Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "3.343",
%%%     date            = "22 October 2024",
%%%     time            = "08:28:10 MDT",
%%%     filename        = "cryptography2000.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "https://www.math.utah.edu/~beebe",
%%%     checksum        = "18856 88336 362897 3900472",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; Blowfish; cipher;
%%%                        Clipper; code breaking; cracking;
%%%                        cryptanalysis; crypto; cryptobytes;
%%%                        cryptography; cryptology; cryptosystem; data
%%%                        encryption algorithm; decryption; DES;
%%%                        Diffie; digital signature; encryption;
%%%                        Hellmann; International Data Encryption
%%%                        Algorithm (IDEA); Kahn; Kerberos; key escrow;
%%%                        kleptography; PGP; Pretty Good Privacy;
%%%                        Rivest; RSA; Schneier; Smart Card;
%%%                        steganography; Twofish; Zimmermann",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is bibliography of publications on
%%%                        cryptography and related subjects, covering
%%%                        publications for the decade 2000--2009.  The
%%%                        companion file, cryptography.bib, covers
%%%                        1606--1999, and cryptography2010.bib covers
%%%                        2010--2019.
%%%
%%%                        The initial draft of this bibliography was
%%%                        extracted using the bibsearch utility from
%%%                        the large TeX User Group and BibNet Project
%%%                        bibliography archives, available on the
%%%                        Internet at
%%%
%%%                            https://www.math.utah.edu/pub/tex/bib
%%%                            https://www.math.utah.edu/pub/tex/bib/index-table.html
%%%
%%%                        and
%%%
%%%                            https://www.math.utah.edu/pub/bibnet
%%%                            https://www.math.utah.edu/pub/bibnet/index.html
%%%
%%%                        As of April 1999, these archives hold more
%%%                        than 231,000 bibliographic entries in BibTeX
%%%                        form.
%%%
%%%                        Those results were then augmented by entries
%%%                        for books found in the University of
%%%                        California Melvyl catalog, the Library of
%%%                        Congress catalog, and the OCLC WorldCat
%%%                        database, and by other publications found in
%%%                        the Compendex database, the OCLC Contents1st,
%%%                        Proceedings, and PapersFirst databases, and
%%%                        the MathSciNet database.
%%%
%%%                        Counterpane Systems maintains a Web site at
%%%
%%%                            http://www.counterpane.com/
%%%                            http://www.counterpane.com/publish.html
%%%
%%%                        with a substantial number of their technical
%%%                        reports and articles available in electronic
%%%                        form.
%%%
%%%                        The International Association for Cryptologic
%%%                        Research (IACR) is a ``non-profit scientific
%%%                        organization whose primary purpose is to
%%%                        further research in cryptology and related
%%%                        fields''.  It has a World-Wide Web site at
%%%
%%%                            http://www.iacr.org/index.html
%%%
%%%                        IACR publishes an email newsletter thrice
%%%                        yearly.  Back issues are available starting
%%%                        with Volume 15, Number 1, Fall 1998 at the
%%%                        above site.  It also supports a distinguished
%%%                        lecture series
%%%
%%%                            http://www.iacr.org/publications/dl/
%%%
%%%                        and a preprint server
%%%
%%%                            http://www.iacr.org/publications/preprint.html
%%%
%%%                        The Cryptography and Security Group at the
%%%                        Department of Computer Science and
%%%                        Engineering of the University of California
%%%                        at San Diego supports a World-Wide Web site,
%%%                        called the Theory of Cryptography Library, at
%%%
%%%                            http://philby.ucsd.edu/cryptolib/
%%%
%%%                        There is another site with cryptographic
%%%                        miscellanea and news articles at
%%%
%%%                            http://cryptome.org/
%%%
%%%                        There is an archive of the cryptography
%%%                        mailing list at
%%%
%%%                            http://www.mail-archive.com/cryptography%40wasabisystems.com/
%%%
%%%                        All of the cited references from all of the
%%%                        articles in the online journal CryptoBytes
%%%                        are also included, with referencedin key
%%%                        values recording the source of citations.
%%%
%%%                        However, publications in the journals
%%%
%%%                            * Cryptography and Communications,
%%%                            * Cryptologia,
%%%                            * Designs, Codes, and Cryptography,
%%%                            * Groups Complexity Cryptology,
%%%                            * Information Security Technical Report
%%%                            * International Journal of Information Security
%%%                            * Journal of Cryptology,
%%%                            * Journal of Discrete Mathematical
%%%                              Sciences and Cryptography
%%%
%%%                        are generally excluded, unless they are
%%%                        cross-referenced by other entries in this
%%%                        bibliography, because they are covered in
%%%                        separate companion bibliographies,
%%%                        cryptologia.bib, designscodescryptogr.bib,
%%%                        intjinfosec.bib, jcryptology.bib, and
%%%                        jdiscrmathscicrypto.bib.
%%%
%%%                        At version 3.343, the year coverage looked
%%%                        like this:
%%%
%%%                             1927 (   1)    1958 (   0)    1989 (   0)
%%%                             1929 (   0)    1960 (   0)    1991 (   1)
%%%                             1933 (   0)    1964 (   0)    1995 (   2)
%%%                             1934 (   0)    1965 (   0)    1996 (   2)
%%%                             1935 (   0)    1966 (   1)    1997 (   0)
%%%                             1936 (   0)    1967 (   2)    1998 (   4)
%%%                             1937 (   0)    1968 (   0)    1999 (   6)
%%%                             1938 (   0)    1969 (   0)    2000 ( 415)
%%%                             1939 (   1)    1970 (   0)    2001 ( 639)
%%%                             1940 (   0)    1971 (   0)    2002 ( 454)
%%%                             1941 (   0)    1972 (   0)    2003 ( 354)
%%%                             1942 (   0)    1973 (   0)    2004 ( 307)
%%%                             1943 (   0)    1974 (   1)    2005 ( 516)
%%%                             1944 (   0)    1975 (   0)    2006 ( 250)
%%%                             1945 (   0)    1976 (   0)    2007 ( 234)
%%%                             1946 (   0)    1977 (   0)    2008 ( 235)
%%%                             1947 (   0)    1978 (   0)    2009 ( 237)
%%%                             1948 (   0)    1979 (   2)    2010 (  10)
%%%                             1949 (   0)    1980 (   0)    2011 (   5)
%%%                             1950 (   0)    1981 (   0)    2012 (   1)
%%%                             1951 (   0)    1982 (   0)    2013 (   2)
%%%                             1952 (   0)    1983 (   0)    2014 (   1)
%%%                             1955 (   1)    1986 (   0)    2017 (   1)
%%%                             20xx (   3)
%%%
%%%                             Article:       2296
%%%                             Book:           374
%%%                             InCollection:    39
%%%                             InProceedings:  623
%%%                             Manual:          30
%%%                             MastersThesis:    9
%%%                             Misc:            42
%%%                             Periodical:       1
%%%                             PhdThesis:       20
%%%                             Proceedings:    195
%%%                             TechReport:      59
%%%
%%%                             Total entries: 3688
%%%
%%%                        there is a hypertext bibliography of
%%%                        classical cryptography at
%%%
%%%                            http://ourworld.compuserve.com/homepages/crypto/BIB1XX.HTM
%%%
%%%                        CIPHER, the Electronic Newsletter of the
%%%                        Technical Committee on Security and Privacy,
%%%                        A Technical Committee of the Computer Society
%%%                        of the IEEE, is available on the World-Wide
%%%                        Web at
%%%
%%%                            http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher
%%%
%%%                        with pointers to all back issues (1994--1998).
%%%
%%%                        ``CRYPTO-GRAM is a free monthly newsletter
%%%                        providing summaries, analyses, insights, and
%%%                        commentaries on cryptography and computer
%%%                        security.  To subscribe, visit
%%%
%%%                            http://www.counterpane.com/crypto-gram.html
%%%
%%%                        or send a blank message to
%%%
%%%                            crypto-gram-subscribe at chaparraltree.com
%%%
%%%                        Back issues are available on
%%%
%%%                            http://www.counterpane.com''
%%%
%%%                        CRYPTO-GRAM is a good source of news of
%%%                        recent developments in the field, and
%%%                        contains many interesting essays on aspects
%%%                        of cryptography.
%%%
%%%                        There is a Web site on steganography at
%%%
%%%                            http://www.cl.cam.ac.uk/~fapp2/steganography/
%%%
%%%                        In this bibliography, entries are sorted
%%%                        first by ascending year, and within each
%%%                        year, alphabetically by author or editor,
%%%                        and then, if necessary, by the 3-letter
%%%                        abbreviation at the end of the BibTeX
%%%                        citation tag, using the bibsort -byyear
%%%                        utility.  Year order has been chosen to
%%%                        make it easier to identify the most recent
%%%                        work.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\ifx \undefined \bbb \def \bbb #1{\mathbb{#1}} \fi"
  # "\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi"
  # "\ifx \undefined \circled \def \circled #1{(#1)}\fi"
  # "\ifx \undefined \cprime \def \cprime {$\mathsurround=0pt '$}\fi"
  # "\ifx \undefined \mathbb \def \mathbb #1{{\bf #1}}\fi"
  # "\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}}\fi"
  # "\ifx \undefined \reg \def \reg {\circled{R}}\fi"
  # "\ifx \undefined \textperiodcentered \def \textperiodcentered {$\cdot$} \fi"
  # "\ifx \undefined \TM \def \TM {${}^{\sc TM}$} \fi"
  # "\hyphenation{
        Aba-di
        Arch-ives
        Ding-yi
        for-ge-ry
        Go-pa-la-krish-nan
        Hi-de-ki
        Kraw-czyk
        Lands-verk
        Law-rence
        Leigh-ton
        Mich-ael
        Moell-er
        North-ridge
        para-digm
        para-digms
        Piep-rzyk
        Piv-e-teau
        Ram-kilde
        Re-tro-fit-ting
        Rich-ard
        Sho-stak
        Si-ro-mo-n-ey
        Ste-ph-en
        The-o-dore
        Tho-m-as
        Tzone-lih
        venge-ance
        Will-iam
        Ye-sh-i-va
    }"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-bs =   "Bruce Schneier,
                    Counterpane Systems,
                    101 East Minnehaha Parkway,
                    Minneapolis, MN 55419,
                    e-mail: \path|schneier@counterpane.com"}

@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|https://www.math.utah.edu/~beebe/|"}

@String{ack-pb =     "Preston Briggs,
                     Tera Computer Company,
                     2815 Eastlake East,
                     Seattle, WA 98102,
                     USA,
                     Tel: +1 206 325-0800,
                     e-mail: \path|preston@tera.com|"}

%%% ====================================================================
%%% Institution abbreviations:
@String{inst-COUNTERPANE-INTERNET-SECURITY = "Counterpane Internet Security"}
@String{inst-COUNTERPANE-INTERNET-SECURITY:adr = "3031 Tisch Way, Suite 100PE,
                                  San Jose, CA 95128, USA"}

@String{inst-COUNTERPANE-SYSTEMS = "Counterpane Systems"}
@String{inst-COUNTERPANE-SYSTEMS:adr = "101 East Minnehaha Parkway, Minneapolis,
                                   MN 55419"}

@String{inst-UTAH-MATH          = "University of Utah, Department of Mathematics"}
@String{inst-UTAH-MATH:adr      = "Salt Lake City, UT 84112-0090, USA"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-ACM-COMM-COMP-ALGEBRA = "ACM Communications in Computer Algebra"}

@String{j-ACM-J-EXP-ALGORITHMICS = "ACM Journal of Experimental Algorithmics"}

@String{j-ADV-COMPUT-MATH       = "Advances in Computational Mathematics"}

@String{j-AIP-CONF-PROC         = "AIP Conference Proceedings"}

@String{j-ALGORITHMICA          = "Algorithmica"}

@String{j-ALGORITHMS-BASEL      = "Algorithms ({Basel})"}

@String{j-AMER-MATH-MONTHLY     = "American Mathematical Monthly"}

@String{j-APPL-ALGEBRA-ENG-COMMUN-COMPUT = "Applicable algebra in engineering,
                                  communication and computing"}

@String{j-APPL-MATH-COMP        = "Applied Mathematics and Computation"}

@String{j-AUDITING              = "Auditing: A Journal of Practice \& Theory"}

@String{j-BELL-LABS-TECH-J      = "Bell Labs Technical Journal"}

@String{j-BELL-SYST-TECH-J      = "The Bell System Technical Journal"}

@String{j-BRITISH-J-HIST-SCI    = "British Journal for the History of Science"}

@String{j-BSHM-BULL             = "BSHM Bulletin: Journal of the British Society
                                   for the History of Mathematics"}

@String{j-BULL-AUSTRAL-MATH-SOC = "Bulletin of the Australian Mathematical
                                  Society"}

@String{j-CACM                  = "Communications of the Association for
                                  Computing Machinery"}

@String{j-CCPE                  = "Concurrency and Computation: Prac\-tice and
                                   Experience"}

@String{j-CCCUJ                 = "C/C++ Users Journal"}

@String{j-CGF                   = "Com{\-}pu{\-}ter Graphics Forum"}

@String{j-CHAOS-SOLITONS-FRACTALS = "Chaos, solitons \& fractals"}

@String{j-CHIN-J-COMPUTERS      = "Chinese Journal of Computers = Chi suan chi
                                  hsueh pao"}

@String{j-CHIN-PHYS-LETT        = "Chinese Physics Letters"}

@String{j-COLLEGE-MATH-J        = "College Mathematics Journal"}

@String{j-COMBIN-PROBAB-COMPUT  = "Combinatorics, Probability and Computing"}

@String{j-COMP-ARCH-NEWS        = "ACM SIGARCH Computer Architecture News"}

@String{j-COMP-GRAPHICS         = "Computer Graphics"}

@String{j-COMP-J                = "The Computer Journal"}

@String{j-COMP-NET-AMSTERDAM    = "Computer Networks (Amsterdam, Netherlands:
                                  1999)"}

@String{j-COMP-PHYS-COMM        = "Computer Physics Communications"}

@String{j-COMP-SURV             = "ACM Computing Surveys"}

@String{j-COMP-VIS-IMAGE-UNDERSTANDING = "Computer Vision and Image
                                  Understanding: CVIU"}

@String{j-COMPLEX-SYSTEMS       = "Complex Systems"}

@String{j-COMPUT-INTELL         = "Computational Intelligence"}

@String{j-COMPUT-MATH-APPL      = "Computers and Mathematics with Applications"}

@String{j-COMPUT-SECUR          = "Computers \& Security"}

@String{j-COMPUT-SECUR-J        = "Computer Security Journal"}

@String{j-COMPUTER              = "Computer"}

@String{j-COMPUTERS-AND-GRAPHICS = "Computers and Graphics"}

@String{j-COMPUTING             = "Computing"}

@String{j-DDJ                   = "Dr. Dobb's Journal of Software Tools"}

@String{j-DISCRETE-APPL-MATH    = "Discrete Applied Mathematics"}

@String{j-EDUC-STUD-MATH        = "Educational Studies in Mathematics"}

@String{j-ELECT-COMM-JAPAN-3-FUND-ELECT-SCI = "Electronics and communications
                                  in Japan. Part 3, Fundamental electronic
                                  science"}

@String{j-ELECTRONIK            = "Elektronik"}

@String{j-EMBEDDED-LINUX-J      = "Embedded Linux Journal"}

@String{j-EURASIP-J-APPL-SIG-PROC = "EURASIP Journal on Applied Signal Processing"}

@String{j-EURASIP-J-EMBED-SYS   = "EURASIP Journal on Embedded Systems"}

@String{j-EXP-MATH              = "Experimental Mathematics"}

@String{j-FORM-ASP-COMPUT       = "Formal Aspects of Computing"}

@String{j-FOUND-PHYS-LETT       = "Foundations of Physics Letters"}

@String{j-FUND-INFO             = "Fundamenta Informaticae"}

@String{j-FUT-GEN-COMP-SYS      = "Future Generation Computer Systems"}

@String{j-GLASG-MATH-J          = "Glasgow Mathematical Journal"}

@String{j-HIGHER-ORDER-SYMB-COMPUT = "Higher-Order and Symbolic Computation"}

@String{j-IBM-JRD               = "IBM Journal of Research and Development"}

@String{j-IBM-SYS-J             = "IBM Systems Journal"}

@String{j-IEEE-ANN-HIST-COMPUT  = "IEEE Annals of the History of Computing"}

@String{j-IEEE-CGA              = "IEEE Computer Graphics and Applications"}

@String{j-IEEE-CONCURR          = "IEEE Concurrency"}

@String{j-IEEE-DES-TEST-COMPUT  = "IEEE Design \& Test of Computers"}

@String{j-IEEE-DISTRIB-SYST-ONLINE = "IEEE Distributed Systems Online"}

@String{j-IEEE-J-SOLID-STATE-CIRCUITS = "IEEE Journal of Solid-State Circuits"}

@String{j-IEEE-MICRO            = "IEEE Micro"}

@String{j-IEEE-MULTIMEDIA       = "IEEE MultiMedia"}

@String{j-IEEE-SEC-PRIV         = "IEEE Security \& Privacy"}

@String{j-IEEE-SOFTWARE         = "IEEE Software"}

@String{j-IEEE-SPECTRUM         = "IEEE Spectrum"}

@String{j-IEEE-TRANS-CIRCUITS-SYST-1 = "IEEE Transactions on Circuits and
                                  Systems I: Regular Papers"}

@String{j-IEEE-TRANS-CIRCUITS-SYST-I-FUNDAM-THEORY-APPL = "IEEE Transactions on
                                  Circuits and Systems I: Fundamental
                                  Theory and Application"}

@String{j-IEEE-TRANS-CIRCUITS-SYST-2 = "IEEE transactions on circuits and
                                  systems. 2, Analog and digital signal
                                  processing"}

@String{j-IEEE-TRANS-COMPUT     = "IEEE Transactions on Computers"}

@String{j-IEEE-TRANS-INF-THEORY = "IEEE Transactions on Information Theory"}

@String{j-IEEE-TRANS-NETWORKING = "IEEE\slash ACM Transactions on Networking"}

@String{j-IEEE-TRANS-PAR-DIST-SYS = "IEEE Transactions on Parallel and
                                  Distributed Systems"}

@String{j-IEEE-TRANS-SOFTW-ENG  = "IEEE Transactions on Software Engineering"}

@String{j-IEEE-TRANS-VIS-COMPUT-GRAPH = "IEEE Transactions on Visualization
                                   and Computer Graphics"}

@String{j-IETE-TECH-REV         = "IETE Technical Review"}

@String{j-IJCSS                 = "International Journal of Computer Science and
                                  Security (IJCSS)"}

@String{j-IJHPCA                = "The International Journal of High
                                  Performance Computing Applications"}

@String{j-IMAGE-VIS-COMPUT      = "Image and Vision Computing"}

@String{j-INF-COMPUT            = "Information and Computation"}

@String{j-INFO-PROC-LETT        = "Information Processing Letters"}

@String{j-INFORMATIK-SPEKTRUM   = "Informatik Spektrum"}

@String{j-INT-J-BIFURC-CHAOS-APPL-SCI-ENG = "International journal of
                                  bifurcation and chaos in applied sciences
                                  and engineering"}

@String{j-INT-J-COMP-RESEARCH   = "International Journal of Computer Research"}

@String{j-INT-J-COMPUT-MATH     = "International Journal of Computer
                                  Mathematics"}

@String{j-INT-J-COMPUT-APPL     = "International Journal of Computer
                                   Applications"}

@String{j-INT-J-COMPUT-SYST-SCI-ENG = "International Journal of Computer
                                  Systems Science and Engineering"}

@String{j-INT-J-DIGIT-LIBR      = "International Journal on Digital Libraries"}

@String{j-INT-J-ELECTRON        = "International Journal of Electronics
                                  Theoretical \& Experimental"}

@String{j-INT-J-FOUND-COMP-SCI  = "International Journal of Foundations of
                                  Computer Science (IJFCS)"}

@String{j-INT-J-IMAGE-GRAPHICS  = "International Journal of Image and Graphics
                                  (IJIG)"}

@String{j-INT-J-INFO-SEC        = "International Journal of Information
                                  Security"}

@String{j-INT-J-MOD-PHYS-C      = "International Journal of Modern Physics C
                                  [Physics and Computers]"}

@String{j-INT-J-NUMBER-THEORY  = "International Journal of Number Theory (IJNT)"}

@String{j-INT-J-PARALLEL-PROG   = "International Journal of Parallel
                                  Programming"}

@String{j-INT-J-SOFTW-TOOLS-TECHNOL-TRANSFER = "International Journal on
                                  Software Tools for Technology Transfer: STTT"}

@String{j-INT-J-SYST-SCI        = "International Journal of Systems Science"}

@String{j-INTEL-TECH-J          = "Intel Technology Journal"}

@String{j-INTELL-NATL-SECUR     = "Intelligence and National Security"}

@String{j-J-ACM                 = "Journal of the ACM"}

@String{j-J-ALG                 = "Journal of Algorithms"}

@String{j-J-AM-SOC-INF-SCI-TECHNOL = "Journal of the American Society for
                                  Information Science and Technology: JASIST"}

@String{j-J-AUTOM-REASON        = "Journal of Automated Reasoning"}

@String{j-J-COMP-SCI-TECH       = "Journal of computer science and technology"}

@String{j-J-COMP-SYS-SCI        = "Journal of Computer and System Sciences"}

@String{j-J-COMPUT-APPL-MATH    = "Journal of Computational and Applied
                                  Mathematics"}

@String{j-J-COMP-SECUR            = "Journal of Computer Security"}

@String{j-J-GRID-COMP            = "Journal of Grid Computing"}

@String{j-J-HIST-ASTRON         = "Journal for the History of Astronomy"}

@String{j-J-INFO-SCI-ENG        = "Journal of Information Science and
                                  Engineering"}

@String{j-J-MATH-PHYS           = "Journal of Mathematical Physics"}

@String{j-J-NETW-COMPUT-APPL    = "Journal of Network and Computer
                                  Applications"}

@String{j-J-NUMBER-THEORY       = "Journal of Number Theory"}

@String{j-J-PAR-DIST-COMP       = "Journal of Parallel and Distributed
                                  Computing"}

@String{j-J-SOUND-VIB           = "Journal of Sound and Vibration"}

@String{j-J-STAT-COMPUT-SIMUL   = "Journal of Statistical Computation and
                                  Simulation"}

@String{j-J-STAT-PLANN-INFERENCE = "Journal of Statistical Planning and
                                  Inference"}

@String{j-J-STAT-SOFT           = "Journal of Statistical Software"}

@String{j-J-SUPERCOMPUTING      = "The Journal of Supercomputing"}

@String{j-J-SYMBOLIC-COMP       = "Journal of Symbolic Computation"}

@String{j-J-SYST-SOFTW          = "The Journal of Systems and Software"}

@String{j-J-UCS                 = "J.UCS: Journal of Universal Computer
                                  Science"}

@String{j-J-VLSI-SIGNAL-PROC    = "Journal of VLSI Signal Processing"}

@String{j-JDIQ                  = "Journal of Data and Information
                                  Quality (JDIQ)"}

@String{j-JERIC                 = "ACM Journal on Educational Resources in
                                  Computing (JERIC)"}

@String{j-LECT-NOTES-COMP-SCI   = "Lecture Notes in Computer Science"}

@String{j-LINEAR-ALGEBRA-APPL   = "Linear Algebra and its Applications"}

@String{j-LINUX-J               = "Linux Journal"}

@String{j-LMS-J-COMPUT-MATH     = "LMS Journal of Computation and Mathematics"}

@String{j-LOGIN                 = ";login: the USENIX Association newsletter"}

@String{j-LOS-ALAMOS-SCIENCE    = "Los Alamos Science"}

@String{j-MATH-COMP-SIM         = "Mathematics and Computers in Simulation"}

@String{j-MATH-COMPUT           = "Mathematics of Computation"}

@String{j-MATHEMATIKA           = "Mathematika"}

@String{j-NAMS                  = "Notices of the American Mathematical
                                  Society"}

@String{j-NETWORK-SECURITY      = "Network Security"}

@String{j-NEW-GEN-COMP          = "New Generation Computing"}

@String{j-NORDIC-J-COMPUT       = "Nordic Journal of Computing"}

@String{j-OBZORNIK-MAT-FIZ      = "Dru{\\v{s}}tvo Matematikov, Fizikov in
                                  Astronomov SRS. Obzornik za Matematiko in
                                  Fiziko"}

@String{j-OPER-SYS-REV          = "Operating Systems Review"}

@String{j-PARALLEL-COMPUTING    = "Parallel Computing"}

@String{j-PARALLEL-PROCESS-LETT = "Parallel Processing Letters"}

@String{j-PC-MAGAZINE           = "PC Magazine"}

@String{j-PHILIPS-J-RES         = "Philips Journal of Research"}

@String{j-PHYS-LET-A            = "Physics Letters A"}

@String{j-PHYS-REV-A            = "Physical Review A (Atomic, Molecular, and
                                  Optical Physics)"}

@String{j-PHYS-REV-LET          = "Physical Review Letters"}

@String{j-PRAMANA               = "Pramana: Journal of Physics"}

@String{j-PROBL-INF-TRANSM      = "Problems of Information Transmission"}

@String{j-PROC-NATL-ACAD-SCI-USA = "Proceedings of the National Academy of
                                  Sciences of the United States of America"}

@String{j-PROC-SPIE             = "Proceedings of the SPIE --- The
                                  International Society for Optical
                                  Engineering"}

@String{j-PROC-VLDB-ENDOWMENT   = "Proceedings of the VLDB Endowment"}

@String{j-QUEUE                 = "ACM Queue: Tomorrow's Computing Today"}

@String{j-REV-MOD-PHYS = "Reviews of Modern Physics"}

@String{j-REV-SCI-INSTRUM       = "Review of Scientific Instruments"}

@String{j-RUTHERFORD-J          = "Rutherford Journal"}

@String{j-SCI-AMER              = "Scientific American"}

@String{j-SCI-COMPUT-PROGRAM    = "Science of Computer Programming"}

@String{j-SIAM-J-COMPUT         = "SIAM Journal on Computing"}

@String{j-SIAM-J-DISCR-MATH     = "SIAM Journal on Discrete Mathematics"}

@String{j-SIAM-REVIEW           = "SIAM Review"}

@String{j-SIGACT                = "ACM SIGACT News"}

@String{j-SIGADA-LETTERS        = "ACM SIGADA Ada Letters"}

@String{j-SIGCSE                = "SIGCSE Bulletin (ACM Special Interest Group
                                  on Computer Science Education)"}

@String{j-SIGKDD                = "ACM SIGKDD Explorations Newsletter"}

@String{j-SIGMETRICS            = "ACM SIGMETRICS Performance Evaluation
                                  Review"}

@String{j-SIGMOD                = "SIGMOD Record (ACM Special Interest
                                  Group on Management of Data)"}

@String{j-SIGPLAN               = "ACM SIG{\-}PLAN Notices"}

@String{j-SIGSAM                = "SIGSAM Bulletin (ACM Special Interest Group
                                  on Symbolic and Algebraic Manipulation)"}

@String{j-SIGSOFT               = "ACM SIGSOFT Software Engineering Notes"}

@String{j-SPE                   = "Soft\-ware\emdash Prac\-tice and Experience"}

@String{j-STUD-HIST-PHILOS-MOD-PHYS = "Studies in History and Philosophy of
                                  Modern Physics"}

@String{j-SYNTHESE              = "Synthese"}

@String{j-SYS-ADMIN             = "Sys Admin: The Journal for UNIX Systems
                                  Administrators"}

@String{j-TAAS                  = "ACM Transactions on Autonomous and Adaptive
                                  Systems (TAAS)"}

@String{j-TACO                  = "ACM Transactions on Architecture and
                                  Code Optimization"}

@String{j-TALG                  = "ACM Transactions on Algorithms"}

@String{j-TAP                   = "ACM Transactions on Applied Perception"}

@String{j-TCBB                  = "IEEE/ACM Transactions on Computational
                                  Biology and Bioinformatics"}

@String{j-TECH-CULTURE          = "Technology and Culture"}

@String{j-TECS                  = "ACM Transactions on Embedded Computing
                                  Systems"}

@String{j-THEOR-COMP-SCI        = "Theoretical Computer Science"}

@String{j-TISSEC                = "ACM Transactions on Information and System
                                  Security"}

@String{j-TOCL                  = "ACM Transactions on Computational Logic"}

@String{j-TOCS                  = "ACM Transactions on Computer Systems"}

@String{j-TODAES                = "ACM Transactions on Design Automation of
                                  Electronic Systems"}

@String{j-TODS                  = "ACM Transactions on Database Systems"}

@String{j-TOIT                  = "ACM Transactions on Internet Technology
                                  (TOIT)"}

@String{j-TOMACS                = "ACM Transactions on Modeling and Computer
                                  Simulation"}

@String{j-TOMCCAP               = "ACM Transactions on Multimedia Computing,
                                  Communications, and Applications"}

@String{j-TOPLAS                = "ACM Transactions on Programming
                                  Languages and Systems"}

@String{j-TOS                   = "ACM Transactions on Storage"}

@String{j-TOSEM                 = "ACM Transactions on Software Engineering and
                                  Methodology"}

@String{j-TOSN                  = "ACM Transactions on Sensor Networks"}

@String{j-TRANS-INFO-PROCESSING-SOC-JAPAN = "Transactions of the Information
                                  Processing Society of Japan"}

@String{j-TRETS                 = "ACM Transactions on Reconfigurable Technology
                                  and Systems (TRETS)"}

@String{j-VLDB-J                = "VLDB Journal: Very Large Data Bases"}

@String{j-WIRED                 = "Wired"}

%%% ====================================================================
%%% Publisher abbreviations:
@String{pub-A-K-PETERS          = "A. K. Peters, Ltd."}
@String{pub-A-K-PETERS:adr      = "Wellesley, MA, USA"}

@String{pub-ACADEMIC            = "Academic Press"}
@String{pub-ACADEMIC:adr        = "New York, NY, USA"}

@String{pub-ACM                 = "ACM Press"}
@String{pub-ACM:adr             = "New York, NY 10036, USA"}

@String{pub-AIP                 = "American Institute of Physics"}
@String{pub-AIP:adr             = "Woodbury, NY, USA"}

@String{pub-AMS                 = "American Mathematical Society"}
@String{pub-AMS:adr             = "Providence, RI, USA"}

@String{pub-ANCHOR              = "Anchor Press/Doubleday"}
@String{pub-ANCHOR:adr          = "Garden City, NY, USA"}

@String{pub-ANSI                = "American National Standards Institute"}
@String{pub-ANSI:adr            = "1430 Broadway, New York, NY 10018, USA"}

@String{pub-APRESS              = "Apress"}
@String{pub-APRESS:adr          = "Berkeley, CA, USA"}

@String{pub-ARTECH              = "Artech House Inc."}
@String{pub-ARTECH:adr          = "Norwood, MA, USA"}

@String{pub-AW                  = "Ad{\-d}i{\-s}on-Wes{\-l}ey"}
@String{pub-AW:adr              = "Reading, MA, USA"}

@String{pub-BANTAM              = "Bantam Doubleday Dell Publishing Group Inc."}
@String{pub-BANTAM:adr          = "666 Fifth Avenue, New York, NY 10130, USA"}

@String{pub-BASIC-BOOKS         = "Basic Books"}
@String{pub-BASIC-BOOKS:adr     = "New York, NY, USA"}

@String{pub-BIRKHAUSER          = "Birkh{\"a}user Verlag"}
@String{pub-BIRKHAUSER:adr      = "Basel, Switzerland"}

@String{pub-BN                  = "Barnes and Noble"}
@String{pub-BN:adr              = "New York, NY, USA"}

@String{pub-BUTTERWORTH-HEINEMANN = "Butterworth-Heinemann"}
@String{pub-BUTTERWORTH-HEINEMANN:adr = "Boston, MA, USA"}

@String{pub-CAMBRIDGE           = "Cambridge University Press"}
@String{pub-CAMBRIDGE:adr       = "Cambridge, UK"}

@String{pub-CHAPMAN-HALL-CRC    = "Chapman and Hall/CRC"}
@String{pub-CHAPMAN-HALL-CRC:adr = "Boca Raton, FL, USA"}

@String{pub-CISCO               = "Cisco Press"}
@String{pub-CISCO:adr           = "Indianapolis, IN, USA"}

@String{pub-CLARENDON           = "Clarendon Press"}
@String{pub-CLARENDON:adr       = "Oxford, UK"}

@String{pub-COPERNICUS          = "Copernicus (a division of Springer-Verlag
                                  New York, Inc.)"}
@String{pub-COPERNICUS:adr      = "175 Fifth Avenue, New York, NY 10010, USA"}

@String{pub-CRC                 = "CRC Press"}
@String{pub-CRC:adr             = "2000 N.W. Corporate Blvd., Boca Raton,
                                  FL 33431-9868, USA"}

@String{pub-DEKKER              = "Marcel Dekker, Inc."}
@String{pub-DEKKER:adr          = "New York, NY, USA"}

@String{pub-DP                  = "Digital Press"}
@String{pub-DP:adr              = "12 Crosby Drive, Bedford, MA 01730, USA"}

@String{pub-DOUBLEDAY           = "Doubleday"}
@String{pub-DOUBLEDAY:adr       = "New York, NY, USA"}

@String{pub-ECMA                = "ECMA (European Association for
                                   Standardizing Information and
                                   Communication Systems)"}
@String{pub-ECMA:adr             = "Geneva, Switzerland"}

@String{pub-ELSEVIER            = "Elsevier"}
@String{pub-ELSEVIER:adr        = "Amsterdam, The Netherlands"}

@String{pub-ELSEVIER-ACADEMIC   = "Elsevier Academic Press"}
@String{pub-ELSEVIER-ACADEMIC:adr = "Amsterdam, The Netherlands"}

@String{pub-FABER-FABER         = "Faber and Faber"}
@String{pub-FABER-FABER:adr     = "London, UK"}

@String{pub-FREE                = "Free Press"}
@String{pub-FREE:adr            = "New York, NY, USA"}

@String{pub-GRUYTER             = "Walter de Gruyter"}
@String{pub-GRUYTER:adr         = "New York, NY, USA"}

@String{pub-HOUGHTON-MIFFLIN    = "Houghton-Mifflin"}
@String{pub-HOUGHTON-MIFFLIN:adr = "Boston, MA, USA"}

@String{pub-IBM                 = "IBM Corporation"}
@String{pub-IBM:adr             = "San Jose, CA, USA"}

@String{pub-IDG-WORLDWIDE       = "I D G Books Worldwide"}
@String{pub-IDG-WORLDWIDE:adr   = "Indianapolis, IN, USA"}

@String{pub-IEEE                = "IEEE Computer Society Press"}
@String{pub-IEEE:adr            = "1109 Spring Street, Suite 300, Silver
                                  Spring, MD 20910, USA"}

@String{pub-INTEL               = "Intel Corporation"}
@String{pub-INTEL:adr           = "Santa Clara, CA, USA"}

@String{pub-ISO                 = "International Organization for
                                  Standardization"}
@String{pub-ISO:adr             = "Geneva, Switzerland"}

@String{pub-JONES-BARTLETT      = "Jones and Bartlett"}
@String{pub-JONES-BARTLETT:adr  = "Boston, MA, USA"}

@String{pub-KLUWER              = "Kluwer Academic Publishers"}
@String{pub-KLUWER:adr          = "Dordrecht, The Netherlands"}

@String{pub-MACMILLAN           = "MacMillan Publishing Company"}
@String{pub-MACMILLAN:adr       = "New York, NY, USA"}

@String{pub-MATH-ASSOC-AMER     = "Mathematical Association of America"}
@String{pub-MATH-ASSOC-AMER:adr = "Washington, DC, USA"}

@String{pub-MCGRAW-HILL         = "Mc{\-}Graw-Hill"}
@String{pub-MCGRAW-HILL:adr     = "New York, NY, USA"}

@String{pub-MICROSOFT           = "Microsoft Press"}
@String{pub-MICROSOFT:adr       = "Redmond, WA, USA"}

@String{pub-MIT                 = "MIT Press"}
@String{pub-MIT:adr             = "Cambridge, MA, USA"}

@String{pub-MORGAN-KAUFMANN     = "Morgan Kaufmann Publishers"}
@String{pub-MORGAN-KAUFMANN:adr = "Los Altos, CA 94022, USA"}

@String{pub-MORGAN-KAUFMANN-SF  = "Morgan Kaufmann Publishers"}
@String{pub-MORGAN-KAUFMANN-SF:adr = "San Francisco, CA, USA"}

@String{pub-NEW-RIDERS          = "New Riders Publishing"}
@String{pub-NEW-RIDERS:adr      = "Carmel, IN, USA"}

@String{pub-NEWNES              = "Newnes Press"}
@String{pub-NEWNES:adr          = "Amsterdam, The Netherlands and Boston, MA,
                                  USA"}

@String{pub-NIST                = "National Institute for Standards and
                                  Technology"}
@String{pub-NIST:adr            = "Gaithersburg, MD 20899-8900, USA"}

@String{pub-NO-STARCH           = "No Starch Press"}
@String{pub-NO-STARCH:adr       = "San Francisco, CA, USA"}

@String{pub-ORA                 = "O'Reilly \& {Associates, Inc.}"}
@String{pub-ORA:adr             = "103a Morris Street,
                                   Sebastopol, CA 95472,
                                   USA,
                                   Tel: +1 707 829 0515,
                                   and
                                   90 Sherman Street,
                                   Cambridge, MA 02140,
                                   USA,
                                   Tel: +1 617 354 5800"}

@String{pub-ORA-MEDIA           = "O'Reilly Media, Inc."}
@String{pub-ORA-MEDIA:adr       = "1005 Gravenstein Highway North, Sebastopol,
                                  CA 95472, USA"}

@String{pub-OSBORNE-MCGRAW-HILL = "Osborne\slash Mc{\-}Graw-Hill"}
@String{pub-OSBORNE-MCGRAW-HILL:adr = "Berkeley, CA, USA"}

@String{pub-OXFORD              = "Oxford University Press"}
@String{pub-OXFORD:adr          = "Walton Street, Oxford OX2 6DP, UK"}

@String{pub-PENGUIN             = "Penguin"}
@String{pub-PENGUIN:adr         = "London, UK and New York, NY, USA"}

@String{pub-PH                  = "Pren{\-}tice-Hall, Inc."}
@String{pub-PH:adr              = "Upper Saddle River, NJ 07458, USA"}

@String{pub-PHPTR               = "Pren{\-}tice-Hall PTR"}
@String{pub-PHPTR:adr           = "Upper Saddle River, NJ 07458, USA"}

@String{pub-PPH                 = "Pearson Prentice Hall"}
@String{pub-PPH:adr             = "Upper Saddle River, NJ, USA"}

@String{pub-PRINCETON           = "Princeton University Press"}
@String{pub-PRINCETON:adr       = "Princeton, NJ, USA"}

@String{pub-RANDOM-HOUSE        = "Random House"}
@String{pub-RANDOM-HOUSE:adr    = "New York, NY, USA"}

@String{pub-RSA                 = "RSA Data Security, Inc."}
@String{pub-RSA:adr             = "Redwood City, CA, USA"}

@String{pub-SAMS                = "SAMS Publishing"}
@String{pub-SAMS:adr            = "Indianapolis, IN, USA"}

@String{pub-SIMON-SCHUSTER      = "Simon and Schuster"}
@String{pub-SIMON-SCHUSTER:adr  = "New York, NY, USA"}

@String{pub-SPIE                = "Society of Photo-optical
                                  Instrumentation Engineers (SPIE)"}
@String{pub-SPIE:adr            = "Bellingham, WA, USA"}

@String{pub-SUN                 = "Sun Microsystems"}
@String{pub-SUN:adr             = "2550 Garcia Avenue, Mountain View,
                                  CA 94043, USA"}

@String{pub-SUN-MICROSYSTEMS-PRESS = "Sun Microsystems Press"}
@String{pub-SUN-MICROSYSTEMS-PRESS:adr = "Palo Alto, CA, USA"}

@String{pub-SV                  = "Spring{\-}er-Ver{\-}lag"}
@String{pub-SV:adr              = "Berlin, Germany~/ Heidelberg, Germany~/
                                  London, UK~/ etc."}

@String{pub-SYNGRESS            = "Syngress Publishing, Inc."}
@String{pub-SYNGRESS:adr        = "Rockland, MA, USA"}

@String{pub-TAYLOR-FRANCIS      = "Taylor and Francis"}
@String{pub-TAYLOR-FRANCIS:adr  = "Boca Raton, FL, USA"}

@String{pub-USENIX              = "USENIX"}
@String{pub-USENIX:adr          = "Berkeley, CA, USA"}

@String{pub-USGPO               = "United States Government Printing Office"}
@String{pub-USGPO:adr           = "Washington, DC, USA"}

@String{pub-VIKING              = "Viking"}
@String{pub-VIKING:adr          = "New York, NY, USA"}

@String{pub-WEIDENFELD-NICOLSON = "Weidenfeld and Nicolson"}
@String{pub-WEIDENFELD-NICOLSON:adr = "London, UK"}

@String{pub-WILEY               = "John Wiley and Sons, Inc."}
@String{pub-WILEY:adr           = "New York, NY, USA"}

@String{pub-WILEY-INTERSCIENCE  = "Wiley-In{\-}ter{\-}sci{\-}ence"}
@String{pub-WILEY-INTERSCIENCE:adr = "New York, NY, USA"}

@String{pub-WORLD-SCI           = "World Scientific Publishing Co."}
@String{pub-WORLD-SCI:adr       = "Singapore; Philadelphia, PA, USA; River
                                  Edge, NJ, USA"}

@String{pub-WROX                = "Wrox Press"}
@String{pub-WROX:adr            = "Chicago, IL, USA"}

%%% ====================================================================
%%% Series abbreviations:
@String{ser-LNAI                = "Lecture Notes in Artificial Intelligence"}

@String{ser-LNCS                = "Lecture Notes in Computer Science"}

@String{ser-LNMATH              = "Lecture Notes in Mathematics"}

@String{ser-PROJECT-GUTENBERG   = "Project Gutenberg"}

@String{ser-SIGPLAN             = "ACM SIG{\-}PLAN Notices"}

%%% ====================================================================
%%% Bibliography entries:
@Book{Tippett:1927:RSN,
  author =       "L. H. C. (Leonard Henry Caleb) Tippett",
  title =        "Random sampling numbers",
  volume =       "15",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "viii + xxvi",
  year =         "1927",
  LCCN =         "QA47 .T7 no. 15",
  bibdate =      "Sat Aug 23 08:23:19 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Reprinted in 1952. Reprinted in 1959 with a foreword
                 by Karl Pearson.",
  series =       "Tracts for computers",
  acknowledgement = ack-nhfb,
  annote =       "This may be the first known publication of tables of
                 random numbers. I found an unsubstantiated claim that
                 they were determined by taking the middle digits from
                 area measurements of English churches. See also
                 \cite{Rand:1955:MRD}.",
}

@Book{Kendall:1939:TRS,
  author =       "Maurice G. (Maurice George) Kendall and Bernard
                 {Babington Smith}",
  title =        "Tables of random sampling numbers",
  volume =       "XXIV",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "x + 60",
  year =         "1939",
  LCCN =         "QA47 .T7 no.24",
  bibdate =      "Sat Dec 24 08:04:43 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Tracts of computers \ldots{}",
  acknowledgement = ack-nhfb,
  remark =       "On cover: Department of Statistics. University of
                 London, University College.",
  subject =      "Sampling (Statistics); Mathematics; Tables",
}

@Book{Rand:1955:MRD,
  author =       "{Rand Corporation}",
  title =        "A Million Random Digits With 100,000 Normal Deviates",
  publisher =    "Free Press",
  address =      "Glencoe, IL, USA",
  pages =        "xxv + 400 + 200",
  year =         "1955",
  ISBN =         "0-02-925790-5",
  ISBN-13 =      "978-0-02-925790-6",
  LCCN =         "QA276.5 .R3",
  bibdate =      "Sat Aug 23 07:58:03 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Reprinted in 1966 and 2001 \cite{Rand:2001:MRD}. See
                 also \cite{Tippett:1927:RSN}.",
  acknowledgement = ack-nhfb,
}

@Book{Tuchman:1966:ZT,
  author =       "Barbara W. Tuchman",
  title =        "The {Zimmermann} telegram",
  publisher =    pub-MACMILLAN,
  address =      pub-MACMILLAN:adr,
  pages =        "xii + 244",
  year =         "1966",
  LCCN =         "D511 .T77 1966",
  bibdate =      "Wed Nov 25 13:57:39 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Reprint of original 1958 edition. Kahn
                 \cite{Kahn:1996:CSS} describes this book as
                 ``recount[ing] the political effects of the most
                 important cryptogram solution in history''.",
  acknowledgement = ack-nhfb,
}

@Book{Kahn:1967:CSSa,
  author =       "David Kahn",
  title =        "The Codebreakers: the Story of Secret Writing",
  publisher =    pub-MACMILLAN,
  address =      pub-MACMILLAN:adr,
  pages =        "xvi + 1164",
  year =         "1967",
  LCCN =         "Z103 .K28",
  bibdate =      "Tue Dec 01 08:31:37 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/index-table-c.html#cryptography;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1000.html",
  acknowledgement = ack-nhfb,
  keywords =     "information hiding; steganography",
}

@Book{Kahn:1967:CSSb,
  author =       "David Kahn",
  title =        "The Codebreakers: the Story of Secret Writing",
  publisher =    pub-WEIDENFELD-NICOLSON,
  address =      pub-WEIDENFELD-NICOLSON:adr,
  pages =        "xvi + 1164",
  year =         "1967",
  LCCN =         "Z103 .K28 1967",
  bibdate =      "Tue Dec 01 08:35:10 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  acknowledgement = ack-nhfb,
}

@Book{Kahn:1974:C,
  author =       "David Kahn",
  title =        "The Codebreakers",
  publisher =    pub-WEIDENFELD-NICOLSON,
  address =      pub-WEIDENFELD-NICOLSON:adr,
  edition =      "Abridged",
  pages =        "xvi + 576",
  year =         "1974",
  ISBN =         "0-297-76785-2",
  ISBN-13 =      "978-0-297-76785-5",
  LCCN =         "Z103 .K28 1974",
  bibdate =      "Thu Jul 23 17:02:35 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  acknowledgement = ack-nhfb,
}

@Article{Blakley:1979:RSA,
  author =       "G. R. Blakley and I. Borosh",
  title =        "{Rivest--Shamir--Adleman} public key cryptosystems do
                 not always conceal messages",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "5",
  number =       "3",
  pages =        "169--178",
  year =         "1979",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  MRclass =      "94B99 (10A25 94A24)",
  MRnumber =     "81e:94026",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigcse.bib",
  fjournal =     "Computers \& Mathematics with Applications. An
                 International Journal",
  remark =       "This paper points out that the some keys in the RSA
                 may fail to encrypt: instead, they produce an output
                 ciphertext that is identical to the input plaintext.
                 See also \cite{Smith:1979:UFM,Bergmann:2009:DKR}",
}

@Article{Smith:1979:UFM,
  author =       "Donald R. Smith and James T. Palmer",
  title =        "Universal fixed messages and the
                 {Rivest--Shamir--Adleman} cryptosystem",
  journal =      j-MATHEMATIKA,
  volume =       "26",
  number =       "1",
  pages =        "44--52",
  year =         "1979",
  CODEN =        "MTKAAB",
  ISSN =         "0025-5793",
  MRclass =      "94B99",
  MRnumber =     "80m:94071",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigcse.bib",
  fjournal =     "Mathematika. A Journal of Pure and Applied
                 Mathematics",
  remark =       "This paper points out that the some keys in the RSA
                 may fail to encrypt: instead, they produce an output
                 ciphertext that is identical to the input plaintext.
                 See also \cite{Blakley:1979:RSA,Bergmann:2009:DKR}",
}

@Article{Lamont:1991:UFC,
  author =       "P. J. C. Lamont",
  title =        "Unique factorization in {Cayley} arithmetics and
                 cryptology",
  journal =      j-GLASG-MATH-J,
  volume =       "33",
  number =       "3",
  pages =        "267--273",
  month =        "????",
  year =         "1991",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1017/S0017089500008326",
  ISSN =         "0017-0895 (print), 1469-509X (electronic)",
  ISSN-L =       "0017-0895",
  bibdate =      "Tue Sep 20 18:52:12 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Glasgow Mathematical Journal",
  onlinedate =   "18 May 2009",
}

@Book{Stinson:1995:CTP,
  author =       "Douglas R. (Douglas Robert) Stinson",
  title =        "Cryptography: theory and practice",
  publisher =    pub-CRC,
  address =      pub-CRC:adr,
  pages =        "434",
  year =         "1995",
  ISBN =         "0-8493-8521-0",
  ISBN-13 =      "978-0-8493-8521-6",
  LCCN =         "QA268 .S75 1995",
  bibdate =      "Fri Mar 23 11:28:53 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "The CRC Press series on discrete mathematics and its
                 applications",
  acknowledgement = ack-nhfb,
  subject =      "Coding theory; Cryptography",
}

@Article{Wheeler:1995:TTE,
  author =       "D. J. Wheeler and R. M. Needham",
  title =        "{TEA}, a tiny encryption algorithm",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1008",
  pages =        "363--??",
  year =         "1995",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat May 11 13:45:32 MDT 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs1996a.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Kahn:1996:CSS,
  author =       "David Kahn",
  title =        "The Codebreakers: the Story of Secret Writing",
  publisher =    "Scribner",
  address =      "New York, NY, USA",
  edition =      "Revised",
  pages =        "xviii + 1181",
  year =         "1996",
  ISBN =         "0-684-83130-9",
  ISBN-13 =      "978-0-684-83130-5",
  LCCN =         "Z103 .K28 1996",
  bibdate =      "Thu Apr 29 18:02:15 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See \cite{Tuchman:1966:ZT}.",
  acknowledgement = ack-nhfb,
}

@Book{Diffie:1998:PLP,
  author =       "Whitfield Diffie and Susan Eva Landau",
  title =        "Privacy on the Line: the Politics of Wiretapping and
                 Encryption",
  publisher =    pub-MIT,
  address =      pub-MIT:adr,
  pages =        "ix + 342",
  year =         "1998",
  ISBN =         "0-262-04167-7 (hardcover)",
  ISBN-13 =      "978-0-262-04167-6 (hardcover)",
  LCCN =         "KF9670 .D54 1998",
  bibdate =      "Thu Mar 22 12:48:25 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Wiretapping; United States; Data encryption (Computer
                 science); Law and legislation; Privacy, Right of",
}

@Book{Grasser:1998:FC,
  author =       "R. Scott Grasser",
  title =        "{FINDsomeone.com}",
  publisher =    pub-BUTTERWORTH-HEINEMANN,
  address =      pub-BUTTERWORTH-HEINEMANN:adr,
  pages =        "xvii + 137",
  year =         "1998",
  ISBN =         "0-7506-7020-7",
  ISBN-13 =      "978-0-7506-7020-3",
  LCCN =         "HV6762.U5 G73 1998",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$39.95",
  acknowledgement = ack-nhfb,
}

@Book{Hardy:1998:ITN,
  author =       "G. H. (Godfrey Harold) Hardy and Edward Maitland
                 Wright",
  title =        "An introduction to the theory of numbers",
  publisher =    pub-CLARENDON,
  address =      pub-CLARENDON:adr,
  edition =      "Fifth",
  pages =        "xvi + 426",
  year =         "1998",
  ISBN =         "0-19-853171-0 (paperback)",
  ISBN-13 =      "978-0-19-853171-5 (paperback)",
  LCCN =         "QA241 .H28 1998",
  bibdate =      "Fri Jun 24 12:34:44 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Oxford science publications",
  acknowledgement = ack-nhfb,
  author-dates = "1877--1947",
  remark =       "Reprint of 1979 and 1988 editions (with
                 corrections).",
  subject =      "Number theory",
}

@Article{Stone:1998:PCC,
  author =       "Jonathan Stone and Michael Greenwald and Craig
                 Partridge and James Hughes",
  title =        "Performance of checksums and {CRC}'s over real data",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "6",
  number =       "5",
  pages =        "529--543",
  month =        oct,
  year =         "1998",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/90.731187",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Tue Jul 27 15:53:14 MDT 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/ton/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/ton/1998-6-5/p529-stone/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
  keywords =     "algorithms; experimentation; measurement; performance;
                 theory; verification",
  subject =      "{\bf C.4} Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Reliability, availability, and
                 serviceability. {\bf C.2.1} Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, Network
                 Architecture and Design, Packet-switching networks.
                 {\bf C.2.1} Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Asynchronous Transfer Mode (ATM). {\bf
                 C.2.2} Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
                 TCP/IP.",
}

@Book{Bodycombe:1999:CC,
  author =       "David J. Bodycombe",
  title =        "Codes \& ciphers",
  publisher =    "Robinson",
  address =      "London, UK",
  pages =        "vi + 122",
  year =         "1999",
  ISBN =         "1-85487-897-2",
  ISBN-13 =      "978-1-85487-897-7",
  LCCN =         "????",
  bibdate =      "Sat Apr 20 11:56:00 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.nls.uk:7290/voyager",
  acknowledgement = ack-nhfb,
  subject =      "Ciphers; Puzzles",
}

@Book{Goldreich:1999:MCP,
  author =       "Oded Goldreich",
  title =        "Modern cryptography, probabilistic proofs, and
                 pseudorandomness",
  volume =       "17",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xv + 182",
  year =         "1999",
  ISBN =         "3-540-64766-X",
  ISBN-13 =      "978-3-540-64766-9",
  LCCN =         "QA76.9.A25 G64 1999",
  bibdate =      "Fri Mar 23 11:33:40 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Algorithms and combinatorics, 0937-5511",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0815/98050548-d.html;
                 http://www.loc.gov/catdir/enhancements/fy0815/98050548-t.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Cryptography",
}

@Book{Shparlinski:1999:NTM,
  author =       "Igor E. Shparlinski",
  title =        "Number theoretic methods in cryptography: complexity
                 lower bounds",
  volume =       "17",
  publisher =    pub-BIRKHAUSER,
  address =      pub-BIRKHAUSER:adr,
  pages =        "viii + 180",
  year =         "1999",
  ISBN =         "3-7643-5888-2 (Basel), 0-8176-5888-2 (Boston)",
  ISBN-13 =      "978-3-7643-5888-4 (Basel), 978-0-8176-5888-5
                 (Boston)",
  LCCN =         "QA267.7 .S57 1999",
  bibdate =      "Mon Oct 16 09:48:58 MDT 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "Progress in computer science and applied logic",
  acknowledgement = ack-nhfb,
  keywords =     "computational complexity; cryptography; number
                 theory",
  remark =       "See updated edition \cite{Shparlinski:2003:CAA}.",
}

@Book{Singh:1999:CBE,
  author =       "Simon Singh",
  title =        "The code book: the evolution of secrecy from {Mary,
                 Queen of Scots}, to quantum cryptography",
  publisher =    pub-DOUBLEDAY,
  address =      pub-DOUBLEDAY:adr,
  pages =        "xiii + 402",
  year =         "1999",
  ISBN =         "0-385-49531-5",
  ISBN-13 =      "978-0-385-49531-8",
  LCCN =         "Z103 .S56 1999",
  bibdate =      "Mon Dec 06 16:25:40 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See also \cite{Almgren:2000:HWC}.",
  price =        "US\$24.95",
  acknowledgement = ack-nhfb,
}

@Article{Zhang:1999:AFV,
  author =       "Yuqing Zhang and Jihong Li and Guozhen Xiao",
  title =        "An approach to the formal verification of the
                 two-party cryptographic protocols",
  journal =      j-OPER-SYS-REV,
  volume =       "33",
  number =       "4",
  pages =        "48--51",
  month =        oct,
  year =         "1999",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:52 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See comments \cite{Ji:2001:CAF}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGOPS Operating Systems Review",
}

@Book{Aalberts:2000:DSB,
  author =       "Babette Aalberts and Simone van der Hof",
  title =        "Digital signature blindness: analysis of legislative
                 approaches toward electronic authentication",
  number =       "32",
  publisher =    pub-KLUWER,
  address =      pub-KLUWER:adr,
  pages =        "77",
  year =         "2000",
  ISBN =         "90-268-3656-2",
  ISBN-13 =      "978-90-268-3656-5",
  LCCN =         "K564.C6 A73 2000",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "In English with summary in Dutch.",
  series =       "ITeR, Nationaal programma informatietechnologie en
                 recht",
  acknowledgement = ack-nhfb,
  keywords =     "data protection --- law and legislation; digital
                 signatures; electronic commerce --- law and
                 legislation; signature (law) --- data processing",
}

@InProceedings{Abadi:2000:TA,
  author =       "Mart{\'\i}n Abadi",
  title =        "Taming the Adversary",
  crossref =     "Bellare:2000:ACC",
  pages =        "353--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800353.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800353.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@Article{Abdalla:2000:KMR,
  author =       "Michel Abdalla and Yuval Shavitt and Avishai Wool",
  title =        "Key management for restricted multicast using
                 broadcast encryption",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "8",
  number =       "4",
  pages =        "443--454",
  year =         "2000",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/90.865073",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Fri Dec 8 17:21:08 MST 2000",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/ton/2000-8-4/p443-abdalla/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
  subject =      "Data --- Data Encryption (E.3); Information Systems
                 --- Information Systems Applications --- Communications
                 Applications (H.4.3): {\bf Internet}; Computing Milieux
                 --- Computers and Society --- Public Policy Issues
                 (K.4.1): {\bf Intellectual property rights}; Computing
                 Milieux --- Computers and Society --- Electronic
                 Commerce (K.4.4)",
}

@Article{Abdalla:2000:NFS,
  author =       "Michel Abdalla and Leonid Reyzin",
  title =        "A New Forward-Secure Digital Signature Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1976",
  pages =        "116--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:17:24 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1976.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1976/19760116.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1976/19760116.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Abe:2000:PSP,
  author =       "Masayuki Abe and Tatsuaki Okamoto",
  title =        "Provably Secure Partially Blind Signatures",
  crossref =     "Bellare:2000:ACC",
  pages =        "271--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800271.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800271.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@InProceedings{Aharonov:2000:QBE,
  author =       "Dorit Aharonov and Amnon Ta-Shma and Umesh V. Vazirani
                 and Andrew C. Yao",
  title =        "Quantum bit escrow",
  crossref =     "ACM:2000:PTS",
  pages =        "705--714",
  year =         "2000",
  bibdate =      "Wed Feb 20 18:35:45 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/proceedings/series/stoc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.acm.org/pubs/articles/proceedings/stoc/335305/p705-aharonov/p705-aharonov.pdf;
                 http://www.acm.org/pubs/citations/proceedings/stoc/335305/p705-aharonov/",
  acknowledgement = ack-nhfb,
}

@TechReport{Almgren:2000:HWC,
  author =       "Fredrik Almgren and Gunnar Andersson and Torbj{\"o}rn
                 Granlund and Lars Ivansson and Staffan Ulfberg",
  title =        "How We Cracked the {Code Book} Ciphers",
  type =         "Technical report",
  institution =  "????",
  address =      "????",
  pages =        "40",
  day =          "11",
  month =        oct,
  year =         "2000",
  bibdate =      "Thu Jan 17 10:51:00 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See \cite{Singh:1999:CBE}.",
  URL =          "http://frode.home.cern.ch/frode/crypto/codebook_solution.pdf;
                 http://www.simonsingh.com/cipher.htm",
  acknowledgement = ack-nhfb,
}

@Article{Alvarez:2000:CCE,
  author =       "G. Alvarez and F. Montoya and M. Romera and G.
                 Pastor",
  title =        "Cryptanalysis of a chaotic encryption system",
  journal =      j-PHYS-LET-A,
  volume =       "276",
  number =       "1-4",
  pages =        "191--196",
  year =         "2000",
  CODEN =        "PYLAAG",
  ISSN =         "0375-9601 (print), 1873-2429 (electronic)",
  ISSN-L =       "0375-9601",
  MRclass =      "94A60",
  MRnumber =     "1 803 876",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  fjournal =     "Physics Letters. A",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03759601",
}

@Book{Alvarez:2000:SMC,
  author =       "David J. Alvarez",
  title =        "Secret messages: codebreaking and {American}
                 diplomacy, 1930--1945",
  publisher =    "University Press of Kansas",
  address =      "Lawrence, KS, USA",
  pages =        "xi + 292",
  year =         "2000",
  ISBN =         "0-7006-1013-8",
  ISBN-13 =      "978-0-7006-1013-6",
  LCCN =         "D810.C88 A48 2000",
  bibdate =      "Thu Dec 28 09:13:51 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Modern war studies",
  URL =          "http://www.h-net.org/review/hrev-a0b6k4-aa",
  abstract =     "In \booktitle{Secret Messages}, David Alvarez provides
                 the first comprehensive analysis of the impact of
                 decoded radio messages (signals intelligence) upon
                 American foreign policy and strategy from 1930 to 1945.
                 He presents the most complete account to date of the
                 U.S. Army's top-secret Signal Intelligence Service
                 (SIS): its creation, struggles, and rapid wartime
                 growth, and its contributions to the war effort.",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939-1945; Cryptography; United States;
                 History; 20th century; Diplomatic history; Foreign
                 relations; 1933-1945",
  tableofcontents = "Antecedents \\
                 Launching a Service \\
                 Toward Pearl Harbor \\
                 Marching to War \\
                 Photo Section \\
                 Targets \\
                 The Russian Problem \\
                 A Usually Reliable Source",
}

@Article{Amadio:2000:RPC,
  author =       "Roberto M. Amadio and Denis Lugiez",
  title =        "On the Reachability Problem in Cryptographic
                 Protocols",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1877",
  pages =        "380--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:54 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1877.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1877/18770380.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1877/18770380.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Anderson:2000:CS,
  author =       "Ross Anderson and Eli Biham and Lars Knudsen",
  title =        "The Case for {Serpent}",
  crossref =     "NIST:2000:TAE",
  pages =        "349--353",
  year =         "2000",
  bibdate =      "Thu Feb 22 18:33:42 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.cl.cam.ac.uk/ftp/users/rja14/serpentcase.pdf;
                 http://www.cl.cam.ac.uk/ftp/users/rja14/slides-bw.pdf;
                 http://www.cl.cam.ac.uk/ftp/users/rja14/slides.pdf;
                 http://www.cl.cam.ac.uk/~rja14/serpent.html",
  acknowledgement = ack-nhfb,
}

@InProceedings{Anonymous:2000:AIah,
  author =       "Anonymous",
  title =        "Author Index",
  crossref =     "Bellare:2000:ACC",
  pages =        "545--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/papers/1880/1880auth.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@Article{Anonymous:2000:AIH,
  author =       "Anonymous",
  title =        "{AES IP} hardware encryptor introduced",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "9",
  pages =        "6--7",
  day =          "1",
  month =        sep,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)09019-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:01 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348580009019X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Book{Anonymous:2000:CLI,
  author =       "Anonymous",
  title =        "Cryptography and liberty 2000: an international survey
                 of encryption policy",
  publisher =    "Electronic Privacy Information Center",
  address =      "Washington, DC, USA",
  pages =        "iv + 139",
  year =         "2000",
  ISBN =         "1-893044-07-6",
  ISBN-13 =      "978-1-893044-07-4",
  LCCN =         "????",
  bibdate =      "Wed Sep 28 07:55:48 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:2000:CRR,
  author =       "Anonymous",
  title =        "{China} relaxes rules on encryption products",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "4",
  pages =        "4--5",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)04011-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800040113",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2000:EES,
  author =       "Anonymous",
  title =        "{European} encryption still safer than {US} versions",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "3",
  pages =        "3--3",
  day =          "1",
  month =        mar,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)03005-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:52 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800030051",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2000:GBE,
  author =       "Anonymous",
  title =        "Governments back down on encryption regulations",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "5",
  pages =        "3--4",
  day =          "1",
  month =        may,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)05008-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:55 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348580005008X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2000:PESa,
  author =       "Anonymous",
  title =        "{PGP} encryption software granted global export
                 license",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "1",
  pages =        "1--1",
  month =        jan,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)90024-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:49 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800900242",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2000:PTD,
  author =       "Anonymous",
  title =        "Privacy threatened by digital signatures",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "5",
  pages =        "4--4",
  day =          "1",
  month =        may,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)05009-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:55 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800050091",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2000:SES,
  author =       "Anonymous",
  title =        "Signing and encryption software system launched",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "5",
  pages =        "6--6",
  day =          "1",
  month =        may,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)05017-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:55 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800050170",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2000:UAS,
  author =       "Anonymous",
  title =        "User authentication via smart card",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "9",
  pages =        "7--7",
  day =          "1",
  month =        sep,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)09020-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:01 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800090206",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2000:VAS,
  author =       "Anonymous",
  title =        "Voice authentication smart card",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "10",
  pages =        "5--5",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)10014-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:03 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800100145",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@InProceedings{Aoki:2000:FIA,
  author =       "Kazumaro Aoki and Helger Lipmaa",
  title =        "Fast Implementations of {AES} Candidates",
  crossref =     "NIST:2000:TAE",
  pages =        "106--122",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Ateniese:2000:PPS,
  author =       "Giuseppe Ateniese and Jan Camenisch and Marc Joye and
                 Gene Tsudik",
  title =        "A Practical and Provably Secure Coalition-Resistant
                 Group Signature Scheme",
  crossref =     "Bellare:2000:ACC",
  pages =        "255--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800255.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800255.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@Article{Austin:2000:ASF,
  author =       "Todd Austin and Jerome Burke and John McDonald",
  title =        "Architectural Support for Fast Symmetric-Key
                 Cryptography",
  journal =      j-SIGPLAN,
  volume =       "35",
  number =       "11",
  pages =        "178--189",
  month =        nov,
  year =         "2000",
  CODEN =        "SINODQ",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Tue Nov 7 16:57:37 MST 2000",
  bibsource =    "http://foothill.lcs.mit.edu/asplos2k/program.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
}

@Article{Baran:2000:NVB,
  author =       "Nicholas Baran",
  title =        "News and Views: 108-bit Elliptic Curve Cryptographic
                 Key Found; New Algorithm Cracks the Stock Market; First
                 Complete {Babbage} Printer Unveiled; {XrML} View to Be
                 Digital Rights Standard; {PKWare} Founder [Phil Katz]
                 Dies Unexpectedly",
  journal =      j-DDJ,
  volume =       "25",
  number =       "7",
  pages =        "18--18",
  month =        jul,
  year =         "2000",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Nov 9 08:25:16 MST 2000",
  bibsource =    "http://www.ddj.com/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Baran:2000:NVM,
  author =       "Nicholas Baran",
  title =        "News and Views: More on Tiny Transistors; {Open
                 Source} Repository Launched; Design Contest Promotes
                 New Software Tools; And Then There's a Decryption
                 Contest; {Fred Brooks} Wins {ACM Turing Award}",
  journal =      j-DDJ,
  volume =       "25",
  number =       "3",
  pages =        "18--18",
  month =        mar,
  year =         "2000",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Nov 9 08:25:14 MST 2000",
  bibsource =    "http://www.ddj.com/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://sourceforge.net/",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Baran:2000:NVR,
  author =       "Nicholas Baran",
  title =        "News and Views: {RSA} Algorithm in the Public Domain;
                 {Woz} Joins the {Inventors Hall of Fame}; Entangled
                 Photons Mean Faster, Smaller {ICs}; {BEHEMOTH}
                 Mothballed; {Advanced Encryption Standard} Selected;
                 {SGI} Releases {SDK} as Open Source; {WSDL} Spec
                 Released",
  journal =      j-DDJ,
  volume =       "25",
  number =       "12",
  pages =        "18--18",
  month =        dec,
  year =         "2000",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Wed Nov 8 15:09:25 MST 2000",
  bibsource =    "http://www.ddj.com/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
  keywords =     "Advanced Encryption Standard (AES); Big Electronic
                 Human-Energized Machine (BEHEMOTH) [computerized
                 bicycle]; Rivest-Shamir-Adleman (RSA); Steve Wozniak;
                 Web Services Description Language (WSDL)",
}

@InProceedings{Bassham:2000:ETA,
  author =       "Lawrence E. Bassham III",
  title =        "Efficiency Testing of {ANSI C} Implementations of
                 Round 2 Candidate Algorithms for the {Advanced
                 Encryption Standard}",
  crossref =     "NIST:2000:TAE",
  pages =        "136--148",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Baudron:2000:ENS,
  author =       "Olivier Baudron and David Pointcheval and Jacques
                 Stern",
  booktitle =    "Automata, languages and programming (Geneva, 2000)",
  title =        "Extended Notions of Security for Multicast Public Key
                 Cryptosystems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1853",
  pages =        "499--511",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A62 (94A60)",
  MRnumber =     "2001h:94027",
  bibdate =      "Tue Sep 10 19:08:44 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1853.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1853/18530499.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1853/18530499.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Bauer:2000:DSM,
  author =       "Friedrich Ludwig Bauer",
  title =        "Decrypted secrets: methods and maxims of cryptology",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  edition =      "Second",
  pages =        "xii + 470",
  year =         "2000",
  ISBN =         "3-540-66871-3",
  ISBN-13 =      "978-3-540-66871-8",
  LCCN =         "QA76.9.A25 B38513 2000",
  bibdate =      "Mon Oct 16 09:48:58 MDT 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography",
}

@InProceedings{Beck:2000:FSD,
  author =       "Robert Beck and Steve Holstead",
  title =        "{FOKSTRAUT} and {Samba} --- Dealing with
                 Authentication and Performance Issues on a Large-scale
                 {Samba} Service",
  crossref =     "USENIX:2000:PFSa",
  pages =        "??--??",
  year =         "2000",
  bibdate =      "Wed Oct 16 05:17:16 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/usenix2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/lisa2000/beck.html",
  acknowledgement = ack-nhfb,
}

@Article{Beimel:2000:CFS,
  author =       "Amos Beimel and Mike Burmester and Yvo Desmedt and
                 Eyal Kushilevitz",
  title =        "Computing Functions of a Shared Secret",
  journal =      j-SIAM-J-DISCR-MATH,
  volume =       "13",
  number =       "3",
  pages =        "324--345",
  year =         "2000",
  CODEN =        "SJDMEC",
  DOI =          "https://doi.org/10.1137/S0895480195288819",
  ISSN =         "0895-4801 (print), 1095-7146 (electronic)",
  ISSN-L =       "0895-4801",
  bibdate =      "Fri Oct 27 07:10:38 MDT 2000",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SIDMA/13/3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjdiscrmath.bib",
  URL =          "http://epubs.siam.org/sam-bin/dbq/article/28881",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Discrete Mathematics",
  journal-URL =  "http://epubs.siam.org/sidma",
}

@InProceedings{Beimel:2000:RSC,
  author =       "Amos Beimel and Yuval Ishai and Tal Malkin",
  title =        "Reducing the Servers Computation in Private
                 Information Retrieval: {PIR} with Preprocessing",
  crossref =     "Bellare:2000:ACC",
  pages =        "55--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800055.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800055.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@InCollection{Bellare:2000:AER,
  author =       "Mihir Bellare and Chanathip Namprempre",
  booktitle =    "Advances in cryptology---ASIACRYPT 2000 (Kyoto)",
  title =        "Authenticated Encryption: Relations among Notions and
                 Analysis of the Generic Composition Paradigm",
  volume =       "1976",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "531--545",
  year =         "2000",
  MRclass =      "94A62 (94A60)",
  MRnumber =     "1 864 350",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1976.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  series =       "Lecture Notes in Comput. Sci.",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1976/19760531.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1976/19760531.pdf",
}

@Article{Bellare:2000:AKE,
  author =       "Mihir Bellare and David Pointcheval and Phillip
                 Rogaway",
  title =        "Authenticated Key Exchange Secure against Dictionary
                 Attacks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1807",
  pages =        "139--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1807.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1807/18070139.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1807/18070139.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InCollection{Bellare:2000:ETE,
  author =       "Mihir Bellare and Phillip Rogaway",
  booktitle =    "Advances in cryptology---ASIACRYPT 2000 (Kyoto)",
  title =        "Encode-Then-Encipher Encryption: How to Exploit Nonces
                 or Redundancy in Plaintexts for Efficient
                 Cryptography",
  volume =       "1976",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "317--330",
  year =         "2000",
  MRclass =      "94A60",
  MRnumber =     "2002h:94044",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1976.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  series =       "Lecture Notes in Comput. Sci.",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1976/19760317.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1976/19760317.pdf",
}

@Article{Bellare:2000:PKE,
  author =       "Mihir Bellare and Alexandra Boldyreva and Silvio
                 Micali",
  title =        "Public-Key Encryption in a Multi-user Setting:
                 Security Proofs and Improvements",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1807",
  pages =        "259--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1807.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1807/18070259.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1807/18070259.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bellare:2000:SCB,
  author =       "Mihir Bellare and Joe Kilian and Phillip Rogaway",
  title =        "The Security of the Cipher Block Chaining Message
                 Authentication Code",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "61",
  number =       "3",
  pages =        "362--399",
  month =        dec,
  year =         "2000",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1006/jcss.1999.1694",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:26:42 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S002200009991694X",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Article{Benedens:2000:AIW,
  author =       "Oliver Benedens",
  title =        "Affine Invariant Watermarks for {$3$D} Polygonal and
                 {NURBS} Based Models",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1975",
  pages =        "15--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Sep 12 08:19:41 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1975.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1975/19750015.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1975/19750015.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Benedens:2000:TBD,
  author =       "Oliver Benedens and Christoph Busch",
  title =        "Towards Blind Detection of Robust Watermarks in
                 Polygonal Models",
  journal =      j-CGF,
  volume =       "19",
  number =       "3",
  pages =        "??--??",
  month =        aug,
  year =         "2000",
  CODEN =        "CGFODY",
  ISSN =         "0167-7055 (print), 1467-8659 (electronic)",
  ISSN-L =       "0167-7055",
  bibdate =      "Wed Oct 11 06:13:38 MDT 2000",
  bibsource =    "http://www.blackwellpublishing.com/journal.asp?ref=0167-7055;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "aid=412&
                 http://www.blackwellpublishers.co.uk/asp/journal.asp?ref=0167-7055&
                 iid=3& src=ard& vid=19",
  acknowledgement = ack-nhfb,
  author-1-adr = "Department of Security Technology for Graphic and
                 Communication Systems, Fraunhofer Institute for
                 Computer Graphics, Darmstadt, Germany",
  author-2-adr = "Department of Security Technology for Graphic and
                 Communication Systems, Fraunhofer Institute for
                 Computer Graphics, Darmstadt, Germany",
  fjournal =     "Com{\-}pu{\-}ter Graphics Forum",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1467-8659/",
}

@Article{Berson:2000:CE,
  author =       "Thomas A. Berson",
  title =        "Cryptography Everywhere",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1976",
  pages =        "72--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:17:24 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1976.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1976/19760072.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1976/19760072.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Betarte:2000:SSC,
  author =       "Gustavo Betarte and Cristina Cornes and Nora Szasz and
                 Alvaro Tasistro",
  title =        "Specification of a Smart Card Operating System",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1956",
  pages =        "77--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:08:56 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1956.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1956/19560077.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1956/19560077.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Bialaski:2000:SLN,
  author =       "Tom Bialaski and Michael Haines",
  title =        "{Solaris} and {LDAP Naming Services}: Deploying {LDAP}
                 in the Enterprise",
  publisher =    pub-SUN-MICROSYSTEMS-PRESS,
  address =      pub-SUN-MICROSYSTEMS-PRESS:adr,
  pages =        "xxvii + 372",
  year =         "2000",
  ISBN =         "0-13-030678-9",
  ISBN-13 =      "978-0-13-030678-4",
  LCCN =         "QA76.76.O63B518 2001",
  bibdate =      "Fri Apr 11 12:03:24 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/unix.bib;
                 http://www.sun.com/blueprints/",
  note =         "Part No. 806-2893-10 October 2000.",
  series =       "Sun BluePrints Program",
  URL =          "books/ldap.pdf;
                 http://www.sun.com/books/catalog/haines/",
  abstract =     "Solaris and LDAP Naming Services is a practical guide
                 to implementing Solaris 8 native LDAP on clients and
                 servers. Basic LDAP concepts are covered, as well as
                 naming and authentication architectural details. This
                 BluePrint outlines strategies for consolidating legacy
                 directory services using LDAP technology.",
  acknowledgement = ack-nhfb,
}

@InProceedings{Biehl:2000:DFA,
  author =       "Ingrid Biehl and Bernd Meyer and Volker M{\"u}ller",
  title =        "Differential Fault Attacks on Elliptic Curve
                 Cryptosystems",
  crossref =     "Bellare:2000:ACC",
  pages =        "131--??",
  year =         "2000",
  MRclass =      "94B27 (14G50)",
  MRnumber =     "2002h:94104",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800131.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800131.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@InProceedings{Bierbrauer:2000:AIW,
  author =       "J{\"u}rgen Bierbrauer and Holger Schellwat",
  title =        "Almost Independent and Weakly Biased Arrays: Efficient
                 Constructions and Cryptologic Applications",
  crossref =     "Bellare:2000:ACC",
  pages =        "533--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800533.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800533.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@Article{Biham:2000:CAG,
  author =       "Eli Biham and Orr Dunkelman",
  booktitle =    "Progress in cryptology---INDOCRYPT 2000 (Calcutta)",
  title =        "Cryptanalysis of the {A5/1 GSM} stream cipher",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1977",
  pages =        "43--51",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A55 (94A60)",
  MRnumber =     "2002h:94038",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Biham:2000:CPR,
  author =       "Eli Biham",
  title =        "Cryptanalysis of {Patarin}'s $2$-Round Public Key
                 System with {S} Boxes ({$2$R})",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1807",
  pages =        "408--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1807.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1807/18070408.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1807/18070408.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Biham:2000:IDR,
  author =       "Eli Biham and Vladimir Furman",
  title =        "Impossible Differential on 8-Round {MARS}' Core",
  crossref =     "NIST:2000:TAE",
  pages =        "186--194",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Biham:2000:IID,
  author =       "Eli Biham and Vladimir Furman",
  title =        "Improved Impossible Differentials on {Twofish}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1977",
  pages =        "80--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:08:57 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1977.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1977/19770080.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1977/19770080.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Biryukov:2000:CTM,
  author =       "Alex Biryukov and Adi Shamir",
  title =        "Cryptanalytic Time\slash Memory\slash Data Tradeoffs
                 for Stream Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1976",
  pages =        "1--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Sep 12 08:29:38 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1976.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1976/19760001.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1976/19760001.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Black:2000:CMA,
  author =       "John Black and Phillip Rogaway",
  title =        "{CBC MACs} for Arbitrary-Length Messages:The Three-Key
                 Constructions",
  crossref =     "Bellare:2000:ACC",
  pages =        "197--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800197.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800197.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@MastersThesis{Black:2000:TDE,
  author =       "Michael Andrew Black",
  title =        "A treatise on data encryption and an example of the
                 Black algorithm",
  type =         "Thesis ({M.A.})",
  school =       "University of California, Santa Barbara",
  address =      "Santa Barbara, CA, USA",
  year =         "2000",
  LCCN =         "QA13.5.C2 S25 BLAM 2000",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "dissertations, academic --- UCSB --- pure
                 mathematics",
}

@Article{Blundo:2000:VCG,
  author =       "Carlo Blundo and Alfredo {De Santis} and Moni Naor",
  title =        "Visual cryptography for grey level images",
  journal =      j-INFO-PROC-LETT,
  volume =       "75",
  number =       "6",
  pages =        "255--259",
  day =          "30",
  month =        nov,
  year =         "2000",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Apr 18 07:11:19 MDT 2001",
  bibsource =    "http://www.elsevier.com:80/inca/publications/store/5/0/5/6/1/2/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.nl/gej-ng/10/23/20/64/31/27/abstract.html;
                 http://www.elsevier.nl/gej-ng/10/23/20/64/31/27/article.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@InProceedings{Bobineau:2000:PSD,
  author =       "Christophe Bobineau and Luc Bouganim and Philippe
                 Pucheral and Patrick Valduriez",
  title =        "{PicoDMBS}: Scaling Down Database Techniques for the
                 {Smartcard}",
  crossref =     "ElAbbadi:2000:VPI",
  pages =        "11--20",
  year =         "2000",
  bibdate =      "Fri Jan 12 07:50:24 MST 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.vldb.org/dblp/db/conf/vldb/vldb2000.html",
  URL =          "http://www.vldb.org/dblp/db/conf/vldb/ChristopheBPV00.html",
  acknowledgement = ack-nhfb,
  authorurl =    "http://www.vldb.org/dblp/db/indices/a-tree/b/Bobineau:Christophe.html;
                 http://www.vldb.org/dblp/db/indices/a-tree/b/Bouganim:Luc.html;
                 http://www.vldb.org/dblp/db/indices/a-tree/p/Pucheral:Philippe.html;
                 http://www.vldb.org/dblp/db/indices/a-tree/v/Valduriez:Patrick.html",
}

@Article{Bolosky:2000:FSD,
  author =       "William J. Bolosky and John R. Douceur and David Ely
                 and Marvin Theimer",
  title =        "Feasibility of a serverless distributed file system
                 deployed on an existing set of desktop {PCs}",
  journal =      j-SIGMETRICS,
  volume =       "28",
  number =       "1",
  pages =        "34--43",
  month =        jun,
  year =         "2000",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/339331.339345",
  ISSN =         "0163-5999 (print), 1557-9484 (electronic)",
  ISSN-L =       "0163-5999",
  bibdate =      "Thu Jun 26 11:31:11 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We consider an architecture for a serverless
                 distributed file system that does not assume mutual
                 trust among the client computers. The system provides
                 security, availability, and reliability by distributing
                 multiple encrypted replicas of each file among the
                 client machines. To assess the feasibility of deploying
                 this system on an existing desktop infrastructure, we
                 measure and analyze a large set of client machines in a
                 commercial environment. In particular, we measure and
                 report results on disk usage and content; file
                 activity; and machine uptimes, lifetimes, and loads. We
                 conclude that the measured desktop infrastructure would
                 passably support our proposed system, providing
                 availability on the order of one unfilled file request
                 per user per thousand days.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGMETRICS Performance Evaluation Review",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J618",
  keywords =     "analytical modeling; availability; feasibility
                 analysis; personal computer usage data; reliability;
                 security; serverless distributed file system
                 architecture; trust; workload characterization",
}

@Book{Bondi:2000:CVB,
  author =       "Richard Bondi",
  title =        "Cryptography for {Visual Basic}: a programmer's guide
                 to the {Microsoft CryptoAPI}",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xx + 459",
  year =         "2000",
  ISBN =         "0-471-38189-6 (paperback)",
  ISBN-13 =      "978-0-471-38189-1 (paperback)",
  LCCN =         "QA76.73.B3 B665 2000",
  bibdate =      "Wed Feb 13 12:10:46 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; Microsoft CryptoAPI; Microsoft Visual
                 Basic",
}

@Article{Boneh:2000:CRP,
  author =       "Dan Boneh and Glenn Durfee",
  title =        "Cryptanalysis of {RSA} with private key {$d$} less
                 than {$ N^{0.292} $}",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "46",
  number =       "4",
  pages =        "1339--1349",
  month =        apr,
  year =         "2000",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/18.850673",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94A60 (11Y05 68Q25)",
  MRnumber =     "2002g:94034",
  MRreviewer =   "Marc M. Gysin",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Institute of Electrical and Electronics Engineers.
                 Transactions on Information Theory",
}

@Article{Boneh:2000:GRK,
  author =       "Dan Boneh and Nagendra Modadugu and Michael Kim",
  title =        "Generating {RSA} Keys on a Handheld Using an Untrusted
                 Server",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1977",
  pages =        "271--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:08:57 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1977.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1977/19770271.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1977/19770271.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Boneh:2000:TC,
  author =       "Dan Boneh and Moni Naor",
  title =        "Timed Commitments",
  crossref =     "Bellare:2000:ACC",
  pages =        "236--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800236.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800236.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@InCollection{Boneh:2000:WTE,
  author =       "Dan Boneh and Antoine Joux and Phong Q. Nguyen",
  booktitle =    "Advances in cryptology---ASIACRYPT 2000 (Kyoto)",
  title =        "Why textbook {ElGamal} and {RSA} encryption are
                 insecure (extended abstract)",
  volume =       "1976",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "30--43",
  year =         "2000",
  MRclass =      "94A60 (94A62)",
  MRnumber =     "1 864 320",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1976.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  series =       "Lecture Notes in Comput. Sci.",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1976/19760030.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1976/19760030.pdf",
}

@Book{Boni:2000:NGT,
  author =       "William Boni and Gerald L. Kovacich",
  title =        "Netspionage: the global threat to information",
  publisher =    pub-BUTTERWORTH-HEINEMANN,
  address =      pub-BUTTERWORTH-HEINEMANN:adr,
  pages =        "xx + 260",
  year =         "2000",
  ISBN =         "0-7506-7257-9",
  ISBN-13 =      "978-0-7506-7257-3",
  LCCN =         "HV6773 .B665 2000",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$34.95",
  acknowledgement = ack-nhfb,
}

@Article{Borras:2000:TRT,
  author =       "Kevin Borras",
  title =        "A transport revolution: {Turkey} gets the smart card
                 bug",
  journal =      "Tolltrans",
  pages =        "36--38",
  month =        sep,
  year =         "2000",
  LCCN =         "HE336.T64 A1 2000:8",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "smart cards --- Turkey --- Izmir",
}

@Book{Bouwmeester:2000:PQI,
  author =       "Dirk Bouwmeester and Artur K. Ekert and Anton
                 Zeilinger",
  title =        "The physics of quantum information: quantum
                 cryptography, quantum teleportation, quantum
                 computation",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xvi + 314",
  year =         "2000",
  ISBN =         "3-540-66778-4",
  ISBN-13 =      "978-3-540-66778-0",
  LCCN =         "QA76.889 .P47 2000",
  bibdate =      "Mon Oct 16 09:48:58 MDT 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  annote =       "Contents: The physics of quantum information: basic
                 concepts --- Quantum cryptography --- Quantum dense
                 coding and quantum teleportation --- Concepts of
                 quantum computation --- Experiments leading towards
                 quantum computation --- Quantum networks and
                 multi-particle entanglement --- Decoherence and quantum
                 error correction --- Entanglement purification.",
  keywords =     "quantum computers",
}

@Article{Boyko:2000:PSP,
  author =       "Victor Boyko and Philip MacKenzie and Sarvar Patel",
  title =        "Provably Secure Password-Authenticated Key Exchange
                 Using {Diffie--Hellman}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1807",
  pages =        "156--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1807.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1807/18070156.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1807/18070156.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Brassard:2000:SAP,
  author =       "Gilles Brassard and Norbert L{\"u}tkenhaus and Tal Mor
                 and Barry C. Sanders",
  title =        "Security Aspects of Practical Quantum Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1807",
  pages =        "289--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1807.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1807/18070289.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1807/18070289.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Brisbane:2000:RBW,
  author =       "Gareth Brisbane and Rei Safavi-Naini and Philip
                 Ogunbona",
  title =        "Region-Based Watermarking by Distribution Adjustment",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1975",
  pages =        "54--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:08:57 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1975.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1975/19750054.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1975/19750054.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Brown:2000:PCW,
  author =       "Michael Brown and Donny Cheung and Darrel Hankerson
                 and Julio Lopez Hernandez and Michael Kirkup and Alfred
                 Menezes",
  title =        "{PGP} in Constrained Wireless Devices",
  crossref =     "USENIX:2000:PNU",
  pages =        "??--??",
  year =         "2000",
  bibdate =      "Wed Oct 16 05:17:16 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/sec2000/brown.html",
  acknowledgement = ack-nhfb,
}

@Article{Buchmann:2000:ECC,
  author =       "Johannes Buchmann and Harald Baier",
  title =        "Efficient Construction of Cryptographically Strong
                 Elliptic Curves",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1977",
  pages =        "191--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:08:57 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1977.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1977/19770191.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1977/19770191.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Buchmann:2000:IC,
  author =       "Johannes Buchmann",
  title =        "Introduction to Cryptography",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 281",
  year =         "2000",
  ISBN =         "0-387-95034-6",
  ISBN-13 =      "978-0-387-95034-1",
  LCCN =         "QA268.B83 2001",
  bibdate =      "Wed Jan 16 09:13:38 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "UK\pounds 29.50",
  series =       "Undergraduate texts in mathematics",
  acknowledgement = ack-nhfb,
  keywords =     "coding theory; computer science textbooks;
                 cryptography",
}

@Book{Budiansky:2000:BWC,
  author =       "Stephen Budiansky",
  title =        "Battle of Wits: The Complete Story of Codebreaking in
                 {World War II}",
  publisher =    pub-FREE,
  address =      pub-FREE:adr,
  pages =        "436",
  year =         "2000",
  ISBN =         "0-684-85932-7",
  ISBN-13 =      "978-0-684-85932-3",
  LCCN =         "D810.C88 B83 2000",
  bibdate =      "Wed Nov 15 14:05:36 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$27.50, UK\pounds 20",
  acknowledgement = ack-nhfb,
  annote =       "See review by Simon Singh (author of The Code Book and
                 the television series, The Science of Secrecy) in
                 Nature, Vol. 408, 2 November 2000, pp. 23--24.",
  xxISBN =       "0-670-88492-8",
}

@Article{Budiansky:2000:DBU,
  author =       "Stephen Budiansky",
  title =        "The Difficult Beginnings of {US--British} Codebreaking
                 Co-operation",
  journal =      j-INTELL-NATL-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "49--??",
  year =         "2000",
  ISSN =         "0268-4527 (print), 1743-9019 (electronic)",
  ISSN-L =       "0268-4527",
  bibdate =      "Wed Jan 16 10:21:32 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Intelligence and National Security",
  journal-URL =  "http://www.tandfonline.com/loi/fint20",
}

@Article{Burke:2000:ASFa,
  author =       "Jerome Burke and John McDonald and Todd Austin",
  title =        "Architectural support for fast symmetric-key
                 cryptography",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "28",
  number =       "5",
  pages =        "178--189",
  month =        dec,
  year =         "2000",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 09:41:22 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Burke:2000:ASFb,
  author =       "Jerome Burke and John McDonald and Todd Austin",
  title =        "Architectural support for fast symmetric-key
                 cryptography",
  journal =      j-OPER-SYS-REV,
  volume =       "34",
  number =       "5",
  pages =        "178--189",
  month =        dec,
  year =         "2000",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:56 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGOPS Operating Systems Review",
}

@Article{Burke:2000:ASFc,
  author =       "Jerome Burke and John McDonald and Todd Austin",
  title =        "Architectural support for fast symmetric-key
                 cryptography",
  journal =      j-SIGPLAN,
  volume =       "35",
  number =       "11",
  pages =        "178--189",
  month =        nov,
  year =         "2000",
  CODEN =        "SINODQ",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Sun Dec 14 09:18:19 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
}

@Article{Burmansson:2000:TCY,
  author =       "Frank Burmansson",
  title =        "Travel cards in the year 2000: the {Helsinki} region
                 ushers in the smart card era",
  journal =      "Urban public transportation systems",
  pages =        "229--238",
  month =        "Engineers",
  year =         "2000",
  LCCN =         "HE305 .U684 2000",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "local transit --- rates --- Finland --- Helsinki;
                 smart cards",
}

@InProceedings{Burnett:2000:EMG,
  author =       "L. Burnett and G. Carter and E. Dawson and W. Millan",
  title =        "Efficient Methods for Generating {MARS}-like {S}-boxes
                 (abstract only)",
  crossref =     "NIST:2000:TAE",
  pages =        "10--10",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "One of the five AES finalists, MARS, makes use of a
                 9x32 s-box with very specific combinatorial,
                 differential and linear correlation properties. The
                 s-box used in the cipher was selected as the best from
                 a large sample of pseudo randomly generated tables, in
                 a process that took IBM about a week to compute. This
                 paper provides a faster and more effective alternative
                 generation method using heuristic techniques to produce
                 9x32 s-boxes with cryptographic properties that are
                 clearly superior to those of the MARS s-box, and
                 typically take less than two hours to produce on a
                 single PC.",
  acknowledgement = ack-nhfb,
}

@Article{Butler:2000:NSA,
  author =       "Randy Butler and Von Welch and Douglas Engert and Ian
                 Foster and Steven Tuecke and John Volmer and Carl
                 Kesselman",
  title =        "A National-Scale Authentication Infrastructure",
  journal =      j-COMPUTER,
  volume =       "33",
  number =       "12",
  pages =        "60--66",
  month =        dec,
  year =         "2000",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Wed Dec 6 18:12:09 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computer2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/co/books/co2000/pdf/rz060.pdf;
                 http://www.computer.org/computer/co2000/rz060abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@InProceedings{Cachin:2000:OFS,
  author =       "Christian Cachin and Jan Camenisch",
  title =        "Optimistic Fair Secure Computation",
  crossref =     "Bellare:2000:ACC",
  pages =        "93--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800093.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800093.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@Manual{CADOJ:2000:DSE,
  author =       "{California.Dept.of Justice}",
  title =        "Digital signature, election petitions, public and
                 private transactions: initiative statute",
  publisher =    "Office of the Secretary of State",
  address =      "Elections Division",
  pages =        "15",
  day =          "13",
  month =        oct,
  year =         "2000",
  LCCN =         "A7878 no.905",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Title and summary prepared by the California Attorney
                 General. Initiative \#905.",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- California; signature (law) ---
                 California",
}

@Manual{CALACIT:2000:SID,
  author =       "{California Legislature.Assembly Committee on
                 Information Technology}",
  title =        "Securing the {Internet}: digital signatures and
                 electronic transactions in {California}",
  publisher =    "The Committee",
  address =      "Sacramento, CA",
  pages =        "various",
  day =          "4",
  month =        aug,
  year =         "2000",
  LCCN =         "HF5548.32 .C34 2000",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "computer networks --- security measures ---
                 California; computers --- access control --- California
                 passwords; cryptograms --- data processing; data
                 encryption (computer science) --- California; database
                 security --- California; electronic commerce ---
                 California",
}

@Article{Caloyannides:2000:EWE,
  author =       "M. A. Caloyannides",
  title =        "Encryption wars: early battles",
  journal =      j-IEEE-SPECTRUM,
  volume =       "37",
  number =       "4",
  pages =        "37--43",
  month =        apr,
  year =         "2000",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/6.833026",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Computerized monitoring; computers; Cryptography;
                 cryptography; Decoding; electronic document delivery;
                 electronic message interception; electronic messaging;
                 encryption techniques; information economy; Internet;
                 legal campaigns; Military computing; Postal services;
                 Privacy; private documents; Protection; public key
                 cryptography; public-key encryption; Security;
                 symmetric encryption; Telecommunication computing;
                 telecommunications; US export laws",
}

@Article{Caloyannides:2000:EWS,
  author =       "M. A. Caloyannides",
  title =        "Encryption wars: shifting tactics",
  journal =      j-IEEE-SPECTRUM,
  volume =       "37",
  number =       "5",
  pages =        "46--51",
  month =        may,
  year =         "2000",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/6.842134",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "anonymity preservation; anonymizers; Books;
                 Communication system control; computer data creation;
                 computer data storage; computer data transmission;
                 criminals; cryptography; Cryptography; data
                 encapsulation; data hiding; electronic communications;
                 encryption; Government; Law enforcement; law
                 enforcement agencies; laws; Military computing;
                 personal privacy protection; Privacy; Protection;
                 regulations; steganography; Terrorism; terrorists;
                 Weapons",
}

@Article{Camenisch:2000:CSS,
  author =       "Jan Camenisch and Markus Michels",
  title =        "Confirmer Signature Schemes Secure against Adaptive
                 Adversaries (Extended Abstract)",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1807",
  pages =        "243--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1807.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1807/18070243.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1807/18070243.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InCollection{Camenisch:2000:VEG,
  author =       "Jan Camenisch and Ivan Damg{\aa}rd",
  booktitle =    "Advances in cryptology---ASIACRYPT 2000 (Kyoto)",
  title =        "Verifiable Encryption, Group Encryption, and Their
                 Applications to Separable Group Signatures and
                 Signature Sharing Schemes (extended abstract)",
  volume =       "1976",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "331--345",
  year =         "2000",
  MRclass =      "94A60",
  MRnumber =     "1 864 341",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1976.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  series =       "Lecture Notes in Comput. Sci.",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1976/19760331.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1976/19760331.pdf",
}

@TechReport{CAMTC:2000:TSC,
  author =       "{California.Metropolitan Transportation Commission}",
  title =        "{TransLink} smart card: universal transit card for the
                 {San Francisco Bay Area}",
  institution =  "Metropolitan Transportation Commission",
  address =      "Oakland, CA",
  pages =        "4",
  year =         "2000",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "automatic fare collection; automation; local transit
                 --- fares --- California --- San Francisco Bay Area --;
                 smart cards --- California --- San Francisco Bay Area;
                 transfers; translink (program: California)",
}

@Article{Carpenter:2000:CB,
  author =       "Mary Carpenter and Betty Paul Dowse",
  title =        "The Code Breakers of 1942",
  journal =      "Wellesley",
  volume =       "??",
  number =       "??",
  pages =        "26--30",
  month =        "Winter",
  year =         "2000",
  bibdate =      "Fri Dec 29 09:05:14 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Carriere:2000:PSC,
  author =       "Bruno Carriere",
  title =        "Le passe sans contact: autopsie d'une puce",
  journal =      "La vie du rail et des transports",
  pages =        "43--48",
  month =        nov,
  year =         "2000",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "automatic fare collection; passes (transportation) ---
                 France; smart cards --- France; subways --- France ---
                 fares --- automation",
}

@Article{Catalano:2000:CIS,
  author =       "Dario Catalano and Rosario Gennaro and Shai Halevi",
  title =        "Computing Inverses over a Shared Secret Modulus",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1807",
  pages =        "190--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1807.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1807/18070190.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1807/18070190.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Cavallar:2000:FBR,
  author =       "Stefania Cavallar and Bruce Dodson and Arjen K.
                 Lenstra and Walter Lioen and Peter L. Montgomery and
                 Brian Murphy and Herman te Riele and Karen Aardal and
                 Jeff Gilchrist and G{\'e}rard Guillerm and Paul Leyland
                 and Jo{\"e}l Marchand and Fran{\c{c}}ois Morain and
                 Alec Muffett and Chris Putnam and Craig Putnam and Paul
                 Zimmermann",
  title =        "Factorization of a $ 512 $-Bit {RSA} Modulus",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1807",
  pages =        "1--18",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1807.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1807/18070001.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1807/18070001.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chang:2000:ELD,
  author =       "Yuh-Shihng Chang and Tzong-Chen Wu and Shih-Chan
                 Huang",
  title =        "{ElGamal}-like digital signature and multisignature
                 schemes using self-certified public keys",
  journal =      j-J-SYST-SOFTW,
  volume =       "50",
  number =       "2",
  pages =        "99--105",
  day =          "15",
  month =        feb,
  year =         "2000",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Thu Sep 9 07:30:18 MDT 2010",
  bibsource =    "http://www.elsevier.com/locate/issn/01641212;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.elsevier.nl/gej-ng/10/29/11/49/27/26/article.pdf;
                 http://www.elsevier.nl/gej-ng/10/29/11/49/27/abstract.html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Chao:2000:CHC,
  author =       "Jinhui Chao and Kazuto Matsuo and Hiroto Kawashiro and
                 Shigeo Tsujii",
  booktitle =    "Advances in cryptology---ASIACRYPT 2000 (Kyoto)",
  title =        "Construction of hyperelliptic curves with {CM} and its
                 application to cryptosystems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1976",
  pages =        "259--273",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60 (14G50)",
  MRnumber =     "2002i:94037",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chen:2000:IBD,
  author =       "J. J.-R. Chen and Y. Liu",
  title =        "An {ID}-based digital multisignatures scheme with time
                 stamp technique",
  journal =      j-INT-J-COMPUT-SYST-SCI-ENG,
  volume =       "15",
  number =       "2",
  pages =        "105--??",
  month =        mar,
  year =         "2000",
  CODEN =        "CSSEEI",
  ISSN =         "0267-6192",
  bibdate =      "Wed Feb 20 12:04:38 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 OCLC Contents1st database",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Systems Science and
                 Engineering",
}

@Book{Chen:2000:JCT,
  author =       "Zhiqun Chen",
  title =        "{Java Card} technology for {Smart Cards}: architecture
                 and programmer's guide",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xxii + 368",
  year =         "2000",
  ISBN =         "0-201-70329-7",
  ISBN-13 =      "978-0-201-70329-0",
  LCCN =         "QA76.73.J38 C478 2000",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "Java series",
  acknowledgement = ack-nhfb,
  keywords =     "Java (computer program language); smart cards",
}

@Article{Cheon:2000:NBC,
  author =       "Dong Hyeon Cheon and Sang Jin Lee and Jong In Lim and
                 Sung Jae Lee",
  title =        "New Block Cipher {DONUT} Using Pairwise Perfect
                 Decorrelation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1977",
  pages =        "262--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:08:57 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1977.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1977/19770262.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1977/19770262.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Cherry:2000:SLD,
  author =       "S. Cherry",
  title =        "Secrets and lies: digital security in a networked
                 world [Books]",
  journal =      j-IEEE-SPECTRUM,
  volume =       "37",
  number =       "10",
  pages =        "15--16",
  month =        oct,
  year =         "2000",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2000.873914",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Authentication; Books; Computer network management;
                 Computer networks; Computer security; Cryptography;
                 Digital systems; Environmental management; Information
                 security; Intelligent networks",
}

@Article{Clark:2000:LNC,
  author =       "Julie Clark",
  title =        "Looking for new contactless points: {Hong Kong}'s
                 {Octopus} smart card could get a lot smarter, but it
                 will have to pick its way carefully through regulations
                 and competition from other quarters first",
  journal =      "ITS international",
  volume =       "6",
  number =       "2",
  pages =        "77--78",
  month =        mar # "/" # apr,
  year =         "2000",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "smart cards --- China --- Hong Kong",
}

@Article{Clark:2000:TNE,
  author =       "David Clark",
  title =        "Technology News: Encryption Advances to Meet
                 {Internet} Challenges",
  journal =      j-COMPUTER,
  volume =       "33",
  number =       "8",
  pages =        "20--24",
  month =        aug,
  year =         "2000",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Mon Oct 30 17:20:20 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/co/books/co2000/pdf/r8020.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
  keywords =     "Advanced Encryption Standard (AES); Cipherunicorn-A;
                 GNU Privacy Guard; SmartTrust",
}

@Article{Clarke:2000:VSP,
  author =       "E. M. Clarke and S. Jha and W. Marrero",
  title =        "Verifying security protocols with {Brutus}",
  journal =      j-TOSEM,
  volume =       "9",
  number =       "4",
  pages =        "443--487",
  month =        oct,
  year =         "2000",
  CODEN =        "ATSMER",
  ISSN =         "1049-331X (print), 1557-7392 (electronic)",
  ISSN-L =       "1049-331X",
  bibdate =      "Fri Apr 20 08:21:35 MDT 2001",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosem.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/tosem/2000-9-4/p443-clarke/p443-clarke.pdf;
                 http://www.acm.org/pubs/citations/journals/tosem/2000-9-4/p443-clarke/",
  abstract =     "Due to the rapid growth of the ``Internet'' and the
                 ``World Wide Web'' security has become a very important
                 concern in the design and implementation of software
                 systems. Since security has become an important issue,
                 the number of protocols in this domain has become very
                 large. These protocols are very diverse in nature. If a
                 software architect wants to deploy some of these
                 protocols in a system, they have to be sure that the
                 protocol has the right properties as dictated by the
                 requirements of the system. In this article we present
                 BRUTUS, a tool for verifying properties of security
                 protocols. This tool can be viewed as a special-purpose
                 model checker for security protocols. We also present
                 reduction techniques that make the tool efficient.
                 Experimental results are provided to demonstrate the
                 efficiency of BRUTUS.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Software Engineering and
                 Methodology",
  generalterms = "Security; Verification",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J790",
  keywords =     "authentication and secure payment protocols; formal
                 methods; model-checking",
  subject =      "Software --- Software Engineering --- Software/Program
                 Verification (D.2.4): {\bf Model checking}; Software
                 --- Operating Systems --- Security and Protection
                 (D.4.6): {\bf Verification**}",
}

@Article{Constantinou:2000:CSC,
  author =       "Toulla Constantinou",
  title =        "{Chicago} smart: {Chicago Transit Authority (CTS)}
                 joins ``smart card'' revolution",
  journal =      "Mass transit",
  volume =       "26",
  number =       "7",
  pages =        "52--53",
  month =        dec,
  year =         "2000",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "automatic fare collection; local transit --- Illinois
                 --- Chicago metropolitan area --- fares; smart cards",
}

@Article{Coppersmith:2000:C,
  author =       "D. Coppersmith",
  title =        "Cryptography",
  journal =      j-IBM-JRD,
  volume =       "44",
  number =       "1/2",
  pages =        "246--250",
  month =        jan # "\slash " # mar,
  year =         "2000",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  ISSN-L =       "0018-8646",
  bibdate =      "Wed Feb 07 19:33:48 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Special issue: reprints on Evolution of information
                 technology 1957--1999.",
  URL =          "http://www.research.ibm.com/journal/rd/441/coppersmith.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IBM Journal of Research and Development",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
}

@InProceedings{Coppersmith:2000:ICT,
  author =       "Don Coppersmith and Rosario Gennaro and Shai Halevi
                 and Charanjit Jutla and Stephen M. {Matyas, Jr.} and
                 Mohammad Peyravian and David Safford and Nevenko
                 Zunic",
  title =        "{IBM} Comments: {Third AES Conference April 13,
                 2000}",
  crossref =     "NIST:2000:TAE",
  pages =        "333--336",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Coppersmith:2000:KRF,
  author =       "Don Coppersmith and Lars R. Knudsen and Chris J.
                 Mitchell",
  title =        "Key Recovery and Forgery Attacks on the {MacDES MAC}
                 Algorithm",
  crossref =     "Bellare:2000:ACC",
  pages =        "184--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800184.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800184.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@InProceedings{Corella:2000:FIT,
  author =       "Francisco Corella",
  title =        "A Fast Implementation of {DES} and {Triple-DES} on
                 {PA-RISC 2.0}",
  crossref =     "USENIX:2000:PFW",
  pages =        "??--??",
  year =         "2000",
  bibdate =      "Wed Oct 16 05:17:16 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/osdi2000/wiess2000/corella.html",
  acknowledgement = ack-nhfb,
}

@InProceedings{Coron:2000:ESF,
  author =       "Jean-S{\'e}bastien Coron",
  title =        "On the Exact Security of Full Domain Hash",
  crossref =     "Bellare:2000:ACC",
  pages =        "229--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800229.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800229.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@Article{Coron:2000:FLA,
  author =       "Jean-S{\'e}bastien Coron and Fran{\c{c}}ois Koeune and
                 David Naccache",
  title =        "From Fixed-Length to Arbitrary-Length {RSA} Padding
                 Schemes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1976",
  pages =        "90--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:17:24 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1976.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1976/19760090.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1976/19760090.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Coron:2000:NAP,
  author =       "Jean-S{\'e}bastien Coron and Marc Joye and David
                 Naccache and Pascal Paillier",
  title =        "New Attacks on {PKCS\#1} v1.5 Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1807",
  pages =        "369--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1807.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1807/18070369.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1807/18070369.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InCollection{Cosgrave:2000:NTC,
  author =       "John Cosgrave",
  booktitle =    "Coding theory and cryptography (Annapolis, MD, 1998)",
  title =        "Number theory and cryptography (using {Maple})",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "124--143",
  year =         "2000",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "MR1749521",
  bibdate =      "Sat Apr 16 17:32:09 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
}

@InProceedings{Cramer:2000:CVS,
  author =       "Ronald Cramer and Ivan Damg{\aa}rd and Stefan
                 Dziembowski",
  title =        "On the complexity of verifiable secret sharing and
                 multiparty computation",
  crossref =     "ACM:2000:PTS",
  pages =        "325--334",
  year =         "2000",
  bibdate =      "Wed Feb 20 18:35:45 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/proceedings/series/stoc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.acm.org/pubs/articles/proceedings/stoc/335305/p325-cramer/p325-cramer.pdf;
                 http://www.acm.org/pubs/citations/proceedings/stoc/335305/p325-cramer/",
  acknowledgement = ack-nhfb,
}

@Article{Cramer:2000:GSM,
  author =       "Ronald Cramer and Ivan Damg{\aa}rd and Ueli Maurer",
  title =        "General Secure Multi-party Computation from any Linear
                 Secret-Sharing Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1807",
  pages =        "316--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1807.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1807/18070316.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1807/18070316.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Cramer:2000:SSB,
  author =       "Ronald Cramer and Victor Shoup",
  title =        "Signature Schemes Based on the Strong {RSA}
                 Assumption",
  journal =      j-TISSEC,
  volume =       "3",
  number =       "3",
  pages =        "161--185",
  month =        aug,
  year =         "2000",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Mon Feb 25 16:47:22 MST 2002",
  bibsource =    "http://www.acm.org/tissec/v3no3.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Crenshaw:2000:SPK,
  author =       "Scott Crenshaw",
  title =        "Speedy public key cryptography system",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "3",
  pages =        "6--6",
  day =          "1",
  month =        mar,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)03013-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:52 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800030130",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Misc{CRI:2000:DPA,
  author =       "{Cryptography Research, Inc.}",
  title =        "Differential Power Analysis",
  howpublished = "Web page.",
  year =         "2000",
  bibdate =      "Mon Oct 16 08:24:41 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.cryptography.com/dpa/index.html",
  acknowledgement = ack-nhfb # " and " # ack-bs,
}

@Article{Crotch-Harvey:2000:OPR,
  author =       "Trevor Crotch-Harvey",
  title =        "Operators are poised to reap smart card benefits",
  journal =      "International railway journal and rapid transit
                 review: IRJ",
  volume =       "40",
  number =       "2",
  pages =        "31--32",
  month =        feb,
  year =         "2000",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "automatic fare collection; local transit --- fares ---
                 equipment and supplies; smart cards",
}

@InProceedings{Daemen:2000:BCR,
  author =       "Joan Daemen and Vincent Rijmen",
  title =        "The Block Cipher {Rijndael}",
  crossref =     "Quisquater:2000:SCR",
  pages =        "288--296",
  year =         "2000",
  bibdate =      "Fri Aug 13 06:57:40 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@TechReport{Daemen:2000:NPN,
  author =       "Joan Daemen and Micha{\"e}l Peeters and Gilles {Van
                 Assche} and Vincent Rijmen",
  title =        "{Nessie} Proposal: {NOEKEON}",
  type =         "Report",
  institution =  "Proton World International and ESAT Cosic KULeuven",
  address =      "Belgium",
  pages =        "30",
  day =          "27",
  month =        oct,
  year =         "2000",
  bibdate =      "Fri Sep 23 06:01:32 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://gro.noekeon.org/Noekeon-spec.pdf",
  acknowledgement = ack-nhfb,
  remark =       "From section 2: ``NOEKEON is a block cipher with a
                 block and key length of 128 bits. It is an iterated
                 cipher consisting of the repeated application of a
                 simple round transformation, followed by an output
                 transformation. The round transformation includes
                 XORing a Working Key to the intermediate result.''",
}

@InProceedings{Daemen:2000:RA,
  author =       "Joan Daemen and Vincent Rijmen",
  title =        "{Rijndael} for {AES}",
  crossref =     "NIST:2000:TAE",
  pages =        "343--347",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Dalkilic:2000:ICA,
  author =       "Mehmet E. Dalkilic and Cengiz Gungor",
  title =        "An Interactive Cryptanalysis Algorithm for the
                 {Vigen{\`e}re} Cipher",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1909",
  pages =        "341--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:17:05 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1909.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1909/19090341.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1909/19090341.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Damgaard:2000:ECZ,
  author =       "Ivan Damg{\aa}rd",
  editor =       "????",
  booktitle =    "Advances in cryptology---EUROCRYPT 2000 (Bruges)",
  title =        "Efficient concurrent zero-knowledge in the auxiliary
                 string model",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "418--430",
  year =         "2000",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 11:47:21 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 22]{Schneier:2015:SWC}.",
}

@InProceedings{Damgaard:2000:INC,
  author =       "Ivan Damg{\aa}rd and Jesper Buus Nielsen",
  title =        "Improved Non-committing Encryption Schemes Based on a
                 General Complexity Assumption",
  crossref =     "Bellare:2000:ACC",
  pages =        "432--??",
  year =         "2000",
  MRclass =      "94A60",
  MRnumber =     "2002h:94049",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800432.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800432.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@Misc{DDJ:2000:DDE,
  author =       "{Dr.Dobb's Journal}",
  title =        "{Dr. Dobb's} Essential Books on Cryptography and
                 Security",
  howpublished = "CD-ROM containing PDF files.",
  year =         "2000",
  bibdate =      "Wed Apr 05 06:48:33 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Includes twelve books on cryptography.",
  URL =          "http://www.ddj.com/cdrom/;
                 http://www.digitalriver.com/dr/v2/ec_MAIN.Entry10?SP=10023&PN=1&V1=163454&xid=2823",
  acknowledgement = ack-nhfb,
  annote =       "Contents: \\
                 * Foreword - Bruce Schneier \\
                 * Applied Cryptography: Protocols, Algorithms, and
                 Source Code in C, Second Edition \\
                 * Cryptography: A New Dimension in Computer Data
                 Security \\
                 * Contemporary Cryptology: The Science of Information
                 \\
                 * Cryptography and Data Security \\
                 * Applied Cryptography, Cryptographic Protocols, and
                 Computer Security \\
                 * Cryptography: Theory and Practice \\
                 * Handbook of Applied Cryptography \\
                 * Military Cryptanalysis, Volume I-IV \\
                 * RSA Laboratories FAQ on Cryptography, RSA
                 Laboratories \\
                 * Technical Reports, RSA Laboratories Security
                 Bulletins, and \\
                 * CryptoBytes Newsletter",
}

@Article{DeBonis:2000:RVC,
  author =       "Annalisa {De Bonis} and Alfredo {De Santis}",
  title =        "Randomness in Visual Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1770",
  pages =        "626--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:11 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1770.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1770/17700626.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1770/17700626.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@PhdThesis{deLeeuw:2000:CSD,
  author =       "Karl de Leeuw",
  title =        "Cryptology and statecraft in the {Dutch Republic}
                 [{Cryptologie} en buitenlands beleid in de {Republiek
                 der Verenigde Nederlanden}]",
  type =         "{Ph.D.} thesis",
  school =       "Universiteit van Amsterdam",
  address =      "Amsterdam, The Netherlands",
  pages =        "viii + 190",
  year =         "2000",
  ISBN =         "90-5776-039-8",
  ISBN-13 =      "978-90-5776-039-6",
  LCCN =         "????",
  bibdate =      "Wed Feb 13 12:10:46 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "The work in this thesis has been carried out under the
                 auspices of the research school IPA (Institute for
                 Programming research and Algorithmics). In Dutch and
                 English.",
  series =       "IPA dissertation series",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; cryptography --- history; cryptography
                 --- Netherlands --- history --- 18th century",
}

@PhdThesis{Desai:2000:ESS,
  author =       "Anand Desai",
  title =        "Encryption schemes: security notions, designs and
                 analyses",
  type =         "Vita Thesis ({Ph.D.})",
  school =       "University of California, San Diego",
  address =      "San Diego, CA, USA",
  year =         "2000",
  LCCN =         "QA 3.8 .D473 2000",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "dissertations, academic --- UCSD --- Computer Science;
                 dissertations, academic --- UCSD --- Computer Science
                 and Engineering",
}

@InProceedings{Desai:2000:NPC,
  author =       "Anand Desai",
  title =        "New Paradigms for Constructing Symmetric Encryption
                 Schemes Secure against Chosen-Ciphertext Attack",
  crossref =     "Bellare:2000:ACC",
  pages =        "394--??",
  year =         "2000",
  MRclass =      "94A62",
  MRnumber =     "2002h:94077",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800394.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800394.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@InProceedings{Desai:2000:SAN,
  author =       "Anand Desai",
  title =        "The Security of All-or-Nothing Encryption: Protecting
                 against Exhaustive Key Search",
  crossref =     "Bellare:2000:ACC",
  pages =        "359--??",
  year =         "2000",
  MRclass =      "94A60",
  MRnumber =     "2002h:94050",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800359.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800359.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@Article{DeSantis:2000:SSS,
  author =       "Alfredo {De Santis} and Barbara Masucci",
  title =        "On secret set schemes",
  journal =      j-INFO-PROC-LETT,
  volume =       "74",
  number =       "5--6",
  pages =        "243--251",
  day =          "30",
  month =        jun,
  year =         "2000",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Oct 12 06:44:31 MDT 2000",
  bibsource =    "http://www.elsevier.com:80/inca/publications/store/5/0/5/6/1/2/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2000.bib",
  URL =          "http://www.elsevier.nl/gej-ng/10/23/20/63/28/34/abstract.html;
                 http://www.elsevier.nl/gej-ng/10/23/20/63/28/34/article.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Devanbu:2000:CVT,
  author =       "P. T. Devanbu and S. G. Stubblebine",
  title =        "Cryptographic verification of test coverage claims",
  journal =      j-IEEE-TRANS-SOFTW-ENG,
  volume =       "26",
  number =       "2",
  pages =        "178--192",
  month =        feb,
  year =         "2000",
  CODEN =        "IESEDJ",
  DOI =          "https://doi.org/10.1109/32.841116",
  ISSN =         "0098-5589 (print), 1939-3520 (electronic)",
  ISSN-L =       "0098-5589",
  bibdate =      "Thu Feb 1 11:00:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=841116",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Software Engineering",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32",
}

@InProceedings{Dhamija:2000:DVU,
  author =       "Rachna Dhamija and Adrian Perrig",
  title =        "{D{\'e}j{\`a} Vu} --- {A} User Study: Using Images for
                 Authentication",
  crossref =     "USENIX:2000:PNU",
  pages =        "??--??",
  year =         "2000",
  bibdate =      "Wed Oct 16 05:17:16 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/usenix2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/sec2000/dhamija.html",
  acknowledgement = ack-nhfb,
}

@InProceedings{Dhem:2000:PIT,
  author =       "Jean-Fran{\c{c}}ois Dhem and Fran{\c{c}}ois Koeune and
                 Philippe-Alexandre Leroux and Patrick Mestr and
                 Jean-Jacques Quisquater and Jean-Louis Willems",
  editor =       "????",
  booktitle =    "Smart Card Research and Applications",
  title =        "A practical implementation of the timing attack",
  volume =       "1820",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "167--182",
  year =         "2000",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 11:50:48 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 26]{Schneier:2015:SWC}.",
}

@Article{Dierickx:2000:EGD,
  author =       "J{\"u}rgen Dierickx",
  title =        "{European} guidelines for digital signatures",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "3",
  pages =        "3--4",
  day =          "1",
  month =        mar,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)03006-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:52 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800030063",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Ding:2000:SSC,
  author =       "Cunsheng Ding and David R. Kohel and San Ling",
  title =        "Secret-sharing with a class of ternary codes",
  journal =      j-THEOR-COMP-SCI,
  volume =       "246",
  number =       "1--2",
  pages =        "285--298",
  day =          "6",
  month =        sep,
  year =         "2000",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Oct 31 11:38:44 MST 2000",
  bibsource =    "http://www.elsevier.com/locate/issn/03043975;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2000.bib",
  URL =          "http://www.elsevier.nl/gej-ng/10/41/16/180/21/34/abstract.html;
                 http://www.elsevier.nl/gej-ng/10/41/16/180/21/34/article.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@InProceedings{Dodis:2000:CSG,
  author =       "Yevgeniy Dodis and Shai Halevi and Tal Rabin",
  title =        "A Cryptographic Solution to a Game Theoretic Problem",
  crossref =     "Bellare:2000:ACC",
  pages =        "112--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800112.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800112.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@InProceedings{Dodis:2000:PRI,
  author =       "Yevgeniy Dodis and Silvio Micali",
  title =        "Parallel Reducibility for Information-Theoretically
                 Secure Computation",
  crossref =     "Bellare:2000:ACC",
  pages =        "74--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800074.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800074.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@Article{Dolev:2000:NC,
  author =       "Danny Dolev and Cynthia Dwork and Moni Naor",
  title =        "Nonmalleable Cryptography",
  journal =      j-SIAM-J-COMPUT,
  volume =       "30",
  number =       "2",
  pages =        "391--437",
  month =        apr,
  year =         "2000",
  CODEN =        "SMJCAT",
  DOI =          "https://doi.org/10.1137/S0097539795291562",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Fri Oct 27 06:28:40 MDT 2000",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/30/2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://epubs.siam.org/sam-bin/dbq/article/29156",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@InProceedings{Dray:2000:NPA,
  author =       "Jim Dray",
  title =        "{NIST} Performance Analysis of the Final Round {Java
                 AES} Candidates",
  crossref =     "NIST:2000:TAE",
  pages =        "149--160",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Misc{Dreyfus:2000:PUC,
  author =       "Suelette Dreyfus",
  title =        "The Practical Use of Cryptography in Human Rights
                 Groups",
  year =         "2000",
  bibdate =      "Wed Oct 16 05:17:16 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Unpublished invited talk at Ninth USENIX Security
                 Symposium.",
  URL =          "http://www.usenix.org/publications/library/proceedings/sec2000/invitedtalks.html",
  acknowledgement = ack-nhfb,
}

@Article{Dumais:2000:PCQ,
  author =       "Paul Dumais and Dominic Mayers and Louis Salvail",
  title =        "Perfectly Concealing Quantum Bit Commitment from any
                 Quantum One-Way Permutation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1807",
  pages =        "300--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1807.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1807/18070300.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1807/18070300.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Durante:2000:CAC,
  author =       "Antonio Durante and Riccardo Focardi and Roberto
                 Gorrieri",
  title =        "A compiler for analyzing cryptographic protocols using
                 noninterference",
  journal =      j-TOSEM,
  volume =       "9",
  number =       "4",
  pages =        "488--528",
  month =        oct,
  year =         "2000",
  CODEN =        "ATSMER",
  ISSN =         "1049-331X (print), 1557-7392 (electronic)",
  ISSN-L =       "1049-331X",
  bibdate =      "Fri Apr 20 08:21:35 MDT 2001",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/tosem/2000-9-4/p488-durante/p488-durante.pdf;
                 http://www.acm.org/pubs/citations/journals/tosem/2000-9-4/p488-durante/",
  abstract =     "The Security Process Algebra (SPA) is a CCS-like
                 specification language where actions belong to two
                 different levels of confidentiality. It has been used
                 to define several noninterference-like security
                 properties whose verification has been automated by the
                 tool CoSeC. In recent years, a method for analyzing
                 security protocols using SPA and CoSeC has been
                 developed. Even if it has been useful in analyzing
                 small security protocols, this method has shown to be
                 error-prone, as it requires the protocol description
                 and its environment to be written by hand. This problem
                 has been solved by defining a protocol specification
                 language more abstract than SPA, called VSP, and a
                 compiler CVS that automatically generates the SPA
                 specification for a given protocol described in VSP.
                 The VSP/CVS technology is very powerful, and its
                 usefulness is shown with some case studies: the Woo-Lam
                 one-way authentication protocol, for which a new attack
                 to authentication is found, and the Wide Mouthed Frog
                 protocol, where different kinds of attack are detected
                 and analyzed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Software Engineering and
                 Methodology",
  generalterms = "Security; Verification",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J790",
  keywords =     "automatic verification; cryptographic protocols;
                 noninterference; process algebra; verification tool",
  subject =      "Computer Systems Organization ---
                 Computer-Communication Networks --- General (C.2.0):
                 {\bf Security and protection (e.g., firewalls)};
                 Computer Systems Organization ---
                 Computer-Communication Networks --- Network Protocols
                 (C.2.2): {\bf Protocol verification}; Software ---
                 Software Engineering --- Software/Program Verification
                 (D.2.4): {\bf Formal methods}; Software --- Software
                 Engineering --- Software/Program Verification (D.2.4):
                 {\bf Model checking}; Software --- Software Engineering
                 --- Software/Program Verification (D.2.4): {\bf
                 Validation}; Theory of Computation --- Logics and
                 Meanings of Programs --- Semantics of Programming
                 Languages (F.3.2): {\bf Operational semantics}; Theory
                 of Computation --- Logics and Meanings of Programs ---
                 Semantics of Programming Languages (F.3.2): {\bf
                 Process models}",
}

@Article{Durfee:2000:CRS,
  author =       "Glenn Durfee and Phong Q. Nguyen",
  booktitle =    "Advances in cryptology---ASIACRYPT 2000 (Kyoto)",
  title =        "Cryptanalysis of the {RSA} Schemes with Short Secret
                 Exponent from {Asiacrypt '99}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1976",
  pages =        "14--29",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60 (94A62)",
  MRnumber =     "2002h:94052",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1976.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1976/19760014.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1976/19760014.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ebringer:2000:PAP,
  author =       "Tim Ebringer and Peter Thorne and Yuliang Zheng",
  title =        "Parasitic Authentication To Protect Your {E}-Wallet",
  journal =      j-COMPUTER,
  volume =       "33",
  number =       "10",
  pages =        "54--60",
  month =        oct,
  year =         "2000",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Mon Oct 30 17:20:21 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computer2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/co/books/co2000/pdf/rx054.pdf;
                 http://www.computer.org/computer/co2000/rx054abs.htm",
  abstract =     "Preventing unauthorized use of an e-wallet has proven
                 quite difficult to achieve. The authors describe their
                 use of existing protocols to address some crucial
                 usability and security issues related to using these
                 portable devices.",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Book{ECMA:2000:EPIa,
  author =       "{ECMA}",
  title =        "{ECMA-305}: {Private Integrated Services Network}
                 ({PISN}) --- Specification, Functional Model and
                 Information Flows --- {Wireless Terminal
                 Authentication} Supplementary Services ({WTMAU-SD})",
  publisher =    pub-ECMA,
  address =      pub-ECMA:adr,
  month =        jun,
  year =         "2000",
  bibdate =      "Thu Feb 22 08:43:46 MST 2001",
  bibsource =    "http://www.ecma-international.org/publications/standards/Standard.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ecma.ch/ecma1/STAND/ECMA-305.HTM",
  acknowledgement = ack-nhfb,
  ECMAnumber =   "ECMA-305",
}

@Book{ECMA:2000:EPIb,
  author =       "{ECMA}",
  title =        "{ECMA-306}: {Private Integrated Services Network}
                 ({PISN}) --- {Inter-Exchange Signalling Protocol ---
                 Wireless Terminal Authentication} Supplementary
                 Services ({QSIG-WTMAU})",
  publisher =    pub-ECMA,
  address =      pub-ECMA:adr,
  month =        jun,
  year =         "2000",
  bibdate =      "Thu Feb 22 08:43:46 MST 2001",
  bibsource =    "http://www.ecma-international.org/publications/standards/Standard.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ecma.ch/ecma1/STAND/ECMA-306.HTM",
  acknowledgement = ack-nhfb,
  ECMAnumber =   "ECMA-306",
}

@Book{Eghlidos:2000:SLB,
  author =       "Taraneh Eghlidos",
  title =        "On the security of {DES} and {DES}-like block ciphers
                 against differential cryptanalysis",
  publisher =    "Shaker Verlag",
  address =      "Aachen, Germany",
  pages =        "xvi + 178",
  year =         "2000",
  ISBN =         "3-8265-7951-8",
  ISBN-13 =      "978-3-8265-7951-6",
  LCCN =         "????",
  bibdate =      "Fri May 13 06:01:17 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Elbirt:2000:FIP,
  author =       "A. J. Elbirt and W. Yip and B. Chetwynd and C. Paar",
  title =        "An {FPGA} Implementation and Performance Evaluation of
                 the {AES} Block Cipher Candidate Algorithm Finalists",
  crossref =     "NIST:2000:TAE",
  pages =        "13--27",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ellison:2000:IRRa,
  author =       "Carl Ellison and Bruce Schneier",
  title =        "Inside risks: risks of {PKI}: Secure Email",
  journal =      j-CACM,
  volume =       "43",
  number =       "1",
  pages =        "160--160",
  month =        jan,
  year =         "2000",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 25 15:22:32 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/2000-43/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/cacm/2000-43-1/p160-ellison/p160-ellison.pdf;
                 http://www.acm.org/pubs/citations/journals/cacm/2000-43-1/p160-ellison/",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  subject =      "Information Systems --- Information Systems
                 Applications --- Communications Applications (H.4.3):
                 {\bf Electronic mail}; Computer Systems Organization
                 --- Computer-Communication Networks --- General
                 (C.2.0): {\bf Security and protection (e.g.,
                 firewalls)}; Data --- Data Encryption (E.3)",
}

@Article{Ellison:2000:PSK,
  author =       "Carl Ellison and Chris Hall and Randy Milbert and
                 Bruce Schneier",
  title =        "Protecting Secret Keys with Personal Entropy",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "16",
  number =       "4",
  pages =        "311--318",
  month =        feb,
  year =         "2000",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Wed Feb 27 12:41:19 MST 2002",
  bibsource =    "ftp://ftp.ira.uka.de/bibliography/Misc/security.2.bib;
                 ftp://ftp.ira.uka.de/bibliography/Theory/cryptography.bib;
                 ftp://ftp.ira.uka.de/bibliography/Theory/CRYPTOGRAPHY/cryptography.bib;
                 http://www.elsevier.com/locate/issn/0167739X;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.counterpane.com/personal-entropy.pdf;
                 http://www.elsevier.com/gej-ng/10/19/19/41/27/26/abstract.html",
  abstract-1 =   "Conventional encryption technology often requires
                 users to protect a secret key by selecting a password
                 or passphrase. While a good passphrase will only be
                 known to the user, it also has the flaw that it must be
                 remembered exactly in order to recover the secret key.
                 As time passes, the ability to remember the passphrase
                 fades and the user may eventually lose access to the
                 secret key. We propose a scheme whereby a user can
                 protect a secret key using the ``personal entropy'' in
                 his own life, by encrypting the passphrase using the
                 answers to several personal questions. We designed the
                 scheme so the user can forget answers to a subset of
                 the questions and still recover the secret key, while
                 an attacker must learn the answer to a large subset of
                 the questions in order to recover the secret key.",
  abstract-2 =   "Split a secret using standard (not with cheater
                 detection!) (n,t) threshold secret-sharing and encrypt
                 them with multiple passwords. Main (only?) advantage
                 over a system using a passphrase of length t
                 (threshold) is that the system inhibits some
                 fault-tolerance against forgetting (at most n-t)
                 password. To make the set of password manageable they
                 use a set of hints (e.g., general questions). [However
                 they didn't explore how much this constrains the
                 dictionaries or how independent passwords will be]. The
                 system was proposed in 1996 and has been implemented.
                 See also \cite{BleNgu2000} for some attacks.",
  acknowledgement = ack-nhfb,
  added-at =     "Wed Oct 6 12:24:48 1999",
  added-by =     "sti",
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Ellison:2000:TRP,
  author =       "C. Ellison and B. Schneier",
  title =        "Ten Risks of {PKI}: What You're Not Being Told About
                 Public-Key Infrastructure",
  journal =      j-COMPUT-SECUR-J,
  volume =       "16",
  number =       "1",
  pages =        "1--7",
  month =        "????",
  year =         "2000",
  CODEN =        "CSJLDR",
  ISSN =         "0277-0865",
  bibdate =      "Mon Jan 17 09:36:08 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Security Journal",
}

@Article{English:2000:MNDb,
  author =       "Marie English",
  title =        "Micro News: Digital-Signature Legislation",
  journal =      j-IEEE-MICRO,
  volume =       "20",
  number =       "4",
  pages =        "4--4",
  month =        jul # "\slash " # aug,
  year =         "2000",
  CODEN =        "IEMIDZ",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Thu Dec 14 06:08:58 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 Science Citation Index database (1980--2000)",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Micro",
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
}

@TechReport{Ferguson:2000:CEI,
  author =       "N. Ferguson and B. Schneier",
  title =        "A Cryptographic Evaluation of {IPsec}",
  type =         "Technical Report",
  institution =  inst-COUNTERPANE-INTERNET-SECURITY,
  address =      inst-COUNTERPANE-INTERNET-SECURITY:adr,
  year =         "2000",
  bibdate =      "Mon Jan 17 10:18:33 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.counterpane.com/ipsec.html;
                 http://www.counterpane.com/ipsec.pdf",
  acknowledgement = ack-nhfb,
}

@InProceedings{Ferguson:2000:ICR,
  author =       "Niels Ferguson and John Kelsey and Bruce Schneier and
                 Mike Stay and David Wagner and Doug Whiting",
  title =        "Improved Cryptanalysis of {Rijndael} (abstract only)",
  crossref =     "NIST:2000:TAE",
  pages =        "9--9",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We improve the best attack on 6-round Rijndael from
                 complexity 272 to 242. We also present the first known
                 attacks on 7- and 8-round Rijndael. Finally, we discuss
                 the key schedule of Rijndael and describe a related-key
                 technique that can break 9-round Rijndael with 256-bit
                 keys.",
  acknowledgement = ack-nhfb,
}

@InProceedings{Ferguson:2000:SEK,
  author =       "N. Ferguson",
  editor =       "????",
  booktitle =    "Third AES Candidate Conference",
  title =        "Semi-Equivalent Keys in {MARS}",
  publisher =    "????",
  address =      "????",
  pages =        "??--??",
  month =        apr,
  year =         "2000",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Oct 16 08:29:43 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb # " and " # ack-bs,
}

@TechReport{Ferguson:2000:TRR,
  author =       "N. Ferguson and J. Kelsey and B. Schneier and D.
                 Wagner",
  title =        "A {Twofish} Retreat: Related-Key Attacks Against
                 Reduced-Round {Twofish}",
  type =         "{Twofish} technical report",
  number =       "6",
  institution =  inst-COUNTERPANE-SYSTEMS,
  address =      inst-COUNTERPANE-SYSTEMS:adr,
  pages =        "????",
  day =          "14",
  month =        feb,
  year =         "2000",
  bibdate =      "Mon Oct 16 08:32:43 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb # " and " # ack-bs,
}

@Article{Filiol:2000:DAS,
  author =       "Eric Filiol",
  title =        "Decimation Attack of Stream Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1977",
  pages =        "31--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:08:57 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1977.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1977/19770031.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1977/19770031.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Manual{FIPS:2000:DSS,
  author =       "{FIPS}",
  title =        "{Digital Signature Standard (DSS)}",
  volume =       "186-2",
  organization = pub-NIST,
  address =      pub-NIST:adr,
  pages =        "ii + 74",
  day =          "27",
  month =        jan,
  year =         "2000",
  bibdate =      "Thu Aug 18 07:16:02 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "FIPS PUB",
  URL =          "http://csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography; Digital Signature
                 Algorithm (DSA); Elliptic Curve Digital Signature
                 Algorithm (ECDSA); Rivest-Shamir-Adelman (RSA)",
  remark =       "From the Web site: ``October 20, 2006: An attack has
                 been found on some implementations of RSA digital
                 signatures using the padding scheme for
                 RSASSA-PKCS1-v1\_5 as specified in Public Key
                 Cryptography Standards (PKCS) #1 v2.1: RSA Cryptography
                 Standard-2002. A statement discussing the attack is
                 available. A similar attack could also be applied to
                 implementations of digital signatures as specified in
                 American National Standard (ANS) X9.31. Note that this
                 attack is not on the RSA algorithm itself, but on
                 improper implementations of the signature verification
                 process.''",
}

@InProceedings{Fischlin:2000:ENM,
  author =       "Marc Fischlin and Roger Fischlin",
  title =        "Efficient Non-malleable Commitment Schemes",
  crossref =     "Bellare:2000:ACC",
  pages =        "413--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800413.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800413.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@Article{Focardi:2000:ITN,
  author =       "Riccardo Focardi and Roberto Gorrieri and Fabio
                 Martinelli",
  title =        "Invited Talk: Non Interference for the Analysis of
                 Cryptographic Protocols",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1853",
  pages =        "354--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:08:44 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1853.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1853/18530354.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1853/18530354.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Focardi:2000:MAT,
  author =       "Riccardo Focardi and Roberto Gorrieri and Fabio
                 Martinelli",
  title =        "Message Authentication through Non Interference",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1816",
  pages =        "258--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:32 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1816.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1816/18160258.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1816/18160258.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Fox:2000:NTFb,
  author =       "Robert Fox",
  title =        "News Track: Flying the rails; Logging online hours at
                 work; Top prize: embedded encryption; {Digital Nose}
                 knows; Walking again via chip implant; Cell-phone-free
                 class; Another node in the crowd",
  journal =      j-CACM,
  volume =       "43",
  number =       "5",
  pages =        "9--9",
  month =        may,
  year =         "2000",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 25 15:22:32 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/2000-43/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/cacm/2000-43-5/p9-fox/",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@InProceedings{Freking:2000:MMR,
  author =       "W. L. Freking and K. K. Parhi",
  booktitle =    "Conference Record of the Thirty-Fourth Asilomar
                 Conference on Signals, Systems and Computers, 2000",
  title =        "Modular multiplication in the residue number system
                 with application to massively-parallel public-key
                 cryptography systems",
  volume =       "2",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "1339--1343",
  year =         "2000",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/ACSSC.2000.911210",
  ISSN =         "????",
  bibdate =      "Fri Nov 9 11:38:59 MST 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "residue arithmetic; residue number system",
  summary =      "Modular multiplication is a fundamental operation in
                 many public-key cryptography systems including RSA.
                 Residue number system (RNS) implementation of modular
                 multiplication has been of recent interest due to
                 inherent RNS properties of \ldots{}",
}

@TechReport{Frykholm:2000:CAB,
  author =       "Niklas Frykholm",
  title =        "Countermeasures against Buffer Overflow Attacks",
  type =         "Technical report",
  institution =  pub-RSA,
  address =      pub-RSA:adr,
  day =          "30",
  month =        nov,
  year =         "2000",
  bibdate =      "Wed Jun 06 06:07:12 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.rsasecurity.com/rsalabs/technotes/buffer/buffer_overflow.html",
  acknowledgement = ack-nhfb,
}

@Article{Furnell:2000:ASS,
  author =       "S. M. Furnell and P. S. Dowland and H. M. Illingworth
                 and P. L. Reynolds",
  title =        "Authentication and Supervision: a Survey of User
                 Attitudes",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "529--539",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060272",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Gaj:2000:CHP,
  author =       "Kris Gaj and Pawel Chodowiec",
  title =        "Comparison of the hardware performance of the {AES}
                 candidates using reconfigurable hardware",
  crossref =     "NIST:2000:TAE",
  pages =        "40--56",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Garay:2000:LLB,
  author =       "Juan A. Garay and Jessica Staddon and Avishai Wool",
  title =        "Long-Lived Broadcast Encryption",
  crossref =     "Bellare:2000:ACC",
  pages =        "333--??",
  year =         "2000",
  MRclass =      "94A60",
  MRnumber =     "2002h:94054",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800333.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800333.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@Article{Gengler:2000:UPC,
  author =       "Barbara Gengler",
  title =        "{US President Clinton} signs {Digital Signature
                 Bill}",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "9",
  pages =        "7--8",
  day =          "1",
  month =        sep,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)09023-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:01 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800090231",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@InProceedings{Gennaro:2000:IPR,
  author =       "Rosario Gennaro",
  title =        "An Improved Pseudo-random Generator Based on Discrete
                 Log",
  crossref =     "Bellare:2000:ACC",
  pages =        "469--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800469.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800469.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@InProceedings{Gennaro:2000:LBE,
  author =       "R. Gennaro and L. Trevisan",
  title =        "Lower bounds on the efficiency of generic
                 cryptographic constructions",
  crossref =     "IEEE:2000:ASF",
  pages =        "305--313",
  year =         "2000",
  bibdate =      "Thu Apr 5 06:14:11 MDT 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Geppert:2000:T,
  author =       "L. Geppert and W. Sweet",
  title =        "Technology 2000",
  journal =      j-IEEE-SPECTRUM,
  volume =       "37",
  number =       "1",
  pages =        "26--31",
  month =        jan,
  year =         "2000",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2000.815435",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/java2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Cryptography; Hardware; Home appliances; Internet;
                 Java; NIST; Open source software; Operating systems;
                 Protection",
}

@Article{Geppert:2000:TMS,
  author =       "L. Geppert and Tekla S. Perry",
  title =        "{Transmeta}'s magic show [microprocessor chips]",
  journal =      j-IEEE-SPECTRUM,
  volume =       "37",
  number =       "5",
  pages =        "26--33",
  month =        may,
  year =         "2000",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/6.842131",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/java2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Chip scale packaging; Computer architecture;
                 Contracts; Crusoe chips; Crusoe microprocessors;
                 Hardware; IBM PC-compatible personal computers;
                 low-power chips; Marketing and sales; microprocessor
                 chips; Microprocessors; Microsoft Windows; Personal
                 communication networks; Reduced instruction set
                 computing; Remuneration; software applications;
                 Transmeta Corporation; Unix; VLIW",
}

@InProceedings{Gertner:2000:RBP,
  author =       "Y. Gertner and S. Kannan and T. Malkin and O. Reingold
                 and M. Viswanathan",
  title =        "The relationship between public key encryption and
                 oblivious transfer",
  crossref =     "IEEE:2000:ASF",
  pages =        "325--335",
  year =         "2000",
  bibdate =      "Thu Apr 5 06:14:11 MDT 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Gilbert:2000:CAR,
  author =       "Henri Gilbert and Marine Minier",
  title =        "A collision attack on 7 rounds of {Rijndael}",
  crossref =     "NIST:2000:TAE",
  pages =        "230--241",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Gilbert:2000:SAR,
  author =       "Henri Gilbert and Helena Handschuh and Antoine Joux
                 and Serge Vaudenay",
  title =        "A Statistical Attack on {RC6} (abstract only)",
  crossref =     "NIST:2000:TAE",
  pages =        "10--10",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "This paper details the attack on RC6 which was
                 announced in a report published in the proceedings of
                 the second AES candidate conference (March 1999). Based
                 on an observation on the RC6 statistics, we show how to
                 distinguish RC6 from a random permutation and to
                 recover the secret extended key for a fair number of
                 rounds.",
  acknowledgement = ack-nhfb,
}

@Article{Girault:2000:CCP,
  author =       "Marc Girault and Jean-Fran{\c{c}}ois Misarsky",
  title =        "Cryptanalysis of Countermeasures Proposed for
                 Repairing {ISO 9796-1}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1807",
  pages =        "81--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1807.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1807/18070081.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1807/18070081.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Gisin:2000:LCQ,
  author =       "Nicolas Gisin and Stefan Wolf",
  title =        "Linking Classical and Quantum Key Agreement: Is There
                 ``{Bound Information}''?",
  crossref =     "Bellare:2000:ACC",
  pages =        "482--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800482.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800482.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@Article{Giuliano:2000:ISC,
  author =       "Genevieve Giuliano and James E. {Moore II} and
                 Jacqueline Golob",
  title =        "Integrated smart-card fare system: results from field
                 operational test",
  journal =      "Transportation research record",
  pages =        "138--146",
  month =        "No",
  year =         "2000",
  LCCN =         "TA1001.5 .T7 no. 1735",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "bus lines --- California --- Ventura County --- fares;
                 local transit passes --- California --- Ventura County;
                 smart cards --- California --- Ventura County ---
                 evaluation",
}

@Article{Gonzales:2000:LBC,
  author =       "Octavio A. Gonzales and Gunhee Han and Jos{\'e} Pineda
                 de Gyvez and Edgar S{\'a}nchez-Sinencio",
  title =        "{Lorenz}-based chaotic cryptosystem: a monolithic
                 implementation",
  journal =      "IEEE Trans. Circuits Systems I Fund. Theory Appl.",
  volume =       "47",
  number =       "8",
  pages =        "1243--1247",
  year =         "2000",
  CODEN =        "ITCAEX",
  ISSN =         "1057-7122 (print), 1558-1268 (electronic)",
  MRclass =      "94A60",
  MRnumber =     "1 792 708",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "IEEE Transactions on Circuits and Systems. I.
                 Fundamental Theory and Applications",
}

@Article{Good:2000:TAE,
  author =       "I. J. Good",
  title =        "{Turing}'s anticipation of empirical {Bayes} in
                 connection with the cryptanalysis of the naval
                 {Enigma}",
  journal =      j-J-STAT-COMPUT-SIMUL,
  volume =       "66",
  number =       "2",
  pages =        "101--111",
  year =         "2000",
  CODEN =        "JSCSAT",
  ISSN =         "0094-9655 (print), 1563-5163 (electronic)",
  ISSN-L =       "0094-9655",
  MRclass =      "62C12 (01A60 62L10 68P25)",
  MRnumber =     "2001k:62008",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "50th Anniversary of the Department of Statistics,
                 Virginia Tech, Part II (Blacksburg, VA, 1999)",
  fjournal =     "Journal of Statistical Computation and Simulation",
  journal-URL =  "http://www.tandfonline.com/loi/gscs20",
}

@Article{Goubault-Larrecq:2000:MAC,
  author =       "Jean Goubault-Larrecq",
  title =        "A Method for Automatic Cryptographic Protocol
                 Verification",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1800",
  pages =        "977--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:18 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1800.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1800/18000977.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1800/18000977.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Goubin:2000:CTC,
  author =       "Louis Goubin and Nicolas T. Courtois",
  booktitle =    "Advances in cryptology---ASIACRYPT 2000 (Kyoto)",
  title =        "Cryptanalysis of the {TTM} cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1976",
  pages =        "44--57",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "2002j:94037",
  bibdate =      "Sat Oct 26 10:52:02 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Gutmann:2000:OSC,
  author =       "Peter Gutmann",
  title =        "An Open-Source Cryptographic Coprocessor",
  crossref =     "USENIX:2000:PNU",
  pages =        "??--??",
  year =         "2000",
  bibdate =      "Wed Oct 16 05:17:16 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/gnu.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/sec2000/gutmann.html",
  acknowledgement = ack-nhfb,
}

@Article{Haddad:2000:AUA,
  author =       "Ibrahim F. Haddad",
  title =        "{Apache} User Authentication",
  journal =      j-LINUX-J,
  volume =       "78",
  pages =        "??--??",
  month =        oct,
  year =         "2000",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Thu Sep 21 07:44:14 MDT 2000",
  bibsource =    "http://noframes.linuxjournal.com/lj-issues/issue78/index.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux-journal.bib",
  abstract =     "A guide to setting up user authentication for the
                 Apache web server running on Linux, using the plaintext
                 file method.",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Hamdy:2000:SCB,
  author =       "Safuat Hamdy and Bodo M{\"o}ller",
  booktitle =    "Advances in cryptology---ASIACRYPT 2000 (Kyoto)",
  title =        "Security of cryptosystems based on class groups of
                 imaginary quadratic orders",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1976",
  pages =        "234--247",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "2002j:94040",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hanaoka:2000:USD,
  author =       "Goichiro Hanaoka and Junji Shikata and Yuliang Zheng
                 and Hideki Imai",
  title =        "Unconditionally Secure Digital Signature Schemes
                 Admitting Transferability",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1976",
  pages =        "130--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:17:24 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1976.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1976/19760130.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1976/19760130.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hancock:2000:EWP,
  author =       "Bill Hancock",
  title =        "Not Everyone Wants {PKI} --- {NSF} Opts for Digital
                 Signature Alternative",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "301--302",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040098",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{Hankerson:2000:CTC,
  author =       "Darrel R. Hankerson and Gary Hoffman and D. A. Leonard
                 and Charles C. Lindner and K. T. Phelps and C. A.
                 Rodger and J. R. Wall",
  title =        "Coding theory and cryptography: the essentials",
  volume =       "234",
  publisher =    pub-DEKKER,
  address =      pub-DEKKER:adr,
  edition =      "Second",
  pages =        "x + 350",
  year =         "2000",
  ISBN =         "0-8247-0465-7",
  ISBN-13 =      "978-0-8247-0465-0",
  LCCN =         "QA268 .C675 2000",
  bibdate =      "Mon Oct 16 09:48:58 MDT 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "Monographs and textbooks in pure and applied
                 mathematics",
  URL =          "http://lccn.loc.gov/00060106",
  acknowledgement = ack-nhfb,
  keywords =     "coding theory; cryptography",
}

@InProceedings{Harvey:2000:EMA,
  author =       "Ian Harvey",
  title =        "The Effects of Multiple Algorithms in the {Advanced
                 Encryption Standard}",
  crossref =     "NIST:2000:TAE",
  pages =        "269--278",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hasan:2000:LTB,
  author =       "M. Anwarul Hasan",
  title =        "Look-up table-based large finite field multiplication
                 in memory constrained cryptosystems",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "49",
  number =       "7",
  pages =        "749--758",
  year =         "2000",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/12.863045",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  MRclass =      "94A60",
  MRnumber =     "1 783 604",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Institute of Electrical and Electronics Engineers.
                 Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Hassler:2000:OFA,
  author =       "Vesna Hassler and Oliver Fodor",
  title =        "{OpenCard Framework} Application Development",
  journal =      j-DDJ,
  volume =       "25",
  number =       "2",
  pages =        "70, 72, 74--76",
  month =        feb,
  year =         "2000",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Nov 9 08:25:13 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/ftp/2000/2000_02/ocfjava.txt;
                 http://www.ddj.com/ftp/2000/2000_02/ocfjava.zip",
  abstract =     "The Personal Computer/Smart Card Interface (PC/SC) and
                 OpenCard Framework emphasize the interoperability of
                 smartcards and card terminals, and the integration of
                 those card terminals into Microsoft Windows. Additional
                 resources include ocfjava.txt (listings) and
                 ocfjava.zip (source code).",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Hawkes:2000:EMC,
  author =       "Philip Hawkes and Gregory G. Rose",
  title =        "Exploiting Multiples of the Connection Polynomial in
                 Word-Oriented Stream Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1976",
  pages =        "303--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:17:24 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1976.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1976/19760303.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1976/19760303.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Hill:2000:KII,
  author =       "Paul B. Hill",
  title =        "{Kerberos} Interoperability Issues",
  crossref =     "USENIX:2000:PLI",
  pages =        "??--??",
  year =         "2000",
  bibdate =      "Wed Oct 16 07:19:34 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://db.usenix.org/publications/library/proceedings/lisa-nt2000/hill.html",
  acknowledgement = ack-nhfb,
}

@InCollection{Hirt:2000:ERF,
  author =       "Martin Hirt and Kazue Sako",
  booktitle =    "Advances in cryptology---EUROCRYPT 2000 (Bruges)",
  title =        "Efficient Receipt-Free Voting Based on Homomorphic
                 Encryption",
  volume =       "1807",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "539--556",
  year =         "2000",
  MRclass =      "94A60 (91B12)",
  MRnumber =     "1 772 033",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1807.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  series =       "Lecture Notes in Comput. Sci.",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1807/18070539.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1807/18070539.pdf",
}

@Article{Hofmeister:2000:COS,
  author =       "Thomas Hofmeister and Matthias Krause and Hans U.
                 Simon",
  title =        "Contrast-optimal $k$ out of $n$ secret sharing schemes
                 in visual cryptography",
  journal =      j-THEOR-COMP-SCI,
  volume =       "240",
  number =       "2",
  pages =        "471--485",
  day =          "17",
  month =        jun,
  year =         "2000",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Oct 31 11:38:27 MST 2000",
  bibsource =    "http://www.elsevier.com/locate/issn/03043975;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.nl/gej-ng/10/41/16/174/23/31/abstract.html;
                 http://www.elsevier.nl/gej-ng/10/41/16/174/23/31/article.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Horn:2000:APF,
  author =       "G{\"u}nther Horn and Bart Preneel",
  title =        "Authentication and payment in future mobile systems",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "2--3",
  pages =        "183--207",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-82-306",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:31 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Huhnlein:2000:EIC,
  author =       "Detlef H{\"u}hnlein",
  booktitle =    "Selected areas in cryptography (Kingston, ON, 1999)",
  title =        "Efficient implementation of cryptosystems based on
                 non-maximal imaginary quadratic orders",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1758",
  pages =        "147--162",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "1 767 730",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hwang:2000:CBV,
  author =       "Min-Shiang Hwang and Iuon-Chung Lin and Kuo-Feng
                 Hwang",
  title =        "Cryptanalysis of the batch verifying multiple {RSA}
                 digital signatures",
  journal =      "Informatica (Vilnius)",
  volume =       "11",
  number =       "1",
  pages =        "15--18",
  year =         "2000",
  ISSN =         "0868-4952",
  MRclass =      "94A60",
  MRnumber =     "1 754 435",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lithuanian Academy of Sciences. Informatica
                 (Vilnius)",
}

@Article{Hwang:2000:CYK,
  author =       "Min-Shiang Hwang",
  title =        "Cryptanalysis of {YCN} key assignment scheme in a
                 hierarchy",
  journal =      j-INFO-PROC-LETT,
  volume =       "73",
  number =       "3-4",
  pages =        "97--101",
  year =         "2000",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "2000k:94032",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@TechReport{IBM-MARS-Team:2000:MAS,
  author =       "{IBM MARS Team}",
  title =        "{MARS} and the {AES} Selection Criteria",
  type =         "Technical report",
  institution =  pub-IBM,
  address =      pub-IBM:adr,
  day =          "15",
  month =        may,
  year =         "2000",
  bibdate =      "Fri Feb 16 08:13:57 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.research.ibm.com/security/final-comments.doc;
                 http://www.research.ibm.com/security/final-comments.pdf;
                 http://www.research.ibm.com/security/final-comments.ps",
  acknowledgement = ack-nhfb,
}

@InProceedings{Ichikawa:2000:HEA,
  author =       "Tetsuya Ichikawa and Tomomi Kasuya and Mitsuru
                 Matsui",
  title =        "Hardware Evaluation of the {AES} Finalists",
  crossref =     "NIST:2000:TAE",
  pages =        "279--285",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Misc{IEEE:2000:IPH,
  author =       "{IEEE}",
  title =        "The {IEEE P1363} Home Page: Standard Specifications
                 For Public-Key Cryptography",
  howpublished = "World-Wide Web site.",
  year =         "2000",
  bibdate =      "Mon Dec 08 08:02:36 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://grouper.ieee.org/groups/1363/index.html",
  acknowledgement = ack-nhfb,
}

@Book{Ifrah:2000:UHN,
  author =       "Georges Ifrah",
  title =        "The Universal History of Numbers from Prehistory to
                 the Invention of the Computer",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xxii + 633",
  year =         "2000",
  ISBN =         "0-471-37568-3",
  ISBN-13 =      "978-0-471-37568-5",
  LCCN =         "QA141.I3713 2000",
  bibdate =      "Mon Dec 06 16:02:33 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Translated from the French edition, {\em Histoire
                 universelle des chiffres}, by David Bellos, E. F.
                 Harding, Sophie Wood, and Ian Monk.",
  price =        "US\$39.95",
  acknowledgement = ack-nhfb,
  annote =       "Contains a dozen or so pages on the use of numbers in
                 historical cryptography and numerology.",
}

@Article{Imai:2000:CPC,
  author =       "Hideki Imai and Atsuhiro Yamagishi",
  title =        "{CRYPTREC Project} --- Cryptographic Evaluation
                 Project for the {Japanese} Electronic Government",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1976",
  pages =        "399--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:17:24 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1976.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1976/19760399.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1976/19760399.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@TechReport{Intel:2000:IIP,
  author =       "{Intel Corporation}",
  title =        "{Intel Itanium} Processor: High Performance On
                 Security Algorithms ({RSA} Decryption Kernel)",
  institution =  pub-INTEL,
  address =      pub-INTEL:adr,
  pages =        "8",
  year =         "2000",
  bibdate =      "Fri Jan 05 09:27:38 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib",
  URL =          "http://developer.intel.com/design/ia-64/downloads/itaniumssl_seg_103.htm",
  acknowledgement = ack-nhfb,
}

