Abbreviations


[Page 663 (continued)]

ACM

Association for Computing Machinery

IEEE

Institute of Electrical and Electronics Engineers

NIST

National Institute of Standards and Technology


ADAM90 Adams, C., and Tavares, S. "Generating and Counting Binary Bent Sequences." IEEE Transactions on Information Theory, 1990.

ADAM94 Adams, C. "Simple and Effective Key Scheduling for Symmetric Ciphers." Proceedings, Workshop in Selected Areas of Cryptography, SAC' 94. 1994.

ADLE83 Adleman, L. "The Function Field Sieve." Lecture Notes in Computer Science 877, Springer-Verlag, 1983.

AGRA02 Agrawal, M.; Keyal, N.; and Saxena, N. "PRIMES is in P." IIT Kanpur, Preprint, August 2002. http://www.cse.iitk.ac.in/news/primality.pdf

AKL83 Akl, S. "Digital Signatures: A Tutorial Survey." Computer, February 1983.

ALVA90 Alvare, A. "How Crackers Crack Passwords or What Passwords to Avoid." Proceedings, UNIX Security Workshop II, August 1990.

ANDE80 Anderson, J. Computer Security Threat Monitoring and Surveillance. Fort Washington, PA: James P. Anderson Co., April 1980.

AUDI04 Audin, G. "Next-Gen Firewalls: What to Expect." Business Communications Review, June 2004.

AXEL00 Axelsson, S. "The Base-Rate Fallacy and the Difficulty of Intrusion Detection." ACM Transactions and Information and System Security, August 2000.

BACE00 Bace, R. Intrusion Detection. Indianapolis, IN: Macmillan Technical Publishing, 2000.

BACE01 Bace, R., and Mell, P. Intrusion Detection Systems. NIST Special Publication SP 800-31, November 2000.

BARK91 Barker, W. Introduction to the Analysis of the Data Encryption Standard (DES). Laguna Hills, CA: Aegean Park Press, 1991.

BARR03 Barreto, P., and Rijmen, V. "The Whirlpool Hashing Function." Submitted to NESSIE, September 2000, revised May 2003.

BAUE88 Bauer, D., and Koblentz, M. "NIDXAn Expert System for Real-Time Network Intrusion Detection." Proceedings, Computer Networking Symposium, April 1988.

BELL90 Bellovin, S., and Merritt, M. "Limitations of the Kerberos Authentication System." Computer Communications Review, October 1990.

BELL92 Bellovin, S. "There Be Dragons." Proceedings, UNIX Security Symposium III, September 1992.

BELL93 Bellovin, S. "Packets Found on an Internet." Computer Communications Review, July 1993.

BELL94a Bellare, M, and Rogaway, P. "Optimal Asymmetric EncryptionHow to Encrypt with RSA." Proceedings, Eurocrypt '94, 1994.

BELL94b Bellovin, S., and Cheswick, W. "Network Firewalls." IEEE Communications Magazine, September 1994.


[Page 664]

BELL96a Bellare, M.; Canetti, R.; and Krawczyk, H. "Keying Hash Functions for Message Authentication." Proceedings, CRYPTO '96, August 1996; published by Springer-Verlag. An expanded version is available at http://www-cse.ucsd.edu/users/mihir

BELL96b Bellare, M.; Canetti, R.; and Krawczyk, H. "The HMAC Construction." CryptoBytes, Spring 1996.

BELL97 Bellare, M., and Rogaway, P. "Collision-Resistant Hashing: Towards Making UOWHF's Practical." Proceedings, CRYPTO '97, 1997; published by Springer-Verlag.

BELL00 Bellare, M.; Kilian, J.; and Rogaway, P. "The Security of the Cipher Block Chaining Message Authentication Code." Journal of Computer and System Sciences, December 2000.

BERL84 Berlekamp, E. Algebraic Coding Theory. Laguna Hills, CA: Aegean Park Press, 1984.

BETH91 Beth, T.; Frisch, M.; and Simmons, G. eds. Public-Key Cryptography: State of the Art and Future Directions. New York: Springer-Verlag, 1991.

BIHA93 Biham, E., and Shamir, A. Differential Cryptanalysis of the Data Encryption Standard. New York: Springer-Verlag, 1993.

BIHA00 Biham, E., and Shamir, A. "Power Analysis of the Key Scheduling of the AES Candidates" Proceedings, Second AES Candidate Conference, 24 October 2000. http://csrc.nist.gov/encryption/aes/round1/conf2/aes2conf.htm

BISH03 Bishop, M. Computer Security: Art and Science. Boston: Addison-Wesley, 2003.

BISH05 Bishop, M. Introduction to Computer Security. Boston: Addison-Wesley, 2005.

BLAC00 Black, J., and Rogaway, P.; and Shrimpton, T. "CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions." Advances in CryptologyCRYPTO '00, 2000.

BLAC02 Black, J., and Rogaway, P. "Black-Box Analysis of the Block-Cipher-Based Hash Function Constructions from PGV." Advances in CryptologyCRYPTO '02, 2002.

BLAK99 Blake, I.; Seroussi, G.; and Smart, N. Elliptic Curves in Cryptography. Cambridge: Cambridge University Press, 1999.

BLOO70 Bloom, B. "Space/time Trade-Offs in Hash Coding with Allowable Errors." Communications of the ACM, July 1970.

