bibs/2274/22740001.htm; .S32 2006. http://link.springer- Schmidt-Samoa:2006:AFW ny.com/link/service/series/ 0558/papers/2274/22740001. [SSST06] K. Schmidt-Samoa, O. Se- pdf. may, and T. Takagi. Anal- ysis of fractional win- Shamir:2001:IOO dow recoding methods and [ST01b] Adi Shamir and Yael Tau- their application to elliptic man. Improved online/ curve cryptosystems. IEEE Transactions on Computers, offline signature schemes. In Kilian [Kil01a], pages 55(1):48–57, January 2006. CODEN ITCOB4. ISSN 355–?? ISBN 3-540- 0018-9340 (print), 1557- 42456-3 (paperback). LCCN QA76.9.A25 C79 2001; 9956 (electronic). URL QA267.A1 L43 no.2139. http://ieeexplore.ieee. UK£47.00. URL http: org/stamp/stamp.jsp?tp= //link.springer-ny.com/ &arnumber=1545750. link/service/series/0558/ StPierre:2000:TFA bibs/2139/21390355.htm; [St.00] Jim St.Pierre. Two- http://link.springer- factor authentication added ny.com/link/service/series/ to PKI solutions. Net- 0558/papers/2139/21390355. work Security, 2000(5):6, pdf. May 1, 2000. CODEN Stern:2001:ADW NTSCF5. ISSN 1353-4858 (print), 1872-9371 (elec- [ST01c] Julien P. Stern and Jean- tronic). URL http:// Pierre Tillich. Automatic www.sciencedirect.com/ detection of a watermarked science/article/pii/S1353485800050182. document using a private Sakurai:2001:NSS key. Lecture Notes in Computer Science, 2137: [ST01a] Kouichi Sakurai and Tsuyoshi 258–??, 2001. CODEN Takagi. New semanti- LNCSD9. ISSN 0302- cally secure public-key cryp- 9743 (print), 1611-3349 tosystems from the RSA- (electronic). URL http: primitive. Lecture Notes //link.springer-ny.com/ in Computer Science, 2274: link/service/series/0558/ 1–??, 2001. CODEN bibs/2137/21370258.htm; LNCSD9. ISSN 0302- http://link.springer- 9743 (print), 1611-3349 ny.com/link/service/series/ REFERENCES 645

0558/papers/2137/21370258. Satoh:2003:SDF pdf. [ST03a] A. Satoh and K. Takano. Stinson:2001:SAC A scalable dual-field el- liptic curve cryptographic [ST01d] Douglas R. Stinson and processor. IEEE Trans- Stafford Tavares, editors. actions on Computers,52 Selected areas in cryptog- (4):449–460, April 2003. raphy: 7th annual inter- CODEN ITCOB4. ISSN national workshop, SAC 0018-9340 (print), 1557- 2000, Waterloo, Ontario, 9956 (electronic). URL Canada, August 14–15, http://ieeexplore.ieee. 2000: proceedings,volume org/stamp/stamp.jsp?tp= 2012 of Lecture Notes in &arnumber=1190586. Computer Science. Spring- Shamir:2003:FLN er-Verlag, Berlin, Ger- many / Heidelberg, Ger- [ST03b] Adi Shamir and Eran many / London, UK / etc., Tromer. Factoring large 2001. ISBN 3-540-42069- numbers with the TWIRL X (paperback). LCCN device. In Boneh [Bon03], QA76.9.A25 S22 2000; pages 1–26. CODEN QA267.A1 L43 no.2012. LNCSD9. ISBN 3-540- URL http://link.springer- 40674-3. ISSN 0302-9743 ny.com/link/service/series/ (print), 1611-3349 (elec- 0558/tocs/t2012.htm. tronic). LCCN QA76.9.A25 C79 2003. URL http: Sakurai:2002:SMP //link.springer-ny.com/ link/service/series/0558/ [ST02] Kouichi Sakurai and Tsuyoshi tocs/t2729.htm; http: Takagi. On the security of //www.springerlink.com/ a modified Paillier public- openurl.asp?genre=issue& key primitive. Lecture issn=0302-9743&volume= Notes in Computer Science, 2729; http://www.springerlink. 2384:436–??, 2002. CO- com/openurl.asp?genre= DEN LNCSD9. ISSN 0302- volume&id=doi:10.1007/ 9743 (print), 1611-3349 b11817. (electronic). URL http: Spivak:2006:SPT //link.springer-ny.com/ link/service/series/0558/[ST06] Michal Spivak and Sivan bibs/2384/23840436.htm; Toledo. Storing a per- http://link.springer- sistent transactional object ny.com/link/service/series/ heap on flash memory. ACM 0558/papers/2384/23840436. SIGPLAN Notices, 41(7): pdf. 22–33, July 2006. CODEN REFERENCES 646

SINODQ. ISSN 0362-1340 //link.springer-ny.com/ (print), 1523-2867 (print), link/service/series/0558/ 1558-1160 (electronic). tocs/t2779.htm; http: //www.springerlink.com/ Stallings:2000:SSC openurl.asp?genre=issue& [Sta00] William Stallings. The SET issn=0302-9743&volume= Standard and E-commerce. 2779; http://www.springerlink. Dr. Dobb’s Journal of Soft- com/openurl.asp?genre= ware Tools, 25(11):30, 32, volume&id=doi:10.1007/ 34, 36, November 2000. CO- b13240. DEN DDJOEB. ISSN 1044- Stanik:2005:NLO 789X. [Sta05] John Stanik. News 2.0: Los- Stallings:2002:CNS ing our edge? the real cost of Linux; say no to crackber- [Sta02a] William Stallings. Cryp- ries. ACM Queue: Tomor- tography and network secu- row’s Computing Today,3 rity: principles and prac- (5):14, June 2005. CODEN tice. Prentice-Hall, Inc., Up- AQCUAE. ISSN 1542-7730 per Saddle River, NJ 07458, (print), 1542-7749 (elec- USA, third edition, 2002. tronic). ISBN 0-13-091429-0. 696 (est.) pp. Stamp:2006:ISP

Standboge:2002:ENO [Sta06] Mark Stamp. Informa- tion security: principles [Sta02b] James Standboge. En- and practice. Wiley-Inter- crypted NFS with OpenSSH science, New York, NY, and Linux. Sys Admin: USA, 2006. ISBN 0-471- The Journal for UNIX Sys- 73848-4 (cloth). xxi + 390 tems Administrators, 11(3): pp. LCCN QA76.9.A25 S69 30, 32–34, March 2002. CO- 2006. URL http://www. DEN SYADE7. ISSN 1061- loc.gov/catdir/enhancements/ 2688. fy0645/2005005152-b.html; Stajano:2003:SCU http://www.loc.gov/catdir/ enhancements/fy0645/2005005152- [Sta03] Frank Stajano. The se- d.html; http://www.loc. curity challenges of ubiq- gov/catdir/toc/ecip058/ uitous computing. In 2005005152.html. Walter et al. [WKP03], Sterlicchi:2000:SCD page 1. CODEN LNCSD9. ISBN 3-540-40833-9. ISSN [Ste00] John Sterlicchi. Software 0302-9743 (print), 1611- companies disappointed by 3349 (electronic). LCCN encryption draft. Net- TK7895.E42. URL http: work Security, 2000(1):4, REFERENCES 647

January 2000. CODEN 1075-3583 (print), 1938- NTSCF5. ISSN 1353-4858 3827 (electronic). (print), 1872-9371 (elec- tronic). URL http:// Steil:2005:MMM www.sciencedirect.com/ science/article/pii/S1353485800866477[Ste05b]. Michael Steil. 17 mis- takes Microsoft made in Steinwandt:2001:LTP the Xbox security sys- tem. Report, Xbox Linux [Ste01] Rainer Steinwandt. Loop- Project, December 2005. holes in two public key cryp- 13 pp. URL http:// tosystems using the mod- events.ccc.de/congress/ ular group. Lecture Notes 2005/fahrplan/attachments/ in Computer Science, 1992: 591-paper_xbox.pdf. 180–189, 2001. CODEN LNCSD9. ISSN 0302- Stern:2005:MLF 9743 (print), 1611-3349 (electronic). URL http: [Ste05c] Richard H. Stern. Mi- //link.springer-ny.com/ cro law: FTC cracks link/service/series/0558/ down on spyware and PC bibs/1992/19920180.htm; hijacking, but not true http://link.springer- lies. IEEE Micro,25 ny.com/link/service/series/ (1):6–7, 100–101, January/ 0558/papers/1992/19920180. February 2005. CODEN pdf. IEMIDZ. ISSN 0272-1732 (print), 1937-4143 (elec- Stefanek:2002:ISB tronic). URL http:/ [Ste02] George L. Stefanek. Infor- /csdl.computer.org/dl/ mation security best prac- mags/mi/2005/01/m1006. tices: 205 basic rules. htm; http://csdl.computer. Newnes Press, Amster- org/dl/mags/mi/2005/01/ . dam, The Netherlands m1006.pdf and Boston, MA, USA, Stein:2008:ENT 2002. ISBN 1-878707- 96-5. xii + 194 pp. [Ste08] William Stein. Elemen- LCCN QA76.9.A25S744 tary number theory: primes, 2002. US$29.95. congruences, and secrets, Steele:2005:PPT volume 666 of Undergrad- uate texts in mathemat- [Ste05a] Corey Steele. Paranoid pen- ics. Springer-Verlag, Berlin, guin: Two-factor authenti- Germany / Heidelberg, Ger- cation. Linux Journal, 2005 many / London, UK / etc., (139):10, November 2005. 2008. ISBN 0-387-85524-6. CODEN LIJOFX. ISSN 175 (est.) pp. LCCN ???? REFERENCES 648

Stinson:1995:CTP Stieber:2006:GH

[Sti95] Douglas R. (Douglas Robert) [Sti06b] Tony Stieber. GnuPG Stinson. Cryptography: the- hacks. Linux Journal, 2006 ory and practice.The (143):2, March 2006. CO- CRC Press series on dis- DEN LIJOFX. ISSN 1075- crete mathematics and its 3583 (print), 1938-3827 applications. CRC Press, (electronic). 2000 N.W. Corporate Blvd., Boca Raton, FL 33431-9868, Stinson:2006:CTP USA, 1995. ISBN 0-8493- [Sti06c] Douglas R. (Douglas Robert) 8521-0. 434 pp. LCCN Stinson. Cryptography: the- QA268 .S75 1995. ory and practice.The Stinson:2001:C CRC Press series on dis- crete mathematics and its [Sti01] Douglas R. Stinson. Cryp- applications. Chapman and tography. CRC Press, Hall/CRC, Boca Raton, 2000 N.W. Corporate Blvd., FL, USA, third edition, Boca Raton, FL 33431-9868, 2006. ISBN 1-58488- USA, second edition, 2001. 508-4 (hardcover). 593 ISBN 1-58488-206-9. 512 pp. LCCN QA268 .S75 (est) pp. LCCN QA268 .S75 2006. URL http://www. 2002. UK£49.99. loc.gov/catdir/enhancements/ Stinson:2002:CTP fy0647/2006272493-d.html.

[Sti02] Douglas R. (Douglas Robert) Stipcevic:2011:QRN Stinson. Cryptography: the- ory and practice.The[Sti11] M. Stipcevic. Quantum ran- CRC Press series on dis- dom number generators and crete mathematics and its their use in cryptography. In applications. Chapman and 2011 Proceedings of the 34th Hall/CRC, Boca Raton, FL, International Convention USA, second edition, 2002. MIPRO, pages 1474–1479. ISBN 1-58488-206-9. 339 IEEE Computer Society pp. LCCN QA268 .S75 Press, 1109 Spring Street, 2002. Suite 300, Silver Spring, MD 20910, USA, 2011. URL Stieber:2006:OH http://ieeexplore.ieee. [Sti06a] Anthony J. Stieber. OpenSSL org/stamp/stamp.jsp?tp= hacks. Linux Journal, 2006 &arnumber=5967293. (147):??, July 2006. CO- Shimoyama:2002:MLC DEN LIJOFX. ISSN 1075- 3583 (print), 1938-3827 [STK02] Takeshi Shimoyama, Masahiko (electronic). Takenaka, and Takeshi REFERENCES 649

Koshiba. Multiple lin- Strunk:2001:JQJ ear cryptanalysis of a re- duced round RC6. Lec- [Str01b] Elisabeth Strunk. Java ture Notes in Computer Sci- Q&A: Java & NT authen- ence, 2365:76–??, 2002. CO- tication. Dr. Dobb’s Jour- DEN LNCSD9. ISSN 0302- nal of Software Tools,26 9743 (print), 1611-3349 (2):145–146, 148, February (electronic). URL http: 2001. CODEN DDJOEB. //link.springer-ny.com/ ISSN 1044-789X. URL link/service/series/0558/ http://www.ddj.com/ftp/ bibs/2365/23650076.htm; 2001/2001_02/jqa0201.txt. http://link.springer- ny.com/link/service/series/ Strubinger:2002:HBS 0558/papers/2365/23650076. pdf. [Str02] Ray Strubinger. A home- grown backup solution uti- Stone:2001:CI lizing RSA keys, SSH, and tar. Sys Admin: The [Sto01] Jonathan Richard Stone. Journal for UNIX Systems Checksums and the Internet. Administrators, 11(4):37– Ph.D. dissertation, Depart- 38, April 2002. CODEN ment of Computer Science, SYADE7. ISSN 1061-2688. Stanford University, Stan- ford, CA, USA, 2001. 228 Stytz:2004:BRW pp. URL http://wwwlib. umi.com/dissertations/ [Sty04] Martin R. Stytz. Book re- fullcit/3028177. views: Wireless world order [How Secure Is Your Wire- Struif:2001:UBU less Network? Safeguard- [Str01a] Bruno Struif. Use of bio- ing Your Wi-Fi LAN by Lee metrics for user verifica- Barken]; no need to fear [Be- tion in electronic signa- yond Fear: Thinking Sen- ture smartcards. Lecture sibly About Security in an Notes in Computer Science, Uncertain World,byBruce 2140:220–??, 2001. CO- Schneier]. IEEE Security DEN LNCSD9. ISSN 0302- & Privacy, 2(1):20–21, Jan- 9743 (print), 1611-3349 uary/February 2004. CO- (electronic). URL http: DEN ???? ISSN 1540-7993 //link.springer-ny.com/ (print), 1558-4046 (elec- link/service/series/0558/ tronic). URL http://csdl. bibs/2140/21400220.htm; computer.org/comp/mags/ http://link.springer- sp/2004/01/j1020abs.htm; ny.com/link/service/series/ http://csdl.computer. 0558/papers/2140/21400220. org/dl/mags/sp/2004/01/ pdf. j1020.pdf. REFERENCES 650

Saxena:2007:TCP drastic reduction of ran- domness in Monte Carlo [STY07] Nitesh Saxena, Gene Tsudik, integration. Mathemat- and Jeong Hyun Yi. Thresh- icsandComputersinSim- old cryptography in P2P ulation, 62(3–6):529–537, and MANETs: The case March 3, 2003. CODEN of access control. Com- MCSIDR. ISSN 0378-4754 puter Networks (Amster- (print), 1872-7166 (elec- dam, Netherlands: 1999), tronic). URL http:// 51(12):3632–3649, August www.sciencedirect.com/ 22, 2007. CODEN ???? science/article/pii/S0378475402002318. ISSN 1389-1286 (print), 1872-7069 (electronic). Sullivan:2005:CFI

Shaltiel:2007:LEU [Sul05] Roger K. Sullivan. The case for federated identity. Net- [SU07] Ronen Shaltiel and Christo- work Security, 2005(9):15– pher Umans. Low-end uni- 19, September 2005. CO- form hardness vs. random- DEN NTSCF5. ISSN 1353- ness tradeoffs for AM. In 4858 (print), 1872-9371 ACM [ACM07], pages 430– (electronic). URL http:/ 439. ISBN 1-59593-631-9. /www.sciencedirect.com/ LCCN QA75.5 .A22 2007. science/article/pii/S135348580570283X. Sugihara:2001:PCD Sun:2000:DRR

[Sug01] Ryo Sugihara. Practical [Sun00a] H.-M.-Min Sun. On the capacity of digital water- dealer’s randomness re- marks. Lecture Notes in quired in perfect secret Computer Science, 2137: sharing schemes with ac- 316–??, 2001. CODEN cess structures of constant LNCSD9. ISSN 0302- rank. International Jour- 9743 (print), 1611-3349 nal of Foundations of Com- (electronic). URL http: puter Science (IJFCS),11 //link.springer-ny.com/ (2):263–282, 2000. CODEN link/service/series/0558/ IFCSEN. ISSN 0129-0541 bibs/2137/21370316.htm; (print), 1793-6373 (elec- http://link.springer- tronic). ny.com/link/service/series/ 0558/papers/2137/21370316. Sun:2000:ESM pdf. [Sun00b] Hung-Min Sun. Enhancing Sugita:2003:DRW the security of the McEliece public-key cryptosystem. [Sug03] Hiroshi Sugita. Dynamic Journal of Information Sci- random Weyl sampling for ence and Engineering,16 REFERENCES 651

(6):799–812, 2000. CODEN 589–598. ISBN 1-60558-047- JINEEY. ISSN 1016-2364. 3. LCCN QA76.6 .A152 Sun:2002:IIR 2008. Sebe:2007:SMO [Sun02] Hung-Min Sun. Improv- ing the information rate of [SVDF07] Francesc Seb´e, Alexandre a private-key cryptosystem Viejo, and Josep Domingo- based on product codes. In- Ferrer. Secure many-to- formatica (Vilnius), 13(1): one symbol transmission for 105–110, 2002. ISSN 0868- implementation on smart 4952. cards. Computer Net- Sun:2005:UMS works (Amsterdam, Nether- lands: 1999), 51(9):2299– [Sun05] Qibin Sun. Understand- 2307, June 20, 2007. CO- ing multimedia security. DEN ???? ISSN 1389-1286 IEEE MultiMedia, 12(4): (print), 1872-7069 (elec- 88–89, October/December tronic). 2005. CODEN IEMUE4. ISSN 1070-986X (print), Shmueli:2009:DEO 1941-0166 (electronic). URL [SVEG09] Erez Shmueli, Ronen Vaisen- http://csdl.computer.org/ berg, Yuval Elovici, and comp/mags/mu/2005/04/u4088. Chanan Glezer. Database pdf. encryption: an overview Seidl:2008:FOV of contemporary challenges and design considerations. [SV08a] Helmut Seidl and Ku- SIGMOD Record (ACM mar Neeraj Verma. Flat and Special Interest Group on one-variable clauses: Com- Management of Data),38 plexity of verifying crypto- (3):29–34, September 2009. graphic protocols with sin- CODEN SRECD8. ISSN gle blind copying. ACM 0163-5808 (print), 1943- Transactions on Compu- 5835 (electronic). tational Logic, 9(4):28:1– 28:??, August 2008. CO- Smith:2000:CIR DEN ???? ISSN 1529-3785 [SVW00] Michael Smith, Paul Van (print), 1557-945X (elec- Oorschot, and Michael Wil- tronic). lett. Cryptographic infor- Shaltiel:2008:HAP mation recovery using key recovery. Computers & Se- [SV08b] Ronen Shaltiel and Emanuele curity, 19(1):21–27, Jan- Viola. Hardness amplifica- uary 1, 2000. CODEN tion proofs require major- CPSEDU. ISSN 0167-4048 ity. In ACM [ACM08], pages (print), 1872-6208 (elec- REFERENCES 652

tronic). URL https:// supporting synchronization, www.sciencedirect.com/ revocation, and recency. science/article/pii/S0167404800863580. IEEE Transactions on Soft- ware Engineering, 28(3): Schneier:2000:PCF 256–285, March 2002. CO- [SW00a] Bruce Schneier and Doug DEN IESEDJ. ISSN 0098- Whiting. A performance 5589 (print), 1939-3520 comparison of the five (electronic). URL http: AES finalists. In NIST //ieeexplore.ieee.org/ [NIS00], pages 123–135. stamp/stamp.jsp?arnumber= ISBN ???? LCCN ???? 991320. URL http://csrc.nist. Shim:2005:WIB gov/encryption/aes/round2/ conf3/aes3conf.htm; http:[SW05a] Kyungah Shim and Sungsik //csrc.nist.gov/encryption/ Woo. Weakness in ID-based aes/round2/conf3/papers/ one round authenticated tri- AES3Proceedings-1.pdf; partite multiple-key agree- http://csrc.nist.gov/ ment protocol with pair- encryption/aes/round2/ ings. Applied Mathemat- conf3/papers/AES3Proceedings- ics and Computation, 166 2.pdf; http://csrc.nist. (3):523–530, July 26, 2005. gov/encryption/aes/round2/ CODEN AMHCBQ. ISSN conf3/papers/AES3Proceedings- 0096-3003 (print), 1873- 3.pdf; http://csrc.nist. 5649 (electronic). gov/encryption/aes/round2/ Stuck:2005:HVC conf3/papers/AES3Proceedings. pdf. [SW05b] B. Stuck and M. Wein- Sun:2000:AFA garten. How venture cap- ital thwarts innovation. [SW00b] Yongxing Sun and Xinmei IEEE Spectrum, 42(4):50– Wang. An approach to find- 55, April 2005. CODEN ing the attacks on the cryp- IEESAM. ISSN 0018-9235 tographic protocols. Operat- (print), 1939-9340 (elec- ing Systems Review, 34(3): tronic). 19–28, July 2000. CODEN OSRED8. ISSN 0163-5980 Shieh:2006:ERM (print), 1943-586X (elec- [SW06] Wen-Gong Shieh and Jian- tronic). Min Wang. Efficient re- Stubblebine:2002:ALF mote mutual authentication and key agreement. Com- [SW02] S. G. Stubblebine and R. N. puters & Security, 25(1):72– Wright. An authentication 77, February 2006. CODEN logic with formal semantics CPSEDU. ISSN 0167-4048 REFERENCES 653

(print), 1872-6208 (elec- com/9812701532/9812701532. tronic). URL https:// 0031.html. www.sciencedirect.com/ Sun:2009:TDS science/article/pii/S0167404805001719. [SWH+09] Hung-Min Sun, Mu-En Wu, Swaine:2001:PPSa M. Jason Hinek, Cheng- [Swa01] Michael Swaine. Program- Ta Yang, and Vincent S. ming paradigms: Secrets Tseng. Trading decryption and lies. Dr. Dobb’s Jour- for speeding encryption in nal of Software Tools, 26(4): Rebalanced-RSA. The Jour- 125–127, April 2001. CO- nal of Systems and Software, DEN DDJOEB. ISSN 1044- 82(9):1503–1512, Septem- 789X. URL http://www. ber 2009. CODEN JS- SODM. ISSN 0164-1212 ddj.com/. (print), 1873-1228 (elec- Swenson:2008:MCT tronic).

[Swe08] Christopher Swenson. Mod- Swire:2005:SMI ern cryptanalysis: tech- [Swi05] Peter P. Swire. Security niques for advanced code market: incentives for dis- breaking. John Wiley and closure of vulnerabilities. Sons, Inc., New York, NY, In Meadows and Syver- USA, 2008. ISBN 0-470- son [MS05b], page 405. 13593-X (cloth). xxviii + ISBN 1-59593-226-7. LCCN 236 pp. LCCN QA76.9.A25 QA76.9.A25. ACM order S932 2008. URL http:// number 459050. www.loc.gov/catdir/enhancements/ fy0806/2007051636-d.html; Stevenson:2005:SCI http://www.loc.gov/catdir/ enhancements/fy0808/2007051636-[SWR05] Daniel E. Stevenson, Mich- t.html; http://www.loc. ael R. Wick, and Steven J. gov/catdir/enhancements/ Ratering. Steganography fy0810/2007051636-b.html. and cartography: interest- ing assignments that rein- Song:2005:ISG force machine representa- tion, bit manipulation, and [SWH05] Lin Song, Biao Wang, discrete structures concepts. andDequanHe.Anim- SIGCSE Bulletin (ACM proved scheme for group Special Interest Group on signature. In Han et al. Computer Science Educa- [HYZ05b], pages 96–?? tion), 37(1):277–281, March ISBN 981-270-153-2. LCCN 2005. CODEN SIGSD3. ???? URL http:// ISSN 0097-8418 (print), eproceedings.worldscinet. 2331-3927 (electronic). REFERENCES 654

Song:2007:TAK (electronic). URL http: //link.springer-ny.com/ [SWT07] Dawn Xiaodong Song, David link/service/series/0558/ Wagner, and Xuqing Tian. bibs/2195/21950638.htm; Timing analysis of keystrokes http://link.springer- and timing attacks on SSH. ny.com/link/service/series/ Report, University of Cal- 0558/papers/2195/21950638. ifornia, Berkeley, Berke- pdf. ley,CA,USA,July15, 2007. URL http://www.cs. Shi:2001:NSF berkeley.edu/~dawnsong/ papers/ssh-timing.pdf. [SY01b] Jiaoying Shi and Kaixi- Shujun:2001:PRB ang Yi. New semi-fragile authentication watermark- [SXY01] L. Shujun, M. Xuanqin, ing. Lecture Notes in and C. Yuanlong. Pseudo- Computer Science, 2195: random bit generator based 969–??, 2001. CODEN on couple chaotic sys- LNCSD9. ISSN 0302- tems and its applications 9743 (print), 1611-3349 in stream-cipher cryptog- (electronic). URL http: raphy. Lecture Notes in //link.springer-ny.com/ Computer Science, 2247: link/service/series/0558/ 316–??, 2001. CODEN bibs/2195/21950969.htm; LNCSD9. ISSN 0302- http://link.springer- 9743 (print), 1611-3349 ny.com/link/service/series/ (electronic). URL http: 0558/papers/2195/21950969. //link.springer-ny.com/ pdf. link/service/series/0558/ bibs/2247/22470316.htm; Sun:2006:PBA http://link.springer- ny.com/link/service/series/ [SY06] Hung-Min Sun and Her- 0558/papers/2247/22470316. Tyan Yeh. Password-based pdf. authentication and key dis- Seo:2001:CDA tribution protocols with per- fect forward secrecy. Jour- [SY01a] Jin S. Seo and Chang D. nal of Computer and System Yoo. Correlation detec- Sciences, 72(6):1002–1011, tion of asymmetric water- September 2006. CODEN mark. Lecture Notes in JCSSBM. ISSN 0022-0000 Computer Science, 2195: (print), 1090-2724 (elec- 638–??, 2001. CODEN tronic). URL http:// LNCSD9. ISSN 0302- www.sciencedirect.com/ 9743 (print), 1611-3349 science/article/pii/S0022000006000481. REFERENCES 655