@InProceedings{Itoi:2000:SCI,
  author =       "Naomaru Itoi",
  title =        "Secure Coprocessor Integration with {Kerberos V5}",
  crossref =     "USENIX:2000:PNU",
  pages =        "??--??",
  year =         "2000",
  bibdate =      "Wed Oct 16 05:17:16 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/sec2000/itoi.html",
  acknowledgement = ack-nhfb,
}

@InProceedings{Iwata:2000:PAF,
  author =       "Tetsu Iwata and Kaoru Kurosawa",
  title =        "On the Pseudorandomness of {AES} Finalists --- {RC6},
                 {Serpent}, {MARS} and {Twofish} (abstract only)",
  crossref =     "NIST:2000:TAE",
  pages =        "9--9",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The aim of this paper is to compare the security of
                 AES finalists in an idealized model like Luby and
                 Rackoff. We mainly prove that a five round idealized
                 RC6 and a three round idealized Serpent are
                 super-pseudorandom permutations. We then show a
                 comparison about this kind of pseudorandomness for four
                 AES finalists, RC6, Serpent, MARS and Twofish.",
  acknowledgement = ack-nhfb,
}

@Article{Jackson:2000:SCQ,
  author =       "Chris Jackson",
  title =        "Smart card questions move from technology to
                 applications",
  journal =      "Railway gazette international",
  volume =       "156",
  number =       "3",
  pages =        "167--168",
  month =        mar,
  year =         "2000",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "automatic fare collection; local transit --- fares ---
                 equipment and supplies; smart cards",
}

@Article{Jakobsson:2000:MMS,
  author =       "Markus Jakobsson and Ari Juels",
  title =        "Mix and Match: Secure Function Evaluation via
                 Ciphertexts",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1976",
  pages =        "162--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:17:24 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1976.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1976/19760162.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1976/19760162.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Jambunathan:2000:CCP,
  author =       "K. Jambunathan",
  title =        "On Choice of Connection-Polynomials for {LFSR}-Based
                 Stream Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1977",
  pages =        "9--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:08:57 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1977.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1977/19770009.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1977/19770009.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Janczewski:2000:IIS,
  author =       "Lech Janczewski",
  title =        "{Internet} and intranet security management: risks and
                 solutions",
  publisher =    "Idea Group Pub.",
  address =      "Hershey, PA, USA",
  pages =        "302",
  year =         "2000",
  ISBN =         "1-878289-71-3",
  ISBN-13 =      "978-1-878289-71-1",
  LCCN =         "TK5105.875.I57 I684 2000",
  bibdate =      "Mon Apr 29 11:50:37 MDT 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Contents: Pt. I. State of the Art. Ch. 1. Security
                 Risk Assessment and Electronic Commerce: A
                 Cross-Industry Analysis / Jonathan W. Palmer, Jamie
                 Kliewer and Mark Sweat. Ch. 2. Securing the Internet in
                 New Zealand: Threats and Solutions / Jairo A. Gutierrez
                 --- Pt. II. Managing Intranet and Internet Security.
                 Ch. 3. Developing Trust for Electronic Commerce /
                 Dieter Fink. Ch. 4. Managing Security Functions Using
                 Security Standards / Lech Janczewski. Ch. 5. Managing
                 Security in the World Wide Web: Architecture, Services
                 and Techniques / Fredj Dridi and Gustaf Neumann --- Pt.
                 III. Cryptography and Technical Security Standards. Ch.
                 6. Cryptography: Protecting Confidentiality, Integrity
                 and Availability of Data / Henry B. Wolfe. Ch. 7.
                 Foundations for Cryptography / Dieter Gollmann. Ch. 8.
                 Developments in Security Mechanism Standards / Chris
                 Mitchell --- Pt. IV. Security and the Law. Ch. 9.
                 Electronic Mail, Employee Privacy and the Workplace /
                 Charles Prysby and Nicole Prysby. Ch. 10. Protecting
                 Personal Privacy in Cyberspace: The Limitations of
                 Third Generation Data Protection Laws Such as the New
                 Zealand Privacy Act 1993 / Gehan Gunasekara",
  acknowledgement = ack-nhfb,
  annote =       "Contents: Pt. I. State of the Art. Ch. 1. Security
                 Risk Assessment and Electronic Commerce: A
                 Cross-Industry Analysis / Jonathan W. Palmer, Jamie
                 Kliewer and Mark Sweat. Ch. 2. Securing the Internet in
                 New Zealand: Threats and Solutions / Jairo A. Gutierrez
                 --- Pt. II. Managing Intranet and Internet Security.
                 Ch. 3. Developing Trust for Electronic Commerce /
                 Dieter Fink. Ch. 4. Managing Security Functions Using
                 Security Standards / Lech Janczewski. Ch. 5. Managing
                 Security in the World Wide Web: Architecture, Services
                 and Techniques / Fredj Dridi and Gustaf Neumann --- Pt.
                 III. Cryptography and Technical Security Standards. Ch.
                 6. Cryptography: Protecting Confidentiality, Integrity
                 and Availability of Data / Henry B. Wolfe. Ch. 7.
                 Foundations for Cryptography / Dieter Gollmann. Ch. 8.
                 Developments in Security Mechanism Standards / Chris
                 Mitchell --- Pt. IV. Security and the Law. Ch. 9.
                 Electronic Mail, Employee Privacy and the Workplace /
                 Charles Prysby and Nicole Prysby. Ch. 10. Protecting
                 Personal Privacy in Cyberspace: The Limitations of
                 Third Generation Data Protection Laws Such as the New
                 Zealand Privacy Act 1993 / Gehan Gunasekara.",
  keywords =     "computers --- access control; cryptography; Internet
                 --- security measures; intranets (computer networks)
                 --- security measures",
}

@Article{Jarecki:2000:AST,
  author =       "Stanis{\l}aw Jarecki and Anna Lysyanskaya",
  title =        "Adaptively Secure Threshold Cryptography: Introducing
                 Concurrency, Removing Erasures (Extended Abstract)",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1807",
  pages =        "221--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1807.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1807/18070221.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1807/18070221.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Jaulmes:2000:CCA,
  author =       "{\'E}liane Jaulmes and Antoine Joux",
  title =        "A Chosen-Ciphertext Attack against {NTRU}",
  crossref =     "Bellare:2000:ACC",
  pages =        "20--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800020.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800020.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@Article{Jaulmes:2000:NC,
  author =       "{\'E}liane Jaulmes and Antoine Joux",
  title =        "A {NICE} Cryptanalysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1807",
  pages =        "382--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1807.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1807/18070382.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1807/18070382.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Jennewein:2000:FCQ,
  author =       "Thomas Jennewein and Ulrich Achleitner and Gregor
                 Weihs and Harald Weinfurter and Anton Zeilinger",
  title =        "A fast and compact quantum random number generator",
  journal =      j-REV-SCI-INSTRUM,
  volume =       "71",
  number =       "4",
  pages =        "1675--1680",
  year =         "2000",
  CODEN =        "RSINAK",
  DOI =          "https://doi.org/10.1063/1.1150518",
  ISSN =         "1089-7623, 0034-6748",
  ISSN-L =       "0034-6748",
  bibdate =      "Mon Jan 16 15:57:34 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://link.aip.org/link/?RSI/71/1675/1",
  acknowledgement = ack-nhfb,
  fjournal =     "Review of scientific instruments",
  journal-URL =  "http://rsi.aip.org/",
  keywords =     "binary sequences; optical beam splitters; optical
                 polarisers; quantum cryptography; quantum optics;
                 random number generation; true random numbers from
                 physical sources",
}

@InProceedings{Johansson:2000:FCA,
  author =       "Thomas Johansson and Fredrik J{\"o}nsson",
  title =        "Fast Correlation Attacks through Reconstruction of
                 Linear Polynomials",
  crossref =     "Bellare:2000:ACC",
  pages =        "300--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800300.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800300.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@InProceedings{Johnson:2000:AFR,
  author =       "Don Johnson",
  title =        "{AES} and Future Resiliency: More Thoughts And
                 Questions",
  crossref =     "NIST:2000:TAE",
  pages =        "257--268",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Katz:2000:CCA,
  author =       "Jonathan Katz and Bruce Schneier",
  title =        "A Chosen Ciphertext Attack Against Several {E}-Mail
                 Encryption Protocols",
  crossref =     "USENIX:2000:PNU",
  pages =        "??--??",
  year =         "2000",
  bibdate =      "Wed Oct 16 05:17:16 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/sec2000/katz.html",
  acknowledgement = ack-nhfb,
}

@InProceedings{Katz:2000:CCS,
  author =       "Jonathan Katz and Moti Yung",
  title =        "Complete characterization of security notions for
                 probabilistic private-key encryption",
  crossref =     "ACM:2000:PTS",
  pages =        "245--254",
  year =         "2000",
  bibdate =      "Wed Feb 20 18:35:45 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/proceedings/series/stoc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.acm.org/pubs/articles/proceedings/stoc/335305/p245-katz/p245-katz.pdf;
                 http://www.acm.org/pubs/citations/proceedings/stoc/335305/p245-katz/",
  acknowledgement = ack-nhfb,
}

@Book{Katzenbeisser:2000:IHT,
  editor =       "Stefan Katzenbeisser and Fabien A. P. Petitcolas",
  title =        "Information hiding techniques for steganography and
                 digital watermarking",
  publisher =    pub-ARTECH,
  address =      pub-ARTECH:adr,
  pages =        "xviii + 220",
  year =         "2000",
  ISBN =         "1-58053-035-4",
  ISBN-13 =      "978-1-58053-035-4",
  LCCN =         "QA76.9.A25 I54144 2000",
  bibdate =      "Wed Feb 13 12:10:46 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "Artech House computer security series",
  abstract =     "Steganography, a means by which two or more parties
                 may communicate using ``invisible'' or ``subliminal''
                 communication, and watermarking, a means of hiding
                 copyright data in images, are becoming necessary
                 components of commercial multimedia applications that
                 are subject to illegal use.\par

                 Inside, you get a thorough review of steganography, the
                 history of this previously neglected element of
                 cryptography, a description of possible applications,
                 and a survey of methods you can use to hide information
                 in modern media. Included is an overview of
                 ``steganalysis,'' methods that can be used to break
                 steganographic communication.",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; data protection; water-marks",
  subject =      "Computer security; Data protection; Digital
                 watermarking; Watermarks; tatouage; empreinte digitale;
                 st{\'e}ganographie; cryptographie; Cryptographie.;
                 Filigranes (papeterie); Techniques num{\'e}riques.;
                 Protection de l'information (informatique); Computer
                 security.; Data protection.; Digital watermarking.",
  tableofcontents = "1: Introduction to information hiding \\
                 I: Secret writing and steganography \\
                 2: Principles of steganography \\
                 3: A survey of steganographic techniques \\
                 4: Steganalysis \\
                 II: Watermarking and copyright protection \\
                 5: Introduction to watermarking techniques\\
                 6: A survey of current watermarking techniques\\
                 7: Robustness of copyright marking systems\\
                 8: Fingerprinting\\
                 9: Copyright on the Internet and watermarking",
}

@InProceedings{Kelsey:2000:ABA,
  author =       "John Kelsey and Tadayoshi Kohno and Bruce Schneier",
  title =        "Amplified Boomerang Attacks Against Reduced-Round
                 {MARS} and {Serpent} (abstract only)",
  crossref =     "NIST:2000:TAE",
  pages =        "10--10",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We introduce a new kind of attack based on Wagner's
                 boomerang and inside-out attacks. We first describe the
                 new attack in terms of the original boomerang attack,
                 and then demonstrate its use on reduced-round variants
                 of the MARS core and of Serpent. Our attack breaks
                 eleven rounds of the Mars core with 265 chosen
                 plaintexts, 269 memory, and 2229 partial decryptions.
                 Our attack breaks eight rounds of Serpent with 2114
                 chosen plaintexts, 2119 memory, and 2179 partial
                 decryptions.",
  acknowledgement = ack-nhfb,
}

@InProceedings{Kelsey:2000:CPL,
  author =       "J. Kelsey and N. Ferguson and B. Schneier and M.
                 Stay",
  editor =       "????",
  booktitle =    "Third AES Candidate Conference",
  title =        "Cryptanalytic Progress: Lessons for {AES}",
  publisher =    "????",
  address =      "????",
  pages =        "??--??",
  month =        apr,
  year =         "2000",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Oct 16 08:37:43 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb # " and " # ack-bs,
}

@TechReport{Kelsey:2000:KST,
  author =       "J. Kelsey",
  title =        "Key Separation in {Twofish}",
  type =         "{Twofish} technical report",
  number =       "7",
  institution =  inst-COUNTERPANE-SYSTEMS,
  address =      inst-COUNTERPANE-SYSTEMS:adr,
  pages =        "????",
  day =          "7",
  month =        apr,
  year =         "2000",
  bibdate =      "Mon Oct 16 08:36:24 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.counterpane.com/twofish-tr7.html",
  acknowledgement = ack-nhfb # " and " # ack-bs,
}

@InProceedings{Kelsey:2000:MAP,
  author =       "John Kelsey and Bruce Schneier",
  title =        "{MARS} Attacks! Preliminary Cryptanalysis of
                 Reduced-Round {MARS} Variants",
  crossref =     "NIST:2000:TAE",
  pages =        "169--185",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Kelsey:2000:SCC,
  author =       "John Kelsey and Bruce Schneier and David Wagner and
                 Chris Hall",
  title =        "Side channel cryptanalysis of product ciphers",
  journal =      j-J-COMP-SECUR,
  volume =       "8",
  number =       "2--3",
  pages =        "141--158",
  month =        "????",
  year =         "2000",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2000-82-304",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:31 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@InProceedings{Kelsey:2000:YND,
  author =       "John Kelsey and Bruce Schneier and Niels Ferguson",
  title =        "{Yarrow-160}: Notes on the design and analysis of the
                 {Yarrow} cryptographic pseudorandom number generator",
  crossref =     "Heys:2000:SAC",
  pages =        "13--33",
  year =         "2000",
  bibdate =      "Mon Aug 30 17:37:07 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.counterpane.com/yarrow-notes.html;
                 http://www.schneier.com/paper-yarrow.html",
  abstract =     "We describe the design of Yarrow, a family of
                 cryptographic pseudo-random number generators (PRNG).
                 We describe the concept of a PRNG as a separate
                 cryptographic primitive, and the design principles used
                 to develop Yarrow. We then discuss the ways that PRNGs
                 can fail in practice, which motivates our discussion of
                 the components of Yarrow and how they make Yarrow
                 secure. Next, we define a specific instance of a PRNG
                 in the Yarrow family that makes use of available
                 technology today.",
  acknowledgement = ack-nhfb,
  pagecount =    "14",
  xxtitle =      "Notes on the Design and Analysis of the {Yarrow}
                 Cryptographic Pseudorandom Number Generator",
}

@Article{Kidwell:2000:SNC,
  author =       "Peggy A. Kidwell",
  title =        "The {Swiss Nema} cipher machine [Reviews]",
  journal =      j-IEEE-ANN-HIST-COMPUT,
  volume =       "22",
  number =       "2",
  pages =        "80--80",
  month =        apr # "--" # jun,
  year =         "2000",
  CODEN =        "IAHCEX",
  DOI =          "https://doi.org/10.1109/MAHC.2000.841146",
  ISSN =         "1058-6180 (print), 1934-1547 (electronic)",
  ISSN-L =       "1058-6180",
  bibdate =      "Wed Mar 14 10:17:48 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeeannhistcomput.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=85",
}

@Article{Kim:2000:RMW,
  author =       "Tae-hoon Kim and Jehee Lee and Sung Yong Shin",
  title =        "Robust Motion Watermarking based on Multiresolution
                 Analysis",
  journal =      j-CGF,
  volume =       "19",
  number =       "3",
  pages =        "??--??",
  month =        aug,
  year =         "2000",
  CODEN =        "CGFODY",
  ISSN =         "0167-7055 (print), 1467-8659 (electronic)",
  ISSN-L =       "0167-7055",
  bibdate =      "Wed Oct 11 06:13:38 MDT 2000",
  bibsource =    "http://www.blackwellpublishing.com/journal.asp?ref=0167-7055;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "aid=411&
                 http://www.blackwellpublishers.co.uk/asp/journal.asp?ref=0167-7055&
                 iid=3& src=ard& vid=19",
  acknowledgement = ack-nhfb,
  author-1-adr = "Department of Computer Science, Korea Advanced
                 Institute of Science and Technology, 373-1 Kusung-dong
                 Yusung-gu, Taejon, Republic of Korea",
  author-2-adr = "Department of Computer Science, Korea Advanced
                 Institute of Science and Technology, 373-1 Kusung-dong
                 Yusung-gu, Taejon, Republic of Korea",
  author-3-adr = "Department of Computer Science, Korea Advanced
                 Institute of Science and Technology, 373-1 Kusung-dong
                 Yusung-gu, Taejon, Republic of Korea",
  fjournal =     "Com{\-}pu{\-}ter Graphics Forum",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1467-8659/",
}

@Article{King:2000:IMP,
  author =       "Brian King",
  title =        "Improved Methods to Perform Threshold {RSA}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1976",
  pages =        "359--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:17:24 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1976.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1976/19760359.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1976/19760359.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Knudsen:2000:CRA,
  author =       "Lars Knudsen and Willi Meier",
  title =        "Correlations in {RC6} (abstract only)",
  crossref =     "NIST:2000:TAE",
  pages =        "9--9",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "In this paper the block cipher RC6 is analysed. RC6 is
                 submitted as a candidate for the Advanced Encryption
                 Standard, and is one of five finalists. It has 128-bit
                 blocks and supports keys of 128, 192 and 256 bits, and
                 is an iterated 20-round block cipher. Here it is shown
                 that versions of RC6 with 128-bit blocks can be
                 distinguished from a random permutation with up to 15
                 rounds; for some weak keys up to 17 rounds. Moreover,
                 with an increased effort key-recovery attacks can be
                 mounted on RC6 with up to 15 rounds faster than an
                 exhaustive search for the key.",
  acknowledgement = ack-nhfb,
}

@TechReport{Knudsen:2000:TT,
  author =       "L. Knudsen",
  title =        "Trawling {Twofish}",
  type =         "Reports in Informatics",
  institution =  "University of Bergen",
  address =      "Bergen, Norway",
  pages =        "????",
  month =        apr,
  year =         "2000",
  bibdate =      "Mon Oct 16 08:43:59 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb # " and " # ack-bs,
}

@InProceedings{Knudsen:2000:TTR,
  author =       "L. Knudsen",
  editor =       "????",
  booktitle =    "Third AES Candidate Conference",
  title =        "Trawling {Twofish} --- Revisited",
  publisher =    "????",
  address =      "????",
  pages =        "??--??",
  month =        apr,
  year =         "2000",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Oct 16 08:44:47 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb # " and " # ack-bs,
}

@InProceedings{Ko:2000:NPK,
  author =       "Ki Hyoung Ko and Sang Jin Lee and Jung Hee Cheon and
                 Jae Woo Han and Ju-sung Kang and Choonsik Park",
  title =        "New Public-Key Cryptosystem Using Braid Groups",
  crossref =     "Bellare:2000:ACC",
  pages =        "166--??",
  year =         "2000",
  MRclass =      "94A62 (20F36)",
  MRnumber =     "2002i:94057",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800166.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800166.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@Book{Koblitz:2000:TQC,
  author =       "Neal Koblitz",
  title =        "Towards a quarter-century of public key cryptography",
  publisher =    pub-KLUWER,
  address =      pub-KLUWER:adr,
  pages =        "179",
  year =         "2000",
  ISBN =         "0-7923-7802-4",
  ISBN-13 =      "978-0-7923-7802-0",
  LCCN =         "QA76.9.A25 T69 2000",
  bibdate =      "Wed Feb 13 12:10:46 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "A special issue of Designs, codes, and cryptography,
                 an international journal, volume 19, no. 2/3 (2000).",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; public key cryptography ---
                 history",
}

@InProceedings{Kohno:2000:PCR,
  author =       "Tadayoshi Kohno and John Kelsey and Bruce Schneier",
  title =        "Preliminary Cryptanalysis of Reduced-Round {Serpent}",
  crossref =     "NIST:2000:TAE",
  pages =        "195--214",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Koshiba:2000:SEP,
  author =       "Takeshi Koshiba and Osamu Watanabe",
  title =        "Strong encryption of public key cryptosystems based on
                 weak randomness hypotheses",
  journal =      "S\=urikaisekikenky\=usho K\=oky\=uroku",
  volume =       "1148",
  number =       "1148",
  pages =        "118--123",
  year =         "2000",
  MRclass =      "94A62",
  MRnumber =     "1 799 823",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  note =         "Theoretical foundations of computer science: toward a
                 paradigm for computing in the 21st century (Japanese)
                 (Kyoto, 2000)",
  fjournal =     "S\=urikaisekikenky\=usho K\=oky\=uroku",
}

@Book{Kovacich:2000:HTC,
  author =       "Gerald L. Kovacich and William C. Boni",
  title =        "High-technology-crime investigator's handbook: working
                 in the global information environment",
  publisher =    pub-BUTTERWORTH-HEINEMANN,
  address =      pub-BUTTERWORTH-HEINEMANN:adr,
  pages =        "xix + 298",
  year =         "2000",
  ISBN =         "0-7506-7086-X",
  ISBN-13 =      "978-0-7506-7086-9",
  LCCN =         "HV8079.C65 K68 2000",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$39.95",
  acknowledgement = ack-nhfb,
}

@InProceedings{Kuhn:2000:PCL,
  author =       "Markus G. Kuhn",
  title =        "Probabilistic Counting of Large Digital Signature
                 Collections",
  crossref =     "USENIX:2000:PNU",
  pages =        "??--??",
  year =         "2000",
  bibdate =      "Wed Oct 16 05:17:16 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/sec2000/kuhn.html",
  acknowledgement = ack-nhfb,
}

@Article{Kun:2000:SMA,
  author =       "Yang Kun and Guo Xin and Liu Dayou",
  title =        "Security in mobile agent system: problems and
                 approaches",
  journal =      j-OPER-SYS-REV,
  volume =       "34",
  number =       "1",
  pages =        "21--28",
  month =        jan,
  year =         "2000",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:37 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Kuribayashi:2000:WSB,
  author =       "Minoru Kuribayashi and Hatsukazu Tanaka",
  title =        "A Watermarking Scheme Based on the Characteristic of
                 Addition among {DCT} Coefficients",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1975",
  pages =        "1--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:08:57 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1975.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1975/19750001.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1975/19750001.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kushilevitz:2000:OWT,
  author =       "Eyal Kushilevitz and Rafail Ostrovsky",
  title =        "One-Way Trapdoor Permutations Are Sufficient for
                 Non-trivial Single-Server Private Information
                 Retrieval",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1807",
  pages =        "104--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1807.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1807/18070104.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1807/18070104.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Lafe:2000:CAT,
  author =       "Olu Lafe",
  title =        "Cellular automata transforms: theory and applications
                 in multimedia compression, encryption and modeling",
  volume =       "MMSA16",
  publisher =    pub-KLUWER,
  address =      pub-KLUWER:adr,
  pages =        "xii + 177",
  year =         "2000",
  ISBN =         "0-7923-7857-1",
  ISBN-13 =      "978-0-7923-7857-0",
  LCCN =         "QA267.5.C45 L34 2000",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "Multimedia systems and applications series",
  acknowledgement = ack-nhfb,
  keywords =     "cellular automata",
}

@Article{Landau:2000:CST,
  author =       "Susan Landau",
  title =        "Communications Security for the {Twenty-first
                 Century}: {The Advanced Encryption Standard}",
  journal =      j-NAMS,
  volume =       "47",
  number =       "4",
  pages =        "450--459",
  month =        apr,
  year =         "2000",
  CODEN =        "AMNOAN",
  ISSN =         "0002-9920 (print), 1088-9477 (electronic)",
  ISSN-L =       "0002-9920",
  bibdate =      "Fri Oct 25 12:55:40 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ams.org/notices/200004/fea-landau.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Notices of the American Mathematical Society",
  journal-URL =  "http://www.ams.org/notices/",
}

@Article{Landau:2000:STT,
  author =       "Susan Landau",
  title =        "Standing the Test of Time: {The Data Encryption
                 Standard}",
  journal =      j-NAMS,
  volume =       "47",
  number =       "3",
  pages =        "341--349",
  month =        mar,
  year =         "2000",
  CODEN =        "AMNOAN",
  ISSN =         "0002-9920 (print), 1088-9477 (electronic)",
  ISSN-L =       "0002-9920",
  MRclass =      "94A60 (01A60)",
  MRnumber =     "1740390",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/nams2000.bib",
  URL =          "http://www.ams.org/notices/200003/fea-landau.pdf",
  acknowledgement = ack-nhfb,
  ajournal =     "Notices Amer. Math. Soc.",
  fjournal =     "Notices of the American Mathematical Society",
  journal-URL =  "http://www.ams.org/notices/",
}

@Article{Landau:2000:TOD,
  author =       "Susan Landau",
  title =        "Technical opinion: designing cryptography for the new
                 century",
  journal =      j-CACM,
  volume =       "43",
  number =       "5",
  pages =        "115--115",
  month =        may,
  year =         "2000",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 25 15:22:32 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/2000-43/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/cacm/2000-43-5/p115-landau/",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  subject =      "Data --- Data Encryption (E.3)",
}

@Article{Lanet:2000:ITS,
  author =       "Jean-Louis Lanet",
  title =        "Invited talk: Are Smart Cards the Ideal Domain for
                 Applying Formal Methods?",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1878",
  pages =        "363--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:55 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1878.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1878/18780363.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1878/18780363.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Laufer:2000:SSC,
  author =       "Konstantin L{\"a}ufer and Gerald Baumgartner and
                 Vincent F. Russo",
  title =        "Safe Structural Conformance for {Java}",
  journal =      j-COMP-J,
  volume =       "43",
  number =       "6",
  pages =        "469--481",
  month =        "????",
  year =         "2000",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Mar 6 08:20:58 MST 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_43/Issue_06/",
  URL =          "http://www3.oup.co.uk/computer_journal/hdb/Volume_43/Issue_06/430469.sgm.abs.html;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_43/Issue_06/pdf/430469.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Lee:2000:UBN,
  author =       "J. A. N. Lee and C. Burke and D. Anderson",
  title =        "The {US Bombes}, {NCR}, {Joseph Desch}, and 600
                 {WAVES}: the first reunion of the {US Naval Computing
                 Machine Laboratory}",
  journal =      j-IEEE-ANN-HIST-COMPUT,
  volume =       "22",
  number =       "3",
  pages =        "27--41",
  month =        jul # "\slash " # sep,
  year =         "2000",
  CODEN =        "IAHCEX",
  DOI =          "https://doi.org/10.1109/85.859524",
  ISSN =         "1058-6180 (print), 1934-1547 (electronic)",
  ISSN-L =       "1058-6180",
  bibdate =      "Thu Jul 12 08:14:46 MDT 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeeannhistcomput.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/85/18655/00859524.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=85",
}

@InProceedings{Lenstra:2000:XPK,
  author =       "Arjen K. Lenstra and Eric R. Verheul",
  title =        "The {XTR} Public Key System",
  crossref =     "Bellare:2000:ACC",
  pages =        "1--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800001.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800001.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@Book{Lewand:2000:CM,
  author =       "Robert Edward Lewand",
  title =        "Cryptological Mathematics",
  publisher =    pub-MATH-ASSOC-AMER,
  address =      pub-MATH-ASSOC-AMER:adr,
  pages =        "xiv + 1999",
  year =         "2000",
  ISBN =         "0-88385-719-7",
  ISBN-13 =      "978-0-88385-719-9",
  LCCN =         "QA268 .L48 2000",
  bibdate =      "Sat Apr 20 11:43:10 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "UK\pounds 19.95",
  URL =          "http://www.loc.gov/catdir/description/cam041/00105256.html;
                 http://www.loc.gov/catdir/toc/cam041/00105256.html",
  acknowledgement = ack-nhfb,
  subject =      "coding theory; cryptography; mathematics",
}

@Article{Lie:2000:ASC,
  author =       "David Lie and Chandramohan Thekkath and Mark Mitchell
                 and Patrick Lincoln and Dan Boneh and John Mitchell and
                 Mark Horowitz",
  title =        "Architectural Support for Copy and Tamper Resistant
                 Software",
  journal =      j-SIGPLAN,
  volume =       "35",
  number =       "11",
  pages =        "168--177",
  month =        nov,
  year =         "2000",
  CODEN =        "SINODQ",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Sun Dec 14 09:18:19 MST 2003",
  bibsource =    "http://foothill.lcs.mit.edu/asplos2k/program.html;
                 http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Although there have been attempts to develop code
                 transformations that yield tamper-resistant software,
                 no reliable software-only methods are known. This paper
                 studies the hardware implementation of a form of
                 execute-only memory (XOM) that allows instructions
                 stored in memory to be executed there but not otherwise
                 manipulated. To support XOM code we use a machine that
                 supports internal compartments --- a process in one
                 compartment cannot read data from another compartment.
                 All data that leaves the machine is encrypted, since we
                 assume external memory is not secure. The design of
                 this machine poses some interesting tradeoffs between
                 security, efficient, and flexibility. We explore some
                 of the potential security issues as one pushes the
                 machine to become more efficient and flexible. Although
                 security carries a performance penalty, our analysis
                 indicates that it is possible to create a normal
                 multi-tasking machine where nearly all applications can
                 be run in XOM mode. While a virtual XOM machine is
                 possible, the underlying hardware needs to support a
                 unique private key, private memory, and traps on cache
                 misses. For efficient operation, hardware assist to
                 provide fast symmetric ciphers is also required.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  keywords =     "cryptography",
}

@Article{Lim:2000:GTC,
  author =       "Seongan Lim and Seungjoo Kim and Ikkwon Yie and
                 Hongsub Lee",
  booktitle =    "Progress in cryptology---INDOCRYPT 2000 (Calcutta)",
  title =        "A generalized {Takagi}-cryptosystem with a modulus of
                 the form {$ p^r q^s $}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1977",
  pages =        "283--294",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "1 847 762",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lin:2000:PAS,
  author =       "Xiaodong Lin and Johnny W. Wong and Weidong Kou",
  title =        "Performance Analysis of Secure {Web} Server Based on
                 {SSL}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1975",
  pages =        "249--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:08:57 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1975.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1975/19750249.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1975/19750249.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lin:2000:RTI,
  author =       "Phen-Lan Lin",
  title =        "Robust transparent image watermarking system with
                 spatial mechanisms",
  journal =      j-J-SYST-SOFTW,
  volume =       "50",
  number =       "2",
  pages =        "107--116",
  day =          "15",
  month =        feb,
  year =         "2000",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Oct 10 10:06:11 MDT 2000",
  bibsource =    "http://www.elsevier.com/locate/issn/01641212;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.nl/gej-ng/10/29/11/49/27/27/article.pdf;
                 http://www.elsevier.nl/gej-ng/10/29/11/49/27/abstract.html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Lin:2000:TPE,
  author =       "Chun-Li Lin and Hung-Min Sun and Tzonelih Hwang",
  title =        "Three-party encrypted key exchange: attacks and a
                 solution",
  journal =      j-OPER-SYS-REV,
  volume =       "34",
  number =       "4",
  pages =        "12--20",
  month =        oct,
  year =         "2000",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:52 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Linares:2000:SAM,
  author =       "Leandro Rodr{\'\i}guez Li{\~n}ares and Carmen
                 Garc{\'\i}a Mateo",
  title =        "A Speaker Authentication Module in {TelCorreo}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1902",
  pages =        "375--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:08:45 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1902.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1902/19020375.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1902/19020375.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Lindell:2000:PPD,
  author =       "Yehuda Lindell and Benny Pinkas",
  title =        "Privacy Preserving Data Mining",
  crossref =     "Bellare:2000:ACC",
  pages =        "36--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800036.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800036.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@TechReport{Linn:2000:TMM,
  author =       "John Linn",
  title =        "Trust Models and Management in Public-Key
                 Infrastructures",
  type =         "Technical report",
  institution =  pub-RSA,
  address =      pub-RSA:adr,
  pages =        "13",
  day =          "6",
  month =        nov,
  year =         "2000",
  bibdate =      "Wed Jun 06 06:19:54 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "ftp://ftp.rsasecurity.com/pub/pdfs/PKIPaper.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Loidreau:2000:SMC,
  author =       "Pierre Loidreau",
  booktitle =    "Advances in cryptology---ASIACRYPT 2000 (Kyoto)",
  title =        "Strengthening {McEliece} cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1976",
  pages =        "585--598",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A62 (94B27)",
  MRnumber =     "2002g:94042",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Lucks:2000:ASR,
  author =       "Stefan Lucks",
  title =        "Attacking Seven Rounds of {Rijndael} under 192-bit and
                 256-bit Keys",
  crossref =     "NIST:2000:TAE",
  pages =        "215--229",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{MacAndrew:2000:LPT,
  author =       "Tim MacAndrew and Robert H. Norman and Jeff Templon
                 and Kevin W. Wall and Shari Lawrence Pfleeger and
                 Joseph C. Sligo and Christopher Jack and Terry Ritter",
  title =        "Letters: Probability Theory and Software Engineering;
                 Food for Thought; Uncovering Erroneous Assumptions;
                 {Einstein}'s {Nobel Prize}; Small-Project Process
                 Improvement; The Truth about Cryptography",
  journal =      j-COMPUTER,
  volume =       "33",
  number =       "2",
  pages =        "4--8",
  month =        feb,
  year =         "2000",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Sat Mar 11 09:52:58 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/co/books/co2000/pdf/r2004.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@TechReport{Machado:2000:NCP,
  author =       "Alexis Warner Machado",
  title =        "The {Nimbus} cipher: a proposal for {NESSIE}",
  type =         "Report",
  number =       "??",
  institution =  "????",
  address =      "????",
  month =        sep,
  year =         "2000",
  bibdate =      "Fri Sep 23 05:59:10 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "NESSIE (New European Schemes for Signature, Integrity
                 and Encryption)",
  remark =       "I can find this report cited, but no source for it
                 yet.",
}

@Article{MacKenzie:2000:PAK,
  author =       "Philip MacKenzie and Sarvar Patel and Ram
                 Swaminathan",
  title =        "Password-Authenticated Key Exchange Based on {RSA}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1976",
  pages =        "599--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:17:24 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1976.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1976/19760599.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1976/19760599.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Maclean:2000:OIG,
  author =       "Abby Maclean and Stephen M. Matyas and Nevenko Zunic",
  title =        "Organization Implementation Guidelines for Recovery of
                 Encrypted Information",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "69--81",
  day =          "1",
  month =        jan,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800863658",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Madsen:2000:HCI,
  author =       "Wayne Madsen",
  title =        "Health Care Industry Debate: Electronic Versus Digital
                 Signatures",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "12",
  pages =        "5--5",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)12013-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:06 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800120136",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Madsen:2000:RDU,
  author =       "Wayne Madsen",
  title =        "Revised Draft {US} Crypto Export Regulations leaked",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "3",
  pages =        "8--8",
  day =          "1",
  month =        mar,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)88024-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:52 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800880241",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Madsen:2000:WUN,
  author =       "Wayne Madsen",
  title =        "{Whitehouse} unveils new cyber-crime, crypto export
                 policies",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "8",
  pages =        "7--7",
  day =          "1",
  month =        aug,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)08017-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:00 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348580008017X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Mazieres:2000:SKM,
  author =       "David Mazi{\`e}res and Michael Kaminsky and M. Frans
                 Kaashoek and Emmett Witchel",
  title =        "Separating key management from file system security",
  journal =      j-OPER-SYS-REV,
  volume =       "34",
  number =       "2",
  pages =        "19--20",
  month =        apr,
  year =         "2000",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:42 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Merton:2000:NBG,
  author =       "Orren Merton and Linda Dailey Paulson",
  title =        "News Briefs: Gamers Jump into Broadband Technology;
                 {Intel} Has New Chip Design for Handhelds; Patent
                 Expiration Begins New Encryption Era; Privacy
                 Organization Raises Privacy Concerns",
  journal =      j-COMPUTER,
  volume =       "33",
  number =       "11",
  pages =        "16--19",
  month =        nov,
  year =         "2000",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Tue Nov 7 15:11:30 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/co/books/co2000/pdf/ry016.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@InProceedings{Messerges:2000:SAF,
  author =       "Thomas Messerges",
  title =        "Securing the {AES} Finalists Against Power Analysis
                 Attacks (abstract only)",
  crossref =     "NIST:2000:TAE",
  pages =        "10--10",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Techniques to protect software implementations of the
                 AES candidate algorithms from power analysis attacks
                 are investigated. New countermeasures that employ
                 random masks are developed and the performance
                 characteristics of these countermeasures are analyzed.
                 Implementations in a 32-bit, ARM-based smartcard are
                 considered.",
  acknowledgement = ack-nhfb,
}

@Article{Michener:2000:IWM,
  author =       "John R. Michener and Tolga Acar",
  title =        "{Internet} Watch: Managing System and Active-Content
                 Integrity",
  journal =      j-COMPUTER,
  volume =       "33",
  number =       "7",
  pages =        "108--110",
  month =        jul,
  year =         "2000",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Mon Oct 30 17:20:20 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/co/books/co2000/pdf/r7108.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
  keywords =     "ActiveX; code signing and verification; cryptography",
}

@Article{Michener:2000:MSA,
  author =       "John R. Michener and Tolga Acar",
  title =        "Managing System and Active-Content Integrity",
  journal =      j-COMPUTER,
  volume =       "33",
  number =       "7",
  pages =        "108--110",
  month =        jul,
  year =         "2000",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Sat Jul 29 06:05:28 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
  keywords =     "ActiveX; code signing and verification; cryptography",
}

@Article{Mitchell:2000:MSN,
  author =       "Chris J. Mitchell",
  title =        "Making serial number based authentication robust
                 against loss of state",
  journal =      j-OPER-SYS-REV,
  volume =       "34",
  number =       "3",
  pages =        "56--59",
  month =        jul,
  year =         "2000",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:47 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Monrose:2000:KDB,
  author =       "Fabian Monrose and Aviel D. Rubin",
  title =        "Keystroke dynamics as a biometric for authentication",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "16",
  number =       "4",
  pages =        "351--359",
  month =        feb,
  year =         "2000",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Wed Feb 27 12:41:19 MST 2002",
  bibsource =    "http://www.elsevier.com/locate/issn/0167739X;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.com/gej-ng/10/19/19/41/27/30/abstract.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Moriai:2000:PTL,
  author =       "Shiho Moriai and Serge Vaudenay",
  title =        "On the Pseudorandomness of Top-Level Schemes of Block
                 Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1976",
  pages =        "289--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:17:24 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1976.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1976/19760289.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1976/19760289.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Misc{Murphy:2000:KST,
  author =       "S. Murphy",
  title =        "The Key Separation of {Twofish}",
  howpublished = "Comments on AES round 2 submitted to NIST.",
  month =        mar,
  year =         "2000",
  bibdate =      "Mon Oct 16 08:49:21 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb # " and " # ack-bs,
}

@Book{Nichols:2000:DYD,
  author =       "Randall K. Nichols and Daniel J. Ryan and Julie J. C.
                 H. Ryan",
  title =        "Defending your digital assets: against hackers,
                 crackers, spies and thieves",
  publisher =    pub-MCGRAW-HILL,
  address =      pub-MCGRAW-HILL:adr,
  pages =        "xxxv + 858",
  year =         "2000",
  ISBN =         "0-07-212285-4",
  ISBN-13 =      "978-0-07-212285-5",
  LCCN =         "QA76.9.A25 N528 2000",
  bibdate =      "Wed Jun 06 18:22:07 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$59.99",
  URL =          "http://corpitk.earthweb.com/reference/0072122854.html",
  acknowledgement = ack-nhfb,
}

@Book{NIST:2000:FPD,
  author =       "{National Institute of Standards and Technology}",
  title =        "{FIPS PUB 186-2}: {Digital Signature Standard (DSS)}",
  publisher =    pub-NIST,
  address =      pub-NIST:adr,
  day =          "27",
  month =        jan,
  year =         "2000",
  bibdate =      "Mon Nov 27 09:20:17 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.itl.nist.gov/fipspubs/fip186-2.pdf",
  abstract =     "This standard specifies a suite of algorithms which
                 can be used to generate a digital signature. Digital
                 signatures are used to detect unauthorized
                 modifications to data and to authenticate the identity
                 of the signatory. In addition, the recipient of signed
                 data can use a digital signature in proving to a third
                 party that the signature was in fact generated by the
                 signatory. This is known as nonrepudiation since the
                 signatory cannot, at a later time, repudiate the
                 signature.",
  acknowledgement = ack-nhfb,
  keywords =     "ADP security; computer security; digital signatures;
                 Federal Information Processing Standards; public-key
                 cryptography",
}

@InProceedings{Okamoto:2000:QPK,
  author =       "Tatsuaki Okamoto and Keisuke Tanaka and Shigenori
                 Uchiyama",
  title =        "Quantum Public-Key Cryptosystems",
  crossref =     "Bellare:2000:ACC",
  pages =        "147--??",
  year =         "2000",
  MRclass =      "94A62 (81P68)",
  MRnumber =     "2002i:94060",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800147.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800147.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@Article{Okeya:2000:PAB,
  author =       "Katsuyuki Okeya and Kouichi Sakurai",
  booktitle =    "Progress in cryptology---INDOCRYPT 2000 (Calcutta)",
  title =        "Power analysis breaks elliptic curve cryptosystems
                 even secure against the timing attack",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1977",
  pages =        "178--190",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60 (14G50)",
  MRnumber =     "2002i:94047",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Olson:2000:SCT,
  author =       "Adam Olson",
  title =        "Scaring Crackers Away with {TCP} Wrapper",
  journal =      j-SYS-ADMIN,
  volume =       "9",
  number =       "10",
  pages =        "67--71",
  month =        oct,
  year =         "2000",
  CODEN =        "SYADE7",
  ISSN =         "1061-2688",
  bibdate =      "Mon Sep 18 08:04:28 MDT 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.samag.com/",
  abstract =     "This article covers how to configure TCP Wrapper so
                 that crackers probing your network will be afraid to
                 investigate any further.",
  acknowledgement = ack-nhfb,
  fjournal =     "Sys admin: the journal for UNIX system
                 administrators",
}

@Article{Ortiz:2000:ITW,
  author =       "Sixto {Ortiz Jr.}",
  title =        "Industry Trends: Will {PKI} Become a Key to Online
                 Security?",
  journal =      j-COMPUTER,
  volume =       "33",
  number =       "12",
  pages =        "13--15",
  month =        dec,
  year =         "2000",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Wed Dec 6 18:12:09 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/co/books/co2000/pdf/rz013.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
  keywords =     "digital certificates; encryption; public key
                 infrastructure (PKI)",
}

@InProceedings{Osvik:2000:SS,
  author =       "Dag Arne Osvik",
  title =        "Speeding up {Serpent}",
  crossref =     "NIST:2000:TAE",
  pages =        "317--329",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Park:2000:CAP,
  author =       "DongGook Park and Colin Boyd and Ed Dawson",
  title =        "Classification of Authentication Protocols: a
                 Practical Approach",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1975",
  pages =        "194--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:08:57 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1975.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1975/19750194.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1975/19750194.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Paulson:2000:NBU,
  author =       "Linda Dailey Paulson and Orren Merton",
  title =        "News Briefs: {U.S.} Picks New Encryption Standard;
                 Better Software with Open Source; Taking a {SIP} of
                 {Internet} Telephony; Schools May Hold Valuable
                 Spectrum; Getting a Feel for the {Web}",
  journal =      j-COMPUTER,
  volume =       "33",
  number =       "12",
  pages =        "20--23",
  month =        dec,
  year =         "2000",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Wed Dec 6 18:12:09 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/co/books/co2000/pdf/rz020.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Petrie:2000:NBI,
  author =       "C. Petrie and J. Connelly",
  title =        "A noise-based {IC} random number generator for
                 applications in cryptography",
  journal =      j-IEEE-J-SOLID-STATE-CIRCUITS,
  volume =       "47",
  number =       "5",
  pages =        "615--621",
  month =        "????",
  year =         "2000",
  CODEN =        "IJSCBC",
  DOI =          "https://doi.org/10.1109/81.847868",
  ISSN =         "0018-9200 (print), 1558-173X (electronic)",
  ISSN-L =       "0018-9200",
  bibdate =      "Thu Feb 23 08:24:54 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Journal of Solid-State Circuits",
}

@Article{Peyravian:2000:MBB,
  author =       "Mohammad Peyravian and Stephen M. Matyas and Allen
                 Roginsky and Nevenko Zunic",
  title =        "Multiparty Biometric-Based Authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "369--374",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040256",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pointcheval:2000:CCS,
  author =       "David Pointcheval",
  booktitle =    "Public key cryptography (Melbourne, 2000)",
  title =        "Chosen-ciphertext security for any one-way
                 cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1751",
  pages =        "129--146",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A62",
  MRnumber =     "1 864 776",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Poupard:2000:FER,
  author =       "Guillaume Poupard and Jacques Stern",
  title =        "Fair Encryption of {RSA} Keys",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1807",
  pages =        "172--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1807.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1807/18070172.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1807/18070172.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Price:2000:NCH,
  author =       "Dick Price",
  title =        "News: {CAIDA} helps train network engineers, 109-bit
                 cryptographic key cracked, {LosLobos--Linux}
                 supercluster",
  journal =      j-IEEE-CONCURR,
  volume =       "8",
  number =       "2",
  pages =        "4--7",
  month =        apr # "\slash " # jun,
  year =         "2000",
  CODEN =        "IECMFX",
  ISSN =         "1092-3063 (print), 1558-0849 (electronic)",
  ISSN-L =       "1092-3063",
  bibdate =      "Fri Oct 13 09:48:42 MDT 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/pd/books/pd2000/pdf/p2004.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Concurrency",
}

@InProceedings{Provos:2000:EVM,
  author =       "Niels Provos",
  title =        "Encrypting Virtual Machine",
  crossref =     "USENIX:2000:PNU",
  pages =        "??--??",
  year =         "2000",
  bibdate =      "Wed Oct 16 05:17:16 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/sec2000/provos.html",
  acknowledgement = ack-nhfb,
}

@Article{Raikhel:2000:DF,
  author =       "Eugene Raikhel",
  title =        "Decoding the Forecast",
  journal =      j-SCI-AMER,
  volume =       "283",
  number =       "3s",
  pages =        "20--??",
  month =        mar,
  year =         "2000",
  CODEN =        "SCAMAC",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Mon Nov 13 06:19:23 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 OCLC Contents1st database",
  abstract =     "From ``cold front'' to ``degree days,'' this guide
                 deciphers the often abstruse terminology of newspaper
                 and broadcast reports",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@InProceedings{Ramzan:2000:RSS,
  author =       "Zulfikar Ramzan and Leonid Reyzin",
  title =        "On the Round Security of Symmetric-Key Cryptographic
                 Primitives",
  crossref =     "Bellare:2000:ACC",
  pages =        "376--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800376.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800376.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@Book{Rankl:2000:SCH,
  author =       "W. (Wolfgang) Rankl and W. Effing",
  title =        "Smart card handbook",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  edition =      "Second",
  pages =        "xxviii + 746",
  year =         "2000",
  ISBN =         "0-471-98875-8",
  ISBN-13 =      "978-0-471-98875-5",
  LCCN =         "TK7895.S62 R3613 2000",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "smart cards --- handbooks, manuals, etc",
}

@Article{Reed:2000:ANA,
  author =       "Benjamin C. Reed and Edward G. Chron and Randal C.
                 Burns and Darrell D. E. Long",
  title =        "Authenticating Network-Attached Storage",
  journal =      j-IEEE-MICRO,
  volume =       "20",
  number =       "1",
  pages =        "49--57",
  month =        jan # "\slash " # feb,
  year =         "2000",
  CODEN =        "IEMIDZ",
  DOI =          "https://doi.org/10.1109/40.820053",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Thu Dec 14 06:08:58 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemicro.bib;
                 Science Citation Index database (1980--2000)",
  URL =          "http://dlib.computer.org/mi/books/mi2000/pdf/m1049.pdf;
                 http://www.computer.org/micro/mi2000/m1049abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Micro",
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
}

@Article{Rieffel:2000:IQC,
  author =       "Eleanor Rieffel and Wolfgang Polak",
  title =        "An introduction to quantum computing for
                 non-physicists",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "3",
  pages =        "300--335",
  month =        sep,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/367701.367709",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:14:44 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/2000-32-3/p300-rieffel/p300-rieffel.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/2000-32-3/p300-rieffel/",
  abstract =     "Richard Feynman's observation that certain quantum
                 mechanical effects cannot be simulated efficiently on a
                 computer led to speculation that computation in general
                 could be done more efficiently if it used these quantum
                 effects. This speculation proved justified when Peter
                 Shor described a polynomial time quantum algorithm for
                 factoring integers. \par

                 In quantum systems, the computational space increases
                 exponentially with the size of the system, which
                 enables exponential parallelism. This parallelism could
                 lead to exponentially faster quantum algorithms than
                 possible classically. The catch is that accessing the
                 results, which requires measurement, proves tricky and
                 requires new nontraditional programming techniques.
                 \par

                 The aim of this paper is to guide computer scientists
                 through the barriers that separate quantum computing
                 from conventional computing. We introduce basic
                 principles of quantum mechanics to explain where the
                 power of quantum computers comes from and why it is
                 difficult to harness. We describe quantum cryptography,
                 teleportation, and dense coding. Various approaches to
                 exploiting the power of quantum parallelism are
                 explained. We conclude with a discussion of quantum
                 error correction.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Algorithms; Security; Theory",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "complexity; parallelism; quantum computing",
  subject =      "General Literature --- Introductory and Survey (A.1);
                 Computer Applications --- Physical Sciences and
                 Engineering (J.2): {\bf Physics}",
}

@Article{Riezenman:2000:CSB,
  author =       "M. J. Riezenman",
  title =        "Cellular security: better, but foes still lurk",
  journal =      j-IEEE-SPECTRUM,
  volume =       "37",
  number =       "6",
  pages =        "39--42",
  month =        jun,
  year =         "2000",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/6.846096",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "authentication; Cellular networks; Cellular phones;
                 cellular radio; cellular security; Cloning; Costs;
                 Credit cards; electronic commerce; fingerprint
                 identification; fraud; handset; Instruments; Internet;
                 RF fingerprinting; Security; security issues; security
                 of data; service provider subsidies misapplication;
                 subscription fraud; Subscriptions; Telephone sets; user
                 identification",
}

@InProceedings{Rivest:2000:RA,
  author =       "Ronald L. Rivest and M. J. B. Robshaw and Yiqun Lisa
                 Yin",
  title =        "{RC6} as the {AES}",
  crossref =     "NIST:2000:TAE",
  pages =        "337--342",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Rosen:2000:NRC,
  author =       "Alon Rosen",
  title =        "A Note on the Round-Complexity of Concurrent
                 Zero-Knowledge",
  crossref =     "Bellare:2000:ACC",
  pages =        "451--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800451.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800451.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@Article{Rosenbaum:2000:SFR,
  author =       "Ren{\'e} Rosenbaum and Heidrun Schumann",
  title =        "A Steganographic Framework for Reference Colour Based
                 Encoding and Cover Image Selection",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1975",
  pages =        "30--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:08:57 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1975.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1975/19750030.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1975/19750030.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Rosenblatt:2000:CBE,
  author =       "A. Rosenblatt",
  title =        "{{\booktitle{The code book: the evolution of secrecy
                 from Mary Queen of Scots to quantum cryptography}}}
                 [Books]",
  journal =      j-IEEE-SPECTRUM,
  volume =       "37",
  number =       "10",
  pages =        "10--14",
  month =        oct,
  year =         "2000",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2000.873912",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Algorithm design and analysis; Books; Cultural
                 differences; Data privacy; Frequency; Machine
                 intelligence; Mathematics; Public key cryptography;
                 Quantum computing; Statistics",
}

@Manual{Roychowdhury:2000:PCJ,
  author =       "Vwani P. Roychowdhury",
  title =        "Practical cryptography: July 24--27, 2000, Engineering
                 819.311",
  publisher =    "Dept. of Engineering, Information Systems and
                 Technical Management, University of California, Los
                 Angeles",
  address =      "Los Angeles, CA, USA",
  pages =        "(various)",
  year =         "2000",
  LCCN =         "????",
  bibdate =      "Wed Feb 13 12:10:46 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Manual{RSA:2000:PCP,
  author =       "{RSA Laboratories}",
  title =        "{PKCS \#15}: Conformance Profile Specification",
  organization = pub-RSA,
  address =      pub-RSA:adr,
  pages =        "8",
  day =          "1",
  month =        aug,
  year =         "2000",
  bibdate =      "Mon Dec 08 08:20:23 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.rsasecurity.com/rsalabs/pkcs/pkcs-15/index.html",
  acknowledgement = ack-nhfb,
}

@Misc{RSA:2000:PKC,
  author =       "{RSA}",
  title =        "Public-Key Cryptography Standards",
  howpublished = "World-Wide Web site.",
  year =         "2000",
  bibdate =      "Mon Dec 08 08:03:51 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.rsasecurity.com/rsalabs/pkcs/",
  acknowledgement = ack-nhfb,
}

@Manual{RSA:2000:PVCa,
  author =       "{RSA Laboratories}",
  title =        "{PKCS \#10 v1.7}: Certification Request Syntax
                 Standard",
  organization = pub-RSA,
  address =      pub-RSA:adr,
  pages =        "10",
  day =          "26",
  month =        may,
  year =         "2000",
  bibdate =      "Mon Dec 08 08:20:23 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.rsasecurity.com/rsalabs/pkcs/pkcs-10/index.html",
  acknowledgement = ack-nhfb,
}

@Manual{RSA:2000:PVCb,
  author =       "{RSA Laboratories}",
  title =        "{PKCS \#15 v1.1}: Cryptographic Token Information
                 Syntax Standard",
  organization = pub-RSA,
  address =      pub-RSA:adr,
  pages =        "81",
  day =          "6",
  month =        jun,
  year =         "2000",
  bibdate =      "Mon Dec 08 08:20:23 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.rsasecurity.com/rsalabs/pkcs/pkcs-15/index.html",
  acknowledgement = ack-nhfb,
}

@Manual{RSA:2000:PVS,
  author =       "{RSA Laboratories}",
  title =        "{PKCS \#9 v2.0}: Selected Object Classes and Attribute
                 Types",
  organization = pub-RSA,
  address =      pub-RSA:adr,
  pages =        "34",
  day =          "25",
  month =        feb,
  year =         "2000",
  bibdate =      "Mon Dec 08 08:20:23 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.rsasecurity.com/rsalabs/pkcs/pkcs-9/index.html",
  acknowledgement = ack-nhfb,
}

@Article{Rubin:2000:KVL,
  author =       "Aviel D. Rubin",
  title =        "{Kerberos} Versus the {Leighton-Micali} Protocol",
  journal =      j-DDJ,
  volume =       "25",
  number =       "11",
  pages =        "21--22, 24, 26",
  month =        nov,
  year =         "2000",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Wed Nov 8 15:09:25 MST 2000",
  bibsource =    "http://www.ddj.com/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Although more complicated, the Leighton-Micali
                 protocol is more elegant, efficient, and secure than
                 the venerable Kerberos security protocol.",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Ryutov:2000:RESa,
  author =       "Tatyana Ryutov and Clifford Neuman",
  title =        "Representation and evaluation of security policies",
  journal =      j-OPER-SYS-REV,
  volume =       "34",
  number =       "2",
  pages =        "34--34",
  month =        apr,
  year =         "2000",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:42 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Ryutov:2000:RESb,
  author =       "Tatyana Ryutov and Clifford Neuman",
  title =        "Representation and evaluation of security policies
                 (poster session)",
  journal =      j-OPER-SYS-REV,
  volume =       "34",
  number =       "2",
  pages =        "41--41",
  month =        apr,
  year =         "2000",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:42 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Saeednia:2000:HMB,
  author =       "Shahrokh Saeednia",
  title =        "How to maintain both privacy and authentication in
                 digital libraries",
  journal =      j-INT-J-DIGIT-LIBR,
  volume =       "2",
  number =       "4",
  pages =        "251--258",
  month =        may,
  year =         "2000",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/PL00021469",
  ISSN =         "1432-1300 (print), 1432-5012 (electronic)",
  ISSN-L =       "1432-1300",
  bibdate =      "Tue May 7 07:43:18 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjdigitlibr.bib",
  URL =          "https://link.springer.com/article/10.1007/PL00021469",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Digit. Libr.",
  fjournal =     "International Journal on Digital Libraries",
  journal-URL =  "https://link.springer.com/journal/799",
}

@InProceedings{Safavi-Naini:2000:STT,
  author =       "Reihaneh Safavi-Naini and Yejing Wang",
  title =        "Sequential Traitor Tracing",
  crossref =     "Bellare:2000:ACC",
  pages =        "316--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800316.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800316.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@Article{Sakai:2000:NDS,
  author =       "Hideaki Sakai and Noriko Nakamura and Yoshihide
                 Igarashi",
  title =        "A new definition of semantic security for public-key
                 encryption schemes",
  journal =      "S\=urikaisekikenky\=usho K\=oky\=uroku",
  volume =       "1148",
  pages =        "112--117",
  year =         "2000",
  MRclass =      "94A62",
  MRnumber =     "1 799 822",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  note =         "Theoretical foundations of computer science: toward a
                 paradigm for computing in the 21st century (Japanese)
                 (Kyoto, 2000)",
  fjournal =     "S\=urikaisekikenky\=usho K\=oky\=uroku",
}

@InCollection{Sale:2000:CBP,
  author =       "Anthony E. Sale",
  title =        "The {Colossus of Bletchley Park}: the {German} cipher
                 system",
  crossref =     "Rojas:2000:FCH",
  pages =        "351--364",
  year =         "2000",
  bibdate =      "Sat Nov 20 21:08:08 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Sale:2000:CGL,
  author =       "Anthony E. Sale",
  title =        "{Colossus} and the {German Lorenz} Cipher --- Code
                 Breaking in {WW II}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1807",
  pages =        "417--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1807.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1807/18070417.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1807/18070417.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Sano:2000:PEA,
  author =       "Fumihiko Sano and Masanobu Koike and Shinichi Kawamura
                 and Masue Shiba",
  title =        "Performance Evaluation of {AES} Finalists on the
                 High-End {Smart Card}",
  crossref =     "NIST:2000:TAE",
  pages =        "82--93",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Sarkar:2000:CNB,
  author =       "Palash Sarkar and Subhamoy Maitra",
  title =        "Construction of Nonlinear {Boolean} Functions with
                 Important Cryptographic Properties",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1807",
  pages =        "485--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1807.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1807/18070485.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1807/18070485.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Sarkar:2000:NBC,
  author =       "Palash Sarkar and Subhamoy Maitra",
  title =        "Nonlinearity Bounds and Constructions of Resilient
                 {Boolean} Functions",
  crossref =     "Bellare:2000:ACC",
  pages =        "515--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800515.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800515.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@InProceedings{Satoh:2000:HSM,
  author =       "Akashi Satoh and Nobuyuki Ooba and Kohji Takano and
                 Edward D'Avignon",
  title =        "High-Speed {MARS} Hardware",
  crossref =     "NIST:2000:TAE",
  pages =        "305--316",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Schneier:2000:AAR,
  author =       "Bruce Schneier",
  title =        "Abstracts of {AES}-related Papers from the {Fast
                 Software Encryption Workshop (FSE) 2000}",
  crossref =     "NIST:2000:TAE",
  pages =        "9--10",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Schneier:2000:CTA,
  author =       "Bruce Schneier and John Kelsey and Doug Whiting and
                 David Wagner and Niels Ferguson",
  title =        "Comments on {Twofish} as an {AES} Candidate",
  crossref =     "NIST:2000:TAE",
  pages =        "355--356",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Schneier:2000:IRS,
  author =       "Bruce Schneier",
  title =        "Inside risks: semantic network attacks",
  journal =      j-CACM,
  volume =       "43",
  number =       "12",
  pages =        "168--168",
  month =        dec,
  year =         "2000",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Feb 05 16:53:17 2001",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See letters
                 \cite{Crawford:2001:FHC,Crawford:2001:FPV}.",
  URL =          "http://www.acm.org/pubs/citations/journals/cacm/2000-43-12/p168-schneier/",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@InProceedings{Schneier:2000:PCF,
  author =       "Bruce Schneier and Doug Whiting",
  title =        "A Performance Comparison of the Five {AES} Finalists",
  crossref =     "NIST:2000:TAE",
  pages =        "123--135",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Schneier:2000:SLD,
  author =       "Bruce Schneier",
  title =        "Secrets and Lies: Digital Security in a Networked
                 World",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xv + 412",
  year =         "2000",
  ISBN =         "0-471-25311-1",
  ISBN-13 =      "978-0-471-25311-2",
  LCCN =         "QA76.9.A25 S352 2000",
  bibdate =      "Wed Sep 20 16:28:33 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$29.99",
  acknowledgement = ack-nhfb,
}

@Article{Schneier:2000:SRF,
  author =       "Bruce Schneier",
  title =        "Security Research and the Future",
  journal =      j-DDJ,
  volume =       "25",
  number =       "12 (supplement)",
  pages =        "33--35",
  month =        dec,
  year =         "2000",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Wed Nov 08 18:09:45 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
  keywords =     "cryptography",
}

@InCollection{Schnorr:2000:SSE,
  author =       "Claus Peter Schnorr and Markus Jakobsson",
  booktitle =    "Advances in cryptology---ASIACRYPT 2000 (Kyoto)",
  title =        "Security of Signed {ElGamal} Encryption",
  volume =       "1976",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "73--89",
  year =         "2000",
  MRclass =      "94A60",
  MRnumber =     "2002h:94067",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1976.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  series =       "Lecture Notes in Comput. Sci.",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1976/19760073.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1976/19760073.pdf",
}

@Book{Sebag-Montefiore:2000:EBC,
  author =       "Hugh Sebag-Montefiore",
  title =        "{Enigma}: the battle for the code",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "x + 422",
  year =         "2000",
  ISBN =         "0-471-40738-0 (cloth)",
  ISBN-13 =      "978-0-471-40738-6 (cloth)",
  LCCN =         "D810.C88 S43 2000",
  bibdate =      "Sat Dec 17 17:34:41 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/bios/wiley043/00043920.html;
                 http://www.loc.gov/catdir/description/wiley035/00043920.html;
                 http://www.loc.gov/catdir/toc/onix06/00043920.html",
  acknowledgement = ack-nhfb,
  subject =      "Enigma cipher system; History; World War, 1939--1945;
                 Cryptography",
}

@Article{Sebe:2000:SDI,
  author =       "Francesc Seb{\'e} and Josep Domingo-Ferrer and Jordi
                 Herrera",
  title =        "Spatial-Domain Image Watermarking Robust against
                 Compression, Filtering, Cropping and Scaling",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1975",
  pages =        "44--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:08:57 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1975.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1975/19750044.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1975/19750044.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Seifried:2000:C,
  author =       "Kurt Seifried",
  title =        "{Crypto 101}",
  journal =      j-SYS-ADMIN,
  volume =       "9",
  number =       "5",
  pages =        "16, 20, 22, 24, 26--27",
  month =        may,
  year =         "2000",
  CODEN =        "SYADE7",
  ISSN =         "1061-2688",
  bibdate =      "Wed Apr 26 16:13:37 MDT 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.samag.com/",
  abstract =     "Seifried provides an overview of cryptography and an
                 introduction to Open Source cryptographic software.",
  acknowledgement = ack-nhfb,
  fjournal =     "Sys admin: the journal for UNIX system
                 administrators",
}

@Article{Seifried:2000:PPA,
  author =       "Kurt Seifried",
  title =        "{PAM} --- {Pluggable Authentication Modules}",
  journal =      j-SYS-ADMIN,
  volume =       "9",
  number =       "9",
  pages =        "8, 10, 12, 14",
  month =        sep,
  year =         "2000",
  CODEN =        "SYADE7",
  ISSN =         "1061-2688",
  bibdate =      "Wed Oct 18 18:03:13 MDT 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.samag.com/",
  abstract =     "PAM provides the backbone of most authentication in
                 modern Linux systems, yet it is typically ignored and
                 underutilized. Seifried explains how it works.",
  acknowledgement = ack-nhfb,
  fjournal =     "Sys admin: the journal for UNIX system
                 administrators",
}

@Article{Selcuk:2000:BEL,
  author =       "Ali Ayd{\i}n Sel{\c{c}}uk",
  booktitle =    "Progress in cryptology---INDOCRYPT 2000 (Calcutta)",
  title =        "On bias estimation in linear cryptanalysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1977",
  pages =        "52--66",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "2002h:94068",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Semanko:2000:CAA,
  author =       "Michael Semanko",
  title =        "{L}-collision Attacks against Randomized {MACs}",
  crossref =     "Bellare:2000:ACC",
  pages =        "216--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800216.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800216.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@InCollection{Shin:2000:ANT,
  author =       "Sang Uk Shin and Kyung Hyune Rhee",
  booktitle =    "Public key cryptography (Melbourne, 2000)",
  title =        "All-or-nothing transform and remotely keyed encryption
                 protocols",
  volume =       "1751",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "178--195",
  year =         "2000",
  MRclass =      "94A60",
  MRnumber =     "1 864 779",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  series =       "Lecture Notes in Comput. Sci.",
}

@Article{Shoup:2000:CTU,
  author =       "Victor Shoup",
  title =        "A Composition Theorem for Universal One-Way Hash
                 Functions",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1807",
  pages =        "445--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1807.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1807/18070445.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1807/18070445.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Shoup:2000:UHF,
  author =       "Victor Shoup",
  title =        "Using Hash Functions as a Hedge against Chosen
                 Ciphertext Attack",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1807",
  pages =        "275--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:16:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1807.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1807/18070275.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1807/18070275.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Singh:2000:CBE,
  author =       "Simon Singh",
  title =        "The code book: the evolution of secrecy from Ancient
                 {Egypt} to quantum cryptography",
  publisher =    pub-ANCHOR,
  address =      pub-ANCHOR:adr,
  pages =        "xvii + 411",
  year =         "2000",
  ISBN =         "0-385-49532-3",
  ISBN-13 =      "978-0-385-49532-5",
  LCCN =         "Z103 .S56 1999",
  bibdate =      "Mon Dec 06 16:25:40 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See also \cite{Almgren:2000:HWC}.",
  price =        "US\$15.00",
  acknowledgement = ack-nhfb,
  xxnote =       "Check year: some catalogs have 1999, others 2000.
                 Check publisher: some have Anchor Books, others
                 Delacorte Press. See also
                 \cite{Singh:1999:CBE,Singh:2002:CBH}.",
}

@Article{Smith:2000:ABS,
  author =       "Tim Smith",
  title =        "Authentication by biometric smart card",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "6",
  pages =        "5--5",
  day =          "1",
  month =        jun,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)06011-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:57 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800060116",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Smith:2000:CIR,
  author =       "Michael Smith and Paul {Van Oorschot} and Michael
                 Willett",
  title =        "Cryptographic Information Recovery Using Key
                 Recovery",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "21--27",
  day =          "1",
  month =        jan,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800863580",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Song:2000:TPA,
  author =       "Boyeon Song and Kwangjo Kim",
  title =        "Two-Pass Authenticated Key Agreement Protocol with Key
                 Confirmation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1977",
  pages =        "237--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:08:57 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1977.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1977/19770237.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1977/19770237.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Sonntag:2000:MAS,
  author =       "Michael Sonntag and Rudolf H{\"o}rmanseder",
  title =        "Mobile agent security based on payment",
  journal =      j-OPER-SYS-REV,
  volume =       "34",
  number =       "4",
  pages =        "48--55",
  month =        oct,
  year =         "2000",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:52 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@TechReport{Soto:2000:RTA,
  author =       "Juan Soto and Lawrence E. Bassham",
  title =        "Randomness Testing of the {Advanced Encryption
                 Standard} Finalist Candidates",
  type =         "NIST internal report",
  number =       "6483",
  institution =  pub-NIST,
  address =      pub-NIST:adr,
  month =        apr,
  year =         "2000",
  LCCN =         "DOC C 13.58:6483 mf11 Microcopy",
  bibdate =      "Mon Dec 08 07:51:45 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "NISTIR",
  URL =          "http://csrc.nist.gov/rng/aes-report-final.doc",
  acknowledgement = ack-nhfb,
  keywords =     "data encryption (computer science)",
}

@Article{Stallings:2000:SSC,
  author =       "William Stallings",
  title =        "The {SET Standard} and {E}-Commerce",
  journal =      j-DDJ,
  volume =       "25",
  number =       "11",
  pages =        "30, 32, 34, 36",
  month =        nov,
  year =         "2000",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Wed Nov 8 15:09:25 MST 2000",
  bibsource =    "http://www.ddj.com/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The Secure Electronic Transaction (SET) is an open
                 encryption and security specification designed to
                 protect credit-card transactions on the Internet.",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@InProceedings{Steinwandt:2000:WHS,
  author =       "Rainer Steinwandt and Markus Grassl and Willi
                 Geiselmann and Thomas Beth",
  title =        "Weaknesses in the $ \mathrm {SL}_2 (\bbb {F}_{2^n}) $
                 Hashing Scheme",
  crossref =     "Bellare:2000:ACC",
  pages =        "287--299",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800287.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800287.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@InProceedings{Sterbenz:2000:PAC,
  author =       "Andreas Sterbenz and Peter Lipp",
  title =        "Performance of the {AES} Candidate Algorithms in
                 {Java}",
  crossref =     "NIST:2000:TAE",
  pages =        "161--168",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Sterlicchi:2000:SCD,
  author =       "John Sterlicchi",
  title =        "Software companies disappointed by encryption draft",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "1",
  pages =        "4--4",
  month =        jan,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)86647-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:49 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800866477",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{StPierre:2000:TFA,
  author =       "Jim {St. Pierre}",
  title =        "Two-factor authentication added to {PKI} solutions",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "5",
  pages =        "6--6",
  day =          "1",
  month =        may,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)05018-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:55 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800050182",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@InProceedings{Sugita:2000:RAD,
  author =       "Makoto Sugita and Kazukuni Kobara and Kazuhiro Uehara
                 and Shuji Kubota and Hideki Imai",
  title =        "Relationships among Differential, Truncated
                 Differential, Impossible Differential Cryptanalyses
                 against Word-Oriented Block Ciphers like {RIJNDAEL},
                 {E2}",
  crossref =     "NIST:2000:TAE",
  pages =        "242--256",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Sun:2000:AFA,
  author =       "Yongxing Sun and Xinmei Wang",
  title =        "An approach to finding the attacks on the
                 cryptographic protocols",
  journal =      j-OPER-SYS-REV,
  volume =       "34",
  number =       "3",
  pages =        "19--28",
  month =        jul,
  year =         "2000",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:47 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Sun:2000:DRR,
  author =       "H.-M.-Min Sun",
  title =        "On the Dealer's Randomness Required in Perfect Secret
                 Sharing Schemes with Access Structures of Constant
                 Rank",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "11",
  number =       "2",
  pages =        "263--282",
  year =         "2000",
  CODEN =        "IFCSEN",
  ISSN =         "0129-0541 (print), 1793-6373 (electronic)",
  ISSN-L =       "0129-0541",
  bibdate =      "Tue Jan 27 08:06:49 MST 2004",
  bibsource =    "http://ejournals.wspc.com.sg/ijfcs/;
                 http://ejournals.wspc.com.sg/ijfcs/mkt/archive.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 OCLC Article1st database",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Sun:2000:ESM,
  author =       "Hung-Min Sun",
  title =        "Enhancing the security of the {McEliece} public-key
                 cryptosystem",
  journal =      j-J-INFO-SCI-ENG,
  volume =       "16",
  number =       "6",
  pages =        "799--812",
  year =         "2000",
  CODEN =        "JINEEY",
  ISSN =         "1016-2364",
  MRclass =      "94A62",
  MRnumber =     "2001m:94050",
  MRreviewer =   "J. D{\'e}nes",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "JISE. Journal of Information Science and Engineering",
}

@Article{Sung:2000:PSS,
  author =       "Jaechul Sung and Sangjin Lee and Jongin Lim and
                 Seokhie Hong and Sangjoon Park",
  booktitle =    "Advances in cryptology---ASIACRYPT 2000 (Kyoto)",
  title =        "Provable security for the {Skipjack}-like structure
                 against differential cryptanalysis and linear
                 cryptanalysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1976",
  pages =        "274--288",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "2002h:94069",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Susilo:2000:NEF,
  author =       "Willy Susilo and Rei Safavi-Naini and Marc Gysin and
                 Jennifer Seberry",
  title =        "A New and Efficient Fail-stop Signature Scheme",
  journal =      j-COMP-J,
  volume =       "43",
  number =       "5",
  pages =        "430--437",
  month =        "????",
  year =         "2000",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Sat Dec 23 14:12:23 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_43/Issue_05/",
  URL =          "http://www3.oup.co.uk/computer_journal/hdb/Volume_43/Issue_05/430430.sgm.abs.html;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_43/Issue_05/pdf/430430.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Syed:2000:CLA,
  author =       "Furqan Syed",
  title =        "Children of {DES}: a Look at the {Advanced Encryption
                 Standard}",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "9",
  pages =        "11--12",
  day =          "1",
  month =        sep,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)09026-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:01 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800090267",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Tahir:2000:RCM,
  author =       "Farasat Tahir and Muhammad Tahir",
  title =        "{RSA} ciphers with {Maple}",
  journal =      "Punjab Univ. J. Math. (Lahore)",
  volume =       "33",
  pages =        "145--152",
  year =         "2000",
  ISSN =         "1016-2526",
  MRclass =      "94A60",
  MRnumber =     "MR1895055",
  bibdate =      "Sat Apr 16 17:32:47 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "The Punjab University. Journal of Mathematics",
}

@InProceedings{Takano:2000:PTH,
  author =       "Kohji Takano and Akashi Satoh and Nobuyuki Ohba",
  title =        "Poster 5: {TATSU} --- Hardware Accelerator for
                 Public-Key Cryptography Using {Montgomery} Method",
  crossref =     "Anonymous:2000:CCI",
  pages =        "??--??",
  year =         "2000",
  bibdate =      "Mon Jan 08 05:28:04 2001",
  bibsource =    "http://www.coolchips.org/index-cool3.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Tao:2000:ITF,
  author =       "Renji Tao and Shihua Chen",
  title =        "Input-trees of finite automata and application to
                 cryptanalysis",
  journal =      "J. Comput. Sci. Tech.",
  volume =       "15",
  number =       "4",
  pages =        "305--325",
  year =         "2000",
  CODEN =        "JCTEEM",
  ISSN =         "1000-9000",
  MRclass =      "68Q45 (94A60)",
  MRnumber =     "2001e:68108",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Journal of Computer Science and Technology",
}

@Article{Tochikubo:2000:RAE,
  author =       "Kouya Tochikubo and Koji Okada and Naoki Endoh and
                 Eiji Okamoto",
  title =        "Renewable authentication and encryption systems",
  journal =      j-TRANS-INFO-PROCESSING-SOC-JAPAN,
  volume =       "41",
  number =       "8",
  pages =        "2121--2127",
  year =         "2000",
  CODEN =        "JSGRD5",
  ISSN =         "0387-5806",
  ISSN-L =       "0387-5806",
  MRclass =      "94A62",
  MRnumber =     "2001i:94066",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  fjournal =     "IPSJ Journal",
}

@Article{Totsch:2000:MSS,
  author =       "David Totsch",
  title =        "Managing {SUID\slash SGID} Files",
  journal =      j-SYS-ADMIN,
  volume =       "9",
  number =       "9",
  pages =        "60, 62--63, 65",
  month =        sep,
  year =         "2000",
  CODEN =        "SYADE7",
  ISSN =         "1061-2688",
  bibdate =      "Wed Oct 18 18:03:13 MDT 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.samag.com/",
  abstract =     "Normally, the SUID bit gives ordinary users the
                 ability to perform functions like changing their own
                 passwords. However, a cracker may expend significant
                 effort to set the same bit on a covert copy of a shell.
                 As admins, we need to discern between the mild mannered
                 and sinister files.",
  acknowledgement = ack-nhfb,
  fjournal =     "Sys admin: the journal for UNIX system
                 administrators",
}

@Article{Tousidou:2000:IMS,
  author =       "Eleni Tousidou and Alex Nanopoulos and Yannis
                 Manolopoulos",
  title =        "Improved Methods for Signature-Tree Construction",
  journal =      j-COMP-J,
  volume =       "43",
  number =       "4",
  pages =        "301--314",
  month =        "????",
  year =         "2000",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Nov 14 07:02:08 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_43/Issue_04/",
  URL =          "http://www3.oup.co.uk/computer_journal/hdb/Volume_43/Issue_04/430301.sgm.abs.html;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_43/Issue_04/pdf/430301.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@InProceedings{Ulfving:2000:GS,
  author =       "Lars Ulfving and Frode Weierud",
  title =        "The {Geheimschreiber} Secret",
  crossref =     "Joyner:2000:CTC",
  pages =        "??--??",
  year =         "2000",
  bibdate =      "Mon Nov 07 18:23:52 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{USC:2000:HRS,
  author =       "{United States Congress}",
  title =        "{H.R. 850, the Security and Freedom through Encryption
                 (SAFE) Act: Markup before the Committee on
                 International Relations, House of Representatives, One
                 Hundred Sixth Congress, first session, Tuesday, July
                 13, 1999}",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "iii + 102",
  year =         "2000",
  ISBN =         "0-16-060340-4, 0-16-060340-4",
  ISBN-13 =      "978-0-16-060340-2, 978-0-16-060340-2",
  LCCN =         "KF27.I53 106th",
  bibdate =      "Wed Sep 28 08:32:47 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Manual{USHCAS:2000:UEP,
  author =       "{United States Congress.House Committee on Armed
                 Services}",
  title =        "{U.S.} encryption policy: hearing before the
                 {Committee on Armed Services, House of Representatives,
                 One Hundred Sixth Congress, first session: hearings
                 held July 1, 13, 1999}",
  number =       "H.A.S.C. no. 106-16",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "iv + 195",
  year =         "2000",
  ISBN =         "0-16-060018-9",
  ISBN-13 =      "978-0-16-060018-0",
  LCCN =         "Y 4.AR 5/2 A:999-2000/16 Govt Pub; J61 .A752 106th
                 no.16",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "H.A.S.C. no. 106-16.",
  acknowledgement = ack-nhfb,
  keywords =     "computer software --- law and legislation --- United
                 States; computers --- access control --- United States;
                 data encryption (computer science) --- law and
                 legislation --- United States; export controls ---
                 United States; national security --- United States",
}

@Manual{USHCIR:2000:ESH,
  author =       "{United States Congress.House Committee on
                 International Relations.Subcommittee on International
                 Economic Policy and Trade}",
  title =        "{Encryption security in a high tech era: hearing
                 before the Subcommittee on International Economic
                 Policy and Trade of the Committee on International
                 Relations, House of Representatives, One Hundred Sixth
                 Congress, first session, Tuesday, May 18, 1999}",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "iii + 60",
  year =         "2000",
  ISBN =         "0-16-060699-3",
  ISBN-13 =      "978-0-16-060699-1",
  LCCN =         "KF27.I53 106th",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Serial no. 106-108. Shipping list no.: 2000-0319-P.",
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control --- United States; data
                 encryption (computer science) --- United States; export
                 controls --- United States",
}

@Manual{USHCIR:2000:HES,
  author =       "{United States Congress.House Committee on
                 International Relations}",
  title =        "{106-1 Hearing: Encryption Security in a High Tech
                 Era, May 18, 1999}",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  year =         "2000",
  LCCN =         "DOC Y 4.IN 8/16:SE 2/9 Gov Info Stacks",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Shipping List \#: 2000-0319-P. Shipping List Date:
                 07/31/2000.",
  acknowledgement = ack-nhfb,
}

@Manual{USHCIR:2000:HSF,
  author =       "{United States Congress.House Committee on
                 International Relations}",
  title =        "{H.R. 850, the Security and Freedom through Encryption
                 (SAFE) Act: markup before the Committee on
                 International Relations, House of Representatives, One
                 Hundred Sixth Congress, first session, Tuesday, July
                 13, 1999}",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "iii + 102",
  year =         "2000",
  ISBN =         "0-16-060340-4",
  ISBN-13 =      "978-0-16-060340-2",
  LCCN =         "KF27.I53 106th",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Shipping list no.: 2000-0214-P",
  acknowledgement = ack-nhfb,
  keywords =     "computer software --- law and legislation --- United
                 States; computers --- access control --- United States;
                 data encryption (computer science) --- law and
                 legislation --- United States; export controls ---
                 United States",
}

@Manual{USHCIR:2000:MHS,
  author =       "{United States Congress.House Committee on
                 International Relations}",
  title =        "{106-1 Markup: H.R. 850, The Security And Freedom
                 Through Encryption (SAFE) Act, July 13, 1999}",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  year =         "2000",
  LCCN =         "Y 4.IN 8/16:SE 2/4/999 Gov Pubs US Docs",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Shipping List \#: 2000-0214-P. Shipping List Date:
                 04/20/2000.",
  acknowledgement = ack-nhfb,
}

@Manual{USHCJ:2000:HSF,
  author =       "{United States Congress.House Committee on the
                 Judiciary}",
  title =        "{106-1 Hearing: Security And Freedom Through
                 Encryption, (SAFE) Act, Serial No. 34, March 4, 1999}",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  year =         "2000",
  LCCN =         "Y 4.J 89/1:106/34 Gov Pubs US Docs",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Shipping List \#: 2000-0275-P. Shipping List Date:
                 06/21/2000.",
  acknowledgement = ack-nhfb,
}

@Manual{USHCJ:2000:SFT,
  author =       "{United States Congress.House Committee on the
                 Judiciary.Subcommittee on Courts and Intellectual
                 Property}",
  title =        "{Security and Freedom through Encryption (SAFE) Act:
                 hearing before the Subcommittee on Courts and
                 Intellectual Property of the Committee on the
                 Judiciary, House of Representatives, One Hundred Sixth
                 Congress, first session, on H.R. 850, March 4, 1999}",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "iv + 169",
  year =         "2000",
  ISBN =         "0-16-060600-4",
  ISBN-13 =      "978-0-16-060600-7",
  LCCN =         "KF27.J8 106th",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Serial no. 34. Shipping list no.: 2000-0275-P",
  acknowledgement = ack-nhfb,
  keywords =     "computer software --- law and legislation --- United
                 States; computers --- access control --- United States;
                 data encryption (computer science) --- law and
                 legislation --- United States; export controls ---
                 United States",
}

@Book{vanTilborg:2000:FCP,
  author =       "Henk C. A. van Tilborg",
  title =        "Fundamentals of cryptology: a professional reference
                 and interactive tutorial",
  volume =       "SECS 528",
  publisher =    pub-KLUWER,
  address =      pub-KLUWER:adr,
  pages =        "xiv + 490",
  year =         "2000",
  ISBN =         "0-7923-8675-2",
  ISBN-13 =      "978-0-7923-8675-9",
  LCCN =         "QA76.9.A25 T53 2000 Accompanying CD-Rom shelved in
                 Reserves",
  bibdate =      "Mon Oct 16 09:48:58 MDT 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "The Kluwer international series in engineering and
                 computer science",
  acknowledgement = ack-nhfb,
  annote =       "Updated and improved version of ``An introduction to
                 cryptology''. 1988. Accompanied by a full text
                 electronic version on CD-ROM as an interactive
                 Mathematica manuscript.",
  keywords =     "computers --- access control; cryptography",
}

@Article{Wagner:2000:CYL,
  author =       "David Wagner",
  booktitle =    "Advances in cryptology---ASIACRYPT 2000 (Kyoto)",
  title =        "Cryptanalysis of the {Yi-Lam} hash",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1976",
  pages =        "483--488",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "2002h:94071",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wallach:2000:SSM,
  author =       "Dan S. Wallach and Andrew W. Appel and Edward W.
                 Felten",
  title =        "{SAFKASI}: a security mechanism for language-based
                 systems",
  journal =      j-TOSEM,
  volume =       "9",
  number =       "4",
  pages =        "341--378",
  month =        oct,
  year =         "2000",
  CODEN =        "ATSMER",
  ISSN =         "1049-331X (print), 1557-7392 (electronic)",
  ISSN-L =       "1049-331X",
  bibdate =      "Fri Apr 20 08:21:35 MDT 2001",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosem.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/tosem/2000-9-4/p341-wallach/p341-wallach.pdf;
                 http://www.acm.org/pubs/citations/journals/tosem/2000-9-4/p341-wallach/",
  abstract =     "In order to run untrusted code in the same process as
                 trusted code, there must be a mechanism to allow
                 dangerous calls to determine if their caller is
                 authorized to exercise the privilege of using the
                 dangerous routine. Java systems have adopted a
                 technique called stack inspection to address this
                 concern. But its original definition, in terms of
                 searching stack frames, had an unclear relationship to
                 the actual achievement of security, overconstrained the
                 implementation of a Java system, limited many desirable
                 optimizations such as method inlining and tail
                 recursion, and generally interfered with
                 interprocedural optimization. We present a new
                 semantics for stack inspection based on a belief logic
                 and its implementation using the calculus of {\em
                 security-passing style\/} which addresses the concerns
                 of traditional stack inspection. With security-passing
                 style, we can efficiently represent the security
                 context for any method activation, and we can build a
                 new implementation strictly by rewriting the Java
                 bytecodes before they are loaded by the system. No
                 changes to the JVM or bytecode semantics are necessary.
                 With a combination of static analysis and runtime
                 optimizations, our prototype implementation shows
                 reasonable performance (although traditional stack
                 inspection is still faster), and is easier to consider
                 for languages beyond Java. We call our system SAFKASI
                 (the Security Architecture Formerly Known as Stack
                 Inspection).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Software Engineering and
                 Methodology",
  generalterms = "Design; Languages; Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J790",
  keywords =     "access control; applets; Internet; Java;
                 security-passing style; stack inspection; WWW",
  subject =      "Software --- Programming Techniques ---
                 Object-oriented Programming (D.1.5); Software ---
                 Software Engineering --- General (D.2.0): {\bf
                 Protection mechanisms}; Software --- Programming
                 Languages --- Language Classifications (D.3.2): {\bf
                 Object-oriented languages}; Software --- Operating
                 Systems --- Security and Protection (D.4.6): {\bf
                 Access controls}; Software --- Operating Systems ---
                 Security and Protection (D.4.6): {\bf Authentication}",
}

@Article{Walsh:2000:BRM,
  author =       "Gary Walsh",
  title =        "Book review: {{\em The Mathematics of Ciphers, Number
                 Theory and RSA Cryptography}}",
  journal =      j-MATH-COMPUT,
  volume =       "69",
  number =       "231",
  pages =        "1314--1315",
  month =        jul,
  year =         "2000",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (print), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Wed Nov 1 11:50:05 MST 2000",
  bibsource =    "http://www.ams.org/mcom/2000-69-231;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ams.org/mcom/2000-69-231/S0025-5718-00-01249-7/bookrev-S0025-5718-00-01249-7.html;
                 http://www.ams.org/mcom/2000-69-231/S0025-5718-00-01249-7/S0025-5718-00-01249-7.dvi;
                 http://www.ams.org/mcom/2000-69-231/S0025-5718-00-01249-7/S0025-5718-00-01249-7.pdf;
                 http://www.ams.org/mcom/2000-69-231/S0025-5718-00-01249-7/S0025-5718-00-01249-7.ps;
                 http://www.ams.org/mcom/2000-69-231/S0025-5718-00-01249-7/S0025-5718-00-01249-7.tex",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
}

@InCollection{Wardlaw:2000:RPK,
  author =       "William P. Wardlaw",
  booktitle =    "Coding theory and cryptography (Annapolis, MD, 1998)",
  title =        "The {RSA} public key cryptosystem",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "101--123",
  year =         "2000",
  MRclass =      "94A60",
  MRnumber =     "1 749 520",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
}

@InProceedings{Weaver:2000:CAC,
  author =       "Nicholas Weaver and John Wawrzynek",
  title =        "A Comparison of the {AES} Candidates Amenability to
                 {FPGA} Implementation",
  crossref =     "NIST:2000:TAE",
  pages =        "28--39",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Weeks:2000:HPS,
  author =       "Bryan Weeks and Mark Bean and Tom Rozylowicz and Chris
                 Ficke",
  title =        "Hardware Performance Simulations of Round 2 {Advanced
                 Encryption Standard} Algorithms",
  crossref =     "NIST:2000:TAE",
  pages =        "286--304",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Wehde:2000:IME,
  author =       "Ed Wehde",
  title =        "{IBM}, {Microsoft} in encryption effort",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "2",
  pages =        "5--5",
  day =          "1",
  month =        feb,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)87654-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:51 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800876540",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@InProceedings{Weierud:2000:SFB,
  author =       "Frode Weierud",
  title =        "{Sturgeon}, The {FISH BP} Never Really Caught",
  crossref =     "Joyner:2000:CTC",
  pages =        "??--??",
  year =         "2000",
  bibdate =      "Mon Nov 07 18:24:29 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Weiss:2000:CAC,
  author =       "Richard Weiss and Nathan Binkert",
  title =        "A comparison of {AES} candidates on the {Alpha
                 21264}",
  crossref =     "NIST:2000:TAE",
  pages =        "75--81",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Wiener:2000:AAH,
  author =       "Michael J. Wiener",
  title =        "Algorithm Alley: High-Speed Cryptography with the
                 {RSA} Algorithm",
  journal =      j-DDJ,
  volume =       "25",
  number =       "2",
  pages =        "123--126",
  month =        feb,
  year =         "2000",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Nov 9 08:25:13 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/ftp/2000/2000_02/aa220.txt",
  abstract =     "Michael presents some key optimizations (with
                 source-code examples) that can be made to make RSA
                 algorithm as fast as possible. Additional resources
                 include aa220.txt (listings).",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Book{Winterbotham:2000:USI,
  author =       "F. W. (Frederick William) Winterbotham",
  title =        "The {Ultra} secret: the inside story of {Operation
                 Ultra}, {Bletchley Park} and {Enigma}",
  publisher =    "Orion",
  address =      "London, UK",
  pages =        "xv + 199",
  year =         "2000",
  ISBN =         "0-7528-3751-6",
  ISBN-13 =      "978-0-7528-3751-2",
  LCCN =         "????",
  bibdate =      "Mon Sep 3 18:06:08 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 library.ox.ac.uk:210/ADVANCE",
  acknowledgement = ack-nhfb,
  author-dates = "1897--1990",
  remark =       "Originally published: London: Weidenfeld and Nicolson,
                 1974.",
  subject =      "World War, 1939-1945; Electronic intelligence; Great
                 Britain; Secret service; Cryptography",
}

@InProceedings{Wollinger:2000:HWH,
  author =       "Thomas J. Wollinger and Min Wang and Jorge Guajardo
                 and Christof Paar",
  title =        "How Well Are High-End {DSPs} Suited for the {AES}
                 Algorithms? {AES} Algorithms on the {TMS320C6x DSP}",
  crossref =     "NIST:2000:TAE",
  pages =        "94--105",
  year =         "2000",
  bibdate =      "Wed Feb 07 19:03:41 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Wong:2000:SGC,
  author =       "Chung Kei Wong and Mohamed Gouda and Simon S. Lam",
  title =        "Secure group communications using key graphs",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "8",
  number =       "1",
  pages =        "16--30",
  month =        feb,
  year =         "2000",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/90.836475",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Sat Oct 28 17:15:07 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/ton/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/ton/2000-8-1/p16-wong/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
  keywords =     "confidentiality; group communications; group key
                 management; key distribution; multicast; privacy;
                 rekeying; security",
  subject =      "Computer Systems Organization ---
                 Computer-Communication Networks --- General (C.2.0):
                 {\bf Security and protection (e.g., firewalls)}",
}

@Article{Wool:2000:KME,
  author =       "Avishai Wool",
  title =        "Key Management for Encrypted Broadcast",
  journal =      j-TISSEC,
  volume =       "3",
  number =       "2",
  pages =        "107--134",
  month =        may,
  year =         "2000",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Mon Feb 25 16:47:22 MST 2002",
  bibsource =    "http://www.acm.org/tissec/v3no2.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@InProceedings{Worley:2000:AFP,
  author =       "John Worley and Bill Worley and Tom Christian and
                 Christopher Worley",
  title =        "{AES} Finalists on {PA-RISC} and {IA-64}:
                 Implementations {\&} Performance",
  crossref =     "NIST:2000:TAE",
  pages =        "57--74",
  year =         "2000",
  bibdate =      "Tue Jan 23 13:29:28 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/conf/aes/aes2000.html#WorleyWCW00;
                 https://www.math.utah.edu/pub/mirrors/ftp.ira.uka.de/bibliography/Theory/qc.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  oldlabel =     "WorleyWCW00",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#conf/aes/WorleyWCW00",
}

@Article{Wright:2000:IQC,
  author =       "Marie A. Wright",
  title =        "The Impact of Quantum Computing on Cryptography",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "9",
  pages =        "13--15",
  day =          "1",
  month =        sep,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)09027-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:01 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800090279",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Wu:2000:PKC,
  author =       "Chuan-Kun Wu and Vijay Varadharajan",
  title =        "Public key cryptosystems based on {Boolean}
                 permutations and their applications",
  journal =      j-INT-J-COMPUT-MATH,
  volume =       "74",
  number =       "2",
  pages =        "167--184",
  year =         "2000",
  CODEN =        "IJCMAT",
  ISSN =         "0020-7160",
  ISSN-L =       "0020-7160",
  MRclass =      "94A60",
  MRnumber =     "2001a:94027",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "International Journal of Computer Mathematics",
}

@Article{Yamamura:2000:QCB,
  author =       "Akihiro Yamamura and Hirokazu Ishizuka",
  title =        "Quantum cryptanalysis of block ciphers",
  journal =      "S\=urikaisekikenky\=usho K\=oky\=uroku",
  volume =       "1166",
  pages =        "235--243",
  year =         "2000",
  MRclass =      "81P68 (94A60)",
  MRnumber =     "1 805 390",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Algebraic systems, formal languages and computations
                 (Japanese) (Kyoto, 2000)",
  fjournal =     "S\=urikaisekikenky\=usho K\=oky\=uroku",
}

@Book{Yan:2000:NTC,
  author =       "S. Y. Yan",
  title =        "Number Theory for Computing",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "256 (est.)",
  year =         "2000",
  ISBN =         "0-387-65472-0",
  ISBN-13 =      "978-0-387-65472-0",
  LCCN =         "????",
  bibdate =      "Wed Mar 14 08:32:42 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$46.00",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; discrete logarithms; elliptic curves",
}

@Article{Yen:2000:CBO,
  author =       "Sung-Ming Yen and M. Joye",
  title =        "Checking before output may not be enough against
                 fault-based cryptanalysis",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "49",
  number =       "9",
  pages =        "967--970",
  month =        sep,
  year =         "2000",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/12.869328",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Jul 5 10:35:25 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=869328",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Yen:2000:WOW,
  author =       "Sung-Ming Yen and Yuliang Zheng",
  title =        "Weighted One-Way Hash Chain and Its Applications",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1975",
  pages =        "135--??",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:08:57 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1975.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1975/19750135.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1975/19750135.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Young:2000:RBA,
  author =       "Adam Young and Moti Yung",
  booktitle =    "Public key cryptography (Melbourne, 2000)",
  title =        "{RSA}-based auto-recoverable cryptosystems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1751",
  pages =        "326--341",
  year =         "2000",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A62",
  MRnumber =     "2002h:94088",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zafar:2000:ACB,
  author =       "Naeem Zafar",
  title =        "Authentication company buys smart card firm",
  journal =      j-NETWORK-SECURITY,
  volume =       "2000",
  number =       "5",
  pages =        "4--5",
  day =          "1",
  month =        may,
  year =         "2000",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)05011-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:55 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348580005011X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Zeadally:2000:IPQ,
  author =       "S. Zeadally",
  title =        "Implementation and Performance of {QoS}-aware {Java}
                 Applications over {ATM} Networks",
  journal =      j-COMP-J,
  volume =       "43",
  number =       "4",
  pages =        "266--273",
  month =        "????",
  year =         "2000",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Nov 14 07:02:08 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_43/Issue_04/",
  URL =          "http://www3.oup.co.uk/computer_journal/hdb/Volume_43/Issue_04/430266.sgm.abs.html;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_43/Issue_04/pdf/430266.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@InProceedings{Zhang:2000:MCA,
  author =       "Muxiang Zhang and Agnes Chan",
  title =        "Maximum Correlation Analysis of Nonlinear {S}-boxes in
                 Stream Ciphers",
  crossref =     "Bellare:2000:ACC",
  pages =        "501--??",
  year =         "2000",
  bibdate =      "Fri Feb 1 09:16:56 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1880.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1880/18800501.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1880/18800501.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2000; cryptography",
}

@Article{Zhang:2000:WMH,
  author =       "Peter Zhang",
  title =        "{Webrelay}: a Multithreaded {HTTP} Relay Server",
  journal =      j-DDJ,
  volume =       "25",
  number =       "2",
  pages =        "86, 88, 90--94, 96",
  month =        feb,
  year =         "2000",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Nov 9 08:25:13 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/multithreading.bib",
  URL =          "http://www.ddj.com/ftp/2000/2000_02/webrelay.txt;
                 http://www.ddj.com/ftp/2000/2000_02/webrelay.zip",
  abstract =     "Webrelay is a freely available multithreaded HTTP
                 relay server that authenticates that clients are
                 legitimate users before they are connected to vendor
                 web servers. Additional resources include webrelay.txt
                 (listings) and webrelay.zip (source code).",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@PhdThesis{Abdalla:2001:DAS,
  author =       "Michel Ferreira Abdalla",
  title =        "Design and analysis of secure encryption schemes",
  type =         "Vita Thesis ({Ph.D.})",
  school =       "University of California, San Diego",
  address =      "San Diego, CA, USA",
  year =         "2001",
  LCCN =         "QA 3.8 .A2 2001",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "dissertations, academic --- UCSD --- Computer Science;
                 dissertations, academic --- UCSD --- Computer Science
                 and Engineering",
}

@Article{Abdalla:2001:ODH,
  author =       "Michel Abdalla and Mihir Bellare and Phillip Rogaway",
  title =        "The Oracle {Diffie--Hellman} Assumptions and an
                 Analysis of {DHIES}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2020",
  pages =        "143--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2020.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2020/20200143.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2020/20200143.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Abe:2001:SEP,
  author =       "Masayuki Abe",
  title =        "Securing {``Encryption $+$ Proof of Knowledge''} in
                 the Random Oracle Model",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2271",
  pages =        "277--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:06 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2271.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2271/22710277.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2271/22710277.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Abe:2001:SPA,
  author =       "Masayuki Abe and Koutarou Suzuki",
  title =        "{$ M + 1 $}-st Price Auction Using Homomorphic
                 Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2274",
  pages =        "115--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:07 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2274.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2274/22740115.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2274/22740115.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Adelsbach:2001:ZKW,
  author =       "Andr{\'e} Adelsbach and Ahmad-Reza Sadeghi",
  title =        "Zero-Knowledge Watermark Detection and Proof of
                 Ownership",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2137",
  pages =        "273--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:39 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2137.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2137/21370273.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2137/21370273.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Agung:2001:ICI,
  author =       "I. Wiseto Agung and Peter Sweeney",
  title =        "Improvement and Comments on Image Watermarking Using
                 Complementary Modulation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2195",
  pages =        "411--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2195.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2195/21950411.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2195/21950411.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Akkar:2001:IAS,
  author =       "M.-L. Akkar and C. Giraud",
  title =        "An Implementation of {DES} and {AES}, Secure against
                 Some Attacks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2162",
  pages =        "309--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:06 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2162.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2162/21620309.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2162/21620309.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Al-Ibrahim:2001:AMS,
  author =       "M. Al-Ibrahim and J. Pieprzyk",
  title =        "Authenticating Multicast Streams in Lossy Channels
                 Using Threshold Techniques",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2094",
  pages =        "239--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:54 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2094.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2094/20940239.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2094/20940239.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Allison:2001:LLE,
  author =       "Dennis Allison and Randy Schrickel and Reid Womack and
                 Jeremy C. Reed and Ashley Tate and Paul Munsey",
  title =        "Letters: Looking for Early {PPC [People's Computing
                 Company]} People; Being Prepared for Invasion;
                 {BetterBASIC}; {Linux} versus {BSD}; {Diffie--Hellman}
                 to the Rescue; The Future of Programming",
  journal =      j-DDJ,
  volume =       "26",
  number =       "6",
  pages =        "10, 12",
  month =        jun,
  year =         "2001",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Tue Feb 12 17:40:37 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Amir:2001:FAA,
  author =       "Yair Amir and Cristina Nita-Rotaru and Jonathan R.
                 Stanton",
  title =        "Framework for Authentication and Access Control of
                 Client-Server Group Communication Systems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2233",
  pages =        "128--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:19 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2233.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2233/22330128.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2233/22330128.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InCollection{An:2001:DER,
  author =       "Jee Hea An and Mihir Bellare",
  booktitle =    "Advances in cryptology---EUROCRYPT 2001 (Innsbruck)",
  title =        "Does Encryption with Redundancy Provide
                 Authenticity?",
  volume =       "2045",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "512--528",
  year =         "2001",
  MRclass =      "94A60",
  MRnumber =     "1 895 452",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2045.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  series =       "Lecture Notes in Comput. Sci.",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2045/20450512.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2045/20450512.pdf",
}

@Article{Anagnostopoulos:2001:PAD,
  author =       "Aris Anagnostopoulos and Michael T. Goodrich and
                 Roberto Tamassia",
  title =        "Persistent Authenticated Dictionaries and Their
                 Applications",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2200",
  pages =        "379--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:44 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2200.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2200/22000379.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2200/22000379.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Anonymous:2001:AAPb,
  author =       "Anonymous",
  title =        "An Anonymous Auction Protocol Using ``Money Escrow''
                 (Transcript of Discussion)",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2133",
  pages =        "223--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:35 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2133.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2133/21330223.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2133/21330223.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Anonymous:2001:AIgb,
  author =       "Anonymous",
  title =        "Author Index",
  crossref =     "Kilian:2001:ACC",
  pages =        "599--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/papers/2139/2139auth.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Anonymous:2001:ANT,
  author =       "Anonymous",
  title =        "Authentication and Naming (Transcript of Discussion)",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2133",
  pages =        "20--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:35 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2133.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2133/21330020.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2133/21330020.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Anonymous:2001:AWB,
  author =       "Anonymous",
  title =        "Authentication {Web}-Based Virtual Shops Using
                 Signature-Embedded Marks --- {A} Practical Analysis ---
                 (Transcript of Discussion)",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2133",
  pages =        "249--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:35 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2133.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2133/21330249.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2133/21330249.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Anonymous:2001:CCA,
  author =       "Anonymous",
  title =        "Censoring crypto not the answer says {Schneier}",
  journal =      j-NETWORK-SECURITY,
  volume =       "2001",
  number =       "10",
  pages =        "4--4",
  day =          "31",
  month =        oct,
  year =         "2001",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(01)01011-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:20 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348580101011X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@TechReport{Anonymous:2001:EDS,
  author =       "Anonymous",
  title =        "Encryption and Digital Signature Standards",
  type =         "Technical report",
  number =       "AD-a398 639",
  institution =  "National Aeronautics and Space Administration",
  address =      "Ames Research Center, Moffett Field, CA, USA",
  pages =        "14",
  year =         "2001",
  bibdate =      "Wed Sep 28 08:23:23 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:2001:EER,
  author =       "Anonymous",
  title =        "Encryption expert released on bail",
  journal =      j-NETWORK-SECURITY,
  volume =       "2001",
  number =       "8",
  pages =        "2--2",
  day =          "1",
  month =        aug,
  year =         "2001",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(01)00802-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:17 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485801008029",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2001:EMB,
  author =       "Anonymous",
  title =        "Encryption market bolstered by hackers",
  journal =      j-NETWORK-SECURITY,
  volume =       "2001",
  number =       "7",
  pages =        "4--4",
  day =          "1",
  month =        jul,
  year =         "2001",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(01)00711-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:16 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485801007115",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2001:LBS,
  author =       "Anonymous",
  title =        "Looking on the Bright Side of Black-Box Cryptography
                 (Transcript of Discussion)",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2133",
  pages =        "54--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:35 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2133.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2133/21330054.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2133/21330054.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Anonymous:2001:MIT,
  author =       "Anonymous",
  title =        "Massive identity theft by {NY} dish washer",
  journal =      j-NETWORK-SECURITY,
  volume =       "2001",
  number =       "4",
  pages =        "2--2",
  day =          "1",
  month =        apr,
  year =         "2001",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(01)00402-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:12 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485801004020",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2001:MLF,
  author =       "Anonymous",
  title =        "{Magic Lantern} fries crypto keys",
  journal =      j-NETWORK-SECURITY,
  volume =       "2001",
  number =       "12",
  pages =        "2--2",
  day =          "1",
  month =        dec,
  year =         "2001",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(01)01202-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:23 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485801012028",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2001:NWS,
  author =       "Anonymous",
  title =        "{Netherlands} to watch strong crypto",
  journal =      j-NETWORK-SECURITY,
  volume =       "2001",
  number =       "10",
  pages =        "4--4",
  day =          "31",
  month =        oct,
  year =         "2001",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(01)01012-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:20 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485801010121",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2001:PKC,
  author =       "Anonymous",
  title =        "Public-Key Crypto-systems Using Symmetric-Key
                 Crypto-algorithms (Transcript of Discussion)",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2133",
  pages =        "184--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:35 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2133.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2133/21330184.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2133/21330184.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Anonymous:2001:RAC,
  author =       "Anonymous",
  title =        "{DOS}-Resistant Authentication with Client Puzzles
                 (Transcript of Discussion)",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2133",
  pages =        "178--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:35 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2133.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2133/21330178.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2133/21330178.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Anonymous:2001:SCS,
  author =       "Anonymous",
  title =        "Short Certification of Secure {RSA} Modulus
                 (Transcript of Discussion)",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2133",
  pages =        "234--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:35 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2133.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2133/21330234.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2133/21330234.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Anonymous:2001:TAD,
  author =       "Anonymous",
  title =        "Talking about digital copyright",
  journal =      j-IEEE-SPECTRUM,
  volume =       "38",
  number =       "6",
  pages =        "9--9",
  month =        jun,
  year =         "2001",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2001.925271",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Conference proceedings; Digital recording; Discussion
                 forums; Educational institutions; Electromagnetic
                 interference; Intelligent robots; Law; National
                 security; Protection; Watermarking",
}

@Article{Anshel:2001:NKA,
  author =       "Iris Anshel and Michael Anshel and Benji Fisher and
                 Dorian Goldfeld",
  title =        "New Key Agreement Protocols in Braid Group
                 Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2020",
  pages =        "13--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2020.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2020/20200013.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2020/20200013.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ansper:2001:ELT,
  author =       "Arne Ansper and Ahto Buldas and Meelis Roos and Jan
                 Willemson",
  title =        "Efficient Long-Term Validation of Digital Signatures",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1992",
  pages =        "402--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:11 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1992.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1992/19920402.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1992/19920402.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Aoki:2001:CBB,
  author =       "Kazumaro Aoki and Tetsuya Ichikawa and Masayuki Kanda
                 and Mitsuru Matsui and Shiho Moriai and Junko Nakajima
                 and Toshio Tokita",
  title =        "Camellia: a $ 128 $-Bit Block Cipher Suitable for
                 Multiple Platforms --- Design and Analysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2012",
  pages =        "39--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:30 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2012.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2012/20120039.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2012/20120039.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Arboit:2001:FLM,
  author =       "Genevi{\`e}ve Arboit and Jean-Marc Robert",
  title =        "From Fixed-Length Messages to Arbitrary-Length
                 Messages Practical {RSA} Signature Padding Schemes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2020",
  pages =        "44--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2020.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2020/20200044.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2020/20200044.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Arnold:2001:AWB,
  author =       "Michael Arnold",
  title =        "Audio Watermarking: Burying information in the data",
  journal =      j-DDJ,
  volume =       "26",
  number =       "11",
  pages =        "21--22, 24--26, 28",
  month =        nov,
  year =         "2001",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Tue Feb 12 05:21:40 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/ftp/2001/2001_11/watermk.txt;
                 http://www.ddj.com/ftp/2001/2001_11/watermk.zip",
  abstract =     "Digital watermarking is a security technique that
                 provides copy protection, authentication, and more for
                 audio and other forms of information. The approach
                 Michael presents here is based on a statistical
                 algorithm working in the Fourier domain. Additional
                 resources include {\tt watermk.txt} (listings) and {\tt
                 watermk.zip} (source code).",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Atallah:2001:NLW,
  author =       "Mikhail J. Atallah and Victor Raskin and Michael
                 Crogan and Christian Hempelmann and Florian Kerschbaum
                 and Dina Mohamed and Sanket Naik",
  title =        "Natural Language Watermarking: Design, Analysis, and a
                 Proof-of-Concept Implementation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2137",
  pages =        "185--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:39 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2137.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2137/21370185.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2137/21370185.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ateniese:2001:ECV,
  author =       "Giuseppe Ateniese and Carlo Blundo and Alfredo {De
                 Santis} and Douglas R. Stinson",
  title =        "Extended capabilities for visual cryptography",
  journal =      j-THEOR-COMP-SCI,
  volume =       "250",
  number =       "1--2",
  pages =        "143--161",
  day =          "6",
  month =        jan,
  year =         "2001",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Oct 31 11:38:56 MST 2000",
  bibsource =    "http://www.elsevier.com/locate/issn/03043975;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.nl/gej-ng/10/41/16/186/20/29/abstract.html;
                 http://www.elsevier.nl/gej-ng/10/41/16/186/20/29/article.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Ateniese:2001:SRC,
  author =       "Giuseppe Ateniese and Cristina Nita-Rotaru",
  title =        "Stateless-Recipient Certified {E}-Mail System Based on
                 Verifiable Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2271",
  pages =        "182--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:06 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2271.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2271/22710182.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2271/22710182.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Aura:2001:RAC,
  author =       "Tuomas Aura and Pekka Nikander and Jussipekka Leiwo",
  title =        "{DOS}-Resistant Authentication with Client Puzzles",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2133",
  pages =        "170--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:35 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2133.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2133/21330170.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2133/21330170.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Babbage:2001:MHO,
  author =       "Steve Babbage and Laurent Frisch",
  booktitle =    "Information security and cryptology---ICISC 2000
                 (Seoul)",
  title =        "On {MISTY1} higher order differential cryptanalysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2015",
  pages =        "22--36",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "1 897 370",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Baier:2001:ECP,
  author =       "H. Baier",
  title =        "Elliptic Curves of Prime Order over Optimal Extension
                 Fields for Use in Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2247",
  pages =        "99--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:31 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2247.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2247/22470099.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2247/22470099.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Baier:2001:ECS,
  author =       "Harald Baier",
  title =        "Efficient Computation of Singular Moduli with
                 Application in Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2138",
  pages =        "71--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:40 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2138.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2138/21380071.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2138/21380071.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Banks:2001:CAS,
  author =       "William D. Banks and Daniel Lieman and Igor E.
                 Shparlinski and Van Thuong To",
  title =        "Cryptographic Applications of Sparse Polynomials over
                 Finite Rings",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2015",
  pages =        "206--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2015.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2015/20150206.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2015/20150206.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bao:2001:CTS,
  author =       "Feng Bao and Robert H. Deng and Willi Geiselmann and
                 Claus Schnorr and Rainer Steinwandt and Hongjun Wu",
  booktitle =    "Public key cryptography (Cheju Island, 2001)",
  title =        "Cryptanalysis of Two Sparse Polynomial Based Public
                 Key Cryptosystems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1992",
  pages =        "153--164",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "1 898 031",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1992.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1992/19920153.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1992/19920153.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bao:2001:SPD,
  author =       "Feng Bao and Robert Deng and Peirong Feng and Yan Guo
                 and Hongjun Wu",
  title =        "Secure and Private Distribution of Online Video and
                 Some Related Cryptographic Issues",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2119",
  pages =        "190--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:21 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2119.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2119/21190190.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2119/21190190.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Barak:2001:IPO,
  author =       "Boaz Barak and Oded Goldreich and Rusell Impagliazzo
                 and Steven Rudich and Amit Sahai and Salil Vadhan and
                 Ke Yang",
  title =        "On the (Im)possibility of Obfuscating Programs",
  crossref =     "Kilian:2001:ACC",
  pages =        "1--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390001.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390001.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Book{Barrett:2001:SSS,
  author =       "Daniel J. Barrett and Richard E. Silverman",
  title =        "{SSH}: The {Secure Shell}: The Definitive Guide",
  publisher =    pub-ORA,
  address =      pub-ORA:adr,
  pages =        "xv + 540",
  year =         "2001",
  ISBN =         "0-596-00011-1",
  ISBN-13 =      "978-0-596-00011-0",
  LCCN =         "QA76.76.O63 B369 2001",
  bibdate =      "Mon Apr 18 15:01:35 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  price =        "US\$39.95",
  URL =          "http://www.oreilly.com/catalog/9780596000110;
                 http://www.oreilly.com/catalog/sshtdg/;
                 http://www.snailbook.com/",
  acknowledgement = ack-nhfb,
  subject =      "UNIX Shells; Data encryption (Computer science);
                 Computer networks; Security measures",
}

@Article{Batina:2001:AWD,
  author =       "Lejla Batina and Geeke Muurling",
  title =        "Another Way of Doing {RSA} Cryptography in Hardware",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2260",
  pages =        "364--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:45 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2260.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2260/22600364.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2260/22600364.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bauer:2001:PPGa,
  author =       "Mick Bauer",
  title =        "Paranoid Penguin {GPG}: The Best Free Crypto You
                 Aren't Using, {Part I} of {II}",
  journal =      j-LINUX-J,
  volume =       "89",
  pages =        "32--34, 36--37",
  month =        sep,
  year =         "2001",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Thu Aug 30 06:06:53 MDT 2001",
  bibsource =    "http://noframes.linuxjournal.com/lj-issues/issue89/index.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://noframes.linuxjournal.com/lj-issues/issue89/4828.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Bauer:2001:PPGb,
  author =       "Mick Bauer",
  title =        "Paranoid Penguin: {GPG}: the Best Free Crypto You
                 Aren't Using, {Part II} of {II}",
  journal =      j-LINUX-J,
  volume =       "90",
  pages =        "46, 48, 50--52, 54--55",
  month =        oct,
  year =         "2001",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Wed Sep 19 18:50:19 MDT 2001",
  bibsource =    "http://noframes.linuxjournal.com/lj-issues/issue90/index.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Bauer:2001:PPUb,
  author =       "Mick Bauer",
  title =        "Paranoid Penguin: The 101 Uses of {OpenSSH}: {Part II}
                 of {II}",
  journal =      j-LINUX-J,
  volume =       "82",
  pages =        "52, 54, 56, 58--59",
  month =        feb,
  year =         "2001",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Thu Feb 15 08:04:55 MST 2001",
  bibsource =    "http://noframes.linuxjournal.com/lj-issues/issue82/index.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Bedi:2001:CNF,
  author =       "S. S. Bedi and N. R. Pillai",
  title =        "Cryptanalysis of the Nonlinear {FeedForward}
                 Generator",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2247",
  pages =        "188--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:31 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2247.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2247/22470188.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2247/22470188.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bella:2001:MPS,
  author =       "Giampaolo Bella",
  title =        "Mechanising a Protocol for Smart Cards",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2140",
  pages =        "19--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2140.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2140/21400019.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2140/21400019.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bellare:2001:KPP,
  author =       "Mihir Bellare and Alexandra Boldyreva and Anand Desai
                 and David Pointcheval",
  title =        "Key-Privacy in Public-Key Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2248",
  pages =        "566--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2248.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2248/22480566.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2248/22480566.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Bellare:2001:OCH,
  author =       "Mihir Bellare and Alexandra Boldyreva and Lars Knudsen
                 and Chanathip Namprempre",
  title =        "Online Ciphers and the Hash-{CBC} Construction",
  crossref =     "Kilian:2001:ACC",
  pages =        "292--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390292.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390292.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Benantar:2001:IPK,
  author =       "M. Benantar",
  title =        "The {Internet} public key infrastructure",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "3",
  pages =        "648--665",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/403/benantar.html;
                 http://www.research.ibm.com/journal/sj/403/benantar.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IBM Systems Journal",
  ordernumber =  "G321-0142",
}

@TechReport{Benson:2001:VS,
  author =       "Robert L. Benson",
  title =        "The {Venona} Story",
  type =         "Report",
  number =       "????",
  institution =  "Center for Cryptologic History, National Security
                 Agency",
  address =      "Fort Meade, MD, USA",
  month =        "????",
  year =         "2001",
  bibdate =      "Mon Sep 19 22:37:57 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Berbecaru:2001:CPK,
  author =       "Diana Berbecaru and Antonio Lioy and Marius Marian",
  title =        "On the Complexity of Public-Key Certificate
                 Validation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2200",
  pages =        "183--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:44 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2200.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2200/22000183.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2200/22000183.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bergadano:2001:CSA,
  author =       "Francesco Bergadano and Davide Cavagnino and Bruno
                 Crispo",
  title =        "Chained Stream Authentication",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2012",
  pages =        "144--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:30 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2012.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2012/20120144.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2012/20120144.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Biryukov:2001:RTC,
  author =       "Alex Biryukov and Adi Shamir and David Wagner",
  title =        "Real Time Cryptanalysis of {A5/1} on a {PC}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1978",
  pages =        "1--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:00 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1978.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1978/19780001.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1978/19780001.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Biryukov:2001:SCS,
  author =       "Alex Biryukov and Adi Shamir",
  booktitle =    "Advances in cryptology---EUROCRYPT 2001 (Innsbruck)",
  title =        "Structural cryptanalysis of {SASAS}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2045",
  pages =        "394--405",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "1 895 445",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Black:2001:CAF,
  author =       "John Black and Phillip Rogaway",
  title =        "Ciphers with Arbitrary Finite Domains",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2271",
  pages =        "114--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:06 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2271.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2271/22710114.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2271/22710114.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Blanchet-Sadri:2001:MSD,
  author =       "F. Bl anchet-Sadri and C. Morgan",
  title =        "Multiset and set decipherable codes",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "41",
  number =       "10--11",
  pages =        "1257--1262",
  month =        may # "\slash " # jun,
  year =         "2001",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:49:13 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122101000967",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Blanchet:2001:ACP,
  author =       "Bruno Blanchet",
  title =        "Abstracting Cryptographic Protocols by {Prolog}
                 Rules",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2126",
  pages =        "433--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:28 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2126.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2126/21260433.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2126/21260433.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Blanchet:2001:ECP,
  author =       "Bruno Blanchet",
  editor =       "????",
  booktitle =    "{IEEE Computer Security Foundations Workshop}",
  title =        "An efficient cryptographic protocol verifier based on
                 {{\tt prolog}} rules",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "82--82",
  year =         "2001",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 11:30:06 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 10]{Schneier:2015:SWC}.",
}

@Misc{Blaze:2001:LYS,
  author =       "Matt Blaze",
  title =        "Loaning Your Soul to the Devil: Influencing Policy
                 Without Selling Out",
  year =         "2001",
  bibdate =      "Tue Oct 15 16:52:27 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Unpublished invited talk, Tenth USENIX Security
                 Symposium, August 13--17, 2001, Washington, DC, USA.",
  abstract =     "All of a sudden, it seems, computer security and
                 cryptology have become important not only as technical
                 problems but as public policy issues. More to the
                 point, we practitioners and researchers in computer
                 security and cryptology often now find ourselves sought
                 out not only for technical expertise but also by
                 policymakers, lobbyists, and the media. Unfortunately,
                 we're often surprised at just how ill-prepared we are
                 for the public policy culture, and we risk finding
                 ourselves misused, misunderstood or misquoted. It
                 doesn't have to be that way. This talk will present a
                 personal view of the relationship between science and
                 public policy, focusing on the different value systems,
                 protocols, and expectations found in the two worlds. It
                 really is possible to maintain one's integrity while
                 making a difference, even inside the Beltway.",
  acknowledgement = ack-nhfb,
}

@Article{Blomer:2001:LSE,
  author =       "Johannes Bl{\"o}mer and Alexander May",
  title =        "Low Secret Exponent {RSA} Revisited",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2146",
  pages =        "4--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:49 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2146.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2146/21460004.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2146/21460004.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bo:2001:EID,
  author =       "Xiaochen Bo and Lincheng Shen and Wensen Chang",
  title =        "Evaluation of the Image Degradation for a Typical
                 Watermarking Algorithm in the Block-{DCT} Domain",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2229",
  pages =        "52--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:15 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2229.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2229/22290052.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2229/22290052.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bo:2001:SCD,
  author =       "Xiaochen Bo and Lincheng Shen and Wensen Chang",
  title =        "Sign Correlation Detector for Blind Image Watermarking
                 in the {DCT} Domain",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2195",
  pages =        "780--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2195.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2195/21950780.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2195/21950780.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Boneh:2001:EGS,
  author =       "Dan Boneh and Matthew Franklin",
  title =        "Efficient generation of shared {RSA} keys",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "4",
  pages =        "702--722",
  month =        jul,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:42:49 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@InProceedings{Boneh:2001:IBE,
  author =       "Dan Boneh and Matt Franklin",
  title =        "Identity-Based Encryption from the {Weil} Pairing",
  crossref =     "Kilian:2001:ACC",
  pages =        "213--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390213.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390213.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Boneh:2001:LBM,
  author =       "Dan Boneh and Glenn Durfee and Matt Franklin",
  title =        "Lower Bounds for Multicast Message Authentication",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2045",
  pages =        "437--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:02 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2045.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2045/20450437.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2045/20450437.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Boneh:2001:MFR,
  author =       "Dan Boneh and Xuhua Ding and Gene Tsudik and Chi Ming
                 Wong",
  title =        "A Method for Fast Revocation of Public Key
                 Certificates and Security Capabilities",
  crossref =     "USENIX:2001:PTU",
  pages =        "??--??",
  year =         "2001",
  bibdate =      "Tue Oct 15 16:52:27 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/sec01/boneh.html",
  acknowledgement = ack-nhfb,
}

@InProceedings{Boneh:2001:SOR,
  author =       "Dan Boneh",
  title =        "Simplified {OAEP} for the {RSA} and {Rabin}
                 Functions",
  crossref =     "Kilian:2001:ACC",
  pages =        "275--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390275.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390275.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@InProceedings{Boneh:2001:UBE,
  author =       "Dan Boneh and Igor E. Shparlinski",
  title =        "On the Unpredictability of Bits of the Elliptic Curve
                 {Diffie--Hellman} Scheme",
  crossref =     "Kilian:2001:ACC",
  pages =        "201--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390201.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390201.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Boreale:2001:STA,
  author =       "Michele Boreale",
  title =        "Symbolic Trace Analysis of Cryptographic Protocols",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2076",
  pages =        "667--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Feb 1 09:17:25 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2076.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2076/20760667.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2076/20760667.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Borst:2001:CSC,
  author =       "Johan Borst and Bart Preneel and Vincent Rijmen",
  title =        "Cryptography on smart cards",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "36",
  number =       "4",
  pages =        "423--435",
  day =          "16",
  month =        jul,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Wed Jul 25 16:48:14 MDT 2001",
  bibsource =    "http://www.elsevier.com/locate/issn/13891286;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.nl/gej-ng/10/15/22/61/28/29/abstract.html;
                 http://www.elsevier.nl/gej-ng/10/15/22/61/28/29/article.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Boyd:2001:ECB,
  author =       "Colin Boyd and Paul Montague and Khanh Nguyen",
  title =        "Elliptic Curve Based Password Authenticated Key
                 Exchange Protocols",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2119",
  pages =        "487--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:21 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2119.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2119/21190487.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2119/21190487.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Brandao:2001:UEC,
  author =       "T. Brand{\~a}o and M. P. Queluz and A. Rodrigues",
  title =        "On the Use of Error Correction Codes in Spread
                 Spectrum Based Image Watermarking",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2195",
  pages =        "630--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2195.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2195/21950630.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2195/21950630.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Brands:2001:RPK,
  author =       "Stefan A. Brands",
  title =        "Rethinking public key infrastructures and digital
                 certificates: building in privacy",
  publisher =    pub-MIT,
  address =      pub-MIT:adr,
  pages =        "xxi + 314",
  year =         "2001",
  ISBN =         "0-262-02491-8",
  ISBN-13 =      "978-0-262-02491-4",
  LCCN =         "TK5105.59 .B73 2000",
  bibdate =      "Mon Feb 04 12:08:50 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Brandt:2001:CPS,
  author =       "Felix Brandt",
  title =        "Cryptographic Protocols for Secure Second-Price
                 Auctions",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2182",
  pages =        "154--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:25 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2182.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2182/21820154.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2182/21820154.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bresson:2001:PAG,
  author =       "Emmanuel Bresson and Olivier Chevassut and David
                 Pointcheval",
  title =        "Provably Authenticated Group {Diffie--Hellman} Key
                 Exchange --- The Dynamic Case",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2248",
  pages =        "290--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2248.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2248/22480290.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2248/22480290.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Brier:2001:CRS,
  author =       "Eric Brier and Christophe Clavier and
                 Jean-S{\'e}bastien Coron and David Naccache",
  title =        "Cryptanalysis of {RSA} Signatures with Fixed-Pattern
                 Padding",
  crossref =     "Kilian:2001:ACC",
  pages =        "433--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390433.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390433.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Brincat:2001:KRA,
  author =       "Karl Brincat and Chris J. Mitchell",
  title =        "Key Recovery Attacks on {MACs} Based on Properties of
                 Cryptographic {APIs}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2260",
  pages =        "63--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:45 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2260.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2260/22600063.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2260/22600063.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Buchmann:2001:IC,
  author =       "Johannes Buchmann",
  title =        "Introduction to cryptography",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 281",
  year =         "2001",
  ISBN =         "0-387-95034-6 (hardcover)",
  ISBN-13 =      "978-0-387-95034-1 (hardcover)",
  LCCN =         "QA268.B83 2001",
  bibdate =      "Wed Feb 13 12:10:46 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "Undergraduate texts in mathematics",
  acknowledgement = ack-nhfb,
  keywords =     "coding theory; computer science textbooks;
                 cryptography",
  remark =       "See also second edition \cite{Buchmann:2004:IC}.",
}

@Misc{Burnett:2001:CB,
  author =       "Steve Burnett",
  title =        "Crypto Blunders",
  year =         "2001",
  bibdate =      "Tue Oct 15 15:38:06 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Unpublished invited talk, LISA 2001: 15th Systems
                 Administration Conference, December 2--7, 2001, Town
                 and Country Resort Hotel, San Diego, CA.",
  URL =          "http://db.usenix.org/publications/library/proceedings/lisa2001/tech/",
  abstract =     "Cryptography has emerged as an enormously important
                 component of the networked world. People are hesitant
                 to trust the Web and e-commerce without the protections
                 crypto provides. More and more applications are now
                 built with crypto core components. Many cryptographic
                 algorithms are almost unbreakable \ldots{} if used
                 properly.\par

                 This presentation will describe some blunders, famous
                 and not so famous. Some may be a little humorous --- to
                 those not involved. If nothing else, the audience will
                 learn what not to do in their products.",
  acknowledgement = ack-nhfb,
}

@Book{Burnett:2001:RSO,
  author =       "Steve Burnett and Stephen Paine",
  title =        "{RSA Security}'s Official Guide to Cryptography",
  publisher =    pub-MCGRAW-HILL,
  address =      pub-MCGRAW-HILL:adr,
  pages =        "xxi + 419",
  year =         "2001",
  ISBN =         "0-07-213139-X",
  ISBN-13 =      "978-0-07-213139-0",
  LCCN =         "TK5105.59.B87 200",
  bibdate =      "Wed Jan 16 10:48:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Includes CD-ROM.",
  price =        "US\$59.99",
  acknowledgement = ack-nhfb,
}

@InProceedings{Cachin:2001:SEA,
  author =       "Christian Cachin and Klaus Kursawe and Frank Petzold
                 and Victor Shoup",
  title =        "Secure and Efficient Asynchronous Broadcast
                 Protocols",
  crossref =     "Kilian:2001:ACC",
  pages =        "524--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390524.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390524.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Book{Calvocoressi:2001:TSU,
  author =       "Peter Calvocoressi",
  title =        "Top secret {Ultra}",
  publisher =    "M and M Baldwin",
  address =      "Cleobury Mortimer, Kidderminster, England",
  pages =        "158",
  year =         "2001",
  ISBN =         "0-947712-41-0",
  ISBN-13 =      "978-0-947712-41-9",
  LCCN =         "D810.C88 C34 2001",
  bibdate =      "Mon May 8 07:07:03 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Calvocoressi, Peter; Cryptographers; Great Britain;
                 Biography; World War, 1939--1945; Personal narratives,
                 English; Cryptography; Secret service",
}

@InProceedings{Camenisch:2001:IES,
  author =       "Jan Camenisch and Anna Lysyanskaya",
  title =        "An Identity Escrow Scheme with Appointed Verifiers",
  crossref =     "Kilian:2001:ACC",
  pages =        "388--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390388.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390388.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Campo:2001:JFC,
  author =       "Celeste Campo and Andr{\'e}s Marm and Arturo
                 Garc{\'\i}a and Ignacio D{\'\i}az and Peter T. Breuer
                 and Carlos Delgado and Carlos Garc{\'\i}a",
  title =        "{JCCM}: Flexible Certificates for Smartcards with
                 {Java} Card",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2140",
  pages =        "34--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2140.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2140/21400034.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2140/21400034.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Canda:2001:SBC,
  author =       "Val{\'e}r {\v{C}}anda and Tran van Trung and Spyros
                 Magliveras and Tam{\'a}s Horv{\'a}th",
  title =        "Symmetric Block Ciphers Based on Group Bases",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2012",
  pages =        "89--105",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:30 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2012.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2012/20120089.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2012/20120089.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Canetti:2001:UCC,
  author =       "Ran Canetti and Marc Fischlin",
  title =        "Universally Composable Commitments",
  crossref =     "Kilian:2001:ACC",
  pages =        "19--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390019.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390019.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@InProceedings{Canetti:2001:UCS,
  author =       "R. Canetti",
  title =        "Universally composable security: a new paradigm for
                 cryptographic protocols",
  crossref =     "IEEE:2001:ISF",
  pages =        "136--145",
  year =         "2001",
  bibdate =      "Fri Feb 22 06:25:27 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Canteaut:2001:CFD,
  author =       "A. Canteaut",
  title =        "Cryptographic Functions and Design Criteria for Block
                 Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2247",
  pages =        "1--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:31 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2247.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2247/22470001.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2247/22470001.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Canteaut:2001:COR,
  author =       "Anne Canteaut and Eric Filiol",
  title =        "Ciphertext Only Reconstruction of Stream Ciphers Based
                 on Combination Generators",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1978",
  pages =        "165--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:00 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1978.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1978/19780165.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1978/19780165.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Caprara:2001:PSR,
  author =       "Alberto Caprara",
  title =        "On the Practical Solution of the Reversal Median
                 Problem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2149",
  pages =        "238--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:52 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2149.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2149/21490238.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2149/21490238.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Carter:2001:SCT,
  author =       "Amy Carter",
  title =        "Smart card technology just got smarter",
  journal =      "Metro",
  volume =       "97",
  number =       "9",
  month =        dec,
  year =         "2001",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "automatic fare collection --- United States; smart
                 cards --- United States",
}

@InCollection{Catalano:2001:BSP,
  author =       "Dario Catalano and Rosario Gennaro and Nick
                 Howgrave-Graham",
  booktitle =    "Advances in cryptology---EUROCRYPT 2001 (Innsbruck)",
  title =        "The Bit Security of {Paillier}'s Encryption Scheme and
                 Its Applications",
  volume =       "2045",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "229--243",
  year =         "2001",
  MRclass =      "94A60",
  MRnumber =     "1 895 436",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2045.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  series =       "Lecture Notes in Comput. Sci.",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2045/20450229.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2045/20450229.pdf",
}

@InProceedings{Cattaneo:2001:DIT,
  author =       "Giuseppe Cattaneo and Luigi Catuogno and Aniello {Del
                 Sorbo} and Pino Persiano",
  title =        "The Design and Implementation of a Transparent
                 Cryptographic File System for {UNIX}",
  crossref =     "USENIX:2001:PFT",
  pages =        "??--??",
  year =         "2001",
  bibdate =      "Tue Oct 15 17:19:08 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/usenix2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/usenix01/freenix01/cattaneo.html",
  acknowledgement = ack-nhfb,
}

@Article{Chan:2001:CRP,
  author =       "Chi-Kwong Chan and L. M. Cheng",
  title =        "Cryptanalysis of a remote password authentication
                 scheme",
  journal =      j-INT-J-COMPUT-MATH,
  volume =       "78",
  number =       "3",
  pages =        "323--326",
  year =         "2001",
  CODEN =        "IJCMAT",
  ISSN =         "0020-7160",
  ISSN-L =       "0020-7160",
  MRclass =      "94A62 (68P25)",
  MRnumber =     "1 894 961",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "International Journal of Computer Mathematics",
}

@Article{Chan:2001:CTB,
  author =       "Chi-Kwong Chan and L. M. Cheng",
  title =        "Cryptanalysis of a Timestamp-Based Password
                 Authentication Scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "74--76",
  month =        "First Quarter",
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802001104",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chan:2001:WEF,
  author =       "Alvin T. S. Chan and Jiannong Cao and Henry Chan and
                 Gilbert Young",
  title =        "A {Web}-enabled framework for smart card applications
                 in health services",
  journal =      j-CACM,
  volume =       "44",
  number =       "9",
  pages =        "76--82",
  month =        sep,
  year =         "2001",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Sep 8 19:28:25 MDT 2001",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/cacm/2001-44-9/p76-chan/p76-chan.pdf;
                 http://www.acm.org/pubs/citations/journals/cacm/2001-44-9/p76-chan/",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Chang:2001:ASM,
  author =       "Kyung-Ah Chang and Byung-Rae Lee and Tai-Yun Kim",
  title =        "Authentication Service Model Supporting Multiple
                 Domains in Distributed Computing",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2073",
  pages =        "413--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:28 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2073.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2073/20730413.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2073/20730413.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chang:2001:CIU,
  author =       "Chin-Chen Chang and Iuon-Chang Lin",
  title =        "Cryptanalysis of the Improved User Efficient Blind
                 Signatures",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2229",
  pages =        "42--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:15 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2229.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2229/22290042.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2229/22290042.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chang:2001:FAM,
  author =       "Kyung-Ah Chang and Byung-Rae Lee and Tai-Yun Kim",
  title =        "Flexible Authentication with Multiple Domains of
                 Electronic Commerce",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2115",
  pages =        "176--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:17 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2115.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2115/21150176.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2115/21150176.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chang:2001:NEA,
  author =       "Chin-Chen Chang and Min-Shian Hwang and Tung-Shou
                 Chen",
  title =        "A new encryption algorithm for image cryptosystems",
  journal =      j-J-SYST-SOFTW,
  volume =       "58",
  number =       "2",
  pages =        "83--91",
  day =          "1",
  month =        sep,
  year =         "2001",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Nov 19 09:08:02 MST 2001",
  bibsource =    "http://www.elsevier.com/locate/issn/01641212;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.com/gej-ng/10/29/11/68/33/27/abstract.html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Chang:2001:NSS,
  author =       "Chin-Chen Chang and Jyh-Chiang Yeh and Ju-Yuan Hsiao",
  title =        "A Novel Scheme for Securing Image Steganography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2195",
  pages =        "804--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2195.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2195/21950804.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2195/21950804.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chang:2001:TFG,
  author =       "Chin-Chen Chang and Kuo-Feng Hwang",
  title =        "Towards the Forgery of a Group Signature without
                 Knowing the Group Center's Secret",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2229",
  pages =        "47--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:15 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2229.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2229/22290047.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2229/22290047.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chapman:2001:PEA,
  author =       "Mark Chapman and George I. Davida and Marc Rennhard",
  title =        "A Practical and Effective Approach to Large-Scale
                 Automated Linguistic Steganography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2200",
  pages =        "156--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:44 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2200.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2200/22000156.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2200/22000156.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chen:2001:DEU,
  author =       "Chaur-Chin Chen",
  title =        "Data Encryption Using {MRF} with an {RSA} Key",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2195",
  pages =        "399--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2195.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2195/21950399.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2195/21950399.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chen:2001:PDP,
  author =       "Su-Shing Chen",
  title =        "The Paradox of Digital Preservation",
  journal =      j-COMPUTER,
  volume =       "34",
  number =       "3",
  pages =        "24--28",
  month =        mar,
  year =         "2001",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Wed Mar 14 07:01:26 MST 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computer2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/co/books/co2001/pdf/r3024.pdf;
                 http://www.computer.org/computer/co2001/r3024abs.htm",
  abstract =     "Preserving digital information requires proven methods
                 for maintaining and accessing and authenticating
                 technology-generated data.",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Chen:2001:SFW,
  author =       "Minghua Chen and Yun He",
  title =        "A Synchronous Fragile Watermarking Scheme for
                 Erroneous {Q--DCT} Coefficients Detection",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2195",
  pages =        "812--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2195.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2195/21950812.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2195/21950812.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Cheng:2001:NPT,
  author =       "Qi Cheng and Shigenori Uchiyama",
  title =        "Nonuniform Polynomial Time Algorithm to Solve
                 Decisional {Diffie--Hellman} Problem in Finite Fields
                 under Conjecture",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2271",
  pages =        "290--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:06 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2271.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2271/22710290.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2271/22710290.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Cheon:2001:NVR,
  author =       "Jung Hee Cheon",
  title =        "Nonlinear Vector Resilient Functions",
  crossref =     "Kilian:2001:ACC",
  pages =        "458--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390458.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390458.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Chepyzhov:2001:SAF,
  author =       "Vladimor V. Chepyzhov and Thomas Johansson and Ben
                 Smeets",
  title =        "A Simple Algorithm for Fast Correlation Attacks on
                 Stream Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1978",
  pages =        "181--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:00 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1978.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1978/19780181.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1978/19780181.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Cherry:2001:HDS,
  author =       "S. M. Cherry",
  title =        "Is hyperlinking to decryption software illegal?",
  journal =      j-IEEE-SPECTRUM,
  volume =       "38",
  number =       "8",
  pages =        "64--65",
  month =        aug,
  year =         "2001",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/6.938724",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "2600 magazine; Cities and towns; computer code;
                 Computer hacking; computer program; Constitution;
                 Cryptography; cryptography; decryption software; DeCSS
                 software; digital movies illegal copying; DVD; DVD
                 encryption scheme decoding; federal court;
                 hyperlinking; hypermedia; legislation; Motion pictures;
                 movie-industry; New York City; protected speech;
                 Protection; Publishing; Software; software packages;
                 speech coding; Speech coding; United States; Web site",
}

@Article{Cherry:2001:HMH,
  author =       "S. M. Cherry",
  title =        "Hyperencryption: Much hype about little that is new
                 [Web Sites]",
  journal =      j-IEEE-SPECTRUM,
  volume =       "38",
  number =       "4",
  pages =        "87--87",
  month =        apr,
  year =         "2001",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2001.8822377",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
}

@Article{Cherry:2001:REM,
  author =       "S. M. Cherry",
  title =        "Remailers elude e-mail surveillance",
  journal =      j-IEEE-SPECTRUM,
  volume =       "38",
  number =       "11",
  pages =        "69--69",
  month =        nov,
  year =         "2001",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2001.963268",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Computer networks; Cryptography; Electronic mail;
                 Legislation; Network servers; Software maintenance;
                 Surveillance; Telecommunication traffic; Terrorism; Web
                 and internet services",
}

@Article{Cheung:2001:TPS,
  author =       "O. Y. H. Cheung and K. H. Tsoi and P. H. W. Leong and
                 M. P. Leong",
  title =        "Tradeoffs in Parallel and Serial Implementations of
                 the International Data Encryption Algorithm {IDEA}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2162",
  pages =        "333--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:06 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2162.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2162/21620333.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2162/21620333.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chien:2001:CCW,
  author =       "Hung-Yu Chien and Tzong-Chen Wu and Jinn-Ke Jan and
                 Yuh-Min Tseng",
  title =        "Cryptanalysis of {Chang--Wu}'s group-oriented
                 authentication and key exchange protocols",
  journal =      j-INFO-PROC-LETT,
  volume =       "80",
  number =       "2",
  pages =        "113--117",
  day =          "31",
  month =        oct,
  year =         "2001",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "2002j:94033",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "http://www.elsevier.com:80/inca/publications/store/5/0/5/6/1/2/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.com/gej-ng/10/23/20/80/37/33/abstract.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Chien:2001:MRL,
  author =       "Hung-Yu Chien and Jinn-Ke Jan and Yuh-Min Tseng",
  title =        "A modified remote login authentication scheme based on
                 geometric approach",
  journal =      j-J-SYST-SOFTW,
  volume =       "55",
  number =       "3",
  pages =        "287--290",
  day =          "15",
  month =        jan,
  year =         "2001",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed Apr 18 06:31:11 MDT 2001",
  bibsource =    "http://www.elsevier.com/locate/issn/01641212;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.nl/gej-ng/10/29/11/54/27/29/abstract.html;
                 http://www.elsevier.nl/gej-ng/10/29/11/54/27/29/article.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Chodowiec:2001:ETG,
  author =       "Pawel Chodowiec and Kris Gaj and Peter Bellows and
                 Brian Schott",
  title =        "Experimental Testing of the {Gigabit IPSec}-Compliant
                 Implementations of {Rijndael} and {Triple DES} Using
                 {SLAAC-1V FPGA} Accelerator Board",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2200",
  pages =        "220--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:44 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2200.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2200/22000220.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2200/22000220.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Christianson:2001:PKC,
  author =       "Bruce Christianson and Bruno Crispo and James A.
                 Malcolm",
  title =        "Public-Key Crypto-systems Using Symmetric-Key
                 Crypto-algorithms",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2133",
  pages =        "182--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:35 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2133.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2133/21330182.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2133/21330182.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ciet:2001:SFC,
  author =       "M. Ciet and J.-J. Quisquater and F. Sica",
  title =        "A Secure Family of Composite Finite Fields Suitable
                 for Fast Implementation of Elliptic Curve
                 Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2247",
  pages =        "108--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:31 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2247.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2247/22470108.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2247/22470108.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Cirstea:2001:SAP,
  author =       "Horatiu Cirstea",
  title =        "Specifying Authentication Protocols Using Rewriting
                 and Strategies",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1990",
  pages =        "138--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:09 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1990.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1990/19900138.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1990/19900138.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Misc{claffy:2001:IMM,
  author =       "kc claffy",
  title =        "{Internet} Measurement: Myths About {Internet} Data",
  year =         "2001",
  bibdate =      "Tue Oct 15 15:38:06 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Unpublished invited talk, LISA 2001: 15th Systems
                 Administration Conference, December 2--7, 2001, Town
                 and Country Resort Hotel, San Diego, CA.",
  URL =          "http://db.usenix.org/publications/library/proceedings/lisa2001/tech/",
  abstract =     "Current papers that propose new techniques and
                 protocols often make assumptions about traffic
                 characteristics that are simply not validated by real
                 data. Hypotheses about the level of fragmented traffic,
                 encrypted traffic, topology characteristics, traffic
                 favoritism, path symmetry, DOS attack prevalence,
                 address space utilization and consumption, directional
                 balance of traffic volume, routing protocol behavior
                 and policy, and distribution statistics of path
                 lengths, flow sizes, packet sizes, prefix lengths, and
                 routing announcements therefore yield questionable
                 analytical results. Even in cases where analysis is
                 based on data attainable by a researcher on his or her
                 local campus, attempts to generalize typically lose
                 integrity in the face of more complete or
                 representative data sets.",
  acknowledgement = ack-nhfb,
  annote =       "Yes, author name is all lowercase.",
}

@Article{Cobas:2001:CTA,
  author =       "Juan David Gonz{\'a}lez Cobas and Jos{\'e} Antonio
                 L{\'o}pez Brugos",
  title =        "A Complexity-Theoretic Approach to the Design of Good
                 Measures of Cryptographic Strength",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2178",
  pages =        "233--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:08:59 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2178.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2178/21780233.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2178/21780233.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Cochran:2001:NVS,
  author =       "Shannon Cochran",
  title =        "News and Views: Scientists Seek Immersive Reality;
                 {USENIX} Names Lifetime Achievement Recipients [the
                 {GNU Project} and the {Kerberos} network authentication
                 system]; Robots Need Programmers; Evangelizing the
                 {Semantic Web}; Get Your Supercomputer Software Free;
                 {Usenet} Creator {Jim Ellis} Dies; {DARPA} Funds
                 {FreeBSD} Security Initiative",
  journal =      j-DDJ,
  volume =       "26",
  number =       "9",
  pages =        "18--18",
  month =        sep,
  year =         "2001",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Tue Feb 12 05:21:39 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Cocks:2001:IBE,
  author =       "Clifford Cocks",
  title =        "An Identity Based Encryption Scheme Based on Quadratic
                 Residues",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2260",
  pages =        "360--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:45 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2260.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2260/22600360.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2260/22600360.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Cormen:2001:IA,
  author =       "Thomas H. Cormen and Charles E. (Eric) Leiserson and
                 Ronald L. Rivest",
  title =        "Introduction to Algorithms",
  publisher =    pub-MIT,
  address =      pub-MIT:adr,
  edition =      "Second",
  pages =        "xxi + 1180",
  year =         "2001",
  ISBN =         "0-262-53196-8 (paperback), 0-262-03293-7 (hardcover),
                 0-07-013151-1 (McGraw-Hill), 0-07-297054-5 (McGraw-Hill
                 with CD-ROM)",
  ISBN-13 =      "978-0-262-53196-2 (paperback), 978-0-262-03293-3
                 (hardcover), 978-0-07-013151-4 (McGraw-Hill),
                 978-0-07-297054-8 (McGraw-Hill with CD-ROM)",
  LCCN =         "QA76.6 .I5858 2001",
  bibdate =      "Sat Jan 26 12:46:16 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib;
                 z3950.loc.gov:7090/Voyager",
  abstract =     "This title covers a broad range of algorithms in
                 depth, yet makes their design and analysis accessible
                 to all levels of readers. Each chapter is relatively
                 self-contained and can be used as a unit of study. The
                 algorithms are described in English and in a pseudocode
                 designed to be readable by anyone who has done a little
                 programming. The explanations have been kept elementary
                 without sacrificing depth of coverage or mathematical
                 rigor. This second edition features new chapters on the
                 role of algorithms, probabilistic analysis and
                 randomized algorithms, and linear programming, as well
                 as extensive revisions to virtually every section of
                 the book. In a subtle but important change, loop
                 invariants are introduced early and used throughout the
                 text to prove algorithm correctness. Without changing
                 the mathematical and analytic focus, the authors have
                 moved much of the mathematical foundations material
                 from Part I to an appendix and have included additional
                 motivational material at the beginning.",
  acknowledgement = ack-ds # " and " # ack-nhfb,
  libnote =      "Not yet in my library.",
  rawdata =      "Cormen, Thomas H., Charles E. Leiserson, Ronald L.
                 Rivest and Clifford Stein (2001) {\it Introduction to
                 Algorithms}, 2nd Edition, MIT Press and McGraw-Hill.",
  remark =       "MIT Press 2001, McGraw-Hill 2002 (third printing),
                 McGraw-Hill 2003 (fourth printing)",
  shorttableofcontents = "1: The Role of Algorithms in Computing \\
                 2: Getting Started \\
                 3: Growth of Functions \\
                 4: Recurrences \\
                 5: Probabilistic Analysis and Randomized Algorithms \\
                 6: Heapsort \\
                 7: Quicksort \\
                 8: Sorting in Linear Time \\
                 9: Medians and Order Statistics \\
                 10: Elementary Data Structures \\
                 11: Hash Tables \\
                 12: Binary Search Trees \\
                 13: Red-Black Trees \\
                 14: Augmenting Data Structures \\
                 15: Dynamic Programming \\
                 16: Greedy Algorithms \\
                 17: Amortized Analysis \\
                 18: B-Trees \\
                 19: Binomial Heaps \\
                 20: Fibonacci Heaps \\
                 21: Data Structures for Disjoint Sets \\
                 22: Elementary Graph Algorithms \\
                 23: Minimum Spanning Trees \\
                 24: Single-Source Shortest Paths \\
                 25: All-Pairs Shortest Paths \\
                 26: Maximum Flow \\
                 27: Sorting Networks \\
                 28: Matrix Operations \\
                 29: Linear Programming \\
                 30: Polynomials and the FFT \\
                 31: Number-Theoretic Algorithms \\
                 32: String Matching \\
                 33: Computational Geometry \\
                 34: NP-Completeness \\
                 35: Approximation Algorithms \\
                 A: Summations \\
                 B: Sets, etc. \\
                 C: Counting and probability",
  subject =      "Computer programming; Computer algorithms",
  tableofcontents = "Preface / xiii \\
                 I Foundations \\
                 Introduction / 3 \\
                 1 The Role of Algorithms in Computing / 5 \\
                 1.1 Algorithms / 5 \\
                 1.2 Algorithms as a technology / 10 \\
                 2 Getting Started / 75 \\
                 2.1 Insertion sort / 15 \\
                 2.2 Analyzing algorithms / 21 \\
                 2.3 Designing algorithms / 27 \\
                 3 Growth of Functions / 41 \\
                 3.1 Asymptotic notation / 41 \\
                 3.2 Standard notations and common functions / 51 \\
                 4 Recurrences / 62 \\
                 4.1 The substitution method / 63 \\
                 4.2 The recursion-tree method / 67 \\
                 4.3 The master method / 73 \\
                 4.4 Proof of the master theorem / 76 \\
                 5 Probabilistic Analysis and Randomized Algorithms / 91
                 \\
                 5.1 The hiring problem / 91 \\
                 5.2 Indicator random variables / 94 \\
                 5.3 Randomized algorithms / 99 \\
                 5.4 Probabilistic analysis and further uses of
                 indicator random variables / 106 \\
                 II Sorting and Order Statistics \\
                 Introduction / 123 \\
                 6 Heapsort / 127 \\
                 6.1 Heaps / 127 \\
                 6.2 Maintaining the heap property / 130 \\
                 6.3 Building a heap / 132 \\
                 6.4 The heapsort algorithm / 135 \\
                 6.5 Priority queues / 138 \\
                 7 Quicksort / 145 \\
                 7.1 Description of quicksort / 145 \\
                 7.2 Performance of quicksort / 149 \\
                 7.3 A randomized version of quicksort / 153 \\
                 7.4 Analysis of quicksort / 755 \\
                 8 Sorting in Linear Time / 165 \\
                 8.1 Lower bounds for sorting / 765 \\
                 8.2 Counting sort / 168 \\
                 8.3 Radix sort / 770 \\
                 8.4 Bucket sort / 174 \\
                 9 Medians and Order Statistics / 183 \\
                 9.1 Minimum and maximum / 184 \\
                 9.2 Selection in expected linear time / 785 \\
                 9.3 Selection in worst-case linear time / 189 \\
                 III Data Structures \\
                 Introduction / 197 \\
                 10 Elementary Data Structures / 200 \\
                 10.1 Stacks and queues / 200 \\
                 10.2 Linked lists / 204 \\
                 10.3 Implementing pointers and objects / 209 \\
                 10.4 Representing rooted trees / 214 \\
                 11 Hash Tables / 221 \\
                 11.1 Direct-address tables / 222 \\
                 11.2 Hash tables / 224 \\
                 11.3 Hash functions / 229 \\
                 11.4 Open addressing / 237 \\
                 11.5 Perfect hashing / 245 \\
                 12 Binary Search Trees / 253 \\
                 12.1 What is a binary search tree? / 253 \\
                 12.2 Querying a binary search tree / 256 \\
                 12.3 Insertion and deletion / 261 \\
                 12.4 Randomly built binary search trees / 265 \\
                 13 Red--Black Trees / 273 \\
                 13.1 Properties of red-black trees / 273 \\
                 13.2 Rotations / 277 \\
                 13.3 Insertion / 280 \\
                 13.4 Deletion / 288 \\
                 14 Augmenting Data Structures / 302 \\
                 14.1 Dynamic order statistics / 302 \\
                 14.2 How to augment a data structure / 308 \\
                 14.3 Interval trees / 311 \\
                 IV Advanced Design and Analysis Techniques \\
                 Introduction / 321 \\
                 15 Dynamic Programming / 323 \\
                 15.1 Assembly-line scheduling / 324 \\
                 15.2 Matrix-chain multiplication / 331 \\
                 15.3 Elements of dynamic programming / 339 \\
                 15.4 Longest common subsequence / 350 \\
                 15.5 Optimal binary search trees / 356 \\
                 16 Greedy Algorithms / 370 \\
                 16.1 An activity-selection problem / 377 \\
                 16.2 Elements of the greedy strategy / 379 \\
                 16.3 Huffman codes / 385 \\
                 * 16.4 Theoretical foundations for greedy methods / 393
                 \\
                 * 16.5 A task-scheduling problem / 399 \\
                 17 Amortized Analysis / 405 \\
                 17.1 Aggregate analysis / 406 \\
                 17.2 The accounting method / 470 \\
                 17.3 The potential method / 412 \\
                 17.4 Dynamic tables / 476 \\
                 V Advanced Data Structures \\
                 Introduction / 431 \\
                 18 B-Trees / 434 \\
                 18.1 Definition of B-trees / 438 \\
                 18.2 Basic operations on B-trees / 441 \\
                 18.3 Deleting a key from -tree / 449 \\
                 19 Binomial Heaps / 455 \\
                 19.1 Binomial trees and binomial heaps / 457 \\
                 19.2 Operations on binomial heaps / 461 \\
                 20 Fibonacci Heaps / 476 \\
                 20.1 Structure of Fibonacci heaps / 477 \\
                 20.2 Mergeable-heap operations / 479 \\
                 20.3 Decreasing a key and deleting a node / 489 \\
                 20.4 Bounding the maximum degree / 493 \\
                 21 Data Structures for Disjoint Sets / 498 \\
                 21.1 Disjoint-set operations / 498 \\
                 21.2 Linked-list representation of disjoint sets / 501
                 \\
                 21.3 Disjoint-set forests / 505 \\
                 * 21.4 Analysis of union by rank with path compression
                 / 509 \\
                 VI Graph Algorithms \\
                 Introduction / 525 \\
                 22 Elementary Graph Algorithms / 527 \\
                 22.1 Representations of graphs / 527 \\
                 22.2 Breadth-first search / 531 \\
                 22.3 Depth-first search / 540 \\
                 22.4 Topological sort / 549 \\
                 22.5 Strongly connected components / 552 \\
                 23 Minimum Spanning Trees / 561 \\
                 23.1 Growing a minimum spanning tree / 562 \\
                 23.2 The algorithms of Kruskal and Prim / 567 \\
                 24 Single-Source Shortest Paths / 580 \\
                 24.1 The Bellman--Ford algorithm / 588 \\
                 24.2 Single-source shortest paths in directed acyclic
                 graphs / 592 \\
                 24.3 Dijkstra's algorithm / 595 \\
                 24.4 Difference constraints and shortest paths / 607
                 \\
                 24.5 Proofs of shortest-paths properties / 607 \\
                 25 All-Pairs Shortest Paths / 620 \\
                 25.1 Shortest paths and matrix multiplication / 622 \\
                 25.2 The Floyd--Warshall algorithm / 629 \\
                 25.3 Johnson's algorithm for sparse graphs / 636 \\
                 26 Maximum Flow / 643 \\
                 26.1 Flow networks / 644 \\
                 26.2 The Ford--Fulkerson method / 657 \\
                 26.3 Maximum bipartite matching / 664 \\
                 * 26.4 Push-relabel algorithms / 669 \\
                 26.5 The relabel-to-front algorithm / 681 \\
                 VII Selected Topics \\
                 Introduction / 701 \\
                 27 Sorting Networks / 704 \\
                 21 Comparison networks / 704 \\
                 27.2 The zero-one principle / 709 \\
                 21.3 A bitonic sorting network / 712 \\
                 21.4 A merging network / 716 \\
                 27.5 A sorting network / 719 \\
                 28 Matrix Operations / 725 \\
                 28.1 Properties of matrices / 725 \\
                 28.2 Strassen's algorithm for matrix multiplication /
                 735 \\
                 28.3 Solving systems of linear equations / 742 \\
                 28.4 Inverting matrices / 755 \\
                 28.5 Symmetric positive-definite matrices and
                 least-squares approximation / 760 \\
                 29 Linear Programming / 770 \\
                 29.1 Standard and slack forms / 777 \\
                 29.2 Formulating problems as linear programs / 785 \\
                 29.3 The simplex algorithm / 790 \\
                 29.4 Duality / 804 \\
                 29.5 The initial basic feasible solution Si / 7 \\
                 30 Polynomials and the FFT / 822 \\
                 30.1 Representation of polynomials / 824 \\
                 30.2 The DFT and FFT / 830 \\
                 30.3 Efficient FFT implementations / 839 \\
                 31 Number-Theoretic Algorithms / 849 \\
                 31.1 Elementary number-theoretic notions / 850 \\
                 31.2 Greatest common divisor / 856 \\
                 31.3 Modular arithmetic / 862 \\
                 31.4 Solving modular linear equations / 869 \\
                 31.5 The Chinese remainder theorem / 873 \\
                 31.6 Powers of an element / 876 \\
                 31.7 The RSA public-key cryptosystem / 881 \\
                 31.8 Primality testing / 887 \\
                 31.9 Integer factorization / 896 \\
                 32 String Matching / 906 \\
                 32.1 The naive string-matching algorithm / 909 \\
                 32.2 The Rabin--Karp algorithm / 911 \\
                 32.3 String matching with finite automata / 976 \\
                 32.4 The Knuth--Morris--Pratt algorithm / 923 \\
                 33 Computational Geometry / 933 \\
                 33.1 Line-segment properties / 934 \\
                 33.2 Determining whether any pair of segments
                 intersects / 940 \\
                 33.3 Finding the convex hull / 947 \\
                 33.4 Finding the closest pair of points / 957 \\
                 34 NP-Completeness / 966 \\
                 34.1 Polynomial time / 971 \\
                 34.2 Polynomial-time verification / 979 \\
                 34.3 NP-completeness and reducibility / 984 \\
                 34.4 NP-completeness proofs / 995 \\
                 34.5 NP-complete problems / 1003 \\
                 35 Approximation Algorithms / 1022 \\
                 35.1 The vertex-cover problem / 1024 \\
                 35.2 The traveling-salesman problem / 7027 \\
                 35.3 The set-covering problem / 1033 \\
                 35.4 Randomization and linear programming / 7039 \\
                 35.5 The subset-sum problem / 1043 \\
                 VIII Appendix: Mathematical Background \\
                 Introduction / 1057 \\
                 A Summations / 1058 \\
                 A.1 Summation formulas and properties / 1058 \\
                 A.2 Bounding summations / 1062",
}

