Cited on page 338 [104] S. Morris, Cryptology timelinr, at in .NET

Embed code128b in .NET Cited on page 338 [104] S. Morris, Cryptology timelinr, at
Cited on page 338 [104] S. Morris, Cryptology timelinr, at
Code 128 Code Set A barcode library with .net
generate, create code 128 code set b none for .net projects"morris/l35/timeline.html
Code 128 barcode library with .net
Using Barcode reader for Visual Studio .NET Control to read, scan read, scan image in Visual Studio .NET applications.
Cited on page 5 [lo51 National cryptologic museum, the big machines exhibit, at Cited on pages 49 and 53 [106] nl. Nelson, Remembering Phil Katz, at
Barcode barcode library with .net
generate, create bar code none for .net projects
Barcode scanner with .net
Using Barcode reader for VS .NET Control to read, scan read, scan image in VS .NET applications.
Cited on page 111
Code 128A barcode library with .net c#
generate, create code 128c none with c# projects
Control code 128 code set a image in .net
using todevelop code-128 for web,windows application
[lo71 National Institute of Standards and Technology (NIST), Security requirements for cryptographic modules, FIPS PUB 140-2, at
Control ansi/aim code 128 size for visual basic
to encode barcode code 128 and code128b data, size, image with barcode sdk
Ean13+5 creator in .net
using barcode encoding for vs .net crystal control to generate, create ean13 image in vs .net crystal applications.
Cited on page 315 [lo81 NTRU Cryptosystems, at www. Cited on pages 294 and 295
Code-39 barcode library on .net
use .net framework code39 implement todevelop code 39 on .net
[log] A. M. Odlyzko, The rise and fall of knapsack cryptosystems, at
Pdf417 barcode library with .net
generate, create pdf 417 none with .net projects
2d Matrix Barcode barcode library in .net
use .net framework crystal matrix barcode maker toprint matrix barcode on .net
Cited on page 275 [110] P. C. van Oorschot and M. J. Wiener, Parallel collision search with application to hash functions and discrete logarithms, at
.net Vs 2010 international standard serial number implement with .net
using .net torender issn for web,windows application"paulv/papers/acmccs94.pdf
QR Code 2d Barcode barcode library in .net
using barcode maker for sql 2008 control to generate, create qr image in sql 2008 applications.
Cited on page 202 [111] Operating instructions for ECM Mark 2 (CSP 888/889) and CCM Mark 1 (CSP 1600), at www. Cited on page 52
Java bar code integration in java
use java barcode generation togenerate barcode for java
[I121 PBS home programs, Creativity and play: fostering creativity, at
decode european article number 13 on none
Using Barcode Control SDK for None Control to generate, create, read, scan barcode image in None applications.
.NET WinForms Crystal pdf417 2d barcode implement on
using windows forms crystal toadd pdf417 in web,windows application
Cited on page 127 [113] R. Pekelney, ECM MARK 2 and CCM MARK 1, at
Control data matrix ecc200 image with java
using java tomake data matrix barcode on web,windows application
ANSI/AIM Code 39 creator with visual basic
using barcode creator for vs .net control to generate, create code 39 full ascii image in vs .net applications.
Cited on page 59 [114] PKZIP, Wikipedia, the free encyclopedia, at
DataMatrix barcode library in visual c#
using barcode development for .net for windows forms crystal control to generate, create data matrix image in .net for windows forms crystal applications. Web qr-code encoding in .net
use website qr writer torender qr codes with .net
Cited on page 110
[115] C. Pomerance, The quadratic sieve factoring algorithm, Advances in Cryptology, Proceedings of Eurocrypt '84, LNCS 209, T. Beth, N. Cot, and I. Ingemarsson, Eds., Springer-Verlag, 1985, pp. 169-182, at
Cited on page 327 [116] C. Pomerance, A tale of two sieves, Notices of the AMS,December 1996, pp. 1473-1485, at Cited on page 328 [117] Purple cipher switch, at Cited on page 38
[118] M. 0. Rabin, Digitalized signatures and public key functions as intractable as factorization, MIT/LCS/TR-212, MIT Laboratory for Computer Science, 1979 Cited on page 289 [119] J. Reeds, Solved: the ciphers in book I11 of Trithemius's Steganographia, at .pdf Cited on page 144 [120] E. Rescorla, RFC 2631--Diffie-Hellman
key agreement method, at
Cited on page 276
[la11 R. Rivest, RFC 1320-the MD4 rnessage-digest algorithm, April 1992, at Cited on pages 208 and 209
[122] R. Rivest, RFC 1321-the MD5 message-digest algorithm, April 1992, at Cited on pages 225, 226, 227, and 231 [123] R. Rivest, A. Shamir, and L. Adelman, A method for obtaining digit,al signatures and puhlic-key cryptosystems, Communications of the A C M , Vol. 21, 1978, pp. 120-126 Cited on page 284 [124] G. Rose, Greg Rose's cryptographic stuff, at,
Cited on page 144 [125] R. Rueppel, Analysis and Design of Stream Ciphers, Springer-Verlag, 198G Cited on pages 83, 87, and 95
The best hook available on the theory of stream ciphers.
[126] L. F. Safford and D. W. Seiler, Control circuits for electric coding machines, United States patent number 6,175,625, January 2001 Cited on page 53 [127] Y. Sasaki, Y. Naito, N. Kunihiro, and K. Ohta, Improved collision attack on MD5, at eprint . .pdf Cited on page 230 [128] J . J. G. Savard and R. S. Pekelncy, The ECM Mark 11: design, history arid cryptology, Crypptologia, Vol. 23, No. 3, July 1999, pp. 211-228 Cit,etl on page 59
[129] W. Schindler, A timing attack against RSA with the Chinese Remainder Theorem, CHES 2000, LNCS 1965, C. K. Koq and C. Paar, Eds., Springer-Verlag, 2000, pp. 109-124 Cited on pages 334, 345, 346, 347, 349, 350, and 352 [130] J. Seberry, Hash function tutorial, at
Cited on page 193 [131] Shanks-Tonelli algorithm, at
Cited on page 326 [132] A. Shamir, A polynomial-time algorithm for breaking the basic MerkleHellman cryptosystem, IEEE Transactions on Information Theory, Vol. IT-30, No. 5, September 1984, pp. 699-704 Cited on pages 270 and 272 [133] C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, Vol. 28, No. 4, 1949, pp. 656-715, at
Cited on pages 8, 17, 69, and 182
The paper that started it all. This paper remains surprisingly relevant after more than a half-century.
[134] A. Shimizu and S. Miyaguchi, Fast data encryption algorithm FEAL, Advances in Cryptology, Proceedings of Eurocrypt '87, LNCS 304, D. Chaum and W. L. Price, Eds., Springer-Verlag, 1987, pp. 267-278 Cited on pages 170 and 171 [135] T . Siegenthaler, Decrypting a class of stream ciphers using ciphertext only, IEEE Transactions on Computers, Vol. C-34, No. 1, 1985, pp. 8184 Cited on page 93 [136] J. Silverman, A meet-in-the-middle attack on an NTRU private key, Technical Report 4: Version 1, NTRU Cryptosystems, 1997 Cited on pages 299 and 301
Version 2 of this report is available at the NTRU website. However, that version omits many iniportant details and is very unclear.
[137] J. Silverman, Almost inverses and fast NTRU key creation, Technical Report 14, NTR.U Cryptosystems, 1999 Cited on page 294