Syed:2000:CLA //link.springer-ny.com/ link/service/series/0558/ [Sye00] Furqan Syed. Children of tocs/t2339.htm; http: DES: a look at the Ad- //www.springerlink.com/ vanced Encryption Stan- openurl.asp?genre=issue& dard. Network Secu- issn=0302-9743&volume= rity, 2000(9):11–12, Septem- 2339. ber 1, 2000. CODEN Shimoyama:2002:BCS NTSCF5. ISSN 1353-4858 (print), 1872-9371 (elec- [SYY+02] Takeshi Shimoyama, Hi- tronic). URL http:// toshi Yanami, Kazuhiro www.sciencedirect.com/ Yokoyama, Masahiko Tak- science/article/pii/S1353485800090267. enaka, Kouichi Itoh, Jun Yajima, Naoya Torii, and Sun:2005:CSS Hidema Tanaka. The block [SYLC05] Qibin Sun, Shuiming Ye, cipher SC2000. Lecture Ching-Yung Lin, and Shih- Notes in Computer Science, Fu Chang. A crypto sig- 2355:312–??, 2002. CO- nature scheme for image DEN LNCSD9. ISSN 0302- authentication over wireless 9743 (print), 1611-3349 channel. International Jour- (electronic). URL http: nal of Image and Graphics //link.springer-ny.com/ (IJIG), 5(1):135–??, Jan- link/service/series/0558/ uary 2005. CODEN ???? bibs/2355/23550312.htm; ISSN 0219-4678. http://link.springer- ny.com/link/service/series/ Syverson:2002:FCI 0558/papers/2355/23550312. [Syv02] Paul F. Syverson, editor. Fi- pdf. nancial Cryptography: 5th Steinfeld:2001:ALE International Conference, FC 2001, Grand Cayman, [SZ01] Ron Steinfeld and Yuliang British West Indies, Febru- Zheng. An advantage of low- ary 19–22, 2001. Proceed- exponent RSA with mod- ings, volume 2339 of Lecture ulus primes sharing least Notes in Computer Science. significant bits. Lecture Springer-Verlag, Berlin, Notes in Computer Science, Germany / Heidelberg, Ger- 2020:52–??, 2001. CO- many / London, UK / etc., DEN LNCSD9. ISSN 0302- 2002. CODEN LNCSD9. 9743 (print), 1611-3349 ISBN 3-540-44079-8 (soft- (electronic). URL http: cover). ISSN 0302-9743 //link.springer-ny.com/ (print), 1611-3349 (elec- link/service/series/0558/ tronic). LCCN HG1710 bibs/2020/20200052.htm; .F35 2001. URL http: http://link.springer- REFERENCES 656

ny.com/link/service/series/ authentication scheme. Ap- 0558/papers/2020/20200052. plied Mathematics and Com- pdf. putation, 170(2):1185–1193, November 15, 2005. CO- Skoudis:2003:MFM DEN AMHCBQ. ISSN [SZ03] Ed Skoudis and Lenny 0096-3003 (print), 1873- Zeltser. Malware: Fighting 5649 (electronic). Malicious Code. Prentice Tada:2002:OSM Hall series in computer net- working and distributed sys- [Tad02] Mitsuru Tada. An order- tems. Prentice-Hall PTR, specified multisignature scheme Upper Saddle River, NJ secure against active in- 07458, USA, 2003. ISBN sider attacks. Lecture Notes 0-13-101405-6. 512 (est.) in Computer Science, 2384: pp. LCCN QA76.9.A25 S58 328–??, 2002. CODEN 2003. US$44.99. LNCSD9. ISSN 0302- 9743 (print), 1611-3349 Sarikaya:2008:SPT (electronic). URL http: [SZ08] Behcet Sarikaya and Xiao //link.springer-ny.com/ Zheng. SIP paging and link/service/series/0558/ tracking of wireless LAN bibs/2384/23840328.htm; hosts for VoIP. IEEE/ACM http://link.springer- Transactions on Network- ny.com/link/service/series/ ing, 16(3):539–548, June 0558/papers/2384/23840328. 2008. CODEN IEANEP. pdf. ISSN 1063-6692 (print), Tang:2001:AES 1558-2566 (electronic). [Tan01] Ye Tang. The advanced Sun:2002:NAD encryption standard map- [SZP02] Qi Sun, Qi Fan Zhang, and ping into MorphoSys archi- Guo Hua Peng. A new tecture. Thesis (M.S., Elec- algorithm for the Dickson trical and Computer Engi- polynomial ge(x, 1) public neering), University of Cal- key cryptosystem. Sichuan ifornia, Irvine, Irvine, CA, Daxue Xuebao, 39(1):18–23, USA, 2001. 2002. CODEN SCTHAO. Tang:2007:MMU ISSN 0490-6756. Sun:2005:WIW [Tan07a] Ping Tak Peter Tang. Mod- ular multiplication using [SZS05] Da-Zhi Sun, Ji-Dong Zhong, redundant digit division. and Yu Sun. Weakness and In Kornerup and Muller improvement on Wang–Li– [KM07], pages 217–224. Tie’s user-friendly remote ISBN 0-7695-2854-6. ISSN REFERENCES 657

1063-6889. LCCN ???? http://dlib.computer.org/ URL http://www.lirmm. mi/books/mi2001/m6026abs. fr/arith18/. htm; http://dlib.computer. Tang:2007:SGK org/mi/books/mi2001/pdf/ m6026.pdf. [Tan07b] Qiang Tang. On the secu- rity of a group key agree- Tistarelli:2002:BAI ment protocol. The Com- [TBJ02] Massimo Tistarelli, Josef Bi- puter Journal, 50(5):589– gun, and Anil K. Jain, edi- 590, September 2007. CO- tors. Biometric authentica- DEN CMPJA6. ISSN 0010- tion: International ECCV 4620 (print), 1460-2067 2002 Workshop, Copen- (electronic). URL http:/ hagen, Denmark, June 1, /comjnl.oxfordjournals. 2002: Proceedings,volume org/cgi/content/abstract/ 2359 of Lecture Notes in 50/5/589; http://comjnl. Computer Science. Spring- oxfordjournals.org/cgi/ er-Verlag, Berlin, Ger- content/full/50/5/589; many / Heidelberg, Ger- http://comjnl.oxfordjournals. many / London, UK / etc., org/cgi/reprint/50/5/589. 2002. CODEN LNCSD9. Tattersall:2005:ENT ISBN 3-540-43723-1 (soft- cover). ISSN 0302-9743 [Tat05] James J. (James Joseph) (print), 1611-3349 (elec- Tattersall. Elementary tronic). LCCN TK7882.P3 number theory in nine chap- I568 2002. URL http: ters. Cambridge University //link.springer-ny.com/ Press, Cambridge, UK, sec- link/service/series/0558/ ond edition, 2005. ISBN 0- tocs/t2359.htm; http: 521-85014-2 (hardcover), 0- //www.springerlink.com/ 521-61524-0 (paperback), 0- openurl.asp?genre=issue& 511-75634-8 (e-book). xi + issn=0302-9743&volume= 430 pp. LCCN ???? 2359. Trichina:2001:SCH Tao:2000:ITF [TBDL01] Elena Trichina, Marco [TC00] Renji Tao and Shihua Chen. Bucci, Domenico De Seta, Input-trees of finite au- and Raimondo Luzzi. Sup- tomata and application to plemental cryptographic cryptanalysis. J. Comput. hardware for smart cards. Sci. Tech., 15(4):305–325, IEEE Micro, 21(6):26–35, 2000. CODEN JCTEEM. November/December 2001. ISSN 1000-9000. CODEN IEMIDZ. ISSN Tsai:2001:GSI 0272-1732 (print), 1937- 4143 (electronic). URL [TC01] Chwei-Shyong Tsai and REFERENCES 658

Chin-Chen Chang. A gen- very, and Russell Rice. De- eralized secret image shar- signing secure enterprise ing and recovery scheme. networks. Cisco Press, In- Lecture Notes in Computer dianapolis, IN, USA, 2003. Science, 2195:963–??, 2001. ISBN 1-58705-115-X. ???? CODEN LNCSD9. ISSN pp. Duplicate ISBN with 0302-9743 (print), 1611- [Con04]. 3349 (electronic). URL http://link.springer-ny. Teepe:2006:PPA com/link/service/series/ 0558/bibs/2195/21950963. [Tee06] Wouter Teepe. Proving htm; http://link.springer- possession of arbitrary se- ny.com/link/service/series/ crets while not giving them 0558/papers/2195/21950963. away: New protocols and pdf. a proof in GNY logic. Synthese, 149(2):409–443, Tsaur:2005:EAS March 2006. CODEN SYN- [TC05] Woei-Jiunn Tsaur and TAE. ISSN 0039-7857 Chih-Ho Chou. Efficient (print), 1573-0964 (elec- algorithms for speeding up tronic). URL http://link. the computations of el- springer.com//content/ liptic curve cryptosystems. pdf/10.1007/s11229-005- Applied Mathematics and 3879-4.pdf; http://link. Computation, 168(2):1045– springer.com/article/10. 1064, September 15, 2005. 1007/s11229-005-3879-4. CODEN AMHCBQ. ISSN 0096-3003 (print), 1873- Todd:2001:LSS 5649 (electronic). [TEM+01] Andrew W. Todd, Jonathan Tsai:2002:SMS Erickson, Nadine McKen- zie, Chris Cleeland, Rich- [TCC02] Chwei-Shyong Tsai, Chin- ard Huang, Ragae Ghaly, Chen Chang, and Tung- and The Editors. Let- Shou Chen. Sharing multi- ters: Shared source and ple secrets in digital images. shared secrets; JavaScript The Journal of Systems fix; CORBA interoperabil- and Software, 64(2):163– ity; EJB application servers 170, November 15, 2002. update; correction [“The CODEN JSSODM. ISSN Delphi XML SAX2 Com- 0164-1212 (print), 1873- ponent and MSXML 3.0”]. 1228 (electronic). Dr. Dobb’s Journal of Soft- Trudel:2003:DSE ware Tools, 26(10):10, 12, October 2001. CODEN [TCR03] Bernard Trudel, Sean Con- DDJOEB. ISSN 1044- REFERENCES 659

789X. URL http://www. termark for every image. ddj.com/. See [Hei01]. IEEE MultiMedia, 8(4):30– 37, October 2001. CODEN Terai:2008:BRB IEMUE4. ISSN 1070-986X [Ter08] S. Terai. Book review: (print), 1941-0166 (elec- Cryptography in C and tronic). URL http://dlib. C++, by Michael Welschen- computer.org/mu/books/ bach, Apress, 2005. ACM mu2001/pdf/u4030.pdf; SIGACT News, 39(1):12– http://www.computer.org/ 16, March 2008. CO- multimedia/mu2001/u4030abs. DEN SIGNDM. ISSN 0163- htm. 5700 (print), 1943-5827 Thimbleby:2003:RE (electronic). URL http: [Thi03] Harold Thimbleby. The re- //doi.acm.org/10.1145/ duced Enigma. Comput- 1360443.1360446.See ers & Security, 22(7):624– [WK01, Wel05]. 642, October 2003. CODEN Thorsteinson:2004:NSC CPSEDU. ISSN 0167-4048 (print), 1872-6208 (elec- [TG04] Peter Thorsteinson and tronic). URL https:// G. Gnana Arun Ganesh. www.sciencedirect.com/ .NET Security and Cryptog- science/article/pii/S0167404803007120. raphy. The integrated .NET series from object innova- Tabatabaian:2001:NSP tions. Prentice-Hall PTR, [TIGD01] Seyed J. Tabatabaian, Sam Upper Saddle River, NJ Ikeshiro, Murat Gumussoy, 07458, USA, 2004. ISBN 0- and Mungal S. Dhanda. 13-100851-X. xvii + 466 pp. A new search pattern in LCCN ???? US$49.99. multiple residue method Theoharidou:2007:CBK (MRM) and its impor- tance in the cryptanaly- [TG07] Marianthi Theoharidou and sis of the RSA. Lecture Dimitris Gritazalis. Com- Notes in Computer Science, mon body of knowledge for 2260:378–??, 2001. CO- information security. IEEE DEN LNCSD9. ISSN 0302- Security & Privacy, 5(2):64– 9743 (print), 1611-3349 67, March/April 2007. CO- (electronic). URL http: DEN ???? ISSN 1540-7993 //link.springer-ny.com/ (print), 1558-4046 (elec- link/service/series/0558/ tronic). bibs/2260/22600378.htm; Tirkel:2001:UWE http://link.springer- ny.com/link/service/series/ [TH01] Andrew Z. Tirkel and Tho- 0558/papers/2260/22600378. mas E. Hall. A unique wa- pdf. REFERENCES 660

Tippett:1927:RSN 0898-1221 (print), 1873- 7668 (electronic). [Tip27] L. H. C. (Leonard Henry Caleb) Tippett. Random sam- Tseng:2003:DSM pling numbers,volume15of [TJC03] Yuh-Min Tseng, Jinn-Ke Tracts for computers.Cam- Jan, and Hung-Yu Chien. bridge University Press, Digital signature with mes- Cambridge, UK, 1927. viii sage recovery using self- + xxvi pp. LCCN QA47 .T7 certified public keys and its no. 15. Reprinted in 1952. variants. Applied Mathemat- Reprinted in 1959 with a ics and Computation, 136 foreword by Karl Pearson. (2–3):203–214, March 15, Torres:2007:ANS 2003. CODEN AMHCBQ. ISSN 0096-3003 (print), [TIS07] Joaquin Torres, Antonio 1873-5649 (electronic). Izquierdo, and Jose Maria Sierra. Advances in network Tico:2003:RAS smart cards authentication. Computer Networks (Ams- [TK03] Marius Tico and Pauli Ku- terdam, Netherlands: 1999), osmanen. A remote authen- 51(9):2249–2261, June 20, tication system using finger- 2007. CODEN ???? ISSN prints. International Jour- 1389-1286 (print), 1872- nal of Image and Graph- 7069 (electronic). ics (IJIG), 3(3):425–??, July 2003. CODEN ???? ISSN Tseng:2001:GGO 0219-4678. [TJ01a] Y.-M. Tseng and J.-K. Jan. Toll:2008:CSE

Generalized group-oriented + cryptosystem with authen- [TKP 08] David C. Toll, Paul A. ticated sender. Interna- Karger, Elaine R. Palmer, tional Journal of Computer Suzanne K. McIntosh, and Systems Science and Engi- Sam Weber. The Caernar- neering, 16(5):??, Septem- von secure embedded op- ber 2001. CODEN CSSEEI. erating system. Operating ISSN 0267-6192. Systems Review, 42(1):32– 39, January 2008. CODEN Tseng:2001:CLB OSRED8. ISSN 0163-5980 [TJ01b] Yuh-Min Tseng and Jinn-Ke (print), 1943-586X (elec- Jan. Cryptanalysis of Liaw’s tronic). broadcasting cryptosystem. Thien:2002:TSS Computers and Mathemat- ics with Applications,41[TL02] Chih-Ching Thien and Ja- (12):1575–1578, 2001. CO- Chen Lin. Technical sec- DEN CMAPDK. ISSN tion: Secret image shar- REFERENCES 661

ing. Computers and Graph- Tsai:2005:CAE ics, 26(5):765–770, Octo- ber ??, 2002. CODEN [TLH05] Chwei-Shyong Tsai, Shu- COGRD2. ISSN 0097-8493 Chen Lin, and Min-Shiang (print), 1873-7684 (elec- Hwang. Cryptanalysis of tronic). URL http://www. an authenticated encryption elsevier.com/gej-ng/10/ scheme using self-certified 13/20/68/56/39/abstract. public keys. Applied Math- html. ematics and Computation, Thomas:2007:HQU 166(1):118–122, July 6, 2005. CODEN AMHCBQ. [TL07] David B. Thomas and ISSN 0096-3003 (print), Wayne Luk. High qual- 1873-5649 (electronic). ity uniform using LUT op- Tan:2004:OBC timised state-transition ma- trices. Journal of VLSI Sig- [TLYL04] Zhangxi Tan, Chuang Lin, nal Processing, 47(1):77–92, Hao Yin, and Bo Li. Opti- 2007. CODEN JVSPED. mization and benchmark of ISSN 0922-5773. From the cryptographic algorithms on issue entitled “Special Is- network processors. IEEE sue: Field Programmable Micro, 24(5):55–69, Septem- Technology. Guest Editors: ber/October 2004. CO- Gordon Brebner, Samarjit DEN IEMIDZ. ISSN 0272- Chakraborty, and Weng-Fai 1732 (print), 1937-4143 Wong”. (electronic). URL http: //csdl.computer.org/dl/ Turner:2006:SIS mags/mi/2004/05/m5055. [TLC06] Stephen John Turner, Bu Sung htm; http://csdl.computer. Lee, and Wientong Cai, org/dl/mags/mi/2004/05/ editors. Sixth Interna- m5055.pdf. tional Symposium on Clus- ter Computing and the Tokita:2001:ADC Grid CCGrid 06: 16– 19 May, 2006, Singapore. [TM01] Toshio Tokita and Tsutomu IEEE Computer Society Matsumoto. On applica- Press, 1109 Spring Street, bility of differential crypt- Suite 300, Silver Spring, analysis, linear cryptanaly- MD 20910, USA, 2006. sis and ISBN 0-7695-2585-7. LCCN to an encryption algorithm QA76.9.C58. IEEE Com- M8 (ISO9979-20). IPSJ puter Society Order Number J., 42(8):2098–2105, 2001. P2585. ISSN 0387-5806. REFERENCES 662

Tang:2006:CHA Drossos, Spyros Sioutas, and Theodore Papatheodorou. [TM06] Qiang Tang and Chris J. Applying robust multibit Mitchell. Cryptanalysis of watermarks to digital im- a hybrid authentication pro- ages. Journal of Compu- tocol for large mobile net- tational and Applied Math- works. The Journal of ematics, 227(1):213–220, Systems and Software,79 May 1, 2009. CODEN (4):496–501, April 2006. JCAMDI. ISSN 0377-0427 CODEN JSSODM. ISSN (print), 1879-1778 (elec- 0164-1212 (print), 1873- tronic). URL http:// 1228 (electronic). www.sciencedirect.com/ Torrubia:2001:CRC science/article/pii/S0377042708003543. [TMM01] Andres Torrubia, Fran- Teoh:2004:PCK cisco J. Mora, and Luis Marti. Cryptography reg- [TNG04] Andrew B. J. Teoh, David C. L. Ngo, and Alwyn Goh. ulations for e-commerce and digital rights manage- Personalised cryptographic key generation based on ment. Computers & Se- FaceHashing. Computers curity, 20(8):724–738, De- cember 1, 2001. CODEN &Security, 23(7):606–614, October 2004. CODEN CPSEDU. ISSN 0167-4048 (print), 1872-6208 (elec- CPSEDU. ISSN 0167-4048 (print), 1872-6208 (elec- tronic). URL https:// tronic). URL https:// www.sciencedirect.com/ science/article/pii/S0167404801008148. www.sciencedirect.com/ science/article/pii/S0167404804001701. Tian:2005:RWS Tousidou:2000:IMS [TMMM05] Junfeng Tian, Guofu Ma, Shengfu Ma, and Yahui [TNM00] Eleni Tousidou, Alex Nanopou- Meng. Research on Web los, and Yannis Manolopou- server attacking-based in- los. Improved methods for trusion detection. In Han signature-tree construction. et al. [HYZ05b], pages 159– The Computer Journal,43 ?? ISBN 981-270-153-2. (4):301–314, ???? 2000. LCCN ???? URL http:// CODEN CMPJA6. ISSN eproceedings.worldscinet. 0010-4620 (print), 1460- com/9812701532/9812701532. 2067 (electronic). URL 0031.html. http://www3.oup.co.uk/ Tsolis:2009:ARM computer_journal/hdb/Volume_ 43/Issue_04/430301.sgm. [TND+09] Dimitrios Tsolis, Spiri- abs.html; http://www3. don Nikolopoulos, Lambros oup.co.uk/computer_journal/ REFERENCES 663

hdb/Volume_43/Issue_04/ Chicago and London: Uni- pdf/430301.pdf. versity of Chicago Press, 2001. Pp. xix + 624. ISBN 0- Tanaka:2001:QPK 226-74410-8. £22.50, $35.00 [TO01] Keisuke Tanaka and Tat- (hardcover). British Journal suaki Okamoto. Quan- for the History of Science, tum public-key cryptosys- 35(3):347–379, September tems and their improve- 2002. CODEN BJHSAT. ment. S¯urikaisekikenky¯usho ISSN 0007-0874 (print), K¯oky¯uroku, 1205:53–58, 1474-001X (electronic). 2001. New developments of the theory of computation Totsch:2000:MSS and algorithms (Japanese) [Tot00] David Totsch. Managing (Kyoto, 2001). SUID/SGID files. Sys Ad- Tochikubo:2000:RAE min: The Journal for UNIX Systems Administrators,9 [TOEO00] Kouya Tochikubo, Koji (9):60, 62–63, 65, September Okada, Naoki Endoh, and 2000. CODEN SYADE7. Eiji Okamoto. Renewable ISSN 1061-2688. URL authentication and encryp- http://www.samag.com/. tion systems. Transactions of the Information Process- Tague:2007:CSA ing Society of Japan, 41(8): [TP07] Patrick Tague and Radha 2121–2127, 2000. CODEN Poovendran. A canoni- JSGRD5. ISSN 0387-5806. cal seed assignment model Tomaszewski:2006:YSY for key predistribution in [Tom06] John P. Tomaszewski. Are wireless sensor networks. you sure you had a pri- ACM Transactions on Sen- vacy incident? IEEE sor Networks, 3(4):19:1– Security & Privacy, 4(6): 19:??, October 2007. CO- 64–66, November/December DEN ???? ISSN 1550-4859 2006. CODEN ???? ISSN (print), 1550-4867 (elec- 1540-7993 (print), 1558- tronic). 4046 (electronic). Trope:2007:CSD Topham:2002:BRJ [TPPM07] Roland L. Trope, E. Mich- [Top02] Jon Topham. Book review: ael Power, Vincent I. Pol- JamesA.Secord,Victorian ley, and Bradford C. Mor- Sensation: The Extraor- ley. A coherent strategy dinary Publication, Recep- for data security through tion, and Secret Author- data governance. IEEE Se- ship of Vestiges of the Nat- curity & Privacy, 5(3):32– ural History of Creation. 39, May/June 2007. CO- REFERENCES 664

DEN ???? ISSN 1540-7993 1540-7993 (print), 1558- (print), 1558-4046 (elec- 4046 (electronic). tronic). Troutman:2008:VMM Trimberger:2001:GED [Tro08] Justin Troutman. The [TPS01] Steve Trimberger, Raymond virtues of mature and mini- Pang, and Amit Singh. malist cryptography. IEEE A 12 Gbps DES encryp- Security & Privacy, 6(4):62– tor/decryptor core in an 65, July/August 2008. CO- FPGA. Lecture Notes in DEN ???? ISSN 1540-7993 Computer Science, 1965: (print), 1558-4046 (elec- 156–??, 2001. CODEN tronic). LNCSD9. ISSN 0302- 9743 (print), 1611-3349 Tsaur:2001:FUA (electronic). URL http: [Tsa01] W.-J. Tsaur. A flexible //link.springer-ny.com/ user authentication scheme link/service/series/0558/ for multi-server Internet ser- bibs/1965/19650156.htm; vices. Lecture Notes in http://link.springer- Computer Science, 2093: ny.com/link/service/series/ 174–??, 2001. CODEN 0558/papers/1965/19650156. LNCSD9. ISSN 0302- pdf. 9743 (print), 1611-3349 Troutman:2009:CCGa (electronic). URL http: //link.springer-ny.com/ [TR09a] Justin Troutman and Vin- link/service/series/0558/ cent Rijmen. Crypto cor- bibs/2093/20930174.htm; ner: Green cryptography: http://link.springer- Cleaner engineering through ny.com/link/service/series/ recycling. IEEE Security & 0558/papers/2093/20930174. Privacy, 7(4):71–73, July/ pdf. August 2009. CODEN ???? ISSN 1540-7993 (print), Tsaur:2005:SSS 1558-4046 (electronic). [Tsa05] Woei-Jiunn Tsaur. Sev- Troutman:2009:CCGb eral security schemes con- structed using ECC-based [TR09b] Justin Troutman and Vin- self-certified public key cent Rijmen. Crypto cor- cryptosystems. Applied ner: Green cryptography: Mathematics and Com- Cleaner engineering through putation, 168(1):447–464, recycling, part 2. IEEE September 1, 2005. CODEN Security & Privacy, 7(5): AMHCBQ. ISSN 0096-3003 64–65, September/October (print), 1873-5649 (elec- 2009. CODEN ???? ISSN tronic). REFERENCES 665

Tsaban:2006:FGD Journal, 50(1):41–52, Jan- uary 2007. CODEN CM- [Tsa06] Boaz Tsaban. Fast genera- PJA6. ISSN 0010-4620 tors for the Diffie–Hellman (print), 1460-2067 (elec- key agreement protocol and tronic). URL http:// malicious standards. In- comjnl.oxfordjournals. formation Processing Let- org/cgi/content/abstract/ ters, 99(4):145–148, August 50/1/41; http://comjnl. 31, 2006. CODEN IF- oxfordjournals.org/cgi/ PLAT. ISSN 0020-0190 content/full/50/1/41; (print), 1872-6119 (elec- http://comjnl.oxfordjournals. tronic). org/cgi/reprint/50/1/41.

Tsang:2007:WCT Takano:2000:PTH

[Tsa07] Patrick P. Tsang. When [TSO00] Kohji Takano, Akashi Satoh, cryptographers turn lead and Nobuyuki Ohba. Poster into gold. IEEE Secu- 5: TATSU — hardware rity & Privacy, 5(2):76–79, accelerator for public-key March/April 2007. CO- cryptography using Mont- DEN ???? ISSN 1540-7993 gomery method. In Anony- (print), 1558-4046 (elec- mous [Ano00d], page ?? tronic). Tsunoo:2003:CIC Tsai:2008:EMS [TSS+03] Yukiyasu Tsunoo, Teruo [Tsa08] Jia-Lun Tsai. Efficient Saito, Tomoyasu Suzaki, multi-server authentication Maki Shigeri, and Hiroshi scheme based on one-way Miyauchi. Cryptanalysis of hash function without veri- DES implemented on com- fication table. Computers & puters with cache. In Wal- Security, 27(3–4):115–121, ter et al. [WKP03], pages May/June 2008. CODEN 62–76. CODEN LNCSD9. CPSEDU. ISSN 0167-4048 ISBN 3-540-40833-9. ISSN (print), 1872-6208 (elec- 0302-9743 (print), 1611- tronic). URL https:// 3349 (electronic). LCCN www.sciencedirect.com/ TK7895.E42. URL http: science/article/pii/S0167404808000084. //link.springer-ny.com/ Tseng:2007:SAG link/service/series/0558/ tocs/t2779.htm; http: [Tse07] Yuh-Min Tseng. A se- //www.springerlink.com/ cure authenticated group openurl.asp?genre=issue& key agreement protocol for issn=0302-9743&volume= resource-limited mobile de- 2779; http://www.springerlink. vices. The Computer com/openurl.asp?genre= REFERENCES 666

volume&id=doi:10.1007/ Tuchman:1966:ZT b13240. [Tuc66] Barbara W. Tuchman. Tahir:2000:RCM The Zimmermann telegram. MacMillan Publishing Com- [TT00] Farasat Tahir and Muham- pany, New York, NY, USA, mad Tahir. RSA ciphers 1966. xii + 244 pp. LCCN with Maple. Punjab Univ. J. D511 .T77 1966. Reprint of Math. (Lahore), 33:145–152, original 1958 edition. Kahn 2000. ISSN 1016-2526. [Kah96] describes this book as “recount[ing] the politi- Tzeng:2001:PKT cal effects of the most im- portant cryptogram solution [TT01] Wen-Guey Tzeng and Zhi- in history”. Jia Tzeng. A public-key traitor tracing scheme with Turing:2004:BS revocation using dynamic shares. Lecture Notes in [Tur04] Alan M. Turing. Bombe Computer Science, 1992: and Spider. In Copeland 207–??, 2001. CODEN [Cop04b], pages 313–335. LNCSD9. ISSN 0302- ISBN 0-19-825079-7 (hard- 9743 (print), 1611-3349 cover), 0-19-825080-0 (pa- (electronic). URL http: perback). LCCN QA29.T8 //link.springer-ny.com/ E77 2004. URL ftp:// link/service/series/0558/ uiarchive.cso.uiuc.edu/ bibs/1992/19920207.htm; pub/etext/gutenberg/; http://link.springer- http://www.loc.gov/catdir/ ny.com/link/service/series/ toc/fy053/2004275594.html. 0558/papers/1992/19920207. Text prepared by Ralph Er- pdf. skine and Philip Marks and Frode Weierud from the Tian:2001:ICE only two surviving copies of Turing’s typescript. [TTZ01] Jun Tian, Tieniu Tan, and Tiri:2003:SEA Liangpei Zhang, editors. Image compression and en- [TV03] Kris Tiri and Ingrid Ver- cryption technologies: 22– bauwhede. Securing en- 24 October 2001, Wuhan, cryption algorithms against China, volume 4551 of SPIE DPA at the logic level: proceedings series.Society Next generation Smart Card of Photo-optical Instrumen- technology. In Walter tation Engineers (SPIE), et al. [WKP03], pages 125– Bellingham, WA, USA, 136. CODEN LNCSD9. 2001. ISBN 0-8194-4279-8. ISBN 3-540-40833-9. ISSN LCCN TK5105.59 .I43 2001. 0302-9743 (print), 1611- REFERENCES 667

3349 (electronic). LCCN Trappe:2005:ICC TK7895.E42. URL http: //link.springer-ny.com/ [TW05] Wade Trappe and Law- link/service/series/0558/ rence C. Washington. In- tocs/t2779.htm; http: troduction to cryptography: //www.springerlink.com/ with coding theory.Pearson openurl.asp?genre=issue& Prentice Hall, Upper Sad- issn=0302-9743&volume= dle River, NJ, USA, second 2779; http://www.springerlink. edition, 2005. ISBN 0-13- com/openurl.asp?genre= 186239-1. xiv + 577 pp. volume&id=doi:10.1007/ LCCN QA268 .T73 2005. b13240. Talbot:2006:CCI Toft:2001:LTT [TW06a] J. (John) Talbot and