@Article{Coron:2001:GGC,
  author =       "Jean-S{\'e}bastien Coron and Helena Handschuh and Marc
                 Joye and Pascal Paillier and David Pointcheval and
                 Christophe Tymen",
  title =        "{GEM}: a {Generic} Chosen-Ciphertext Secure
                 {Encryption Method}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2271",
  pages =        "263--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:06 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2271.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2271/22710263.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2271/22710263.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Coron:2001:OCC,
  author =       "Jean-S{\'e}bastien Coron and Helena Handschuh and Marc
                 Joye and Pascal Paillier and David Pointcheval and
                 Christophe Tymen",
  title =        "Optimal Chosen-Ciphertext Secure Encryption of
                 Arbitrary-Length Messages",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2274",
  pages =        "17--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:07 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2274.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2274/22740017.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2274/22740017.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Coron:2001:SSL,
  author =       "Jean-S{\'e}bastien Coron and Paul Kocher and David
                 Naccache",
  title =        "Statistics and Secret Leakage",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1962",
  pages =        "157--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:55 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1962.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1962/19620157.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1962/19620157.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InCollection{Coulter:2001:GAH,
  author =       "Robert S. Coulter and George Havas and Marie
                 Henderson",
  booktitle =    "Computer mathematics (Matsuyama, 2001)",
  title =        "{Giesbrecht}'s algorithm, the {HFE} cryptosystem and
                 {Ore}'s {$ p^s $}-polynomials",
  volume =       "9",
  publisher =    pub-WORLD-SCI,
  address =      pub-WORLD-SCI:adr,
  pages =        "36--45",
  year =         "2001",
  MRclass =      "11T71 (16S35 94A60)",
  MRnumber =     "1 877 440",
  MRreviewer =   "Steven L. Swanson",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "Lecture Notes Ser. Comput.",
}

@Article{Courtois:2001:EZK,
  author =       "Nicolas T. Courtois",
  title =        "Efficient Zero-Knowledge Authentication Based on a
                 Linear Algebra Problem {MinRank}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2248",
  pages =        "402--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2248.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2248/22480402.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2248/22480402.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Courtois:2001:HAM,
  author =       "Nicolas T. Courtois and Matthieu Finiasz and Nicolas
                 Sendrier",
  title =        "How to Achieve a {McEliece}-Based Digital Signature
                 Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2248",
  pages =        "157--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2248.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2248/22480157.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2248/22480157.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Cramer:2001:CRS,
  author =       "Ronald Cramer and Ivan Damg{\aa}rd and Serge Fehr",
  title =        "On the Cost of Reconstructing a Secret, or {VSS} with
                 Optimal Reconstruction Phase",
  crossref =     "Kilian:2001:ACC",
  pages =        "503--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390503.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390503.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@InCollection{Cramer:2001:MCT,
  author =       "Ronald Cramer and Ivan Damg{\aa}rd and Jesper B.
                 Nielsen",
  booktitle =    "Advances in cryptology---EUROCRYPT 2001 (Innsbruck)",
  title =        "Multiparty Computation from Threshold Homomorphic
                 Encryption",
  volume =       "2045",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "280--300",
  year =         "2001",
  MRclass =      "94A60",
  MRnumber =     "1 895 439",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2045.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  series =       "Lecture Notes in Comput. Sci.",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2045/20450280.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2045/20450280.pdf",
}

@InProceedings{Cramer:2001:SDL,
  author =       "Ronald Cramer and Ivan Damg{\aa}rd",
  title =        "Secure Distributed Linear Algebra in a Constant Number
                 of Rounds",
  crossref =     "Kilian:2001:ACC",
  pages =        "119--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390119.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390119.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Crawford:2001:FHC,
  author =       "Diane Crawford and Mick Zraly and Hal Berghel and Ken
                 Pugh and Mat H. West and Conrad Weisert and Terry
                 Steyaert and Richard Johnson",
  title =        "Forum: How Can the {Web} Advance {Western}
                 Democracies? Who Needs Digital Signatures;
                 Misinformation and the {Emulex} Hoax; {OOSCD} Not
                 Really So Unified; Go Back to Non-{OOSD}",
  journal =      j-CACM,
  volume =       "44",
  number =       "2",
  pages =        "11--13",
  month =        feb,
  year =         "2001",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Feb 05 18:28:34 2001",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See \cite{Schneier:2000:IRS}.",
  URL =          "http://www.acm.org/pubs/citations/journals/cacm/2001-44-2/p11-crawford/",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Crawford:2001:FPV,
  author =       "Diane Crawford and Thomas Tiahrt and Moti Ben-Ari and
                 Matt West and Hans A. von Spakovsky and Deborah
                 Phillips",
  title =        "Forum: Participatory Vs. Representative Democracy; Why
                 Store Everything?; {Emulex} Hoax; Correction",
  journal =      j-CACM,
  volume =       "44",
  number =       "4",
  pages =        "13--15",
  month =        apr,
  year =         "2001",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Apr 7 07:56:05 MDT 2001",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See \cite{Schneier:2000:IRS,Phillips:2001:GRI}.",
  URL =          "http://www.acm.org/pubs/citations/journals/cacm/2001-44-4/p13-crawford/",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Crouch:2001:LAR,
  author =       "P. A. Crouch and J. H. Davenport",
  title =        "Lattice Attacks on {RSA}-Encrypted {IP} and {TCP}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2260",
  pages =        "329--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:45 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2260.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2260/22600329.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2260/22600329.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Crowley:2001:MFL,
  author =       "Paul Crowley",
  title =        "{Mercy}: a Fast Large Block Cipher for Disk Sector
                 Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1978",
  pages =        "49--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:00 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1978.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1978/19780049.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1978/19780049.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Daemen:2001:AAR,
  author =       "Joan Daemen and Vincent Rijmen",
  title =        "Algorithm Alley: {Rijndael}: The {Advanced Encryption
                 Standard}",
  journal =      j-DDJ,
  volume =       "26",
  number =       "3",
  pages =        "137--139",
  month =        mar,
  year =         "2001",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Feb 15 12:14:41 MST 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/ftp/2001/2001_03/aa0301.txt;
                 http://www.esat.kuleuven.ac.be/~rijmen/rijndael/",
  abstract =     "NIST has announced that the Rijndael algorithm was the
                 winner of its Advanced Encryption Standard competition.
                 Joan and Vincent, its inventors, lift the hood on the
                 algorithm. Additional resources include aa0301.txt
                 (listings).",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Daemen:2001:BCP,
  author =       "Joan Daemen and Michael Peeters and Gilles {Van
                 Assche}",
  title =        "Bitslice Ciphers and Power Analysis Attacks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1978",
  pages =        "134--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:00 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1978.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1978/19780134.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1978/19780134.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Dai:2001:CDE,
  author =       "Qiong Dai and Xiao Xiang Zou and Zhu Kai Luo",
  title =        "Cracking a data encryption and decryption system using
                 multi-valued logic array",
  journal =      j-CHIN-J-COMPUTERS,
  volume =       "24",
  number =       "6",
  pages =        "654--656",
  year =         "2001",
  CODEN =        "JIXUDT",
  ISSN =         "0254-4164",
  MRclass =      "94A60",
  MRnumber =     "1 852 016",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  fjournal =     "Chinese Journal of Computers. Jisuanji Xuebao",
}

@Article{Dale:2001:BSA,
  author =       "Richard Dale",
  title =        "Biometric Security: It's all about identification and
                 authentication",
  journal =      j-DDJ,
  volume =       "26",
  number =       "11",
  pages =        "93--94, 96",
  month =        nov,
  year =         "2001",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Tue Feb 12 05:21:40 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/",
  abstract =     "Biometrics offers a strong authentication alternative
                 to traditional passwords and tokens, and can do so
                 without imposing the burden and cost of application
                 source-code modification.",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Damgaard:2001:GSS,
  author =       "Ivan Damg{\aa}rd and Mads Jurik",
  title =        "A Generalisation, a Simplification and Some
                 Applications of {Paillier}'s Probabilistic Public-Key
                 System",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1992",
  pages =        "119--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:11 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1992.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1992/19920119.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1992/19920119.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Damgaard:2001:PTR,
  author =       "Ivan Damg{\aa}rd and Maciej Koprowski",
  title =        "Practical Threshold {RSA} Signatures without a Trusted
                 Dealer",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2045",
  pages =        "152--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:02 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2045.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2045/20450152.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2045/20450152.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Dandalis:2001:CSP,
  author =       "Andreas Dandalis and Viktor K. Prasanna and Jose D. P.
                 Rolim",
  title =        "A Comparative Study of Performance of {AES} Final
                 Candidates Using {FPGAs}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1965",
  pages =        "125--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:57 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1965.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1965/19650125.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1965/19650125.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Danielyan:2001:AAE,
  author =       "Edgar Danielyan",
  title =        "{AES}: {Advanced Encryption Standard} is Coming",
  journal =      j-LOGIN,
  volume =       "26",
  number =       "1",
  pages =        "??--??",
  month =        feb,
  year =         "2001",
  CODEN =        "LOGNEM",
  ISSN =         "1044-6397",
  bibdate =      "Tue Apr 11 10:45:51 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.usenix.org/publications/login/2001-02/index.html",
  URL =          "http://www.usenix.org/publications/login/2001-02/pdfs/danielyan.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     ";login: the USENIX Association newsletter",
}

@InProceedings{Davis:2001:DSA,
  author =       "Don Davis",
  title =        "Defective {Sign \& Encrypt} in {S/MIME}, {PKCS\#7},
                 {MOSS}, {PEM}, {PGP}, and {XML}",
  crossref =     "USENIX:2001:PUA",
  pages =        "??--??",
  year =         "2001",
  bibdate =      "Tue Oct 15 17:19:08 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/usenix01/davis.html",
  acknowledgement = ack-nhfb,
}

@Article{Davis:2001:DSE,
  author =       "Don Davis",
  title =        "Defective Sign-and-Encrypt: Can you really trust
                 {S/MIME}, {PCKS\#7}, {PGP}, and {XML}?",
  journal =      j-DDJ,
  volume =       "26",
  number =       "11",
  pages =        "30",
  month =        nov,
  year =         "2001",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Tue Feb 12 05:21:40 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/",
  abstract =     "Over the past 25 years, most security protocols have
                 focused on securing network connections, ignoring
                 relatively simple file-encryption problems. Don
                 presents guidelines for avoiding a common security
                 pitfall when combining encryption with digital
                 signatures.",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Book{Davis:2001:ISV,
  author =       "Carlton R. Davis",
  title =        "{IPSec}: Securing {VPNs}",
  publisher =    pub-MCGRAW-HILL,
  address =      pub-MCGRAW-HILL:adr,
  pages =        "xix + 404",
  year =         "2001",
  ISBN =         "0-07-212757-0",
  ISBN-13 =      "978-0-07-212757-7",
  LCCN =         "TK5105.567 D38 200",
  bibdate =      "Wed Jun 06 18:29:48 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$49.99",
  acknowledgement = ack-nhfb,
}

@Article{Dawu:2001:TES,
  author =       "Gu Dawu and Wang Yi",
  title =        "On the techniques of enhancing the security of block
                 ciphers",
  journal =      j-OPER-SYS-REV,
  volume =       "35",
  number =       "4",
  pages =        "94--96",
  month =        oct,
  year =         "2001",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:53 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@InProceedings{DeSantis:2001:RNI,
  author =       "Alfredo {De Santis} and Giovanni {Di Crescenzo} and
                 Rafail Ostrovsky and Giuseppe Persiano and Amit Sahai",
  title =        "Robust Non-interactive Zero Knowledge",
  crossref =     "Kilian:2001:ACC",
  pages =        "566--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390566.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390566.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Desmedt:2001:ERD,
  author =       "Yvo Desmedt and Mike Burmester and Jennifer Seberry",
  title =        "Equitability in Retroactive Data Confiscation versus
                 Proactive Key Escrow",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1992",
  pages =        "277--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:11 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1992.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1992/19920277.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1992/19920277.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Dhem:2001:HSS,
  author =       "Jean-Fran{\c{c}}ois Dhem and Nathalie Feyt",
  title =        "Hardware and Software Symbiosis Helps Smart Card
                 Evolution",
  journal =      j-IEEE-MICRO,
  volume =       "21",
  number =       "6",
  pages =        "14--25",
  month =        nov # "\slash " # dec,
  year =         "2001",
  CODEN =        "IEMIDZ",
  DOI =          "https://doi.org/10.1109/40.977754",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Thu Jan 31 18:42:02 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/mi/books/mi2001/m6014abs.htm;
                 http://dlib.computer.org/mi/books/mi2001/pdf/m6014.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Micro",
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
}

@Article{DiCrescenzo:2001:SOS,
  author =       "Giovanni {Di Crescenzo}",
  title =        "Sharing One Secret vs. Sharing Many Secrets: Tight
                 Bounds for the Max Improvement Ratio",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2136",
  pages =        "292--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2136.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2136/21360292.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2136/21360292.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Diffie:2001:UC,
  author =       "Whitfield Diffie",
  title =        "Ultimate cryptography",
  journal =      j-CACM,
  volume =       "44",
  number =       "3",
  pages =        "84--86",
  month =        mar,
  year =         "2001",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/365181.365214",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Mar 13 18:15:02 MST 2001",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/cacm/2001-44-3/p84-diffie/",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@InProceedings{Ding:2001:OTB,
  author =       "Yan Zong Ding",
  title =        "Oblivious Transfer in the Bounded Storage Model",
  crossref =     "Kilian:2001:ACC",
  pages =        "155--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390155.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390155.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Dittmann:2001:UCW,
  author =       "Jana Dittmann and Petra Wohlmacher and Klara
                 Nahrstedt",
  title =        "Using Cryptographic and Watermarking Algorithms",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "8",
  number =       "4",
  pages =        "54--65",
  month =        oct,
  year =         "2001",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/93.959103",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Sat Feb 23 11:55:59 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/mu/books/mu2001/pdf/u4054.pdf;
                 http://www.computer.org/multimedia/mu2001/u4054abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Multimedia",
}

@Article{Djurovic:2001:DWF,
  author =       "Igor Djurovic and Srdjan Stankovic and Ioannis Pitas",
  title =        "Digital watermarking in the fractional {Fourier}
                 transformation domain",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "24",
  number =       "2",
  pages =        "167--173",
  month =        apr,
  year =         "2001",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:42:39 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804500901280",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Dodis:2001:PAS,
  author =       "Yevgeniy Dodis and Amit Sahai and Adam Smith",
  title =        "On Perfect and Adaptive Security in Exposure-Resilient
                 Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2045",
  pages =        "301--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:02 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2045.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2045/20450301.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2045/20450301.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Domingo-Ferrer:2001:CDS,
  author =       "Josep Domingo-Ferrer and Pieter Hartel",
  title =        "Current directions in smart cards",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "36",
  number =       "4",
  pages =        "377--379",
  day =          "16",
  month =        jul,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Wed Jul 25 16:48:14 MDT 2001",
  bibsource =    "http://www.elsevier.com/locate/issn/13891286;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.nl/gej-ng/10/15/22/61/28/25/abstract.html;
                 http://www.elsevier.nl/gej-ng/10/15/22/61/28/25/article.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Donsez:2001:TMA,
  author =       "Didier Donsez and S{\'e}bastien Jean and Sylvain
                 Lecomte and Olivier Thomas",
  title =        "Turning Multi-applications Smart Cards Services
                 Available from Anywhere at Anytime: a {SOAP \slash MOM}
                 Approach in the Context of {Java} Cards",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2140",
  pages =        "83--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2140.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2140/21400083.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2140/21400083.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Du:2001:OKS,
  author =       "Wei Zhang Du and Xin Mei Wang",
  title =        "One kind of secret-code encryption scheme based on
                 maximum rank distance codes",
  journal =      j-CHIN-J-COMPUTERS,
  volume =       "24",
  number =       "6",
  pages =        "650--653",
  year =         "2001",
  CODEN =        "JIXUDT",
  ISSN =         "0254-4164",
  MRclass =      "94A60 (94B60)",
  MRnumber =     "1 852 015",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  fjournal =     "Chinese Journal of Computers. Jisuanji Xuebao",
}

@Article{Durante:2001:CWR,
  author =       "Antonio Durante and Riccardo Focardi and Roberto
                 Gorrieri",
  title =        "{CVS} at Work: a Report on New Failures upon Some
                 Cryptographic Protocols",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2052",
  pages =        "287--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:08 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2052.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2052/20520287.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2052/20520287.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Duranti:2001:LTP,
  author =       "Luciana Duranti",
  title =        "The Long-Term Preservation of Authentic Electronic
                 Records",
  crossref =     "Apers:2001:PTS",
  pages =        "625--628",
  year =         "2001",
  bibdate =      "Thu Feb 21 17:51:12 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.vldb.org/dblp/db/conf/vldb/vldb2001.html",
  URL =          "http://www.vldb.org/conf/2001/P625.pdf",
  acknowledgement = ack-nhfb,
  annote =       "link",
  authorurl =    "http://www.vldb.org/dblp/db/indices/a-tree/d/Duranti:Luciana.html",
}

@Article{Eggers:2001:DWC,
  author =       "Joachim J. Eggers and Wolf-Dietrich Ihlenfeldt and
                 Bernd Girod",
  title =        "Digital Watermarking of Chemical Structure Sets",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2137",
  pages =        "200--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:39 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2137.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2137/21370200.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2137/21370200.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Eghlidos:2001:IRL,
  author =       "Taraneh Eghlidos and Albrecht Beutelspacher and Babak
                 Sadeghiyan",
  title =        "Improving the resistance of {DES} and {DES}-like
                 cryptosystems against differential cryptanalysis",
  journal =      "Atti Sem. Mat. Fis. Univ. Modena",
  volume =       "49",
  number =       "1",
  pages =        "147--169",
  year =         "2001",
  CODEN =        "ASMMAK",
  ISSN =         "0041-8986",
  MRclass =      "94A60",
  MRnumber =     "2002d:94039",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Atti del Seminario Matematico e Fisico
                 dell'Universit\`a di Modena",
}

@Article{El-Kassar:2001:GPK,
  author =       "A. N. El-Kassar and Mohamed Rizk and N. M. Mirza and
                 Y. A. Awad",
  title =        "{El-Gamal} public key cryptosystem in the domain of
                 {Gaussian} integers",
  journal =      "Int. J. Appl. Math.",
  volume =       "7",
  number =       "4",
  pages =        "405--412",
  year =         "2001",
  ISSN =         "1311-1728",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "1 856 865",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "International Journal of Applied Mathematics",
}

@Article{Erickson:2001:EDD,
  author =       "Jonathan Erickson",
  title =        "Editorial: From the {Department of Dumb Ideas}",
  journal =      j-DDJ,
  volume =       "26",
  number =       "3",
  pages =        "8--8",
  month =        mar,
  year =         "2001",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Feb 15 12:14:41 MST 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
  keywords =     "Content Protection for Recordable Media (CPRM)",
}

@Article{Felkel:2001:ICW,
  author =       "Petr Felkel and Mario Bruckschwaiger and Rainer
                 Wegenkittl",
  title =        "Implementation and Complexity of the
                 Watershed-from-Markers Algorithm Computed as a Minimal
                 Cost Forest",
  journal =      j-CGF,
  volume =       "20",
  number =       "3",
  pages =        "??--??",
  month =        sep,
  year =         "2001",
  CODEN =        "CGFODY",
  ISSN =         "0167-7055 (print), 1467-8659 (electronic)",
  ISSN-L =       "0167-7055",
  bibdate =      "Thu Feb 21 09:14:37 2002",
  bibsource =    "http://www.blackwellpublishing.com/journal.asp?ref=0167-7055;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Com{\-}pu{\-}ter Graphics Forum",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1467-8659/",
}

@Article{Ferguson:2001:ICRa,
  author =       "Niels Ferguson and John Kelsey and Stefan Lucks and
                 Bruce Schneier and Mike Stay and David Wagner and Doug
                 Whiting",
  title =        "Improved Cryptanalysis of {Rijndael}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1978",
  pages =        "213--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:00 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1978.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1978/19780213.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1978/19780213.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Ferguson:2001:ICRb,
  author =       "N. Ferguson and J. Kelsey and S. Lucks and B. Schneier
                 and M. Stay and D. Wagner and D. Whiting",
  title =        "Improved Cryptanalysis of {Rijndael}",
  crossref =     "Schneier:2001:FSE",
  pages =        "19--??",
  year =         "2001",
  bibdate =      "Mon Oct 16 08:07:47 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.counterpane.com/rijndael.html;
                 http://www.counterpane.com/rijndael.ps.zip",
  acknowledgement = ack-nhfb # " and " # ack-bs,
}

@Article{Ferguson:2001:SAR,
  author =       "Niels Ferguson and Richard Schroeppel and Doug
                 Whiting",
  title =        "A Simple Algebraic Representation of {Rijndael}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2259",
  pages =        "103--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:44 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2259.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2259/22590103.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2259/22590103.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Filiol:2001:NUS,
  author =       "Eric Filiol and Caroline Fontaine",
  title =        "A New Ultrafast Stream Cipher Design: {COS} Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2260",
  pages =        "85--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:45 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2260.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2260/22600085.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2260/22600085.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Manual{FIPS:2001:AES,
  author =       "{FIPS}",
  title =        "{Advanced Encryption Standard (AES)}",
  volume =       "197",
  organization = pub-NIST,
  address =      pub-NIST:adr,
  pages =        "iv + 47",
  day =          "26",
  month =        nov,
  year =         "2001",
  bibdate =      "Thu Aug 18 07:16:02 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "FIPS PUB",
  URL =          "http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "AES; computer security; cryptography",
}

@Manual{FIPS:2001:SRC,
  author =       "{FIPS}",
  title =        "Security Requirements for Cryptographic Modules",
  volume =       "140-2",
  organization = pub-NIST,
  address =      pub-NIST:adr,
  pages =        "viii + 61",
  day =          "25",
  month =        may,
  year =         "2001",
  bibdate =      "Thu Aug 18 07:16:02 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Annex A: Approved Security Functions (19 May 2005);
                 Annex B: Approved Protection Profiles (04 November
                 2004); Annex C: Approved Random Number Generators (31
                 January 2005); Annex D: Approved Key Establishment
                 Techniques (30 June 2005). Supersedes FIPS PUB 140-1,
                 1994 January 11.",
  series =       "FIPS PUB",
  URL =          "http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf;
                 http://csrc.nist.gov/publications/fips/fips140-2/fips1402annexa.pdf;
                 http://csrc.nist.gov/publications/fips/fips140-2/fips1402annexb.pdf;
                 http://csrc.nist.gov/publications/fips/fips140-2/fips1402annexc.pdf;
                 http://csrc.nist.gov/publications/fips/fips140-2/fips1402annexd.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography",
}

@Article{Fischer:2001:TMR,
  author =       "V. Fischer and M. Drutarovsk{\'y}",
  title =        "Two Methods of {Rijndael} Implementation in
                 Reconfigurable Hardware",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2162",
  pages =        "77--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:06 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2162.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2162/21620077.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2162/21620077.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Fischlin:2001:CLP,
  author =       "Marc Fischlin",
  title =        "Cryptographic limitations on parallelizing membership
                 and equivalence queries with applications to
                 random-self-reductions",
  journal =      j-THEOR-COMP-SCI,
  volume =       "268",
  number =       "2",
  pages =        "199--219",
  day =          "17",
  month =        oct,
  year =         "2001",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Nov 19 08:33:26 MST 2001",
  bibsource =    "http://www.elsevier.com/locate/issn/03043975;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2000.bib",
  URL =          "http://www.elsevier.nl/gej-ng/10/41/16/217/31/29/abstract.html;
                 http://www.elsevier.nl/gej-ng/10/41/16/217/31/29/article.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Fischlin:2001:ICN,
  author =       "Marc Fischlin",
  title =        "On the Impossibility of Constructing Non-interactive
                 Statistically-Secret Protocols from Any Trapdoor
                 One-Way Function",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2271",
  pages =        "79--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:06 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2271.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2271/22710079.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2271/22710079.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Fitzi:2001:MCP,
  author =       "Matthias Fitzi and Juan A. Garay and Ueli Maurer and
                 Rafail Ostrovsky",
  title =        "Minimal Complete Primitives for Secure Multi-party
                 Computation",
  crossref =     "Kilian:2001:ACC",
  pages =        "80--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390080.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390080.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Book{Flannery:2001:CYW,
  author =       "Sarah Flannery and David Flannery",
  title =        "In Code: a [Young Women's] Mathematical Journey",
  publisher =    "Algonquin Books of Chapel Hill",
  address =      "Chapel Hill, NC, USA",
  pages =        "ix + 341",
  year =         "2001",
  ISBN =         "1-56512-377-8",
  ISBN-13 =      "978-1-56512-377-9",
  LCCN =         "QA29.F6 A3 2003",
  bibdate =      "Tue Feb 18 10:28:42 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib",
  price =        "US\$13.95",
  abstract =     "In January 1999, Sarah Flannery, a sports-loving
                 teenager from Blarney in County Cork, won Ireland's
                 Young Scientist of the Year award for her extraordinary
                 research and discoveries in Internet cryptography. Soon
                 her story and photograph were splashed across the front
                 page of the London Times, where she was called
                 ``brilliant.'' Her discoveries earned her the title
                 European Young Scientist of the Year. Just sixteen, she
                 was suddenly a mathematician with an international
                 reputation. Here is the story of how a girl next door
                 moved from the simple math puzzles that were the staple
                 of her family's dinnertime conversation to prime
                 numbers, the Sieve of Eratosthenes, Fermat's Little
                 Theorem, googols --- and finally into her breathtaking
                 algorithm. Parallel with each step is a modest girl's
                 own self-discovery. It's a heartwarming story that will
                 have readers cheering Sarah on.",
  acknowledgement = ack-nhfb,
  keywords =     "Cayley--Purser (CP) encryption; cryptography; RSA",
  tableofcontents = "Foreword / vii \\
                 Preface / ix \\
                 Part I: Background / 1 \\
                 1: Early influences / 3 \\
                 2: Early challenges / 8 \\
                 3: Beginning my first project / 32 \\
                 Part II: Mathematical excursions / 41 \\
                 4: Dad's evening class / 43 \\
                 5: Of prime importance / 47 \\
                 6: The Arithmetic of cryptography / 71 \\
                 7: Sums with a difference / 113 \\
                 8: One way only / 149 \\
                 9: Public key cryptography / 164 \\
                 Part III: Exhibition time / 187 \\
                 10: Young scientist '98 / 189 \\
                 11: Birth of a project / 194 \\
                 12: Young scientist '99 / 218 \\
                 Part IV: After-math / 229 13: Media blitz / 231 \\
                 14: Around the world and back / 254 \\
                 About this book / 269 \\
                 Appendix A: ``Cryptography --- New algorithm versus the
                 RSA'' / 271 \\
                 Appendix B: Answers to miscellaneous questions / 297
                 \\
                 Appendix C: Euclid's algorithm / 305 \\
                 Appendix D: Euler $\phi$-function and the Euler--Fermat
                 Theorem / 315 \\
                 Acknowledgments / 320 \\
                 Bibliography / 323 \\
                 Index / 325",
}

@Article{Fluhrer:2001:AES,
  author =       "Scott Fluhrer and Stefan Lucks",
  title =        "Analysis of the {$ E_0 $} Encryption System",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2259",
  pages =        "38--48",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:44 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2259.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2259/22590038.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2259/22590038.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Fluhrer:2001:WKS,
  author =       "Scott Fluhrer and Itsik Mantin and Adi Shamir",
  editor =       "Serge Vaudenay and Amr M. Youssef",
  booktitle =    "{Selected areas in cryptography: 8th Annual
                 International Workshop, SAC 2001, Toronto, Ontario,
                 Canada, August 16--17, 2001: revised papers}",
  title =        "Weaknesses in the Key Scheduling Algorithm of {RC4}",
  volume =       "2259",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "1--24",
  year =         "2001",
  ISBN =         "3-540-43066-0",
  ISBN-13 =      "978-3-540-43066-7",
  LCCN =         "QA76.9.A25 S22 2001",
  bibdate =      "Mon Jan 23 06:38:15 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://dl.acm.org/citation.cfm?id=694759;
                 http://link.springer-ny.com/link/service/series/0558/tocs/t2259.htm;
                 http://www.crypto.com/papers/others/rc4_ksaproc.pdf;
                 http://www.loc.gov/catdir/enhancements/fy0817/2002511206-d.html",
  abstract =     "In this paper we present several weaknesses in the key
                 scheduling algorithm of RC4, and describe their
                 cryptanalytic significance. We identify a large number
                 of weak keys, in which knowledge of a small number of
                 key bits suffices to determine many state and output
                 bits with non-negligible probability. We use these weak
                 keys to construct new distinguishers for RC4, and to
                 mount related key attacks with practical complexities.
                 Finally, we show that RC4 is completely insecure in a
                 common mode of operations which is used in the
                 widely-deployed Wired Equivalent Privacy protocol (WEP,
                 which is part of the 802.11 standard), in which a fixed
                 secret key is concatenated with known IV modifiers in
                 order to encrypt different messages. Our new passive
                 ciphertext-only attack on this mode can recover an
                 arbitrarily long key in a negligible amount of time
                 which grows only linearly with its size, both for 24
                 and 128 bit IV modifiers.",
  acknowledgement = ack-nhfb,
  remark =       "The Fedora Linux {\tt airsnort} package implements an
                 attack on WEP. From its description: ``AirSnort is a
                 wireless LAN (WLAN) tool which recovers encryption
                 keys. AirSnort operates by passively monitoring
                 transmissions, computing the encryption key when enough
                 packets have been gathered.\par

                 802.11b, using the Wired Equivalent Protocol (WEP), is
                 crippled with numerous security flaws. Most damning of
                 these is the weakness described in ``Weaknesses in the
                 Key Scheduling Algorithm of RC4'' by Scott Fluhrer,
                 Itsik Mantin and Adi Shamir. Adam Stubblefield was the
                 first to implement this attack, but he has not made his
                 software public. AirSnort, along with WEPCrack, which
                 was released about the same time as AirSnort, are the
                 first publicly available implementations of this
                 attack.\par

                 AirSnort requires approximately 5--10 million encrypted
                 packets to be gathered. Once enough packets have been
                 gathered, AirSnort can guess the encryption password in
                 under a second.'' That attack is improved to need only
                 about $ 2^{15} $ packets in \cite{Vaudenay:2007:POK}.",
}

@Book{Ford:2001:SEC,
  author =       "Warwick Ford and Michael S. Baum",
  title =        "Secure electronic commerce: building the
                 infrastructure for digital signatures and encryption",
  publisher =    pub-PHPTR,
  address =      pub-PHPTR:adr,
  edition =      "Second",
  pages =        "xxv + 612",
  year =         "2001",
  ISBN =         "0-13-203795-5 (paperback)",
  ISBN-13 =      "978-0-13-203795-2 (paperback)",
  LCCN =         "QA76.9.A25 F655 2000",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "business communication --- security measures; computer
                 networks --- security measures; computer security",
}

@Article{Fouque:2001:FDT,
  author =       "Pierre-Alain Fouque and Jacques Stern",
  title =        "Fully Distributed Threshold {RSA} under Standard
                 Assumptions",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2248",
  pages =        "310--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2248.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2248/22480310.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2248/22480310.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Fouque:2001:SDC,
  author =       "Pierre-Alain Fouque and Guillaume Poupard and Jacques
                 Stern",
  title =        "Sharing Decryption in the Context of Voting or
                 Lotteries",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1962",
  pages =        "90--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:55 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1962.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1962/19620090.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1962/19620090.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Fouque:2001:TCS,
  author =       "Pierre-Alain Fouque and David Pointcheval",
  title =        "Threshold Cryptosystems Secure against
                 Chosen-Ciphertext Attacks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2248",
  pages =        "351--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2248.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2248/22480351.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2248/22480351.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Fox:2001:PPK,
  author =       "Barbara Fox and Brian LaMacchia",
  title =        "Panel: Public Key Infrastructure: {PKIX}, Signed {XML}
                 or Something Else?",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1962",
  pages =        "327--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:55 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1962.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1962/19620327.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1962/19620327.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Frankel:2001:ASA,
  author =       "Yair Frankel and Philip D. MacKenzie and Moti Yung",
  title =        "Adaptive Security for the Additive-Sharing Based
                 Proactive {RSA}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1992",
  pages =        "240--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:11 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1992.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1992/19920240.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1992/19920240.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Friberg:2001:UCH,
  author =       "Paul Friberg",
  title =        "Using a Cryptographic Hardware Token with {Linux}: The
                 {OpenSSL} Project's New Engine",
  journal =      j-LINUX-J,
  volume =       "89",
  pages =        "??--??",
  month =        sep,
  year =         "2001",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Thu Aug 30 06:06:53 MDT 2001",
  bibsource =    "http://noframes.linuxjournal.com/lj-issues/issue89/index.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Web only.",
  URL =          "http://www.linuxjournal.com/articles/style/0006.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Fridrich:2001:DLS,
  author =       "Jessica Fridrich and Miroslav Goljan and Rui Du",
  title =        "Detecting {LSB} Steganography in Color and Gray-Scale
                 Images",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "8",
  number =       "4",
  pages =        "22--28",
  month =        oct,
  year =         "2001",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/93.959097",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Sat Feb 23 11:55:59 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/mu/books/mu2001/pdf/u4022.pdf;
                 http://www.computer.org/multimedia/mu2001/u4022abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Multimedia",
}

@Article{Friedlander:2001:DDH,
  author =       "John B. Friedlander and Igor E. Shparlinski",
  title =        "On the Distribution of {Diffie--Hellman} Triples with
                 Sparse Exponents",
  journal =      j-SIAM-J-DISCR-MATH,
  volume =       "14",
  number =       "2",
  pages =        "162--169",
  year =         "2001",
  CODEN =        "SJDMEC",
  DOI =          "https://doi.org/10.1137/S0895480199361740",
  ISSN =         "0895-4801 (print), 1095-7146 (electronic)",
  ISSN-L =       "0895-4801",
  bibdate =      "Fri Apr 6 20:26:58 MDT 2001",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SIDMA/14/2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://epubs.siam.org/sam-bin/dbq/article/36174",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Discrete Mathematics",
  journal-URL =  "http://epubs.siam.org/sidma",
}

@InProceedings{Fu:2001:DCA,
  author =       "Kevin Fu and Emil Sit and Kendra Smith and Nick
                 Feamster",
  title =        "The Dos and Don'ts of Client Authentication on the
                 {Web}",
  crossref =     "USENIX:2001:PTU",
  pages =        "??--??",
  year =         "2001",
  bibdate =      "Tue Oct 15 16:52:27 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/usenix2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/sec01/fu.html",
  acknowledgement = ack-nhfb,
}

@InProceedings{Fujisaki:2001:ROS,
  author =       "Eiichiro Fujisaki and Tatsuaki Okamoto and David
                 Pointcheval and Jacques Stern",
  title =        "{RSA--OAEP} Is Secure under the {RSA} Assumption",
  crossref =     "Kilian:2001:ACC",
  pages =        "260--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390260.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390260.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@MastersThesis{Furman:2001:CSM,
  author =       "Vladimir Furman",
  title =        "Cryptanalysis of some modern blockciphers",
  type =         "Thesis ({Master's})",
  school =       "Faculty of Computer Science, Technion --- Israel
                 Institute of Technology",
  address =      "Haifa, Israel",
  pages =        "75",
  year =         "2001",
  bibdate =      "Fri May 13 06:27:16 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  advisor =      "Eli Biham",
  remark =       "Added title page and abstract in Hebrew.",
}

@InProceedings{Furukawa:2001:ESP,
  author =       "Jun Furukawa and Kazue Sako",
  title =        "An Efficient Scheme for Proving a Shuffle",
  crossref =     "Kilian:2001:ACC",
  pages =        "368--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390368.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390368.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Fuster-Sabater:2001:EAG,
  author =       "A. F{\'u}ster-Sabater and L. J. Garc{\'\i}a-Villalba",
  title =        "An efficient algorithm to generate binary sequences
                 for cryptographic purposes",
  journal =      j-THEOR-COMP-SCI,
  volume =       "259",
  number =       "1--2",
  pages =        "679--688",
  day =          "28",
  month =        may,
  year =         "2001",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Jul 25 18:49:24 MDT 2001",
  bibsource =    "http://www.elsevier.com/locate/issn/03043975;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2000.bib",
  URL =          "http://www.elsevier.nl/gej-ng/10/41/16/202/21/54/abstract.html;
                 http://www.elsevier.nl/gej-ng/10/41/16/202/21/54/article.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@InCollection{Gaj:2001:FIF,
  author =       "Kris Gaj and Pawel Chodowiec",
  booktitle =    "Topics in cryptology---CT-RSA 2001 (San Francisco,
                 CA)",
  title =        "Fast Implementation and Fair Comparison of the Final
                 Candidates for {Advanced Encryption Standard} Using
                 Field Programmable Gate Arrays",
  volume =       "2020",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "84--99",
  year =         "2001",
  MRclass =      "94A60",
  MRnumber =     "1 907 091",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2020.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  series =       "Lecture Notes in Comput. Sci.",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2020/20200084.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2020/20200084.pdf",
}

@TechReport{Galbraith:2001:CNR,
  author =       "Steven D. Galbraith and Wenbo Mao and Kenneth G.
                 Paterson",
  title =        "A Cautionary Note Regarding Cryptographic Protocols
                 Based on Composite Integers",
  type =         "Report",
  number =       "HPL-2001-284",
  institution =  "HP Laboratories Bristol",
  address =      "Bristol, UK",
  day =          "8",
  month =        nov,
  year =         "2001",
  bibdate =      "Sat Sep 17 10:57:57 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.hpl.hp.com/techreports/2001/HPL-2001-284.html",
  abstract =     "These days it is rather common in cryptology to see
                 ideas which originated in the setting of finite fields
                 being extended to $ Z*N $. However, the security
                 results do not necessarily generalise to $ Z*N $. In
                 this paper we illustrate this phenomenon by pointing
                 out a flaw in the soundness proof of a zero-knowledge
                 protocol in a timed commitment scheme of Boneh and
                 Naor",
  acknowledgement = ack-nhfb,
}

@Article{Galbraith:2001:RBU,
  author =       "Steven D. Galbraith and Wenbo Mao and Kenneth G.
                 Paterson",
  title =        "{RSA}-Based Undeniable Signatures for General Moduli",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2271",
  pages =        "200--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:06 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2271.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2271/22710200.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2271/22710200.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Galbraith:2001:SCC,
  author =       "Steven D. Galbraith",
  title =        "Supersingular Curves in Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2248",
  pages =        "495--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2248.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2248/22480495.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2248/22480495.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Gallant:2001:FPM,
  author =       "Robert P. Gallant and Robert J. Lambert and Scott A.
                 Vanstone",
  title =        "Faster Point Multiplication on Elliptic Curves with
                 Efficient Endomorphisms",
  crossref =     "Kilian:2001:ACC",
  pages =        "190--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390190.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390190.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@InProceedings{Ganger:2001:AC,
  author =       "G. R. Ganger",
  title =        "Authentication Confidences",
  crossref =     "IEEE:2001:EIW",
  pages =        "169--169",
  year =         "2001",
  bibdate =      "Fri Feb 22 11:41:03 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 OCLC Proceedings database",
  acknowledgement = ack-nhfb,
}

@Book{Gannon:2001:SST,
  author =       "James Gannon",
  title =        "Stealing Secrets, Telling Lies: How Spies and
                 Codebreakers Helped Shape the {Twentieth Century}",
  publisher =    "Brassey's",
  address =      "Washington, DC, USA",
  pages =        "xi + 324",
  year =         "2001",
  ISBN =         "1-57488-367-4, 1-57488-473-5, 1-61234-207-8",
  ISBN-13 =      "978-1-57488-367-1, 978-1-57488-473-9,
                 978-1-61234-207-8",
  LCCN =         "JF 1525 .I6G36 2001X ROBA; JF1525.I6 G36 2001",
  bibdate =      "Sun Dec 1 09:25:44 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 sirsi.library.utoronto.ca:2200/UNICORN",
  acknowledgement = ack-nhfb,
  subject =      "Espionage; International relations",
}

@Book{Garrett:2001:MBC,
  author =       "Paul B. Garrett",
  title =        "Making, breaking codes: an introduction to
                 cryptology",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  pages =        "xix + 524",
  year =         "2001",
  ISBN =         "0-13-030369-0",
  ISBN-13 =      "978-0-13-030369-1",
  LCCN =         "QA268 .G37 2001",
  bibdate =      "Wed Feb 13 12:10:46 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "coding theory",
}

@Article{Gasarch:2001:BRBa,
  author =       "William Gasarch",
  title =        "Book Review: {{\booktitle{The Codebreakers: the Story
                 of Secret Writing}}, by David Kahn. Scribner}",
  journal =      j-SIGACT,
  volume =       "32",
  number =       "2",
  pages =        "5--6",
  month =        jun,
  year =         "2001",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/504192.1005762",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 18:30:24 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See
                 \cite{Kahn:1967:CSSa,Kahn:1967:CSSb,Kahn:1974:C,Kahn:1996:CSS}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Gengler:2001:PPS,
  author =       "Barbara Gengler",
  title =        "{Princeton} Poll Shows 56\% Favour Crypto
                 Regulations",
  journal =      j-NETWORK-SECURITY,
  volume =       "2001",
  number =       "11",
  pages =        "5--6",
  day =          "30",
  month =        nov,
  year =         "2001",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(01)01112-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:22 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485801011126",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@InProceedings{Gennaro:2001:RCV,
  author =       "Rosario Gennaro and Yuval Ishai and Eyal Kushilevitz
                 and Tal Rabin",
  title =        "The round complexity of verifiable secret sharing and
                 secure multicast",
  crossref =     "ACM:2001:PAA",
  pages =        "580--589",
  year =         "2001",
  bibdate =      "Wed Feb 20 18:37:27 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gentry:2001:CNS,
  author =       "Craig Gentry and Jakob Jonsson and Jacques Stern and
                 Michael Szydlo",
  title =        "Cryptanalysis of the {NTRU Signature Scheme (NSS)}
                 from {Eurocrypt 2001}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2248",
  pages =        "1--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2248.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2248/22480001.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2248/22480001.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Gilbert:2001:SAR,
  author =       "H. Gilbert and H. Handschuh and A. Joux and Serge
                 Vaudenay",
  title =        "A Statistical Attack on {RC6}",
  crossref =     "Schneier:2001:FSE",
  pages =        "??--??",
  year =         "2001",
  bibdate =      "Mon Oct 16 08:34:27 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb # " and " # ack-bs,
}

@Article{Giuliani:2001:GLI,
  author =       "Kenneth J. Giuliani and Guang Gong",
  title =        "Generating Large Instances of the {Gong--Harn}
                 Cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2260",
  pages =        "317--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:45 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2260.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2260/22600317.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2260/22600317.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Goldreich:2001:FCBa,
  author =       "Oded Goldreich",
  title =        "Foundations of Cryptography: Basic Tools",
  volume =       "1",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "xix + 372",
  year =         "2001",
  ISBN =         "0-521-03536-8 (paperback ), 0-521-79172-3
                 (hardcover)",
  ISBN-13 =      "978-0-521-03536-1 (paperback ), 978-0-521-79172-4
                 (hardcover)",
  LCCN =         "QA268 .G5745 2001",
  bibdate =      "Fri Mar 23 10:23:59 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 jenson.stanford.edu:2210/unicorn",
  note =         "See also volume 2 \cite{Goldreich:2004:FCV}.",
  price =        "US\$54.95 (hardcover)",
  acknowledgement = ack-nhfb,
  subject =      "Coding theory; Cryptography; Mathematics",
  tableofcontents = "List of figures \\
                 Preface \\
                 Acknowledgements \\
                 5. Encryption schemes \\
                 6. Digital signatures and message authentication \\
                 7. General cryptographic protocols \\
                 Appendix C: corrections and additions to volume I \\
                 Bibliography \\
                 Index",
}

@Book{Goldreich:2001:FCBb,
  author =       "Oded Goldreich",
  title =        "Foundations of Cryptography: Basic Applications",
  volume =       "2",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "xii + 373--798",
  year =         "2001",
  ISBN =         "0-521-83084-2 (hardcover)",
  ISBN-13 =      "978-0-521-83084-3 (hardcover)",
  LCCN =         "QA268.G5745 2001",
  bibdate =      "Wed Jan 16 10:57:08 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See also volume 2 \cite{Goldreich:2004:FCV}.",
  price =        "US\$54.95 (hardcover)",
  acknowledgement = ack-nhfb,
}

@InProceedings{Goldreich:2001:SKG,
  author =       "Oded Goldreich and Yehuda Lindell",
  title =        "Session-Key Generation Using Human Passwords Only",
  crossref =     "Kilian:2001:ACC",
  pages =        "408--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390408.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390408.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@InProceedings{Golic:2001:CAS,
  author =       "Jovan D. Goli{\'c}",
  title =        "Correlation Analysis of the Shrinking Generator",
  crossref =     "Kilian:2001:ACC",
  pages =        "440--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390440.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390440.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Golic:2001:HCC,
  author =       "Jovan Dj. Goli{\'c}",
  title =        "How to Construct Cryptographic Primitives from Stream
                 Ciphers",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "79--89",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010252",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Golic:2001:MOS,
  author =       "Jovan Dj. Golic",
  title =        "Modes of Operation of Stream Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2012",
  pages =        "233--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:30 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2012.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2012/20120233.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2012/20120233.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gong:2001:GPK,
  author =       "Guang Gong and Lein Harn and Huapeng Wu",
  title =        "The {GH} Public-Key Cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2259",
  pages =        "284--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:44 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2259.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2259/22590284.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2259/22590284.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{GonzalezVasco:2001:CPK,
  author =       "Mar{\'\i}a Isabel {Gonz{\'a}lez Vasco} and Rainer
                 Steinwandt",
  title =        "Clouds over a public key cryptosystem based on
                 {Lyndon} words",
  journal =      j-INFO-PROC-LETT,
  volume =       "80",
  number =       "5",
  pages =        "239--242",
  year =         "2001",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "94A62 (68R15)",
  MRnumber =     "1 864 974",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Goodman:2001:EER,
  author =       "James Goodman and Anantha Chandrakasan",
  title =        "An Energy Efficient Reconfigurable Public-Key
                 Cryptography Processor Architecture",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1965",
  pages =        "175--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:57 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1965.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1965/19650175.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1965/19650175.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Goots:2001:FEA,
  author =       "Nick D. Goots and Alexander A. Moldovyan and Nick A.
                 Moldovyan",
  title =        "Fast Encryption Algorithm {Spectr-H64}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2052",
  pages =        "275--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:08 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2052.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2052/20520275.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2052/20520275.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gopalakrishnan:2001:PWV,
  author =       "K. Gopalakrishnan and Nasir Memon and Poorvi L. Vora",
  title =        "Protocols for Watermark Verification",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "8",
  number =       "4",
  pages =        "66--70",
  month =        oct,
  year =         "2001",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/93.959104",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Sat Feb 23 11:55:59 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/mu/books/mu2001/pdf/u4066.pdf;
                 http://www.computer.org/multimedia/mu2001/u4066abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Multimedia",
}

@Article{Gore:2001:CMT,
  author =       "Rajeev Prabhakar Gor{\'e} and Phuong Th{\^e}
                 Nguy{\^e}n",
  title =        "{CardS4}: Modal Theorem Proving on {Java} Smartcards",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2140",
  pages =        "111--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2140.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2140/21400111.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2140/21400111.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Graff:2001:CCW,
  author =       "Jon Graff",
  title =        "Cryptography and e-commerce: a {Wiley} tech brief",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xviii + 222",
  year =         "2001",
  ISBN =         "0-471-40574-4 (paperback)",
  ISBN-13 =      "978-0-471-40574-0 (paperback)",
  LCCN =         "QA76.9.A25 G68 2001",
  bibdate =      "Wed Feb 13 12:10:46 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "Wiley tech brief series",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography; electronic commerce",
}

@Article{Grigg:2001:FCL,
  author =       "Ian Grigg",
  title =        "Financial Cryptography in $7$ Layers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1962",
  pages =        "332--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:55 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1962.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1962/19620332.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1962/19620332.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InCollection{Grosek:2001:SPK,
  author =       "Otokar Gro{\v{s}}ek and Spyros S. Magliveras and Wandi
                 Wei",
  booktitle =    "Public-key cryptography and computational number
                 theory (Warsaw, 2000)",
  title =        "On the security of a public-key cryptosystem",
  publisher =    pub-GRUYTER,
  address =      pub-GRUYTER:adr,
  pages =        "71--75",
  year =         "2001",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "1 881 628",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
}

@Article{Grossschadl:2001:HSR,
  author =       "Johann Gro{\ss}sch{\"a}dl",
  title =        "High-Speed {RSA} Hardware Based on {Barret}'s Modular
                 Reduction Method",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1965",
  pages =        "191--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:57 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1965.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1965/19650191.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1965/19650191.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Guajardo:2001:EIE,
  author =       "Jorge Guajardo and Rainer Bl{\"u}mel and Uwe Krieger
                 and Christof Paar",
  booktitle =    "Public key cryptography (Cheju Island, 2001)",
  title =        "Efficient implementation of elliptic curve
                 cryptosystems on the {TI MSP430x33x} family of
                 microcontrollers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1992",
  pages =        "365--382",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60 (94B27)",
  MRnumber =     "1 898 047",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Guillou:2001:CAP,
  author =       "L. C. Guillou and M. Ugon and J-J. Quisquater",
  title =        "Cryptographic authentication protocols for smart
                 cards",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "36",
  number =       "4",
  pages =        "437--451",
  day =          "16",
  month =        jul,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Wed Jul 25 16:48:14 MDT 2001",
  bibsource =    "http://www.elsevier.com/locate/issn/13891286;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.nl/gej-ng/10/15/22/61/28/30/abstract.html;
                 http://www.elsevier.nl/gej-ng/10/15/22/61/28/30/article.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Guoxiang:2001:IFB,
  author =       "Song Guoxiang and Wang Weiwei",
  title =        "Image-Feature Based Second Generation Watermarking in
                 Wavelet Domain",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2251",
  pages =        "16--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:36 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2251.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2251/22510016.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2251/22510016.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hamann:2001:SBA,
  author =       "E.-M. Hamann and H. Henn and T. Sch{\"a}ck and F.
                 Seliger",
  title =        "Securing e-business applications using smart cards",
  journal =      j-IBM-SYS-J,
  volume =       "40",
  number =       "3",
  pages =        "635--647",
  month =        "????",
  year =         "2001",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Nov 14 19:06:40 MST 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/sj/403/hamann.html;
                 http://www.research.ibm.com/journal/sj/403/hamann.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IBM Systems Journal",
  ordernumber =  "G321-0142",
}

@Article{Hanaoka:2001:EUS,
  author =       "Goichiro Hanaoka and Junji Shikata and Yuliang Zheng
                 and Hideki Imai",
  title =        "Efficient and Unconditionally Secure Digital
                 Signatures and a Security Analysis of a Multireceiver
                 Authentication Code",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2274",
  pages =        "64--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:07 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2274.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2274/22740064.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2274/22740064.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InCollection{Handschuh:2001:ASE,
  author =       "Helena Handschuh and Lars R. Knudsen and Matthew J.
                 Robshaw",
  booktitle =    "Topics in cryptology---CT-RSA 2001 (San Francisco,
                 CA)",
  title =        "Analysis of {SHA-1} in Encryption Mode",
  volume =       "2020",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "70--83",
  year =         "2001",
  MRclass =      "94A60",
  MRnumber =     "1 907 090",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2020.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  series =       "Lecture Notes in Comput. Sci.",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2020/20200070.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2020/20200070.pdf",
}

@Article{Hankerson:2001:SIE,
  author =       "Darrel Hankerson and Julio L{\'o}pez Hernandez and
                 Alfred Menezes",
  title =        "Software Implementation of Elliptic Curve Cryptography
                 over Binary Fields",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1965",
  pages =        "1--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:57 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1965.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1965/19650001.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1965/19650001.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hare:2001:RUPa,
  author =       "Chris Hare",
  title =        "Revisiting {UNIX} Password Controls -- Part 1",
  journal =      j-SYS-ADMIN,
  volume =       "10",
  number =       "10",
  pages =        "30, 32--34",
  month =        oct,
  year =         "2001",
  CODEN =        "SYADE7",
  ISSN =         "1061-2688",
  bibdate =      "Thu Sep 13 18:44:19 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.samag.com/",
  abstract =     "This article discusses UNIX password controls
                 including the encryption systems used, password rules
                 and validation, password shadows, and aging.",
  acknowledgement = ack-nhfb,
  fjournal =     "Sys admin: the journal for UNIX system
                 administrators",
}

@Article{Hare:2001:RUPb,
  author =       "Chris Hare",
  title =        "Revisiting {UNIX} Password Controls -- Part 2",
  journal =      j-SYS-ADMIN,
  volume =       "10",
  number =       "11",
  pages =        "35--38",
  month =        nov,
  year =         "2001",
  CODEN =        "SYADE7",
  ISSN =         "1061-2688",
  bibdate =      "Fri Feb 08 11:17:41 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The first part of Hare's series discussed the
                 encryption methods used in protecting the passwords on
                 a UNIX system. This concluding article describes using
                 a shadow file to provide further protection for the
                 encrypted passwords and discusses the validity of
                 password-cracking tools.",
  acknowledgement = ack-nhfb,
  fjournal =     "Sys admin: the journal for UNIX system
                 administrators",
}

@Article{Hartel:2001:FSJ,
  author =       "Pieter H. Hartel and Luc Moreau",
  title =        "Formalizing the safety of {Java}, the {Java Virtual
                 Machine}, and {Java} card",
  journal =      j-COMP-SURV,
  volume =       "33",
  number =       "4",
  pages =        "517--558",
  month =        dec,
  year =         "2001",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/503112.503115",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:17:06 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We review the existing literature on Java safety,
                 emphasizing formal approaches, and the impact of Java
                 safety on small footprint devices such as smartcards.
                 The conclusion is that although a lot of good work has
                 been done, a more concerted effort is needed to build a
                 coherent set of machine-readable formal models of the
                 whole of Java and its implementation. This is a
                 formidable task but we believe it is essential to build
                 trust in Java safety, and thence to achieve ITSEC level
                 6 or Common Criteria level 7 certification for Java
                 programs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Common criteria; programming",
}

@Article{Hartel:2001:TMS,
  author =       "Pieter H. Hartel and Michael J. Butler and Eduard de
                 Jong and Mark Longley",
  title =        "Transacted Memory for Smart Cards",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2021",
  pages =        "478--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:39 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2021.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2021/20210478.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2021/20210478.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Hasan:2001:ECM,
  author =       "M. A. Hasan",
  title =        "Efficient Computation of Multiplicative Inverses for
                 Cryptographic Applications",
  crossref =     "Burgess:2001:ISC",
  pages =        "66--72",
  year =         "2001",
  bibdate =      "Fri May 3 13:58:18 MDT 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib; OCLC
                 Proceedings database",
  URL =          "http://www.acsel-lab.com/arithmetic/arith15/papers/ARITH15_Hasan.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "ARITH-15",
}

@Article{Hasan:2001:PAA,
  author =       "M. A. Hasan",
  title =        "Power analysis attacks and algorithmic approaches to
                 their countermeasures for {Koblitz} curve
                 cryptosystems",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "50",
  number =       "10",
  pages =        "1071--1083",
  year =         "2001",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/12.956092",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  MRclass =      "94A60",
  MRnumber =     "1 860 290",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Institute of Electrical and Electronics Engineers.
                 Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Hawkes:2001:PCS,
  author =       "Philip Hawkes and Frank Quick and Gregory G. Rose",
  title =        "A Practical Cryptanalysis of {SSC2}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2259",
  pages =        "25--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:44 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2259.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2259/22590025.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2259/22590025.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{He:2001:SAR,
  author =       "Yeping He and Sihan Qing",
  title =        "Square Attack on Reduced {Camellia} Cipher",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2229",
  pages =        "238--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:15 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2229.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2229/22290238.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2229/22290238.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Heijl:2001:DXS,
  author =       "Danny Heijl",
  title =        "The {Delphi XML SAX2} Component and {MSXML 3.0}",
  journal =      j-DDJ,
  volume =       "26",
  number =       "9",
  pages =        "42, 46, 48, 50, 52, 54",
  month =        sep,
  year =         "2001",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Tue Feb 12 05:21:39 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See correction \cite{Todd:2001:LSS}.",
  URL =          "http://www.ddj.com/ftp/2001/2001_09/xmlsax2.txt;
                 http://www.ddj.com/ftp/2001/2001_09/xmlsax2.zip",
  abstract =     "Danny shows how to use the C++ COM interfaces of
                 Microsoft's MSXML 3.0 SAX2 parser with Borland Delphi.
                 He then presents TSAXParser, a Delphi component that
                 uses these interfaces, but shields you from their
                 complexities. Additional resources include {\tt
                 xmlsax2.txt} (listings) and {\tt xmlsax2.zip} (source
                 code).",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Henderson:2001:IEV,
  author =       "Neil J. Henderson and Neil M. White and Pieter H.
                 Hartel",
  title =        "{iButton} Enrolment and Verification Requirements for
                 the Pressure Sequence Smartcard Biometric",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2140",
  pages =        "124--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2140.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2140/21400124.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2140/21400124.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Hendry:2001:SCS,
  author =       "Mike Hendry",
  title =        "Smart card security and applications",
  publisher =    pub-ARTECH,
  address =      pub-ARTECH:adr,
  edition =      "Second",
  pages =        "xviii + 305",
  year =         "2001",
  ISBN =         "1-58053-156-3",
  ISBN-13 =      "978-1-58053-156-6",
  LCCN =         "TK7895.S62 H46 2001",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "The Artech House telecommunications library",
  acknowledgement = ack-nhfb,
  keywords =     "smart cards --- security measures",
}

@Article{Hernandez:2001:DTR,
  author =       "Julio C{\'e}sar Hern{\'a}ndez and Jos{\'e} Mar{\'\i}a
                 Sierra and Arturo Ribagorda and Benjam{\'\i}n Ramos and
                 J. C. Mex-Perera",
  title =        "Distinguishing {TEA} from a Random Permutation:
                 Reduced Round Versions of {TEA} Do Not Have the {SAC}
                 or Do Not Generate Random Numbers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2260",
  pages =        "374--377",
  year =         "2001",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/3-540-45325-3_34",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Feb 01 16:50:09 2012",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2260.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2260/22600374.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2260/22600374.pdf",
  abstract =     "In this paper the authors present a statistical test
                 for testing the strict avalanche criterion (SAC), a
                 property that cryptographic primitives such as block
                 ciphers and hash functions must have. Random
                 permutations should also behave as good random number
                 generators when, given any initial input, its output is
                 considered part of a pseudorandom stream and then used
                 as an input block to produce more output bits. Using
                 these two ideal properties, we construct a test
                 framework for cryptographic primitives that is shown at
                 work on the block cipher TEA. In this way, we are able
                 to distinguish reduced round versions of it from a
                 random permutation.",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hess:2001:TTH,
  author =       "Florian Hess and Gadiel Seroussi and Nigel P. Smart",
  title =        "Two Topics in Hyperelliptic Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2259",
  pages =        "181--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:44 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2259.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2259/22590181.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2259/22590181.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hirose:2001:UAS,
  author =       "Shouichi Hirose and Susumu Yoshida",
  title =        "A User Authentication Scheme with Identity and
                 Location Privacy",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2119",
  pages =        "235--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:21 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2119.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2119/21190235.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2119/21190235.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Hirt:2001:RFU,
  author =       "Martin Hirt and Ueli Maurer",
  title =        "Robustness for Free in Unconditional Multi-party
                 Computation",
  crossref =     "Kilian:2001:ACC",
  pages =        "101--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390101.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390101.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Hoepman:2001:SKA,
  author =       "Jaap-Henk Hoepman",
  title =        "Secret Key Authentication with Software-Only
                 Verification",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1962",
  pages =        "313--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:55 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1962.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1962/19620313.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1962/19620313.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hoffstein:2001:MAD,
  author =       "Jeffrey Hoffstein and Joseph H. Silverman",
  title =        "{MiniPASS}: Authentication and Digital Signatures in a
                 Constrained Environment",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1965",
  pages =        "328--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:57 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1965.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1965/19650328.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1965/19650328.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Hoffstein:2001:NNL,
  author =       "J. Hoffstein and J. Pipher and J. H. Silverman",
  title =        "{NSS}: An {NTRU} lattice-based signature scheme",
  crossref =     "Pfitzmann:2001:ACE",
  pages =        "211--228",
  year =         "2001",
  bibdate =      "Thu Apr 21 13:42:36 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hofinger:2001:LBE,
  author =       "Siegfried H{\"o}finger",
  title =        "Load Balancing for the Electronic Structure Program
                 {GREMLIN} in a Very Heterogeneous {SSH}-Connected
                 {WAN}-Cluster of {UNIX}-Type Hosts",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2074",
  pages =        "801--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:30 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2074.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2074/20740801.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2074/20740801.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hong:2001:KIA,
  author =       "Deukjo Hong and Jaechul Sung and Seokhie Hong and
                 Wonil Lee and Sangjin Lee and Jongin Lim and Okyeon
                 Yi",
  title =        "Known-{IV} Attacks on Triple Modes of Operation of
                 Block Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2248",
  pages =        "208--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2248.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2248/22480208.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2248/22480208.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hong:2001:PSA,
  author =       "Seokhie Hong and Sangjin Lee and Jongin Lim and
                 Jaechul Sung and Donghyeon Cheon and Inho Cho",
  title =        "Provable Security against Differential and Linear
                 Cryptanalysis for the {SPN} Structure",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1978",
  pages =        "273--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:00 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1978.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1978/19780273.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1978/19780273.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Huhnlein:2001:ICB,
  author =       "Detlef H{\"u}hnlein and Sachar Paulus",
  booktitle =    "Selected areas in cryptography (Waterloo, ON, 2000)",
  title =        "On the implementation of cryptosystems based on real
                 quadratic number fields (extended abstract)",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2012",
  pages =        "288--302",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A62 (94A60)",
  MRnumber =     "1 895 598",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Huhnlein:2001:TPN,
  author =       "Detlef H{\"u}hnlein and Michael J. {Jacobson, Jr.} and
                 Damian Weber",
  booktitle =    "Selected areas in cryptography (Waterloo, ON, 2000)",
  title =        "Towards Practical Non-interactive Public Key
                 Cryptosystems Using Non-maximal Imaginary Quadratic
                 Orders (Extended Abstract)",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2012",
  pages =        "275--287",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A62 (94A60)",
  MRnumber =     "1 895 597",
  bibdate =      "Sat Feb 2 13:03:30 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2012.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2012/20120275.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2012/20120275.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Husemann:2001:SSC,
  author =       "Dirk Husemann",
  title =        "Standards in the smart card world",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "36",
  number =       "4",
  pages =        "473--487",
  day =          "16",
  month =        jul,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Wed Jul 25 16:48:14 MDT 2001",
  bibsource =    "http://www.elsevier.com/locate/issn/13891286;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.nl/gej-ng/10/15/22/61/28/32/abstract.html;
                 http://www.elsevier.nl/gej-ng/10/15/22/61/28/32/article.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Book{Hutchinson:2001:IWC,
  author =       "William Hutchinson and Matthew Warren",
  title =        "Information Warfare: Corporate Attack and Defense in a
                 Digital World",
  publisher =    pub-BUTTERWORTH-HEINEMANN,
  address =      pub-BUTTERWORTH-HEINEMANN:adr,
  pages =        "xx + 204",
  year =         "2001",
  ISBN =         "0-7506-4944-5",
  ISBN-13 =      "978-0-7506-4944-5",
  LCCN =         "QA76.9.A25 H88 2001",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$39.95",
  series =       "Computer Weekly professional series",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Information warfare",
}

@Book{Huth:2001:SCS,
  author =       "Michael R. A. Huth",
  title =        "Secure communicating systems: design, analysis, and
                 implementation",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "x + 283",
  year =         "2001",
  ISBN =         "0-521-80731-X (hardcover)",
  ISBN-13 =      "978-0-521-80731-9 (hardcover)",
  LCCN =         "TK5102.85 .H88 2001",
  bibdate =      "Tue Apr 02 15:13:35 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$40.00",
  acknowledgement = ack-nhfb,
}

@Article{Hwang:2001:LCT,
  author =       "Ren-Junn Hwang and Timothy K. Shih and Chuan-Ho Kao
                 and Tsung-Ming Chang",
  title =        "Lossy Compression Tolerant Steganography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2105",
  pages =        "427--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:05 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2105.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2105/21050427.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2105/21050427.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hwang:2001:TSB,
  author =       "Min-Shiang Hwang and Cheng-Chi Lee and Yuan-Liang
                 Tang",
  title =        "Two Simple Batch Verifying Multiple Digital
                 Signatures",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2229",
  pages =        "233--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:15 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2229.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2229/22290233.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2229/22290233.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Itkis:2001:FSS,
  author =       "Gene Itkis and Leonid Reyzin",
  title =        "Forward-Secure Signatures with Optimal Signing and
                 Verifying",
  crossref =     "Kilian:2001:ACC",
  pages =        "332--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390332.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390332.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@InProceedings{Itoi:2001:SCS,
  author =       "Naomaru Itoi",
  title =        "{SC-CFS}: {Smartcard} Secured Cryptographic File
                 System",
  crossref =     "USENIX:2001:PTU",
  pages =        "??--??",
  year =         "2001",
  bibdate =      "Tue Oct 15 16:52:27 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/sec01/itoi.html",
  acknowledgement = ack-nhfb,
}

@Article{Itoi:2001:SIS,
  author =       "Naomaru Itoi and Tomoko Fukuzawa and Peter Honeyman",
  title =        "Secure {Internet} Smartcards",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2041",
  pages =        "73--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:58 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2041.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2041/20410073.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2041/20410073.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Iwata:2001:PAF,
  author =       "Tetsu Iwata and Kaoru Kurosawa",
  title =        "On the Pseudorandomness of the {AES} Finalists ---
                 {RC6} and {Serpent}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1978",
  pages =        "231--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:00 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1978.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1978/19780231.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1978/19780231.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Izotov:2001:COC,
  author =       "Boris V. Izotov and Alexander A. Moldovyan and Nick A.
                 Moldovyan",
  title =        "Controlled Operations as a Cryptographic Primitive",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2052",
  pages =        "230--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:08 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2052.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2052/20520230.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2052/20520230.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Jablon:2001:PAU,
  author =       "David P. Jablon",
  title =        "Password Authentication Using Multiple Servers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2020",
  pages =        "344--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2020.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2020/20200344.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2020/20200344.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Jakimoski:2001:ASR,
  author =       "Goce Jakimoski and Ljup{\v{c}}o Kocarev",
  title =        "Analysis of some recently proposed chaos-based
                 encryption algorithms",
  journal =      j-PHYS-LET-A,
  volume =       "291",
  number =       "6",
  pages =        "381--384",
  year =         "2001",
  CODEN =        "PYLAAG",
  ISSN =         "0375-9601 (print), 1873-2429 (electronic)",
  ISSN-L =       "0375-9601",
  MRclass =      "94A60",
  MRnumber =     "1 917 690",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  fjournal =     "Physics Letters. A",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03759601",
}

@Article{Jakimoski:2001:CCB,
  author =       "Goce Jakimoski and Ljup{\v{c}}o Kocarev",
  title =        "Chaos and cryptography: block encryption ciphers based
                 on chaotic maps",
  journal =      "IEEE Trans. Circuits Systems I Fund. Theory Appl.",
  volume =       "48",
  number =       "2",
  pages =        "163--169",
  year =         "2001",
  CODEN =        "ITCAEX",
  ISSN =         "1057-7122 (print), 1558-1268 (electronic)",
  MRclass =      "94A60",
  MRnumber =     "1 820 541",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  fjournal =     "IEEE Transactions on Circuits and Systems. I.
                 Fundamental Theory and Applications",
}

@Article{Jang:2001:BWA,
  author =       "Yongwon Jang and Intaek Kim and Hwan Il Kang and Kab
                 Il Kim and Seung-Soo Han",
  title =        "Blind Watermarking Algorithm Using Complex Block
                 Selection Method",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2195",
  pages =        "996--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2195.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2195/21950996.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2195/21950996.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Jaulmes:2001:CPN,
  author =       "{\'E}liane Jaulmes and Antoine Joux",
  booktitle =    "Public key cryptography (Cheju Island, 2001)",
  title =        "Cryptanalysis of {PKP}: a new approach",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1992",
  pages =        "165--172",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "1 898 032",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ji:2001:CAF,
  author =       "Dongyao Ji and Yuming Wang",
  title =        "Comments on {{\em ``An approach to the formal
                 verification of the two-party cryptographic
                 protocols''\/} by Zhang, Li and Xiao}",
  journal =      j-OPER-SYS-REV,
  volume =       "35",
  number =       "1",
  pages =        "6--7",
  month =        jan,
  year =         "2001",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:37 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See \cite{Zhang:1999:AFV}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Jin:2001:WCS,
  author =       "Liang Jin and Shi Ren and Liang Feng and Gao Zheng
                 Hua",
  title =        "{WAP} Clients and Set Protocol",
  journal =      j-DDJ,
  volume =       "26",
  number =       "6",
  pages =        "85, 87--89, 91",
  month =        jun,
  year =         "2001",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Jun 7 06:07:16 MDT 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/",
  abstract =     "Our authors examine both the Secure Electronic
                 Transaction (SET) protocol and the Wireless Application
                 Protocol (WAP), then present a model that uses WAP to
                 support SET with a SET thin client and smartcard
                 technology.",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Book{Johnson:2001:IHS,
  author =       "Neil F. Johnson and Zoran Duric and Sushil Jajodia",
  title =        "Information hiding: steganography and watermarking:
                 attacks and countermeasures",
  volume =       "1",
  publisher =    pub-KLUWER,
  address =      pub-KLUWER:adr,
  pages =        "xx + 137",
  year =         "2001",
  ISBN =         "0-7923-7204-2",
  ISBN-13 =      "978-0-7923-7204-2",
  LCCN =         "QA76.9.A25 J25 2001",
  bibdate =      "Wed Feb 13 12:10:46 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "Advances in information security",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; data protection",
  subject =      "Computer security; Data protection;
                 Computerbeveiliging; Databescherming; Watermerken;
                 Datensicherung; Elektronisches Wasserzeichen;
                 Steganographie; Filigranes num{\'e}riques;
                 Cryptographie; Protection de l'information
                 (informatique); Syst{\`e}mes informatiques; Mesures de
                 s{\^u}ret{\'e}; Computer security; Data protection.",
  tableofcontents = "Steganography: Hiding Information \\
                 Steganography throughout History \\
                 Methods for Hiding Information \\
                 Hiding in Text \\
                 Hiding in Disk Space \\
                 Hiding in Network Packets \\
                 Hiding in Software and Circuitry \\
                 Hiding in Audio and Images \\
                 Attacks against Hidden Information \\
                 Detection \\
                 Distortion and Removal \\
                 Countermeasures Against Attacks \\
                 Contributions and Future Work \\
                 Organization of the Book \\
                 Exploring Steganography \\
                 Digital Images \\
                 Hiding Information in Images \\
                 Hiding Data in the Noise \\
                 Watermarking Techniques \\
                 Issues in Information Hiding \\
                 Level of Visibility: Perceptible or Imperceptible \\
                 Robustness vs. Payload \\
                 Spatial or transform domain \\
                 File Format Dependence \\
                 Image Modeling \\
                 Summary of Hiding Techniques \\
                 Examples of Digital Image Steganography Software \\
                 StegoDos \\
                 White Noise Storm \\
                 S-Tools \\
                 Comments on Other Software \\
                 Summary of Tools \\
                 Comments on Steganography \\
                 Steganalysis: Attacks Against Hidden Data \\
                 Detection: Seeing the Unseen \\
                 Techniques for Detecting Hidden Information \\
                 Examples of Detecting Signatures in Stego-Images \\
                 S-Tools \\
                 Mandelsteg \\
                 Hide and Seek \\
                 Hide4PGP \\
                 EzStego, Stego On-line \\
                 Jsteg-Jpeg \\
                 Distortion: Disabling Steganography and Watermarks \\
                 Techniques for Distorting Embedded Data \\
                 Examples of Distorting Embedded Information \\
                 Application of Steganalysis: Forensic Investigation \\
                 Comments on Steganalysis \\
                 Countermeasures to Attacks \\
                 Countermeasures to Distortion \\
                 Stronger Watermarks",
}

@Article{Jolish:2001:EDP,
  author =       "Barak D. Jolish",
  title =        "The Encryption Debate in Plaintext: National Security
                 and Encryption in the {United States} and {Israel}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1962",
  pages =        "202--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:55 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1962.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1962/19620202.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1962/19620202.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Jongkook:2001:NUS,
  author =       "Lee Jongkook and Ryu Shiryong and Kim Jeungseop and
                 Yoo Keeyoung",
  title =        "A New Undeniable Signature Scheme Using Smart Cards",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2260",
  pages =        "387--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:45 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2260.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2260/22600387.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2260/22600387.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Joye:2001:CEN,
  author =       "Marc Joye and Christophe Tymen",
  title =        "Compact Encoding of Non-adjacent Forms with
                 Applications to Elliptic Curve Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1992",
  pages =        "353--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:11 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1992.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1992/19920353.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1992/19920353.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Joye:2001:NMM,
  author =       "Marc Joye and Sung-Ming Yen",
  title =        "New Minimal Modified Radix-$r$ Representation with
                 Applications to Smart Cards",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2274",
  pages =        "375--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:07 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2274.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2274/22740375.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2274/22740375.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Joye:2001:OAD,
  author =       "Marc Joye and Jean-Jacques Quisquater and Sung-Ming
                 Yen and Moti Yung",
  title =        "Observability Analysis --- Detecting When Improved
                 Cryptosystems Fail",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2271",
  pages =        "17--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:06 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2271.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2271/22710017.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2271/22710017.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Joye:2001:PAD,
  author =       "M. Joye and C. Tymen",
  title =        "Protections against Differential Analysis for Elliptic
                 Curve Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2162",
  pages =        "377--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:06 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2162.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2162/21620377.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2162/21620377.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Joye:2001:PMA,
  author =       "Marc Joye and Jean-Jacques Quisquater and Moti Yung",
  title =        "On the Power of Misbehaving Adversaries and Security
                 Analysis of the Original {EPOC}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2020",
  pages =        "208--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2020.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2020/20200208.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2020/20200208.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Juang:2001:FBT,
  author =       "W.-S. Juang and C.-L. Lei and H.-T. Liaw",
  title =        "Fair blind threshold signatures based on discrete
                 logarithm",
  journal =      j-INT-J-COMPUT-SYST-SCI-ENG,
  volume =       "16",
  number =       "6",
  pages =        "??--??",
  month =        nov,
  year =         "2001",
  CODEN =        "CSSEEI",
  ISSN =         "0267-6192",
  bibdate =      "Sat Jan 03 19:15:31 2004",
  bibsource =    "http://www.crlpublishing.co.uk/cssecont00.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Systems Science and
                 Engineering",
}

@Article{Juels:2001:RKG,
  author =       "Ari Juels and Jorge Guajardo",
  title =        "{RSA} Key Generation with Verifiable Randomness",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2274",
  pages =        "357--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:07 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2274.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2274/22740357.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2274/22740357.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Jung:2001:EMO,
  author =       "Oliver Jung and Sven Kuhn and Christoph Ruland and Kai
                 Wollenweber",
  title =        "Enhanced Modes of Operation for the Encryption in
                 High-Speed Networks and Their Impact on {QoS}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2119",
  pages =        "344--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:21 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2119.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2119/21190344.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2119/21190344.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InCollection{Jutla:2001:EMA,
  author =       "Charanjit S. Jutla",
  booktitle =    "Advances in cryptology---EUROCRYPT 2001 (Innsbruck)",
  title =        "Encryption Modes with Almost Free Message Integrity",
  volume =       "2045",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "529--544",
  year =         "2001",
  MRclass =      "94A60",
  MRnumber =     "1 895 453",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2045.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  series =       "Lecture Notes in Comput. Sci.",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2045/20450529.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2045/20450529.pdf",
}

@Article{Kabatnik:2001:LSD,
  author =       "M. Kabatnik and A. Zugenmaier",
  title =        "Location Stamps for Digital Signatures: a New Service
                 for Mobile Telephone Networks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2094",
  pages =        "20--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:54 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2094.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2094/20940020.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2094/20940020.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kaliski:2001:RDS,
  author =       "Burton S. {Kaliski, Jr.}",
  title =        "{RSA} Digital Signatures",
  journal =      j-DDJ,
  volume =       "26",
  number =       "5",
  pages =        "30, 32--33, 35--36",
  month =        may,
  year =         "2001",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Apr 12 06:45:08 MDT 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/",
  abstract =     "Digital signatures are growing in importance as they
                 gain legal standing with traditional handwritten
                 signatures. Burton examines the three most popular
                 signature schemes currently in use.",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Kanda:2001:PSE,
  author =       "Masayuki Kanda",
  booktitle =    "Selected areas in cryptography (Waterloo, ON, 2000)",
  title =        "Practical Security Evaluation against Differential and
                 Linear Cryptanalyses for {Feistel} Ciphers with {SPN}
                 Round Function",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2012",
  pages =        "324--338",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "1 895 601",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2012.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2012/20120324.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2012/20120324.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kang:2001:NHO,
  author =       "Ju-Sung Kang and Seongtaek Chee and Choonsik Park",
  title =        "A Note on the Higher Order Differential Attack of
                 Block Ciphers with Two-Block Structures",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2015",
  pages =        "1--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2015.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2015/20150001.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2015/20150001.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kang:2001:PMT,
  author =       "Ju-Sung Kang and Okyeon Yi and Dowon Hong and Hyunsook
                 Cho",
  title =        "Pseudorandomness of {MISTY}-Type Transformations and
                 the Block Cipher {KASUMI}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2119",
  pages =        "60--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:21 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2119.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2119/21190060.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2119/21190060.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kang:2001:PSK,
  author =       "Ju-Sung Kang and Sang-Uk Shin and Dowon Hong and
                 Okyeon Yi",
  title =        "Provable Security of {KASUMI} and {3GPP} Encryption
                 Mode $ f8 $",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2248",
  pages =        "255--271",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2248.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2248/22480255.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2248/22480255.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Karski:2001:SSS,
  author =       "Jan Karski",
  title =        "Story of a Secret State",
  publisher =    pub-HOUGHTON-MIFFLIN,
  address =      pub-HOUGHTON-MIFFLIN:adr,
  pages =        "vi + 391",
  year =         "2001",
  ISBN =         "1-931541-39-6 (hardcover)",
  ISBN-13 =      "978-1-931541-39-8 (hardcover)",
  LCCN =         "D802.P6 K3 2001",
  bibdate =      "Thu Feb 23 07:42:11 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939--1945; Personal narratives; Polish
                 World War, 1939--1945 --- Poland; Poland --- History
                 --- Occupation, 1939--1945",
  tableofcontents = "Note on the Text / xi \\
                 Publisher's Note / xii \\
                 Preface / xv \\
                 Foreword / xvii \\
                 Biographical Essay of Jan Karski / xxv \\
                 1 Defeat / 1 \\
                 2 Prisoner in Russia / 15 \\
                 3 Exchange and Escape / 28 \\
                 4 Devastated Poland / 45 \\
                 5 The Beginning / 54 \\
                 6 Transformation / 66 \\
                 7 Initiation / 73 \\
                 8 Borecki / 79 \\
                 9 Contact between Cells / 89 \\
                 10 Mission to France / 101 \\
                 11 The Underground State / 117 \\
                 12 Caught by the Gestapo / 127 \\
                 13 Torture / 136 \\
                 14 The SS Hospital / 156 \\
                 15 Rescue / 168 \\
                 16 The ``Gardener'' / 180 \\
                 17 Propaganda from the Country / 189 \\
                 18 Execution of a Traitor / 207 \\
                 19 The Four Branches of the Underground / 218 \\
                 20 The Laskowa Apartment / 225 \\
                 21 Assignment in Lublin / 232 \\
                 22 Retribution / 240 \\
                 23 The Secret Press / 250 \\
                 24 My ``Conspiratorial Apparatus'' / 260 \\
                 25 The Liaison Women / 265 \\
                 26 Marriage per Procuram / 272 \\
                 27 School-Underground / 277 \\
                 28 Parliament in Poland / 293 \\
                 29 The Ghetto / 302 \\
                 30 ``To Die in Agony'' / 320 \\
                 31 Unter den Linden Revisited / 335 \\
                 32 Journey through France and Spain / 340 \\
                 33 My Report to the World / 358 \\
                 Notes / 367 \\
                 Glossary / 385 \\
                 Further Reading / 397 \\
                 Afterword / 401 \\
                 Index / 403",
}

@Article{Katz:2001:CCA,
  author =       "Jonathan Katz and Steven Myers and Rafail Ostrovsky",
  title =        "Cryptographic Counters and Applications to Electronic
                 Voting",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2045",
  pages =        "78--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:02 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2045.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2045/20450078.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2045/20450078.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Katz:2001:EPA,
  author =       "Jonathan Katz and Rafail Ostrovsky and Moti Yung",
  title =        "Efficient Password-Authenticated Key Exchange Using
                 Human-Memorable Passwords",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2045",
  pages =        "475--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:02 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2045.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2045/20450475.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2045/20450475.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Katz:2001:UEC,
  author =       "Jonathan Katz and Moti Yung",
  title =        "Unforgeable Encryption and Chosen Ciphertext Secure
                 Modes of Operation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1978",
  pages =        "284--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:00 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1978.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1978/19780284.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1978/19780284.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Katzenbeisser:2001:RAR,
  author =       "Stefan Katzenbeisser",
  title =        "Recent advances in {RSA} cryptography",
  volume =       "3",
  publisher =    pub-KLUWER,
  address =      pub-KLUWER:adr,
  pages =        "xiii + 140",
  year =         "2001",
  ISBN =         "0-7923-7438-X",
  ISBN-13 =      "978-0-7923-7438-1",
  LCCN =         "QA76.9.A25 K38 2001",
  bibdate =      "Wed Feb 13 12:10:46 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "Advances in information security",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography",
}

@Article{Kavut:2001:SCP,
  author =       "Sel{\c{c}}uk Kavut and Melek D. Y{\"u}cel",
  title =        "On Some Cryptographic Properties of {Rijndael}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2052",
  pages =        "300--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:08 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2052.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2052/20520300.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2052/20520300.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kehr:2001:ISM,
  author =       "Roger Kehr and Michael Rohs and Harald Vogt",
  title =        "Issues in Smartcard Middleware",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2041",
  pages =        "90--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:58 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2041.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2041/20410090.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2041/20410090.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Keliher:2001:IUB,
  author =       "Liam Keliher and Henk Meijer and Stafford Tavares",
  title =        "Improving the Upper Bound on the Maximum Average
                 Linear Hull Probability for {Rijndael}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2259",
  pages =        "112--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:44 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2259.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2259/22590112.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2259/22590112.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Kelsey:2001:ABA,
  author =       "J. Kelsey and T. Kohno and B. Schneier",
  title =        "Amplified Boomerang Attacks Against Reduced-Round
                 {MARS} and {Serpent}",
  crossref =     "Schneier:2001:FSE",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "??--??",
  year =         "2001",
  bibdate =      "Mon Oct 16 08:39:00 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb # " and " # ack-bs,
}

@Article{Khachatrian:2001:FMI,
  author =       "Gurgen H. Khachatrian and Melsik K. Kuregian and Karen
                 R. Ispiryan and James L. Massey",
  title =        "Fast Multiplication of Integers for Public-Key
                 Applications",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2259",
  pages =        "245--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:44 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2259.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2259/22590245.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2259/22590245.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kiayias:2001:PRB,
  author =       "Aggelos Kiayias and Moti Yung",
  title =        "Polynomial Reconstruction Based Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2259",
  pages =        "129--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:44 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2259.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2259/22590129.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2259/22590129.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Kiayias:2001:SPP,
  author =       "Aggelos Kiayias and Moti Yung",
  title =        "Self Protecting Pirates and Black-Box Traitor
                 Tracing",
  crossref =     "Kilian:2001:ACC",
  pages =        "63--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390063.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390063.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Kiltz:2001:TBC,
  author =       "E. Kiltz",
  title =        "A Tool Box of Cryptographic Functions Related to the
                 {Diffie--Hellman} Function",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2247",
  pages =        "339--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:31 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2247.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2247/22470339.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2247/22470339.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kim:2001:NPK,
  author =       "Hwankoo Kim and SangJae Moon",
  title =        "New Public-Key Cryptosystem Using Divisor Class
                 Groups",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2119",
  pages =        "74--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:21 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2119.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2119/21190074.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2119/21190074.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kim:2001:SAC,
  author =       "Seungjoo Kim and Jung Hee Cheon and Marc Joye and
                 Seongan Lim and Masahiro Mambo and Dongho Won and
                 Yuliang Zheng",
  title =        "Strong Adaptive Chosen-Ciphertext Attacks with Memory
                 Dump (or: The Importance of the Order of Decryption and
                 Validation)",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2260",
  pages =        "114--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:45 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2260.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2260/22600114.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2260/22600114.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{King:2001:CMF,
  author =       "David A. King",
  title =        "The ciphers of the monks: a forgotten number-notation
                 of the {Middle Ages}",
  volume =       "44",
  publisher =    "F. Steiner",
  address =      "Stuttgart, Germany",
  pages =        "506",
  year =         "2001",
  ISBN =         "3-515-07640-9",
  ISBN-13 =      "978-3-515-07640-1",
  LCCN =         "QA141.2 .K56 2001",
  bibdate =      "Thu Sep 23 23:53:13 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Boethius: Texte und Abhandlungen zur Geschichte der
                 Mathematik der Naturwissenschaften",
  acknowledgement = ack-nhfb,
  remark =       "Errata slip laid in.",
  subject =      "Numeration; History; Numerals, Writing of;
                 Manuscripts, Medieval; Astrolabes; Astronomy, Medieval;
                 Instruments",
}

@Book{King:2001:SAD,
  author =       "Christopher M. King and Curtis E. Dalton and T. Ertam
                 Osmano{\u{g}}lu",
  title =        "Security Architecture: Design, Deployment and
                 Operations",
  publisher =    pub-MCGRAW-HILL,
  address =      pub-MCGRAW-HILL:adr,
  pages =        "xxii + 481",
  year =         "2001",
  ISBN =         "0-07-213385-6",
  ISBN-13 =      "978-0-07-213385-1",
  LCCN =         "QA76.9.A25 K54 2001",
  bibdate =      "Wed Jun 06 18:29:48 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Kirkby:2001:CCW,
  author =       "Andrea Kirkby",
  title =        "Cryptography and E-Commerce: a {Wiley} Tech Brief",
  journal =      j-NETWORK-SECURITY,
  volume =       "2001",
  number =       "4",
  pages =        "9--9",
  day =          "1",
  month =        apr,
  year =         "2001",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(01)00416-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:12 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485801004160",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Book{Kirtland:2001:INC,
  author =       "Joseph Kirtland",
  title =        "Identification numbers and check digit schemes",
  publisher =    pub-MATH-ASSOC-AMER,
  address =      pub-MATH-ASSOC-AMER:adr,
  pages =        "xi + 174",
  year =         "2001",
  ISBN =         "0-88385-720-0",
  ISBN-13 =      "978-0-88385-720-5",
  LCCN =         "QA241 .K576 2001",
  bibdate =      "Fri Mar 23 16:59:36 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Classroom resource materials",
  URL =          "http://www.loc.gov/catdir/description/cam021/00108052.html;
                 http://www.loc.gov/catdir/toc/cam027/00108052.html",
  abstract =     "This book develops the mathematical skills necessary
                 for the investigation of the increasingly pervasive
                 codes used to identify everything from credit cards to
                 books to supermarket goods. An important part of such
                 codes is the check digit, which can point out when an
                 error has been made, either accidentally in
                 transmission, or deliberately in an attempt at fraud.
                 Mathematics plays a crucial role in designing and
                 verifying such check digit schemes. Beginning
                 undergraduates and pre-university students should find
                 this book both accessible and fun. In the process of
                 describing the identification number schemes, the
                 author introduces many fundamental areas of discrete
                 mathematics, including modular arithmetic and group
                 theory, with emphasis on their applications. A unique
                 point of the book is the way it offers students the
                 possibility of writing papers summarizing a given topic
                 to improve their understanding. It also contains
                 pointers into the literature for further reading.",
  acknowledgement = ack-nhfb,
  subject =      "Number theory; Check digit schemes",
  tableofcontents = "Introduction\\
                 1. Identification numbers and check digit schemes\\
                 2. Number theory, cryptography, and check digit
                 schemes\\
                 3. Functions, permutations, and their applications\\
                 4. Symmetry and rigid motions\\
                 5. Group theory and applications.",
}

@Article{Klarlund:2001:MIS,
  author =       "Nils Klarlund and Anders M{\o}ller and Michael I.
                 Schwartzbach",
  title =        "{MONA} Implementation Secrets",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2088",
  pages =        "182--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:47 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2088.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2088/20880182.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2088/20880182.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Knudsen:2001:CPL,
  author =       "Lars R. Knudsen and John Erik Mathiassen",
  title =        "A Chosen-Plaintext Linear Attack on {DES}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1978",
  pages =        "262--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:00 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1978.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1978/19780262.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1978/19780262.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Knudsen:2001:CRR,
  author =       "L. Knudsen and W. Meier",
  title =        "Correlations in {RC6} with a Reduced Number of
                 Rounds",
  crossref =     "Schneier:2001:FSE",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "??--??",
  year =         "2001",
  bibdate =      "Mon Oct 16 08:40:53 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb # " and " # ack-bs,
}

@Article{Kobara:2001:NCP,
  author =       "Kazukuni Kobara and Hideki Imai",
  title =        "New Chosen-Plaintext Attacks on the One-Wayness of the
                 Modified {McEliece PKC} Proposed at {Asiacrypt 2000}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2274",
  pages =        "237--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:07 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2274.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2274/22740237.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2274/22740237.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kobara:2001:SSM,
  author =       "Kazukuni Kobara and Hideki Imai",
  booktitle =    "Public key cryptography (Cheju Island, 2001)",
  title =        "Semantically Secure {McEliece} Public-Key
                 Cryptosystems --- Conversions for {McEliece PKC}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1992",
  pages =        "19--35",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60 (94A62)",
  MRnumber =     "1 898 022",
  bibdate =      "Sat Feb 2 13:03:11 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1992.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1992/19920019.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1992/19920019.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kocarev:2001:LMB,
  author =       "Ljup{\v{c}}o Kocarev and Goce Jakimoski",
  title =        "Logistic map as a block encryption algorithm",
  journal =      j-PHYS-LET-A,
  volume =       "289",
  number =       "4-5",
  pages =        "199--206",
  year =         "2001",
  CODEN =        "PYLAAG",
  ISSN =         "0375-9601 (print), 1873-2429 (electronic)",
  ISSN-L =       "0375-9601",
  MRclass =      "94A60 (37D45 37N99 82Bxx)",
  MRnumber =     "1 867 990",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  fjournal =     "Physics Letters. A",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03759601",
}

@Article{Komninos:2001:ESC,
  author =       "N. Komninos and Bahram Honary and Michael Darnell",
  title =        "An Efficient Stream Cipher {Alpha1} for Mobile and
                 Wireless Devices",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2260",
  pages =        "294--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:45 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2260.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2260/22600294.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2260/22600294.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kong:2001:AVW,
  author =       "Xiangwei Kong and Yu Liu and Huajian Liu",
  title =        "Adaptive Video Watermarking Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2195",
  pages =        "933--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2195.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2195/21950933.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2195/21950933.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InCollection{Koshiba:2001:NAS,
  author =       "Takeshi Koshiba",
  booktitle =    "Public key cryptography (Cheju Island, 2001)",
  title =        "A New Aspect for Security Notions: Secure Randomness
                 in Public-Key Encryption Schemes",
  volume =       "1992",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "87--103",
  year =         "2001",
  MRclass =      "94A60 (62D05 94A62)",
  MRnumber =     "1 898 027",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1992.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  series =       "Lecture Notes in Comput. Sci.",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1992/19920087.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1992/19920087.pdf",
}

@Article{Koshiba:2001:SRS,
  author =       "Takeshi Koshiba",
  title =        "On Sufficient Randomness for Secure Public-Key
                 Cryptosystems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2274",
  pages =        "34--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:07 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2274.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2274/22740034.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2274/22740034.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Koskinen:2001:NIK,
  author =       "Jukka A. Koskinen",
  title =        "Non-injective knapsack public-key cryptosystems",
  journal =      j-THEOR-COMP-SCI,
  volume =       "255",
  number =       "1--2",
  pages =        "401--422",
  day =          "28",
  month =        mar,
  year =         "2001",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "2001m:94047",
  MRreviewer =   "J. D{\'e}nes",
  bibdate =      "Tue Apr 17 08:40:28 MDT 2001",
  bibsource =    "http://www.elsevier.com/locate/issn/03043975;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.nl../40/abstract.html;
                 http://www.elsevier.nl/gej-ng/10/41/16/197/21/40/article.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Book{Kovach:2001:BCB,
  author =       "Karen Kovach",
  title =        "Breaking codes, breaking barriers: the {WACs} of the
                 {Signal Security Agency}, {World War II}",
  publisher =    "History Office, Office of the Chief of Staff, US Army
                 Intelligence and Security Command",
  address =      "Fort Belvoir, VA, USA",
  pages =        "vi + 49",
  year =         "2001",
  LCCN =         "UA565.W6 K68 2001",
  bibdate =      "Thu Dec 28 09:53:35 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939--1945; Military intelligence; United
                 States; Cryptography",
}

@InProceedings{Krawczyk:2001:OEA,
  author =       "Hugo Krawczyk",
  title =        "The Order of Encryption and Authentication for
                 Protecting Communications (or: How Secure Is {SSL}?)",
  crossref =     "Kilian:2001:ACC",
  pages =        "310--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390310.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390310.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Kuhn:2001:CRR,
  author =       "Ulrich K{\"u}hn",
  booktitle =    "Advances in cryptology---EUROCRYPT 2001 (Innsbruck)",
  title =        "Cryptanalysis of reduced-round {MISTY}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2045",
  pages =        "325--329",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "1 895 441",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kukorelly:2001:PAL,
  author =       "Zsolt Kukorelly",
  title =        "The piling-up approximation in linear cryptanalysis",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "47",
  number =       "7",
  pages =        "2812--2823",
  month =        jul,
  year =         "2001",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/18.959262",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94A60 (60-XX)",
  MRnumber =     "1 872 842",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Institute of Electrical and Electronics Engineers.
                 Transactions on Information Theory",
}

@Article{Kundur:2001:WDI,
  author =       "Deepa Kundur",
  title =        "Watermarking with Diversity: Insights and
                 Implications",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "8",
  number =       "4",
  pages =        "46--52",
  month =        oct,
  year =         "2001",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/93.959102",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Sat Feb 23 11:55:59 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/mu/books/mu2001/pdf/u4046.pdf;
                 http://www.computer.org/multimedia/mu2001/u4046abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Multimedia",
}

@Article{Kuo:2001:AOS,
  author =       "H. Kuo and I. Verbauwhede",
  title =        "Architectural Optimization for a 1.82Gbits\slash sec
                 {VLSI} Implementation of the {AES Rijndael} Algorithm",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2162",
  pages =        "51--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:06 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2162.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2162/21620051.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2162/21620051.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kuribayashi:2001:NAF,
  author =       "M. Kuribayashi and H. Tanaka",
  title =        "A New Anonymous Fingerprinting Scheme with High
                 Enciphering Rate",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2247",
  pages =        "30--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:31 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2247.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2247/22470030.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2247/22470030.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kurosawa:2001:ICP,
  author =       "Kaoru Kurosawa and Wakaha Ogata and Toshihiko Matsuo
                 and Shuichi Makishima",
  title =        "{IND--CCA} Public Key Schemes Equivalent to Factoring
                 $n = p q$",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1992",
  pages =        "36--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:11 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1992.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1992/19920036.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1992/19920036.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kurosawa:2001:LCI,
  author =       "Kaoru Kurosawa and Takuya Yoshida",
  title =        "Linear Code Implies Public-Key Traitor Tracing",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2274",
  pages =        "172--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:07 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2274.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2274/22740172.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2274/22740172.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kurosawa:2001:MRP,
  author =       "Kaoru Kurosawa",
  title =        "Multi-recipient Public-Key Encryption with Shortened
                 Ciphertext",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2274",
  pages =        "48--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:07 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2274.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2274/22740048.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2274/22740048.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Lam:2001:CCN,
  author =       "Kwok Yan Lam",
  title =        "Cryptography and computational number theory",
  volume =       "20",
  publisher =    pub-BIRKHAUSER,
  address =      pub-BIRKHAUSER:adr,
  pages =        "viii + 378",
  year =         "2001",
  ISBN =         "3-7643-6510-2, 0-8176-6510-2",
  ISBN-13 =      "978-3-7643-6510-3, 978-0-8176-6510-4",
  LCCN =         "QA268 .C77 2001",
  bibdate =      "Wed Feb 13 12:10:46 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "Progress in computer science and applied logic",
  acknowledgement = ack-nhfb,
  keywords =     "coding theory --- congresses; cryptography ---
                 congresses; number theory --- data processing ---
                 congresses",
}

@Article{Lang:2001:CMS,
  author =       "Ulrich Lang and Dieter Gollmann and Rudolf Schreiner",
  title =        "Cryptography and Middleware Security",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2229",
  pages =        "408--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:15 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2229.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2229/22290408.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2229/22290408.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@PhdThesis{Lee:2001:AES,
  author =       "Jee Hea Lee",
  title =        "Authenticated encryption in the symmetric and
                 asymmetric settings",
  type =         "Vita Thesis ({Ph.D.})",
  school =       "University of California, San Diego",
  address =      "San Diego, CA, USA",
  year =         "2001",
  LCCN =         "QA 3.8 .L44 2001 Archives DISS",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "dissertations, academic --- UCSD --- Computer Science;
                 dissertations, academic --- UCSD --- Computer Science
                 and Engineering",
}

@Article{Lee:2001:EPI,
  author =       "Ruby B. Lee and Zhijie Shi and Xiao Yang",
  title =        "Efficient Permutation Instructions for Fast Software
                 Cryptography",
  journal =      j-IEEE-MICRO,
  volume =       "21",
  number =       "6",
  pages =        "56--69",
  month =        nov # "\slash " # dec,
  year =         "2001",
  CODEN =        "IEMIDZ",
  DOI =          "https://doi.org/10.1109/40.977759",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Thu Jan 31 18:42:02 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/mi/books/mi2001/m6056abs.htm;
                 http://dlib.computer.org/mi/books/mi2001/pdf/m6056.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Micro",
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
}

@InProceedings{Lee:2001:PBG,
  author =       "Eonkyung Lee and Sang Jin Lee and Sang Geun Hahn",
  title =        "Pseudorandomness from Braid Groups",
  crossref =     "Kilian:2001:ACC",
  pages =        "486--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390486.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390486.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Lee:2001:SEK,
  author =       "Byung-Rae Lee and Kyung-Ah Chang and Tai-Yun Kim",
  title =        "A Secure and Efficient Key Escrow Protocol for Mobile
                 Communications",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2073",
  pages =        "433--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:28 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2073.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2073/20730433.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2073/20730433.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Leitold:2001:MTN,
  author =       "Herbert Leitold and Wolfgang Mayerwieser and Udo Payer
                 and Karl Christian Posch and Reinhard Posch and
                 Johannes Wolkerstorfer",
  title =        "A {155 Mbps Triple-DES} Network Encryptor",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1965",
  pages =        "164--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:57 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1965.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1965/19650164.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1965/19650164.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lenstra:2001:SFR,
  author =       "Arjen K. Lenstra and Igor E. Shparlinski",
  title =        "Selective Forgery of {RSA} Signatures with
                 Fixed-Pattern Padding",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2274",
  pages =        "228--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:07 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2274.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2274/22740228.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2274/22740228.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lenstra:2001:USM,
  author =       "Arjen K. Lenstra",
  title =        "Unbelievable Security. Matching {AES} Security Using
                 Public Key Systems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2248",
  pages =        "67--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2248.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2248/22480067.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2248/22480067.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Leung:2001:WDI,
  author =       "K. H. Leung and Bing Zeng",
  title =        "Wavelet-Domain Image Watermarking Based on Statistical
                 Metrics",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2195",
  pages =        "788--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2195.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2195/21950788.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2195/21950788.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Leveiller:2001:CNF,
  author =       "Sabine Leveiller and Joseph Boutros and Philippe
                 Guillot and Gilles Z{\'e}mor",
  title =        "Cryptanalysis of Nonlinear Filter Generators with $ \{
                 0, 1 \} $-Metric {Viterbi} Decoding",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2260",
  pages =        "402--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:45 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2260.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2260/22600402.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2260/22600402.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Levy:2001:CHC,
  author =       "Steven Levy",
  title =        "Crypto: how the code rebels beat the government,
                 saving privacy in the digital age",
  publisher =    pub-VIKING,
  address =      pub-VIKING:adr,
  pages =        "viii + 356",
  year =         "2001",
  ISBN =         "0-670-85950-8, 0-14-024432-8",
  ISBN-13 =      "978-0-670-85950-4, 978-0-14-024432-8",
  LCCN =         "QA76.9.A25 L49 2001",
  bibdate =      "Sat Dec 17 17:13:01 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Cryptography",
  xxtitle =      "Crypto: secrecy and privacy in the new code war",
}

@Article{Li:2001:CCB,
  author =       "Zi Chen Li and Yi Qi Dai",
  title =        "Cryptoanalysis of cryptosystems based on the quadratic
                 residue problem",
  journal =      "J. Tsinghua Univ.",
  volume =       "41",
  number =       "7",
  pages =        "80--82",
  year =         "2001",
  CODEN =        "QDXKE8",
  ISSN =         "1000-0054",
  MRclass =      "94A60",
  MRnumber =     "2002f:94038",
  MRreviewer =   "Dingyi Pei",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Journal of Tsinghua University. Science and
                 Technology. Qinghua Daxue Xuebao. Ziran Kexue Ban",
}

@Article{Li:2001:GOT,
  author =       "Zi-Chen Li and Jun-Mei Zhang and Jun Luo and William
                 Song and Yi-Qi Dai",
  title =        "Group-Oriented $ (t, n) $ Threshold Digital Signature
                 Schemes with Traceable Signers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2040",
  pages =        "57--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:57 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2040.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2040/20400057.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2040/20400057.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Li:2001:NSA,
  author =       "Yifa Li",
  title =        "A New Semantics of Authentication Logic",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2229",
  pages =        "476--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:15 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2229.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2229/22290476.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2229/22290476.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Li:2001:SPD,
  author =       "Shujun Li and Qi Li and Wenmin Li and Xuanqin Mou and
                 Yuanlong Cai",
  title =        "Statistical Properties of Digital Piecewise Linear
                 Chaotic Maps and Their Roles in Cryptography and
                 Pseudo-Random Coding",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2260",
  pages =        "205--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:45 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2260.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2260/22600205.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2260/22600205.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Lientz:2001:BTP,
  author =       "Bennet P. Lientz and Kathryn P. Rea",
  title =        "Breakthrough technology project management",
  publisher =    pub-ACADEMIC,
  address =      pub-ACADEMIC:adr,
  pages =        "xxv + 342",
  year =         "2001",
  ISBN =         "0-12-449968-6",
  ISBN-13 =      "978-0-12-449968-3",
  LCCN =         "HD69.P75 L538 2001",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$44.95",
  acknowledgement = ack-nhfb,
}

@Article{Lim:2001:SAW,
  author =       "Shin-Young Lim and Jeong-Ho Ko and Eun-Ah Jun and
                 Gang-Soo Lee",
  title =        "Specification and analysis of $n$-way key recovery
                 system by {Extended Cryptographic Timed Petri Net}",
  journal =      j-J-SYST-SOFTW,
  volume =       "58",
  number =       "2",
  pages =        "93--106",
  day =          "1",
  month =        sep,
  year =         "2001",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Nov 19 09:08:02 MST 2001",
  bibsource =    "http://www.elsevier.com/locate/issn/01641212;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.elsevier.com/gej-ng/10/29/11/68/33/28/abstract.html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Lin:2001:DWM,
  author =       "Phen-Lan Lin",
  title =        "Digital watermarking models for resolving rightful
                 ownership and authenticating legitimate customer",
  journal =      j-J-SYST-SOFTW,
  volume =       "55",
  number =       "3",
  pages =        "261--271",
  day =          "15",
  month =        jan,
  year =         "2001",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed Apr 18 06:31:11 MDT 2001",
  bibsource =    "http://www.elsevier.com/locate/issn/01641212;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.nl/gej-ng/10/29/11/54/27/27/abstract.html;
                 http://www.elsevier.nl/gej-ng/10/29/11/54/27/27/article.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Lin:2001:HKA,
  author =       "Chu-Hsing Lin",
  title =        "Hierarchical key assignment without public-key
                 cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "7",
  pages =        "612--619",
  day =          "31",
  month =        oct,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801007118",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Lindell:2001:PCT,
  author =       "Yehuda Lindell",
  title =        "Parallel Coin-Tossing and Constant-Round Secure
                 Two-Party Computation",
  crossref =     "Kilian:2001:ACC",
  pages =        "171--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390171.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390171.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@InProceedings{Lindemann:2001:ICT,
  author =       "Mark Lindemann and Sean W. Smith",
  title =        "Improving {DES} Coprocessor Throughput for Short
                 Operations",
  crossref =     "USENIX:2001:PTU",
  pages =        "??--??",
  year =         "2001",
  bibdate =      "Tue Oct 15 16:52:27 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/sec01/lindemann.html",
  acknowledgement = ack-nhfb,
}

@Article{Loidreau:2001:WKM,
  author =       "Pierre Loidreau and Nicolas Sendrier",
  title =        "Weak keys in the {McEliece} public-key cryptosystem",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "47",
  number =       "3",
  pages =        "1207--1211",
  month =        mar,
  year =         "2001",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/18.915687",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94A62",
  MRnumber =     "2002f:94049",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Institute of Electrical and Electronics Engineers.
                 Transactions on Information Theory",
}

@Article{Lovering:2001:TKF,
  author =       "Daniel Lovering",
  title =        "Taming the Killing Fields of {Laos}: Live bombs from
                 the {Vietnam War} continue to kill people and hamper
                 agricultural development in {Laos}. The cleanup project
                 required deciphering decades-old computer files",
  journal =      j-SCI-AMER,
  volume =       "285",
  number =       "2",
  pages =        "66--71",
  month =        aug,
  year =         "2001",
  CODEN =        "SCAMAC",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Thu Jul 19 06:21:52 MDT 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciam.com/2001/0801issue/0801quicksummary.html",
  URL =          "http://www.sciam.com/2001/0801issue/2001/0801issue/0801hargrove.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Article{Lu:2001:DWC,
  author =       "Chun-Shien Lu and Hong-Yuan Mark Liao",
  title =        "Digital Watermarking: a Communications with Side
                 Information Perspective",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2195",
  pages =        "927--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2195.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2195/21950927.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2195/21950927.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ludwig:2001:FSE,
  author =       "Stefan Ludwig and Winfried Kalfa",
  title =        "File system encryption with integrated user
                 management",
  journal =      j-OPER-SYS-REV,
  volume =       "35",
  number =       "4",
  pages =        "88--93",
  month =        oct,
  year =         "2001",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:53 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Lukyanov:2001:PFA,
  author =       "Dmitro O. Luk'yanov",
  title =        "On the problem of the formation of an authentication
                 protocol for on-line cryptosystems",
  journal =      "V{\=\i}sn. Ki{\"\i} v. Un{\=\i}v. Ser. F{\=\i}z.-Mat.
                 Nauki",
  volume =       "2",
  pages =        "269--276",
  year =         "2001",
  MRclass =      "94A60",
  MRnumber =     "1 897 251",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "V{\=\i}snik Ki{\"\i} vs\cprime kogo Un{\=\i}versitetu.
                 Ser{\=\i}ya: F{\=\i}ziko-Matematichn{\=\i} Nauki",
}

@Article{Lysyanskaya:2001:AST,
  author =       "Anna Lysyanskaya and Chris Peikert",
  title =        "Adaptive Security in the Threshold Setting: From
                 Cryptosystems to Signature Schemes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2248",
  pages =        "331--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2248.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2248/22480331.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2248/22480331.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{MacKenzie:2001:MEP,
  author =       "Philip MacKenzie",
  title =        "More Efficient Password-Authenticated Key Exchange",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2020",
  pages =        "361--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2020.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2020/20200361.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2020/20200361.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{MacKenzie:2001:TPG,
  author =       "Philip MacKenzie and Michael K. Reiter",
  title =        "Two-Party Generation of {DSA} Signatures",
  crossref =     "Kilian:2001:ACC",
  pages =        "137--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390137.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390137.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Maitra:2001:SDD,
  author =       "S. Maitra and D. P. Mukherjee",
  title =        "Spatial Domain Digital Watermarking with Buyer
                 Authentication",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2247",
  pages =        "149--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:31 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2247.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2247/22470149.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2247/22470149.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Manger:2001:CCA,
  author =       "James Manger",
  title =        "A Chosen Ciphertext Attack on {RSA} Optimal Asymmetric
                 Encryption Padding {(OAEP)} as Standardized in {PKCS}
                 \#1 v2.0",
  crossref =     "Kilian:2001:ACC",
  pages =        "230--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390230.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390230.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Mao:2001:TRC,
  author =       "Wenbo Mao",
  title =        "Timed-Release Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2259",
  pages =        "342--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:44 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2259.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2259/22590342.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2259/22590342.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Maurer:2001:C,
  author =       "Ueli Maurer",
  title =        "Cryptography $ 2000 \pm 10 $",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2000",
  pages =        "63--85",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:19 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2000.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2000/20000063.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2000/20000063.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Mayer-Sommer:2001:SAS,
  author =       "Rita Mayer-Sommer",
  title =        "Smartly Analyzing the Simplicity and the Power of
                 Simple Power Analysis on Smartcards",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1965",
  pages =        "78--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:57 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1965.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1965/19650078.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1965/19650078.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Mayers:2001:USQ,
  author =       "Dominic Mayers",
  title =        "Unconditional security in quantum cryptography",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "3",
  pages =        "351--406",
  month =        may,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:52:07 MST 2002",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2001-48-3/p351-mayers/",
  abstract =     "Basic techniques to prove the unconditional security
                 of quantum cryptography are described. They are applied
                 to a quantum key distribution protocol proposed by
                 Bennett and Brassard [1984]. The proof considers a
                 practical variation on the protocol in which the
                 channel is noisy and photos may be lost during the
                 transmission. Each individual signal sent into the
                 channel must contain a single photon or any
                 two-dimensional system in the exact state described in
                 the protocol. No restriction is imposed on the detector
                 used at the receiving side of the channel, except that
                 whether or not the received system is detected must be
                 independent of the basis used to measure this system.",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of the Association for Computing Machinery",
  generalterms = "Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
  keywords =     "quantum cryptography; quantum information theory;
                 unconditional security",
  subject =      "Data --- Data Encryption (E.3): {\bf Public key
                 cryptosystems}",
}

@Article{McCook:2001:NSS,
  author =       "Alison McCook and Philip Yam and Graham P. Collins",
  title =        "News Scan: The Not So Sheltering Sky; Computer: Hack
                 Job; Tissue Engineering: Fat into Cartilage;
                 Psychology: Holier Than Thou; Astronomy: Otherworldly
                 Ocean; Physics: Microscopic Maelstrom; Medicine: Fetal
                 Cell Setback",
  journal =      j-SCI-AMER,
  volume =       "284",
  number =       "5",
  pages =        "24--25",
  month =        may,
  year =         "2001",
  CODEN =        "SCAMAC",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Tue Apr 17 05:07:31 MDT 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciam.com/2001/0501issue/0501quicksummary.html",
  URL =          "http://www.sciam.com/2001/0501issue/0501inbrief.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
  keywords =     "CSS (content scrambling system); DVD encryption;
                 efdtt; flood, hurricane, and tornado damage costs;
                 Jupiter's largest moon, Ganymede; qrpff",
}

@InCollection{McGrew:2001:AAE,
  author =       "David A. McGrew and Scott R. Fluhrer",
  booktitle =    "Selected areas in cryptography (Waterloo, ON, 2000)",
  title =        "Attacks on Additive Encryption of Redundant Plaintext
                 and Implications on {Internet} Security",
  volume =       "2012",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "14--28",
  year =         "2001",
  MRclass =      "94A60",
  MRnumber =     "1 895 579",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2012.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  series =       "Lecture Notes in Comput. Sci.",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2012/20120014.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2012/20120014.pdf",
}

@Article{McLoone:2001:HPS,
  author =       "M. McLoone and J. V. McCanny",
  title =        "High Performance Single-Chip {FPGA Rijndael} Algorithm
                 Implementations",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2162",
  pages =        "65--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:06 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2162.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2162/21620065.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2162/21620065.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{McLoone:2001:SCF,
  author =       "M{\'a}ire McLoone and John V. McCanny",
  title =        "Single-Chip {FPGA} Implementation of the Advanced
                 Encryption Standard Algorithm",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2147",
  pages =        "152--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:49 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2147.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2147/21470152.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2147/21470152.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{McMillan:2001:JIA,
  author =       "Scott McMillan and Cameron Patterson",
  title =        "{JBits{\TM}} Implementations of the {Advanced
                 Encryption Standard (Rijndael)}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2147",
  pages =        "162--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:49 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2147.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2147/21470162.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2147/21470162.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Meadows:2001:OIF,
  author =       "Catherine Meadows",
  title =        "Open Issues in Formal Methods for Cryptographic
                 Protocol Analysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2052",
  pages =        "21--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:08 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2052.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2052/20520021.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2052/20520021.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Mehrabi:2001:DW,
  author =       "Hamid Reza Mehrabi",
  title =        "Digital Watermark",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2163",
  pages =        "49--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:07 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2163.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2163/21630049.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2163/21630049.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Meister:2001:PPG,
  author =       "Gisela Meister and Michael Vogel",
  title =        "Protection Profiles and Generic Security Targets for
                 Smart Cards as Secure Signature Creation Devices ---
                 Existing Solutions for the Payment Sector",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2140",
  pages =        "179--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2140.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2140/21400179.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2140/21400179.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Mel:2001:CD,
  author =       "H. X. Mel and Doris M. Baker",
  title =        "Cryptography Decrypted",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xx + 352",
  year =         "2001",
  ISBN =         "0-201-61647-5",
  ISBN-13 =      "978-0-201-61647-7",
  LCCN =         "QA76.9.A25 M44 2001",
  bibdate =      "Wed Jan 16 09:04:46 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US \$29.95; CDN \$44.95; UK\pounds 22.99",
  acknowledgement = ack-nhfb,
  annote =       "Contents: Pt. I. Secret Key Cryptography. Ch. 1. Locks
                 and Keys. Ch. 2. Substitution and Caesar's Cipher. Ch.
                 3. Transposition Ciphers: Moving Around. Ch. 4. Diffuse
                 and Confuse: How Cryptographers Win the End Game. Ch.
                 5. DES Isn't Strong Anymore. Ch. 6. Evolution of
                 Cryptography: Going Global. Ch. 7. Secret Key
                 Assurances. Ch. 8. Problems with Secret Key Exchange
                 --- Pt. II. Public Key Cryptography. Ch. 9. Pioneering
                 Public Key: Public Exchange of Secret Keys. Ch. 10.
                 Confidentiality Using Public Keys. Ch. 11. Making
                 Public Keys: Math Tricks. Ch. 12. Creating Digital
                 Signatures Using the Private Key. Ch. 13. Hashes:
                 Non-keyed Message Digests. Ch. 14. Message Digest
                 Assurances. Ch. 15. Comparing Secret Key, Public Key,
                 and Message Digests --- Pt. III. Distribution of Public
                 Keys. Ch. 16. Digital Certificates. Ch. 17. X.509
                 Public Key Infrastructure. Ch. 18. Pretty Good Privacy
                 and the Web of Trust --- Pt. IV. Real-World Systems.
                 Ch. 19. Secure E-mail. Ch. 20. Secure Socket Layer and
                 Transport Layer Security. Ch. 21. IPsec Overview. Ch.
                 22. Cryptographic Gotchas. Ch. 23. Protecting Your Keys
                 --- App. A. Public Key Mathematics (and Some Words on
                 Random Numbers) --- App. B. (A Few) IPsec Details.",
  keywords =     "computer security; cryptography",
}

@Article{Messerges:2001:SAF,
  author =       "Thomas S. Messerges",
  title =        "Securing the {AES} Finalists Against Power Analysis
                 Attacks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1978",
  pages =        "150--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:00 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1978.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1978/19780150.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1978/19780150.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Meyer:2001:FIC,
  author =       "Andreas Meyer and Stefan Neis and Thomas Pfahler",
  title =        "First Implementation of Cryptographic Protocols Based
                 on Algebraic Number Fields",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2119",
  pages =        "84--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:21 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2119.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2119/21190084.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2119/21190084.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Miaou:2001:BCW,
  author =       "Shaou-Gang Miaou and Tzung-Shian Lee and Chih-Ming
                 Chen",
  title =        "{BCH} Coded Watermarks for Error-Prone Transmission of
                 {MPEG} Video",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2195",
  pages =        "654--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2195.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2195/21950654.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2195/21950654.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Micali:2001:MRR,
  author =       "Silvio Micali and Leonid Reyzin",
  title =        "Min-round Resettable Zero-Knowledge in the Public-Key
                 Model",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2045",
  pages =        "373--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:02 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2045.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2045/20450373.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2045/20450373.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Micali:2001:SPK,
  author =       "Silvio Micali and Leonid Reyzin",
  title =        "Soundness in the Public-Key Model",
  crossref =     "Kilian:2001:ACC",
  pages =        "542--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390542.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390542.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Micciancio:2001:ILB,
  author =       "Daniele Micciancio",
  booktitle =    "Cryptography and lattices (Providence, RI, 2001)",
  title =        "Improving lattice based cryptosystems using the
                 {Hermite} normal form",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2146",
  pages =        "126--145",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "11H71 (94Axx)",
  MRnumber =     "1 903 892",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Mihailescu:2001:BRE,
  author =       "Preda Mihailescu and F. Pappalardi",
  title =        "Book review: {{\em Elliptic curves in cryptography}}",
  journal =      j-MATH-COMPUT,
  volume =       "70",
  number =       "236",
  pages =        "1755--1759",
  month =        oct,
  year =         "2001",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (print), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Mon Jul 16 07:53:14 MDT 2001",
  bibsource =    "http://www.ams.org/mcom/2001-70-236;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathcomp2000.bib",
  URL =          "http://www.ams.org/mcom/2001-70-236/S0025-5718-01-01400-4/bookrev-S0025-5718-01-01400-4.html;
                 http://www.ams.org/mcom/2001-70-236/S0025-5718-01-01400-4/S0025-5718-01-01400-4.dvi;
                 http://www.ams.org/mcom/2001-70-236/S0025-5718-01-01400-4/S0025-5718-01-01400-4.pdf;
                 http://www.ams.org/mcom/2001-70-236/S0025-5718-01-01400-4/S0025-5718-01-01400-4.ps;
                 http://www.ams.org/mcom/2001-70-236/S0025-5718-01-01400-4/S0025-5718-01-01400-4.tex",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
}

@Article{Minier:2001:SCC,
  author =       "Marine Minier and Henri Gilbert",
  title =        "Stochastic Cryptanalysis of {Crypton}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1978",
  pages =        "121--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:00 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1978.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1978/19780121.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1978/19780121.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Miyazaki:2001:ISG,
  author =       "Takeru Miyazaki",
  title =        "An Improved Scheme of the {Gennaro-Krawczyk-Rabin}
                 Undeniable Signature System Based on {RSA}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2015",
  pages =        "135--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2015.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2015/20150135.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2015/20150135.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Mizuki:2001:NSN,
  author =       "Takaaki Mizuki and Takao Nishizeki",
  title =        "Necessary and Sufficient Numbers of Cards for Sharing
                 Secret Keys on Hierarchical Groups",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2223",
  pages =        "196--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:08 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2223.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2223/22230196.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2223/22230196.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Mollin:2001:IC,
  author =       "Richard A. Mollin",
  title =        "An Introduction to Cryptography",
  publisher =    pub-CHAPMAN-HALL-CRC,
  address =      pub-CHAPMAN-HALL-CRC:adr,
  pages =        "xiii + 373",
  year =         "2001",
  ISBN =         "1-58488-127-5",
  ISBN-13 =      "978-1-58488-127-8",
  LCCN =         "QA268 .M65 2000",
  bibdate =      "Wed Jan 16 09:22:51 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "UK\pounds 29.99",
  series =       "The CRC Press series on discrete mathematics and its
                 applications",
  acknowledgement = ack-nhfb,
  keywords =     "coding theory",
}

@Article{Monsignori:2001:WMS,
  author =       "M. Monsignori and P. Nesi and M. B. Spinu",
  title =        "Watermarking Music Sheets",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2195",
  pages =        "646--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2195.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2195/21950646.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2195/21950646.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Moore:2001:AGK,
  author =       "Patrick C. Moore and Wilbur R. Johnson and Richard J.
                 Detry",
  title =        "Adapting {Globus} and {Kerberos} for a Secure {ASCI}
                 Grid",
  crossref =     "ACM:2001:SHP",
  pages =        "??--??",
  year =         "2001",
  bibdate =      "Sat Feb 10 14:28:55 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.sc2001.org/papers/pap.pap192.pdf",
  acknowledgement = ack-nhfb,
  pagecount =    "9",
}

@Article{Moore:2001:UMW,
  author =       "Samuel K. Moore",
  title =        "Unhooking medicine [wireless networking]",
  journal =      j-IEEE-SPECTRUM,
  volume =       "38",
  number =       "1",
  pages =        "107--108",
  month =        jan,
  year =         "2001",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/6.901156",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "1395 to 1400 MHz; 14 MHz; 1429 to 1432 MHz; 608 to 614
                 MHz; bedside wireless systems; biomedical telemetry;
                 Control systems; Cryptography; Digital TV; FCC;
                 Frequency; Hospitals; hospitals; Internet; medical
                 device firms; patient data access; Patient monitoring;
                 patient-worn wireless systems; personal digital
                 assistant; Protection; radio applications; Telemetry;
                 Wireless Medical Telemetry Service; wireless
                 networking; wireless phone",
}

@Article{Morelli:2001:JAH,
  author =       "Ralph Morelli and Ralph Walde and Gregg Marcuccio",
  title =        "A {Java API} for historical ciphers: an
                 object-oriented design project",
  journal =      j-SIGCSE,
  volume =       "33",
  number =       "1",
  pages =        "307--311",
  month =        mar,
  year =         "2001",
  CODEN =        "SIGSD3",
  DOI =          "https://doi.org/10.1145/366413.364609",
  ISSN =         "0097-8418 (print), 2331-3927 (electronic)",
  ISSN-L =       "0097-8418",
  bibdate =      "Sat Nov 17 16:56:46 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigcse2000.bib",
  abstract =     "This paper describes a project suitable for a software
                 engineering or object-oriented design course. The
                 project consists of asking students to design an
                 application programming interface (API) for a
                 particular range of applications. An API-design project
                 has several features not always found in
                 application-design projects: It forces students to
                 focus carefully on the distinction between the
                 programming and the user interfaces; it provides a good
                 justification for studying existing APIs as model code;
                 it provides a natural way to divide tasks between
                 different groups of designers/programmers; and, the
                 final product can be used as the basis for programming
                 projects in other courses. In this case the particular
                 project we describe is the design of an API for
                 implementing Historical Cipher algorithms.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIGCSE Bulletin (ACM Special Interest Group on
                 Computer Science Education)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J688",
}

@Article{Moshopoulos:2001:NSA,
  author =       "Nikos K. Moshopoulos and K. Z. Pekmestzi",
  title =        "A Novel Systolic Architecture for an Efficient {RSA}
                 Implementation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1992",
  pages =        "416--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:11 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1992.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1992/19920416.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1992/19920416.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{MRaihi:2001:CAS,
  author =       "David M'Ra{\"\i}hi and Moti Yung",
  title =        "{E}-commerce applications of smart cards",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "36",
  number =       "4",
  pages =        "453--472",
  day =          "16",
  month =        jul,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Wed Jul 25 16:48:14 MDT 2001",
  bibsource =    "http://www.elsevier.com/locate/issn/13891286;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.nl/gej-ng/10/15/22/61/28/31/abstract.html;
                 http://www.elsevier.nl/gej-ng/10/15/22/61/28/31/article.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@InCollection{Muller:2001:SIC,
  author =       "Siguna M{\"u}ller",
  booktitle =    "Public-key cryptography and computational number
                 theory (Warsaw, 2000)",
  title =        "A survey of {IND-CCA} secure public-key encryption
                 schemes relative to factoring",
  publisher =    pub-GRUYTER,
  address =      pub-GRUYTER:adr,
  pages =        "181--196",
  year =         "2001",
  MRclass =      "94A60",
  MRnumber =     "1 881 634",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
}

@InCollection{Muller:2001:SWB,
  author =       "Siguna M{\"u}ller",
  booktitle =    "Public key cryptography (Cheju Island, 2001)",
  title =        "On the Security of a {Williams} Based Public Key
                 Encryption Scheme",
  volume =       "1992",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "1--18",
  year =         "2001",
  MRclass =      "94A62 (94A60)",
  MRnumber =     "1 898 021",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1992.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  series =       "Lecture Notes in Comput. Sci.",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1992/19920001.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1992/19920001.pdf",
}

@Misc{Murray:2001:CDC,
  author =       "Eric Murray",
  title =        "Changes in Deployment of Cryptography, and Possible
                 Causes",
  year =         "2001",
  bibdate =      "Tue Oct 15 16:52:27 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Unpublished invited talk, Tenth USENIX Security
                 Symposium, August 13--17, 2001, Washington, DC, USA.",
  URL =          "http://www.usenix.org/publications/library/proceedings/sec01/murray/index.htm",
  abstract =     "SSL/TLS is arguably the most widely deployed
                 cryptographic protocol and is readily characterized.
                 Last year my survey of over 8,000 SSL servers found
                 that about 25\% of them used only weak ``export''-level
                 keys and cipher suites. With the wider deployment of
                 TLS, more high-speed cryptographic hardware, and
                 another year since the U.S. liberalized crypto export
                 regulations, more sites have deployed strong crypto.
                 This talk will discuss the results of this year's
                 survey, the changes in crypto deployment that have
                 occurred in the last year, and the possible causes of
                 those changes.",
  acknowledgement = ack-nhfb,
}

@Article{Nakahara:2001:LCR,
  author =       "Jorge {Nakahara, Jr.} and Bart Preneel and Joos
                 Vandewalle",
  title =        "Linear Cryptanalysis of Reduced-Round Versions of the
                 {SAFER} Block Cipher Family",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1978",
  pages =        "244--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:00 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1978.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1978/19780244.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1978/19780244.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Nakai:2001:SFW,
  author =       "Yuichi Nakai",
  title =        "Semi Fragile Watermarking Based on Wavelet Transform",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2195",
  pages =        "796--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2195.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2195/21950796.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2195/21950796.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Naor:2001:RTS,
  author =       "Dalit Naor and Moni Naor and Jeff Lotspiech",
  title =        "Revocation and Tracing Schemes for Stateless
                 Receivers",
  crossref =     "Kilian:2001:ACC",
  pages =        "41--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390041.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390041.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Book{Nash:2001:PIM,
  author =       "Andrew Nash and William Duane and Celia Joseph and
                 Derek Brink",
  title =        "{PKI}: Implementing and Managing {E}-Security",
  publisher =    pub-MCGRAW-HILL,
  address =      pub-MCGRAW-HILL:adr,
  pages =        "xxii + 513",
  year =         "2001",
  ISBN =         "0-07-213123-3",
  ISBN-13 =      "978-0-07-213123-9",
  LCCN =         "QA76.9.A25 P5 2001",
  bibdate =      "Wed Jan 16 10:56:41 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$49.99",
  acknowledgement = ack-nhfb,
}

@Article{Neraud:2001:CFD,
  author =       "Jean N{\'e}raud and Carla Selmi",
  title =        "On codes with a finite deciphering delay: constructing
                 uncompletable words",
  journal =      j-THEOR-COMP-SCI,
  volume =       "255",
  number =       "1--2",
  pages =        "151--162",
  day =          "28",
  month =        mar,
  year =         "2001",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Apr 17 08:40:28 MDT 2001",
  bibsource =    "http://www.elsevier.com/locate/issn/03043975;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.nl../28/abstract.html;
                 http://www.elsevier.nl/gej-ng/10/41/16/197/21/28/article.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Nguyen:2001:ISA,
  author =       "Phong Q. Nguyen and Igor E. Shparlinski",
  title =        "On the Insecurity of a Server-Aided {RSA} Protocol",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2248",
  pages =        "21--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2248.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2248/22480021.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2248/22480021.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Nguyen:2001:TFLa,
  author =       "Phong Q. Nguyen and Jacques Stern",
  title =        "The Two Faces of Lattices in Cryptology",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2146",
  pages =        "146--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:49 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2146.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2146/21460146.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2146/21460146.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Nguyen:2001:TFLb,
  author =       "Phong Q. Nguyen",
  title =        "The Two Faces of Lattices in Cryptology",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2259",
  pages =        "313--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:44 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2259.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2259/22590313.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2259/22590313.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Nicholson:2001:YBC,
  author =       "John Nicholson",
  title =        "You've Been Cracked \ldots{} and Now You're Sued",
  journal =      j-LOGIN,
  volume =       "26",
  number =       "2",
  pages =        "??--??",
  month =        apr,
  year =         "2001",
  CODEN =        "LOGNEM",
  ISSN =         "1044-6397",
  bibdate =      "Tue Apr 11 10:51:58 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.usenix.org/publications/login/2001-04/index.html",
  URL =          "http://www.usenix.org/publications/login/2001-04/pdfs/nicholson.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     ";login: the USENIX Association newsletter",
}

@Article{Nieto:2001:PKC,
  author =       "Juan Manuel Gonz{\'a}lez Nieto and Colin Boyd and Ed
                 Dawson",
  title =        "A Public Key Cryptosystem Based on the Subgroup
                 Membership Problem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2229",
  pages =        "352--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:15 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2229.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2229/22290352.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2229/22290352.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Misc{NIST:2001:CT,
  author =       "{NIST}",
  title =        "Cryptographic Toolkit",
  howpublished = "World-Wide Web document",
  year =         "2001",
  bibdate =      "Wed Apr 20 12:03:17 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csrc.nist.gov/CryptoToolkit/",
  acknowledgement = ack-nhfb,
  remark =       "The Cryptographic Toolkit is a collection of standards
                 and guidance --- not actual software implementations of
                 the algorithms.",
}

@TechReport{NIST:2001:SRC,
  author =       "{NIST}",
  title =        "Security Requirements for Cryptographic Modules",
  type =         "Federal Information Processing Standards Publication",
  number =       "FIPS PUB 140-2",
  institution =  pub-NIST,
  address =      pub-NIST:adr,
  day =          "25",
  month =        may,
  year =         "2001",
  bibdate =      "Wed Aug 04 09:46:50 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
}

@Article{Novak:2001:SBA,
  author =       "Roman Novak",
  title =        "{SPA}-Based Adaptive Chosen-Ciphertext Attack on {RSA}
                 Implementation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2274",
  pages =        "252--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:07 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2274.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2274/22740252.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2274/22740252.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Nozaki:2001:IRA,
  author =       "H. Nozaki and M. Motoyama and A. Shimbo and S.
                 Kawamura",
  title =        "Implementation of {RSA} Algorithm Based on {RNS
                 Montgomery} Multiplication",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2162",
  pages =        "364--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:06 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2162.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2162/21620364.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2162/21620364.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Nyberg:2001:CTC,
  author =       "Kaisa Nyberg",
  title =        "Correlation theorems in cryptanalysis",
  journal =      j-DISCRETE-APPL-MATH,
  volume =       "111",
  number =       "1-2",
  pages =        "177--188",
  year =         "2001",
  CODEN =        "DAMADU",
  ISSN =         "0166-218X (print), 1872-6771 (electronic)",
  ISSN-L =       "0166-218X",
  MRclass =      "94A60 (94C10)",
  MRnumber =     "2002f:94042",
  MRreviewer =   "Michael M. Dediu",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Discrete Applied Mathematics. Combinatorial
                 Algorithms, Optimization and Computer Science",
}

@Article{Ohkuma:2001:BCH,
  author =       "Kenji Ohkuma and Hirofumi Muratani and Fumihiko Sano
                 and Shinichi Kawamura",
  title =        "The Block Cipher Hierocrypt",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2012",
  pages =        "72--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:30 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2012.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2012/20120072.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2012/20120072.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Okada:2001:IEC,
  author =       "Souichi Okada and Naoya Torii and Kouichi Itoh and
                 Masahiko Takenaka",
  title =        "Implementation of Elliptic Curve Cryptographic
                 Coprocessor over {$ {\rm GF}(2^m) $} on an {FPGA}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1965",
  pages =        "25--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:57 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1965.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1965/19650025.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1965/19650025.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Okamoto:2001:GPN,
  author =       "Tatsuaki Okamoto and David Pointcheval",
  title =        "The Gap-Problems: a New Class of Problems for the
                 Security of Cryptographic Schemes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1992",
  pages =        "104--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:11 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1992.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1992/19920104.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1992/19920104.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Okamoto:2001:RRE,
  author =       "Tatsuaki Okamoto and David Pointcheval",
  booktitle =    "Topics in cryptology---CT-RSA 2001 (San Francisco,
                 CA)",
  title =        "{REACT}: rapid enhanced-security asymmetric
                 cryptosystem transform",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2020",
  pages =        "159--175",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A62 (94A60)",
  MRnumber =     "1 907 096",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Okeya:2001:EEC,
  author =       "K. Okeya and K. Sakurai",
  title =        "Efficient Elliptic Curve Cryptosystems from a Scalar
                 Multiplication Algorithm with Recovery of the
                 $y$-Coordinate on a {Montgomery}-Form Elliptic Curve",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2162",
  pages =        "126--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:06 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2162.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2162/21620126.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2162/21620126.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Onions:2001:SSI,
  author =       "Paul Onions",
  title =        "On the Strength of Simply-Iterated {Feistel} Ciphers
                 with Whitening Keys",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2020",
  pages =        "63--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2020.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2020/20200063.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2020/20200063.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Oppliger:2001:SMP,
  author =       "Rolf Oppliger",
  title =        "Secure messaging with {PGP} and {S/MIME}",
  publisher =    pub-ARTECH,
  address =      pub-ARTECH:adr,
  pages =        "xxiii + 305",
  year =         "2001",
  ISBN =         "1-58053-161-X",
  ISBN-13 =      "978-1-58053-161-0",
  LCCN =         "TK5102.85 .O67 2001",
  bibdate =      "Thu May 12 10:35:23 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Artech House computer security series",
  URL =          "http://www.artechhouse.com/Detail.aspx?strIsbn=978-1-58053-161-0",
  acknowledgement = ack-nhfb,
  subject =      "telecommunication systems; security measures; PGP
                 (computer file); data encryption (computer science);
                 electronic mail systems",
}

@InProceedings{Paeng:2001:NPK,
  author =       "Seong-Hun Paeng and Kil-Chan Ha and Jae Heon Kim and
                 Seongtaek Chee and Choonsik Park",
  title =        "New Public Key Cryptosystem Using Finite Non {Abelian}
                 Groups",
  crossref =     "Kilian:2001:ACC",
  pages =        "470--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390470.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390470.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Papadimitriou:2001:PSE,
  author =       "S. Papadimitriou and T. Bountis and S. Mavroudi and A.
                 Bezerianos",
  title =        "A probabilistic symmetric encryption scheme for very
                 fast secure communication based on chaotic systems of
                 difference equations",
  journal =      j-INT-J-BIFURC-CHAOS-APPL-SCI-ENG,
  volume =       "11",
  number =       "12",
  pages =        "3107--3115",
  year =         "2001",
  CODEN =        "IJBEE4",
  ISSN =         "0218-1274",
  MRclass =      "94A60 (37N99)",
  MRnumber =     "1 885 260",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  fjournal =     "International Journal of Bifurcation and Chaos in
                 Applied Sciences and Engineering",
}

@Article{Park:2001:CSC,
  author =       "DongGook Park and JungJoon Kim and Colin Boyd and Ed
                 Dawson",
  title =        "Cryptographic Salt: a Countermeasure against
                 Denial-of-Service Attacks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2119",
  pages =        "334--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:21 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2119.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2119/21190334.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2119/21190334.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Park:2001:DNP,
  author =       "Hee-Un Park and Im-Yeong Lee",
  title =        "A Digital Nominative Proxy Signature Scheme for Mobile
                 Communication",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2229",
  pages =        "451--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:15 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2229.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2229/22290451.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2229/22290451.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Park:2001:NDW,
  author =       "Ji Hwan Park and Sook Ee Jeong and Young Huh",
  title =        "A New Digital Watermarking for Text Document Images
                 Using Diagonal Profile",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2195",
  pages =        "748--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2195.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2195/21950748.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2195/21950748.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Park:2001:RFW,
  author =       "Ji Hwan Park and Sook Ee Jeong and Chang Soo Kim",
  title =        "Robust and Fragile Watermarking Techniques for
                 Documents Using Bi-directional Diagonal Profiles",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2229",
  pages =        "483--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:15 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2229.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2229/22290483.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2229/22290483.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Parker:2001:RKC,
  author =       "Andrew T. Parker and Kevin M. Short",
  title =        "Reconstructing the keystream from a chaotic encryption
                 scheme",
  journal =      "IEEE Trans. Circuits Systems I Fund. Theory Appl.",
  volume =       "48",
  number =       "5",
  pages =        "624--635",
  year =         "2001",
  CODEN =        "ITCAEX",
  ISSN =         "1057-7122 (print), 1558-1268 (electronic)",
  MRclass =      "94A60",
  MRnumber =     "2002j:94046",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  fjournal =     "IEEE Transactions on Circuits and Systems. I.
                 Fundamental Theory and Applications",
}

@Article{Patarin:2001:QBL,
  author =       "Jacques Patarin and Nicolas Courtois and Louis
                 Goubin",
  title =        "{QUARTZ}, $ 128 $-Bit Long Digital Signatures",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2020",
  pages =        "282--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2020.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2020/20200282.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2020/20200282.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Patterson:2001:DFI,
  author =       "Cameron Patterson",
  title =        "A Dynamic {FPGA} Implementation of the {Serpent} Block
                 Cipher",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1965",
  pages =        "141--155",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:57 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1965.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1965/19650141.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1965/19650141.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Paulson:2001:RBS,
  author =       "Lawrence C. Paulson",
  title =        "Relations between secrets: two formal analyses of the
                 {Yahalom} protocol",
  journal =      j-J-COMP-SECUR,
  volume =       "9",
  number =       "3",
  pages =        "197--216",
  month =        "????",
  year =         "2001",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2001-9302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:21:43 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Pemble:2001:CEW,
  author =       "Matthew Pemble",
  title =        "Confidentiality: From Encryption, to Where?",
  journal =      j-NETWORK-SECURITY,
  volume =       "2001",
  number =       "4",
  pages =        "10--11",
  day =          "1",
  month =        apr,
  year =         "2001",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(01)00417-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:12 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485801004172",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Pemble:2001:SPA,
  author =       "Matthew Pemble",
  title =        "A Sceptical Pigeon Amongst The Crypto Cats: Report on
                 the {Edinburgh Financial Cryptographic Engineering
                 Conference, 2001}",
  journal =      j-NETWORK-SECURITY,
  volume =       "2001",
  number =       "7",
  pages =        "7--9",
  day =          "1",
  month =        jul,
  year =         "2001",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(01)00715-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:16 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485801007152",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Pfitzmann:2001:SEC,
  author =       "Birgit Pfitzmann and Ahmad-Reza Sadeghi",
  title =        "Self-Escrowed Cash against User Blackmailing",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1962",
  pages =        "42--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:55 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1962.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1962/19620042.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1962/19620042.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Phillips:2001:GRI,
  author =       "Deborah M. Phillips and Hans A. von Spakovsky",
  title =        "Gauging the risks of {Internet} elections",
  journal =      j-CACM,
  volume =       "44",
  number =       "1",
  pages =        "73--73",
  month =        jan,
  year =         "2001",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Dec 30 12:33:46 MST 2000",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See correction \cite{Crawford:2001:FPV}.",
  URL =          "http://www.acm.org/pubs/citations/journals/cacm/2001-44-1/p73-phillips/",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Book{Phoha:2001:SDI,
  editor =       "Vir V. Phoha",
  title =        "The {Springer} Dictionary of {Internet} Security",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "288 (est.)",
  year =         "2001",
  ISBN =         "0-387-95261-6",
  ISBN-13 =      "978-0-387-95261-1",
  LCCN =         "TK5105.59 .P56 2002",
  bibdate =      "Wed Feb 13 17:40:57 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$39.95",
  acknowledgement = ack-nhfb,
}

@Article{Picard:2001:NNF,
  author =       "Justin Picard and Arnaud Robert",
  title =        "Neural Networks Functions for Public Key
                 Watermarking",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2137",
  pages =        "142--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:39 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2137.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2137/21370142.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2137/21370142.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Pieprzyk:2001:CPS,
  author =       "J. Pieprzyk and X.-M. Zhang",
  title =        "Cheating Prevention in Secret Sharing over {$ {\rm
                 GF}(p t) $}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2247",
  pages =        "79--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:31 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2247.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2247/22470079.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2247/22470079.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Pliam:2001:PTU,
  author =       "John O. Pliam",
  title =        "A Polynomial-Time Universal Security Amplifier in the
                 Class of Block Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2012",
  pages =        "169--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:30 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2012.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2012/20120169.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2012/20120169.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Poh:2001:HBP,
  author =       "Norman Poh and Jerzy Korczak",
  title =        "Hybrid Biometric Person Authentication Using Face and
                 Voice Features",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2091",
  pages =        "348--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:50 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2091.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2091/20910348.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2091/20910348.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Pohlmann:2001:SCA,
  author =       "Norbert Pohlmann",
  title =        "Smart cards: The Authenticated Solution For E-business
                 User",
  journal =      j-NETWORK-SECURITY,
  volume =       "2001",
  number =       "4",
  pages =        "12--15",
  day =          "1",
  month =        apr,
  year =         "2001",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(01)00418-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:12 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485801004184",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Pornin:2001:SHT,
  author =       "Thomas Pornin and Jacques Stern",
  title =        "Software-Hardware Trade-Offs: Application to {A5/1}
                 Cryptanalysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1965",
  pages =        "318--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:57 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1965.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1965/19650318.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1965/19650318.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Pornin:2001:THE,
  author =       "T. Pornin",
  title =        "Transparent Harddisk Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2162",
  pages =        "273--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:06 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2162.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2162/21620273.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2162/21620273.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Praca:2001:SCS,
  author =       "Denis Praca and Claude Barral",
  title =        "From smart cards to smart objects: the road to new
                 smart technologies",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "36",
  number =       "4",
  pages =        "381--389",
  day =          "16",
  month =        jul,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Wed Jul 25 16:48:14 MDT 2001",
  bibsource =    "http://www.elsevier.com/locate/issn/13891286;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.nl/gej-ng/10/15/22/61/28/26/abstract.html;
                 http://www.elsevier.nl/gej-ng/10/15/22/61/28/26/article.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Preneel:2001:NES,
  author =       "Bart Preneel",
  title =        "{New European Schemes for Signature, Integrity and
                 Encryption (NESSIE)}: a Status Report",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2274",
  pages =        "297--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:07 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2274.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2274/22740297.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2274/22740297.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
  keywords =     "NESSIE (New European Schemes for Signature, Integrity
                 and Encryption)",
}

@InProceedings{Provos:2001:DAS,
  author =       "Niels Provos",
  title =        "Defending Against Statistical Steganalysis",
  crossref =     "USENIX:2001:PTU",
  pages =        "??--??",
  year =         "2001",
  bibdate =      "Tue Oct 15 16:52:27 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/sec01/provos.html",
  acknowledgement = ack-nhfb,
}

@Article{Pucheral:2001:PSD,
  author =       "Philippe Pucheral and Luc Bouganim and Patrick
                 Valduriez and Christophe Bobineau",
  title =        "{PicoDBMS}: {Scaling} down database techniques for the
                 smartcard",
  journal =      j-VLDB-J,
  volume =       "10",
  number =       "2--3",
  pages =        "120--132",
  month =        sep,
  year =         "2001",
  CODEN =        "VLDBFR",
  DOI =          "https://doi.org/10.1007/s007780100047",
  ISSN =         "1066-8888 (print), 0949-877X (electronic)",
  ISSN-L =       "1066-8888",
  bibdate =      "Mon Jun 23 10:50:58 MDT 2008",
  bibsource =    "http://link.springer.de/link/service/journals/00778/tocs/t1010002.htm;
                 http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/journals/00778/bibs/1010002/10100120.htm;
                 http://link.springer.de/link/service/journals/00778/papers/1010002/10100120.pdf",
  abstract =     "Smartcards are the most secure portable computing
                 device today. They have been used successfully in
                 applications involving money, and proprietary and
                 personal data (such as banking, healthcare, insurance,
                 etc.). As smartcards get more powerful (with 32-bit CPU
                 and more than 1 MB of stable memory in the next
                 versions) and become multi-application, the need for
                 database management arises. However, smartcards have
                 severe hardware limitations (very slow write, very
                 little RAM, constrained stable memory, no autonomy,
                 etc.) which make traditional database technology
                 irrelevant. The major problem is scaling down database
                 techniques so they perform well under these
                 limitations. In this paper, we give an in-depth
                 analysis of this problem and propose a PicoDBMS
                 solution based on highly compact data structures, query
                 execution without RAM, and specific techniques for
                 atomicity and durability. We show the effectiveness of
                 our techniques through performance evaluation.",
  acknowledgement = ack-nhfb,
  fjournal =     "VLDB Journal: Very Large Data Bases",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J869",
  keywords =     "atomicity; durability; execution model; PicoDBMS;
                 query optimization; smartcard applications; storage
                 model",
}

@Article{Qu:2001:KPW,
  author =       "Gang Qu",
  title =        "Keyless Public Watermarking for Intellectual Property
                 Authentication",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2137",
  pages =        "96--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:39 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2137.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2137/21370096.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2137/21370096.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Quisquater:2001:EAE,
  author =       "Jean-Jacques Quisquater and David Samyde",
  title =        "{ElectroMagnetic} Analysis {(EMA)}: Measures and
                 Counter-Measures for Smart Cards",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2140",
  pages =        "200--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2140.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2140/21400200.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2140/21400200.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ramesh:2001:TAE,
  author =       "D. Ramesh",
  title =        "A Twin Algorithm for Efficient Generation of Digital
                 Signatures",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2247",
  pages =        "267--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:31 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2247.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2247/22470267.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2247/22470267.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Rand:2001:MRD,
  author =       "{Rand Corporation}",
  title =        "A Million Random Digits With 100,000 Normal Deviates",
  publisher =    "Rand Corporation",
  address =      "Santa Monica, CA, USA",
  pages =        "xxv + 400 + 200",
  year =         "2001",
  ISBN =         "0-8330-3047-7",
  ISBN-13 =      "978-0-8330-3047-4",
  LCCN =         "QA276.25 .M55 2001",
  bibdate =      "Sat Aug 23 07:58:03 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See also \cite{Rand:1955:MRD}.",
  acknowledgement = ack-nhfb,
}

@Article{Reeds:2001:BRB,
  author =       "Jim Reeds",
  title =        "Book Review: {{\booktitle{The Code Book: the Evolution
                 of Secrecy from Mary Queen Of Scots to Quantum
                 Cryptography}}, by Simon Singh. Anchor Books}",
  journal =      j-SIGACT,
  volume =       "32",
  number =       "2",
  pages =        "6--11",
  month =        jun,
  year =         "2001",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/504192.1005763",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 18:30:24 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See \cite{Singh:1999:CBE}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Rescorla:2001:IOPa,
  author =       "Eric Rescorla",
  title =        "An Introduction to {OpenSSL} Programming, {Part I} of
                 {II}",
  journal =      j-LINUX-J,
  volume =       "89",
  pages =        "74, 76--78, 80, 82--83",
  month =        sep,
  year =         "2001",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Thu Aug 30 06:06:53 MDT 2001",
  bibsource =    "http://noframes.linuxjournal.com/lj-issues/issue89/index.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Filling in the gaps of the OpenSSL manual pages.",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Rescorla:2001:IOPb,
  author =       "Eric Rescorla",
  title =        "An Introduction to {OpenSSL} Programming, {Part II} of
                 {II}",
  journal =      j-LINUX-J,
  volume =       "92",
  pages =        "??--??",
  month =        dec,
  year =         "2001",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Fri Feb 8 14:44:29 MST 2002",
  bibsource =    "http://noframes.linuxjournal.com/lj-issues/issue92/index.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Web only.",
  URL =          "http://www.linuxjournal.com/article.php?sid=5487",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Misc{Reynard:2001:SCB,
  author =       "Robert Reynard",
  title =        "Secret Code Breaker Online",
  howpublished = "World-Wide Web document",
  month =        sep,
  year =         "2001",
  bibdate =      "Thu Jan 17 10:49:32 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://codebreaker.dids.com/",
  acknowledgement = ack-nhfb,
}

@Misc{Rijmen:2001:WHF,
  author =       "Vincent Rijmen and Paulo S. L. M. Barreto",
  title =        "The {WHIRLPOOL} Hash Function",
  howpublished = "World-Wide Web document",
  year =         "2001",
  bibdate =      "Tue Jul 26 18:45:41 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://paginas.terra.com.br/informatica/paulobarreto/WhirlpoolPage.html;
                 http://planeta.terra.com.br/informatica/paulobarreto/whirlpool.zip",
  abstract =     "WHIRLPOOL is a hash function designed by Vincent
                 Rijmen and Paulo S. L. M. Barreto that operates on
                 messages less than 2256 bits in length, and produces a
                 message digest of 512 bits.\par

                 WHIRLPOOL has been selected for the NESSIE portfolio of
                 cryptographic primitives. The International
                 Organization for Standardization (ISO) has decided to
                 include the final version of WHIRLPOOL in the revised
                 ISO/IEC 10118-3:2003(E) standard.",
  acknowledgement = ack-nhfb,
  keywords =     "NESSIE (New European Schemes for Signature, Integrity
                 and Encryption)",
}

@Article{Rivest:2001:HLS,
  author =       "Ronald L. Rivest and Adi Shamir and Yael Tauman",
  title =        "How to Leak a Secret",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2248",
  pages =        "552--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2248.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2248/22480552.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2248/22480552.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Romao:2001:SMA,
  author =       "Artur Rom{\~a}o and Miguel Mira da Silva",
  title =        "Secure Mobile Agent Digital Signatures with Proxy
                 Certificates",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2033",
  pages =        "206--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:50 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2033.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2033/20330206.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2033/20330206.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Romer:2001:ILA,
  author =       "Tanja R{\"o}mer and Jean-Pierre Seifert",
  title =        "Information Leakage Attacks against Smart Card
                 Implementations of the Elliptic Curve Digital Signature
                 Algorithm",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2140",
  pages =        "211--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2140.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2140/21400211.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2140/21400211.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Roth:2001:EJA,
  author =       "Volker Roth and Vania Conan",
  title =        "Encrypting {Java} Archives and Its Application to
                 Mobile Agent Security",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1991",
  pages =        "229--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:10 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1991.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1991/19910229.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1991/19910229.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Roth:2001:RSC,
  author =       "Volker Roth",
  title =        "On the Robustness of Some Cryptographic Protocols for
                 Mobile Agent Protection",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2240",
  pages =        "1--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:25 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2240.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2240/22400001.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2240/22400001.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Manual{RSA:2001:PVC,
  author =       "{RSA Laboratories}",
  title =        "{PKCS \#11 v2.11}: Cryptographic Token Interface
                 Standard",
  organization = pub-RSA,
  address =      pub-RSA:adr,
  pages =        "374",
  day =          "1",
  month =        nov,
  year =         "2001",
  bibdate =      "Mon Dec 08 08:20:23 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.rsasecurity.com/rsalabs/pkcs/pkcs-11/index.html",
  acknowledgement = ack-nhfb,
}