BLUM86 Blum, L.; Blum, M.; and Shub, M. "A Simple Unpredictable Pseudo-Random Number Generator." SIAM Journal on Computing, No. 2, 1986.

BONE99 Boneh, D. "Twenty Years of Attacks on the RSA Cryptosystem." Notices of the American Mathematical Society, February 1999.

BONE02 Boneh, D., and Shacham, H. "Fast Variants of RSA." CryptoBytes, Winter/Spring 2002. http://www.rsasecurity.com/rsalabs

BORN03 Bornemann, F. "PRIMES is in P: A Breakthrough for Everyman." Notices of the American Mathematical Society, May 2003.

BRIG79 Bright, H., and Enison, R. "Quasi-Random Number Sequences from Long-Period TLP Generator with Remarks on Application to Cryptography." Computing Surveys, December 1979.

BRYA88 Bryant, W. Designing an Authentication System: A Dialogue in Four Scenes. Project Athena document, February 1988. Available at http://web.mit.edu/kerberos/www/dialogue.html

BURN97 Burn, R. A Pathway to Number Theory. Cambridge, England: Cambridge University Press, 1997.

CAMP92 Campbell, K., and Wiener, M. "Proof that DES Is Not a Group." Proceedings, Crypto '92, 1992; published by Springer-Verlag.

CASS01 Cass, S. "Anatomy of Malice." IEEE Spectrum, November 2001.

CERT01 CERT Coordination Center. "Denial of Service Attacks." June 2001. http://www.cert.org/tech_tips/denial_of_service.html

CHAN02 Chang, R. "Defending Against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial." IEEE Communications Magazine, October 2002.

CHAP00 Chapman, D., and Zwicky, E. Building Internet Firewalls. Sebastopol, CA: O'Reilly, 2000.

CHEN98 Cheng, P., et al. "A Security Architecture for the Internet Protocol." IBM Systems Journal, Number 1, 1998.

CHES97 Chess, D. "The Future of Viruses on the Internet." Proceedings, Virus Bulletin International Conference, October 1997.


[Page 665]

CHES03 Cheswick, W., and Bellovin, S. Firewalls and Internet Security: Repelling the Wily Hacker. Reading, MA: Addison-Wesley, 2003.

COCK73 Cocks, C. A Note on Non-Secret Encryption. CESG Report, November 1973.

COHE94 Cohen, F. A Short Course on Computer Viruses. New York: Wiley, 1994.

COPP94 Coppersmith, D. "The Data Encryption Standard (DES) and Its Strength Against Attacks." IBM Journal of Research and Development, May 1994.

CORM01 Cormen, T.; Leiserson, C.; Rivest, R.; and Stein, C. Introduction to Algorithms. Cambridge, MA: MIT Press, 2001.

CRAN01 Crandall, R., and Pomerance, C. Prime Numbers: A Computational Perspective. New York: Springer-Verlag, 2001.

DAEM99 Daemen, J., and Rijmen, V. AES Proposal: Rijndael, Version 2. Submission to NIST, March 1999. http://csrc.nist.gov/encryption/aes

DAEM01 Daemen, J., and Rijmen, V. "Rijndael: The Advanced Encryption Standard." Dr. Dobb's Journal, March 2001.

DAEM02 Daemen, J., and Rijmen, V. The Design of Rijndael: The Wide Trail Strategy Explained. New York, Springer-Verlag, 2002.

DAMG89 Damgard, I. "A Design Principle for Hash Functions." Proceedings, CRYPTO '89, 1989; published by Springer-Verlag.

DAVI89 Davies, D., and Price, W. Security for Computer Networks. New York: Wiley, 1989.

DAVI93 Davies, C., and Ganesan, R. "BApasswd: A New Proactive Password Checker." Proceedings, 16th National Computer Security Conference, September 1993.

DAWS96 Dawson, E., and Nielsen, L. "Automated Cryptoanalysis of XOR Plaintext Strings." Cryptologia, April 1996.

DENN81 Denning, D. "Timestamps in Key Distribution Protocols." Communications of the ACM, August 1981.

DENN82 Denning, D. Cryptography and Data Security. Reading, MA: Addison-Wesley, 1982.

DENN83 Denning, D. "Protecting Public Keys and Signature Keys." Computer, February 1983.

DENN87 Denning, D. "An Intrusion-Detection Model." IEEE Transactions on Software Engineering, February 1987.

DESK92 Deskins, W. Abstract Algebra. New York: Dover, 1992.

DIFF76a Diffie, W., and Hellman, M. "New Directions in Cryptography." Proceedings of the AFIPS National Computer Conference, June 1976.

DIFF76b Diffie, W., and Hellman, M. "Multiuser Cryptographic Techniques." IEEE Transactions on Information Theory, November 1976.

DIFF77 Diffie, W., and Hellman, M. "Exhaustive Cryptanalysis of the NBS Data Encryption Standard." Computer, June 1977.

DIFF79 Diffie, W., and Hellman, M. "Privacy and Authentication: An Introduction to Cryptography." Proceedings of the IEEE, March 1979.

DIFF88 Diffie, W. "The First Ten Years of Public-Key Cryptography." Proceedings of the IEEE, May 1988. Reprinted in [SIMM92].

DOBB96 Dobbertin, H. "The Status of MD5 After a Recent Attack." CryptoBytes, Summer 1996.