+ D. J. A. Welsh. Cryptogra- [TvdKB 01] George Toft, Hugo van der phy and complexity: an in- Kooij, Mick Bauer, Chris troduction. Cambridge Uni- Hendrickson, Stephanie versity Press, Cambridge, Black, Adrian Ho, Markus UK, 2006. ISBN 0-521- Hogger, Ian Abbott, and 85231-5 (hardcover), 0-521- Robin Rowes. Letters: 61771-5 (paperback). xii + Tech tipsy; awkward solu- 292 pp. LCCN Z103 .T35 tion; Mandrake 7.2 review; 2006. OpenSSH and DSA keys; missed the tripwire; FAT Trappe:2006:ICC problems. Linux Journal, [TW06b] Wade Trappe and Law- 85:6, 126, May 2001. CO- rence C. Washington. In- DEN LIJOFX. ISSN 1075- troduction to Cryptography: 3583 (print), 1938-3827 with Coding Theory.Pear- (electronic). URL http:/ son Prentice Hall, Upper /noframes.linuxjournal. Saddle River, NJ, USA, sec- com/lj-issues/issue85/ ond edition, 2006. ISBN 4646.html. 0-13-186239-1, 0-13-198199- Trappe:2002:ICC 4 (paperback). xiv + 577 pp. LCCN QA268 .T73 2006. [TW02] Wade Trappe and Law- Tsai:2007:TTA rence C. Washington. In- troduction to Cryptography [TW07] Yuh-Ren Tsai and Shiuh- with Coding Theory.Pren- Jeng Wang. Two-tier au- tice-Hall, Inc., Upper Saddle thentication for cluster and River, NJ 07458, USA, 2002. individual sets in mobile ISBN 0-13-061814-4. xiii + ad hoc networks. Com- 490 pp. LCCN QA268 .T73 puter Networks (Amster- 2002. UK£29.99. dam, Netherlands: 1999), REFERENCES 668

51(3):883–900, February 21, Parallel/Distributed Com- 2007. CODEN ???? ISSN puting 2008. SNPD ’08, 1389-1286 (print), 1872- pages 356–361. IEEE Com- 7069 (electronic). puter Society Press, 1109 Spring Street, Suite 300, Tsaur:2005:EUA Silver Spring, MD 20910, [TWL05] Woei-Jiunn Tsaur, Chia- USA, 2008. URL http: Chun Wu, and Wei-Bin //ieeexplore.ieee.org/ Lee. An enhanced user stamp/stamp.jsp?tp=&arnumber= authentication scheme for 4617397. multi-server Internet ser- Tzeng:2004:NTM vices. Applied Mathematics and Computation, 170(1): [TYH04] Shiang-Feng Tzeng, Cheng- 258–266, November 1, 2005. Ying Yang, and Min-Shiang CODEN AMHCBQ. ISSN Hwang. A nonrepudia- 0096-3003 (print), 1873- ble threshold multi-proxy 5649 (electronic). multi-signature scheme with Tiwari:2009:CIF shared verification. Future Generation Computer Sys- [TWM+09] Mohit Tiwari, Hassan M. G. tems, 20(5):887–893, June Wassel, Bita Mazloom, 15, 2004. CODEN FGSEVI. Shashidhar Mysore, Fred- ISSN 0167-739X (print), eric T. Chong, and Timothy 1872-7115 (electronic). Sherwood. Complete infor- mation flow tracking from Ting:2002:FBS the gates up. ACM SIG- PLAN Notices, 44(3):109– [TYLL02] Kurt K. Ting, Steve C. L. 120, March 2009. CODEN Yuen, K. H. Lee, and SINODQ. ISSN 0362-1340 Philip H. W. Leong. An (print), 1523-2867 (print), FPGA based SHA-256 pro- 1558-1160 (electronic). cessor. Lecture Notes in Thamrin:2008:PBR Computer Science, 2438: 577–??, 2002. CODEN [TWNA08] N. M. Thamrin, G. Wit- LNCSD9. ISSN 0302- jaksono, A. Nuruddin, and 9743 (print), 1611-3349 M. S. Abdullah. A photonic- (electronic). URL http: based random number gen- //link.springer-ny.com/ erator for cryptographic link/service/series/0558/ application. In Ninth bibs/2438/24380577.htm; ACIS International Con- http://link.springer- ference on Software En- ny.com/link/service/series/ gineering, Artificial Intel- 0558/papers/2438/24380577. ligence, Networking, and pdf. REFERENCES 669

Tynan:2005:CPA http://ieeexplore.ieee. org/stamp/stamp.jsp?tp= [Tyn05] Dan Tynan. Computer pri- &arnumber=5193698. vacy annoyances: how to Tong:2009:RAPb avoid the most annoying in- vasions of your personal and [TZT09b] Qiaoling Tong, Xuecheng online privacy. O’Reilly Zou, and Hengqing Tong. Media, Inc., 1005 Graven- A RFID authentication pro- stein Highway North, Se- tocol based on infinite di- bastopol, CA 95472, USA, mension pseudo random 2005. ISBN 0-596-00775- number generator for face 2 (paperback). xii + 177 recognition system. In pp. LCCN QA76.9.A25 T96 2009. ICBBE 2009. 3rd In- 2005. ternational Conference on Tian:2005:NDF Bioinformatics and Biomed- ical Engineering, pages 1– [TZDZ05] Junfeng Tian, Weidong 4. IEEE Computer Society Zhao, Ruizhong Du, and Press, 1109 Spring Street, Zhe Zhang. A new data Suite 300, Silver Spring, MD fusion model of intrusion 20910, USA, 2009. URL detection—IDSFM. In Han http://ieeexplore.ieee. et al. [HYZ05b], pages 73– org/stamp/stamp.jsp?tp= ?? ISBN 981-270-153-2. &arnumber=5162237. LCCN ???? URL http:// Uz:2009:MBT eproceedings.worldscinet. com/9812701532/9812701532.[UBEP09] Tamer Uz, George Bebis, 0031.html. Ali Erol, and Salil Prab- hakar. Minutiae-based tem- Tong:2009:RAPa plate synthesis and match- [TZT09a] Qiaoling Tong, Xuecheng ing for fingerprint authen- Zou, and Hengqing Tong. tication. Computer Vi- A RFID authentication sion and Image Understand- protocol based on infi- ing: CVIU, 113(9):979–992, nite dimension pseudo ran- September 2009. CODEN dom number generator. CVIUF4. ISSN 1077-3142 In 2009. CSO 2009. In- (print), 1090-235X (elec- ternational Joint Confer- tronic). ence on Computational Sci- Unay:2008:SQE ences and Optimization,vol- ume 1, pages 292–294. IEEE [UG08]¨ Ozan Unay¨ and Taflan I. Computer Society Press, G¨undem. A survey on 1109 Spring Street, Suite querying encrypted XML 300, Silver Spring, MD documents for databases 20910, USA, 2009. URL as a service. SIGMOD REFERENCES 670

Record (ACM Special In- ington, DC, USA, 2000. terest Group on Manage- ISBN 0-16-060340-4, 0-16- ment of Data), 37(1):12– 060340-4. iii + 102 pp. 20, March 2008. CODEN LCCN KF27.I53 106th. SRECD8. ISSN 0163-5808 (print), 1943-5835 (elec- USHCAS:2000:UEP tronic). [Uni00b] United States Congress.House Uchida:2009:FPR Committee on Armed Ser- [UHA+09] A. Uchida, T. Honjo, vices. U.S. encryption K. Amano, K. Hirano, policy: hearing before the H. Someya, H. Okumura, Committee on Armed Ser- S. Yoshimori, K. Yoshimura, vices, House of Repre- P. Davis, and Y. Tokura. sentatives, One Hundred Fast physical random bit Sixth Congress, first ses- generator based on chaotic sion: hearings held July 1, semiconductor lasers: Ap- 13, 1999. Washington, DC, plication to quantum cryp- USA, 2000. iv + 195 pp. tography. In Lasers and H.A.S.C. no. 106-16. Electro-Optics 2009 and the USHCIR:2000:HES European Quantum Elec- tronics Conference. CLEO Europe - EQEC 2009. Euro- [Uni00c] United States Congress.House pean Conference on, page 1. Committee on International IEEE Computer Society Relations. 106-1 Hearing: Press, 1109 Spring Street, Encryption Security in a Suite 300, Silver Spring, MD High Tech Era, May 18, 20910, USA, 2009. URL 1999. Washington, DC, http://ieeexplore.ieee. USA, 2000. Shipping List #: org/stamp/stamp.jsp?tp= 2000-0319-P. Shipping List &arnumber=5192510. Date: 07/31/2000. USC:2000:HRS USHCIR:2000:MHS [Uni00a] United States Congress. H.R. 850, the Security and [Uni00d] United States Congress.House Freedom through Encryption Committee on International (SAFE) Act: Markup before Relations. 106-1 Markup: the Committee on Interna- H.R. 850, The Security And tional Relations, House of Freedom Through Encryp- Representatives, One Hun- tion (SAFE) Act, July 13, dred Sixth Congress, first 1999. Washington, DC, session, Tuesday, July 13, USA, 2000. Shipping List #: 1999. United States Govern- 2000-0214-P. Shipping List ment Printing Office, Wash- Date: 04/20/2000. REFERENCES 671

USHCIR:2000:HSF Serial No. 34, March 4, 1999. Washington, DC, [Uni00e] United States Congress.House USA, 2000. Shipping List #: Committee on International 2000-0275-P. Shipping List Relations. H.R. 850, the Se- Date: 06/21/2000. curity and Freedom through Encryption (SAFE) Act: USHCJ:2000:SFT markup before the Commit- tee on International Re- [Uni00h] United States Congress.House lations, House of Repre- Committee on the Ju- sentatives, One Hundred diciary.Subcommittee on Sixth Congress, first ses- Courts and Intellectual sion, Tuesday, July 13, Property. Security and 1999. Washington, DC, Freedom through Encryp- USA, 2000. iii + 102 pp. tion (SAFE) Act: hear- Shipping list no.: 2000- ing before the Subcommittee 0214-P. on Courts and Intellectual Property of the Committee USHCIR:2000:ESH on the Judiciary, House of Representatives, One Hun- [Uni00f] United States Congress.House dred Sixth Congress, first Committee on International session, on H.R. 850, March Relations.Subcommittee on 4, 1999. Washington, DC, International Economic Pol- USA, 2000. iv + 169 pp. Se- icy and Trade. Encryption rial no. 34. Shipping list no.: securityinahightechera: 2000-0275-P. hearing before the Subcom- mittee on International Eco- USPTO:2001:CCP nomic Policy and Trade of the Committee on Interna- [Uni01] United States Patent and tional Relations, House of Trademark Office. Class 380 Representatives, One Hun- — Cryptography, Patent dred Sixth Congress, first Classification Definitions, session, Tuesday, May 18, Patent and Trademark Of- 1999. Washington, DC, fice, U.S. Dept. of Com- USA, 2000. iii + 60 pp. merce, December 1999. Serial no. 106-108. Shipping Washington, DC, USA, list no.: 2000-0319-P. 2001. Shipping List #: 2001-0468-M. Shipping List USHCJ:2000:HSF Date: 08/31/2001.

[Uni00g] United States Congress.House Uhl:2005:IVE Committee on the Judi- ciary. 106-1 Hearing: Secu- [UP05] Andreas Uhl and Andreas rity And Freedom Through Pommer. Image and video Encryption, (SAFE) Act, encryption: from digital REFERENCES 672

rights management to se- USA. USENIX, Berkeley, cured personal communi- CA, USA, 2000. ISBN 1- cation,volume15ofAd- 880446-19-7. LCCN ???? vances in information se- URL http://db.usenix. curity. Springer-Verlag, org/publications/library/ Berlin, Germany / Heidel- proceedings/lisa-nt2000/ berg, Germany / London, . UK / etc., 2005. ISBN 0- USENIX:2000:PFW 387-23402-0. xvi + 161 pp. LCCN TA1637 .U72 2005. [USE00b] USENIX, editor. Proceed- Urban:2001:MWB ings of the First Work- shop on Industrial Expe- [Urb01] Mark Urban. The Man Who riences with Systems Soft- Broke Napoleon’s Codes. ware (WIESS 2000), Oc- Faber and Faber, London, tober 22, 2000, Paradise UK, 2001. ISBN 0-571- Point Resort, San Diego, 20513-5. xiv + 333 pp. California, USA. USENIX, LCCN DC232.U73 2001. Berkeley, CA, USA, 2000. UK£16.99. ISBN 1-880446-15-4. LCCN Urien:2001:PIS QA76.76.S95 W67 2000. URL http://www.usenix. [Uri01] Pascal Urien. Program- org/publications/library/ ming Internet smartcard proceedings/osdi2000/wiess2000/ with XML scripts. Lecture . Notes in Computer Science, USENIX:2000:PFSa 2140:228–??, 2001. CO- DEN LNCSD9. ISSN 0302- [USE00c] USENIX, editor. Proceed- 9743 (print), 1611-3349 ings of the Fourteenth Sys- (electronic). URL http: tems Administration Con- //link.springer-ny.com/ ference (LISA XIV), De- link/service/series/0558/ cember 3–8, 2000, New bibs/2140/21400228.htm; Orleans, Louisiana, USA. http://link.springer- USENIX, Berkeley, CA, ny.com/link/service/series/ USA, 2000. ISBN 1-880446- 0558/papers/2140/21400228. 13-8. LCCN ???? URL pdf. http://www.usenix.org/ publications/library/proceedings/ USENIX:2000:PLI lisa2000/technical.html. [USE00a] USENIX, editor. Proceed- USENIX:2000:PNU ings of the 3rd Large Instal- lation System Administra- [USE00d] USENIX, editor. Proceed- tion of Windows NT/2000 ings of the Ninth USENIX Conference: August 1–2, Security Symposium, Au- 2000, Seattle, Washington, gust 14–17, 2000, Denver, REFERENCES 673

Colorado. USENIX, Berke- Berkeley, CA, USA, 2001. ley, CA, USA, 2000. ISBN ISBN 1-880446-18-9, 1- 1-880446-18-9. LCCN ???? 880446-07-3. LCCN QA76.9.A25 URL http://www.usenix. U565 2001. URL http:// org/publications/library/ www.usenix.org/publications/ proceedings/sec2000. library/proceedings/sec01/ technical.html. USENIX:2001:PUA USENIX:2002:PBF [USE01a] USENIX, editor. Proceed- ings of the 2001 USENIX [USE02a] USENIX, editor. Pro- Annual Technical Confer- ceedings of BSDCon 2002: ence: June 25–30, 2001, February 11–14, 2002, Marriott Copley Place Ho- CathedralHillHotel,San tel, Boston, Massachusetts, Francisco, CA. USENIX, USA. USENIX, Berkeley, Berkeley, CA, USA, 2002. CA, USA, 2001. ISBN ISBN 1-880446-02-2. LCCN 1-880446-09-X. LCCN QA76.76.O63 B736 2002. QA76.8.U65 U84 2001. URL URL http://www.usenix. http://www.usenix.org/ org/publications/library/ publications/library/proceedings/ proceedings/bsdcon02/tech. usenix01/technical.html. html. USENIX:2001:PFT USENIX:2002:PUS [USE01b] USENIX, editor. Proceed- [USE02b] USENIX, editor. Proceed- ings of the FREENIX Track: ings of the 11th USENIX Se- 2001 USENIX Annual Tech- curity Symposium 2002, Au- nical Conference: June 25– gust 5–9, 2002, San Fran- 30, 2001, Marriott Copley cisco, CA. USENIX, Berke- Place Hotel, Boston, Mas- ley, CA, USA, 2002. ISBN sachusetts, USA. USENIX, 1-931971-00-5. LCCN ???? Berkeley, CA, USA, 2001. URL http://www.usenix. ISBN 1-880446-10-3. LCCN org/publications/library/ QA76.8.U65 U84 2001. URL proceedings/sec02/. http://www.usenix.org/ USENIX:2002:PFT publications/library/proceedings/ usenix01/freenix01/technical.[USE02c] USENIX, editor. Proceed- html. ings of the FREENIX Track: USENIX:2001:PTU 2002 USENIX Annual Tech- nical Conference, June 10– [USE01c] USENIX, editor. Proceed- 15, 2002, Monterey, Cal- ings of the Tenth USENIX ifornia, USA. USENIX, Security Symposium, Au- Berkeley, CA, USA, 2002. gust 13–17, 2001, Washing- ISBN 1-880446-01-4. LCCN ton, DC, USA. USENIX, QA76.8.U65 P765 2002. REFERENCES 674

URL http://www.usenix. In Applied algebra, alge- org/publications/library/ braic algorithms and error- proceedings/usenix02/. correcting codes (Melbourne, 2001), volume 2227 of Utami:2002:FID Lecture Notes in Comput. [USS02] Dewi Utami, Hadi Suwastio, Sci., pages 278–286. Spring- and Bambang Sumadjudin. er-Verlag, Berlin, Ger- FPGA implementation of many / Heidelberg, Ger- digital chaotic cryptogra- many / London, UK / phy. Lecture Notes in etc., 2001. URL http: Computer Science, 2510: //link.springer-ny.com/ 239–??, 2002. CODEN link/service/series/0558/ LNCSD9. ISSN 0302-9743 bibs/2227/22270278.htm; (print), 1611-3349 (elec- http://link.springer- tronic). URL http:// ny.com/link/service/series/ link.springer.de/link/ 0558/papers/2227/22270278. service/series/0558/bibs/ pdf. 2510/25100239.htm; http: Ulfving:2000:GS //link.springer.de/link/ service/series/0558/papers/[UW00] Lars Ulfving and Frode 2510/25100239.pdf. Weierud. The Geheim- schreiber secret. In Joyner Urien:2001:XS [Joy00], page ?? ISBN 3- [UST01a] P. Urien, H. Saleh, and 540-66336-3 (softcover), 3- A. Tizraoui. XML smart- 642-59663-0 (e-book). LCCN cards. Lecture Notes in QA268 .C67 1999. UK£44.50. Computer Science, 2093: URL http://frode.home. 811–??, 2001. CODEN cern.ch/frode/pubs/cryptoday. LNCSD9. ISSN 0302- pdf. Proceedings of the 9743 (print), 1611-3349 Conference on Coding The- (electronic). URL http: ory, Cryptography and //link.springer-ny.com/ Number Theory held at the link/service/series/0558/ U.S. Naval Academy during bibs/2093/20930811.htm; October 25–26, 1998. http://link.springer- Uzun:2004:BRC ny.com/link/service/series/ 0558/papers/2093/20930811.[Uzu04] Isa Servan Uzun. Book pdf. review: Cryptographic Se- Ustimenko:2001:CGT curity Architecture—Design and Verification,byPe- [Ust01b] Vasyl Ustimenko. CRYP- ter Gutmann. The Com- TIM: Graphs as tools puter Journal, 47(5):622– for symmetric encryption. 623, September 2004. CO- REFERENCES 675

DEN CMPJA6. ISSN 2729; http://www.springerlink. 0010-4620 (print), 1460- com/openurl.asp?genre= 2067 (electronic). URL volume&id=doi:10.1007/ http://www3.oup.co.uk/ b11817. computer_journal/free_ Vanstone:2003:NGS pdf/470622a.pdf; http: //www3.oup.co.uk/computer_[Van03] S. A. Vanstone. Next gen- journal/hdb/Volume_47/ eration security for wireless: Issue_05/470622a.sgm.abs. elliptic curve cryptography. html. Computers & Security,22 Vacca:2006:GWN (5):412–415, July 2003. CO- DEN CPSEDU. ISSN 0167- [Vac06] John R. Vacca. Guide 4048 (print), 1872-6208 to wireless network secu- (electronic). URL https:/ rity,volume20ofAd- /www.sciencedirect.com/ vances in information se- science/article/pii/S0167404803005078. curity. Springer-Verlag, Berlin, Germany / Heidel- Vaudenay:2001:DID berg, Germany / London, UK / etc., 2006. ISBN 0- [Vau01] Serge Vaudenay. Decorrela- 387-95425-2. xxii + 848 tion over infinite domains: pp. LCCN QA76.9.A25 C66 The encrypted CBC–MAC 2006. URL http://www. case. Lecture Notes in loc.gov/catdir/enhancements/ Computer Science, 2012: fy0663/2005939009-d.html. 189–??, 2001. CODEN LNCSD9. ISSN 0302- Vadhan:2003:CLC 9743 (print), 1611-3349 [Vad03] Salil P. Vadhan. On con- (electronic). URL http: structing locally computable //link.springer-ny.com/ extractors and cryptosys- link/service/series/0558/ tems in the bounded stor- bibs/2012/20120189.htm; age model. In Boneh http://link.springer- [Bon03], pages 61–77. CO- ny.com/link/service/series/ DEN LNCSD9. ISBN 3-540- 0558/papers/2012/20120189. . 40674-3. ISSN 0302-9743 pdf (print), 1611-3349 (elec- Vaudenay:2002:SFI tronic). LCCN QA76.9.A25 C79 2003. URL http: [Vau02] Serge Vaudenay. Secu- //link.springer-ny.com/ rity flaws induced by CBC link/service/series/0558/ padding — applications tocs/t2729.htm; http: to SSL, IPSEC, WTLS //www.springerlink.com/ .... Lecture Notes in openurl.asp?genre=issue& Computer Science, 2332: issn=0302-9743&volume= 534–??, 2002. CODEN REFERENCES 676

LNCSD9. ISSN 0302- communications over in- 9743 (print), 1611-3349 secure channels based on (electronic). URL http: short authenticated strings. //link.springer-ny.com/ In Shoup [Sho05a], pages link/service/series/0558/ 309–?? ISBN 3-540- bibs/2332/23320534.htm; 28114-2. ISSN 0302-9743 http://link.springer- (print), 1611-3349 (elec- ny.com/link/service/series/ tronic). LCCN QA76.9.A25 0558/papers/2332/23320534. C79 2005; QA76.9 .A25; pdf. QA76.9 C79 2005; QA76.9 C794 2005; QA76.9; In- Vaudenay:2005:PKC ternet. URL http:/ [Vau05a] Serge Vaudenay, editor. /www.springerlink.com/ Public key cryptography — openurl.asp?genre=issue& PKC 2005: 8th Interna- issn=0302-9743&volume= tional Workshop on The- 3621. ory and Practice in Public Vavriv:2003:RNG Key Cryptography, Les Di- ablerets, Switzerland, Jan- [Vav03] D. D. Vavriv. Ran- uary 23–26, 2005: Proceed- dom number generators on ings, volume 3386 of Lecture the basis of systems with Notes in Computer Science. chaotic behavior. AIP Springer-Verlag, Berlin, Conference Proceedings, 676 Germany / Heidelberg, Ger- (1):373, 2003. CODEN many / London, UK / etc., APCPCS. ISSN 0094-243X 2005. CODEN LNCSD9. (print), 1551-7616 (elec- ISBN 3-540-24454-9 (pa- tronic), 1935-0465. URL perback). ISSN 0302-9743 http://link.aip.org/link/ (print), 1611-3349 (elec- ?APC/676/373/1. tronic). LCCN QA76.9.A25 Vlachos:2009:OPV I567 2005. URL http:// springerlink.metapress. [VAVY09] Michail Vlachos, Aris Anag- com/openurl.asp?genre= nostopoulos, Olivier Ver- issue&issn=0302-9743&volume= scheure, and Philip S. Yu. 3386; http://www.springerlink. Online pairing of VoIP con- com/openurl.asp?genre= versations. VLDB Jour- issue&issn=0302-9743&volume= nal: Very Large Data Bases, 3386; http://www.springerlink. 18(1):77–98, January 2009. com/openurl.asp?genre= CODEN VLDBFR. ISSN volume&id=doi:10.1007/ 1066-8888 (print), 0949- b105124. 877X (electronic). Vaudenay:2005:SCI Voloshynovskiy:2005:ITD [Vau05b] Serge Vaudenay. Secure [VDKP05] Sviatoslav Voloshynovskiy, REFERENCES 677

Frederic Deguillaume, Olek- Verheul:2001:EXM siy Koval, and Thierry Pun. Information-theoretic data- [Ver01] Eric R. Verheul. Evidence hiding: Recent achieve- that XTR is more secure ments and open problems. than supersingular elliptic International Journal of Im- curve cryptosystems. Lec- age and Graphics (IJIG),5 ture Notes in Computer Sci- (1):5–??, January 2005. CO- ence, 2045:195–210, 2001. DEN ???? ISSN 0219-4678. CODEN LNCSD9. ISSN 0302-9743 (print), 1611- vanDijk:2006:ICS 3349 (electronic). Vercauteren:2002:CZF [vDKST06] Marten van Dijk, Tom Kevenaar, Geert-Jan Schri- [Ver02] Frederik Vercauteren. Com- jen, and Pim Tuyls. Im- puting zeta functions of hy- proved constructions of se- perelliptic curves over fi- cret sharing schemes by ap- nite fields of characteristic plying (λ, ω)-decompositions. 2. In Yung [Yun02a], pages Information Processing Let- 369–384. CODEN LNCSD9. ters, 99(4):154–157, August ISBN 3-540-44050-X (pa- 31, 2006. CODEN IF- perback). ISSN 0302-9743 PLAT. ISSN 0020-0190 (print), 1611-3349 (elec- (print), 1872-6119 (elec- tronic). LCCN QA76.9.A25 tronic). C79 2002. URL http:/ /link.springer.de/link/ vanDijk:2004:AOC service/series/0558/bibs/ 2442/24420369.htm; http: [vDW04] Marten van Dijk and David //link.springer.de/link/ Woodruff. Asymptotically service/series/0558/papers/ optimal communication for 2442/24420369.pdf. torus-based cryptography. Vergnaud:2006:RBS In Franklin [Fra04], pages 157–?? CODEN LNCSD9. [Ver06a] Damien Vergnaud. RSA- ISBN 3-540-22668-0. ISSN based secret handshakes. In 0302-9743 (print), 1611- Ytrehus [Ytr06], pages 252– 3349 (electronic). LCCN 274. ISBN 3-540-35481- 10.1007/b99099. URL 6. LCCN QA76.9.A25 I557 http://www.springerlink. 2005. com/openurl.asp?genre= Vernitski:2006:CUM issue&issn=0302-9743&volume= 3152; http://www.springerlink.[Ver06b] Alexei Vernitski. Can com/openurl.asp?genre= unbreakable mean incom- volume&id=doi:10.1007/ putable? The Com- b99099. puter Journal, 49(1):108– REFERENCES 678

112, January 2006. CODEN basedondigitalwater- CMPJA6. ISSN 0010-4620 marking. Lecture Notes (print), 1460-2067 (elec- in Computer Science, 2137: tronic). URL http:// 330–??, 2001. CODEN comjnl.oxfordjournals. LNCSD9. ISSN 0302- org/cgi/content/abstract/ 9743 (print), 1611-3349 49/1/108; http://comjnl. (electronic). URL http: oxfordjournals.org/cgi/ //link.springer-ny.com/ content/full/49/1/108; link/service/series/0558/ http://comjnl.oxfordjournals. bibs/2137/21370330.htm; org/cgi/reprint/49/1/108. http://link.springer- ny.com/link/service/series/ Vladimirov:2004:WFS 0558/papers/2137/21370330. [VGM04] Andrew A. Vladimirov, pdf. Konstantin V. Gavrilenko, Viroli:2003:TPA and Andrei A. Mikhailovsky. Wi-Foo: The Secrets of [Vir03] Mirko Viroli. A type- Wireless Hacking. Addi- passing approach for the im- son-Wesley, Reading, MA, plementation of paramet- USA, 2004. ISBN 0-321- ric methods in Java. The 20217-1. xxvii + 555 Computer Journal, 46(3): pp. LCCN TK5105.59 263–294, May 2003. CO- .V53 2004. URL http:// DEN CMPJA6. ISSN www.awprofessional.com/ 0010-4620 (print), 1460- title/0321202171. 2067 (electronic). URL Vassev:2009:STA http://www3.oup.co.uk/ computer_journal/hdb/Volume_ [VH09] Emil Vassev and Mike 46/Issue_03/460263.sgm. Hinchey. Software technolo- abs.html; http://www3. gies: ASSL: a software en- oup.co.uk/computer_journal/ gineering approach to au- hdb/Volume_46/Issue_03/ tonomic computing. Com- pdf/460263.pdf. puter, 42(6):90–93, June 2009. CODEN CPTRB4. Vixie:2002:SRR ISSN 0018-9162 (print), [Vix02] Paul A. Vixie. Spam 1558-0814 (electronic). — roles and responsi- Voloshynovskiy:2001:BDA bilities, 2002. URL http://www.usenix.org/ [VHP01] Sviatoslav Voloshynovskiy, publications/library/proceedings/ Alexander Herrigel, and bsdcon02/tech.html.Un- Thierry Pun. Blur/ published invited talk, BS- deblur attack against doc- DCON2002: Growing the ument protection systems BSD Community, February REFERENCES 679