@Article{Rubin:2001:SCR,
  author =       "Avi Rubin",
  title =        "Security Considerations for Remote Electronic Voting
                 Over the {Internet}",
  journal =      j-LOGIN,
  volume =       "26",
  number =       "1",
  pages =        "??--??",
  month =        feb,
  year =         "2001",
  CODEN =        "LOGNEM",
  ISSN =         "1044-6397",
  bibdate =      "Tue Apr 11 10:45:51 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.usenix.org/publications/login/2001-02/index.html",
  URL =          "http://www.usenix.org/publications/login/2001-02/pdfs/rubin.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     ";login: the USENIX Association newsletter",
}

@Article{Rudra:2001:ERE,
  author =       "A. Rudra and P. K. Dubey and C. S. Jutla and V. Kumar
                 and J. R. Rao and P. Rohatgi",
  title =        "Efficient {Rijndael} Encryption Implementation with
                 Composite Field Arithmetic",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2162",
  pages =        "171--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:06 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2162.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2162/21620171.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2162/21620171.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ruiz:2001:SPS,
  author =       "Antonio Ruiz and Gregorio Mart{\'\i}nez and Oscar
                 C{\'a}novas and Antonio F. G{\'o}mez",
  title =        "{SPEED} Protocol: Smartcard-Based Payment with
                 Encrypted Electronic Delivery",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2200",
  pages =        "446--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:44 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2200.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2200/22000446.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2200/22000446.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Manual{Rukhin:2001:STS,
  author =       "Andrew Rukhin and Juan Soto and James Nechvatal and
                 Miles Smid and Elaine Barker and Stefan Leigh and Mark
                 Levenson and Mark Vangel and David Banks and Alan
                 Heckert and James Dray and San Vo",
  title =        "A Statistical Test Suite For Random and Pseudorandom
                 Number Generators for Cryptographic Applications",
  organization = pub-NIST,
  address =      pub-NIST:adr,
  pages =        "xi + 153",
  month =        apr,
  year =         "2001",
  bibdate =      "Tue Apr 19 15:40:44 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "NIST Special Publication 800-22, with revisions dated
                 May 15, 2001.",
  URL =          "http://csrc.nist.gov/rng/rng2.html;
                 http://csrc.nist.gov/rng/SP800-22b.pdf;
                 http://csrc.nist.gov/rng/sts-1.5.tar;
                 http://csrc.nist.gov/rng/sts.data.tar;
                 http://csrc.nist.gov/rng/StsGui.zip;
                 http://www.cs.sunysb.edu/~algorith/implement/rng/distrib/SP800-22b.pdf",
  abstract =     "This paper discusses some aspects of selecting and
                 testing random and pseudorandom number generators. The
                 outputs of such generators may be used in many
                 cryptographic applications, such as the generation of
                 key material. Generators suitable for use in
                 cryptographic applications may need to meet stronger
                 requirements than for other applications. In
                 particular, their outputs must be unpredictable in the
                 absence of knowledge of the inputs. Some criteria for
                 characterizing and selecting appropriate generators are
                 discussed in this document. The subject of statistical
                 testing and its relation to cryptanalysis is also
                 discussed, and some recommended statistical tests are
                 provided. These tests may be useful as a first step in
                 determining whether or not a generator is suitable for
                 a particular cryptographic application. However, no set
                 of statistical tests can absolutely certify a generator
                 as appropriate for usage in a particular application,
                 i.e., statistical testing cannot serve as a substitute
                 for cryptanalysis. The design and cryptanalysis of
                 generators is outside the scope of this paper.",
  acknowledgement = ack-nhfb,
  keywords =     "hypothesis test; P-value; random number generator",
}

@Article{Safavi-Naini:2001:BAG,
  author =       "Rei Safavi-Naini and Huaxiong Wang",
  title =        "Broadcast authentication for group communication",
  journal =      j-THEOR-COMP-SCI,
  volume =       "269",
  number =       "1--2",
  pages =        "1--21",
  day =          "28",
  month =        oct,
  year =         "2001",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Nov 19 08:33:27 MST 2001",
  bibsource =    "http://www.elsevier.com/locate/issn/03043975;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.nl/gej-ng/10/41/16/219/27/27/abstract.html;
                 http://www.elsevier.nl/gej-ng/10/41/16/219/27/27/article.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Safavi-Naini:2001:LAC,
  author =       "R. Safavi-Naini and H. Wang and C. Xing",
  title =        "Linear Authentication Codes: Bounds and
                 Constructions",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2247",
  pages =        "127--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:31 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2247.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2247/22470127.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2247/22470127.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Sakamura:2001:GEI,
  author =       "Ken Sakamura",
  title =        "Guest Editor's Introduction: Radio Frequency
                 Identification and Noncontact Smart Cards",
  journal =      j-IEEE-MICRO,
  volume =       "21",
  number =       "6",
  pages =        "4--6",
  month =        nov # "\slash " # dec,
  year =         "2001",
  CODEN =        "IEMIDZ",
  DOI =          "https://doi.org/10.1109/MM.2001.977752",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Thu Jan 31 18:42:02 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/mi/books/mi2001/m6004abs.htm;
                 http://dlib.computer.org/mi/books/mi2001/pdf/m6004.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Micro",
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
}

@Article{Sakurai:2001:NSS,
  author =       "Kouichi Sakurai and Tsuyoshi Takagi",
  title =        "New Semantically Secure Public-Key Cryptosystems from
                 the {RSA}-Primitive",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2274",
  pages =        "1--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:07 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2274.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2274/22740001.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2274/22740001.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@TechReport{Sale:2001:GRT,
  author =       "Tony Sale",
  title =        "General Report on {Tunny}: The {Newmanry} History",
  month =        mar,
  year =         "2001",
  bibdate =      "Wed Apr 20 12:11:10 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.codesandciphers.org.uk/documents/newman/newman.pdf",
  acknowledgement = ack-nhfb,
  remark =       "The original report was written by Donald Michie, Jack
                 Good and other members of the Newmanry, after the end
                 of World War II and has only recently been
                 declassified.",
}

@Misc{Salus:2001:CA,
  author =       "Peter Salus",
  title =        "2001: a Communications Anniversary",
  year =         "2001",
  bibdate =      "Tue Oct 15 15:38:06 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Unpublished invited talk, LISA 2001: 15th Systems
                 Administration Conference, December 2--7, 2001, Town
                 and Country Resort Hotel, San Diego, CA.",
  URL =          "http://db.usenix.org/publications/library/proceedings/lisa2001/tech/",
  abstract =     "We are at the end of a year that provided a flood of
                 important anniversaries important to LISA attendees.
                 Peter will discuss the anniversaries and the
                 significance of this confluence. Among
                 them:\\par

                 \begin{itemize} \item 1676: Leibnitz's mechanical
                 calculator \\
                 \item 1876: Bell's telephone \\
                 \item 1901: Marconi's trans-Atlantic message \\
                 \item 1951: The junction transistor \\
                 \item 1951: UNIVAC, first commercial computer \\
                 \item 1976: John Lions and students install UNIX \\
                 \item 1976: 63 hosts on the ARPAnet \\
                 \item 1991: Phil Zimmerman posts PGP \\
                 \item 1991: Tim Berners-Lee posts what we now call www
                 \\
                 \item 1991: Linus Torvalds posts Linux .01
                 \end{itemize}\par

                 What a ride!",
  acknowledgement = ack-nhfb,
}

@Article{Samarati:2001:AMP,
  author =       "Pierangela Samarati and Michael K. Reiter and Sushil
                 Jajodia",
  title =        "An authorization model for a public key management
                 service",
  journal =      j-TISSEC,
  volume =       "4",
  number =       "4",
  pages =        "453--482",
  month =        nov,
  year =         "2001",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Mon Feb 25 16:47:23 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Samid:2001:ESR,
  author =       "Gideon Samid",
  title =        "Encryption Sticks (Randomats)",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2229",
  pages =        "150--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:15 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2229.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2229/22290150.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2229/22290150.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Sanchez-Reillo:2001:IBA,
  author =       "Raul Sanchez-Reillo",
  title =        "Including Biometric Authentication in a Smart Card
                 Operating System",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2091",
  pages =        "342--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:50 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2091.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2091/20910342.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2091/20910342.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Sanchez:2001:RNM,
  author =       "David S{\'a}nchez and Agust{\'\i}n Orfila and Julio
                 C{\'e}sar Hern{\'a}ndez and Jos{\'e} Mar{\'\i}a
                 Sierra",
  title =        "Robust New Method in Frequency Domain Watermarking",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2200",
  pages =        "166--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:44 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2200.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2200/22000166.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2200/22000166.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Sarkar:2001:EIL,
  author =       "P. Sarkar and S. Maitra",
  title =        "Efficient Implementation of ``Large'' Stream Cipher
                 Systems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2162",
  pages =        "319--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:06 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2162.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2162/21620319.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2162/21620319.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Sarkar:2001:PAE,
  author =       "P. Sarkar and P. J. Schellenberg",
  title =        "A Parallel Algorithm for Extending Cryptographic Hash
                 Functions",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2247",
  pages =        "40--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:31 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2247.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2247/22470040.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2247/22470040.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Satoh:2001:CRH,
  author =       "Akashi Satoh and Sumio Morioka and Kohji Takano and
                 Seiji Munetoh",
  title =        "A Compact {Rijndael} Hardware Architecture with
                 {S}-Box Optimization",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2248",
  pages =        "239--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2248.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2248/22480239.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2248/22480239.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Scharinger:2001:ASK,
  author =       "Josef Scharinger",
  title =        "Application of Signed {Kolmogorov} Hashes to Provide
                 Integrity and Authenticity in {Web}-Based Software
                 Distribution",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2178",
  pages =        "257--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:08:59 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2178.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2178/21780257.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2178/21780257.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Schindler:2001:IDC,
  author =       "Werner Schindler and Fran{\c{c}}ois Koeune and
                 Jean-Jacques Quisquater",
  title =        "Improving Divide and Conquer Attacks against
                 Cryptosystems by Better Error Detection\slash
                 Correction Strategies",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2260",
  pages =        "245--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:45 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2260.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2260/22600245.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2260/22600245.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Schindler:2001:TAA,
  author =       "Werner Schindler",
  title =        "A Timing Attack against {RSA} with the {Chinese
                 Remainder Theorem}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1965",
  pages =        "109--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:57 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1965.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1965/19650109.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1965/19650109.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InCollection{Schnorr:2001:SDE,
  author =       "Claus Peter Schnorr",
  booktitle =    "Public-key cryptography and computational number
                 theory (Warsaw, 2000)",
  title =        "Security of {DL}-encryption and signatures against
                 generic attacks---a survey",
  publisher =    pub-GRUYTER,
  address =      pub-GRUYTER:adr,
  pages =        "257--282",
  year =         "2001",
  MRclass =      "94A60 (94-02)",
  MRnumber =     "1 881 640",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
}

@Article{Schnorr:2001:SGH,
  author =       "C. P. Schnorr",
  title =        "Small generic hardcore subsets for the discrete
                 logarithm: {Short} secret {DL}-keys",
  journal =      j-INFO-PROC-LETT,
  volume =       "79",
  number =       "2",
  pages =        "93--98",
  day =          "30",
  month =        jun,
  year =         "2001",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Jul 25 16:11:35 MDT 2001",
  bibsource =    "http://www.elsevier.com:80/inca/publications/store/5/0/5/6/1/2/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2000.bib",
  URL =          "http://www.elsevier.nl/gej-ng/10/23/20/80/31/31/abstract.html;
                 http://www.elsevier.nl/gej-ng/10/23/20/80/31/31/article.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@TechReport{Screamer:2001:MDR,
  author =       "Beale Screamer",
  title =        "{Microsoft}'s Digital Rights Management Scheme ---
                 Technical Details",
  type =         "Report",
  institution =  "Microsoft Corporation",
  address =      "Redmond, WA, USA",
  day =          "20",
  month =        oct,
  year =         "2001",
  bibdate =      "Thu Sep 22 18:58:17 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://cryptome.org/ms-drm.htm",
  acknowledgement = ack-nhfb,
  remark =       "The author name appears to be pseudonym: it appears in
                 quotes in the document.",
}

@Article{Sebe:2001:OIW,
  author =       "Francesc Seb{\'e} and Josep Domingo-Ferrer",
  title =        "Oblivious Image Watermarking Robust against Scaling
                 and Geometric Distortions",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2200",
  pages =        "420--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:44 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2200.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2200/22000420.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2200/22000420.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Seki:2001:DCR,
  author =       "Haruki Seki and Toshinobu Kaneko",
  booktitle =    "Selected areas in cryptography (Waterloo, ON, 2000)",
  title =        "Differential cryptanalysis of reduced rounds of
                 {GOST}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2012",
  pages =        "315--323",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "1 895 600",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Seo:2001:CDA,
  author =       "Jin S. Seo and Chang D. Yoo",
  title =        "Correlation Detection of Asymmetric Watermark",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2195",
  pages =        "638--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2195.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2195/21950638.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2195/21950638.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Shacham:2001:ISH,
  author =       "Hovav Shacham and Dan Boneh",
  title =        "Improving {SSL} Handshake Performance via Batching",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2020",
  pages =        "28--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2020.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2020/20200028.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2020/20200028.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Shailer:2001:PMT,
  author =       "David M. Shailer",
  title =        "The project manager's toolkit: practical checklists
                 for systems development",
  publisher =    pub-BUTTERWORTH-HEINEMANN,
  address =      pub-BUTTERWORTH-HEINEMANN:adr,
  pages =        "xiii + 244",
  year =         "2001",
  ISBN =         "0-7506-5035-4",
  ISBN-13 =      "978-0-7506-5035-9",
  LCCN =         "QA76.9.S88 S53 2001",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$39.95",
  acknowledgement = ack-nhfb,
}

@InProceedings{Shamir:2001:IOO,
  author =       "Adi Shamir and Yael Tauman",
  title =        "Improved Online\slash Offline Signature Schemes",
  crossref =     "Kilian:2001:ACC",
  pages =        "355--??",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390355.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390355.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Shamir:2001:NDC,
  author =       "A. Shamir",
  title =        "New Directions in Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2162",
  pages =        "159--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:06 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2162.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2162/21620159.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2162/21620159.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Shamir:2001:PSC,
  author =       "Adi Shamir",
  title =        "Protecting Smart Cards from Passive Power Analysis
                 with Detached Power Supplies",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1965",
  pages =        "71--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:57 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1965.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1965/19650071.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1965/19650071.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Shao:2001:BVM,
  author =       "Zuhua Shao",
  title =        "Batch verifying multiple {DSA}-type digital
                 signatures",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "37",
  number =       "3--4",
  pages =        "383--389",
  day =          "5",
  month =        nov,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Wed Feb 20 06:34:11 MST 2002",
  bibsource =    "http://www.elsevier.com/locate/issn/13891286;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.nl/gej-ng/10/15/22/67/34/35/abstract.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Sharp:2001:IKB,
  author =       "Toby Sharp",
  title =        "An Implementation of Key-Based Digital Signal
                 Steganography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2137",
  pages =        "13--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:39 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2137.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2137/21370013.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2137/21370013.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Shepherd:2001:CDC,
  author =       "Simon Shepherd",
  title =        "Cryptography: diffusing the confusion",
  volume =       "5",
  publisher =    "Research Studies Press",
  address =      "Philadelphia, PA, USA",
  pages =        "xiv + 152",
  year =         "2001",
  ISBN =         "0-86380-270-2",
  ISBN-13 =      "978-0-86380-270-6",
  LCCN =         "QA268.S44 2001",
  bibdate =      "Wed Feb 13 12:10:46 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "Communications systems, techniques, and applications
                 series",
  acknowledgement = ack-nhfb,
  keywords =     "coding theory; cryptography --- mathematics",
}

@Article{Shi:2001:NSF,
  author =       "Jiaoying Shi and Kaixiang Yi",
  title =        "New Semi-fragile Authentication Watermarking",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2195",
  pages =        "969--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2195.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2195/21950969.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2195/21950969.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Shoup:2001:OR,
  author =       "Victor Shoup",
  title =        "{OAEP} Reconsidered",
  crossref =     "Kilian:2001:ACC",
  pages =        "239--259",
  year =         "2001",
  bibdate =      "Sat Feb 2 13:05:41 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390239.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2139/21390239.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2001; cryptography",
}

@Article{Shparlinski:2001:UDR,
  author =       "Igor E. Shparlinski",
  title =        "On the uniformity of distribution of the {RSA} pairs",
  journal =      j-MATH-COMPUT,
  volume =       "70",
  number =       "234",
  pages =        "801--808",
  month =        apr,
  year =         "2001",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (print), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Wed Apr 18 05:10:18 MDT 2001",
  bibsource =    "http://www.ams.org/mcom/2001-70-234;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ams.org/journal-getitem?pii=S0025-5718-00-01274-6;
                 http://www.ams.org/mcom/2001-70-234/S0025-5718-00-01274-6/S0025-5718-00-01274-6.dvi;
                 http://www.ams.org/mcom/2001-70-234/S0025-5718-00-01274-6/S0025-5718-00-01274-6.pdf;
                 http://www.ams.org/mcom/2001-70-234/S0025-5718-00-01274-6/S0025-5718-00-01274-6.ps;
                 http://www.ams.org/mcom/2001-70-234/S0025-5718-00-01274-6/S0025-5718-00-01274-6.tex",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
}

@Article{Shujun:2001:PRB,
  author =       "L. Shujun and M. Xuanqin and C. Yuanlong",
  title =        "Pseudo-random Bit Generator Based on Couple Chaotic
                 Systems and Its Applications in Stream-Cipher
                 Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2247",
  pages =        "316--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:31 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2247.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2247/22470316.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2247/22470316.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Siegelin:2001:SCD,
  author =       "C. Siegelin and L. Castillo and U. Finger",
  title =        "{Smart Cards}: Distributed Computing with \$5
                 Devices",
  journal =      j-PARALLEL-PROCESS-LETT,
  volume =       "11",
  number =       "1",
  pages =        "57--??",
  month =        mar,
  year =         "2001",
  CODEN =        "PPLTEE",
  ISSN =         "0129-6264 (print), 1793-642X (electronic)",
  bibdate =      "Sat Feb 23 19:27:51 MST 2002",
  bibsource =    "http://ejournals.wspc.com.sg/ppl/ppl.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Parallel Processing Letters",
  journal-URL =  "http://www.worldscientific.com/loi/ppl",
}

@Article{Singh:2001:DPK,
  author =       "A. K. Singh",
  title =        "Deployment of Public-Key Infrastructure in Wireless
                 Data Networks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2094",
  pages =        "217--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:54 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2094.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2094/20940217.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2094/20940217.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Singh:2001:SSS,
  author =       "Simon Singh",
  title =        "The Science of Secrecy: The Secret History of Codes
                 and Codebreaking",
  publisher =    "Fourth Estate",
  address =      "London, UK",
  pages =        "xi + 224",
  year =         "2001",
  ISBN =         "1-84115-435-0",
  ISBN-13 =      "978-1-84115-435-0",
  LCCN =         "Z103 .S57 2000",
  bibdate =      "Thu Jan 29 18:07:39 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "UK\pounds 14.99",
  acknowledgement = ack-nhfb,
}

@Article{Smart:2001:CDF,
  author =       "N. P. Smart",
  title =        "A comparison of different finite fields for elliptic
                 curve cryptosystems",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "42",
  number =       "1-2",
  pages =        "91--100",
  year =         "2001",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  MRclass =      "94A60",
  MRnumber =     "2002c:94033",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Computers \& Mathematics with Applications. An
                 International Journal",
}

@Book{Smith:2001:ADB,
  editor =       "Michael Smith and Ralph Erskine",
  title =        "Action This Day: {Bletchley Park} from the breaking of
                 the {Enigma Code} to the birth of the modern computer",
  publisher =    pub-BANTAM,
  address =      pub-BANTAM:adr,
  pages =        "xv + 543",
  year =         "2001",
  ISBN =         "0-593-04910-1",
  ISBN-13 =      "978-0-593-04910-5",
  LCCN =         "D810.C88 A28 2001",
  bibdate =      "Wed Jan 16 08:17:47 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "UK\pounds 25.00",
  URL =          "http://frode.home.cern.ch/frode/crypto/ActionContents.html",
  acknowledgement = ack-nhfb,
  keywords =     "Bletchley Park (Buckinghamshire, England)--History;
                 Cryptography--Great Britain--History--20th century;
                 Electronic intelligence--Great Britain--History--20th
                 century; Government Communications Headquarters;
                 Intelligence services--Great Britain--History--20th
                 century; World War, 1939--1945--Cryptography; World
                 War, 1939--1945--Electronic intelligence--Great
                 Britain",
  xxnote =       "Check: University of California Melvyl catalog has
                 Ralph Erskine as primary author??",
}

@Book{Smith:2001:APP,
  author =       "Richard E. Smith",
  title =        "Authentication: From Passwords to Public Keys",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "549",
  year =         "2001",
  ISBN =         "0-201-61599-1",
  ISBN-13 =      "978-0-201-61599-9",
  LCCN =         "QA76.9.A25 S65 2002",
  bibdate =      "Tue Apr 30 05:08:54 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$44.99",
  acknowledgement = ack-nhfb,
}

@Book{Smith:2001:ECB,
  author =       "Michael Smith",
  title =        "The {Emperor}'s Codes: {Bletchley Park} and the
                 breaking of {Japan}'s secret ciphers",
  publisher =    pub-BANTAM,
  address =      pub-BANTAM:adr,
  pages =        "410 + 14",
  year =         "2001",
  ISBN =         "0-553-81320-X (paperback)",
  ISBN-13 =      "978-0-553-81320-3 (paperback)",
  LCCN =         "????",
  bibdate =      "Wed Jan 16 09:07:49 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "UK\pounds 7.99",
  acknowledgement = ack-nhfb,
}

@Article{Smith:2001:IK,
  author =       "David Smith",
  title =        "Implementing {Kerberos}",
  journal =      j-SYS-ADMIN,
  volume =       "10",
  number =       "12",
  pages =        "28, 30, 32, 34--38",
  month =        dec,
  year =         "2001",
  CODEN =        "SYADE7",
  ISSN =         "1061-2688",
  bibdate =      "Fri Feb 08 11:17:41 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Smith describes how to implement Kerberos on multiple
                 operating systems and discusses use of Kerberized
                 applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "Sys admin: the journal for UNIX system
                 administrators",
}

@Article{Song:2001:ANL,
  author =       "Zhimin Song and Sihan Qing",
  title =        "Applying {NCP} Logic to the Analysis of {SSL 3.0}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2229",
  pages =        "155--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:15 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2229.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2229/22290155.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2229/22290155.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Song:2001:DWF,
  author =       "Y. J. Song and R. Z. Liu and T. N. Tan",
  title =        "Digital Watermarking for Forgery Detection in Printed
                 Materials",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2195",
  pages =        "403--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2195.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2195/21950403.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2195/21950403.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Speed:2001:PIS,
  author =       "Timothy Speed and Juanita Ellis and Steffano Korper",
  title =        "The Personal {Internet} Security Guidebook: Keeping
                 Hackers and Crackers out of Your Home",
  publisher =    pub-ACADEMIC,
  address =      pub-ACADEMIC:adr,
  pages =        "xxiv + 202",
  year =         "2001",
  ISBN =         "0-12-656561-9",
  ISBN-13 =      "978-0-12-656561-4",
  LCCN =         "????",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$44.95",
  acknowledgement = ack-nhfb,
}

@Article{Steiner:2001:SPB,
  author =       "Michael Steiner and Peter Buhler and Thomas Eirich and
                 Michael Waidner",
  title =        "Secure Password-Based Cipher Suite for {TLS}",
  journal =      j-TISSEC,
  volume =       "4",
  number =       "2",
  pages =        "134--157",
  month =        may,
  year =         "2001",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Mon Feb 25 16:47:22 MST 2002",
  bibsource =    "http://www.acm.org/tissec/contents/v4no2.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Steinfeld:2001:ALE,
  author =       "Ron Steinfeld and Yuliang Zheng",
  title =        "An Advantage of Low-Exponent {RSA} with Modulus Primes
                 Sharing Least Significant Bits",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2020",
  pages =        "52--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2020.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2020/20200052.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2020/20200052.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Steinwandt:2001:LTP,
  author =       "Rainer Steinwandt",
  booktitle =    "Public key cryptography (Cheju Island, 2001)",
  title =        "Loopholes in Two Public Key Cryptosystems Using the
                 Modular Group",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1992",
  pages =        "180--189",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "1 898 034",
  bibdate =      "Sat Feb 2 13:03:11 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1992.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1992/19920180.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1992/19920180.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Steinwandt:2001:TDB,
  author =       "Rainer Steinwandt and Willi Geiselmann and Thomas
                 Beth",
  title =        "A Theoretical {DPA}-Based Cryptanalysis of the
                 {NESSIE} Candidates {FLASH} and {SFLASH}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2200",
  pages =        "280--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:44 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2200.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2200/22000280.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2200/22000280.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
  keywords =     "NESSIE (New European Schemes for Signature, Integrity
                 and Encryption)",
}

@Article{Stern:2001:ADW,
  author =       "Julien P. Stern and Jean-Pierre Tillich",
  title =        "Automatic Detection of a Watermarked Document Using a
                 Private Key",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2137",
  pages =        "258--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:39 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2137.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2137/21370258.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2137/21370258.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Stinson:2001:C,
  author =       "Douglas R. Stinson",
  title =        "Cryptography",
  publisher =    pub-CRC,
  address =      pub-CRC:adr,
  edition =      "Second",
  pages =        "512 (est)",
  year =         "2001",
  ISBN =         "1-58488-206-9",
  ISBN-13 =      "978-1-58488-206-0",
  LCCN =         "QA268 .S75 2002",
  bibdate =      "Thu Jan 17 10:35:41 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "UK\pounds 49.99",
  acknowledgement = ack-nhfb,
}

@Article{Stojanovski:2001:CBRa,
  author =       "T. Stojanovski and L. Kocarev",
  title =        "Chaos-based random number generators-part {I}:
                 analysis [cryptography]",
  journal =      j-IEEE-TRANS-CIRCUITS-SYST-I-FUNDAM-THEORY-APPL,
  volume =       "48",
  number =       "3",
  pages =        "281--288",
  month =        mar,
  year =         "2001",
  CODEN =        "ITCAEX",
  DOI =          "https://doi.org/10.1109/81.915385",
  ISSN =         "1057-7122 (print), 1558-1268 (electronic)",
  ISSN-L =       "1057-7122",
  bibdate =      "Thu Feb 23 09:01:20 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Circuits and Systems I:
                 Fundamental Theory and Application",
}

@PhdThesis{Stone:2001:CI,
  author =       "Jonathan Richard Stone",
  title =        "Checksums and the {Internet}",
  type =         "{Ph.D.} dissertation",
  school =       "Department of Computer Science, Stanford University",
  address =      "Stanford, CA, USA",
  pages =        "228",
  month =        "",
  year =         "2001",
  ISBN =         "0-493-40464-3",
  ISBN-13 =      "978-0-493-40464-6",
  bibdate =      "Sat Oct 21 09:07:20 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://wwwlib.umi.com/dissertations/fullcit/3028177",
  abstract =     "This dissertation examines errors above the link layer
                 in data communications networks. Specifically we study
                 the network and transport layers of the Internet
                 protocol suite. The focus of our study is
                 error-detecting codes (EDCs), such as checksums and
                 cyclic redundancy checks (CRCs); how often those EDCs
                 are called upon to detect errors, and how well they
                 perform that task. As a framework for the empirical
                 work in the thesis, we develop a formal description of
                 how to compare and rank different EDCs. We show that
                 currently deployed EDCs (the 16-bit TCP checksum, and
                 the alternate Fletcher checksum) should come close to
                 the ideal of 1 in $ 2^{16} $ undetected errors. We
                 present herein a set of simulation studies for existing
                 EDCs which show that in practice these EDCs do not
                 approach the expected ideal results. Our analysis shows
                 that the cause is self-correlation of the input data.
                 In this case, relocating the checksum value to the end
                 of the packet gives a significant improvement. Errors
                 captured from live networks are also examined. We
                 present a new method for capturing both damaged packets
                 from real-life networks and subsequent retransmissions
                 of the damaged packets. This method meets privacy and
                 confidentiality constraints on interception of
                 real-life user data. A significant body of errors was
                 captured at four representative sites. This data is
                 described, summarized, and analyzed. Comparison of the
                 damaged packets and the undamaged retransmissions
                 yields information on the kinds and causes of errors
                 which occur above the link layer. Our data provides
                 strong evidence that errors above the link-layer are
                 due to a variety of causes, which include bad memory in
                 intermediate routers, and bugs in end-host hardware or
                 software which are outside the protection of link-level
                 error checks. For the real-life captured errors, we
                 find CRCs are little or no better than additive
                 checksums of the same size. Our data shows that the
                 datapath between packet buffers and on-NIC CRC hardware
                 is a significant source of errors. We conclude that
                 reliable data communication should use end-to-end error
                 checks. Strongly reliable communication should use an
                 application-level end-to-end check that also covers the
                 packet-buffer-to-NIC datapath.",
  acknowledgement = ack-nhfb,
  remark =       "See also \cite{Stone:1998:PCC} and Internet RFC3309
                 (September 2002), ``Stream Control Transmission
                 Protocol (SCTP) Checksum Change'', based on this
                 work.",
}

@Article{Struif:2001:UBU,
  author =       "Bruno Struif",
  title =        "Use of Biometrics for User Verification in Electronic
                 Signature Smartcards",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2140",
  pages =        "220--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2140.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2140/21400220.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2140/21400220.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Strunk:2001:JQJ,
  author =       "Elisabeth Strunk",
  title =        "{Java Q\&A}: {Java} \& {NT} Authentication",
  journal =      j-DDJ,
  volume =       "26",
  number =       "2",
  pages =        "145--146, 148",
  month =        feb,
  year =         "2001",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Feb 15 12:14:41 MST 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/ftp/2001/2001_02/jqa0201.txt",
  abstract =     "Elisabeth builds a JNI wrapper that lets the Java
                 Authentication and Authorization Service and Windows NT
                 authenticate specific users. Additional resources
                 include jqa0201.txt (listings).",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Stubblebine:2001:AAF,
  author =       "Stuart G. Stubblebine and Paul F. Syverson",
  title =        "Authentic Attributes with Fine-Grained Anonymity
                 Protection",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1962",
  pages =        "276--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:55 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1962.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1962/19620276.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1962/19620276.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Sugihara:2001:PCD,
  author =       "Ryo Sugihara",
  title =        "Practical Capacity of Digital Watermarks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2137",
  pages =        "316--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:39 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2137.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2137/21370316.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2137/21370316.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Sugita:2001:SRV,
  author =       "Makoto Sugita and Kazukuni Kobara and Hideki Imai",
  title =        "Security of Reduced Version of the Block Cipher
                 {Camellia} against Truncated and Impossible
                 Differential Cryptanalysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2248",
  pages =        "193--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2248.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2248/22480193.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2248/22480193.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Swaine:2001:PPSa,
  author =       "Michael Swaine",
  title =        "Programming Paradigms: Secrets and Lies",
  journal =      j-DDJ,
  volume =       "26",
  number =       "4",
  pages =        "125--127",
  month =        apr,
  year =         "2001",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Tue Mar 13 15:22:36 MST 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/",
  abstract =     "Everyone has a secret, but ``Who can you believe?''
                 asks our resident cynic.",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Syverson:2001:LAP,
  author =       "Paul Syverson and Iliano Cervesato",
  title =        "The Logic of Authentication Protocols",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2171",
  pages =        "63--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:15 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2171.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2171/21710063.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2171/21710063.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Tabatabaian:2001:NSP,
  author =       "Seyed J. Tabatabaian and Sam Ikeshiro and Murat
                 Gumussoy and Mungal S. Dhanda",
  title =        "A New Search Pattern in Multiple Residue Method
                 {(MRM)} and Its Importance in the Cryptanalysis of the
                 {RSA}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2260",
  pages =        "378--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:45 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2260.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2260/22600378.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2260/22600378.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Tanaka:2001:QPK,
  author =       "Keisuke Tanaka and Tatsuaki Okamoto",
  title =        "Quantum public-key cryptosystems and their
                 improvement",
  journal =      "S\=urikaisekikenky\=usho K\=oky\=uroku",
  volume =       "1205",
  pages =        "53--58",
  year =         "2001",
  MRclass =      "94A62 (81P68)",
  MRnumber =     "1 854 610",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "New developments of the theory of computation and
                 algorithms (Japanese) (Kyoto, 2001)",
  fjournal =     "S\=urikaisekikenky\=usho K\=oky\=uroku",
}

@MastersThesis{Tang:2001:AES,
  author =       "Ye Tang",
  title =        "The advanced encryption standard mapping into
                 {MorphoSys} architecture",
  type =         "Thesis ({M.S., Electrical and Computer Engineering})",
  school =       "University of California, Irvine",
  address =      "Irvine, CA, USA",
  year =         "2001",
  LCCN =         "LD 791.8 .E38 2001 T36 SpCol Archives",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "computer algorithms; computer architecture; computer
                 security; cryptography --- data processing; data
                 encryption (computer science); dissertations, academic
                 --- University of California, Irvine --- Electrical and
                 Computer Engineering; MorphoSys (computer
                 architecture); parallel processing (electronic
                 computers); RISC microprocessors",
}

@Article{Tirkel:2001:UWE,
  author =       "Andrew Z. Tirkel and Thomas E. Hall",
  title =        "A Unique Watermark for Every Image",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "8",
  number =       "4",
  pages =        "30--37",
  month =        oct,
  year =         "2001",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/93.959098",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Sat Feb 23 11:55:59 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/mu/books/mu2001/pdf/u4030.pdf;
                 http://www.computer.org/multimedia/mu2001/u4030abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Multimedia",
}

@Article{Todd:2001:LSS,
  author =       "Andrew W. Todd and Jonathan Erickson and Nadine
                 McKenzie and Chris Cleeland and Richard Huang and Ragae
                 Ghaly and {The Editors}",
  title =        "Letters: Shared Source and Shared Secrets;
                 {JavaScript} Fix; {CORBA} Interoperability; {EJB}
                 Application Servers Update; Correction [{``The Delphi
                 XML SAX2 Component and MSXML 3.0''}]",
  journal =      j-DDJ,
  volume =       "26",
  number =       "10",
  pages =        "10, 12",
  month =        oct,
  year =         "2001",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Tue Feb 12 05:21:40 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See \cite{Heijl:2001:DXS}.",
  URL =          "http://www.ddj.com/",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Toft:2001:LTT,
  author =       "George Toft and Hugo van der Kooij and Mick Bauer and
                 Chris Hendrickson and Stephanie Black and Adrian Ho and
                 Markus Hogger and Ian Abbott and Robin Rowes",
  title =        "Letters: Tech Tipsy; Awkward Solution; {Mandrake 7.2}
                 Review; {OpenSSH} and {DSA} Keys; Missed the Tripwire;
                 {FAT} Problems",
  journal =      j-LINUX-J,
  volume =       "85",
  pages =        "6, 126",
  month =        may,
  year =         "2001",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Wed May 23 15:20:33 MDT 2001",
  bibsource =    "http://noframes.linuxjournal.com/lj-issues/issue85/index.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://noframes.linuxjournal.com/lj-issues/issue85/4646.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Tokita:2001:ADC,
  author =       "Toshio Tokita and Tsutomu Matsumoto",
  title =        "On applicability of differential cryptanalysis, linear
                 cryptanalysis and mod {$n$} cryptanalysis to an
                 encryption algorithm {M8} ({ISO9979}-20)",
  journal =      "IPSJ J.",
  volume =       "42",
  number =       "8",
  pages =        "2098--2105",
  year =         "2001",
  ISSN =         "0387-5806",
  MRclass =      "94A60",
  MRnumber =     "2002k:94029",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  fjournal =     "IPSJ Journal",
}

@Article{Torrubia:2001:CRC,
  author =       "Andres Torrubia and Francisco J. Mora and Luis Marti",
  title =        "Cryptography Regulations for E-commerce and Digital
                 Rights Management",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "8",
  pages =        "724--738",
  day =          "1",
  month =        dec,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801008148",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Trichina:2001:SCH,
  author =       "Elena Trichina and Marco Bucci and Domenico {De Seta}
                 and Raimondo Luzzi",
  title =        "Supplemental Cryptographic Hardware for Smart Cards",
  journal =      j-IEEE-MICRO,
  volume =       "21",
  number =       "6",
  pages =        "26--35",
  month =        nov # "\slash " # dec,
  year =         "2001",
  CODEN =        "IEMIDZ",
  DOI =          "https://doi.org/10.1109/40.977755",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Thu Jan 31 18:42:02 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/mi/books/mi2001/m6026abs.htm;
                 http://dlib.computer.org/mi/books/mi2001/pdf/m6026.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Micro",
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
}

@Article{Trimberger:2001:GED,
  author =       "Steve Trimberger and Raymond Pang and Amit Singh",
  title =        "A {12 Gbps DES} Encryptor\slash Decryptor Core in an
                 {FPGA}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1965",
  pages =        "156--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:57 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1965.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1965/19650156.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1965/19650156.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Tsai:2001:GSI,
  author =       "Chwei-Shyong Tsai and Chin-Chen Chang",
  title =        "A Generalized Secret Image Sharing and Recovery
                 Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2195",
  pages =        "963--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2195.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2195/21950963.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2195/21950963.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Tsaur:2001:FUA,
  author =       "W.-J. Tsaur",
  title =        "A Flexible User Authentication Scheme for Multi-server
                 {Internet} Services",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2093",
  pages =        "174--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:52 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2093.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2093/20930174.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2093/20930174.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Tseng:2001:CLB,
  author =       "Yuh-Min Tseng and Jinn-Ke Jan",
  title =        "Cryptanalysis of {Liaw}'s broadcasting cryptosystem",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "41",
  number =       "12",
  pages =        "1575--1578",
  year =         "2001",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  MRclass =      "94A60",
  MRnumber =     "2002e:94102",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Computers \& Mathematics with Applications. An
                 International Journal",
}

@Article{Tseng:2001:GGO,
  author =       "Y.-M. Tseng and J.-K. Jan",
  title =        "Generalized group-oriented cryptosystem with
                 authenticated sender",
  journal =      j-INT-J-COMPUT-SYST-SCI-ENG,
  volume =       "16",
  number =       "5",
  pages =        "??--??",
  month =        sep,
  year =         "2001",
  CODEN =        "CSSEEI",
  ISSN =         "0267-6192",
  bibdate =      "Sat Jan 03 19:15:31 2004",
  bibsource =    "http://www.crlpublishing.co.uk/cssecont00.htm;
                 http://www.crlpublishing.co.uk/cssecont01.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Systems Science and
                 Engineering",
}

@Article{Tzeng:2001:PKT,
  author =       "Wen-Guey Tzeng and Zhi-Jia Tzeng",
  title =        "A Public-Key Traitor Tracing Scheme with Revocation
                 Using Dynamic Shares",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1992",
  pages =        "207--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:11 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1992.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1992/19920207.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1992/19920207.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Urban:2001:MWB,
  author =       "Mark Urban",
  title =        "The Man Who Broke {Napoleon}'s Codes",
  publisher =    pub-FABER-FABER,
  address =      pub-FABER-FABER:adr,
  pages =        "xiv + 333",
  year =         "2001",
  ISBN =         "0-571-20513-5",
  ISBN-13 =      "978-0-571-20513-4",
  LCCN =         "DC232.U73 2001",
  bibdate =      "Wed Jan 16 09:02:03 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "UK\pounds 16.99",
  acknowledgement = ack-nhfb,
  keywords =     "cryptographers --- Great Britain --- biography; Great
                 Britain --- history, military, --- 1789--1820; Great
                 Britain. army --- officers --- biography; Napoleonic
                 Wars, 1800--1815 --- cryptography; Peninsular War,
                 1807--1814 --- campaigns --- participation, British;
                 Scovell, George, 19th cent",
}

@Article{Urien:2001:PIS,
  author =       "Pascal Urien",
  title =        "Programming {Internet} Smartcard with {XML} Scripts",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2140",
  pages =        "228--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2140.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2140/21400228.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2140/21400228.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Urien:2001:XS,
  author =       "P. Urien and H. Saleh and A. Tizraoui",
  title =        "{XML} Smartcards",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2093",
  pages =        "811--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:52 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2093.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2093/20930811.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2093/20930811.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Manual{USPTO:2001:CCP,
  author =       "{United States Patent and Trademark Office}",
  title =        "{Class 380 --- Cryptography, Patent Classification
                 Definitions, Patent and Trademark Office, U.S. Dept. of
                 Commerce, December 1999}",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  year =         "2001",
  LCCN =         "DOC C 21.3/2:380/999 mf11 Microcopy",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Shipping List \#: 2001-0468-M. Shipping List Date:
                 08/31/2001",
  acknowledgement = ack-nhfb,
}

@InCollection{Ustimenko:2001:CGT,
  author =       "Vasyl Ustimenko",
  booktitle =    "Applied algebra, algebraic algorithms and
                 error-correcting codes (Melbourne, 2001)",
  title =        "{CRYPTIM}: Graphs as Tools for Symmetric Encryption",
  volume =       "2227",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "278--286",
  year =         "2001",
  MRclass =      "94A60 (05C90)",
  MRnumber =     "1 913 474",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2227.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  series =       "Lecture Notes in Comput. Sci.",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2227/22270278.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2227/22270278.pdf",
}

@Article{vanTilborg:2001:ECC,
  author =       "Henk van Tilborg",
  title =        "Elliptic curve cryptosystems; too good to be true?",
  journal =      "Nieuw Arch. Wiskd. (5)",
  volume =       "2",
  number =       "3",
  pages =        "220--225",
  year =         "2001",
  ISSN =         "0028-9825",
  MRclass =      "94A60 (94-01)",
  MRnumber =     "1 872 592",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Nieuw Archief voor Wiskunde. Vijfde Serie",
}

@Article{Vasco:2001:CPK,
  author =       "Mar{\'\i}a Isabel Gonz{\'a}lez Vasco and Rainer
                 Steinwandt",
  title =        "Clouds over a public key cryptosystem based on
                 {Lyndon} words",
  journal =      j-INFO-PROC-LETT,
  volume =       "80",
  number =       "5",
  pages =        "239--242",
  day =          "15",
  month =        dec,
  year =         "2001",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Feb 25 15:36:49 MST 2002",
  bibsource =    "http://www.elsevier.com:80/inca/publications/store/5/0/5/6/1/2/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.com/gej-ng/10/23/20/84/36/30/abstract.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Vaudenay:2001:DID,
  author =       "Serge Vaudenay",
  title =        "Decorrelation over Infinite Domains: The Encrypted
                 {CBC--MAC} Case",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2012",
  pages =        "189--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:30 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2012.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2012/20120189.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2012/20120189.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Venkatesan:2001:GTA,
  author =       "Ramarathnam Venkatesan and Vijay Vazirani and Saurabh
                 Sinha",
  title =        "A Graph Theoretic Approach to Software Watermarking",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2137",
  pages =        "157--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:39 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2137.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2137/21370157.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2137/21370157.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Verheul:2001:EXM,
  author =       "Eric R. Verheul",
  booktitle =    "Advances in cryptology---EUROCRYPT 2001 (Innsbruck)",
  title =        "Evidence that {XTR} is more secure than supersingular
                 elliptic curve cryptosystems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2045",
  pages =        "195--210",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60 (11T71 14G50 94B27)",
  MRnumber =     "1 895 434",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Vogt:2001:USC,
  author =       "Holger Vogt and Henning Pagnia and Felix C.
                 G{\"a}rtner",
  title =        "Using Smart Cards for Fair Exchange",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2232",
  pages =        "101--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:18 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2232.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2232/22320101.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2232/22320101.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Voloshynovskiy:2001:BDA,
  author =       "Sviatoslav Voloshynovskiy and Alexander Herrigel and
                 Thierry Pun",
  title =        "Blur\slash Deblur Attack against Document Protection
                 Systems Based on Digital Watermarking",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2137",
  pages =        "330--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:39 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2137.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2137/21370330.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2137/21370330.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{vonWillich:2001:TIT,
  author =       "Manfred von Willich",
  title =        "A Technique with an Information-Theoretic Basis for
                 Protecting Secret Data from Differential Power
                 Attacks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2260",
  pages =        "44--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:45 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2260.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2260/22600044.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2260/22600044.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Walter:2001:PBM,
  author =       "Colin D. Walter",
  title =        "Precise Bounds for {Montgomery} Modular Multiplication
                 and Some Potentially Insecure {RSA} Moduli",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2271",
  pages =        "30--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:06 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2271.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2271/22710030.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2271/22710030.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wang:2001:TUR,
  author =       "Guilin Wang and Sihan Qing and Mingsheng Wang and
                 Zhanfei Zhou",
  title =        "Threshold Undeniable {RSA} Signature Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2229",
  pages =        "221--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:15 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2229.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2229/22290221.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2229/22290221.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Watanabe:2001:EAP,
  author =       "Yuji Watanabe and Goichiro Hanaoka and Hideki Imai",
  title =        "Efficient Asymmetric Public-Key Traitor Tracing
                 without Trusted Agents",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2020",
  pages =        "392--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2020.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2020/20200392.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2020/20200392.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wayman:2001:FBA,
  author =       "J. L. Wayman",
  title =        "Fundamentals of Biometric Authentication
                 Technologies",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "1",
  number =       "1",
  pages =        "93--??",
  month =        jan,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "0219-4678",
  bibdate =      "Tue Feb 26 12:00:38 MST 2002",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Weimerskirch:2001:ECC,
  author =       "Andr{\'e} Weimerskirch and Christof Paar and Sheueling
                 Chang Shantz",
  title =        "Elliptic Curve Cryptography on a Palm {OS} Device",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2119",
  pages =        "502--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:21 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2119.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2119/21190502.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2119/21190502.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Weis:2001:SYH,
  author =       "R{\"u}diger Weis and Bastiaan Bakker and Stefan
                 Lucks",
  title =        "Security on Your Hand: Secure Filesystems with a
                 ``Non-Cryptographic'' {JAVA}-Ring",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2041",
  pages =        "151--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:58 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2041.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/java2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2041/20410151.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2041/20410151.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Welschenbach:2001:CCC,
  author =       "Michael Welschenbach and David Kramer",
  title =        "Cryptography in {C} and {C++}",
  publisher =    pub-APRESS,
  address =      pub-APRESS:adr,
  edition =      "Second",
  pages =        "xix + 432",
  year =         "2001",
  ISBN =         "1-893115-95-X",
  ISBN-13 =      "978-1-893115-95-8",
  LCCN =         "QA76.73.C153 W457 2001",
  bibdate =      "Wed Jan 16 09:12:41 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "UK\pounds 35.50",
  acknowledgement = ack-nhfb,
  annote =       "Covers Rijndael, the new American encryption standard.
                 CD-ROM includes all programs presented in the book, x86
                 assembler programs, implementations of Rijndael
                 algorithm in both C and C++.",
  keywords =     "C (computer program language); data encryption
                 (computer science); public key cryptography",
}

@InProceedings{Westerlund:2001:HWK,
  author =       "Assar Westerlund and Johan Danielsson",
  title =        "{Heimdal} and {Windows 2000 Kerberos} --- How to Get
                 Them to Play Together",
  crossref =     "USENIX:2001:PFT",
  pages =        "??--??",
  year =         "2001",
  bibdate =      "Tue Oct 15 17:19:08 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/usenix01/freenix01/westerlund.html",
  acknowledgement = ack-nhfb,
}

@Article{Westfeld:2001:FSA,
  author =       "Andreas Westfeld",
  title =        "{F5} --- {A} Steganographic Algorithm",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2137",
  pages =        "289--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:39 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2137.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2137/21370289.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2137/21370289.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@TechReport{Wilcox:2001:SEH,
  author =       "Jennifer E. Wilcox",
  title =        "Solving the {Enigma}: history of the cryptanalytic
                 bombe",
  type =         "Report",
  institution =  "National Security Agency/Central Security Service.
                 Center for Cryptologic History",
  address =      "Fort George G. Meade, MD, USA",
  pages =        "52",
  month =        jan,
  year =         "2001",
  bibdate =      "Sun Dec 01 10:07:12 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Williams:2001:ICA,
  author =       "Jeannette Williams and Yolande Dickerson",
  title =        "The Invisible Cryptologists: {African--Americans},
                 {WWII} to 1956",
  publisher =    "Center for Cryptologic History, National Security
                 Agency",
  address =      "Fort Meade, MD, USA",
  pages =        "viii + 43",
  year =         "2001",
  bibdate =      "Sun Dec 31 07:02:59 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.nsa.gov/about/cryptologic-heritage/historical-figures-publications/publications/wwii/assets/files/invisible_cryptologists.pdf",
  acknowledgement = ack-nhfb,
  tableofcontents = "Foreword / v \\
                 Acknowledgments / vii \\
                 Introduction / 1 \\
                 1: Race Relations on the Home Front at the Onset of
                 WWII / 2 \\
                 2: 1939--1946: African--Americans Join the SIS / 5 \\
                 3: 1944--1946: The Commercial Code Unit / 10 \\
                 4: 1947: Changing Demographics / 15 \\
                 5: 1948--1951: The Dark Side of the Golden Age of
                 Russian Plain Text / 19 \\
                 6: 1948--1951: Wanted --- Key Punchers and Equipment
                 Operators / 24 \\
                 7: 1948: R\&D: A Different Kind of Place / 27 \\
                 8: 1951: Color Barrier Broken in Security Division / 30
                 \\
                 9: 1950--1954: Strides toward Broad Integration;
                 Breakup of the Plantation / 33 \\
                 Epilogue / 39",
}

@Article{Wilson:2001:PBA,
  author =       "Gregory V. Wilson",
  title =        "Programmer's Bookshelf: Alien Worlds",
  journal =      j-DDJ,
  volume =       "26",
  number =       "12",
  pages =        "122, 124",
  month =        dec,
  year =         "2001",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Tue Feb 12 05:21:41 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/",
  abstract =     "Greg examines a bunch of books this month, including
                 Network Programming with Perl, by Lincoln Stein; Perl
                 Debugged, by Peter Scott and Ed Wright; Beyond Contact:
                 A Guide to SETI and Communicating with Alien
                 Civilizations, by Brian McConnell; SSH, the Secure
                 Shell: The Definitive Guide, by Daniel Barrett and
                 Richard Silverman; and Hacking Exposed: Network
                 Security Secrets and Solutions, Second Edition, by Joel
                 Scambray, Stuart McClure, and George Kurtz.",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Wincelberg:2001:JQH,
  author =       "David Wincelberg",
  title =        "{Java Q\&A}: How Do You Use the {{\tt javax.crypto}}
                 Package?",
  journal =      j-DDJ,
  volume =       "26",
  number =       "4",
  pages =        "139--140",
  month =        apr,
  year =         "2001",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Tue Mar 13 15:22:36 MST 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/ftp/2001/2001_04/jqa0401.txt;
                 http://www.ddj.com/ftp/2001/2001_04/jqa0401.zip",
  abstract =     "How do you use the javax.crypto package? David shows
                 you, as he adds security to Java-based e-commerce
                 systems by encrypting/decrypting users' credit-card
                 numbers. Additional resources include jqa0401.txt
                 (listings) and jqa0401.zip (source code).",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Withers:2001:IWU,
  author =       "Alex Withers",
  title =        "Integrating {Windows 2000} and {UNIX} Using
                 {Kerberos}",
  journal =      j-SYS-ADMIN,
  volume =       "10",
  number =       "12",
  pages =        "39, 41--42, 44",
  month =        dec,
  year =         "2001",
  CODEN =        "SYADE7",
  ISSN =         "1061-2688",
  bibdate =      "Fri Feb 08 11:17:41 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Withers explains how to configure UNIX and Linux
                 machines to authenticate as clients to a Windows 2000
                 Active Directory server.",
  acknowledgement = ack-nhfb,
  fjournal =     "Sys admin: the journal for UNIX system
                 administrators",
}

@Article{Wolkerstorfer:2001:AIA,
  author =       "Johannes Wolkerstorfer and Elisabeth Oswald and Mario
                 Lamberger",
  title =        "An {ASIC} Implementation of the {AES SBoxes}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2271",
  pages =        "67--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:06 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2271.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2271/22710067.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2271/22710067.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wong:2001:EMA,
  author =       "Duncan S. Wong and Agnes H. Chan",
  title =        "Efficient and Mutually Authenticated Key Exchange for
                 Low Power Computing Devices",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2248",
  pages =        "272--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2248.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2248/22480272.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2248/22480272.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wong:2001:MCC,
  author =       "Wai-kit Wong and Lap-piu Lee and Kwok-wo Wong",
  title =        "A modified chaotic cryptographic method",
  journal =      j-COMP-PHYS-COMM,
  volume =       "138",
  number =       "3",
  pages =        "234--236",
  day =          "15",
  month =        aug,
  year =         "2001",
  CODEN =        "CPHCBZ",
  DOI =          "https://doi.org/10.1016/S0010-4655(01)00220-X",
  ISSN =         "0010-4655 (print), 1879-2944 (electronic)",
  ISSN-L =       "0010-4655",
  bibdate =      "Mon Feb 13 23:41:01 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compphyscomm2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See comment and reply
                 \cite{Alvarez:2004:KCC,Wong:2004:RCK}.",
  URL =          "http://www.sciencedirect.com/science/article/pii/S001046550100220X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Physics Communications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00104655",
}

@Article{Wright:2001:AES,
  author =       "Marie A. Wright",
  title =        "The {Advanced Encryption Standard}",
  journal =      j-NETWORK-SECURITY,
  volume =       "2001",
  number =       "10",
  pages =        "11--13",
  day =          "31",
  month =        oct,
  year =         "2001",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(01)01018-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:20 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485801010182",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Wu:2001:CDS,
  author =       "Hongjun Wu and Feng Bao and Robert H. Deng",
  booktitle =    "Public key cryptography (Cheju Island, 2001)",
  title =        "Cryptanalysis of a Digital Signature Scheme on
                 {ID}-Based Key-Sharing Infrastructures",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1992",
  pages =        "173--179",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "1 898 033",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1992.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1992/19920173.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1992/19920173.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wu:2001:CFF,
  author =       "Lisa Wu and Chris Weaver and Todd Austin",
  title =        "{CryptoManiac}: a fast flexible architecture for
                 secure communication",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "29",
  number =       "2",
  pages =        "110--119",
  month =        may,
  year =         "2001",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 09:40:50 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Wu:2001:CKA,
  author =       "T.-C. Wu and C.-C. Chang",
  title =        "Cryptographic key assignment scheme for hierarchical
                 access control",
  journal =      j-INT-J-COMPUT-SYST-SCI-ENG,
  volume =       "16",
  number =       "1",
  pages =        "??--??",
  month =        jan,
  year =         "2001",
  CODEN =        "CSSEEI",
  ISSN =         "0267-6192",
  bibdate =      "Wed Feb 20 12:01:01 2002",
  bibsource =    "http://www.crlpublishing.co.uk/cssecont01.htm;
                 https://www.math.utah.edu/pub/tex/bib/computsystscieng.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Systems Science and
                 Engineering",
}

@Article{Wu:2001:DSM,
  author =       "T.-C. Wu",
  title =        "Digital signature\slash multisignature schemes giving
                 public key verification and message recovery
                 simultaneously",
  journal =      j-INT-J-COMPUT-SYST-SCI-ENG,
  volume =       "16",
  number =       "6",
  pages =        "??--??",
  month =        nov,
  year =         "2001",
  CODEN =        "CSSEEI",
  ISSN =         "0267-6192",
  bibdate =      "Sat Jan 03 19:15:31 2004",
  bibsource =    "http://www.crlpublishing.co.uk/cssecont00.htm;
                 http://www.crlpublishing.co.uk/cssecont01.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Systems Science and
                 Engineering",
}

@Article{Wu:2001:FED,
  author =       "Chuan-Kun Wu and Vijay Varadharajan",
  title =        "Fair Exchange of Digital Signatures with Offline
                 Trusted Third Party",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2229",
  pages =        "466--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:15 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2229.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2229/22290466.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2229/22290466.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Xu:2001:CPW,
  author =       "Changsheng Xu and David Dagan Feng and Yongwei Zhu",
  title =        "Copyright Protection for {WAV}-Table Synthesis Audio
                 Using Digital Watermarking",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2195",
  pages =        "772--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:38 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2195.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2195/21950772.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2195/21950772.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Xu:2001:EIE,
  author =       "Sheng-Bo Xu and Lejla Batina",
  title =        "Efficient Implementation of Elliptic Curve
                 Cryptosystems on an {ARM7} with Hardware Accelerator",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2200",
  pages =        "266--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:44 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2200.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2200/22000266.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2200/22000266.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yamamoto:2001:PKB,
  author =       "Hideo Yamamoto and Tetsutaro Kobayashi and Masahiro
                 Morita and Ryuji Yamada",
  title =        "Public-Key-Based High-Speed Payment (Electronic Money)
                 System Using Contact-Less Smart Cards",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2140",
  pages =        "242--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2140.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2140/21400242.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2140/21400242.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yamamura:2001:EDA,
  author =       "Akihiro Yamamura and Hirokazu Ishizuka",
  title =        "Error Detection and Authentication in Quantum Key
                 Distribution",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2119",
  pages =        "260--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:21 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2119.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2119/21190260.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2119/21190260.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yang:2001:EEA,
  author =       "Jong-Phil Yang and Weon Shin and Kyung-Hyune Rhee",
  title =        "An End-to-End Authentication Protocol in Wireless
                 Application Protocol",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2119",
  pages =        "247--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:21 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2119.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2119/21190247.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2119/21190247.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ye:2001:ATD,
  author =       "Dingfeng Ye and Junhui Yang and Zongduo Dai and Haiwen
                 Ou",
  title =        "Attacks on Two Digital Signature Schemes Based on
                 Error Correcting Codes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2229",
  pages =        "84--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:15 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2229.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2229/22290084.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2229/22290084.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yin:2001:RMW,
  author =       "Kangkang Yin and Zhigeng Pan and Jiaoying Shi and
                 David Zhang",
  title =        "Robust mesh watermarking based on multiresolution
                 processing",
  journal =      j-COMPUTERS-AND-GRAPHICS,
  volume =       "25",
  number =       "3",
  pages =        "409--420",
  month =        jun,
  year =         "2001",
  CODEN =        "COGRD2",
  ISSN =         "0097-8493 (print), 1873-7684 (electronic)",
  ISSN-L =       "0097-8493",
  bibdate =      "Tue Jul 17 08:15:19 MDT 2001",
  bibsource =    "http://www.elsevier.com/locate/issn/00978493;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.nl/gej-ng/10/13/20/57/32/32/abstract.html;
                 http://www.elsevier.nl/gej-ng/10/13/20/57/32/32/article.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Graphics",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00978493",
}

@Article{Yoshiura:2001:AWB,
  author =       "Hiroshi Yoshiura and Takaaki Shigematsu and Seiichi
                 Susaki and Tsukasa Saitoh and Hisashi Toyoshima and
                 Chikako Kurita and Satoru Tezuka and Ryoichi Sasaki",
  title =        "Authenticating {Web}-Based Virtual Shops Using
                 Signature-Embedded Marks --- {A} Practical Analysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2133",
  pages =        "238--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:35 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2133.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2133/21330238.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2133/21330238.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{You:2001:GEC,
  author =       "Lin You and Yi Xian Yang and Chun Qi Zhang",
  title =        "Generalization of Elliptic Curve Digital Signature
                 Schemes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2229",
  pages =        "246--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:15 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2229.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2229/22290246.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2229/22290246.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Young:2001:BOK,
  author =       "A. Young and M. Yung",
  title =        "Bandwidth-Optimal Kleptographic Attacks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2162",
  pages =        "235--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:06:06 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2162.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2162/21620235.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2162/21620235.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Misc{Young:2001:RP,
  author =       "John Young and Deborah Natsios",
  title =        "Reversing the Panopticon",
  year =         "2001",
  bibdate =      "Tue Oct 15 16:52:27 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Unpublished invited talk, Tenth USENIX Security
                 Symposium, August 13--17, 2001, Washington, DC, USA.",
  abstract =     "Cryptome welcomes documents for publication that are
                 prohibited by governments worldwide--in particular,
                 material on cryptology; dual-use technologies; and
                 national security and intelligence open, secret, and
                 classified documents. Cartome, a newly inaugurated
                 companion site to Cryptome, is an archive of spatial
                 and geographic documents on privacy, cryptography,
                 dual-use technologies, and national security and
                 intelligence communicated by imagery systems:
                 cartography, photography, photogrammetry,
                 steganography, climatography, seismography, geography,
                 camouflage, maps, images, drawings, charts, diagrams,
                 imagery intelligence (IMINT), and their
                 reverse-panopticon and counter-deception potential.",
  acknowledgement = ack-nhfb,
}

@Article{Youssef:2001:CAF,
  author =       "A. M. Youssef",
  booktitle =    "Selected areas in cryptography (Waterloo, ON, 2000)",
  title =        "Cryptanalysis of the {``Augmented Family of
                 Cryptographic Parity Circuits''} Proposed at {ISW'97}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2012",
  pages =        "29--38",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "1 895 580",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2012.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2012/20120029.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2012/20120029.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Youssef:2001:CIM,
  author =       "A. Youssef and G. Gong",
  title =        "Cryptanalysis of {Imai} and {Matsumoto} Scheme {B}
                 Asymmetric Cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2247",
  pages =        "214--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:31 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2247.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2247/22470214.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2247/22470214.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Youssef:2001:CPK,
  author =       "Amr Youssef and Guang Gong",
  title =        "Cryptanalysis of a Public Key Cryptosystem Proposed at
                 {ACISP 2000}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2119",
  pages =        "15--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:21 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2119.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2119/21190015.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2119/21190015.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Youssef:2001:IAB,
  author =       "A. M. Youssef and G. Gong",
  title =        "On the Interpolation Attacks on Block Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1978",
  pages =        "109--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:00 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1978.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1978/19780109.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1978/19780109.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yu:2001:TCB,
  author =       "Heather Yu and Xiangyang Kong and Wayne Wolf",
  title =        "Techniques for Content-Based Graph Authentication",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "8",
  number =       "4",
  pages =        "38--45",
  month =        oct,
  year =         "2001",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/93.959101",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Sat Feb 23 11:55:59 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/mu/books/mu2001/pdf/u4038.pdf;
                 http://www.computer.org/multimedia/mu2001/u4038abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Multimedia",
}

@Article{Yue:2001:GNN,
  author =       "Tai-Wen Yue and Suchen Chiang",
  title =        "The General Neural-Network Paradigm for Visual
                 Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2084",
  pages =        "196--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:04:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2084.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2084/20840196.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2084/20840196.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zane:2001:EWD,
  author =       "Francis Zane",
  title =        "Efficient Watermark Detection and Collusion Security",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1962",
  pages =        "21--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:02:55 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1962.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1962/19620021.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1962/19620021.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zeng:2001:CHR,
  author =       "Kencheng Zeng and Chung-Huang Yang and T. R. N. Rao",
  title =        "Cryptanalysis of the {Hwang-Rao} Secret
                 Error-Correcting Code Schemes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2229",
  pages =        "419--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:15 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2229.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2229/22290419.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2229/22290419.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zenner:2001:ICS,
  author =       "Erik Zenner and Matthias Krause and Stefan Lucks",
  title =        "Improved Cryptanalysis of the Self-Shrinking
                 Generator",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2119",
  pages =        "21--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:05:21 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2119.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2119/21190021.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2119/21190021.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zhang:2001:ASE,
  author =       "Long Jun Zhang and Jun Yi Shen and Lin Zhao",
  title =        "An approach to the security of elliptic curve
                 cryptosystems",
  journal =      "Xi'an Jiaotong Daxue Xuebao",
  volume =       "35",
  number =       "10",
  pages =        "1038--1041, 1058",
  year =         "2001",
  CODEN =        "HCTPDW",
  ISSN =         "0253-987X",
  MRclass =      "94A60 (14G50)",
  MRnumber =     "2002k:94030",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Xi'an Jiaotong Daxue Xuebao. Journal of Xi'an Jiaotong
                 University",
}

@Article{Zhang:2001:CIS,
  author =       "Xian-Mo Zhang and Josef Pieprzyk",
  title =        "Cheating Immune Secret Sharing",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2229",
  pages =        "144--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:07:15 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2229.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2229/22290144.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2229/22290144.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zhang:2001:QKD,
  author =       "Yong-Sheng Zhang and Chuan-Feng Li and Guang-Can Guo",
  title =        "Quantum key distribution via quantum encryption",
  journal =      j-PHYS-REV-A,
  volume =       "64",
  number =       "2",
  pages =        "024302, 4",
  year =         "2001",
  CODEN =        "PLRAAN",
  ISSN =         "1050-2947 (print), 1094-1622, 1538-4446, 1538-4519",
  ISSN-L =       "1050-2947",
  MRclass =      "81P68 (94A62)",
  MRnumber =     "2002i:81064",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  fjournal =     "Physical Review. A. Third Series",
  journal-URL =  "http://pra.aps.org/browse",
}

@Article{Zhang:2001:SOS,
  author =       "Muxiang Zhang and Christopher Carroll and Agnes Chan",
  title =        "The Software-Oriented Stream Cipher {SSC2}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1978",
  pages =        "31--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:00 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1978.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1978/19780031.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1978/19780031.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zhang:2001:USC,
  author =       "Yuqing Zhang and Chunling Wang and Jianping Wu and
                 Xing Li",
  title =        "Using {SMV} for cryptographic protocol analysis: a
                 case study",
  journal =      j-OPER-SYS-REV,
  volume =       "35",
  number =       "2",
  pages =        "43--50",
  month =        apr,
  year =         "2001",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:42 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Zheng:2001:ISS,
  author =       "Yuliang Zheng",
  title =        "Identification, Signature and Signcryption Using High
                 Order Residues Modulo an {RSA} Composite",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "1992",
  pages =        "48--??",
  year =         "2001",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Feb 2 13:03:11 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t1992.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/1992/19920048.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/1992/19920048.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zolman:2001:SEM,
  author =       "Leor Zolman",
  title =        "An {STL} Error Message Decryptor for {Visual C++}",
  journal =      j-CCCUJ,
  volume =       "19",
  number =       "7",
  pages =        "24--??",
  month =        jul,
  year =         "2001",
  CODEN =        "CCUJEX",
  ISSN =         "1075-2838",
  bibdate =      "Tue May 14 18:09:32 MDT 2002",
  bibsource =    "http://www.cuj.com/articles/2001/0107/0107toc.htm?topic=articles;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Believe it or not, there's helpful information buried
                 in those template error messages. It just takes a
                 little Perl to dig it out.",
  acknowledgement = ack-nhfb,
  fjournal =     "C/C++ Users Journal",
}

@Article{Abe:2002:KES,
  author =       "Masayuki Abe and Masayuki Kanda",
  title =        "A Key Escrow Scheme with Time-Limited Monitoring for
                 One-way Communication",
  journal =      j-COMP-J,
  volume =       "45",
  number =       "6",
  pages =        "661--671",
  month =        "????",
  year =         "2002",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Nov 6 11:21:54 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_45/Issue_06/",
  URL =          "http://www3.oup.co.uk/computer_journal/hdb/Volume_45/Issue_06/450661.sgm.abs.html;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_45/Issue_06/pdf/450661.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Abe:2002:SVK,
  author =       "Masayuki Abe and Miyako Ohkubo and Koutarou Suzuki",
  title =        "1-out-of-n Signatures from a Variety of Keys",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "415--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010415.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010415.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Adcock:2002:QGL,
  author =       "Mark Adcock and Richard Cleve",
  title =        "A Quantum {Goldreich--Levin} Theorem with
                 Cryptographic Applications",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2285",
  pages =        "323--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:12 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2285.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2285/22850323.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2285/22850323.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@TechReport{Agrawal:2002:PP,
  author =       "Manindra Agrawal and Neeraj Kayal and Nitin Saxena",
  title =        "{PRIMES} is in {P}",
  type =         "Report",
  institution =  "Department of Computer Science and Engineering, Indian
                 Institute of Technology Kanpur",
  address =      "Kanpur-208016, India",
  day =          "6",
  month =        aug,
  year =         "2002",
  bibdate =      "Tue Sep 10 06:16:25 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.cse.iitk.ac.in/news/primality.pdf",
  abstract =     "We present a deterministic polynomial-time algorithm
                 that determines whether an input number $n$ is prime or
                 composite.",
  acknowledgement = ack-nhfb,
  annote =       "From the paper: ``The ultimate goal of this line of
                 research is, of course, to obtain an unconditional
                 deterministic polynomial-time algorithm for primality
                 testing. Despite the impressive progress made in
                 primality testing so far, this goal has remained
                 elusive. In this paper, we achieve this. We give a
                 deterministic, $ \tilde {O}((l o g n)^12) $ time
                 algorithm for testing if a number is prime.
                 Heuristically, our algorithm does much better: under a
                 widely believed conjecture on the density of Sophie
                 Germain primes (primes $p$ such that $ 2 p + 1 $ is
                 also prime), the algorithm takes only $ \tilde {O}((l o
                 g n)^6) $ steps.''",
}

@InProceedings{Agrawal:2002:WRD,
  author =       "Rakesh Agrawal and Jerry Kiernan",
  title =        "Watermarking Relational Databases",
  crossref =     "Bernstein:2002:VPT",
  pages =        "155--166",
  year =         "2002",
  bibdate =      "Mon Dec 22 18:34:16 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.vldb.org/dblp/db/conf/vldb/vldb2002.html",
  URL =          "http://www.vldb.org/conf/2002/S05P03.pdf",
  acknowledgement = ack-nhfb,
  annote =       "link",
  authorurl =    "http://www.vldb.org/dblp/db/indices/a-tree/a/Agrawal:Rakesh.html;
                 http://www.vldb.org/dblp/db/indices/a-tree/k/Kiernan:Jerry.html",
}

@InProceedings{Algesheimer:2002:ECM,
  author =       "Joy Algesheimer and Jan Camenisch and Victor Shoup",
  title =        "Efficient Computation Modulo a Shared Secret with
                 Application to the Generation of Shared Safe-Prime
                 Products",
  crossref =     "Yung:2002:ACC",
  pages =        "417--432",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420417.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420417.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Amadio:2002:SRP,
  author =       "Roberto M. Amadio and Denis Lugiez and Vincent
                 Vanack{\`e}re",
  title =        "On the symbolic reduction of processes with
                 cryptographic functions",
  journal =      j-THEOR-COMP-SCI,
  volume =       "290",
  number =       "1",
  pages =        "695--740",
  month =        oct,
  year =         "2002",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Nov 20 18:15:29 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{An:2002:SJS,
  author =       "Jee Hea An and Yevgeniy Dodis and Tal Rabin",
  title =        "On the Security of Joint Signature and Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2332",
  pages =        "83--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:37 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2332.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2332/23320083.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2332/23320083.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Anonymous:2002:DEC,
  author =       "Anonymous",
  title =        "Data encryption and cryptography",
  publisher =    "Academia Sinica",
  address =      "Institute of Information Science, Taipei",
  pages =        "i--ii, 349--391",
  year =         "2002",
  ISSN =         "1016-2364",
  MRclass =      "94-06",
  MRnumber =     "1 917 115",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  note =         "JISE J. Inf. Sci. Eng. {\bf 18} (2002), no. 3",
}

@Article{Anonymous:2002:IHB,
  author =       "Anonymous",
  title =        "The Importance of Hardware-based Cryptography for
                 Added Security",
  journal =      j-NETWORK-SECURITY,
  volume =       "2002",
  number =       "3",
  pages =        "5--5",
  day =          "31",
  month =        mar,
  year =         "2002",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(02)00306-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:28 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485802003069",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2002:NSD,
  author =       "Anonymous",
  title =        "{NASA} secret data hacked",
  journal =      j-NETWORK-SECURITY,
  volume =       "2002",
  number =       "9",
  pages =        "2--3",
  day =          "1",
  month =        sep,
  year =         "2002",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(02)09002-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:36 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485802090025",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2002:PFQ,
  author =       "Anonymous",
  title =        "Promise From the Future --- Quantum Cryptography",
  journal =      j-NETWORK-SECURITY,
  volume =       "2002",
  number =       "9",
  pages =        "6--6",
  day =          "1",
  month =        sep,
  year =         "2002",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(02)09007-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:36 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485802090074",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2002:PPD,
  author =       "Anonymous",
  title =        "Products: {Palm Digital Media}'s {eBook} Publishing
                 Tools; {Veridicom}'s Fingerprint Authentication Module;
                 High-Speed Debugging Tool for {Macraigor Systems};
                 {QNX} Launches {IDE} for Embedded Programming; {Extreme
                 Networks}' Network Management Tools; {Parascript}'s
                 Handwriting Recognition {SDK}; System Debugger Tool
                 from {Compuware}",
  journal =      j-COMPUTER,
  volume =       "35",
  number =       "8",
  pages =        "74--??",
  month =        aug,
  year =         "2002",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Dec 12 19:53:31 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/dl/mags/co/2002/08/r8074.htm;
                 http://csdl.computer.org/dl/mags/co/2002/08/r8074.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Anonymous:2002:PSS,
  author =       "Anonymous",
  title =        "Products: {SOISIC} Ships Design Kit for {SOI}
                 Structures; Systems and Software Development Tools from
                 {Telelogic}; {RSA Security}'s {Web} Access Management
                 System; {Altera}'s Free Embedded Processor Portfolio;
                 Signal Integrity Measurement Tools from {Tektronix};
                 {Oracle} Upgrades {Java} Development Tool; {Xilinx}
                 Delivers {EDK} for {FPGA} Processor; {Westbridge}'s
                 Tool to Sniff Unauthorized {XML}; {SpeechStudio}'s
                 Telephony Development Tools",
  journal =      j-COMPUTER,
  volume =       "35",
  number =       "12",
  pages =        "118--119",
  month =        dec,
  year =         "2002",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Dec 12 19:53:37 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/dl/mags/co/2002/12/rz118.htm;
                 http://csdl.computer.org/dl/mags/co/2002/12/rz118.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Anonymous:2002:QCR,
  author =       "Anonymous",
  title =        "Quantum Cryptography Revisited",
  journal =      j-NETWORK-SECURITY,
  volume =       "2002",
  number =       "8",
  pages =        "14--16",
  day =          "1",
  month =        aug,
  year =         "2002",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(02)08012-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:34 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485802080121",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2002:RUB,
  author =       "Anonymous",
  title =        "Review of {US} Bombes",
  journal =      j-IEEE-ANN-HIST-COMPUT,
  volume =       "24",
  number =       "3",
  pages =        "85--87",
  month =        jul # "--" # sep,
  year =         "2002",
  CODEN =        "IAHCEX",
  ISSN =         "1058-6180 (print), 1934-1547 (electronic)",
  ISSN-L =       "1058-6180",
  bibdate =      "Fri Nov 1 10:13:04 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://computer.org/annals/an2002/a3letter_web/a3lettertoeditor_web.htm;
                 http://dlib.computer.org/an/books/an2002/pdf/a3085.pdf;
                 http://www.computer.org/annals/an2002/a3085abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=85",
}

@Article{Araki:2002:NRS,
  author =       "Shunsuke Araki",
  title =        "A {Nyberg--Rueppel} Signature for Multiple Messages
                 and Its Batch Verification",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2433",
  pages =        "220--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:26 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2433.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2433/24330220.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2433/24330220.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Armington:2002:BAI,
  author =       "John Armington and Purdy Ho and Paul Koznek and
                 Richard Martinez",
  title =        "Biometric Authentication in Infrastructure Security",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2437",
  pages =        "1--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:24 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2437.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2437/24370001.htm;
                 http://link.springer.de/link/service/series/0558/papers/2437/24370001.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Asenjo:2002:AES,
  author =       "Juan C. Asenjo",
  title =        "The {Advanced Encryption Standard} --- Implementation
                 and Transition to a New Cryptographic Benchmark",
  journal =      j-NETWORK-SECURITY,
  volume =       "2002",
  number =       "7",
  pages =        "7--9",
  day =          "1",
  month =        jul,
  year =         "2002",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(02)07008-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:33 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485802070083",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Backes:2002:DCS,
  author =       "Michael Backes and Christian Jacobi and Birgit
                 Pfitzmann",
  title =        "Deriving Cryptographically Sound Implementations Using
                 Composition and Formally Verified Bisimulation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2391",
  pages =        "310--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:10 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2391.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2391/23910310.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2391/23910310.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bagnulo:2002:PAA,
  author =       "Marcelo Bagnulo and Bernardo Alarcos and Mar{\'\i}a
                 Calder{\'o}n and Marifeli Sedano",
  title =        "Providing Authentication {\&} Authorization Mechanisms
                 for Active Service Charging",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2511",
  pages =        "337--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:49 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2511.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2511/25110337.htm;
                 http://link.springer.de/link/service/series/0558/papers/2511/25110337.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Bamford:2002:BSA,
  author =       "James Bamford",
  title =        "Body of secrets: anatomy of the ultra-secret {National
                 Security Agency}",
  publisher =    "Anchor Books",
  address =      "New York, NY, USA",
  pages =        "763",
  year =         "2002",
  ISBN =         "0-385-49908-6",
  ISBN-13 =      "978-0-385-49908-8",
  LCCN =         "UB256.U6 B36 2002",
  bibdate =      "Thu Jan 19 12:30:30 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/bios/random051/2002284054.html;
                 http://www.loc.gov/catdir/description/random043/2002284054.html;
                 http://www.loc.gov/catdir/samples/random041/2002284054.html",
  acknowledgement = ack-nhfb,
  subject =      "Electronic intelligence; United States; History;
                 Cryptography",
}

@Article{Banks:2002:NSR,
  author =       "William D. Banks and Igor E. Shparlinski",
  title =        "On the number of sparse {RSA} exponents",
  journal =      j-J-NUMBER-THEORY,
  volume =       "95",
  number =       "2",
  pages =        "340--350",
  month =        aug,
  year =         "2002",
  CODEN =        "JNUTA9",
  DOI =          "https://doi.org/10.1006/jnth.2001.2775",
  ISSN =         "0022-314X (print), 1096-1658 (electronic)",
  ISSN-L =       "0022-314X",
  bibdate =      "Wed Jul 15 08:47:58 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnumbertheory2000.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022314X01927751",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Number Theory",
  fjournal =     "Journal of Number Theory",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0022314X",
}

@Article{Barkan:2002:HMW,
  author =       "Elad Barkan and Eli Biham",
  title =        "In How Many Ways Can You Write Rijndael?",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "160--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010160.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010160.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Barnum:2002:AQM,
  author =       "H. Barnum and C. Crepeau and D. Gottesman and A. Smith
                 and A. Tapp",
  title =        "Authentication of quantum messages",
  crossref =     "IEEE:2002:PAI",
  pages =        "449--458",
  year =         "2002",
  bibdate =      "Fri Jul 15 16:13:02 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2000.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8411/26517/01181969.pdf?isnumber=26517&prod=CNF&arnumber=1181969&arSt=+449&ared=+458&arAuthor=Barnum%2C+H.%3B+Crepeau%2C+C.%3B+Gottesman%2C+D.%3B+Smith%2C+A.%3B+Tapp%2C+A.;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=26517&arnumber=1181969&count=82&index=45",
  acknowledgement = ack-nhfb,
}

@Book{Barr:2002:IC,
  author =       "Thomas H. Barr",
  title =        "Invitation to Cryptology",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  pages =        "xii + 396",
  year =         "2002",
  ISBN =         "0-13-088976-8",
  ISBN-13 =      "978-0-13-088976-8",
  LCCN =         "Z103 .B34 2002",
  bibdate =      "Tue Feb 15 17:29:10 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  tableofcontents = "Origins, examples, and ideas in cryptology \\
                 Classical cryptographic techniques \\
                 Symmetric computer-based cryptology \\
                 Public-key cryptography \\
                 Case studies and issues",
}

@InProceedings{Barreto:2002:EAP,
  author =       "Paulo S. L. M. Barreto and Hae Y. Kim and Ben Lynn and
                 Michael Scott",
  title =        "Efficient Algorithms for Pairing-Based Cryptosystems",
  crossref =     "Yung:2002:ACC",
  pages =        "354--368",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420354.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420354.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Book{Bauer:2002:DSM,
  author =       "Friedrich Ludwig Bauer",
  title =        "Decrypted secrets: methods and maxims of cryptology",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  edition =      "Third",
  pages =        "xii + 473",
  year =         "2002",
  ISBN =         "3-540-42674-4",
  ISBN-13 =      "978-3-540-42674-5",
  LCCN =         "QA76.9.A25 B38513 2002",
  bibdate =      "Sat Dec 17 17:13:00 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Cryptography",
}

@Article{Bauer:2002:PPB,
  author =       "Mick Bauer",
  title =        "Paranoid Penguin: {BestCrypt}: Cross-Platform
                 Filesystem Encryption",
  journal =      j-LINUX-J,
  volume =       "98",
  pages =        "??--??",
  month =        jun,
  year =         "2002",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Sat Apr 12 06:59:06 MDT 2003",
  bibsource =    "http://noframes.linuxjournal.com/lj-issues/issue98/index.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.linuxjournal.com/article.php?sid=5938",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Book{Beckman:2002:CAB,
  author =       "Bengt Beckman",
  title =        "Codebreakers: {Arne Beurling} and the {Swedish} crypto
                 program during {World War II}",
  publisher =    pub-AMS,
  address =      pub-AMS:adr,
  pages =        "xviii + 259",
  year =         "2002",
  ISBN =         "0-8218-2889-4",
  ISBN-13 =      "978-0-8218-2889-2",
  LCCN =         "D810.C88 B413 2002",
  bibdate =      "Tue Dec 20 12:46:33 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939--1945; Cryptography; World War,
                 1939--1945; Electronic intelligence; Sweden; Beurling,
                 Arne",
}

@Article{Behrmann:2002:UIS,
  author =       "Gerd Behrmann and Johan Bengtsson and Alexandre David
                 and Kim G. Larsen and Paul Pettersson and Wang Yi",
  title =        "{UPPAAL} Implementation Secrets",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2469",
  pages =        "3--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:34 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2469.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2469/24690003.htm;
                 http://link.springer.de/link/service/series/0558/papers/2469/24690003.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Bellare:2002:GSI,
  author =       "Mihir Bellare and Adriana Palacio",
  title =        "{GQ} and {Schnorr} Identification Schemes: Proofs of
                 Security against Impersonation under Active and
                 Concurrent Attacks",
  crossref =     "Yung:2002:ACC",
  pages =        "162--177",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Bellare:2002:PRI,
  author =       "Mihir Bellare and Chanathip Namprempre and David
                 Pointcheval and Michael Semanko",
  title =        "The Power of {RSA} Inversion Oracles and the Security
                 of Chaum's {RSA}-Based Blind Signature Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2339",
  pages =        "319--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:40 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2339.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2339/23390319.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2339/23390319.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bellare:2002:TSB,
  author =       "Mihir Bellare and Gregory Neven",
  title =        "Transitive Signatures Based on Factoring and {RSA}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "397--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010397.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010397.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bellavista:2002:JLD,
  author =       "Paolo Bellavista and Antonio Corradi and Cesare
                 Stefanelli",
  title =        "{Java} for On-line Distributed Monitoring of
                 Heterogeneous Systems and Services",
  journal =      j-COMP-J,
  volume =       "45",
  number =       "6",
  pages =        "595--607",
  month =        "????",
  year =         "2002",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Nov 6 11:21:54 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_45/Issue_06/",
  URL =          "http://www3.oup.co.uk/computer_journal/hdb/Volume_45/Issue_06/450595.sgm.abs.html;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_45/Issue_06/pdf/450595.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Book{Benantar:2002:IPK,
  author =       "Messaoud Benantar",
  title =        "Introduction to the {Public Key Infrastructure} for
                 the {Internet}",
  publisher =    pub-PHPTR,
  address =      pub-PHPTR:adr,
  pages =        "xii + 254",
  year =         "2002",
  ISBN =         "0-13-060927-7",
  ISBN-13 =      "978-0-13-060927-4",
  LCCN =         "QA76.9.A25 B45 2002",
  bibdate =      "Mon Apr 29 11:50:37 MDT 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$54.99",
  URL =          "http://www.phptr.com/ptrbooks/ptr_0130609277.html",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; Internet --- access control;
                 Internet --- security measures",
}

@Article{Benerecetti:2002:VST,
  author =       "Massimo Benerecetti and Maurizio Panti and Luca
                 Spalazzi and Simone Tacconi",
  title =        "Verification of the {SSL\slash TLS} Protocol Using a
                 Model Checkable Logic of Belief and Time",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2434",
  pages =        "126--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:23 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2434.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2434/24340126.htm;
                 http://link.springer.de/link/service/series/0558/papers/2434/24340126.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bennett:2002:ESE,
  author =       "Krista Bennett and Christian Grothoff and Tzvetan
                 Horozov and Ioana Patrascu",
  title =        "Efficient Sharing of Encrypted Data",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2384",
  pages =        "107--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2384/23840107.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2384/23840107.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bergadano:2002:IAM,
  author =       "F. Bergadano and D. Cavagnino and B. Crispo",
  title =        "Individual Authentication in Multiparty
                 Communications",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "8",
  pages =        "719--735",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802008131",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bergadano:2002:UAT,
  author =       "Francesco Bergadano and Daniele Gunetti and Claudia
                 Picardi",
  title =        "User authentication through keystroke dynamics",
  journal =      j-TISSEC,
  volume =       "5",
  number =       "4",
  pages =        "367--397",
  month =        nov,
  year =         "2002",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Aug 7 09:02:36 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Biehl:2002:NDP,
  author =       "Ingrid Biehl and Tsuyoshi Takagi",
  title =        "A New Distributed Primality Test for Shared {RSA} Keys
                 Using Quadratic Fields",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2384",
  pages =        "1--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2384/23840001.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2384/23840001.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Biham:2002:DCQ,
  author =       "Eli Biham and Vladimir Furman and Michal Misztal and
                 Vincent Rijmen",
  title =        "Differential Cryptanalysis of {Q}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2355",
  pages =        "174--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:48 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2355.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2355/23550174.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2355/23550174.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Biham:2002:EDL,
  author =       "Eli Biham and Orr Dunkelman and Nathan Keller",
  title =        "Enhancing Differential-Linear Cryptanalysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "254--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010254.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010254.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Biham:2002:HDE,
  author =       "Eli Biham",
  title =        "How to decrypt or even substitute {DES}-encrypted
                 messages in $ 2^{28} $ steps",
  journal =      j-INFO-PROC-LETT,
  volume =       "84",
  number =       "3",
  pages =        "117--124",
  day =          "15",
  month =        nov,
  year =         "2002",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Biham:2002:LCR,
  author =       "Eli Biham and Orr Dunkelman and Nathan Keller",
  title =        "Linear Cryptanalysis of Reduced Round Serpent",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2355",
  pages =        "16--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:48 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2355.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2355/23550016.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2355/23550016.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Biham:2002:SQK,
  author =       "Eli Biham and Michel Boyer and Gilles Brassard and
                 Jeroen van de Graaf and Tal Mor",
  title =        "Security of Quantum Key Distribution against All
                 Collective Attacks",
  journal =      j-ALGORITHMICA,
  volume =       "34",
  number =       "4",
  pages =        "372--388",
  month =        nov,
  year =         "2002",
  CODEN =        "ALGOEJ",
  DOI =          "https://doi.org/10.1007/s00453-002-0973-6",
  ISSN =         "0178-4617 (print), 1432-0541 (electronic)",
  ISSN-L =       "0178-4617",
  MRclass =      "94A60 (68Q05 81P68 94A62)",
  MRnumber =     "MR1943513 (2003k:94022)",
  MRreviewer =   "Hoi-Kwong Lo",
  bibdate =      "Fri Jan 6 11:38:16 MST 2006",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0178-4617&volume=34&issue=4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/index-table-a.html#algorithmica;
                 MathSciNet database",
  note =         "Quantum computation and quantum cryptography",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0178-4617&volume=34&issue=4&spage=372",
  acknowledgement = ack-nhfb,
  fjournal =     "Algorithmica. An International Journal in Computer
                 Science",
  journal-URL =  "http://link.springer.com/journal/453",
  remark =       "Special issue on Quantum Algorithms and
                 Cryptography.",
}

@InProceedings{Black:2002:BBA,
  author =       "John Black and Phillip Rogaway and Thomas Shrimpton",
  title =        "Black-Box Analysis of the Block-Cipher-Based
                 Hash-Function Constructions from {PGV}",
  crossref =     "Yung:2002:ACC",
  pages =        "320--335",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420320.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420320.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Black:2002:BCM,
  author =       "John Black and Phillip Rogaway",
  title =        "A Block-Cipher Mode of Operation for Parallelizable
                 Message Authentication",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2332",
  pages =        "384--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:37 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2332.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2332/23320384.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2332/23320384.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Black:2002:SCA,
  author =       "John Black and Hector Urtubia",
  title =        "Side-Channel Attacks on Symmetric Encryption Schemes:
                 The Case for Authenticated Encryption",
  crossref =     "USENIX:2002:PUS",
  pages =        "327--338",
  year =         "2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/sec02/black.html",
}

@Misc{Blake-Wilson:2002:RUE,
  author =       "S. Blake-Wilson and D. Brown and P. Lambert",
  title =        "{RFC 3278}: Use of {Elliptic Curve Cryptography (ECC)}
                 Algorithms in {Cryptographic Message Syntax (CMS)}",
  month =        apr,
  year =         "2002",
  bibdate =      "Wed Apr 20 12:01:15 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "ftp://ftp.internic.net/rfc/rfc3278.txt;
                 https://www.math.utah.edu/pub/rfc/rfc3278.txt",
  acknowledgement = ack-nhfb,
}

@Article{Blanchet:2002:SAS,
  author =       "Bruno Blanchet",
  title =        "From Secrecy to Authenticity in Security Protocols",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2477",
  pages =        "342--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:11:24 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2477.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2477/24770342.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2477/24770342.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Blaser:2002:PCC,
  author =       "Markus Bl{\"a}ser and Andreas Jakoby and Maciej
                 Liskiewicz and Bodo Siebert",
  title =        "Private Computation --- $k$-Connected versus
                 1-Connected Networks",
  crossref =     "Yung:2002:ACC",
  pages =        "194--209",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@InProceedings{Blaze:2002:CI,
  author =       "Matt Blaze",
  title =        "Cryptography and Insecurity",
  crossref =     "USENIX:2002:PBF",
  year =         "2002",
  bibdate =      "Tue Oct 15 12:37:27 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Unpublished invited talk, BSDCON2002: Growing the BSD
                 Community, February 11--14, 2002, Cathedral Hill Hotel,
                 San Francisco, CA",
  URL =          "http://www.usenix.org/publications/library/proceedings/bsdcon02/tech.html",
  abstract =     "Cryptography sounds just wonderful. With a few simple
                 algorithms, it is possible to separate the security of
                 messages from the security of the media over which they
                 are carried; public-key techniques even make it
                 possible to have secure communication over completely
                 public channels without advance arrangements. Now that
                 crypto export restrictions have been relaxed, vendors
                 are actually implementing it--the world has finally
                 gotten serious about security, it seems.\par

                 And yet Internet attacks have become a far greater
                 problem than they were in the bad old days before
                 widely deployed cryptography. This talk will try to
                 figure out who is to blame for this situation.",
  acknowledgement = ack-nhfb,
}

@Article{Blumenthal:2002:SAD,
  author =       "Uri Blumenthal and Milind M. Buddhikot and Juan A.
                 Garay and Scott C. Miller and Sarvar Patel and Luca
                 Salgarelli and Dorothy Stanley",
  title =        "A scheme for authentication and dynamic key exchange
                 in wireless networks",
  journal =      j-BELL-LABS-TECH-J,
  volume =       "7",
  number =       "2",
  pages =        "37--48",
  month =        "Summer",
  year =         "2002",
  CODEN =        "BLTJFD",
  DOI =          "https://doi.org/10.1002/bltj.10004",
  ISSN =         "1089-7089 (print), 1538-7305 (electronic)",
  ISSN-L =       "1089-7089",
  bibdate =      "Fri Nov 26 17:31:31 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Bell Labs Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
  onlinedate =   "2 Dec 2002",
}

@Article{Bodei:2002:FLD,
  author =       "C. Bodei and P. Degano and F. Nielson and H. Riis
                 Nielson",
  title =        "Flow logic for {Dolev--Yao} secrecy in cryptographic
                 processes",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "18",
  number =       "6",
  pages =        "747--756",
  month =        may,
  year =         "2002",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Sat Jan 10 10:03:27 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Bodei:2002:PAP,
  author =       "Chiara Bodei and Pierpaolo Degano and Riccardo Focardi
                 and Corrado Priami",
  title =        "Primitives for authentication in process algebras",
  journal =      j-THEOR-COMP-SCI,
  volume =       "283",
  number =       "2",
  pages =        "271--304",
  month =        jun,
  year =         "2002",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Nov 20 18:08:57 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@TechReport{Bollinger:2002:UFO,
  author =       "Terry Bollinger",
  title =        "Use of {Free and Open-Source Software} ({FOSS}) in the
                 {U.S. Department of Defense}: Version: 1.2",
  type =         "Mitre report",
  number =       "MP 02 W0000101",
  institution =  "MITRE Corporation",
  pages =        "160",
  day =          "28",
  month =        oct,
  year =         "2002",
  bibdate =      "Wed Oct 30 08:48:57 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.egovos.org/pdf/dodfoss.pdf",
  acknowledgement = ack-nhfb,
  annote =       "About 100 pages of this report are devoted to exhibits
                 of the licenses of the various open source packages
                 discussed in the report.",
  keywords =     "ACE; ACE ORB (TAO); ACID; AMANDA; Apache; Autoconf;
                 Automake; bash; Bastille; BIND; C++ Boost; CIS
                 Benchmarks; Colt; Condor; COPS; Crack; CVS; CVW;
                 Cygwin; DDD; DjVuLibre; EADSIM; Emacs; eTrust; Expect;
                 FreeBSD; GateD; gawk (awk); GCC; GDB; Ghostscript;
                 GNAT; GnuPG; gnuplot; grep; h2n; HOSTS; ImageMagick;
                 JADE; Jakarta; Jaxen; JBoss; JDOM; Jikes; jSIP; Kaffe;
                 LaTeX; Linux; Linux (Red Hat); Linux firewalls; Lsof;
                 m4; Majordomo; make; Maxima; MIMEsweeper; MRTG; MTR;
                 MySQL; Nessus; NetBSD; NetSaint; nload; Nmap; ntop;
                 NTP; Octave; OpenBSD; OpenMap; OpenOffice; OpenSSH;
                 OpenSSL; Perl; Perl CGI scripts; PerLDAP; PHP;
                 PingScan; Procmail; Qmail; R; RealSecure; RRDtool;
                 RTLinux; RWhois; RXVT; Samba; SARA; SATAN; Saxon; SCA;
                 sed; SELinux; Sendmail; SNARE; Snort; Squid; Tcl/Tk;
                 TCP Wrappers; Tomcat; Top; Tripwire; VisAD; VOCAL; VTK;
                 Webmin; WebTAS; Weka; WU-FTPD; Xalan; Xerces; XFree86;
                 XGobi; Xpatch; zlib; Zope",
}

@Article{Boreale:2002:PTC,
  author =       "Michele Boreale and Rocco {De Nicola} and Rosario
                 Pugliese",
  title =        "Proof Techniques for Cryptographic Processes",
  journal =      j-SIAM-J-COMPUT,
  volume =       "31",
  number =       "3",
  pages =        "947--986",
  month =        jun,
  year =         "2002",
  CODEN =        "SMJCAT",
  DOI =          "https://doi.org/10.1137/S0097539700377864",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Sat Feb 23 11:36:25 MST 2002",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/31/3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  URL =          "http://epubs.siam.org/sam-bin/dbq/article/37786",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Article{Borselius:2002:PAU,
  author =       "Niklas Borselius and Chris J. Mitchell and Aaron
                 Wilson",
  title =        "A pragmatic alternative to undetachable signatures",
  journal =      j-OPER-SYS-REV,
  volume =       "36",
  number =       "2",
  pages =        "6--11",
  month =        apr,
  year =         "2002",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:43 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Borselius:2002:VTS,
  author =       "Niklas Borselius and Chris J. Mitchell and Aaron
                 Wilson",
  title =        "On the value of threshold signatures",
  journal =      j-OPER-SYS-REV,
  volume =       "36",
  number =       "4",
  pages =        "30--35",
  month =        oct,
  year =         "2002",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:53 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Bounkong:2002:ICA,
  author =       "St{\'e}phane Bounkong and David Saad and David Lowe",
  title =        "Independent Component Analysis for Domain Independent
                 Watermarking",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2415",
  pages =        "510--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:20 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2415.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2415/24150510.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2415/24150510.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Boyce:2002:IAM,
  author =       "Joseph G. Boyce and Dan W. Jennings",
  title =        "Information assurance: managing organizational {IT}
                 security risks",
  publisher =    pub-BUTTERWORTH-HEINEMANN,
  address =      pub-BUTTERWORTH-HEINEMANN:adr,
  pages =        "xxi + 261",
  year =         "2002",
  ISBN =         "0-7506-7327-3",
  ISBN-13 =      "978-0-7506-7327-3",
  LCCN =         "QA76.9.A25 B69 2002",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$44.95",
  acknowledgement = ack-nhfb,
}

@Article{Boyer:2002:LDS,
  author =       "John Boyer and Andrew D. Todd and Jason Trenough and
                 Doug Farrell",
  title =        "Letters: Defective Sign-and-Encrypt and Healthcare
                 Woes and {J2EE} Cache and Pool and {Regex++}",
  journal =      j-DDJ,
  volume =       "27",
  number =       "2",
  pages =        "10--10",
  month =        feb,
  year =         "2002",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Tue Feb 12 05:21:41 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Bresson:2002:DGD,
  author =       "Emmanuel Bresson and Olivier Chevassut and David
                 Pointcheval",
  title =        "Dynamic Group {Diffie--Hellman} Key Exchange under
                 Standard Assumptions",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2332",
  pages =        "321--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:37 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2332.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2332/23320321.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2332/23320321.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bresson:2002:GDH,
  author =       "Emmanuel Bresson and Olivier Chevassut and David
                 Pointcheval",
  title =        "Group {Diffie--Hellman} Key Exchange Secure against
                 Dictionary Attacks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "497--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010497.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010497.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Bresson:2002:TRS,
  author =       "Emmanuel Bresson and Jacques Stern and Michael
                 Szydlo",
  title =        "Threshold Ring Signatures and Applications to Ad-hoc
                 Groups",
  crossref =     "Yung:2002:ACC",
  pages =        "465--480",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420465.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420465.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Breunesse:2002:SVD,
  author =       "Cees-Bart Breunesse and Bart Jacobs and Joachim van
                 den Berg",
  title =        "Specifying and Verifying a Decimal Representation in
                 {Java} for {Smart Cards}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2422",
  pages =        "304--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:23 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2422.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2422/24220304.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2422/24220304.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Broadfoot:2002:ASA,
  author =       "Philippa Broadfoot and Gavin Lowe",
  title =        "Analysing a Stream Authentication Protocol Using Model
                 Checking",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2502",
  pages =        "146--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:43 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2502.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2502/25020146.htm;
                 http://link.springer.de/link/service/series/0558/papers/2502/25020146.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Buchmann:2002:ICP,
  author =       "Johannes Buchmann and Kouichi Sakurai and Tsuyoshi
                 Takagi",
  title =        "An {IND-CCA2} Public-Key Cryptosystem with Fast
                 Decryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2288",
  pages =        "51--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:14 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2288.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2288/22880051.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2288/22880051.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Budiansky:2002:BWC,
  author =       "Stephen Budiansky",
  title =        "Battle of wits: the complete story of codebreaking in
                 {World War II}",
  publisher =    pub-SIMON-SCHUSTER,
  address =      pub-SIMON-SCHUSTER:adr,
  pages =        "436 + 16",
  year =         "2002",
  ISBN =         "0-7432-1734-9 (paperback)",
  ISBN-13 =      "978-0-7432-1734-7 (paperback)",
  LCCN =         "????",
  bibdate =      "Tue Jan 17 21:40:22 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 sirsi.library.utoronto.ca:2200/UNICORN",
  price =        "US\$16.00",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939-1945; Cryptography; Military
                 intelligence",
}

@Article{Buonanno:2002:IUE,
  author =       "Enrico Buonanno and Jonathan Katz and Moti Yung",
  title =        "Incremental Unforgeable Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2355",
  pages =        "109--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:48 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2355.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2355/23550109.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2355/23550109.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Burke:2002:IWA,
  author =       "Colin B. Burke",
  title =        "It wasn't all magic: the early struggle to automate
                 cryptanalysis, 1930s--1960s",
  volume =       "6",
  publisher =    "Center for Cryptologic History, National Security
                 Agency",
  address =      "Fort George G. Meade, MD, USA",
  pages =        "344",
  year =         "2002",
  LCCN =         "Z103.4. U6",
  bibdate =      "Wed Dec 21 12:27:13 MST 2016",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "United States cryptologic history special series",
  URL =          "http://archive.org/details/NSA-WasntAllMagic_2002;
                 http://purl.fdlp.gov/GPO/gpo40404;
                 http://purl.stanford.edu/jj264fh4943;
                 http://www.nsa.gov/public_info/_files/cryptologic_histories/magic.pdf",
  acknowledgement = ack-nhfb,
  author-dates = "1936--",
  subject =      "Cryptography; United States; Automation; History",
}

@InProceedings{Camenisch:2002:DAA,
  author =       "Jan Camenisch and Anna Lysyanskaya",
  title =        "Dynamic Accumulators and Application to Efficient
                 Revocation of Anonymous Credentials",
  crossref =     "Yung:2002:ACC",
  pages =        "61--76",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@InProceedings{Canetti:2002:SAI,
  author =       "Ran Canetti and Hugo Krawczyk",
  title =        "Security Analysis of {IKE}'s Signature-Based
                 Key-Exchange Protocol",
  crossref =     "Yung:2002:ACC",
  pages =        "143--161",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420143.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420143.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Canetti:2002:UCN,
  author =       "Ran Canetti and Hugo Krawczyk",
  title =        "Universally Composable Notions of Key Exchange and
                 Secure Channels",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2332",
  pages =        "337--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:37 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2332.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2332/23320337.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2332/23320337.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Canetti:2002:UCT,
  author =       "Ran Canetti and Yehuda Lindell and Rafail Ostrovsky
                 and Amit Sahai",
  title =        "Universally composable two-party and multi-party
                 secure computation",
  crossref =     "ACM:2002:PTF",
  pages =        "494--503",
  year =         "2002",
  bibdate =      "Tue Jan 13 06:21:05 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Canovas:2002:DSB,
  author =       "{\'O}scar C{\'a}novas and Antonio F. G{\'o}mez and
                 Humberto Mart{\'\i}nez and Gregorio Mart{\'\i}nez",
  title =        "Different {Smartcard}-Based Approaches to Physical
                 Access Control",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2437",
  pages =        "214--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:24 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2437.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2437/24370214.htm;
                 http://link.springer.de/link/service/series/0558/papers/2437/24370214.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Canteaut:2002:DCH,
  author =       "Anne Canteaut and Marion Videau",
  title =        "Degree of Composition of Highly Nonlinear Functions
                 and Applications to Higher Order Differential
                 Cryptanalysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2332",
  pages =        "518--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:37 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2332.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2332/23320518.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2332/23320518.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Cao:2002:TKE,
  author =       "Zhen Fu Cao and Ji Guo Li",
  title =        "A threshold key escrow scheme based on {ElGamal}
                 public key cryptosystem",
  journal =      j-CHIN-J-COMPUTERS,
  volume =       "25",
  number =       "4",
  pages =        "346--350",
  year =         "2002",
  CODEN =        "JIXUDT",
  ISSN =         "0254-4164",
  MRclass =      "94A60",
  MRnumber =     "1 919 051",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Chinese Journal of Computers. Jisuanji Xuebao",
}

@InProceedings{Carlet:2002:LCC,
  author =       "Claude Carlet",
  title =        "A Larger Class of Cryptographic {Boolean} Functions
                 via a Study of the {Maiorana--McFarland} Construction",
  crossref =     "Yung:2002:ACC",
  pages =        "549--564",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420549.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420549.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Carline:2002:NWT,
  author =       "Dylan Carline and Paul Coulton",
  title =        "A Novel Watermarking Technique for {LUT} Based {FPGA}
                 Designs",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2438",
  pages =        "1152--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:28 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2438.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2438/24381152.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2438/24381152.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Carrington:2002:EDS,
  editor =       "Charles Carrington and others",
  title =        "Enterprise directory and security implementation
                 guide: designing and implementing directories in your
                 organization",
  publisher =    pub-ACADEMIC,
  address =      pub-ACADEMIC:adr,
  pages =        "xxvi + 238",
  year =         "2002",
  ISBN =         "0-12-160452-7",
  ISBN-13 =      "978-0-12-160452-3",
  LCCN =         "HD9696.25.A2 E58 2002",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$49.95",
  acknowledgement = ack-nhfb,
}

@Book{Casey:2002:HCC,
  editor =       "Eoghan Casey",
  title =        "Handbook of computer crime investigation: forensic
                 tools and technology",
  publisher =    pub-ACADEMIC,
  address =      pub-ACADEMIC:adr,
  pages =        "xiv + 448",
  year =         "2002",
  ISBN =         "0-12-163103-6",
  ISBN-13 =      "978-0-12-163103-1",
  LCCN =         "HV8079.C65 H36 2002",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$39.95",
  acknowledgement = ack-nhfb,
}

@Article{Catalano:2002:HHL,
  author =       "Dario Catalano and Phong Q. Nguyen and Jacques Stern",
  title =        "The Hardness of {Hensel} Lifting: The Case of {RSA}
                 and Discrete Logarithm",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "299--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010299.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010299.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chan:2002:SLI,
  author =       "Chi-Kwong Chan and L. M. Cheng",
  title =        "Security of {Lin}'s image watermarking system",
  journal =      j-J-SYST-SOFTW,
  volume =       "62",
  number =       "3",
  pages =        "211--215",
  day =          "15",
  month =        jun,
  year =         "2002",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Sat Oct 25 07:14:08 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Chang:2002:ATI,
  author =       "Fu-Chi Chang and Chia-Jiu Wang",
  title =        "Architectural tradeoff in implementing {RSA}
                 processors",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "30",
  number =       "1",
  pages =        "5--11",
  month =        mar,
  year =         "2002",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 09:40:36 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Chang:2002:IBO,
  author =       "Yan-Cheng Chang and Chun-Yun Hsiao and Chi-Jen Lu",
  title =        "On the Impossibilities of Basing One-Way Permutations
                 on Central Cryptographic Primitives",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "110--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010110.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010110.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chen:2002:AMT,
  author =       "L. Chen and K. Harrison and D. Soldera and N. P.
                 Smart",
  title =        "Applications of Multiple Trust Authorities in Pairing
                 Based Cryptosystems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2437",
  pages =        "260--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:24 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2437.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2437/24370260.htm;
                 http://link.springer.de/link/service/series/0558/papers/2437/24370260.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chen:2002:CPK,
  author =       "L. Chen and K. Harrison and A. Moss and D. Soldera and
                 N. P. Smart",
  title =        "Certification of Public Keys within an Identity Based
                 System",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2433",
  pages =        "322--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:26 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2433.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2433/24330322.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2433/24330322.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chen:2002:SFS,
  author =       "Yangjun Chen",
  title =        "Signature files and signature trees",
  journal =      j-INFO-PROC-LETT,
  volume =       "82",
  number =       "4",
  pages =        "213--221",
  day =          "31",
  month =        may,
  year =         "2002",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:28 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Cheon:2002:IID,
  author =       "Jung Hee Cheon and MunJu Kim and Kwangjo Kim and
                 Jung-Yeun Lee and SungWoo Kang",
  title =        "Improved Impossible Differential Cryptanalysis of
                 {Rijndael} and {Crypton}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2288",
  pages =        "39--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:14 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2288.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2288/22880039.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2288/22880039.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chien:2002:EPS,
  author =       "Hung-Yu Chien and Jinn-Ke Jan and Yuh-Min Tseng",
  title =        "An Efficient and Practical Solution to Remote
                 Authentication: Smart Card",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "372--375",
  day =          "1",
  month =        aug,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802004157",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Choi:2002:IPP,
  author =       "Dug-Hwan Choi and Seungbok Choi and Dongho Won",
  title =        "Improvement of Probabilistic Public Key Cryptosystems
                 Using Discrete Logarithm",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2288",
  pages =        "72--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:14 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2288.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2288/22880072.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2288/22880072.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Choie:2002:ICH,
  author =       "Y. Choie and D. Yun",
  title =        "Isomorphism Classes of Hyperelliptic Curves of Genus
                 $2$ over $ \mathbb {F}_q $",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2384",
  pages =        "190--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2384/23840190.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2384/23840190.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Churchhouse:2002:CCJ,
  author =       "Robert F. Churchhouse",
  title =        "Codes and Ciphers: {Julius Caesar}, the {Enigma}, and
                 the {Internet}",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "x + 240",
  year =         "2002",
  ISBN =         "0-521-81054-X (hardcover), 0-521-00890-5 (paperback)",
  ISBN-13 =      "978-0-521-81054-8 (hardcover), 978-0-521-00890-7
                 (paperback)",
  LCCN =         "Z103 .C48 2002",
  bibdate =      "Mon Apr 29 11:50:37 MDT 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$55.00 (hardcover), US\$20.00 (paperback)",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
  subject =      "Cryptography; Ciphers",
  tableofcontents = "Chapter 1. Introduction 1 \\
                 Some aspects of secure communication I \\
                 Julius Caesar's cipher 2 \\
                 Some basic definitions 3 \\
                 Three stages to decryption identification, breaking and
                 setting 4 \\
                 Codes and ciphers 5 \\
                 Assessing the strength of a cipher system 7 \\
                 Error detecting and correcting codes 8 \\
                 Other methods of concealing messages 9 \\
                 Modular arithmetic 10 \\
                 Modular addition and subtraction of letters 11 \\
                 Gender 11 \\
                 End matter 12 \\
                 Chapter 2. From Julius Caesar to simple substitution 13
                 \\
                 Julius Caesar ciphers and their solution 13 \\
                 Simple substitution ciphers 15 \\
                 How to solve a simple substitution cipher 17 \\
                 Letter frequencies in languages other than English 24
                 \\
                 How many letters are needed to solve a simple
                 substitution cipher? 26 \\
                 Chapter 3. Polyalphabetic systems 28 \\
                 Strengthening Julius Caesar Vigen{\'e}re ciphers 28 \\
                 How to solve a Vigen{\'e}re cipher 30 \\
                 Indicators 33 \\
                 Depths 34 \\
                 Recognising `depths' 34 \\
                 How much text do we need to solve a Vigen{\'e}re
                 cipher? 37 \\
                 Jefferson's cylinder 37 \\
                 Chapter 4. Jigsaw ciphers 40 \\
                 Transpositions 40 \\
                 Simple transposition 40 \\
                 Double transposition 44 \\
                 Other forms of transposition 48 \\
                 Assessment of the security of transposition ciphers 51
                 \\
                 Double encipherment in general 52 \\
                 Chapter 5. Two-letter ciphers 54 \\
                 Monograph to digraph 54 \\
                 MDTM ciphers 56 \\
                 Digraph to digraph 58 \\
                 Playfair encipherment 59 \\
                 Playfair decipherment 60 \\
                 Cryptanalytic aspects of Playfair 61 \\
                 Double Playfair 61 \\
                 Chapter 6. Codes 64 \\
                 Characteristics of codes 64 \\
                 One part and two-part codes 65 \\
                 Code plus additive 67 \\
                 Chapter 7. Ciphers for spies 72 \\
                 Stencil ciphers 73 \\
                 Book ciphers 75 \\
                 Letter frequencies in book ciphers 79 \\
                 Solving a book cipher 79 \\
                 Indicators 86 \\
                 Disastrous errors in using a book cipher 86 \\
                 ???? ciphers 88 \\
                 One-time pad 92 \\
                 Chapter 8. Producing random numbers and letters 94 \\
                 Random sequences 94 \\
                 Producing random sequences 95 \\
                 Coin spinning 95 \\
                 Throwing dice 96 \\
                 Lottery type draws 97 \\
                 Cosmic rays 97 \\
                 Amplifier noise 97 \\
                 Pseudo-random sequences 98 \\
                 Linear recurrences 99 \\
                 Using a binary stream of key for encipherment 100 \\
                 Binary linear sequences as key generators 101 \\
                 Cryptanalysis of a linear recurrence 104 \\
                 Improving the security of binary keys 104 \\
                 Pseudo-random number generators 106 \\
                 The mid-square method 106 \\
                 Linear congruential generators 107 \\
                 Chapter 9. The Enigma cipher machine 110 \\
                 Historical background 110 \\
                 The original Enigma 112 \\
                 Encipherment using wired wheels 116 \\
                 Encipherment by the Enigma 118 \\
                 The Enigma plugboard 121 \\
                 The Achilles heel of the Enigma 121 \\
                 The indicator `chains' in the Enigma 125 \\
                 Aligning the chains 128 \\
                 Identifying RI and its setting 128 \\
                 Doubly-enciphered Enigma messages 132 \\
                 The Abwehr Enigma 132 \\
                 Chapter 10. The Hagelin cipher machine 133 \\
                 Historical background 133 \\
                 Structure of the Hagelin machine 134 \\
                 Encipherment on the Hagelin 135 \\
                 Choosing the cage for the Hagelin 138 \\
                 The theoretical `work factor' for the Hagelin 142 \\
                 Solving the Hagelin from a stretch of keys 143 \\
                 Additional features of the Hagelin machine 147 \\
                 The slide 147 \\
                 Identifying the slide in a cipher message 148 \\
                 Overlapping 148 \\
                 Solving the Hagelin from cipher texts only 150 \\
                 Chapter 11. Beyond the Enigma 153 \\
                 The SZ42: a pre-electronic machine 153 \\
                 Description of the 742 machine 155 \\
                 Encipherment on the SZ42 155 \\
                 Breaking and setting the 5Z42 158 \\
                 Modifications to the SZ42 159 \\
                 Chapter 12. Public key cryptography 161 \\
                 Historical background 161 \\
                 Security issues 163 \\
                 Protection of programs and data 163 \\
                 Encipherment of programs, data and messages 164 \\
                 The key distribution problem 166 \\
                 The Difie-Hellman key exchange system 166 \\
                 Strength of the Diffie--Hellman system 168 \\
                 Chapter 13. Encipherment and the Internet 170 \\
                 Generalisation of simple substitution 170 \\
                 Factorisation of large integers 171 \\
                 The standard method of factorisation 172 \\
                 Fermat's ``Little (????) Theorem'' 174 \\
                 The Fermat-Euler Theorem (as needed in the RSA system)
                 175 \\
                 Encipherment and decipherment keys in the RSA system
                 175 \\
                 The encipherment and decipherment processes in the RSA
                 system 178 \\
                 How does the key-owner reply to correspondents? 182 \\
                 The Data Encryption Standard (DES) 183 \\
                 Security of the DES 184 \\
                 Chaining 186 \\
                 Implementation of the DES 186 \\
                 Using both RSA and DES 186 \\
                 A salutary note 187 \\
                 Beyond the DES 187 \\
                 Authentication and signature verification 188 \\
                 Elliptic curve cryptography 189 \\
                 Appendix 190 \\
                 Solutions to problems 218 \\
                 References 230 \\
                 Name index 235 \\
                 Subject index 237.",
}

@Article{Cimato:2002:DAP,
  author =       "Stelvio Cimato",
  title =        "Design of an Authentication Protocol for {Gsm
                 Javacards}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2288",
  pages =        "355--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:14 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2288.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2288/22880355.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2288/22880355.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Clarke:2002:ASA,
  author =       "N. L. Clarke and S. M. Furnell and P. M. Rodwell and
                 P. L. Reynolds",
  title =        "Acceptance of Subscriber Authentication Methods For
                 Mobile Telephony Devices",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "220--228",
  day =          "1",
  month =        jun,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802003048",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Clarke:2002:UCP,
  author =       "Dwaine Clarke and Blaise Gassend and Thomas Kotwal and
                 Matt Burnside and Marten van Dijk and Srinivas Devadas
                 and Ronald Rivest",
  title =        "The Untrusted Computer Problem and Camera-Based
                 Authentication",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2414",
  pages =        "114--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:20 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2414.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2414/24140114.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2414/24140114.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Cochran:2002:NVSb,
  author =       "Shannon Cochran",
  title =        "News and Views: {School of Adaptive Computer
                 Training}; It Seems Like Yesterday\ldots{} [10th
                 anniversary of the first {Web} site]; Double-Gate
                 Transistor Breakthrough; {802.11g Standard} Proposed;
                 30th Anniversary of the [{Intel}] 4004; {DeCSS} Legal
                 Decisions",
  journal =      j-DDJ,
  volume =       "27",
  number =       "2",
  pages =        "18--18",
  month =        feb,
  year =         "2002",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Tue Feb 12 05:21:41 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Cochran:2002:NVW,
  author =       "Shannon Cochran",
  title =        "News and Views: {WaSP} [{Web Standards Project}]
                 Buzzes Off; {Eclipse Project} on the Horizon;
                 Semiconductor Roadmap: Ramping Up, Scaling Down; {AES}
                 [{Advanced Encryption Standard}]: Its Finally Official;
                 {SMS} [{Short Message Service}] Shines On;
                 {Berners-Lee} Awarded {Japan Prize}",
  journal =      j-DDJ,
  volume =       "27",
  number =       "3",
  pages =        "14--14",
  month =        mar,
  year =         "2002",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Tue Feb 12 05:21:42 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Collberg:2002:WTP,
  author =       "C. S. Collberg and C. Thomborson",
  title =        "Watermarking, tamper-proofing, and obfuscation ---
                 tools for software protection",
  journal =      j-IEEE-TRANS-SOFTW-ENG,
  volume =       "28",
  number =       "8",
  pages =        "735--746",
  month =        aug,
  year =         "2002",
  CODEN =        "IESEDJ",
  DOI =          "https://doi.org/10.1109/TSE.2002.1027797",
  ISSN =         "0098-5589 (print), 1939-3520 (electronic)",
  ISSN-L =       "0098-5589",
  bibdate =      "Thu Feb 1 11:00:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1027797",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Software Engineering",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32",
}

@Article{Cook:2002:REJ,
  author =       "Jonathan J. Cook",
  title =        "Reverse Execution of {Java} Bytecode",
  journal =      j-COMP-J,
  volume =       "45",
  number =       "6",
  pages =        "608--619",
  month =        "????",
  year =         "2002",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Nov 6 11:21:54 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_45/Issue_06/",
  URL =          "http://www3.oup.co.uk/computer_journal/hdb/Volume_45/Issue_06/450608.sgm.abs.html;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_45/Issue_06/pdf/450608.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@InProceedings{Coppersmith:2002:CSC,
  author =       "Don Coppersmith and Shai Halevi and Charanjit Jutla",
  title =        "Cryptanalysis of Stream Ciphers with Linear Masking",
  crossref =     "Yung:2002:ACC",
  pages =        "515--532",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420515.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420515.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Book{Cornea:2002:SCI,
  author =       "Marius Cornea and John Harrison and Ping Tak Peter
                 Tang",
  title =        "Scientific computing on {Itanium}-based systems",
  publisher =    pub-INTEL,
  address =      pub-INTEL:adr,
  pages =        "xvii + 406",
  year =         "2002",
  ISBN =         "0-9712887-7-1",
  ISBN-13 =      "978-0-9712887-7-5",
  LCCN =         "QA76.8.I83 C67 2002",
  bibdate =      "Sat Dec 06 15:02:26 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$69.95",
  URL =          "http://www.intel.com/intelpress/sum_scientific.htm",
  abstract =     "Written for professionals who need to write, port, or
                 maintain reliable, accurate, and efficient numerical
                 software for the Itanium architecture, Scientific
                 Computing on Itanium-based Systems shows you how to
                 construct key numerical infrastructure and application
                 programs.\par

                 This book describes the crucial techniques required for
                 stability and reliability in developing numerical
                 kernels and applications. Through numerous tested
                 examples, the authors explain how you can get the most
                 from the 64-bit architecture. This combination of
                 explanation with example helps you to make difficult
                 computations more easily and to increase the
                 performance of your numerical software.\par

                 This book provides examples to solve problems
                 encountered in scientific and engineering computations,
                 such as:\par

                 * Polynomial evaluation\\
                 * Complex arithmetic\\
                 * Quad-precision arithmetic\\
                 * Software pipelining, to include register rotation and
                 modulo-scheduled loop support\\
                 * SIMD instructions\\
                 * Interval arithmetic\\
                 * Fast-Fourier Transformation (FFT) algorithms\\
                 * Numerical linear algebra and basic linear algebra
                 subprograms(BLAS)\\
                 * Vector Math Library (VML)\\
                 * Cryptography",
  acknowledgement = ack-nhfb,
}

@InProceedings{Coron:2002:SPP,
  author =       "Jean-S{\'e}bastien Coron",
  title =        "Security Proof for Partial-Domain Hash Signature
                 Schemes",
  crossref =     "Yung:2002:ACC",
  pages =        "613--626",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420613.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420613.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@InProceedings{Coron:2002:UPS,
  author =       "Jean-S{\'e}bastien Coron and Marc Joye and David
                 Naccache and Pascal Paillier",
  title =        "Universal Padding Schemes for {RSA}",
  crossref =     "Yung:2002:ACC",
  pages =        "226--241",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420226.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420226.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Courtois:2002:CBC,
  author =       "Nicolas T. Courtois and Josef Pieprzyk",
  title =        "Cryptanalysis of Block Ciphers with Overdefined
                 Systems of Equations",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "267--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://eprint.iacr.org/2002/044/;
                 http://link.springer.de/link/service/series/0558/bibs/2501/25010267.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010267.pdf",
  abstract =     "Several recently proposed ciphers are built with
                 layers of small S-boxes, interconnected by linear
                 key-dependent layers. Their security relies on the
                 fact, that the classical methods of cryptanalysis (e.g.
                 linear or differential attacks) are based on
                 probabilistic characteristics, which makes their
                 security grow exponentially with the number of rounds
                 Nr.\par

                 In this paper we study the security of such ciphers
                 under an additional hypothesis: the S-box can be
                 described by an overdefined system of algebraic
                 equations (true with probability 1). We show that this
                 hypothesis is true for both Serpent (due to a small
                 size of S-boxes) and Rijndael (due to unexpected
                 algebraic properties).\par

                 We study general methods known for solving overdefined
                 systems of equations, such as XL from Eurocrypt'00, and
                 show their inefficiency. Then we introduce a new method
                 called XSL that uses the sparsity of the equations and
                 their specific structure.\par

                 The XSL attack is very powerful, but heuristic and it
                 is very difficult to evaluate its complexity. The XSL
                 attack has a parameter P, and in theory we show that P
                 should be a constant. The XSL attack would then be
                 polynomial in Nr, with a huge constant that is
                 double-exponential in the size of the S-box.\par

                 We demonstrated by computer simulations that the XSL
                 attack works well enough on a toy cipher. It seems
                 however that P will rather increase very slowly with
                 Nr. More simulations are needed for bigger
                 ciphers.\par

                 Our optimistic evaluation shows that the XSL attack
                 might be able to break Rijndael 256 bits and Serpent
                 for key lengths 192 and 256 bits. However if only $P$
                 is increased by 2 (respectively 4) the XSL attack on
                 Rijndael (respectively Serpent) would become slower
                 than the exhaustive search. At any rate, it seems that
                 the security of these ciphers does NOT grow
                 exponentially with the number of rounds.",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
  keywords =     "secret-key cryptography / block ciphers; AES;
                 Rijndael; Square; Serpent; Camellia; multivariate
                 quadratic equations; MQ problem; overdefined systems of
                 multivariate equations; XL algorithm; Gr{\"o}bner
                 bases; sparse multivariate polynomials.",
}

@Book{Cox:2002:DW,
  author =       "Ingemar J. Cox and Matthew L. Miller and Jeffrey A.
                 Bloom",
  title =        "Digital watermarking",
  publisher =    pub-MORGAN-KAUFMANN-SF,
  address =      pub-MORGAN-KAUFMANN-SF:adr,
  pages =        "xxv + 542",
  year =         "2002",
  ISBN =         "1-55860-714-5",
  ISBN-13 =      "978-1-55860-714-9",
  LCCN =         "QA76.9.A25 C69 2002",
  bibdate =      "Thu Jan 31 05:30:58 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "Morgan Kaufmann series in multimedia information and
                 systems",
  acknowledgement = ack-nhfb,
}

@Article{Cox:2002:FYE,
  author =       "Ingemar J. Cox and Matt L. Miller",
  title =        "The First 50 Years of Electronic Watermarking",
  journal =      j-EURASIP-J-APPL-SIG-PROC,
  volume =       "2",
  number =       "1",
  pages =        "126--132",
  month =        jan,
  year =         "2002",
  ISSN =         "1110-8657",
  bibdate =      "Mon Jun 22 15:11:54 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://delivery.acm.org/10.1145/1290000/1283114/p126-cox.pdf",
  abstract =     "Electronic watermarking can be traced back as far as
                 1954. The last 10 years has seen considerable interest
                 in digital watermarking, due, in large part, to
                 concerns about illegal piracy of copyrighted content.
                 In this paper, we consider the following questions: is
                 the interest warranted? What are the commercial
                 applications of the technology? What scientific
                 progress has been made in the last 10 years? What are
                 the most exciting areas for research? And where might
                 the next 10 years take us? In our opinion, the interest
                 in watermarking is appropriate. However, we expect that
                 copyright applications will be overshadowed by
                 applications such as broadcast monitoring,
                 authentication, and tracking content distributed within
                 corporations. We further see a variety of applications
                 emerging that add value to media, such as annotation
                 and linking content to the Web. These latter
                 applications may turn out to be the most compelling.
                 Considerable progress has been made toward enabling
                 these applications-perceptual modelling, security
                 threats and countermeasures, and the development of a
                 bag of tricks for efficient implementations. Further
                 progress is needed in methods for handling geometric
                 and temporal distortions. We expect other exciting
                 developments to arise from research in informed
                 watermarking.",
  acknowledgement = ack-nhfb,
}

@InProceedings{Cox:2002:SP9,
  author =       "Russ Cox and Eric Grosse and Rob Pike and Dave
                 Presotto and Sean Quinlan",
  title =        "Security in {Plan 9}",
  crossref =     "USENIX:2002:PUS",
  pages =        "3--16",
  year =         "2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/plan9.bib",
  URL =          "http://plan9.bell-labs.com/sys/doc/auth.pdf;
                 http://www.usenix.org/publications/library/proceedings/sec02/cox.html",
  abstract =     "The security architecture of the Plan 9 operating
                 system has recently been redesigned to address some
                 technical shortcomings. This redesign provided an
                 opportunity also to make the system more convenient to
                 use securely. Plan 9 has thus improved in two ways not
                 usually seen together: it has become more secure {\em
                 and\/} easier to use.\par

                 The central component of the new architecture is a
                 per-user self-contained agent called {\tt factotum}.
                 {\tt Factotum} securely holds a copy of the user's keys
                 and negotiates authentication protocols, on behalf of
                 the user, with secure services around the network.
                 Concentrating security code in a single program offers
                 several advantages including: ease of update or repair
                 to broken security software and protocols; the ability
                 to run secure services at a lower privilege level;
                 uniform management of keys for all services; and an
                 opportunity to provide single sign on, even to
                 unchanged legacy applications. {\tt Factotum} has an
                 unusual architecture: it is implemented as a Plan 9
                 file server.",
  annote =       "Best conference paper award.",
}

@InProceedings{Cramer:2002:OBB,
  author =       "Ronald Cramer and Serge Fehr",
  title =        "Optimal Black-Box Secret Sharing over Arbitrary
                 {Abelian} Groups",
  crossref =     "Yung:2002:ACC",
  pages =        "272--287",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420272.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420272.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Cramer:2002:UHP,
  author =       "Ronald Cramer and Victor Shoup",
  title =        "Universal Hash Proofs and a Paradigm for Adaptive
                 Chosen Ciphertext Secure Public-Key Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2332",
  pages =        "45--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:37 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2332.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2332/23320045.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2332/23320045.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Crawford:2002:FEE,
  author =       "Diane Crawford and Srinivas Nedunuri and Adrian Bowyer
                 and Arnd Weber and Greg A. Woods and Mark Adler",
  title =        "Forum: Embrace the Engineering Metaphor; Credit for
                 Crypto's Parallel Development; Enough {PDF}: Give me
                 {HTML}",
  journal =      j-CACM,
  volume =       "45",
  number =       "8",
  pages =        "11--14",
  month =        aug,
  year =         "2002",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 1 07:05:19 MDT 2002",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Crosby:2002:CHB,
  author =       "Scott Crosby and Ian Goldberg and Robert Johnson and
                 Dawn Song and David Wagner",
  title =        "A Cryptanalysis of the High-Bandwidth Digital Content
                 Protection System",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2320",
  pages =        "192--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:30 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2320.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2320/23200192.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2320/23200192.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Crowley:2002:BLS,
  author =       "Paul Crowley and Stefan Lucks",
  title =        "Bias in the {LEVIATHAN} Stream Cipher",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2355",
  pages =        "211--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:48 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2355.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2355/23550211.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2355/23550211.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Czumaj:2002:PTA,
  author =       "Artur Czumaj and Andrzej Lingas and Hairong Zhao",
  title =        "Polynomial-Time Approximation Schemes for the
                 {Euclidean} Survivable Network Design Problem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2380",
  pages =        "973--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:00 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2380.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2380/23800973.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2380/23800973.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Daemen:2002:AWT,
  author =       "Joan Daemen and Vincent Rijmen",
  title =        "{AES} and the Wide Trail Design Strategy",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2332",
  pages =        "108--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:37 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2332.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2332/23320108.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2332/23320108.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Daemen:2002:DRA,
  author =       "Joan Daemen and Vincent Rijmen",
  title =        "The Design of {Rijndael}: {AES} -- The {Advanced
                 Encryption Standard}",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xvii + 238",
  year =         "2002",
  DOI =          "https://doi.org/10.1007/978-3-662-04722-4",
  ISBN =         "3-642-07646-7, 3-662-04722-5 (e-book)",
  ISBN-13 =      "978-3-642-07646-6, 978-3-662-04722-4 (e-book)",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "QA76.9.A25",
  bibdate =      "Sat Jun 10 08:35:19 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "Information Security and Cryptography",
  URL =          "http://www.springerlink.com/content/978-3-662-04722-4",
  abstract =     "In October 2000, the US National Institute of
                 Standards and Technology selected the block cipher
                 Rijndael as the Advanced Encryption Standard (AES). AES
                 is expected to gradually replace the present Data
                 Encryption Standard (DES) as the most widely applied
                 data encryption technology. This book by the designers
                 of the block cipher presents Rijndael from scratch. The
                 underlying mathematics and the wide trail strategy as
                 the basic design idea are explained in detail and the
                 basics of differential and linear cryptanalysis are
                 reworked. Subsequent chapters review all known attacks
                 against the Rijndael structure and deal with
                 implementation and optimization issues. Finally, other
                 ciphers related to Rijndael are presented. This volume
                 is THE authoritative guide to the Rijndael algorithm
                 and AES. Professionals, researchers, and students
                 active or interested in data encryption will find it a
                 valuable source of information and reference.",
  acknowledgement = ack-nhfb,
  subject =      "Advanced Encryption Standard; Data Encryption
                 Standard; Computer science; Computer Communication
                 Networks; Data protection; Data encryption (Computer
                 science); Computer software",
  tableofcontents = "1. The Advanced Encryption Standard Process \\
                 2. Preliminaries \\
                 3. Specification of Rijndael \\
                 4. Implementation Aspects \\
                 5. Design Philosophy \\
                 6. The Data Encryption Standard \\
                 7. Correlation Matrices \\
                 8. Difference Propagation \\
                 9. The Wide Trail Strategy \\
                 10. Cryptanalysis \\
                 11. Related Block Ciphers \\
                 Appendices \\
                 A. Propagation Analysis in Galois Fields \\
                 A.1.1 Difference Propagation \\
                 A.l.2 Correlation \\
                 A. 1.4 Functions that are Linear over GF(2) \\
                 A.2.1 Difference Propagation \\
                 A.2.2 Correlation \\
                 A.2.4 Functions that are Linear over GF(2) \\
                 A.3.3 Dual Bases \\
                 A.4.2 Relationship Between Trace Patterns and Selection
                 Patterns \\
                 A.4.4 Illustration \\
                 A.5 Rijndael-GF \\
                 B. Trail Clustering \\
                 B.1 Transformations with Maximum Branch Number \\
                 B.2 Bounds for Two Rounds \\
                 B.2.1 Difference Propagation \\
                 B.2.2 Correlation \\
                 B.3 Bounds for Four Rounds \\
                 B.4 Two Case Studies \\
                 B.4.1 Differential Trails \\
                 B.4.2 Linear Trails \\
                 C. Substitution Tables \\
                 C.1 SRD \\
                 C.2 Other Tables \\
                 C.2.1 xtime \\
                 C.2.2 Round Constants \\
                 D. Test Vectors \\
                 D.1 KeyExpansion \\
                 D.2 Rijndael(128,128) \\
                 D.3 Other Block Lengths and Key Lengths \\
                 E. Reference Code",
}

@Article{Dalkilic:2002:CPF,
  author =       "Mehmet Emin Dalkili{\c{c}} and G{\"o}khan
                 Dalkili{\c{c}}",
  title =        "On the Cryptographic Patterns and Frequencies in
                 {Turkish} Language",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2457",
  pages =        "144--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2457.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2457/24570144.htm;
                 http://link.springer.de/link/service/series/0558/papers/2457/24570144.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Damgaard:2002:EPF,
  author =       "Ivan Damg{\aa}rd and Jesper Buus Nielsen",
  title =        "Expanding Pseudorandom Functions; or: From
                 Known-Plaintext Security to Chosen-Plaintext Security",
  crossref =     "Yung:2002:ACC",
  pages =        "449--464",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@InProceedings{Damgaard:2002:PHP,
  author =       "Ivan Damg{\aa}rd and Jesper Buus Nielsen",
  title =        "Perfect Hiding and Perfect Binding Universally
                 Composable Commitment Schemes with Constant Expansion
                 Factor",
  crossref =     "Yung:2002:ACC",
  pages =        "581--596",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420565.htm;
                 http://link.springer.de/link/service/series/0558/bibs/2442/24420581.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420565.pdf;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420581.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Danas:2002:CUS,
  author =       "George Danas",
  title =        "On a cryptosystem using simple continued fractions",
  journal =      "Math. Sci. Res. J.",
  volume =       "6",
  number =       "3",
  pages =        "168--173",
  year =         "2002",
  ISSN =         "1537-5978",
  MRclass =      "68P25 (11T71 14G50 94A60)",
  MRnumber =     "1 902 656",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Mathematical Sciences Research Journal. An
                 International Journal of Rapid Publication",
}

@Article{Dang:2002:EPT,
  author =       "Zhe Dang and Oscar H. Ibarra and Zhi-Wei Sun",
  title =        "On the Emptiness Problem for Two-Way {NFA} with One
                 Reversal-Bounded Counter",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2518",
  pages =        "103--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:58:01 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2518.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2518/25180103.htm;
                 http://link.springer.de/link/service/series/0558/papers/2518/25180103.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Debaert:2002:RRI,
  author =       "Christophe Debaert and Henri Gilbert",
  title =        "The {RIPEMD} and {RIPEMD} Improved Variants of {MD4}
                 Are Not Collision Free",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2355",
  pages =        "52--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:48 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2355.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2355/23550052.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2355/23550052.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Delbourg:2002:JBC,
  author =       "D. Delbourg and G. Penillault and T. K. Tuong and M.
                 Decourt and N. Borome and H. Harroch and B. Lessellier
                 and B. Waast and J. P. Mouffron",
  title =        "A {Java}-based control system for the {Orsay} tandem
                 accelerator",
  journal =      j-PRAMANA,
  volume =       "59",
  number =       "6",
  publisher =    "Indian Academy of Sciences",
  pages =        "1025--1034",
  year =         "2002",
  CODEN =        "PRAMCI",
  ISSN =         "0304-4289",
  bibdate =      "Tue Jan 14 08:59:22 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 Ingenta database",
  acknowledgement = ack-nhfb,
  fjournal =     "Pramana: Journal of Physics",
  journal-URL =  "http://www.springerlink.com/content/0304-4289",
}

@Book{Delfs:2002:ICP,
  author =       "Hans Delfs and Helmut Knebl",
  title =        "Introduction to Cryptography: Principles and
                 Applications",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiv + 310",
  year =         "2002",
  DOI =          "https://doi.org/10.1007/978-3-642-87126-9",
  ISBN =         "3-642-87126-7 (e-book), 3-642-87128-3",
  ISBN-13 =      "978-3-642-87126-9 (e-book), 978-3-642-87128-3",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "QA76.9.A25",
  bibdate =      "Sat Jun 10 08:35:18 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Information Security and Cryptography",
  URL =          "http://www.springerlink.com/content/978-3-642-87126-9",
  abstract =     "Due to the rapid growth of digital communication and
                 electronic data exchange, information security has
                 become a crucial issue in industry, business, and
                 administration. Modern cryptography provides essential
                 techniques for securing information and protecting
                 data. In the first part, this book covers the key
                 concepts of cryptography on an undergraduate level,
                 from encryption and digital signatures to cryptographic
                 protocols. Essential techniques are demonstrated in
                 protocols for key exchange, user identification,
                 electronic elections and digital cash. In the second
                 part, more advanced topics are addressed, such as the
                 bit security of one-way functions and computationally
                 perfect pseudorandom bit generators. The security of
                 cryptographic schemes is a central topic. Typical
                 examples of provably secure encryption and signature
                 schemes and their security proofs are given. Though
                 particular attention is given to the mathematical
                 foundations, no special background in mathematics is
                 presumed. The necessary algebra, number theory and
                 probability theory are included in the appendix. Each
                 chapter closes with a collection of exercises. The
                 second edition contains corrections, revisions and new
                 material, including a complete description of the AES,
                 an extended section on cryptographic hash functions, a
                 new section on random oracle proofs, and a new section
                 on public-key encryption schemes that are provably
                 secure against adaptively-chosen-ciphertext attacks.",
  acknowledgement = ack-nhfb,
  subject =      "Computer science; Data encryption (Computer science);
                 Coding theory; Coding theory; Computer science; Data
                 encryption (Computer science)",
  tableofcontents = "1. Introduction \\
                 1.1 Encryption and Secrecy \\
                 1.2 The Objectives of Cryptography \\
                 1.3 Attacks \\
                 1.4 Cryptographic Protocols \\
                 1.5 Provable Security \\
                 2. Symmetric-Key Encryption \\
                 2.1 Stream Ciphers \\
                 2.2 Block Ciphers \\
                 3. Public-Key Cryptography \\
                 3.1 The Concept of Public-Key Cryptography \\
                 3.2 Modular Arithmetic \\
                 3.3 RSA \\
                 3.4 Hash Functions \\
                 3.5 The Discrete Logarithm \\
                 3.6 Modular Squaring \\
                 4. Cryptographic Protocols \\
                 4.1 Key Exchange and Entity Authentication \\
                 4.2 Identification Schemes \\
                 4.3 Commitment Schemes \\
                 4.4 Electronic Elections \\
                 4.5 Digital Cash \\
                 5. Probabilistic Algorithms \\
                 5.1 Coin-Tossing Algorithms \\
                 5.2 Monte Carlo and Las Vegas Algorithms \\
                 6. One-Way Functions and the Basic Assumptions \\
                 6.1 A Notation for Probabilities \\
                 6.2 Discrete Exponential Function \\
                 6.3 Uniform Sampling Algorithms \\
                 6.4 Modular Powers \\
                 6.5 Modular Squaring \\
                 6.6 Quadratic Residuosity Property \\
                 6.7 Formal Definition of One-Way Functions \\
                 6.8 Hard-Core Predicates \\
                 7. Bit Security of One-Way Functions \\
                 7.1 Bit Security of the Exp Family \\
                 7.2 Bit Security of the RSA Family \\
                 7.3 Bit Security of the Square Family \\
                 8. One-Way Functions and Pseudorandomness \\
                 8.1 Computationally Perfect Pseudorandom Bit Generators
                 \\
                 8.2 Yao's Theorem \\
                 9. Provably Secure Encryption \\
                 9.1 Classical Information-Theoretic Security \\
                 9.2 Perfect Secrecy and Probabilistic Attacks \\
                 9.3 Public-Key One-Time Pads \\
                 9.4 Computationally Secret Encryption Schemes \\
                 9.5 Unconditional Security of Cryptosystems \\
                 10. Provably Secure Digital Signatures \\
                 10.1 Attacks and Levels of Security \\
                 10.2 Claw-Free Pairs and Collision-Resistant Hash
                 Functions \\
                 10.3 Authentication-Tree-Based Signatures \\
                 10.4 A State-Free Signature Scheme \\
                 A. Algebra and Number Theory \\
                 A.1 The Integers \\
                 A.2 Residues \\
                 A.3 The Chinese Remainder Theorem \\
                 A.4 Primitive Roots and the Discrete Logarithm \\
                 A.5 Quadratic Residues \\
                 A.6 Modular Square Roots \\
                 A.7 Primes and Primality Tests \\
                 B. Probabilities and Information Theory \\
                 B.1 Finite Probability Spaces and Random Variables \\
                 B.2 The Weak Law of Large Numbers \\
                 B.3 Distance Measures \\
                 B.4 Basic Concepts of Information Theory \\
                 References",
}

@Article{DeMatteis:2002:PP,
  author =       "A. {De Matteis} and S. Pagnutti",
  title =        "Pseudorandom permutation",
  journal =      j-J-COMPUT-APPL-MATH,
  volume =       "142",
  number =       "2",
  pages =        "367--375",
  day =          "15",
  month =        may,
  year =         "2002",
  CODEN =        "JCAMDI",
  DOI =          "https://doi.org/10.1016/S0377-0427(01)00425-3",
  ISSN =         "0377-0427 (print), 1879-1778 (electronic)",
  ISSN-L =       "0377-0427",
  bibdate =      "Tue Dec 27 06:57:58 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0377042701004253",
  abstract =     "A number-theoretical approach to the permutation of a
                 sequence of objects performed by means of a linear
                 congruential generator of pseudorandom numbers is
                 presented. A sufficient condition is found for
                 obtaining permutations with the property that each
                 object definitely abandons its initial position. Since
                 cryptography is among the possible applications, the
                 generator performing the inverse transformation is also
                 given.",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computational and Applied Mathematics",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03770427",
  keywords =     "congruential generators; cryptography;
                 multiplicative-additive generators; pseudorandom
                 numbers; random permutation; shuffling, inverse
                 permutation",
}

@Article{deWeger:2002:CRS,
  author =       "Benne de Weger",
  title =        "Cryptanalysis of {RSA} with small prime difference",
  journal =      j-APPL-ALGEBRA-ENG-COMMUN-COMPUT,
  volume =       "13",
  number =       "1",
  pages =        "17--28",
  year =         "2002",
  CODEN =        "AAECEW",
  ISSN =         "0938-1279 (print), 1432-0622 (electronic)",
  ISSN-L =       "0938-1279",
  MRclass =      "94A60",
  MRnumber =     "1 895 813",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Applicable Algebra in Engineering, Communication and
                 Computing",
}

@Article{Ding:2002:HEE,
  author =       "Yan Zong Ding and Michael O. Rabin",
  title =        "Hyper-Encryption and Everlasting Security",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2285",
  pages =        "1--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:12 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2285.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2285/22850001.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2285/22850001.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Dodis:2002:KIP,
  author =       "Yevgeniy Dodis and Jonathan Katz and Shouhuai Xu and
                 Moti Yung",
  title =        "Key-Insulated Public Key Cryptosystems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2332",
  pages =        "65--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:37 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2332.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2332/23320065.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2332/23320065.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Dodis:2002:NUO,
  author =       "Y. Dodis and J. Spencer",
  title =        "On the (non)universality of the one-time pad",
  crossref =     "IEEE:2002:PAI",
  pages =        "376--385",
  year =         "2002",
  bibdate =      "Fri Jul 15 16:13:02 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8411/26517/01181962.pdf?isnumber=26517&prod=CNF&arnumber=1181962&arSt=+376&ared=+385&arAuthor=Dodis%2C+Y.%3B+Spencer%2C+J.;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=26517&arnumber=1181962&count=82&index=38",
  acknowledgement = ack-nhfb,
}

@Article{Driscoll:2002:BER,
  author =       "Kevin Driscoll",
  title =        "{BeepBeep}: Embedded Real-Time Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2365",
  pages =        "164--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:52 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2365.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2365/23650164.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2365/23650164.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Ekert:2002:BTQ,
  author =       "Artur Ekert",
  title =        "{29. The Bell Theorem in quantum cryptography: Vortrag
                 am 14. November 2000}",
  crossref =     "Bertlmann:2002:QUB",
  pages =        "??--??",
  year =         "2002",
  bibdate =      "Thu Jun 14 06:45:11 2012",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/s/schroedinger-erwin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{England:2002:AOO,
  author =       "Paul England and Marcus Peinado",
  title =        "Authenticated Operation of Open Computing Devices",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2384",
  pages =        "346--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2384/23840346.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2384/23840346.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Erickson:2002:EDD,
  author =       "Jonathan Erickson",
  title =        "Editorial: Deciphering the Doors of Knowledge",
  journal =      j-DDJ,
  volume =       "27",
  number =       "4",
  pages =        "8--8",
  month =        apr,
  year =         "2002",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Tue Mar 5 07:08:41 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Ettinger:2002:QQC,
  author =       "Mark Ettinger",
  title =        "20 Questions, Quantum Computers, and Cryptography",
  journal =      j-LOS-ALAMOS-SCIENCE,
  volume =       "27",
  pages =        "46--51",
  year =         "2002",
  CODEN =        "LASCDI",
  ISSN =         "0273-7116",
  bibdate =      "Mon Apr 11 08:15:55 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Los Alamos Science",
  keywords =     "quantum cryptography",
}

@Article{Fan:2002:ETB,
  author =       "Lei Fan and Jian-Hua Li and Hong-Wen Zhu",
  title =        "An enhancement of timestamp-based password
                 authentication scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "7",
  pages =        "665--667",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802011185",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Feghali:2002:SAP,
  author =       "Wajdi Feghali and Brad Burres and Gilbert Wolrich and
                 Douglas Carrigan",
  title =        "Security: Adding Protection to the Network via the
                 Network Processor",
  journal =      j-INTEL-TECH-J,
  volume =       "6",
  number =       "3",
  pages =        "40--49",
  day =          "15",
  month =        aug,
  year =         "2002",
  ISSN =         "1535-766X",
  bibdate =      "Sun Nov 17 11:06:06 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://developer.intel.com/technology/itj/2002/volume06issue03/art02_security/p01_abstract.htm;
                 http://developer.intel.com/technology/itj/2002/volume06issue03/art02_security/vol6iss3_art02.pdf",
  keywords =     "3DES; AES; authentication; encryption; security;
                 SHA-1",
}

@InProceedings{Fehr:2002:LVD,
  author =       "Serge Fehr and Ueli Maurer",
  title =        "Linear {VSS} and Distributed Commitments Based on
                 Secret Sharing and Pairwise Checks",
  crossref =     "Yung:2002:ACC",
  pages =        "565--580",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420565.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420565.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Fernandes:2002:SAL,
  author =       "Savio Fernandes and KLM Reddy",
  title =        "Securing Applications on {Linux} with {PAM}",
  journal =      j-LINUX-J,
  volume =       "102",
  pages =        "??--??",
  month =        oct,
  year =         "2002",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Sat Apr 12 06:59:06 MDT 2003",
  bibsource =    "http://noframes.linuxjournal.com/lj-issues/issue102/index.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux-journal.bib",
  URL =          "http://www.linuxjournal.com/article.php?sid=5940",
  abstract =     "Make your new authentication technology work with
                 Linux applications or add standards-based
                 authentication to your new application.",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@TechReport{Filiol:2002:NST,
  author =       "Eric Filiol",
  title =        "A New Statistical Testing for Symmetric Ciphers and
                 Hash Functions",
  institution =  "ESAT --- Virology and Cryptology Lab",
  address =      "B.P. 18 35998 Rennes, FRANCE",
  pages =        "14",
  day =          "23",
  month =        jul,
  year =         "2002",
  bibdate =      "Mon Sep 16 06:46:47 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Cryptology ePrint Archive, Report 2002/099.",
  URL =          "http://eprint.iacr.org/2002/099/",
  abstract =     "This paper presents a new, powerful statistical
                 testing of symmetric ciphers and hash functions which
                 allowed us to detect biases in both of these systems
                 where previously known tests failed. We first give a
                 complete characterization of the Algebraic Normal Form
                 (ANF) of random Boolean functions by means of the
                 M{\"o}bius transform. Then we built a new testing based
                 on the comparison between the structure of the
                 different Boolean functions Algebraic Normal Forms
                 characterizing symmetric ciphers and hash functions and
                 those of purely random Boolean functions. Detailed
                 testing results on several cryptosystems are presented.
                 As a main result we show that AES, DES Snow and
                 Lili-128 fail all or part of the tests and thus present
                 strong biases.",
  acknowledgement = ack-nhfb,
  keywords =     "Boolean function; statistical testing; symmetric
                 cipher; randomness; hash function; M{\"o}bius
                 transform; Walsh Transform",
}

@Article{Finley:2002:BSE,
  author =       "Brian Elliott Finley",
  title =        "{BOEL}: a Small {Embedded Linux} with {PIC}
                 Libraries",
  journal =      j-EMBEDDED-LINUX-J,
  volume =       "8",
  pages =        "44--46",
  month =        mar # "\slash " # apr,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1534-083X",
  bibdate =      "Thu May 09 05:32:41 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux-journal.bib",
  URL =          "http://embedded.linuxjournal.com/magazine/issue08/;
                 http://www.linuxdevices.com/articles/AT2829528599.html",
  abstract =     "Brian's single-floppy Linux reveals software-shrinking
                 secrets of the Linux masters.",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
}

@Manual{FIPS:2002:KHM,
  author =       "{FIPS}",
  title =        "The {Keyed-Hash Message Authentication Code (HMAC)}",
  volume =       "198",
  organization = pub-NIST,
  address =      pub-NIST:adr,
  pages =        "vii + 13",
  day =          "6",
  month =        mar,
  year =         "2002",
  bibdate =      "Thu Aug 18 07:16:02 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "FIPS PUB",
  URL =          "http://csrc.nist.gov/publications/fips/fips198/fips-198a.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography; HMAC; MAC",
}

@Manual{FIPS:2002:SHS,
  author =       "{FIPS}",
  title =        "{Secure Hash Standard}",
  volume =       "180-2",
  organization = pub-NIST,
  address =      pub-NIST:adr,
  pages =        "iv + 79",
  day =          "1",
  month =        aug,
  year =         "2002",
  bibdate =      "Thu Aug 18 07:16:02 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "FIPS PUB",
  URL =          "http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography",
}

@Article{Fischer:2002:NFC,
  author =       "Wieland Fischer and Jean-Pierre Seifert",
  title =        "Note on Fast Computation of Secret {RSA} Exponents",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2384",
  pages =        "136--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2384/23840136.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2384/23840136.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Fluhrer:2002:CMB,
  author =       "Scott R. Fluhrer",
  title =        "Cryptanalysis of the Mercy Block Cipher",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2355",
  pages =        "28--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:48 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2355.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2355/23550028.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2355/23550028.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Fluhrer:2002:CSP,
  author =       "Scott R. Fluhrer",
  title =        "Cryptanalysis of the {SEAL 3.0} Pseudorandom Function
                 Family",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2355",
  pages =        "135--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:48 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2355.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2355/23550135.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2355/23550135.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Frankel:2002:ASD,
  author =       "Yair Frankel and Philip MacKenzie and Moti Yung",
  title =        "Adaptively secure distributed public-key systems",
  journal =      j-THEOR-COMP-SCI,
  volume =       "287",
  number =       "2",
  pages =        "535--561",
  month =        sep,
  year =         "2002",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Nov 20 18:08:58 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Frenkiel:2002:CCS,
  author =       "Michel Frenkiel and Paul Grison and Philippe
                 Laluyaux",
  title =        "{Clip Card}: {Smart Card} Based Traffic Tickets",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2456",
  pages =        "313--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:28 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2456.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2456/24560313.htm;
                 http://link.springer.de/link/service/series/0558/papers/2456/24560313.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@TechReport{Fuller:2002:LRA,
  author =       "Joanne Fuller and William Millan",
  title =        "On Linear Redundancy in the {AES} {S}-Box",
  type =         "Report",
  number =       "2002/111",
  institution =  "Cryptology ePrint Archive",
  year =         "2002",
  bibdate =      "Tue Sep 10 06:11:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://eprint.iacr.org/2002/111.ps;
                 http://eprint.iacr.org/2002/111.ps.gz;
                 http://eprint.iacr.org/2002/111/",
  abstract =     "We show the existence of a previously unknown linear
                 redundancy property of the only nonlinear component of
                 the AES block cipher. It is demonstrated that the
                 outputs of the 8*8 Rijndael s-box (based on inversion
                 in a finite field) are all equivalent under affine
                 transformation. The method used to discover these
                 affine relations is novel and exploits a new
                 fundamental result on the invariance properties of
                 local connection structure of affine equivalence
                 classes. As well as increasing existing concerns about
                 the security of the AES, these results may also have
                 serious consequences for many other ciphers recently
                 proposed for standardisation.",
  acknowledgement = ack-nhfb,
}

@Article{Furman:2002:DCN,
  author =       "Vladimir Furman",
  title =        "Differential Cryptanalysis of {Nimbus}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2355",
  pages =        "187--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:48 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2355.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2355/23550187.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2355/23550187.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Furuya:2002:SAK,
  author =       "Soichi Furuya",
  title =        "Slide Attacks with a Known-Plaintext Cryptanalysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2288",
  pages =        "214--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:14 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2288.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2288/22880214.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2288/22880214.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Galbraith:2002:PKS,
  author =       "S. Galbraith and J. Malone-Lee and N. P. Smart",
  title =        "Public key signatures in the multi-user setting",
  journal =      j-INFO-PROC-LETT,
  volume =       "83",
  number =       "5",
  pages =        "263--266",
  day =          "15",
  month =        sep,
  year =         "2002",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:29 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Book{Galbreath:2002:CID,
  author =       "Nicholas Galbreath",
  title =        "Cryptography for {Internet} and database applications:
                 developing secret and public key techniques with
                 {Java}",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "400",
  year =         "2002",
  ISBN =         "0-471-21029-3",
  ISBN-13 =      "978-0-471-21029-0",
  LCCN =         "QA76.9.A25 G35 2002",
  bibdate =      "Tue May 6 05:26:58 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography; database security;
                 Internet --- security measures; Java (computer program
                 language)",
}