DORA03 Doraswamy, N., and Harkins, D. IPSec. Upper Saddle River, NJ: Prentice Hall, 2003.

EFF98 Electronic Frontier Foundation. Cracking DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design. Sebastopol, CA: O'Reilly, 1998

ELGA85 ElGamal, T. "A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms." IEEE Transactions on Information Theory, July 1985.

ELLI70 Ellis, J. The Possibility of Secure Non-Secret Digital Encryption. CESG Report, January 1970.

ELLI99 Ellis, J. "The History of Non-Secret Encryption." Cryptologia, July 1999.

ENGE80 Enger, N., and Howerton, P. Computer Security. New York: Amacom, 1980.

ENGE99 Enge, A. Elliptic Curves and Their Applications to Cryptography. Norwell, MA: Kluwer Academic Publishers, 1999.

FEIS73 Feistel, H. "Cryptography and Computer Privacy." Scientific American, May 1973.

FEIS75 Feistel, H.; Notz, W.; and Smith, J. "Some Cryptographic Techniques for Machine-to-Machine Data Communications." Proceedings of the IEEE, November 1975.

FELT03 Felten, E. "Understanding Trusted Computing: Will Its Benefits Outweigh its Drawbacks?" IEEE Security and Privacy, May/June 2003.


[Page 666]

FERN99 Fernandes, A. "Elliptic Curve Cryptography." Dr. Dobb's Journal, December 1999.

FLUH00 Fluhrer, S., and McGrew, D. "Statistical Analysis of the Alleged RC4 Key Stream Generator." Proceedings, Fast Software Encryption 2000, 2000.

FLUH01 Fluhrer, S.; Mantin, I.; and Shamir, A. "Weakness in the Key Scheduling Algorithm of RC4." Proceedings, Workshop in Selected Areas of Cryptography, 2001.

FORD95 Ford, W. "Advances in Public-Key Certificate Standards." ACM SIGSAC Review, July 1995.

FORR97 Forrest, S.; Hofmeyr, S.; and Somayaji, A. "Computer Immunology." Communications of the ACM, October 1997.

FRAN01 Frankel, S. Demystifying the IPSec Puzzle. Boston: Artech House, 2001.

FREE93 Freedman, D. "The Goods on Hacker Hoods." Forbes ASAP, 13 September 1993.

FUMY93 Fumy, S., and Landrock, P. "Principles of Key Management." IEEE Journal on Selected Areas in Communications, June 1993.

GARD72 Gardner, M. Codes, Ciphers, and Secret Writing. New York: Dover, 1972.

GARD77 Gardner, M. "A New Kind of Cipher That Would Take Millions of Years to Break." Scientific American, August 1977.

GARR01 Garrett, P. Making, Breaking Codes: An Introduction to Cryptology. Upper Saddle River, NJ: Prentice Hall, 2001.

GASS88 Gasser, M. Building a Secure Computer System. New York: Van Nostrand Reinhold, 1988.

GAUD00 Gaudin, S. "The Omega Files." Network World, June 26, 2000.

GILB03 Gilbert, H. and Handschuh, H. "Security Analysis of SHA-256 and Sisters." Proceedings, CRYPTO '03, 2003; published by Springer-Verlag.

GOLL99 Gollmann, D. Computer Security. New York: Wiley, 1999.

GONG92 Gong, L. "A Security Risk of Depending on Synchronized Clocks." Operating Systems Review, January 1992.

GONG93 Gong, L. "Variations on the Themes of Message Freshness and Replay." Proceedings, IEEE Computer Security Foundations Workshop, June 1993.

GRAH94 Graham, R.; Knuth, D.; and Patashnik, O. Concrete Mathematics: A Foundation for Computer Science. Reading, MA: Addison-Wesley, 1994.

GUTM02 Gutmann, P. "PKI: It's Not Dead, Just Resting." Computer, August 2002.

HAMM91 Hamming, R. The Art of Probability for Scientists and Engineers. Reading, MA: Addison-Wesley, 1991.

HANK04 Hankerson, D.; Menezes, A.; and Vanstone, S. Guide to Elliptic Curve Cryptography. New York: Springer, 2004.

HARL01 Harley, D.; Slade, R.; and Gattiker, U. Viruses Revealed. New York: Osborne/McGraw-Hill, 2001.

HEBE92 Heberlein, L.; Mukherjee, B.; and Levitt, K. "Internetwork Security Monitor: An Intrusion-Detection System for Large-Scale Networks." Proceedings, 15th National Computer Security Conference, October 1992.

HELD96 Held, G. Data and Image Compression: Tools and Techniques. New York: Wiley, 1996.

HELL78 Hellman, M. "An Overview of Public Key Cryptography." IEEE Communications Magazine, November 1978.

HERS75 Herstein, I. Topics in Algebra. New York: Wiley, 1975.

HEVI99 Hevia, A., and Kiwi, M. "Strength of Two Data Encryption Standard Implementations Under Timing Attacks." ACM Transactions on Information and System Security, November 1999.

HEYS95 Heys, H., and Tavares, S. "Avalanche Characteristics of Substitution-Permutation Encryption Networks." IEEE Transactions on Computers, September 1995.

HONE01 The Honeynet Project. Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community. Reading, MA: Addison-Wesley, 2001.

HORO71 Horowitz, E. "Modular Arithmetic and Finite Field Theory: A Tutorial." Proceedings of the Second ACM Symposium and Symbolic and Algebraic Manipulation, March 1971.