11–14, 2002, Cathedral Hill Signal Processing, pages 1– Hotel, San Francisco, CA. 4. IEEE Computer Society Press, 1109 Spring Street, Vural:2007:IND Suite 300, Silver Spring, MD [VK07] Cabir Vural and Serap 20910, USA, 2009. URL Kazan. Image normaliza- http://ieeexplore.ieee. tion and discrete wavelet org/stamp/stamp.jsp?tp= transform based robust dig- &arnumber=5201107. ital image watermarking. Viega:2003:SPC In Simos and Maroulis [SM07b], pages 1404–1407. [VM03] John Viega and Matt ISBN 0-7354-0476-3 (set), Messier. Secure program- 0-7354-0477-1 (vol. 1), 0- ming cookbook for C and 7354-0478-X (vol. 2). ISSN C++: Recipes for cryptog- 0094-243X (print), 1551- raphy, authentication, net- 7616 (electronic), 1935- working, input validation 0465. LCCN Q183.9 and more. O’Reilly & As- .I524 2007. URL http: sociates, Inc., 103a Mor- //proceedings.aip.org/ ris Street, Sebastopol, CA getpdf/servlet/GetPDFServlet? 95472, USA, Tel: +1 707 filetype=pdf& id= 829 0515, and 90 Sher- APCPCS000963000002001404000001& man Street, Cambridge, MA amp; idtype=cvips. 02140, USA, Tel: +1 617 354 5800, 2003. ISBN 0- Vo:2008:SMA 596-00394-3. xxv + 762 [VK08] Duc-Liem Vo and Kwangjo pp. LCCN QA76.73.C15 Kim. A secure mutual au- V53 2003. thentication scheme with Viega:2002:NSO key agreement using smart card from bilinear pair- [VMC02] John Viega, Matt Messier, ings. International Journal and Pravir Chandra. Net- of Computer Systems Sci- work Security with OpenSSL: ence and Engineering,23 Cryptography for Secure (3):??, May 2008. CODEN Communications. O’Reilly CSSEEI. ISSN 0267-6192. & Associates, Inc., 103a Morris Street, Sebastopol, Volos:2009:IEP CA 95472, USA, Tel: +1 [VKS09] C. K. Volos, I. M. Kypri- 707 829 0515, and 90 Sher- anidis, and I. N. Stoubou- man Street, Cambridge, MA los. Image encryption pro- 02140, USA, Tel: +1 617 cess based on a chaotic 354 5800, 2002. ISBN 0- True Random Bit Genera- 596-00270-X. xiv + 367 tor. In 2009 16th Interna- pp. LCCN TK5105.59 .V54 tional Conference on Digital 2002. US$39.95. URL REFERENCES 680

http://safari.oreilly. Voice:2005:OAM com/059600270X; http: //www.oreilly.com/catalog/[Voi05] Chris Voice. Online au- openssl. thentication: matching se- curity levels to the risk. Net- Vasco:2005:NCS work Security, 2005(12):15– 18, December 2005. CO- [VMSV05] Mar´ıa Isabel Gonz´alez DEN NTSCF5. ISSN 1353- Vasco, Consuelo Mart´ınez, 4858 (print), 1872-9371 Rainer Steinwandt, and (electronic). URL http:/ Jorge L. Villar. A new /www.sciencedirect.com/ Cramer–Shoup like method- science/article/pii/S1353485805703159. ology for group based provably secure encryp- vanOorschot:2008:PMU tion schemes. In Kil- ian [Kil05], pages 495– [vOT08] P. C. van Oorschot and Julie ?? CODEN LNCSD9. Thorpe. On predictive mod- ISBN 3-540-24573-1 (soft- els and user-drawn graphi- cover). ISSN 0302-9743 cal passwords. ACM Trans- (print), 1611-3349 (elec- actions on Information and tronic). LCCN QA76.9.A25 System Security, 10(4):5:1– 5:??, January 2008. CODEN T44 2005. URL http: ATISBQ. ISSN 1094-9224 //www.springerlink.com/ (print), 1557-7406 (elec- openurl.asp?genre=issue& tronic). issn=0302-9743&volume= 3378; http://www.springerlink. vanOorschot:2007:IRS com/openurl.asp?genre= volume&id=doi:10.1007/ [vOWK07] P. C. van Oorschot, Tao b106171. Wan, and Evangelos Kranakis. On interdomain routing se- Vaughan-Nichols:2004:VAS curity and pretty secure [VN04] Steven J. Vaughan-Nichols. BGP (psBGP). ACM Voice authentication speaks Transactions on Informa- to the marketplace. Com- tion and System Security, puter, 37(3):13–??, March 10(3):11:1–11:??, July 2007. 2004. CODEN CP- CODEN ATISBQ. ISSN TRB4. ISSN 0018-9162 1094-9224 (print), 1557- (print), 1558-0814 (elec- 7406 (electronic). tronic). URL http:/ Vogt:2001:USC /csdl.computer.org/dl/ mags/co/2004/03/r3013. [VPG01] Holger Vogt, Henning Pag- htm; http://csdl.computer. nia, and Felix C. G¨artner. org/dl/mags/co/2004/03/ Using smart cards for fair r3013.pdf. exchange. Lecture Notes REFERENCES 681

in Computer Science, 2232: Fundamentals of cryptology: 101–??, 2001. CODEN a professional reference and LNCSD9. ISSN 0302- interactive tutorial,volume 9743 (print), 1611-3349 SECS 528 of The Kluwer in- (electronic). URL http: ternational series in engi- //link.springer-ny.com/ neering and computer sci- link/service/series/0558/ ence. Kluwer Academic bibs/2232/22320101.htm; Publishers, Dordrecht, The http://link.springer- Netherlands, 2000. ISBN ny.com/link/service/series/ 0-7923-8675-2. xiv + 490 0558/papers/2232/22320101. pp. LCCN QA76.9.A25 T53 pdf. 2000 Accompanying CD- Rom shelved in Reserves. Vasco:2001:CPK vanTilborg:2001:ECC [VS01] Mar´ıa Isabel Gonz´alez Vasco and Rainer Stein- [vT01] Henk van Tilborg. Ellip- wandt. Clouds over a pub- tic curve cryptosystems; too lic key cryptosystem based good to be true? Nieuw on Lyndon words. In- Arch. Wiskd. (5), 2(3):220– formation Processing Let- 225, 2001. ISSN 0028-9825. ters, 80(5):239–242, Decem- ber 15, 2001. CODEN IF- vanTilborg:2005:ECS PLAT. ISSN 0020-0190 (print), 1872-6119 (elec- [vT05] Henk C. A. van Tilborg, editor. Encyclopedia of tronic). URL http://www. cryptography and security. elsevier.com/gej-ng/10/ Springer-Verlag, Berlin, 23/20/84/36/30/abstract. Germany / Heidelberg, Ger- html. many / London, UK / etc., Voyiatzis:2008:SFS 2005. ISBN 0-387-23473- [VS08] Artemios G. Voyiatzis and X (hardcover). x + 684 Dimitrios N. Serpanos. The pp. LCCN Z103 .E53 2005. security of the Fiat–Shamir US$299.00. scheme in the presence of Vaudenay:2007:POK transient hardware faults. ACM Transactions on Em- [VV07] Serge Vaudenay and Mar- bedded Computing Systems, tin Vuagnoux. Passive- 7(3):31:1–31:??, April 2008. only key recovery attacks on CODEN ???? ISSN RC4. In Carlisle Adams, Ali 1539-9087 (print), 1558- Miri, and Michael Wiener, 3465 (electronic). editors, Selected areas in cryptography: 14th interna- vanTilborg:2000:FCP tional workshop, SAC 2007, [vT00] Henk C. A. van Tilborg. Ottawa, Canada, August REFERENCES 682

16–17, 2007, revised se- //link.springer-ny.com/ lected papers, volume 4876 link/service/series/0558/ of Lecture Notes in Com- bibs/2260/22600044.htm; puter Science, pages 344– http://link.springer- 359. Springer-Verlag, Berlin, ny.com/link/service/series/ Germany / Heidelberg, Ger- 0558/papers/2260/22600044. many / London, UK / etc., pdf. 2007. ISBN 3-540-77359-2 (softcover). LCCN QA76.9 Vaudenay:2001:SAC 2007. URL http://www. [VY01] Serge Vaudenay and Amr M. loc.gov/catdir/enhancements/ Youssef, editors. Selected fy0826/2007941250-d.html. Areas in Cryptography: 8th Venkatesan:2001:GTA Annual International Work- shop, SAC 2001, Toronto, [VVS01] Ramarathnam Venkatesan, Ontario, Canada, August Vijay Vazirani, and Saurabh 16–17, 20001: proceed- Sinha. A graph theoretic ings, volume 2259 of Lec- approach to software wa- ture Notes in Computer termarking. Lecture Notes Science. Springer-Verlag, in Computer Science, 2137: Berlin, Germany / Hei- 157–??, 2001. CODEN delberg, Germany / Lon- LNCSD9. ISSN 0302- don, UK / etc., 2001. 9743 (print), 1611-3349 ISBN 3-540-43066-0. LCCN (electronic). URL http: QA76.9.A25 S22 2001. //link.springer-ny.com/ Whittaker:2006:HBW link/service/series/0558/ bibs/2137/21370157.htm; [WA06] James A. Whittaker and http://link.springer- Mike Andrews. How to ny.com/link/service/series/ break Web software: func- 0558/papers/2137/21370157. tional and security test- pdf. ing of Web applications and Web services. Addi- vonWillich:2001:TIT son-Wesley, Reading, MA, [vW01] Manfred von Willich. A USA, 2006. ISBN 0-321- technique with an information- 36944-0 (paperback). ???? theoretic basis for protect- pp. LCCN QA76.76.T48 ing secret data from differ- W485 2006. URL http:// ential power attacks. Lec- www.loc.gov/catdir/toc/ ture Notes in Computer Sci- ecip064/2005034913.html. ence, 2260:44–??, 2001. CO- Woody:2007:COS DEN LNCSD9. ISSN 0302- 9743 (print), 1611-3349 [WA07] Carol Woody and Christo- (electronic). URL http: pher Alberts. Consid- REFERENCES 683

ering operational security ATSMER. ISSN 1049-331X risk during system devel- (print), 1557-7392 (elec- opment. IEEE Security & tronic). URL http://www. Privacy, 5(1):30–35, Jan- acm.org/pubs/articles/ uary/February 2007. CO- journals/tosem/2000-9- DEN ???? ISSN 1540-7993 4/p341-wallach/p341-wallach. (print), 1558-4046 (elec- pdf; http://www.acm. tronic). org/pubs/citations/journals/ tosem/2000-9-4/p341-wallach/ Weitzner:2008:IA . [WABL+08] Daniel J. Weitzner, Harold Wagner:2000:CYL Abelson, Tim Berners-Lee, [Wag00] David Wagner. Cryptanaly- Joan Feigenbaum, James sis of the Yi-Lam hash. Lec- Hendler, and Gerald Jay ture Notes in Computer Sci- Sussman. Information ac- ence, 1976:483–488, 2000. countability. Communica- CODEN LNCSD9. ISSN tions of the Association for 0302-9743 (print), 1611- Computing Machinery,51 3349 (electronic). (6):82–87, June 2008. CO- DEN CACMA2. ISSN Wagner:2002:GBP 0001-0782 (print), 1557- 7317 (electronic). [Wag02] David Wagner. A gen- eralized birthday problem: Wachsmann:2005:CAK (extended abstract). In Yung [Yun02a], pages 288– [Wac05] Alf Wachsmann. Central- 303. CODEN LNCSD9. ized authentication with ISBN 3-540-44050-X (pa- Kerberos 5, Part I. Linux perback). ISSN 0302-9743 Journal, 2005(130):6, Febru- (print), 1611-3349 (elec- ary 2005. CODEN LI- tronic). LCCN QA76.9.A25 JOFX. ISSN 1075-3583 C79 2002. URL http: (print), 1938-3827 (elec- //link.springer-ny.com/ tronic). link/service/series/0558/ Wallach:2000:SSM tocs/t2442.htm; http: //www.springerlink.com/ [WAF00] Dan S. Wallach, Andrew W. openurl.asp?genre=issue& Appel, and Edward W. Fel- issn=0302-9743&volume= ten. SAFKASI: a security 2442. mechanism for language- Wagstaff:2003:CNT based systems. ACM Transactions on Software [Wag03] Samuel S. Wagstaff, Jr. Engineering and Method- Cryptanalysis of number ology, 9(4):341–378, Oc- theoretic ciphers.Com- tober 2000. CODEN putational mathematics. REFERENCES 684

Chapman and Hall/CRC, some potentially insecure Boca Raton, FL, USA, RSA moduli. Lecture Notes 2003. ISBN 1-58488- in Computer Science, 2271: 153-4. xv + 318 pp. 30–??, 2001. CODEN LCCN QA76.9.A25 W33 LNCSD9. ISSN 0302- 2003. URL http://www. 9743 (print), 1611-3349 loc.gov/catdir/enhancements/ (electronic). URL http: fy0646/2002034919-d.html. //link.springer-ny.com/ link/service/series/0558/ Walsh:2000:BRM bibs/2271/22710030.htm; [Wal00] Gary Walsh. Book re- http://link.springer- view: The Mathematics ny.com/link/service/series/ of Ciphers, Number The- 0558/papers/2271/22710030. ory and RSA Cryptography. pdf. Mathematics of Compu- tation, 69(231):1314–1315, Walter:2003:STM July 2000. CODEN MCM- [Wal03] Colin D. Walter. Seeing PAF. ISSN 0025-5718 through MIST given a small (paper), 1088-6842 (elec- fraction of an RSA pri- tronic). URL http:// vate key. In Joye [Joy03b], www.ams.org/mcom/2000- pages 391–402. CODEN 69-231/S0025-5718-00-01249- LNCSD9. ISBN 3-540- 7/bookrev-S0025-5718-00- 00847-0. ISSN 0302-9743 01249-7.html; http:/ (print), 1611-3349 (elec- /www.ams.org/mcom/2000- tronic). LCCN QA76.9.A25 69-231/S0025-5718-00-01249- C822 2003. URL http: 7/S0025-5718-00-01249- //link.springer-ny.com/ 7.dvi; http://www.ams. link/service/series/0558/ org/mcom/2000-69-231/S0025- tocs/t2612.htm; http: 5718-00-01249-7/S0025- //www.springerlink.com/ 5718-00-01249-7.pdf; openurl.asp?genre=issue& http://www.ams.org/mcom/ issn=0302-9743&volume= 2000-69-231/S0025-5718- 2612. 00-01249-7/S0025-5718- 00-01249-7.ps; http:/ Wallich:2004:EEI /www.ams.org/mcom/2000- 69-231/S0025-5718-00-01249-[Wal04] P. Wallich. Electrical 7/S0025-5718-00-01249- engineering’s identity cri- 7.tex. sis — when does a vast Walter:2001:PBM and vital profession be- come unrecognizably dif- [Wal01] Colin D. Walter. Pre- fuse? IEEE Spectrum,41 cise bounds for Montgomery (11):66–73, November 2004. modular multiplication and CODEN IEESAM. ISSN REFERENCES 685

0018-9235 (print), 1939- Computation, 164(1):99– 9340 (electronic). 116, May 5, 2005. CODEN AMHCBQ. ISSN 0096-3003 Wallich:2009:SGP (print), 1873-5649 (elec- [Wal09] P. Wallich. The supercom- tronic). puter goes personal. IEEE Wardlaw:2000:RPK Spectrum, 46(4):64, April 2009. CODEN IEESAM. [War00] William P. Wardlaw. The ISSN 0018-9235 (print), RSA public key cryptosys- 1939-9340 (electronic). tem. In Coding theory and cryptography (Annapo- Wang:2004:AWA lis, MD, 1998), pages 101– 123. Springer-Verlag, Berlin, [Wan04a] Shiuh-Jeng Wang. Anony- Germany / Heidelberg, Ger- mous wireless authentica- many / London, UK / etc., tion on a portable cellu- 2000. lar mobile system. IEEE Transactions on Computers, Washington:2008:BRB 53(10):1317–1329, October [Was08a] Lawrence C. Washington. 2004. CODEN ITCOB4. Book review: Handbook ISSN 0018-9340 (print), of Elliptic and Hyperellip- 1557-9956 (electronic). URL tic Curve Cryptography,by http://ieeexplore.ieee. H. Cohen and G. Frey, org/stamp/stamp.jsp?tp= Chapman & Hall/CRC, &arnumber=1327581. 2006, 1-58488-518-1. ACM Wang:2004:TVS SIGACT News, 39(1):19– 22, March 2008. CO- [Wan04b] Shiuh-Jeng Wang. Thresh- DEN SIGNDM. ISSN 0163- old verification scheme to a 5700 (print), 1943-5827 valid-signature using iden- (electronic). URL http: tity only on specialized ap- //doi.acm.org/10.1145/ proval. Applied Mathemat- 1360443.1360448.See ics and Computation, 152 [CFA+06]. (2):373–383, May 5, 2004. CODEN AMHCBQ. ISSN Washington:2008:ECN 0096-3003 (print), 1873- [Was08b] Lawrence C. Washington. 5649 (electronic). Elliptic curves: number the- Wang:2005:SCR ory and cryptography. Dis- crete mathematics and its [Wan05] Shiuh-Jeng Wang. Steganog- applications. Chapman and raphy of capacity required Hall/CRC, Boca Raton, FL, using modulo operator for USA, second edition, 2008. embedding secret image. ISBN 1-4200-7146-7 (hard- Applied Mathematics and cover). xviii + 513 pp. REFERENCES 686

LCCN QA567.2.E44 W37 439 pp. LCCN TK5105.59 2008. .W39 2009. URL http:/ Wayman:2001:FBA /www.sciencedirect.com/ science/book/9780123744791. [Way01] J. L. Wayman. Fundamen- Weiss:2000:CAC tals of biometric authenti- cation technologies. Inter- [WB00] Richard Weiss and Nathan national Journal of Image Binkert. A compari- and Graphics (IJIG), 1(1): son of AES candidates 93–??, January 2001. CO- on the Alpha 21264. In DEN ???? ISSN 0219-4678. NIST [NIS00], pages 75–81. Wayman:2002:BAT ISBN ???? LCCN ???? URL http://csrc.nist. [Way02a] James L. Wayman. Bio- gov/encryption/aes/round2/ metric authentication tech- conf3/aes3conf.htm; http: nologies: Hype meets the //csrc.nist.gov/encryption/ test results, 2002. URL aes/round2/conf3/papers/ http://www.usenix.org/ AES3Proceedings-1.pdf; publications/library/proceedings/ http://csrc.nist.gov/ sec02/tech.html. Unpub- encryption/aes/round2/ lished. conf3/papers/AES3Proceedings- Wayner:2002:DCI 2.pdf; http://csrc.nist. gov/encryption/aes/round2/ [Way02b] Peter Wayner. Disappear- conf3/papers/AES3Proceedings- ing cryptography: informa- 3.pdf; http://csrc.nist. tion hiding: steganography gov/encryption/aes/round2/ &watermarking. Morgan conf3/papers/AES3Proceedings. Kaufmann Publishers, Los pdf. Altos, CA 94022, USA, sec- Wu:2002:CSCa ond edition, 2002. ISBN 1-55860-769-2. xvii + 413 [WB02] Hongjun Wu and Feng pp. LCCN TK5105.59 .W39 Bao. Cryptanalysis of 2002. US$44.95. stream cipher COS(2,128) Wayner:2009:DCI Mode I. Lecture Notes in Computer Science, 2384: [Way09] Peter Wayner. Disappear- 154–??, 2002. CODEN ing cryptography: infor- LNCSD9. ISSN 0302- mation hiding: steganog- 9743 (print), 1611-3349 raphy and watermarking. (electronic). URL http: Morgan Kaufmann Publish- //link.springer-ny.com/ ers, Los Altos, CA 94022, link/service/series/0558/ USA, third edition, 2009. bibs/2384/23840154.htm; ISBN 0-12-374479-2, 0-08- http://link.springer- 092270-8 (e-book). xv + ny.com/link/service/series/ REFERENCES 687

0558/papers/2384/23840154. Weeks:2000:HPS pdf. [WBRF00] Bryan Weeks, Mark Bean, Wu:2001:CDS Tom Rozylowicz, and Chris Ficke. Hardware perfor- [WBD01] Hongjun Wu, Feng Bao, and mance simulations of round Robert H. Deng. Crypt- 2 Advanced Encryption analysis of a digital sig- Standard algorithms. In nature scheme on ID- NIST [NIS00], pages 286– based key-sharing infras- 304. ISBN ???? LCCN ???? tructures. Lecture Notes URL http://csrc.nist. in Computer Science, 1992: gov/encryption/aes/round2/ 173–179, 2001. CODEN conf3/aes3conf.htm; http: LNCSD9. ISSN 0302- //csrc.nist.gov/encryption/ 9743 (print), 1611-3349 aes/round2/conf3/papers/ (electronic). URL http: AES3Proceedings-1.pdf; //link.springer-ny.com/ http://csrc.nist.gov/ link/service/series/0558/ encryption/aes/round2/ bibs/1992/19920173.htm; conf3/papers/AES3Proceedings- http://link.springer- 2.pdf; http://csrc.nist. ny.com/link/service/series/ gov/encryption/aes/round2/ 0558/papers/1992/19920173. conf3/papers/AES3Proceedings- pdf. 3.pdf; http://csrc.nist. gov/encryption/aes/round2/ Weis:2001:SYH conf3/papers/AES3Proceedings. pdf. [WBL01] R¨udiger Weis, Bastiaan Bakker, and Stefan Lucks. Wong:2001:EMA Security on your hand: Secure filesystems with a [WC01a] Duncan S. Wong and “non-cryptographic” JAVA- Agnes H. Chan. Efficient ring. Lecture Notes in and mutually authenticated Computer Science, 2041: key exchange for low power 151–??, 2001. CODEN computing devices. Lecture LNCSD9. ISSN 0302- Notes in Computer Science, 9743 (print), 1611-3349 2248:272–??, 2001. CO- (electronic). URL http: DEN LNCSD9. ISSN 0302- //link.springer-ny.com/ 9743 (print), 1611-3349 link/service/series/0558/ (electronic). URL http: bibs/2041/20410151.htm; //link.springer-ny.com/ http://link.springer- link/service/series/0558/ ny.com/link/service/series/ bibs/2248/22480272.htm; 0558/papers/2041/20410151. http://link.springer- pdf. ny.com/link/service/series/ REFERENCES 688

0558/papers/2248/22480272. ital images based on side- pdf. match vector quantization. Fundamenta Informaticae, Wu:2001:CKA 63(1):89–106, January 2004. [WC01b] T.-C. Wu and C.-C. Chang. CODEN FUMAAJ. ISSN Cryptographic key assign- 0169-2968 (print), 1875- ment scheme for hierarchi- 8681 (electronic). cal access control. Interna- Wu:2005:NDI tional Journal of Computer Systems Science and Engi- [WC05] Hsien-Chu Wu and Chin- neering, 16(1):??, January Chen Chang. A novel digital 2001. CODEN CSSEEI. image watermarking scheme ISSN 0267-6192. based on the vector quanti- zation technique. Comput- Wu:2003:HDW ers & Security, 24(6):460– [WC03a] Hsien-Chu Wu and Chin- 471, September 2005. CO- Chen Chang. Hiding digi- DEN CPSEDU. ISSN 0167- tal watermarks using frac- 4048 (print), 1872-6208 tal compression technique. (electronic). URL https:/ Fundamenta Informaticae, /www.sciencedirect.com/ 58(2):189–202, April 2003. science/article/pii/S0167404805000672. CODEN FUMAAJ. ISSN Wang:2005:TAP 0169-2968 (print), 1875- 8681 (electronic). [WCJ05] Xinyuan Wang, Shiping Chen, and Sushil Jajodia. Wu:2003:UFR Tracking anonymous peer- to-peer VoIP calls on the [WC03b] Shyi-Tsong Wu and Bin- Internet. In Meadows and Chang Chieu. A user Syverson [MS05b], pages friendly remote authenti- 81–91. ISBN 1-59593-226-7. cation scheme with smart LCCN QA76.9.A25. ACM cards. Computers & order number 459050. Security, 22(6):547–550, September 2003. CODEN Wang:2009:NWA CPSEDU. ISSN 0167-4048 [WCJ09] Chung-Chuan Wang, Chin- (print), 1872-6208 (elec- Chen Chang, and Jinn-Ke tronic). URL https:// Jan. Novel watermark- www.sciencedirect.com/ ing authentication schemes science/article/pii/S0167404803006163. for binary images based on Wu:2004:EIW dual-pair block pixel pat- terns. Fundamenta Infor- [WC04] Hsien-Chu Wu and Chin- maticae, 90(1–2):125–155, Chen Chang. Embedding in- January 2009. CODEN FU- visible watermarks into dig- MAAJ. ISSN 0169-2968 REFERENCES 689

(print), 1875-8681 (elec- Weir:2009:UPS tronic). [WDCJ09] Catherine S. Weir, Gary Wang:2005:SDR Douglas, Martin Carruthers, and Mervyn Jack. User per- [WCZ05] Kun Wang, Zhen Cai, and ceptions of security, con- Lihua Zhou. Study on venience and usability for disaster recovery planning ebanking authentication to- model. In Han et al. kens. Computers & Secu- [HYZ05b], pages 151–?? rity, 28(1–2):47–62, Febru- ISBN 981-270-153-2. LCCN ary/March 2009. CODEN ???? URL http:// CPSEDU. ISSN 0167-4048 eproceedings.worldscinet. (print), 1872-6208 (elec- com/9812701532/9812701532. tronic). URL https:// 0031.html. www.sciencedirect.com/ Westerlund:2001:HWK science/article/pii/S0167404808000941. [WD01a] Assar Westerlund and Jo- Wang:2009:SST han Danielsson. Heim- dal and Windows 2000 [WDLN09] Ronghua Wang, Wenliang Kerberos — how to get Du, Xiaogang Liu, and Peng them to play together. In Ning. ShortPK: a short- USENIX [USE01b], page ?? term public key scheme ISBN 1-880446-10-3. LCCN for broadcast authentica- QA76.8.U65 U84 2001. URL tion in sensor networks. http://www.usenix.org/ ACM Transactions on Sen- publications/library/proceedings/ sor Networks, 6(1):9:1–9:??, usenix01/freenix01/westerlund. December 2009. CODEN html. ???? ISSN 1550-4859 (print), 1550-4867 (elec- Williams:2001:ICA tronic). [WD01b] Jeannette Williams and Weaver:2006:BA Yolande Dickerson. The In- visible Cryptologists: African– [Wea06] Alfred C. Weaver. Biometric Americans, WWII to 1956. authentication. Computer, Center for Cryptologic His- 39(2):96–97, February 2006. tory, National Security CODEN CPTRB4. ISSN Agency, Fort Meade, MD, 0018-9162 (print), 1558- USA, 2001. viii + 43 pp. 0814 (electronic). URL https://www.nsa. Weber:2002:ECH gov/about/cryptologic- heritage/historical-figures-[Web02] Arnd Weber. Enabling publications/publications/ crypto: how radical inno- wwii/assets/files/invisible_ vations occur. Communi- cryptologists.pdf. cations of the Association REFERENCES 690

for Computing Machinery, Weiss:2004:JCE 45(4):103–107, April 2002. CODEN CACMA2. ISSN [Wei04] Jason Weiss. Java Cryptog- 0001-0782 (print), 1557- raphy Extensions: Practi- 7317 (electronic). cal Guide for Programmers. Morgan Kaufmann Publish- Webb:2008:IZN ers, Los Altos, CA 94022, USA, 2004. ISBN 0-12- [Web08] Charles F. Webb. IBM 742751-1. xv + 158 pp. z10: The next-generation LCCN QA76.73.J38 W445 mainframe microprocessor. 2004. US$21.95. IEEE Micro, 28(2):19–29, March/April 2008. CODEN Weierud:2005:BSF IEMIDZ. ISSN 0272-1732 (print), 1937-4143 (elec- [Wei05] Frode Weierud. BP’s stur- tronic). geon, the FISH that laid no eggs. In Copeland [Cop05], Wehde:2000:IME page ?? ISBN 0-19-284055- X. LCCN D810.C88 C66 [Weh00] Ed Wehde. IBM, Microsoft 2006. in encryption effort. Net- work Security, 2000(2):5, Weierud:2005:BPS February 1, 2000. CODEN [Wei06] Frode Weierud. Bletch- NTSCF5. ISSN 1353-4858 ley Park’s Sturgeon, the (print), 1872-9371 (elec- fish that laid no eggs. tronic). URL http:// Rutherford Journal, 1(??): www.sciencedirect.com/ ??, ???? 2005–2006. CO- science/article/pii/S1353485800876540. DEN ???? ISSN 1177- Weierud:2000:SFB 1380. URL http:// rutherfordjournal.org/ [Wei00] Frode Weierud. Sturgeon, article010106.html. the FISH BP never really Welschenbach:2005:CCC caught. In Joyner [Joy00], page ?? ISBN 3-540-66336- [Wel05] Michael Welschenbach. Cryp- 3 (softcover), 3-642-59663- tography in C and C++. 0 (e-book). LCCN QA268 Apress, Berkeley, CA, USA, .C67 1999. UK£44.50. URL second edition, 2005. ISBN http://frode.home.cern. 1-59059-502-5. xxv + 478 ch/frode/pubs/cryptoday. pp. LCCN QA76.9.A25 pdf. Proceedings of the W4313 2005. URL http:// Conference on Coding The- www.loc.gov/catdir/enhancements/ ory, Cryptography and fy0663/2005002553-d.html; Number Theory held at the http://www.loc.gov/catdir/ U.S. Naval Academy during toc/ecip057/2005002553. October 25–26, 1998. html. REFERENCES 691