@Book{Garfinkel:2002:WSP,
  author =       "Simson Garfinkel and Gene Spafford",
  title =        "{Web} Security, Privacy \& Commerce",
  publisher =    pub-ORA,
  address =      pub-ORA:adr,
  edition =      "Second",
  pages =        "xxviii + 756",
  year =         "2002",
  ISBN =         "0-596-00045-6",
  ISBN-13 =      "978-0-596-00045-5",
  LCCN =         "TK5105.59 .G37 2002 Stacks",
  bibdate =      "Wed Oct 30 16:15:17 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.oreilly.com/catalog/prdindex.html",
  price =        "US\$44.95",
  URL =          "http://safari.oreilly.com/0596000456;
                 http://www.oreilly.com/catalog/websec2",
  acknowledgement = ack-nhfb,
  keywords =     "computer networks --- security measures; Web sites ---
                 security measures; World Wide Web --- security
                 measures",
  publishersummary = "This much expanded new edition explores Web
                 security risks and how to minimize them. Aimed at Web
                 users, administrators, and content providers, Web
                 Security, Privacy & Commerce covers cryptography, SSL,
                 the Public Key Infrastructure, digital signatures,
                 digital certificates, privacy threats (cookies, log
                 files, Web logs, Web bugs), hostile mobile code, and
                 Web publishing (intellectual property, P3P, digital
                 payments, client-side digital signatures, code signing,
                 PICS).",
}

@Article{Gaudry:2002:CCS,
  author =       "Pierrick Gaudry",
  title =        "A Comparison and a Combination of {SST} and {AGM}
                 Algorithms for Counting Points of Elliptic Curves in
                 Characteristic $2$",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "311--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010311.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010311.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gennaro:2002:CPG,
  author =       "Rosario Gennaro and Daniele Micciancio",
  title =        "Cryptanalysis of a Pseudorandom Generator Based on
                 Braid Groups",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2332",
  pages =        "1--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:37 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2332.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2332/23320001.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2332/23320001.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Gennaro:2002:RSM,
  author =       "Rosario Gennaro and Yuval Ishai and Eyal Kushilevitz
                 and Tal Rabin",
  title =        "On $2$-Round Secure Multiparty Computation",
  crossref =     "Yung:2002:ACC",
  pages =        "178--193",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Gentry:2002:CRN,
  author =       "Craig Gentry and Mike Szydlo",
  title =        "Cryptanalysis of the Revised {NTRU} Signature Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2332",
  pages =        "299--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:37 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2332.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2332/23320299.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2332/23320299.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gentry:2002:HIB,
  author =       "Craig Gentry and Alice Silverberg",
  title =        "Hierarchical {ID}-Based Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "548--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010548.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010548.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gilbert:2002:CS,
  author =       "Henri Gilbert and Marine Minier",
  title =        "Cryptanalysis of {SFLASH}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2332",
  pages =        "288--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:37 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2332.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2332/23320288.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2332/23320288.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gilbert:2002:NRP,
  author =       "Henri Gilbert and Marine Minier",
  title =        "New Results on the Pseudorandomness of Some
                 Blockcipher Constructions",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2355",
  pages =        "248--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:48 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2355.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2355/23550248.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2355/23550248.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gilbert:2002:SCL,
  author =       "Gerald Gilbert and Michael Hamrick",
  title =        "Secrecy, Computational Loads and Rates in Practical
                 Quantum Cryptography",
  journal =      j-ALGORITHMICA,
  volume =       "34",
  number =       "4",
  pages =        "314--339",
  month =        nov,
  year =         "2002",
  CODEN =        "ALGOEJ",
  DOI =          "https://doi.org/10.1007/s00453-002-0977-2",
  ISSN =         "0178-4617 (print), 1432-0541 (electronic)",
  ISSN-L =       "0178-4617",
  MRclass =      "94A60 (68P25 68Q05 81P68 94-02)",
  MRnumber =     "MR1943510 (2004a:94041)",
  bibdate =      "Fri Jan 6 11:38:16 MST 2006",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0178-4617&volume=34&issue=4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/index-table-a.html#algorithmica;
                 MathSciNet database",
  note =         "Quantum computation and quantum cryptography",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0178-4617&volume=34&issue=4&spage=314",
  acknowledgement = ack-nhfb,
  fjournal =     "Algorithmica. An International Journal in Computer
                 Science",
  journal-URL =  "http://link.springer.com/journal/453",
  remark =       "Special issue on Quantum Algorithms and
                 Cryptography.",
}

@Article{Giles:2002:ADW,
  author =       "James Giles and Reiner Sailer and Dinesh Verma and
                 Suresh Chari",
  title =        "Authentication for Distributed {Web} Caches",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2502",
  pages =        "126--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:43 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2502.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2502/25020126.htm;
                 http://link.springer.de/link/service/series/0558/papers/2502/25020126.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gisin:2002:QC,
  author =       "Nicolas Gisin and Gr{\'e}goire Ribordy and Wolfgang
                 Tittel and Hugo Zbinden",
  title =        "Quantum cryptography",
  journal =      j-REV-MOD-PHYS,
  volume =       "74",
  number =       "1",
  pages =        "145--195",
  month =        jan,
  year =         "2002",
  CODEN =        "RMPHAT",
  DOI =          "https://doi.org/10.1103/RevModPhys.74.145",
  ISSN =         "0034-6861 (print), 1538-4527 (electronic), 1539-0756",
  ISSN-L =       "0034-6861",
  bibdate =      "Tue May 22 16:37:26 MDT 2012",
  bibsource =    "http://rmp.aps.org/toc/RMP/v74/i1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/revmodphys2000.bib",
  URL =          "http://link.aps.org/doi/10.1103/RevModPhys.74.145;
                 http://rmp.aps.org/abstract/RMP/v74/i1/p145_1",
  acknowledgement = ack-nhfb,
  fjournal =     "Reviews of Modern Physics",
  journal-URL =  "http://rmp.aps.org/browse",
  onlinedate =   "8 March 2002",
}

@Article{Gligor:2002:FEA,
  author =       "Virgil D. Gligor and Pompiliu Donescu",
  title =        "Fast Encryption and Authentication: {XCBC} Encryption
                 and {XECB} Authentication Modes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2355",
  pages =        "92--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:48 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2355.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2355/23550092.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2355/23550092.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Golic:2002:LCB,
  author =       "Jovan Dj. Goli{\'c} and Vittorio Bagini and Guglielmo
                 Morgari",
  title =        "Linear Cryptanalysis of {Bluetooth} Stream Cipher",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2332",
  pages =        "238--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:37 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2332.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2332/23320238.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2332/23320238.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gomulkiewicz:2002:HWA,
  author =       "Marcin Gomu{\l}kiewicz and Miros{\l}aw Kuty{\l}owski",
  title =        "{Hamming} Weight Attacks on Cryptographic Hardware ---
                 Breaking Masking Defense",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2502",
  pages =        "90--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:43 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2502.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2502/25020090.htm;
                 http://link.springer.de/link/service/series/0558/papers/2502/25020090.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Goodrich:2002:EDD,
  author =       "Michael T. Goodrich and Roberto Tamassia and Jasminka
                 Hasi{\'c}",
  title =        "An Efficient Dynamic and Distributed Cryptographic
                 Accumulator",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2433",
  pages =        "372--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:26 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2433.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2433/24330372.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2433/24330372.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gordon:2002:TCP,
  author =       "Andrew D. Gordon",
  title =        "Types for Cryptographic Protocols",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2421",
  pages =        "99--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:19 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2421.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2421/24210099.htm;
                 http://link.springer.de/link/service/series/0558/papers/2421/24210099.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Granboulan:2002:FDC,
  author =       "Louis Granboulan",
  title =        "Flaws in Differential Cryptanalysis of {Skipjack}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2355",
  pages =        "328--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:48 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2355.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2355/23550328.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2355/23550328.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Granboulan:2002:SSR,
  author =       "Louis Granboulan",
  title =        "Short Signatures in the Random Oracle Model",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "364--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010364.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010364.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Grembowski:2002:CAH,
  author =       "Tim Grembowski and Roar Lien and Kris Gaj and Nghi
                 Nguyen and Peter Bellows and Jaroslav Flidr and Tom
                 Lehman and Brian Schott",
  title =        "Comparative Analysis of the Hardware Implementations
                 of Hash Functions {SHA-1} and {SHA-512}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2433",
  pages =        "75--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:26 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2433.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2433/24330075.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2433/24330075.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gurgens:2002:APF,
  author =       "Sigrid G{\"u}rgens and Peter Ochsenschl{\"a}ger and
                 Carsten Rudolph",
  title =        "Authenticity and Provability --- {A} Formal
                 Framework",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2437",
  pages =        "227--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:24 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2437.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2437/24370227.htm;
                 http://link.springer.de/link/service/series/0558/papers/2437/24370227.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gutmann:2002:CFP,
  author =       "Peter Gutmann",
  title =        "Cover Feature: {PKI}: It's Not Dead, Just Resting",
  journal =      j-COMPUTER,
  volume =       "35",
  number =       "8",
  pages =        "41--49",
  month =        aug,
  year =         "2002",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Dec 12 19:53:31 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/dl/mags/co/2002/08/r8041.htm;
                 http://csdl.computer.org/dl/mags/co/2002/08/r8041.pdf;
                 http://www.computer.org/computer/co2002/r8041abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
  keywords =     "PKI (public key infrastructure)",
}

@PhdThesis{Gutmann:2002:DVC,
  author =       "Peter Gutmann",
  title =        "The Design and Verification of a Cryptographic
                 Security Architecture",
  school =       "Department of Computer Science, University of
                 Auckland, Private Bag 92019",
  address =      "Auckland, New Zealand",
  year =         "2002",
  bibdate =      "Thu Apr 04 07:25:57 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Published in book form \cite{Gutmann:2004:CSA}.",
  URL =          "http://www.cryptoengines.com/~peter/06_random.pdf;
                 http://www.cs.auckland.ac.nz/~pgut001/;
                 http://www.cs.auckland.ac.nz/~pgut001/pubs/thesis.html",
  acknowledgement = ack-nhfb,
}

@Article{Guttman:2002:ATS,
  author =       "Joshua D. Guttman and F. Javier Thayer",
  title =        "Authentication tests and the structure of bundles",
  journal =      j-THEOR-COMP-SCI,
  volume =       "283",
  number =       "2",
  pages =        "333--380",
  month =        jun,
  year =         "2002",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Nov 20 18:08:57 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@InProceedings{Hacigumus:2002:ESE,
  author =       "Hakan Hacig{\"u}m{\"u}{\c{s}} and Bala Iyer and Chen
                 Li and Sharad Mehrotra",
  title =        "Executing {SQL} over encrypted data in the
                 database-service-provider model",
  crossref =     "Franklin:2002:PAS",
  pages =        "216--227",
  year =         "2002",
  bibdate =      "Fri Oct 31 08:03:02 MST 2003",
  bibsource =    "http://www.acm.org/pubs/contents/proceedings/series/sigmod_pods/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Halevi:2002:SSE,
  author =       "Shai Halevi and Don Coppersmith and Charanjit Jutla",
  title =        "Scream: a Software-Efficient Stream Cipher",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2365",
  pages =        "195--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:52 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2365.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2365/23650195.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2365/23650195.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Halevy:2002:LBE,
  author =       "Dani Halevy and Adi Shamir",
  title =        "The {LSD} Broadcast Encryption Scheme",
  crossref =     "Yung:2002:ACC",
  pages =        "47--60",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420047.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420047.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Hamalainen:2002:GPS,
  author =       "Antti H{\"a}m{\"a}l{\"a}inen and Matti Tommiska and
                 Jorma Skytt{\"a}",
  title =        "6.78 Gigabits per Second Implementation of the {IDEA}
                 Cryptographic Algorithm",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2438",
  pages =        "760--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:28 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2438.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2438/24380760.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2438/24380760.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Han:2002:CMV,
  author =       "Daewan Han and Sangwoo Park and Seongtaek Chee",
  title =        "Cryptanalysis of the Modified Version of the Hash
                 Function Proposed at {PKC'98}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2365",
  pages =        "252--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:52 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2365.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2365/23650252.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2365/23650252.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Han:2002:DMA,
  author =       "Hong Han and Xian Liang Lu and Jun Lu and Chen Bo and
                 Ren Li Yong",
  title =        "Data mining aided signature discovery in network-based
                 intrusion detection system",
  journal =      j-OPER-SYS-REV,
  volume =       "36",
  number =       "4",
  pages =        "7--13",
  month =        oct,
  year =         "2002",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:53 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Han:2002:HEF,
  author =       "Guo Ping Han and Kai Quan Shi",
  title =        "Half-encryption and full-encryption of fuzzy
                 recognition",
  journal =      "J. Fuzzy Math.",
  volume =       "10",
  number =       "2",
  pages =        "385--397",
  year =         "2002",
  ISSN =         "1066-8950",
  MRclass =      "94A60",
  MRnumber =     "1 908 631",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  fjournal =     "Journal of Fuzzy Mathematics",
}

@Article{Hanaoka:2002:HNI,
  author =       "Goichiro Hanaoka and Tsuyoshi Nishioka and Yuliang
                 Zheng and Hideki Imai",
  title =        "A Hierarchical Non-interactive Key-Sharing Scheme with
                 Low Memory Size and High Resistance against Collusion
                 Attacks",
  journal =      j-COMP-J,
  volume =       "45",
  number =       "3",
  pages =        "293--303",
  month =        "????",
  year =         "2002",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri May 10 10:12:07 MDT 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_45/Issue_03/",
  URL =          "http://www3.oup.co.uk/computer_journal/hdb/Volume_45/Issue_03/450293.sgm.abs.html;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_45/Issue_03/pdf/450293.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Hanaoka:2002:USA,
  author =       "Goichiro Hanaoka and Junji Shikata and Yumiko Hanaoka
                 and Hideki Imai",
  title =        "Unconditionally Secure Anonymous Encryption and Group
                 Authentication",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "81--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010081.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010081.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hand:2002:MPP,
  author =       "Steven Hand and Timothy Roscoe",
  title =        "{Mnemosyne}: Peer-to-Peer Steganographic Storage",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2429",
  pages =        "130--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:21 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2429.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2429/24290130.htm;
                 http://link.springer.de/link/service/series/0558/papers/2429/24290130.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Haneberg:2002:MSS,
  author =       "Dominik Haneberg and Wolfgang Reif and Kurt Stenzel",
  title =        "A Method for Secure {Smartcard} Applications",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2422",
  pages =        "319--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:23 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2422.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2422/24220319.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2422/24220319.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Harbitter:2002:MAP,
  author =       "Alan Harbitter and Daniel A. Menasc{\'e}",
  title =        "A methodology for analyzing the performance of
                 authentication protocols",
  journal =      j-TISSEC,
  volume =       "5",
  number =       "4",
  pages =        "458--491",
  month =        nov,
  year =         "2002",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Aug 7 09:02:36 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Book{Hassler:2002:JCP,
  author =       "Vesna Hassler",
  title =        "{Java} card for e-payment applications",
  publisher =    pub-ARTECH,
  address =      pub-ARTECH:adr,
  pages =        "xvii + 362",
  year =         "2002",
  ISBN =         "1-58053-291-8",
  ISBN-13 =      "978-1-58053-291-4",
  LCCN =         "QA76.73.J38 J3638 2002",
  bibdate =      "Mon May 6 06:26:30 MDT 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "Artech House computer security series",
  acknowledgement = ack-nhfb,
  keywords =     "Java (computer program language); smart cards",
}

@Article{He:2002:WSM,
  author =       "Wei-Hua He",
  title =        "Weaknesses in some multisignature schemes for
                 specified group of verifiers",
  journal =      j-INFO-PROC-LETT,
  volume =       "83",
  number =       "2",
  pages =        "95--99",
  day =          "31",
  month =        jul,
  year =         "2002",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:29 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Henderson:2002:MTS,
  author =       "Marie Henderson and Robert Coulter and Ed Dawson and
                 Eiji Okamoto",
  title =        "Modelling Trust Structures for Public Key
                 Infrastructures",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2384",
  pages =        "56--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2384/23840056.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2384/23840056.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hernandez:2002:GCT,
  author =       "Julio C{\'e}sar Hern{\'a}ndez and Jos{\'e} Mar{\'\i}a
                 Sierra and Pedro Isasi and Arturo Ribagorda",
  title =        "Genetic Cryptoanalysis of Two Rounds {TEA}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2331",
  pages =        "1024--1031",
  year =         "2002",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/3-540-47789-6_108",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Feb 01 16:44:05 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.springerlink.com/content/0pa8nj982jewn9ev/",
  abstract =     "Distinguishing the output of a cryptographic primitive
                 such as a block cipher or a hash function from the
                 output of a random mapping seriously affects the
                 credibility of the primitive security, and defeats it
                 for many cryptographic applications. However, this is
                 usually a quite difficult task. In a previous work [1],
                 a new cryptoanalytic technique was presented and proved
                 useful in distinguishing a block cipher from a random
                 permutation in a completely automatic way. This
                 technique is based in the selection of the worst input
                 patterns for the block cipher with the aid of genetic
                 algorithms. The objective is to find which input
                 patters generate a significant deviation of the
                 observed output from the output we would expect from a
                 random permutation. In [1], this technique was applied
                 to the case of the block cipher TEA with 1 round. The
                 much harder problem of breaking TEA with 2 rounds is
                 successfully solved in this paper, where an efficient
                 distinguisher is also presented.",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
  remark =       "ICCS 2002",
}

@Article{Herzberg:2002:SX,
  author =       "Amir Herzberg",
  title =        "Securing {XML}",
  journal =      j-DDJ,
  volume =       "27",
  number =       "3",
  pages =        "56, 59--62",
  month =        mar,
  year =         "2002",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Tue Feb 12 05:21:42 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/ftp/2002/2002_03/secxml.txt",
  abstract =     "Amir examines several proposed XML security
                 mechanisms, including XML Digital Signatures and XML
                 Encryption. Additional resources include {\tt
                 secxml.txt} (listings). WORKBENCH",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Hevia:2002:PSG,
  author =       "Alejandro Hevia and Daniele Micciancio",
  title =        "The Provable Security of Graph-Based One-Time
                 Signatures and Extensions to Algebraic Signature
                 Schemes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "379--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010379.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010379.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hitchcock:2002:NEC,
  author =       "Yvonne Hitchcock and Paul Montague",
  title =        "A New Elliptic Curve Scalar Multiplication Algorithm
                 to Resist Simple Power Analysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2384",
  pages =        "214--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2384/23840214.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2384/23840214.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hong:2002:IDC,
  author =       "Deukjo Hong and Jaechul Sung and Shiho Moriai and
                 SangjinLee and Jongin Lim",
  title =        "Impossible Differential Cryptanalysis of {Zodiac}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2355",
  pages =        "300--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:48 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2355.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2355/23550300.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2355/23550300.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hong:2002:PSR,
  author =       "Seokhie Hong and Jaechul Sung and Sangjin Lee and
                 Jongin Lim and Jongsu Kim",
  title =        "Provable security for $ 13 $ round {Skipjack}-like
                 structure",
  journal =      j-INFO-PROC-LETT,
  volume =       "82",
  number =       "5",
  pages =        "243--246",
  day =          "15",
  month =        jun,
  year =         "2002",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:28 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@InProceedings{Hopper:2002:PSS,
  author =       "Nicholas J. Hopper and John Langford and Luis von
                 Ahn",
  title =        "Provably Secure Steganography: (Extended Abstract)",
  crossref =     "Yung:2002:ACC",
  pages =        "77--92",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420077.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420077.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Horwitz:2002:THI,
  author =       "Jeremy Horwitz and Ben Lynn",
  title =        "Toward Hierarchical Identity-Based Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2332",
  pages =        "466--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:37 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2332.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2332/23320466.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2332/23320466.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hsu:2002:IGT,
  author =       "Chien-Lung Hsu and Tzong-Sun Wu and Tzong-Chen Wu",
  title =        "Improvements of generalization of threshold signature
                 and authenticated encryption for group communications",
  journal =      j-INFO-PROC-LETT,
  volume =       "81",
  number =       "1",
  pages =        "41--45",
  day =          "16",
  month =        jan,
  year =         "2002",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "94A60 (94A62)",
  MRnumber =     "1 866 812",
  bibdate =      "Mon Jan 26 06:35:42 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190;
                 MathSciNet database",
  URL =          "http://www.elsevier.com/gej-ng/10/23/20/85/27/33/abstract.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Hughes:2002:LAA,
  author =       "James Hughes",
  title =        "A Linear Algebraic Attack on the {AAFG1} Braid Group
                 Cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2384",
  pages =        "176--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2384/23840176.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2384/23840176.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Humphries:2002:IC,
  author =       "Jeffrey W. Humphries and Martin C. Carlisle",
  title =        "Introduction to {Cryptography}",
  journal =      j-JERIC,
  volume =       "2",
  number =       "3",
  pages =        "2--2",
  month =        sep,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Journal on Educational Resources in Computing
                 (JERIC)",
}

@Article{Iglesias:2002:NSB,
  author =       "A. Iglesias",
  title =        "A New Scheme Based on Semiconductor Lasers with
                 Phase-Conjugate Feedback for Cryptographic
                 Communications",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2510",
  pages =        "135--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:47 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2510.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2510/25100135.htm;
                 http://link.springer.de/link/service/series/0558/papers/2510/25100135.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Inamori:2002:SPB,
  author =       "Hitoshi Inamori",
  title =        "Security of Practical {BB84} Quantum Key
                 Distribution",
  journal =      j-ALGORITHMICA,
  volume =       "34",
  number =       "4",
  pages =        "366--371",
  month =        nov,
  year =         "2002",
  CODEN =        "ALGOEJ",
  DOI =          "https://doi.org/10.1007/s00453-002-0984-3",
  ISSN =         "0178-4617 (print), 1432-0541 (electronic)",
  ISSN-L =       "0178-4617",
  MRclass =      "94A60 (68Q05 81P68 94A62)",
  MRnumber =     "MR1943512 (2004a:94048)",
  bibdate =      "Fri Jan 6 11:38:16 MST 2006",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0178-4617&volume=34&issue=4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/index-table-a.html#algorithmica;
                 MathSciNet database",
  note =         "Quantum computation and quantum cryptography",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0178-4617&volume=34&issue=4&spage=366",
  acknowledgement = ack-nhfb,
  fjournal =     "Algorithmica. An International Journal in Computer
                 Science",
  journal-URL =  "http://link.springer.com/journal/453",
  remark =       "Special issue on Quantum Algorithms and
                 Cryptography.",
}

@Article{Inamori:2002:SPT,
  author =       "Hitoshi Inamori",
  title =        "Security of Practical Time-Reversed {EPR} Quantum Key
                 Distribution",
  journal =      j-ALGORITHMICA,
  volume =       "34",
  number =       "4",
  pages =        "340--365",
  month =        nov,
  year =         "2002",
  CODEN =        "ALGOEJ",
  DOI =          "https://doi.org/10.1007/s00453-002-0983-4",
  ISSN =         "0178-4617 (print), 1432-0541 (electronic)",
  ISSN-L =       "0178-4617",
  MRclass =      "94A60 (68Q05 81P68 94A62)",
  MRnumber =     "MR1943511 (2003k:94029)",
  MRreviewer =   "Hoi-Kwong Lo",
  bibdate =      "Fri Jan 6 11:38:16 MST 2006",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0178-4617&volume=34&issue=4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/index-table-a.html#algorithmica;
                 MathSciNet database",
  note =         "Quantum computation and quantum cryptography",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0178-4617&volume=34&issue=4&spage=340",
  acknowledgement = ack-nhfb,
  fjournal =     "Algorithmica. An International Journal in Computer
                 Science",
  journal-URL =  "http://link.springer.com/journal/453",
  remark =       "Special issue on Quantum Algorithms and
                 Cryptography.",
}

@InProceedings{Itkis:2002:SSB,
  author =       "Gene Itkis and Leonid Reyzin",
  title =        "{SiBIR}: {Signer-Base Intrusion-Resilient}
                 Signatures",
  crossref =     "Yung:2002:ACC",
  pages =        "499--514",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420499.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420499.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Iwata:2002:NCP,
  author =       "Tetsu Iwata and Tomonobu Yoshino and Kaoru Kurosawa",
  title =        "Non-cryptographic Primitive for Pseudorandom
                 Permutation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2365",
  pages =        "149--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:52 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2365.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2365/23650149.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2365/23650149.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Jakimovski:2002:CS,
  author =       "Goce Jakimovski and Ljup{\v{c}}o Kocarev",
  title =        "Cryptanalysis of {SBLH}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2355",
  pages =        "144--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:48 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2355.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2355/23550144.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2355/23550144.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Jakobsson:2002:MAL,
  author =       "Markus Jakobsson and David Pointcheval",
  title =        "Mutual Authentication for Low-Power Mobile Devices",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2339",
  pages =        "178--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:40 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2339.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2339/23390178.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2339/23390178.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Jallad:2002:ICC,
  author =       "Kahil Jallad and Jonathan Katz and Bruce Schneier",
  editor =       "Lynn Batten and Jennifer Seberry",
  booktitle =    "Information security and privacy: 7th Australasian
                 conference, ACISP 2002, Melbourne, Australia, July
                 3--5, 2002: proceedings",
  title =        "Implementation of Chosen-Ciphertext Attacks against
                 {PGP} and {GnuPG}",
  volume =       "2384",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "??--??",
  year =         "2002",
  ISBN =         "3-540-43861-0",
  ISBN-13 =      "978-3-540-43861-8",
  LCCN =         "QA76.9.A25 A278 2002",
  bibdate =      "Thu Sep 12 16:25:57 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2433.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2433/24330090.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2433/24330090.pdf;
                 http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 http://www.counterpane.com/pgp-attack.html",
  acknowledgement = ack-nhfb,
  annote =       "Not shown in table of contents at publisher Web
                 site.",
}

@Article{Jaulmes:2002:SHG,
  author =       "{\'E}liane Jaulmes and Guillaume Poupard",
  title =        "On the Security of Homage Group Authentication
                 Protocol",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2339",
  pages =        "106--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:40 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2339.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2339/23390106.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2339/23390106.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Jonsson:2002:FCA,
  author =       "Fredrik J{\"o}nsson and Thomas Johansson",
  title =        "A fast correlation attack on {LILI-128}",
  journal =      j-INFO-PROC-LETT,
  volume =       "81",
  number =       "3",
  pages =        "127--132",
  day =          "14",
  month =        feb,
  year =         "2002",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 06:35:42 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.elsevier.com/gej-ng/10/23/20/85/34/28/abstract.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "cryptography",
}

@Article{Jonsson:2002:SRE,
  author =       "Jakob Jonsson and Burton S. {Kaliski Jr.}",
  title =        "On the Security of {RSA} Encryption in {TLS}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2442",
  pages =        "127--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:26 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420127.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420127.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Jonsson:2002:SRT,
  author =       "Jakob Jonsson and Burton S. {Kaliski, Jr.}",
  title =        "On the Security of {RSA} Encryption in {TLS}",
  crossref =     "Yung:2002:ACC",
  pages =        "127--142",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420017.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420017.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@InProceedings{Joux:2002:BAA,
  author =       "Antoine Joux and Gwena{\"e}lle Martinet and
                 Fr{\'e}d{\'e}ric Valette",
  title =        "Blockwise-Adaptive Attackers: Revisiting the
                 (In)Security of Some Provably Secure Encryption Modes:
                 {CBC}, {GEM}, {IACBC}",
  crossref =     "Yung:2002:ACC",
  pages =        "17--30",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420017.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420017.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Joux:2002:WTP,
  author =       "Antoine Joux",
  title =        "The {Weil} and {Tate} Pairings as Building Blocks for
                 Public Key Cryptosystems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2369",
  pages =        "20--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:55 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2369.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2369/23690020.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2369/23690020.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Juang:2002:VMA,
  author =       "Wen-Shenq Juang and Chin-Laung Lei and Horng-Twu
                 Liaw",
  title =        "A Verifiable Multi-Authority Secret Election Allowing
                 Abstention from Voting",
  journal =      j-COMP-J,
  volume =       "45",
  number =       "6",
  pages =        "672--682",
  month =        "????",
  year =         "2002",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Nov 6 11:21:54 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_45/Issue_06/",
  URL =          "http://www3.oup.co.uk/computer_journal/hdb/Volume_45/Issue_06/450672.sgm.abs.html;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_45/Issue_06/pdf/450672.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Judge:2002:WWM,
  author =       "Paul Judge and Mostafa Ammar",
  title =        "{WHIM}: watermarking multicast video with a hierarchy
                 of intermediaries",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "39",
  number =       "6",
  pages =        "699--712",
  day =          "21",
  month =        aug,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Nov 9 12:48:58 MST 2002",
  bibsource =    "http://www.elsevier.com/locate/issn/13891286;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.com/gej-ng/10/15/22/96/53/27/abstract.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Kanda:2002:SCA,
  author =       "Masayuki Kanda and Tsutomu Matsumoto",
  title =        "Security of {Camellia} against Truncated Differential
                 Cryptanalysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2355",
  pages =        "286--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:48 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2355.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2355/23550286.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2355/23550286.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kariya:2002:GM,
  author =       "S. Kariya",
  title =        "Getting the message",
  journal =      j-IEEE-SPECTRUM,
  volume =       "39",
  number =       "8",
  pages =        "56--57",
  month =        aug,
  year =         "2002",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2002.1021957",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "clandestine activities; cryptography; Cryptography;
                 Data security; defense industry; electrical engineers;
                 electromagnetic noncommunications transmissions;
                 electronic communications; electronic warfare;
                 Electronic warfare; encryption; foreign communication;
                 global eavesdropping; government policies; Governmental
                 factors; intelligence gathering; interception; military
                 communication; Military communication; missile signals;
                 Personnel; personnel; radar signals; security
                 clearance; security of data; sensitive compartmented
                 information; signal detection; signals intelligence;
                 technical challenges; technical complexities;
                 telecommunication security; US National Security
                 Agency",
}

@Article{Katz:2002:TCB,
  author =       "Jonathan Katz and Moti Yung",
  title =        "Threshold Cryptosystems Based on Factoring",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "192--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010192.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010192.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Kaufman:2002:NSP,
  author =       "Charlie Kaufman and Radia Perlman and Michael
                 Speciner",
  title =        "Network security: private communication in a public
                 world",
  publisher =    pub-PHPTR,
  address =      pub-PHPTR:adr,
  edition =      "Second",
  pages =        "xxvi + 713",
  year =         "2002",
  ISBN =         "0-13-046019-2",
  ISBN-13 =      "978-0-13-046019-6",
  LCCN =         "QA76.9.A25 K39 2002",
  bibdate =      "Thu Feb 2 17:19:10 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Prentice Hall series in computer networking and
                 distributed systems",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Computers; Access control;
                 Electronic data processing departments; Security
                 measures; Computer networks",
  tableofcontents = "Introduction \\
                 Introduction to cryptography \\
                 Secret key cryptography \\
                 Modes of operation \\
                 Hashes and message digests \\
                 Public key algorithms \\
                 Number theory \\
                 Math with AES and elliptic curves \\
                 Overview of authentication systems \\
                 Security handshake pitfalls \\
                 Strong password protocols \\
                 Kerberos V4 \\
                 Kerberos V5 \\
                 PKI (Public Key Infastructures) \\
                 Real-time communication security \\
                 IPsec: AH and ESP \\
                 IPsec: IKE \\
                 SSL/TLS \\
                 Electronic mail security \\
                 PEM and S/MIME \\
                 PGP (Pretty Good Privacy) \\
                 Firewalls \\
                 More security systems \\
                 Web issues \\
                 Folklore",
}

@Article{Kelsey:2002:CIL,
  author =       "John Kelsey",
  title =        "Compression and Information Leakage of Plaintext",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2365",
  pages =        "263--276",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Feb 25 06:55:26 2003",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2365.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2365/23650263.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2365/23650263.pdf",
  abstract =     "Cryptosystems like AES and triple-DES are designed to
                 encrypt a sequence of input bytes (the plaintext) into
                 a sequence of output bytes (the ciphertext) in such a
                 way that the output carries no information about that
                 plaintext except its length. In recent years, concerns
                 have been raised about `side-channel' attacks on
                 various cryptosystems-attacks that make use of some
                 kind of leaked information about the cryptographic
                 operations (e.g., power consumption or timing) to
                 defeat them. In this paper, we describe a somewhat
                 different kind of side-channel provided by data
                 compression algorithms, yielding information about
                 their inputs by the size of their outputs. The
                 existence of some information about a compressor's
                 input in the size of its output is obvious; here, we
                 discuss ways to use this apparently very small leak of
                 information in surprisingly powerful ways.",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Kenyon:2002:DNR,
  author =       "Tony Kenyon",
  title =        "Data Networks: Routing, Security, and Performance
                 Optimization",
  publisher =    pub-DP,
  address =      pub-DP:adr,
  pages =        "xvi + 807",
  year =         "2002",
  ISBN =         "1-55558-271-0",
  ISBN-13 =      "978-1-55558-271-5",
  LCCN =         "TK5105.543 .K46 2002",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$59.99",
  acknowledgement = ack-nhfb,
}

@Book{Kenyon:2002:HPD,
  author =       "Tony Kenyon",
  title =        "High Performance Data Network Design: Design
                 Techniques and Tools",
  publisher =    pub-DP,
  address =      pub-DP:adr,
  pages =        "xiii + 623",
  year =         "2002",
  ISBN =         "1-55558-207-9",
  ISBN-13 =      "978-1-55558-207-4",
  LCCN =         "TK5105.5 .K45 2002",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$54.99",
  acknowledgement = ack-nhfb,
}

@Article{Kerins:2002:FPE,
  author =       "Tim Kerins and Emanuel Popovici and William Marnane
                 and Patrick Fitzpatrick",
  title =        "Fully Parameterizable Elliptic Curve Cryptography
                 Processor over {GF(2)}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2438",
  pages =        "750--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:28 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2438.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2438/24380750.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2438/24380750.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kiayias:2002:CHB,
  author =       "Aggelos Kiayias and Moti Yung",
  title =        "Cryptographic Hardness Based on the Decoding of
                 {Reed--Solomon} Codes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2380",
  pages =        "232--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:00 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2380.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2380/23800232.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2380/23800232.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kida:2002:PGR,
  author =       "Masanari Kida",
  title =        "Potential Good Reduction of Elliptic Curves",
  journal =      j-J-SYMBOLIC-COMP,
  volume =       "34",
  number =       "3",
  pages =        "173--180",
  month =        sep,
  year =         "2002",
  CODEN =        "JSYCEH",
  ISSN =         "0747-7171 (print), 1095-855X (electronic)",
  ISSN-L =       "0747-7171",
  bibdate =      "Tue Dec 16 09:13:32 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Symbolic Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07477171",
}

@Article{Kim:2002:ABA,
  author =       "Jongsung Kim and Dukjae Moon and Wonil Lee and Seokhie
                 Hong and Sangjin Lee and Seokwon Jung",
  title =        "Amplified Boomerang Attack against Reduced-Round
                 {SHACAL}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "243--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010243.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010243.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kim:2002:EPS,
  author =       "Nam-Yeun Kim and Won-Ho Lee and Kee-Young Yoo",
  title =        "Efficient Power-Sum Systolic Architectures for
                 Public-Key Cryptosystems in {GF($ 2^m $ )}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2387",
  pages =        "153--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:08 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2387.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2387/23870153.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2387/23870153.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kim:2002:IDS,
  author =       "Nam-Yeun Kim and Dae-Ghon Kho and Kee-Young Yoo",
  title =        "Inversion\slash Division Systolic Architecture for
                 Public-Key Cryptosystems in {GF($ 2^m $ )}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2433",
  pages =        "289--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Sep 12 08:41:42 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2433.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2433/24330289.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2433/24330289.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kim:2002:NIS,
  author =       "Myungsun Kim and Kwangjo Kim",
  title =        "A New Identification Scheme Based on the Bilinear
                 {Diffie--Hellman} Problem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2384",
  pages =        "362--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2384/23840362.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2384/23840362.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kim:2002:PAA,
  author =       "Hyun-Sung Kim and Kee-Young Yoo",
  title =        "Parallel Algorithm and Architecture for Public-Key
                 Cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2510",
  pages =        "145--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:47 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2510.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2510/25100145.htm;
                 http://link.springer.de/link/service/series/0558/papers/2510/25100145.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kim:2002:SMA,
  author =       "Seongyeol Kim and Ilyong Chung",
  title =        "A Secure Mobile Agent System Applying Identity-Based
                 Digital Signature Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2510",
  pages =        "588--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:47 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2510.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2510/25100588.htm;
                 http://link.springer.de/link/service/series/0558/papers/2510/25100588.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{King:2002:RGI,
  author =       "Brian King",
  title =        "Requirements for Group Independent Linear Threshold
                 Secret Sharing Schemes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2384",
  pages =        "89--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2384/23840089.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2384/23840089.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Klimov:2002:ANC,
  author =       "Alexander Klimov and Anton Mityagin and Adi Shamir",
  title =        "Analysis of Neural Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "288--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010288.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010288.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Knill:2002:FPE,
  author =       "Emanuel Knill and Raymond Laflamme and Howard N.
                 Barnum and Diego A. Dalvit and Jacek J. Dziarmaga and
                 James E. Gubernatis and Leonid Gurvits and Gerardo
                 Ortiz and Lorenza Viola and Wojciech H. Zurek",
  title =        "From Factoring to Phase Estimation: a Discussion of
                 {Shor}'s Algorithm",
  journal =      j-LOS-ALAMOS-SCIENCE,
  volume =       "27",
  pages =        "38--45",
  year =         "2002",
  CODEN =        "LASCDI",
  ISSN =         "0273-7116",
  bibdate =      "Mon Apr 11 08:15:55 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://library.lanl.gov/cgi-bin/getfile?27-05.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Los Alamos Science",
  keywords =     "quantum cryptography",
}

@Article{Knill:2002:QIP,
  author =       "Emanuel Knill and Raymond Laflamme and Howard N.
                 Barnum and Diego A. Dalvit and Jacek J. Dziarmaga and
                 James E. Gubernatis and Leonid Gurvits and Gerardo
                 Ortiz and Lorenza Viola and Wojciech H. Zurek",
  title =        "Quantum Information Processing: a Hands-on Primer",
  journal =      j-LOS-ALAMOS-SCIENCE,
  volume =       "27",
  pages =        "2--37",
  year =         "2002",
  CODEN =        "LASCDI",
  ISSN =         "0273-7116",
  bibdate =      "Mon Apr 11 08:15:55 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://library.lanl.gov/cgi-bin/getfile?27-07.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Los Alamos Science",
  keywords =     "quantum cryptography",
}

@Article{Knudsen:2002:IC,
  author =       "Lars Knudsen and David Wagner",
  title =        "Integral Cryptanalysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2365",
  pages =        "112--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:52 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2365.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2365/23650112.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2365/23650112.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Misc{Kocher:2002:IS,
  author =       "Paul Kocher",
  booktitle =    "11th USENIX Security Symposium 2002, August 5--9,
                 2002, San Francisco CA, Invited talk",
  title =        "Illusions of Security",
  year =         "2002",
  bibdate =      "Tue Oct 15 11:02:26 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Unpublished.",
  URL =          "http://www.usenix.org/publications/library/proceedings/sec02/tech.html",
  abstract =     "For years, the standard yardstick for measuring
                 cryptographic security has been key length.
                 Unfortunately, real adversaries lack the propriety to
                 limit themselves to tidy attacks such as brute force,
                 factoring, and differential cryptanalysis. Worse,
                 Moore's Law is driving vendors to build systems of
                 exponentially increasing complexity without making
                 security experts exponentially smarter to compensate.
                 The resulting products have a minuscule chance of being
                 extremely secure, and a large chance of being
                 critically flawed. This talk will review basic
                 engineering approaches that can improve assurance and
                 will show how evaluators and attackers break overly
                 complex, poorly tested designs.",
  acknowledgement = ack-nhfb,
}

@Article{Koeune:2002:FIL,
  author =       "Fran{\c{c}}ois Koeune and Gael Rouvroy and
                 Fran{\c{c}}ois-Xavier Standaert and Jean-Jacques
                 Quisquater and Jean-Pierre David and Jean-Didier
                 Legat",
  title =        "An {FPGA} Implementation of the Linear Cryptanalysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2438",
  pages =        "845--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:28 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2438.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2438/24380845.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2438/24380845.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Koga:2002:GFR,
  author =       "Hiroki Koga",
  title =        "A General Formula of the $ (t, n) $-Threshold Visual
                 Secret Sharing Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "328--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010328.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010328.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Konstantinou:2002:SLE,
  author =       "Elisavet Konstantinou and Yiannis Stamatiou and
                 Christos Zaroliagis",
  title =        "A Software Library for Elliptic Curve Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2461",
  pages =        "625--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:11:21 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2461.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2461/24610625.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2461/24610625.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Krause:2002:BBC,
  author =       "Matthias Krause",
  title =        "{BDD}-Based Cryptanalysis of Keystream Generators",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2332",
  pages =        "222--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:37 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2332.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2332/23320222.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2332/23320222.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Krause:2002:USP,
  author =       "Rory Krause",
  title =        "Using {SSH} Port Forwarding to Print at Remote
                 Locations",
  journal =      j-LINUX-J,
  volume =       "94",
  pages =        "60--62, 64",
  month =        feb,
  year =         "2002",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Fri Feb 8 16:59:02 MST 2002",
  bibsource =    "http://noframes.linuxjournal.com/lj-issues/issue94/index.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://noframes.linuxjournal.com/lj-issues/issue94/article.php?sid=5462",
  abstract =     "Directly print your office documents at home.",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Ku:2002:IIB,
  author =       "Wei-Chi Ku",
  title =        "An Improved {ID}-Based Authentication and Key
                 Distribution Protocol",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2344",
  pages =        "375--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:13 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2344.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2344/23440375.htm;
                 http://link.springer.de/link/service/series/0558/papers/2344/23440375.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kuhn:2002:ICM,
  author =       "Ulrich K{\"u}hn",
  title =        "Improved Cryptanalysis of {MISTY1}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2365",
  pages =        "61--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:52 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2365.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2365/23650061.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2365/23650061.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Kuhn:2002:OTD,
  author =       "Markus Kuhn",
  editor =       "{IEEE}",
  booktitle =    "Proceedings: 2002 IEEE Symposium on Security and
                 Privacy, 12-15 May, 2002, Berkeley, California",
  title =        "Optical Time-Domain Eavesdropping Risks of {CRT}
                 Displays",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  bookpages =    "ix + 295",
  pages =        "3--18",
  year =         "2002",
  ISBN =         "0-7695-1543-6",
  ISBN-13 =      "978-0-7695-1543-4",
  LCCN =         "QA76.9.A25 I34 2002",
  bibdate =      "Wed Sep 25 12:29:30 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "IEEE Computer Society Order Number PR01543.",
  URL =          "http://www.cl.cam.ac.uk/~mgk25/ieee02-optical.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Kumar:2002:APS,
  author =       "M. V. N. Ashwin Kumar and K. Srinathan and C. Pandu
                 Rangan",
  title =        "Asynchronous Perfectly Secure Computation Tolerating
                 Generalized Adversaries",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2384",
  pages =        "497--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2384/23840497.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2384/23840497.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kuramitsu:2002:ETC,
  author =       "K. Kuramitsu and K. Sakamura",
  title =        "Electronic Tickets on Contactless {Smartcard}
                 Database",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2453",
  pages =        "392--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:33 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2453.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2453/24530392.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2453/24530392.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kusters:2002:DCP,
  author =       "Ralf K{\"u}sters",
  title =        "On the Decidability of Cryptographic Protocols with
                 Open-Ended Data Structures",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2421",
  pages =        "515--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:19 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2421.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2421/24210515.htm;
                 http://link.springer.de/link/service/series/0558/papers/2421/24210515.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kwon:2002:DSA,
  author =       "Taekyoung Kwon",
  title =        "Digital signature algorithm for securing digital
                 identities",
  journal =      j-INFO-PROC-LETT,
  volume =       "82",
  number =       "5",
  pages =        "247--252",
  day =          "15",
  month =        jun,
  year =         "2002",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:28 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  note =         "See erratum \cite{Kwon:2003:EDS}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Labbe:2002:AIF,
  author =       "Anna Labb{\'e} and Annie P{\'e}rez",
  title =        "{AES} Implementation on {FPGA}: Time --- Flexibility
                 Tradeoff",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2438",
  pages =        "836--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:28 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2438.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2438/24380836.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2438/24380836.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lange:2002:PIE,
  author =       "Tanja Lange and Arne Winterhof",
  title =        "Polynomial Interpolation of the Elliptic Curve and
                 {XTR} Discrete Logarithm",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2387",
  pages =        "137--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:08 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2387.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2387/23870137.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2387/23870137.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lee:2002:FRU,
  author =       "Cheng-Chi Lee and Min-Shiang Hwang and Wei-Peng Yang",
  title =        "A flexible remote user authentication scheme using
                 {Smart Cards}",
  journal =      j-OPER-SYS-REV,
  volume =       "36",
  number =       "3",
  pages =        "46--52",
  month =        jul,
  year =         "2002",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:48 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Lee:2002:RUA,
  author =       "Cheng-Chi Lee and Li-Hua Li and Min-Shiang Hwang",
  title =        "A remote user authentication scheme using hash
                 functions",
  journal =      j-OPER-SYS-REV,
  volume =       "36",
  number =       "4",
  pages =        "23--29",
  month =        oct,
  year =         "2002",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:53 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Lee:2002:SEC,
  author =       "Hyung-Woo Lee and Sung-Min Lee and Im-Yeong Lee",
  title =        "Secure Electronic Copyright Distribution with Public
                 Key Based Traitor Tracing",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2455",
  pages =        "324--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:11:20 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2455.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2455/24550324.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2455/24550324.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lee:2002:TDC,
  author =       "Seonhee Lee and Seokhie Hong and Sangjin Lee and
                 Jongin Lim and Seonhee Yoon",
  title =        "Truncated Differential Cryptanalysis of {Camellia}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2288",
  pages =        "32--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:14 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2288.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2288/22880032.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2288/22880032.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Leroy:2002:BVJ,
  author =       "Xavier Leroy",
  title =        "Bytecode verification on {Java} smart cards",
  journal =      j-SPE,
  volume =       "32",
  number =       "4",
  pages =        "319--340",
  day =          "10",
  month =        apr,
  year =         "2002",
  CODEN =        "SPEXBL",
  DOI =          "https://doi.org/10.1002/spe.438",
  ISSN =         "0038-0644 (print), 1097-024X (electronic)",
  ISSN-L =       "0038-0644",
  bibdate =      "Sat Mar 23 17:30:52 MST 2002",
  bibsource =    "http://www.interscience.wiley.com/jpages/0038-0644;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www3.interscience.wiley.com/journalfinder.html",
  URL =          "http://www3.interscience.wiley.com/cgi-bin/abstract/91016433/START;
                 http://www3.interscience.wiley.com/cgi-bin/fulltext?ID=91016433&PLACEBO=IE.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Software---Practice and Experience",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X",
}

@Article{Leveiller:2002:CNF,
  author =       "Sabine Leveiller and Joseph Boutros and Philippe
                 Guillot and Gilles Z{\'e}mor",
  title =        "Cryptanalysis of Nonlinear Filter Generators with $ \{
                 0, 1 \} $-Metric {Viterbi} Decoding",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2288",
  pages =        "50--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:14 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2288.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2288/22880050.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2288/22880050.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Levy:2002:C,
  author =       "Stephen Levy",
  title =        "Crypto",
  publisher =    pub-PENGUIN,
  address =      pub-PENGUIN:adr,
  pages =        "368",
  year =         "2002",
  ISBN =         "0-14-024432-8",
  ISBN-13 =      "978-0-14-024432-8",
  LCCN =         "????",
  bibdate =      "Sat Apr 20 12:29:43 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Li:2002:HNP,
  author =       "Wen-Ching W. Li and Mats N{\"a}slund and Igor E.
                 Shparlinski",
  title =        "Hidden Number Problem with the Trace and Bit Security
                 of {XTR} and {LUC}",
  crossref =     "Yung:2002:ACC",
  pages =        "433--448",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@InProceedings{Lindell:2002:CAB,
  author =       "Yehuda Lindell and Anna Lysyanskaya and Tal Rabin",
  title =        "On the composition of authenticated {Byzantine}
                 agreement",
  crossref =     "ACM:2002:PTF",
  pages =        "514--523",
  year =         "2002",
  bibdate =      "Tue Jan 13 06:21:05 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Lingmann:2002:DSK,
  author =       "Thomas Lingmann",
  title =        "{Datenverschl{\"u}sselung: sichere Kommunikation mit
                 Linux und BSD: Security mit Open Source}. ({German})
                 [{Data} encoding: Secure communication with {Linux} and
                 {BSD}: {Security} with {Open Source}]",
  publisher =    "C \& L",
  address =      "B{\"o}blingen, Germany",
  pages =        "476 (est.)",
  year =         "2002",
  ISBN =         "3-932311-87-8 (??invalid checksum??)",
  ISBN-13 =      "978-3-932311-87-1",
  LCCN =         "????",
  bibdate =      "Tue Sep 17 06:16:52 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "System security and cryptography; Systemsicherheit und
                 Kryptographie",
  language =     "German",
}

@InProceedings{Liskov:2002:TBC,
  author =       "Moses Liskov and Ronald L. Rivest and David Wagner",
  title =        "Tweakable Block Ciphers",
  crossref =     "Yung:2002:ACC",
  pages =        "31--46",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420031.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420031.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Lorenz:2002:SSG,
  author =       "U. Lorenz and B. Monien",
  title =        "The Secret of Selective Game Tree Search, When Using
                 Random-Error Evaluations",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2285",
  pages =        "203--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:12 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2285.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2285/22850203.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2285/22850203.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lotspiech:2002:CFB,
  author =       "Jeffrey Lotspiech and Stefan Nusser and Florian
                 Pestoni",
  title =        "Cover Feature: Broadcast Encryption's Bright Future",
  journal =      j-COMPUTER,
  volume =       "35",
  number =       "8",
  pages =        "57--63",
  month =        aug,
  year =         "2002",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Dec 12 19:53:31 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/dl/mags/co/2002/08/r8057.htm;
                 http://csdl.computer.org/dl/mags/co/2002/08/r8057.pdf;
                 http://www.computer.org/computer/co2002/r8057abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Lou:2002:ESA,
  author =       "D-C Lou and T-L Yin and M-C Chang",
  title =        "An efficient steganographic approach",
  journal =      j-INT-J-COMPUT-SYST-SCI-ENG,
  volume =       "17",
  number =       "4/5",
  pages =        "??--??",
  month =        jul # "\slash " # sep,
  year =         "2002",
  CODEN =        "CSSEEI",
  ISSN =         "0267-6192",
  bibdate =      "Sat Jan 03 19:15:31 2004",
  bibsource =    "http://www.crlpublishing.co.uk/cssecont00.htm;
                 http://www.crlpublishing.co.uk/cssecont02.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Systems Science and
                 Engineering",
}

@Article{Lou:2002:SMS,
  author =       "Der-Chyuan Lou and Jiang-Lung Liu",
  title =        "Steganographic Method for Secure Communications",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "449--460",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802005151",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Lu:2002:HEA,
  author =       "Chi-Jen Lu",
  title =        "Hyper-encryption against Space-Bounded Adversaries
                 from On-Line Strong Extractors",
  crossref =     "Yung:2002:ACC",
  pages =        "257--271",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420257.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420257.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Luccio:2002:AC,
  author =       "Fabrizio Luccio and Linda Pagli",
  title =        "From Algorithms to Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2286",
  pages =        "15--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:12 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2286.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2286/22860015.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2286/22860015.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lucks:2002:SAB,
  author =       "Stefan Lucks",
  title =        "The Saturation Attack --- {A} Bait for {Twofish}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2355",
  pages =        "1--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:48 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2355.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2355/23550001.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2355/23550001.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lucks:2002:VCS,
  author =       "Stefan Lucks",
  title =        "A Variant of the {Cramer--Shoup} Cryptosystem for
                 Groups of Unknown Order",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "27--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010027.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010027.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lutz:2002:BBS,
  author =       "Michael J. Lutz",
  title =        "Bookshelf: Balancing Speed and Complexity with
                 Compilers; Advanced Cryptology Text; Computer
                 Architecture Basics; Mutation Testing Compendium",
  journal =      j-COMPUTER,
  volume =       "35",
  number =       "4",
  pages =        "89--89",
  month =        apr,
  year =         "2002",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Apr 5 15:49:45 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/co/books/co2002/pdf/r4089.pdf;
                 http://www.computer.org/computer/co2002/r4089abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@InProceedings{Lysyanskaya:2002:USV,
  author =       "Anna Lysyanskaya",
  title =        "Unique Signatures and Verifiable Random Functions from
                 the {DH--DDH} Separation",
  crossref =     "Yung:2002:ACC",
  pages =        "597--612",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420597.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420597.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@InProceedings{MacKenzie:2002:TPA,
  author =       "Philip MacKenzie and Thomas Shrimpton and Markus
                 Jakobsson",
  title =        "Threshold Password-Authenticated Key Exchange:
                 (Extended Abstract)",
  crossref =     "Yung:2002:ACC",
  pages =        "385--400",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 http://link.springer-ny.com/link/service/series/0558/tocs/t2455.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2455/24550224.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2455/24550224.pdf;
                 http://link.springer.de/link/service/series/0558/bibs/2442/24420385.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420385.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Maggi:2002:USV,
  author =       "Paolo Maggi and Riccardo Sisto",
  title =        "Using {SPIN} to Verify Security Properties of
                 Cryptographic Protocols",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2318",
  pages =        "187--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:29 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2318.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2318/23180187.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2318/23180187.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Maitra:2002:CSB,
  author =       "Subhamoy Maitra and Palash Sarkar",
  title =        "Cryptographically significant {Boolean} functions with
                 five valued {Walsh} spectra",
  journal =      j-THEOR-COMP-SCI,
  volume =       "276",
  number =       "1--2",
  pages =        "133--146",
  day =          "6",
  month =        apr,
  year =         "2002",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Thu Apr 25 16:46:36 MDT 2002",
  bibsource =    "http://www.elsevier.com/locate/issn/03043975;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2000.bib",
  URL =          "http://www.elsevier.com/gej-ng/10/41/16/247/27/33/abstract.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Malcolm:2002:LAM,
  author =       "James Malcolm",
  title =        "Lightweight Authentication in a Mobile Network
                 (Transcript of Discussion)",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2467",
  pages =        "217--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2467.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2467/24670217.htm;
                 http://link.springer.de/link/service/series/0558/papers/2467/24670217.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Malkhi:2002:ACE,
  author =       "Dahlia Malkhi and Elan Pavlov",
  title =        "Anonymity without `Cryptography' (Extended Abstract)",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2339",
  pages =        "117--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:40 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2339.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2339/23390117.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2339/23390117.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Mana:2002:PMD,
  author =       "Antonio Ma{\~n}a and Sonia Matamoros",
  title =        "Practical Mobile Digital Signatures",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2455",
  pages =        "224--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:11:20 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2455.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2455/24550224.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2455/24550224.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Mann:2002:HI,
  author =       "Charles C. Mann",
  title =        "Homeland Insecurity",
  journal =      "The Atlantic",
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  month =        sep,
  year =         "2002",
  bibdate =      "Tue Sep 10 06:40:25 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.theatlantic.com/issues/2002/09/mann.htm",
  abstract =     "A top expert says America's approach to protecting
                 itself will only make matters worse. Forget `foolproof'
                 technology--we need systems designed to fail smartly.",
  acknowledgement = ack-nhfb,
  annote =       "Lengthy article about (in)security, Bruce Schneier,
                 and Counterplane Internet Security.",
}

@Article{Marques:2002:BSJ,
  author =       "Paulo Marques",
  title =        "Building Secure {Java RMI} Servers",
  journal =      j-DDJ,
  volume =       "27",
  number =       "11",
  pages =        "36, 38, 40--42, 44",
  month =        nov,
  year =         "2002",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Jun 12 05:46:19 MDT 2003",
  bibsource =    "http://www.ddj.com/articles/2002/0211/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/documents/s=7644/ddj0211d/",
  abstract =     "Paulo uses the proxy pattern along with the Java
                 Authentication and Authorization Service API to build
                 secure Java Remote Method Invocation servers that allow
                 only properly authenticated users access to systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Marsaglia:2002:SDP,
  author =       "George Marsaglia and Wai Wan Tsang",
  title =        "Some Difficult-to-pass Tests of Randomness",
  journal =      j-J-STAT-SOFT,
  volume =       "7",
  number =       "3",
  pages =        "1--8",
  year =         "2002",
  CODEN =        "JSSOBK",
  ISSN =         "????",
  bibdate =      "Sun Nov 17 22:35:43 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jstatsoft.org/v07/i03;
                 http://www.jstatsoft.org/v07/i03/tuftests.c;
                 http://www.jstatsoft.org/v07/i03/tuftests.pdf;
                 http://www.jstatsoft.org/v07/i03/updates",
  abstract =     "We describe three tests of randomness --- tests that
                 many random number generators fail. In particular, all
                 congruential generators --- even those based on a prime
                 modulus --- fail at least one of the tests, as do many
                 simple generators, such as shift register and lagged
                 Fibonacci. On the other hand, generators that pass the
                 three tests seem to pass all the tests in the Diehard
                 Battery of Tests.\par

                 Note that these tests concern the randomness of a
                 generator's output as a sequence of independent,
                 uniform 32-bit integers. For uses where the output is
                 converted to uniform variates in $ [0, 1) $, potential
                 flaws of the output as integers will seldom cause
                 problems after the conversion. Most generators seem to
                 be adequate for producing a set of uniform reals in $
                 [0, 1) $, but several important applications. notably
                 in cryptography and number theory --- for example,
                 establishing probable primes, complexity of factoring
                 algorithms, random partitions of large integers --- may
                 require satisfactory performance on the kinds of tests
                 we describe here.",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Statistical Software",
  journal-URL =  "http://www.jstatsoft.org/",
}

@Article{Martinelli:2002:SSA,
  author =       "Fabio Martinelli",
  title =        "Symbolic Semantics and Analysis for Crypto-{CCS} with
                 (Almost) Generic Inference Systems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2420",
  pages =        "519--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:18 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2420.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2420/24200519.htm;
                 http://link.springer.de/link/service/series/0558/papers/2420/24200519.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Martinez-Nadal:2002:CUM,
  author =       "Apol{\textperiodcentered}l{\`o}nia Mart{\'\i}nez-Nadal
                 and Josep Llu{\'\i}s Ferrer-Gomila",
  title =        "Comments to the {UNCITRAL} Model Law on Electronic
                 Signatures",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2433",
  pages =        "229--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:26 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2433.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2433/24330229.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2433/24330229.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Masuda:2002:CDC,
  author =       "Naoki Masuda and Kazuyuki Aihara",
  title =        "Cryptosystems with discretized chaotic maps",
  journal =      "IEEE Trans. Circuits Systems I Fund. Theory Appl.",
  volume =       "49",
  number =       "1",
  pages =        "28--40",
  year =         "2002",
  CODEN =        "ITCAEX",
  ISSN =         "1057-7122 (print), 1558-1268 (electronic)",
  MRclass =      "94A60 (37E05 37N99 82C05)",
  MRnumber =     "1 874 225",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "IEEE Transactions on Circuits and Systems. I.
                 Fundamental Theory and Applications",
}

@InProceedings{Matsumoto:2002:IAG,
  author =       "T. Matsumoto and H. Matsumoto and K. Yamada and S.
                 Hoshino",
  booktitle =    "Proceedings of SPIE: Optical Security and Counterfeit
                 Deterrence Techniques IV, 2002",
  title =        "Impact of Artificial Gummy Fingers on Fingerprint
                 Systems",
  volume =       "4677",
  publisher =    pub-SPIE,
  address =      pub-SPIE:adr,
  pages =        "??--??",
  year =         "2002",
  bibdate =      "Thu May 16 08:43:04 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.itu.int/itudoc/itu-t/workshop/security/present/s5p4.pdf",
  acknowledgement = ack-nhfb,
  annote =       "Shows how biometric fingerprint identification systems
                 can be easily fooled. See commentary by Bruce Schneier
                 in CRYPTO-GRAM newsletter of 15-May-2002.",
}

@InProceedings{May:2002:CUR,
  author =       "Alexander May",
  title =        "Cryptanalysis of Unbalanced {RSA} with Small
                 {CRT}-Exponent",
  crossref =     "Yung:2002:ACC",
  pages =        "242--256",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420242.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420242.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{May:2002:SKS,
  author =       "Lauren May and Matt Henricksen and William Millan and
                 Gary Carter and Ed Dawson",
  title =        "Strengthening the Key Schedule of the {AES}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2384",
  pages =        "226--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2384/23840226.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2384/23840226.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Micciancio:2002:GCK,
  author =       "D. Micciancio",
  title =        "Generalized compact knapsacks, cyclic lattices, and
                 efficient one-way functions from worst-case complexity
                 assumptions",
  crossref =     "IEEE:2002:PAI",
  pages =        "356--365",
  year =         "2002",
  bibdate =      "Fri Jul 15 16:13:02 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8411/26517/01181960.pdf?isnumber=26517&prod=CNF&arnumber=1181960&arSt=+356&ared=+365&arAuthor=Micciancio%2C+D.;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=26517&arnumber=1181960&count=82&index=36",
  acknowledgement = ack-nhfb,
}

@InProceedings{Micciancio:2002:ICH,
  author =       "Daniele Micciancio",
  title =        "Improved cryptographic hash functions with
                 worst-case\slash average-case connection",
  crossref =     "ACM:2002:PTF",
  pages =        "609--618",
  year =         "2002",
  bibdate =      "Tue Jan 13 06:21:05 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Mironov:2002:RSO,
  author =       "Ilya Mironov",
  title =        "(Not So) Random Shuffles of {RC4}",
  crossref =     "Yung:2002:ACC",
  pages =        "304--319",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Book{Mitnick:2002:ADC,
  author =       "Kevin D. (Kevin David) Mitnick and William L. Simon",
  title =        "The art of deception: controlling the human element of
                 security",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xvi + 352",
  year =         "2002",
  ISBN =         "0-471-23712-4, 0-7645-4280-X (paperback)",
  ISBN-13 =      "978-0-471-23712-9, 978-0-7645-4280-0 (paperback)",
  LCCN =         "QA76.9.A25 M585 2002",
  bibdate =      "Sat Dec 24 07:29:58 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/bios/wiley043/2002512977.html;
                 http://www.loc.gov/catdir/description/wiley036/2002512977.html;
                 http://www.loc.gov/catdir/toc/wiley031/2002512977.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Information technology; Social
                 aspects; Computer hackers",
}

@Article{Mitra:2002:TAD,
  author =       "Ananda Mitra",
  title =        "Trust, authenticity, and discursive power in
                 cyberspace",
  journal =      j-CACM,
  volume =       "45",
  number =       "3",
  pages =        "27--29",
  month =        mar,
  year =         "2002",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Mar 12 16:19:59 MST 2002",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Mitrakas:2002:CCI,
  author =       "Andreas Mitrakas",
  title =        "Citizen Centric Identity Management: Chip Tricks?",
  journal =      j-NETWORK-SECURITY,
  volume =       "2002",
  number =       "7",
  pages =        "15--16",
  day =          "1",
  month =        jul,
  year =         "2002",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(02)07010-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:33 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485802070101",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Moller:2002:PEC,
  author =       "Bodo M{\"o}ller",
  title =        "Parallelizable Elliptic Curve Point Multiplication
                 Method with Resistance against Side-Channel Attacks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2433",
  pages =        "402--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:26 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2433.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2433/24330402.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2433/24330402.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Monrose:2002:TSG,
  author =       "Fabian Monrose and Michael Reiter and Qi Li and Daniel
                 P. Lopresti and Chilin Shih",
  title =        "Toward Speech-Generated Cryptographic Keys on
                 Resource-Constrained Devices",
  crossref =     "USENIX:2002:PUS",
  pages =        "283--296",
  year =         "2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/usenix2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/sec02/monrose.html",
}

@Article{Moon:2002:IDC,
  author =       "Dukjae Moon and Kyungdeok Hwang and Wonil Lee and
                 Sangjin Lee and Jongin Lim",
  title =        "Impossible Differential Cryptanalysis of Reduced Round
                 {XTEA} and {TEA}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2365",
  pages =        "49--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:52 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2365.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2365/23650049.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2365/23650049.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Moreira:2002:RCE,
  author =       "Emmanuel A. Moreira and Paul L. McAlpine and Simon D.
                 Haynes",
  title =        "{Rijndael} Cryptographic Engine on the {UltraSONIC}
                 Reconfigurable Platform",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2438",
  pages =        "770--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:28 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2438.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2438/24380770.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2438/24380770.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Morelos-Zaragoza:2002:AEC,
  author =       "Robert Morelos-Zaragoza",
  title =        "The Art of Error Correcting Coding",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xvi + 221",
  year =         "2002",
  ISBN =         "0-471-49581-6",
  ISBN-13 =      "978-0-471-49581-9",
  LCCN =         "????",
  bibdate =      "Sat Apr 20 11:49:43 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "UK\pounds 45.00, US\$95.00",
  URL =          "http://www.loc.gov/catdir/description/wiley035/2002280749.html;
                 http://www.loc.gov/catdir/toc/wiley023/2002280749.html",
  acknowledgement = ack-nhfb,
  subject =      "Error-correcting codes (Information theory)",
}

@Article{Mukherjee:2002:CAB,
  author =       "Monalisa Mukherjee and Niloy Ganguly and P. Pal
                 Chaudhuri",
  title =        "Cellular Automata Based Authentication {(CAA)}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2493",
  pages =        "259--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:07 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2493.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2493/24930259.htm;
                 http://link.springer.de/link/service/series/0558/papers/2493/24930259.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Mullins:2002:MUC,
  author =       "J. Mullins",
  title =        "Making unbreakable code",
  journal =      j-IEEE-SPECTRUM,
  volume =       "39",
  number =       "5",
  pages =        "40--45",
  month =        may,
  year =         "2002",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/6.999793",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "ciphers; codebreakers; codemakers; cryptographers;
                 Decoding; Detectors; eavesdroppers; Finishing; message
                 encryption; optical fiber communication; Optical
                 fibers; optical fibre communication; photons; Physics;
                 Polarization; Public key; Public key cryptography;
                 quantum cryptography; Quantum mechanics; quantum
                 mechanics laws; quantum optics; quantum properties;
                 secure reception; Telegraphy; unbreakable code",
}

@TechReport{Murphy:2002:EASa,
  author =       "S. Murphy and M. J. B. Robshaw",
  title =        "Essential Algebraic Structure Within the {AES}",
  type =         "Report",
  institution =  "Information Security Group, Royal Holloway, University
                 of London",
  address =      "Egham, Surrey, TW20 0EX, UK",
  pages =        "16",
  year =         "2002",
  bibdate =      "Mon Sep 16 06:51:06 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.isg.rhul.ac.uk/~mrobshaw/aes-crypto.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "(Field) Conjugate; (Finite) Galois Field; Advanced
                 Encryption Standard; AES; Algebraic Structure; BES;
                 Multivariate Quadratic (MQ) Equations.; Rijndael",
}

@InProceedings{Murphy:2002:EASb,
  author =       "Sean Murphy and Matthew J. B. Robshaw",
  title =        "Essential Algebraic Structure within the {AES}",
  crossref =     "Yung:2002:ACC",
  pages =        "1--16",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420001.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420001.pdf;
                 http://www.isg.rhul.ac.uk/~mrobshaw/aes-crypto.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@InProceedings{Murray:2002:IYP,
  author =       "Mark R. V. Murray",
  title =        "An Implementation of the {Yarrow PRNG} for {FreeBSD}",
  crossref =     "USENIX:2002:PBF",
  pages =        "47--53",
  year =         "2002",
  bibdate =      "Tue Oct 15 12:37:27 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/bsdcon02/murray.html",
  acknowledgement = ack-nhfb,
  keywords =     "pseudo-random number generator",
}

@Article{Muthukrishnan:2002:IAS,
  author =       "S. Muthukrishnan and S. Cenk Sahinalp",
  title =        "An Improved Algorithm for Sequence Comparison with
                 Block Reversals",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2286",
  pages =        "319--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:12 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2286.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2286/22860319.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2286/22860319.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Namprempre:2002:SCB,
  author =       "Chanathip Namprempre",
  title =        "Secure Channels Based on Authenticated Encryption
                 Schemes: a Simple Characterization",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "515--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010515.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010515.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Naor:2002:DRA,
  author =       "Moni Naor",
  title =        "Deniable Ring Authentication",
  crossref =     "Yung:2002:ACC",
  pages =        "481--498",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420210.htm;
                 http://link.springer.de/link/service/series/0558/bibs/2442/24420481.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420210.pdf;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420481.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Nazario:2002:RYS,
  author =       "Jose Nazario",
  title =        "A Rough Year for {SSH}",
  journal =      j-LINUX-J,
  volume =       "95",
  pages =        "??--??",
  month =        mar,
  year =         "2002",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Thu Feb 14 06:30:28 MST 2002",
  bibsource =    "http://noframes.linuxjournal.com/lj-issues/issue95/index.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Web only.",
  URL =          "http://noframes.linuxjournal.com/lj-issues/issue95/article.php?sid=5672",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@InProceedings{Nguyen:2002:AIN,
  author =       "Phong Q. Nguyen and David Pointcheval",
  title =        "Analysis and Improvements of {NTRU} Encryption
                 Paddings",
  crossref =     "Yung:2002:ACC",
  pages =        "210--225",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420210.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420210.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Niederreiter:2002:BRC,
  author =       "Harald Niederreiter",
  title =        "Book review: {{\em Cryptography and computational
                 number theory}}",
  journal =      j-MATH-COMPUT,
  volume =       "71",
  number =       "239",
  pages =        "??--??",
  month =        jul,
  year =         "2002",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (print), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Fri Nov 22 10:22:22 MST 2002",
  bibsource =    "http://www.ams.org/mcom/2002-71-239;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ams.org/mcom/2002-71-239/S0025-5718-02-01454-0/bookrev-S0025-5718-02-01454-0.html;
                 http://www.ams.org/mcom/2002-71-239/S0025-5718-02-01454-0/S0025-5718-02-01454-0.dvi;
                 http://www.ams.org/mcom/2002-71-239/S0025-5718-02-01454-0/S0025-5718-02-01454-0.pdf;
                 http://www.ams.org/mcom/2002-71-239/S0025-5718-02-01454-0/S0025-5718-02-01454-0.ps;
                 http://www.ams.org/mcom/2002-71-239/S0025-5718-02-01454-0/S0025-5718-02-01454-0.tex",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
}

@InProceedings{Nielsen:2002:SRO,
  author =       "Jesper Buus Nielsen",
  title =        "Separating Random Oracle Proofs from Complexity
                 Theoretic Proofs: The Non-committing Encryption Case",
  crossref =     "Yung:2002:ACC",
  pages =        "111--126",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420111.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420111.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@InProceedings{Nielsen:2002:TPF,
  author =       "Jesper Buus Nielsen",
  title =        "A Threshold Pseudorandom Function Construction and Its
                 Applications",
  crossref =     "Yung:2002:ACC",
  pages =        "401--416",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Book{Nievergelt:2002:FLM,
  author =       "Yves Nievergelt",
  title =        "Foundations of Logic and Mathematics: Applications to
                 Computer Science and Cryptography",
  publisher =    pub-BIRKHAUSER,
  address =      pub-BIRKHAUSER:adr,
  pages =        "xvi + 415",
  year =         "2002",
  ISBN =         "0-8176-4249-8 , 3-7643-4249-8",
  ISBN-13 =      "978-0-8176-4249-5, 978-3-7643-4249-4",
  LCCN =         "QA9 .N53 2002",
  bibdate =      "Fri Mar 23 19:09:42 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0812/2001052551-d.html;
                 http://www.loc.gov/catdir/enhancements/fy0812/2001052551-t.html",
  acknowledgement = ack-nhfb,
  subject =      "Logic, Symbolic and mathematical; Set theory; Number
                 theory; Computer science; Mathematics",
  zz-isbn =      "0-8176-4249-8, 3-7643-4249-8",
}

@Article{Nikander:2002:DSAa,
  author =       "Pekka Nikander",
  title =        "Denial-of-Service, Address Ownership, and Early
                 Authentication in the {IPv6} World",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2467",
  pages =        "12--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2467.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2467/24670012.htm;
                 http://link.springer.de/link/service/series/0558/papers/2467/24670012.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Nikander:2002:DSAb,
  author =       "Pekka Nikander",
  title =        "Denial of Service, Address Ownership, and Early
                 Authentication in the {IPv6} World (Transcript of
                 Discussion)",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2467",
  pages =        "22--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:33 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2467.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2467/24670022.htm;
                 http://link.springer.de/link/service/series/0558/papers/2467/24670022.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Nishioka:2002:DAF,
  author =       "Mototsugu Nishioka and Hisayoshi Satoh and Kouichi
                 Sakurai",
  title =        "Design and Analysis of Fast Provably Secure Public-Key
                 Cryptosystems Based on a Modular Squaring",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2288",
  pages =        "81--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:14 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2288.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2288/22880081.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2288/22880081.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Nordholt:2002:NFC,
  author =       "Jane E. Nordholt and Richard J. Hughes",
  title =        "A New Face for Cryptography",
  journal =      j-LOS-ALAMOS-SCIENCE,
  volume =       "27",
  pages =        "68--85",
  year =         "2002",
  CODEN =        "LASCDI",
  ISSN =         "0273-7116",
  bibdate =      "Mon Apr 11 08:15:55 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://library.lanl.gov/cgi-bin/getfile?27-08.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Los Alamos Science",
  keywords =     "quantum cryptography",
}

@Book{Northcutt:2002:NID,
  author =       "Stephen Northcutt and Judy Novak",
  title =        "Network intrusion detection",
  publisher =    pub-NEW-RIDERS,
  address =      pub-NEW-RIDERS:adr,
  edition =      "Third",
  pages =        "xvii + 490",
  year =         "2002",
  ISBN =         "0-7357-1265-4",
  ISBN-13 =      "978-0-7357-1265-2",
  LCCN =         "TK5105.59 .N475 2003",
  bibdate =      "Sat Dec 17 17:13:02 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures; Internet;
                 Security measures; Computer security",
}

@Article{Ohbuchi:2002:FDA,
  author =       "Ryutarou Ohbuchi and Akio Mukaiyama and Shigeo
                 Takahashi",
  title =        "A Frequency-Domain Approach to Watermarking {$3$D}
                 Shapes",
  journal =      j-CGF,
  volume =       "21",
  number =       "3",
  pages =        "373--382",
  month =        sep,
  year =         "2002",
  CODEN =        "CGFODY",
  ISSN =         "0167-7055 (print), 1467-8659 (electronic)",
  ISSN-L =       "0167-7055",
  bibdate =      "Sat Jan 10 08:23:48 MST 2004",
  bibsource =    "http://www.blackwellpublishing.com/journal.asp?ref=0167-7055;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Com{\-}pu{\-}ter Graphics Forum",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1467-8659/",
}

@Article{Ohzahata:2002:FAM,
  author =       "Satoshi Ohzahata and Shigetomo Kimura and Yoshihiko
                 Ebihara",
  title =        "A Fast Authentication Method for Secure and Seamless
                 Handoff",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2344",
  pages =        "243--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:13 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2344.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2344/23440243.htm;
                 http://link.springer.de/link/service/series/0558/papers/2344/23440243.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Padro:2002:LBI,
  author =       "Carles Padr{\'o} and Germ{\'a}n S{\'a}ez",
  title =        "Lower bounds on the information rate of secret sharing
                 schemes with homogeneous access structure",
  journal =      j-INFO-PROC-LETT,
  volume =       "83",
  number =       "6",
  pages =        "345--351",
  day =          "30",
  month =        sep,
  year =         "2002",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:29 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Palmer:2002:TMQ,
  author =       "Chlo{\"e} Palmer",
  title =        "{Toshiba} makes Quantum Crypto Breakthrough",
  journal =      j-NETWORK-SECURITY,
  volume =       "2002",
  number =       "1",
  pages =        "6--6",
  day =          "1",
  month =        jan,
  year =         "2002",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(02)00115-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:25 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485802001150",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Park:2002:SRL,
  author =       "Sangwoo Park and Soo Hak Sung and Seongtaek Chee and
                 E-Joong Yoon and Jongin Lim",
  title =        "On the Security of {Rijndael}-Like Structures against
                 Differential and Linear Cryptanalysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "176--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010176.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010176.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Park:2002:XQP,
  author =       "Sangwon Park and Yoonra Choi and Hyoung-Joo Kim",
  title =        "{XML} Query Processing Using Signature and {DTD}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2455",
  pages =        "162--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:11:20 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2455.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2455/24550162.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2455/24550162.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Patiyoot:2002:MSE,
  author =       "D. Patiyoot",
  title =        "Migration \slash evolution of security towards
                 wireless {ATM}",
  journal =      j-OPER-SYS-REV,
  volume =       "36",
  number =       "1",
  pages =        "23--30",
  month =        jan,
  year =         "2002",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:37 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Patiyoot:2002:SIW,
  author =       "Danai Patiyoot",
  title =        "Security issues for wireless {ATM} networks",
  journal =      j-OPER-SYS-REV,
  volume =       "36",
  number =       "1",
  pages =        "31--57",
  month =        jan,
  year =         "2002",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:37 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Paulson:2002:NBPb,
  author =       "Linda Dailey Paulson",
  title =        "News Briefs: Project promises accessible technology
                 for the disabled; Two efforts aim to upgrade mobile
                 memory; New Haptics Approach Lets Parents-to-Be
                 ``Touch'' their Unborn Children; Prime breakthrough may
                 improve encryption",
  journal =      j-COMPUTER,
  volume =       "35",
  number =       "10",
  pages =        "26--26",
  month =        oct,
  year =         "2002",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Dec 12 19:31:52 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/dl/mags/co/2002/10/rx026.htm;
                 http://csdl.computer.org/dl/mags/co/2002/10/rx026.pdf;
                 http://www.cse.iitk.ac.in/news/primality.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
  keywords =     "Manindra Agrawal; Neeraj Kayal; Nitin Saxena",
}

@Article{Paulson:2002:NBR,
  author =       "Linda Dailey Paulson",
  title =        "News Briefs: Researchers upgrade {Smart Card}
                 technology; New optical clock could synchronize chips;
                 Blind, deaf engineer develops computerized {Braille}
                 machine",
  journal =      j-COMPUTER,
  volume =       "35",
  number =       "12",
  pages =        "25--27",
  month =        dec,
  year =         "2002",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Dec 12 19:31:54 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/dl/mags/co/2002/12/rz025.htm;
                 http://csdl.computer.org/dl/mags/co/2002/12/rz025.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Pieprzyk:2002:CCI,
  author =       "Josef Pieprzyk and Xian-Mo Zhang",
  title =        "Constructions of Cheating Immune Secret Sharing",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2288",
  pages =        "226--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:14 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2288.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2288/22880226.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2288/22880226.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Pieprzyk:2002:CPL,
  author =       "Josef Pieprzyk and Xian-Mo Zhang",
  title =        "Cheating Prevention in Linear Secret Sharing",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2384",
  pages =        "121--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2384/23840121.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2384/23840121.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Pinkas:2002:CTP,
  author =       "Benny Pinkas",
  title =        "Cryptographic techniques for privacy-preserving data
                 mining",
  journal =      j-SIGKDD,
  volume =       "4",
  number =       "2",
  pages =        "12--19",
  month =        dec,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/772862.772865",
  ISSN =         "1931-0145 (print), 1931-0153 (electronic)",
  ISSN-L =       "1931-0145",
  bibdate =      "Sat Sep 17 11:06:15 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Research in secure distributed computation, which was
                 done as part of a larger body of research in the theory
                 of cryptography, has achieved remarkable results. It
                 was shown that non-trusting parties can jointly compute
                 functions of their different inputs while ensuring that
                 no party learns anything but the defined output of the
                 function. These results were shown using generic
                 constructions that can be applied to any function that
                 has an efficient representation as a circuit. We
                 describe these results, discuss their efficiency, and
                 demonstrate their relevance to privacy preserving
                 computation of data mining algorithms. We also show
                 examples of secure computation of data mining
                 algorithms that use these generic constructions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGKDD Explorations Newsletter",
}

@Book{Piper:2002:CVS,
  author =       "Fred Piper and Sean Murphy",
  title =        "Cryptography: a Very Short Introduction",
  volume =       "68",
  publisher =    pub-OXFORD,
  address =      pub-OXFORD:adr,
  pages =        "142",
  year =         "2002",
  ISBN =         "0-19-280315-8",
  ISBN-13 =      "978-0-19-280315-3",
  LCCN =         "Z103 .P56 2002",
  bibdate =      "Wed Jan 16 09:35:04 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "UK\pounds 6.99",
  series =       "Very short introductions",
  acknowledgement = ack-nhfb,
}

@Article{Piva:2002:MCW,
  author =       "Alessandro Piva and Franco Bartolini and Mauro Barni",
  title =        "Managing Copyright: Watermark and Cryptography
                 Algorithms",
  journal =      j-IEEE-DISTRIB-SYST-ONLINE,
  volume =       "3",
  number =       "5",
  pages =        "??--??",
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1541-4922 (print), 1558-1683 (electronic)",
  ISSN-L =       "1541-4922",
  bibdate =      "Wed Oct 23 17:47:56 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dsonline.computer.org/0205/features/w3piva.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Distributed Systems Online",
}

@Article{Pointcheval:2002:PSP,
  author =       "David Pointcheval",
  title =        "Practical Security in Public-Key Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2288",
  pages =        "1--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:14 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2288.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2288/22880001.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2288/22880001.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Pomerance:2002:SOC,
  author =       "Carl Pomerance and Igor E. Shparlinski",
  title =        "Smooth Orders and Cryptographic Applications",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2369",
  pages =        "338--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:55 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2369.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2369/23690338.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2369/23690338.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Preneel:2002:NEA,
  author =       "Bart Preneel",
  title =        "{NESSIE}: a {European} Approach to Evaluate
                 Cryptographic Algorithms",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2355",
  pages =        "267--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:48 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2355.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2355/23550267.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2355/23550267.pdf;
                 https://www.cosic.esat.kuleuven.be/publications/article-82.ps",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
  keywords =     "NESSIE (New European Schemes for Signature, Integrity
                 and Encryption)",
}

@TechReport{Preneel:2002:NPT,
  author =       "Bart Preneel",
  title =        "The {NESSIE Project}: Towards New Cryptographic
                 Algorithms",
  type =         "Report",
  number =       "??",
  institution =  "Katholieke Univ. Leuven, Dept. Electrical
                 Engineering-ESAT, Kasteelpark Arenberg 10",
  address =      "B-3001 Leuven-Heverlee, Belgium",
  day =          "25",
  month =        nov,
  year =         "2002",
  bibdate =      "Fri Sep 23 06:29:35 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.stork.eu.org/papers/03_nessiev2.pdf",
  abstract =     "In spite of more than 25 years of open research on
                 cryptographic algorithms, many applications still use
                 insecure cryptography. This paper attempts to explain
                 this problem and tries to motivate why continuous
                 research in this area is required. It also discusses
                 the status of the NESSIE project. NESSIE (New European
                 Schemes for Signature, Integrity and Encryption) is a
                 40-month research project (2000--2003) which intends to
                 put forward a new generation of strong cryptographic
                 algorithms, which have been obtained after an open call
                 and an open evaluation process.",
  acknowledgement = ack-nhfb,
  keywords =     "NESSIE (New European Schemes for Signature, Integrity
                 and Encryption)",
}

@Article{Quisquater:2002:CTM,
  author =       "Jean-Jacques Quisquater and Fran{\c{c}}ois-Xavier
                 Standaert and Gael Rouvroy and Jean-Pierre David and
                 Jean-Didier Legat",
  title =        "A Cryptanalytic Time-Memory Tradeoff: First {FPGA}
                 Implementation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2438",
  pages =        "780--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:28 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2438.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2438/24380780.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2438/24380780.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Reddy:2002:AAM,
  author =       "Prakash Reddy and Venky Krishnan and Kan Zhang and
                 Devaraj Das",
  title =        "Authentication and Authorization of Mobile Clients in
                 Public Data Networks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2437",
  pages =        "115--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:24 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2437.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2437/24370115.htm;
                 http://link.springer.de/link/service/series/0558/papers/2437/24370115.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Reyzin:2002:BTB,
  author =       "Leonid Reyzin and Natan Reyzin",
  title =        "Better than {BiBa}: Short One-Time Signatures with
                 Fast Signing and Verifying",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2384",
  pages =        "144--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2384/23840144.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2384/23840144.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Riedl:2002:FSH,
  author =       "Reinhard Riedl and Nico Maibaum",
  title =        "{FASME} --- From {Smartcards} to Holistic
                 {IT}-Architectures for Interstate e-Government",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2456",
  pages =        "173--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:28 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2456.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2456/24560173.htm;
                 http://link.springer.de/link/service/series/0558/papers/2456/24560173.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Rila:2002:DAB,
  author =       "Luciano Rila",
  title =        "Denial of Access in Biometrics-Based Authentication
                 Systems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2437",
  pages =        "19--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:24 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2437.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2437/24370019.htm;
                 http://link.springer.de/link/service/series/0558/papers/2437/24370019.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Riley:2002:CBR,
  author =       "K. Jonathan Riley and John P. Eakins",
  title =        "Content-Based Retrieval of Historical Watermark
                 Images: {I}-tracings",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2383",
  pages =        "253--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2383.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2383/23830253.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2383/23830253.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Robinson:2002:LLE,
  author =       "Andrew Robinson",
  title =        "Lost languages: the enigma of the world's undeciphered
                 scripts",
  publisher =    pub-MCGRAW-HILL,
  address =      pub-MCGRAW-HILL:adr,
  pages =        "352",
  year =         "2002",
  ISBN =         "0-07-135743-2 (hardcover)",
  ISBN-13 =      "978-0-07-135743-2 (hardcover)",
  LCCN =         "P211 .R59 2002",
  bibdate =      "Sat Dec 17 17:34:43 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/bios/mh041/2001051412.html;
                 http://www.loc.gov/catdir/description/mh021/2001051412.html;
                 http://www.loc.gov/catdir/toc/fy022/2001051412.html",
  acknowledgement = ack-nhfb,
  remark =       "A Peter N. Nevraumont book.",
  subject =      "Writing; History; Extinct languages",
  tableofcontents = "Acknowledgements 8\par

                 Introduction: Writing Systems, Coded Civilizations and
                 Undeciphered Scripts 10\par

                 Part I: Three Great Decipherments\par

                 I. Voices of the Pharaohs: Egyptian Hieroglyphs (Egypt)
                 50\par

                 II. The Labyrinth of Minos: LINEAR B (GREECE)
                 74\par

                 III. Bishop de Landa's Inquisition: Mayan Glyphs
                 (Central America) 104\par

                 Part II: Undeciphered Scripts\par

                 IV: Voices of the Black Pharaohs: The Meroitic Script
                 (Sudan) 140\par

                 V: Greek but not Greek: The Etruscan Alphabet (Italy)
                 156\par

                 VI: A Mediterranean Mystery: Linear A (the Aegean)
                 182\par

                 VII: Secrets of the Ancient Ledgers: The Proto-Elamite
                 Script (Iran) 200\par

                 VIII: Birdmen of Rapanui: Rongorongo (Easter Island)
                 218\par

                 IX: The New World Begins to Write: The Zapotec and
                 Isthmian Scripts (Mexico) 244\par

                 X: At the Sign of the Unicorn: The Indus Script
                 (Pakistan/India) 264\par

                 XI: Sir Arthur's ``Chaunt of Victory'': The Phaistos
                 Disc (Crete) 296\par

                 Conclusion\par

                 XII: The Urge to Decipher 316\par

                 Notes and References 324\par

                 Further Reading 334\par

                 Bibliography 335\par

                 Illustration Credits 341\par

                 Index 344.",
}

@Article{Roscoe:2002:TBC,
  author =       "Timothy Roscoe and Steven Hand",
  title =        "Transaction-Based Charging in Mnemosyne: a
                 Peer-to-Peer Steganographic Storage System",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2376",
  pages =        "335--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:15 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2376.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2376/23760335.htm;
                 http://link.springer.de/link/service/series/0558/papers/2376/23760335.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Roth:2002:JSA,
  author =       "Volker Roth",
  title =        "{Java} Security Architecture And Extensions",
  journal =      j-DDJ,
  volume =       "27",
  number =       "4",
  pages =        "34, 36--38",
  month =        apr,
  year =         "2002",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Tue Mar 5 07:08:41 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/ftp/2002/2002_04/jca.txt;
                 http://www.ddj.com/ftp/2002/2002_04/jca.zip",
  abstract =     "The Java Cryptography Architecture is a framework that
                 attempts to provide a common interface for accessing
                 basic cryptographic primitives. Additional resources
                 include jca.txt (listings) and jca.zip (source code).",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Rothe:2002:SFC,
  author =       "J{\"o}rg Rothe",
  title =        "Some facets of complexity theory and cryptography: a
                 five-lecture tutorial",
  journal =      j-COMP-SURV,
  volume =       "34",
  number =       "4",
  pages =        "504--549",
  month =        dec,
  year =         "2002",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/592642.592646",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:18:33 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "In this tutorial, selected topics of cryptology and of
                 computational complexity theory are presented. We give
                 a brief overview of the history and the foundations of
                 classical cryptography, and then move on to modern
                 public-key cryptography. Particular attention is paid
                 to cryptographic protocols and the problem of
                 constructing key components of protocols such as
                 one-way functions. A function is one-way if it is easy
                 to compute, but hard to invert. We discuss the notion
                 of one-way functions both in a cryptographic and in a
                 complexity-theoretic setting. We also consider
                 interactive proof systems and present some interesting
                 zero-knowledge protocols. In a zero-knowledge protocol,
                 one party can convince the other party of knowing some
                 secret information without disclosing any bit of this
                 information. Motivated by these protocols, we survey
                 some complexity-theoretic results on interactive proof
                 systems and related complexity classes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Complexity theory; interactive proof systems; one-way
                 functions; public-key cryptography; zero-knowledge
                 protocols",
}

@Manual{RSA:2002:PVR,
  author =       "{RSA Laboratories}",
  title =        "{PKCS \#1 v2.1}: {RSA} Cryptography Standard",
  organization = pub-RSA,
  address =      pub-RSA:adr,
  pages =        "61",
  day =          "14",
  month =        jun,
  year =         "2002",
  bibdate =      "Mon Dec 08 08:16:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.rsasecurity.com/rsalabs/pkcs/pkcs-1/index.html",
  acknowledgement = ack-nhfb,
}

@InProceedings{Rubin:2002:SAV,
  author =       "Karl Rubin and Alice Silverberg",
  title =        "Supersingular {Abelian} Varieties in Cryptology",
  crossref =     "Yung:2002:ACC",
  pages =        "336--353",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420336.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420336.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Russell:2002:HFU,
  author =       "Alexander Russell and Hong Wang",
  title =        "How to Fool an Unbounded Adversary with a Short Key",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2332",
  pages =        "133--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:37 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2332.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2332/23320133.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2332/23320133.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Saeednia:2002:IBS,
  author =       "Shahrokh Saeednia",
  title =        "An identity-based society oriented signature scheme
                 with anonymous signers",
  journal =      j-INFO-PROC-LETT,
  volume =       "83",
  number =       "6",
  pages =        "295--299",
  day =          "30",
  month =        sep,
  year =         "2002",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:29 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Saini:2002:JMD,
  author =       "S. P. Saini and F. Ahmad",
  title =        "{Java} Model of {DSA} ({Digital Signature
                 Algorithm})",
  journal =      j-IETE-TECH-REV,
  volume =       "19",
  number =       "4",
  publisher =    "Institute of Electronics \& Telecommunication",
  pages =        "189--194",
  year =         "2002",
  CODEN =        "ITREEI",
  ISSN =         "0256-4602",
  ISSN-L =       "0256-4602",
  bibdate =      "Tue Nov 19 09:39:05 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 Ingenta database",
  acknowledgement = ack-nhfb,
  fjournal =     "IETE Technical Review",
}

@Article{Sakurai:2002:SMP,
  author =       "Kouichi Sakurai and Tsuyoshi Takagi",
  title =        "On the Security of a Modified {Paillier} Public-Key
                 Primitive",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2384",
  pages =        "436--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2384/23840436.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2384/23840436.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Sarkar:2002:FCM,
  author =       "Palash Sarkar",
  title =        "The Filter-Combiner Model for Memoryless Synchronous
                 Stream Ciphers",
  crossref =     "Yung:2002:ACC",
  pages =        "533--548",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420533.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420533.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Satoh:2002:SHS,
  author =       "Akashi Satoh and Sumio Morioka",
  title =        "Small and High-Speed Hardware Architectures for the
                 {3GPP} Standard Cipher {KASUMI}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2433",
  pages =        "48--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:26 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2433.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2433/24330048.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2433/24330048.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Schultz:2002:GBC,
  author =       "E. Eugene Schultz",
  title =        "The gap between cryptography and information
                 security",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "8",
  pages =        "674--676",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802008015",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shahruz:2002:DNC,
  author =       "S. M. Shahruz and A. K. Pradeep and R. Gurumoorthy",
  title =        "Design of a novel cryptosystem based on chaotic
                 oscillators and feedback inversion",
  journal =      j-J-SOUND-VIB,
  volume =       "250",
  number =       "4",
  pages =        "762--771",
  year =         "2002",
  CODEN =        "JSVIAG",
  ISSN =         "0022-460X",
  ISSN-L =       "0022-460X",
  MRclass =      "94A60 (34C28 37N99)",
  MRnumber =     "1 893 980",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Journal of Sound and Vibration",
}

@InProceedings{Shapiro:2002:CCM,
  author =       "Jonathan S. Shapiro",
  title =        "{CPCMS}: a Configuration Management System Based on
                 Cryptographic Names",
  crossref =     "USENIX:2002:PFT",
  pages =        "??--??",
  year =         "2002",
  bibdate =      "Tue Oct 15 11:37:49 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/usenix2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/usenix02/tech/freenix/shapiro.html",
  acknowledgement = ack-nhfb,
}

@Article{Shelfer:2002:SCE,
  author =       "Katherine M. Shelfer and J. Drew Procaccino",
  title =        "Smart card evolution",
  journal =      j-CACM,
  volume =       "45",
  number =       "7",
  pages =        "83--88",
  month =        jul,
  year =         "2002",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 1 07:05:18 MDT 2002",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Shen:2002:NDW,
  author =       "Kuan-Ting Shen and Ling-Hwei Chen",
  title =        "A New Digital Watermarking Technique for Video",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2314",
  pages =        "269--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:26 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2314.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2314/23140269.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2314/23140269.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Shigetomi:2002:ALS,
  author =       "Rie Shigetomi and Akira Otsuka and Takahide Ogawa and
                 Hideki Imai",
  title =        "An Anonymous Loan System Based on Group Signature
                 Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2433",
  pages =        "244--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:26 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2433.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2433/24330244.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2433/24330244.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Shimoyama:2002:BCS,
  author =       "Takeshi Shimoyama and Hitoshi Yanami and Kazuhiro
                 Yokoyama and Masahiko Takenaka and Kouichi Itoh and Jun
                 Yajima and Naoya Torii and Hidema Tanaka",
  title =        "The Block Cipher {SC2000}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2355",
  pages =        "312--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:48 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2355.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2355/23550312.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2355/23550312.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Shimoyama:2002:MLC,
  author =       "Takeshi Shimoyama and Masahiko Takenaka and Takeshi
                 Koshiba",
  title =        "Multiple Linear Cryptanalysis of a Reduced Round
                 {RC6}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2365",
  pages =        "76--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:52 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2365.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2365/23650076.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2365/23650076.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Shparlinski:2002:SMS,
  author =       "Igor E. Shparlinski",
  title =        "Security of most significant bits of $ g^{x^2} $",
  journal =      j-INFO-PROC-LETT,
  volume =       "83",
  number =       "2",
  pages =        "109--113",
  day =          "31",
  month =        jul,
  year =         "2002",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:29 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "bit security; cryptography; Diffie--Hellman;
                 exponential sums; hidden number problem",
}

@Article{Shyamasundar:2002:ACP,
  author =       "R. K. Shyamasundar",
  title =        "Analyzing Cryptographic Protocols in a Reactive
                 Framework",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2294",
  pages =        "46--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:17 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2294.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2294/22940046.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2294/22940046.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Simon:2002:CRE,
  author =       "Denis Simon",
  title =        "Computing the rank of elliptic curves over number
                 fields",
  journal =      j-LMS-J-COMPUT-MATH,
  volume =       "5",
  pages =        "7--17",
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1461-1570",
  MRclass =      "11Dxx (11Rxx 11Yxx)",
  MRnumber =     "1 916 919",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.lms.ac.uk/jcm/5/lms2000-006/",
  fjournal =     "LMS Journal of Computation and Mathematics",
}

@Book{Singh:2002:CBH,
  author =       "Simon Singh",
  title =        "The Code Book: How to Make It, Break It, Hack It, or
                 Crack It",
  publisher =    "Delacorte Press",
  address =      "New York, NY, USA",
  pages =        "263 (est.)",
  year =         "2002",
  ISBN =         "0-385-72913-8",
  ISBN-13 =      "978-0-385-72913-0",
  LCCN =         "TK5102.92 .S56 2002",
  bibdate =      "Sat Apr 20 12:33:48 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  subject =      "Coding theory; Cryptography",
  tableofcontents = "1 The Cipher of Mary Queen of Scots 5\par

                 The birth of cryptography, the substitution cipher and
                 the invention of codebreaking by frequency
                 analysis\par

                 2 The Anonymous Codebreaker 51\par

                 The Vigen{\`e}re cipher, why cryptographers seldom get
                 credit for their breakthroughs and a tale of buried
                 treasure\par

                 3 The Mechanization of Secrecy 95\par

                 The Zimmermann telegram, the Enigma machine and how
                 cryptography changed the courses of World Wars I and
                 II\par

                 4 The Language Barrier 152\par

                 The impenetrability of unknown languages, the Navajo
                 code talkers of World War II and the decipherment of
                 Egyptian hieroglyphs\par

                 5 Alice and Bob Go Public 180\par

                 Modern cryptography, the solution to the so-called
                 key-distribution problem and the secret history of
                 nonsecret encryption\par

                 6 Pretty Good Privacy 221\par

                 The politics of privacy, the future of cryptography ---
                 and the quest for an uncrackable code.",
  xxnote =       "Check year: some catalogs have 2001, others 2002. See
                 also \cite{Singh:1999:CBE,Singh:2000:CBE}.",
}

@Article{Smeraldi:2002:SVF,
  author =       "Fabrizio Smeraldi and Josef Bigun and Wulfram
                 Gerstner",
  title =        "Support Vector Features and the Role of Dimensionality
                 in Face Authentication",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2388",
  pages =        "249--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:09 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2388.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2388/23880249.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2388/23880249.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Smith:2002:OAP,
  author =       "Sean W. Smith",
  title =        "Outbound Authentication for Programmable Secure
                 Coprocessors",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2502",
  pages =        "72--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:43 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2502.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2502/25020072.htm;
                 http://link.springer.de/link/service/series/0558/papers/2502/25020072.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Speed:2002:PIS,
  author =       "Timothy Speed and Juanita Ellis and Steffano Korper",
  title =        "The Personal {Internet} Security Guidebook: Keeping
                 Hackers and Crackers out of Your Home",
  publisher =    pub-ACADEMIC,
  address =      pub-ACADEMIC:adr,
  pages =        "xxiv + 202",
  year =         "2002",
  ISBN =         "0-12-656561-9",
  ISBN-13 =      "978-0-12-656561-4",
  LCCN =         "TK5105.59 .S6423 2002",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$44.95",
  series =       "The Korper and Ellis e-commerce books series",
  acknowledgement = ack-nhfb,
  subject =      "Internet; Security measures",
}

@Article{Srinathan:2002:ASC,
  author =       "K. Srinathan and M. V. N. Ashwin Kumar and C. Pandu
                 Rangan",
  title =        "Asynchronous Secure Communication Tolerating Mixed
                 Adversaries",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "224--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010224.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010224.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Stallings:2002:CNS,
  author =       "William Stallings",
  title =        "Cryptography and network security: principles and
                 practice",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  edition =      "Third",
  pages =        "696 (est.)",
  year =         "2002",
  ISBN =         "0-13-091429-0",
  ISBN-13 =      "978-0-13-091429-3",
  LCCN =         "",
  bibdate =      "Mon Oct 16 10:05:17 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "coding theory; computer networks --- security
                 measures; computer security; data encryption (computer
                 science)",
}

@Article{Standboge:2002:ENO,
  author =       "James Standboge",
  title =        "Encrypted {NFS} with {OpenSSH} and {Linux}",
  journal =      j-SYS-ADMIN,
  volume =       "11",
  number =       "3",
  pages =        "30, 32--34",
  month =        mar,
  year =         "2002",
  CODEN =        "SYADE7",
  ISSN =         "1061-2688",
  bibdate =      "Fri Feb 22 14:32:38 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.samag.com/",
  acknowledgement = ack-nhfb,
  fjournal =     "Sys admin: the journal for UNIX system
                 administrators",
}

@Book{Stefanek:2002:ISB,
  author =       "George L. Stefanek",
  title =        "Information security best practices: 205 basic rules",
  publisher =    pub-NEWNES,
  address =      pub-NEWNES:adr,
  pages =        "xii + 194",
  year =         "2002",
  ISBN =         "1-878707-96-5",
  ISBN-13 =      "978-1-878707-96-3",
  LCCN =         "QA76.9.A25S744 2002",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$29.95",
  acknowledgement = ack-nhfb,
}

@Article{Steinfeld:2002:NSA,
  author =       "Ron Steinfeld and Joonsang Baek and Yuliang Zheng",
  title =        "On the Necessity of Strong Assumptions for the
                 Security of a Class of Asymmetric Encryption Schemes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2384",
  pages =        "241--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2384/23840241.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2384/23840241.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Stern:2002:FAP,
  author =       "Jacques Stern and David Pointcheval and John
                 Malone-Lee and Nigel P. Smart",
  title =        "Flaws in Applying Proof Methodologies to Signature
                 Schemes",
  crossref =     "Yung:2002:ACC",
  pages =        "93--110",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420093.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420093.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Book{Stinson:2002:CTP,
  author =       "Douglas R. (Douglas Robert) Stinson",
  title =        "Cryptography: theory and practice",
  publisher =    pub-CHAPMAN-HALL-CRC,
  address =      pub-CHAPMAN-HALL-CRC:adr,
  edition =      "Second",
  pages =        "339",
  year =         "2002",
  ISBN =         "1-58488-206-9",
  ISBN-13 =      "978-1-58488-206-0",
  LCCN =         "QA268 .S75 2002",
  bibdate =      "Fri Mar 23 11:28:34 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "The CRC Press series on discrete mathematics and its
                 applications.",
  acknowledgement = ack-nhfb,
  subject =      "Coding theory; Cryptography",
}

@Article{Stoll:2002:MMC,
  author =       "Michael Stoll and John E. Cremona",
  title =        "Minimal models for $2$-coverings of elliptic curves",
  journal =      j-LMS-J-COMPUT-MATH,
  volume =       "5",
  pages =        "220--??",
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1461-1570",
  bibdate =      "Thu Jan 15 06:08:29 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.lms.ac.uk/jcm/5/lms2002-013/",
  acknowledgement = ack-nhfb,
  fjournal =     "LMS Journal of Computation and Mathematics",
}

@Article{Strubinger:2002:HBS,
  author =       "Ray Strubinger",
  title =        "A Homegrown Backup Solution Utilizing {RSA} Keys,
                 {SSH}, and {\tt tar}",
  journal =      j-SYS-ADMIN,
  volume =       "11",
  number =       "4",
  pages =        "37--38",
  month =        apr,
  year =         "2002",
  CODEN =        "SYADE7",
  ISSN =         "1061-2688",
  bibdate =      "Tue Mar 19 18:37:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.samag.com/",
  acknowledgement = ack-nhfb,
  fjournal =     "Sys admin: the journal for UNIX system
                 administrators",
}

@Article{Stubblebine:2002:ALF,
  author =       "S. G. Stubblebine and R. N. Wright",
  title =        "An authentication logic with formal semantics
                 supporting synchronization, revocation, and recency",
  journal =      j-IEEE-TRANS-SOFTW-ENG,
  volume =       "28",
  number =       "3",
  pages =        "256--285",
  month =        mar,
  year =         "2002",
  CODEN =        "IESEDJ",
  DOI =          "https://doi.org/10.1109/32.991320",
  ISSN =         "0098-5589 (print), 1939-3520 (electronic)",
  ISSN-L =       "0098-5589",
  bibdate =      "Thu Feb 1 11:00:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=991320",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Software Engineering",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32",
}

@Article{Sun:2002:IIR,
  author =       "Hung-Min Sun",
  title =        "Improving the information rate of a private-key
                 cryptosystem based on product codes",
  journal =      "Informatica (Vilnius)",
  volume =       "13",
  number =       "1",
  pages =        "105--110",
  year =         "2002",
  ISSN =         "0868-4952",
  MRclass =      "94A62",
  MRnumber =     "1 898 177",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Lithuanian Academy of Sciences. Informatica
                 (Vilnius)",
}

@Article{Sun:2002:NAD,
  author =       "Qi Sun and Qi Fan Zhang and Guo Hua Peng",
  title =        "A new algorithm for the {Dickson} polynomial {$ g_e(x,
                 1) $} public key cryptosystem",
  journal =      "Sichuan Daxue Xuebao",
  volume =       "39",
  number =       "1",
  pages =        "18--23",
  year =         "2002",
  CODEN =        "SCTHAO",
  ISSN =         "0490-6756",
  MRclass =      "94A60",
  MRnumber =     "2002k:94028",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Journal of Sichuan University. Natural Science
                 Edition. Sichuan Daxue Xuebao. Ziran Kexue Ban",
}

@Article{Sun:2002:WDC,
  author =       "Hung-Min Sun and Bor-Liang Chen",
  title =        "Weighted decomposition construction for perfect secret
                 sharing schemes",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "43",
  number =       "6--7",
  pages =        "877--887",
  month =        mar # "\slash " # apr,
  year =         "2002",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:49:22 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122101003285",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Tada:2002:OSM,
  author =       "Mitsuru Tada",
  title =        "An Order-Specified Multisignature Scheme Secure
                 against Active Insider Attacks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2384",
  pages =        "328--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2384/23840328.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2384/23840328.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Thien:2002:TSS,
  author =       "Chih-Ching Thien and Ja-Chen Lin",
  title =        "Technical Section: Secret image sharing",
  journal =      j-COMPUTERS-AND-GRAPHICS,
  volume =       "26",
  number =       "5",
  pages =        "765--770",
  day =          "??",
  month =        oct,
  year =         "2002",
  CODEN =        "COGRD2",
  ISSN =         "0097-8493 (print), 1873-7684 (electronic)",
  ISSN-L =       "0097-8493",
  bibdate =      "Fri Nov 22 09:29:36 MST 2002",
  bibsource =    "http://www.elsevier.com/locate/issn/00978493;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.elsevier.com/gej-ng/10/13/20/68/56/39/abstract.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Graphics",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00978493",
}

@Article{Ting:2002:FBS,
  author =       "Kurt K. Ting and Steve C. L. Yuen and K. H. Lee and
                 Philip H. W. Leong",
  title =        "An {FPGA} Based {SHA}-256 Processor",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2438",
  pages =        "577--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:28 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2438.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2438/24380577.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2438/24380577.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Topham:2002:BRJ,
  author =       "Jon Topham",
  title =        "Book Review: {James A. Secord, Victorian Sensation:
                 The Extraordinary Publication, Reception, and Secret
                 Authorship of Vestiges of the Natural History of
                 Creation. Chicago and London: University of Chicago
                 Press, 2001. Pp. xix + 624. ISBN 0-226-74410-8. \pounds
                 22.50, \$35.00 (hardcover)}",
  journal =      j-BRITISH-J-HIST-SCI,
  volume =       "35",
  number =       "3",
  pages =        "347--379",
  month =        sep,
  year =         "2002",
  CODEN =        "BJHSAT",
  DOI =          "https://doi.org/10.1017/S0007087402304783",
  ISSN =         "0007-0874 (print), 1474-001X (electronic)",
  ISSN-L =       "0007-0874",
  bibdate =      "Thu Sep 23 07:34:43 MDT 2010",
  bibsource =    "http://journals.cambridge.org/action/displayJournal?jid=BJH;
                 https://www.math.utah.edu/pub/tex/bib/bjhs2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "British Journal for the History of Science",
  journal-URL =  "http://journals.cambridge.org/action/displayJournal?jid=BJH",
}

@Book{Trappe:2002:ICC,
  author =       "Wade Trappe and Lawrence C. Washington",
  title =        "Introduction to Cryptography with Coding Theory",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  pages =        "xiii + 490",
  year =         "2002",
  ISBN =         "0-13-061814-4",
  ISBN-13 =      "978-0-13-061814-6",
  LCCN =         "QA268 .T73 2002",
  bibdate =      "Wed Jan 16 09:11:10 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "UK\pounds 29.99",
  acknowledgement = ack-nhfb,
  keywords =     "coding theory; cryptography",
}

@Article{Tsai:2002:SMS,
  author =       "Chwei-Shyong Tsai and Chin-Chen Chang and Tung-Shou
                 Chen",
  title =        "Sharing multiple secrets in digital images",
  journal =      j-J-SYST-SOFTW,
  volume =       "64",
  number =       "2",
  pages =        "163--170",
  day =          "15",
  month =        nov,
  year =         "2002",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Sat Oct 25 07:14:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Utami:2002:FID,
  author =       "Dewi Utami and Hadi Suwastio and Bambang Sumadjudin",
  title =        "{FPGA} Implementation of Digital Chaotic
                 Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2510",
  pages =        "239--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:47 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2510.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2510/25100239.htm;
                 http://link.springer.de/link/service/series/0558/papers/2510/25100239.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Vaudenay:2002:SFI,
  author =       "Serge Vaudenay",
  title =        "Security Flaws Induced by {CBC} Padding ---
                 Applications to {SSL}, {IPSEC}, {WTLS} \ldots{}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2332",
  pages =        "534--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:37 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2332.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2332/23320534.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2332/23320534.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Vercauteren:2002:CZF,
  author =       "Frederik Vercauteren",
  title =        "Computing Zeta Functions of Hyperelliptic Curves over
                 Finite Fields of Characteristic $2$",
  crossref =     "Yung:2002:ACC",
  pages =        "369--384",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2442/24420369.htm;
                 http://link.springer.de/link/service/series/0558/papers/2442/24420369.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Book{Viega:2002:NSO,
  author =       "John Viega and Matt Messier and Pravir Chandra",
  title =        "Network Security with {OpenSSL}: Cryptography for
                 Secure Communications",
  publisher =    pub-ORA,
  address =      pub-ORA:adr,
  pages =        "xiv + 367",
  year =         "2002",
  ISBN =         "0-596-00270-X",
  ISBN-13 =      "978-0-596-00270-1",
  LCCN =         "TK5105.59 .V54 2002",
  bibdate =      "Wed Oct 30 16:15:17 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.oreilly.com/catalog/prdindex.html",
  price =        "US\$39.95",
  URL =          "http://safari.oreilly.com/059600270X;
                 http://www.oreilly.com/catalog/openssl",
  acknowledgement = ack-nhfb,
  keywords =     "computer network protocols; computer networks ---
                 security measures; OpenSSL",
  publishersummary = "OpenSSL is a popular and effective open source
                 version of SSL/TLS, the most widely used protocol for
                 secure network communications. The only guide available
                 on the subject, Network Security with OpenSSL details
                 the challenges in securing network communications, and
                 shows you how to use OpenSSL tools to best meet those
                 challenges. Focused on the practical, this book
                 provides only the information that is necessary to use
                 OpenSSL safely and effectively.",
}

@Misc{Vixie:2002:SRR,
  author =       "Paul A. Vixie",
  title =        "Spam --- Roles and Responsibilities",
  year =         "2002",
  bibdate =      "Tue Oct 15 12:37:27 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/usenix2000.bib",
  note =         "Unpublished invited talk, BSDCON2002: Growing the BSD
                 Community, February 11--14, 2002, Cathedral Hill Hotel,
                 San Francisco, CA",
  URL =          "http://www.usenix.org/publications/library/proceedings/bsdcon02/tech.html",
  abstract =     "Protocols and practices designed for computer
                 scientists and members of the U.S. military are not
                 always a perfect fit for broad commercial use. So it is
                 in the case of e-mail, which has no practical
                 authentication, auditing, rate limiting, or security.
                 In this invited talk, Mr. Vixie will highlight some
                 common abuses of the e-mail protocols and explain the
                 roles and responsibilities of each party to such
                 abuse.",
  acknowledgement = ack-nhfb,
}

@InProceedings{Wagner:2002:GBP,
  author =       "David Wagner",
  title =        "A Generalized Birthday Problem: (Extended Abstract)",
  crossref =     "Yung:2002:ACC",
  pages =        "288--303",
  year =         "2002",
  bibdate =      "Tue Apr 4 09:52:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2002; cryptography",
}

@Article{Wang:2002:AAB,
  author =       "Lusheng Wang and Zimao Li",
  title =        "An approximation algorithm for a bottleneck
                 $k$-{Steiner} tree problem in the {Euclidean} plane",
  journal =      j-INFO-PROC-LETT,
  volume =       "81",
  number =       "3",
  pages =        "151--156",
  day =          "14",
  month =        feb,
  year =         "2002",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 06:35:42 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.elsevier.com/gej-ng/10/23/20/85/34/32/abstract.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Wang:2002:CSE,
  author =       "Xiang Sheng Wang and Juan Ren Gan",
  title =        "A chaotic sequence encryption method",
  journal =      j-CHIN-J-COMPUTERS,
  volume =       "25",
  number =       "4",
  pages =        "351--356",
  year =         "2002",
  CODEN =        "JIXUDT",
  ISSN =         "0254-4164",
  MRclass =      "94A60 (37N99)",
  MRnumber =     "1 919 052",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  fjournal =     "Chinese Journal of Computers. Jisuanji Xuebao",
}

@Article{Wang:2002:IPD,
  author =       "Xinyuan Wang and Douglas S. Reeves and S. Felix Wu",
  title =        "Inter-Packet Delay Based Correlation for Tracing
                 Encrypted Connections through Stepping Stones",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2502",
  pages =        "244--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:43 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2502.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2502/25020244.htm;
                 http://link.springer.de/link/service/series/0558/papers/2502/25020244.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wang:2002:WEM,
  author =       "Shiuh-Jeng Wang and Kai-Sheng Yang",
  title =        "Watermark Embedding Mechanism Using Modulus-Based for
                 Intellectual Property Protection on Image Data",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2455",
  pages =        "333--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:11:20 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2455.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2455/24550333.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2455/24550333.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Watanabe:2002:CCD,
  author =       "Yuji Watanabe and Masayuki Numao",
  title =        "Conditional Cryptographic Delegation for {P2P} Data
                 Sharing",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2433",
  pages =        "309--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:26 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2433.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2433/24330309.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2433/24330309.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Misc{Wayman:2002:BAT,
  author =       "James L. Wayman",
  booktitle =    "11th USENIX Security Symposium 2002, August 5--9,
                 2002, San Francisco CA, Invited talk",
  title =        "Biometric Authentication Technologies: Hype Meets the
                 Test Results",
  year =         "2002",
  bibdate =      "Tue Oct 15 11:02:26 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/usenix2000.bib",
  note =         "Unpublished.",
  URL =          "http://www.usenix.org/publications/library/proceedings/sec02/tech.html",
  abstract =     "Biometric authentication is automatic identification
                 or identity verification based on behavioral and
                 physiological characteristics. Its potential for
                 securing financial transactions and controlling
                 physical access has been recognized for over 40 years,
                 but adoption has been considerably slower than
                 predicted. One reason for this has been the unrealistic
                 performance expectations placed on the technologies by
                 both vendors and users. This talk will discuss
                 biometric technologies and applications, performance
                 metrics, and the results of the last 10 years of pilot
                 projects and independent testing. We will explore what
                 has worked, what hasn't, and why, with particular
                 emphasis on the impact of biometrics on privacy.",
  acknowledgement = ack-nhfb,
}

@Book{Wayner:2002:DCI,
  author =       "Peter Wayner",
  title =        "Disappearing cryptography: information hiding:
                 steganography \& watermarking",
  publisher =    pub-MORGAN-KAUFMANN,
  address =      pub-MORGAN-KAUFMANN:adr,
  edition =      "Second",
  pages =        "xvii + 413",
  year =         "2002",
  ISBN =         "1-55860-769-2",
  ISBN-13 =      "978-1-55860-769-9",
  LCCN =         "TK5105.59 .W39 2002",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$44.95",
  acknowledgement = ack-nhfb,
}

@Article{Weber:2002:ECH,
  author =       "Arnd Weber",
  title =        "Enabling crypto: how radical innovations occur",
  journal =      j-CACM,
  volume =       "45",
  number =       "4",
  pages =        "103--107",
  month =        apr,
  year =         "2002",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Apr 9 14:09:15 MDT 2002",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Weimerskirch:2002:DLW,
  author =       "Andr{\'e} Weimerskirch and Gilles Thonet",
  title =        "A Distributed Light-Weight Authentication Model for
                 Ad-hoc Networks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2288",
  pages =        "341--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:14 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2288.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2288/22880341.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2288/22880341.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wernsdorf:2002:RFR,
  author =       "Ralph Wernsdorf",
  title =        "The Round Functions of {RIJNDAEL} Generate the
                 Alternating Group",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2365",
  pages =        "143--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:52 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2365.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2365/23650143.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2365/23650143.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wincelberg:2002:LIE,
  author =       "David Wincelberg and Sy Wong and Dan Leach and Paul
                 Keister and Robert Masta",
  title =        "Letters: Inside {eBook} Security; Numerical Weather
                 Forecasting; {FrontPage EULA}; Priority Queues; Audio
                 Watermarking Versus Compression",
  journal =      j-DDJ,
  volume =       "27",
  number =       "3",
  pages =        "10--10",
  month =        mar,
  year =         "2002",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Tue Feb 12 05:21:42 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Woodruff:2002:CUC,
  author =       "David P. Woodruff and Marten van Dijk",
  title =        "Cryptography in an Unbounded Computational Model",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2332",
  pages =        "149--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:37 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2332.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2332/23320149.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2332/23320149.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wright:2002:EPS,
  author =       "R. N. Wright and S. Spalding",
  title =        "Experimental Performance of Shared {RSA} Modulus
                 Generation",
  journal =      j-ALGORITHMICA,
  volume =       "33",
  number =       "1",
  pages =        "89--103",
  month =        jan,
  year =         "2002",
  CODEN =        "ALGOEJ",
  DOI =          "https://doi.org/10.1007/s00453-001-0106-7",
  ISSN =         "0178-4617 (print), 1432-0541 (electronic)",
  ISSN-L =       "0178-4617",
  MRclass =      "94A62 (68W15)",
  MRnumber =     "MR1888542",
  bibdate =      "Fri Jan 6 11:38:15 MST 2006",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0178-4617&volume=33&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/index-table-a.html#algorithmica;
                 MathSciNet database",
  note =         "Experimental algorithms",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0178-4617&volume=33&issue=1&spage=89",
  acknowledgement = ack-nhfb,
  fjournal =     "Algorithmica. An International Journal in Computer
                 Science",
  journal-URL =  "http://link.springer.com/journal/453",
}

@Article{Wu:2002:CAE,
  author =       "Tzong-Sun Wu and Chien-Lung Hsu",
  title =        "Convertible authenticated encryption scheme",
  journal =      j-J-SYST-SOFTW,
  volume =       "62",
  number =       "3",
  pages =        "205--209",
  day =          "15",
  month =        jun,
  year =         "2002",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Sat Oct 25 07:14:08 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Wu:2002:CSCa,
  author =       "Hongjun Wu and Feng Bao",
  title =        "Cryptanalysis of Stream Cipher {COS$^{(2, 128)}$ Mode
                 I}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2384",
  pages =        "154--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2384/23840154.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2384/23840154.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wu:2002:CSCb,
  author =       "Hongjun Wu",
  title =        "Cryptanalysis of Stream Cipher {Alpha$1$}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2384",
  pages =        "169--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2384/23840169.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2384/23840169.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wu:2002:IBM,
  author =       "Tzong-Sun Wu and Chien-Lung Hsu",
  title =        "{ID}-based multisignatures with distinguished signing
                 authorities for sequential and broadcasting
                 architectures",
  journal =      j-APPL-MATH-COMP,
  volume =       "131",
  number =       "2--3",
  pages =        "349--356",
  day =          "25",
  month =        sep,
  year =         "2002",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Fri Jan 9 08:40:42 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Wu:2002:LCN,
  author =       "Wenling Wu and Dengguo Feng",
  title =        "Linear cryptanalysis of {NUSH} block cipher",
  journal =      "Sci. China Ser. F",
  volume =       "45",
  number =       "1",
  pages =        "59--67",
  year =         "2002",
  ISSN =         "1009-2757",
  MRclass =      "94A60",
  MRnumber =     "1 909 529",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  fjournal =     "Science in China (Scientia Sinica). Series F.
                 Information Sciences",
}

@Article{Wyant:2002:APK,
  author =       "Jeremy Wyant",
  title =        "Applicability of Public Key Cryptosystems to Digital
                 Rights Management Applications",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2339",
  pages =        "75--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:40 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2339.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2339/23390075.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2339/23390075.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{XXX:2002:CC,
  author =       "??",
  title =        "Codes Ciphers",
  publisher =    "Bounty Books",
  address =      "",
  pages =        "",
  year =         "2002",
  ISBN =         "0-7537-0220-7",
  ISBN-13 =      "978-0-7537-0220-8",
  LCCN =         "????",
  bibdate =      "Wed Jan 16 09:34:14 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "UK\pounds 7.99",
  acknowledgement = ack-nhfb,
}

@Article{Yanami:2002:DLC,
  author =       "Hitoshi Yanami and Takeshi Shimoyama and Orr
                 Dunkelman",
  title =        "Differential and Linear Cryptanalysis of a
                 Reduced-Round {SC2000}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2365",
  pages =        "34--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:52 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2365.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2365/23650034.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2365/23650034.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yang:2002:NEC,
  author =       "Ching-Nung Yang",
  title =        "A note on efficient color visual encryption",
  journal =      j-J-INFO-SCI-ENG,
  volume =       "18",
  number =       "3",
  pages =        "367--372",
  year =         "2002",
  CODEN =        "JINEEY",
  ISSN =         "1016-2364",
  MRclass =      "94A60",
  MRnumber =     "1 917 117",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 MathSciNet database",
  note =         "Data encryption and cryptography",
  fjournal =     "JISE. Journal of Information Science and Engineering",
}

@Article{Yeh:2002:SAK,
  author =       "Her-Tyan Yeh and Hung-Min Sun",
  title =        "Simple authenticated key agreement protocol resistant
                 to password guessing attacks",
  journal =      j-OPER-SYS-REV,
  volume =       "36",
  number =       "4",
  pages =        "14--22",
  month =        oct,
  year =         "2002",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:53 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Yen:2002:CAO,
  author =       "Sung-Ming Yen and Seungjoo Kim and Seongan Lim and
                 Sangjae Moon",
  title =        "A Countermeasure against One Physical Cryptanalysis
                 May Benefit Another Attack",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2288",
  pages =        "414--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:14 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2288.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2288/22880414.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2288/22880414.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yen:2002:RSR,
  author =       "Sung-Ming Yen and Seungjoo Kim and Seongan Lim and
                 Sangjae Moon",
  title =        "{RSA} Speedup with Residue Number System Immune
                 against Hardware Fault Cryptanalysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2288",
  pages =        "397--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:14 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2288.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2288/22880397.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2288/22880397.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yoo:2002:LAU,
  author =       "Hyejoung Yoo and Kwangsoo Lee and Sangjin Lee and
                 Jongin Lim",
  title =        "Off-Line Authentication Using Watermarks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2288",
  pages =        "200--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:09:14 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2288.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2288/22880200.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2288/22880200.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yung:2002:CI,
  author =       "Moti Yung",
  title =        "Crypto-integrity",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "567--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010567.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010567.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zhang:2002:CRD,
  author =       "Fangguo Zhang and Shengli Liu and Kwangjo Kim",
  title =        "Compact Representation of Domain Parameters of
                 Hyperelliptic Curve Cryptosystems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2384",
  pages =        "203--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2384/23840203.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2384/23840203.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zhang:2002:IBB,
  author =       "Fangguo Zhang and Kwangjo Kim",
  title =        "{ID}-Based Blind Signature and Ring Signature from
                 Pairings",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2501",
  pages =        "533--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 20:57:42 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.de/link/service/series/0558/bibs/2501/25010533.htm;
                 http://link.springer.de/link/service/series/0558/papers/2501/25010533.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zhao:2002:EII,
  author =       "Xianfeng Zhao and Weinong Wang and Kefei Chen",
  title =        "Exploiting the Intrinsic Irreversibility of Adaptive
                 Technologies to Enhance the Security of Digital
                 Watermarking",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2419",
  pages =        "430--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:23 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2419.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2419/24190430.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2419/24190430.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zheng:2002:NPK,
  author =       "Jiande Zheng",
  title =        "A New Public Key Cryptosystem for Constrained
                 Hardware",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2433",
  pages =        "334--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:26 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2433.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2433/24330334.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2433/24330334.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zhou:2002:MVD,
  author =       "Jianying Zhou",
  title =        "Maintaining the Validity of Digital Signatures in
                 {B2B} Applications",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2384",
  pages =        "303--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:02 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2384.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2384/23840303.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2384/23840303.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zhu:2002:PAK,
  author =       "Feng Zhu and Duncan S. Wong and Agnes H. Chan and
                 Robbie Ye",
  title =        "Password Authenticated Key Exchange Based on {RSA} for
                 Imbalanced Wireless Networks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2433",
  pages =        "150--??",
  year =         "2002",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Sep 10 19:10:26 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/tocs/t2433.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer-ny.com/link/service/series/0558/bibs/2433/24330150.htm;
                 http://link.springer-ny.com/link/service/series/0558/papers/2433/24330150.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@PhdThesis{Aamodt:2003:CSP,
  author =       "Ken S. Aamodt",
  title =        "A cryptographically secure pseudorandom number
                 generator",
  type =         "{Ph.D.} thesis",
  school =       "Purdue University",
  address =      "West Lafayette, IN, USA",
  pages =        "147",
  month =        dec,
  year =         "2003",
  ISBN =         "0-542-33216-7",
  ISBN-13 =      "978-0-542-33216-6",
  bibdate =      "Thu Jan 19 17:01:34 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://catalog.lib.purdue.edu/Find/Record/1380784;
                 http://search.proquest.com/docview/305316022?accountid=14677",
  abstract =     "We investigate a cryptographically secure pseudorandom
                 number generator based on a Linear Feedback Shift
                 Register (LFSR). The statistical properties of the
                 generator are examined, as well as its resistance to
                 cryptographic analysis. LFSRs are known to produce bit
                 streams that have excellent statistical properties.
                 However, they can be predicted by monitoring their
                 outputs briefly. Many approaches have been tried to
                 modify an LFSR output to preserve its statistical
                 properties but make it unpredictable. These techniques
                 work in a `stream-wise' manner; for each bit output
                 from the LFSR, one bit is output from the composite
                 generator. All of these approaches have fallen to
                 cryptanalysis. The technique used in this project
                 processes the output of an LFSR with a hash function,
                 converting blocks of M bits into smaller blocks of N
                 bits. Since the hash function maps many input blocks
                 into any given output block, there is no way of
                 determining the LFSR state by knowing the value of an
                 output block. The resulting generator was analyzed
                 using standard statistical tests for randomness, such
                 as chi-square tests on the distribution of blocks of
                 bits, autocovariance of the output bit stream, and the
                 Marsaglia `Die-Hard Battery' of statistical tests. The
                 Lempel-Ziv data-compression algorithm was used on the
                 output stream to try to discover any structure. In
                 addition, a cryptographic analysis technique, the
                 Berlekamp-Massey algorithm, was used to determine the
                 difficulty of predicting the generator's output.",
  acknowledgement = ack-nhfb,
  advisor =      "Mark R. Bell",
}

@Misc{Adleman:2003:TLP,
  author =       "Leonard M. Adleman",
  title =        "{Turing Lecture} on Pre {RSA} Days",
  howpublished = "World-Wide Web slide presentation, video, and audio.",
  year =         "2003",
  bibdate =      "Sat Nov 19 07:46:28 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.acm.org/turingawardlecture/RSA/",
  acknowledgement = ack-nhfb,
}

@InProceedings{Agrawal:2003:MCA,
  author =       "Dakshi Agrawal and Josyula R. Rao and Pankaj Rohatgi",
  title =        "Multi-channel Attacks",
  crossref =     "Walter:2003:CHE",
  pages =        "2--16",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@InProceedings{Agrawal:2003:SWR,
  author =       "Rakesh Agrawal and Peter J. Haas and Jerry Kiernan",
  title =        "A system for watermarking relational databases",
  crossref =     "ACM:2003:PAS",
  pages =        "674--674",
  year =         "2003",
  bibdate =      "Fri Oct 31 08:03:18 MST 2003",
  bibsource =    "http://www.acm.org/pubs/contents/proceedings/series/sigmod_pods/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Agrawal:2003:WRD,
  author =       "Rakesh Agrawal and Peter J. Haas and Jerry Kiernan",
  title =        "Watermarking relational data: framework, algorithms
                 and analysis",
  journal =      j-VLDB-J,
  volume =       "12",
  number =       "2",
  pages =        "157--169",
  month =        aug,
  year =         "2003",
  CODEN =        "VLDBFR",
  DOI =          "https://doi.org/10.1007/s00778-003-0097-x",
  ISSN =         "1066-8888 (print), 0949-877X (electronic)",
  ISSN-L =       "1066-8888",
  bibdate =      "Mon Jun 23 10:51:06 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We enunciate the need for watermarking database
                 relations to deter data piracy, identify the
                 characteristics of relational data that pose unique
                 challenges for watermarking, and delineate desirable
                 properties of a watermarking system for relational
                 data. We then present an effective watermarking
                 technique geared for relational data. This technique
                 ensures that some bit positions of some of the
                 attributes of some of the tuples contain specific
                 values. The specific bit locations and values are
                 algorithmically determined under the control of a
                 secret key known only to the owner of the data. This
                 bit pattern constitutes the watermark. Only if one has
                 access to the secret key can the watermark be detected
                 with high probability. Detecting the watermark requires
                 access neither to the original data nor the watermark,
                 and the watermark can be easily and efficiently
                 maintained in the presence of insertions, updates, and
                 deletions. Our analysis shows that the proposed
                 technique is robust against various forms of malicious
                 attacks as well as benign updates to the data. Using an
                 implementation running on DB2, we also show that the
                 algorithms perform well enough to be used in real-world
                 applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "VLDB Journal: Very Large Data Bases",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J869",
  keywords =     "database; information hiding; steganography;
                 watermarking",
}

@Article{Aljifri:2003:ILA,
  author =       "Hassan Aljifri and Diego S{\'a}nchez Navarro",
  title =        "International legal aspects of cryptography:
                 Understanding cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "196--203",
  month =        apr,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803003055",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Allen:2003:EST,
  author =       "Daniel R. Allen",
  title =        "Eleven {SSH} tricks",
  journal =      j-LINUX-J,
  volume =       "2003",
  number =       "112",
  pages =        "5--5",
  month =        aug,
  year =         "2003",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Sat Dec 24 17:45:48 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@MastersThesis{Andem:2003:CTE,
  author =       "Vikram Reddy Andem",
  title =        "A Cryptanalysis of the {Tiny Encryption Algorithm}",
  type =         "Master of Science",
  school =       "Department of Computer Science, The University of
                 Alabama",
  address =      "Tuscaloosa, AL, USA",
  pages =        "viii + 60",
  year =         "2003",
  bibdate =      "Tue Dec 27 14:06:46 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.93.5394",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:2003:NAW,
  author =       "Anonymous",
  title =        "Network armies in a world without secrets",
  journal =      j-NETWORK-SECURITY,
  volume =       "2003",
  number =       "3",
  pages =        "14--15",
  month =        mar,
  year =         "2003",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(03)00311-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:42 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485803003118",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2003:NUP,
  author =       "Anonymous",
  title =        "News 2.0: Uncrackable passwords; {WebFountain} drinks
                 down the {Web}; Embracing open source in {India}",
  journal =      j-QUEUE,
  volume =       "1",
  number =       "5",
  pages =        "8--8",
  month =        jul # "\slash " # aug,
  year =         "2003",
  CODEN =        "AQCUAE",
  ISSN =         "1542-7730 (print), 1542-7749 (electronic)",
  ISSN-L =       "1542-7730",
  bibdate =      "Sat Aug 23 11:00:11 2003",
  bibsource =    "http://www.acmqueue.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Queue: Tomorrow's Computing Today",
}

@Article{Anonymous:2003:SEY,
  author =       "Anonymous",
  title =        "Secret enough for you?",
  journal =      j-IEEE-SPECTRUM,
  volume =       "40",
  number =       "4",
  pages =        "9--9",
  month =        apr,
  year =         "2003",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2003.1191775",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Computer networks; Cryptography; Engineering
                 profession; File servers; Government; Internet;
                 National security; Network servers; Satellites; Space
                 technology",
}

@Article{Anonymous:2003:TMC,
  author =       "Anonymous",
  title =        "For {Taiwan}'s 22 million citizens, {Java Smart Cards}
                 are clamping down on health-care fraud",
  journal =      j-PC-MAGAZINE,
  volume =       "22",
  number =       "17",
  pages =        "66--67",
  year =         "2003",
  CODEN =        "PCMGEP",
  ISSN =         "0888-8507",
  ISSN-L =       "0888-8507",
  bibdate =      "Tue Sep 30 06:17:55 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 Ingenta database",
  acknowledgement = ack-nhfb,
  fjournal =     "PC Magazine",
}

@Misc{Anonymous:2003:TMP,
  author =       "Anonymous",
  title =        "Table of {Mersenne} Primes",
  year =         "2003",
  bibdate =      "Wed Feb 06 15:22:23 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Mersenne primes are primes of the form $ M(n) = 2^p -
                 1 $. The known members of this set in order of
                 increasing $p$ (not of discovery), year of discovery,
                 and discoverer, are:

                 \begin{tabular}{rrll} \hline \boldmath $n$ & $p$ & {\bf
                 year} & {\bf discoverer} \\
                 \hline 1 & 2 & unknown & unknown \\
                 2 & 3 & unknown & unknown \\
                 3 & 5 & unknown & unknown \\
                 4 & 7 & unknown & unknown \\
                 5 & 13 & 1461 & Anonymous \\[1ex] 6 & 17 & 1588 & P. A.
                 Cataldi \\
                 7 & 19 & 1588 & P. A. Cataldi \\
                 8 & 31 & 1750 & L. Euler \\
                 9 & 61 & 1883 & I. M. Pervushin \\
                 10 & 89 & 1911 & R. E. Powers \\[1ex] 11 & 107 & 1913 &
                 E. Fauquembergue \\
                 12 & 127 & 1876 & E. Lucas \\
                 13 & 521 & 1952 & R. M. Robinson \\
                 14 & 607 & 1952 & R. M. Robinson \\
                 15 & 1279 & 1952 & R. M. Robinson \\[1ex] 16 & 2203 &
                 1952 & R. M. Robinson \\
                 17 & 2281 & 1952 & R. M. Robinson \\
                 18 & 3217 & 1957 & H. Riesel \\
                 19 & 4253 & 1961 & A. Hurwitz \\
                 20 & 4423 & 1961 & A. Hurwitz \\[1ex] 21 & 9689 & 1963
                 & D. B. Gillies \\
                 22 & 9941 & 1963 & D. B. Gillies \\
                 23 & 11213 & 1963 & D. B. Gillies \\
                 24 & 19937 & 1971 & B. Tuckerman \\
                 25 & 21701 & 1978 & L. C. Noll \& L. Nickel \\[1ex] 26
                 & 23209 & 1979 & L. C. Noll \\
                 27 & 44497 & 1979 & H. Nelson \& D. Slowinski \\
                 28 & 86243 & 1982 & D. Slowinski \\
                 29 & 110503 & 1988 & W. N. Colquitt \& L. Welsch, Jr.
                 \\
                 30 & 132049 & 1983 & D. Slowinski \\[1ex] 31 & 216091 &
                 1985 & D. Slowinski \\
                 32 & 756839 & 1992 & Slowinski \& Gage \\
                 33 & 859433 & 1994 & Slowinski \& Gage \\
                 34 & 1257787 & 1996 & Slowinski \& Gage \\
                 35 & 1398269 & 1996 & Armengaud et al. (GIMPS)\\[1ex]
                 36 & 2976221 & 1997 & Spence et al. (GIMPS)\\
                 37 & 3021377 & 1998 & Clarkson, Woltman, Kurowski, and
                 Slowinski (GIMPS) \\
                 38 & 6972593 & 1999 & Hajratwala et al. (GIMPS) \\
                 39 & 13466917 & 2001 & M. Cameron (GIMPS) \\
                 40 & 20996011 & 2003 & M. Shafer (GIMPS) \\[1ex] 41 &
                 24036583 & 2004 & Josh Findley (GIMPS) \\
                 42 & 25964951 & 2005 & Martin Nowak (GIMPS) \\
                 43 & 30402457 & 2005 & Curtis Cooper \& Steven Boone
                 (GIMPS) \\
                 44 & 32582657 & 2006 & Curtis Cooper \& Steven Boone
                 (GIMPS) \\
                 45 & 37156667 & 2008 & Hans-Michael Elvenich, George
                 Woltman, Scott Kurowski (GIMPS) \\
                 46 & 42643801 & 2009 & Odd Magnar Strindmo (GIMPS) \\
                 47 & 43112609 & 2008 & Edson Smith, George Woltman,
                 Scott Kurowski (GIMPS) \\
                 48 & 57885161 & 2013 & Curtis Cooper, George Woltman,
                 Scott Kurowski, and others \\
                 49 & 74207281 & 2016 & Curtis Cooper (GIMPS) \\
                 50 & 77232917 & 2017 & Jon Pace (GIMPS) \\
                 51 (??) & 82589933 & 2018 & P. Laroche, G. Woltman, A. Blosser, et al. (GIMPS) \\
                 \hline
                 \end{tabular}",
  URL =          "http://mathworld.wolfram.com/MersennePrime.html;
                 http://primes.utm.edu/mersenne/;
                 http://primes.utm.edu/top20/page.php?id=4;
                 http://www.computerworld.com/s/article/9236570/Mathematician_Finding_17M_digit_prime_number_like_climbing_Everest;
                 http://www.mersenne.org/;
                 http://www.mersenne.org/prime.htm;
                 http://www.mersenne.org/report_milestones/;
                 http://www.mersenne.org/various/57885161.htm;
                 http://www.perfsci.com/wall-art.asp;
                 http://www.utm.edu/research/primes/mersenne/index.html;
                 http://www.utm.edu/research/primes/notes/3021377/",
  acknowledgement = ack-nhfb,
  keywords =     "Marin Mersenne (1588--1648)",
  remark =       "In \cite[p. 429]{Metropolis:1980:HCT}, Harry D. Huskey
                 writes about the National Bureau of Standards Western
                 Automatic Computer (SWAC) (1950--1967): ``One of the
                 exciting problems in mathematics on which the SWAC
                 worked was the study of Mersenne numbers, that is,
                 numbers of the form $ 2^p - 1 $, where $p$ is a prime.
                 These numbers, when prime, are related to the `perfect
                 numbers' of the Greeks, numbers that are the sum of all
                 their integral divisors, excluding themselves. The list
                 of values of $p$ that yielded prime numbers up to that
                 time was $ p = 2, 3, 5, 7, 13, 17, 19, 31, 61, 89 $,
                 and $ 107 $. Everyone was greatly excited when SWAC
                 added $ 521 $ to the list, and there was a real
                 celebration when $ 607 $ was added about an hour later.
                 In all, by June 1953, five values [$ 521, 607, 1279,
                 2203, 2281 $ ] had been added to the list with the use
                 of the SWAC as a result of systematic testing of all
                 primes up to $ 2297 $.'' Raphael M. Robinson's work
                 appears in `Mersenne and Fermat Numbers', Proc. Amer.
                 Math. Soc., v. 5, 1954, pp. 842--846
                 (http://www.ams.org/journals/proc/1954-005-05/S0002-9939-1954-0064787-4/S0002-9939-1954-0064787-4.pdf).
                 He reports ``At that time, the total memory of the SWAC
                 consisted of 256 words of 36 binary digits each,
                 exclusive of the sign. For the Mersenne test, half of
                 this memory was reserved for commands. Since successive
                 squarings of numbers less than the modulus $ 2^n - 1 $
                 are required, this modulus was restricted to 64 words,
                 so that the condition $ w < 64 *36 = 2304 $ was
                 imposed. The estimated running time for the program was
                 $ 0.25 n^3 + 125 n^2 $ microseconds, and the actual
                 time was in fair agreement with this. Thus, roughly
                 speaking, the testing time was a minute for the first
                 and an hour for the last of the five new primes. Each
                 minute of machine time is equivalent to more than a
                 year's work for a person using a desk calculator.''",
}

@Article{Anonymous:2003:UCD,
  author =       "Anonymous",
  title =        "Unravelling Crypto Developments: {Dr Nicko van
                 Someren}, founder and {CTO} of {nCipher}, sorts out
                 fact from fiction when it comes to quantum encryption",
  journal =      j-NETWORK-SECURITY,
  volume =       "2003",
  number =       "9",
  pages =        "7--8",
  month =        sep,
  year =         "2003",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(03)00906-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:50 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485803009061",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2003:YCS,
  author =       "Anonymous",
  title =        "Is your Current Security {SECURE}?: {John Jessop},
                 {Cryptic Software}",
  journal =      j-NETWORK-SECURITY,
  volume =       "2003",
  number =       "4",
  pages =        "3--3",
  month =        apr,
  year =         "2003",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(03)00406-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:44 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485803004069",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@InProceedings{Armknecht:2003:AAC,
  author =       "Frederik Armknecht and Matthias Krause",
  title =        "Algebraic Attacks on Combiners with Memory",
  crossref =     "Boneh:2003:ACC",
  pages =        "162--175",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Book{Ashburn:2003:PBA,
  author =       "Julian Ashburn",
  title =        "Practical Biometrics: From Aspiration to
                 Implementation",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiv + 159",
  year =         "2003",
  ISBN =         "1-85233-774-5",
  ISBN-13 =      "978-1-85233-774-2",
  LCCN =         "TK7882.B56A84 2003",
  bibdate =      "Tue Jun 01 13:47:04 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$49.95",
  acknowledgement = ack-nhfb,
  xxnote =       "Check copyright year: some catalogs have 2004, but
                 U.S. Library of Congress say 2003.",
}

@Article{Augot:2003:PKE,
  author =       "Daniel Augot and Matthieu Finiasz",
  title =        "A Public Key Encryption Scheme Based on the Polynomial
                 Reconstruction Problem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2656",
  pages =        "229--240",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/3-540-39200-9_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 11:39:24 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2003a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/3-540-39200-9_14.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/3-540-39200-9",
  book-URL =     "http://www.springerlink.com/content/978-3-540-39200-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Avanzi:2003:CAD,
  author =       "Roberto M. Avanzi",
  title =        "Countermeasures against Differential Power Analysis
                 for Hyperelliptic Curve Cryptosystems",
  crossref =     "Walter:2003:CHE",
  pages =        "366--381",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Article{Backhouse:2003:TOT,
  author =       "James Backhouse and Carol Hsu and Aidan McDonnell",
  title =        "Technical opinion: Toward public-key infrastructure
                 interoperability",
  journal =      j-CACM,
  volume =       "46",
  number =       "6",
  pages =        "98--100",
  month =        jun,
  year =         "2003",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Sep 3 17:06:36 MDT 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@InProceedings{Bajard:2003:EMG,
  author =       "J.-C. Bajard and L. Imbert and C. Negre and T.
                 Plantard",
  title =        "Efficient multiplication in {GF}$ (p_k) $ for Elliptic
                 Curve Cryptography",
  crossref =     "Bajard:2003:ISC",
  pages =        "181--187",
  year =         "2003",
  bibdate =      "Wed Nov 26 12:04:35 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Barak:2003:DC,
  author =       "Boaz Barak and Shien Jin Ong and Salil Vadhan",
  title =        "Derandomization in Cryptography",
  crossref =     "Boneh:2003:ACC",
  pages =        "299--315",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@InProceedings{Barak:2003:TRN,
  author =       "Boaz Barak and Ronen Shaltiel and Eran Tromer",
  title =        "True Random Number Generators Secure in a Changing
                 Environment",
  crossref =     "Walter:2003:CHE",
  pages =        "166--180",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Article{Barbancho:2003:CAC,
  author =       "A. M. Barbancho and A. Peinado",
  title =        "Cryptanalysis of anonymous channel protocol for
                 large-scale area in wireless communications",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "43",
  number =       "6",
  pages =        "777--785",
  day =          "20",
  month =        dec,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Mon Feb 9 06:35:22 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@InProceedings{Barkan:2003:ICO,
  author =       "Elad Barkan and Eli Biham and Nathan Keller",
  title =        "Instant Ciphertext-Only Cryptanalysis of {GSM}
                 Encrypted Communication",
  crossref =     "Boneh:2003:ACC",
  pages =        "600--616",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Book{Barken:2003:HSY,
  author =       "Lee Barken",
  title =        "How Secure is Your Wireless Network? {Safeguarding}
                 Your {Wi-Fi LAN}",
  publisher =    pub-PHPTR,
  address =      pub-PHPTR:adr,
  pages =        "xx + 199",
  year =         "2003",
  ISBN =         "0-13-140206-4",
  ISBN-13 =      "978-0-13-140206-5",
  LCCN =         "QA76.9.A25B3775 2003",
  bibdate =      "Tue Nov 04 17:51:59 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$34.99",
  acknowledgement = ack-nhfb,
}

@Article{Basu:2003:AC,
  author =       "Amit Basu and Steve Muylle",
  title =        "Authentication in e-commerce",
  journal =      j-CACM,
  volume =       "46",
  number =       "12",
  pages =        "159--166",
  month =        dec,
  year =         "2003",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jan 5 16:48:14 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  remark =       "Web version only (not in printed issue).",
}

@Article{Bauer:2003:PPAa,
  author =       "Mick Bauer",
  title =        "Paranoid penguin: Authenticate with {LDAP}",
  journal =      j-LINUX-J,
  volume =       "2003",
  number =       "112",
  pages =        "12--12",
  month =        aug,
  year =         "2003",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Sat Dec 24 17:45:48 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Bauer:2003:PPAb,
  author =       "Mick Bauer",
  title =        "Paranoid penguin: Authenticate with {LDAP}, {Part
                 III}",
  journal =      j-LINUX-J,
  volume =       "2003",
  number =       "113",
  pages =        "13--13",
  month =        sep,
  year =         "2003",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Sat Dec 24 17:45:49 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@InProceedings{Bellare:2003:FSP,
  author =       "Mihir Bellare and Bennet Yee",
  title =        "Forward-Security in Private-Key Cryptography",
  crossref =     "Joye:2003:TCC",
  pages =        "1--18",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@InProceedings{Berson:2003:CAB,
  author =       "Tom Berson",
  title =        "Cryptography after the Bubble: How to Make an Impact
                 on the World",
  crossref =     "Joye:2003:TCC",
  pages =        "226--226",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@InProceedings{Bertoni:2003:EAA,
  author =       "Guido Bertoni and Jorge Guajardo and Sandeep Kumar and
                 Gerardo Orlando and Christof Paar and Thomas
                 Wollinger",
  title =        "Efficient $ {GF}(p^m) $ Arithmetic Architectures for
                 Cryptographic Applications",
  crossref =     "Joye:2003:TCC",
  pages =        "158--175",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@Article{Bertoni:2003:EAD,
  author =       "G. Bertoni and L. Breveglieri and I. Koren and P.
                 Maistri and V. Piuri",
  title =        "Error analysis and detection procedures for a hardware
                 implementation of the advanced encryption standard",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "52",
  number =       "4",
  pages =        "492--505",
  month =        apr,
  year =         "2003",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2003.1190590",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Jul 5 08:52:47 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1190590",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Book{Bidgoli:2003:EIS,
  editor =       "Hossein Bidgoli",
  title =        "Encyclopedia of information systems",
  publisher =    pub-ACADEMIC,
  address =      pub-ACADEMIC:adr,
  pages =        "various",
  year =         "2003",
  ISBN =         "0-12-227240-4",
  ISBN-13 =      "978-0-12-227240-0",
  LCCN =         "QA76.15 .E516 2003",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Four volumes.",
  price =        "US\$1,200.00",
  acknowledgement = ack-nhfb,
}

@InProceedings{Biryukov:2003:CS,
  author =       "Alex Biryukov and Christophe {De Canni{\`e}re} and
                 Gustaf Dellkrantz",
  title =        "Cryptanalysis of {Safer++}",
  crossref =     "Boneh:2003:ACC",
  pages =        "195--211",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Book{Bishop:2003:CSA,
  author =       "Matt Bishop",
  title =        "Computer Security: Art and Science",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xli + 1084",
  year =         "2003",
  ISBN =         "0-201-44099-7 (hardcover)",
  ISBN-13 =      "978-0-201-44099-7 (hardcover)",
  LCCN =         "QA76.9.A25 B56 2002",
  bibdate =      "Wed Dec 31 13:50:12 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib",
  price =        "US\$79.99, CAN\$120.99",
  abstract =     "This book has three goals. The first is to show the
                 importance of theory to practice and of practice to
                 theory. The second goal is to emphasize that computer
                 security and cryptography are different. Although
                 cryptography is an essential component of computer
                 security, it is by no means the only component. The
                 third goal is to demonstrate that computer security is
                 not just a science but also an art. It is an art
                 because no system can be considered secure without an
                 examination of how it is to be used. Computer security
                 is also a science. Its theory is based on mathematical
                 constructions, analyses, and proofs. Its systems are
                 built in accordance with the accepted practices of
                 engineering. The material in this book is at the
                 advanced undergraduate level. Throughout, [the authors]
                 assume that the reader is familiar with the basics of
                 compilers and computer architecture (such as the use of
                 the program stack) and operating systems. The reader
                 should also be comfortable with modular arithmetic (for
                 the material on cryptography).",
  acknowledgement = ack-nhfb,
  tableofcontents = "Part 1: Introduction \\
                 1: An overview of computer security \\
                 Part 2: Foundations \\
                 2: Access control matrix \\
                 3: Foundational results \\
                 Part 3: Policy \\
                 4: Security policies \\
                 5: Confidentiality policies \\
                 6: Integrity policies \\
                 7: Hybrid policies \\
                 8: Noninterference and policy composition \\
                 Part 4: Implementation I: cryptography \\
                 9: Basic cryptography \\
                 10: Key management \\
                 11: Cipher techniques \\
                 12: Authentication \\
                 Part 5: Implementation II: systems \\
                 13: Design principles \\
                 14: Representing identity \\
                 15: Access control mechanisms \\
                 16: Information flow \\
                 17: Confinement problem \\
                 Part 6: Assurance / by Elisabeth Sullivan \\
                 18: Introduction to assurance \\
                 19: Building systems with assurance \\
                 20: Formal methods \\
                 21: Evaluating systems \\
                 Part 7: Special topics \\
                 22: Malicious logic \\
                 23: Vulnerability analysis \\
                 24: Auditing \\
                 25: Intrusion detection \\
                 Part 8: Practicum \\
                 26: Network security \\
                 27: System security \\
                 28: User security \\
                 29: Program security \\
                 Part 9: End matter \\
                 30: Lattices \\
                 31: The extended Euclidean algorithm \\
                 32: Entropy and uncertainty \\
                 33: Virtual machines \\
                 34: Symbolic logic \\
                 35: Example academic security policy",
}

@Book{Bishop:2003:ICJ,
  author =       "David Bishop",
  title =        "Introduction to cryptography with {Java} applets",
  publisher =    pub-JONES-BARTLETT,
  address =      pub-JONES-BARTLETT:adr,
  pages =        "xvi + 370",
  year =         "2003",
  ISBN =         "0-7637-2207-3",
  ISBN-13 =      "978-0-7637-2207-4",
  LCCN =         "QA76.9.A25 B565 2003",
  bibdate =      "Tue Oct 11 05:14:14 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Cryptography; Java (Computer
                 program language)",
}

@InProceedings{Blomer:2003:NPK,
  author =       "Johannes Bl{\"o}mer and Alexander May",
  title =        "New Partial Key Exposure Attacks on {RSA}",
  crossref =     "Boneh:2003:ACC",
  pages =        "27--43",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Article{Blum:2003:NTL,
  author =       "Avrim Blum and Adam Kalai and Hal Wasserman",
  title =        "Noise-tolerant learning, the parity problem, and the
                 statistical query model",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "4",
  pages =        "506--519",
  month =        jul,
  year =         "2003",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/792538.792543",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Sep 8 17:55:23 MDT 2003",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We describe a slightly subexponential time algorithm
                 for learning parity functions in the presence of random
                 classification noise, a problem closely related to
                 several cryptographic and coding problems. Our
                 algorithm runs in polynomial time for the case of
                 parity functions that depend on only the first $ O(\log
                 n \log \log n) $ bits of input, which provides the
                 first known instance of an efficient noise-tolerant
                 algorithm for a concept class that is not learnable in
                 the Statistical Query model of Kearns [1998]. Thus, we
                 demonstrate that the set of problems learnable in the
                 statistical query model is a strict subset of those
                 problems learnable in the presence of noise in the PAC
                 model.\par

                 In coding-theory terms, what we give is a poly(n)-time
                 algorithm for decoding linear $ k \times n $ codes in
                 the presence of random noise for the case of $ k = c
                 \log n \log \log n $ for some $ c > 0 $. (The case of $
                 k = O(\log n) $ is trivial since one can just
                 individually check each of the $ 2^k $ possible
                 messages and choose the one that yields the closest
                 codeword.)\par

                 A natural extension of the statistical query model is
                 to allow queries about statistical properties that
                 involve $t$-tuples of examples, as opposed to just
                 single examples. The second result of this article is
                 to show that any class of functions learnable (strongly
                 or weakly) with $t$-wise queries for $ t = O(\log n) $
                 is also weakly learnable with standard unary queries.
                 Hence, this natural extension to the statistical query
                 model does not increase the set of weakly learnable
                 functions.",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of the Association for Computing Machinery",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@Article{Blundo:2003:COT,
  author =       "C. Blundo and P. D'Arco and A. {De Santis} and D. R.
                 Stinson",
  title =        "Contrast Optimal Threshold Visual Cryptography
                 Schemes",
  journal =      j-SIAM-J-DISCR-MATH,
  volume =       "16",
  number =       "2",
  pages =        "224--261",
  year =         "2003",
  CODEN =        "SJDMEC",
  DOI =          "https://doi.org/10.1137/S0895480198336683",
  ISSN =         "0895-4801 (print), 1095-7146 (electronic)",
  ISSN-L =       "0895-4801",
  bibdate =      "Wed Aug 20 06:47:26 MDT 2003",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SIDMA/16/2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://epubs.siam.org/sam-bin/dbq/article/33668",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Discrete Mathematics",
  journal-URL =  "http://epubs.siam.org/sidma",
}

@Book{Bolle:2003:GB,
  author =       "Ruud Bolle and Jonathan Connell and Sharatchandra
                 Pankanti and Nalini Ratha and Andrew Senior",
  title =        "Guide to biometrics",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "335 (est.)",
  year =         "2003",
  ISBN =         "0-387-40089-3",
  ISBN-13 =      "978-0-387-40089-1",
  LCCN =         "TK7882.B56 G85 2003",
  bibdate =      "Fri Mar 05 18:23:51 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$49.95",
  acknowledgement = ack-nhfb,
}