HUIT98 Huitema, C. IPv6: The New Internet Protocol. Upper Saddle River, NJ: Prentice Hall, 1998.

IANS90 I'Anson, C., and Mitchell, C. "Security Defects in CCITT Recommendation X.509The Directory Authentication Framework." Computer Communications Review, April 1990.


[Page 667]

ILGU93 Ilgun, K. "USTAT: A Real-Time Intrusion Detection System for UNIX." Proceedings, 1993 IEEE Computer Society Symposium on Research in Security and Privacy, May 1993.

IWAT03 Iwata, T., and Kurosawa, K. "OMAC: One-Key CBC MAC." Proceedings, Fast Software Encryption, FSE '03, 2003.

JAIN91 Jain, R. The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling. New York: Wiley, 1991.

JAKO98 Jakobsson, M.; Shriver, E.; Hillyer, B.; and Juels, A. "A practical secure physical random bit generator." Proceedings of The Fifth ACM Conference on Computer and Communications Security, November 1998.

JAVI91 Javitz, H., and Valdes, A. "The SRI IDES Statistical Anomaly Detector." Proceedings, 1991 IEEE Computer Society Symposium on Research in Security and Privacy, May 1991.

JONE82 Jones, R. "Some Techniques for Handling Encipherment Keys." ICL Technical Journal, November 1982.

JUEN85 Jueneman, R.; Matyas, S.; and Meyer, C. "Message Authentication." IEEE Communications Magazine, September 1988.

JUEN87 Jueneman, R. "Electronic Document Authentication." IEEE Network Magazine, April 1987.

JUN99 Jun, B., and Kocher, P. The Intel Random Number Generator. Intel White Paper, April 22, 1999.

JUNO04 Junod, P., and Vaudenay, S. "Perfect Diffusion Primitives for Block Ciphers: Building Efficient MDS Matrices." Selected Areas in Cryptography 2004, Waterloo, Canada, August 910, 2004.

JURI97 Jurisic, A., and Menezes, A. "Elliptic Curves and Cryptography." Dr. Dobb's Journal, April 1997.

KAHN96 Kahn, D. The Codebreakers: The Story of Secret Writing. New York: Scribner, 1996.

KALI95 Kaliski, B., and Robshaw, M. "The Secure Use of RSA." CryptoBytes, Autumn 1995.

KALI96a Kaliski, B., and Robshaw, M. "Multiple Encryption: Weighing Security and Performance." Dr. $$$Dobb's Journal, January 1996.

KALI96b Kaliski, B. "Timing Attacks on Cryptosystems." RSA Laboratories Bulletin, January 1996. http://www.rsasecurity.com/rsalabs

KATZ00 Katzenbeisser, S., ed. Information Hiding Techniques for Steganography and Digital Watermarking. Boston: Artech House, 2000.

KEHN92 Kehne, A.; Schonwalder, J.; and Langendorfer, H. "A Nonce-Based Protocol for Multiple Authentications" Operating Systems Review, October 1992.

KELS98 Kelsey, J.; Schneier, B.; and Hall, C. "Cryptanalytic Attacks on Pseudorandom Number Generators." Proceedings, Fast Software Encryption, 1998. http://www.schneier.com/paper-prngs.html

KENT00 Kent, S. "On the Trail of Intrusions into Information Systems." IEEE Spectrum, December 2000.

KEPH97a Kephart, J.; Sorkin, G.; Chess, D.; and White, S. "Fighting Computer Viruses." Scientific American, November 1997.

KEPH97b Kephart, J.; Sorkin, G.; Swimmer, B.; and White, S. "Blueprint for a Computer Immune System." Proceedings, Virus Bulletin International Conference, October 1997.

KITS04 Kitsos, P., and Koufopaviou, O. "Architecture and Hardware Implementation of the Whirlpool Hash Function." IEEE Transactions on Consumer Electronics, February 2004.

KLEI90 Klein, D. "Foiling the Cracker: A Survey of, and Improvements to, Password Security." Proceedings, UNIX Security Workshop II, August 1990.

KNUD98 Knudsen, L., et al. "Analysis Method for Alleged RC4." Proceedings, ASIACRYPT '98, 1998.

KNUT97 Knuth, D. The Art of Computer Programming, Volume 1: Fundamental Algorithms. Reading, MA: Addison-Wesley, 1997.

KNUT98 Knuth, D. The Art of Computer Programming, Volume 2: Seminumerical Algorithms. Reading, MA: Addison-Wesley, 1998.

KOBL92 Koblas, D., and Koblas, M. "SOCKS." Proceedings, UNIX Security Symposium III, September 1992.


[Page 668]

KOBL94 Koblitz, N. A Course in Number Theory and Cryptography. New York: Springer-Verlag, 1994.

KOCH96 Kocher, P. "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems." Proceedings, Crypto '96, August 1996.

KOCH98 Kocher, P.; Jaffe, J.; and Jun, B. Introduction to Differential Power Analysis and Related Attacks." http://www.cryptography.com/dpa/technical/index.html

KOHL89 Kohl, J. "The Use of Encryption in Kerberos for Network Authentication." Proceedings, Crypto '89, 1989; published by Springer-Verlag.