Weng:2003:CHC ny.com/link/service/series/ 0558/papers/2365/23650143. [Wen03] Annegret Weng. Construct- pdf. ing hyperelliptic curves of genus 2 suitable for cryp- Westfeld:2001:FSA tography. Mathematics of [Wes01] Andreas Westfeld. F5 Computation, 72(241):435– — A steganographic algo- 458, January 2003. CODEN rithm. Lecture Notes in MCMPAF. ISSN 0025- Computer Science, 2137: 5718 (paper), 1088-6842 289–??, 2001. CODEN (electronic). URL http: LNCSD9. ISSN 0302- //www.ams.org/journal- 9743 (print), 1611-3349 getitem?pii=S0025-5718- (electronic). URL http: 02-01422-9; http://www. //link.springer-ny.com/ ams.org/mcom/2003-72-241/ link/service/series/0558/ S0025-5718-02-01422-9/ bibs/2137/21370289.htm; S0025-5718-02-01422-9. http://link.springer- dvi; http://www.ams. ny.com/link/service/series/ org/mcom/2003-72-241/S0025- 0558/papers/2137/21370289. 5718-02-01422-9/S0025- pdf. 5718-02-01422-9.pdf; http://www.ams.org/mcom/ Wu:2002:LCN 2003-72-241/S0025-5718- [WF02] Wenling Wu and Dengguo 02-01422-9/S0025-5718- Feng. Linear cryptanalysis 02-01422-9.ps; http:/ of NUSH block cipher. Sci. /www.ams.org/mcom/2003- China Ser. F, 45(1):59–67, 72-241/S0025-5718-02-01422- 2002. ISSN 1009-2757. 9/S0025-5718-02-01422- Wang:2004:CHF 9.tex. Wernsdorf:2002:RFR [WFLY04] Xiaoyun Wang, Deng- guo Feng, Xuejia Lai, [Wer02] Ralph Wernsdorf. The and Hongbo Yu. Col- round functions of RIJN- lisions for hash functions DAEL generate the al- MD4, MD5, HAVAL-128 ternating group. Lecture and RIPEMD. Cryptol- Notes in Computer Science, ogy ePrint Archive, Report 2365:143–??, 2002. CO- 2004/199, 2004. URL http: DEN LNCSD9. ISSN 0302- //eprint.iacr.org/2004/ 9743 (print), 1611-3349 199.pdf; http://www. (electronic). URL http: tcs.hut.fi/~mjos/md5/. //link.springer-ny.com/ Wang:2002:CSE link/service/series/0558/ bibs/2365/23650143.htm; [WG02] Xiang Sheng Wang and http://link.springer- Juan Ren Gan. A chaotic se- REFERENCES 692

quence encryption method. Wu:2002:IBM Chinese Journal of Comput- ers = Chi suan chi hsueh [WH02b] Tzong-Sun Wu and Chien- pao, 25(4):351–356, 2002. Lung Hsu. ID-based mul- CODEN JIXUDT. ISSN tisignatures with distin- 0254-4164. guished signing authori- ties for sequential and Wang:2005:RST broadcasting architectures. [WG05] Lijun Wang and Chao Gao. Applied Mathematics and Rough set theory’s applica- Computation, 131(2–3):349– tion on intrusion detection 356, September 25, 2002. basedonsystemcalls.In CODEN AMHCBQ. ISSN Han et al. [HYZ05b], pages 0096-3003 (print), 1873- 83–?? ISBN 981-270-153-2. 5649 (electronic). LCCN ???? URL http:// eproceedings.worldscinet. Wu:2003:TSS com/9812701532/9812701532.[WH03] Tzong-Sun Wu and Chien- 0031.html. Lung Hsu. Threshold sig- Wong:2000:SGC nature scheme using self- certified public keys. The [WGL00] Chung Kei Wong, Mohamed Journal of Systems and Gouda, and Simon S. Lam. Software, 67(2):89–97, Au- Secure group communica- gust 15, 2003. CODEN JS- tions using key graphs. SODM. ISSN 0164-1212 IEEE/ACM Transactions (print), 1873-1228 (elec- on Networking, 8(1):16–30, tronic). February 2000. CODEN IEANEP. ISSN 1063-6692 Wang:2009:NWM (print), 1558-2566 (elec- tronic). URL http://www. [WH09] Yu-Ping Wang and Shi-Min acm.org/pubs/citations/ Hu. A new watermark- journals/ton/2000-8-1/ ing method for 3D mod- p16-wong/. els based on integral invari- ants. IEEE Transactions Wu:2002:CAE on Visualization and Com- [WH02a] Tzong-Sun Wu and Chien- puter Graphics, 15(2):285– Lung Hsu. Convertible 294, March/April 2009. CO- authenticated encryption DEN ITVGEA. ISSN 1077- scheme. The Journal of 2626 (print), 1941-0506 Systems and Software,62 (electronic), 2160-9306. (3):205–209, June 15, 2002. Wen:2005:URE CODEN JSSODM. ISSN 0164-1212 (print), 1873- [WHH05] Hsiang-An Wen, Sheng- 1228 (electronic). Yu Hwang, and Tzonelih REFERENCES 693

Hwang. On the unlinkability White:2009:EOD of randomization-enhanced Chaum’s blind signature [Whi09] Tobin White. Encrypted scheme. Applied Mathemat- objects and decryption pro- ics and Computation, 164 cesses: problem-solving (3):799–803, May 25, 2005. with functions in a learn- CODEN AMHCBQ. ISSN ing environment based on 0096-3003 (print), 1873- cryptography. Educa- 5649 (electronic). tional Studies in Mathemat- ics, 72(1):17–37, Septem- Wu:2008:RPG ber 2009. CODEN EDS- MAN. ISSN 0013-1954 [WHHT08] Tzong-Chen Wu, Thsia-Tzu (print), 1573-0816 (elec- Huang, Chien-Lung Hsu, tronic). URL http://link. and Kuo-Yu Tsai. Recursive springer.com/content/pdf/ protocol for group-oriented 10.1007/s10649-008-9180- authentication with key dis- y.pdf. tribution. The Journal of Systems and Software,81 Wu:2005:SSP (7):1227–1239, July 2008. CODEN JSSODM. ISSN [WHL05] Hsien-Chu Wu, Min-Shiang 0164-1212 (print), 1873- Hwang, and Chia-Hsin Liu. 1228 (electronic). A secure strong-password authentication protocol. Watanabe:2001:EAP Fundamenta Informaticae, 68(4):399–406, June 2005. [WHI01] Yuji Watanabe, Goichiro CODEN FUMAAJ. ISSN Hanaoka, and Hideki Imai. 0169-2968 (print), 1875- Efficient asymmetric public- 8681 (electronic). key traitor tracing with- out trusted agents. Lecture Wu:2003:IMT Notes in Computer Science, 2020:392–??, 2001. CO- [WHLH03] Tzong-Sun Wu, Chien-Lung DEN LNCSD9. ISSN 0302- Hsu, Han-Yu Lin, and Po- 9743 (print), 1611-3349 Sheng Huang. Improvement (electronic). URL http: of the Miyazaki–Takaragi //link.springer-ny.com/ threshold digital signature link/service/series/0558/ scheme. Information Pro- bibs/2020/20200392.htm; cessing Letters, 88(4):183– http://link.springer- 186, November 30, 2003. ny.com/link/service/series/ CODEN IFPLAT. ISSN 0558/papers/2020/20200392. 0020-0190 (print), 1872- pdf. 6119 (electronic). REFERENCES 694

Wang:2005:EAS [i.e., QCQC] ’98, Palm Springs, California, USA, [WHLH05] Fei Wang, Yupu Hu, Ying February 17–20, 1998: se- Liu, and Zhanpeng Hu. An lected papers, volume 1509 efficient algorithm for soft- of Lecture Notes in Com- ware generation of the gen- puter Science. Springer-Ver- eralized self-shrinking se- lag, Berlin, Germany / Hei- quence. In Han et al. delberg, Germany / Lon- [HYZ05b], pages 163–?? don, UK / etc., 1999. ISBN 981-270-153-2. LCCN ISBN 3-540-65514-X (soft- ???? URL http:// cover). ISSN 0302-9743 eproceedings.worldscinet. (print), 1611-3349 (elec- com/9812701532/9812701532. tronic). LCCN QA76.889 0031.html. .Q37 1998. Whyte:2005:TFC Wilcox:2001:SEH [Why05] William Whyte. To- wards faster cryptosystems, [Wil01a] Jennifer E. Wilcox. Solv- I. In Garrett and Lie- ing the Enigma: history man [GL05], pages 113– of the cryptanalytic bombe. 137. ISBN 0-8218-3365- Report, National Security 0. LCCN QA76.9.A25 Agency/Central Security P82 2005. URL http:// Service. Center for Crypto- www.loc.gov/catdir/toc/ logic History, Fort George fy0612/2005048178.html. G. Meade, MD, USA, Jan- uary 2001. 52 pp. Wiener:2000:AAH Wilson:2001:PBA [Wie00] Michael J. Wiener. Al- gorithm alley: High-speed [Wil01b] Gregory V. Wilson. Pro- cryptography with the RSA grammer’s bookshelf: Alien algorithm. Dr. Dobb’s Jour- worlds. Dr. Dobb’s Journal nal of Software Tools,25 of Software Tools, 26(12): (2):123–126, February 2000. 122, 124, December 2001. CODEN DDJOEB. ISSN CODEN DDJOEB. ISSN 1044-789X. URL http: 1044-789X. URL http:// //www.ddj.com/ftp/2000/ www.ddj.com/. 2000_02/aa220.txt. Williams:1999:QCQ Williams:2006:C [Wil99] Colin P. Williams, edi- [Wil06] Conrad Williams. The tor. Quantum computing cryptanalyst. Leaf, Aber- and quantum communica- cynon, UK, 2006. ISBN 1- tions: First NASA Inter- 905599-23-4. 32 pp. LCCN national Conference, QCQS ???? REFERENCES 695

Winterbotham:2000:USI House Inc., Norwood, MA, USA, 2005. ISBN 1-58053- [Win00] F. W. (Frederick William) 996-3. ???? pp. LCCN Winterbotham. The Ultra D810.C88 G47 2005. secret: the inside story of Winkler:2005:SAU Operation Ultra, Bletchley Park and Enigma.Orion,[Win05c] Ira Winkler. Spies among London, UK, 2000. ISBN 0- us: how to stop the spies, 7528-3751-6. xv + 199 pp. terrorists, hackers, and LCCN ???? criminals you don’t even Wincelberg:2001:JQH know you encounter ev- ery day. John Wiley and [Win01] David Wincelberg. Java Sons, Inc., New York, NY, Q&A: How do you use USA, 2005. ISBN 0-7645- the javax.crypto pack- 8468-5 (cloth). xix + age? Dr. Dobb’s Jour- 326 pp. LCCN UB250 nal of Software Tools, 26(4): .W55 2005. URL http:// 139–140, April 2001. CO- www.loc.gov/catdir/toc/ DEN DDJOEB. ISSN 1044- ecip054/2004028735.html; 789X. URL http://www. http://www.wiley.com/ ddj.com/ftp/2001/2001_ WileyCDA/WileyTitle/productCd- 04/jqa0401.txt; http: 0764584685.html. //www.ddj.com/ftp/2001/ Withers:2001:IWU 2001_04/jqa0401.zip. Windley:2005:DI [Wit01] Alex Withers. Integrating Windows 2000 and UNIX [Win05a] Phillip J. Windley. Dig- using Kerberos. Sys Ad- ital identity. O’Reilly & min: The Journal for UNIX Associates, Inc., 103a Mor- Systems Administrators,10 ris Street, Sebastopol, CA (12):39, 41–42, 44, De- 95472, USA, Tel: +1 707 cember 2001. CODEN 829 0515, and 90 Sher- SYADE7. ISSN 1061-2688. man Street, Cambridge, MA Wang:2007:VBW 02140, USA, Tel: +1 617 354 5800, 2005. ISBN 0- [WJP07] Feng-Hsing Wang, Lakhmi C. 596-00878-3. xviii + 234 Jain, and Jeng-Shyang Pan. pp. LCCN TK5105.59 .W45 VQ-based watermarking 2005. scheme with genetic code- Winkel:2005:GEC book partition. Journal of Network and Computer Ap- [Win05b] Brian J. Winkel, editor. The plications, 30(1):4–23, Jan- German Enigma cipher ma- uary 2007. CODEN JN- chine. Artech House com- CAF3. ISSN 1084-8045 puter security series. Artech (print), 1095-8592 (elec- REFERENCES 696

tronic). URL http:// 0302-9743 (print), 1611- www.sciencedirect.com/ 3349 (electronic). LCCN science/article/pii/S108480450500038X. ???? URL http:/ /www.springerlink.com/ Welschenbach:2001:CCC openurl.asp?genre=issue& [WK01] Michael Welschenbach and issn=0302-9743&volume= David Kramer. Cryptogra- 3935. phy in C and C++. Apress, Weigold:2008:RCA Berkeley, CA, USA, second edition, 2001. ISBN 1- [WKB08] Thomas Weigold, Thorsten 893115-95-X. xix + 432 pp. Kramp, and Michael Baentsch. LCCN QA76.73.C153 W457 Remote client authentica- 2001. UK£35.50. tion. IEEE Security & Privacy, 6(4):36–43, July/ Wang:2005:ECSb August 2008. CODEN ???? [WK05] Chih-Hung Wang and Yan- ISSN 1540-7993 (print), Sheng Kuo. An efficient 1558-4046 (electronic). contract signing protocol us- Walter:2003:CHE ing the aggregate signature scheme to protect signers’ [WKP03] Colin D. Walter, C¸etin K. privacy and promote relia- Ko¸c, and Christof Paar, bility. Operating Systems editors. Cryptographic Review, 39(4):66–79, Octo- Hardware and Embedded ber 2005. CODEN OS- Systems—CHES 2003: 5th RED8. ISSN 0163-5980 International Workshop, (print), 1943-586X (elec- Cologne, Germany, Septem- tronic). ber 8–10, 2003: Proceed- ings, volume 2779 of Lecture Won:2006:ISC Notes in Computer Science. [WK06] Dongho Won and Seungjoo Springer-Verlag, Berlin, Kim, editors. Informa- Germany / Heidelberg, Ger- tion security and cryptol- many / London, UK / etc., ogy — ICISC 2005: 8th 2003. CODEN LNCSD9. international conference, ISBN 3-540-40833-9. ISSN Seoul, Korea, December 1– 0302-9743 (print), 1611- 2, 2005, revised selected pa- 3349 (electronic). LCCN pers, volume 3935 of Lec- TK7895.E42. URL http: ture Notes in Computer //link.springer-ny.com/ Science. Springer-Verlag, link/service/series/0558/ Berlin, Germany / Heidel- tocs/t2779.htm; http: berg, Germany / London, //www.springerlink.com/ UK / etc., 2006. CO- openurl.asp?genre=issue& DEN LNCSD9. ISBN 3-540- issn=0302-9743&volume= 33354-1 (softcover). ISSN 2779; http://www.springerlink. REFERENCES 697

com/openurl.asp?genre= Wang:2005:CHY volume&id=doi:10.1007/ b13240. [WL05] Shyh-Yih Wang and Chi- Sung Laih. Cryptanaly- Wang:2002:AAB sis of Hwang–Yang scheme for controlling access in [WL02] Lusheng Wang and Zimao large partially ordered hier- Li. An approximation al- archies. The Journal of Sys- gorithm for a bottleneck tems and Software, 75(1–2): k-Steiner tree problem in 189–192, February 15, 2005. the Euclidean plane. In- CODEN JSSODM. ISSN formation Processing Let- 0164-1212 (print), 1873- ters, 81(3):151–156, Febru- 1228 (electronic). ary 14, 2002. CODEN IF- PLAT. ISSN 0020-0190 Wang:2007:NCD (print), 1872-6119 (elec- tronic). URL http://www. [WL07a] Zhenghong Wang and Ruby B. elsevier.com/gej-ng/10/ Lee. New cache designs for 23/20/85/34/32/abstract. thwarting software cache- html. based side channel attacks. ACM SIGARCH Computer Wedde:2004:MAA Architecture News, 35(2): 494–505, May 2007. CO- [WL04a] Horst F. Wedde and Mario DEN CANED2. ISSN Lischka. Modular autho- 0163-5964 (print), 1943- rization and administration. 5851 (electronic). ACM Transactions on In- formation and System Secu- Williams:2007:FTA rity, 7(3):363–391, August 2004. CODEN ATISBQ. [WL07b] D. Williams and H. Lut- ISSN 1094-9224 (print), fiyya. Fault-tolerant au- 1557-7406 (electronic). thentication services. In- ternational Journal of Com- Wu:2004:RKA puter Applications, 29(2): 107–114, 2007. CODEN [WL04b] Tzong-Sun Wu and Han-Yu IJCAFW. ISSN 1206- Lin. Robust key authenti- 212X (print), 1925-7074 cation scheme resistant to (electronic). URL https: public key substitution at- //www.tandfonline.com/ tacks. Applied Mathematics doi/full/10.1080/1206212X. and Computation, 157(3): 2007.11441838. 825–833, October 15, 2004. Wen:2006:PSA CODEN AMHCBQ. ISSN 0096-3003 (print), 1873- [WLH06] Hsiang-An Wen, Chun-Li 5649 (electronic). Lin, and Tzonelih Hwang. REFERENCES 698

Provably secure authenti- authentication scheme. Com- cated key exchange proto- puters & Security, 22(7): cols for low power com- 643–645, October 2003. CO- puting clients. Comput- DEN CPSEDU. ISSN 0167- ers & Security, 25(2):106– 4048 (print), 1872-6208 113, March 2006. CODEN (electronic). URL https:/ CPSEDU. ISSN 0167-4048 /www.sciencedirect.com/ (print), 1872-6208 (elec- science/article/pii/S0167404803007132. tronic). URL https:// www.sciencedirect.com/ Wang:2005:SAI science/article/pii/S0167404805001732[WLT05a]. Yingjie Wang, J. H. Li, and Wen:2005:TRB L. Tie. Security analysis and improvement of a user- [WLHH05] Hsiang-An Wen, Kuo- friendly remote authentica- Chang Lee, Sheng-Yu Hwang, tion protocol. Applied Math- and Tzonelih Hwang. On ematics and Computation, the traceability on RSA- 168(1):47–50, September 1, based partially signature 2005. CODEN AMHCBQ. with low computation. ISSN 0096-3003 (print), Applied Mathematics and 1873-5649 (electronic). Computation, 162(1):421– 425, March 4, 2005. CO- Wu:2005:IAW DEN AMHCBQ. ISSN [WLT05b] Qiong Wu, Guohui Li, and 0096-3003 (print), 1873- Dan Tu. An image au- 5649 (electronic). thentication watermarking Wang:2009:DSM with self-localization and recovery. In Han et al. [WLLL09] J. Wang, J. L¨u, S. Lian, [HYZ05b], pages 960–?? andG.Liu.Onthedesign ISBN 981-270-153-2. LCCN of secure multimedia au- ???? URL http:// thentication. J.UCS: Jour- eproceedings.worldscinet. nal of Universal Computer com/9812701532/9812701532. Science, 15(2):426–??, ???? 0031.html. 2009. CODEN ???? ISSN Wong:2004:RCK 0948-6968. URL http:// www.jucs.org/jucs_15_2/ [WLW04] W. K. Wong, L. P. Lee, on_the_design_of. and K. W. Wong. Reply Wang:2003:CET to the comment “Keystream cryptanalysis of a chaotic [WLT03] Bin Wang, Jian-Hua Li, cryptographic method”. and Zhi-Peng Tong. Crypt- Computer Physics Commu- analysis of an enhanced nications, 156(2):208, Jan- timestamp-based password uary 1, 2004. CODEN REFERENCES 699

CPHCBZ. ISSN 0010-4655 1544-3558 (print), 1544- (print), 1879-2944 (elec- 3965 (electronic). tronic). URL http:// www.sciencedirect.com/ Wheeler:1995:TTE science/article/pii/S0010465503004338[WN95]. D. J. Wheeler and R. M. ´ See [kWpLwW01, AMRP04]. Needham. TEA, a tiny en- Wang:2005:TSP cryption algorithm. Lecture Notes in Computer Science, [WLZZ05] Yu Wang, Yichao Li, Xi- 1008:363–??, 1995. CODEN aosong Zhang, and Ji- LNCSD9. ISSN 0302-9743 azhi Zeng. Tracing single- (print), 1611-3349 (elec- packet attacks to their tronic). sources. In Han et al. Watanabe:2002:CCD [HYZ05b], pages 118–?? ISBN 981-270-153-2. LCCN [WN02] Yuji Watanabe and Masayuki ???? URL http:// Numao. Conditional cryp- eproceedings.worldscinet. tographic delegation for com/9812701532/9812701532. P2P data sharing. Lecture 0031.html. Notes in Computer Science, Wu:2008:RWM 2433:309–??, 2002. CO- DEN LNCSD9. ISSN 0302- [WMDR08] Xiaomao Wu, Lizhuang Ma, 9743 (print), 1611-3349 Zhuoqun Dong, and Lionel (electronic). URL http: Rev´eret. Robust water- //link.springer-ny.com/ marking motion data with link/service/series/0558/ DL-STDM. Computers bibs/2433/24330309.htm; and Graphics, 32(3):320– http://link.springer- 329, June 2008. CODEN ny.com/link/service/series/ COGRD2. ISSN 0097-8493 0558/papers/2433/24330309. (print), 1873-7684 (elec- pdf. tronic). URL http:// www.sciencedirect.com/ Wang:2008:NAD science/article/pii/S0097849308000447[WNQ08]. Xiang-Yang Wang, Pan- Watters:2008:VDL Pan Niu, and Wei Qi. A new adaptive digital au- [WMS08] Paul Watters, Frances Mar- dio watermarking based tin, and H. Steffen Stripf. on support vector ma- Visual detection of LSB- chine. Journal of Net- encoded natural image work and Computer Ap- steganography. ACM Trans- plications, 31(4):735–749, actions on Applied Percep- November 2008. CODEN tion, 5(1):5:1–5:??, January JNCAF3. ISSN 1084-8045 2008. CODEN ???? ISSN (print), 1095-8592 (elec- REFERENCES 700

tronic). URL http:// www.sciencedirect.com/ www.sciencedirect.com/ science/article/pii/S0167404803005042. science/article/pii/S1084804507000525. Wollinger:2004:SHI Wang:2009:RDA [Wol04] Thomas Wollinger. Software [WNY09] Xiang-Yang Wang, Pan-Pan and hardware implementa- Niu, and Hong-Ying Yang. tion of hyperelliptic curve A robust, digital-audio wa- cryptosystems, volume 3 of termarking method. IEEE IT-Security.Europ¨aischer MultiMedia, 16(3):60–69, Universit¨atsverlag, Bochum, July/September 2009. CO- Germany, 2004. ISBN DEN IEMUE4. ISSN 1070- 3-86515-025-X. 177 pp. 986X (print), 1941-0166 LCCN ???? EUR 24.90. (electronic). URL http://verlag.rub. de/g9783865150257.html. Wolkerstorfer:2001:AIA

[WOL01] Johannes Wolkerstorfer, Won:2001:ISC Elisabeth Oswald, and Mario Lamberger. An [Won01] Dongho Won, editor. Infor- ASIC implementation of mation security and cryp- the AES SBoxes. Lec- tology: ICISC 2000, Third ture Notes in Computer Sci- International Conference, ence, 2271:67–??, 2001. CO- Seoul, Korea, December DEN LNCSD9. ISSN 0302- 8–9, 2000: Proceedings, 9743 (print), 1611-3349 volume 2015 of Lecture (electronic). URL http: Notes in Computer Science. //link.springer-ny.com/ Springer-Verlag, Berlin, link/service/series/0558/ Germany / Heidelberg, Ger- bibs/2271/22710067.htm; many / London, UK / etc., http://link.springer- 2001. CODEN LNCSD9. ny.com/link/service/series/ ISBN 3-540-41782-6 (soft- 0558/papers/2271/22710067. cover). ISSN 0302-9743 pdf. (print), 1611-3349 (elec- tronic). LCCN QA76.9.A25 Wolfe:2003:EE I32 2000; QA267.A1 L43 no.2015. URL http:/ [Wol03] Hank Wolfe. Encounter- /link.springer-ny.com/ ing encryption. Comput- link/service/series/0558/ ers & Security, 22(5):388– tocs/t2015.htm; http: 391, July 2003. CODEN //www.springerlink.com/ CPSEDU. ISSN 0167-4048 openurl.asp?genre=issue& (print), 1872-6208 (elec- issn=0302-9743&volume= tronic). URL https:// 2015. REFERENCES 701

Wool:2000:KME Wollinger:2005:CVH

[Woo00] Avishai Wool. Key manage- [WPP05] T. Wollinger, J. Pelzl, and ment for encrypted broad- C. Paar. Cantor versus cast. ACM Transactions on Harley: optimization and Information and System Se- analysis of explicit formulae curity, 3(2):107–134, May for hyperelliptic curve cryp- 2000. CODEN ATISBQ. tosystems. IEEE Transac- ISSN 1094-9224 (print), tions on Computers, 54(7): 1557-7406 (electronic). 861–872, July 2005. CO- DEN ITCOB4. ISSN Wood:2005:IIM 0018-9340 (print), 1557- 9956 (electronic). URL [Woo05] Peter Wood. Imple- http://ieeexplore.ieee. menting identity manage- org/stamp/stamp.jsp?tp= ment security — an eth- &arnumber=1432669. ical hacker’s view. Net- work Security, 2005(9):12– Weimerskirch:2001:ECC 15, September 2005. CO- [WPS01] Andr´e Weimerskirch, Christof DEN NTSCF5. ISSN 1353- Paar, and Sheueling Chang 4858 (print), 1872-9371 Shantz. Elliptic curve cryp- (electronic). URL http:/ tography on a palm OS /www.sciencedirect.com/ device. Lecture Notes in science/article/pii/S1353485805702828. Computer Science, 2119: 502–??, 2001. CODEN Wang:2003:SGP LNCSD9. ISSN 0302- [WP03] Huaxiong Wang and Josef 9743 (print), 1611-3349 Pieprzyk. Shared gen- (electronic). URL http: eration of pseudo-random //link.springer-ny.com/ functions with cumulative link/service/series/0558/ maps. In Joye [Joy03b], bibs/2119/21190502.htm; pages 281–294. CODEN http://link.springer- LNCSD9. ISBN 3-540- ny.com/link/service/series/ 00847-0. ISSN 0302-9743 0558/papers/2119/21190502. (print), 1611-3349 (elec- pdf. tronic). LCCN QA76.9.A25 Wang:2001:TUR C822 2003. URL http: //link.springer-ny.com/ [WQWZ01] Guilin Wang, Sihan Qing, link/service/series/0558/ Mingsheng Wang, and tocs/t2612.htm; http: Zhanfei Zhou. Thresh- //www.springerlink.com/ old undeniable RSA sig- openurl.asp?genre=issue& nature scheme. Lecture issn=0302-9743&volume= Notes in Computer Science, 2612. 2229:221–??, 2001. CO- REFERENCES 702