@TechReport{Bond:2003:DTA,
  author =       "Mike Bond and Piotr Zieli{\'n}ski",
  title =        "Decimalisation table attacks for {PIN} cracking",
  type =         "Technical Report",
  number =       "560",
  institution =  "University of Cambridge Computer Laboratory",
  address =      "Cambridge, UK",
  pages =        "14",
  month =        feb,
  year =         "2003",
  ISSN =         "1476-2986",
  bibdate =      "Mon Mar 17 11:28:13 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.cl.cam.ac.uk/TechReports/UCAM-CL-TR-560.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Boneh:2003:AVE,
  author =       "Dan Boneh and Craig Gentry and Ben Lynn and Hovav
                 Shacham",
  title =        "Aggregate and Verifiably Encrypted Signatures from
                 Bilinear Maps",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2656",
  pages =        "416--432",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/3-540-39200-9_26",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 11:39:42 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2003a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/3-540-39200-9_26.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/3-540-39200-9",
  book-URL =     "http://www.springerlink.com/content/978-3-540-39200-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Boneh:2003:IBE,
  author =       "Dan Boneh and Matthew Franklin",
  title =        "Identity-Based Encryption from the {Weil} Pairing",
  journal =      j-SIAM-J-COMPUT,
  volume =       "32",
  number =       "3",
  pages =        "586--615",
  month =        jun,
  year =         "2003",
  CODEN =        "SMJCAT",
  DOI =          "https://doi.org/10.1137/S0097539701398521",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Wed Aug 20 06:43:35 MDT 2003",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/32/3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://epubs.siam.org/sam-bin/dbq/article/39852",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@InProceedings{Boneh:2003:SSS,
  author =       "Dan Boneh and Ilya Mironov and Victor Shoup",
  title =        "A Secure Signature Scheme from Bilinear Maps",
  crossref =     "Joye:2003:TCC",
  pages =        "98--110",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@Article{Bouda:2003:EQI,
  author =       "Jan Bouda and Vladim{\'\i}r R. Bu{\v{z}}ek",
  title =        "Encryption of Quantum Information",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "14",
  number =       "5",
  pages =        "741--??",
  month =        oct,
  year =         "2003",
  CODEN =        "IFCSEN",
  ISSN =         "0129-0541 (print), 1793-6373 (electronic)",
  ISSN-L =       "0129-0541",
  bibdate =      "Tue Jan 27 08:06:53 MST 2004",
  bibsource =    "http://ejournals.wspc.com.sg/ijfcs/mkt/archive.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@InProceedings{Bouganim:2003:CSD,
  author =       "Luc Bouganim and Fran{\c{c}}ois Dang Ngoc and Philippe
                 Pucheral and Lilan Wu",
  title =        "Chip-Secured Data Access: Reconciling Access Rights
                 with Data Encryption",
  crossref =     "Freytag:2003:VPI",
  pages =        "1133--1136",
  year =         "2003",
  bibdate =      "Mon Dec 22 18:34:17 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.vldb.org/dblp/db/conf/vldb/vldb2003.html",
  URL =          "http://www.vldb.org/dblp/db/indices/a-tree/b/Bouganim:Luc.html",
  acknowledgement = ack-nhfb,
  authorurl =    "http://www.vldb.org/dblp/db/indices/a-tree/b/Bouganim:Luc.html;
                 http://www.vldb.org/dblp/db/indices/a-tree/n/Ngoc:Fran=ccedil=ois_Dang.html;
                 http://www.vldb.org/dblp/db/indices/a-tree/p/Pucheral:Philippe.html;
                 http://www.vldb.org/dblp/db/indices/a-tree/w/Wu:Lilan.html",
}

@Article{Bourbakis:2003:SBC,
  author =       "Nikolaos Bourbakis and Apostolos Dollas",
  title =        "{SCAN}-Based Compression-Encryption-Hiding for Video
                 on Demand",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "10",
  number =       "3",
  pages =        "79--87",
  month =        jul # "--" # sep,
  year =         "2003",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/MMUL.2003.1218259",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Sat Jan 3 12:43:03 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/comp/mags/mu/2003/03/u3079abs.htm;
                 http://csdl.computer.org/dl/mags/mu/2003/03/u3079.htm;
                 http://csdl.computer.org/dl/mags/mu/2003/03/u3079.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Multimedia",
}

@Book{Boyd:2003:PAK,
  author =       "Colin Boyd and Anish Mathuria",
  title =        "Protocols for Authentication and Key Establishment",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xxiv + 323",
  year =         "2003",
  DOI =          "https://doi.org/10.1007/978-3-662-09527-0",
  ISBN =         "3-662-09527-0 (e-book), 3-642-07716-1",
  ISBN-13 =      "978-3-662-09527-0 (e-book), 978-3-642-07716-6",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "QA76.9.A25",
  bibdate =      "Sat Jun 10 08:35:20 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "Information Security and Cryptography",
  URL =          "http://www.springerlink.com/content/978-3-662-09527-0",
  abstract =     "Protocols for authentication and key establishment are
                 the foundation for security of communications. The
                 range and diversity of these protocols is immense,
                 while the properties and vulnerabilities of different
                 protocols can vary greatly. This is the first
                 comprehensive and integrated treatment of these
                 protocols. It allows researchers and practitioners to
                 quickly access a protocol for their needs and become
                 aware of existing protocols which have been broken in
                 the literature. As well as a clear and uniform
                 presentation of the protocols this book includes a
                 description of all the main attack types and classifies
                 most protocols in terms of their properties and
                 resource requirements. It also includes tutorial
                 material suitable for graduate students.",
  acknowledgement = ack-nhfb,
  subject =      "Authentifikation; Schl{\"u}sselverwaltung;
                 Kommunikationsprotokoll; Datensicherung;
                 Diffie--Hellman-Algorithmus; Computer science; Computer
                 Communication Networks; Data protection; Data
                 encryption (Computer science); Computer software",
  tableofcontents = "A Tutorial Introduction to Authentication and Key
                 Establishment \\
                 Goals for Authentication and Key Establishment \\
                 Protocols Using Shared Key Cryptography.-Authentication
                 and Key Transport Using Public Key Cryptography \\
                 Key Agreement Protocols \\
                 Conference Key Protocols \\
                 Password-Based Protocols \\
                 Appendix A \\
                 Standards for Authentication and Key Establishment \\
                 Appendix B \\
                 Summary of Notation \\
                 References \\
                 Index of Protocols \\
                 General Index",
}

@InProceedings{Boyen:2003:MIB,
  author =       "Xavier Boyen",
  title =        "Multipurpose Identity-Based Signcryption: a {Swiss
                 Army} Knife for Identity-Based Cryptography",
  crossref =     "Boneh:2003:ACC",
  pages =        "383--399",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Article{Bucci:2003:HSO,
  author =       "M. Bucci and L. Germani and R. Luzzi and A. Trifiletti
                 and M. Varanonuovo",
  title =        "A high-speed oscillator-based truly random number
                 source for cryptographic applications on a smart card
                 {IC}",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "52",
  number =       "4",
  pages =        "403--409",
  month =        apr,
  year =         "2003",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2003.1190581",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Jul 5 08:52:46 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1190581",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@InProceedings{Buchbinder:2003:LUB,
  author =       "Niv Buchbinder and Erez Petrank",
  title =        "Lower and Upper Bounds on Obtaining History
                 Independence",
  crossref =     "Boneh:2003:ACC",
  pages =        "445--462",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Article{Burr:2003:SAE,
  author =       "William E. Burr",
  title =        "Selecting the {Advanced Encryption Standard}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "2",
  pages =        "43--52",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1193210",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2043.pdf;
                 http://www.computer.org/security/j2043abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@InProceedings{Camenisch:2003:PVE,
  author =       "Jan Camenisch and Victor Shoup",
  title =        "Practical Verifiable Encryption and Decryption of
                 Discrete Logarithms",
  crossref =     "Boneh:2003:ACC",
  pages =        "126--144",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Article{Canetti:2003:FSP,
  author =       "Ran Canetti and Shai Halevi and Jonathan Katz",
  title =        "A Forward-Secure Public-Key Encryption Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2656",
  pages =        "255--271",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/3-540-39200-9_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 11:39:24 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2003a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/3-540-39200-9_16.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/3-540-39200-9",
  book-URL =     "http://www.springerlink.com/content/978-3-540-39200-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Canetti:2003:RCC,
  author =       "Ran Canetti and Hugo Krawczyk and Jesper B. Nielsen",
  title =        "Relaxing Chosen-Ciphertext Security",
  crossref =     "Boneh:2003:ACC",
  pages =        "565--582",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@InProceedings{Canetti:2003:UCJ,
  author =       "Ran Canetti and Tal Rabin",
  title =        "Universal Composition with Joint State",
  crossref =     "Boneh:2003:ACC",
  pages =        "265--281",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@InProceedings{Canvel:2003:PIS,
  author =       "Brice Canvel and Alain Hiltgen and Serge Vaudenay and
                 Martin Vuagnoux",
  title =        "Password Interception in a {SSL\slash TLS} Channel",
  crossref =     "Boneh:2003:ACC",
  pages =        "583--599",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@InProceedings{Cary:2003:MAC,
  author =       "Matthew Cary and Ramarathnam Venkatesan",
  title =        "A Message Authentication Code Based on Unimodular
                 Matrix Groups",
  crossref =     "Boneh:2003:ACC",
  pages =        "500--512",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Article{Cass:2003:LES,
  author =       "Stephen Cass",
  title =        "Listening in [electronic spying]",
  journal =      j-IEEE-SPECTRUM,
  volume =       "40",
  number =       "4",
  pages =        "32--37",
  month =        apr,
  year =         "2003",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2003.1191772",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "bugging devices; cloak-and-dagger information
                 gathering; code-breaking computers; communications
                 systems; cryptography; Data security; data security
                 measures; electronic spying; fiber-optic cables;
                 receivers; security of data; software flaws;
                 telecommunication security",
}

@InProceedings{Cathalo:2003:NTT,
  author =       "Julien Cathalo and Fran{\c{c}}ois Koeune and
                 Jean-Jacques Quisquater",
  title =        "A New Type of Timing Attack: Application to {GPS}",
  crossref =     "Walter:2003:CHE",
  pages =        "291--303",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Article{Chen:2003:AEY,
  author =       "Ke-Fei Chen and Sheng Zhong",
  title =        "Attacks on the (enhanced) {Yang--Shieh}
                 authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "8",
  pages =        "725--727",
  month =        dec,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See erratum \cite{McKenna:2004:EAE}.",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803000129",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Cheng:2003:PPO,
  author =       "Qi Cheng",
  title =        "Primality Proving via One Round in {ECPP} and One
                 Iteration in {AKS}",
  crossref =     "Boneh:2003:ACC",
  pages =        "338--348",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@InProceedings{Cheon:2003:PTA,
  author =       "Jung Hee Cheon and Byungheup Jun",
  title =        "A Polynomial Time Algorithm for the Braid
                 {Diffie--Hellman} Conjugacy Problem",
  crossref =     "Boneh:2003:ACC",
  pages =        "212--225",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@InProceedings{Chevallier-Mames:2003:FDS,
  author =       "Beno{\^\i}t Chevallier-Mames and Marc Joye and Pascal
                 Paillierinst",
  title =        "Faster Double-Size Modular Multiplication from
                 {Euclidean} Multipliers",
  crossref =     "Walter:2003:CHE",
  pages =        "214--227",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Article{Chien:2003:CMV,
  author =       "Hung-Yu Chien and Jinn-Ke Jan and Yuh-Min Tseng",
  title =        "Cryptanalysis on {Mu--Varadharajan}'s e-voting
                 schemes",
  journal =      j-APPL-MATH-COMP,
  volume =       "139",
  number =       "2--3",
  pages =        "525--530",
  day =          "15",
  month =        jul,
  year =         "2003",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Fri Jan 9 08:40:58 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Chien:2003:HAP,
  author =       "Hung-Yu Chien and Jinn-Ke Jan",
  title =        "A hybrid authentication protocol for large mobile
                 network",
  journal =      j-J-SYST-SOFTW,
  volume =       "67",
  number =       "2",
  pages =        "123--130",
  day =          "15",
  month =        aug,
  year =         "2003",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Sat Oct 25 07:14:15 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Chien:2003:NHA,
  author =       "Hung-Yu Chien and Jinn-Ke Jan",
  title =        "New hierarchical assignment without Public Key
                 cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "523--526",
  month =        sep,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803006138",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chien:2003:RSA,
  author =       "Hung-Yu Chien and Jinn-Ke Jan",
  title =        "Robust and Simple Authentication Protocol",
  journal =      j-COMP-J,
  volume =       "46",
  number =       "2",
  pages =        "193--201",
  month =        feb,
  year =         "2003",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Mar 4 14:32:54 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_46/Issue_02/",
  URL =          "http://www3.oup.co.uk/computer_journal/hdb/Volume_46/Issue_02/460193.sgm.abs.html;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_46/Issue_02/pdf/460193.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@InProceedings{Chodowiec:2003:VCF,
  author =       "Pawe{\l} Chodowiec and Kris Gaj",
  title =        "Very Compact {FPGA} Implementation of the {AES}
                 Algorithm",
  crossref =     "Walter:2003:CHE",
  pages =        "319--333",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Article{Chun:2003:DLC,
  author =       "Kilsoo Chun and Seungjoo Kim and Sangjin Lee and Soo
                 Hak Sung and Seonhee Yoon",
  title =        "Differential and linear cryptanalysis for $2$-round
                 {SPNs}",
  journal =      j-INFO-PROC-LETT,
  volume =       "87",
  number =       "5",
  pages =        "277--282",
  day =          "15",
  month =        sep,
  year =         "2003",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:32 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Chung:2003:EPX,
  author =       "Yon Dohn Chung and Jong Wook Kim and Myoung Ho Kim",
  title =        "Efficient preprocessing of {XML} queries using
                 structured signatures",
  journal =      j-INFO-PROC-LETT,
  volume =       "87",
  number =       "5",
  pages =        "257--264",
  day =          "15",
  month =        sep,
  year =         "2003",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:32 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@InProceedings{Ciet:2003:PFI,
  author =       "M. Ciet and M. Neve and E. Peeters and J.-J.
                 Quisquater",
  booktitle =    "MWSCAS '03. Proceedings of the 46th IEEE International
                 Midwest Symposium on Circuits and Systems",
  title =        "Parallel {FPGA} implementation of {RSA} with residue
                 number systems --- can side-channel threats be
                 avoided?",
  volume =       "2",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "806--810",
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MWSCAS.2003.1562409",
  ISSN =         "????",
  bibdate =      "Fri Nov 9 11:38:59 MST 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "residue arithmetic; residue number system",
  summary =      "In this paper, the authors presented a new parallel
                 architecture to avoid side-channel analysis such as:
                 timing attack, simple/differential power analysis,
                 fault induction attack and simple/differential
                 electromagnetic analysis. Montgomery \ldots{}",
}

@InProceedings{Clulow:2003:SP,
  author =       "Jolyon Clulow",
  title =        "On the Security of {PKCS \#11}",
  crossref =     "Walter:2003:CHE",
  pages =        "411--425",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Article{Cochran:2003:NVC,
  author =       "Shannon Cochran",
  title =        "News and Views: Cryptographers [{Ronald Rivest}, {Adi
                 Shamir}, and {Leonard Adleman}] Receive {Turing Award};
                 Computer-Science Pioneer [{John G. ``Jack'' Herriot}]
                 Passes Away; Programming Quantum Computers; The
                 Demography of the {Internet}",
  journal =      j-DDJ,
  volume =       "28",
  number =       "7",
  pages =        "14--14",
  month =        jul,
  year =         "2003",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Jun 12 05:46:24 MDT 2003",
  bibsource =    "http://www.ddj.com/articles/2003/0307/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Cohen:2003:FOV,
  author =       "Ernie Cohen",
  title =        "First-order verification of cryptographic protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "189--216",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11203",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:06 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Book{Cole:2003:HPS,
  author =       "Eric Cole",
  title =        "Hiding in Plain Sight: Steganography and the Art of
                 Covert Communication",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xviii + 335",
  year =         "2003",
  ISBN =         "0-471-44449-9",
  ISBN-13 =      "978-0-471-44449-7",
  LCCN =         "QA76.9.A25 C598 2003",
  bibdate =      "Sat Jun 14 15:10:28 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$35.00",
  acknowledgement = ack-nhfb,
}

@InProceedings{Coron:2003:NAS,
  author =       "Jean-S{\'e}bastien Coron and Alexei Tchulkine",
  title =        "A New Algorithm for Switching from Arithmetic to
                 {Boolean} Masking",
  crossref =     "Walter:2003:CHE",
  pages =        "89--97",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Article{Costlow:2003:BIM,
  author =       "Terry Costlow",
  title =        "In Brief: Intelligent Mail Idea Raising Opponents'
                 Ire",
  journal =      j-IEEE-DISTRIB-SYST-ONLINE,
  volume =       "4",
  number =       "9",
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1541-4922 (print), 1558-1683 (electronic)",
  ISSN-L =       "1541-4922",
  bibdate =      "Sat Jan 03 14:59:06 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dsonline.computer.org/0309/d/brief.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Distributed Systems Online",
}

@Article{Courtois:2003:AAS,
  author =       "Nicolas T. Courtois and Willi Meier",
  title =        "Algebraic Attacks on Stream Ciphers with Linear
                 Feedback",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2656",
  pages =        "345--359",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/3-540-39200-9_21",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 11:39:42 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2003a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/3-540-39200-9_21.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/3-540-39200-9",
  book-URL =     "http://www.springerlink.com/content/978-3-540-39200-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Courtois:2003:AXA,
  author =       "Nicolas T. Courtois and Jacques Patarin",
  title =        "About the {XL} Algorithm over $ {GF}(2) $",
  crossref =     "Joye:2003:TCC",
  pages =        "141--157",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@InProceedings{Courtois:2003:FAA,
  author =       "Nicolas T. Courtois",
  title =        "Fast Algebraic Attacks on Stream Ciphers with Linear
                 Feedback",
  crossref =     "Boneh:2003:ACC",
  pages =        "176--194",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Article{Cramer:2003:DAP,
  author =       "Ronald Cramer and Victor Shoup",
  title =        "Design and Analysis of Practical Public-Key Encryption
                 Schemes Secure against Adaptive Chosen Ciphertext
                 Attack",
  journal =      j-SIAM-J-COMPUT,
  volume =       "33",
  number =       "1",
  pages =        "167--226",
  month =        feb,
  year =         "2003",
  CODEN =        "SMJCAT",
  DOI =          "https://doi.org/10.1137/S0097539702403773",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Mon Jan 12 18:56:13 MST 2004",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/33/1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://epubs.siam.org/sam-bin/dbq/article/40377",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@InProceedings{Crepeau:2003:SBR,
  author =       "Claude Cr{\'e}peau and Alain Slakmon",
  title =        "Simple Backdoors for {RSA} Key Generation",
  crossref =     "Joye:2003:TCC",
  pages =        "403--416",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@InProceedings{Damgaard:2003:UCE,
  author =       "Ivan Damg{\aa}rd and Jesper Buus Nielsen",
  title =        "Universally Composable Efficient Multiparty
                 Computation from Threshold Homomorphic Encryption",
  crossref =     "Boneh:2003:ACC",
  pages =        "247--264",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@InProceedings{DArco:2003:FTD,
  author =       "Paolo D'Arco and Douglas R. Stinson",
  title =        "Fault Tolerant and Distributed Broadcast Encryption",
  crossref =     "Joye:2003:TCC",
  pages =        "263--280",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@Article{Devanbu:2003:ADP,
  author =       "Premkumar Devanbu and Michael Gertz and Charles Martel
                 and Stuart G. Stubblebine",
  title =        "Authentic data publication over the {Internet}",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "291--314",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:10 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@InProceedings{Dhem:2003:EMR,
  author =       "Jean-Fran{\c{c}}ois Dhem",
  title =        "Efficient Modular Reduction Algorithm in and Its
                 Application to ``Left to Right'' Modular Multiplication
                 in",
  crossref =     "Walter:2003:CHE",
  pages =        "203--213",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@InProceedings{Dichtl:2003:HPO,
  author =       "Markus Dichtl",
  title =        "How to Predict the Output of a Hardware Random Number
                 Generator",
  crossref =     "Walter:2003:CHE",
  pages =        "181--188",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Article{DiCrescenzo:2003:SOS,
  author =       "Giovanni {Di Crescenzo}",
  title =        "Sharing one secret vs. sharing many secrets",
  journal =      j-THEOR-COMP-SCI,
  volume =       "295",
  number =       "1--3",
  pages =        "123--140",
  day =          "24",
  month =        feb,
  year =         "2003",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Nov 5 08:45:28 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@InProceedings{Ding:2003:SIB,
  author =       "Xuhua Ding and Gene Tsudik",
  title =        "Simple Identity-Based Cryptography with Mediated
                 {RSA}",
  crossref =     "Joye:2003:TCC",
  pages =        "193--210",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@Article{DiRaimondo:2003:PST,
  author =       "Mario {Di Raimondo} and Rosario Gennaro",
  title =        "Provably Secure Threshold Password-Authenticated Key
                 Exchange",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2656",
  pages =        "507--523",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/3-540-39200-9_32",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 11:39:42 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2003a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/3-540-39200-9_32.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/3-540-39200-9",
  book-URL =     "http://www.springerlink.com/content/978-3-540-39200-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Dodis:2003:CAA,
  author =       "Yevgeniy Dodis and Jee Hea An",
  title =        "Concealment and Its Applications to Authenticated
                 Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2656",
  pages =        "312--329",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/3-540-39200-9_19",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 11:39:24 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2003a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/3-540-39200-9_19.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/3-540-39200-9",
  book-URL =     "http://www.springerlink.com/content/978-3-540-39200-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Dodis:2003:IRP,
  author =       "Yevgeniy Dodis and Matt Franklin and Jonathan Katz and
                 Atsuko Miyaji and Moti Yung",
  title =        "Intrusion-Resilient Public-Key Encryption",
  crossref =     "Joye:2003:TCC",
  pages =        "19--32",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@Article{Dolev:2003:NC,
  author =       "Danny Dolev and Cynthia Dwork and Moni Naor",
  title =        "Nonmalleable Cryptography",
  journal =      j-SIAM-REVIEW,
  volume =       "45",
  number =       "4",
  pages =        "727--784",
  month =        dec,
  year =         "2003",
  CODEN =        "SIREAD",
  DOI =          "https://doi.org/10.1137/S0036144503429856",
  ISSN =         "0036-1445 (print), 1095-7200 (electronic)",
  ISSN-L =       "0036-1445",
  bibdate =      "Fri Jan 2 07:22:46 MST 2004",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toc/SIREV/45/4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamreview.bib",
  URL =          "http://epubs.siam.org/sam-bin/dbq/article/42985",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Review",
  journal-URL =  "http://epubs.siam.org/sirev",
}

@Article{Duwell:2003:BRB,
  author =       "Armond Duwell",
  title =        "Book Review: {{\booktitle{The physics of quantum
                 information: quantum cryptography, quantum
                 teleportation, quantum computation}}: D. Bouwmeester,
                 A. Ekert and A. Zeilinger (Eds.); Germany, 2000, 314pp,
                 US\$54, ISBN 3-540-66778-4}",
  journal =      j-STUD-HIST-PHILOS-MOD-PHYS,
  volume =       "34",
  number =       "2",
  pages =        "331--334",
  month =        jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/S1355-2198(03)00012-1",
  ISSN =         "1355-2198 (print), 1879-2502 (electronic)",
  ISSN-L =       "1355-2198",
  bibdate =      "Thu Nov 3 06:18:25 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/shps-b.bib;
                 http://www.sciencedirect.com/science/journal/13552198",
  note =         "See \cite{Bouwmeester:2001:PQI}.",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1355219803000121",
  acknowledgement = ack-nhfb,
  fjournal =     "Studies in History and Philosophy of Modern Physics",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13552198",
}

@InProceedings{Dwork:2003:MBF,
  author =       "Cynthia Dwork and Andrew Goldberg and Moni Naor",
  title =        "On Memory-Bound Functions for Fighting Spam",
  crossref =     "Boneh:2003:ACC",
  pages =        "426--444",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Article{Dwork:2003:MFM,
  author =       "Cynthia Dwork and Moni Naor and Omer Reingold and
                 Larry Stockmeyer",
  title =        "Magic Functions: In Memoriam: {Bernard M. Dwork}
                 1923--1998",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "6",
  pages =        "852--921",
  month =        nov,
  year =         "2003",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/950620.950623",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 28 14:26:11 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We prove that three apparently unrelated fundamental
                 problems in distributed computing, cryptography, and
                 complexity theory, are essentially the same problem.
                 These three problems and brief descriptions of them
                 follow. (1) The selective decommitment problem. An
                 adversary is given commitments to a collection of
                 messages, and the adversary can ask for some subset of
                 the commitments to be opened. The question is whether
                 seeing the decommitments to these open plaintexts
                 allows the adversary to learn something unexpected
                 about the plaintexts that are unopened. (2) The power
                 of 3-round weak zero-knowledge arguments. The question
                 is what can be proved in (a possibly weakened form of)
                 zero-knowledge in a 3-round argument. In particular, is
                 there a language outside of BPP that has a 3-round
                 public-coin weak zero-knowledge argument? (3) The
                 Fiat--Shamir methodology. This is a method for
                 converting a 3-round public-coin argument (viewed as an
                 identification scheme) to a 1-round signature scheme.
                 The method requires what we call a ``magic function''
                 that the signer applies to the first-round message of
                 the argument to obtain a second-round message (queries
                 from the verifier). An open question here is whether
                 every 3-round public-coin argument for a language
                 outside of BPP has a magic function.\par

                 It follows easily from definitions that if a 3-round
                 public-coin argument system is zero-knowledge in the
                 standard (fairly strong) sense, then it has no magic
                 function. We define a weakening of zero-knowledge such
                 that zero-knowledge ? no-magic-function still holds.
                 For this weakened form of zero-knowledge, we give a
                 partial converse: informally, if a 3-round public-coin
                 argument system is not weakly zero-knowledge, then some
                 form of magic is possible for this argument system. We
                 obtain our definition of weak zero-knowledge by a
                 sequence of weakenings of the standard definition,
                 forming a hierarchy. Intermediate forms of
                 zero-knowledge in this hierarchy are reasonable ones,
                 and they may be useful in applications. Finally, we
                 relate the selective decommitment problem to
                 public-coin proof systems and arguments at an
                 intermediate level of the hierarchy, and obtain several
                 positive security results for selective decommitment.",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of the Association for Computing Machinery",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@TechReport{Dworkin:2003:DRB,
  author =       "Morris Dworkin",
  title =        "{DRAFT} Recommendation for Block Cipher Modes of
                 Operation: {The} {CCM} Mode For Authentication and
                 Confidentiality",
  type =         "{NIST} Special Publication",
  number =       "800-38C",
  institution =  pub-NIST,
  address =      pub-NIST:adr,
  month =        sep,
  year =         "2003",
  bibdate =      "Mon Sep 15 07:58:33 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csrc.nist.gov/publications/drafts/Draft_SP_800-38C_9-04-2003.pdf",
  abstract =     "This Recommendation defines a mode of operation,
                 called CCM, for a symmetric key block cipher algorithm.
                 CCM may be used to provide cryptographic protection for
                 sensitive, but unclassified, computer data. In
                 particular, CCM may be used to provide assurance of the
                 confidentiality and the authenticity of the data by
                 combining the techniques of the Counter (CTR) mode and
                 the Cipher Block Chaining-Message Authentication Code
                 (CBC-MAC) algorithm.",
  acknowledgement = ack-nhfb,
  keywords =     "Authentication; block cipher; confidentiality;
                 cryptography; encryption; Federal Information
                 Processing Standard; IEEE 802.11i; information
                 security; mode of operation",
  remark =       "The draft specifies the CCM mode of operation of the
                 Advanced Encryption Standard (AES) algorithm. CCM
                 combines the counter authentication code (CBC-MAC)
                 technique for authentication and data integrity. The
                 specification of CCM is intended to be compatible with
                 the use of CCM within the draft IEEE 802.11i
                 standard.",
}

@Article{Ellison:2003:PKS,
  author =       "Carl Ellison and Steve Dohrmann",
  title =        "Public-key support for group collaboration",
  journal =      j-TISSEC,
  volume =       "6",
  number =       "4",
  pages =        "547--565",
  month =        nov,
  year =         "2003",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Mon Dec 22 17:56:10 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@InProceedings{Epstein:2003:DIT,
  author =       "Michael Epstein and Laszlo Hars and Raymond Krasinski
                 and Martin Rosner and Hao Zheng",
  title =        "Design and Implementation of a True Random Number
                 Generator Based on Digital Circuit Artifacts",
  crossref =     "Walter:2003:CHE",
  pages =        "152--165",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Book{Erickson:2003:HAE,
  author =       "Jon (Jon Mark) Erickson",
  title =        "Hacking: the art of exploitation",
  publisher =    pub-NO-STARCH,
  address =      pub-NO-STARCH:adr,
  pages =        "xi + 241",
  year =         "2003",
  ISBN =         "1-59327-007-0",
  ISBN-13 =      "978-1-59327-007-0",
  LCCN =         "QA76.9.A25 E75 2003",
  bibdate =      "Sat Dec 24 07:30:39 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip047/2003017498.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Computer hackers; Computer
                 networks; Security measures",
}

@Article{Everitt:2003:JBI,
  author =       "R. A. J. Everitt and P. W. McOwan",
  title =        "{Java}-Based {Internet} Biometric Authentication
                 System",
  journal =      "IEEE Transactions on Pattern Analysis and Machine
                 Intelligence",
  volume =       "25",
  number =       "9",
  pages =        "1166--1171",
  year =         "2003",
  CODEN =        "????",
  ISSN =         "0162-8828",
  bibdate =      "Tue Sep 30 06:17:55 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 Ingenta database",
  acknowledgement = ack-nhfb,
}

@Article{Fan:2003:ILC,
  author =       "Chun-I Fan",
  title =        "Improved low-computation partially blind signatures",
  journal =      j-APPL-MATH-COMP,
  volume =       "145",
  number =       "2--3",
  pages =        "853--867",
  day =          "25",
  month =        dec,
  year =         "2003",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Fri Jan 9 08:41:12 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Faugere:2003:ACH,
  author =       "Jean-Charles Faug{\`e}re and Antoine Joux",
  title =        "Algebraic Cryptanalysis of {Hidden Field Equation
                 (HFE)} Cryptosystems Using {Gr{\"o}bner} Bases",
  crossref =     "Boneh:2003:ACC",
  pages =        "44--60",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Misc{Ferguson:2003:CEI,
  author =       "Niels Ferguson and Bruce Schneier",
  title =        "A cryptographic evaluation of {IPsec}",
  howpublished = "Unknown",
  year =         "2003",
  bibdate =      "Mon Mar 09 12:03:06 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.schneier.com/paper-ipsec.html",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference ]{Schneier:2015:SWC}.",
}

@Book{Ferguson:2003:PC,
  author =       "Niels Ferguson and Bruce Schneier",
  title =        "Practical Cryptography",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xx + 410",
  year =         "2003",
  ISBN =         "0-471-22894-X (hardcover), 0-471-22357-3 (paperback)",
  ISBN-13 =      "978-0-471-22894-3 (hardcover), 978-0-471-22357-3
                 (paperback)",
  LCCN =         "QA76.9.A25 F466 2003",
  bibdate =      "Mon Apr 21 16:29:39 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib",
  URL =          "http://www.counterpane.com/book-practical.html;
                 http://www.loc.gov/catdir/bios/wiley044/2003276249.html;
                 http://www.loc.gov/catdir/description/wiley036/2003276249.html;
                 http://www.loc.gov/catdir/toc/wiley032/2003276249.html",
  abstract =     "Security is the number one concern for businesses
                 worldwide. The gold standard for attaining security is
                 cryptography because it provides the most reliable
                 tools for storing or transmitting digital
                 information.",
  acknowledgement = ack-nhfb,
  tableofcontents = "1: Our design philosophy \\
                 2: The context of cryptography \\
                 3: Introduction to cryptography \\
                 4: Block ciphers \\
                 5: Block cipher modes \\
                 6: Hash functions \\
                 7: Message authentication codes \\
                 8: The secure channel \\
                 9: Implementation issues \\
                 10: Generating randomness \\
                 11: Primes \\
                 12: Diffie--Hellman \\
                 13: RSA \\
                 14: Introduction to cryptographic protocols \\
                 15: Key negotiation protocol \\
                 16: Implementation issues 2 \\
                 17: The clock \\
                 18: Key servers \\
                 19: The dream of PKI \\
                 20: PKI reality \\
                 21: PKI practicalities \\
                 22: Storing secrets \\
                 23: Standards \\
                 24: Patents \\
                 25: Involving experts",
}

@Book{Finkenzeller:2003:RHF,
  author =       "Klaus Finkenzeller",
  title =        "{RFID} handbook: fundamentals and applications in
                 contactless smart cards and identification",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  edition =      "Second",
  pages =        "xviii + 427",
  year =         "2003",
  ISBN =         "0-470-84402-7",
  ISBN-13 =      "978-0-470-84402-1",
  LCCN =         "TS160 .F5513 2003",
  bibdate =      "Thu Jun 23 18:36:11 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "ftp://uiarchive.cso.uiuc.edu/pub/etext/gutenberg/;
                 http://www.loc.gov/catdir/description/wiley039/2002192439.html;
                 http://www.loc.gov/catdir/toc/wiley031/2002192439.html",
  acknowledgement = ack-nhfb,
  subject =      "Inventory control; Automation; Radio frequency
                 identification systems; Smart cards",
}

@Article{Focardi:2003:CTA,
  author =       "Riccardo Focardi and Roberto Gorrieri and Fabio
                 Martinelli",
  title =        "A comparison of three authentication properties",
  journal =      j-THEOR-COMP-SCI,
  volume =       "291",
  number =       "3",
  pages =        "285--327",
  day =          "6",
  month =        jan,
  year =         "2003",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Nov 5 08:45:19 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@InProceedings{Fouque:2003:AUR,
  author =       "Pierre-Alain Fouque and Gwena{\"e}lle Martinet and
                 Guillaume Poupard",
  title =        "Attacking Unbalanced {RSA--CRT} Using {SPA}",
  crossref =     "Walter:2003:CHE",
  pages =        "254--268",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@InProceedings{Fouque:2003:DAW,
  author =       "Pierre-Alain Fouque and Frederic Valette",
  title =        "The Doubling Attack --- Why Upwards Is Better than
                 Downwards",
  crossref =     "Walter:2003:CHE",
  pages =        "269--280",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@InProceedings{Fournier:2003:SEA,
  author =       "Jacques J. A. Fournier and Simon Moore and Huiyun Li
                 and Robert Mullins and George Taylor",
  title =        "Security Evaluation of Asynchronous Circuits",
  crossref =     "Walter:2003:CHE",
  pages =        "137--151",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Article{Fremberg:2003:MAP,
  author =       "Daniel Fremberg",
  title =        "The {Mithra} Authentication Protocol",
  journal =      j-DDJ,
  volume =       "28",
  number =       "5",
  pages =        "44, 46--48",
  month =        may,
  year =         "2003",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Jun 12 05:46:23 MDT 2003",
  bibsource =    "http://www.ddj.com/articles/2003/0305/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ddj.com/documents/s=7927/ddj0305d/",
  abstract =     "Mithra is an authentication protocol designed to
                 detect Man-in-the-Middle attacks that try to steal your
                 passwords.",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Gaj:2003:FME,
  author =       "Kris Gaj and Arkadiusz Or{\l}owski",
  title =        "Facts and Myths of {Enigma}: Breaking Stereotypes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2656",
  pages =        "106--122",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/3-540-39200-9_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 11:39:24 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2003a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/3-540-39200-9_7.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/3-540-39200-9",
  book-URL =     "http://www.springerlink.com/content/978-3-540-39200-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Galbraith:2003:IAU,
  author =       "Steven D. Galbraith and Wenbo Mao",
  title =        "Invisibility and Anonymity of Undeniable and Confirmer
                 Signatures",
  crossref =     "Joye:2003:TCC",
  pages =        "80--97",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@Article{Gallo:2003:SST,
  author =       "Vince Gallo",
  title =        "Secret Steganography Techniques Revealed",
  journal =      j-NETWORK-SECURITY,
  volume =       "2003",
  number =       "2",
  pages =        "4--8",
  month =        feb,
  year =         "2003",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(03)00209-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485803002095",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Garfinkel:2003:EBI,
  author =       "Simson L. Garfinkel",
  title =        "Email-Based Identification and Authentication: An
                 Alternative to {PKI}?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "6",
  pages =        "20--26",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1253564",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6020abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6020.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6020.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Book{Garfinkel:2003:PUI,
  author =       "Simson Garfinkel and Gene Spafford and Alan Schwartz",
  title =        "Practical {Unix} \& {Internet} Security",
  publisher =    pub-ORA,
  address =      pub-ORA:adr,
  edition =      "Third",
  pages =        "xxix + 954",
  year =         "2003",
  ISBN =         "0-596-00323-4",
  ISBN-13 =      "978-0-596-00323-4",
  LCCN =         "QA76.76.O63 G38 2003",
  bibdate =      "Wed Oct 30 16:15:17 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.oreilly.com/catalog/prdindex.html;
                 z3950.loc.gov:7090/Voyager",
  price =        "US\$54.95",
  URL =          "http://www.oreilly.com/catalog/puis3",
  acknowledgement = ack-nhfb,
  publishersummary = "This new edition of Practical UNIX and Internet
                 Security provides detailed coverage of today's security
                 and networking issues. In addition to covering the four
                 most popular Unix variants today: Solaris, Linux,
                 FreeBSD, and Mac OS X, the authors have added far more
                 information about Linux, security policy, and
                 cryptography, and have added new sections on embedded
                 systems, biometrics, additional Internet protocols, new
                 authentication systems such as LDAP and PAM, and
                 anti-theft technologies.",
  subject =      "Operating systems (Computers); UNIX (Computer file);
                 Computer security; Internet; Congresses",
}

@Book{Garman:2003:KDG,
  author =       "Jason Garman",
  title =        "{Kerberos}: the definitive guide",
  publisher =    pub-ORA,
  address =      pub-ORA:adr,
  pages =        "xiv + 253",
  year =         "2003",
  ISBN =         "0-596-00403-6",
  ISBN-13 =      "978-0-596-00403-3",
  LCCN =         "TK5105.59 .G375 2003",
  bibdate =      "Mon Apr 18 15:06:04 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.oreilly.com/catalog/9780596004033",
  acknowledgement = ack-nhfb,
  remark =       "``Covers Unix and Windows'' --- cover.
                 ``Cross-platform authentication and single-sign-on''
                 --- cover.",
  subject =      "Computer networks; Security measures; Computer
                 networks; Access control",
}

@Article{Geier:2003:LCC,
  author =       "M. J. Geier",
  title =        "Lights, camera, controls! [DVD copying prevention]",
  journal =      j-IEEE-SPECTRUM,
  volume =       "40",
  number =       "5",
  pages =        "28--31",
  month =        may,
  year =         "2003",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2003.1197474",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Cameras; Cascading style sheets; content scramble
                 system; copyright; cryptography; digital copies;
                 digital versatile discs; DVD; DVD copying prevention;
                 encryption; History; Internet; Law; Lighting control;
                 Motion pictures; movie industry; Protection; Video
                 recording",
}

@InProceedings{Geiselmann:2003:HSS,
  author =       "Willi Geiselmann and Rainer Steinwandt",
  title =        "Hardware to Solve Sparse Systems of Linear Equations
                 over {$ \mathrm {GF}(2) $}",
  crossref =     "Walter:2003:CHE",
  pages =        "51--61",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Article{Gennaro:2003:FPB,
  author =       "Rosario Gennaro and Yehuda Lindell",
  title =        "A Framework for Password-Based Authenticated Key
                 Exchange",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2656",
  pages =        "524--543",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/3-540-39200-9_33",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 11:39:42 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2003a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/3-540-39200-9_33.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/3-540-39200-9",
  book-URL =     "http://www.springerlink.com/content/978-3-540-39200-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Gennaro:2003:LBE,
  author =       "Rosario Gennaro and Yael Gertner and Jonathan Katz",
  title =        "Lower bounds on the efficiency of encryption and
                 digital signature schemes",
  crossref =     "ACM:2003:PTF",
  pages =        "417--425",
  year =         "2003",
  bibdate =      "Tue Jan 13 06:21:07 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Gennaro:2003:SAP,
  author =       "Rosario Gennaro and Stanislaw Jarecki and Hugo
                 Krawczyk and Tal Rabin",
  title =        "Secure Applications of {Pedersen}'s Distributed Key
                 Generation Protocol",
  crossref =     "Joye:2003:TCC",
  pages =        "373--390",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@Article{Gentry:2003:CBE,
  author =       "Craig Gentry",
  title =        "Certificate-Based Encryption and the Certificate
                 Revocation Problem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2656",
  pages =        "272--293",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/3-540-39200-9_17",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 11:39:24 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2003a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/3-540-39200-9_17.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/3-540-39200-9",
  book-URL =     "http://www.springerlink.com/content/978-3-540-39200-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Golic:2003:DNP,
  author =       "Jovan D. Goli{\'c}",
  title =        "{DeKaRT}: a New Paradigm for Key-Dependent Reversible
                 Circuits",
  crossref =     "Walter:2003:CHE",
  pages =        "98--112",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@InProceedings{Goodrich:2003:ADS,
  author =       "Michael T. Goodrich and Roberto Tamassia and Nikos
                 Triandopoulos and Robert Cohen",
  title =        "Authenticated Data Structures for Graph and Geometric
                 Searching",
  crossref =     "Joye:2003:TCC",
  pages =        "295--313",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@Article{Gordon:2003:ATS,
  author =       "Andrew D. Gordon and Alan Jeffrey",
  title =        "Authenticity by typing for security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "451--519",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11402",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:14 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@InProceedings{Gross-Amblard:2003:QPW,
  author =       "David Gross-Amblard",
  title =        "Query-preserving watermarking of relational databases
                 and {XML} documents",
  crossref =     "ACM:2003:PTS",
  pages =        "191--201",
  year =         "2003",
  bibdate =      "Fri Oct 31 08:02:47 MST 2003",
  bibsource =    "http://www.acm.org/pubs/contents/proceedings/series/sigmod_pods/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Grossschadl:2003:ASL,
  author =       "Johann Gro{\ss}sch{\"a}dl",
  title =        "Architectural Support for Long Integer Modulo
                 Arithmetic on {RISC}-Based {Smart Cards}",
  journal =      j-IJHPCA,
  volume =       "17",
  number =       "2",
  pages =        "135--146",
  month =        "Summer",
  year =         "2003",
  CODEN =        "IHPCFL",
  ISSN =         "1094-3420 (print), 1741-2846 (electronic)",
  ISSN-L =       "1094-3420",
  bibdate =      "Fri Nov 28 06:52:13 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://hpc.sagepub.com/content/by/year",
  keywords =     "application-specific instruct set processor (ASIP);
                 coarsely-integrated operand scanning (CIOS);
                 Diffie--Hellman; inner-loop operation; Montgomery
                 multiplication; processor specialization; public-key
                 cryptography; Rivest-Shamir-Adelman",
}

@InProceedings{Halevi:2003:TEM,
  author =       "Shai Halevi and Phillip Rogaway",
  title =        "A Tweakable Enciphering Mode",
  crossref =     "Boneh:2003:ACC",
  pages =        "482--499",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Book{Hardy:2003:AAC,
  author =       "Darel W. Hardy and Carol L. Walker",
  title =        "Applied algebra: codes, ciphers, and discrete
                 algorithms",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  pages =        "x + 420",
  year =         "2003",
  ISBN =         "0-13-067464-8",
  ISBN-13 =      "978-0-13-067464-7",
  LCCN =         "QA268 .H365 2003",
  bibdate =      "Tue Feb 25 07:04:05 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Haufler:2003:CVH,
  author =       "Hervie Haufler",
  title =        "Codebreakers' victory: how the {Allied} cryptographers
                 won {World War II}",
  publisher =    "New American Library",
  address =      "New York, NY, USA",
  pages =        "344",
  year =         "2003",
  ISBN =         "0-451-20979-6",
  ISBN-13 =      "978-0-451-20979-5",
  LCCN =         "D810.C88 H38 2003",
  bibdate =      "Thu Feb 23 07:15:55 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  remark =       "From the publisher: ``For the first time ever, veteran
                 World War II cryptographer Hervie Haufler details how
                 American and British codebreakers were the decisive
                 factor in the Allied victory. From the Purple Machine
                 to the Navajo Talkers to the breaking of Japan's JN-25
                 Naval Code to the shadowy world of decoding units like
                 Hut-8 in Bletchley Park, he shows how crucial
                 information-often obtained by surreptitious and violent
                 means-was the decisive edge in the Battle of Britain,
                 at Midway and against the U-Boats in the North
                 Atlantic, and how Allied intelligence saved the Soviet
                 Union from almost certain defeat.

                 In an accessible account based on years of research,
                 interviews and exclusive access to previously
                 top-secret archives, Haufler demonstrates how
                 cryptography enabled Nimitz and MacArthur to persevere
                 in the Pacific and helped Eisenhower and Patton mount
                 the assaults on Normandy. In compelling detail, Haufler
                 shows us how it was done-as only one who was on the
                 frontlines of the `secret war' could tell it.

                 About the Author Hervie Haufler is a World War II
                 veteran cryptographer who participated in both English
                 and American codebreaking task forces.''",
  subject =      "World War, 1939-1945; Cryptography; United States;
                 History; 20th century; Great Britain",
}

@Article{Heiser:2003:BCB,
  author =       "Jay G. Heiser",
  title =        "Beyond cryptography: Bruce {Schneier}'s Beyond Fear:
                 thinking sensibly about security in an uncertain
                 world",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "8",
  pages =        "673--674",
  month =        dec,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803000051",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hellekalek:2003:EEC,
  author =       "Peter Hellekalek and Stefan Wegenkittl",
  title =        "Empirical evidence concerning {AES}",
  journal =      j-TOMACS,
  volume =       "13",
  number =       "4",
  pages =        "322--333",
  month =        oct,
  year =         "2003",
  CODEN =        "ATMCEZ",
  ISSN =         "1049-3301 (print), 1558-1195 (electronic)",
  ISSN-L =       "1049-3301",
  bibdate =      "Fri Oct 31 05:50:26 MST 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomacs/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://random.mat.sbg.ac.at/ftp/pub/publications/peter/aes_sub.ps;
                 http://random.mat.sbg.ac.at/~peter/slides_YACC04.pdf",
  abstract =     "AES, the Advanced Encryption Standard, is one of the
                 most important algorithms in modern cryptography.
                 Certain randomness properties of AES are of vital
                 importance for its security. At the same time, these
                 properties make AES an interesting candidate for a fast
                 nonlinear random number generator for stochastic
                 simulation. In this article, we address both of these
                 two aspects of AES. We study the performance of AES in
                 a series of statistical tests that are related to
                 cryptographic notions like confusion and diffusion. At
                 the same time, these tests provide empirical evidence
                 for the suitability of AES in stochastic simulation. A
                 substantial part of this article is devoted to the
                 strategy behind our tests and to their relation to
                 other important test statistics like Maurer's Universal
                 Test.",
  acknowledgement = ack-nhfb,
  annote =       "Best period is $ 2^{128} \approx 10^{38} $. From the
                 article: ``It appears that our test results are the
                 first detailed statistical results for AES in the
                 published literature. \ldots{}\par

                 AES has been evaluated using the NIST package (see NIST
                 [2001a]). In principle, we consider this type of
                 testing necessary and valuable. However, up to now, AES
                 has only been tested using relatively small sample
                 sizes. Furthermore, the exact test procedure and the
                 parameters that were used have not been published.
                 There are no refereed publications on this topic.
                 \ldots{} \par

                 4. FINDINGS\par

                 AES performed very well. The empirical results support
                 the hypothesis that AES is not only an excellent
                 cryptographic algorithm, but also a very interesting
                 nonlinear random number generator for stochastic
                 simulation.\par

                 We were unable to find any statistical weaknesses. Most
                 of the $p$-values were completely uncritical, no
                 systematic trends popped up in the tests.\par

                 \ldots{} \par

                 The results indicate that AES pseudorandom numbers are
                 indistinguishable from real random numbers with respect
                 to bit-vectors up to length 16 and with respect to the
                 distribution of 0's and 1's in bit-vectors up to length
                 256.\par

                 From the results for DIFF we conclude that AES is able
                 to compensate for an extreme lack of 1's in the
                 plaintext, and hence provides excellent diffusion in
                 this case. The results for KCOUNT provide some
                 confidence that the key schedule used for generating
                 the internal keys for the encryption rounds in AES does
                 a good job. Similar keys do not yield correlated output
                 sequences.''",
  fjournal =     "ACM Transactions on Modeling and Computer Simulation",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J781",
}

@InProceedings{Herzog:2003:PAK,
  author =       "Jonathan Herzog and Moses Liskov and Silvio Micali",
  title =        "Plaintext Awareness via Key Registration",
  crossref =     "Boneh:2003:ACC",
  pages =        "548--564",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Article{Heys:2003:ASC,
  author =       "H. M. Heys",
  title =        "Analysis of the statistical cipher feedback mode of
                 block ciphers",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "52",
  number =       "1",
  pages =        "77--92",
  month =        jan,
  year =         "2003",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2003.1159755",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Jul 5 08:52:42 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1159755",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@InProceedings{Hoffstein:2003:NDS,
  author =       "Jeffrey Hoffstein and Nick Howgrave-Graham and Jill
                 Pipher and Joseph H. Silverman and William Whyte",
  title =        "{NTRUSIGN}: Digital Signatures Using the {NTRU}
                 Lattice",
  crossref =     "Joye:2003:TCC",
  pages =        "122--140",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "ANSI X9.98-2010; cryptology; NTRUSign; Topics in
                 Cryptology CT-RSA 2003",
}

@Article{Hong:2003:BBP,
  author =       "Hyun-Soo Hong and Ho-Kyu Lee and Hyang-Sook Lee and
                 Hee-Jung Lee",
  title =        "The better bound of private key in {RSA} with
                 unbalanced primes",
  journal =      j-APPL-MATH-COMP,
  volume =       "139",
  number =       "2--3",
  pages =        "351--362",
  day =          "15",
  month =        jul,
  year =         "2003",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Fri Jan 9 08:40:58 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Horvitz:2003:WKA,
  author =       "Omer Horvitz and Virgil Gligor",
  title =        "Weak Key Authenticity and the Computational
                 Completeness of Formal Encryption",
  crossref =     "Boneh:2003:ACC",
  pages =        "530--547",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Book{Howard:2003:WSC,
  author =       "Michael Howard and David LeBlanc",
  title =        "Writing secure code",
  publisher =    pub-MICROSOFT,
  address =      pub-MICROSOFT:adr,
  edition =      "Second",
  pages =        "xxviii + 768",
  year =         "2003",
  ISBN =         "0-7356-1722-8",
  ISBN-13 =      "978-0-7356-1722-3",
  LCCN =         "QA76.9.A25 H698 2003",
  bibdate =      "Thu Feb 23 08:02:30 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Data encryption (Computer
                 science)",
}

@Article{Howgrave-Graham:2003:HNP,
  author =       "Nick A. Howgrave-Graham and Phong Q. Nguyen and Igor
                 E. Shparlinski",
  title =        "Hidden number problem with hidden multipliers,
                 timed-release crypto, and noisy exponentiation",
  journal =      j-MATH-COMPUT,
  volume =       "72",
  number =       "243",
  pages =        "1473--1485",
  month =        jul,
  year =         "2003",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (print), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Wed Nov 5 16:26:01 MST 2003",
  bibsource =    "http://www.ams.org/mcom/2003-72-243;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ams.org/journal-getitem?pii=S0025-5718-03-01495-9;
                 http://www.ams.org/mcom/2003-72-243/S0025-5718-03-01495-9/S0025-5718-03-01495-9.dvi;
                 http://www.ams.org/mcom/2003-72-243/S0025-5718-03-01495-9/S0025-5718-03-01495-9.pdf;
                 http://www.ams.org/mcom/2003-72-243/S0025-5718-03-01495-9/S0025-5718-03-01495-9.ps;
                 http://www.ams.org/mcom/2003-72-243/S0025-5718-03-01495-9/S0025-5718-03-01495-9.tex",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
}

@InProceedings{Howgrave-Graham:2003:IDF,
  author =       "Nick Howgrave-Graham and Phong Q. Nguyen and David
                 Pointcheval and John Proos and Joseph H. Silverman and
                 Ari Singer and William Whyte",
  title =        "The Impact of Decryption Failures on the Security of
                 {NTRU} Encryption",
  crossref =     "Boneh:2003:ACC",
  pages =        "226--246",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Book{Hromkovic:2003:AHP,
  author =       "Juraj Hromkovi{\v{c}}",
  title =        "Algorithmics for Hard Problems: Introduction to
                 Combinatorial Optimization, Randomization,
                 Approximation, and Heuristics",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  edition =      "Second",
  pages =        "xiii + 544",
  year =         "2003",
  ISBN =         "3-540-44134-4",
  ISBN-13 =      "978-3-540-44134-2",
  LCCN =         "QA76.58 .H76 2003",
  bibdate =      "Fri Mar 23 11:17:51 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Texts in theoretical computer science",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0817/2002032405-d.html;
                 http://www.loc.gov/catdir/enhancements/fy0817/2002032405-t.html",
  acknowledgement = ack-nhfb,
  subject =      "Parallel processing (Electronic computers);
                 Computational complexity",
  tableofcontents = "1: Introduction \\
                 2: Elementary Fundamentals \\
                 3: Deterministic Approaches \\
                 4: Approximation Algorithms \\
                 5: Randomized Algorithms \\
                 6: Heuristics \\
                 7: A Guide to Solving Hard Problems",
}

@Article{Hsu:2003:CIT,
  author =       "Chien-Lung Hsu and Tzong-Sun Wu",
  title =        "Cryptanalyses and improvements of two cryptographic
                 key assignment schemes for dynamic access control in a
                 user hierarchy",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "453--456",
  month =        jul,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803005145",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hsu:2003:IMA,
  author =       "Chien-Lung Hsu and Tzong-Sun Wu and Tzong-Chen Wu and
                 Chris Mitchell",
  title =        "Improvement of modified authenticated key agreement
                 protocol",
  journal =      j-APPL-MATH-COMP,
  volume =       "142",
  number =       "2--3",
  pages =        "305--308",
  day =          "10",
  month =        oct,
  year =         "2003",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Fri Jan 9 08:41:06 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Hsu:2003:ITP,
  author =       "Chien-Lung Hsu and Tzong-Sun Wu and Tzong-Chen Wu",
  title =        "Improvement of threshold proxy signature scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "136",
  number =       "2--3",
  pages =        "315--321",
  day =          "15",
  month =        mar,
  year =         "2003",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Fri Jan 9 08:40:52 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Hwang:2003:ASM,
  author =       "Min-Shiang Hwang and Chao-Chen Yang and Cheng-Yeh
                 Shiu",
  title =        "An authentication scheme for mobile satellite
                 communication systems",
  journal =      j-OPER-SYS-REV,
  volume =       "37",
  number =       "4",
  pages =        "42--47",
  month =        oct,
  year =         "2003",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:53 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Hwang:2003:CAL,
  author =       "Min-Shiang Hwang and Wei-Pang Yang",
  title =        "Controlling access in large partially ordered
                 hierarchies using cryptographic keys",
  journal =      j-J-SYST-SOFTW,
  volume =       "67",
  number =       "2",
  pages =        "99--107",
  day =          "15",
  month =        aug,
  year =         "2003",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Sat Oct 25 07:14:15 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Hwang:2003:TRB,
  author =       "Min-Shiang Hwang and Cheng-Chi Lee and Yan-Chi Lai",
  title =        "Traceability on {RSA}-based partially signature with
                 low computation",
  journal =      j-APPL-MATH-COMP,
  volume =       "145",
  number =       "2--3",
  pages =        "465--468",
  day =          "25",
  month =        dec,
  year =         "2003",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Fri Jan 9 08:41:12 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Impagliazzo:2003:LRA,
  author =       "R. Impagliazzo and B. M. Kapron",
  title =        "Logics for reasoning about cryptographic
                 constructions",
  crossref =     "IEEE:2003:PAI",
  pages =        "372--383",
  year =         "2003",
  bibdate =      "Fri Jul 15 16:13:03 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8767/27770/01238211.pdf?isnumber=27770&prod=CNF&arnumber=1238211&arSt=+372&ared=+383&arAuthor=Impagliazzo%2C+R.%3B+Kapron%2C+B.M.;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=27770&arnumber=1238211&count=66&index=38",
  acknowledgement = ack-nhfb,
}

@Article{Imrey:2003:BRC,
  author =       "Lee Imrey",
  title =        "Book Review: {{\em The Code Book: The Science of
                 Secrecy from Ancient Egypt to Quantum Cryptography\/}
                 by Simon Singh, Delacorte Press, 2000, \$15.00, ISBN
                 0-385-49532-3}",
  journal =      j-QUEUE,
  volume =       "1",
  number =       "9",
  pages =        "76--76",
  month =        dec # "\slash " # jan,
  year =         "2003",
  CODEN =        "AQCUAE",
  ISSN =         "1542-7730 (print), 1542-7749 (electronic)",
  ISSN-L =       "1542-7730",
  bibdate =      "Thu Jan 29 12:03:39 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Queue: Tomorrow's Computing Today",
}

@Misc{Intel:2003:IRN,
  author =       "{Intel Corporation}",
  title =        "The {Intel} Random Number Generator",
  howpublished = "World-Wide Web document.",
  year =         "2003",
  bibdate =      "Mon Dec 08 09:38:29 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://developer.intel.com/design/chipsets/rng/docs.htm",
  acknowledgement = ack-nhfb,
}

@Article{Irwin:2003:BRBb,
  author =       "Robert J. Irwin",
  title =        "Book Review: {{\booktitle{Coding Theory and
                 Cryptography: the Essentials}}, second edition, revised
                 and expanded by D.R. Hankerson, et al. Marcel Dekker,
                 2000}",
  journal =      j-SIGACT,
  volume =       "34",
  number =       "4",
  pages =        "17--21",
  month =        dec,
  year =         "2003",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/954092.954096",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 18:30:26 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See \cite{Hankerson:2000:CTC}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@InProceedings{Ishai:2003:EOT,
  author =       "Yuval Ishai and Joe Kilian and Kobbi Nissim and Erez
                 Petrank",
  title =        "Extending Oblivious Transfers Efficiently",
  crossref =     "Boneh:2003:ACC",
  pages =        "145--161",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@InProceedings{Ishai:2003:PCS,
  author =       "Yuval Ishai and Amit Sahai and David Wagner",
  title =        "Private Circuits: Securing Hardware against Probing
                 Attacks",
  crossref =     "Boneh:2003:ACC",
  pages =        "463--481",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@InProceedings{Itoh:2003:PCA,
  author =       "Kouichi Itoh and Tetsuya Izu and Masahiko Takenaka",
  title =        "A Practical Countermeasure against Address-Bit
                 Differential Power Analysis",
  crossref =     "Walter:2003:CHE",
  pages =        "382--396",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Article{Iwata:2003:NCP,
  author =       "Tetsu Iwata and Tomonobu Yoshino and Kaoru Kurosawa",
  title =        "Non-cryptographic primitive for pseudorandom
                 permutation",
  journal =      j-THEOR-COMP-SCI,
  volume =       "306",
  number =       "1--3",
  pages =        "139--154",
  day =          "5",
  month =        sep,
  year =         "2003",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Nov 5 08:45:46 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@InProceedings{Jakobsson:2003:FMT,
  author =       "Markus Jakobsson and Tom Leighton and Silvio Micali
                 and Michael Szydlo",
  title =        "Fractal {Merkle} Tree Representation and Traversal",
  crossref =     "Joye:2003:TCC",
  pages =        "314--326",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@Article{Joux:2003:IGN,
  author =       "Antoine Joux and Reynald Lercier",
  title =        "Improvements to the general number field sieve for
                 discrete logarithms in prime fields. {A} comparison
                 with the {Gaussian} integer method",
  journal =      j-MATH-COMPUT,
  volume =       "72",
  number =       "242",
  pages =        "953--967",
  month =        apr,
  year =         "2003",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (print), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Wed Nov 5 16:25:58 MST 2003",
  bibsource =    "http://www.ams.org/mcom/2003-72-242;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ams.org/journal-getitem?pii=S0025-5718-02-01482-5;
                 http://www.ams.org/mcom/2003-72-242/S0025-5718-02-01482-5/S0025-5718-02-01482-5.dvi;
                 http://www.ams.org/mcom/2003-72-242/S0025-5718-02-01482-5/S0025-5718-02-01482-5.pdf;
                 http://www.ams.org/mcom/2003-72-242/S0025-5718-02-01482-5/S0025-5718-02-01482-5.ps;
                 http://www.ams.org/mcom/2003-72-242/S0025-5718-02-01482-5/S0025-5718-02-01482-5.tex",
  abstract =     "In this paper, we describe many improvements to the
                 number field sieve. Our main contribution consists of a
                 new way to compute individual logarithms with the
                 number field sieve without solving a very large linear
                 system for each logarithm. We show that, with these
                 improvements, the number field sieve outperforms the
                 Gaussian integer method in the hundred digit range. We
                 also illustrate our results by successfully computing
                 discrete logarithms with GNFS in a large prime field.",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
}

@Article{Joye:2003:CPY,
  author =       "Marc Joye",
  title =        "Cryptanalysis of a pay-as-you-watch system",
  journal =      j-INFO-PROC-LETT,
  volume =       "88",
  number =       "3",
  pages =        "119--120",
  day =          "15",
  month =        nov,
  year =         "2003",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:33 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@InProceedings{Joye:2003:GFA,
  author =       "Marc Joye and Pascal Paillier",
  title =        "{GCD}-Free Algorithms for Computing Modular Inverses",
  crossref =     "Walter:2003:CHE",
  pages =        "243--253",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Article{Kachris:2003:RLB,
  author =       "C. Kachris and N. Bourbakis and A. Dollas",
  title =        "A Reconfigurable Logic-Based Processor for the {SCAN}
                 Image and Video Encryption Algorithm",
  journal =      j-INT-J-PARALLEL-PROG,
  volume =       "31",
  number =       "6",
  pages =        "489--506",
  month =        dec,
  year =         "2003",
  CODEN =        "IJPPE5",
  DOI =          "https://doi.org/10.1023/B:IJPP.0000004512.53221.ff",
  ISSN =         "0885-7458 (print), 1573-7640 (electronic)",
  ISSN-L =       "0885-7458",
  bibdate =      "Wed Jul 6 16:40:02 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0885-7458&volume=31&issue=6;
                 http://www.kluweronline.com/issn/0885-7458;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://ipsapp007.kluweronline.com/content/getfile/4773/37/6/abstract.htm;
                 http://ipsapp007.kluweronline.com/content/getfile/4773/37/6/fulltext.pdf;
                 http://www.springerlink.com/openurl.asp?genre=article&issn=0885-7458&volume=31&issue=6&spage=489",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Parallel Programming",
  journal-URL =  "http://link.springer.com/journal/10766",
}

@TechReport{Kaliski:2003:TRK,
  author =       "Burton S. Kaliski",
  title =        "{TWIRL} and {RSA} Key Size",
  type =         "Web report",
  institution =  pub-RSA,
  address =      pub-RSA:adr,
  day =          "6",
  month =        may,
  year =         "2003",
  bibdate =      "Thu Apr 11 14:33:30 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://web.archive.org/web/20170417095741/https://www.emc.com/emc-plus/rsa-labs/historical/twirl-and-rsa-key-size.htm",
  abstract =     "The popular 1024-bit key size for RSA keys is becoming
                 the next horizon for researchers in integer
                 factorization, as demonstrated by the innovative TWIRL
                 design recently proposed by Adi Shamir and Eran Tromer.
                 The design confirms that the traditional assumption
                 that a 1024-bit RSA key provides comparable strength to
                 an 80-bit symmetric key has been a reasonable one.
                 Thus, if the 80-bit security level is appropriate for a
                 given application, then TWIRL itself has no immediate
                 effect. Many details remain to be worked out, however,
                 and the cost estimates are inconclusive. TWIRL provides
                 an opportunity for review of key sizes in practice; RSA
                 Laboratories revised recommendations are given in Table
                 1 below.",
  acknowledgement = ack-nhfb,
  remark =       "The report has disappeared from the RSA Web site, but
                 is archived as noted in the URL. The short table
                 referred to in the abstract says for the symmetric keys
                 of length 80, 112, and 128 bits, respectively, for
                 security to 2010, 2030, and beyond, the corresponding
                 RSA key size is 1024, 2048, and 3072 bits,
                 respectively.",
}

@InProceedings{Kamp:2003:DEB,
  author =       "J. Kamp and D. Zuckerman",
  title =        "Deterministic extractors for bit-fixing sources and
                 exposure-resilient cryptography",
  crossref =     "IEEE:2003:PAI",
  pages =        "92--101",
  year =         "2003",
  bibdate =      "Fri Jul 15 16:13:02 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8767/27770/01238184.pdf?isnumber=27770&prod=CNF&arnumber=1238184&arSt=+92&ared=+101&arAuthor=Kamp%2C+J.%3B+Zuckerman%2C+D.;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=27770&arnumber=1238184&count=66&index=11",
  acknowledgement = ack-nhfb,
}

@InProceedings{Karlof:2003:HMM,
  author =       "Chris Karlof and David Wagner",
  title =        "Hidden {Markov} Model Cryptanalysis",
  crossref =     "Walter:2003:CHE",
  pages =        "17--34",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@InProceedings{Karri:2003:PBC,
  author =       "Ramesh Karri and Grigori Kuznetsov and Michael
                 Goessel",
  title =        "Parity-Based Concurrent Error Detection of
                 Substitution-Permutation Network Block Ciphers",
  crossref =     "Walter:2003:CHE",
  pages =        "113--124",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@InProceedings{Katz:2003:SPA,
  author =       "Jonathan Katz and Moti Yung",
  title =        "Scalable Protocols for Authenticated Group Key
                 Exchange",
  crossref =     "Boneh:2003:ACC",
  pages =        "110--125",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Article{Kim:2003:IBP,
  author =       "Hyun-Sung Kim and Sung-Woon Lee and Kee-Young Yoo",
  title =        "{ID}-based password authentication scheme using smart
                 cards and fingerprints",
  journal =      j-OPER-SYS-REV,
  volume =       "37",
  number =       "4",
  pages =        "32--41",
  month =        oct,
  year =         "2003",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:53 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@InProceedings{Kim:2003:RCC,
  author =       "Seungjoo Kim and Masahiro Mambo and Yuliang Zheng",
  title =        "Rethinking Chosen-Ciphertext Security under
                 {Kerckhoffs}' Assumption",
  crossref =     "Joye:2003:TCC",
  pages =        "227--243",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@Article{Klein:2003:FOW,
  author =       "Andreas Klein and Martin Kutrib",
  title =        "Fast one-way cellular automata",
  journal =      j-THEOR-COMP-SCI,
  volume =       "295",
  number =       "1--3",
  pages =        "233--250",
  day =          "24",
  month =        feb,
  year =         "2003",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Nov 5 08:45:28 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@InProceedings{Klima:2003:ARB,
  author =       "Vlastimil Kl{\'\i}ma and Ondrej Pokorn{\'y} and
                 Tom{\'a}{\v{s}} Rosa",
  title =        "Attacking {RSA}-Based Sessions in {SSL\slash TLS}",
  crossref =     "Walter:2003:CHE",
  pages =        "426--440",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Article{Koc:2003:GEI,
  author =       "C. K. Koc and C. Paar",
  title =        "Guest editors' introduction to the special section on
                 cryptographic hardware and embedded systems",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "52",
  number =       "4",
  pages =        "401--402",
  month =        apr,
  year =         "2003",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2003.1190580",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Jul 5 08:52:46 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1190580",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@InProceedings{Komano:2003:EUP,
  author =       "Yuichi Komano and Kazuo Ohta",
  title =        "Efficient Universal Padding Techniques for
                 Multiplicative Trapdoor One-Way Permutation",
  crossref =     "Boneh:2003:ACC",
  pages =        "366--382",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Book{Kovacich:2003:ISS,
  author =       "Gerald L. Kovacich",
  title =        "The information systems security officer's guide:
                 establishing and managing an information protection
                 program",
  publisher =    pub-BUTTERWORTH-HEINEMANN,
  address =      pub-BUTTERWORTH-HEINEMANN:adr,
  edition =      "Second",
  pages =        "xxviii + 361",
  year =         "2003",
  ISBN =         "0-7506-7656-6",
  ISBN-13 =      "978-0-7506-7656-4",
  LCCN =         "QA76.9.A25 K68 2003",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$39.95",
  acknowledgement = ack-nhfb,
}

@Book{Kovacich:2003:MHC,
  author =       "Gerald L. Kovacich and Edward P. Halibozek",
  title =        "The manager's handbook for corporate security:
                 establishing and managing a successful assets
                 protection program",
  publisher =    pub-BUTTERWORTH-HEINEMANN,
  address =      pub-BUTTERWORTH-HEINEMANN:adr,
  pages =        "xxi + 463",
  year =         "2003",
  ISBN =         "0-7506-7487-3",
  ISBN-13 =      "978-0-7506-7487-4",
  LCCN =         "HV8290 .K68 2003",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$49.95",
  acknowledgement = ack-nhfb,
}

@Article{Krause:2003:DOC,
  author =       "Matthias Krause and Hans Ulrich Simon",
  title =        "Determining the Optimal Contrast for Secret Sharing
                 Schemes in Visual Cryptography",
  journal =      j-COMBIN-PROBAB-COMPUT,
  volume =       "12",
  number =       "3",
  pages =        "285--299",
  month =        may,
  year =         "2003",
  CODEN =        "CPCOFG",
  DOI =          "https://doi.org/10.1017/S096354830200559X",
  ISSN =         "0963-5483 (print), 1469-2163 (electronic)",
  ISSN-L =       "0963-5483",
  MRclass =      "94A60 (94A08)",
  MRnumber =     "MR1988978 (2004f:94065)",
  bibdate =      "Mon Jul 7 15:38:14 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Combinatorics, probability and computing (Oberwolfach,
                 2001)",
  URL =          "http://journals.cambridge.org/action/displayIssue?jid=CPC&volumeId=12&issueId=03",
  acknowledgement = ack-nhfb,
  fjournal =     "Combinatorics, Probability and Computing",
}

@InProceedings{Krawczy:2003:SSM,
  author =       "Hugo Krawczy",
  title =        "{SIGMA}: The ``{SIGn-and-MAc}'' Approach to
                 Authenticated {Diffie--Hellman} and Its Use in the
                 {IKE} Protocols",
  crossref =     "Boneh:2003:ACC",
  pages =        "400--425",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Article{Krishna:2003:BUP,
  author =       "Shankara Narayanan Krishna and Raghavan Rama",
  title =        "Breaking {DES} using {P} systems",
  journal =      j-THEOR-COMP-SCI,
  volume =       "299",
  number =       "1--3",
  pages =        "495--508",
  day =          "18",
  month =        apr,
  year =         "2003",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Nov 5 08:45:36 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Ku:2003:TSA,
  author =       "Wei-Chi Ku and Hao-Chuan Tsai and Shuai-Min Chen",
  title =        "Two simple attacks on {Lin--Shen--Hwang}'s
                 strong-password authentication protocol",
  journal =      j-OPER-SYS-REV,
  volume =       "37",
  number =       "4",
  pages =        "26--31",
  month =        oct,
  year =         "2003",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:53 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Ku:2003:WLL,
  author =       "Wei-Chi Ku and Chien-Ming Chen and Hui-Lung Lee",
  title =        "Weaknesses of {Lee--Li--Hwang}'s hash-based password
                 authentication scheme",
  journal =      j-OPER-SYS-REV,
  volume =       "37",
  number =       "4",
  pages =        "19--25",
  month =        oct,
  year =         "2003",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:53 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@InProceedings{Kurosawa:2003:TTK,
  author =       "Kaoru Kurosawa and Tetsu Iwata",
  title =        "{TMAC}: Two-Key {CBC MAC}",
  crossref =     "Joye:2003:TCC",
  pages =        "33--49",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@Article{Kwok:2003:WBC,
  author =       "Sai Ho Kwok",
  title =        "Watermark-based copyright protection system security",
  journal =      j-CACM,
  volume =       "46",
  number =       "10",
  pages =        "98--101",
  month =        oct,
  year =         "2003",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Oct 28 14:25:08 MST 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Kwon:2003:EDS,
  author =       "Taekyoung Kwon",
  title =        "Erratum to: {``Digital signature algorithm for
                 securing digital identities'': [Inform. Process. Lett.
                 {\bf 82} (2002) 247--252]}",
  journal =      j-INFO-PROC-LETT,
  volume =       "88",
  number =       "4",
  pages =        "201--202",
  day =          "30",
  month =        nov,
  year =         "2003",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:33 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  note =         "See \cite{Kwon:2002:DSA}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@InProceedings{Kwon:2003:EEC,
  author =       "Soonhak Kwon and Chang Hoon Kim and Chun Pyo Hong",
  title =        "Efficient Exponentiation for a Class of Finite Fields
                 {$ \mathrm {GF}(2^n) $} Determined by {Gauss} Periods",
  crossref =     "Walter:2003:CHE",
  pages =        "228--242",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Article{Laih:2003:COP,
  author =       "C. S. Laih and S. Y. Chiou",
  title =        "Cryptanalysis of an optimized protocol for mobile
                 network authentication and security",
  journal =      j-INFO-PROC-LETT,
  volume =       "85",
  number =       "6",
  pages =        "339--341",
  day =          "31",
  month =        mar,
  year =         "2003",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:31 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@InProceedings{Lee:2003:APS,
  author =       "Jung-Yeun Lee and Jung Hee Cheon and Seungjoo Kim",
  title =        "An Analysis of Proxy Signatures: Is a Secure Channel
                 Necessary?",
  crossref =     "Joye:2003:TCC",
  pages =        "68--79",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@Article{Lee:2003:BRBa,
  author =       "Andrew C. Lee",
  title =        "Book Review: {{\booktitle{Introduction to
                 Cryptography}}, by Johannes A. Buchmann. Springer
                 Verlag, 2001}",
  journal =      j-SIGACT,
  volume =       "34",
  number =       "4",
  pages =        "15--17",
  month =        dec,
  year =         "2003",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/954092.954095",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 18:30:26 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See \cite{Buchmann:2001:IC,Buchmann:2004:IC}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Lee:2003:BRBb,
  author =       "Andrew C. Lee",
  title =        "Book Review: {{\booktitle{Modern Cryptography,
                 Probabilistic Proofs and Pseudorandomness Algorithms
                 and Combinatorics}}, vol 17, by Oded Goldreich.
                 Springer Verlag, 1999}",
  journal =      j-SIGACT,
  volume =       "34",
  number =       "4",
  pages =        "32--34",
  month =        dec,
  year =         "2003",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/954092.954099",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 18:30:26 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See \cite{Goldreich:1999:MCP}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Lee:2003:CPK,
  author =       "Eonkyung Lee and Je Hong Park",
  title =        "Cryptanalysis of the Public-Key Encryption Based on
                 Braid Groups",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2656",
  pages =        "477--490",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/3-540-39200-9_30",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 11:39:42 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2003a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/3-540-39200-9_30.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/3-540-39200-9",
  book-URL =     "http://www.springerlink.com/content/978-3-540-39200-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@MastersThesis{Lee:2003:CS,
  author =       "Michael Lee",
  title =        "Cryptanalysis of the {SIGABA}",
  type =         "{Master of Science in Computer Science}",
  school =       "Department of Computer Science, University of
                 California, Santa Barbara",
  address =      "Santa Barbara, CA, USA",
  pages =        "viii + 49",
  month =        jun,
  year =         "2003",
  bibdate =      "Mon Sep 15 11:52:44 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "ucsb.curby.net/broadcast/thesis/thesis.pdf",
  acknowledgement = ack-nhfb,
  remark =       "From the last lines of the conclusion: ``The
                 cryptosystem model used for the cryptanalysis is
                 general enough that defeating it not only defeats the
                 SIGABA, but also defeats any cryptosystem where the
                 rotors move according to any pseudorandom source.
                 Lastly, methods that can be used to extend these
                 attacks were considered. As a result of this work, the
                 SIGABA and related rotor-based cryptosystems can be
                 considered compromised.''",
}

@Article{Lee:2003:NKA,
  author =       "Cheng-Chi Lee and Min-Shiang Hwang and Li-Hua Li",
  title =        "A new key authentication scheme based on discrete
                 logarithms",
  journal =      j-APPL-MATH-COMP,
  volume =       "139",
  number =       "2--3",
  pages =        "343--349",
  day =          "15",
  month =        jul,
  year =         "2003",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Fri Jan 9 08:40:58 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Lee:2003:PKB,
  author =       "M. C. Lee and Chun-Kan Fung",
  title =        "A public-key based authentication and key
                 establishment protocol coupled with a client puzzle",
  journal =      j-J-AM-SOC-INF-SCI-TECHNOL,
  volume =       "54",
  number =       "9",
  pages =        "810--823",
  month =        jul,
  year =         "2003",
  CODEN =        "JASIEF",
  DOI =          "https://doi.org/10.1002/asi.10253",
  ISSN =         "1532-2882 (print), 1532-2890 (electronic)",
  ISSN-L =       "1532-2882",
  bibdate =      "Fri Sep 11 10:42:13 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jasist.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of the American Society for Information
                 Science and Technology: JASIST",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1532-2890",
  onlinedate =   "7 May 2003",
}

@Article{Lee:2003:PSAa,
  author =       "Sung-Woon Lee and Woo-Hun Kim and Hyun-Sung Kim and
                 Kee-Young Yoo",
  title =        "Parallizable simple authenticated key agreement
                 protocol",
  journal =      j-OPER-SYS-REV,
  volume =       "37",
  number =       "2",
  pages =        "13--18",
  month =        apr,
  year =         "2003",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:43 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Lee:2003:PSAb,
  author =       "Sung-Woon Lee and Woo-Hun Kim and Hyun-Sung Kim and
                 Kee-Young Yoo",
  title =        "Parallizable simple authenticated key agreement
                 protocol",
  journal =      j-OPER-SYS-REV,
  volume =       "37",
  number =       "3",
  pages =        "17--22",
  month =        jul,
  year =         "2003",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:48 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Li:2003:SCE,
  author =       "Shujun Li and Xuanqin Mou and Yuanlong Cai and Zhen Ji
                 and Jihong Zhang",
  title =        "On the security of a chaotic encryption scheme:
                 problems with computerized chaos in finite computing
                 precision",
  journal =      j-COMP-PHYS-COMM,
  volume =       "153",
  number =       "1",
  pages =        "52--58",
  day =          "1",
  month =        jun,
  year =         "2003",
  CODEN =        "CPHCBZ",
  DOI =          "https://doi.org/10.1016/S0010-4655(02)00875-5",
  ISSN =         "0010-4655 (print), 1879-2944 (electronic)",
  ISSN-L =       "0010-4655",
  bibdate =      "Tue Feb 14 07:56:28 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compphyscomm2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0010465502008755",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Physics Communications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00104655",
}

@Article{Lin:2003:DBI,
  author =       "S. D. Lin and S. C. Shie and C. F. Chen",
  title =        "A {DCT}-Based Image Watermarking With Threshold
                 Embedding",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "25",
  number =       "2",
  pages =        "130--135",
  year =         "2003",
  DOI =          "https://doi.org/10.1080/1206212X.2003.11441694",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:20:50 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.1080/1206212X.2003.11441694",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "11 Jul 2015",
}

@Article{Lin:2003:NRU,
  author =       "Iuon-Chang Lin and Min-Shiang Hwang and Li-Hua Li",
  title =        "A new remote user authentication scheme for
                 multi-server architecture",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "19",
  number =       "1",
  pages =        "13--22",
  month =        jan,
  year =         "2003",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Sat Jan 10 10:03:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Lin:2003:PAS,
  author =       "Chun-Li Lin and Tzonelih Hwang",
  title =        "A password authentication scheme with secure password
                 updating",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "68--72",
  month =        jan,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803001147",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lin:2003:SEOa,
  author =       "Chih-Wei Lin and Jau-Ji Shen and Min-Shiang Hwang",
  title =        "Security enhancement for {Optimal Strong-Password
                 Authentication} protocol",
  journal =      j-OPER-SYS-REV,
  volume =       "37",
  number =       "2",
  pages =        "7--12",
  month =        apr,
  year =         "2003",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:43 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Lin:2003:SEOb,
  author =       "Chih-Wei Lin and Jau-Ji Shen and Min-Shiang Hwang",
  title =        "Security enhancement for {Optimal Strong-Password
                 Authentication Protocol}",
  journal =      j-OPER-SYS-REV,
  volume =       "37",
  number =       "3",
  pages =        "12--16",
  month =        jul,
  year =         "2003",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:48 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Lindell:2003:SCC,
  author =       "Yehuda Lindell",
  title =        "A Simpler Construction of {CCA2}-Secure Public-Key
                 Encryption under General Assumptions",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2656",
  pages =        "241--254",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/3-540-39200-9_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 11:39:24 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2003a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/3-540-39200-9_15.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/3-540-39200-9",
  book-URL =     "http://www.springerlink.com/content/978-3-540-39200-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lutz:2003:BLF,
  author =       "Michael J. Lutz",
  title =        "Bookshelf: Laying the Foundation for Pervasive
                 Computing [{Pervasive Computing}]; Integrated Approach
                 to Data Handling [{Exploratory Data Mining and Data
                 Cleaning}]; Making Theory Practical [{Modern
                 Cryptography: Theory and Practice}]; Detailed Look at
                 Systems Testing [{Testing of Digital Systems}]",
  journal =      j-COMPUTER,
  volume =       "36",
  number =       "10",
  pages =        "102--102",
  month =        oct,
  year =         "2003",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Dec 12 19:53:58 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/dl/mags/co/2003/10/rx102.htm;
                 http://www.computer.org/computer/co2003/rx102.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Book{MacDonald:2003:CDS,
  author =       "Matthew MacDonald and Erik Johansson",
  title =        "{C\#} data security handbook",
  publisher =    pub-WROX,
  address =      pub-WROX:adr,
  pages =        "vii + 356",
  year =         "2003",
  ISBN =         "1-86100-801-5 (paperback)",
  ISBN-13 =      "978-1-86100-801-5 (paperback)",
  LCCN =         "????",
  bibdate =      "Tue Mar 14 09:53:08 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.nls.uk:7290/voyager",
  acknowledgement = ack-nhfb,
  subject =      "C\# [C-sharp] (computer programming language);
                 Cryptography; Computer security",
}

@InProceedings{Malone-Lee:2003:TBO,
  author =       "John Malone-Lee and Wenbo Mao",
  title =        "Two Birds One Stone: Signcryption Using {RSA}",
  crossref =     "Joye:2003:TCC",
  pages =        "211--225",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@Book{Maltoni:2003:HFR,
  author =       "Davide Maltoni and Dario Maio and Anil K. Jain and
                 Salil Prabhakar",
  title =        "Handbook of fingerprint recognition",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xii + 348",
  year =         "2003",
  ISBN =         "0-387-95431-7",
  ISBN-13 =      "978-0-387-95431-8",
  LCCN =         "HV6074 .H25 2003",
  bibdate =      "Fri Mar 05 18:47:40 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Includes DVD-ROM.",
  price =        "US\$59.95",
  series =       "Springer professional computing",
  acknowledgement = ack-nhfb,
  subject =      "Fingerprints; Identification; Classification",
}

@Article{Markowitch:2003:CWV,
  author =       "Olivier Markowitch and Shahrokh Saeednia",
  title =        "Cryptanalysis of the {Wu--Varadhrajan} fair exchange
                 protocol",
  journal =      j-INFO-PROC-LETT,
  volume =       "87",
  number =       "3",
  pages =        "169--171",
  day =          "16",
  month =        aug,
  year =         "2003",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:32 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Matyas:2003:TRU,
  author =       "V{\'a}clav {Maty{\'a}s, Jr.} and Zdenek Riha",
  title =        "Toward Reliable User Authentication through
                 Biometrics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "3",
  pages =        "45--49",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1203221",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3045.pdf;
                 http://www.computer.org/security/j3045abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Maurer:2003:SMR,
  author =       "Ueli Maurer and Krzysztof Pietrzak",
  title =        "The Security of Many-Round {Luby--Rackoff}
                 Pseudo-Random Permutations",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2656",
  pages =        "544--561",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/3-540-39200-9_34",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 11:39:42 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2003a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/3-540-39200-9_34.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/3-540-39200-9",
  book-URL =     "http://www.springerlink.com/content/978-3-540-39200-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{McClure:2003:HEN,
  author =       "Stuart McClure and Joel Scambray and George Kurtz",
  title =        "Hacking exposed: network security secrets and
                 solutions",
  publisher =    pub-OSBORNE-MCGRAW-HILL,
  address =      pub-OSBORNE-MCGRAW-HILL:adr,
  edition =      "Fourth",
  pages =        "xxiv + 737",
  year =         "2003",
  ISBN =         "0-07-222742-7",
  ISBN-13 =      "978-0-07-222742-0",
  LCCN =         "TK5105359 .M48 2003",
  bibdate =      "Thu Jun 23 18:36:06 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/queue.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "ftp://uiarchive.cso.uiuc.edu/pub/etext/gutenberg/;
                 http://www.loc.gov/catdir/bios/mh051/2004351501.html;
                 http://www.loc.gov/catdir/description/mh051/2004351501.html;
                 http://www.loc.gov/catdir/toc/mh051/2004351501.html",
  acknowledgement = ack-nhfb,
  remark =       "Previous ed.: 2001. Casing the establishment ---
                 System hacking --- Network hacking --- Software hacking
                 --- Appendixes.",
  subject =      "Computer networks; Security measures; Data protection;
                 Computer security",
}

@Article{McNichol:2003:HTM,
  author =       "Tom McNichol",
  title =        "How two math geeks with a lava lamp and a webcam are
                 about to unleash chaos on the {Internet}",
  journal =      j-WIRED,
  volume =       "11",
  number =       "8",
  pages =        "??--??",
  month =        aug,
  year =         "2003",
  CODEN =        "WREDEM",
  ISSN =         "1059-1028 (print), 1078-3148 (electronic)",
  ISSN-L =       "1059-1028",
  bibdate =      "Sat Aug 23 07:53:02 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.lavarnd.org;
                 http://www.wired.com/wired/archive/11.08/random.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Wired",
  keywords =     "lavarand (US Patent 5,732,138: Method for seeding a
                 pseudo-random number generator with a cryptographic
                 hash of a digitization of a chaotic system); LavaRnd",
}

@Book{Mena:2003:IDM,
  author =       "Jes{\'u}s Mena",
  title =        "Investigative data mining for security and criminal
                 detection",
  publisher =    pub-BUTTERWORTH-HEINEMANN,
  address =      pub-BUTTERWORTH-HEINEMANN:adr,
  pages =        "xvi + 452",
  year =         "2003",
  ISBN =         "0-7506-7613-2",
  ISBN-13 =      "978-0-7506-7613-7",
  LCCN =         "QA76.9.D343 M44 2003",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$49.95",
  acknowledgement = ack-nhfb,
}

@Article{Mercuri:2003:IRS,
  author =       "Rebecca T. Mercuri and Peter G. Neumann",
  title =        "Inside risks: Security by obscurity",
  journal =      j-CACM,
  volume =       "46",
  number =       "11",
  pages =        "160--160",
  month =        nov,
  year =         "2003",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Oct 28 14:25:09 MST 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@InProceedings{Micciancio:2003:SZK,
  author =       "Daniele Micciancio and Salil P. Vadhan",
  title =        "Statistical Zero-Knowledge Proofs with Efficient
                 Provers: Lattice Problems and More",
  crossref =     "Boneh:2003:ACC",
  pages =        "282--298",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@InProceedings{Miklau:2003:CAP,
  author =       "Gerome Miklau and Dan Suciu",
  title =        "Controlling Access to Published Data Using
                 Cryptography",
  crossref =     "Freytag:2003:VPI",
  pages =        "898--909",
  year =         "2003",
  bibdate =      "Mon Dec 22 18:34:17 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.vldb.org/dblp/db/conf/vldb/vldb2003.html",
  URL =          "http://www.vldb.org/dblp/db/indices/a-tree/m/Miklau:Gerome.html",
  acknowledgement = ack-nhfb,
  authorurl =    "http://www.vldb.org/dblp/db/indices/a-tree/m/Miklau:Gerome.html;
                 http://www.vldb.org/dblp/db/indices/a-tree/s/Suciu:Dan.html",
}

@Article{Millen:2003:FD,
  author =       "Jonathan Millen",
  title =        "On the freedom of decryption",
  journal =      j-INFO-PROC-LETT,
  volume =       "86",
  number =       "6",
  pages =        "329--333",
  day =          "30",
  month =        jun,
  year =         "2003",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:32 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Minkel:2003:CTT,
  author =       "J. R. Minkel",
  title =        "Could trapping tiny ions crack the toughest codes?",
  journal =      j-IEEE-SPECTRUM,
  volume =       "40",
  number =       "3",
  pages =        "31--32",
  month =        mar,
  year =         "2003",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2003.1184445",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Calcium; Concrete; Deutsch-Jozsa algorithm; Electron
                 traps; encrypted data; encryption systems; Energy
                 states; gigantic numbers factoring; Inductors;
                 ion-trapping technique; large-scale quantum computing;
                 Large-scale systems; Light scattering; Optical pulses;
                 particle traps; quantum algorithm; quantum
                 calculations; quantum computing; Quantum computing;
                 quantum cryptography; quantum mechanics; Quantum
                 mechanics; qubits; tuned laser pulses; very cold
                 calcium ion",
}

@Book{Mohay:2003:CIF,
  editor =       "George M. Mohay and Alison Anderson and Byron Collie
                 and Olivier de Vel and Rod McKemmish",
  title =        "Computer and intrusion forensics",
  publisher =    pub-ARTECH,
  address =      pub-ARTECH:adr,
  pages =        "xxi + 395",
  year =         "2003",
  ISBN =         "1-58053-369-8",
  ISBN-13 =      "978-1-58053-369-0",
  LCCN =         "QA76.9.A25 C628 2003",
  bibdate =      "Thu Jun 23 18:36:10 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Artech House computer security series",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Data protection; Forensic
                 sciences",
}

@InProceedings{Moller:2003:PSP,
  author =       "Bodo M{\"o}ller",
  title =        "Provably Secure Public-Key Encryption for
                 Length-Preserving {Chaumian} Mixes",
  crossref =     "Joye:2003:TCC",
  pages =        "244--262",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@Book{Mollin:2003:RPK,
  author =       "Richard A. Mollin",
  title =        "{RSA} and Public-Key Cryptography",
  publisher =    pub-CHAPMAN-HALL-CRC,
  address =      pub-CHAPMAN-HALL-CRC:adr,
  pages =        "xii + 291",
  year =         "2003",
  ISBN =         "1-58488-338-3",
  ISBN-13 =      "978-1-58488-338-8",
  LCCN =         "QA268 .M655 2003",
  bibdate =      "Wed Aug 11 08:37:57 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$79.95",
  acknowledgement = ack-nhfb,
}

@Article{Monniaux:2003:ACP,
  author =       "David Monniaux",
  title =        "Abstracting cryptographic protocols with tree
                 automata",
  journal =      j-SCI-COMPUT-PROGRAM,
  volume =       "47",
  number =       "2--3",
  pages =        "177--202",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "SCPGD4",
  ISSN =         "0167-6423 (print), 1872-7964 (electronic)",
  ISSN-L =       "0167-6423",
  bibdate =      "Sun Jan 11 10:42:03 MST 2004",
  bibsource =    "http://www.elsevier.com/locate/issn/01676423;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Science of Computer Programming",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01676423",
  remark =       "Special Issue on Static Analysis (SAS'99).",
}

@InProceedings{Montgomery:2003:FEC,
  author =       "Peter L. Montgomery {Kirsten Eisentr{\"a}ger, Kristin
                 Lauter}",
  title =        "Fast Elliptic Curve Arithmetic and Improved {Weil}
                 Pairing Evaluation",
  crossref =     "Joye:2003:TCC",
  pages =        "343--354",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@Article{Morris:2003:KKL,
  author =       "James Morris",
  title =        "Kernel Korner: The {Linux} Kernel Cryptographic
                 {API}",
  journal =      j-LINUX-J,
  volume =       "108",
  pages =        "??--??",
  month =        apr,
  year =         "2003",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Sat Apr 12 06:59:06 MDT 2003",
  bibsource =    "http://noframes.linuxjournal.com/lj-issues/issue108/index.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux-journal.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Book{Morrow:2003:DIB,
  author =       "Monique Morrow and Kateel Vijayananda",
  title =        "Developing {IP}-based services: solutions for service
                 providers and vendors",
  publisher =    pub-MORGAN-KAUFMANN,
  address =      pub-MORGAN-KAUFMANN:adr,
  pages =        "xxi + 313",
  year =         "2003",
  ISBN =         "1-55860-779-X",
  ISBN-13 =      "978-1-55860-779-8",
  LCCN =         "TK5105.5 .M72 2003",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$49.95",
  acknowledgement = ack-nhfb,
}

@Book{Mrayati:2003:AKT,
  editor =       "M. Mrayati and Y. Meer Alam and M. H. at-Tayyan",
  title =        "{Al-Kindi}'s treatise on cryptanalysis",
  volume =       "1",
  publisher =    "KFCRIS \& KACST",
  address =      "Riyadh, Saudi Arabia",
  pages =        "204",
  year =         "2003",
  ISBN =         "9960-890-08-2",
  ISBN-13 =      "978-9960-890-08-1",
  LCCN =         "????",
  bibdate =      "Thu May 12 06:53:13 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "{Arabic} origins of cryptology",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography / Arab countries / history",
}

@Article{Naik:2003:DSW,
  author =       "Vinayak Naik and Anish Arora and Sandip Bapat and
                 Mohamed Gouda",
  title =        "Dependable Systems: Whisper: Local Secret Maintenance
                 in Sensor Networks",
  journal =      j-IEEE-DISTRIB-SYST-ONLINE,
  volume =       "4",
  number =       "9",
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1541-4922 (print), 1558-1683 (electronic)",
  ISSN-L =       "1541-4922",
  bibdate =      "Sat Jan 03 14:59:06 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dsonline.computer.org/0309/f/gaep.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Distributed Systems Online",
}

@InProceedings{Naor:2003:CAC,
  author =       "Moni Naor",
  title =        "On Cryptographic Assumptions and Challenges",
  crossref =     "Boneh:2003:ACC",
  pages =        "96--109",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Article{Naor:2003:CFP,
  author =       "Dalit Naor and Moni Naor",
  title =        "Cover Feature: Protecting cryptographic keys: the
                 trace-and-revoke approach",
  journal =      j-COMPUTER,
  volume =       "36",
  number =       "7",
  pages =        "47--53",
  month =        jul,
  year =         "2003",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Dec 12 19:53:43 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/dl/mags/co/2003/07/r7047.htm;
                 http://csdl.computer.org/dl/mags/co/2003/07/r7047.pdf;
                 http://www.computer.org/computer/co2003/r7047abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Neve:2003:STF,
  author =       "Amaury N{\`e}ve and Denis Flandre and Jean-Jacques
                 Quisquater",
  title =        "{SOI} Technology for Future High-Performance Smart
                 Cards",
  journal =      j-IEEE-MICRO,
  volume =       "23",
  number =       "3",
  pages =        "58--67",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "IEMIDZ",
  DOI =          "https://doi.org/10.1109/MM.2003.1209467",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Thu Jun 26 05:36:42 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/comp/mags/mi/2003/03/m3058abs.htm;
                 http://csdl.computer.org/dl/mags/mi/2003/03/m3058.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Micro",
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
}

@Article{Nisley:2003:ELH,
  author =       "E. Nisley",
  title =        "{Ed} looks at the history of cryptography and examines
                 what it means for embedded systems developers
                 programming in {Java} today",
  journal =      j-DDJ,
  volume =       "28",
  number =       "11",
  pages =        "73--75",
  year =         "2003",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Tue Nov 4 05:29:15 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 Ingenta database",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@TechReport{NIST:2003:RKE,
  author =       "{NIST}",
  title =        "Recommendation on Key Establishment Schemes",
  type =         "NIST Special Publication",
  number =       "800-56",
  institution =  pub-NIST,
  address =      pub-NIST:adr,
  edition =      "Draft 2.0",
  month =        jan,
  year =         "2003",
  bibdate =      "Wed Apr 20 12:14:29 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csrc.nist.gov/CryptoToolkit/kms/keyschemes-Jan03.pdf",
  acknowledgement = ack-nhfb,
}

@InProceedings{Oechslin:2003:MFC,
  author =       "Philippe Oechslin",
  title =        "Making a Faster Cryptanalytic Time-Memory Trade-Off",
  crossref =     "Boneh:2003:ACC",
  pages =        "617--630",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@InProceedings{Okeya:2003:MFC,
  author =       "Katsuyuki Okeya and Tsuyoshi Takagi",
  title =        "A More Flexible Countermeasure against Side Channel
                 Attacks Using Window Method",
  crossref =     "Walter:2003:CHE",
  pages =        "397--410",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@InProceedings{Okeya:2003:WNM,
  author =       "Katsuyuki Okeya and Tsuyoshi Takagi",
  title =        "The Width-$w$ {NAF} Method Provides Small Memory and
                 Fast Elliptic Scalar Multiplications Secure against
                 Side Channel Attacks",
  crossref =     "Joye:2003:TCC",
  pages =        "328--342",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@Book{Olson:2003:QHK,
  author =       "Lynne Olson and Stanley Cloud",
  title =        "A question of honor: the {Ko{\'s}ciuszko Squadron}:
                 forgotten heroes of {World War II}",
  publisher =    "Knopf",
  address =      "New York, NY, USA",
  pages =        "xii + 495",
  year =         "2003",
  ISBN =         "0-375-41197-6",
  ISBN-13 =      "978-0-375-41197-7",
  LCCN =         "D786 .O57 2003",
  bibdate =      "Thu Feb 23 07:25:37 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/bios/random051/2002044826.html;
                 http://www.loc.gov/catdir/description/random0414/2002044826.html;
                 http://www.loc.gov/catdir/samples/random045/2002044826.html",
  acknowledgement = ack-nhfb,
  subject =      "Air pilots, Military; Poland; History; 20th century;
                 World War, 1939--1945; Regimental histories; Great
                 Britain; Aerial operations, Polish; Aerial operations,
                 British; Forced repatriation",
}

@InProceedings{Ors:2003:PAA,
  author =       "S{\i}dd{\i}ka Berna {\"O}rs and Elisabeth Oswald and
                 Bart Preneel",
  title =        "Power-Analysis Attacks on an {FPGA} --- First
                 Experimental Results",
  crossref =     "Walter:2003:CHE",
  pages =        "35--50",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Article{Paeng:2003:SCU,
  author =       "Seong-Hun Paeng",
  title =        "On the security of cryptosystem using automorphism
                 groups",
  journal =      j-INFO-PROC-LETT,
  volume =       "88",
  number =       "6",
  pages =        "293--298",
  day =          "31",
  month =        dec,
  year =         "2003",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:33 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Page:2003:BRW,
  author =       "Sophie Page",
  title =        "Book Review: {William R. Newman and Anthony Grafton
                 (eds.), Secrets of Nature: Astrology and Alchemy in
                 Early Modern Europe. Transformations: Studies in the
                 History of Science and Technology. Cambridge, MA and
                 London: MIT Press, 2001. Pp. 443. ISBN 0-262-14075-6.
                 \pounds 34.50 (hardcover)}",
  journal =      j-BRITISH-J-HIST-SCI,
  volume =       "36",
  number =       "1",
  pages =        "87--127",
  month =        mar,
  year =         "2003",
  CODEN =        "BJHSAT",
  DOI =          "https://doi.org/10.1017/S0007087403254972",
  ISSN =         "0007-0874 (print), 1474-001X (electronic)",
  ISSN-L =       "0007-0874",
  bibdate =      "Sat Oct 2 10:06:46 MDT 2010",
  bibsource =    "http://journals.cambridge.org/action/displayJournal?jid=BJH;
                 https://www.math.utah.edu/pub/tex/bib/bjhs2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jstor.org/stable/4028320",
  acknowledgement = ack-nhfb,
  fjournal =     "British Journal for the History of Science",
  journal-URL =  "http://journals.cambridge.org/action/displayJournal?jid=BJH",
}

@Article{Park:2003:EMS,
  author =       "Jung Min Park and Edwin K. P. Chong and Howard Jay
                 Siegel",
  title =        "Efficient multicast stream authentication using
                 erasure codes",
  journal =      j-TISSEC,
  volume =       "6",
  number =       "2",
  pages =        "258--285",
  month =        may,
  year =         "2003",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Aug 7 09:02:37 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Park:2003:ESA,
  author =       "Yongsu Park and Tae-Sun Chung and Yookun Cho",
  title =        "An efficient stream authentication scheme using tree
                 chaining",
  journal =      j-INFO-PROC-LETT,
  volume =       "86",
  number =       "1",
  pages =        "1--8",
  day =          "15",
  month =        apr,
  year =         "2003",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:31 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@InProceedings{Pass:2003:DCR,
  author =       "Rafael Pass",
  title =        "On Deniability in the Common Reference String and
                 Random Oracle Model",
  crossref =     "Boneh:2003:ACC",
  pages =        "316--337",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@InProceedings{Patarin:2003:LRR,
  author =       "Jacques Patarin",
  title =        "{Luby--Rackoff}: $7$ Rounds Are Enough for Security",
  crossref =     "Boneh:2003:ACC",
  pages =        "513--529",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Article{Paulson:2003:NBV,
  author =       "Linda Dailey Paulson",
  title =        "News Briefs: Vendors Push Wireless {LAN} security;
                 Picturing a new encryption technique; Think tank
                 targets better software",
  journal =      j-COMPUTER,
  volume =       "36",
  number =       "1",
  pages =        "28--30",
  month =        jan,
  year =         "2003",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Dec 12 19:31:55 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/dl/mags/co/2003/01/r1028.htm;
                 http://csdl.computer.org/dl/mags/co/2003/01/r1028.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@InProceedings{Pelzl:2003:HCC,
  author =       "Jan Pelzl and Thomas Wollinger and Jorge Guajardo and
                 Christof Paar",
  title =        "Hyperelliptic Curve Cryptosystems: {Closing} the
                 Performance Gap to Elliptic Curves",
  crossref =     "Walter:2003:CHE",
  pages =        "351--365",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Article{Pereira:2003:SAU,
  author =       "Olivier Pereira and Jean-Jacques Quisquater",
  title =        "Some attacks upon authenticated group key agreement
                 protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "555--580",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:14 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Perrine:2003:ECP,
  author =       "Tom Perrine",
  title =        "The End of {{\tt crypt()}} Passwords \ldots{}
                 Please?",
  journal =      j-LOGIN,
  volume =       "28",
  number =       "6",
  pages =        "??--??",
  month =        dec,
  year =         "2003",
  CODEN =        "LOGNEM",
  ISSN =         "1044-6397",
  bibdate =      "Tue Apr 11 10:52:34 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.usenix.org/publications/login/2003-12/index.html",
  URL =          "http://www.usenix.org/publications/login/2003-12/pdfs/perrine.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     ";login: the USENIX Association newsletter",
}

@Article{Petullo:2003:IEH,
  author =       "Mike Petullo",
  title =        "Implementing encrypted home directories",
  journal =      j-LINUX-J,
  volume =       "2003",
  number =       "112",
  pages =        "1--1",
  month =        aug,
  year =         "2003",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Sat Dec 24 17:45:48 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Book{Pfleeger:2003:SC,
  author =       "Charles P. Pfleeger and Shari Lawrence Pfleeger",
  title =        "Security in computing",
  publisher =    pub-PHPTR,
  address =      pub-PHPTR:adr,
  edition =      "Third",
  pages =        "xxix + 746",
  year =         "2003",
  ISBN =         "0-13-035548-8",
  ISBN-13 =      "978-0-13-035548-5",
  LCCN =         "QA76.9.A25 P45 2003",
  bibdate =      "Thu Dec 14 18:04:33 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Data protection; Privacy, Right
                 of",
}

@Book{Pieprzyk:2003:FCS,
  author =       "Josef Pieprzyk and Thomas Hardjono and Jennifer
                 Seberry",
  title =        "Fundamentals of computer security",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xx + 677",
  year =         "2003",
  ISBN =         "3-540-43101-2",
  ISBN-13 =      "978-3-540-43101-5",
  LCCN =         "QA76.9.A25 P536 2003",
  bibdate =      "Fri Mar 05 18:22:06 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$69.95",
  series =       "Monographs in theoretical computer science",
  acknowledgement = ack-nhfb,
}

@TechReport{Pinkas:2003:CTP,
  author =       "Benny Pinkas",
  title =        "Cryptographic techniques for privacy-preserving data
                 mining",
  type =         "Report",
  number =       "HPL-2003-22",
  institution =  "Trusted Systems Laboratory, HP Laboratories Palo
                 Alto",
  address =      "Palo Alto, CA, USA",
  day =          "29",
  month =        jan,
  year =         "2003",
  bibdate =      "Sat Sep 17 11:00:25 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "To be published in SIGKDD Explorations, Volume 4,
                 Issue 2.",
  URL =          "http://www.hpl.hp.com/techreports/2003/HPL-2003-22.html",
  abstract =     "Research in secure distributed computation, which was
                 done as part of a larger body of research in the theory
                 of cryptography, has achieved remarkable results. It
                 was shown that non-trusting parties can jointly compute
                 functions of their different inputs while ensuring that
                 no party learns anything but the defined output of the
                 function. These results were shown using generic
                 constructions that can be applied to any function that
                 has an efficient representation as a circuit. We
                 describe these results, discuss their efficiency, and
                 demonstrate their relevance to privacy preserving
                 computation of data mining algorithms. We also show
                 examples of secure computation of data mining
                 algorithms that use these generic constructions.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; data mining; privacy",
}

@Article{Piper:2003:RCS,
  author =       "Fred Piper",
  title =        "Reseacrh in cryptography and security mechanisms",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "22--25",
  month =        jan,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803001044",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Piret:2003:DFA,
  author =       "Gilles Piret and Jean-Jacques Quisquater",
  title =        "A Differential Fault Attack Technique against {SPN}
                 Structures, with Application to the {AES} and
                 {KHAZAD}",
  crossref =     "Walter:2003:CHE",
  pages =        "77--88",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Article{Polk:2003:IIC,
  author =       "William T. Polk and Nelson E. Hastings and Ambarish
                 Malpani",
  title =        "{IEEE Internet} Computing: Security Track: Public Key
                 Infrastructures that Satisfy Security Goals",
  journal =      j-IEEE-DISTRIB-SYST-ONLINE,
  volume =       "4",
  number =       "7",
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1541-4922 (print), 1558-1683 (electronic)",
  ISSN-L =       "1541-4922",
  bibdate =      "Sat Jan 03 14:59:06 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dsonline.computer.org/0307/f/wp4sec.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Distributed Systems Online",
}

@Book{Poole:2003:NSP,
  author =       "Owen Poole",
  title =        "Network Security: a Practical Guide",
  publisher =    pub-BUTTERWORTH-HEINEMANN,
  address =      pub-BUTTERWORTH-HEINEMANN:adr,
  pages =        "xi + 212",
  year =         "2003",
  ISBN =         "0-7506-5033-8",
  ISBN-13 =      "978-0-7506-5033-5",
  LCCN =         "TK5105.59 .P66 2003",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$47.95",
  URL =          "http://www.loc.gov/catdir/description/els051/2004315747.html;
                 http://www.loc.gov/catdir/toc/els051/2004315747.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Computer networks; Security
                 measures",
}

@Book{Potter:2003:S,
  author =       "Bruce Potter and Bob Fleck",
  title =        "802.11 Security",
  publisher =    pub-ORA,
  address =      pub-ORA:adr,
  pages =        "xiii + 176",
  year =         "2003",
  ISBN =         "0-596-00290-4",
  ISBN-13 =      "978-0-596-00290-9",
  LCCN =         "TK5105.78 .P68 2003",
  bibdate =      "Mon Apr 18 15:04:48 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  price =        "US\$34.95, CDN\$54.95, UK\pounds 24.95",
  URL =          "http://www.oreilly.com/catalog/80211security/",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures; Wireless
                 communication systems; Security measures; IEEE 802.11
                 (Standard)",
}

@Article{Potter:2003:WAO,
  author =       "Bruce Potter",
  title =        "Wireless authentication options for up and down the
                 {Stack}",
  journal =      j-NETWORK-SECURITY,
  volume =       "2003",
  number =       "6",
  pages =        "4--5",
  month =        jun,
  year =         "2003",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(03)00607-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:46 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348580300607X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Provos:2003:HSI,
  author =       "Niels Provos and Peter Honeyman",
  title =        "Hide and Seek: An Introduction to Steganography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "3",
  pages =        "32--44",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1203220",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3032.pdf;
                 http://www.computer.org/security/j3032abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Pucella:2003:JRB,
  author =       "Riccardo Pucella",
  title =        "Joint review of {{\booktitle{Foundations of
                 Cryptography: Basic Tools}}, by O. Goldreich. Cambridge
                 University Press, and \booktitle{Modelling and Analysis
                 of Security Protocols}, by P. Ryan and S. Schneider.
                 Addison Wesley}",
  journal =      j-SIGACT,
  volume =       "34",
  number =       "4",
  pages =        "26--31",
  month =        dec,
  year =         "2003",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/954092.954098",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 18:30:26 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See \cite{Goldreich:2001:FCBa}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Rafaeli:2003:SKM,
  author =       "Sandro Rafaeli and David Hutchison",
  title =        "A survey of key management for secure group
                 communication",
  journal =      j-COMP-SURV,
  volume =       "35",
  number =       "3",
  pages =        "309--329",
  month =        sep,
  year =         "2003",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/937503.937506",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:19:22 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Group communication can benefit from IP multicast to
                 achieve scalable exchange of messages. However, there
                 is a challenge of effectively controlling access to the
                 transmitted data. IP multicast by itself does not
                 provide any mechanisms for preventing nongroup members
                 to have access to the group communication. Although
                 encryption can be used to protect messages exchanged
                 among group members, distributing the cryptographic
                 keys becomes an issue. Researchers have proposed
                 several different approaches to group key management.
                 These approaches can be divided into three main
                 classes: centralized group key management protocols,
                 decentralized architectures and distributed key
                 management protocols. The three classes are described
                 here and an insight given to their features and goals.
                 The area of group key management is then surveyed and
                 proposed solutions are classified according to those
                 characteristics.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Group Key Distribution; Multicast Security",
}

@Book{Rankl:2003:SCH,
  author =       "W. (Wolfgang) Rankl and W. Effing",
  title =        "Smart Card Handbook",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  edition =      "Third",
  pages =        "1120",
  year =         "2003",
  ISBN =         "",
  ISBN-13 =      "",
  LCCN =         "",
  bibdate =      "Mon Dec 22 12:08:12 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Ratner:2003:NGI,
  author =       "Daniel Ratner and Mark Ratner",
  title =        "Nanotechnology: a gentle introduction to the next big
                 idea",
  publisher =    pub-PHPTR,
  address =      pub-PHPTR:adr,
  pages =        "xiv + 188",
  year =         "2003",
  ISBN =         "0-13-101400-5",
  ISBN-13 =      "978-0-13-101400-8",
  LCCN =         "T174.7 .R38 2003",
  bibdate =      "Tue Nov 04 17:58:25 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Ratner:2003:NHS,
  author =       "Daniel Ratner and Mark Ratner",
  title =        "Nanotechnology and Homeland Security: New Weapons for
                 New Wars",
  publisher =    pub-PHPTR,
  address =      pub-PHPTR:adr,
  pages =        "176 (est.)",
  year =         "2003",
  ISBN =         "0-13-145307-6",
  ISBN-13 =      "978-0-13-145307-4",
  LCCN =         "UA927.R38 2004",
  bibdate =      "Tue Nov 04 17:54:51 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$24.95",
  acknowledgement = ack-nhfb,
  annote =       "Daniel Ratner is an engineer and technology
                 entrepreneur who has founded three startup firms,
                 including Driveitaway.com, where he currently serves as
                 CTO. He is also an industry advisor to several other
                 high-tech ventures, and was recently awarded the
                 prestigious ``30 Under 30'' entrepreneurs' award by
                 Philly Tech Magazine.\par

                 Mark A. Ratner is Charles E. and Emma H. Morrison
                 Professor in Chemistry at Northwestern University. With
                 Ari Aviram, he originated the field of molecular-scale
                 electronics. Ratner won the 2001 Feynman Prize in
                 Nanotechnology for theoretical achievements that have
                 advanced the development of molecular nanotechnology.",
}

@Article{Reese:2003:ELD,
  author =       "R. A. Reese",
  title =        "Extreme lawsuits [digital copyright]",
  journal =      j-IEEE-SPECTRUM,
  volume =       "40",
  number =       "5",
  pages =        "23--25",
  month =        may,
  year =         "2003",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2003.1197471",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Broadcasting; business developments; Cities and towns;
                 consumer electronics products design; copyright;
                 copyright owners; copyright violations liability;
                 Cryptography; Digital audio players; digital copyright;
                 digital systems; digital technology; DVD; encryption;
                 entertainment; Law; lawsuits; Legal factors;
                 legislation; Motion pictures; Permission; Protection",
}

@InProceedings{Regev:2003:NLB,
  author =       "Oded Regev",
  title =        "New lattice based cryptographic constructions",
  crossref =     "ACM:2003:PTF",
  pages =        "407--416",
  year =         "2003",
  bibdate =      "Tue Jan 13 06:21:07 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Renner:2003:NBS,
  author =       "Renato Renner and Stefan Wolf",
  title =        "New Bounds in Secret-Key Agreement: The Gap between
                 Formation and Secrecy Extraction",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2656",
  pages =        "562--577",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/3-540-39200-9_35",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Nov 30 11:39:42 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2003a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/3-540-39200-9_35.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/3-540-39200-9",
  book-URL =     "http://www.springerlink.com/content/978-3-540-39200-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Renner:2003:UAP,
  author =       "Renato Renner and Stefan Wolf",
  title =        "Unconditional Authenticity and Privacy from an
                 Arbitrarily Weak Secret",
  crossref =     "Boneh:2003:ACC",
  pages =        "78--95",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@InProceedings{Reyhani-Masoleh:2003:LCB,
  author =       "Arash Reyhani-Masoleh and M. Anwar Hasan",
  title =        "On Low Complexity Bit Parallel Polynomial Basis
                 Multipliers",
  crossref =     "Walter:2003:CHE",
  pages =        "189--202",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@InProceedings{Reyhani-Masoleh:2003:LCS,
  author =       "Arash Reyhani-Masoleh and M. Anwar Hasan",
  title =        "Low complexity sequential normal basis multipliers
                 over {$ \mathrm {GF}(2^m) $}",
  crossref =     "Bajard:2003:ISC",
  pages =        "188--195",
  year =         "2003",
  bibdate =      "Wed Nov 26 12:04:35 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  URL =          "http://www.acsel-lab.com/arithmetic/arith16/papers/ARITH16_Reyhani-Masoleh.pdf",
  abstract =     "For efficient hardware implementation of finite field
                 arithmetic units, the use of a normal basis is
                 advantageous. In this article, two architectures for
                 multipliers over the finite field $ \mathrm {GF}(2^m) $
                 are proposed. Both of these multipliers are of
                 sequential type --- after receiving the coordinates of
                 the two input field elements, they go through $m$
                 iterations (or clock cycles) to finally yield all the
                 coordinates of the product in parallel. These
                 multipliers are highly area efficient and require fewer
                 number of logic gates even when compared with the most
                 area efficient multiplier available in the open
                 literature. This makes the proposed multipliers
                 suitable for applications where the value of is large
                 but space is of concern, e.g., resource constrained
                 cryptographic systems. Additionally, the AND gate count
                 for one of the multipliers is $ \floor {m / 2} + 1 $
                 only. This implies that if the multiplication over $
                 \mathrm {GF}(2^m) $ is performed using a suitable
                 subfield $ \mathrm {GF}(2^n) $ where $ n > 1 $ and $ n
                 | m $, then the corresponding multiplier architecture
                 will yield a highly efficient digit or word serial
                 multiplier.",
  acknowledgement = ack-nhfb,
  keywords =     "ARITH-16",
}

@MastersThesis{Rhinelander:2003:DIE,
  author =       "Jason P. Rhinelander",
  title =        "Design and implementation of encryption algorithms in
                 a coarse grain reconfigurable environment",
  type =         "Thesis ({M. Eng.})",
  school =       "Memorial University of Newfoundland",
  address =      "St. Johns, Newfoundland, Canada",
  year =         "2003",
  bibdate =      "Wed Sep 28 08:30:29 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Riebeck:2003:SCC,
  author =       "H. Riebeck",
  title =        "A second coffin for Chernobyl",
  journal =      j-IEEE-SPECTRUM,
  volume =       "40",
  number =       "3",
  pages =        "30--31",
  month =        mar,
  year =         "2003",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2003.1184444",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "113 m; 20000 ton; ceiling cranes; Chernobyl Reactor 4;
                 Concrete; Cryptography; Design engineering; fission
                 reactor accidents; fission reactor materials; greased
                 steel plates; Inductors; movable structure; Power
                 engineering and energy; Power generation; Quantum
                 computing; Quantum mechanics; radioactive materials
                 removal; Rain; shielding; Steel; steel shell; steel
                 structure",
}

@Misc{Rivest:2003:TAL,
  author =       "Ronald L. Rivest and Adi Shamir and Leonard M.
                 Adleman",
  title =        "{2002 Turing Award Lecture}",
  howpublished = "World-Wide Web document.",
  day =          "7",
  month =        jun,
  year =         "2003",
  bibdate =      "Mon Dec 01 14:14:41 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Collection of three slide presentations: ``Pre RSA
                 Days'' (Adleman), ``Early RSA Days'' (Rivest), ``Turing
                 Lecture on Cryptology: A Status Report'' (Shamir).",
  URL =          "http://www.acm.org/awards/turing_citations/rivest-shamir-adleman.html",
  acknowledgement = ack-nhfb,
}

@Misc{Rivest:2003:TLE,
  author =       "Ronald L. Rivest",
  title =        "{Turing Lecture} on Early {RSA} Days",
  howpublished = "World-Wide Web slide presentation, video, and audio.",
  year =         "2003",
  bibdate =      "Sat Nov 19 07:46:28 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.acm.org/turingawardlecture/RSA/",
  acknowledgement = ack-nhfb,
}

@Article{Rogaway:2003:OBC,
  author =       "Phillip Rogaway and Mihir Bellare and John Black",
  title =        "{OCB}: a block-cipher mode of operation for efficient
                 authenticated encryption",
  journal =      j-TISSEC,
  volume =       "6",
  number =       "3",
  pages =        "365--403",
  month =        aug,
  year =         "2003",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Mon Dec 22 17:56:09 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Rothe:2003:SFC,
  author =       "J{\"o}rg Rothe",
  title =        "Some facets of complexity theory and cryptography: a
                 five-lecture tutorial",
  journal =      j-COMP-SURV,
  volume =       "34",
  number =       "4",
  pages =        "504--549",
  month =        dec,
  year =         "2003",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Aug 7 06:57:01 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rouvroy:2003:EUF,
  author =       "G. Rouvroy and F.-X. Standaert and J.-J. Quisquater
                 and J.-D. Legat",
  title =        "Efficient uses of {FPGAs} for implementations of {DES}
                 and its experimental linear cryptanalysis",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "52",
  number =       "4",
  pages =        "473--482",
  month =        apr,
  year =         "2003",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2003.1190588",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Jul 5 08:52:46 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1190588",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Manual{RSA:2003:PEC,
  author =       "{RSA Laboratories}",
  title =        "{PKCS \#13}: Elliptic Curve Cryptography Standard",
  organization = pub-RSA,
  address =      pub-RSA:adr,
  year =         "2003",
  bibdate =      "Mon Dec 08 08:20:23 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Still under development.",
  URL =          "http://www.rsasecurity.com/rsalabs/pkcs/pkcs-13/index.html",
  acknowledgement = ack-nhfb,
}

@InProceedings{Rubin:2003:TBC,
  author =       "Karl Rubin and Alice Silverberg",
  title =        "Torus-Based Cryptography",
  crossref =     "Boneh:2003:ACC",
  pages =        "349--365",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Book{Salomon:2003:DPS,
  author =       "David Salomon",
  title =        "Data Privacy and Security",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiv + 465",
  year =         "2003",
  ISBN =         "0-387-00311-8",
  ISBN-13 =      "978-0-387-00311-5",
  LCCN =         "QA76.9.A25 S265 2003",
  bibdate =      "Mon Jun 16 18:35:35 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 https://www.math.utah.edu/pub/tex/bib/texbook2.bib",
  price =        "US\$59.95",
  URL =          "http://www.booksbydavidsalomon.com/",
  abstract =     "This integrated volume focuses on keeping data secure
                 and private and covers classical cryptography, modern
                 cryptography, and steganography. Each topic is
                 presented and explained by describing various methods,
                 techniques, and algorithms. Moreover, there are
                 numerous helpful examples to reinforce the reader's
                 understanding and expertise with these techniques and
                 methodologies.",
  acknowledgement = ack-nhfb,
  tableofcontents = "Part I: Data Encryption \\
                 1: Monoalphabetic Substitution Ciphers \\
                 2: Transposition Ciphers \\
                 3: Polyalphabetic Substitution Ciphers \\
                 4: Random Numbers \\
                 5: The Enigma \\
                 6: Stream Ciphers \\
                 7: Block Ciphers \\
                 8: Public-Key Cryptography \\
                 9: Quantum Cryptography \\
                 Part II: Data Hiding \\
                 10: Data Hiding in Text \\
                 11: Data Hiding in Images \\
                 12: Data Hiding: Other Methods \\
                 Part III: Essential Resources \\
                 Appendix A: Convolution \\
                 Appendix B: Hashing \\
                 Appendix C: Cyclic Redundancy Codes \\
                 Appendix D: Galois Fields",
}

@Article{Salus:2003:BRBb,
  author =       "Peter H. Salus",
  title =        "Book Reviews: The Bookworm: Reviews of {Pavol
                 Cerven}'s {{\em Crackproof Your Software\/}} and of
                 {Jenness} and {Cozens}'s {{\em Extending and Embedding
                 Perl}}",
  journal =      j-LOGIN,
  volume =       "28",
  number =       "2",
  pages =        "??--??",
  month =        apr,
  year =         "2003",
  CODEN =        "LOGNEM",
  ISSN =         "1044-6397",
  bibdate =      "Tue Apr 11 10:52:26 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.usenix.org/publications/login/2003-04/index.html",
  URL =          "http://www.usenix.org/publications/login/2003-04/openpdfs/bookreviews.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     ";login: the USENIX Association newsletter",
}

@Article{Sarkar:2003:EIC,
  author =       "P. Sarkar and S. Maitra",
  title =        "Efficient implementation of cryptographically useful
                 ``large'' {Boolean} functions",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "52",
  number =       "4",
  pages =        "410--417",
  month =        apr,
  year =         "2003",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2003.1190582",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Jul 5 08:52:46 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1190582",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Satoh:2003:SDF,
  author =       "A. Satoh and K. Takano",
  title =        "A scalable dual-field elliptic curve cryptographic
                 processor",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "52",
  number =       "4",
  pages =        "449--460",
  month =        apr,
  year =         "2003",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2003.1190586",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Jul 5 08:52:46 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1190586",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@InProceedings{Satoh:2003:UHA,
  author =       "Akashi Satoh and Sumio Morioka",
  title =        "Unified Hardware Architecture for 128-Bit Block
                 Ciphers {AES} and {Camellia}",
  crossref =     "Walter:2003:CHE",
  pages =        "304--318",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Book{Schneier:2003:BFT,
  author =       "Bruce Schneier",
  title =        "Beyond fear: thinking sensibly about security in an
                 uncertain world",
  publisher =    pub-COPERNICUS,
  address =      pub-COPERNICUS:adr,
  pages =        "295",
  year =         "2003",
  ISBN =         "0-387-02620-7",
  ISBN-13 =      "978-0-387-02620-6",
  LCCN =         "HV6432 .S36 2003",
  bibdate =      "Thu Aug 21 08:38:41 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Sennewald:2003:ESM,
  author =       "Charles A. Sennewald",
  title =        "Effective security management",
  publisher =    pub-BUTTERWORTH-HEINEMANN,
  address =      pub-BUTTERWORTH-HEINEMANN:adr,
  pages =        "xx + 395",
  year =         "2003",
  ISBN =         "0-7506-7454-7",
  ISBN-13 =      "978-0-7506-7454-6",
  LCCN =         "HV8290 .S46 2003",
  bibdate =      "Thu Oct 30 07:30:32 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$49.95",
  acknowledgement = ack-nhfb,
}

@Article{Seznec:2003:HUL,
  author =       "Andr{\'e} Seznec and Nicolas Sendrier",
  title =        "{HAVEGE}: a user-level software heuristic for
                 generating empirically strong random numbers",
  journal =      j-TOMACS,
  volume =       "13",
  number =       "4",
  pages =        "334--346",
  month =        oct,
  year =         "2003",
  CODEN =        "ATMCEZ",
  ISSN =         "1049-3301 (print), 1558-1195 (electronic)",
  ISSN-L =       "1049-3301",
  bibdate =      "Fri Oct 31 05:50:26 MST 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomacs/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Random numbers with high cryptographic quality are
                 needed to enhance the security of cryptography
                 applications. Software heuristics for generating
                 empirically strong random number sequences rely on
                 entropy gathering by measuring unpredictable external
                 events. These generators only deliver a few bits per
                 event. This limits them to being used as seeds for
                 pseudorandom generators. General-purpose processors
                 feature a large number of hardware mechanisms that aim
                 to improve performance: caches, branch predictors,
                 \ldots{}. The state of these components is not
                 architectural (i.e., the result of an ordinary
                 application does not depend on it). It is also volatile
                 and cannot be directly monitored by the user. On the
                 other hand, every operating system interrupt modifies
                 thousands of these binary volatile states. In this
                 article, we present and analyze HAVEGE (HArdware
                 Volatile Entropy Gathering and Expansion), a new
                 user-level software heuristic to generate practically
                 strong random numbers on general-purpose computers. The
                 hardware clock cycle counter of the processor can be
                 used to gather part of the entropy\slash uncertainty
                 introduced by operating system interrupts in the
                 internal states of the processor. Then, we show how
                 this entropy gathering technique can be combined with
                 pseudorandom number generation in HAVEGE. Since the
                 internal state of HAVEGE includes thousands of internal
                 volatile hardware states, it seems impossible even for
                 the user itself to reproduce the generated sequences.",
  acknowledgement = ack-nhfb,
  annote =       "From the article: ``On current PCs and workstations,
                 the HAVEG algorithms collects several tens of thousands
                 of empirically strong random bits, on average, per
                 every operating system interrupt, that is, HAVEG is
                 three to four orders of magnitude more efficient than
                 previous software entropy gathering
                 techniques.\par

                 \ldots{}\par

                 \ldots{} on all the target platforms of HAVEGE in 2002
                 [Seznec and Sendrier 2002], the HAVEG algorithm
                 illustrated in Figure 1 allows to gather at least
                 8K--64K random bits in average per operating system
                 interrupt (from 8K on Itanium/Linux to 64K on
                 Solaris/UltraSparc II). That is, at least three to four
                 orders of magnitude more than the `entropy' gathered by
                 previously available entropy-gathering
                 techniques.\par

                 \ldots{}\par

                 In average on Pentium III, 920 million $ \pm 5 \% $
                 cycles were needed to collect 32 Mbytes of random
                 numbers, while on the UltraSparc II, 500 million $ \pm
                 5 \% $ cycles were sufficient. This throughput is in
                 the same range as the throughput of standard
                 pseudorandom number generators.''\par

                 Thus, it seems that this algorithm deserves careful
                 consideration for use in {\tt /dev/random} and {\tt
                 /dev/urandom} pseudodevices in Unix systems, since the
                 former in particular on several platforms can be
                 rapidly drained of data, causing very long input waits
                 (e.g., two days to read 10MB of data.)",
  fjournal =     "ACM Transactions on Modeling and Computer Simulation",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J781",
}

@InProceedings{Shamir:2003:FLN,
  author =       "Adi Shamir and Eran Tromer",
  title =        "Factoring Large Numbers with the {TWIRL} Device",
  crossref =     "Boneh:2003:ACC",
  pages =        "1--26",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@InProceedings{Shamir:2003:RS,
  author =       "Adi Shamir",
  title =        "{RSA} Shortcuts",
  crossref =     "Joye:2003:TCC",
  pages =        "327--327",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@Misc{Shamir:2003:TLC,
  author =       "Adi Shamir",
  title =        "{Turing Lecture} on Cryptology: a Status Report",
  howpublished = "World-Wide Web slide presentation, video, and audio.",
  year =         "2003",
  bibdate =      "Sat Nov 19 07:46:28 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/acm-turing-awards.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.acm.org/turingawardlecture/RSA/",
  acknowledgement = ack-nhfb,
}

@Article{Shao:2003:CIB,
  author =       "Zuhua Shao",
  title =        "Cryptanalysis of {``an identity-based society oriented
                 signature scheme with anonymous signers''}",
  journal =      j-INFO-PROC-LETT,
  volume =       "86",
  number =       "6",
  pages =        "295--298",
  day =          "30",
  month =        jun,
  year =         "2003",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:32 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Shao:2003:PSS,
  author =       "Zuhua Shao",
  title =        "Proxy signature schemes based on factoring",
  journal =      j-INFO-PROC-LETT,
  volume =       "85",
  number =       "3",
  pages =        "137--143",
  day =          "14",
  month =        feb,
  year =         "2003",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Shen:2003:SET,
  author =       "Jau-Ji Shen and Chih-Wei Lin and Min-Shiang Hwang",
  title =        "Security enhancement for the timestamp-based password
                 authentication scheme using smart cards",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "7",
  pages =        "591--595",
  month =        oct,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803007090",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{Shparlinski:2003:CAA,
  author =       "Igor E. Shparlinski",
  title =        "Cryptographic Applications of Analytic Number Theory:
                 Complexity Lower Bounds and Pseudorandomness",
  volume =       "22",
  publisher =    pub-BIRKHAUSER,
  address =      pub-BIRKHAUSER:adr,
  pages =        "viii + 411",
  year =         "2003",
  ISBN =         "3-7643-6654-0 , 0-8176-6654-0",
  ISBN-13 =      "978-3-7643-6654-4, 978-0-8176-6654-5",
  LCCN =         "QA267.7 .S55 2003",
  bibdate =      "Fri Mar 23 10:30:16 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 jenson.stanford.edu:2210/unicorn",
  series =       "Progress in computer science and applied logic",
  acknowledgement = ack-nhfb,
  subject =      "Computational complexity; Coding theory; Combinatorial
                 number theory",
  zz-isbn =      "3-7643-6654-0, 0-8176-6654-0",
}

@Article{Sklavos:2003:DDR,
  author =       "N. Sklavos and O. Koufopavlou",
  title =        "Data dependent rotations, a trustworthy approach for
                 future encryption systems\slash ciphers: low cost and
                 high performance",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "7",
  pages =        "585--588",
  month =        oct,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803007065",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Skolnikoff:2003:SS,
  author =       "Eugene B. Skolnikoff",
  title =        "Security and sanity",
  journal =      j-IEEE-SPECTRUM,
  volume =       "40",
  number =       "4",
  pages =        "13--14",
  month =        apr,
  year =         "2003",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2003.1191776",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Artificial satellites; Cryptography; Educational
                 institutions; Government; Information security;
                 Licenses; National security; Power engineering and
                 energy; Space technology; Weapons",
}

@Book{Skoudis:2003:MFM,
  author =       "Ed Skoudis and Lenny Zeltser",
  title =        "Malware: Fighting Malicious Code",
  publisher =    pub-PHPTR,
  address =      pub-PHPTR:adr,
  pages =        "512 (est.)",
  year =         "2003",
  ISBN =         "0-13-101405-6",
  ISBN-13 =      "978-0-13-101405-3",
  LCCN =         "QA76.9.A25 S58 2003",
  bibdate =      "Tue Nov 04 18:30:20 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$44.99",
  series =       "{Prentice Hall} series in computer networking and
                 distributed systems",
  acknowledgement = ack-nhfb,
}

@InProceedings{Smart:2003:ACU,
  author =       "Nigel P. Smart",
  title =        "Access Control Using Pairing Based Cryptography",
  crossref =     "Joye:2003:TCC",
  pages =        "111--121",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@InProceedings{Smart:2003:AGR,
  author =       "Nigel P. Smart",
  title =        "An Analysis of {Goubin}'s Refined Power Analysis
                 Attack",
  crossref =     "Walter:2003:CHE",
  pages =        "281--290",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Article{Smith:2003:FTT,
  author =       "B. Smith",
  title =        "{Fort TV} [{TV} show e-mail transmission prevention]",
  journal =      j-IEEE-SPECTRUM,
  volume =       "40",
  number =       "5",
  pages =        "30--32",
  month =        may,
  year =         "2003",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2003.1197475",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "broad public redistribution; cryptography; digital
                 content robust protection; digital defenses; digital
                 television; Digital TV; direct digital home copying;
                 DVD; electronic mail; encryption technology; FCC;
                 Internet; Motion pictures; Protection; TV broadcasting;
                 TV show e-mail transmission prevention; Video
                 equipment; Waste materials; Watermarking",
}

@Article{Springer:2003:BRB,
  author =       "William M. {Springer II}",
  title =        "Book Review: {{\booktitle{Cryptography: Theory and
                 Practice}}, second edition by Douglas R. Stinson. CRC
                 Press}",
  journal =      j-SIGACT,
  volume =       "34",
  number =       "4",
  pages =        "22--25",
  month =        dec,
  year =         "2003",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/954092.954097",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 18:30:26 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See
                 \cite{Stinson:1995:CTP,Stinson:2002:CTP,Stinson:2006:CTP}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Staff:2003:NTC,
  author =       "{CACM Staff}",
  title =        "News track: Cinematic Watermark; Eye-Opening
                 Education; Roaming Time; Stand By Me; Savings Bonds
                 Fade to Net; Phone Home",
  journal =      j-CACM,
  volume =       "46",
  number =       "7",
  pages =        "9--10",
  month =        jul,
  year =         "2003",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Sep 3 17:06:37 MDT 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@InProceedings{Stajano:2003:SCU,
  author =       "Frank Stajano",
  title =        "The Security Challenges of Ubiquitous Computing",
  crossref =     "Walter:2003:CHE",
  pages =        "1--1",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@InProceedings{Standaert:2003:EIR,
  author =       "Fran{\c{c}}ois-Xavier Standaert and Gael Rouvroy and
                 Jean-Jacques Quisquater and Jean-Didier Legat",
  title =        "Efficient Implementation of {Rijndael} Encryption in
                 Reconfigurable Hardware: {Improvements} and Design
                 Tradeoffs",
  crossref =     "Walter:2003:CHE",
  pages =        "334--350",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Article{Sugita:2003:DRW,
  author =       "Hiroshi Sugita",
  title =        "Dynamic random {Weyl} sampling for drastic reduction
                 of randomness in {Monte Carlo} integration",
  journal =      j-MATH-COMP-SIM,
  volume =       "62",
  number =       "3--6",
  pages =        "529--537",
  day =          "3",
  month =        mar,
  year =         "2003",
  CODEN =        "MCSIDR",
  DOI =          "https://doi.org/10.1016/S0378-4754(02)00231-8",
  ISSN =         "0378-4754 (print), 1872-7166 (electronic)",
  ISSN-L =       "0378-4754",
  bibdate =      "Mon Feb 27 18:00:02 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0378475402002318",
  abstract =     "To reduce randomness drastically in Monte Carlo (MC)
                 integration, we propose a pairwise independent
                 sampling, the dynamic random Weyl sampling (DRWS). DRWS
                 is applicable even if the length of random bits to
                 generate a sample may vary. The algorithm of DRWS is so
                 simple that it works very fast, even though the
                 pseudo-random generator, the source of randomness,
                 might be slow. In particular, we can use a
                 cryptographically secure pseudo-random generator for
                 DRWS to obtain the most reliable numerical integration
                 method for complicated functions.",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics and Computers in Simulation",
  keywords =     "dynamic random Weyl sampling (DRWS)",
}

@Article{Sumii:2003:LRE,
  author =       "Eijiro Sumii and Benjamin C. Pierce",
  title =        "Logical relations for encryption",
  journal =      j-J-COMP-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "521--554",
  month =        "????",
  year =         "2003",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2003-11403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:14 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Thimbleby:2003:RE,
  author =       "Harold Thimbleby",
  title =        "The reduced {Enigma}",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "7",
  pages =        "624--642",
  month =        oct,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803007120",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tico:2003:RAS,
  author =       "Marius Tico and Pauli Kuosmanen",
  title =        "A Remote Authentication System Using Fingerprints",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "3",
  number =       "3",
  pages =        "425--??",
  month =        jul,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "0219-4678",
  bibdate =      "Thu Jan 06 07:38:16 2005",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@InProceedings{Tiri:2003:SEA,
  author =       "Kris Tiri and Ingrid Verbauwhede",
  title =        "Securing Encryption Algorithms against {DPA} at the
                 Logic Level: Next Generation {Smart Card} Technology",
  crossref =     "Walter:2003:CHE",
  pages =        "125--136",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@Book{Trudel:2003:DSE,
  author =       "Bernard Trudel and Sean Convery and Russell Rice",
  title =        "Designing secure enterprise networks",
  publisher =    pub-CISCO,
  address =      pub-CISCO:adr,
  pages =        "????",
  year =         "2003",
  ISBN =         "1-58705-115-X",
  ISBN-13 =      "978-1-58705-115-9",
  bibdate =      "Thu Jun 23 18:36:24 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  note =         "Duplicate ISBN with \cite{Convery:2004:NSA}.",
  acknowledgement = ack-nhfb,
  xxnote =       "Check: was this a prepublication catalog entry??",
}

@Article{Tseng:2003:DSM,
  author =       "Yuh-Min Tseng and Jinn-Ke Jan and Hung-Yu Chien",
  title =        "Digital signature with message recovery using
                 self-certified public keys and its variants",
  journal =      j-APPL-MATH-COMP,
  volume =       "136",
  number =       "2--3",
  pages =        "203--214",
  day =          "15",
  month =        mar,
  year =         "2003",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Fri Jan 9 08:40:52 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Tsunoo:2003:CIC,
  author =       "Yukiyasu Tsunoo and Teruo Saito and Tomoyasu Suzaki
                 and Maki Shigeri and Hiroshi Miyauchi",
  title =        "Cryptanalysis of {DES} Implemented on Computers with
                 Cache",
  crossref =     "Walter:2003:CHE",
  pages =        "62--76",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:12:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CHES 2003; cryptography",
}

@InProceedings{Vadhan:2003:CLC,
  author =       "Salil P. Vadhan",
  title =        "On Constructing Locally Computable Extractors and
                 Cryptosystems in the Bounded Storage Model",
  crossref =     "Boneh:2003:ACC",
  pages =        "61--77",
  year =         "2003",
  bibdate =      "Tue Apr 4 08:39:42 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto' 2003; cryptography",
}

@Article{Vanstone:2003:NGS,
  author =       "S. A. Vanstone",
  title =        "Next generation security for wireless: elliptic curve
                 cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "412--415",
  month =        jul,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803005078",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Vavriv:2003:RNG,
  author =       "D. D. Vavriv",
  editor =       "Visarath In and Ljupco Kocarev and Stefano Boccaletti
                 and Bruce J. Gluckman and Jurgen Kurths and Thomas L.
                 Carroll",
  title =        "Random Number Generators on the Basis of Systems with
                 Chaotic Behavior",
  journal =      j-AIP-CONF-PROC,
  volume =       "676",
  number =       "1",
  pages =        "373--373",
  year =         "2003",
  CODEN =        "APCPCS",
  DOI =          "https://doi.org/10.1063/1.1612254",
  ISSN =         "0094-243X (print), 1551-7616 (electronic), 1935-0465",
  ISSN-L =       "0094-243X",
  bibdate =      "Mon Jan 16 15:57:34 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://link.aip.org/link/?APC/676/373/1",
  acknowledgement = ack-nhfb,
  fjournal =     "AIP Conference Proceedings",
  keywords =     "chaos; cryptography; random number generation;
                 sequences",
}

@Book{Viega:2003:SPC,
  author =       "John Viega and Matt Messier",
  title =        "Secure programming cookbook for {C} and {C++}: Recipes
                 for cryptography, authentication, networking, input
                 validation and more",
  publisher =    pub-ORA,
  address =      pub-ORA:adr,
  pages =        "xxv + 762",
  year =         "2003",
  ISBN =         "0-596-00394-3",
  ISBN-13 =      "978-0-596-00394-4",
  LCCN =         "QA76.73.C15 V53 2003",
  bibdate =      "Thu Feb 23 07:58:01 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  remark =       "Covers Unix and Windows",
  subject =      "C (Computer program language); C++ (Computer program
                 language); Computer security; Computer software;
                 Development",
}

@Article{Viroli:2003:TPA,
  author =       "Mirko Viroli",
  title =        "A Type-Passing Approach for the Implementation of
                 Parametric Methods in {Java}",
  journal =      j-COMP-J,
  volume =       "46",
  number =       "3",
  pages =        "263--294",
  month =        may,
  year =         "2003",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Sun Jun 29 07:07:12 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_46/Issue_03/",
  URL =          "http://www3.oup.co.uk/computer_journal/hdb/Volume_46/Issue_03/460263.sgm.abs.html;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_46/Issue_03/pdf/460263.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Book{Wagstaff:2003:CNT,
  author =       "Samuel S. {Wagstaff, Jr.}",
  title =        "Cryptanalysis of number theoretic ciphers",
  publisher =    pub-CHAPMAN-HALL-CRC,
  address =      pub-CHAPMAN-HALL-CRC:adr,
  pages =        "xv + 318",
  year =         "2003",
  ISBN =         "1-58488-153-4",
  ISBN-13 =      "978-1-58488-153-7",
  LCCN =         "QA76.9.A25 W33 2003",
  bibdate =      "Thu May 12 07:25:59 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Computational mathematics",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0646/2002034919-d.html",
  acknowledgement = ack-nhfb,
  subject =      "computer security; cryptography; number theory",
}

@InProceedings{Walter:2003:STM,
  author =       "Colin D. Walter",
  title =        "Seeing through {MIST} Given a Small Fraction of an
                 {RSA} Private Key",
  crossref =     "Joye:2003:TCC",
  pages =        "391--402",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@Article{Wang:2003:CET,
  author =       "Bin Wang and Jian-Hua Li and Zhi-Peng Tong",
  title =        "Cryptanalysis of an enhanced timestamp-based password
                 authentication scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "7",
  pages =        "643--645",
  month =        oct,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803007132",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Wang:2003:SGP,
  author =       "Huaxiong Wang and Josef Pieprzyk",
  title =        "Shared Generation of Pseudo-Random Functions with
                 Cumulative Maps",
  crossref =     "Joye:2003:TCC",
  pages =        "281--294",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@Article{Weng:2003:CHC,
  author =       "Annegret Weng",
  title =        "Constructing hyperelliptic curves of genus $2$
                 suitable for cryptography",
  journal =      j-MATH-COMPUT,
  volume =       "72",
  number =       "241",
  pages =        "435--458",
  month =        jan,
  year =         "2003",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (print), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Fri Nov 22 10:22:27 MST 2002",
  bibsource =    "http://www.ams.org/mcom/2003-72-241;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ams.org/journal-getitem?pii=S0025-5718-02-01422-9;
                 http://www.ams.org/mcom/2003-72-241/S0025-5718-02-01422-9/S0025-5718-02-01422-9.dvi;
                 http://www.ams.org/mcom/2003-72-241/S0025-5718-02-01422-9/S0025-5718-02-01422-9.pdf;
                 http://www.ams.org/mcom/2003-72-241/S0025-5718-02-01422-9/S0025-5718-02-01422-9.ps;
                 http://www.ams.org/mcom/2003-72-241/S0025-5718-02-01422-9/S0025-5718-02-01422-9.tex",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
}

@InProceedings{Whiting:2003:MPH,
  author =       "Douglas L. Whiting and Michael J. Sabin",
  title =        "{Montgomery} Prime Hashing for Message
                 Authentication",
  crossref =     "Joye:2003:TCC",
  pages =        "50--67",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@Article{Wolfe:2003:EE,
  author =       "Hank Wolfe",
  title =        "Encountering encryption",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "388--391",
  month =        jul,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803005042",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wu:2003:HDW,
  author =       "Hsien-Chu Wu and Chin-Chen Chang",
  title =        "Hiding Digital Watermarks Using Fractal Compression
                 Technique",
  journal =      j-FUND-INFO,
  volume =       "58",
  number =       "2",
  pages =        "189--202",
  month =        apr,
  year =         "2003",
  CODEN =        "FUMAAJ",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:01:24 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Wu:2003:IMT,
  author =       "Tzong-Sun Wu and Chien-Lung Hsu and Han-Yu Lin and
                 Po-Sheng Huang",
  title =        "Improvement of the {Miyazaki--Takaragi} threshold
                 digital signature scheme",
  journal =      j-INFO-PROC-LETT,
  volume =       "88",
  number =       "4",
  pages =        "183--186",
  day =          "30",
  month =        nov,
  year =         "2003",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:33 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Wu:2003:TSS,
  author =       "Tzong-Sun Wu and Chien-Lung Hsu",
  title =        "Threshold signature scheme using self-certified public
                 keys",
  journal =      j-J-SYST-SOFTW,
  volume =       "67",
  number =       "2",
  pages =        "89--97",
  day =          "15",
  month =        aug,
  year =         "2003",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Sat Oct 25 07:14:15 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Wu:2003:UFR,
  author =       "Shyi-Tsong Wu and Bin-Chang Chieu",
  title =        "A user friendly remote authentication scheme with
                 smart cards",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "547--550",
  month =        sep,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803006163",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Xiao:2003:HPC,
  author =       "Lu Xiao and Howard M. Heys",
  title =        "Hardware Performance Characterization of Block Cipher
                 Structures",
  crossref =     "Joye:2003:TCC",
  pages =        "176--192",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@InProceedings{Xu:2003:TEP,
  author =       "Shouhuai Xu and Ravi Sandhu",
  title =        "Two Efficient and Provably Secure Schemes for
                 Server-Assisted Threshold Signatures",
  crossref =     "Joye:2003:TCC",
  pages =        "355--372",
  year =         "2003",
  bibdate =      "Tue Apr 4 18:46:22 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptology; Topics in Cryptology CT-RSA 2003",
}

@Article{Yeh:2003:IAM,
  author =       "Her-Tyan Yeh and Hung-Min Sun and Tzonelih Hwang",
  title =        "Improved authenticated multiple-key agreement
                 protocol",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "46",
  number =       "2--3",
  pages =        "207--211",
  month =        jul # "\slash " # aug,
  year =         "2003",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:49:31 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122103900253",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Yen:2003:RSC,
  author =       "Sung-Ming Yen and Seungjoo Kim and Seongan Lim and
                 Sang-Jae Moon",
  title =        "{RSA} speedup with {Chinese Remainder Theorem} immune
                 against hardware fault cryptanalysis",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "52",
  number =       "4",
  pages =        "461--472",
  month =        apr,
  year =         "2003",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2003.1190587",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Jul 5 08:52:46 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1190587",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Zhang:2003:FSP,
  author =       "Zhenxiang Zhang and Min Tang",
  title =        "Finding strong pseudoprimes to several bases. {II}",
  journal =      j-MATH-COMPUT,
  volume =       "72",
  number =       "244",
  pages =        "2085--2097",
  month =        oct,
  year =         "2003",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (print), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Wed Nov 5 16:26:04 MST 2003",
  bibsource =    "http://www.ams.org/mcom/2003-72-244;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ams.org/journal-getitem?pii=S0025-5718-03-01545-X;
                 http://www.ams.org/mcom/2003-72-244/S0025-5718-03-01545-X/S0025-5718-03-01545-X.dvi;
                 http://www.ams.org/mcom/2003-72-244/S0025-5718-03-01545-X/S0025-5718-03-01545-X.pdf;
                 http://www.ams.org/mcom/2003-72-244/S0025-5718-03-01545-X/S0025-5718-03-01545-X.ps;
                 http://www.ams.org/mcom/2003-72-244/S0025-5718-03-01545-X/S0025-5718-03-01545-X.tex",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
}

@Article{Abadi:2004:PA,
  author =       "Mart{\'\i}n Abadi and C{\'e}dric Fournet",
  title =        "Private authentication",
  journal =      j-THEOR-COMP-SCI,
  volume =       "322",
  number =       "3",
  pages =        "427--476",
  month =        sep,
  year =         "2004",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Thu Nov 4 10:19:18 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@InProceedings{Abe:2004:ASF,
  author =       "Masayuki Abe and Serge Fehr",
  title =        "Adaptively Secure {Feldman} {VSS} and Applications to
                 Universally-Composable Threshold Cryptography",
  crossref =     "Franklin:2004:ACC",
  pages =        "317--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Abe:2004:CEP,
  author =       "Masayuki Abe",
  title =        "Combining Encryption and Proof of Knowledge in the
                 Random Oracle Model",
  journal =      j-COMP-J,
  volume =       "47",
  number =       "1",
  pages =        "58--??",
  month =        jan,
  year =         "2004",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Feb 26 06:22:27 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_47/Issue_01/",
  URL =          "http://www3.oup.co.uk/computer_journal/hdb/Volume_47/Issue_01/470058.sgm.abs.html;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_47/Issue_01/pdf/470058.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@InProceedings{Agrawal:2004:OPE,
  author =       "Rakesh Agrawal and Jerry Kiernan and Ramakrishnan
                 Srikant and Yirong Xu",
  title =        "Order preserving encryption for numeric data",
  crossref =     "ACM:2004:PAS",
  pages =        "563--574",
  year =         "2004",
  bibdate =      "Sun Nov 7 06:14:27 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Aiello:2004:JFK,
  author =       "William Aiello and Steven M. Bellovin and Matt Blaze
                 and Ran Canetti and John Ioannidis and Angelos D.
                 Keromytis and Omer Reingold",
  title =        "Just fast keying: {Key} agreement in a hostile
                 {Internet}",
  journal =      j-TISSEC,
  volume =       "7",
  number =       "2",
  pages =        "242--273",
  month =        may,
  year =         "2004",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Nov 4 08:41:51 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Book{Al-Akaidi:2004:FSP,
  author =       "Marwan Al-Akaidi",
  title =        "Fractal speech processing",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "x + 214",
  year =         "2004",
  ISBN =         "0-521-81458-8 (hardcover), 0-511-75454-X (e-book)",
  ISBN-13 =      "978-0-521-81458-4 (hardcover), 978-0-511-75454-8
                 (e-book)",
  LCCN =         "TK7882.S65 A43 2004; TK7882.S65 ALA",
  bibdate =      "Tue Sep 20 18:49:43 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 library.ox.ac.uk:210/ADVANCE",
  URL =          "http://www.loc.gov/catdir/description/cam032/2003055750.htm;
                 http://www.loc.gov/catdir/toc/cam032/2003055750.htm",
  acknowledgement = ack-nhfb,
  subject =      "Speech processing systems; Fractals; Data processing",
  tableofcontents = "Frontmatter: i--iv \\
                 Contents: v--viii \\
                 List of acronyms and abbreviations: ix--x \\
                 1: Introduction to speech processing: 1--25 \\
                 2: Computational background: 26--65 \\
                 3: Statistical analysis, entropy and Bayesian
                 estimation: 66--87 \\
                 4: Introduction to fractal geometry: 88--126 \\
                 5: Application to speech processing and synthesis:
                 127--140 \\
                 6: Speech processing with fractals: 141--163 \\
                 7: Speech synthesis using fractals: 164--177 \\
                 8: Cryptology and chaos: 178--211 \\
                 Index: 212--214",
}

@Article{Alvarez:2004:KCC,
  author =       "G. {\'A}lvarez and F. Montoya and M. Romera and G.
                 Pastor",
  title =        "Keystream cryptanalysis of a chaotic cryptographic
                 method",
  journal =      j-COMP-PHYS-COMM,
  volume =       "156",
  number =       "2",
  pages =        "205--207",
  day =          "1",
  month =        jan,
  year =         "2004",
  CODEN =        "CPHCBZ",
  DOI =          "https://doi.org/10.1016/S0010-4655(03)00432-6",
  ISSN =         "0010-4655 (print), 1879-2944 (electronic)",
  ISSN-L =       "0010-4655",
  bibdate =      "Mon Feb 13 23:41:34 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compphyscomm2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See \cite{Wong:2001:MCC,Wong:2004:RCK}.",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0010465503004326",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Physics Communications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00104655",
}

@Article{Aly:2004:CSP,
  author =       "Alaaeldin A. Aly and Shakil Akhtar",
  title =        "Cryptography and security protocols course for
                 undergraduate {IT} students",
  journal =      j-SIGCSE,
  volume =       "36",
  number =       "2",
  pages =        "44--47",
  month =        jun,
  year =         "2004",
  CODEN =        "SIGSD3",
  DOI =          "https://doi.org/10.1145/1024338.1024369",
  ISSN =         "0097-8418 (print), 2331-3927 (electronic)",
  ISSN-L =       "0097-8418",
  bibdate =      "Sat Nov 17 16:57:09 MST 2012",
  bibsource =    "DBLP;
                 http://dblp.uni-trier.de/db/journals/sigcse/sigcse36.html#AlyA04;
                 http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigcse2000.bib",
  URL =          "https://www.math.utah.edu/pub/mirrors/ftp.ira.uka.de/bibliography/Misc/DBLP/2004.bib",
  abstract =     "This paper presents an application of active learning
                 methodologies to teach cryptography and security
                 protocols for undergraduate IT students. This course is
                 offered to sophomore/junior students and is based upon
                 the recently approved Computing Curricula CC 2001 by
                 IEEE Computer Society/ACM taskforce. We illustrate the
                 teaching methodology to cover the security related
                 topics such as encryption/decryption methodologies,
                 security and protection, cryptographic algorithms and
                 standards, and computer crime. An example lesson
                 covering the DES is included.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIGCSE Bulletin (ACM Special Interest Group on
                 Computer Science Education)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J688",
}

@Article{Amir:2004:PGK,
  author =       "Yair Amir and Yongdae Kim and Cristina Nita-Rotaru and
                 Gene Tsudik",
  title =        "On the performance of group key agreement protocols",
  journal =      j-TISSEC,
  volume =       "7",
  number =       "3",
  pages =        "457--488",
  month =        aug,
  year =         "2004",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Nov 4 08:41:51 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Anderson:2004:BRR,
  author =       "Dennis Anderson",
  title =        "Book Review: {{\em RFID Handbook: Fundamentals and
                 Applications in Contactless Smart Cards and
                 Identification\/} by Klaus Finkenzeller, John Wiley \&
                 Sons, 2003, \$125, ISBN 0-470-84402-7}",
  journal =      j-QUEUE,
  volume =       "2",
  number =       "3",
  pages =        "74--74",
  month =        may,
  year =         "2004",
  CODEN =        "AQCUAE",
  ISSN =         "1542-7730 (print), 1542-7749 (electronic)",
  ISSN-L =       "1542-7730",
  bibdate =      "Thu Jun 23 16:38:49 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Queue: Tomorrow's Computing Today",
}