KOHL94 Kohl, J.; Neuman, B.; and Ts'o, T. "The Evolution of the Kerberos Authentication Service." in Brazier, F., and Johansen, D. Distributed Open Systems. Los Alamitos, CA: IEEE Computer Society Press, 1994. Available at http://web.mit.edu/kerberos/www/papers.html

KOHN78 Kohnfelder, L. Towards a Practical Public-Key Cryptosystem. Bachelor's Thesis, M.I.T., May 1978.

KONH81 Konheim, A. Cryptography: A Primer. New York: Wiley, 1981.

KORN96 Korner, T. The Pleasures of Counting. Cambridge, England: Cambridge University Press, 1996.

KUMA97 Kumar, I. Cryptology. Laguna Hills, CA: Aegean Park Press, 1997.

KUMA98 Kumanduri, R., and Romero, C. Number Theory with Computer Applications. Upper Saddle River, NJ: Prentice Hall, 1998.

LAM92a Lam, K., and Gollmann, D. "Freshness Assurance of Authentication Protocols" Proceedings, ESORICS 92, 1992; published by Springer-Verlag.

LAM92b Lam, K., and Beth, T. "Timely Authentication in Distributed Systems." Proceedings, ESORICS 92, 1992; published by Springer-Verlag.

LAND04 Landau, S. "Polynomials in the Nation's Service: Using Algebra to Design the Advanced Encryption Standard." American Mathematical Monthly, February 2004.

LE93 Le, A.; Matyas. S.; Johnson, D.; and Wilkins, J. "A Public Key Extension to the Common Cryptographic Architecture." IBM Systems Journal, No. 3, 1993.

LEHM51 Lehmer, D. "Mathematical Methods in Large-Scale Computing." Proceedings, 2nd Symposium on Large-Scale Digital Calculating Machinery, Cambridge: Harvard University Press, 1951.

LEUT94 Leutwyler, K. "Superhack." Scientific American, July 1994.

LEVE90 Leveque, W. Elementary Theory of Numbers. New York: Dover, 1990.

LEWA00 Lewand, R. Cryptological Mathematics. Washington, DC: Mathematical Association of America, 2000.

LEWI69 Lewis, P.; Goodman, A.; and Miller, J. "A Pseudo-Random Number Generator for the System/360." IBM Systems Journal, No. 2, 1969.

LIDL94 Lidl, R., and Niederreiter, H. Introduction to Finite Fields and Their Applications. Cambridge: Cambridge University Press, 1994.

LIPM00 Lipmaa, H.; Rogaway, P.; and Wagner, D. "CTR Mode Encryption." NIST First Modes of Operation Workshop, October 2000. http://csrc.nist.gov/encryption/modes

LODI98 Lodin, S., and Schuba, C. "Firewalls Fend Off Invasions from the Net." IEEE Spectrum, February 1998.

LUNT88 Lunt, T., and Jagannathan, R. "A Prototype Real-Time Intrusion-Detection Expert System." Proceedings, 1988 IEEE Computer Society Symposium on Research in Security and Privacy, April 1988.

MADS93 Madsen, J. "World Record in Password Checking." Usenet, comp.security.misc newsgroup, August 18, 1993.

MANT01 Mantin, I., Shamir, A. "A Practical Attack on Broadcast RC4." Proceedings, Fast Software Encryption, 2001.

MARK97 Markham, T. "Internet Security Protocol." Dr. Dobb's Journal, June 1997.

MATS93 Matsui, M. "Linear Cryptanalysis Method for DES Cipher." Proceedings, EUROCRYPT '93, 1993; published by Springer-Verlag.

MATY91a Matyas, S. "Key Handling with Control Vectors." IBM Systems Journal, No.2, 1991.

MATY91b Matyas, S.; Le, A.; and Abraham, D. "A Key-Management Scheme Based on Control Vectors." IBM Systems Journal, No. 2, 1991.


[Page 669]

MCHU00 McHugh, J.; Christie, A.; and Allen, J. "The Role of Intrusion Detection Systems." IEEE Software, September/October 2000.

MEIN01 Meinel, C. "Code Red for the Web." Scientific American, October 2001.

MENE97 Menezes, A.; van Oorschot, P.; and Vanstone, S. Handbook of Applied Cryptography. Boca Raton, FL: CRC Press, 1997.

MERK78 Merkle, R., and Hellman, M. "Hiding Information and Signatures in Trap Door Knapsacks." IEEE Transactions on Information Theory, September 1978.

MERK79 Merkle, R. Secrecy, Authentication, and Public Key Systems. Ph.D. Thesis, Stanford University, June 1979.

MERK81 Merkle, R., and Hellman, M. "On the Security of Multiple Encryption." Communications of the ACM, July 1981.

MERK89 Merkle, R. "One Way Hash Functions and DES." Proceedings, CRYPTO '89, 1989; published by Springer-Verlag.

MEYE82 Meyer, C., and Matyas, S. Cryptography: A New Dimension in Computer Data Security. New York: Wiley, 1982.

MEYE88 Meyer, C., and Schilling, M. "Secure Program Load with Modification Detection Code." Proceedings, SECURICOM 88, 1988.

MILL75 Miller, G. "Riemann's Hypothesis and Tests for Primality." Proceedings of the Seventh Annual ACM Symposium on the Theory of Computing, May 1975.

MILL88 Miller, S.; Neuman, B.; Schiller, J.; and Saltzer, J. "Kerberos Authentication and Authorization System." Section E.2.1, Project Athena Technical Plan, M.I.T. Project Athena, Cambridge, MA. October 27, 1988.