DEN LNCSD9. ISSN 0302- of Lecture Notes in Com- 9743 (print), 1611-3349 puter Science. Springer-Ver- (electronic). URL http: lag, Berlin, Germany / Hei- //link.springer-ny.com/ delberg, Germany / Lon- link/service/series/0558/ don, UK / etc., 2003. CO- bibs/2229/22290221.htm; DEN LNCSD9. ISBN 3-540- http://link.springer- 40663-8. ISSN 0302-9743 ny.com/link/service/series/ (print), 1611-3349 (elec- 0558/papers/2229/22290221. tronic). LCCN HG1710 pdf. .F35 2003. URL http: //www.springerlink.com/ Wright:2000:IQC openurl.asp?genre=issue& [Wri00] Marie A. Wright. The im- issn=0302-9743&volume= pact of quantum comput- 2742; http://www.springerlink. ing on cryptography. Net- com/openurl.asp?genre= work Security, 2000(9):13– volume&id=doi:10.1007/ 15, September 1, 2000. CO- b11831. DEN NTSCF5. ISSN 1353- Wrixon:2005:CCO 4858 (print), 1872-9371 (electronic). URL http:/ [Wri05] Fred B. Wrixon. Codes, /www.sciencedirect.com/ Ciphers and Other Cryptic science/article/pii/S1353485800090279. and Clandestine Communi- cation: Making and Break- Wright:2001:AES ing Secret Messages from Hieroglyphs to the Inter- [Wri01] Marie A. Wright. The Ad- net. Black Dog & Leventhal vanced Encryption Stan- Publishers, New York, NY, dard. Network Secu- USA, 2005. ISBN 1-57912- rity, 2001(10):11–13, Oc- 485-2. 704 pp. LCCN Z103.3 tober 31, 2001. CODEN .W75 1998. NTSCF5. ISSN 1353-4858 (print), 1872-9371 (elec- Wang:2002:IPD tronic). URL http:// [WRW02] Xinyuan Wang, Douglas S. www.sciencedirect.com/ Reeves, and S. Felix Wu. science/article/pii/S1353485801010182. Inter-packet delay based Wright:2003:FCI correlation for tracing en- crypted connections through [Wri03] Rebecca N. Wright, edi- stepping stones. Lecture tor. Financial cryptogra- Notes in Computer Science, phy: 7th International Con- 2502:244–??, 2002. CODEN ference, FC 2003, Guade- LNCSD9. ISSN 0302-9743 loupe, French West Indies, (print), 1611-3349 (elec- January 27–30, 2003: re- tronic). URL http:// vised papers, volume 2742 link.springer.de/link/ REFERENCES 703

service/series/0558/bibs/ dent power use in multi- 2502/25020244.htm; http: pliers. In IEEE [IEE05b], //link.springer.de/link/ page ?? ISBN ???? service/series/0558/papers/ LCCN ???? URL 2502/25020244.pdf. http://arith17.polito. it/final/paper-126.pdf. Wright:2002:EPS [WS02] R. N. Wright and S. Spald- Weimerskirch:2002:DLW ing. Experimental perfor- [WT02] Andr´e Weimerskirch and mance of shared RSA mod- Gilles Thonet. A dis- ulus generation. Algorith- tributed light-weight au- mica, 33(1):89–103, Jan- thentication model for ad- uary 2002. CODEN AL- hoc networks. Lecture GOEJ. ISSN 0178-4617 Notes in Computer Science, (print), 1432-0541 (elec- 2288:341–??, 2002. CO- tronic). URL http:/ DEN LNCSD9. ISSN 0302- /www.springerlink.com/ 9743 (print), 1611-3349 openurl.asp?genre=article& (electronic). URL http: issn=0178-4617&volume= //link.springer-ny.com/ 33&issue=1&spage=89.Ex- link/service/series/0558/ perimental algorithms. bibs/2288/22880341.htm; Whiting:2003:MPH http://link.springer- ny.com/link/service/series/ [WS03] Douglas L. Whiting and 0558/papers/2288/22880341. Michael J. Sabin. Mont- pdf. gomery prime hashing for message authentication. In Wu:2001:DSM Joye [Joy03b], pages 50– 67. CODEN LNCSD9. [Wu01] T.-C. Wu. Digital signa- ISBN 3-540-00847-0. ISSN ture/multisignature schemes 0302-9743 (print), 1611- giving public key verifica- 3349 (electronic). LCCN tion and message recovery QA76.9.A25 C822 2003. simultaneously. Interna- URL http://link.springer- tional Journal of Computer ny.com/link/service/series/ Systems Science and Engi- 0558/tocs/t2612.htm; neering, 16(6):??, Novem- http://www.springerlink. ber 2001. CODEN CSSEEI. com/openurl.asp?genre= ISSN 0267-6192. issue&issn=0302-9743&volume= Wu:2002:CSCb 2612. [Wu02] Hongjun Wu. Crypt- Walter:2005:DDP analysis of stream cipher [WS05] Colin Walter and David Alpha1. Lecture Notes in Samyde. Data depen- Computer Science, 2384: REFERENCES 704

169–??, 2002. CODEN (electronic). URL http: LNCSD9. ISSN 0302- //link.springer-ny.com/ 9743 (print), 1611-3349 link/service/series/0558/ (electronic). URL http: bibs/2229/22290466.htm; //link.springer-ny.com/ http://link.springer- link/service/series/0558/ ny.com/link/service/series/ bibs/2384/23840169.htm; 0558/papers/2229/22290466. http://link.springer- pdf. ny.com/link/service/series/ 0558/papers/2384/23840169. Woodruff:2002:CUC pdf. [WvD02] David P. Woodruff and Wuensche:2009:CAE Marten van Dijk. Cryptog- raphy in an unbounded com- [Wue09] Andrew Wuensche. Cellu- putational model. Lecture lar Automata Encryption: Notes in Computer Science, the reverse algorithm, Z- 2332:149–??, 2002. CO- parameter and chain-rules. DEN LNCSD9. ISSN 0302- Parallel Processing Letters, 9743 (print), 1611-3349 19(2):283–297, June 2009. (electronic). URL http: CODEN PPLTEE. ISSN //link.springer-ny.com/ 0129-6264 (print), 1793- link/service/series/0558/ 642X (electronic). bibs/2332/23320149.htm; Wu:2000:PKC http://link.springer- ny.com/link/service/series/ [WV00] Chuan-Kun Wu and Vi- 0558/papers/2332/23320149. jay Varadharajan. Public pdf. key cryptosystems based on Boolean permutations and Weaver:2000:CAC their applications. Inter- national Journal of Com- [WW00] Nicholas Weaver and John puter Mathematics, 74(2): Wawrzynek. A compari- 167–184, 2000. CODEN son of the AES candidates IJCMAT. ISSN 0020-7160. amenability to FPGA im- plementation. In NIST Wu:2001:FED [NIS00], pages 28–39. ISBN [WV01] Chuan-Kun Wu and Vi- ???? LCCN ???? jay Varadharajan. Fair URL http://csrc.nist. exchange of digital signa- gov/encryption/aes/round2/ tures with offline trusted conf3/aes3conf.htm; http: third party. Lecture Notes //csrc.nist.gov/encryption/ in Computer Science, 2229: aes/round2/conf3/papers/ 466–??, 2001. CODEN AES3Proceedings-1.pdf; LNCSD9. ISSN 0302- http://csrc.nist.gov/ 9743 (print), 1611-3349 encryption/aes/round2/ REFERENCES 705

conf3/papers/AES3Proceedings- raphy on point-sampled ge- 2.pdf; http://csrc.nist. ometry. Computers and gov/encryption/aes/round2/ Graphics, 30(2):244–254, conf3/papers/AES3Proceedings- April 2006. CODEN 3.pdf; http://csrc.nist. COGRD2. ISSN 0097-8493 gov/encryption/aes/round2/ (print), 1873-7684 (elec- conf3/papers/AES3Proceedings. tronic). URL http:// pdf. www.sciencedirect.com/ science/article/pii/S009784930600032X. Wang:2004:CWS Wang:2008:DCP [WW04] Huaiqing Wang and Shuozhong Wang. Cyber warfare: [WW08] Xing-Yuan Wang and Xiao- steganography vs. steganal- Juan Wang. Design of ysis. Communications of chaotic pseudo-random bit the Association for Comput- generator and its appli- ing Machinery, 47(10):76– cations in stream-cipher 82, October 2004. CODEN cryptography. Interna- CACMA2. ISSN 0001-0782 tional Journal of Modern (print), 1557-7317 (elec- Physics C [Physics and tronic). Computers], 19(5):813–820, May 2008. CODEN IJM- Wolf:2005:NML PEO. ISSN 0129-1831 (print), 1793-6586 (elec- [WW05] Stefan Wolf and J¨urg tronic). URL Wullschleger. New mono- http://www. tones and lower bounds worldscinet.com/ijmpc/ in unconditional two-party 19/1905/S0129183108012479. html. computation. In Shoup [Sho05a], pages 467–?? Wu:2001:CFF ISBN 3-540-28114-2. ISSN 0302-9743 (print), 1611- [WWA01] Lisa Wu, Chris Weaver, and 3349 (electronic). LCCN Todd Austin. CryptoMa- QA76.9.A25 C79 2005; niac: a fast flexible architec- QA76.9 .A25; QA76.9 C79 ture for secure communica- 2005; QA76.9 C794 2005; tion. ACM SIGARCH Com- QA76.9; Internet. URL puter Architecture News, http://www.springerlink. 29(2):110–119, May 2001. com/openurl.asp?genre= CODEN CANED2. ISSN issue&issn=0302-9743&volume= 0163-5964 (print), 1943- 3621. 5851 (electronic). Wang:2006:SPS Worley:2000:AFP

[WW06] Chung-Ming Wang and [WWCW00] John Worley, Bill Wor- Peng-Cheng Wang. Steganog- ley, Tom Christian, and REFERENCES 706

Christopher Worley. AES gov/encryption/aes/round2/ finalists on PA-RISC and conf3/papers/AES3Proceedings- IA-64: Implementations & 3.pdf; http://csrc.nist. performance. In NIST gov/encryption/aes/round2/ [NIS00], pages 57–74. ISBN conf3/papers/AES3Proceedings. ???? LCCN ???? pdf. URL http://csrc.nist. gov/encryption/aes/round2/ Wincelberg:2002:LIE conf3/aes3conf.htm; http:[WWL+02] David Wincelberg, Sy Wong, //csrc.nist.gov/encryption/ Dan Leach, Paul Keister, aes/round2/conf3/papers/ and Robert Masta. Letters: AES3Proceedings-1.pdf; Inside eBook security; nu- http://csrc.nist.gov/ merical weather forecasting; encryption/aes/round2/ FrontPage EULA; priority conf3/papers/AES3Proceedings- queues; audio watermark- 2.pdf; http://csrc.nist. ing versus compression. Dr. gov/encryption/aes/round2/ Dobb’s Journal of Software conf3/papers/AES3Proceedings- Tools, 27(3):10, March 2002. 3.pdf; http://csrc.nist. CODEN DDJOEB. ISSN gov/encryption/aes/round2/ 1044-789X. URL http:// conf3/papers/AES3Proceedings. www.ddj.com/. pdf. Wang:2008:HQS Wollinger:2000:HWH [WWTH08] Chung-Ming Wang, Nan- [WWGP00] Thomas J. Wollinger, Min I Wu, Chwei-Shyong Tsai, Wang, Jorge Guajardo, and Min-Shiang Hwang. A and Christof Paar. How high quality steganographic well are high-end DSPs method with pixel-value suited for the AES algo- differencing and modulus rithms? AES algorithms function. The Journal of on the TMS320C6x DSP. Systems and Software,81 In NIST [NIS00], pages 94– (1):150–158, January 2008. 105. ISBN ???? LCCN ???? CODEN JSSODM. ISSN URL http://csrc.nist. 0164-1212 (print), 1873- gov/encryption/aes/round2/ 1228 (electronic). conf3/aes3conf.htm; http: Wang:2002:WEM //csrc.nist.gov/encryption/ aes/round2/conf3/papers/ [WY02] Shiuh-Jeng Wang and Kai- AES3Proceedings-1.pdf; Sheng Yang. Watermark http://csrc.nist.gov/ embedding mechanism us- encryption/aes/round2/ ing modulus-based for in- conf3/papers/AES3Proceedings- tellectual property protec- 2.pdf; http://csrc.nist. tion on image data. Lecture REFERENCES 707

Notes in Computer Science, Wyler:2005:ANS 2455:333–??, 2002. CO- DEN LNCSD9. ISSN 0302- [Wyl05] Neil R. Wyler. Aggressive 9743 (print), 1611-3349 network self-defense.Syn- (electronic). URL http: gress Publishing, Inc., Rock- //link.springer-ny.com/ land, MA, USA, 2005. ISBN link/service/series/0558/ 1-931836-20-5. xxx + 383 bibs/2455/24550333.htm; pp. LCCN QA76.9.A25 http://link.springer- A38 2005; QA76.9.A25 ny.com/link/service/series/ A447 2005. URL http: 0558/papers/2455/24550333. //site.ebrary.com/lib/ pdf. ucsc/Doc?id=10075669. Wang:2005:CSA Wu:2005:CTR [WYY05a] Xiaoyun Wang, Yiqun Lisa [WY05] Lin-Chuan Wu and Yi- Yin, and Hongbo Yu. Col- Shiung Yeh. Comment on lision search attacks on traceability on RSA-based SHA1. Technical re- partially signature with low port, Shandong Univer- computation. Applied Math- sity, Shandong, China, ematics and Computation, 2005. URL http:// 170(2):1344–1348, Novem- theory.csail.mit.edu/~ ber 15, 2005. CODEN yiqun/shanote.pdf. AMHCBQ. ISSN 0096-3003 (print), 1873-5649 (elec- Wang:2005:FCFa tronic). [WYY05b] Xiaoyun Wang, Yiqun Lisa Wyant:2002:APK Yin, and Hongbo Yu. Find- ing collisions in the full [Wya02] Jeremy Wyant. Applicabil- SHA-1. Technical report, ity of public key cryptosys- Shandong University, Shan- tems to digital rights man- dong, China, June 22, 2005. agement applications. Lec- URL http://cryptome. ture Notes in Computer Sci- org/wang_sha1_v2.zip. ence, 2339:75–??, 2002. CO- Wang:2005:FCFb DEN LNCSD9. ISSN 0302- 9743 (print), 1611-3349 [WYY05c] Xiaoyun Wang, Yiqun Lisa (electronic). URL http: Yin, and Hongbo Yu. Find- //link.springer-ny.com/ ing collisions in the full link/service/series/0558/ SHA-1. In Shoup [Sho05a], bibs/2339/23390075.htm; pages 17–?? ISBN 3-540- http://link.springer- 28114-2. ISSN 0302-9743 ny.com/link/service/series/ (print), 1611-3349 (elec- 0558/papers/2339/23390075. tronic). LCCN QA76.9.A25 pdf. C79 2005; QA76.9 .A25; REFERENCES 708

QA76.9 C79 2005; QA76.9 et al. [HYZ05b], pages 79– C794 2005; QA76.9; In- ?? ISBN 981-270-153-2. ternet. URL http:/ LCCN ???? URL http:// /www.springerlink.com/ eproceedings.worldscinet. openurl.asp?genre=issue& com/9812701532/9812701532. issn=0302-9743&volume= 0031.html. . 3621 Xu:2001:EIE Wang:2005:ECSa [XB01] Sheng-Bo Xu and Lejla [WYY05d] Xiaoyun Wang, Hongbo Batina. Efficient imple- Yu, and Yiqun Lisa Yin. mentation of elliptic curve Efficient collision search cryptosystems on an ARM7 attacks on SHA-0. In with hardware accelera- Shoup [Sho05a], pages tor. Lecture Notes in 1–?? ISBN 3-540- Computer Science, 2200: 28114-2. ISSN 0302-9743 266–??, 2001. CODEN (print), 1611-3349 (elec- LNCSD9. ISSN 0302- tronic). LCCN QA76.9.A25 9743 (print), 1611-3349 C79 2005; QA76.9 .A25; (electronic). URL http: QA76.9 C79 2005; QA76.9 //link.springer-ny.com/ C794 2005; QA76.9; In- link/service/series/0558/ ternet. URL http:/ bibs/2200/22000266.htm; /www.springerlink.com/ http://link.springer- openurl.asp?genre=issue& ny.com/link/service/series/ issn=0302-9743&volume= 0558/papers/2200/22000266. 3621. pdf. Winslett:2005:PLD Xu:2005:ETR [WZB05] Marianne Winslett, Charles C. [XC05] Qiu-Liang Xu and Tzer- Zhang, and Piero A. Bon- Shyong Chen. An efficient atti. PeerAccess: a logic threshold RSA digital signa- for distributed authoriza- ture scheme. Applied Math- tion. In Meadows and Syver- ematics and Computation, son [MS05b], pages 168–179. 166(1):25–34, July 6, 2005. ISBN 1-59593-226-7. LCCN CODEN AMHCBQ. ISSN QA76.9.A25. ACM order 0096-3003 (print), 1873- number 459050. 5649 (electronic). Wang:2005:DIC Xu:2001:CPW [WZW05] Xuebing Wang, Linhua Zhang, and Yong Wu. De- [XFZ01] Changsheng Xu, David Da- sign and implementation of gan Feng, and Yongwei a chaos-based public key en- Zhu. Copyright protec- cryption scheme. In Han tion for WAV-table syn- REFERENCES 709

thesis audio using digi- 0020-0190 (print), 1872- tal watermarking. Lecture 6119 (electronic). Notes in Computer Science, 2195:772–??, 2001. CO- Xenakis:2006:GCO DEN LNCSD9. ISSN 0302- [XLMS06] Christos Xenakis, Nikolaos 9743 (print), 1611-3349 Laoutaris, Lazaros Merakos, (electronic). URL http: and Ioannis Stavrakakis. A //link.springer-ny.com/ generic characterization of link/service/series/0558/ the overheads imposed by bibs/2195/21950772.htm; IPsec and associated cryp- http://link.springer- tographic algorithms. Com- ny.com/link/service/series/ puter Networks (Amster- 0558/papers/2195/21950772. dam, Netherlands: 1999), pdf. 50(17):3225–3241, Decem- Xiao:2003:HPC ber 5, 2006. CODEN ???? ISSN 1389-1286 (print), [XH03] Lu Xiao and Howard M. 1872-7069 (electronic). Heys. Hardware per- formance characterization Xu:2007:CAD of block cipher struc- [XMST07] Changsheng Xu, Namunu C. tures. In Joye [Joy03b], Maddage, Xi Shao, and pages 176–192. CODEN Qi Tian. Content-adaptive LNCSD9. ISBN 3-540- digital music watermarking 00847-0. ISSN 0302-9743 based on music structure (print), 1611-3349 (elec- analysis. ACM Transactions tronic). LCCN QA76.9.A25 on Multimedia Computing, C822 2003. URL http: Communications, and Ap- //link.springer-ny.com/ plications, 3(1):??, February link/service/series/0558/ 2007. CODEN ???? ISSN tocs/t2612.htm; http: 1551-6857 (print), 1551- //www.springerlink.com/ 6865 (electronic). openurl.asp?genre=issue& issn=0302-9743&volume= Xu:2005:ADR 2612. + Xiao:2005:SPA [XNK 05] Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, and Chris [XH05] Lu Xiao and Howard M. Bookholt. Automatic diag- Heys. A simple power anal- nosis and response to mem- ysis attack against the key ory corruption vulnerabili- schedule of the Camellia ties. In Meadows and Syver- block cipher. Information son [MS05b], pages 223–234. Processing Letters, 95(3): ISBN 1-59593-226-7. LCCN 409–412, August 16, 2005. QA76.9.A25. ACM order CODEN IFPLAT. ISSN number 459050. REFERENCES 710

Xie:2007:ISP V9–238–V9–241. IEEE Com- puter Society Press, 1109 [XQ07] Tao Xie and Xiao Qin. Im- Spring Street, Suite 300, proving security for periodic Silver Spring, MD 20910, tasksinembeddedsystems USA, 2010. URL http: through scheduling. ACM //ieeexplore.ieee.org/ Transactions on Embedded stamp/stamp.jsp?tp=&arnumber= Computing Systems, 6(3): 5623043. 20:1–20:??, July 2007. CO- DEN ???? ISSN 1539-9087 Xiang:2008:CPA (print), 1558-3465 (elec- [XwWL08] Tao Xiang, Kwok wo Wong, tronic). and Xiaofeng Liao. Crypt- Xu:2003:TEP analysis of a password au- thentication scheme over in- [XS03] Shouhuai Xu and Ravi secure networks. Journal of Sandhu. Two efficient and Computer and System Sci- provably secure schemes ences, 74(5):657–661, Au- for server-assisted threshold gust 2008. CODEN JC- signatures. In Joye [Joy03b], SSBM. ISSN 0022-0000 pages 355–372. CODEN (print), 1090-2724 (elec- LNCSD9. ISBN 3-540- tronic). URL http:// 00847-0. ISSN 0302-9743 www.sciencedirect.com/ (print), 1611-3349 (elec- science/article/pii/S0022000007000657. tronic). LCCN QA76.9.A25 C822 2003. URL http: Xie:2004:CTA //link.springer-ny.com/ [XY04] Qi Xie and Xiu Yuan Yu. link/service/series/0558/ Cryptanalysis of Tseng et tocs/t2612.htm; http: al.’s authenticated encryp- //www.springerlink.com/ tion schemes. Applied openurl.asp?genre=issue& Mathematics and Compu- issn=0302-9743&volume= tation, 158(1):1–5, Octo- 2612. ber 25, 2004. CODEN Xin:2010:IEB AMHCBQ. ISSN 0096-3003 (print), 1873-5649 (elec- [XSWC10] Hong Xin, Zhu Shujing, tronic). Chen Weibin, and Jian Chongjun. An image Xu:2009:AVB encryption base on non- linear pseudo-random num- [XYL09] Songhua Xu, Wenxia Yang, ber generator. In 2010 and Francis C. M. Lau. Ap- International Conference plications: a visualization on Computer Application based approach for digi- and System Modeling (IC- tal signature authentication. CASM), volume 9, pages Computer Graphics Forum, REFERENCES 711

28(3):935–942, June 2009. com/Hash2005.pdf. World- CODEN CGFODY. ISSN Wide Web document. 0167-7055 (print), 1467- Yan:2007:CAR 8659 (electronic). [Yan07] Song Y. Yan. Cryptanalytic Xing-Yuan:2011:PRS attacks on RSA. Springer- [XYXYX11] Wang Xing-Yuan, Qin Xue, Verlag, Berlin, Germany / and Xie Yi-Xin. Pseudo- Heidelberg, Germany / Lon- random sequences gener- don, UK / etc., 2007. ISBN ated by a class of one- 0-387-48741-7. xx + 254 dimensional smooth map. pp. LCCN QA76.9.A25 Y34 Chinese Physics Letters,28 2007. (8):080501, 2011. CO- Yasuda:2008:DLP DEN CPLEEU. ISSN 0256- 307X (print), 1741-3540 [Yas08] Masaya Yasuda. The dis- (electronic). URL http: crete logarithm problem on //stacks.iop.org/0256- elliptic curves defined over 307X/28/i=8/a=080501. Q (abstract only). ACM Communications in Com- Yan:2000:NTC puter Algebra, 42(1–2):64– [Yan00] S. Y. Yan. Number Theory 66, March/June 2008. CO- for Computing. Springer- DEN ???? ISSN 1932-2232 Verlag, Berlin, Germany / (print), 1932-2240 (elec- Heidelberg, Germany / Lon- tronic). don, UK / etc., 2000. ISBN Yuan-bo:2004:ITA 0-387-65472-0. 256 (est.) pp. LCCN ???? US$46.00. [YbJf04] Guo Yuan-bo and Ma Jian- feng. An intrusion-tolerant Yang:2002:NEC authorization and authenti- [Yan02] Ching-Nung Yang. A note cation scheme in distributed on efficient color visual en- environments. Operating cryption. Journal of In- Systems Review, 38(4):45– formation Science and En- 51, October 2004. CODEN gineering, 18(3):367–372, OSRED8. ISSN 0163-5980 2002. CODEN JINEEY. (print), 1943-586X (elec- ISSN 1016-2364. Data en- tronic). cryption and cryptography. Yue:2001:GNN Yang:2005:TFN [YC01] Tai-Wen Yue and Suchen [Yan05] JiXian Yang. TWOBLOCK: Chiang. The general neural- a fast new hash func- network paradigm for vi- tion, 2005. URL http: sual cryptography. Lecture //yjxonline.hostrocket. Notes in Computer Science, REFERENCES 712

2084:196–??, 2001. CO- Yang:2009:ETP DEN LNCSD9. ISSN 0302- 9743 (print), 1611-3349 [YC09a] Jen-Ho Yang and Chin- (electronic). URL http: Chen Chang. An efficient //link.springer-ny.com/ three-party authenticated link/service/series/0558/ key exchange protocol us- bibs/2084/20840196.htm; ing elliptic curve cryptog- http://link.springer- raphy for mobile-commerce ny.com/link/service/series/ environments. The Jour- 0558/papers/2084/20840196. nal of Systems and Software, pdf. 82(9):1497–1502, Septem- ber 2009. CODEN JS- SODM. ISSN 0164-1212 Yue:2007:SEV (print), 1873-1228 (elec- tronic). [YC07] Tai-Wen Yue and Suchen Chiang. The semipublic en- Yang:2009:IBR cryption for visual cryptog- [YC09b] Jen-Ho Yang and Chin- raphy using Q’tron neural Chen Chang. An ID- networks. Journal of Net- based remote mutual au- work and Computer Appli- thentication with key agree- cations, 30(1):24–41, Jan- ment scheme for mobile de- uary 2007. CODEN JN- vices on elliptic curve cryp- CAF3. ISSN 1084-8045 tosystem. Computers & (print), 1095-8592 (elec- Security, 28(3–4):138–143, tronic). URL http:// May/June 2009. CODEN www.sciencedirect.com/ CPSEDU. ISSN 0167-4048 science/article/pii/S1084804505000391. (print), 1872-6208 (elec- tronic). URL https:// Yiu:2008:ODC www.sciencedirect.com/ science/article/pii/S0167404808001120. [YC08] Wai-Pun Ken Yiu and Yang:2009:CGA Shueng-Han Gary Chan. Of- fering data confidentiality [YC09c] Seung S. Yang and Hongsik for multimedia overlay mul- Choi. A complement to ticast: Design and anal- the GridOne authentication ysis. ACM Transactions method. Network Secu- on Multimedia Computing, rity, 2009(12):12–18, De- Communications, and Ap- cember 2009. CODEN plications, 5(2):13:1–13:??, NTSCF5. ISSN 1353-4858 November 2008. CODEN (print), 1872-9371 (elec- ???? ISSN 1551-6857 tronic). URL http:// (print), 1551-6865 (elec- www.sciencedirect.com/ tronic). science/article/pii/S1353485810700076. REFERENCES 713

Yang:2004:MSS Chung-Chun Wang. Im- provements of image shar- [YCH04] Chou-Chen Yang, Ting- ing with steganography and Yi Chang, and Min-Shiang authentication. The Jour- Hwang. A (t, n) multi-secret nal of Systems and Software, sharing scheme. Applied 80(7):1070–1076, July 2007. Mathematics and Com- CODEN JSSODM. ISSN putation, 151(2):483–490, 0164-1212 (print), 1873- April 5, 2004. CODEN 1228 (electronic). AMHCBQ. ISSN 0096-3003 (print), 1873-5649 (elec- Yung:2006:PKC tronic). [YDKM06] Moti Yung, Yevgeniy Dodis, Yu:2007:NSM Aggelos Kiayias, and Tal Malkin, editors. Public Key [YCL07] Yuan-Hui Yu, Chin-Chen Cryptography: PPK 2006: Chang, and Iuon-Chang 9th International Confer- Lin. A new stegano- ence on Theory and Prac- graphic method for color tice in Public-Key Cryp- and grayscale image hiding. tography, New York, NY, Computer Vision and Im- USA, April 24–26, 2006. age Understanding: CVIU, Proceedings, volume 3958 107(3):183–194, September of Lecture Notes in Com- 2007. CODEN CVIUF4. puter Science. Springer-Ver- ISSN 1077-3142 (print), lag, Berlin, Germany / Hei- 1090-235X (electronic). delberg, Germany / Lon- Yang:2008:NFD don, UK / etc., 2006. ISBN 3-540-33851-9 (softcover). + [YCW 08] Guomin Yang, Jing Chen, LCCN ???? URL http: Duncan S. Wong, Xi- //www.springerlink.com/ aotie Deng, and Dongsheng openurl.asp?genre=issue& Wang. A new framework issn=0302-9743&volume= for the design and analy- 3958. sis of identity-based iden- Yekhanin:2007:LDC tification schemes. Theo- retical Computer Science, [Yek07] Sergey Yekhanin. Lo- 407(1–3):370–388, Novem- cally Decodable Codes and ber 6, 2008. CODEN TC- Private Information Re- SCDI. ISSN 0304-3975 trieval Schemes.Ph.D. (print), 1879-2294 (elec- dissertation, Massachusetts tronic). Institute of Technology, Cambridge, MA, USA, Yang:2007:IIS 2007. URL http:// [YCYW07] Ching-Nung Yang, Tse-Shih www.acm.org/press-room/ Chen, Kun Hsuan Yu, and news-releases/dd-award- REFERENCES 714