@Article{Androutsellis-Theotokis:2004:SPP,
  author =       "Stephanos Androutsellis-Theotokis and Diomidis
                 Spinellis",
  title =        "A survey of peer-to-peer content distribution
                 technologies",
  journal =      j-COMP-SURV,
  volume =       "36",
  number =       "4",
  pages =        "335--371",
  month =        dec,
  year =         "2004",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1041680.1041681",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:20:19 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Distributed computer architectures labeled
                 'peer-to-peer' are designed for the sharing of computer
                 resources (content, storage, CPU cycles) by direct
                 exchange, rather than requiring the intermediation or
                 support of a centralized server or authority.
                 Peer-to-peer architectures are characterized by their
                 ability to adapt to failures and accommodate transient
                 populations of nodes while maintaining acceptable
                 connectivity and performance. Content distribution is
                 an important peer-to-peer application on the Internet
                 that has received considerable research attention.
                 Content distribution applications typically allow
                 personal computers to function in a coordinated manner
                 as a distributed storage medium by contributing,
                 searching, and obtaining digital content. In this
                 survey, we propose a framework for analyzing
                 peer-to-peer content distribution technologies. Our
                 approach focuses on nonfunctional characteristics such
                 as security, scalability, performance, fairness, and
                 resource management potential, and examines the way in
                 which these characteristics are reflected in---and
                 affected by---the architectural design decisions
                 adopted by current peer-to-peer systems. We study
                 current peer-to-peer systems and infrastructure
                 technologies in terms of their distributed object
                 location and routing mechanisms, their approach to
                 content replication, caching and migration, their
                 support for encryption, access control, authentication
                 and identity, anonymity, deniability, accountability
                 and reputation, and their use of resource trading and
                 management schemes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Content distribution; DHT; DOLR; grid computing; p2p;
                 peer-to-peer",
}

@Article{Anonymous:2004:BB,
  author =       "Anonymous",
  title =        "Biometrics Boom",
  journal =      j-IEEE-SPECTRUM,
  volume =       "41",
  number =       "3",
  pages =        "13--13",
  month =        mar,
  year =         "2004",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2004.1270539",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Aircraft; Authentication; Biometrics; Clocks; Clouds;
                 Costs; Energy capture; Fingerprint recognition; Humans;
                 Solar energy",
}

@Article{Anonymous:2004:Cf,
  author =       "Anonymous",
  title =        "Codebuster",
  journal =      j-IEEE-SPECTRUM,
  volume =       "41",
  number =       "5",
  pages =        "59--60",
  month =        may,
  year =         "2004",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2004.1296018",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Andy Clark; biographies; Biographies; codes; computer
                 crime; Computer crime; computer forensics;
                 cryptography; Cryptography; data encryption; decryption
                 technique; Deep Thought; Inforenz; parallel computers",
}

@Article{Anonymous:2004:CJL,
  author =       "Anonymous",
  title =        "{Chipkarten: Java-L{\"o}sung f{\"u}r SmartCards}.
                 ({German}) [{Chip} cards: {Java} Solutions for
                 {SmartCards}]",
  journal =      j-ELECTRONIK,
  volume =       "53",
  number =       "4",
  pages =        "6",
  year =         "2004",
  CODEN =        "EKRKAR",
  ISSN =         "0013-5658",
  bibdate =      "Sat Apr 3 08:12:24 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 Ingenta database",
  acknowledgement = ack-nhfb,
  fjournal =     "Elektronik",
  language =     "German",
}

@Article{Anonymous:2004:CPS,
  author =       "Anonymous",
  title =        "Call for Papers for Special Section on Fault Diagnosis
                 and Tolerance in Cryptography",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "53",
  number =       "11",
  pages =        "1504--1504",
  month =        nov,
  year =         "2004",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2004.89",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Jul 5 08:12:46 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1336771",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Anonymous:2004:ISL,
  author =       "Anonymous",
  title =        "{IBM}'s support for the {Liberty Alliance} brings
                 standard convergence for federated identity a step
                 closer",
  journal =      j-NETWORK-SECURITY,
  volume =       "2004",
  number =       "11",
  pages =        "3, 20",
  month =        nov,
  year =         "2004",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(04)00151-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:06 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485804001515",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2004:NGJ,
  author =       "Anonymous",
  title =        "New generation {Java} smart cards",
  journal =      "Card Technology Today",
  volume =       "16",
  number =       "3",
  pages =        "10--11",
  year =         "2004",
  CODEN =        "????",
  ISSN =         "0965-2590",
  bibdate =      "Sat Apr 3 08:12:24 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 Ingenta database",
  acknowledgement = ack-nhfb,
}

@InProceedings{Applebaum:2004:CNS,
  author =       "B. Applebaum and Y. Ishai and E. Kushilevitz",
  title =        "Cryptography in {NC}$^0$",
  crossref =     "IEEE:2004:PAI",
  pages =        "166--175",
  year =         "2004",
  bibdate =      "Fri Jul 15 16:13:03 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/9430/29918/01366236.pdf?isnumber=29918&prod=CNF&arnumber=1366236&arSt=+166&ared=+175&arAuthor=Applebaum%2C+B.%3B+Ishai%2C+Y.%3B+Kushilevitz%2C+E.;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=29918&arnumber=1366236&count=64&index=17",
  acknowledgement = ack-nhfb,
}

@Article{Arnold:2004:IPN,
  author =       "T. W. Arnold and L. P. {Van Doorn}",
  title =        "The {IBM PCIXCC}: a new cryptographic coprocessor for
                 the {IBM eServer}",
  journal =      j-IBM-JRD,
  volume =       "48",
  number =       "3/4",
  pages =        "475--487",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMJAE",
  DOI =          "https://doi.org/10.1147/rd.483.0475",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  ISSN-L =       "0018-8646",
  bibdate =      "Tue Sep 28 06:50:40 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/rd/483/arnold.html;
                 http://www.research.ibm.com/journal/rd/483/arnold.pdf",
  abstract =     "IBM has designed special cryptographic processors for
                 its servers for more than 25 years. These began as very
                 simple devices, but over time the requirements have
                 become increasingly complex, and there has been a
                 never-ending demand for increased speed. This paper
                 describes the PCIXCC, the new coprocessor introduced in
                 the IBM z990 server. In many ways, PCIXCC is a
                 watershed design. For the first time, a single product
                 satisfies all requirements across all IBM server
                 platforms. It offers the performance demanded by
                 today's Web servers, it supports the complex and
                 specialized cryptographic functions needed in the
                 banking and finance industry, and it uses packaging
                 technology that leads the world in resistance to
                 physical or electrical attacks against its secure
                 processes and the secret data it holds. Furthermore, it
                 is programmable and highly flexible, so that its
                 function can be easily modified to meet new
                 requirements as they appear. These features are
                 possible because of innovative design in both the
                 hardware and embedded software for the card. This paper
                 provides an overview of that design.",
  acknowledgement = ack-nhfb,
  fjournal =     "IBM Journal of Research and Development",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
  ordernumber =  "G322-0240",
  remark =       "From the paper: ``Random-number generator: The card
                 includes two cryptographic-quality hardware
                 random-number generators. The entropy is obtained from
                 electrical noise from a semiconductor junction. Each of
                 the two random-number sources provides random bits at a
                 rate of 128 Kb/s.''\par

                 Linux operating system and device drivers: \ldots{} By
                 adopting Linux as the card O/S, the PCIXCC development
                 team could focus more of its energy on the unique
                 PCIXCC components. \ldots{} In the end, we decided to
                 provide all device driver modules under the same
                 license as the Linux kernel, the GNU General Public
                 License (GPL).",
}

@Article{Artail:2004:PAC,
  author =       "Hassan A. Artail",
  title =        "Peer-assisted carrying authentication {(PACA)}",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "478--488",
  month =        sep,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001191",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Aslan:2004:HSM,
  author =       "Heba K. Aslan",
  title =        "A hybrid scheme for multicast authentication over
                 lossy networks",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "8",
  pages =        "705--713",
  month =        dec,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001798",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Aslan:2004:LAA,
  author =       "Heba K. Aslan",
  title =        "Logical analysis of {AUTHMAC\_DH}: a new protocol for
                 authentication and key distribution",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "4",
  pages =        "290--299",
  month =        jun,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000215",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Atallah:2004:ALA,
  author =       "Mikhail J. Atallah and Stefano Lonardi",
  title =        "Augmenting {LZ-77} with authentication and integrity
                 assurance capabilities",
  journal =      j-CCPE,
  volume =       "16",
  number =       "11",
  pages =        "1063--1076",
  month =        sep,
  year =         "2004",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.804",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat May 14 11:30:55 MDT 2005",
  bibsource =    "http://www.interscience.wiley.com/jpages/1532-0626;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www3.interscience.wiley.com/journalfinder.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Prac\-tice and
                 Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "6 Aug 2004",
}

@Article{Ateniese:2004:VED,
  author =       "Giuseppe Ateniese",
  title =        "Verifiable encryption of digital signatures and
                 applications",
  journal =      j-TISSEC,
  volume =       "7",
  number =       "1",
  pages =        "1--20",
  month =        feb,
  year =         "2004",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Nov 4 08:41:51 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Bajard:2004:FRI,
  author =       "J.-C. Bajard and L. Imbert",
  title =        "A full {RNS} implementation of {RSA}",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "53",
  number =       "6",
  pages =        "769--774",
  month =        jun,
  year =         "2004",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2004.2",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Jul 5 08:12:38 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1288551",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Bao:2004:CPK,
  author =       "Feng Bao",
  title =        "Cryptanalysis of a partially known cellular automata
                 cryptosystem",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "53",
  number =       "11",
  pages =        "1493--1497",
  month =        nov,
  year =         "2004",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2004.94",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Jul 5 08:12:46 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1336769",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@InProceedings{Bar-Yossef:2004:ESQ,
  author =       "Ziv Bar-Yossef and T. S. Jayram and Iordanis
                 Kerenidis",
  title =        "Exponential separation of quantum and classical
                 one-way communication complexity",
  crossref =     "ACM:2004:PAA",
  pages =        "128--137",
  year =         "2004",
  bibdate =      "Wed Apr 5 05:59:11 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Bellare:2004:BPR,
  author =       "Mihir Bellare and Tadayoshi Kohno and Chanathip
                 Namprempre",
  title =        "Breaking and provably repairing the {SSH}
                 authenticated encryption scheme: a case study of the
                 Encode-then-Encrypt-and-{MAC} paradigm",
  journal =      j-TISSEC,
  volume =       "7",
  number =       "2",
  pages =        "206--241",
  month =        may,
  year =         "2004",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Nov 4 08:41:51 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Misc{Bellare:2004:CBG,
  author =       "M. Bellare and P. Rogaway",
  title =        "Code-based game-playing proofs and the security of
                 triple encryption",
  howpublished = "Cryptology ePrint Archive report 2004/331",
  year =         "2004",
  bibdate =      "Tue Mar 18 10:50:08 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://eprint.iacr.org/2004/331",
  acknowledgement = ack-nhfb,
}

@InProceedings{Bellare:2004:KEA,
  author =       "Mihir Bellare and Adriana Palacio",
  title =        "The Knowledge-of-Exponent Assumptions and $3$-Round
                 Zero-Knowledge Protocols",
  crossref =     "Franklin:2004:ACC",
  pages =        "273--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Bellovin:2004:IRS,
  author =       "Steven M. Bellovin",
  title =        "Inside risks: Spamming, phishing, authentication, and
                 privacy",
  journal =      j-CACM,
  volume =       "47",
  number =       "12",
  pages =        "144--144",
  month =        dec,
  year =         "2004",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 2 06:08:32 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@TechReport{Benson:2004:VS,
  author =       "Robert L. Benson",
  title =        "The {Venona} Story",
  type =         "Report",
  institution =  "Center for Cryptologic History, National Security
                 Agency",
  address =      "9800 Savage Road, Suite 6886, Fort George G. Meade, MD
                 20755-6886",
  pages =        "63",
  day =          "15",
  month =        jan,
  year =         "2004",
  bibdate =      "Fri Dec 29 08:09:11 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.nsa.gov/about/cryptologic-heritage/historical-figures-publications/publications/coldwar/assets/files/venona_story.pdf",
  abstract =     "On 1 February 1943 the U.S. Army's Signal Intelligence
                 Service, a forerunner of the National Security Agency,
                 began a small, very secret program, later codenamed
                 VENONA. The original object of the VENONA program was
                 to examine, and possibly exploit, encrypted Soviet
                 diplomatic communications. These messages had been
                 accumulated by the Signal Intelligence Service (later
                 renamed the U.S. Army Signal Security Agency and
                 commonly called ``Arlington Hall'' after the Virginia
                 location of its headquarters) since 1939 but had not
                 been studied previously. American analysts discovered
                 that these Soviet communications dealt with not only
                 diplomatic subjects but also espionage matters.",
  acknowledgement = ack-nhfb,
  keywords =     "Alger Hiss; Carter Clarke; Cecil Phillips; David
                 Greenglass; Donald Maclean; Elizabeth Bentley; Ethel
                 Rosenberg; Gene Grabeel; Guy Burgess; Harry D. White;
                 Harry Gold; Julius Rosenberg; Kim Philby; Klaus Fuchs;
                 Meredith Gardner; Robert Lamphere; Theodore Hall;
                 William Perl",
  remark =       "Internally undated, but pdfinfo reports CreationDate:
                 Thu Jan 15 07:25:33 2004 and ModDate: Wed Oct 22
                 10:27:42 2008.",
}

@Misc{Bernstein:2004:FPA,
  author =       "Daniel J. Bernstein",
  title =        "Floating-Point Arithmetic and Message Authentication",
  pages =        "21",
  day =          "18",
  month =        sep,
  year =         "2004",
  bibdate =      "Mon May 13 10:25:28 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  note =         "To be incorporated into the author's
                 \booktitle{High-Speed Cryptography} book. [As of 13 May
                 2024, this book seems not to have been published.]",
  URL =          "https://cr.yp.to/antiforgery/hash127-20040918.pdf",
  abstract =     "There is a well-known class of message authentication
                 systems guaranteeing that attackers will have a
                 negligible chance of successfully forging a message.
                 This paper shows how one of these systems can hash
                 messages at extremely high speed --- much more quickly
                 than previous systems at the same security level ---
                 using IEEE floating-point arithmetic. This paper also
                 presents a survey of the literature in a unified
                 mathematical framework.",
  acknowledgement = ack-nhfb,
  remark =       "From the first page: ``What distinguishes $ h_r $ is
                 its speed: it is the first high-security system that
                 offers better speed than the MD5-based systems in
                 common use today.'' The section on Priority dates on
                 the second page notes earlier work back to April
                 1999.",
}

@Article{Bhargavan:2004:SWS,
  author =       "Karthikeyan Bhargavan and C{\'e}dric Fournet and
                 Andrew D. Gordon",
  title =        "A semantics for {Web} services authentication",
  journal =      j-SIGPLAN,
  volume =       "39",
  number =       "1",
  pages =        "198--209",
  month =        jan,
  year =         "2004",
  CODEN =        "SINODQ",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Tue Apr 12 09:38:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
}

@InProceedings{Biham:2004:NCS,
  author =       "Eli Biham and Rafi Chen",
  title =        "Near-Collisions of {SHA-0}",
  crossref =     "Franklin:2004:ACC",
  pages =        "290--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@InProceedings{Biryukov:2004:MLA,
  author =       "Alex Biryukov and Christophe {De Canni{\`e}re} and
                 Micha{\"e}l Quisquater",
  title =        "On Multiple Linear Approximations",
  crossref =     "Franklin:2004:ACC",
  pages =        "1--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Book{Blake:2004:AEC,
  editor =       "Ian F. Blake and G. (Gadiel) Seroussi and Nigel P.
                 (Nigel Paul) Smart",
  title =        "Advances in elliptic curve cryptography",
  volume =       "317",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "xvi + 281",
  year =         "2004",
  ISBN =         "0-521-60415-X",
  ISBN-13 =      "978-0-521-60415-4",
  LCCN =         "QA76.9.A25 A375 2004",
  bibdate =      "Wed Sep 14 14:29:46 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "London Mathematical Society lecture note series",
  URL =          "http://www.loc.gov/catdir/description/cam051/2004054519.html;
                 http://www.loc.gov/catdir/toc/cam051/2004054519.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Public key cryptography",
  tableofcontents = "Protocols --- Elliptic curve base protocols / N. P.
                 Smart \\
                 On the provable security of ECDSA / D. Brown \\
                 Proofs of security for ECIES / A. W. Dent \\
                 Implementation Techniques --- Side channel analysis /
                 E. Oswald \\
                 Defenses against side-channel analysis / M. Joye \\
                 Mathematical Foundations --- Advances in point counting
                 / F. Vercauteren \\
                 Hyperelliptic curves and the HCDLP / P. Guadry \\
                 Weil descent attacks / F. Hess \\
                 Pairing Based Techniques --- Pairings / S. Galbraith
                 \\
                 Cryptography from pairings / K. G. Paterson.",
}

@Article{Blundo:2004:SIA,
  author =       "Carlo Blundo and Stelvio Cimato",
  title =        "A Software Infrastructure for Authenticated {Web}
                 Metering",
  journal =      j-COMPUTER,
  volume =       "37",
  number =       "4",
  pages =        "28--??",
  month =        apr,
  year =         "2004",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Wed May 4 16:02:09 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/comp/mags/co/2004/04/r4028abs.htm;
                 http://csdl.computer.org/dl/mags/co/2004/04/r4028.htm;
                 http://csdl.computer.org/dl/mags/co/2004/04/r4028.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@InProceedings{Boesgaard:2004:RNH,
  author =       "M. Boesgaard and M. Vesterager and T. Pedersen and J.
                 Christiansen and O. Scavenius",
  editor =       "????",
  booktitle =    "Proceedings of Fast Software Encryption 10",
  title =        "{Rabbit}: a new high performance stream cipher",
  volume =       "2887",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "307--329",
  year =         "2004",
  bibdate =      "Thu Sep 22 18:43:55 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Boneh:2004:SGS,
  author =       "Dan Boneh and Xavier Boyen and Hovav Shacham",
  title =        "Short Group Signatures",
  crossref =     "Franklin:2004:ACC",
  pages =        "41--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@InProceedings{Boneh:2004:SIB,
  author =       "Dan Boneh and Xavier Boyen",
  title =        "Secure Identity Based Encryption Without Random
                 Oracles",
  crossref =     "Franklin:2004:ACC",
  pages =        "443--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Bozzano:2004:AVS,
  author =       "Marco Bozzano and Giorgio Delzanno",
  title =        "Automatic verification of secrecy properties for
                 linear logic specifications of cryptographic
                 protocols",
  journal =      j-J-SYMBOLIC-COMP,
  volume =       "38",
  number =       "5",
  pages =        "1375--1415",
  month =        nov,
  year =         "2004",
  CODEN =        "JSYCEH",
  ISSN =         "0747-7171 (print), 1095-855X (electronic)",
  ISSN-L =       "0747-7171",
  bibdate =      "Tue Jul 5 17:59:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/07477171",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Symbolic Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07477171",
}

@Article{Branovic:2004:WCE,
  author =       "I. Branovic and R. Giorgi and E. Martinelli",
  title =        "A workload characterization of elliptic curve
                 cryptography methods in embedded environments",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "32",
  number =       "3",
  pages =        "27--34",
  month =        jun,
  year =         "2004",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 09:41:01 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Book{Buchmann:2004:IC,
  author =       "Johannes Buchmann",
  title =        "Introduction to cryptography",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  edition =      "Second",
  pages =        "xvi + 335",
  year =         "2004",
  ISBN =         "0-387-20756-2 , 0-387-21156-X",
  ISBN-13 =      "978-0-387-20756-8, 978-0-387-21156-5",
  LCCN =         "QA268.B83; QA268.B83 2004",
  bibdate =      "Thu Apr 21 17:40:14 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 library.mit.edu:9909/mit01",
  series =       "Undergraduate texts in mathematics",
  acknowledgement = ack-nhfb,
  remark =       "See also first edition \cite{Buchmann:2001:IC}.",
  subject =      "Coding theory; Cryptography",
}

@Article{Burmester:2004:HPK,
  author =       "Mike Burmester and Yvo G. Desmedt",
  title =        "Is hierarchical public-key certification the next
                 target for hackers?",
  journal =      j-CACM,
  volume =       "47",
  number =       "8",
  pages =        "68--74",
  month =        aug,
  year =         "2004",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1012037.1012038",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 2 06:08:31 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@InProceedings{Camenisch:2004:SSA,
  author =       "Jan Camenisch and Anna Lysyanskaya",
  title =        "Signature Schemes and Anonymous Credentials from
                 Bilinear Maps",
  crossref =     "Franklin:2004:ACC",
  pages =        "56--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Carrier:2004:STP,
  author =       "Brian Carrier and Clay Shields",
  title =        "The session token protocol for forensics and
                 traceback",
  journal =      j-TISSEC,
  volume =       "7",
  number =       "3",
  pages =        "333--362",
  month =        aug,
  year =         "2004",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Nov 4 08:41:51 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@InProceedings{Catalano:2004:IIP,
  author =       "Dario Catalano and David Pointcheval and Thomas
                 Pornin",
  title =        "{IPAKE}: {Isomorphisms for Password-Based
                 Authenticated Key Exchange}",
  crossref =     "Franklin:2004:ACC",
  pages =        "477--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Ceravolo:2004:ERH,
  author =       "P. Ceravolo",
  title =        "Extracting role hierarchies from authentication data
                 flows",
  journal =      j-INT-J-COMPUT-SYST-SCI-ENG,
  volume =       "19",
  number =       "3",
  pages =        "??--??",
  month =        may,
  year =         "2004",
  CODEN =        "CSSEEI",
  ISSN =         "0267-6192",
  bibdate =      "Sat May 14 12:27:04 2005",
  bibsource =    "http://www.crlpublishing.co.uk/cssecont04.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Systems Science and
                 Engineering",
  remark =       "Special issue: Semantics-Aware Techniques for
                 Security.",
}

@Periodical{Certicom:2004:CCC,
  author =       "{Certicom}",
  title =        "Code \& Cipher: {Certicom}'s Bulletin of Security and
                 Cryptography",
  publisher =    "Certicom",
  address =      "5520 Explorer Drive, 4th Floor Mississauga, Ontario,
                 L4W 5L1 Canada",
  year =         "2004",
  bibdate =      "Wed Apr 20 11:56:41 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Published quarterly.",
  URL =          "http://www.certicom.com/codeandcipher",
  acknowledgement = ack-nhfb,
}

@Article{Chang:2004:ASS,
  author =       "Chin-Chen Chang and Piyu Tsai and Min-Hui Lin",
  title =        "An Adaptive Steganographic Scheme for Color Images",
  journal =      j-FUND-INFO,
  volume =       "62",
  number =       "3--4",
  pages =        "275--289",
  month =        mar,
  year =         "2004",
  CODEN =        "FUMAAJ",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:02:22 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Chang:2004:CGS,
  author =       "Chin-Chen Chang and Yeu-Pong Lai",
  title =        "A convertible group signature scheme",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "4",
  pages =        "58--65",
  month =        oct,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:53 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Chang:2004:IDA,
  author =       "Ya-Fan Chang and Chin-Chen Chang and Chia-Lin Kao",
  title =        "An improvement on a deniable authentication protocol",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "3",
  pages =        "65--74",
  month =        jul,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:48 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Chang:2004:IDM,
  author =       "Chin-Chen Chang and Iuon-Chang Lin",
  title =        "An improvement of delegated multisignature scheme with
                 document decomposition",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "4",
  pages =        "52--57",
  month =        oct,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:53 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Chang:2004:RFB,
  author =       "Chin-Chen Chang and Iuon-Chang Lin",
  title =        "Remarks on fingerprint-based remote user
                 authentication scheme using {Smart Cards}",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "4",
  pages =        "91--96",
  month =        oct,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:53 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Chang:2004:SES,
  author =       "Ya-Fen Chang and Chin-Chen Chang",
  title =        "A secure and efficient strong-password authentication
                 protocol",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "3",
  pages =        "79--90",
  month =        jul,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:48 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Chang:2004:SOT,
  author =       "Ya-Fen Chang and Chin-Chen Chang and Jui-Yi Kuo",
  title =        "A secure one-time password authentication scheme using
                 {Smart Cards} without limiting login times",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "4",
  pages =        "80--90",
  month =        oct,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:53 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Chang:2004:TSSb,
  author =       "Ting-Yi Chang and Chou-Chen Yang and Min-Shiang
                 Hwang",
  title =        "A threshold signature scheme for group communications
                 without a shared distribution center",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "20",
  number =       "6",
  pages =        "1013--1021",
  month =        aug,
  year =         "2004",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Jul 15 08:00:45 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Chaum:2004:VSB,
  author =       "David Chaum",
  title =        "{E}-Voting: Secret-Ballot Receipts: True
                 Voter-Verifiable Elections",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "38--47",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264852",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1038abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1038.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Chen:2004:IAM,
  author =       "Bi-Hui Chen",
  title =        "Improvement of authenticated multiple-key agreement
                 protocol",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "3",
  pages =        "35--41",
  month =        jul,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:48 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Chen:2004:MCK,
  author =       "Tzer-Shyong Chen and Kuo-Hsuan Huang and Yu-Fang
                 Chung",
  title =        "Modified cryptographic key assignment scheme for
                 overcoming the incorrectness of the {CHW} scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "159",
  number =       "1",
  pages =        "147--155",
  day =          "25",
  month =        nov,
  year =         "2004",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:37 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Chen:2004:SEP,
  author =       "Ling Chen and Yi Pan and Xiao-hua Xu",
  title =        "Scalable and Efficient Parallel Algorithms for
                 {Euclidean} Distance Transform on the {LARPBS} Model",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "15",
  number =       "11",
  pages =        "975--982",
  month =        nov,
  year =         "2004",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2004.71",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Sat Dec 11 16:24:16 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/comp/trans/td/2004/11/l0975abs.htm;
                 http://csdl.computer.org/dl/trans/td/2004/11/l0975.htm;
                 http://csdl.computer.org/dl/trans/td/2004/11/l0975.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Chen:2004:TPM,
  author =       "Tzer-Shyong Chen and Yu-Fang Chung and Kuo-Hsuan
                 Huang",
  title =        "A traceable proxy multisignature scheme based on the
                 elliptic curve cryptosystem",
  journal =      j-APPL-MATH-COMP,
  volume =       "159",
  number =       "1",
  pages =        "137--145",
  day =          "25",
  month =        nov,
  year =         "2004",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:37 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Cheng:2004:BSD,
  author =       "Qi Cheng",
  title =        "On the Bounded Sum-of-Digits Discrete Logarithm
                 Problem in Finite Fields",
  crossref =     "Franklin:2004:ACC",
  pages =        "201--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Chien:2004:IAM,
  author =       "Hung-Yu Chien and Jinn-Ke Jan",
  title =        "Improved authenticated multiple-key agreement protocol
                 without using conventional one-way function",
  journal =      j-APPL-MATH-COMP,
  volume =       "147",
  number =       "2",
  pages =        "491--497",
  day =          "12",
  month =        jan,
  year =         "2004",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Fri Jan 9 08:41:16 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Chien:2004:SIS,
  author =       "Hung-Yu Chien and Jinn-Ke Jan and Yuh-Min Tseng",
  title =        "Solving the invalid signer-verified signature problem
                 and comments on {Xia--You} group signature",
  journal =      j-J-SYST-SOFTW,
  volume =       "73",
  number =       "3",
  pages =        "369--373",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed May 18 10:27:26 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Cho:2004:GKR,
  author =       "Taenam Cho and Sang-Ho Lee and Won Kim",
  title =        "A group key recovery mechanism based on logical key
                 hierarchy",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "711--736",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12503",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@InProceedings{Chow:2004:UDL,
  author =       "Jim Chow and Ben Pfaff and Tal Garfinkel and Kevin
                 Christopher and Mendel Rosenblum",
  editor =       "????",
  booktitle =    "USENIX Security Symposium",
  title =        "Understanding data lifetime via whole system
                 simulation",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  pages =        "??--??",
  year =         "2004",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 11:40:20 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 17]{Schneier:2015:SWC}.",
}

@Book{Cobb:2004:CD,
  author =       "Chey Cobb",
  title =        "Cryptography For Dummies",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xx + 304",
  year =         "2004",
  ISBN =         "0-7645-4188-9",
  ISBN-13 =      "978-0-7645-4188-9",
  LCCN =         "TK5102.94 .C62 2004",
  bibdate =      "Sat Jan 10 09:20:32 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$24.99",
  series =       "For dummies",
  URL =          "http://www.loc.gov/catdir/bios/wiley046/2003105686.html;
                 http://www.loc.gov/catdir/description/wiley039/2003105686.html;
                 http://www.loc.gov/catdir/toc/wiley041/2003105686.html",
  acknowledgement = ack-nhfb,
  subject =      "Telecommunication; Security measures; Popular works;
                 Data encryption (Computer science)",
}

@Article{Collberg:2004:DPB,
  author =       "C. Collberg and E. Carter and S. Debray and A.
                 Huntwork and J. Kececioglu and C. Linn and M. Stepp",
  title =        "Dynamic path-based software watermarking",
  journal =      j-SIGPLAN,
  volume =       "39",
  number =       "6",
  pages =        "107--118",
  month =        may,
  year =         "2004",
  CODEN =        "SINODQ",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Thu Dec 2 05:49:55 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
}

@Book{Convery:2004:NSA,
  author =       "Sean Convery",
  title =        "Network security architectures",
  publisher =    pub-CISCO,
  address =      pub-CISCO:adr,
  pages =        "xxxix + 739",
  year =         "2004",
  ISBN =         "1-58705-115-X",
  ISBN-13 =      "978-1-58705-115-9",
  LCCN =         "TK5105.59 .C5793 2004",
  bibdate =      "Thu Jun 23 18:36:24 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  note =         "Duplicate ISBN with \cite{Trudel:2003:DSE}.",
  series =       "Networking technology series",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures",
}

@Article{Copeland:2004:COO,
  author =       "B. Jack Copeland",
  title =        "{Colossus}: Its Origins and Originators",
  journal =      j-IEEE-ANN-HIST-COMPUT,
  volume =       "26",
  number =       "4",
  pages =        "38--45",
  month =        oct # "\slash " # dec,
  year =         "2004",
  CODEN =        "IAHCEX",
  DOI =          "https://doi.org/10.1109/MAHC.2004.26",
  ISSN =         "1058-6180 (print), 1934-1547 (electronic)",
  ISSN-L =       "1058-6180",
  bibdate =      "Sat Dec 11 18:28:43 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/dl/mags/an/2004/04/a4038.htm;
                 http://csdl.computer.org/dl/mags/an/2004/04/a4038.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=85",
}

@Article{Cornwall:2004:AAM,
  author =       "Linda A. Cornwall and Jens Jensen and David P. Kelsey
                 and {\'A}kos Frohner and Daniel Kou{\v{r}}il and Franck
                 Bonnassieux and Sophie Nicoud and K{\'a}roly
                 L{\~o}rentey and Joni Hahkala and Mika Silander and
                 Roberto Cecchini and Vincenzo Ciaschini and Luca
                 dell'Agnello and Fabio Spataro and David O'Callaghan
                 and Olle Mulmo and Gian Luca Volpato and David Groep
                 and Martijn Steenbakkers and Andrew McNab",
  title =        "Authentication and Authorization Mechanisms for
                 Multi-Domain {Grid} Environments",
  journal =      j-J-GRID-COMP,
  volume =       "2",
  number =       "4",
  pages =        "301--311",
  month =        dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10723-004-8182-y",
  ISSN =         "1570-7873 (print), 1572-9184 (electronic)",
  ISSN-L =       "1570-7873",
  bibdate =      "Wed Jul 6 08:49:48 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=1570-7873&volume=2&issue=4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=1570-7873&volume=2&issue=4&spage=301",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Grid Computing",
  journal-URL =  "http://link.springer.com/journal/10723",
}

@Article{Coron:2004:SSL,
  author =       "Jean-Sebastien Coron and David Naccache and Paul
                 Kocher",
  title =        "Statistics and secret leakage",
  journal =      j-TECS,
  volume =       "3",
  number =       "3",
  pages =        "492--508",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Fri Oct 29 06:35:47 MDT 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J840",
}

@InProceedings{Courtois:2004:FSB,
  author =       "Nicolas T. Courtois",
  title =        "{Feistel} Schemes and Bi-linear Cryptanalysis:
                 (Extended Abstract)",
  crossref =     "Franklin:2004:ACC",
  pages =        "23--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Cousot:2004:AIB,
  author =       "Patrick Cousot and Radhia Cousot",
  title =        "An abstract interpretation-based framework for
                 software watermarking",
  journal =      j-SIGPLAN,
  volume =       "39",
  number =       "1",
  pages =        "173--185",
  month =        jan,
  year =         "2004",
  CODEN =        "SINODQ",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Tue Apr 12 09:38:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
}

@InProceedings{Crescenzo:2004:CRR,
  author =       "Giovanni {Di Crescenzo} and Giuseppe Persiano and Ivan
                 Visconti",
  title =        "Constant-Round Resettable Zero Knowledge with
                 Concurrent Soundness in the Bare Public-Key Model",
  crossref =     "Franklin:2004:ACC",
  pages =        "237--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@InProceedings{Damgaard:2004:ZKP,
  author =       "Ivan Damg{\aa}rd and Serge Fehr and Louis Salvail",
  title =        "Zero-Knowledge Proofs and String Commitments
                 Withstanding Quantum Attacks",
  crossref =     "Franklin:2004:ACC",
  pages =        "254--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Dandalis:2004:ACE,
  author =       "Andreas Dandalis and Viktor K. Prasanna",
  title =        "An adaptive cryptographic engine for {Internet}
                 protocol security architectures",
  journal =      j-TODAES,
  volume =       "9",
  number =       "3",
  pages =        "333--353",
  month =        jul,
  year =         "2004",
  CODEN =        "ATASFO",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Thu Nov 4 08:12:30 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/todaes/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems (TODAES)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Article{DeBonis:2004:RSS,
  author =       "Annalisa {De Bonis} and Alfredo {De Santis}",
  title =        "Randomness in secret sharing and visual cryptography
                 schemes",
  journal =      j-THEOR-COMP-SCI,
  volume =       "314",
  number =       "3",
  pages =        "351--374",
  day =          "10",
  month =        apr,
  year =         "2004",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Thu Nov 4 10:19:14 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Book{DeBrosse:2004:SBU,
  author =       "Jim DeBrosse and Colin B. Burke",
  title =        "The secret in {Building 26}: the untold story of
                 {America}'s ultra war against the {U}-boat {Enigma}
                 codes",
  publisher =    pub-RANDOM-HOUSE,
  address =      pub-RANDOM-HOUSE:adr,
  pages =        "xxix + 272",
  year =         "2004",
  ISBN =         "0-375-50807-4, 1-58836-353-8, 0-375-75995-6",
  ISBN-13 =      "978-0-375-50807-3, 978-1-58836-353-4,
                 978-0-375-75995-6",
  LCCN =         "D810.C88 D43 2004",
  bibdate =      "Fri Jan 13 17:17:54 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/samples/random045/2003058494.html;
                 http://www.randomhouse.com/catalog/display.pperl?isbn=9781588363534",
  acknowledgement = ack-nhfb,
  remark =       "From the publisher: ``Much has been written about the
                 success of the British ``Ultra'' program in cracking
                 the Germans' Enigma code early in World War II, but few
                 know what really happened in 1942, when the Germans
                 added a fourth rotor to the machine that created the
                 already challenging naval code and plunged Allied
                 intelligence into darkness.

                 Enter one Joe Desch, an unassuming but brilliant
                 engineer at the National Cash Register Company in
                 Dayton, Ohio, who was given the task of creating a
                 machine to break the new Enigma settings. It was an
                 enterprise that rivaled the Manhattan Project for
                 secrecy and complexity---and nearly drove Desch to a
                 breakdown. Under enormous pressure, he succeeded in
                 creating a 5,000-pound electromechanical monster known
                 as the Desch Bombe, which helped turn the tide in the
                 Battle of the Atlantic---but not before a disgruntled
                 co-worker attempted to leak information about the
                 machine to the Nazis.

                 After toiling anonymously---it even took his daughter
                 years to learn of his accomplishments---Desch was
                 awarded the National Medal of Merit, the country's
                 highest civilian honor. In The Secret in Building 26,
                 the entire thrilling story of the final triumph over
                 Enigma is finally told. ''",
  subject =      "World War, 1939--1945; Cryptography; Enigma cipher
                 system; United States; History; 20th century; Desch,
                 Joseph",
}

@Article{DePalma:2004:CCS,
  author =       "Paul {De Palma} and Charles Frank and Suzanne
                 Gladfelter and Joshua Holden",
  title =        "Cryptography and computer security for
                 undergraduates",
  journal =      j-SIGCSE,
  volume =       "36",
  number =       "1",
  pages =        "94--95",
  month =        mar,
  year =         "2004",
  CODEN =        "SIGSD3",
  DOI =          "https://doi.org/10.1145/1028174.971334",
  ISSN =         "0097-8418 (print), 2331-3927 (electronic)",
  ISSN-L =       "0097-8418",
  bibdate =      "Sat Nov 17 16:57:06 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigcse2000.bib",
  abstract =     "The panel discusses solutions to the problem of
                 computer security education.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIGCSE Bulletin (ACM Special Interest Group on
                 Computer Science Education)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J688",
}

@Article{DeSantis:2004:CKA,
  author =       "Alfredo {De Santis} and Anna Lisa Ferrara and Barbara
                 Masucci",
  title =        "Cryptographic key assignment schemes for any access
                 control policy",
  journal =      j-INFO-PROC-LETT,
  volume =       "92",
  number =       "4",
  pages =        "199--205",
  day =          "30",
  month =        nov,
  year =         "2004",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 18:40:57 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Devanbu:2004:FAX,
  author =       "Premkumar Devanbu and Michael Gertz and April Kwong
                 and Charles Martel and Glen Nuckolls and Stuart G.
                 Stubblebine",
  title =        "Flexible authentication of {XML} documents",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "841--864",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12602",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@InProceedings{Dodis:2004:IPC,
  author =       "Y. Dodis and Shien Jin Ong and M. Prabhakaran and A.
                 Sahai",
  title =        "On the (im)possibility of cryptography with imperfect
                 randomness",
  crossref =     "IEEE:2004:PAI",
  pages =        "196--205",
  year =         "2004",
  bibdate =      "Fri Jul 15 16:13:03 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/9430/29918/01366239.pdf?isnumber=29918&prod=CNF&arnumber=1366239&arSt=+196&ared=+205&arAuthor=Dodis%2C+Y.%3B+Shien+Jin+Ong%3B+Prabhakaran%2C+M.%3B+Sahai%2C+A.;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=29918&arnumber=1366239&count=64&index=20",
  acknowledgement = ack-nhfb,
}

@InProceedings{Dodis:2004:REK,
  author =       "Yevgeniy Dodis and Rosario Gennaro and Johan
                 H{\aa}stad and Hugo Krawczyk and Tal Rabin",
  title =        "Randomness Extraction and Key Derivation Using the
                 {CBC}, {Cascade} and {HMAC} Modes",
  crossref =     "Franklin:2004:ACC",
  pages =        "494--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Duggan:2004:TBC,
  author =       "Dominic Duggan",
  title =        "Type-based cryptographic operations",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "485--550",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-407",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Book{Dwivedi:2004:ISS,
  author =       "Himanshu Dwivedi",
  title =        "Implementing {SSH}: strategies for optimizing the
                 secure shell",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xxvi + 376",
  year =         "2004",
  ISBN =         "0-471-45880-5",
  ISBN-13 =      "978-0-471-45880-7",
  LCCN =         "QA76.76.O63 D895 2004",
  bibdate =      "Wed Jan 21 05:31:30 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "UK\pounds 24.50",
  URL =          "ftp://uiarchive.cso.uiuc.edu/pub/etext/gutenberg/;
                 http://www.loc.gov/catdir/bios/wiley046/2004297174.html;
                 http://www.loc.gov/catdir/description/wiley041/2004297174.html;
                 http://www.loc.gov/catdir/toc/wiley041/2004297174.html",
  acknowledgement = ack-nhfb,
  remark =       "Pt. 1. SSH Basics. ch. 1. Overview of SSH ; ch. 2. SSH
                 Servers ; ch. 3. Secure Shell clients ; ch. 4.
                 Authentication ; ch. 5. SSH Management -- pt. 2. Remote
                 Access Solutions. ch. 6. SSH port forwarding ; ch. 7.
                 Secure remote access -- pt. 3. Protocol replacement.
                 ch. 8. SSH versatility ; ch. 9. Proxy technologies in a
                 secure Web environment ; ch. 10. SSH case studies.",
  subject =      "UNIX Shells; Computer networks; Security measures;
                 Data encryption (Computer science)",
}

@InProceedings{Dwork:2004:PPD,
  author =       "Cynthia Dwork and Kobbi Nissim",
  title =        "Privacy-Preserving Datamining on Vertically
                 Partitioned Databases",
  crossref =     "Franklin:2004:ACC",
  pages =        "528--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Elliott:2004:QC,
  author =       "Chip Elliott",
  title =        "Quantum Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "57--61",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.54",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4057.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4057.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ernst:2004:FBH,
  author =       "M. Ernst and B. Henhapl and S. Klupsch and S. Huss",
  title =        "{FPGA} based hardware acceleration for elliptic curve
                 public key cryptosystems",
  journal =      j-J-SYST-SOFTW,
  volume =       "70",
  number =       "3",
  pages =        "299--313",
  month =        mar,
  year =         "2004",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed May 18 10:27:23 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Fan:2004:PPI,
  author =       "Jinliang Fan and Jun Xu and Mostafa H. Ammar and Sue
                 B. Moon",
  title =        "Prefix-preserving {IP} address anonymization:
                 measurement-based security evaluation and a new
                 cryptography-based scheme",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "46",
  number =       "2",
  pages =        "253--272",
  day =          "7",
  month =        oct,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Thu Jul 14 17:03:03 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Feng:2004:PEX,
  author =       "L. Feng and W. Jonker",
  title =        "Preparations for encrypted {XML} metadata querying",
  journal =      j-INT-J-COMPUT-SYST-SCI-ENG,
  volume =       "19",
  number =       "3",
  pages =        "??--??",
  month =        may,
  year =         "2004",
  CODEN =        "CSSEEI",
  ISSN =         "0267-6192",
  bibdate =      "Sat May 14 12:27:04 2005",
  bibsource =    "http://www.crlpublishing.co.uk/cssecont04.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Systems Science and
                 Engineering",
  remark =       "Special issue: Semantics-Aware Techniques for
                 Security.",
}

@InProceedings{Fitzi:2004:PSB,
  author =       "Matthias Fitzi and Stefan Wolf and J{\"u}rg
                 Wullschleger",
  title =        "Pseudo-signatures, Broadcast, and Multi-party
                 Computation from Correlated Randomness",
  crossref =     "Franklin:2004:ACC",
  pages =        "562--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Forbes:2004:BRN,
  author =       "Scott Forbes",
  title =        "Book Reviews: {{\em A .NET Gold Mine: .NET Security
                 and Cryptography}, by Peter Thorsteinson and G. Gnana
                 Arun Ganesh (Prentice-Hall 2004, ISBN 0-13-100851-X)}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "10--10",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.38",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4010.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@InProceedings{Fundulaki:2004:SYD,
  author =       "Irini Fundulaki and Arnaud Sahuguet",
  title =        "``Share your data, keep your secrets''",
  crossref =     "ACM:2004:PAS",
  pages =        "945--946",
  year =         "2004",
  bibdate =      "Sun Nov 7 06:14:27 MST 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/pods.bib",
  acknowledgement = ack-nhfb,
}

@Article{Galbraith:2004:EDD,
  author =       "Steven D. Galbraith and Victor Rotger",
  title =        "Easy decision {Diffie--Hellman} groups",
  journal =      j-LMS-J-COMPUT-MATH,
  volume =       "7",
  pages =        "201--??",
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1461-1570",
  bibdate =      "Tue Nov 09 08:26:26 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "LMS Journal of Computation and Mathematics",
}

@Book{Garrett:2004:MCT,
  author =       "Paul B. Garrett",
  title =        "The mathematics of coding theory: information,
                 compression, error correction, and finite fields",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  pages =        "x + 398",
  year =         "2004",
  ISBN =         "0-13-101967-8",
  ISBN-13 =      "978-0-13-101967-6",
  LCCN =         "QA275 .G26 2003",
  bibdate =      "Tue Feb 15 17:18:13 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Error analysis (Mathematics); Finite fields (Algebra);
                 Coding theory",
}

@Article{Gassend:2004:IAI,
  author =       "Blaise Gassend and Daihyun Lim and Dwaine Clarke and
                 Marten van Dijk and Srinivas Devadas",
  title =        "Identification and authentication of integrated
                 circuits",
  journal =      j-CCPE,
  volume =       "16",
  number =       "11",
  pages =        "1077--1098",
  month =        sep,
  year =         "2004",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.805",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat May 14 11:30:55 MDT 2005",
  bibsource =    "http://www.interscience.wiley.com/jpages/1532-0626;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www3.interscience.wiley.com/journalfinder.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Prac\-tice and
                 Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "6 Aug 2004",
}

@Article{Gebotys:2004:DSC,
  author =       "Catherine H. Gebotys",
  title =        "Design of secure cryptography against the threat of
                 power-attacks in {DSP}-embedded processors",
  journal =      j-TECS,
  volume =       "3",
  number =       "1",
  pages =        "92--113",
  month =        feb,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Sat Mar 6 07:14:21 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J840",
}

@InProceedings{Gennaro:2004:MTC,
  author =       "Rosario Gennaro",
  title =        "Multi-trapdoor Commitments and Their Applications to
                 Proofs of Knowledge Secure Under Concurrent
                 Man-in-the-Middle Attacks",
  crossref =     "Franklin:2004:ACC",
  pages =        "220--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@InProceedings{Gentry:2004:HCR,
  author =       "Craig Gentry",
  title =        "How to Compress {Rabin} Ciphertexts and Signatures
                 (and More)",
  crossref =     "Franklin:2004:ACC",
  pages =        "179--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Book{Goldreich:2004:FCV,
  author =       "Oded Goldreich",
  title =        "Foundations of Cryptography: Volume 2: Basic
                 Applications",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "373--798",
  year =         "2004",
  ISBN =         "0-521-83084-2",
  ISBN-13 =      "978-0-521-83084-3",
  LCCN =         "QA268 .G5745 2001",
  bibdate =      "Wed Sep 14 14:23:22 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See also volume 1 \cite{Goldreich:2001:FCBa}.",
  URL =          "http://www.loc.gov/catdir/description/cam021/00049362.html;
                 http://www.loc.gov/catdir/toc/cam023/00049362.html",
  acknowledgement = ack-nhfb,
  subject =      "Coding theory; Cryptography; Mathematics",
}

@Article{Goldsmith:2004:CAI,
  author =       "Clair W. Goldsmith and Rob Kolstad",
  title =        "A Conversation About Identity Management",
  journal =      j-LOGIN,
  volume =       "29",
  number =       "5",
  pages =        "??--??",
  month =        oct,
  year =         "2004",
  CODEN =        "LOGNEM",
  ISSN =         "1044-6397",
  bibdate =      "Tue Apr 11 10:52:44 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.usenix.org/publications/login/2004-10/index.html",
  URL =          "http://www.usenix.org/publications/login/2004-10/pdfs/interview.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     ";login: the USENIX Association newsletter",
}

@InProceedings{Goodrich:2004:ETB,
  author =       "Michael T. Goodrich and Jonathan Z. Sun and Roberto
                 Tamassia",
  title =        "Efficient Tree-Based Revocation in Groups of Low-State
                 Devices",
  crossref =     "Franklin:2004:ACC",
  pages =        "511--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Gordon:2004:TEA,
  author =       "Andrew D. Gordon and Alan Jeffrey",
  title =        "Types and effects for asymmetric cryptographic
                 protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "435--483",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-406",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Gorrieri:2004:SFR,
  author =       "Roberto Gorrieri and Fabio Martinelli",
  title =        "A simple framework for real-time cryptographic
                 protocol analysis with compositional proof rules",
  journal =      j-SCI-COMPUT-PROGRAM,
  volume =       "50",
  number =       "1--3",
  pages =        "23--49",
  month =        mar,
  year =         "2004",
  CODEN =        "SCPGD4",
  ISSN =         "0167-6423 (print), 1872-7964 (electronic)",
  ISSN-L =       "0167-6423",
  bibdate =      "Fri Apr 1 18:38:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01676423",
  acknowledgement = ack-nhfb,
  fjournal =     "Science of Computer Programming",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01676423",
}

@Book{Gross:2004:MNh,
  author =       "Benedict H. Gross and Joe Harris",
  title =        "The Magic of Numbers",
  publisher =    "Pearson Education",
  address =      "Upper Saddle River, NJ, USA",
  pages =        "xiv + 287",
  year =         "2004",
  ISBN =         "0-13-177721-1",
  ISBN-13 =      "978-0-13-177721-7",
  LCCN =         "QA39.3 .G76 2003",
  MRclass =      "00Axx",
  bibdate =      "Sun Jan 10 15:34:15 MST 2021",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  author-dates = "1950--",
  subject =      "Mathematics; Matematik.",
  tableofcontents = "I: Counting \\
                 1: Simple Counting \\
                 2: The Multiplication Principle \\
                 3: The Subtraction Principle \\
                 4: Collections \\
                 5: Probability \\
                 6: The Binomial Theorem \\
                 7: Advanced Counting \\
                 \\
                 II: Arithmetic \\
                 8: Divisibility \\
                 9: Combinations \\
                 10: Primes \\
                 11: Factorization \\
                 12: Consequences \\
                 13: Relatively Prime \\
                 \\
                 III: Modular Aritmetic \\
                 14: What is a Number? \\
                 15: Modular Arithmetic \\
                 16: Congruences \\
                 17: Division \\
                 18: Powers \\
                 19: Roots \\
                 20: Eulers Theorem \\
                 \\
                 IV: Codes and Primes \\
                 21: Codes \\
                 22: Public-Key Cryptography \\
                 23: Finding Primes \\
                 24: Generators, Roots, and Passwords",
}

@Article{Guida:2004:DUP,
  author =       "Richard Guida and Robert Stahl and Thomas Bunt and
                 Gary Secrest and Joseph Moorcones",
  title =        "Deploying and Using Public Key Technology: Lessons
                 Learned in Real Life",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "67--71",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.41",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4067.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4067.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Gumz:2004:BRH,
  author =       "Joy Gumz",
  title =        "Book Review: {{\em Hacking Exposed: Network Security
                 Secrets and Solutions}, 4th ed., by Stuart McClure,
                 Joel Scambray, and George Kurtz, McGraw-Hill, 2003,
                 \$49.99, ISBN 0-07-222742-7}",
  journal =      j-QUEUE,
  volume =       "1",
  number =       "10",
  pages =        "88--88",
  month =        feb,
  year =         "2004",
  CODEN =        "AQCUAE",
  ISSN =         "1542-7730 (print), 1542-7749 (electronic)",
  ISSN-L =       "1542-7730",
  bibdate =      "Sat Mar 6 07:19:32 MST 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/queue.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Queue: Tomorrow's Computing Today",
}

@Book{Gutmann:2004:CSA,
  author =       "Peter Gutmann",
  title =        "Cryptographic Security Architecture: Design and
                 Verification",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xviii + 320",
  year =         "2004",
  ISBN =         "0-387-95387-6",
  ISBN-13 =      "978-0-387-95387-8",
  LCCN =         "QA76.9.A25 G88 2002",
  bibdate =      "Mon Oct 20 17:55:18 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.springer-ny.com/",
  acknowledgement = ack-nhfb,
}

@Article{Gutmann:2004:SPK,
  author =       "Peter Gutmann",
  title =        "Simplifying Public Key Management",
  journal =      j-COMPUTER,
  volume =       "37",
  number =       "2",
  pages =        "101--??",
  month =        feb,
  year =         "2004",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Wed May 4 16:02:09 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/comp/mags/co/2004/02/r2101abs.htm;
                 http://csdl.computer.org/dl/mags/co/2004/02/r2101.htm;
                 http://csdl.computer.org/dl/mags/co/2004/02/r2101.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Guttman:2004:ATD,
  author =       "Joshua D. Guttman",
  title =        "Authentication tests and disjoint encryption: A design
                 method for security protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "3--4",
  pages =        "409--433",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-123-405",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Guttman:2004:FAP,
  author =       "Joshua D. Guttman and F. Javier Thayer and Lenore D.
                 Zuck",
  title =        "The faithfulness of abstract protocol analysis:
                 Message authentication",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "865--891",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12603",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Haastad:2004:SAR,
  author =       "Johan H{\aa}stad and Mats N{\aa}slund",
  title =        "The security of all {RSA} and discrete log bits",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "2",
  pages =        "187--230",
  month =        mar,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Mar 6 07:04:43 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@InProceedings{Halpern:2004:RSS,
  author =       "Joseph Halpern and Vanessa Teague",
  title =        "Rational secret sharing and multiparty computation:
                 extended abstract",
  crossref =     "ACM:2004:PAA",
  pages =        "623--632",
  year =         "2004",
  bibdate =      "Wed Apr 5 05:59:11 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Hankerson:2004:GEC,
  author =       "Darrel Hankerson and Alfred J. Menezes and Scott
                 Vanstone",
  title =        "Guide to Elliptic Curve Cryptography",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xx + 311",
  year =         "2004",
  ISBN =         "0-387-95273-X",
  ISBN-13 =      "978-0-387-95273-4",
  LCCN =         "QA76.9.A25 H37 2003",
  bibdate =      "Fri Mar 05 17:54:57 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$59.95",
  acknowledgement = ack-nhfb,
}

@InProceedings{Hawkes:2004:RVC,
  author =       "Philip Hawkes and Gregory G. Rose",
  title =        "Rewriting Variables: The Complexity of Fast Algebraic
                 Attacks on Stream Ciphers",
  crossref =     "Franklin:2004:ACC",
  pages =        "390--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Hayat:2004:CSE,
  author =       "Khawaja Amer Hayat and Umar Waqar Anis and S.
                 Tauseef-ur-Rehman",
  title =        "Cryptanalysis of some encryption\slash cipher schemes
                 using related key attack",
  journal =      j-SIGCSE,
  volume =       "36",
  number =       "4",
  pages =        "85--87",
  month =        dec,
  year =         "2004",
  CODEN =        "SIGSD3",
  DOI =          "https://doi.org/10.1145/1041624.1041665",
  ISSN =         "0097-8418 (print), 2331-3927 (electronic)",
  ISSN-L =       "0097-8418",
  bibdate =      "Sat Nov 17 16:57:12 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigcse2000.bib",
  note =         "{NOTE FROM ACM}: It has been determined that the
                 authors of this article plagiarized the contents from a
                 previously published paper. Therefore {ACM} has shut
                 off access to this paper.",
  abstract =     "NOTE FROM ACM: It has been determined that the authors
                 of this article plagiarized the contents from a
                 previously published paper. Therefore ACM has shut off
                 access to this paper. To see the paper that was
                 plagiarized, click here Additional Links The citation
                 in ACM's Guide to Computing Literature, click here The
                 available link from Springer, click here For further
                 information, contact the ACM Director of
                 Publications.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIGCSE Bulletin (ACM Special Interest Group on
                 Computer Science Education)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J688",
}

@Article{Hernandez:2004:FED,
  author =       "Julio C. Hernandez and Pedro Isasi",
  title =        "Finding Efficient Distinguishers for Cryptographic
                 Mappings, with an Application to the Block Cipher
                 {TEA}",
  journal =      j-COMPUT-INTELL,
  volume =       "20",
  number =       "3",
  pages =        "517--525",
  month =        aug,
  year =         "2004",
  CODEN =        "COMIE6",
  DOI =          "https://doi.org/10.1111/j.0824-7935.2004.00250.x",
  ISSN =         "0824-7935 (print), 1467-8640 (electronic)",
  ISSN-L =       "0824-7935",
  bibdate =      "Fri Apr 1 07:46:37 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/computintell.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "Comput. Intell.",
  fjournal =     "Computational Intelligence",
  journal-URL =  "https://onlinelibrary.wiley.com/journal/14678640",
  onlinedate =   "27 July 2004",
}

@Article{Hernandez:2004:STN,
  author =       "Julio C. Hernandez and Jos{\'e} Mar{\'\i}a Sierra and
                 Andre Seznec",
  title =        "The {SAC} Test: a New Randomness Test, with Some
                 Applications to {PRNG} Analysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2004",
  pages =        "960--967",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-540-24707-4_108",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Feb 01 16:40:34 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.springerlink.com/content/an44921nlaa5bf0g/",
  abstract =     "A new statistical test for randomness, the SAC test,
                 is presented, together with its results over some
                 well-known generators in the literature. These results
                 are analyzed and some possible applications of the
                 test, as for measuring the strength of cryptographic
                 primitives including block ciphers, stream ciphers and
                 pseudorandom number generators, especially during the
                 design and analysis phase, are detailed. Finally, the
                 source code for the SAC test is provided, which proves
                 some of its other advantages: it is easy to implement,
                 and very fast so well-suited for practical
                 applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hess:2004:CTT,
  author =       "Adam Hess and Jason Holt and Jared Jacobson and Kent
                 E. Seamons",
  title =        "Content-triggered trust negotiation",
  journal =      j-TISSEC,
  volume =       "7",
  number =       "3",
  pages =        "428--456",
  month =        aug,
  year =         "2004",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Nov 4 08:41:51 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Hess:2004:GAR,
  author =       "Florian Hess",
  title =        "The {GHS} attack revisited",
  journal =      j-LMS-J-COMPUT-MATH,
  volume =       "7",
  pages =        "167--??",
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1461-1570",
  bibdate =      "Tue Nov 09 08:26:26 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "LMS Journal of Computation and Mathematics",
  keywords =     "elliptic curve discrete logarithm problem (ECDLP)",
}

@Article{Hess:2004:SVE,
  author =       "F. Hess",
  title =        "On the security of the verifiably-encrypted signature
                 scheme of {Boneh}, {Gentry}, {Lynn} and {Shacham}",
  journal =      j-INFO-PROC-LETT,
  volume =       "89",
  number =       "3",
  pages =        "111--114",
  day =          "14",
  month =        feb,
  year =         "2004",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jan 26 08:44:33 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Hodjat:2004:HTP,
  author =       "Alireza Hodjat and Ingrid Verbauwhede",
  title =        "High-Throughput Programmable Cryptocoprocessor",
  journal =      j-IEEE-MICRO,
  volume =       "24",
  number =       "3",
  pages =        "34--45",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "IEMIDZ",
  DOI =          "https://doi.org/10.1109/MM.2004.11",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Sat Dec 11 17:59:16 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/dl/mags/mi/2004/03/m3034.htm;
                 http://csdl.computer.org/dl/mags/mi/2004/03/m3034.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Micro",
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
}

@Book{Hoglund:2004:ESH,
  author =       "Greg Hoglund and Gary McGraw",
  title =        "Exploiting software: how to break code",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xxxv + 471",
  year =         "2004",
  ISBN =         "0-201-78695-8 (paperback)",
  ISBN-13 =      "978-0-201-78695-8 (paperback)",
  LCCN =         "QA76.9.A25 H635 2004",
  bibdate =      "Thu Jun 23 18:36:27 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip0411/2003025556.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Computer software; Testing;
                 Computer hackers",
}

@InProceedings{Holenstein:2004:CCB,
  author =       "Thomas Holenstein and Ueli Maurer and Johan
                 Sj{\"o}din",
  title =        "Complete Classification of Bilinear Hard-Core
                 Functions",
  crossref =     "Franklin:2004:ACC",
  pages =        "73--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Hong:2004:DCT,
  author =       "Seokhie Hong and Deukjo Hong and Youngdai Ko and
                 Donghoon Chang and Wonil Lee and Sangjin Lee",
  title =        "Differential Cryptanalysis of {TEA} and {XTEA}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "2971",
  pages =        "402--417",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-540-24691-6_30",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Feb 01 16:53:31 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.springerlink.com/content/n4exvw35x7g8t6pb/",
  abstract =     "TEA and XTEA are simple block ciphers consisting of
                 exclusive-or, addition, and shift. Although their round
                 functions are very simple and guarantee a little
                 security, large number of 64 rounds have made them
                 secure enough. It seems that the best result for TEA is
                 the related-key attack [3], but it is less reasonable
                 than such attacks for one key as differential and
                 linear attacks. Impossible differential attacks on
                 12-round TEA and 14-round XTEA are best results except
                 for related-key attack [5]. We suggest differential and
                 truncated differential attacks on TEA and XTEA better
                 than them. Our best results on TEA and XTEA are attacks
                 on 17-round TEA and 23-round XTEA.",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
  keywords =     "Block cipher; differential cryptanalysis; TEA;
                 truncated differential cryptanalysis; XTEA",
}

@InProceedings{Hsiao:2004:FCP,
  author =       "Chun-Yuan Hsiao and Leonid Reyzin",
  title =        "Finding Collisions on a Public Road, or Do Secure Hash
                 Functions Need Secret Coins?",
  crossref =     "Franklin:2004:ACC",
  pages =        "92--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Hsu:2004:EPS,
  author =       "Chien-Lung Hsu and Tzong-Sun Wu",
  title =        "Efficient proxy signature schemes using self-certified
                 public keys",
  journal =      j-APPL-MATH-COMP,
  volume =       "152",
  number =       "3",
  pages =        "807--820",
  day =          "13",
  month =        may,
  year =         "2004",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:31 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Hsu:2004:GOS,
  author =       "Chien-Lung Hsu and Tzong-Sun Wu and Tzong-Chen Wu",
  title =        "Group-oriented signature scheme with distinguished
                 signing authorities",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "20",
  number =       "5",
  pages =        "865--873",
  day =          "15",
  month =        jun,
  year =         "2004",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Jul 15 08:00:45 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Huang:2004:NDE,
  author =       "Hui-Feng Huang and Chin-Chen Chang",
  title =        "A new design of efficient partially blind signature
                 scheme",
  journal =      j-J-SYST-SOFTW,
  volume =       "73",
  number =       "3",
  pages =        "397--403",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed May 18 10:27:26 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Hughes:2004:ISE,
  author =       "Jim Hughes",
  title =        "{IEEE} Standard for Encrypted Storage",
  journal =      j-COMPUTER,
  volume =       "37",
  number =       "11",
  pages =        "110--??",
  month =        nov,
  year =         "2004",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2004.210",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Wed May 4 16:02:13 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/dl/mags/co/2004/11/ry110.htm;
                 http://csdl.computer.org/dl/mags/co/2004/11/ry110.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Book{Husemoller:2004:EC,
  author =       "Dale Husem{\"o}ller",
  title =        "Elliptic curves",
  volume =       "111",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  edition =      "Second",
  pages =        "xxi + 487",
  year =         "2004",
  ISBN =         "0-387-95490-2",
  ISBN-13 =      "978-0-387-95490-5",
  LCCN =         "QA567 .H897 2004",
  bibdate =      "Wed Mar 12 17:13:23 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  note =         "With appendices by Stefan Theisen, Otto Forster, and
                 Ruth Lawrence.",
  series =       "Graduate texts in mathematics",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0814/2002067016-d.html;
                 http://www.loc.gov/catdir/enhancements/fy0814/2002067016-t.html",
  acknowledgement = ack-nhfb,
  subject =      "Curves, Elliptic; Curves, Algebraic; Group schemes
                 (Mathematics)",
}

@Article{Hwang:2004:KAS,
  author =       "Min-Shiang Hwang and Li-Hua Li and Cheng-Chi Lee",
  title =        "A key authentication scheme with non-repudiation",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "3",
  pages =        "75--78",
  month =        jul,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:48 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Hwang:2004:NMP,
  author =       "Shin-Jia Hwang and Chiu-Chin Chen",
  title =        "New multi-proxy multi-signature schemes",
  journal =      j-APPL-MATH-COMP,
  volume =       "147",
  number =       "1",
  pages =        "57--67",
  day =          "5",
  month =        jan,
  year =         "2004",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Fri Jan 9 08:41:15 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Hwang:2004:REL,
  author =       "Shin-Jia Hwang and Yun-Hua Lee",
  title =        "Repairing {ElGamal}-like multi-signature schemes using
                 self-certified public keys",
  journal =      j-APPL-MATH-COMP,
  volume =       "156",
  number =       "1",
  pages =        "73--83",
  day =          "25",
  month =        aug,
  year =         "2004",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:34 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Isasi:2004:IAE,
  author =       "Pedro Isasi and Julio C. Hernandez",
  title =        "Introduction to the Applications of Evolutionary
                 Computation in Computer Security and Cryptography",
  journal =      j-COMPUT-INTELL,
  volume =       "20",
  number =       "3",
  pages =        "445--449",
  month =        aug,
  year =         "2004",
  CODEN =        "COMIE6",
  DOI =          "https://doi.org/10.1111/j.0824-7935.2004.00244.x",
  ISSN =         "0824-7935 (print), 1467-8640 (electronic)",
  ISSN-L =       "0824-7935",
  bibdate =      "Fri Apr 1 07:46:37 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/computintell.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "Comput. Intell.",
  fjournal =     "Computational Intelligence",
  journal-URL =  "https://onlinelibrary.wiley.com/journal/14678640",
  onlinedate =   "27 July 2004",
}

@Book{ISO:2004:IIIb,
  author =       "{ISO}",
  title =        "{ISO\slash IEC} 10118-3:2004: Information technology
                 --- Security techniques --- Hash-functions --- Part 3:
                 Dedicated hash-functions",
  publisher =    pub-ISO,
  address =      pub-ISO:adr,
  pages =        "94",
  month =        feb,
  year =         "2004",
  bibdate =      "Tue Feb 07 07:44:15 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.iso.org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=39876",
  abstract =     "ISO/IEC 10118-3:2004 specifies the following seven
                 dedicated hash-functions, i.e., specially-designed
                 hash-functions:\par

                 \begin{itemize} \item the first hash-function
                 (RIPEMD-160) in Clause 7 provides hash-codes of lengths
                 up to 160 bits; \item the second hash-function
                 (RIPEMD-128) in Clause 8 provides hash-codes of lengths
                 up to 128 bits; \item the third hash-function (SHA-1)
                 in Clause 9 provides hash-codes of lengths up to 160
                 bits; \item the fourth hash-function (SHA-256) in
                 Clause 10 provides hash-codes of lengths up to 256
                 bits; \item the fifth hash-function (SHA-512) in Clause
                 11 provides hash-codes of lengths up to 512 bits; \item
                 the sixth hash-function (SHA-384) in Clause 12 provides
                 hash-codes of a fixed length, 384 bits; and \item the
                 seventh hash-function (WHIRLPOOL) in Clause 13 provides
                 hash-codes of lengths up to 512 bits. \end{itemize}

                 For each of these dedicated hash-functions, ISO/IEC
                 10118-3:2004 specifies a round-function that consists
                 of a sequence of sub-functions, a padding method,
                 initializing values, parameters, constants, and an
                 object identifier as normative information, and also
                 specifies several computation examples as informative
                 information.",
  acknowledgement = ack-nhfb,
  xxISBN =       "????",
  xxLCCN =       "",
}

@Article{Jaeger:2004:CAA,
  author =       "Trent Jaeger and Antony Edwards and Xiaolan Zhang",
  title =        "Consistency analysis of authorization hook placement
                 in the {Linux} security modules framework",
  journal =      j-TISSEC,
  volume =       "7",
  number =       "2",
  pages =        "175--205",
  month =        may,
  year =         "2004",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Nov 4 08:41:51 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Jiang:2004:FAP,
  author =       "Rui Jiang and Li Pan and Jian-Hua Li",
  title =        "Further analysis of password authentication schemes
                 based on authentication tests",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "469--477",
  month =        sep,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001038",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Joux:2004:MIH,
  author =       "Antoine Joux",
  title =        "Multicollisions in Iterated Hash Functions.
                 Application to Cascaded Constructions",
  crossref =     "Franklin:2004:ACC",
  pages =        "306--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Juang:2004:EPA,
  author =       "Wen-Shenq Juang",
  title =        "Efficient password authenticated key agreement using
                 smart cards",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "2",
  pages =        "167--173",
  month =        mar,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000252",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Juang:2004:FBT,
  author =       "Wen-Shenq Juang and Horng-Twu Liaw",
  title =        "Fair blind threshold signatures in wallet with
                 observers",
  journal =      j-J-SYST-SOFTW,
  volume =       "72",
  number =       "1",
  pages =        "25--31",
  month =        jun,
  year =         "2004",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed May 18 10:27:24 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@InProceedings{Katz:2004:ROS,
  author =       "Jonathan Katz and Rafail Ostrovsky",
  title =        "Round-Optimal Secure Two-Party Computation",
  crossref =     "Franklin:2004:ACC",
  pages =        "335--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Kim:2004:TBG,
  author =       "Yongdae Kim and Adrian Perrig and Gene Tsudik",
  title =        "Tree-based group key agreement",
  journal =      j-TISSEC,
  volume =       "7",
  number =       "1",
  pages =        "60--96",
  month =        feb,
  year =         "2004",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Nov 4 08:41:51 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Kirovski:2004:DWF,
  author =       "Darko Kirovski and Henrique and Yacov Yacobi",
  title =        "A Dual Watermark-Fingerprint System",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "11",
  number =       "3",
  pages =        "59--73",
  month =        jul # "\slash " # sep,
  year =         "2004",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/MMUL.2004.1",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Sat Dec 11 17:34:41 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/dl/mags/mu/2004/03/u3059.htm;
                 http://csdl.computer.org/dl/mags/mu/2004/03/u3059.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Multimedia",
}

@Article{Koblitz:2004:OTS,
  author =       "Neal Koblitz and Alfred J. Menezes",
  title =        "Obstacles to the torsion-subgroup attack on the
                 decision {Diffie--Hellman Problem}",
  journal =      j-MATH-COMPUT,
  volume =       "73",
  number =       "248",
  pages =        "2027--2041",
  month =        oct,
  year =         "2004",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (print), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Wed Aug 11 08:23:09 MDT 2004",
  bibsource =    "http://www.ams.org/mcom/2004-73-248;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ams.org/mcom/2004-73-248/S0025-5718-04-01637-0/home.html;
                 http://www.ams.org/mcom/2004-73-248/S0025-5718-04-01637-0/S0025-5718-04-01637-0.dvi;
                 http://www.ams.org/mcom/2004-73-248/S0025-5718-04-01637-0/S0025-5718-04-01637-0.pdf;
                 http://www.ams.org/mcom/2004-73-248/S0025-5718-04-01637-0/S0025-5718-04-01637-0.ps;
                 http://www.ams.org/mcom/2004-73-248/S0025-5718-04-01637-0/S0025-5718-04-01637-0.tex",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
}

@Article{Koblitz:2004:SPK,
  author =       "Neal Koblitz and Alfred J. Menezes",
  title =        "A Survey of Public-Key Cryptosystems",
  journal =      j-SIAM-REVIEW,
  volume =       "46",
  number =       "4",
  pages =        "599--634",
  month =        dec,
  year =         "2004",
  CODEN =        "SIREAD",
  DOI =          "https://doi.org/10.1137/S0036144503439190",
  ISSN =         "0036-1445 (print), 1095-7200 (electronic)",
  ISSN-L =       "0036-1445",
  bibdate =      "Sat Apr 16 12:47:34 MDT 2005",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toc/SIREV/46/4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://epubs.siam.org/sam-bin/dbq/article/43919",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Review",
  journal-URL =  "http://epubs.siam.org/sirev",
}

@Book{Kozaczuk:2004:EHP,
  author =       "W{\l}adys{\l}aw Kozaczuk and Jerzy Straszak",
  title =        "{Enigma}: how the {Poles} broke the {Nazi} code",
  publisher =    "Hippocrene Books",
  address =      "New York, NY, USA",
  pages =        "viii + 163",
  year =         "2004",
  ISBN =         "0-7818-0941-X",
  ISBN-13 =      "978-0-7818-0941-2",
  LCCN =         "D810.C88 K67 2004",
  bibdate =      "Thu Feb 23 07:27:33 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/fy051/2004040636.html",
  acknowledgement = ack-nhfb,
  subject =      "Enigma cipher system; ULTRA (Intelligence system);
                 World War, 1939-1945; Electronic intelligence; Poland;
                 Great Britain; Cryptography; History; 20th century",
}

@Article{Ku:2004:HBS,
  author =       "Wei-Chi Ku",
  title =        "A hash-based strong-password authentication scheme
                 without using {Smart Cards}",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "1",
  pages =        "29--34",
  month =        jan,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:37 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@InProceedings{Kurosawa:2004:NPH,
  author =       "Kaoru Kurosawa and Yvo Desmedt",
  title =        "A New Paradigm of Hybrid Encryption Scheme",
  crossref =     "Franklin:2004:ACC",
  pages =        "426--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Lai:2004:SGS,
  author =       "Chun-Pong Lai and Cunsheng Ding",
  title =        "Several Generalizations of {Shamir's} Secret Sharing
                 Scheme",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "15",
  number =       "2",
  pages =        "445--??",
  month =        apr,
  year =         "2004",
  CODEN =        "IFCSEN",
  ISSN =         "0129-0541 (print), 1793-6373 (electronic)",
  ISSN-L =       "0129-0541",
  bibdate =      "Thu Jan 06 08:20:19 2005",
  bibsource =    "http://ejournals.wspc.com.sg/ijfcs/mkt/archive.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Landau:2004:PNS,
  author =       "Susan Landau",
  title =        "Polynomials in the Nation's Service: Using Algebra to
                 Design the {Advanced Encrypted Standard}",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "111",
  number =       "2",
  pages =        "89--117",
  month =        feb,
  year =         "2004",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Tue Mar 16 06:13:26 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://research.sun.com/people/slandau/maa1.pdf;
                 http://www.esat.kuleuven.ac.be/~rijmen/rijndael;
                 http://www.rsasecurity.com/rsalabs/faq3-1.html",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@InProceedings{Landau:2004:SLE,
  author =       "Susan Landau",
  title =        "Security, Liberty, and Electronic Communications",
  crossref =     "Franklin:2004:ACC",
  pages =        "355--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Lee:2004:CIB,
  author =       "Wei-Bin Lee and Kuan-Chieh Liao",
  title =        "Constructing identity-based cryptosystems for discrete
                 logarithm based cryptosystems",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "27",
  number =       "4",
  pages =        "191--199",
  month =        nov,
  year =         "2004",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:42:56 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804504000268",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Lee:2004:CUA,
  author =       "Sung-Woon Lee and Hyun-Sung Kim and Kee-Young Yoo",
  title =        "Cryptanalysis of a user authentication scheme using
                 hash functions",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "1",
  pages =        "24--28",
  month =        jan,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:37 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Lee:2004:CUS,
  author =       "Narn-Yih Lee and Pei-Hsiu Ho",
  title =        "Convertible undeniable signature with subliminal
                 channels",
  journal =      j-APPL-MATH-COMP,
  volume =       "158",
  number =       "1",
  pages =        "169--175",
  day =          "25",
  month =        oct,
  year =         "2004",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:36 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Lee:2004:DEB,
  author =       "Chang-Doo Lee and Bong-Jun Choi and Kyoo-Seok Park",
  title =        "Design and evaluation of a block encryption algorithm
                 using dynamic-key mechanism",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "20",
  number =       "2",
  pages =        "327--338",
  day =          "16",
  month =        feb,
  year =         "2004",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Jul 15 08:00:44 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Lee:2004:DIS,
  author =       "Wongoo Lee and Jaekwang Lee",
  title =        "Design and implementation of secure e-mail system
                 using elliptic curve cryptosystem",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "20",
  number =       "2",
  pages =        "315--326",
  day =          "16",
  month =        feb,
  year =         "2004",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Jul 15 08:00:44 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Lee:2004:ETP,
  author =       "Tian-Fu Lee and Tzonelih Hwang and Chun-Li Lin",
  title =        "Enhanced three-party encrypted key exchange without
                 server public keys",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "7",
  pages =        "571--577",
  month =        oct,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001762",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lee:2004:FIM,
  author =       "Narn-Yih Lee and Ming-Feng Lee",
  title =        "Further improvement on the modified authenticated key
                 agreement scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "157",
  number =       "3",
  pages =        "729--733",
  day =          "15",
  month =        oct,
  year =         "2004",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:36 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Lee:2004:IAK,
  author =       "Narn-Yih Lee and Chien-Nan Wu",
  title =        "Improved authentication key exchange protocol without
                 using one-way hash function",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "2",
  pages =        "85--92",
  month =        apr,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:43 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Lee:2004:MPA,
  author =       "Young-Ran Lee and Hyang-Sook Lee and Ho-Kyu Lee",
  title =        "Multi-party authenticated key agreement protocols from
                 multi-linear forms",
  journal =      j-APPL-MATH-COMP,
  volume =       "159",
  number =       "2",
  pages =        "317--331",
  day =          "6",
  month =        dec,
  year =         "2004",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:38 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Lee:2004:SAA,
  author =       "Cheng-Chi Lee and Min-Shiang Hwang and I-En Liao",
  title =        "A server assisted authentication protocol for
                 detecting error vectors",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "2",
  pages =        "93--96",
  month =        apr,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:43 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Lee:2004:SPM,
  author =       "Hyang-Sook Lee",
  title =        "A self-pairing map and its applications to
                 cryptography",
  journal =      j-APPL-MATH-COMP,
  volume =       "151",
  number =       "3",
  pages =        "671--678",
  day =          "15",
  month =        apr,
  year =         "2004",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:30 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Lee:2004:SSP,
  author =       "Jung-Seuk Lee and Jun-Cheol Jeon and Kee-Young Yoo",
  title =        "A security scheme for protecting security policies in
                 firewall",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "2",
  pages =        "69--72",
  month =        apr,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:43 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Lekkas:2004:CNL,
  author =       "Dimitris Lekkas and Dimitris Gritzalis",
  title =        "Cumulative notarization for long-term preservation of
                 digital signatures",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "413--424",
  month =        jul,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001014",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Levi:2004:UNC,
  author =       "Albert Levi and M. Ufuk Caglayan and Cetin K. Koc",
  title =        "Use of nested certificates for efficient, dynamic, and
                 trust preserving public key infrastructure",
  journal =      j-TISSEC,
  volume =       "7",
  number =       "1",
  pages =        "21--59",
  month =        feb,
  year =         "2004",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Nov 4 08:41:51 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Li:2004:CAB,
  author =       "Hua Li and Chang N. Zhang",
  title =        "A Cellular Automata Based Reconfigurable Architecture
                 for Hybrid Cryptosystems",
  journal =      j-COMP-J,
  volume =       "47",
  number =       "3",
  pages =        "320--328",
  month =        may,
  year =         "2004",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Jun 8 12:55:15 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_47/Issue_03/",
  URL =          "",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Li:2004:CES,
  author =       "Li-Hua Li and Chi-Yu Liu and Min-Shiang Hwang",
  title =        "Cryptanalysis of an efficient secure group signature
                 scheme",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "4",
  pages =        "66--69",
  month =        oct,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:53 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Li:2004:QAU,
  author =       "Xiaoyu Li and Howard Barnum",
  title =        "Quantum Authentication Using Entangled States",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "15",
  number =       "4",
  pages =        "609--??",
  month =        aug,
  year =         "2004",
  CODEN =        "IFCSEN",
  ISSN =         "0129-0541 (print), 1793-6373 (electronic)",
  ISSN-L =       "0129-0541",
  bibdate =      "Thu Jan 6 06:10:33 MST 2005",
  bibsource =    "http://ejournals.wspc.com.sg/ijfcs/mkt/archive.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Li:2004:WMS,
  author =       "Li Li and David Zhang and Zhigeng Pan and Jiaoying Shi
                 and Kun Zhou and Kai Ye",
  title =        "Watermarking {3D} mesh by spherical parameterization",
  journal =      j-COMPUTERS-AND-GRAPHICS,
  volume =       "28",
  number =       "6",
  pages =        "981--989",
  month =        dec,
  year =         "2004",
  CODEN =        "COGRD2",
  ISSN =         "0097-8493 (print), 1873-7684 (electronic)",
  ISSN-L =       "0097-8493",
  bibdate =      "Thu Jul 14 18:00:20 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00978493",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Graphics",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00978493",
}

@Article{Liaw:2004:SPA,
  author =       "Horng-Twu Liaw and Shiou-Wei Fan and Wei-Chen Wu",
  title =        "A simple password authentication using a polynomial",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "4",
  pages =        "74--79",
  month =        oct,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:53 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Lin:2004:SIS,
  author =       "Chang-Chou Lin and Wen-Hsiang Tsai",
  title =        "Secret image sharing with steganography and
                 authentication",
  journal =      j-J-SYST-SOFTW,
  volume =       "73",
  number =       "3",
  pages =        "405--414",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed May 18 10:27:26 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Lin:2004:SOT,
  author =       "Min-Hui Lin and Chin-Chen Chang",
  title =        "A secure one-time password authentication scheme with
                 low-computation for mobile communications",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "2",
  pages =        "76--84",
  month =        apr,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:43 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Lindquist:2004:JCS,
  author =       "T. Lindquist and M. Diarra and B. Millard",
  title =        "A {Java} Cryptography Service Provider Implementing
                 One-Time Pad ({INIDP04})",
  journal =      "Proceedings of the Annual Hawaii International
                 Conference on System Sciences",
  volume =       "CONF37",
  pages =        "189",
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1060-3425",
  bibdate =      "Mon Feb 23 16:27:22 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 Ingenta database",
  acknowledgement = ack-nhfb,
}

@Article{Liu:2004:MBA,
  author =       "Donggang Liu and Peng Ning",
  title =        "Multilevel {$ \mu $TESLA}: {Broadcast} authentication
                 for distributed sensor networks",
  journal =      j-TECS,
  volume =       "3",
  number =       "4",
  pages =        "800--836",
  month =        nov,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Fri Oct 29 06:35:48 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J840",
}

@Article{Lopez:2004:AAI,
  author =       "Javier Lopez and Rolf Oppliger and G{\"u}nther
                 Pernul",
  title =        "Authentication and authorization infrastructures
                 {(AAIs)}: a comparative survey",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "7",
  pages =        "578--590",
  month =        oct,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001828",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Lu:2004:FCA,
  author =       "Yi Lu and Serge Vaudenay",
  title =        "Faster Correlation Attack on {Bluetooth} Keystream
                 Generator {E0}",
  crossref =     "Franklin:2004:ACC",
  pages =        "407--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Lu:2004:XMS,
  author =       "Eric Jui-Lin Lu and Rai-Fu Chen",
  title =        "An {XML} multisignature scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "149",
  number =       "1",
  pages =        "1--14",
  day =          "5",
  month =        feb,
  year =         "2004",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Fri Jan 9 08:41:21 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Luo:2004:UUR,
  author =       "Haiyun Luo and Jiejun Kong and Petros Zerfos and
                 Songwu Lu and Lixia Zhang",
  title =        "{URSA}: ubiquitous and robust access control for
                 mobile ad hoc networks",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "12",
  number =       "6",
  pages =        "1049--1063",
  month =        dec,
  year =         "2004",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2004.838598",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Tue Apr 12 07:15:18 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Madsen:2004:FFD,
  author =       "Wayne Madsen",
  title =        "Former {FBI Director} says encryption fuels
                 terrorists",
  journal =      j-NETWORK-SECURITY,
  volume =       "2004",
  number =       "4",
  pages =        "1, 3",
  month =        apr,
  year =         "2004",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(04)00059-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:58:58 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485804000595",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Book{Mahle:2004:DDI,
  author =       "Melissa Boyle Mahle",
  title =        "Denial and deception: an insider's view of the {CIA}
                 from {Iran--Contra} to 9/11",
  publisher =    "Nation Books",
  address =      "New York, NY, USA",
  pages =        "xi + 403",
  year =         "2004",
  ISBN =         "1-56025-649-4",
  ISBN-13 =      "978-1-56025-649-6",
  LCCN =         "JK468.I6 M333 2004",
  bibdate =      "Thu Jan 19 12:30:08 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Intelligence service; United States",
  tableofcontents = "September 11, 2001. Intelligence failure \par

                 The Webster years (May 26, 1987--August 31, 1991).
                 Iran--Contra legacy; Directorate of operations; Setting
                 new standards \par

                 The Gates years (November 6, 1991--January 20, 1993).
                 Confirmation of an insider; A new vision; Rethinking
                 covert action; The directorate of intelligence;
                 Post-Cold War convulsions \par

                 The Woolsey years (February 5, 1993--January 10, 1995).
                 The technocrat and the new world order; New directions;
                 Adrich Ames; Doing less with less; Woolsey's undoing
                 \par

                 The Deutch years (May 10, 1995--December 15, 1996). The
                 reluctant spy; Politically correct espionage; Al-Qa'ida
                 dawns; Mission alignment; Unethical spies; Turf and
                 policy battles; The CIA bites back \par

                 The Tenet years (July 11, 1997--July 11, 2004). A
                 pleasant surprise; War on terrorism; The dark side;
                 Help wanted; Failure; Out of the foxhole \par

                 The years ahead. Epilogue.",
}

@Book{Mao:2004:MCT,
  author =       "Wenbo Mao",
  title =        "Modern Cryptography: Theory and Practice",
  publisher =    pub-PHPTR,
  address =      pub-PHPTR:adr,
  pages =        "xxxviii + 707",
  year =         "2004",
  ISBN =         "0-13-066943-1, 0-13-288741-X (on-demand digital
                 reprint)",
  ISBN-13 =      "978-0-13-066943-8, 978-0-13-288741-0 (on-demand
                 digital reprint)",
  LCCN =         "????",
  bibdate =      "Wed Dec 03 07:48:43 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$54.99",
  acknowledgement = ack-nhfb,
  tableofcontents = "Part 1. Introduction \\
                 Beginning with a simple communication game \\
                 Wrestling between safeguard and attack \\
                 Part 2. Mathematical foundations \\
                 Probability and information theory \\
                 Computational complexity \\
                 Algebraic foundations \\
                 Number theory \\
                 Part 3. Basic cryptographic techniques \\
                 Encryption: symmetric techniques \\
                 Encryption: asymmetric techniques \\
                 In an ideal world: bit security of the basic public-key
                 cryptographic functions \\
                 Data integrity techniques \\
                 Part 4. Authentication \\
                 Authentication protocols: principles \\
                 Authentication protocols: the real world \\
                 Authentication framework for public-key cryptography
                 \\
                 Part 5. Formal approaches to security establishment \\
                 Formal and strong security definitions for public-key
                 cryptosystems \\
                 Provably secure and efficient public-key cryptosystems
                 \\
                 Strong and provable security for digital signatures \\
                 Formal methods for authentication protocols analysis
                 \\
                 Part 6. Cryptographic protocols \\
                 Zero-knowledge protocols \\
                 Returning to ``coin flipping over telephone'' \\
                 Afterremark",
}

@Article{Martel:2004:GMA,
  author =       "Charles Martel and Glen Nuckolls and Premkumar Devanbu
                 and Michael Gertz and April Kwong and Stuart G.
                 Stubblebine",
  title =        "A General Model for Authenticated Data Structures",
  journal =      j-ALGORITHMICA,
  volume =       "39",
  number =       "1",
  pages =        "21--41",
  month =        jan,
  year =         "2004",
  CODEN =        "ALGOEJ",
  DOI =          "https://doi.org/10.1007/s00453-003-1076-8",
  ISSN =         "0178-4617 (print), 1432-0541 (electronic)",
  ISSN-L =       "0178-4617",
  MRclass =      "68P15 (68P25)",
  MRnumber =     "MR2036441 (2004k:68039)",
  bibdate =      "Fri Jan 6 11:42:46 MST 2006",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0178-4617&volume=39&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/index-table-a.html#algorithmica;
                 MathSciNet database",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0178-4617&volume=39&issue=1&spage=21",
  acknowledgement = ack-nhfb,
  fjournal =     "Algorithmica. An International Journal in Computer
                 Science",
  journal-URL =  "http://link.springer.com/journal/453",
}

@Article{Martin:2004:AMC,
  author =       "Cynthia E. Martin and Jeffrey H. Dunn",
  title =        "Authentication mechanisms for call control message
                 integrity and origin verification",
  journal =      j-BELL-LABS-TECH-J,
  volume =       "8",
  number =       "4",
  pages =        "71--91",
  month =        "Winter",
  year =         "2004",
  CODEN =        "BLTJFD",
  DOI =          "https://doi.org/10.1002/bltj.10088",
  ISSN =         "1089-7089 (print), 1538-7305 (electronic)",
  ISSN-L =       "1089-7089",
  bibdate =      "Fri Nov 26 17:31:33 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Bell Labs Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
  onlinedate =   "5 Feb 2004",
}

@Article{Mastroeni:2004:APA,
  author =       "Isabella Mastroeni",
  title =        "Algebraic Power Analysis by Abstract Interpretation",
  journal =      j-HIGHER-ORDER-SYMB-COMPUT,
  volume =       "17",
  number =       "4",
  pages =        "297--345",
  month =        dec,
  year =         "2004",
  CODEN =        "LSCOEX",
  DOI =          "https://doi.org/10.1007/s10990-004-4867-y",
  ISSN =         "1388-3690 (print), 2212-0793 (electronic)",
  ISSN-L =       "1388-3690",
  bibdate =      "Wed Jul 9 12:34:43 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=1388-3690&volume=17&issue=4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=1388-3690&volume=17&issue=4&spage=297",
  acknowledgement = ack-nhfb,
  fjournal =     "Higher-Order and Symbolic Computation",
  keywords =     "abstract domains; abstract interpretation; algebraic
                 power analysis; software watermarking; static program
                 analysis",
}

@InProceedings{Maurer:2004:RCD,
  author =       "Ueli Maurer",
  title =        "The role of cryptography in database security",
  crossref =     "ACM:2004:PAS",
  pages =        "5--10",
  year =         "2004",
  bibdate =      "Sun Nov 7 06:14:27 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{May:2004:CRS,
  author =       "Alexander May",
  title =        "Computing the {RSA} Secret Key Is Deterministic
                 Polynomial Time Equivalent to Factoring",
  crossref =     "Franklin:2004:ACC",
  pages =        "213--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{McElheny:2004:TPW,
  author =       "Victor K. McElheny",
  title =        "{{\booktitle{Tuxedo Park: A Wall Street Tycoon and the
                 Secret Palace of Science that Changed the Course of
                 World War II}}} (review)",
  journal =      j-TECH-CULTURE,
  volume =       "45",
  number =       "2",
  pages =        "456--457",
  month =        apr,
  year =         "2004",
  CODEN =        "TECUA3",
  DOI =          "https://doi.org/10.1353/tech.2004.0077",
  ISSN =         "0040-165X (print), 1097-3729 (electronic)",
  ISSN-L =       "0040-165X",
  bibdate =      "Sat Sep 30 08:24:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/techculture2000.bib",
  URL =          "https://muse.jhu.edu/pub/1/article/55675",
  acknowledgement = ack-nhfb,
  ajournal =     "Tech. Culture",
  fjournal =     "Technology and Culture",
  journal-URL =  "https://muse.jhu.edu/journal/194",
}

@Article{McKenna:2004:EAE,
  author =       "Brian McKenna",
  title =        "Erratum to {``Attacks on the (enhanced) Yang--Shieh
                 authentication'' [Comput Secur {\bf 22}(8) (2003)
                 725--727]}",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "85--85",
  month =        feb,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:54 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See \cite{Chen:2003:AEY}.",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000082",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McKinnon:2004:CCS,
  author =       "A. David McKinnon and David E. Bakken and John C.
                 Shovic",
  title =        "A configurable cryptography subsystem in a middleware
                 framework for embedded systems",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "46",
  number =       "6",
  pages =        "771--795",
  day =          "20",
  month =        dec,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Thu Jul 14 17:03:05 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Meadows:2004:OSM,
  author =       "Catherine Meadows",
  title =        "Ordering from {Satan}'s menu: a survey of requirements
                 specification for formal analysis of cryptographic
                 protocols",
  journal =      j-SCI-COMPUT-PROGRAM,
  volume =       "50",
  number =       "1--3",
  pages =        "3--22",
  month =        mar,
  year =         "2004",
  CODEN =        "SCPGD4",
  ISSN =         "0167-6423 (print), 1872-7964 (electronic)",
  ISSN-L =       "0167-6423",
  bibdate =      "Fri Apr 1 18:38:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01676423",
  acknowledgement = ack-nhfb,
  fjournal =     "Science of Computer Programming",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01676423",
}

@Article{Micciancio:2004:CTA,
  author =       "Daniele Micciancio and Bogdan Warinschi",
  title =        "Completeness theorems for the {Abadi--Rogaway}
                 language of encrypted expressions",
  journal =      j-J-COMP-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "99--129",
  month =        "????",
  year =         "2004",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2004-12105",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:19 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib;
                 https://www.math.utah.edu/pub/tex/bib/sgml2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Millan:2004:NCE,
  author =       "William Millan and Joanne Fuller and Ed Dawson",
  title =        "New Concepts in Evolutionary Search for {Boolean}
                 Functions in Cryptology",
  journal =      j-COMPUT-INTELL,
  volume =       "20",
  number =       "3",
  pages =        "463--474",
  month =        aug,
  year =         "2004",
  CODEN =        "COMIE6",
  DOI =          "https://doi.org/10.1111/j.0824-7935.2004.00246.x",
  ISSN =         "0824-7935 (print), 1467-8640 (electronic)",
  ISSN-L =       "0824-7935",
  bibdate =      "Fri Apr 1 07:46:37 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/computintell.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "Comput. Intell.",
  fjournal =     "Computational Intelligence",
  journal-URL =  "https://onlinelibrary.wiley.com/journal/14678640",
  onlinedate =   "27 July 2004",
}

@InProceedings{Molland:2004:ICA,
  author =       "H{\aa}vard Molland and Tor Helleseth",
  title =        "An Improved Correlation Attack Against Irregular
                 Clocked and Filtered Keystream Generators",
  crossref =     "Franklin:2004:ACC",
  pages =        "373--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Montenegro:2004:CBI,
  author =       "Gabriel Montenegro and Claude Castelluccia",
  title =        "Crypto-based identifiers {(CBIDs)}: {Concepts} and
                 applications",
  journal =      j-TISSEC,
  volume =       "7",
  number =       "1",
  pages =        "97--127",
  month =        feb,
  year =         "2004",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Nov 4 08:41:51 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@InProceedings{Moran:2004:NIT,
  author =       "Tal Moran and Ronen Shaltiel and Amnon Ta-Shma",
  title =        "Non-interactive Timestamping in the Bounded Storage
                 Model",
  crossref =     "Franklin:2004:ACC",
  pages =        "460--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Book{Mrayati:2004:IAD,
  editor =       "M. Mrayati and Y. Meer Alam and M. H. at-Tayyan",
  title =        "{Ibn 'ad-Durayhim's} treatise on cryptanalysis",
  volume =       "3",
  publisher =    "KFCRIS \& KACST",
  address =      "Riyadh, Saudi Arabia",
  pages =        "127",
  year =         "2004",
  ISBN =         "9960-890-20-0",
  ISBN-13 =      "978-9960-890-20-3",
  LCCN =         "????",
  bibdate =      "Thu May 12 06:53:13 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "{Arabic} origins of cryptology",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography / Arab countries / history",
}

@Article{Muzereau:2004:EBD,
  author =       "A. Muzereau and N. P. Smart and F. Vercauteren",
  title =        "The equivalence between the {DHP} and {DLP} for
                 elliptic curves used in practical applications",
  journal =      j-LMS-J-COMPUT-MATH,
  volume =       "7",
  pages =        "50--??",
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1461-1570",
  bibdate =      "Tue Nov 09 08:26:26 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "LMS Journal of Computation and Mathematics",
}

@Article{Naor:2004:NTC,
  author =       "Moni Naor and Omer Reingold",
  title =        "Number-theoretic constructions of efficient
                 pseudo-random functions",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "2",
  pages =        "231--262",
  month =        mar,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Mar 6 07:04:43 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@Book{Nedjah:2004:ECH,
  editor =       "Nadia Nedjah and Luiza de {Macedo Mourelle}",
  title =        "Embedded cryptographic hardware: methodologies and
                 architectures",
  publisher =    "Nova Science Publishers",
  address =      "New York, NY, USA",
  pages =        "ix + 295",
  year =         "2004",
  ISBN =         "1-59454-012-8 (hardcover)",
  ISBN-13 =      "978-1-59454-012-7 (hardcover)",
  LCCN =         "TK5102.94 .E49 2004",
  bibdate =      "Mon Mar 5 14:58:51 MST 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  URL =          "http://www.loc.gov/catdir/toc/ecip0417/2004008204.html",
  acknowledgement = ack-nhfb,
  subject =      "Telecommunication; Security measures; Data encryption
                 (Computer science); Computer security; Embedded
                 computer systems",
}

@Misc{Netscape:2004:HSW,
  author =       "{Netscape Communications, Inc.}",
  title =        "How {SSL} Works",
  howpublished = "Worldwide Web document.",
  day =          "27",
  month =        aug,
  year =         "2004",
  bibdate =      "Thu Jun 23 08:48:15 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "This is a tutorial of how the Secure Sockets Layer
                 (SSL) protocol works.",
  URL =          "http://developer.netscape.com/tech/security/ssl/howitworks.html;
                 http://web.archive.org/web/20040827080204/",
  acknowledgement = ack-nhfb,
}

@Book{Neuenschwander:2004:PSM,
  author =       "Daniel Neuenschwander",
  title =        "{Probabilistic and Statistical Methods in Cryptology:
                 An Introduction by Selected Topics}",
  volume =       "3028",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "x + 158",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b97045",
  ISBN =         "3-540-22001-1",
  ISBN-13 =      "978-3-540-22001-5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76 A1 L43 3028",
  bibdate =      "Tue Nov 16 07:48:43 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t3028.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3028;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b97045",
  acknowledgement = ack-nhfb,
}

@Article{Niederreiter:2004:BRC,
  author =       "H. Niederreiter",
  title =        "Book review: {{\em Cryptographic applications of
                 analytic number theory}}",
  journal =      j-MATH-COMPUT,
  volume =       "73",
  number =       "247",
  pages =        "1581--1582",
  month =        jul,
  year =         "2004",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (print), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Wed Aug 11 08:23:07 MDT 2004",
  bibsource =    "http://www.ams.org/mcom/2004-73-247;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathcomp2000.bib",
  URL =          "http://www.ams.org/mcom/2004-73-247/S0025-5718-04-01695-3/home.html;
                 http://www.ams.org/mcom/2004-73-247/S0025-5718-04-01695-3/S0025-5718-04-01695-3.dvi;
                 http://www.ams.org/mcom/2004-73-247/S0025-5718-04-01695-3/S0025-5718-04-01695-3.pdf;
                 http://www.ams.org/mcom/2004-73-247/S0025-5718-04-01695-3/S0025-5718-04-01695-3.ps;
                 http://www.ams.org/mcom/2004-73-247/S0025-5718-04-01695-3/S0025-5718-04-01695-3.tex",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
}

@Article{Ning:2004:TTA,
  author =       "Peng Ning and Yun Cui and Douglas S. Reeves and
                 Dingbang Xu",
  title =        "Techniques and tools for analyzing intrusion alerts",
  journal =      j-TISSEC,
  volume =       "7",
  number =       "2",
  pages =        "274--318",
  month =        may,
  year =         "2004",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Nov 4 08:41:51 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@InProceedings{Okeya:2004:SBR,
  author =       "Katsuyuki Okeya and Katja Schmidt-Samoa and Christian
                 Spahn and Tsuyoshi Takagi",
  title =        "Signed Binary Representations Revisited",
  crossref =     "Franklin:2004:ACC",
  pages =        "123--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Page:2004:PCA,
  author =       "D. Page and N. P. Smart",
  title =        "Parallel cryptographic arithmetic using a redundant
                 {Montgomery} representation",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "53",
  number =       "11",
  pages =        "1474--1482",
  month =        nov,
  year =         "2004",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2004.100",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Jul 5 08:12:46 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1336767",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Park:2004:APP,
  author =       "Chang-Seop Park",
  title =        "Authentication protocol providing user anonymity and
                 untraceability in wireless mobile communication
                 systems",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "44",
  number =       "2",
  pages =        "267--273",
  day =          "5",
  month =        feb,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Mon Feb 9 06:35:22 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Park:2004:UUC,
  author =       "Jaehong Park and Ravi Sandhu",
  title =        "The {UCON$_{ABC}$} usage control model",
  journal =      j-TISSEC,
  volume =       "7",
  number =       "1",
  pages =        "128--174",
  month =        feb,
  year =         "2004",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Nov 4 08:41:51 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@InProceedings{Patarin:2004:SRF,
  author =       "Jacques Patarin",
  title =        "Security of Random {Feistel} Schemes with $5$ or More
                 Rounds",
  crossref =     "Franklin:2004:ACC",
  pages =        "106--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Book{Peikari:2004:SW,
  author =       "Cyrus Peikari and Anton Chuvakin",
  title =        "Security warrior",
  publisher =    pub-ORA,
  address =      pub-ORA:adr,
  pages =        "xvii + 531",
  year =         "2004",
  ISBN =         "0-596-00545-8",
  ISBN-13 =      "978-0-596-00545-0",
  LCCN =         "TK5105.59 .P44985 2004",
  bibdate =      "Mon Apr 18 15:07:43 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures",
}

@Article{Peinado:2004:CLK,
  author =       "A. Peinado",
  title =        "Cryptanalysis of {LHL}-key authentication scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "152",
  number =       "3",
  pages =        "721--724",
  day =          "13",
  month =        may,
  year =         "2004",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:31 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Phan:2004:IDC,
  author =       "Raphael C.-W. Phan",
  title =        "Impossible differential cryptanalysis of 7-round
                 {Advanced Encryption Standard (AES)}",
  journal =      j-INFO-PROC-LETT,
  volume =       "91",
  number =       "1",
  pages =        "33--38",
  day =          "16",
  month =        jul,
  year =         "2004",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 18:40:53 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@InProceedings{Prabhakaran:2004:NNS,
  author =       "Manoj Prabhakaran and Amit Sahai",
  title =        "New notions of security: achieving universal
                 composability without trusted setup",
  crossref =     "ACM:2004:PAA",
  pages =        "242--251",
  year =         "2004",
  bibdate =      "Wed Apr 5 05:59:11 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Puzmanova:2004:RWF,
  author =       "Rita Puzmanova",
  title =        "Review of {{\em Wi-Foo: The Secrets of Wireless
                 Hacking\/} by Andrew Vladimirov, Konstantin V.
                 Gravrilenko, and Andrei A. Mikhailovsky. Pearson
                 Education, 2004, ISBN 0-321-20217-1}",
  journal =      j-QUEUE,
  volume =       "2",
  number =       "8",
  pages =        "70--70",
  month =        nov,
  year =         "2004",
  CODEN =        "AQCUAE",
  ISSN =         "1542-7730 (print), 1542-7749 (electronic)",
  ISSN-L =       "1542-7730",
  bibdate =      "Thu Jun 23 16:38:50 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/queue.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Queue: Tomorrow's Computing Today",
}

@Article{Regev:2004:NLB,
  author =       "Oded Regev",
  title =        "New lattice-based cryptographic constructions",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "6",
  pages =        "899--942",
  month =        nov,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jan 15 06:33:05 MST 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of the Association for Computing Machinery",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@Article{Reyhani-Masoleh:2004:TFT,
  author =       "Arash Reyhani-Masoleh and M. Anwar Hasan",
  title =        "Towards fault-tolerant cryptographic computations over
                 finite fields",
  journal =      j-TECS,
  volume =       "3",
  number =       "3",
  pages =        "593--613",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Fri Oct 29 06:35:47 MDT 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J840",
}

@Article{Riley:2004:HAE,
  author =       "Joseph Riley and Michael J. Schulte",
  title =        "A Hardware Accelerator for Elliptic Curve Cryptography
                 over {$ \mathrm {GF}(2^m) $}",
  journal =      j-INT-J-COMP-RESEARCH,
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  year =         "2004",
  ISSN =         "1535-6698",
  bibdate =      "Sun Mar 04 20:54:26 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Special Issue on Cryptographic Hardware and Embedded
                 Systems",
  URL =          "http://mesa.ece.wisc.edu/publications/cp_2004-10.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Research",
}

@Book{Rosenberg:2004:SWS,
  author =       "Jonathan B. Rosenberg and David L. Remy",
  title =        "Securing {Web} services with {WS-Security}:
                 demystifying {WS-Security}, {WS-Policy}, {SAML}, {XML
                 Signature}, and {XML Encryption}",
  publisher =    pub-SAMS,
  address =      pub-SAMS:adr,
  pages =        "xiv + 378",
  year =         "2004",
  ISBN =         "0-672-32651-5 (paperback)",
  ISBN-13 =      "978-0-672-32651-6 (paperback)",
  LCCN =         "TK5105.59 .R68 2004",
  bibdate =      "Wed Sep 28 08:21:03 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ross:2004:TCN,
  author =       "P. E. Ross",
  title =        "10 tech companies for the next 10 years",
  journal =      j-IEEE-SPECTRUM,
  volume =       "41",
  number =       "11",
  pages =        "52--52",
  month =        nov,
  year =         "2004",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2004.1353793",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "biomedical equipment; computer peripheral equipment;
                 Crossbow Technology Inc; Cybernetix; Digital integrated
                 circuits; Displays; Instruments; integrated circuit
                 manufacture; integrated circuit technology; Integrated
                 circuit technology; lighting; Lumileds Lighting LLC;
                 Magiq Technologies Inc; MeshNetworks Inc; Microchips
                 Inc; Microcomputers; Microvision Inc; nanotechnology;
                 Nantero Inc; Picsel Technologies Ltd; power
                 electronics; public key cryptography; Retina; robots;
                 Robots; semiconductor device manufacture; semiconductor
                 technology; Semikron International; technological
                 companies; Technological innovation; telecommunication
                 services; Telecommunications; undersea robots; Venture
                 capital",
}

@Article{Rugg:2004:CMV,
  author =       "Gordon Rugg",
  title =        "Cryptography: The Mystery of the {Voynich
                 Manuscript}",
  journal =      j-SCI-AMER,
  volume =       "291",
  number =       "1",
  pages =        "104--109",
  month =        jul,
  year =         "2004",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican0704-104",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Fri May 17 10:28:01 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam2000.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v291/n1/pdf/scientificamerican0704-104.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Article{Ryabko:2004:NTR,
  author =       "B. Ya. Ryabko and V. S. Stognienko and Y. I. Shokin",
  title =        "A new test for randomness and its application to some
                 cryptographic problems",
  journal =      j-J-STAT-PLANN-INFERENCE,
  volume =       "123",
  number =       "2",
  pages =        "365--376",
  day =          "1",
  month =        jul,
  year =         "2004",
  CODEN =        "JSPIDN",
  DOI =          "https://doi.org/10.1016/S0378-3758(03)00149-6",
  ISSN =         "0378-3758 (print), 1873-1171 (electronic)",
  ISSN-L =       "0378-3758",
  bibdate =      "Fri Mar 09 12:13:33 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0378375803001496",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Statistical Planning and Inference",
  keywords =     "adaptive chi-square test",
}

@Article{Savelli:2004:NDC,
  author =       "A. Savelli",
  title =        "On numerically decipherable codes and their homophonic
                 partitions",
  journal =      j-INFO-PROC-LETT,
  volume =       "90",
  number =       "3",
  pages =        "103--108",
  day =          "16",
  month =        may,
  year =         "2004",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 18:40:52 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Schneier:2004:SA,
  author =       "Bruce Schneier",
  title =        "Sensible Authentication",
  journal =      j-QUEUE,
  volume =       "1",
  number =       "10",
  pages =        "74--78",
  month =        feb,
  year =         "2004",
  CODEN =        "AQCUAE",
  ISSN =         "1542-7730 (print), 1542-7749 (electronic)",
  ISSN-L =       "1542-7730",
  bibdate =      "Sat Mar 6 07:19:32 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Queue: Tomorrow's Computing Today",
}

@Article{Schultz:2004:GBC,
  author =       "E. Eugene Schultz",
  title =        "The gap between cryptography and information security:
                 has it narrowed?",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "7",
  pages =        "531--532",
  month =        oct,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002287",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Scott:2004:CIB,
  author =       "Michael Scott",
  title =        "Cryptanalysis of an {ID}-based password authentication
                 scheme using {Smart Cards} and fingerprints",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "2",
  pages =        "73--75",
  month =        apr,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:43 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@InProceedings{Scott:2004:CP,
  author =       "Michael Scott and Paulo S. L. M. Barreto",
  title =        "Compressed Pairings",
  crossref =     "Franklin:2004:ACC",
  pages =        "140--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Seetharaman:2004:BRB,
  author =       "Priya Seetharaman",
  title =        "Book Review: {{\em Beyond Fear---Thinking Sensibly
                 About Security in an Uncertain World}}, by {Bruce
                 Schneier}",
  journal =      j-COMP-J,
  volume =       "47",
  number =       "3",
  pages =        "397--397",
  month =        may,
  year =         "2004",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Jun 8 12:55:15 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_47/Issue_03/",
  URL =          "http://www3.oup.co.uk/computer_journal/free_pdf/470397.pdf;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_47/Issue_03/470397.sgm.abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Seredynski:2004:CAC,
  author =       "Franciszek Seredynski and Pascal Bouvry and Albert Y.
                 Zomaya",
  title =        "Cellular automata computations and secret key
                 cryptography",
  journal =      j-PARALLEL-COMPUTING,
  volume =       "30",
  number =       "5--6",
  pages =        "753--766",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "PACOEJ",
  ISSN =         "0167-8191 (print), 1872-7336 (electronic)",
  ISSN-L =       "0167-8191",
  bibdate =      "Sun Nov 7 05:53:53 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01678191",
  acknowledgement = ack-nhfb,
  fjournal =     "Parallel Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01678191",
}

@InCollection{Shaltiel:2004:RDE,
  author =       "Ronen Shaltiel",
  title =        "Recent developments in extractors",
  crossref =     "Paun:2004:CTT",
  pages =        "??--??",
  year =         "2004",
  bibdate =      "Wed Apr 05 05:41:37 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.cs.haifa.ac.il/~ronen/online_papers/online_papers.html;
                 http://www.cs.haifa.ac.il/~ronen/online_papers/survey.ps",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography",
  remark =       "A preliminary version appeared in {\em Bulletin of the
                 European Association for Theoretical Computer Science},
                 Volume 77, June 2002, pages 67--95.",
}

@Article{Shao:2004:IDS,
  author =       "Zuhua Shao",
  title =        "Improvement of digital signature with message recovery
                 using self-certified public keys and its variants",
  journal =      j-APPL-MATH-COMP,
  volume =       "159",
  number =       "2",
  pages =        "391--399",
  day =          "6",
  month =        dec,
  year =         "2004",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:38 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Shparlinski:2004:BRR,
  author =       "Igor Shparlinski",
  title =        "Book review: {{\em RSA and public-key cryptography}}",
  journal =      j-MATH-COMPUT,
  volume =       "73",
  number =       "247",
  pages =        "1582--1582",
  month =        jul,
  year =         "2004",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (print), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Wed Aug 11 08:23:07 MDT 2004",
  bibsource =    "http://www.ams.org/mcom/2004-73-247;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ams.org/mcom/2004-73-247/S0025-5718-04-01695-3/home.html;
                 http://www.ams.org/mcom/2004-73-247/S0025-5718-04-01695-3/S0025-5718-04-01695-3.dvi;
                 http://www.ams.org/mcom/2004-73-247/S0025-5718-04-01695-3/S0025-5718-04-01695-3.pdf;
                 http://www.ams.org/mcom/2004-73-247/S0025-5718-04-01695-3/S0025-5718-04-01695-3.ps;
                 http://www.ams.org/mcom/2004-73-247/S0025-5718-04-01695-3/S0025-5718-04-01695-3.tex",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
}

@Article{Shparlinski:2004:UDD,
  author =       "Igor E. Shparlinski",
  title =        "On the uniformity of distribution of the decryption
                 exponent in fixed encryption exponent {RSA}",
  journal =      j-INFO-PROC-LETT,
  volume =       "92",
  number =       "3",
  pages =        "143--147",
  day =          "15",
  month =        nov,
  year =         "2004",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 18:40:56 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Sierra:2004:LCC,
  author =       "Jos{\'e} M. Sierra and Julio C. Hern{\'a}ndez and
                 Narayana Jayaram and Arturo Ribagorda",
  title =        "Low computational cost integrity for block ciphers",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "20",
  number =       "5",
  pages =        "857--863",
  day =          "15",
  month =        jun,
  year =         "2004",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Jul 15 08:00:45 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Smolin:2004:EDE,
  author =       "J. A. Smolin",
  title =        "The early days of experimental quantum cryptography",
  journal =      j-IBM-JRD,
  volume =       "48",
  number =       "1",
  pages =        "47--??",
  month =        "????",
  year =         "2004",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  ISSN-L =       "0018-8646",
  bibdate =      "Tue Jan 27 05:37:12 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/rd/481/smolin.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IBM Journal of Research and Development",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
  ordernumber =  "G322-0238",
}

@Article{Solachidis:2004:WPL,
  author =       "Vassilios Solachidis and Ioannis Pitas",
  title =        "Watermarking Polygonal Lines Using {Fourier}
                 Descriptors",
  journal =      j-IEEE-CGA,
  volume =       "24",
  number =       "3",
  pages =        "44--51",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "ICGADZ",
  DOI =          "https://doi.org/10.1109/MCG.2004.1297010",
  ISSN =         "0272-1716 (print), 1558-1756 (electronic)",
  ISSN-L =       "0272-1716",
  bibdate =      "Sat Dec 11 16:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/comp/mags/cg/2004/03/g3044abs.htm;
                 http://csdl.computer.org/dl/mags/cg/2004/03/g3044.htm;
                 http://csdl.computer.org/dl/mags/cg/2004/03/g3044.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Computer Graphics and Applications",
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/cga",
}

@InProceedings{Srinathan:2004:OPS,
  author =       "K. Srinathan and Arvind Narayanan and C. Pandu
                 Rangan",
  title =        "Optimal Perfectly Secure Message Transmission",
  crossref =     "Franklin:2004:ACC",
  pages =        "545--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Strembeck:2004:IAE,
  author =       "Mark Strembeck and Gustaf Neumann",
  title =        "An integrated approach to engineer and enforce context
                 constraints in {RBAC} environments",
  journal =      j-TISSEC,
  volume =       "7",
  number =       "3",
  pages =        "392--427",
  month =        aug,
  year =         "2004",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Nov 4 08:41:51 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Stubblefield:2004:KRA,
  author =       "Adam Stubblefield and John Ioannidis and Aviel D.
                 Rubin",
  title =        "A key recovery attack on the 802.11b wired equivalent
                 privacy protocol {(WEP)}",
  journal =      j-TISSEC,
  volume =       "7",
  number =       "2",
  pages =        "319--332",
  month =        may,
  year =         "2004",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/996943.996948",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Nov 4 08:41:51 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "In this paper, we present a practical key recovery
                 attack on WEP, the link-layer security protocol for
                 802.11b wireless networks. The attack is based on a
                 partial key exposure vulnerability in the RC4 stream
                 cipher discovered by Fluhrer, Mantin, and Shamir. This
                 paper describes how to apply this flaw to breaking WEP,
                 our implementation of the attack, and optimizations
                 that can be used to reduce the number of packets
                 required for the attack. We conclude that the 802.11b
                 WEP standard is completely insecure, and we provide
                 recommendations on how this vulnerability could be
                 mitigated and repaired.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Stytz:2004:BRW,
  author =       "Martin R. Stytz",
  title =        "Book Reviews: Wireless World Order [{{\em How Secure
                 Is Your Wireless Network? Safeguarding Your Wi-Fi LAN}
                 by Lee Barken}]; No Need to Fear [{{\em Beyond Fear:
                 Thinking Sensibly About Security in an Uncertain
                 World}, by Bruce Schneier}]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "20--21",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264848",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1020abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1020.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Book{Swiderski:2004:TM,
  author =       "Frank Swiderski and Window Snyder",
  title =        "Threat modeling",
  publisher =    pub-MICROSOFT,
  address =      pub-MICROSOFT:adr,
  pages =        "xv + 259",
  year =         "2004",
  ISBN =         "0-7356-1991-3 (paperback)",
  ISBN-13 =      "978-0-7356-1991-3 (paperback)",
  LCCN =         "QA76.9.A25 S934 2004",
  bibdate =      "Tue Jul 3 15:43:30 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Computer networks; Security
                 measures",
}

@Article{Tan:2004:OBC,
  author =       "Zhangxi Tan and Chuang Lin and Hao Yin and Bo Li",
  title =        "Optimization and Benchmark of Cryptographic Algorithms
                 on Network Processors",
  journal =      j-IEEE-MICRO,
  volume =       "24",
  number =       "5",
  pages =        "55--69",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "IEMIDZ",
  DOI =          "https://doi.org/10.1109/MM.2004.54",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Sat Dec 11 17:59:16 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/dl/mags/mi/2004/05/m5055.htm;
                 http://csdl.computer.org/dl/mags/mi/2004/05/m5055.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Micro",
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
}

@Article{Teoh:2004:PCK,
  author =       "Andrew B. J. Teoh and David C. L. Ngo and Alwyn Goh",
  title =        "Personalised cryptographic key generation based on
                 {FaceHashing}",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "7",
  pages =        "606--614",
  month =        oct,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001701",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{Thorsteinson:2004:NSC,
  author =       "Peter Thorsteinson and G. Gnana Arun Ganesh",
  title =        "{.NET} Security and Cryptography",
  publisher =    pub-PHPTR,
  address =      pub-PHPTR:adr,
  pages =        "xvii + 466",
  year =         "2004",
  ISBN =         "0-13-100851-X",
  ISBN-13 =      "978-0-13-100851-9",
  LCCN =         "????",
  bibdate =      "Wed Aug 04 08:04:36 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$49.99",
  series =       "The integrated {.NET} series from object innovations",
  acknowledgement = ack-nhfb,
}

@InCollection{Turing:2004:BS,
  author =       "Alan M. Turing",
  title =        "{Bombe} and {Spider}",
  crossref =     "Copeland:2004:ETS",
  pages =        "313--335",
  year =         "2004",
  bibdate =      "Mon Nov 07 18:26:24 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Text prepared by Ralph Erskine and Philip Marks and
                 Frode Weierud from the only two surviving copies of
                 Turing's typescript.",
  acknowledgement = ack-nhfb,
  remark =       "Chapter 6 of \booktitle{Treatise on the Enigma}.",
}

@Article{Tzeng:2004:NTM,
  author =       "Shiang-Feng Tzeng and Cheng-Ying Yang and Min-Shiang
                 Hwang",
  title =        "A nonrepudiable threshold multi-proxy multi-signature
                 scheme with shared verification",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "20",
  number =       "5",
  pages =        "887--893",
  day =          "15",
  month =        jun,
  year =         "2004",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Jul 15 08:00:45 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Uzun:2004:BRC,
  author =       "Isa Servan Uzun",
  title =        "Book Review: {{\em Cryptographic Security
                 Architecture---Design and Verification}, by Peter
                 Gutmann}",
  journal =      j-COMP-J,
  volume =       "47",
  number =       "5",
  pages =        "622--623",
  month =        sep,
  year =         "2004",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Jun 28 17:48:35 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_47/Issue_05/",
  URL =          "http://www3.oup.co.uk/computer_journal/free_pdf/470622a.pdf;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_47/Issue_05/470622a.sgm.abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@InProceedings{vanDijk:2004:AOC,
  author =       "Marten van Dijk and David Woodruff",
  title =        "Asymptotically Optimal Communication for Torus-Based
                 Cryptography",
  crossref =     "Franklin:2004:ACC",
  pages =        "157--??",
  year =         "2004",
  bibdate =      "Tue Apr 04 07:53:49 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2004; cryptography",
}

@Article{Vaughan-Nichols:2004:VAS,
  author =       "Steven J. Vaughan-Nichols",
  title =        "Voice Authentication Speaks to the Marketplace",
  journal =      j-COMPUTER,
  volume =       "37",
  number =       "3",
  pages =        "13--??",
  month =        mar,
  year =         "2004",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Wed May 4 16:02:09 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/dl/mags/co/2004/03/r3013.htm;
                 http://csdl.computer.org/dl/mags/co/2004/03/r3013.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Book{Vladimirov:2004:WFS,
  author =       "Andrew A. Vladimirov and Konstantin V. Gavrilenko and
                 Andrei A. Mikhailovsky",
  title =        "Wi-Foo: The Secrets of Wireless Hacking",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xxvii + 555",
  year =         "2004",
  ISBN =         "0-321-20217-1",
  ISBN-13 =      "978-0-321-20217-8",
  LCCN =         "TK5105.59 .V53 2004",
  bibdate =      "Thu Oct 6 06:05:08 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.awprofessional.com/title/0321202171",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures; Wireless
                 communication systems",
}

@Article{Wallich:2004:EEI,
  author =       "P. Wallich",
  title =        "Electrical engineering's identity crisis --- when does
                 a vast and vital profession become unrecognizably
                 diffuse?",
  journal =      j-IEEE-SPECTRUM,
  volume =       "41",
  number =       "11",
  pages =        "66--73",
  month =        nov,
  year =         "2004",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2004.1353795",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Biology; circuit designing; Electrical engineering;
                 electrical engineering; electrical engineering identity
                 crisis; Materials science and technology; Physics;
                 professional aspects; quantum-based cryptographic
                 devices; technological development",
}

@Article{Wang:2004:AWA,
  author =       "Shiuh-Jeng Wang",
  title =        "Anonymous wireless authentication on a portable
                 cellular mobile system",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "53",
  number =       "10",
  pages =        "1317--1329",
  month =        oct,
  year =         "2004",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2004.70",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Jul 5 08:12:43 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1327581",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Misc{Wang:2004:CHF,
  author =       "Xiaoyun Wang and Dengguo Feng and Xuejia Lai and
                 Hongbo Yu",
  title =        "Collisions for Hash Functions {MD4}, {MD5},
                 {HAVAL-128} and {RIPEMD}",
  howpublished = "Cryptology ePrint Archive, Report 2004/199",
  pages =        "4",
  year =         "2004",
  bibdate =      "Wed Sep 15 14:58:12 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://eprint.iacr.org/2004/199.pdf;
                 http://www.tcs.hut.fi/~mjos/md5/",
  acknowledgement = ack-nhfb,
  remark =       "From the paper: ``\ldots{} MD5(M,N) = MD5(M',N'). On
                 IBM P690, it takes about one hour to find such M and
                 M', after that, it takes only 15 seconds to 5 minutes
                 to find N$_i$ and N'$_i$, so that (M,N$_i$ ) and
                 (M',N'$_i$ ) will produce the same hash same value.
                 Moreover, our attack works for any given initial
                 value.'' Markku-Juhani O. Saarinen comments (in the
                 second URL): ``This clearly shows that the resistance
                 of MD5 against collision attacks is significantly lower
                 than $ 2^{64} $ indicated by its 128-bit digest. Since
                 the attack allows free selection of IV, these attacks
                 mean that MD5 should not be used for any serious
                 cryptographic purpose.''",
}

@Article{Wang:2004:CWS,
  author =       "Huaiqing Wang and Shuozhong Wang",
  title =        "Cyber warfare: steganography vs. steganalysis",
  journal =      j-CACM,
  volume =       "47",
  number =       "10",
  pages =        "76--82",
  month =        oct,
  year =         "2004",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 2 06:08:31 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Wang:2004:TVS,
  author =       "Shiuh-Jeng Wang",
  title =        "Threshold verification scheme to a valid-signature
                 using identity only on specialized approval",
  journal =      j-APPL-MATH-COMP,
  volume =       "152",
  number =       "2",
  pages =        "373--383",
  day =          "5",
  month =        may,
  year =         "2004",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:31 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Wedde:2004:MAA,
  author =       "Horst F. Wedde and Mario Lischka",
  title =        "Modular authorization and administration",
  journal =      j-TISSEC,
  volume =       "7",
  number =       "3",
  pages =        "363--391",
  month =        aug,
  year =         "2004",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Nov 4 08:41:51 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Book{Weiss:2004:JCE,
  author =       "Jason Weiss",
  title =        "{Java} Cryptography Extensions: Practical Guide for
                 Programmers",
  publisher =    pub-MORGAN-KAUFMANN,
  address =      pub-MORGAN-KAUFMANN:adr,
  pages =        "xv + 158",
  year =         "2004",
  ISBN =         "0-12-742751-1",
  ISBN-13 =      "978-0-12-742751-5",
  LCCN =         "QA76.73.J38 W445 2004",
  bibdate =      "Tue Jul 27 05:22:17 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$21.95",
  acknowledgement = ack-nhfb,
}

@Book{Wollinger:2004:SHI,
  author =       "Thomas Wollinger",
  title =        "Software and hardware implementation of hyperelliptic
                 curve cryptosystems",
  volume =       "3",
  publisher =    "Europ{\"a}ischer Universit{\"a}tsverlag",
  address =      "Bochum, Germany",
  pages =        "177",
  year =         "2004",
  ISBN =         "3-86515-025-X",
  ISBN-13 =      "978-3-86515-025-7",
  LCCN =         "????",
  bibdate =      "Fri May 13 08:53:09 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.gbv.de:20011/gvk",
  price =        "EUR 24.90",
  series =       "IT-Security",
  URL =          "http://verlag.rub.de/g9783865150257.html",
  abstract =     "The hyperelliptic curve cryptosystems (HECC) is one of
                 the emerging cryptographic primitives of the last
                 years. HECC offers the same security as established
                 public-key cryptosystems with much shorter operand
                 length. However, until recently the common belief was
                 that HEC are out of scope for any practical
                 application, because of the complex group
                 operation.\par

                 The thesis at hand is a step towards the practical use
                 of HECC by narrowing the performance gap between
                 elliptic curve (ECC) and HECC. We were able to reduce
                 the complexity of the group operation for small genus
                 hyperelliptic curves. Our theoretical comparison
                 between ECC and HECC, as well as our software and
                 hardware implementations show that the performance of
                 both cryptographic primitives is in the same range. The
                 implementations we investigated range from a general
                 purpose processor to a variety of different embedded
                 processors, and also include the prototype
                 implementation of a HEC coprocessor on FPGAs.",
  acknowledgement = ack-nhfb,
}

@Article{Wong:2004:RCK,
  author =       "W. K. Wong and L. P. Lee and K. W. Wong",
  title =        "Reply to the comment {``Keystream cryptanalysis of a
                 chaotic cryptographic method''}",
  journal =      j-COMP-PHYS-COMM,
  volume =       "156",
  number =       "2",
  pages =        "208--208",
  day =          "1",
  month =        jan,
  year =         "2004",
  CODEN =        "CPHCBZ",
  DOI =          "https://doi.org/10.1016/S0010-4655(03)00433-8",
  ISSN =         "0010-4655 (print), 1879-2944 (electronic)",
  ISSN-L =       "0010-4655",
  bibdate =      "Mon Feb 13 23:41:34 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compphyscomm2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See \cite{Wong:2001:MCC,Alvarez:2004:KCC}.",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0010465503004338",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Physics Communications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00104655",
}

@Article{Wu:2004:EIW,
  author =       "Hsien-Chu Wu and Chin-Chen Chang",
  title =        "Embedding Invisible Watermarks into Digital Images
                 Based on Side-Match Vector Quantization",
  journal =      j-FUND-INFO,
  volume =       "63",
  number =       "1",
  pages =        "89--106",
  month =        jan,
  year =         "2004",
  CODEN =        "FUMAAJ",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:02:27 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Wu:2004:RKA,
  author =       "Tzong-Sun Wu and Han-Yu Lin",
  title =        "Robust key authentication scheme resistant to public
                 key substitution attacks",
  journal =      j-APPL-MATH-COMP,
  volume =       "157",
  number =       "3",
  pages =        "825--833",
  day =          "15",
  month =        oct,
  year =         "2004",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:36 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Xie:2004:CTA,
  author =       "Qi Xie and Xiu Yuan Yu",
  title =        "Cryptanalysis of {Tseng} et al.'s authenticated
                 encryption schemes",
  journal =      j-APPL-MATH-COMP,
  volume =       "158",
  number =       "1",
  pages =        "1--5",
  day =          "25",
  month =        oct,
  year =         "2004",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:36 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Yang:2004:CUF,
  author =       "Chou-Chen Yang and Ren-Chiun Wang",
  title =        "Cryptanalysis of a user friendly remote authentication
                 scheme with smart cards",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "425--427",
  month =        jul,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001002",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yang:2004:ENT,
  author =       "Cheng-Ying Yang and Shiang-Feng Tzeng and Min-Shiang
                 Hwang",
  title =        "On the efficiency of nonrepudiable threshold proxy
                 signature scheme with known signers",
  journal =      j-J-SYST-SOFTW,
  volume =       "73",
  number =       "3",
  pages =        "507--514",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed May 18 10:27:26 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Yang:2004:ISE,
  author =       "Chou-Chen Yang and Ren-Ching Wang",
  title =        "An improvement of security enhancement for the
                 timestamp-based password authentication scheme using
                 {Smart Cards}",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "3",
  pages =        "91--96",
  month =        jul,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:48 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Yang:2004:MSS,
  author =       "Chou-Chen Yang and Ting-Yi Chang and Min-Shiang
                 Hwang",
  title =        "A $ (t, n) $ multi-secret sharing scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "151",
  number =       "2",
  pages =        "483--490",
  day =          "5",
  month =        apr,
  year =         "2004",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:30 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Yeh:2004:PBU,
  author =       "Her-Tyan Yeh and Hung-Min Sun",
  title =        "Password-based user authentication and key
                 distribution protocols for client--server
                 applications",
  journal =      j-J-SYST-SOFTW,
  volume =       "72",
  number =       "1",
  pages =        "97--103",
  month =        jun,
  year =         "2004",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed May 18 10:27:24 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Yi:2004:AKA,
  author =       "Xun Yi",
  title =        "Authenticated key agreement in dynamic peer groups",
  journal =      j-THEOR-COMP-SCI,
  volume =       "326",
  number =       "1--3",
  pages =        "363--382",
  day =          "20",
  month =        oct,
  year =         "2004",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Thu Nov 4 10:19:19 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Yoon:2004:SUA,
  author =       "Eun-Jun Yoon and Eun-Kyung Ryu and Kee-Young Yoo",
  title =        "A secure user authentication scheme using hash
                 functions",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "2",
  pages =        "62--68",
  month =        apr,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:43 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Young:2004:HRV,
  author =       "Dale Young",
  title =        "Human Resources have a vital role to play within
                 employee identity and access management",
  journal =      j-NETWORK-SECURITY,
  volume =       "2004",
  number =       "11",
  pages =        "5--7",
  month =        nov,
  year =         "2004",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(04)00154-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:06 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485804001540",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Book{Young:2004:MCE,
  author =       "Adam Young and Moti Yung",
  title =        "Malicious cryptography: exposing cryptovirology",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xxiv + 392",
  year =         "2004",
  ISBN =         "0-7645-4975-8 (paperback)",
  ISBN-13 =      "978-0-7645-4975-5 (paperback)",
  LCCN =         "QA76.9.A25 Y65 2004",
  bibdate =      "Sat Jun 13 08:19:29 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/bios/wiley047/2003023863.html;
                 http://www.loc.gov/catdir/description/wiley041/2003023863.html;
                 http://www.loc.gov/catdir/toc/wiley041/2003023863.html",
  acknowledgement = ack-nhfb,
  subject =      "computer security; cryptography; computer viruses;
                 prevention; data protection",
}

@Article{Yuan-bo:2004:ITA,
  author =       "Guo Yuan-bo and Ma Jian-feng",
  title =        "An intrusion-tolerant authorization and authentication
                 scheme in distributed environments",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "4",
  pages =        "45--51",
  month =        oct,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:53 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Zhang:2004:AFV,
  author =       "Yuqing Zhang and Xiuying Liu",
  title =        "An approach to the formal verification of the
                 three-principal cryptographic protocols",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "1",
  pages =        "35--42",
  month =        jan,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:37 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Zhang:2004:AIB,
  author =       "Fangguo Zhang and Xiaofeng Chen",
  title =        "Attack on an {ID}-based authenticated group key
                 agreement scheme from {PKC 2004}",
  journal =      j-INFO-PROC-LETT,
  volume =       "91",
  number =       "4",
  pages =        "191--193",
  month =        aug,
  year =         "2004",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 18:40:54 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Zhang:2004:NMS,
  author =       "Zhang Zhang and Guozhen Xiao",
  title =        "New multisignature scheme for specified group of
                 verifiers",
  journal =      j-APPL-MATH-COMP,
  volume =       "157",
  number =       "2",
  pages =        "425--431",
  day =          "5",
  month =        oct,
  year =         "2004",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:36 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Zhang:2004:RMA,
  author =       "Yuqing Zhang and Xiuying Liu",
  title =        "Running-mode analysis of the {Security Socket Layer}
                 protocol",
  journal =      j-OPER-SYS-REV,
  volume =       "38",
  number =       "2",
  pages =        "34--40",
  month =        apr,
  year =         "2004",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:43 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Zhang:2004:SAE,
  author =       "Chang N. Zhang and Chunren Lai",
  title =        "A systematic approach for encryption and
                 authentication with fault tolerance",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "45",
  number =       "2",
  pages =        "143--154",
  day =          "5",
  month =        jun,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Thu Jul 14 17:03:01 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Zhen:2004:IBS,
  author =       "Z. Zhen and B. Fei and L. Kejun",
  title =        "The implementation of 128 bit strong encryption for
                 {SSL} by using {Java} Applet",
  journal =      "Journal --- Huazhong University of Science and
                 Technology Nature Science Chinese Edition",
  volume =       "32",
  number =       "4",
  pages =        "74--76",
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1671-4512",
  bibdate =      "Fri Jun 18 08:03:35 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 Ingenta database",
  acknowledgement = ack-nhfb,
}

@Article{Zhu:2004:DSM,
  author =       "Lie Huang Zhu and Yuan Da Cao and Dong Wang",
  title =        "Digital signature of multicast streams secure against
                 adaptive chosen message attack",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "3",
  pages =        "229--240",
  month =        may,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000707",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Abadi:2005:CFI,
  author =       "Mart{\'\i}n Abadi and Mihai Budiu and {\'U}lfar
                 Erlingsson and Jay Ligatti",
  title =        "Control-flow integrity",
  crossref =     "Meadows:2005:CPA",
  pages =        "340--353",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Abadi:2005:SAC,
  author =       "Mart{\'\i}n Abadi and Bogdan Warinschi",
  title =        "Security analysis of cryptographically controlled
                 access to {XML} documents",
  crossref =     "ACM:2005:PTF",
  pages =        "108--117",
  year =         "2005",
  bibdate =      "Wed Aug 23 12:08:49 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Abdalla:2005:SER,
  author =       "Michel Abdalla and Mihir Bellare and Dario Catalano
                 and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and
                 John Malone-Lee and Gregory Neven and Pascal Paillier
                 and Haixia Shi",
  title =        "Searchable Encryption Revisited: Consistency
                 Properties, Relation to Anonymous {IBE}, and
                 Extensions",
  crossref =     "Shoup:2005:ACC",
  pages =        "205--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_13",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@InProceedings{Aciicmez:2005:IBB,
  author =       "Onur Acii{\c{c}}mez and Werner Schindler and
                 {\c{C}}etin K. Ko{\c{c}}",
  title =        "Improving {Brumley} and {Boneh} timing attack on
                 unprotected {SSL} implementations",
  crossref =     "Meadows:2005:CPA",
  pages =        "139--146",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Al-Azzoni:2005:MVC,
  author =       "Issam Al-Azzoni and Douglas G. Down and Ridha Khedri",
  title =        "Modeling and Verification of Cryptographic Protocols
                 Using Coloured {Petri} Nets and Design\slash {CPN}",
  journal =      j-NORDIC-J-COMPUT,
  volume =       "12",
  number =       "3",
  pages =        "200--228",
  month =        "Fall",
  year =         "2005",
  CODEN =        "NJCOFR",
  ISSN =         "1236-6064",
  bibdate =      "Sat Sep 11 08:22:12 MDT 2010",
  bibsource =    "http://www.cs.helsinki.fi/njc/njc12.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Nordic Journal of Computing",
}

@Article{Alvarez:2005:EBS,
  author =       "Rafael {\'A}lvarez and Joan-Josep Climent and Leandro
                 Tortosa and Antonio Zamora",
  title =        "An efficient binary sequence generator with
                 cryptographic applications",
  journal =      j-APPL-MATH-COMP,
  volume =       "167",
  number =       "1",
  pages =        "16--27",
  day =          "5",
  month =        aug,
  year =         "2005",
  CODEN =        "AMHCBQ",
  DOI =          "https://doi.org/10.1016/j.amc.2004.06.065",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:47 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/applmathcomput2005.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0096300304004709",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Alvarez:2005:SSS,
  author =       "G. Alvarez and A. Hern{\'a}ndez Encinas and L.
                 Hern{\'a}ndez Encinas and A. Mart{\'\i}n del Rey",
  title =        "A secure scheme to share secret color images",
  journal =      j-COMP-PHYS-COMM,
  volume =       "173",
  number =       "1--2",
  pages =        "9--16",
  day =          "1",
  month =        dec,
  year =         "2005",
  CODEN =        "CPHCBZ",
  DOI =          "https://doi.org/10.1016/j.cpc.2005.07.002",
  ISSN =         "0010-4655 (print), 1879-2944 (electronic)",
  ISSN-L =       "0010-4655",
  bibdate =      "Mon Feb 13 23:42:03 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compphyscomm2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0010465505004224",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Physics Communications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00104655",
}

@InProceedings{Alwen:2005:IFR,
  author =       "Jo{\"e} Alwen and Giuseppe Persiano and Ivan
                 Visconti",
  title =        "Impossibility and Feasibility Results for Zero
                 Knowledge with Public Keys",
  crossref =     "Shoup:2005:ACC",
  pages =        "135--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_9",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@Misc{Anonymous:2005:CEC,
  author =       "Anonymous",
  title =        "The Case for Elliptic Curve Cryptography",
  howpublished = "US National Security Agency World-Wide Web document",
  month =        oct,
  year =         "2005",
  bibdate =      "Sat Oct 15 18:59:19 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.nsa.gov/ia/industry/crypto_elliptic_curve.cfm",
  acknowledgement = ack-nhfb,
  remark =       "From the document: ``Despite the many advantages of
                 elliptic curves and despite the adoption of elliptic
                 curves by many users, many vendors and academics view
                 the intellectual property environment surrounding
                 elliptic curves as a major roadblock to their
                 implementation and use. Various aspects of elliptic
                 curve cryptography have been patented by a variety of
                 people and companies around the world. Notably the
                 Canadian company, Certicom Inc. holds over 130 patents
                 related to elliptic curves and public key cryptography
                 in general.\par

                 As a way of clearing the way for the implementation of
                 elliptic curves to protect US and allied government
                 information, the National Security Agency purchased
                 from Certicom a license that covers all of their
                 intellectual property in a restricted field of use. The
                 license would be limited to implementations that were
                 for national security uses and certified under FIPS
                 140-2 or were approved by NSA. Further, the license
                 would be limited to only prime field curves where the
                 prime was greater than 2255. On the NIST list of curves
                 3 out of the 15 fit this field of use: the prime field
                 curves with primes of 256 bits, 384 bits and 521 bits.
                 Certicom identified 26 patents that covered this field
                 of use. NSA's license includes a right to sublicense
                 these 26 patents to vendors building products within
                 the restricted field of use. Certicom also retained a
                 right to license vendors both within the field of use
                 and under other terms that they may negotiate with
                 vendors.''",
  remark2 =      "When a spy agency recommends an encryption method,
                 does it mean that they know how to crack it, and
                 haven't told anyone?",
}

@Article{Anonymous:2005:SCB,
  author =       "Anonymous",
  title =        "Smart card based authentication --- any future?",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "3",
  pages =        "188--191",
  month =        may,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480500043X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2005:WAS,
  author =       "Anonymous",
  title =        "Workshop on architectural support for security and
                 anti-virus {(WASSA)}",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "33",
  number =       "1",
  pages =        "??--??",
  month =        mar,
  year =         "2005",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 09:40:37 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Manual{ANSI:2005:AXP,
  author =       "{ANSI}",
  title =        "{ANSI X9.62:2005}: Public Key Cryptography for the
                 Financial Services Industry, The {Elliptic Curve
                 Digital Signature Algorithm (ECDSA)}",
  organization = pub-ANSI,
  address =      pub-ANSI:adr,
  year =         "2005",
  bibdate =      "Thu Mar 22 11:17:32 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csrc.nist.gov/encryption/dss/ecdsa/NISTReCur.pdf;
                 http://webstore.ansi.org/ansidocstore/product.asp?sku=ANSI+X9%2E62%3A2005",
  abstract =     "This Standard defines methods for digital signature
                 (signature) generation and verification for the
                 protection of messages and data using the Elliptic
                 Curve Digital Signature Algorithm (ECDSA). ECDSA is the
                 elliptic curve analogue of the Digital Signature
                 Algorithm (ANS X9.30). The ECDSA shall be used in
                 conjunction with an approved hash function, as
                 specified in X9 Registry Item 00003, Secure Hash
                 Standard (SHS). The hash functions approved at the time
                 of publication of this document are SHA-1 (see note),
                 SHA-224, SHA-256, SHA-384 and SHA-512. This ECDSA
                 Standard provides methods and criteria for the
                 generation of public and private keys that are required
                 by the ECDSA and the procedural controls required for
                 the secure use of the algorithm with these keys. This
                 ECDSA Standard also provides methods and criteria for
                 the generation of elliptic curve domain parameters that
                 are required by the ECDSA and the procedural controls
                 required for the secure use of the algorithm with these
                 domain parameters.",
  acknowledgement = ack-nhfb,
}

@InProceedings{Appenzeller:2005:IBE,
  author =       "Guido Appenzeller",
  title =        "Identity-based encryption from algorithm to enterprise
                 deployment",
  crossref =     "Meadows:2005:CPA",
  pages =        "406--406",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Arazi:2005:RPK,
  author =       "Benjamin Arazi and Itamar Elhanany and Ortal Arazi and
                 Hairong Qi",
  title =        "Revisiting Public-Key Cryptography for Wireless Sensor
                 Networks",
  journal =      j-COMPUTER,
  volume =       "38",
  number =       "11",
  pages =        "103--105",
  month =        nov,
  year =         "2005",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2005.388",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Jul 4 17:16:18 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Book{Arkin:2005:CND,
  author =       "William M. Arkin",
  title =        "Code names: deciphering {US} military plans, programs,
                 and operations in the 9/11 world",
  publisher =    "Steerforth Press",
  address =      "Hanover, NH, USA",
  pages =        "608",
  year =         "2005",
  ISBN =         "1-58642-083-6",
  ISBN-13 =      "978-1-58642-083-3",
  LCCN =         "UA23 .A689 2005",
  bibdate =      "Thu Jan 19 12:24:43 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip052/2004025039.html",
  acknowledgement = ack-nhfb,
  subject =      "United States; armed forces; organization; military
                 planning; defenses; civil defense; war on terrorism,
                 2001--",
}

@InProceedings{Atallah:2005:DEK,
  author =       "Mikhail J. Atallah and Keith B. Frikken and Marina
                 Blanton",
  title =        "Dynamic and efficient key management for access
                 hierarchies",
  crossref =     "Meadows:2005:CPA",
  pages =        "190--202",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Ateniese:2005:PRS,
  author =       "Giuseppe Ateniese and Susan Hohenberger",
  title =        "Proxy re-signatures: new definitions, algorithms, and
                 applications",
  crossref =     "Meadows:2005:CPA",
  pages =        "310--319",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Ateniese:2005:URT,
  author =       "Giuseppe Ateniese and Jan Camenisch and Breno de
                 Medeiros",
  title =        "Untraceable {RFID} tags via insubvertible encryption",
  crossref =     "Meadows:2005:CPA",
  pages =        "92--101",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Backes:2005:PKS,
  author =       "Michael Backes and Christian Cachin",
  title =        "Public-Key Steganography with Active Attacks",
  crossref =     "Kilian:2005:TCS",
  pages =        "210--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@InProceedings{Bajard:2005:AOP,
  author =       "Jean-Claude Bajard and Laurent Imbert and Thomas
                 Plantard",
  title =        "Arithmetic Operations in the Polynomial Modular Number
                 System",
  crossref =     "IEEE:2005:PIS",
  pages =        "??--??",
  year =         "2005",
  bibdate =      "Wed Jun 22 07:02:55 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://arith17.polito.it/final/paper-168.pdf",
  abstract =     "We propose a new number representation and arithmetic
                 for the elements of the ring of integers modulo p. The
                 so-called Polynomial Modular Number System (PMNS)
                 allows for fast polynomial arithmetic and easy
                 parallelization. The most important contribution of
                 this paper is the fundamental theorem of a Modular
                 Number System, which provides a bound for the
                 coefficients of the polynomials used to represent the
                 set $ \mathbb {Z}_p $. However, we also propose a
                 complete set of algorithms to perform the arithmetic
                 operations over a PMNS, which make this system of
                 practical interest for people concerned about efficient
                 implementation of modular arithmetic.",
  acknowledgement = ack-nhfb,
  keywords =     "Lattice theory; Modular arithmetic; Number system;
                 Table-based methods",
  pagecount =    "8",
}

@InProceedings{Banks:2005:TFC,
  author =       "William D. Banks",
  title =        "Towards faster cryptosystems, {II}",
  crossref =     "Garrett:2005:PKC",
  pages =        "139--152",
  year =         "2005",
  MRclass =      "94A60 (94-02)",
  MRnumber =     "2211875 (2007c:94179)",
  MRreviewer =   "Boris {\`E}. Kunyavski{\u\i}",
  bibdate =      "Fri Sep 17 09:12:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Bao:2005:PSS,
  author =       "Haiyong Bao and Zhenfu Cao and Rongxing Lu",
  title =        "Proxy signature scheme using self-certified public
                 keys",
  journal =      j-APPL-MATH-COMP,
  volume =       "169",
  number =       "2",
  pages =        "1380--1389",
  day =          "15",
  month =        oct,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:49 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Bao:2005:RWH,
  author =       "Haiyong Bao and Zhenfu Cao and Shengbao Wang",
  title =        "Remarks on {Wu--Hsu}'s threshold signature scheme
                 using self-certified public keys",
  journal =      j-J-SYST-SOFTW,
  volume =       "78",
  number =       "1",
  pages =        "56--59",
  month =        oct,
  year =         "2005",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:01 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@InProceedings{Barak:2005:MAP,
  author =       "B. Barak and S. Halevi",
  title =        "A Model and Architecture for Pseudo-Ransom Generation
                 with Applications to {{\tt /dev/random}}",
  crossref =     "Meadows:2005:CPA",
  pages =        "203--212",
  year =         "2005",
  bibdate =      "Mon Apr 03 07:57:43 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Barak:2005:SCA,
  author =       "Boaz Barak and Ran Canetti and Yehuda Lindell and
                 Rafael Pass and Tal Rabin",
  title =        "Secure Computation Without Authentication",
  crossref =     "Shoup:2005:ACC",
  pages =        "361--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_22",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@InProceedings{Barkol:2005:SCC,
  author =       "Omer Barkol and Yuval Ishai",
  title =        "Secure Computation of Constant-Depth Circuits with
                 Applications to Database Search Problems",
  crossref =     "Shoup:2005:ACC",
  pages =        "395--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_24",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@Book{Barrett:2005:SSS,
  author =       "Daniel J. Barrett and Richard E. Silverman and Robert
                 G. Byrnes",
  title =        "{SSH}: The {Secure Shell}: The Definitive Guide",
  publisher =    pub-ORA,
  address =      pub-ORA:adr,
  edition =      "Second",
  pages =        "672 (est.)",
  year =         "2005",
  ISBN =         "0-596-00895-3",
  ISBN-13 =      "978-0-596-00895-6",
  LCCN =         "QA76.76.O63 B369 2001",
  bibdate =      "Thu Apr 21 09:15:39 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$39.95",
  URL =          "http://www.oreilly.com/catalog/9780596008956;
                 http://www.oreilly.com/catalog/sshtdg2/",
  acknowledgement = ack-nhfb,
  subject =      "UNIX Shells; Data encryption (Computer science);
                 Computer networks; Security measures",
}

@Article{Barron:2005:DWP,
  author =       "David W. Barron",
  title =        "{David Wheeler}: a Personal Memoir",
  journal =      j-COMP-J,
  volume =       "48",
  number =       "6",
  pages =        "650--651",
  month =        nov,
  year =         "2005",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxh131",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Nov 8 05:58:50 MST 2005",
  bibsource =    "http://comjnl.oxfordjournals.org/content/vol48/issue6/index.dtl;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://comjnl.oxfordjournals.org/cgi/content/full/48/6/650;
                 http://comjnl.oxfordjournals.org/cgi/reprint/48/6/650",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  keywords =     "Burrows--Wheeler transform (BWT); bzip; bzip2;
                 Cambridge CAP computer; Tiny Encryption Algorithm
                 (TEA)",
  remark =       "From the article: ``Anderson described the history of
                 the Tiny Encryption Algorithm, developed by Wheeler and
                 the late Roger Needham (a former Wheeler research
                 student, later head of the Laboratory and the first
                 managing director of Microsoft Research Ltd). The
                 algorithm was designed in part to `inject some sanity'
                 into the imposition of export controls on encryption
                 software by the US Government in the late 1980s.
                 Wheeler's solution was to devise an encryption
                 algorithm so short, simple and general that it could be
                 memorized and encoded in any language. It proved
                 impossible to put an embargo on what ended up as just
                 eight lines of code---another masterpiece in
                 miniature.'' See \cite{Wheeler:1995:TTE} for the
                 algorithm.\par

                 ``In an email collaboration, Wheeler and Burrows
                 devised a data compression technique based on BWT,
                 which was published as a research report in 1994. The
                 idea was picked up by Dr Dobb's Journal and soon
                 diffused into the commons of computing. Not long after,
                 Burrows received a call from Donald Knuth---asking if
                 he was working with {\em the\/} David Wheeler! Today
                 the technique is the basis of the widely used open
                 source bzip and bzip2 file formats.''",
}

@InProceedings{Baudet:2005:DSP,
  author =       "Mathieu Baudet",
  title =        "Deciding security of protocols against off-line
                 guessing attacks",
  crossref =     "Meadows:2005:CPA",
  pages =        "16--25",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@TechReport{Beebe:2005:CBPd,
  author =       "Nelson H. F. Beebe",
  title =        "A Complete Bibliography of Publications in {{\em
                 Designs, Codes, and Cryptography}}",
  institution =  inst-UTAH-MATH,
  address =      inst-UTAH-MATH:adr,
  pages =        "107",
  day =          "6",
  month =        jul,
  year =         "2005",
  bibdate =      "Wed Jul 06 19:00:56 2005",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/b/beebe-nelson-h-f.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.math.utah.edu/pub/tex/bib/index-table-d.html#designscodescryptogr",
  acknowledgement = ack-nhfb,
}

@InProceedings{Beimel:2005:CIW,
  author =       "Amos Beimel and Tamir Tassa and Enav Weinreb",
  title =        "Characterizing Ideal Weighted Threshold Secret
                 Sharing",
  crossref =     "Kilian:2005:TCS",
  pages =        "600--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@Article{Beimel:2005:PNS,
  author =       "Amos Beimel and Yuval Ishai",
  title =        "On the Power of Nonlinear Secret-Sharing",
  journal =      j-SIAM-J-DISCR-MATH,
  volume =       "19",
  number =       "1",
  pages =        "258--280",
  year =         "2005",
  CODEN =        "SJDMEC",
  DOI =          "https://doi.org/10.1137/S0895480102412868",
  ISSN =         "0895-4801 (print), 1095-7146 (electronic)",
  ISSN-L =       "0895-4801",
  bibdate =      "Thu Dec 29 09:15:53 MST 2005",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SIDMA/19/1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://epubs.siam.org/sam-bin/dbq/article/41286",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Discrete Mathematics",
  journal-URL =  "http://epubs.siam.org/sidma",
}

@InProceedings{Bellare:2005:ISA,
  author =       "Mihir Bellare and Krzysztof Pietrzak and Phillip
                 Rogaway",
  title =        "Improved Security Analyses for {CBC} {MACs}",
  crossref =     "Shoup:2005:ACC",
  pages =        "527--454",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_32",
  bibdate =      "Mon Apr 3 09:26:13 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@InProceedings{Ben-Or:2005:UCS,
  author =       "Michael Ben-Or and Micha{\l} Horodecki and Debbie W.
                 Leung and Dominic Mayers and Jonathan Oppenheim",
  title =        "The Universal Composable Security of Quantum Key
                 Distribution",
  crossref =     "Kilian:2005:TCS",
  pages =        "386--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@Article{Bergadano:2005:DPL,
  author =       "Francesco Bergadano and Davide Cavagnino",
  title =        "Dealing with packet loss in the Interactive Chained
                 Stream Authentication protocol",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "139--146",
  month =        mar,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001877",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bhargavan:2005:SWS,
  author =       "Karthikeyan Bhargavan and C{\'e}dric Fournet and
                 Andrew D. Gordon",
  title =        "A semantics for web services authentication",
  journal =      j-THEOR-COMP-SCI,
  volume =       "340",
  number =       "1",
  pages =        "102--153",
  day =          "13",
  month =        jun,
  year =         "2005",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Thu Jul 7 14:28:20 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Bicakci:2005:ISA,
  author =       "Kemal Bicakci and Nazife Baykal",
  title =        "Improved server assisted signatures",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "47",
  number =       "3",
  pages =        "351--366",
  day =          "21",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Thu Jul 14 17:03:06 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@InProceedings{Bjorn:2005:BHM,
  author =       "Vance Bjorn",
  title =        "Biometrics hit the mainstream: an analysis of security
                 and privacy implications",
  crossref =     "Meadows:2005:CPA",
  pages =        "407--407",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Blackburn:2005:PNP,
  author =       "Simon R. Blackburn and Domingo Gomez-Perez and Jaime
                 Gutierrez and Igor E. Shparlinski",
  title =        "Predicting nonlinear pseudorandom number generators",
  journal =      j-MATH-COMPUT,
  volume =       "74",
  number =       "251",
  pages =        "1471--1494",
  month =        jul,
  year =         "2005",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (print), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Tue Aug 2 10:37:19 MDT 2005",
  bibsource =    "http://www.ams.org/mcom/2005-74-251;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathcomp2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.ams.org/mcom/2005-74-251/S0025-5718-04-01698-9/home.html;
                 http://www.ams.org/mcom/2005-74-251/S0025-5718-04-01698-9/S0025-5718-04-01698-9.dvi;
                 http://www.ams.org/mcom/2005-74-251/S0025-5718-04-01698-9/S0025-5718-04-01698-9.pdf;
                 http://www.ams.org/mcom/2005-74-251/S0025-5718-04-01698-9/S0025-5718-04-01698-9.ps;
                 http://www.ams.org/mcom/2005-74-251/S0025-5718-04-01698-9/S0025-5718-04-01698-9.tex;
                 http://www.jstor.org/stable/pdfplus/4100190.pdf",
  abstract =     "Let $p$ be a prime and let $a$ and $b$ be elements of
                 the finite field $ \mathbb {F}_p $ of $p$ elements. The
                 inversive congruential generator (ICG) is a sequence $
                 (u_n) $ of pseudorandom numbers defined by the relation
                 $ u_{n + 1} \equiv a u_n^{-1} + b \bmod p $. We show
                 that if sufficiently many of the most significant bits
                 of several consecutive values $ u_n $ of the ICG are
                 given, one can recover the initial value $ u_0 $ (even
                 in the case where the coefficients $a$ and $b$ are not
                 known). We also obtain similar results for the
                 quadratic congruential generator (QCG), $ v_{n + 1}
                 \equiv f(v + n) \bmod p $, where $ f \in \mathbb
                 {F}_p[X] $. This suggests that for cryptographic
                 applications ICG and QCG should be used with great
                 care. Our results are somewhat similar to those known
                 for the linear congruential generator (LCG), $ x_{n +
                 1} \equiv a x_n + b \bmod p $, but they apply only to
                 much longer bit strings. We also estimate limits of
                 some heuristic approaches, which still remain much
                 weaker than those known for LCG.",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
}