MIRK04 Mirkovic, J., and Relher, P. "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms." ACM SIGCOMM Computer Communications Review, April 2004.

MIST96 Mister, S., and Adams, C. "Practical S-Box Design." Proceedings, Workshop in Selected Areas of Cryptography, SAC' 96. 1996.

MIST98 Mister, S., and Tavares, S. "Cryptanalysis of RC4-Like Ciphers." Proceedings, Workshop in Selected Areas of Cryptography, SAC' 98. 1998.

MITC90 Mitchell, C.; Walker, M.; and Rush, D. "CCITT/ISO Standards for Secure Message Handling." IEEE Journal on Selected Areas in Communications, May 1989.

MITC92 Mitchell, C.; Piper, F.; and Wild, P. "Digital Signatures." In [SIMM92].

MIYA90 Miyaguchi, S.; Ohta, K.; and Iwata, M. "Confirmation that Some Hash Functions Are Not Collision Free." Proceedings, EUROCRYPT '90, 1990; published by Springer-Verlag.

MOOR01 Moore, M. "Inferring Internet Denial-of-Service Activity." Proceedings of the 10th USENIX Security Symposium, 2001.

MUFT89 Muftic, S. Security Mechanisms for Computer Networks. New York: Ellis Horwood, 1989.

MURP90 Murphy, S. "The Cryptanalysis of FEAL-4 with 20 Chosen Plaintexts." Journal of Cryptology, No. 3, 1990.

MUSA03 Musa, M.; Schaefer, E.; and Wedig, S. "A Simplified AES Algorithm and Its Linear and Differential Cryptanalyses." Cryptologia, April 2003.

MYER91 Myers, L. Spycomm: Covert Communication Techniques of the Underground. Boulder, CO: Paladin Press, 1991.

NACH97 Nachenberg, C. "Computer Virus-Antivirus Coevolution." Communications of the ACM, January 1997.

NECH92 Nechvatal, J. "Public Key Cryptography." In [SIMM92].

NECH00 Nechvatal, J., et al. Report on the Development of the Advanced Encryption Standard. National Institute of Standards and Technology. October 2, 2000.

NEED78 Needham, R., and Schroeder, M. "Using Encryption for Authentication in Large Networks of Computers." Communications of the ACM, December 1978.

NEUM90 Neumann, P. "Flawed Computer Chip Sold for Years." RISKS-FORUM Digest, Vol.10, No. 54, October 18, 1990.

NEUM93a Neuman, B., and Stubblebine, S. "A Note on the Use of Timestamps as Nonces." Operating Systems Review, April 1993.

NEUM93b Neuman, B. "Proxy-Based Authorization and Accounting for Distributed Systems." Proceedings of the 13th International Conference on Distributed Computing Systems, May 1993.


[Page 670]

NICH96 Nichols, R. Classical Cryptography Course. Laguna Hills, CA: Aegean Park Press, 1996.

NING04 Ning, P., et al. "Techniques and Tools for Analyzing Intrusion Alerts." ACM Transactions on Information and System Security, May 2004.

NIST97 National Institute of Standards and Technology. "Request for Candidate Algorithm Nominations for the Advanced Encryption Standard." Federal Register, September 12, 1997.

ODLY95 Odlyzko, A. "The Future of Integer Factorization." CryptoBytes, Summer 1995.

OPPL97 Oppliger, R. "Internet Security: Firewalls and Beyond." Communications of the ACM, May 1997.

OPPL05 Oppliger, R., and Rytz, R. "Does Trusted Computing Remedy Computer Security Problems?" IEEE Security and Privacy, March/April 2005.

ORE67 Ore, O. Invitation to Number Theory. Washington, DC: The Mathematical Association of America, 1967,

ORE76 Ore, O. Number Theory and Its History. New York: Dover, 1976.

PARK88 Park, S., and Miller, K. "Random Number Generators: Good Ones are Hard to Find." Communications of the ACM, October 1988.

PATR04 Patrikakis, C.; Masikos, M.; and Zouraraki, O. "Distributed Denial of Service Attacks." The Internet Protocol Journal, December 2004.

PERL99 Perlman, R. "An Overview of PKI Trust Models." IEEE Network, November/December 1999.

PFLE02 Pfleeger, C. Security in Computing. Upper Saddle River, NJ: Prentice Hall, 2002.

PFLE03 Pfleeger, C. Security in Computing. Upper Saddle River, NJ: Prentice Hall, 1997.

PIAT91 Piattelli-Palmarini, M. "Probability: Neither Rational nor Capricious." Bostonia, March 1991.

PIEP03 Pieprzyk, J.; Hardjono, T.; and Seberry, J. Fundamentals of Computer Security. New York: Springer-Verlag, 2003.

POHL81 Pohl, I., and Shaw, A. The Nature of Computation: An Introduction to Computer Science. Rockville, MD: Computer Science Press, 1981.

POIN02 Pointcheval, D. "How to Encrypt Properly with RSA." CryptoBytes, Winter/Spring 2002. http://www.rsasecurity.com/rsalabs

POPE79 Popek, G., and Kline, C. "Encryption and Secure Computer Networks." ACM Computing Surveys, December 1979.