07. Winner of the ACM DEN LNCSD9. ISSN 0302- 2007 Doctoral Dissertation 9743 (print), 1611-3349 Award. (electronic). URL http: Yan:2006:ICP //link.springer-ny.com/ link/service/series/0558/ [YEP+06] Chenyu Yan, Daniel En- bibs/1978/19780109.htm; glender, Milos Prvulovic, http://link.springer- Brian Rogers, and Yan ny.com/link/service/series/ Solihin. Improving cost, 0558/papers/1978/19780109. performance, and secu- pdf. rity of memory encryp- tion and authentication. Youssef:2001:CPK ACM SIGARCH Computer Architecture News, 34(2): [YG01c] Amr Youssef and Guang 179–190, 2006. CODEN Gong. Cryptanalysis of CANED2. ISSN 0163-5964 a public key cryptosys- (print), 1943-5851 (elec- tem proposed at ACISP tronic). 2000. Lecture Notes in Computer Science, 2119: Youssef:2001:CIM 15–??, 2001. CODEN LNCSD9. ISSN 0302- [YG01a] A. Youssef and G. Gong. 9743 (print), 1611-3349 Cryptanalysis of Imai and (electronic). URL http: Matsumoto scheme B asym- //link.springer-ny.com/ metric cryptosystem. Lec- link/service/series/0558/ ture Notes in Computer Sci- bibs/2119/21190015.htm; ence, 2247:214–??, 2001. http://link.springer- CODEN LNCSD9. ISSN ny.com/link/service/series/ 0302-9743 (print), 1611- 0558/papers/2119/21190015. 3349 (electronic). URL pdf. http://link.springer-ny. com/link/service/series/ Yang:2005:IME 0558/bibs/2247/22470214. htm; http://link.springer-[YGZ05] Jun Yang, Lan Gao, and ny.com/link/service/series/ Youtao Zhang. Improv- 0558/papers/2247/22470214. ing memory encryption per- pdf. formance in secure pro- Youssef:2001:IAB cessors. IEEE Transac- tions on Computers, 54(5): [YG01b] A. M. Youssef and G. Gong. 630–640, May 2005. CO- On the interpolation attacks DEN ITCOB4. ISSN on block ciphers. Lecture 0018-9340 (print), 1557- Notes in Computer Science, 9956 (electronic). URL 1978:109–??, 2001. CO- http://ieeexplore.ieee. REFERENCES 715

org/stamp/stamp.jsp?tp= Yen:2000:CBO &arnumber=1407851. [YJ00] Sung-Ming Yen and M. Joye. Yamamura:2000:QCB Checking before output may not be enough against fault- [YI00] Akihiro Yamamura and Hi- based cryptanalysis. IEEE rokazu Ishizuka. Quantum Transactions on Comput- cryptanalysis of block ci- ers, 49(9):967–970, Septem- phers. S¯urikaisekikenky¯usho ber 2000. CODEN ITCOB4. K¯oky¯uroku, 1166:235–243, ISSN 0018-9340 (print), 2000. Algebraic systems, 1557-9956 (electronic). URL formal languages and com- http://ieeexplore.ieee. putations (Japanese) (Ky- org/stamp/stamp.jsp?tp= oto, 2000). &arnumber=869328. Yamamura:2001:EDA Yen:2002:CAO [YKLM02a] Sung-Ming Yen, Seungjoo [YI01] Akihiro Yamamura and Hi- Kim, Seongan Lim, and rokazu Ishizuka. Error Sangjae Moon. A counter- detection and authentica- measure against one physi- tion in quantum key dis- cal cryptanalysis may bene- tribution. Lecture Notes fit another attack. Lecture in Computer Science, 2119: Notes in Computer Science, 260–??, 2001. CODEN 2288:414–??, 2002. CO- LNCSD9. ISSN 0302- DEN LNCSD9. ISSN 0302- 9743 (print), 1611-3349 9743 (print), 1611-3349 (electronic). URL http: (electronic). URL http: //link.springer-ny.com/ //link.springer-ny.com/ link/service/series/0558/ link/service/series/0558/ bibs/2119/21190260.htm; bibs/2288/22880414.htm; http://link.springer- http://link.springer- ny.com/link/service/series/ ny.com/link/service/series/ 0558/papers/2119/21190260. 0558/papers/2288/22880414. pdf. pdf. Yi:2004:AKA Yen:2002:RSR [Yi04] Xun Yi. Authenticated key [YKLM02b] Sung-Ming Yen, Seungjoo agreement in dynamic peer Kim, Seongan Lim, and groups. Theoretical Com- Sangjae Moon. RSA puter Science, 326(1–3): speedup with residue num- 363–382, October 20, 2004. ber system immune against CODEN TCSCDI. ISSN hardware fault cryptanal- 0304-3975 (print), 1879- ysis. Lecture Notes in 2294 (electronic). Computer Science, 2288: REFERENCES 716

397–??, 2002. CODEN Morita, and Ryuji Ya- LNCSD9. ISSN 0302- mada. Public-key-based 9743 (print), 1611-3349 high-speed payment (elec- (electronic). URL http: tronic money) system us- //link.springer-ny.com/ ing contact-less smart cards. link/service/series/0558/ Lecture Notes in Computer bibs/2288/22880397.htm; Science, 2140:242–??, 2001. http://link.springer- CODEN LNCSD9. ISSN ny.com/link/service/series/ 0302-9743 (print), 1611- 0558/papers/2288/22880397. 3349 (electronic). URL pdf. http://link.springer-ny. com/link/service/series/ Yen:2003:RSC 0558/bibs/2140/21400242. [YKLM03] Sung-Ming Yen, Seungjoo htm; http://link.springer- Kim, Seongan Lim, and ny.com/link/service/series/ Sang-Jae Moon. RSA 0558/papers/2140/21400242. speedup with Chinese Re- pdf. mainder Theorem immune Yu:2001:TCB against hardware fault cryptanalysis. IEEE Trans- [YKW01] Heather Yu, Xiangyang actions on Computers,52 Kong, and Wayne Wolf. (4):461–472, April 2003. Techniques for content- CODEN ITCOB4. ISSN based graph authentication. 0018-9340 (print), 1557- IEEE MultiMedia, 8(4):38– 9956 (electronic). URL 45, October 2001. CODEN http://ieeexplore.ieee. IEMUE4. ISSN 1070-986X org/stamp/stamp.jsp?tp= (print), 1941-0166 (elec- &arnumber=1190587. tronic). URL http://dlib. Yardi:2008:HAC computer.org/mu/books/ mu2001/pdf/u4038.pdf; [YKMB08] Sarita Yardi, Pamela Kro- http://www.computer.org/ likowski, Taneshia Mar- multimedia/mu2001/u4038abs. shall, and Amy Bruckman. htm. An HCI approach to com- Yi:2009:SSG puting in the real world. ACM Journal on Educa- [YLC+09] Ke Yi, Feifei Li, Gra- tional Resources in Comput- ham Cormode, Marios Had- ing (JERIC), 8(3):9:1–9:??, jieleftheriou, George Kol- October 2008. CODEN ???? lios, and Divesh Srivastava. ISSN 1531-4278. Small synopses for group- Yamamoto:2001:PKB by query verification on out- sourced data streams. ACM [YKMY01] Hideo Yamamoto, Tetsu- Transactions on Database taro Kobayashi, Masahiro Systems, 34(3):15:1–15:??, REFERENCES 717

August 2009. CODEN Syverson [MS05b], pages ATDSD3. ISSN 0362-5915 280–288. ISBN 1-59593- (print), 1557-4644 (elec- 226-7. LCCN QA76.9.A25. tronic). ACM order number 459050. Yue:2006:NCB Yu:2005:EHI [YLT06] Yao Yue, Chuang Lin, and [YLH05] Jia Yu, Daxing Li, and Zhangxi Tan. NPCrypt- Rong Hao. An efficient Bench: a cryptographic hierarchical ID-based sig- benchmark suite for net- nature scheme. In Han work processors. ACM et al. [HYZ05b], pages 92– SIGARCH Computer Archi- ?? ISBN 981-270-153-2. tecture News, 34(1):49–56, LCCN ???? URL http:// 2006. CODEN CANED2. eproceedings.worldscinet. ISSN 0163-5964 (print), com/9812701532/9812701532. 1943-5851 (electronic). 0031.html. Young:2001:RP Yoo:2002:LAU [YN01] John Young and Deborah [YLLL02] Hyejoung Yoo, Kwangsoo Natsios. Reversing the Lee, Sangjin Lee, and Jon- panopticon, 2001. Unpub- gin Lim. Off-line au- lished invited talk, Tenth thentication using water- USENIX Security Sympo- marks. Lecture Notes in sium, August 13–17, 2001, Computer Science, 2288: Washington, DC, USA. 200–??, 2002. CODEN LNCSD9. ISSN 0302- Youssef:2001:CAF 9743 (print), 1611-3349 [You01] A. M. Youssef. Cryptanaly- (electronic). URL http: sis of the “Augmented Fam- //link.springer-ny.com/ ily of Cryptographic Par- link/service/series/0558/ ity Circuits” proposed at bibs/2288/22880200.htm; ISW’97. Lecture Notes in http://link.springer- Computer Science, 2012: ny.com/link/service/series/ 29–38, 2001. CODEN 0558/papers/2288/22880200. LNCSD9. ISSN 0302- pdf. 9743 (print), 1611-3349 Yurkewych:2005:CIR (electronic). URL http: //link.springer-ny.com/ [YLR05] Matthew Yurkewych, Brian N. link/service/series/0558/ Levine, and Arnold L. bibs/2012/20120029.htm; Rosenberg. On the cost- http://link.springer- ineffectiveness of redun- ny.com/link/service/series/ dancy in commercial P2P 0558/papers/2012/20120029. computing. In Meadows and pdf. REFERENCES 718

Young:2004:HRV databases. VLDB Jour- nal: Very Large Data Bases, [You04] Dale Young. Human 18(3):631–648, June 2009. resources have a vital CODEN VLDBFR. ISSN role to play within em- 1066-8888 (print), 0949- ployee identity and ac- 877X (electronic). cess management. Net- work Security, 2004(11):5– Yin:2001:RMW 7, November 2004. CODEN NTSCF5. ISSN 1353-4858 [YPSZ01] Kangkang Yin, Zhigeng (print), 1872-9371 (elec- Pan, Jiaoying Shi, and tronic). URL http:// David Zhang. Robust www.sciencedirect.com/ mesh watermarking based science/article/pii/S1353485804001540. on multiresolution process- ing. Computers and Graph- Young:2006:MCC ics, 25(3):409–420, June [You06] Anne L. Young. Mathe- 2001. CODEN COGRD2. matical ciphers: from Cae- ISSN 0097-8493 (print), sar to RSA,volume25of 1873-7684 (electronic). URL Mathematical world.Amer- http://www.elsevier.nl/ ican Mathematical Society, gej-ng/10/13/20/57/32/ Providence, RI, USA, 2006. 32/abstract.html; http: ISBN 0-8218-3730-3. viii + //www.elsevier.nl/gej- 159 pp. LCCN ???? ng/10/13/20/57/32/32/article. pdf. Youn:2008:WRB Yilek:2009:WPK [YPKL08] Taek-Young Youn, Young- Ho Park, Changhan Kim, [YRS+09] Scott Yilek, Eric Rescorla, and Jongin Lim. Weakness Hovav Shacham, Brandon in a RSA-based password Enright, and Stefan Sav- authenticated key exchange age. When private keys protocol. Information Pro- are public: Results from the cessing Letters, 108(6):339– 2008 Debian OpenSSL vul- 342, November 30, 2008. nerability. In ????, edi- CODEN IFPLAT. ISSN tor, ACM Internet Measure- 0020-0190 (print), 1872- ment Conference, page ?? 6119 (electronic). ACM Press, New York, NY 10036, USA, 2009. ISBN Yang:2009:AIO ???? LCCN ???? URL ? [YPPK09] Yin Yang, Stavros Pa- ???. padopoulos, Dimitris Pa- Yoon:2004:SUA padias, and George Kol- lios. Authenticated index- [YRY04] Eun-Jun Yoon, Eun-Kyung ing for outsourced spatial Ryu, and Kee-Young Yoo. REFERENCES 719

A secure user authenti- protocol based on Diffie– cation scheme using hash Hellman algorithm. Applied functions. Operating Sys- Mathematics and Computa- tems Review, 38(2):62–68, tion, 167(1):274–280, Au- April 2004. CODEN OS- gust 5, 2005. CODEN RED8. ISSN 0163-5980 AMHCBQ. ISSN 0096-3003 (print), 1943-586X (elec- (print), 1873-5649 (elec- tronic). tronic).

Yoon:2005:CFI Yoon:2005:IHL

[YRY05a] Eun-Jun Yoon, Eun-Kyung [YRY05d] Eun-Jun Yoon, Eun-Kyung Ryu, and Kee-Young Yoo. Ryu, and Kee-Young Yoo. Cryptanalysis and further An improvement of Hwang– improvement of Peinado’s Lee–Tang’s simple remote improved LHL-key authen- user authentication scheme. tication scheme. Applied Computers & Security,24 Mathematics and Com- (1):50–56, February 2005. putation, 168(2):788–794, CODEN CPSEDU. ISSN September 15, 2005. CO- 0167-4048 (print), 1872- DEN AMHCBQ. ISSN 6208 (electronic). URL 0096-3003 (print), 1873- https://www.sciencedirect. 5649 (electronic). com/science/article/pii/ S0167404804001749. Yoon:2005:ICJ Yeh:2002:SAK [YRY05b] Eun-Jun Yoon, Eun-Kyung Ryu, and Kee-Young Yoo. [YS02] Her-Tyan Yeh and Hung- Improvement of Chien– Min Sun. Simple authen- Jan’s authenticated multiple- ticated key agreement pro- key agreement protocol tocol resistant to password without using conventional guessing attacks. Operating one-way function. Applied Systems Review, 36(4):14– Mathematics and Computa- 22, October 2002. CODEN tion, 167(1):711–715, Au- OSRED8. ISSN 0163-5980 gust 5, 2005. CODEN (print), 1943-586X (elec- AMHCBQ. ISSN 0096-3003 tronic). (print), 1873-5649 (elec- tronic). Yeh:2004:PBU Yoon:2005:IFA [YS04] Her-Tyan Yeh and Hung- Min Sun. Password-based [YRY05c] Eun-Jun Yoon, Eun-Kyung user authentication and key Ryu, and Kee-Young Yoo. distribution protocols for Improvement of Fan et client–server applications. al.’s deniable authentication The Journal of Systems REFERENCES 720

and Software, 72(1):97–103, end-to-end authentication June 2004. CODEN JS- protocol in wireless appli- SODM. ISSN 0164-1212 cation protocol. Lecture (print), 1873-1228 (elec- Notes in Computer Science, tronic). 2119:247–??, 2001. CO- DEN LNCSD9. ISSN 0302- Yanami:2002:DLC 9743 (print), 1611-3349 [YSD02] Hitoshi Yanami, Takeshi (electronic). URL http: Shimoyama, and Orr Dunkel- //link.springer-ny.com/ man. Differential and linear link/service/series/0558/ cryptanalysis of a reduced- bibs/2119/21190247.htm; round SC2000. Lecture http://link.springer- Notes in Computer Science, ny.com/link/service/series/ 2365:34–??, 2002. CO- 0558/papers/2119/21190247. DEN LNCSD9. ISSN 0302- pdf. 9743 (print), 1611-3349 Yoshiura:2001:AWB (electronic). URL http: //link.springer-ny.com/ [YSS+01] Hiroshi Yoshiura, Takaaki link/service/series/0558/ Shigematsu, Seiichi Susaki, bibs/2365/23650034.htm; Tsukasa Saitoh, Hisashi http://link.springer- Toyoshima, Chikako Ku- ny.com/link/service/series/ rita, Satoru Tezuka, and Ry- 0558/papers/2365/23650034. oichi Sasaki. Authenticat- pdf. ing Web-based virtual shops using signature-embedded Yeh:2003:IAM marks — A practical anal- [YSH03] Her-Tyan Yeh, Hung-Min ysis. Lecture Notes in Sun, and Tzonelih Hwang. Computer Science, 2133: Improved authenticated 238–??, 2001. CODEN multiple-key agreement pro- LNCSD9. ISSN 0302- tocol. Computers and 9743 (print), 1611-3349 Mathematics with Appli- (electronic). URL http: cations, 46(2–3):207–211, //link.springer-ny.com/ July/August 2003. CODEN link/service/series/0558/ CMAPDK. ISSN 0898-1221 bibs/2133/21330238.htm; (print), 1873-7668 (elec- http://link.springer- tronic). URL http:// ny.com/link/service/series/ www.sciencedirect.com/ 0558/papers/2133/21330238. science/article/pii/S0898122103900253. pdf. Yang:2001:EEA Yao:2009:CAR

[YSR01] Jong-Phil Yang, Weon Shin, [YT09] Danfeng Yao and Roberto and Kyung-Hyune Rhee. An Tamassia. Compact and REFERENCES 721

anonymous role-based au- Yang. A secure and effi- thorization chain. ACM cient authentication proto- Transactions on Informa- col for anonymous channel tion and System Security, in wireless communications. 12(3):15:1–15:??, January Applied Mathematics and 2009. CODEN ATISBQ. Computation, 169(2):1431– ISSN 1094-9224 (print), 1439, October 15, 2005. 1557-7406 (electronic). CODEN AMHCBQ. ISSN 0096-3003 (print), 1873- Yang:2004:ENT 5649 (electronic). [YTH04] Cheng-Ying Yang, Shiang- Yung:2002:ACC Feng Tzeng, and Min- Shiang Hwang. On the [Yun02a] Moti Yung, editor. Ad- efficiency of nonrepudiable vances in cryptology — threshold proxy signature CRYPTO 2002: 22nd An- scheme with known sign- nual International Cryptol- ers. The Journal of Systems ogy Conference, Santa Bar- and Software, 73(3):507– bara, California, USA, Au- 514, November/December gust 18–22, 2002: Proceed- 2004. CODEN JSSODM. ings, volume 2442 of Lecture ISSN 0164-1212 (print), Notes in Computer Science 1873-1228 (electronic). and Lecture Notes in Ar- tificial Intelligence. Spring- Ytrehus:2006:CCI er-Verlag, Berlin, Ger- many / Heidelberg, Ger- [Ytr06] Øyvind Ytrehus, editor. many / London, UK / etc., Coding and Cryptography: 2002. CODEN LNCSD9. International Workshop, ISBN 3-540-44050-X (pa- WCC 2005, Bergen, Nor- perback). ISSN 0302-9743 way, March 14–18, 2005. (print), 1611-3349 (elec- Revised Selected Papers, tronic). LCCN QA76.9.A25 volume 3969 of Lecture C79 2002. URL http: Notes in Computer Science. //link.springer-ny.com/ Springer-Verlag, Berlin, link/service/series/0558/ Germany / Heidelberg, Ger- tocs/t2442.htm; http: many / London, UK / etc., //www.springerlink.com/ 2006. ISBN 3-540-35481- openurl.asp?genre=issue& 6. LCCN QA76.9.A25 I557 issn=0302-9743&volume= 2005. 2442. Yang:2005:SEA Yung:2002:CI [YTWY05] Chou-Chen Yang, Yuan- [Yun02b] Moti Yung. Crypto- Liang Tang, Ren-Chiun integrity. Lecture Notes Wang, and Hung-Wen in Computer Science, 2501: REFERENCES 722

567–??, 2002. CODEN ticated multiple-key agree- LNCSD9. ISSN 0302-9743 ment protocol without using (print), 1611-3349 (elec- conventional one-way func- tronic). URL http:// tion. Applied Mathemat- link.springer.de/link/ ics and Computation, 162 service/series/0558/bibs/ (1):211–214, March 4, 2005. 2501/25010567.htm; http: CODEN AMHCBQ. ISSN //link.springer.de/link/ 0096-3003 (print), 1873- service/series/0558/papers/ 5649 (electronic). 2501/25010567.pdf. Yen:2006:SED Yang:2004:ISE [YW06] Chih-Hsu Yen and Bing-Fei [YW04a] Chou-Chen Yang and Ren- Wu. Simple error detection Ching Wang. An improve- methods for hardware im- ment of security enhance- plementation of Advanced ment for the timestamp- Encryption Standard. IEEE based password authenti- Transactions on Computers, cation scheme using Smart 55(6):720–731, June 2006. Cards. Operating Sys- CODEN ITCOB4. ISSN tems Review, 38(3):91–96, 0018-9340 (print), 1557- July 2004. CODEN OS- 9956 (electronic). URL RED8. ISSN 0163-5980 http://ieeexplore.ieee. (print), 1943-586X (elec- org/stamp/stamp.jsp?tp= tronic). &arnumber=1628959. Yang:2004:CUF Yang:2005:IYS

[YW04b] Chou-Chen Yang and Ren- [YWC05] Chou-Chen Yang, Ren- Chiun Wang. Cryptanal- Chiun Wang, and Ting- ysis of a user friendly re- Yi Chang. An im- mote authentication scheme provement of the Yang- with smart cards. Comput- Shieh password authenti- ers & Security, 23(5):425– cation schemes. Applied 427, July 2004. CODEN Mathematics and Compu- CPSEDU. ISSN 0167-4048 tation, 162(3):1391–1396, (print), 1872-6208 (elec- March 25, 2005. CODEN tronic). URL https:// AMHCBQ. ISSN 0096-3003 www.sciencedirect.com/ (print), 1873-5649 (elec- science/article/pii/S0167404804001002. tronic). Yang:2005:CIA Yang:2008:VCS

[YW05] Chou-Chen Yang and Ren- [YWC08] Ching-Nung Yang, Chung- Chiun Wang. Cryptanal- Chun Wang, and Tse-Shih ysis of improved authen- Chen. Visual cryptogra- REFERENCES 723

phy schemes with revers- Yang:2008:TFM ing. The Computer Jour- nal, 51(6):710–722, Novem- [YWWD08] Guomin Yang, Duncan S. ber 2008. CODEN CM- Wong, Huaxiong Wang, PJA6. ISSN 0010-4620 and Xiaotie Deng. Two- (print), 1460-2067 (elec- factor mutual authentica- tronic). URL http:// tion based on smart cards comjnl.oxfordjournals. and passwords. Journal org/cgi/content/abstract/ of Computer and System 51/6/710; http://comjnl. Sciences, 74(7):1160–1172, oxfordjournals.org/cgi/ November 2008. CODEN content/full/51/6/710; JCSSBM. ISSN 0022-0000 http://comjnl.oxfordjournals. (print), 1090-2724 (elec- org/cgi/reprint/51/6/710. tronic). URL http:// www.sciencedirect.com/ Yang:2008:FSD science/article/pii/S0022000008000482.

[YWD08] G. Yang, D. S. Wong, and Yang:2009:CLW X. Deng. Formal security [YWWS09] Cheng-Hsing Yang, Chi- definition and efficient con- Yao Weng, Shiuh-Jeng struction for roaming with Wang, and Hung-Min Sun. a privacy-preserving exten- Codebook-linked water- sion. J.UCS: Journal of marking scheme for digital Universal Computer Sci- images. Fundamenta In- ence, 14(3):441–462, ???? formaticae, 92(4):397–409, 2008. CODEN ???? ISSN June 2009. CODEN FU- 0948-6968. URL http:// MAAJ. ISSN 0169-2968 www.jucs.org/jucs_14_3/ (print), 1875-8681 (elec- formal_security_definition_ tronic). and. Young:2000:RBA Yang:2005:SAS [YY00] Adam Young and Moti [YWL05] Chou-Chen Yang, Ren- Yung. RSA-based auto- Chiun Wang, and Wei-Ting recoverable cryptosystems. Liu. Secure authentica- Lecture Notes in Com- tion scheme for session ini- puter Science, 1751:326– tiation protocol. Comput- 341, 2000. CODEN ers & Security, 24(5):381– LNCSD9. ISSN 0302-9743 386, August 2005. CODEN (print), 1611-3349 (elec- CPSEDU. ISSN 0167-4048 tronic). (print), 1872-6208 (elec- Young:2001:BOK tronic). URL https:// www.sciencedirect.com/ [YY01] A. Young and M. Yung. science/article/pii/S0167404804002640. Bandwidth-optimal klepto- REFERENCES 724

graphic attacks. Lecture Yoon:2005:SWL Notes in Computer Science, 2162:235–??, 2001. CO- [YY05b] Eun-Jun Yoon and Kee- DEN LNCSD9. ISSN 0302- Young Yoo. On the se- 9743 (print), 1611-3349 curity of Wu-Lin’s robust (electronic). URL http: key authentication scheme. //link.springer-ny.com/ Applied Mathematics and link/service/series/0558/ Computation, 169(1):1–7, bibs/2162/21620235.htm; October 1, 2005. CODEN http://link.springer- AMHCBQ. ISSN 0096-3003 ny.com/link/service/series/ (print), 1873-5649 (elec- 0558/papers/2162/21620235. tronic). pdf. Ye:2001:ATD Young:2004:MCE [YYDO01] Dingfeng Ye, Junhui Yang, [YY04] Adam Young and Moti Zongduo Dai, and Haiwen Yung. Malicious cryptog- Ou. Attacks on two digital raphy: exposing cryptovirol- signature schemes based on ogy. John Wiley and Sons, error correcting codes. Lec- Inc., New York, NY, USA, ture Notes in Computer Sci- 2004. ISBN 0-7645-4975-8 ence, 2229:84–??, 2001. CO- (paperback). xxiv + 392 DEN LNCSD9. ISSN 0302- pp. LCCN QA76.9.A25 Y65 9743 (print), 1611-3349 2004. URL http://www. (electronic). URL http: loc.gov/catdir/bios/wiley047/ //link.springer-ny.com/ 2003023863.html; http: link/service/series/0558/ //www.loc.gov/catdir/description/ bibs/2229/22290084.htm; wiley041/2003023863.html; http://link.springer- http://www.loc.gov/catdir/ ny.com/link/service/series/ toc/wiley041/2003023863. 0558/papers/2229/22290084. html. pdf. Yoon:2005:CZX You:2001:GEC [YY05a] Eun-Jun Yoon and Kee- [YYZ01] Lin You, Yi Xian Yang, and Young Yoo. Cryptanaly- Chun Qi Zhang. Generaliza- sis of Zhang–Xiao’s mul- tion of elliptic curve digital tisignature scheme for spec- signature schemes. Lecture ified group of verifiers. Notes in Computer Science, Applied Mathematics and 2229:246–??, 2001. CO- Computation, 170(1):226– DEN LNCSD9. ISSN 0302- 229, November 1, 2005. CO- 9743 (print), 1611-3349 DEN AMHCBQ. ISSN (electronic). URL http: 0096-3003 (print), 1873- //link.springer-ny.com/ 5649 (electronic). link/service/series/0558/ REFERENCES 725

bibs/2229/22290246.htm; ators. In NRSC 2009. Na- http://link.springer- tional Radio Science Con- ny.com/link/service/series/ ference, 2009, pages 1– 0558/papers/2229/22290246. 15. IEEE Computer Society pdf. Press, 1109 Spring Street, Suite 300, Silver Spring, MD Yen:2000:WOW 20910, USA, 2009. URL [YZ00] Sung-Ming Yen and Yu- http://ieeexplore.ieee. liang Zheng. Weighted org/stamp/stamp.jsp?tp= one-way hash chain and &arnumber=5233974. its applications. Lecture Zafar:2000:ACB Notes in Computer Science, 1975:135–??, 2000. CO- [Zaf00] Naeem Zafar. Authen- DEN LNCSD9. ISSN 0302- tication company buys 9743 (print), 1611-3349 smart card firm. Net- (electronic). URL http: work Security, 2000(5):4– //link.springer-ny.com/ 5, May 1, 2000. CODEN link/service/series/0558/ NTSCF5. ISSN 1353-4858 bibs/1975/19750135.htm; (print), 1872-9371 (elec- http://link.springer- tronic). URL http:// ny.com/link/service/series/ www.sciencedirect.com/ 0558/papers/1975/19750135. science/article/pii/S135348580005011X. pdf. Zane:2001:EWD Ye:2007:NAW [Zan01] Francis Zane. Efficient wa- [YZDW07] Dengpan Ye, Changfu Zou, termark detection and col- Yuewei Dai, and Zhiquan lusion security. Lecture Wang. A new adaptive Notes in Computer Science, watermarking for real-time 1962:21–??, 2001. CO- MPEG videos. Applied DEN LNCSD9. ISSN 0302- Mathematics and Computa- 9743 (print), 1611-3349 tion, 185(2):907–918, Febru- (electronic). URL http: ary 15, 2007. CODEN //link.springer-ny.com/ AMHCBQ. ISSN 0096-3003 link/service/series/0558/ (print), 1873-5649 (elec- bibs/1962/19620021.htm; tronic). http://link.springer- ny.com/link/service/series/ Youssef:2009:IEU 0558/papers/1962/19620021. . [YZEE09] M. I. Youssef, M. Zahara, pdf A. E. Emam, and M. A. El- Zhang:2005:ITA ghany. Image encryption us- ing pseudo random number [ZAX05] Zhang Zhang, Shunsuke and chaotic sequence gener- Araki, and Guozhen Xiao. REFERENCES 726