PORR92 Porras, P. STAT: A State Transition Analysis Tool for Intrusion Detection. Master's Thesis, University of California at Santa Barbara, July 1992.

PREN93a Preneel, B.; Govaerta, R.; and Vandewalle, J. "Hash Functions Based on Block Ciphers: a Synthetic Approach." Proceedings, Advances in CryptologyCRYPTO '93, 1993.

PREN93b Preneel, B. "Cryptographic Hash Functions." Proceedings of the 3rd Symposium on State and Progress of Research in Cryptography, 1993.

PREN96 Preneel, B., and Oorschot, P. "On the Security of Two MAC Algorithms." Lecture Notes in Computer Science 1561; Lectures on Data Security, 1999; published by Springer-Verlag.

PREN99 Preneel, B. "The State of Cryptographic Hash Functions." Proceedings, EUROCRYPT '96, 1996; published by Springer-Verlag.

PROC01 Proctor, P. The Practical Intrusion Detection Handbook. Upper Saddle River, NJ: Prentice Hall, 2001.

RABI78 Rabin, M. "Digitalized Signatures." In Foundations of Secure Computation, DeMillo, R.; Dobkin, D.; Jones, A.; and Lipton, R., eds. New York: Academic Press, 1978.

RABI80 Rabin, M. "Probabilistic Algorithms for Primality Testing." Journal of Number Theory, December 1980.

RAND55 Rand Corporation. A Million Random Digits. New York: The Free Press, 1955. http://www.rand.org/publications/classics/randomdigits

RESC01 Rescorla, E. SSL and TLS: Designing and Building Secure Systems. Reading, MA: Addison-Wesley, 2001.

RIBE96 Ribenboim, P. The New Book of Prime Number Records. New York: Springer-Verlag, 1996.

RIJM96 Rijmen, V.; Daemen, J.; Preneel, B.; Bosselares, A.; and Win, E. "The Cipher SHARK." Fast Software Encryption, FSE '96, 1996.


[Page 671]

RITT91 Ritter, T. "The Efficient Generation of Cryptographic Confusion Sequences." Cryptologia, vol. 15 no. 2, 1991. http://www.ciphersbyritter.com/ARTS/CRNG2ART.HTM

RIVE78 Rivest, R.; Shamir, A.; and Adleman, L. "A Method for Obtaining Digital Signatures and Public Key Cryptosystems." Communications of the ACM, February 1978.

RIVE84 Rivest, R., and Shamir, A. "How to Expose an Eavesdropper." Communications of the ACM, April 1984.

ROBS95a Robshaw, M. Stream Ciphers. RSA Laboratories Technical Report TR-701, July 1995. http://www.rsasecurity.com/rsalabs

ROBS95b Robshaw, M. Block Ciphers. RSA Laboratories Technical Report TR-601, August 1995. http://www.rsasecurity.com/rsalabs

ROBS95c Robshaw, M. MD2, MD4, MD5, SHA and Other Hash Functions. RSA Laboratories Technical Report TR-101, July 1995. http://www.rsasecurity.com/rsalabs

RODR02 Rodriguez, A., et al. TCP/IP Tutorial and Technical Overview. Upper Saddle River: NJ: Prentice Hall, 2002.

ROSE05 Rosen, K. Elementary Number Theory and its Applications. Reading, MA: Addison-Wesley, 2000.

ROSI99 Rosing, M. Implementing Elliptic Curve Cryptography. Greenwich, CT: Manning Publications, 1999.

RUBI97 Rubin, A. "An Experience Teaching a Graduate Course in Cryptography." Cryptologia, April 1997.

RUEP92 Rueppel, T. "Stream Ciphers." In [SIMM92].

SAFF93 Safford, D.; Schales, D.;, and Hess, D. "The TAMU Security Package: An Ongoing Response to Internet Intruders in an Academic Environment." Proceedings, UNIX Security Symposium IV, October 1993.

SAUE81 Sauer, C., and Chandy, K. Computer Systems Performance Modeling. Englewood Cliffs, NJ: Prentice Hall, 1981.

SCHA96 Schaefer, E. "A Simplified Data Encryption Standard Algorithm." Cryptologia, January 1996.

SCHN91 Schnorr, C. "Efficient Signatures for Smart Card." Journal of Cryptology, No. 3, 1991.

SCHN96 Schneier, B. Applied Cryptography. New York: Wiley, 1996.

SCHN00 Schneier, B. Secrets and Lies: Digital Security in a Networked World. New York: Wiley, 2000.

SHAM82 Shamir, A. "A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem." Proceedings, 23rd IEEE Symposium on the Foundations of Computer Science, 1982.

SHAM03 Shamir, A., and Tromer, E. "On the Cost of Factoring RSA-1024." CryptoBytes, Summer 2003. http://www.rsasecurity.com/rsalabs

SHAN49 Shannon, C. "Communication Theory of Secrecy Systems." Bell Systems Technical Journal, No. 4, 1949.

SIMM92 Simmons, G., ed. Contemporary Cryptology: The Science of Information Integrity. Piscataway, NJ: IEEE Press, 1992.

SIMM93 Simmons, G. "Cryptology." Encyclopaedia Britannica, Fifteenth Edition, 1993.

SIMO95 Simovits, M. The DES: An Extensive Documentation and Evaluation. Laguna Hills, CA: Aegean Park Press, 1995.

SING99 Singh, S. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. New York: Anchor Books, 1999.

SINK66 Sinkov, A. Elementary Cryptanalysis: A Mathematical Approach. Washington, DC: The Mathematical Association of America, 1966.

SMIT97 Smith, R. Internet Cryptography. Reading, MA: Addison-Wesley, 1997.

SNAP91 Snapp, S., et al. "A System for Distributed Intrusion Detection." Proceedings, COMPCON Spring '91, 1991.

SPAF92a Spafford, E. "Observing Reusable Password Choices." Proceedings, UNIX Security Symposium III, September 1992.

SPAF92b Spafford, E. "OPUS: Preventing Weak Password Choices." Computers and Security, No. 3, 1992.


[Page 672]

STAL02 Stallings, W. "The Advanced Encryption Standard." Cryptologia, July 2002.

STAL04 Stallings, W. Computer Networking with Internet Protocols and Technology. Upper Saddle River, NJ: Prentice Hall, 2004.

STAL06 Stallings, W. "The Whirlpool Secure Hash Function." Cryptologia, January 2006.

STEI88 Steiner, J.; Neuman, C.; and Schiller, J. "Kerberos: An Authentication Service for Open Networked Systems." Proceedings of the Winter 1988 USENIX Conference, February 1988.

STEP93 Stephenson, P. "Preventive Medicine." LAN Magazine, November 1993.

STER92 Sterling, B. The Hacker Crackdown: Law and Disorder on the Electronic Frontier. New York: Bantam, 1992.

STIN02 Stinson, D. Cryptography: Theory and Practice. Boca Raton, FL: CRC Press, 2002.

STOL88 Stoll, C. "Stalking the Wily Hacker." Communications of the ACM, May 1988.

STOL89 Stoll, C. The Cuckoo's Egg. New York: Doubleday, 1989.

SZOR05 Szor, P. The Art of Computer Virus Research and Defense. Reading, MA: Addison-Wesley, 2005.

THOM84 Thompson, K. "Reflections on Trusting Trust (Deliberate Software Bugs)." Communications of the ACM, August 1984.

TIME90 Time, Inc. Computer Security, Understanding Computers Series. Alexandria, VA: Time-Life Books, 1990.

TIPP27 Tippett, L. Random Sampling Numbers. Cambridge, England: Cambridge University Press, 1927.

TSUD92 Tsudik, G. "Message Authentication with One-Way Hash Functions." Proceedings, INFOCOM '92, May 1992.

TUCH79 Tuchman, W. "Hellman Presents No Shortcut Solutions to DES." IEEE Spectrum, July 1979.

TUNG99 Tung, B. Kerberos: A Network Authentication System. Reading, MA: Addison-Wesley, 1999.

VACC89 Vaccaro, H., and Liepins, G. "Detection of Anomalous Computer Session Activity." Proceedings of the IEEE Symposium on Research in Security and Privacy, May 1989.

VANO90 van Oorschot, P., and Wiener, M. "A Known-Plaintext Attack on Two-Key Triple Encryption." Proceedings, EUROCRYPT '90, 1990; published by Springer-Verlag.

VANO94 van Oorschot, P., and Wiener, M. "Parallel Collision Search with Application to Hash Functions and Discrete Logarithms." Proceedings, Second ACM Conference on Computer and Communications Security, 1994.

VIJA02 Vijayan, J. "Denial-of-Service Attacks Still a Threat." ComputerWorld, April 8, 2002.

VOYD83 Voydock, V., and Kent., S. "Security Mechanisms in High-Level Network Protocols." Computing Surveys, June 1983.

WACK02 Wack, J.; Cutler, K.; and Pole, J. Guidelines on Firewalls and Firewall Policy. NIST Special Publication SP 800-41, January 2002.

WAGN00 Wagner, D., and Goldberg, I. "Proofs of Security for the UNIX Password Hashing Algorithm." Proceedings, ASIACRYPT '00, 2000.

WANG05 Wang, X.; Yin, Y.; and Yu, H. "Finding Collisions in the Full SHA-1. Proceedings, Crypto '05, 2005; published by Springer-Verlag.

WAYN96 Wayner, P. Disappearing Cryptography. Boston: AP Professional Books, 1996.

WEBS86 Webster, A., and Tavares, S. "On the Design of S-Boxes." Proceedings, Crypto '85, 1985; published by Springer-Verlag.

WIEN90 Wiener, M. "Cryptanalysis of Short RSA Secret Exponents." IEEE Transactions on Information Theory, vol. IT-36, 1990.

WILS05 Wilson, J. "The Future of the Firewall." Business Communications Review, May 2005.

WOO92a Woo, T., and Lam, S. "Authentication for Distributed Systems." Computer, January 1992.

WOO92b Woo, T., and Lam, S. "'Authentication' Revisited." Computer, April 1992.

YUVA79 Yuval, G. "How to Swindle Rabin." Cryptologia, July 1979.

ZENG91 Zeng. K.; Yang, C.; Wei, D.; and Rao, T. "Pseudorandom Bit Generators in Stream-Cipher Cryptography." Computer, February 1991.

ZIV77 Ziv, J., and Lempel, A. "A Universal Algorithm for Sequential Data Compression." IEEE Transactions on Information Theory, May 1977.




Cryptography and Network Security Principles and Practices
Cryptography and Network Security (4th Edition)
ISBN: 0131873164
EAN: 2147483647
Year: 2005
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net