Improvement of Tseng et link/service/series/0558/ al.’s authenticated encryp- bibs/1880/18800501.htm; tion scheme with message http://link.springer- linkages. Applied Mathemat- ny.com/link/service/series/ ics and Computation, 162 0558/papers/1880/18800501. (3):1475–1483, March 25, pdf. 2005. CODEN AMHCBQ. ISSN 0096-3003 (print), Zhang:2004:AIB 1873-5649 (electronic). [ZC04] Fangguo Zhang and Xi- Zivkovic:2005:AAH aofeng Chen. Attack on an ID-based authenticated [ZBLvB05]ˇ Miroslav Zivkovi´ˇ c, Milind M. group key agreement scheme Buddhikot, Ko Lagerberg, from PKC 2004. Informa- andJeroenvanBemmel. tion Processing Letters,91 Authentication across het- (4):191–193, August 2004. erogeneous networks. Bell CODEN IFPLAT. ISSN Labs Technical Journal,10 0020-0190 (print), 1872- (2):39–56, Summer 2005. 6119 (electronic). CODEN BLTJFD. ISSN Zhang:2005:CHC 1089-7089 (print), 1538- 7305 (electronic). [ZC05] Fangguo Zhang and Xi- aofeng Chen. Cryptanalysis Zhao:2005:SSV of Huang–Chang partially [ZBP05] Xin Zhao, Kevin Borders, blind signature scheme. The and Atul Prakash. SVGrid: Journal of Systems and a secure virtual environment Software, 76(3):323–325, for untrusted grid applica- June 2005. CODEN JS- tions. In ACM [ACM05a], SODM. ISSN 0164-1212 pages 1–6. ISBN 1-59593- (print), 1873-1228 (elec- 269-0. LCCN ???? tronic). Zhang:2000:MCA Zhang:2009:CII

[ZC00] Muxiang Zhang and Agnes [ZC09] Fangguo Zhang and Xi- Chan. Maximum corre- aofeng Chen. Cryptanal- lation analysis of nonlin- ysis and improvement of ear S-boxes in stream ci- an ID-based ad-hoc anony- phers. In Bellare [Bel00], mous identification scheme pages 501–?? ISBN 3-540- at CT-RSA 05. Informa- 67907-3. ISSN 0302-9743 tion Processing Letters, 109 (print), 1611-3349 (elec- (15):846–849, July 16, 2009. tronic). LCCN QA76.9.A25 CODEN IFPLAT. ISSN C79 2000 Bar. URL http: 0020-0190 (print), 1872- //link.springer-ny.com/ 6119 (electronic). REFERENCES 727

Zhang:2001:SOS www.sciencedirect.com/ science/article/pii/S0167404804000707. [ZCC01] Muxiang Zhang, Christo- pher Carroll, and Agnes Zunino:2005:WPE Chan. The software- oriented stream cipher [ZD05] Roberto Zunino and Pier- SSC2. Lecture Notes in paolo Degano. Weakening Computer Science, 1978: the perfect encryption as- sumption in Dolev–Yao ad- 31–??, 2001. CODEN LNCSD9. ISSN 0302- versaries. Theoretical Com- 9743 (print), 1611-3349 puter Science, 340(1):154– 178, June 13, 2005. CODEN (electronic). URL http: TCSCDI. ISSN 0304-3975 //link.springer-ny.com/ (print), 1879-2294 (elec- link/service/series/0558/ tronic). bibs/1978/19780031.htm; http://link.springer- Zhao:2006:SAP ny.com/link/service/series/ 0558/papers/1978/19780031.[ZDW06] Zhu Zhao, Zhongqi Dong, pdf. and Yongge Wang. Secu- rity analysis of a password- Zhou:2005:PSP based authentication pro- [ZCL05] Yuan Zhou, ZhenFu Cao, tocol proposed to IEEE and RongXing Lu. Prov- 1363. Theoretical Computer ably secure proxy-protected Science, 352(1–3):280–287, signature schemes based on March 7, 2006. CODEN factoring. Applied Math- TCSCDI. ISSN 0304-3975 ematics and Computation, (print), 1879-2294 (elec- 164(1):83–98, May 5, 2005. tronic). CODEN AMHCBQ. ISSN Zeadally:2000:IPQ 0096-3003 (print), 1873- 5649 (electronic). [Zea00] S. Zeadally. Implementa- Zhu:2004:DSM tion and performance of QoS-aware Java applica- [ZCW04] Lie Huang Zhu, Yuan Da tions over ATM networks. Cao, and Dong Wang. Dig- The Computer Journal,43 ital signature of multi- (4):266–273, ???? 2000. cast streams secure against CODEN CMPJA6. ISSN adaptive chosen message 0010-4620 (print), 1460- attack. Computers & 2067 (electronic). URL Security, 23(3):229–240, http://www3.oup.co.uk/ May 2004. CODEN computer_journal/hdb/Volume_ CPSEDU. ISSN 0167-4048 43/Issue_04/430266.sgm. (print), 1872-6208 (elec- abs.html; http://www3. tronic). URL https:// oup.co.uk/computer_journal/ REFERENCES 728

hdb/Volume_43/Issue_04/ Gao. The monitoring and pdf/430266.pdf. early detection of Internet worms. IEEE/ACM Trans- Zhang:2005:CSS actions on Networking,13 [ZF05] Zhenfeng Zhang and Deng- (5):961–974, October 2005. guo Feng. Cryptanal- CODEN IEANEP. ISSN ysis of some signature 1063-6692 (print), 1558- schemes with message recov- 2566 (electronic). ery. Applied Mathematics and Computation, 170(1): Zhang:2000:WMH 103–114, November 1, 2005. [Zha00] Peter Zhang. Webrelay: CODEN AMHCBQ. ISSN a multithreaded HTTP re- 0096-3003 (print), 1873- lay server. Dr. Dobb’s 5649 (electronic). Journal of Software Tools, Zhen:2004:IBS 25(2):86, 88, 90–94, 96, February 2000. CO- [ZFK04] Z. Zhen, B. Fei, and L. Ke- DEN DDJOEB. ISSN jun. The implementation of 1044-789X. URL http: 128 bit strong encryption for //www.ddj.com/ftp/2000/ SSL by using Java applet. 2000_02/webrelay.txt; Journal — Huazhong Uni- http://www.ddj.com/ftp/ versity of Science and Tech- 2000/2000_02/webrelay. nology Nature Science Chi- zip. nese Edition, 32(4):74–76, 2004. CODEN ???? ISSN Zhao:2006:NDN 1671-4512. Zhang:2005:AES [Zha06] Yunlei Zhao. A note on the Dwork–Naor timed deniable [ZGLX05] Zhikun Zhang, Youping authentication. Informa- Geng, Tingyan Li, and tion Processing Letters, 100 Jianguo Xiao. Analysis (1):1–7, October 16, 2006. of enhanced separation of CODEN IFPLAT. ISSN duty in role-based access 0020-0190 (print), 1872- control model. In Han 6119 (electronic). et al. [HYZ05b], pages 69– ?? ISBN 981-270-153-2. Zhang:2008:CLR LCCN ???? URL http:// eproceedings.worldscinet.[Zha08] Yu Zhang. Cryptographic com/9812701532/9812701532. logical relations. Theoretical 0031.html. Computer Science, 394(1– 2):39–63, March 31, 2008. Zou:2005:MED CODEN TCSCDI. ISSN [ZGTG05] Cliff C. Zou, Weibo Gong, 0304-3975 (print), 1879- Don Towsley, and Lixin 2294 (electronic). REFERENCES 729

Zheng:2001:ISS formation Security, Queen- stown, New Zealand, De- [Zhe01] Yuliang Zheng. Identifi- cember 1–5, 2002. Proceed- cation, signature and sign- ings, volume 2501 of Lecture cryption using high or- Notes in Computer Science. der residues modulo an Springer-Verlag, Berlin, RSA composite. Lecture Germany / Heidelberg, Ger- Notes in Computer Science, many / London, UK / etc., 1992:48–??, 2001. CO- 2002. CODEN LNCSD9. DEN LNCSD9. ISSN 0302- ISBN 3-540-00171-9 (pa- 9743 (print), 1611-3349 perback). ISSN 0302-9743 (electronic). URL http: (print), 1611-3349 (elec- //link.springer-ny.com/ tronic). LCCN QA76.9.A25 link/service/series/0558/ I555 2002. URL http: bibs/1992/19920048.htm; //link.springer-ny.com/ http://link.springer- link/service/series/0558/ ny.com/link/service/series/ tocs/t2501.htm; http: 0558/papers/1992/19920048. //www.springerlink.com/ pdf. openurl.asp?genre=issue& Zheng:2002:NPK issn=0302-9743&volume= 2501. Also available via the [Zhe02a] Jiande Zheng. A new pub- World Wide Web. lic key cryptosystem for con- Zhou:2002:MVD strained hardware. Lecture Notes in Computer Science, [Zho02] Jianying Zhou. Maintain- 2433:334–??, 2002. CO- ing the validity of digi- DEN LNCSD9. ISSN 0302- tal signatures in B2B ap- 9743 (print), 1611-3349 plications. Lecture Notes (electronic). URL http: in Computer Science, 2384: //link.springer-ny.com/ 303–??, 2002. CODEN link/service/series/0558/ LNCSD9. ISSN 0302- bibs/2433/24330334.htm; 9743 (print), 1611-3349 http://link.springer- (electronic). URL http: ny.com/link/service/series/ //link.springer-ny.com/ 0558/papers/2433/24330334. link/service/series/0558/ pdf. bibs/2384/23840303.htm; http://link.springer- Zheng:2002:ACA ny.com/link/service/series/ [Zhe02b] Yuliang Zheng, editor. Ad- 0558/papers/2384/23840303. vances in Cryptology— pdf. ASIACRYPT 2002: 8th In- Zhong:2006:ESC ternational Conference on the Theory and Applica- [Zho06] Sheng Zhong. An effi- tion of Cryptology and In- cient and secure cryptosys- REFERENCES 730

tem for encrypting long mes- openurl.asp?genre=issue& sages. Fundamenta In- issn=0302-9743&volume= formaticae, 71(4):493–497, 3072; http://www.springerlink. September 2006. CODEN com/openurl.asp?genre= FUMAAJ. ISSN 0169-2968 volume&id=doi:10.1007/ (print), 1875-8681 (elec- b98225. tronic). Zhang:2009:IBR Zirkind:2007:ADC [ZJ09] Jianhong Zhang and Cheng Ji. An id-based and re- [Zir07] Givon Zirkind. AFIS data pairing NTRUSign-based compression: an example of anonymous multi-proxy sig- how domain specific com- nature scheme. In IEEE, ed- pression algorithms can pro- itor, Proceedings of the In- duce very high compression ternational Conference on ratios. Computer Graph- Computational Intelligence ics, 41(4):1–36, November and Software Engineering, 2007. CODEN CGRADI, 2009. CiSE 2009, Decem- CPGPBZ. ISSN 0097-8930 ber 11–13, 2009, Wuhan, (print), 1558-4569 (elec- China, pages 1–?? IEEE tronic). Computer Society Press, Zhang:2004:BAF 1109 Spring Street, Suite 300, Silver Spring, MD [ZJ04] David Zhang and Anil K. 20910, USA, 2009. ISBN Jain, editors. Biomet- 1-4244-4507-8. LCCN ric Authentication: First QA76.758 2009. URL http: International Conference, //ieeexplore.ieee.org/ ICBA 2004, Hong Kong, servlet/opac?punumber= China, July 15–17, 2004, 5362500. IEEE catalog Proceedings, volume 3072 number CFP0926H. of Lecture Notes in Com- Zhang:2002:IBB puter Science. Springer-Ver- lag, Berlin, Germany / Hei- [ZK02] Fangguo Zhang and Kwangjo delberg, Germany / Lon- Kim. ID-based blind sig- don, UK / etc., 2004. CO- nature and ring signature DEN LNCSD9. ISBN 3-540- from pairings. Lecture Notes 22146-8. ISSN 0302-9743 in Computer Science, 2501: (print), 1611-3349 (elec- 533–??, 2002. CODEN tronic). LCCN QA76 A1 LNCSD9. ISSN 0302-9743 L43 3072 (LC). URL http: (print), 1611-3349 (elec- //link.springer-ny.com/ tronic). URL http:// link/service/series/0558/ link.springer.de/link/ tocs/t3072.htm; http: service/series/0558/bibs/ //www.springerlink.com/ 2501/25010533.htm; http: REFERENCES 731

//link.springer.de/link/ 154, June 5, 2004. CO- service/series/0558/papers/ DEN ???? ISSN 1389-1286 2501/25010533.pdf. (print), 1872-7069 (elec- tronic). Zhang:2005:CLH Zhang:2004:AFV [ZK05] Fangguo Zhang and Kwangjo Kim. Cryptanalysis of Lee– [ZL04b] Yuqing Zhang and Xiuying Hwang–Li’s key authentica- Liu. An approach to the for- tion scheme. Applied Math- mal verification of the three- ematics and Computation, principal cryptographic pro- 161(1):101–107, February 4, tocols. Operating Systems 2005. CODEN AMHCBQ. Review, 38(1):35–42, Jan- ISSN 0096-3003 (print), uary 2004. CODEN OS- 1873-5649 (electronic). See RED8. ISSN 0163-5980 comment [SCS05b]. (print), 1943-586X (elec- tronic). Zenner:2001:ICS Zhang:2004:RMA [ZKL01] Erik Zenner, Matthias Krause, and Stefan Lucks. [ZL04c] Yuqing Zhang and Xiuying Improved cryptanalysis of Liu. Running-mode anal- the self-shrinking genera- ysis of the Security Socket tor. Lecture Notes in Layer protocol. Operating Computer Science, 2119: Systems Review, 38(2):34– 21–??, 2001. CODEN 40, April 2004. CODEN LNCSD9. ISSN 0302- OSRED8. ISSN 0163-5980 9743 (print), 1611-3349 (print), 1943-586X (elec- (electronic). URL http: tronic). //link.springer-ny.com/ Zhao:2005:MCE link/service/series/0558/ bibs/2119/21190021.htm; [ZL05] Ze-Mao Zhao and Feng-Yu http://link.springer- Liu. Method of construct- ny.com/link/service/series/ ing elliptic curve authen- 0558/papers/2119/21190021. ticated encryption scheme. pdf. Applied Mathematics and Computation, 168(1):146– Zhang:2004:SAE 151, September 1, 2005. [ZL04a] Chang N. Zhang and Chun- CODEN AMHCBQ. ISSN ren Lai. A systematic ap- 0096-3003 (print), 1873- proach for encryption and 5649 (electronic). authentication with fault Zhang:2001:QKD tolerance. Computer Net- works (Amsterdam, Nether- [ZLG01] Yong-Sheng Zhang, Chuan- lands: 1999), 45(2):143– Feng Li, and Guang-Can REFERENCES 732

Guo. Quantum key dis- Zheng:2007:SRI tribution via quantum en- cryption. Physical Re- [ZLZS07] Dong Zheng, Yan Liu, Jiy- view A (Atomic, Molecular, ing Zhao, and Abdulmo- and Optical Physics), 64(2): taleb El Saddik. A sur- 024302, 4, 2001. CODEN vey of RST invariant image PLRAAN. ISSN 1050-2947 watermarking algorithms. (print), 1094-1622, 1538- ACM Computing Surveys, 4446, 1538-4519. 39(2):5:1–5:91, July 2007. CODEN CMSVAN. ISSN Zhang:2002:CRD 0360-0300 (print), 1557- 7341 (electronic). [ZLK02] Fangguo Zhang, Shengli Zolman:2001:SEM Liu, and Kwangjo Kim. Compact representation of [Zol01] Leor Zolman. An STL error domain parameters of hy- message decryptor for Vi- perelliptic curve cryptosys- sual C++. C/C++ Users tems. Lecture Notes in Journal, 19(7):24–??, July Computer Science, 2384: 2001. CODEN CCUJEX. 203–??, 2002. CODEN ISSN 1075-2838. LNCSD9. ISSN 0302- Zhang:2001:CIS 9743 (print), 1611-3349 (electronic). URL http: [ZP01] Xian-Mo Zhang and Josef //link.springer-ny.com/ Pieprzyk. Cheating im- link/service/series/0558/ mune secret sharing. Lecture bibs/2384/23840203.htm; Notes in Computer Science, http://link.springer- 2229:144–??, 2001. CO- ny.com/link/service/series/ DEN LNCSD9. ISSN 0302- 0558/papers/2384/23840203. 9743 (print), 1611-3349 pdf. (electronic). URL http: //link.springer-ny.com/ Zhang:1999:AFV link/service/series/0558/ bibs/2229/22290144.htm; [ZLX99] Yuqing Zhang, Jihong Li, http://link.springer- and Guozhen Xiao. An ap- ny.com/link/service/series/ proach to the formal verifi- 0558/papers/2229/22290144. cation of the two-party cryp- pdf. tographic protocols. Operat- Zhang:2005:DMC ing Systems Review, 33(4): 48–51, October 1999. CO- [ZP05] Zhiyong Zhang and Jiexin DEN OSRED8. ISSN 0163- Pu. Delegation model for 5980 (print), 1943-586X CSCW based on RBAC (electronic). See comments policies and visual mod- [JW01]. eling. In Han et al. REFERENCES 733

[HYZ05b], pages 126–?? Zhao:2005:APA ISBN 981-270-153-2. LCCN ???? URL http:// [ZSN05] Meiyuan Zhao, Sean W. eproceedings.worldscinet. Smith, and David M. Nicol. com/9812701532/9812701532. Aggregated path authenti- 0031.html. cation for efficient BGP se- curity. In Meadows and Zhou:2005:MBI Syverson [MS05b], pages [ZS05] Zhenyu Zhou and Jianjing 128–138. ISBN 1-59593- Shen. Multiagent-based in- 226-7. LCCN QA76.9.A25. formation fusion model for ACM order number 459050. network security. In Han Zhou:2005:APS et al. [HYZ05b], pages 139– ?? ISBN 981-270-153-2. [ZSV05] Lidong Zhou, Fred B. LCCN ???? URL http:// Schneider, and Robbert Van eproceedings.worldscinet. Renesse. APSS: proac- com/9812701532/9812701532. tive secret sharing in asyn- 0031.html. chronous systems. ACM Transactions on Informa- Zhu:2007:IHH tion and System Security,8 [ZSJN07] Sencun Zhu, Sanjeev Se- (3):259–286, August 2005. tia, Sushil Jajodia, and CODEN ATISBQ. ISSN Peng Ning. Interleaved 1094-9224 (print), 1557- hop-by-hop authentication 7406 (electronic). against false data injection Zhang:2001:ASE attacks in sensor networks. ACM Transactions on Sen- [ZSZ01] Long Jun Zhang, Jun Yi sor Networks, 3(3):14:1– Shen, and Lin Zhao. An 14:??, August 2007. CO- approach to the security DEN ???? ISSN 1550-4859 of elliptic curve cryptosys- (print), 1550-4867 (elec- tems. Xi’an Jiaotong Daxue tronic). Xuebao, 35(10):1038–1041, Zhang:2005:RPE 1058, 2001. CODEN HCT- PDW. ISSN 0253-987X. [ZSM05] N. Zhang, Q. Shi, and Zhang:2003:FSP M. Merabti. Revocation of privacy-enhanced public- [ZT03] Zhenxiang Zhang and Min key certificates. The Jour- Tang. Finding strong pseu- nal of Systems and Software, doprimes to several bases. 75(1–2):205–214, February II. Mathematics of Compu- 15, 2005. CODEN JS- tation, 72(244):2085–2097, SODM. ISSN 0164-1212 October 2003. CODEN (print), 1873-1228 (elec- MCMPAF. ISSN 0025- tronic). 5718 (paper), 1088-6842 REFERENCES 734

(electronic). URL http: 0096-3003 (print), 1873- //www.ams.org/journal- 5649 (electronic). getitem?pii=S0025-5718- 03-01545-X; http://www. Zhang:2005:SCA ams.org/mcom/2003-72-244/[ZW05b] Jianhong Zhang and Yu- S0025-5718-03-01545-X/ min Wang. On the secu- S0025-5718-03-01545-X. rity of a convertible authen- dvi; http://www.ams. ticated encryption. Applied org/mcom/2003-72-244/S0025- Mathematics and Computa- 5718-03-01545-X/S0025- tion, 169(2):1063–1069, Oc- 5718-03-01545-X.pdf; tober 15, 2005. CODEN http://www.ams.org/mcom/ AMHCBQ. ISSN 0096-3003 2003-72-244/S0025-5718- (print), 1873-5649 (elec- 03-01545-X/S0025-5718- tronic). 03-01545-X.ps; http:/ /www.ams.org/mcom/2003- Zhao:2002:EII 72-244/S0025-5718-03-01545- X/S0025-5718-03-01545- [ZWC02] Xianfeng Zhao, Weinong X.tex. Wang, and Kefei Chen. Ex- ploiting the intrinsic irre- Zafeiriou:2005:BRW versibility of adaptive tech- [ZTP05] Stefanos Zafeiriou, Anas- nologies to enhance the tasios Tefas, and Ioan- security of digital water- nis Pitas. Blind robust marking. Lecture Notes watermarking schemes for in Computer Science, 2419: copyright protection of 3D 430–??, 2002. CODEN mesh objects. IEEE Trans- LNCSD9. ISSN 0302- actions on Visualization 9743 (print), 1611-3349 and Computer Graphics, (electronic). URL http: 11(5):596–607, September/ //link.springer-ny.com/ October 2005. CODEN link/service/series/0558/ ITVGEA. ISSN 1077-2626 bibs/2419/24190430.htm; (print), 1941-0506 (elec- http://link.springer- tronic), 2160-9306. ny.com/link/service/series/ 0558/papers/2419/24190430. Zhang:2005:ISS pdf. [ZW05a] Jianhong Zhang and Yumin Zhu:2002:PAK Wang. An improved sig- nature scheme without us- [ZWCY02] Feng Zhu, Duncan S. Wong, ing one-way Hash functions. Agnes H. Chan, and Rob- Applied Mathematics and bie Ye. Password authen- Computation, 170(2):905– ticated key exchange based 908, November 15, 2005. on RSA for imbalanced CODEN AMHCBQ. ISSN wireless networks. Lecture REFERENCES 735

Notes in Computer Science, CODEN VLDBFR. ISSN 2433:150–??, 2002. CO- 1066-8888 (print), 0949- DEN LNCSD9. ISSN 0302- 877X (electronic). 9743 (print), 1611-3349 Zhou:2003:ACN (electronic). URL http: //link.springer-ny.com/ [ZYH03] Jianying Zhou, Moti Yung, link/service/series/0558/ and Yongfei Han, edi- bibs/2433/24330150.htm; tors. Applied Cryptog- http://link.springer- raphy and Network Secu- ny.com/link/service/series/ rity: First Title: Interna- 0558/papers/2433/24330150. tional Conference, ACNS pdf. 2003, Kunming, China, Oc- tober 16–19, 2003: Pro- Zhang:2001:USC ceedings, volume 2846 of [ZWWL01] Yuqing Zhang, Chunling Lecture Notes in Computer Wang, Jianping Wu, and Science. Springer-Verlag, Xing Li. Using SMV for Berlin, Germany / Heidel- cryptographic protocol anal- berg, Germany / London, ysis: a case study. Operat- UK / etc., 2003. CO- ing Systems Review, 35(2): DEN LNCSD9. ISBN 3-540- 43–50, April 2001. CODEN 20208-0. ISSN 0302-9743 OSRED8. ISSN 0163-5980 (print), 1611-3349 (elec- (print), 1943-586X (elec- tronic). LCCN TK5102.94 tronic). .A28 2003. URL http: //link.springer-ny.com/ Zhang:2004:NMS link/service/series/0558/ tocs/t2846.htm; http: [ZX04] Zhang Zhang and Guozhen //www.springerlink.com/ Xiao. New multisignature openurl.asp?genre=issue& scheme for specified group issn=0302-9743&volume= of verifiers. Applied Math- 2846; http://www.springerlink. ematics and Computation, com/openurl.asp?genre= 157(2):425–431, October 5, volume&id=doi:10.1007/ 2004. CODEN AMHCBQ. b13996. ISSN 0096-3003 (print), 1873-5649 (electronic). Zhang:2005:ASP Zhong:2008:GPT [ZYLG05] Youtao Zhang, Jun Yang, Yongjing Lin, and Lan Gao. [ZY08] Sheng Zhong and Zhiqiang Architectural support for Yang. Guided perturbation: protecting user privacy on towards private and accu- trusted processors. ACM rate mining. VLDB Journal: SIGARCH Computer Ar- Very Large Data Bases,17 chitecture News, 33(1):118– (5):1165–1177, August 2008. 123, March 2005. CODEN REFERENCES 736

CANED2. ISSN 0163-5964 0558/bibs/2229/22290419. (print), 1943-5851 (elec- htm; http://link.springer- tronic). ny.com/link/service/series/ 0558/papers/2229/22290419. Zhang:2005:ISM pdf. [ZYM05] Peng Zhang, Chengqing Ye, Zhu:2007:EIB and Xueying Ma. Im- provement of secure mo- [ZYW07] Robert W. Zhu, Guomin bile agent system in elec- Yang, and Duncan S. Wong. tronic commerce. In Han An efficient identity-based et al. [HYZ05b], pages 114– key exchange protocol with ?? ISBN 981-270-153-2. KGS forward secrecy for LCCN ???? URL http:// low-power devices. Theoret- eproceedings.worldscinet. ical Computer Science, 378 com/9812701532/9812701532. (2):198–207, June 6, 2007. 0031.html. CODEN TCSCDI. ISSN 0304-3975 (print), 1879- Zhang:2008:FIC 2294 (electronic). [ZYN08] Qing Zhang, Ting Yu, and Zhuang:2005:KAE Peng Ning. A framework for identifying compromised [ZZT05] Li Zhuang, Feng Zhou, and nodes in wireless sensor net- J. D. Tygar. Keyboard works. ACM Transactions acoustic emanations revis- on Information and Sys- ited. In Meadows and Syver- tem Security, 11(3):12:1– son [MS05b], pages 373–382. 12:??, March 2008. CODEN ISBN 1-59593-226-7. LCCN ATISBQ. ISSN 1094-9224 QA76.9.A25. ACM order (print), 1557-7406 (elec- number 459050. tronic).

Zeng:2001:CHR

[ZYR01] Kencheng Zeng, Chung- Huang Yang, and T. R. N. Rao. Cryptanalysis of the Hwang-Rao secret error- correcting code schemes. Lecture Notes in Computer Science, 2229:419–??, 2001. CODEN LNCSD9. ISSN 0302-9743 (print), 1611- 3349 (electronic). URL http://link.springer-ny. com/link/service/series/