@Book{Blake:2005:AEC,
  author =       "Ian F. Blake and Gadiel Seroussi and Nigel P. Smart",
  title =        "Advances in elliptic curve cryptography",
  volume =       "317",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  edition =      "Second",
  pages =        "xvi + 281",
  month =        apr,
  year =         "2005",
  ISBN =         "0-521-60415-X",
  ISBN-13 =      "978-0-521-60415-4",
  LCCN =         "QA76.9.A25 A375 2004",
  bibdate =      "Thu Feb 27 06:18:42 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "London Mathematical Society Lecture Note Series",
  URL =          "http://www.cambridge.org/us/academic/subjects/mathematics/number-theory/advances-elliptic-curve-cryptography",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Public key cryptography",
  tableofcontents = "Part I. Protocols \\
                 1. Elliptic curve base protocols / N. P. Smart \\
                 2. On the provable security of ECDSA / D. Brown \\
                 3. Proofs of security for ECIES / A. W. Dent \\
                 Part II. Implementation Techniques \\
                 4. Side channel analysis / E. Oswald \\
                 5. Defenses against side-channel analysis / M. Joye \\
                 Part III. Mathematical Foundations \\
                 6. Advances in point counting / F. Vercauteren \\
                 7. Hyperelliptic curves and the HCDLP / P. Guadry \\
                 8. Weil descent attacks / F. Hess \\
                 Part IV. Pairing Based Techniques \\
                 9. Pairings / S. Galbraith \\
                 10. Cryptography from pairings / K. G. Paterson",
}

@Article{Blanchet:2005:VCP,
  author =       "Bruno Blanchet and Andreas Podelski",
  title =        "Verification of cryptographic protocols: tagging
                 enforces termination",
  journal =      j-THEOR-COMP-SCI,
  volume =       "333",
  number =       "1--2",
  pages =        "67--90",
  day =          "1",
  month =        mar,
  year =         "2005",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Thu Jul 7 14:28:16 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Bodei:2005:APS,
  author =       "C. Bodei and P. Degano and R. Focardi and C. Priami",
  title =        "Authentication primitives for secure protocol
                 specifications",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "21",
  number =       "5",
  pages =        "645--653",
  month =        may,
  year =         "2005",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Jul 15 08:00:46 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@InProceedings{Boldyreva:2005:ARO,
  author =       "Alexandra Boldyreva and Marc Fischlin",
  title =        "Analysis of Random Oracle Instantiation Scenarios for
                 {OAEP} and Other Practical Schemes",
  crossref =     "Shoup:2005:ACC",
  pages =        "412--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_25",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@InProceedings{Boneh:2005:CRB,
  author =       "Dan Boneh and Craig Gentry and Brent Waters",
  title =        "Collusion Resistant Broadcast Encryption with Short
                 Ciphertexts and Private Keys",
  crossref =     "Shoup:2005:ACC",
  pages =        "258--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_16",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@InProceedings{Boneh:2005:EDF,
  author =       "Dan Boneh and Eu-Jin Goh and Kobbi Nissim",
  title =        "Evaluating {$2$-DNF} Formulas on Ciphertexts",
  crossref =     "Kilian:2005:TCS",
  pages =        "325--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@Book{Boone:2005:BHC,
  author =       "J. V. Boone",
  title =        "A brief history of cryptology",
  publisher =    "Naval Institute Press",
  address =      "Annapolis, MD, USA",
  pages =        "xi + 192",
  year =         "2005",
  ISBN =         "1-59114-084-6",
  ISBN-13 =      "978-1-59114-084-9",
  LCCN =         "TK5102.85 .B66 2005",
  bibdate =      "Mon Jun 16 16:48:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip055/2005000009.html",
  acknowledgement = ack-nhfb,
  subject =      "Telecommunication; Security measures; Computer
                 security; Cryptography",
  tableofcontents = "Overview \\
                 1200--1800: The introduction of mechanical aids \\
                 1800--1895: The introduction of the telegraph, the
                 telephone, and mechanical computing aids \\
                 1895--1939: The introduction of radio stimulates new
                 applications \\
                 Mid-1930s--1950: World War II accelerates developments
                 in all fields \\
                 1950--1969: The introduction of solid-state electronics
                 and satellite technologies \\
                 1970--2003: Extended networking concepts bring closer
                 integration to all three technologies \\
                 Summary \\
                 Appendix A: Introduction to cryptology \\
                 Appendix B: The origins of NSA",
}

@InProceedings{Borders:2005:CHP,
  author =       "Kevin Borders and Xin Zhao and Atul Prakash",
  title =        "{CPOL}: high-performance policy evaluation",
  crossref =     "Meadows:2005:CPA",
  pages =        "147--157",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Boyen:2005:DCC,
  author =       "Xavier Boyen and Qixiang Mei and Brent Waters",
  title =        "Direct chosen ciphertext security from identity-based
                 techniques",
  crossref =     "Meadows:2005:CPA",
  pages =        "320--329",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Breunesse:2005:FMS,
  author =       "C.-B. Breunesse and N. Cata{\~n}o and M. Huisman and
                 B. Jacobs",
  title =        "Formal methods for smart cards: an experience report",
  journal =      j-SCI-COMPUT-PROGRAM,
  volume =       "55",
  number =       "1--3",
  pages =        "53--80",
  month =        mar,
  year =         "2005",
  CODEN =        "SCPGD4",
  ISSN =         "0167-6423 (print), 1872-7964 (electronic)",
  ISSN-L =       "0167-6423",
  bibdate =      "Fri Apr 1 18:38:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01676423",
  acknowledgement = ack-nhfb,
  fjournal =     "Science of Computer Programming",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01676423",
}

@Book{Brown:2005:CEC,
  author =       "Christopher L. T. Brown",
  title =        "Computer evidence: collection and preservation",
  publisher =    "Charles River Media",
  address =      "Hingham, MA, USA",
  pages =        "????",
  year =         "2005",
  ISBN =         "1-58450-405-6 (pbk. with cd-rom)",
  ISBN-13 =      "978-1-58450-405-4 (pbk. with cd-rom)",
  LCCN =         "HV8079.C65 B76 2005",
  bibdate =      "Fri Dec 9 06:49:23 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip0514/2005016674.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer crimes; Investigation",
}

@Book{Browne:2005:DEP,
  author =       "Graham T. Browne",
  title =        "Data encryption: a practical guide to protecting
                 sensitive information",
  publisher =    "Aaben Kryptografi",
  address =      "Cranage, UK",
  pages =        "????",
  year =         "2005",
  ISBN =         "0-9549513-0-1",
  ISBN-13 =      "978-0-9549513-0-6",
  LCCN =         "????",
  bibdate =      "Wed Sep 28 08:11:55 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "One CD-ROM.",
  acknowledgement = ack-nhfb,
}

@Book{Brzezinski:2005:MRL,
  author =       "Zbigniew Brzezi{\'n}ski and Jan Stanis{\l}aw
                 Ciechanowski and Antoni Bohdanowicz and Witold
                 Zbirohowski-Ko{\'s}cia and others",
  title =        "{Marjan Rejewski} 1905--1980: living with the {Enigma}
                 secret",
  publisher =    "Wydawnictwo Tekst Sp. z o.o.",
  address =      "Bydgoszcz, Poland",
  pages =        "288",
  year =         "2005",
  ISBN =         "83-7208-117-4",
  ISBN-13 =      "978-83-7208-117-9",
  LCCN =         "????",
  bibdate =      "Sat Jun 6 12:17:40 MDT 2015",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Introduction by Professor Zbigniew Brzezi{\'n}ski.",
  acknowledgement = ack-nhfb,
  subject =      "Rejewski, Marian; Enigma (maszyna szyfruj{\k{a}}ca).",
  subject-dates = "(1905--1980)",
}

@Article{Bugliesi:2005:NIP,
  author =       "Michele Bugliesi and Sabina Rossi",
  title =        "Non-interference proof techniques for the analysis of
                 cryptographic protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "87--113",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13104",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:39 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Burnside:2005:CCP,
  author =       "Matthew Burnside and Angelos D. Keromytis",
  title =        "The case for crypto protocol awareness inside the {OS}
                 kernel",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "33",
  number =       "1",
  pages =        "58--64",
  month =        mar,
  year =         "2005",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 09:40:37 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@InProceedings{Camenisch:2005:FTO,
  author =       "Jan Camenisch and Anna Lysyanskaya",
  title =        "A Formal Treatment of Onion Routing",
  crossref =     "Shoup:2005:ACC",
  pages =        "169--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_11",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@InProceedings{Canetti:2005:ASN,
  author =       "Ran Canetti and Shai Halevi and Jonathan Katz",
  title =        "Adaptively-Secure, Non-interactive Public-Key
                 Encryption",
  crossref =     "Kilian:2005:TCS",
  pages =        "150--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@InProceedings{Canetti:2005:HAW,
  author =       "Ran Canetti and Shai Halevi and Michael Steiner",
  title =        "Hardness Amplification of Weakly Verifiable Puzzles",
  crossref =     "Kilian:2005:TCS",
  pages =        "17--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@Article{Castro:2005:NRG,
  author =       "Julio C{\'e}sar Hern{\'a}ndez Castro and Pedro Isasi
                 Vi{\~n}uela",
  title =        "New results on the genetic cryptanalysis of {TEA} and
                 reduced-round versions of {XTEA}",
  journal =      j-NEW-GEN-COMP,
  volume =       "23",
  number =       "3",
  pages =        "233--243",
  year =         "2005",
  CODEN =        "NGCOE5",
  DOI =          "https://doi.org/10.1007/BF03037657",
  ISSN =         "0288-3635 (print), 1882-7055 (electronic)",
  ISSN-L =       "0288-3635",
  bibdate =      "Wed Feb 01 16:35:39 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.springerlink.com/content/e018uh040400kh87/",
  abstract =     "Recently, a quick and simple way of creating very
                 efficient distinguishers for cryptographic primitives
                 such as block ciphers or hash functions, was presented
                 and proved useful by the authors. In this paper, this
                 cryptanalytic attack (named genetic cryptanalysis after
                 its use of genetic algorithms) is shown to be
                 successful when applied over reduced-round versions of
                 the block cipher XTEA. Efficient distinguishers for
                 XTEA are proposed for up to 4 cycles (8 rounds).
                 Additionally, a variant of this genetic attack is also
                 introduced, and their results over the block cipher TEA
                 presented, which are the most powerful published to
                 date.",
  acknowledgement = ack-nhfb,
  fjournal =     "New Generation Computing",
  keywords =     "block ciphers; cryptanalysis; distinguishers; TEA;
                 XTEA",
}

@Article{Ceselli:2005:MAI,
  author =       "Alberto Ceselli and Ernesto Damiani and Sabrina {De
                 Capitani Di Vimercati} and Sushil Jajodia and Stefano
                 Paraboschi and Pierangela Samarati",
  title =        "Modeling and assessing inference exposure in encrypted
                 databases",
  journal =      j-TISSEC,
  volume =       "8",
  number =       "1",
  pages =        "119--152",
  month =        feb,
  year =         "2005",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Mar 24 15:53:55 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Challal:2005:HHC,
  author =       "Yacine Challal and Abdelmadjid Bouabdallah and Hatem
                 Bettahar",
  title =        "{$ H_2 A $}: Hybrid Hash-chaining scheme for Adaptive
                 multicast source authentication of media-streaming",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "1",
  pages =        "57--68",
  month =        feb,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001816",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chan:2005:MCM,
  author =       "Alvin T. S. Chan",
  title =        "Mobile cookies management on a smart card",
  journal =      j-CACM,
  volume =       "48",
  number =       "11",
  pages =        "38--43",
  month =        nov,
  year =         "2005",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Oct 25 06:20:33 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Chan:2005:STM,
  author =       "Chao-Wen Chan and Chin-Chen Chang",
  title =        "A scheme for threshold multi-secret sharing",
  journal =      j-APPL-MATH-COMP,
  volume =       "166",
  number =       "1",
  pages =        "1--14",
  day =          "6",
  month =        jul,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:46 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Book{Chandra:2005:BWS,
  author =       "Praphul Chandra",
  title =        "Bulletproof wireless security: {GSM}, {UMTS}, 802.11
                 and ad hoc security",
  publisher =    pub-NEWNES,
  address =      pub-NEWNES:adr,
  pages =        "xxxiii + 237",
  year =         "2005",
  ISBN =         "0-7506-7746-5 (paperback)",
  ISBN-13 =      "978-0-7506-7746-2 (paperback)",
  LCCN =         "TK5103.2 .C445 2005",
  bibdate =      "Mon Oct 3 19:13:41 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Communications engineering series",
  URL =          "http://books.elsevier.com/us/mk/us/subindex.asp?isbn=0750677465",
  acknowledgement = ack-nhfb,
  subject =      "Wireless communication systems; Security measures;
                 Wireless LANs; Security measures; Global system for
                 mobile communications; Security measures; Universal
                 Mobile Telecommunications System; Security measures;
                 IEEE 802.11 (Standard)",
}

@Article{Chang:2005:ASN,
  author =       "Ya-Fen Chang and Chin-Chen Chang",
  title =        "Authentication schemes with no verification table",
  journal =      j-APPL-MATH-COMP,
  volume =       "167",
  number =       "2",
  pages =        "820--832",
  day =          "15",
  month =        aug,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:48 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Chang:2005:CIA,
  author =       "Ting-Yi Chang and Chou-Chan Yang and Ya-Wen Yang",
  title =        "Cryptanalysis of the improved authenticated key
                 agreement protocol",
  journal =      j-APPL-MATH-COMP,
  volume =       "171",
  number =       "2",
  pages =        "771--774",
  day =          "15",
  month =        dec,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:51 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Chang:2005:DSM,
  author =       "Ya-Fen Chang and Chin-Chen Chang and Hui-Feng Huang",
  title =        "Digital signature with message recovery using
                 self-certified public keys without trustworthy system
                 authority",
  journal =      j-APPL-MATH-COMP,
  volume =       "161",
  number =       "1",
  pages =        "211--227",
  day =          "4",
  month =        feb,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:40 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Chang:2005:EAP,
  author =       "Ya-Fen Chang and Chin-Chen Chang",
  title =        "An efficient authentication protocol for mobile
                 satellite communication systems",
  journal =      j-OPER-SYS-REV,
  volume =       "39",
  number =       "1",
  pages =        "70--84",
  month =        jan,
  year =         "2005",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:38 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Chang:2005:ILW,
  author =       "Ting-Yi Chang and Min-Shiang Hwang and Wei-Pang Yang",
  title =        "An improvement on the {Lin--Wu} $ (t, n) $ threshold
                 verifiable multi-secret sharing scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "163",
  number =       "1",
  pages =        "169--178",
  day =          "5",
  month =        apr,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:43 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Chang:2005:NMS,
  author =       "Ting-Yi Chang and Min-Shiang Hwang and Wei-Pang Yang",
  title =        "A new multi-stage secret sharing scheme using one-way
                 function",
  journal =      j-OPER-SYS-REV,
  volume =       "39",
  number =       "1",
  pages =        "48--55",
  month =        jan,
  year =         "2005",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:38 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Chang:2005:SAK,
  author =       "Ting-Yi Chang and Wei-Pang Yang and Min-Shiang Hwang",
  title =        "Simple authenticated key agreement and protected
                 password change protocol",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "49",
  number =       "5--6",
  pages =        "703--714",
  month =        apr # "\slash " # may,
  year =         "2005",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:49:43 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122105000842",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@InProceedings{Chawla:2005:TPP,
  author =       "Shuchi Chawla and Cynthia Dwork and Frank McSherry and
                 Adam Smith and Hoeteck Wee",
  title =        "Toward Privacy in Public Databases",
  crossref =     "Kilian:2005:TCS",
  pages =        "363--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@Article{Chen:2005:CLR,
  author =       "Chien-Yuan Chen and Cheng-Yuan Ku and David C. Yen",
  title =        "Cryptanalysis of large {RSA} exponent by using the
                 {LLL} algorithm",
  journal =      j-APPL-MATH-COMP,
  volume =       "169",
  number =       "1",
  pages =        "516--525",
  day =          "1",
  month =        oct,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:49 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Chen:2005:EDS,
  author =       "Yi-Hwa Chen and Jinn-Ke Jan",
  title =        "Enhancement of digital signature with message recovery
                 using self-certified public keys and its variants",
  journal =      j-OPER-SYS-REV,
  volume =       "39",
  number =       "3",
  pages =        "90--96",
  month =        jul,
  year =         "2005",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:48 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Chen:2005:ENB,
  author =       "Yen-Cheng Chen and Lo-Yao Yeh",
  title =        "An efficient nonce-based authentication scheme with
                 key agreement",
  journal =      j-APPL-MATH-COMP,
  volume =       "169",
  number =       "2",
  pages =        "982--994",
  day =          "15",
  month =        oct,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:49 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Chen:2005:EUG,
  author =       "Tzer-Shyong Chen and Jen-Yan Huang and Tzer-Long
                 Chen",
  title =        "An efficient undeniable group-oriented signature
                 scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "165",
  number =       "1",
  pages =        "95--102",
  day =          "6",
  month =        jun,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:45 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Chen:2005:NVW,
  author =       "Zhenyong Chen and Junhui Deng and Long Tang and
                 Zesheng Tang",
  title =        "A Novel Video Watermarking Resistant to
                 Spatio-Temporal Desynchronization",
  crossref =     "Han:2005:PJI",
  pages =        "532--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Chen:2005:TSS,
  author =       "Tzer-Shyong Chen",
  title =        "A threshold signature scheme based on the elliptic
                 curve cryptosystem",
  journal =      j-APPL-MATH-COMP,
  volume =       "162",
  number =       "3",
  pages =        "1119--1134",
  day =          "25",
  month =        mar,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:42 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Cheng:2005:RIC,
  author =       "Xiaorong Cheng and Huilan Zhao and Jitian Kou",
  title =        "Research and Improvement on Computer Intrusion
                 Detection Technology Based on Immune Principle",
  crossref =     "Han:2005:PJI",
  pages =        "167--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Cherry:2005:MDC,
  author =       "S. Cherry",
  title =        "My dad's computer: a conservation with {Internet}
                 security expert {William R. Cheswick}",
  journal =      j-IEEE-SPECTRUM,
  volume =       "42",
  number =       "8",
  pages =        "55--56",
  month =        aug,
  year =         "2005",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2005.1491229",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "authorisation; Books; Computer hacking; computer
                 network reliability; Computer security; Cryptography;
                 Data security; firewalls; Government; Internet;
                 Internet security; Keyboards; Lumeta Corp.; Probes;
                 telecommunication security; Telecommunications",
}

@Article{Chess:2005:SAC,
  author =       "David M. Chess",
  title =        "Security in autonomic computing",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "33",
  number =       "1",
  pages =        "2--5",
  month =        mar,
  year =         "2005",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 09:40:37 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@InProceedings{Chevallier-Mames:2005:ECB,
  author =       "Beno{\^\i}t Chevallier-Mames",
  title =        "An Efficient {CDH}-Based Signature Scheme with a Tight
                 Security Reduction",
  crossref =     "Shoup:2005:ACC",
  pages =        "511--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_31",
  bibdate =      "Mon Apr 3 09:26:13 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@Article{Chien:2005:NRS,
  author =       "Hung-Yu Chien and Ren-Chiun Wang and Chou-Chen Yang",
  title =        "Note on Robust and Simple Authentication Protocol",
  journal =      j-COMP-J,
  volume =       "48",
  number =       "1",
  pages =        "27--29",
  month =        jan,
  year =         "2005",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Jun 28 17:48:35 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_48/Issue_01/",
  URL =          "http://www3.oup.co.uk/computer_journal/hdb/Volume_48/Issue_01/bxh061.sgm.abs.html;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_48/Issue_01/pdf/bxh061.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Choi:2005:JMA,
  author =       "Hyung-Kyu Choi and Yoo C. Chung and Soo-Mook Moon",
  title =        "{Java} Memory Allocation with Lazy Worst Fit for Small
                 Objects",
  journal =      j-COMP-J,
  volume =       "48",
  number =       "4",
  pages =        "437--442",
  month =        jul,
  year =         "2005",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxh101",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Nov 8 05:58:50 MST 2005",
  bibsource =    "http://comjnl.oxfordjournals.org/content/vol48/issue4/index.dtl;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://comjnl.oxfordjournals.org/cgi/content/abstract/48/4/437;
                 http://comjnl.oxfordjournals.org/cgi/reprint/48/4/437",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Choie:2005:EIB,
  author =       "Young Ju Choie and Eunkyung Jeong and Eunjeong Lee",
  title =        "Efficient identity-based authenticated key agreement
                 protocol from pairings",
  journal =      j-APPL-MATH-COMP,
  volume =       "162",
  number =       "1",
  pages =        "179--188",
  day =          "4",
  month =        mar,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:41 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Cimato:2005:ICV,
  author =       "Stelvio Cimato and Alfredo {De Santis} and Anna Lisa
                 Ferrara and Barbara Masucci",
  title =        "Ideal contrast visual cryptography schemes with
                 reversing",
  journal =      j-INFO-PROC-LETT,
  volume =       "93",
  number =       "4",
  pages =        "199--206",
  day =          "28",
  month =        feb,
  year =         "2005",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 18:40:59 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Clarke:2005:AUM,
  author =       "N. L. Clarke and S. M. Furnell",
  title =        "Authentication of users on mobile telephones --- a
                 survey of attitudes and practices",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "7",
  pages =        "519--527",
  month =        oct,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001446",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{Cojocaru:2005:ISM,
  author =       "Alina Cojocaru and Maruti Ram Murty",
  title =        "An introduction to sieve methods and their
                 applications",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "????",
  year =         "2005",
  ISBN =         "0-521-84816-4 (hardcover), 0-521-61275-6 (paperback)",
  ISBN-13 =      "978-0-521-84816-9 (hardcover), 978-0-521-61275-3
                 (paperback)",
  LCCN =         "????",
  bibdate =      "Wed Sep 14 14:36:09 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "London Mathematical Society student texts",
  acknowledgement = ack-nhfb,
  subject =      "Sieves (Mathematics)",
}

@Article{Collberg:2005:SWF,
  author =       "Christian Collberg and Tapas Ranjan Sahoo",
  title =        "Software watermarking in the frequency domain:
                 Implementation, analysis, and attacks",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "721--755",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13503",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:56 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Comon:2005:TAO,
  author =       "Hubert Comon and V{\'e}ronique Cortier",
  title =        "Tree automata with one memory set constraints and
                 cryptographic protocols",
  journal =      j-THEOR-COMP-SCI,
  volume =       "331",
  number =       "1",
  pages =        "143--214",
  day =          "15",
  month =        feb,
  year =         "2005",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Thu Jul 7 14:28:15 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Contini:2005:SAA,
  author =       "Scott Contini and Igor E. Shparlinski",
  editor =       "Colin Boyd and Juan Manuel Gonz{\'a}lez Nieto",
  title =        "On {Stern}'s Attack Against Secret Truncated Linear
                 Congruential Generators",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3574",
  pages =        "180--206",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11506157_5",
  ISBN =         "3-540-26547-3",
  ISBN-13 =      "978-3-540-26547-4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  LCCN =         "????",
  bibdate =      "Wed Dec 21 08:25:19 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  note =         "Information Security and Privacy 10th Australasian
                 Conference, ACISP 2005, Brisbane, Australia, July 4--6,
                 2005. Proceedings",
  abstract =     "In 1987, Stern \cite{Stern:1987:SLC} showed how the
                 parameters for secret truncated linear congruential
                 generators could be derived in polynomial time. Here,
                 we present a modification to that algorithm which makes
                 it simpler, more robust, and require less data. We then
                 present a more careful analysis of the algorithm, and
                 establish some limits of its applicability. Thus,
                 secret truncated linear congruential generators may not
                 necessarily be insecure for properly chosen parameters.
                 Unfortunately, as in the original algorithm, all the
                 results remain heuristic, however we present results of
                 numerical experiments which support our conclusions.",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Cooper:2005:AAP,
  author =       "Brian F. Cooper and Mayank Bawa and Neil Daswani and
                 Sergio Marti and Hector Garcia-Molina",
  title =        "Authenticity and availability in {PIPE} networks",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "21",
  number =       "3",
  pages =        "391--400",
  day =          "1",
  month =        mar,
  year =         "2005",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Jul 15 08:00:45 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@InProceedings{Coron:2005:MDR,
  author =       "Jean-S{\'e}bastien Coron and Yevgeniy Dodis and
                 C{\'e}cile Malinaud and Prashant Puniya",
  title =        "{Merkle--Damg{\aa}rd} Revisited: How to Construct a
                 Hash Function",
  crossref =     "Shoup:2005:ACC",
  pages =        "430--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_26",
  bibdate =      "Mon Apr 3 09:26:13 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@InProceedings{Cramer:2005:BBS,
  author =       "Ronald Cramer and Serge Fehr and Martijn Stam",
  title =        "Black-Box Secret Sharing from Primitive Sets in
                 Algebraic Number Fields",
  crossref =     "Shoup:2005:ACC",
  pages =        "344--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_21",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@InProceedings{Cramer:2005:CMS,
  author =       "Ronald Cramer and Vanesa Daza and Ignacio Gracia and
                 Jorge Jim{\'e}nez Urroz and Gregor Leander and Jaume
                 Mart{\'\i}-Farr{\'e} and Carles Padr{\'o}",
  title =        "On Codes, Matroids and Secure Multi-party Computation
                 from Linear Secret Sharing Schemes",
  crossref =     "Shoup:2005:ACC",
  pages =        "327--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_20",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@InProceedings{Cramer:2005:SCP,
  author =       "Ronald Cramer and Ivan Damg{\aa}rd and Yuval Ishai",
  title =        "Share Conversion, Pseudorandom Secret-Sharing and
                 Applications to Secure Computation",
  crossref =     "Kilian:2005:TCS",
  pages =        "342--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@InProceedings{Crampton:2005:UDR,
  author =       "Jason Crampton",
  title =        "Understanding and developing role-based administrative
                 models",
  crossref =     "Meadows:2005:CPA",
  pages =        "158--167",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Crandall:2005:DUV,
  author =       "Jedidiah R. Crandall and Zhendong Su and S. Felix Wu",
  title =        "On deriving unknown vulnerabilities from zero-day
                 polymorphic and metamorphic worm exploits",
  crossref =     "Meadows:2005:CPA",
  pages =        "235--248",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Crandall:2005:SAM,
  author =       "Jedidiah R. Crandall and Frederic T. Chong",
  title =        "A security assessment of the {Minos} architecture",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "33",
  number =       "1",
  pages =        "48--57",
  month =        mar,
  year =         "2005",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 09:40:37 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Book{Cranor:2005:SUD,
  author =       "Lorrie Faith Cranor and Simson Garfinkel",
  title =        "Security and usability: designing secure systems that
                 people can use",
  publisher =    pub-ORA,
  address =      pub-ORA:adr,
  pages =        "xviii + 714",
  year =         "2005",
  ISBN =         "0-596-00827-9 (paperback)",
  ISBN-13 =      "978-0-596-00827-7 (paperback)",
  LCCN =         "QA76.9.A25; QA76.9.A25 S3533 2005; QA76.9.A25 S43
                 2005eb; QA76.9.A25 S43 2005",
  bibdate =      "Thu Oct 06 09:06:53 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "US\$44.95, CDN\$62.95, UK\pounds 31.95",
  acknowledgement = ack-nhfb,
}

@Article{Crawford:2005:FBS,
  author =       "Diane Crawford and Marius Matioc and Steven M.
                 Bellovin and Richard Hubert and Andrew D. {Wolfe, Jr.}
                 and David Foulser and Andrew R. Kilner",
  title =        "Forum: To Block Spam, Demand Sender Authentication;
                 Not Revolutionary (Thank Goodness); How to Know the
                 Known from the Unknowns; User First in User-Centered
                 Design",
  journal =      j-CACM,
  volume =       "48",
  number =       "3",
  pages =        "11--13",
  month =        mar,
  year =         "2005",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 16:07:27 MST 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Book{Curtin:2005:BFC,
  author =       "Matt Curtin",
  title =        "Brute force: cracking the {Data Encryption Standard}",
  publisher =    pub-COPERNICUS,
  address =      pub-COPERNICUS:adr,
  pages =        "x + 291",
  year =         "2005",
  ISBN =         "0-387-20109-2",
  ISBN-13 =      "978-0-387-20109-2",
  LCCN =         "QA76.9.A25 C873 2005",
  bibdate =      "Wed Sep 28 07:16:15 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  reviewurl =    "http://www.unixreview.com/documents/s=9884/ur0509k/ur0509k.html",
  subject =      "Computer security; Data encryption (Computer
                 science)",
}

@Article{Cvejic:2005:IRL,
  author =       "N. Cvejic and T. Sepp{\"a}nen",
  title =        "Increasing Robustness of {LSB} Audio Steganography by
                 Reduced Distortion {LSB} Coding",
  journal =      j-J-UCS,
  volume =       "11",
  number =       "1",
  pages =        "56--65",
  day =          "28",
  month =        jan,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Wed Jul 6 08:14:47 MDT 2005",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_11_1/increasing_robustness_of_lsb",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@InProceedings{Damgaard:2005:CRM,
  author =       "Ivan Damg{\aa}rd and Yuval Ishai",
  title =        "Constant-Round Multiparty Computation Using a
                 Black-Box Pseudorandom Generator",
  crossref =     "Shoup:2005:ACC",
  pages =        "378--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_23",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@InProceedings{Damgaard:2005:QCN,
  author =       "Ivan Damg{\aa}rd and Thomas Brochmann Pedersen and
                 Louis Salvail",
  title =        "A Quantum Cipher with Near Optimal Key-Recycling",
  crossref =     "Shoup:2005:ACC",
  pages =        "494--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_30",
  bibdate =      "Mon Apr 3 09:26:13 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@InProceedings{Damgard:2005:CBQ,
  author =       "I. B. Damgard and S. Fehr and L. Salvail and C.
                 Schaffner",
  title =        "Cryptography in the bounded quantum-storage model",
  crossref =     "IEEE:2005:AIS",
  pages =        "449--458",
  year =         "2005",
  DOI =          "https://doi.org/10.1109/SFCS.2005.30",
  bibdate =      "Thu Apr 12 09:33:00 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2000.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10244",
}

@InProceedings{Datta:2005:RBN,
  author =       "Anupam Datta and Ralf K{\"u}sters and John C. Mitchell
                 and Ajith Ramanathan",
  title =        "On the Relationships Between Notions of
                 Simulation-Based Security",
  crossref =     "Kilian:2005:TCS",
  pages =        "476--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@InProceedings{Dedic:2005:ULB,
  author =       "Nenad Dedi{\'c} and Gene Itkis and Leonid Reyzin and
                 Scott Russell",
  title =        "Upper and Lower Bounds on Black-Box Steganography:
                 Extended Abstract",
  crossref =     "Kilian:2005:TCS",
  pages =        "227--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@Article{DelLungo:2005:GSP,
  author =       "Alberto {Del Lungo} and Guy Louchard and Claudio
                 Marini and Franco Montagna",
  title =        "The {Guessing Secrets} problem: a probabilistic
                 approach",
  journal =      j-J-ALG,
  volume =       "55",
  number =       "2",
  pages =        "142--176",
  month =        may,
  year =         "2005",
  CODEN =        "JOALDV",
  DOI =          "https://doi.org/10.1016/j.jalgor.2004.03.001",
  ISSN =         "0196-6774 (print), 1090-2678 (electronic)",
  ISSN-L =       "0196-6774",
  bibdate =      "Tue Dec 11 09:21:47 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jalg.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0196677404000422",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Algorithms",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01966774",
}

@Article{delRey:2005:SSS,
  author =       "A. Mart{\'\i}n del Rey and J. Pereira Mateus and G.
                 Rodr{\'\i}guez S{\'a}nchez",
  title =        "A secret sharing scheme based on cellular automata",
  journal =      j-APPL-MATH-COMP,
  volume =       "170",
  number =       "2",
  pages =        "1356--1364",
  day =          "15",
  month =        nov,
  year =         "2005",
  CODEN =        "AMHCBQ",
  DOI =          "https://doi.org/10.1016/j.amc.2005.01.026",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:50 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/applmathcomput2005.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0096300305000718",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Ding:2005:CTC,
  author =       "Cunsheng Ding and Xuesong Wang",
  title =        "A coding theory construction of new systematic
                 authentication codes",
  journal =      j-THEOR-COMP-SCI,
  volume =       "330",
  number =       "1",
  pages =        "81--99",
  day =          "31",
  month =        jan,
  year =         "2005",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Thu Jul 7 14:28:13 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@InProceedings{Ding:2005:ECB,
  author =       "Yan Zong Ding",
  title =        "Error Correction in the Bounded Storage Model",
  crossref =     "Kilian:2005:TCS",
  pages =        "578--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@Article{Ding:2005:NME,
  author =       "Yong Ding and Kwok-wo Wong and Yu-min Wang",
  title =        "A $w$-{NNAF} method for the efficient computation of
                 scalar multiplication in elliptic curve cryptography",
  journal =      j-APPL-MATH-COMP,
  volume =       "167",
  number =       "1",
  pages =        "81--93",
  day =          "5",
  month =        aug,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:47 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Ding:2005:RNM,
  author =       "J. Ding and D. Schmidt",
  title =        "{Rainbow}, a New Multivariable Polynomial Signature
                 Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3531",
  pages =        "164--175",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 31 15:57:42 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
  journal-URL =  "http://link.springer.com/bookseries/558",
  remark =       "Proceedings of Applied Cryptography and Network
                 Security (ACNS 05).",
}

@InProceedings{DiRaimondo:2005:NAD,
  author =       "Mario {Di Raimondo} and Rosario Gennaro",
  title =        "New approaches for deniable authentication",
  crossref =     "Meadows:2005:CPA",
  pages =        "112--121",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Dodis:2005:CCS,
  author =       "Yevgeniy Dodis and Jonathan Katz",
  title =        "Chosen-Ciphertext Security of Multiple Encryption",
  crossref =     "Kilian:2005:TCS",
  pages =        "188--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@InProceedings{Dodis:2005:ESE,
  author =       "Yevgeniy Dodis and Adam Smith",
  title =        "Entropic Security and the Encryption of High Entropy
                 Messages",
  crossref =     "Kilian:2005:TCS",
  pages =        "556--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@InProceedings{Dodis:2005:GIF,
  author =       "Yevgeniy Dodis and Roberto Oliveira and Krzysztof
                 Pietrzak",
  title =        "On the Generic Insecurity of the Full Domain Hash",
  crossref =     "Shoup:2005:ACC",
  pages =        "449--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_27",
  bibdate =      "Mon Apr 3 09:26:13 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@InProceedings{Du:2005:BRS,
  author =       "Xiaozhen Du and Weidong Kou and Kai Fan and Yuxia
                 Xiao",
  title =        "Breaking and Repairing of a Strong Proxy Signature
                 Scheme With Proxy Signer Privacy Protection",
  crossref =     "Han:2005:PJI",
  pages =        "100--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Dwork:2005:PPW,
  author =       "Cynthia Dwork and Moni Naor and Hoeteck Wee",
  title =        "Pebbling and Proofs of Work",
  crossref =     "Shoup:2005:ACC",
  pages =        "37--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_3",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@Article{Eagleton:2005:BRD,
  author =       "Catherine Eagleton",
  title =        "Book Review: {David A. King, The Ciphers of the Monks:
                 A Forgotten Number-Notation of the Middle Ages.
                 Boethius, 44. Stuttgart: FranzSteiner Verlag, 2001. Pp.
                 506. ISBN 3-515-07640-9. DM 199.49, EUR 102.00
                 (hardcover)}",
  journal =      j-BRITISH-J-HIST-SCI,
  volume =       "38",
  number =       "3",
  pages =        "359--360",
  month =        sep,
  year =         "2005",
  CODEN =        "BJHSAT",
  DOI =          "https://doi.org/10.1017/S0007087405277270",
  ISSN =         "0007-0874 (print), 1474-001X (electronic)",
  ISSN-L =       "0007-0874",
  bibdate =      "Thu Sep 23 07:34:43 MDT 2010",
  bibsource =    "http://journals.cambridge.org/action/displayJournal?jid=BJH;
                 https://www.math.utah.edu/pub/tex/bib/bjhs2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jstor.org/stable/4028680",
  acknowledgement = ack-nhfb,
  fjournal =     "British Journal for the History of Science",
  journal-URL =  "http://journals.cambridge.org/action/displayJournal?jid=BJH",
}

@Article{Eberle:2005:ANG,
  author =       "Hans Eberle and Sheueling Shantz and Vipul Gupta and
                 Nils Gura and Leonard Rarick and Lawrence Spracklen",
  title =        "Accelerating Next-Generation Public-Key Cryptosystems
                 on General-Purpose {CPUs}",
  journal =      j-IEEE-MICRO,
  volume =       "25",
  number =       "2",
  pages =        "52--59",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "IEMIDZ",
  DOI =          "https://doi.org/10.1109/MM.2005.24",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Wed Apr 20 08:11:29 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/comp/mags/mi/2005/02/m2052abs.htm;
                 http://csdl.computer.org/dl/mags/mi/2005/02/m2052.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Micro",
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
}

@Article{Echizen:2005:PAV,
  author =       "Isao Echizen and Yasuhiro Fujii and Takaaki Yamada and
                 Satoru Tezuka and Hiroshi Yoshiura",
  title =        "Perceptually Adaptive Video Watermarking Using Motion
                 Estimation",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "5",
  number =       "1",
  pages =        "89--??",
  month =        jan,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "0219-4678",
  bibdate =      "Wed Jan 12 05:16:34 MST 2005",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Book{Eilam:2005:RSR,
  author =       "Eldad Eilam and Elliot J. Chikofsky",
  title =        "Reversing: secrets of reverse engineering",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xxviii + 589",
  year =         "2005",
  ISBN =         "0-7645-7481-7 (paperback)",
  ISBN-13 =      "978-0-7645-7481-8 (paperback)",
  LCCN =         "QA76.758 .E35 2005",
  bibdate =      "Fri Nov 16 21:15:37 MST 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0628/2005921595-b.html;
                 http://www.loc.gov/catdir/enhancements/fy0628/2005921595-d.html;
                 http://www.loc.gov/catdir/enhancements/fy0628/2005921595-t.html",
  acknowledgement = ack-nhfb,
  subject =      "Software engineering; Reverse engineering; Computer
                 security",
}

@Article{Elbirt:2005:ILD,
  author =       "Adam J. Elbirt and Christof Paar",
  title =        "An Instruction-Level Distributed Processor for
                 Symmetric-Key Cryptography",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "16",
  number =       "5",
  pages =        "468--480",
  month =        may,
  year =         "2005",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2005.51",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Thu Nov 10 08:30:30 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@InProceedings{Enck:2005:EOF,
  author =       "William Enck and Patrick Traynor and Patrick McDaniel
                 and Thomas La Porta",
  title =        "Exploiting open functionality in {SMS}-capable
                 cellular networks",
  crossref =     "Meadows:2005:CPA",
  pages =        "393--404",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Fair:2005:CST,
  author =       "Ted Fair and Michael Nordfelt and Sandra Ring and Eric
                 Cole",
  title =        "Cyber spying: tracking your family's (sometimes)
                 secret online lives",
  publisher =    pub-SYNGRESS,
  address =      pub-SYNGRESS:adr,
  pages =        "xxiii + 439",
  year =         "2005",
  bibdate =      "Thu Oct 6 07:25:38 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  URL =          "ftp://uiarchive.cso.uiuc.edu/pub/etext/gutenberg/;
                 http://site.ebrary.com/lib/ucsc/Doc?id=10074965",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Internet",
}

@Article{Fan:2005:RRA,
  author =       "Chun-I Fan and Yung-Cheng Chan and Zhi-Kai Zhang",
  title =        "Robust remote authentication scheme with smart cards",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "8",
  pages =        "619--628",
  month =        nov,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000477",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Feng:2005:NMS,
  author =       "Jen-Bang Feng and Hsien-Chu Wu and Chwei-Shyong Tsai
                 and Yen-Ping Chu",
  title =        "A new multi-secret images sharing scheme using
                 {Lagrange}'s interpolation",
  journal =      j-J-SYST-SOFTW,
  volume =       "76",
  number =       "3",
  pages =        "327--339",
  month =        jun,
  year =         "2005",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed May 18 10:27:28 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@InProceedings{Fischlin:2005:CEN,
  author =       "Marc Fischlin",
  title =        "Communication-Efficient Non-interactive Proofs of
                 Knowledge with Online Extractors",
  crossref =     "Shoup:2005:ACC",
  pages =        "152--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_10",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@Book{Foster:2005:BOA,
  editor =       "James C. Foster and Vitaly Osipov and Nish Bhalla and
                 Niels Heinen",
  title =        "Buffer Overflow Attacks: Detect, Exploit, Prevent",
  publisher =    pub-SYNGRESS,
  address =      pub-SYNGRESS:adr,
  pages =        "xxii + 497",
  year =         "2005",
  ISBN =         "1-932266-67-4",
  ISBN-13 =      "978-1-932266-67-2",
  LCCN =         "QA76.9.A25 B83 2005",
  bibdate =      "Thu Jun 9 12:29:00 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.oreilly.com/catalog/1932266674/;
                 http://www.oreilly.com/catalog/1932266674/desc.html;
                 http://www.unixreview.com/documents/s=9772/ur0506c/ur0506c.html;
                 melvyl.cdlib.org:210/CDL90",
  note =         "Foreword by Dave Aitel.",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Computer viruses",
}

@InProceedings{Freedman:2005:KSO,
  author =       "Michael J. Freedman and Yuval Ishai and Benny Pinkas
                 and Omer Reingold",
  title =        "Keyword Search and Oblivious Pseudorandom Functions",
  crossref =     "Kilian:2005:TCS",
  pages =        "303--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@InProceedings{Fu:2005:DHP,
  author =       "Yongzhi Fu and Xuejie Zhang and Lin Hao",
  title =        "Design of High Performance Reconfigurable {Triple DES}
                 Processor",
  crossref =     "Han:2005:PJI",
  pages =        "110--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Furht:2005:MEW,
  author =       "Borivoje (Borko) Furht and Edin Muharemagic and Daniel
                 Socek",
  title =        "Multimedia encryption and watermarking",
  volume =       "28",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2005",
  ISBN =         "0-387-24425-5; 0-387-26090-0",
  ISBN-13 =      "978-0-387-24425-9; 978-0-387-26090-7",
  LCCN =         "QA76.575 .F885 2005",
  bibdate =      "Wed Sep 28 08:38:41 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "Multimedia systems and applications",
  acknowledgement = ack-nhfb,
  subject =      "Multimedia systems; Computer security",
}

@Article{Furnell:2005:AOW,
  author =       "Steven Furnell",
  title =        "Authenticating ourselves: will we ever escape the
                 password?",
  journal =      j-NETWORK-SECURITY,
  volume =       "2005",
  number =       "3",
  pages =        "8--13",
  month =        mar,
  year =         "2005",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(05)00212-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:11 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485805002126",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@InProceedings{Ganapathy:2005:APA,
  author =       "Vinod Ganapathy and Trent Jaeger and Somesh Jha",
  title =        "Automatic placement of authorization hooks in the
                 {Linux} security modules framework",
  crossref =     "Meadows:2005:CPA",
  pages =        "330--339",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gang:2005:CNI,
  author =       "Litao Gang and Ali N. Akansu",
  title =        "Cover Noise Interference Suppression in Multimedia
                 Data Hiding",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "5",
  number =       "1",
  pages =        "191--??",
  month =        jan,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "0219-4678",
  bibdate =      "Wed Jan 12 05:16:34 MST 2005",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@InProceedings{Garrett:2005:CP,
  author =       "Paul Garrett",
  title =        "Cryptographic primitives",
  crossref =     "Garrett:2005:PKC",
  pages =        "1--62",
  year =         "2005",
  MRclass =      "11T71 (94-02 94A60)",
  MRnumber =     "2211870 (2006m:11176)",
  MRreviewer =   "Igor E. Shparlinski",
  bibdate =      "Fri Sep 17 09:12:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ge:2005:CCO,
  author =       "Gennian Ge and Ying Miao and Lihua Wang",
  title =        "Combinatorial Constructions for Optimal Splitting
                 Authentication Codes",
  journal =      j-SIAM-J-DISCR-MATH,
  volume =       "18",
  number =       "4",
  pages =        "663--678",
  year =         "2005",
  CODEN =        "SJDMEC",
  DOI =          "https://doi.org/10.1137/S0895480103435469",
  ISSN =         "0895-4801 (print), 1095-7146 (electronic)",
  ISSN-L =       "0895-4801",
  bibdate =      "Thu Dec 29 09:15:51 MST 2005",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SIDMA/18/4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://epubs.siam.org/sam-bin/dbq/article/43546",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Discrete Mathematics",
  journal-URL =  "http://epubs.siam.org/sidma",
}

@InProceedings{Gebhardt:2005:NPV,
  author =       "M. Gebhardt and G. Illies and W. Schindler",
  booktitle =    "{NIST Cryptographic Hash Workshop 2005}",
  title =        "A Note on the Practical Value of Single Hash Function
                 Collisions for Special File Formats",
  publisher =    "????",
  address =      "????",
  pages =        "??--??",
  year =         "2005",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Apr 03 08:43:05 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "18 slides + 15-page paper.",
  URL =          "http://csrc.nist.gov/pki/HashWorkshop/2005/Oct31_Presentations/Illies_NIST_05.pdf",
  abstract =     "We investigate Merkle-Damgard hash functions and
                 different file formats. Our goal is to construct many
                 meaningful hash collisions with given semantic contents
                 from one single abstract collision. We show that this
                 is not only possible for PostScript ([DL1], [DL2]) but
                 also for PDF, TIFF and MS Word 97. Our results suggest
                 that this property might be typical for higher file
                 formats.",
  acknowledgement = ack-nhfb,
  remark =       "The authors show explicit construction of PostScript,
                 PDF, TIFF, and Word 97 documents with identical hash
                 functions but different contents",
}

@Article{Gennaro:2005:BEG,
  author =       "Rosario Gennaro and Yael Gertner and Jonathan Katz and
                 Luca Trevisan",
  title =        "Bounds on the Efficiency of Generic Cryptographic
                 Constructions",
  journal =      j-SIAM-J-COMPUT,
  volume =       "35",
  number =       "1",
  pages =        "217--246",
  month =        "????",
  year =         "2005",
  CODEN =        "SMJCAT",
  DOI =          "",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Tue May 18 08:21:18 MDT 2010",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/35/1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Article{Gennaro:2005:SMS,
  author =       "Rosario Gennaro and Mario {Di Raimondo}",
  title =        "Secure multiplication of shared secrets in the
                 exponent",
  journal =      j-INFO-PROC-LETT,
  volume =       "96",
  number =       "2",
  pages =        "71--79",
  day =          "31",
  month =        oct,
  year =         "2005",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 18:41:04 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@InProceedings{Gentry:2005:PAK,
  author =       "Craig Gentry and Philip Mackenzie and Zulfikar
                 Ramzan",
  title =        "Password authenticated key exchange using hidden
                 smooth subgroups",
  crossref =     "Meadows:2005:CPA",
  pages =        "299--309",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Goldstone:2005:FCR,
  author =       "Lawrence Goldstone and Nancy Bazelon Goldstone",
  title =        "The Friar and the Cipher: {Roger Bacon} and the
                 Unsolved Mystery of the Most Unusual Manuscript in the
                 World",
  publisher =    pub-DOUBLEDAY,
  address =      pub-DOUBLEDAY:adr,
  pages =        "xi + 320",
  year =         "2005",
  ISBN =         "0-7679-1473-2",
  ISBN-13 =      "978-0-7679-1473-4",
  LCCN =         "Z105.5.V65 G65 2005",
  bibdate =      "Mon Oct 5 21:14:57 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/bios/random056/2004050164.html;
                 http://www.loc.gov/catdir/description/random051/2004050164.html;
                 http://www.loc.gov/catdir/enhancements/fy0618/2004050164-s.html",
  acknowledgement = ack-nhfb,
  subject =      "Voynich manuscript; Bacon, Roger",
  subject-dates = "1214?--1294",
  tableofcontents = "Turmoil and opportunity: Roger Bacon's England \\
                 Logic and mysticism: Aristotle, Plato, and Christianity
                 \\
                 Logic and theology: the evolution of scholasticism \\
                 Dogma, drink, and dissent: the University of Paris \\
                 Rebels in gray robes: Oxford \\
                 Science goes mainstream: the rise of Albertus Magnus
                 \\
                 The dumb ox: Thomas Aquinas \\
                 The miraculous doctor: Roger Bacon at Oxford \\
                 Autocracy in the Order of St. Francis \\
                 Theology becomes a science: the logic of Thomas Aquinas
                 \\
                 The great work \\
                 Seeing the future: the Scientia Experimentalis of Roger
                 Bacon \\
                 Knowledge suppressed: the conservatives \\
                 Enigmas and espionage: the strange journey of Dr. Dee
                 \\
                 Brilliant braggart: Francis Bacon \\
                 The trail of the cipher manuscript \\
                 The making of the most mysterious manuscript in the
                 world \\
                 MS 408 \\
                 The unfinished legacy of Roger Bacon",
}

@InProceedings{Goldwasser:2005:PPK,
  author =       "Shafi Goldwasser and Dmitriy Kharchenko",
  title =        "Proof of Plaintext Knowledge for the {Ajtai--Dwork}
                 Cryptosystem",
  crossref =     "Kilian:2005:TCS",
  pages =        "529--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@Book{Golomb:2005:SDG,
  author =       "Solomon W. (Solomon Wolf) Golomb and Guang Gong",
  title =        "Signal design for good correlation for wireless
                 communication, cryptography, and radar",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "xviii + 438",
  year =         "2005",
  ISBN =         "0-521-82104-5 (hardcover)",
  ISBN-13 =      "978-0-521-82104-9 (hardcover)",
  LCCN =         "TK5102.92 .G65 2005",
  bibdate =      "Mon Sep 19 08:49:52 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  URL =          "http://www.loc.gov/catdir/toc/ecip057/2005002719.html",
  acknowledgement = ack-nhfb,
  subject =      "Signal theory (Telecommunication); Signal processing;
                 Digital techniques",
}

@Book{Gorman:2005:NSC,
  author =       "Sean P. Gorman",
  title =        "Networks, security, and complexity: the role of public
                 policy in critical infrastructure protection",
  publisher =    "Edward Elgar Publishers",
  address =      "Northhampton, MA, USA",
  pages =        "153 (est.)",
  year =         "2005",
  ISBN =         "1-84376-952-2",
  ISBN-13 =      "978-1-84376-952-1",
  LCCN =         "QA76.9.A25 G657 2005",
  bibdate =      "Tue Nov 15 14:51:34 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; United States; Computer networks;
                 Security measures; United States; Terrorism; United
                 States; Prevention",
}

@Article{Grabner:2005:ALC,
  author =       "Peter J. Grabner and Clemens Heuberger and Helmut
                 Prodinger and J{\"o}rg M. Thuswaldner",
  title =        "Analysis of linear combination algorithms in
                 cryptography",
  journal =      j-TALG,
  volume =       "1",
  number =       "1",
  pages =        "123--142",
  month =        jul,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1077464.1077473",
  ISSN =         "1549-6325 (print), 1549-6333 (electronic)",
  ISSN-L =       "1549-6325",
  bibdate =      "Tue Dec 13 18:19:55 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Several cryptosystems rely on fast calculations of
                 linear combinations in groups. One way to achieve this
                 is to use joint signed binary digit expansions of small
                 ``weight.'' We study two algorithms, one based on
                 nonadjacent forms of the coefficients of the linear
                 combination, the other based on a certain joint sparse
                 form specifically adapted to this problem. Both methods
                 are sped up using the sliding windows approach combined
                 with precomputed lookup tables. We give explicit and
                 asymptotic results for the number of group operations
                 needed, assuming uniform distribution of the
                 coefficients. Expected values, variances and a central
                 limit theorem are proved using generating functions.
                 Furthermore, we provide a new algorithm that calculates
                 the digits of an optimal expansion of pairs of integers
                 from left to right. This avoids storing the whole
                 expansion, which is needed with the previously known
                 right-to-left methods, and allows an online
                 computation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Algorithms (TALG)",
}

@InProceedings{Granger:2005:DLP,
  author =       "R. Granger and F. Vercauteren",
  title =        "On the Discrete Logarithm Problem on Algebraic Tori",
  crossref =     "Shoup:2005:ACC",
  pages =        "66--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_5",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@Article{Granger:2005:HSN,
  author =       "R. Granger and D. Page and M. Stam",
  title =        "Hardware and software normal basis arithmetic for
                 pairing-based cryptography in characteristic three",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "54",
  number =       "7",
  pages =        "852--860",
  month =        jul,
  year =         "2005",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2005.120",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 16:17:17 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1432668",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@InProceedings{Groth:2005:CS,
  author =       "Jens Groth",
  title =        "Cryptography in Subgroups of {$ \mathbb {Z}*_n $}",
  crossref =     "Kilian:2005:TCS",
  pages =        "50--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@Article{Guar:2005:PPL,
  author =       "Nalneesh Guar",
  title =        "Paranoid penguin: Limitations of {{\tt shc}}, a shell
                 encryption utility",
  journal =      j-LINUX-J,
  volume =       "2005",
  number =       "138",
  pages =        "11--11",
  month =        oct,
  year =         "2005",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Sat Dec 24 17:46:11 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Guerrero:2005:ECB,
  author =       "Jorge Herrer{\'\i}as Guerrero and Roberto G{\'o}mez
                 C{\'a}rdenas",
  title =        "An example of communication between security tools:
                 {IPTables} --- {Snort}",
  journal =      j-OPER-SYS-REV,
  volume =       "39",
  number =       "3",
  pages =        "34--43",
  month =        jul,
  year =         "2005",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:48 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Gutmann:2005:WHC,
  author =       "P. Gutmann and D. Naccache and C. C. Palmer",
  title =        "When hashes collide [applied cryptography]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "3",
  pages =        "68--71",
  month =        may # "/" # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.84",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439506.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439506&count=20&index=13",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@InProceedings{Han:2005:PJIb,
  author =       "Yiliang Han and Xiaoyuan Yang and Jian Zhang",
  title =        "Joint Signature and Encryption on Elliptic Curve",
  crossref =     "Han:2005:PJI",
  pages =        "135--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Harkins:2005:ESU,
  author =       "Ryan Harkins and Eric Weber and Andrew Westmeyer",
  title =        "Encryption Schemes using Finite Frames and {Hadamard}
                 Arrays",
  journal =      j-EXP-MATH,
  volume =       "14",
  number =       "4",
  pages =        "423--433",
  month =        "????",
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1080/10586458.2005.10128935",
  ISSN =         "1058-6458 (print), 1944-950X (electronic)",
  ISSN-L =       "1058-6458",
  bibdate =      "Mon Mar 5 15:33:58 MST 2012",
  bibsource =    "http://projecteuclid.org/euclid.em;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/expmath.bib;
                 http://www.tandfonline.com/toc/uexm20/14/4",
  URL =          "http://projecteuclid.org/euclid.em/1136926973",
  acknowledgement = ack-nhfb,
  fjournal =     "Experimental Mathematics",
  journal-URL =  "http://www.tandfonline.com/loi/uexm20",
  onlinedate =   "30 Jan 2011",
}

@Book{Harrington:2005:NSP,
  author =       "Jan L. Harrington",
  title =        "Network security: a practical approach",
  publisher =    pub-ELSEVIER,
  address =      pub-ELSEVIER:adr,
  pages =        "xv + 365",
  year =         "2005",
  ISBN =         "0-12-311633-3",
  ISBN-13 =      "978-0-12-311633-8",
  LCCN =         "TK5105.59 .H357 2005",
  bibdate =      "Mon Oct 3 19:07:08 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures",
}

@Book{Harris:2005:GHE,
  editor =       "Shon Harris",
  title =        "Gray hat hacking: the ethical hacker's handbook",
  publisher =    pub-OSBORNE-MCGRAW-HILL,
  address =      pub-OSBORNE-MCGRAW-HILL:adr,
  pages =        "xx + 434",
  year =         "2005",
  ISBN =         "0-07-225709-1 (paperback)",
  ISBN-13 =      "978-0-07-225709-0 (paperback)",
  LCCN =         "QA76.9.A25 G743 2005",
  bibdate =      "Fri Oct 21 06:43:58 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "All-in-one",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Computer hackers",
}

@InProceedings{Harris:2005:IUS,
  author =       "David Harris and Ram Krishnamurthy and Mark Anders and
                 Sanu Mathew and Steven Hsu",
  title =        "An Improved Unified Scalable Radix-$2$ {Montgomery}
                 Multiplier",
  crossref =     "IEEE:2005:PIS",
  pages =        "??--??",
  year =         "2005",
  bibdate =      "Wed Jun 22 07:02:55 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://arith17.polito.it/final/paper-109.pdf",
  abstract =     "This paper describes an improved version of the
                 Tenca-Ko{\c{c}} unified scalable radix-2 Montgomery
                 multiplier with half the latency for small and moderate
                 precision operands and half the queue memory
                 requirement. Like the Tenca-Ko{\c{c}} multiplier, this
                 design is reconfigurable to accept any input precision
                 in either $ \mathrm {GF}(p) $ or $ \mathrm {GF}(2 n) $
                 up to the size of the on-chip memory. An FPGA
                 implementation can perform 1024-bit modular
                 exponentiation in 16 ms using 5598 4-input lookup
                 tables, making it the fastest unified scalable design
                 yet reported.",
  acknowledgement = ack-nhfb,
  pagecount =    "7",
}

@InProceedings{He:2005:MCP,
  author =       "Changhua He and Mukund Sundararajan and Anupam Datta
                 and Ante Derek and John C. Mitchell",
  title =        "A modular correctness proof of {IEEE 802.11i} and
                 {TLS}",
  crossref =     "Meadows:2005:CPA",
  pages =        "2--15",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Heuberger:2005:AGE,
  author =       "Clemens Heuberger and Rajendra Katti and Helmut
                 Prodinger and Xiaoyu Ruan",
  title =        "The alternating greedy expansion and applications to
                 computing digit expansions from left-to-right in
                 cryptography",
  journal =      j-THEOR-COMP-SCI,
  volume =       "341",
  number =       "1--3",
  pages =        "55--72",
  day =          "5",
  month =        sep,
  year =         "2005",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Mar 29 06:48:48 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Hilley:2005:CRM,
  author =       "Sarah Hilley",
  title =        "Crypto race for mathematical infinity",
  journal =      j-NETWORK-SECURITY,
  volume =       "2005",
  number =       "4",
  pages =        "10--11",
  month =        apr,
  year =         "2005",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(05)70223-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:12 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485805702233",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
  remark =       "Discussion of the breaking of the SHA-1 cryptographic
                 hash algorithm.",
}

@InProceedings{Hofheinz:2005:CTN,
  author =       "Dennis Hofheinz and Dominique Unruh",
  title =        "Comparing Two Notions of Simulatability",
  crossref =     "Kilian:2005:TCS",
  pages =        "86--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@InProceedings{Hohenberger:2005:HSO,
  author =       "Susan Hohenberger and Anna Lysyanskaya",
  title =        "How to Securely Outsource Cryptographic Computations",
  crossref =     "Kilian:2005:TCS",
  pages =        "264--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@InProceedings{Holenstein:2005:OWS,
  author =       "Thomas Holenstein and Renato Renner",
  title =        "One-Way Secret-Key Agreement and Applications to
                 Circuit Polarization and Immunization of Public-Key
                 Encryption",
  crossref =     "Shoup:2005:ACC",
  pages =        "478--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_29",
  bibdate =      "Mon Apr 3 09:26:13 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@Book{Hollar:2005:EWS,
  author =       "Rickland Hollar and Richard Murphy",
  title =        "Enterprise {Web} services security",
  publisher =    "Charles River Media",
  address =      "Hingham, MA, USA",
  pages =        "????",
  year =         "2005",
  ISBN =         "1-58450-413-7 (pbk. with CD-ROM)",
  ISBN-13 =      "978-1-58450-413-9 (pbk. with CD-ROM)",
  LCCN =         "TK5105.59 .H66 2005",
  bibdate =      "Fri Dec 9 06:49:14 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip0515/2005018419.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures; Web sites;
                 Security measures; Web services",
}

@Book{Hook:2005:BCP,
  author =       "David Hook",
  title =        "Beginning cryptography and {PKI} in {Java}",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xxvi + 448",
  year =         "2005",
  ISBN =         "0-7645-9633-0",
  ISBN-13 =      "978-0-7645-9633-9",
  LCCN =         "QA76.9.A25 H645 2005",
  bibdate =      "Tue Oct 11 05:21:48 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip0511/2005011272.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Cryptography; Public key
                 infrastructure (Computer security); Java (Computer
                 program language)",
}

@Article{Horan:2005:NRN,
  author =       "D. M. Horan and R. A. Guinee",
  title =        "A novel random number generator based on pseudonoise
                 sequences",
  journal =      "IEE Conference Publications",
  volume =       "2005",
  number =       "CP511",
  pages =        "431--436",
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1049/cp:20050349",
  ISSN =         "????",
  bibdate =      "Mon Jan 16 15:57:34 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://link.aip.org/link/abstract/IEECPS/v2005/iCP511/p431/s1",
  acknowledgement = ack-nhfb,
  keywords =     "classical linear feedback shift register;
                 cryptanalytic attacks; cryptographic applications;
                 keystream generation; maximal length sequence;
                 pseudonoise sequences; random number generator;
                 statistical tests",
}

@InProceedings{Howgrave-Graham:2005:PKC,
  author =       "Nick Howgrave-Graham",
  title =        "Public-key cryptography and proofs of security",
  crossref =     "Garrett:2005:PKC",
  pages =        "73--89",
  year =         "2005",
  MRclass =      "94A60 (68P25 94-02)",
  MRnumber =     "2211872 (2006k:94088)",
  bibdate =      "Fri Sep 17 09:12:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Hromkovic:2005:DAR,
  author =       "Juraj Hromkovi{\v{c}}",
  title =        "Design and analysis of randomized algorithms:
                 introduction to design paradigms",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xii + 274",
  year =         "2005",
  ISBN =         "3-540-23949-9",
  ISBN-13 =      "978-3-540-23949-9",
  LCCN =         "QA274 .H76 2005",
  bibdate =      "Mon Jun 12 18:08:09 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Texts in theoretical computer science",
  acknowledgement = ack-nhfb,
  subject =      "algorithms; fingerprinting; random sampling;
                 stochastic processes",
}

@Article{Hsu:2005:CIT,
  author =       "Chien-Lung Hsu",
  title =        "Cryptanalysis and improvement of the {Tzeng--Hwang}
                 authenticated encryption scheme based on elliptic curve
                 discrete logarithm problem",
  journal =      j-APPL-MATH-COMP,
  volume =       "167",
  number =       "2",
  pages =        "882--890",
  day =          "15",
  month =        aug,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:48 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Hsu:2005:NPM,
  author =       "Chien-Lung Hsu and Tzong-Sun Wu and Wei-Hua He",
  title =        "New proxy multi-signature scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "162",
  number =       "3",
  pages =        "1201--1206",
  day =          "25",
  month =        mar,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:42 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Hsu:2005:SCT,
  author =       "Chien-Lung Hsu and Tzong-Sun Wu",
  title =        "Self-certified threshold proxy signature schemes with
                 message recovery, nonrepudiation, and traceability",
  journal =      j-APPL-MATH-COMP,
  volume =       "164",
  number =       "1",
  pages =        "201--225",
  day =          "5",
  month =        may,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:44 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Hsu:2005:UFR,
  author =       "Chien-Lung Hsu",
  title =        "A user friendly remote authentication scheme with
                 smart cards against impersonation attacks",
  journal =      j-APPL-MATH-COMP,
  volume =       "170",
  number =       "1",
  pages =        "135--143",
  day =          "1",
  month =        nov,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:50 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Hu:2005:USA,
  author =       "Ruo Hu and Xingsan Qian",
  title =        "Using Smart Agent-Based Method to Implement Dynamic
                 Information Security Policy",
  crossref =     "Han:2005:PJI",
  pages =        "131--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Huang:2005:ASE,
  author =       "Qiang Huang and David Jao and Helen J. Wang",
  title =        "Applications of secure electronic voting to automated
                 privacy-preserving troubleshooting",
  crossref =     "Meadows:2005:CPA",
  pages =        "68--80",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InCollection{Huang:2005:EMP,
  author =       "Liusheng Huang and Hong Zhong and Hong Shen and
                 Yonglong Luo",
  editor =       "Hong Shen and Koji Nakano",
  booktitle =    "{Sixth International Conference on Parallel and
                 Distributed Computing, Applications and Technologies,
                 2005. PDCAT 2005: 5--8 December 2005, Dalian, China}",
  title =        "An Efficient Multiple-Precision Division Algorithm",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  bookpages =    "xxvi + 1091",
  pages =        "971--974",
  year =         "2005",
  DOI =          "https://doi.org/10.1109/PDCAT.2005.79",
  ISBN =         "0-7695-2405-2",
  ISBN-13 =      "978-0-7695-2405-4",
  LCCN =         "QA76.58 .I5752 2005",
  bibdate =      "Mon Dec 09 14:30:16 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  note =         "The authors present an integer-division algorithm that
                 runs three to five times faster than Knuth's 1981
                 original. However, there is an error in the
                 renormalization algorithm that is corrected in
                 \cite{Mukhopadhyay:2014:EMP}, while retaining the
                 speedup.",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/servlet/opac?punumber=10544",
}

@Article{Hunt:2005:JFE,
  author =       "K. Hunt",
  title =        "A {Java} Framework for Experimentation with
                 Steganography",
  journal =      j-SIGCSE,
  volume =       "37",
  number =       "1",
  pages =        "282--286",
  year =         "2005",
  CODEN =        "SIGSD3",
  ISSN =         "0097-8418 (print), 2331-3927 (electronic)",
  bibdate =      "Tue Apr 26 10:50:23 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 Ingenta database",
  acknowledgement = ack-nhfb,
  fjournal =     "SIGCSE Bulletin (ACM Special Interest Group on
                 Computer Science Education)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J688",
}

@InProceedings{Hwang:2005:GTS,
  author =       "Jung Yeon Hwang and Dong Hoon Lee and Jongin Lim",
  title =        "Generic Transformation for Scalable Broadcast
                 Encryption Schemes",
  crossref =     "Shoup:2005:ACC",
  pages =        "276--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_17",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@Article{Hwang:2005:ITA,
  author =       "Shin-Jia Hwang",
  title =        "Improvement of {Tseng} et al.'s authenticated
                 encryption scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "165",
  number =       "1",
  pages =        "1--4",
  day =          "6",
  month =        jun,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:45 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Hwang:2005:SHW,
  author =       "Shin-Jia Hwang and Hao-Chih Liao",
  title =        "Security of {Hsu--Wu}'s authenticated encryption
                 scheme with $ (t, n) $ shared verification",
  journal =      j-APPL-MATH-COMP,
  volume =       "167",
  number =       "1",
  pages =        "281--285",
  day =          "5",
  month =        aug,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:47 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Hwang:2005:STH,
  author =       "Shin-Jia Hwang and Hao-Chih Liao",
  title =        "Security of {Tzeng--Hwang}'s authenticated encryption
                 scheme based on elliptic curve discrete logarithm
                 problems",
  journal =      j-APPL-MATH-COMP,
  volume =       "168",
  number =       "1",
  pages =        "717--721",
  day =          "1",
  month =        sep,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:48 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Hwang:2005:TAU,
  author =       "Kuo-Feng Hwang and I-En Liao",
  title =        "Two attacks on a user friendly remote authentication
                 scheme with {Smart Cards}",
  journal =      j-OPER-SYS-REV,
  volume =       "39",
  number =       "2",
  pages =        "94--96",
  month =        apr,
  year =         "2005",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:43 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Hwang:2005:TSP,
  author =       "Min-Shiang Hwang and Kuo-Feng Hwang and Chin-Chen
                 Chang",
  title =        "A time-stamping protocol for digital watermarking",
  journal =      j-APPL-MATH-COMP,
  volume =       "169",
  number =       "2",
  pages =        "1276--1284",
  day =          "15",
  month =        oct,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:49 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Inoue:2005:EST,
  author =       "Koji Inoue",
  title =        "Energy-security tradeoff in a secure cache
                 architecture against buffer overflow attacks",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "33",
  number =       "1",
  pages =        "81--89",
  month =        mar,
  year =         "2005",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 09:40:37 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@InProceedings{Irwin:2005:PAI,
  author =       "Keith Irwin and Ting Yu",
  title =        "Preventing attribute information leakage in automated
                 trust negotiation",
  crossref =     "Meadows:2005:CPA",
  pages =        "36--45",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Ishai:2005:SCC,
  author =       "Yuval Ishai and Eyal Kushilevitz and Rafail
                 Ostrovsky",
  title =        "Sufficient Conditions for Collision-Resistant
                 Hashing",
  crossref =     "Kilian:2005:TCS",
  pages =        "445--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@Book{ISO:2005:IDM,
  author =       "{ISO}",
  title =        "{ISO 19005-1:2005}, Document management---Electronic
                 document file format for long-term preservation---Part
                 1: Use of {PDF 1.4 (PDF/A-1)}",
  publisher =    pub-ISO,
  address =      pub-ISO:adr,
  year =         "2005",
  ISBN =         "",
  ISBN-13 =      "",
  LCCN =         "",
  bibdate =      "Wed Sep 21 08:32:04 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.aiim.org/documents/standards/ISO_19005-1_(E).doc;
                 http://www.aiim.org/pdf_a/",
  abstract =     "PDF/A is a constrained form of Adobe PDF version 1.4
                 intended to be suitable for long-term preservation of
                 page-oriented documents for which PDF is already being
                 used in practice. The proposed standard is being
                 developed by an ISO working group with representatives
                 from government, industry, and academia and active
                 support from Adobe Systems Incorporated.\par

                 PDF/A attempts to maximize:\\
                 * Device independence \\
                 * Self-containment \\
                 * Self-documentation The constraints include: \\
                 * Audio and video content are forbidden \\
                 * Javascript and executable file launches are
                 prohibited \\
                 * All fonts must be embedded and also must be legally
                 embeddable for unlimited, universal rendering \\
                 * Colorspaces specified in a device-independent manner
                 \\
                 * Encryption is disallowed \\
                 * Use of standards-based metadata is mandated",
  acknowledgement = ack-nhfb,
  remark =       "Not yet on ISO Web site.",
}

@InProceedings{Jarecki:2005:FSP,
  author =       "Stanis{\l}aw Jarecki and Nitesh Saxena",
  title =        "Further Simplifications in Proactive {RSA}
                 Signatures",
  crossref =     "Kilian:2005:TCS",
  pages =        "510--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@Article{Jiang:2005:RNP,
  author =       "Zhengtao Jiang and Mingsen Xiang and Yumin Wang",
  title =        "A research on new public-key encryption schemes",
  journal =      j-APPL-MATH-COMP,
  volume =       "169",
  number =       "1",
  pages =        "51--61",
  day =          "1",
  month =        oct,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:49 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Jiang:2005:SAI,
  author =       "Zhengtao Jiang and Xi Sun and Yumin Wang",
  title =        "Security analysis and improvement of a double-trapdoor
                 encryption scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "169",
  number =       "1",
  pages =        "41--50",
  day =          "1",
  month =        oct,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:49 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Jiang:2005:TMD,
  author =       "Zhengtao Jiang and Yang Zhan and Dan Chen and Yumin
                 Wang",
  title =        "Two methods of directly constructing probabilistic
                 public-key encryption primitives based on third-order
                 {LFSR} sequences",
  journal =      j-APPL-MATH-COMP,
  volume =       "171",
  number =       "2",
  pages =        "900--911",
  day =          "15",
  month =        dec,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:51 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Jin:2005:EAW,
  author =       "Cong Jin and Kaihua Xu",
  title =        "Estimation and Application of the Watermark Embedding
                 Strength",
  crossref =     "Han:2005:PJI",
  pages =        "147--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Jing-mei:2005:CRB,
  author =       "Liu Jing-mei and Wei Bao-dian and Cheng Xiang-guo and
                 Wang Xin-mei",
  title =        "Cryptanalysis of {Rijndael} {S}-box and improvement",
  journal =      j-APPL-MATH-COMP,
  volume =       "170",
  number =       "2",
  pages =        "958--975",
  day =          "15",
  month =        nov,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:50 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Joglekar:2005:PEM,
  author =       "S. P. Joglekar and S. R. Tate",
  title =        "{ProtoMon}: Embedded Monitors for Cryptographic
                 Protocol Intrusion Detection and Prevention",
  journal =      j-J-UCS,
  volume =       "11",
  number =       "1",
  pages =        "83--??",
  day =          "28",
  month =        jan,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Wed Jul 6 08:14:47 MDT 2005",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_11_1/protomon_embedded_monitors_for",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Johnson:2005:OSV,
  author =       "Thomas K. Johnson",
  title =        "An Open-Secret Voting System",
  journal =      j-COMPUTER,
  volume =       "38",
  number =       "3",
  pages =        "100--??",
  month =        mar,
  year =         "2005",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2005.78",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Wed May 4 16:02:15 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computer2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/dl/mags/co/2005/03/r3100.htm;
                 http://csdl.computer.org/dl/mags/co/2005/03/r3100.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Book{Jones:2005:RDF,
  author =       "Keith J. (Keith John) Jones and Richard Bejtlich and
                 Curtis W. Rose",
  title =        "Real Digital Forensics: Computer Security and Incident
                 Response",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xxx + 650",
  year =         "2005",
  ISBN =         "0-321-24069-3 (paperback)",
  ISBN-13 =      "978-0-321-24069-9 (paperback)",
  LCCN =         "HV8079.C65 J66 2005",
  bibdate =      "Mon Apr 3 07:35:51 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer crimes; Investigation; Computer security",
}

@InProceedings{Juels:2005:APD,
  author =       "Ari Juels and Stephen A. Weis",
  title =        "Authenticating Pervasive Devices with Human
                 Protocols",
  crossref =     "Shoup:2005:ACC",
  pages =        "293--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_18",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@PhdThesis{Junod:2005:SCB,
  author =       "Pascal Junod",
  title =        "Statistical cryptanalysis of block ciphers",
  type =         "Th{\`e}se sciences",
  school =       "Facult{\'e} Informatique et communications IC, Section
                 des syst{\`e}mes de communication (Institut de
                 syst{\`e}mes de communication), EPF Lausanne",
  address =      "Lausanne, Switzerland",
  pages =        "267",
  year =         "2005",
  bibdate =      "Sat May 14 07:05:06 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://library.epfl.ch/theses/?nr=3179",
  acknowledgement = ack-nhfb,
  advisor =      "S. Vaudenay",
}

@Book{Kapera:2005:MRP,
  author =       "Zdzis{\l}aw Jan Kapera",
  title =        "{Marian Rejewski} pogromca {Enigmy}. ({Polish})
                 [{Marian Rejewski} tamer of {Enigma}]",
  volume =       "2",
  publisher =    "Enigma Press",
  address =      "Krak{\'o}w, Poland",
  pages =        "96",
  year =         "2005",
  ISBN =         "83-86110-60-0",
  ISBN-13 =      "978-83-86110-60-5",
  LCCN =         "D810.C88 R455 2005",
  bibdate =      "Sat Jun 6 12:14:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Biblioteczka Enigmy",
  acknowledgement = ack-nhfb,
  subject =      "Rejewski, Marian; Cryptographers; Poland; Biography;
                 Great Britain; Enigma cipher system; World War,
                 1939--1945; Cryptography",
  subject-dates = "1905--1980",
}

@Article{Katos:2005:RTB,
  author =       "Vasilios Katos",
  title =        "A randomness test for block ciphers",
  journal =      j-APPL-MATH-COMP,
  volume =       "162",
  number =       "1",
  pages =        "29--35",
  day =          "4",
  month =        mar,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:41 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Katz:2005:CBR,
  author =       "Jonathan Katz",
  title =        "Comparative book review: {{\booktitle{Cryptography: An
                 Introduction}}, by V. V. Yaschenko (American
                 Mathematical Society, 2002); \booktitle{Cryptanalysis
                 of Number Theoretic Ciphers}, by S. S. Wagstaff, Jr.
                 (Chapman \& Hall\slash CRC Press, 2003); \booktitle{RSA
                 and Public-Key Cryptography}, by R. A. Mollin (Chapman
                 \& Hall/CRC Press, 2003); \booktitle{Foundations of
                 Cryptography, vol. 1: Basic Tools}, by O. Goldreich,
                 (Cambridge University Press, 2001)}",
  journal =      j-SIGACT,
  volume =       "36",
  number =       "2",
  pages =        "14--19",
  month =        jun,
  year =         "2005",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1067309.1067316",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 18:30:27 MDT 2012",
  bibsource =    "DBLP;
                 http://dblp.uni-trier.de/db/journals/sigact/sigact36.html#Katz05;
                 http://portal.acm.org/;
                 https://www.math.utah.edu/pub/mirrors/ftp.ira.uka.de/bibliography/Misc/DBLP/2005.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See
                 \cite{Goldreich:2001:FCBa,Wagstaff:2003:CNT,Mollin:2003:RPK}.",
  URL =          "http://doi.acm.org/10.1145/1067309.1067316",
  abstract =     "With the growing interest in cryptography --- from
                 students and researchers as well as from the general
                 public --- there has been a corresponding increase in
                 the number of cryptography textbooks available. Many of
                 these, however, remain somewhat mired in the past, and
                 present cryptography from a pre-1980s point of view.
                 Indeed, there are very few published books which even
                 make an attempt (let alone a successful one) at
                 covering modern cryptography. This unfortunate state of
                 affairs results in a serious lack of books describing
                 the fundamental advances in the field that have taken
                 place since the mid-1980's; this is especially true at
                 the undergraduate and beginning graduate levels, where
                 there is a severe need for suitable texts in this area.
                 The central contributions of modern (i.e., post-1980)
                 cryptography include an emphasis on precise
                 definitions, formalizations of cryptographic goals, and
                 provably-secure constructions of higher-level tasks
                 (e.g., signatures) from lower-level primitives (e.g.,
                 one-way functions). Without precise definitions and
                 rigorous proofs of security, cryptography is reduced to
                 a ``game'' in which the goal is merely to design a
                 scheme that one's friend or colleague cannot ``break''.
                 Any exposition of cryptography failing to recognize and
                 emphasize the difference between the former and the
                 latter approaches misses a substantial fraction of what
                 current cryptographic research is about, and is a
                 disservice to the field. Sadly, however, almost all
                 cryptography textbooks of which I am aware fall into
                 this category. A classic example of the problems with
                 an ``ad-hoc'' approach to cryptography is the following
                 simple test I often use to discriminate ``good''
                 cryptography books from ``poor'' ones: flip to the
                 section on digital signatures and see whether it is
                 stated anywhere that ``textbook RSA'' signatures are
                 completely insecure. It is a simple exercise to show
                 that this is the case (the same holds for ``textbook
                 RSA'' encryption, but it is somewhat more difficult to
                 demonstrate), yet most books make no mention of this
                 (central!) fact, and instead leave the reader with the
                 impression that secure signature schemes based on the
                 RSA problem are easy to design. Some might argue that
                 there is no place for rigorous definitions and proofs
                 in a book directed toward undergraduates, but I take
                 this misconception as a thinly-guised insult to
                 undergraduate computer science majors. Undergraduates
                 in other majors are taught quantum mechanics,
                 thermodynamics, analysis, and abstract algebra, to name
                 a few, all difficult subjects that are taught
                 rigorously (to varying degrees, perhaps). Why should an
                 undergraduate course on cryptography be expected to be
                 any less rigorous than these? Continuing the
                 disappointing trend discussed above, neither of the
                 first three books reviewed here qualify as (what I
                 would consider) appropriate for introducing the
                 interested reader to the field of cryptography.
                 Cryptography: An Introduction gets a number of things
                 right, but overall is a muddled, poorly written, and
                 disorganized text whose intended audience is unclear.
                 Cryptanalysis\ldots{} is a useful book which I am glad
                 to have on my shelf, but it fails at its stated goal of
                 serving as a suitable text for an introductory
                 cryptography course. It would serve better as a book on
                 elementary number theory (with applications to
                 cryptography, perhaps), and I wish it had been
                 advertised and organized as such. A somewhat similar
                 book, RSA and Public-Key Cryptography suffers from the
                 same criticisms; furthermore, I found its treatment of
                 number theory to be not quite on par with that in
                 Wagstaff's book. In contrast to these, Foundations of
                 Cryptography presents a clear and accurate picture of
                 the foundations underlying modern cryptography; in
                 fact, it is currently the only published book I am
                 aware of which does so. Its primary drawback is that it
                 is likely to be inaccessible to the beginning student;
                 it is more appropriate for a researcher or an advanced
                 graduate student who has previously been exposed to the
                 basics of cryptography, either of whom would benefit
                 from a careful reading of this book cover-to-cover.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@InProceedings{Katz:2005:HEP,
  author =       "Jonathan Katz and Yehuda Lindell",
  title =        "Handling Expected Polynomial-Time Strategies in
                 Simulation-Based Security Proofs",
  crossref =     "Kilian:2005:TCS",
  pages =        "128--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@InProceedings{Katz:2005:MIA,
  author =       "Jonathan Katz and Ji Sun Shin",
  title =        "Modeling insider attacks on group key-exchange
                 protocols",
  crossref =     "Meadows:2005:CPA",
  pages =        "180--189",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Kawachi:2005:UTQ,
  author =       "Akinori Kawachi and Hirotada Kobayashi and Takeshi
                 Koshiba and Raymond H. Putra",
  title =        "Universal test for quantum one-way permutations",
  journal =      j-THEOR-COMP-SCI,
  volume =       "345",
  number =       "2--3",
  pages =        "370--385",
  day =          "22",
  month =        nov,
  year =         "2005",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Mar 29 06:48:50 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Book{Keefe:2005:CDS,
  author =       "Patrick Radden Keefe",
  title =        "Chatter: dispatches from the secret world of global
                 eavesdropping",
  publisher =    pub-RANDOM-HOUSE,
  address =      pub-RANDOM-HOUSE:adr,
  pages =        "xvii + 300",
  year =         "2005",
  ISBN =         "1-4000-6034-6",
  ISBN-13 =      "978-1-4000-6034-4",
  LCCN =         "JK468.I6 K37 2005",
  bibdate =      "Thu Jan 19 12:16:35 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/bios/random051/2004058481.html;
                 http://www.loc.gov/catdir/description/random051/2004058481.html",
  acknowledgement = ack-nhfb,
  subject =      "Echelon; intelligence service; United States;
                 eavesdropping; wiretapping; civil rights; National
                 Security Agency",
}

@Manual{Kellar:2005:NRR,
  author =       "Sharon S. Kellar",
  title =        "{NIST}-Recommended Random Number Generator Based on
                 {ANSI X9.31 Appendix A.2.4} Using the 3-Key {Triple
                 DES} and {AES} Algorithms",
  organization = pub-NIST,
  address =      pub-NIST:adr,
  pages =        "4",
  day =          "31",
  month =        jan,
  year =         "2005",
  bibdate =      "Thu Aug 18 07:16:02 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csrc.nist.gov/cryptval/rng/931rngext.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography",
}

@Manual{Keller:2005:NRR,
  author =       "Sharon S. Keller",
  title =        "{NIST}-Recommended Random Number Generator Based on
                 {ANSI X9.31 Appendix A.2.4} Using the 3-Key {Triple
                 DES} and {AES} Algorithms",
  organization = pub-NIST,
  address =      pub-NIST:adr,
  pages =        "4",
  day =          "31",
  month =        jan,
  year =         "2005",
  bibdate =      "Thu Apr 30 08:10:57 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://csrc.nist.gov/cryptval/rng/931rngext.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography",
}

@Article{Khaw:2005:EDA,
  author =       "L. T. Khaw",
  title =        "Of Encryption and Devices: The Anti-Circumvention
                 Provision of the {Malaysian Copyright Act 1987}",
  journal =      "European intellectual property review",
  volume =       "27",
  number =       "2",
  pages =        "53--64",
  year =         "2005",
  ISSN =         "0142-0461",
  bibdate =      "Wed Sep 28 08:40:15 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Kiltz:2005:SCM,
  author =       "Eike Kiltz and Gregor Leander and John Malone-Lee",
  title =        "Secure Computation of the Mean and Related
                 Statistics",
  crossref =     "Kilian:2005:TCS",
  pages =        "283--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@Article{Kiltz:2005:TCL,
  author =       "Eike Kiltz and Hans Ulrich Simon",
  title =        "Threshold circuit lower bounds on cryptographic
                 functions",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "71",
  number =       "2",
  pages =        "185--212",
  month =        aug,
  year =         "2005",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2005.03.001",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:26:58 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000005000292",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Article{Kim:2005:CLL,
  author =       "Kee-Won Kim and Eun-Kyung Ryu and Kee-Young Yoo",
  title =        "Cryptanalysis of {Lee--Lee} authenticated key
                 agreement scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "163",
  number =       "1",
  pages =        "193--198",
  day =          "5",
  month =        apr,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:43 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Kim:2005:IYA,
  author =       "Kee-Won Kim and Jun-Cheol Jeon and Kee-Young Yoo",
  title =        "An improvement on {Yang} et al.'s password
                 authentication schemes",
  journal =      j-APPL-MATH-COMP,
  volume =       "170",
  number =       "1",
  pages =        "207--215",
  day =          "1",
  month =        nov,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:50 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Kim:2005:SMA,
  author =       "Byung-Gi Kim and Sang-Sun Hong",
  title =        "Secure Mutual Authentication for Ad hoc Wireless
                 Networks",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "33",
  number =       "1",
  pages =        "123--132",
  month =        jul,
  year =         "2005",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-005-0225-z",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Wed Jul 6 10:36:21 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=33&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0920-8542&volume=33&issue=1&spage=123",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@InProceedings{Kissner:2005:PPS,
  author =       "Lea Kissner and Dawn Song",
  title =        "Privacy-Preserving Set Operations",
  crossref =     "Shoup:2005:ACC",
  pages =        "241--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_15",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@TechReport{Koblitz:2005:PBC,
  author =       "Neal Koblitz and Alfred Menezes",
  title =        "Pairing-Based Cryptography at High Security Levels",
  type =         "Report",
  number =       "??",
  institution =  "Department of Mathematics, Box 354350, University of
                 Washington",
  address =      "Seattle, WA 98195, USA",
  day =          "11",
  month =        may,
  year =         "2005",
  bibdate =      "Fri Feb 15 10:47:55 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.mathnet.or.kr/mathnet/preprint_file/cacr/2005/cacr2005-08.pdf",
  acknowledgement = ack-nhfb,
}

@InProceedings{Krawczyk:2005:HHP,
  author =       "Hugo Krawczyk",
  title =        "{HMQV}: a High-Performance Secure {Diffie--Hellman}
                 Protocol",
  crossref =     "Shoup:2005:ACC",
  pages =        "546--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_33",
  bibdate =      "Mon Apr 3 09:26:13 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@MastersThesis{Kreitz:2005:OBE,
  author =       "Gunnar Kreitz",
  title =        "Optimization of broadcast encryption schemes",
  type =         "Examensarbete",
  school =       "Numerisk analys och datalogi, Kungliga Tekniska
                 h{\"o}gskolan",
  address =      "Stockholm, Sweden",
  pages =        "61",
  year =         "2005",
  bibdate =      "Wed Sep 28 07:45:30 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Krukow:2005:FCR,
  author =       "Karl Krukow and Mogens Nielsen and Vladimiro Sassone",
  title =        "A framework for concrete reputation-systems with
                 applications to history-based access control",
  crossref =     "Meadows:2005:CPA",
  pages =        "260--269",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ku:2005:CFR,
  author =       "Wei-Chi Ku and Shuai-Min Chen",
  title =        "Cryptanalysis of a flexible remote user authentication
                 scheme using {Smart Cards}",
  journal =      j-OPER-SYS-REV,
  volume =       "39",
  number =       "1",
  pages =        "90--96",
  month =        jan,
  year =         "2005",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:38 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Ku:2005:WYR,
  author =       "Wei-Chi Ku and Min-Hung Chiang and Shen-Tien Chang",
  title =        "Weaknesses of {Yoon--Ryu--Yoo}'s hash-based password
                 authentication scheme",
  journal =      j-OPER-SYS-REV,
  volume =       "39",
  number =       "1",
  pages =        "85--89",
  month =        jan,
  year =         "2005",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:38 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Kwon:2005:CLK,
  author =       "Jeoung Ok Kwon and Jung Yeon Hwang and Changwook Kim
                 and Dong Hoon Lee",
  title =        "Cryptanalysis of {Lee--Kim--Yoo} password-based key
                 agreement scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "168",
  number =       "2",
  pages =        "858--865",
  day =          "15",
  month =        sep,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:48 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Laskari:2005:TTC,
  author =       "E. C. Laskari and G. C. Meletiou and D. K. Tasoulis
                 and M. N. Vrahatis",
  title =        "Transformations of two cryptographic problems in terms
                 of matrices",
  journal =      j-SIGSAM,
  volume =       "39",
  number =       "4",
  pages =        "127--130",
  month =        dec,
  year =         "2005",
  CODEN =        "SIGSBZ",
  ISSN =         "0163-5824 (print), 1557-9492 (electronic)",
  ISSN-L =       "0163-5824",
  bibdate =      "Wed Aug 23 14:11:11 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIGSAM Bulletin",
  issue =        "154",
}

@InProceedings{Laud:2005:STS,
  author =       "Peeter Laud",
  title =        "Secrecy types for a simulatable cryptographic
                 library",
  crossref =     "Meadows:2005:CPA",
  pages =        "26--35",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lawton:2005:MAH,
  author =       "George Lawton",
  title =        "{E}-Mail Authentication Is Here, but Has It Arrived
                 Yet?",
  journal =      j-COMPUTER,
  volume =       "38",
  number =       "11",
  pages =        "17--19",
  month =        nov,
  year =         "2005",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2005.377",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Jul 4 17:16:18 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/comp/mags/co/2005/11/ry017.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Lee:2005:APC,
  author =       "Ruby B. Lee and Peter C. S. Kwan and John P. McGregor
                 and Jeffrey Dwoskin and Zhenghong Wang",
  title =        "Architecture for Protecting Critical Secrets in
                 Microprocessors",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "33",
  number =       "2",
  pages =        "2--13",
  month =        may,
  year =         "2005",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 09:40:51 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Lee:2005:CMA,
  author =       "Keon-Jik Lee and Byeong-Jik Lee",
  title =        "Cryptanalysis of the modified authenticated key
                 agreement scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "170",
  number =       "1",
  pages =        "280--284",
  day =          "1",
  month =        nov,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:50 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Lee:2005:ENB,
  author =       "Sung-Woon Lee and Hyun-Sung Kim and Kee-Young Yoo",
  title =        "Efficient nonce-based remote user authentication
                 scheme using smart cards",
  journal =      j-APPL-MATH-COMP,
  volume =       "167",
  number =       "1",
  pages =        "355--361",
  day =          "5",
  month =        aug,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:47 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Lee:2005:EVB,
  author =       "Sung-Woon Lee and Hyun-Sung Kim and Kee-Young Yoo",
  title =        "Efficient verifier-based key agreement protocol for
                 three parties without server's public key",
  journal =      j-APPL-MATH-COMP,
  volume =       "167",
  number =       "2",
  pages =        "996--1003",
  day =          "15",
  month =        aug,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:48 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Lee:2005:IEC,
  author =       "B. K. Lee and L. K. John",
  title =        "Implications of executing compression and encryption
                 applications on general purpose processors",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "54",
  number =       "7",
  pages =        "917--922",
  month =        jul,
  year =         "2005",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2005.121",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 16:17:17 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1432674",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Lee:2005:IHA,
  author =       "Sung-Woon Lee and Hyun-Sung Kim and Kee-Young Yoo",
  title =        "Improvement of {HWWM}-authenticated key agreement
                 protocol",
  journal =      j-APPL-MATH-COMP,
  volume =       "162",
  number =       "3",
  pages =        "1315--1320",
  day =          "25",
  month =        mar,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:42 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Lee:2005:ILL,
  author =       "Sung-Woon Lee and Hyun-Sung Kim and Kee-Young Yoo",
  title =        "Improvement of {Lee} and {Lee}'s authenticated key
                 agreement scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "162",
  number =       "3",
  pages =        "1049--1053",
  day =          "25",
  month =        mar,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:42 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Lee:2005:IWR,
  author =       "Choong-Hoon Lee and Heung-Kyu Lee and Youngho Suh",
  title =        "Image Watermarking Resistant to Combined Geometric and
                 Removal Attacks",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "5",
  number =       "1",
  pages =        "37--??",
  month =        jan,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "0219-4678",
  bibdate =      "Wed Jan 12 05:16:34 MST 2005",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Lee:2005:NBS,
  author =       "Cheng-Chi Lee and Min-Shiang Hwang and Wei-Pang Yang",
  title =        "A new blind signature based on the discrete logarithm
                 problem for untraceability",
  journal =      j-APPL-MATH-COMP,
  volume =       "164",
  number =       "3",
  pages =        "837--841",
  day =          "25",
  month =        may,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:45 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Lee:2005:NIW,
  author =       "Joong-Jae Lee and Won Kim and Na-Young Lee and
                 Gye-Young Kim",
  title =        "A New Incremental Watermarking Based on Dual-Tree
                 Complex Wavelet Transform",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "33",
  number =       "1",
  pages =        "133--140",
  month =        jul,
  year =         "2005",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-005-0226-y",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Wed Jul 6 10:36:21 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=33&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0920-8542&volume=33&issue=1&spage=133",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Lee:2005:SSP,
  author =       "Narn-Yih Lee and Ming-Feng Lee",
  title =        "The security of a strong proxy signature scheme with
                 proxy signer privacy protection",
  journal =      j-APPL-MATH-COMP,
  volume =       "161",
  number =       "3",
  pages =        "807--812",
  day =          "25",
  month =        feb,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:40 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Lepinski:2005:FZK,
  author =       "Matt Lepinski and Silvio Micali and Abhi Shelat",
  title =        "Fair-Zero Knowledge",
  crossref =     "Kilian:2005:TCS",
  pages =        "245--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@Article{Lesniewski-Laas:2005:SSS,
  author =       "Chris Lesniewski-Laas and M. Frans Kaashoek",
  title =        "{SSL} splitting: Securely serving data from untrusted
                 caches",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "48",
  number =       "5",
  pages =        "763--779",
  day =          "5",
  month =        aug,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Thu Jul 14 17:03:09 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@InProceedings{Li:2005:AAU,
  author =       "Zude Li and Xiaojun Ye",
  title =        "Attribute Analysis of Usage Control ({UCON})",
  crossref =     "Han:2005:PJI",
  pages =        "59--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Li:2005:ATN,
  author =       "Jiangtao Li and Ninghui Li and William H.
                 Winsborough",
  title =        "Automated trust negotiation using cryptographic
                 credentials",
  crossref =     "Meadows:2005:CPA",
  pages =        "46--57",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Li:2005:AWP,
  author =       "Zhitang Li and Huijun Jiang and Hanju Li",
  title =        "Active Worm Propagation Model With Discrete Time",
  crossref =     "Han:2005:PJI",
  pages =        "122--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Li:2005:BPC,
  author =       "Ninghui Li and John C. Mitchell and William H.
                 Winsborough",
  title =        "Beyond proof-of-compliance: security analysis in trust
                 management",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "3",
  pages =        "474--514",
  month =        may,
  year =         "2005",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1066100.1066103",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Jul 5 06:39:45 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Trust management is a form of distributed access
                 control that allows one principal to delegate some
                 access decisions to other principals. While the use of
                 delegation greatly enhances flexibility and
                 scalability, it may also reduce the control that a
                 principal has over the resources it owns. Security
                 analysis asks whether safety, availability, and other
                 properties can be maintained while delegating to
                 partially trusted principals. We show that in contrast
                 to the undecidability of classical
                 Harrison--Ruzzo--Ullman safety properties, our primary
                 security properties are decidable. In particular, most
                 security properties we study are decidable in
                 polynomial time. The computational complexity of
                 containment analysis, the most complicated security
                 property we study, varies according to the expressive
                 power of the trust management language.",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@InProceedings{Li:2005:FCR,
  author =       "Ying Li and Jintao Li",
  title =        "Further Cryptanalysis of a Remote Login Authentication
                 Scheme Based on Geometric Approach",
  crossref =     "Han:2005:PJI",
  pages =        "143--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Li:2005:ISS,
  author =       "Li-Hua Li and Shiang-Feng Tzeng and Min-Shiang Hwang",
  title =        "Improvement of signature scheme based on factoring and
                 discrete logarithms",
  journal =      j-APPL-MATH-COMP,
  volume =       "161",
  number =       "1",
  pages =        "49--54",
  day =          "4",
  month =        feb,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:40 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Li:2005:IWR,
  author =       "Haifeng Li and Shuxun Wang and Weiwei Song",
  title =        "Image Watermarking Resistant to Global Geometrical
                 Attacks",
  crossref =     "Han:2005:PJI",
  pages =        "911--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Li:2005:MCK,
  author =       "Mingyan Li and Radha Poovendran and David A. McGrew",
  title =        "Minimizing center key storage in hybrid one-way
                 function based group key management with communication
                 constraints",
  journal =      j-INFO-PROC-LETT,
  volume =       "93",
  number =       "4",
  pages =        "191--198",
  day =          "28",
  month =        feb,
  year =         "2005",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 18:40:59 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@InProceedings{Li:2005:ULC,
  author =       "Chung-Chih Li and Bo Sun",
  editor =       "Gongzhu Hu",
  booktitle =    "{Computers and their applications: proceedings of the
                 ISCA 20th international conference ; New Orleans,
                 Louisiana, USA, March 16--18, 2005}",
  title =        "Using Linear Congruential Generators for Cryptographic
                 Purposes",
  publisher =    "International Society for Computers and Their
                 Applications",
  address =      "Cary, NC, USA",
  bookpages =    "vi + 499",
  pages =        "13--19",
  year =         "2005",
  ISBN =         "1-880843-54-4",
  ISBN-13 =      "978-1-880843-54-3",
  LCCN =         "QA76.76.A65 I83 2005",
  bibdate =      "Tue Mar 06 06:57:02 2012",
  bibsource =    "DBLP;
                 http://dblp.uni-trier.de/db/conf/cata/cata2005.html#LiS05;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Liang:2005:FAG,
  author =       "Zhenkai Liang and R. Sekar",
  title =        "Fast and automated generation of attack signatures: a
                 basis for building self-protecting servers",
  crossref =     "Meadows:2005:CPA",
  pages =        "213--222",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Liang:2005:PAC,
  author =       "Wei Liang and Wenye Wang",
  title =        "On performance analysis of challenge\slash response
                 based authentication in wireless networks",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "48",
  number =       "2",
  pages =        "267--288",
  day =          "6",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Thu Jul 14 17:03:08 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Licks:2005:GAI,
  author =       "Vinicius Licks and Ramiro Jordan",
  title =        "Geometric Attacks on Image Watermarking Systems",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "12",
  number =       "3",
  pages =        "68--78",
  month =        jul # "\slash " # sep,
  year =         "2005",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/MMUL.2005.46",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Thu Nov 10 07:41:20 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Multimedia",
}

@InProceedings{Lieman:2005:CRW,
  author =       "Daniel Lieman",
  title =        "Cryptography in the real world today",
  crossref =     "Garrett:2005:PKC",
  pages =        "63--72",
  year =         "2005",
  MRclass =      "94A60 (94-02 94A62)",
  MRnumber =     "2211871 (2006k:94099)",
  bibdate =      "Fri Sep 17 09:12:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Lin:2005:HAO,
  author =       "Henry Lin and Luca Trevisan and Hoeteck Wee",
  title =        "On Hardness Amplification of One-Way Functions",
  crossref =     "Kilian:2005:TCS",
  pages =        "34--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@Article{Lin:2005:NIB,
  author =       "Chih-Yin Lin and Tzong-Chen Wu and Fangguo Zhang and
                 Jing-Jang Hwang",
  title =        "New identity-based society oriented signature schemes
                 from pairings on elliptic curves",
  journal =      j-APPL-MATH-COMP,
  volume =       "160",
  number =       "1",
  pages =        "245--260",
  day =          "5",
  month =        jan,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:39 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@TechReport{Lindskog:2005:DIT,
  author =       "Stefan Lindskog and Anna Brunstr{\"o}m",
  title =        "Design and implementation of a tunable encryption
                 service for networked applications",
  type =         "Technical report",
  number =       "2005:03",
  institution =  "Chalmers tekniska h{\"o}gskola",
  address =      "G{\"o}teborg, Sweden",
  pages =        "17",
  year =         "2005",
  ISSN =         "1652-926X",
  bibdate =      "Wed Sep 28 07:43:27 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Liu:2005:DBV,
  author =       "Hongmei Liu and Jiwu Huang and Yun Q. Shi",
  title =        "{DWT}-Based Video Data Hiding Robust to {MPEG}
                 Compression and Frame Loss",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "5",
  number =       "1",
  pages =        "111--??",
  month =        jan,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "0219-4678",
  bibdate =      "Wed Jan 12 05:16:34 MST 2005",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@InProceedings{Liu:2005:RBU,
  author =       "Linlan Liu and Jian Shu and Jianxiang Zheng",
  title =        "The {RBAC}-Based User Authorization in {Sanxin ERP}
                 System",
  crossref =     "Han:2005:PJI",
  pages =        "155--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Liu:2005:SWA,
  author =       "Sanya Liu and Zhenyu Liu and Zhongren Su",
  title =        "Securing {Web} Application System: a Solution Based on
                 {SMS} for Identifying Users",
  crossref =     "Han:2005:PJI",
  pages =        "104--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Lixin:2005:FLA,
  author =       "Xu Lixin and Zhang Xincheng and He Min and Wu Xianglin
                 and Qingyun Ru",
  title =        "A Four-Layer Architecture for {Web} Application System
                 Security Assurance: a Safeguard Mechanism Research",
  crossref =     "Han:2005:PJI",
  pages =        "87--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Loepp:2005:PIC,
  author =       "Susan Loepp and William Wootters",
  title =        "Protecting Information: From Classical Error
                 Correction to Quantum Cryptography",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "????",
  year =         "2005",
  ISBN =         "0-521-82740-X (hardcover), 0-521-53476-3 (paperback)",
  ISBN-13 =      "978-0-521-82740-9 (hardcover), 978-0-521-53476-5
                 (paperback)",
  LCCN =         "????",
  bibdate =      "Wed Sep 14 14:40:44 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Long:2005:DTC,
  author =       "Yu Long and Zhenfu Cao and Kefei Chen",
  title =        "A dynamic threshold commercial key escrow scheme based
                 on conic",
  journal =      j-APPL-MATH-COMP,
  volume =       "171",
  number =       "2",
  pages =        "972--982",
  day =          "15",
  month =        dec,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:51 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Lu:2005:BIW,
  author =       "Haiping Lu and Yun Q. Shi and Alex C. Kot and Lihui
                 Chen",
  title =        "Binary Image Watermarking Through Blurring and Biased
                 Binarization",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "5",
  number =       "1",
  pages =        "67--??",
  month =        jan,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "0219-4678",
  bibdate =      "Wed Jan 12 05:16:34 MST 2005",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@InProceedings{Lu:2005:CCA,
  author =       "Yi Lu and Willi Meier and Serge Vaudenay",
  title =        "The Conditional Correlation Attack: a Practical Attack
                 on {Bluetooth} Encryption",
  crossref =     "Shoup:2005:ACC",
  pages =        "97--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_7",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Motivated by the security of the nonlinear filter
                 generator, the concept of correlation was previously
                 extended to the conditional correlation, that studied
                 the linear correlation of the inputs conditioned on a
                 given (short) output pattern of some specific nonlinear
                 function. Based on the conditional correlations,
                 conditional correlation attacks were shown to be
                 successful and efficient against the nonlinear filter
                 generator. In this paper, we further generalize the
                 concept of conditional correlations by assigning it
                 with a different meaning, i.e. the correlation of the
                 output of an arbitrary function conditioned on the
                 unknown (partial) input which is uniformly distributed.
                 Based on this generalized conditional correlation, a
                 general statistical model is studied for dedicated
                 key-recovery distinguishers. It is shown that the
                 generalized conditional correlation is no smaller than
                 the unconditional correlation. Consequently, our
                 distinguisher improves on the traditional one (in the
                 worst case it degrades into the traditional one). In
                 particular, the distinguisher may be successful even if
                 no ordinary correlation exists. As an application, a
                 conditional correlation attack is developed and
                 optimized against Bluetooth two-level E0. The attack is
                 based on a recently detected flaw in the
                 resynchronization of E0, as well as the investigation
                 of conditional correlations in the Finite State Machine
                 (FSM) governing the keystream output of E0. Our best
                 attack finds the original encryption key for two-level
                 E0 using the first 24 bits of $ 2^{23.8} $ frames and
                 with $ 2^{38} $ computations. This is clearly the
                 fastest and only practical known-plaintext attack on
                 Bluetooth encryption compared with all existing
                 attacks. Current experiments confirm our analysis.",
  acknowledgement = ack-nhfb,
  keywords =     "Bluetooth; Correlation; Crypto '2005; cryptography;
                 E0; Stream Ciphers",
}

@Article{Lu:2005:ERU,
  author =       "Rongxing Lu and Zhenfu Cao",
  title =        "Efficient remote user authentication scheme using
                 smart card",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "49",
  number =       "4",
  pages =        "535--540",
  day =          "15",
  month =        nov,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:08 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Lu:2005:NDA,
  author =       "Rongxing Lu and Zhenfu Cao",
  title =        "A new deniable authentication protocol from bilinear
                 pairings",
  journal =      j-APPL-MATH-COMP,
  volume =       "168",
  number =       "2",
  pages =        "954--961",
  day =          "15",
  month =        sep,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:48 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Lu:2005:NPS,
  author =       "Eric Jui-Lin Lu and Min-Shiang Hwang and Cheng-Jian
                 Huang",
  title =        "A new proxy signature scheme with revocation",
  journal =      j-APPL-MATH-COMP,
  volume =       "161",
  number =       "3",
  pages =        "799--806",
  day =          "25",
  month =        feb,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:40 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Lu:2005:PBM,
  author =       "RongXing Lu and ZhenFu Cao and Yuan Zhou",
  title =        "Proxy blind multi-signature scheme without a secure
                 channel",
  journal =      j-APPL-MATH-COMP,
  volume =       "164",
  number =       "1",
  pages =        "179--187",
  day =          "5",
  month =        may,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:44 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Lu:2005:RTP,
  author =       "RongXing Lu and ZhenFu Cao and HaoJin Zhu",
  title =        "A robust $ (k, n) + 1 $ threshold proxy signature
                 scheme based on factoring",
  journal =      j-APPL-MATH-COMP,
  volume =       "166",
  number =       "1",
  pages =        "35--45",
  day =          "6",
  month =        jul,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:46 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Lu:2005:TUS,
  author =       "Rong Xing Lu and Zhen Fu Cao and Yuan Zhou",
  title =        "Threshold undeniable signature scheme based on conic",
  journal =      j-APPL-MATH-COMP,
  volume =       "162",
  number =       "1",
  pages =        "165--177",
  day =          "4",
  month =        mar,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:41 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Ludvig:2005:PWF,
  author =       "Michal Ludvig",
  title =        "{VIA} {PadLock}-wicked fast encryption",
  journal =      j-LINUX-J,
  volume =       "2005",
  number =       "133",
  pages =        "4--4",
  month =        may,
  year =         "2005",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Sat Dec 24 17:46:07 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Lv:2005:PCA,
  author =       "Jiqiang Lv and Xinmei Wang and Kwangjo Kim",
  title =        "Practical convertible authenticated encryption schemes
                 using self-certified public keys",
  journal =      j-APPL-MATH-COMP,
  volume =       "169",
  number =       "2",
  pages =        "1285--1297",
  day =          "15",
  month =        oct,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:49 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Lv:2005:SMS,
  author =       "Jiqiang Lv and Xinmei Wang and Kwangjo Kim",
  title =        "Security of a multisignature scheme for specified
                 group of verifiers",
  journal =      j-APPL-MATH-COMP,
  volume =       "166",
  number =       "1",
  pages =        "58--63",
  day =          "6",
  month =        jul,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:46 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Lyuu:2005:CIH,
  author =       "Yuh-Dauh Lyuu and Ming-Luen Wu",
  title =        "Cryptanalysis of and improvement on the {Hwang--Chen}
                 multi-proxy multi-signature schemes",
  journal =      j-APPL-MATH-COMP,
  volume =       "167",
  number =       "1",
  pages =        "729--739",
  day =          "5",
  month =        aug,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:47 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Ma:2005:NCD,
  author =       "Yiping Ma and Jiqing Han",
  title =        "A New Capability Description for Audio Information
                 Hiding",
  crossref =     "Han:2005:PJI",
  pages =        "65--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Macchetti:2005:QPH,
  author =       "Marco Macchetti and Luigi Dadda",
  title =        "Quasi-Pipelined Hash Circuits",
  crossref =     "IEEE:2005:PIS",
  pages =        "??--??",
  year =         "2005",
  bibdate =      "Wed Jun 22 07:02:55 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://arith17.polito.it/final/paper-149.pdf",
  abstract =     "Hash functions are an important cryptographic
                 primitive. They are used to obtain a fixed-size
                 fingerprint, or hash value, of an arbitrary long
                 message. We focus particularly on the class of
                 dedicated hash functions, whose general construction is
                 presented; the peculiar arrangement of sequential and
                 combinational units makes the application of pipelining
                 techniques to these constructions not trivial. We
                 formalize here an optimization technique called
                 quasipipelining, whose goal is to optimize the critical
                 path and thus to increase the clock frequency in
                 dedicated hardware implementations. The SHA-2 algorithm
                 has been previously examined by Dadda et al., with
                 specific versions of quasipipelining; here, a full
                 generalization of the technique is presented, along
                 with application to the SHA-1 algorithm.
                 Quasi-pipelining could be as well applied to future
                 hashing algorithms, provided they are designed along
                 the same lines as those of the SHA family.",
  acknowledgement = ack-nhfb,
  pagecount =    "8",
}

@Article{Mares:2005:BRA,
  author =       "Peter Mares",
  title =        "Book Review: {{\em Art of Java Web Development}, by N.
                 Ford}",
  journal =      j-COMP-J,
  volume =       "48",
  number =       "2",
  pages =        "253--253",
  month =        mar,
  year =         "2005",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Jun 28 17:48:36 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_48/Issue_02/",
  URL =          "http://www3.oup.co.uk/computer_journal/free_pdf/bxh071.pdf;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_48/Issue_02/bxh071.sgm.abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@PhdThesis{Martin:2005:STA,
  author =       "Thomas Martin",
  title =        "A set theoretic approach to broadcast encryption",
  type =         "Thesis ({Ph.D.})",
  school =       "University of London",
  address =      "London, UK",
  pages =        "235",
  year =         "2005",
  bibdate =      "Wed Sep 28 08:14:04 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Mathieson:2005:UCR,
  author =       "SA Mathieson",
  title =        "{UK} crypto regulation option dies",
  journal =      j-NETWORK-SECURITY,
  volume =       "2005",
  number =       "6",
  pages =        "2--2",
  month =        jun,
  year =         "2005",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(05)70241-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:15 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485805702415",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@InProceedings{Matula:2005:TLS,
  author =       "David Matula and Alex Fit-Florea and Mitchell
                 Thornton",
  title =        "Table Lookup Structures for Multiplicative Inverses
                 Modulo $ 2^k $",
  crossref =     "IEEE:2005:PIS",
  pages =        "??--??",
  year =         "2005",
  bibdate =      "Wed Jun 22 07:02:55 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://arith17.polito.it/final/paper-160.pdf",
  abstract =     "We introduce an inheritance property and related table
                 lookup structures applicable to simplified evaluation
                 of the modular operations ``multiplicative inverse'',
                 ``discrete log'', and ``exponential residue'' in the
                 particular modulus $ 2^k $. Regarding applications, we
                 describe an integer representation system of Benschop
                 for transforming integer multiplications into additions
                 which benefits from our table lookup function
                 evaluation procedures.\par We focus herein on the
                 multiplicative inverse modulo $ 2^k $ to exhibit
                 simplifications in hardware implementations realized
                 from the inheritance property. A table lookup structure
                 given by a bit string that can be interpreted with
                 reference to a binary tree is described and analyzed.
                 Using observed symmetries, the lookup structure size is
                 reduced allowing a novel direct lookup process for
                 multiplicative inverses for all 16-bit odd integers to
                 be obtained from a table of size less than two KBytes.
                 The 16-bit multiplicative inverse operation is also
                 applicable for providing a seed inverse for obtaining
                 32/64-bit multiplicative inverses by one/two iterations
                 of a known quadratic refinement algorithm.",
  acknowledgement = ack-nhfb,
  pagecount =    "8",
}

@InProceedings{Maughan:2005:HSC,
  author =       "Douglas Maughan",
  title =        "Homeland security: cyber security {R\&D} initiatives",
  crossref =     "Meadows:2005:CPA",
  pages =        "1--1",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{McGregor:2005:PCK,
  author =       "John P. McGregor and Ruby B. Lee",
  title =        "Protecting cryptographic keys and computations via
                 virtual secure coprocessing",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "33",
  number =       "1",
  pages =        "16--26",
  month =        mar,
  year =         "2005",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 09:40:37 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@InProceedings{Micali:2005:OEC,
  author =       "Silvio Micali and Chris Peikert and Madhu Sudan and
                 David A. Wilson",
  title =        "Optimal Error Correction Against Computationally
                 Bounded Noise",
  crossref =     "Kilian:2005:TCS",
  pages =        "1--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@InProceedings{Micciancio:2005:ASS,
  author =       "Daniele Micciancio and Saurabh Panjwani",
  title =        "Adaptive Security of Symbolic Encryption",
  crossref =     "Kilian:2005:TCS",
  pages =        "169--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@Article{Milenkovic:2005:UIB,
  author =       "Milena Milenkovi{\'c} and Aleksandar Milenkovi{\'c}
                 and Emil Jovanov",
  title =        "Using instruction block signatures to counter code
                 injection attacks",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "33",
  number =       "1",
  pages =        "108--117",
  month =        mar,
  year =         "2005",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 09:40:37 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Book{Mirkovic:2005:IDS,
  editor =       "Jelena Mirkovic",
  title =        "{Internet} denial of service: attack and defense
                 mechanisms",
  publisher =    pub-PHPTR,
  address =      pub-PHPTR:adr,
  pages =        "xxii + 372",
  year =         "2005",
  ISBN =         "0-13-147573-8 (paperback)",
  ISBN-13 =      "978-0-13-147573-1 (paperback)",
  LCCN =         "TK5105.59 .I5455 2004",
  bibdate =      "Mon Oct 3 18:58:21 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "The Radia Perlman series in computer networking and
                 security",
  URL =          "http://www.loc.gov/catdir/toc/ecip0422/2004020335.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures; Internet;
                 Security measures; Computer crimes; Prevention",
}

@Article{Moffie:2005:AAS,
  author =       "Micha Moffie and David Kaeli",
  title =        "{ASM}: application security monitor",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "33",
  number =       "5",
  pages =        "21--26",
  month =        dec,
  year =         "2005",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 09:41:24 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Book{Mollin:2005:CGS,
  author =       "Richard A. Mollin",
  title =        "Codes: the guide to secrecy from ancient to modern
                 times",
  publisher =    pub-CHAPMAN-HALL-CRC,
  address =      pub-CHAPMAN-HALL-CRC:adr,
  pages =        "xx + 678",
  year =         "2005",
  ISBN =         "1-58488-470-3",
  ISBN-13 =      "978-1-58488-470-5",
  LCCN =         "QA76.9.A25 M67 2005",
  bibdate =      "Sun Dec 13 08:48:25 MST 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0647/2005041403-d.html",
  acknowledgement = ack-nhfb,
  subject =      "computer security; data encryption (computer
                 science)",
}

@MastersThesis{Moritz:2005:KAE,
  author =       "Hannes Moritz",
  title =        "{Kryptoanalyse des Advanced Encryption Standard}.
                 ({German}) [Cryptanalysis of the {Advanced Encryption
                 Standard}]",
  type =         "{Diplom-Arbeit}",
  school =       "Technische Universit{\"a}t Wien",
  address =      "Wien, Austria",
  pages =        "iii + 116",
  year =         "2005",
  bibdate =      "Wed Sep 28 08:36:15 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  language =     "German",
}

@Book{Moyle:2005:CLD,
  author =       "Ed Moyle and Diana Kelley",
  title =        "Cryptographic libraries for developers",
  publisher =    "Charles River Media",
  address =      "Hingham, MA, USA",
  pages =        "????",
  year =         "2005",
  ISBN =         "1-58450-409-9",
  ISBN-13 =      "978-1-58450-409-2",
  LCCN =         "QA76.76.D47 M72 2005",
  bibdate =      "Fri Dec 9 06:46:15 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip0519/2005026626.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer software; Development; Cryptography",
}

@Book{Mrayati:2005:IDB,
  editor =       "M. Mrayati and Y. Meer Alam and M. H. at-Tayyan",
  title =        "{Ibn Dunaynir}'s book: Expositive chapters on
                 cryptanalysis : ({Maqasid} al-fusul al-mutargima an
                 hall at-targama)",
  volume =       "4",
  publisher =    "KFCRIS \& KACST",
  address =      "Riyadh, Saudi Arabia",
  pages =        "xii + 189",
  year =         "2005",
  ISBN =         "9960-890-44-9",
  ISBN-13 =      "978-9960-890-44-9",
  LCCN =         "????",
  bibdate =      "Thu May 12 06:53:13 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "{Arabic} origins of cryptology",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography / Arab countries / history",
  language =     "English and Arabic",
}

@InProceedings{Myasnikov:2005:PAB,
  author =       "Alexei Myasnikov and Vladimir Shpilrain and Alexander
                 Ushakov",
  title =        "A Practical Attack on a Braid Group Based
                 Cryptographic Protocol",
  crossref =     "Shoup:2005:ACC",
  pages =        "86--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_6",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@Article{Myles:2005:ETS,
  author =       "Ginger Myles and Christian Collberg and Zachary
                 Heidepriem and Armand Navabi",
  title =        "The evaluation of two software watermarking
                 algorithms",
  journal =      j-SPE,
  volume =       "35",
  number =       "10",
  pages =        "923--938",
  month =        aug,
  year =         "2005",
  CODEN =        "SPEXBL",
  DOI =          "https://doi.org/10.1002/spe.657",
  ISSN =         "0038-0644 (print), 1097-024X (electronic)",
  ISSN-L =       "0038-0644",
  bibdate =      "Tue Oct 4 05:39:37 MDT 2005",
  bibsource =    "http://www.interscience.wiley.com/jpages/0038-0644;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www3.interscience.wiley.com/journalfinder.html",
  abstract =     "In this paper we analyze the effectiveness of two
                 different software watermarking algorithms. The first
                 is an algorithm proposed by Akito Monden et al. and the
                 second an algorithm proposed by Robert L. Davidson and
                 Nathan Myhrvold of the Microsoft Corporation. We have
                 implemented these techniques within the SANDMARK
                 framework, a system designed to study the effectiveness
                 of software protection algorithms on Java bytecode. To
                 the best of our knowledge this is the first
                 implementation and empirical evaluation of these
                 algorithms with respect to a set of properties such as
                 bit-rate, stealth, and resilience to attack. We
                 demonstrate through the use of the SANDMARK framework
                 that both of these algorithms have a high bit-rate but
                 are unstealthy and easy to attack.",
  acknowledgement = ack-nhfb,
  fjournal =     "Software---Practice and Experience",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X",
  onlinedate =   "14 Apr 2005",
}

@Book{Naftali:2005:BSS,
  author =       "Timothy J. Naftali",
  title =        "Blind spot: the secret history of {American}
                 counterterrorism",
  publisher =    "Basic Books",
  address =      "New York, NY, USA",
  pages =        "xv + 399",
  year =         "2005",
  ISBN =         "0-465-09281-0 (hardcover)",
  ISBN-13 =      "978-0-465-09281-9 (hardcover)",
  LCCN =         "HV6432 .N34 2005",
  bibdate =      "Thu Jan 19 12:26:43 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip057/2005003248.html",
  acknowledgement = ack-nhfb,
  subject =      "terrorism; United States; prevention; history;
                 government policy",
  tableofcontents = "The plot to kill General
                 Eisenhower\par

                 Hijacking\par

                 The lessons of Munich 1972\par

                 ``There's very little we can do''\par

                 Lull before the storm\par

                 False start\par

                 Striking back\par

                 The silent struggle\par

                 The new terrorism\par

                 Clinton versus bin Laden\par

                 George W. Bush and bin Laden\par

                 Conclusion: Blindspots and 9/11",
}

@InProceedings{Nagao:2005:UCS,
  author =       "Waka Nagao and Yoshifumi Manabe and Tatsuaki Okamoto",
  title =        "A Universally Composable Secure Channel Based on the
                 {KEM--DEM} Framework",
  crossref =     "Kilian:2005:TCS",
  pages =        "426--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@InProceedings{Naor:2005:ECH,
  author =       "Moni Naor and Asaf Nussboim and Eran Tromer",
  title =        "Efficiently Constructible Huge Graphs That Preserve
                 First Order Properties of Random Graphs",
  crossref =     "Kilian:2005:TCS",
  pages =        "66--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@InProceedings{Narayanan:2005:FDA,
  author =       "Arvind Narayanan and Vitaly Shmatikov",
  title =        "Fast dictionary attacks on passwords using time-space
                 tradeoff",
  crossref =     "Meadows:2005:CPA",
  pages =        "364--372",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Narayanan:2005:ODG,
  author =       "Arvind Narayanan and Vitaly Shmatikov",
  title =        "Obfuscated databases and group privacy",
  crossref =     "Meadows:2005:CPA",
  pages =        "102--111",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Nedjah:2005:SHC,
  author =       "N. Nedjah and L. {de, Macedo, Mourelle}",
  title =        "Software\slash Hardware Co-Design of Efficient and
                 Secure Cryptographic Hardware",
  journal =      j-J-UCS,
  volume =       "11",
  number =       "1",
  pages =        "66--??",
  day =          "28",
  month =        jan,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Wed Jul 6 08:14:47 MDT 2005",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_11_1/software_hardware_co_design",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Nenadic:2005:RBC,
  author =       "A. Nenadic and N. Zhang and B. Cheetham and C. Goble",
  title =        "{RSA}-based Certified Delivery of {E}-Goods Using
                 Verifiable and Recoverable Signature Encryption",
  journal =      j-J-UCS,
  volume =       "11",
  number =       "1",
  pages =        "175--192",
  day =          "28",
  month =        jan,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Wed Jul 6 08:14:47 MDT 2005",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_11_1/rsa_based_certified_delivery",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Nenadic:2005:RBV,
  author =       "Aleksandra Nenadi{\'c} and Ning Zhang and Qi Shi",
  title =        "{RSA-based Verifiable and Recoverable Encryption of
                 Signatures} and its application in certified e-mail
                 delivery",
  journal =      j-J-COMP-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "757--777",
  month =        "????",
  year =         "2005",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2005-13504",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:22:56 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Nguyen:2005:FPL,
  author =       "P. Nguyen and D. Stehle",
  title =        "Floating-Point {LLL} Revisited",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3494",
  pages =        "215--233",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11426639_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Jun 24 14:51:11 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The Lenstra-Lenstra-Lov{\'a}sz lattice basis reduction
                 algorithm (LLL or $ L^3 $ ) is a very popular tool in
                 public-key cryptanalysis and in many other fields.
                 Given an integer $d$-dimensional lattice basis with
                 vectors of norm less than $B$ in an $n$-dimensional
                 space, $ L^3 $ outputs a so-called $ L^3 $-reduced
                 basis in polynomial time $ O(d^5 n \log^3 B) $, using
                 arithmetic operations on integers of bit-length $ O(d l
                 o g B) $. This worst-case complexity is problematic for
                 lattices arising in cryptanalysis where $d$ or/and $
                 \log B $ are often large. As a result, the original $
                 L^3 $ is almost never used in practice. Instead, one
                 applies floating-point variants of $ L^3 $, where the
                 long-integer arithmetic required by Gram--Schmidt
                 orthogonalisation (central in $ L^3 $ ) is replaced by
                 floating-point arithmetic. Unfortunately, this is known
                 to be unstable in the worst-case: the usual
                 floating-point $ L^3 $ is not even guaranteed to
                 terminate, and the output basis may not be $ L^3
                 $-reduced at all. In this article, we introduce the $
                 L^2 $ algorithm, a new and natural floating-point
                 variant of $ L^3 $ which provably outputs $ L^3
                 $-reduced bases in polynomial time $ O(d^4 n (d + \log
                 B) \log B) $. This is the first $ L^3 $ algorithm whose
                 running time (without fast integer arithmetic) provably
                 grows only quadratically with respect to $ \log B $,
                 like the well-known Euclidean and Gaussian algorithms,
                 which it generalizes.",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
  keywords =     "$L^3$; Lattice Reduction; LLL; Public-Key
                 Cryptanalysis",
}

@Article{Nguyen:2005:PSE,
  author =       "L. Nguyen and R. Safavi-Naini and K. Kurosawa",
  title =        "A Provably Secure and Efficient Verifiable Shuffle
                 based on a Variant of the {Paillier} Cryptosystem",
  journal =      j-J-UCS,
  volume =       "11",
  number =       "6",
  pages =        "986--1010",
  month =        "????",
  year =         "2005",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Thu Jul 10 06:41:40 MDT 2008",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_11_6/a_provably_secure_and",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@InProceedings{Nguyen:2005:RBP,
  author =       "Minh-Huyen Nguyen",
  title =        "The Relationship Between Password-Authenticated Key
                 Exchange and Other Cryptographic Primitives",
  crossref =     "Kilian:2005:TCS",
  pages =        "457--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@Book{Oppliger:2005:CC,
  author =       "Rolf Oppliger",
  title =        "Contemporary cryptography",
  publisher =    pub-ARTECH,
  address =      pub-ARTECH:adr,
  pages =        "xxv + 503",
  year =         "2005",
  ISBN =         "1-58053-642-5",
  ISBN-13 =      "978-1-58053-642-4",
  LCCN =         "Z103 .O66 2005",
  bibdate =      "Thu May 12 10:35:23 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Artech House computer security series",
  URL =          "http://www.artechhouse.com/Detail.aspx?strIsbn=978-1-58053-642-4",
  acknowledgement = ack-nhfb,
  subject =      "cryptography",
}

@InProceedings{Ostrovsky:2005:PSS,
  author =       "Rafail Ostrovsky and William E. {Skeith III}",
  title =        "Private Searching on Streaming Data",
  crossref =     "Shoup:2005:ACC",
  pages =        "223--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_14",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@TechReport{Osvik:2005:CAC,
  author =       "Dag Arne Osvik and Adi Shamir and Eran Tromer",
  title =        "Cache Attacks and Countermeasures: the Case of {AES}:
                 (Extended Version)",
  type =         "Technical report",
  institution =  "Department of Computer Science and Applied
                 Mathematics, Weizmann Institute of Science",
  address =      "Rehovot 76100, Israel",
  day =          "8",
  month =        oct,
  year =         "2005",
  bibdate =      "Mon Nov 21 09:00:00 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.wisdom.weizmann.ac.il/~tromer/papers/cache.pdf",
  abstract =     "We describe several software side-channel attacks
                 based on inter-process leakage through the state of the
                 CPU's memory cache. This leakage reveals memory access
                 patterns, which can be used for cryptanalysis of
                 cryptographic primitives that employ data-dependent
                 table lookups. The attacks allow an unprivileged
                 process to attack other processes running in parallel
                 on the same processor, despite partitioning methods
                 such as memory protection, sandboxing and
                 virtualization. Some of our methods require only the
                 ability to trigger services that perform encryption or
                 MAC using the unknown key, such as encrypted disk
                 partitions or secure network links. Moreover, we
                 demonstrate an extremely strong type of attack, which
                 requires knowledge of neither the specific plaintexts
                 nor ciphertexts, and works by merely monitoring the
                 effect of the cryptographic process on the cache. We
                 discuss in detail several such attacks on AES, and
                 experimentally demonstrate their applicability to real
                 systems, such as OpenSSL and Linux's {\tt dm-crypt}
                 encrypted partitions (in the latter case, the full key
                 can be recovered after just 800 writes to the
                 partition, taking 65 milliseconds). Finally, we
                 describe several countermeasures which can be used to
                 mitigate such attacks.",
  acknowledgement = ack-nhfb,
}

@Article{Ouellette:2005:PPM,
  author =       "John Ouellette",
  title =        "Paranoid penguin: Managing {SSH} for scripts and {{\tt
                 cron}} jobs",
  journal =      j-LINUX-J,
  volume =       "2005",
  number =       "137",
  pages =        "13--13",
  month =        sep,
  year =         "2005",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Sat Dec 24 17:46:11 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Pang:2005:NMS,
  author =       "Liao-Jun Pang and Yu-Min Wang",
  title =        "A new $ (t n) $ multi-secret sharing scheme based on
                 {Shamir}'s secret sharing",
  journal =      j-APPL-MATH-COMP,
  volume =       "167",
  number =       "2",
  pages =        "840--848",
  day =          "15",
  month =        aug,
  year =         "2005",
  CODEN =        "AMHCBQ",
  DOI =          "https://doi.org/10.1016/j.amc.2004.06.120",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:48 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/applmathcomput2005.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0096300304005338",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Papanikolaou:2005:BRBa,
  author =       "Nikolaos Papanikolaou",
  title =        "Book Review: {{\booktitle{Data Privacy and Security}},
                 by David Salomon; Spring-Verlag, 2003, \$51.48,
                 Hardcover}",
  journal =      j-SIGACT,
  volume =       "36",
  number =       "2",
  pages =        "8--13",
  month =        jun,
  year =         "2005",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1067309.1067315",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 18:30:27 MDT 2012",
  bibsource =    "DBLP;
                 http://dblp.uni-trier.de/db/journals/sigact/sigact36.html#Papanikolaou05;
                 http://portal.acm.org/;
                 https://www.math.utah.edu/pub/mirrors/ftp.ira.uka.de/bibliography/Misc/DBLP/2005.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See \cite{Salomon:2003:DPS}.",
  URL =          "http://doi.acm.org/10.1145/1067309.1067315",
  abstract =     "The field of cryptology and data security hardly needs
                 any introduction; numerous popular accounts of the
                 subject have appeared over the years, and it is already
                 a core topic in undergraduate computer science. The
                 very term ``cryptology'' is testimony to the long
                 history of the field; the term is derived from the
                 words \kappa \sigma \nu \pi \tau {\'o}s (meaning
                 hidden), and \lambda {\'o} \gamma os (meaning speech),
                 which have retained their meaning in the Greek language
                 for many centuries.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Park:2005:CZA,
  author =       "Je Hong Park and Bo Gyeong Kang and Jae Woo Han",
  title =        "Cryptanalysis of {Zhou} et al.'s proxy-protected
                 signature schemes",
  journal =      j-APPL-MATH-COMP,
  volume =       "169",
  number =       "1",
  pages =        "192--197",
  day =          "1",
  month =        oct,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:49 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Park:2005:NDS,
  author =       "Je Hong Park and Seongtaek Chee",
  title =        "A note on digital signature scheme using a
                 self-pairing map",
  journal =      j-APPL-MATH-COMP,
  volume =       "169",
  number =       "1",
  pages =        "472--475",
  day =          "1",
  month =        oct,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:49 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Pass:2005:NIC,
  author =       "Rafael Pass and Alon Rosen",
  title =        "New and improved constructions of non-malleable
                 cryptographic protocols",
  crossref =     "ACM:2005:SPA",
  pages =        "533--542",
  year =         "2005",
  bibdate =      "Wed Apr 5 05:59:22 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Pass:2005:UCN,
  author =       "Rafael Pass and abhi shelat",
  title =        "Unconditional Characterizations of Non-interactive
                 Zero-Knowledge",
  crossref =     "Shoup:2005:ACC",
  pages =        "118--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_8",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
  xxnote =       "Yes, second author is lowercase name.",
}

@InProceedings{Peng:2005:SES,
  author =       "Kun Peng and Colin Boyd and Ed Dawson",
  title =        "Simple and Efficient Shuffling with Provable
                 Correctness and {ZK} Privacy",
  crossref =     "Shoup:2005:ACC",
  pages =        "188--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_12",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@TechReport{Perlman:2005:EMD,
  author =       "Radia Perlman",
  title =        "The Ephemerizer: Making Data Disappear",
  type =         "Technical report",
  institution =  "Sun Labs",
  address =      "16 Network Circle, Menlo Park, CA 94025, USA",
  pages =        "20",
  year =         "2005",
  bibdate =      "Mon Mar 28 11:13:11 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.research.sun.com/techrep/2005/smll-tr02005-140.pdf",
  abstract =     "This paper is about how to keep data for a finite
                 time, and then make it unrecoverable after that. It is
                 difficult to ensure that data is completely destroyed.
                 To be available before expiration it is desirable to
                 create backup copies. Then absolute deletion becomes
                 difficult, because even after explicitly deleting it,
                 copies might remain on backup media, or in swap space,
                 or be forensically recoverable. The obvious solution is
                 to store the data encrypted, and then delete the key
                 after expiration. The key is somewhat easier to manage,
                 because it is smaller, but there is still the issue of
                 needing to make the key reliably available for some
                 time, and then reliably destroyed. It is difficult
                 enough for a user to manage one key, much less
                 different keys for different data expiration times. The
                 user could keep each key on a tamper-proof smart card
                 with no copies, but then the data will be lost
                 prematurely if the user loses the smart card. And smart
                 cards are expensive. So the idea in this paper is to
                 concentrate all the key management expense and
                 expertise in one place, a server we call an
                 ``ephemerizer''. The ephemerizer creates keys, makes
                 them available for encryption, aids in decryption, and
                 destroys the keys at the appropriate time. The design
                 in this paper ensure that even if a client's machine
                 gets compromised, and everything in stable storage
                 (including long term user keys) is stolen, any data
                 that has expired before the compromise remains
                 unrecoverable.\par

                 The paper starts with a description of an existing
                 commercial scheme, and presents improvements to that
                 scheme to eliminate the necessity for per-message
                 state. Then it presents a new approach, based on public
                 keys, and presents an initial design, and then a more
                 efficient version using a new concept closely related
                 to blind signatures, that we call ``blind
                 decryption''.",
  acknowledgement = ack-nhfb,
}

@Article{Perry:2005:DCP,
  author =       "Tekla S. Perry",
  title =        "{DVD} copy protection: take 2",
  journal =      j-IEEE-SPECTRUM,
  volume =       "42",
  number =       "1",
  pages =        "38--39",
  month =        jan,
  year =         "2005",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2005.1377873",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "advanced access content system; Advanced Encryption
                 Standards; Cascading style sheets; copy protection;
                 cryptography; Decoding; digital versatile discs; DVD;
                 DVD copy protection; Hardware; Law; Legal factors;
                 Manufacturing; Motion pictures; optical disc; Portable
                 computers; portable video player; Protection; video
                 discs; video server",
}

@Article{Petullo:2005:EYR,
  author =       "Mike Petullo",
  title =        "Encrypt your root filesystem",
  journal =      j-LINUX-J,
  volume =       "2005",
  number =       "129",
  pages =        "4--4",
  month =        jan,
  year =         "2005",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Sat Dec 24 17:46:03 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@InProceedings{Phatak:2005:FMR,
  author =       "Dhananjay Phatak and Tom Goff",
  title =        "Fast Modular Reduction for Large Wordlengths via One
                 Linear and One Cyclic Convolution",
  crossref =     "IEEE:2005:PIS",
  pages =        "??--??",
  year =         "2005",
  bibdate =      "Wed Jun 22 07:02:55 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://arith17.polito.it/final/paper-156.pdf",
  abstract =     "Modular reduction is a fundamental operation in
                 cryptographic systems. Most well known modular
                 reduction methods including Barrett's and Montgomery's
                 algorithms leverage some-pre computations to avoid
                 divisions so that the main complexity of these methods
                 lies in a sequence of two long multiplications. For
                 large wordlengths a multiplication which is tantamount
                 to a linear convolution is performed via the Fast
                 Fourier Transform (FFT) or other transform-based
                 techniques as in the Schonhage-Strassen multiplication
                 algorithm.\par

                 We show a fundamental property (the separation
                 principle): in a modular reduction based on long
                 multiplications, the linear convolution required by one
                 of the two long multiplications can be replaced by a
                 cyclic convolution, and the halves can be separated
                 using other information available due to the intrinsic
                 redundancy of the operations. This reduces the number
                 of operations by about 25\%. We demonstrate that both
                 Barrett's and Montgomery's methods can be sped up by
                 using the aforementioned fundamental principle. It is
                 shown that a direct application of this algorithm to
                 modular exponentiation (either using Barrett's or
                 Montgomery's methods) can be expected to yield about
                 17\% speedup.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; cyclic convolution; elliptic-curve; fast
                 modular reduction; FFT multiply; large wordlength;
                 linear convolution; number theoretic transforms;
                 principle of separation",
  pagecount =    "8",
}

@InProceedings{Pietrzak:2005:CDI,
  author =       "Krzysztof Pietrzak",
  title =        "Composition Does Not Imply Adaptive Security",
  crossref =     "Shoup:2005:ACC",
  pages =        "55--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_4",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@Article{Piva:2005:SRA,
  author =       "Alessandro Piva and Franco Bartolini and Roberto
                 Caldelli",
  title =        "Self Recovery Authentication of Images in the {DWT}
                 Domain",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "5",
  number =       "1",
  pages =        "149--??",
  month =        jan,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "0219-4678",
  bibdate =      "Wed Jan 12 05:16:34 MST 2005",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Pon:2005:MDS,
  author =       "Shun-Fu Pon and Erl-Huei Lu and Albert B. Jeng",
  title =        "{Meta-He} digital signatures based on factoring and
                 discrete logarithms",
  journal =      j-APPL-MATH-COMP,
  volume =       "165",
  number =       "1",
  pages =        "171--176",
  day =          "6",
  month =        jun,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:45 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Pon:2005:OPK,
  author =       "Shun-Fu Pon and Erl-Huei Lu and Albert B. Jeng",
  title =        "One private-key for all {DL}-based cryptosystems",
  journal =      j-APPL-MATH-COMP,
  volume =       "170",
  number =       "1",
  pages =        "666--672",
  day =          "1",
  month =        nov,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:50 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Potter:2005:QCS,
  author =       "Bruce Potter",
  title =        "Quantum crypto: Star trek or real science?",
  journal =      j-NETWORK-SECURITY,
  volume =       "2005",
  number =       "7",
  pages =        "4--5",
  month =        jul,
  year =         "2005",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(05)70257-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:16 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485805702579",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@InProceedings{Prabhakaran:2005:RES,
  author =       "Manoj Prabhakaran and Amit Sahai",
  title =        "Relaxing Environmental Security: Monitored
                 Functionalities and Client-Server Computation",
  crossref =     "Kilian:2005:TCS",
  pages =        "104--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@Article{Qian:2005:CLT,
  author =       "Haifeng Qian and ZhenFu Cao and Haiyong Bao",
  title =        "Cryptanalysis of {Li--Tzeng--Hwang}'s improved
                 signature schemes based on factoring and discrete
                 logarithms",
  journal =      j-APPL-MATH-COMP,
  volume =       "166",
  number =       "3",
  pages =        "501--505",
  day =          "26",
  month =        jul,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:46 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Qian:2005:SPL,
  author =       "Haifeng Qian and Zhenfu Cao and Haiyong Bao",
  title =        "Security of {Pon--Lu--Jeng}'s {Meta-He} digital
                 signature schemes",
  journal =      j-APPL-MATH-COMP,
  volume =       "170",
  number =       "1",
  pages =        "724--730",
  day =          "1",
  month =        nov,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:50 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Quisquater:2005:SCC,
  author =       "Micha{\"e}l Quisquater and Bart Preneel and Joos
                 Vandewalle",
  title =        "Spectral characterization of cryptographic {Boolean}
                 functions satisfying the (extended) propagation
                 criterion of degree $l$ and order $k$",
  journal =      j-INFO-PROC-LETT,
  volume =       "93",
  number =       "1",
  pages =        "25--28",
  day =          "16",
  month =        jan,
  year =         "2005",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 18:40:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@InProceedings{Regev:2005:LLE,
  author =       "Oded Regev",
  title =        "On lattices, learning with errors, random linear
                 codes, and cryptography",
  crossref =     "ACM:2005:SPA",
  pages =        "84--93",
  year =         "2005",
  bibdate =      "Wed Apr 5 05:59:22 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Renner:2005:UCP,
  author =       "Renato Renner and Robert K{\"o}nig",
  title =        "Universally Composable Privacy Amplification Against
                 Quantum Adversaries",
  crossref =     "Kilian:2005:TCS",
  pages =        "407--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@InProceedings{Ringenburg:2005:PFS,
  author =       "Michael F. Ringenburg and Dan Grossman",
  title =        "Preventing format-string attacks via automatic and
                 efficient dynamic checking",
  crossref =     "Meadows:2005:CPA",
  pages =        "354--363",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Rittinghouse:2005:IIM,
  author =       "John Rittinghouse and James Ransome",
  title =        "{IM Instant Messaging} Security",
  publisher =    pub-ELSEVIER,
  address =      pub-ELSEVIER:adr,
  pages =        "432 (est.)",
  year =         "2005",
  ISBN =         "1-55558-338-5",
  ISBN-13 =      "978-1-55558-338-5",
  LCCN =         "????",
  bibdate =      "Mon Oct 03 19:10:50 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://books.elsevier.com/us/mk/us/subindex.asp?isbn=1555583385",
  acknowledgement = ack-nhfb,
}

@Article{Rogers:2005:MPH,
  author =       "Brian Rogers and Yan Solihin and Milos Prvulovic",
  title =        "Memory predecryption: hiding the latency overhead of
                 memory encryption",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "33",
  number =       "1",
  pages =        "27--33",
  month =        mar,
  year =         "2005",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 09:40:37 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
  remark =       "Workshop on Architectural Support for Security and
                 Anti-Virus (WASSA)",
}

@Book{Rogers:2005:NSE,
  editor =       "Russ Rogers and Bryan Cunningham",
  title =        "Network security evaluation using the {NSA IEM}",
  publisher =    pub-SYNGRESS,
  address =      pub-SYNGRESS:adr,
  pages =        "xxvi + 437",
  year =         "2005",
  ISBN =         "1-59749-035-0",
  ISBN-13 =      "978-1-59749-035-1",
  LCCN =         "TK5105.59 .N33 2005",
  bibdate =      "Thu Oct 6 07:25:29 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  remark =       "Security Horizon. Network security evaluation using
                 the National Security Agency INFOSEC evaluation
                 methodology.",
  subject =      "Computer networks; Security measures; Evaluation,;
                 Computer security; Evaluation; Information resources
                 management; Evaluation",
}

@Book{Rothe:2005:CTC,
  author =       "J{\"o}rg Rothe",
  title =        "Complexity Theory and Cryptology: an Introduction to
                 Cryptocomplexity",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 478",
  year =         "2005",
  ISBN =         "3-540-22147-6, 3-540-28520-2 (e-book)",
  ISBN-13 =      "978-3-540-22147-0, 978-3-540-28520-5 (e-book)",
  LCCN =         "QA76.9.A25 R672 2005",
  bibdate =      "Fri Mar 23 10:26:29 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 jenson.stanford.edu:2210/unicorn",
  series =       "Texts in theoretical computer science: an EATCS
                 series",
  URL =          "http://www.myilibrary.com?id=133022;
                 http://www.springerlink.com/openurl.asp?genre=book\%26isbn=978-3-540-22147-0",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Cryptography; Computational
                 complexity",
  tableofcontents = "Introduction to cryptocomplexity \\
                 Foundations of computer science and mathematics \\
                 Foundations of complexity theory \\
                 Foundations of cryptology \\
                 Hierarchies based on NP \\
                 Randomized algorithms and complexity classes \\
                 RSA cryptosystem, primality, and factoring \\
                 Other public-key cryptosystems and protocols",
}

@InProceedings{Rubin:2005:ARS,
  author =       "Shai Rubin and Mihai Christodorescu and Vinod
                 Ganapathy and Jonathon T. Giffin and Louis Kruger and
                 Hao Wang and Nicholas Kidd",
  title =        "An auctioning reputation system based on anomaly",
  crossref =     "Meadows:2005:CPA",
  pages =        "270--279",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ryabko:2005:NTA,
  author =       "B. Y. Ryabko and V. A. Monarev and Y. I. Shokin",
  title =        "A New Type of Attack on Block Ciphers",
  journal =      j-PROBL-INF-TRANSM,
  volume =       "41",
  number =       "4",
  pages =        "385--394",
  month =        "????",
  year =         "2005",
  CODEN =        "PRITA9",
  ISSN =         "0032-9460 (print), 1608-3253 (electronic)",
  ISSN-L =       "0032-9460",
  bibdate =      "Fri Mar 09 12:26:31 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Problems of Information Transmission",
}

@Article{Sale:2005:RCB,
  author =       "Anthony E. Sale",
  title =        "The Rebuilding of {Colossus} at {Bletchley Park}",
  journal =      j-IEEE-ANN-HIST-COMPUT,
  volume =       "27",
  number =       "3",
  pages =        "61--69",
  month =        jul # "\slash " # sep,
  year =         "2005",
  CODEN =        "IAHCEX",
  DOI =          "https://doi.org/10.1109/MAHC.2005.47",
  ISSN =         "1058-6180 (print), 1934-1547 (electronic)",
  ISSN-L =       "1058-6180",
  bibdate =      "Mon Nov 7 18:51:49 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=85",
}

@Article{Sallee:2005:MBM,
  author =       "Phil Sallee",
  title =        "Model-Based Methods for Steganography and
                 Steganalysis",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "5",
  number =       "1",
  pages =        "167--??",
  month =        jan,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "0219-4678",
  bibdate =      "Wed Jan 12 05:16:34 MST 2005",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Book{Salomon:2005:CDC,
  author =       "David Salomon",
  title =        "Coding for data and computer communications",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xv + 548",
  year =         "2005",
  ISBN =         "0-387-21245-0",
  ISBN-13 =      "978-0-387-21245-6",
  LCCN =         "TK5102.94 .S35 2005",
  bibdate =      "Mon Apr 25 16:20:33 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.DavidSalomon.name/Codes/Codes.html;
                 http://www.ecs.csun.edu/~dsalomon/",
  acknowledgement = ack-nhfb,
  subject =      "Telecommunication systems; Coding theory;
                 Cryptography",
  tableofcontents = "Preface vii \\
                 \\
                 Part I: Channel Coding 1 \\
                 \\
                 1 Error-Control Codes 3 \\
                 2 Check Digits for Error Detection 35 \\
                 \\
                 Part II: Source Codes 59 \\
                 \\
                 3 Statistical Methods 67 \\
                 4 Dictionary Methods 111 \\
                 5 Image Compression 133 \\
                 \\
                 Part III: Secure Codes 197 \\
                 \\
                 6 Basic Concepts 199 \\
                 7 Monoalphabetic Substitution Ciphers 213 \\
                 8 Transposition Ciphers 227 \\
                 9 Polyalphabetic Substitution Ciphers 243 \\
                 10 Stream Ciphers 269 \\
                 11 Block Ciphers 289 \\
                 12 Public-Key Cryptography 311 \\
                 13 Data Hiding 341 \\
                 14 Data Hiding in Images 365 \\
                 15 Data Hiding: Other Methods 417 \\
                 \\
                 Part IV: Essential Resources 445 \\
                 \\
                 Appendixes \\
                 \\
                 A Symmetry Groups 447 \\
                 B Galois Fields 451 \\
                 B.1 Field Definitions and Operations 451 \\
                 B.2 Polynomial Arithmetic 459 \\
                 C Cyclic Redundancy Codes 461 \\
                 D Projects 465 \\
                 \\
                 Answers to Exercises 471 \\
                 \\
                 Glossary 503 \\
                 \\
                 Bibliography 523 \\
                 \\
                 Index 533",
}

@Book{Salomon:2005:FCS,
  author =       "David Salomon",
  title =        "Foundations of computer security",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xxi + 368",
  year =         "2005",
  ISBN =         "1-84628-193-8, 1-84628-341-8",
  ISBN-13 =      "978-1-84628-193-8, 978-1-84628-341-3",
  LCCN =         "QA76.9.A25 S2656 2005",
  bibdate =      "Sat Jan 7 09:42:09 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.springer.com/sgw/cda/frontpage/0,11855,4-40007-22-65173048-0,00.html;
                 http://www.springer.com/sgw/cda/pageitems/document/cda_downloaddocument/0,11855,0-0-45-166687-p65173048,00.pdf;
                 http://www.springer.com/sgw/cda/pageitems/document/cda_downloaddocument/0,11855,0-0-45-166688-p65173048,00.pdf;
                 http://www.springer.com/sgw/cda/pageitems/document/cda_downloaddocument/0,11855,0-0-45-166689-p65173048,00.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "authentication; computer security; cryptography;
                 encryption; firewalls; identity theft; malware;
                 physical security; spyware; trojan horses; viruses;
                 worms",
  publishersummary = "Anyone with a computer has heard of viruses, had
                 to deal with several, and has been struggling with
                 spam, spyware, and disk crashes. This book is intended
                 as a starting point for those familiar with basic
                 concepts of computers and computations and who would
                 like to extend their knowledge into the realm of
                 computer and network security. Its comprehensive
                 treatment of all the major areas of computer security
                 aims to give readers a complete foundation in the field
                 of Computer Security. Exercises are given throughout
                 the book and are intended to strengthening the reader?s
                 knowledge - answers are also provided.\par

                 Written in a clear, easy to understand style, aimed
                 towards advanced undergraduates and non-experts who
                 want to know about the security problems confronting
                 them everyday. The technical level of the book is low
                 and requires no mathematics, and only a basic concept
                 of computers and computations. Foundations of Computer
                 Security will be an invaluable tool for students and
                 professionals alike.",
}

@Article{Santini:2005:WSI,
  author =       "Simone Santini",
  title =        "We Are Sorry to Inform You \ldots{}",
  journal =      j-COMPUTER,
  volume =       "38",
  number =       "12",
  pages =        "128, 126--127",
  month =        dec,
  year =         "2005",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2005.423",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Jul 4 17:16:19 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/s/shannon-claude-elwood.bib;
                 https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/computer2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/computer",
  remark =       "With a byline of `How much damage could be caused by a
                 peer reviewer having a bad day?', this article is an
                 amusing collection of spoofed referee reports that
                 might have been written to reject some of the most
                 famous papers in computer science: E. W. Dijkstra,
                 \booktitle{Goto Statement Considered Harmful}; E. F.
                 Codd, \booktitle{A Relational Model of Data for Large
                 Shared Data Banks}; A. Turing, \booktitle{On Computable
                 Numbers, with an Application to the
                 Entscheidungsproblem}; C. E. Shannon, \booktitle{A
                 Mathematical Theory of Communication}; C. A. R. Hoare,
                 \booktitle{An Axiomatic Basis for Computer
                 Programming}; R. L. Rivest, A. Shamir, and L. Adelman,
                 \booktitle{A Method for Obtaining Digital Signatures
                 and Public-Key Cryptosystems}.",
}

@Article{Savage:2005:IPWa,
  author =       "P. R. Savage",
  title =        "Invention: Patent Watch",
  journal =      j-IEEE-SPECTRUM,
  volume =       "42",
  number =       "1",
  pages =        "70--71",
  month =        jan,
  year =         "2005",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2005.1377882",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Computer displays; Computer science; Cryptography;
                 Design engineering; Humans; Laser theory; Physics;
                 Power engineering and energy; Resource management;
                 Watches",
}

@Article{Savage:2005:IPWb,
  author =       "P. R. Savage",
  title =        "Inventions: Patent Watch",
  journal =      j-IEEE-SPECTRUM,
  volume =       "42",
  number =       "3",
  pages =        "64--64",
  month =        mar,
  year =         "2005",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2005.1402723",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Cryptography; Electronic mail; Patents; Radiofrequency
                 identification; RFID tags; Technological innovation;
                 TV; Watches; Wireless networks",
}

@Article{Schielzeth:2005:RQN,
  author =       "Daniel Schielzeth and Michael E. Pohst",
  title =        "On Real Quadratic Number Fields Suitable for
                 Cryptography",
  journal =      j-EXP-MATH,
  volume =       "14",
  number =       "2",
  pages =        "189--197",
  month =        "????",
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1080/10586458.2005.10128914",
  ISSN =         "1058-6458 (print), 1944-950X (electronic)",
  ISSN-L =       "1058-6458",
  bibdate =      "Mon Mar 5 15:33:58 MST 2012",
  bibsource =    "http://projecteuclid.org/euclid.em;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/expmath.bib;
                 http://www.tandfonline.com/toc/uexm20/14/2",
  URL =          "http://projecteuclid.org/euclid.em/1128100131",
  acknowledgement = ack-nhfb,
  fjournal =     "Experimental Mathematics",
  journal-URL =  "http://www.tandfonline.com/loi/uexm20",
  onlinedate =   "30 Jan 2011",
}

@Article{Schneier:2005:AE,
  author =       "B. Schneier",
  title =        "Authentication and Expiration",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "1",
  pages =        "88--88",
  month =        jan # "/" # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.4",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392710.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392710&count=17&index=16",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Schneier:2005:TFA,
  author =       "Bruce Schneier",
  title =        "Two-factor authentication: too little, too late",
  journal =      j-CACM,
  volume =       "48",
  number =       "4",
  pages =        "136--136",
  month =        apr,
  year =         "2005",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Mar 24 16:07:27 MST 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Book{Seacord:2005:SCC,
  author =       "Robert C. Seacord",
  title =        "Secure coding in {C} and {C++}",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xxiv + 341",
  year =         "2005",
  ISBN =         "0-321-33572-4 (paperback)",
  ISBN-13 =      "978-0-321-33572-2 (paperback)",
  LCCN =         "QA76.9.A25 S368 2005",
  bibdate =      "Thu Aug 31 10:52:01 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.cert.org/books/secure-coding/;
                 http://www.loc.gov/catdir/toc/ecip0513/2005015012.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; C (Computer program language); C++
                 (Computer program language)",
  tableofcontents = "Contents \\
                 Preface ix \\
                 1 Running with Scissors 1 \\
                 1.1 Gauging the Threat 4 \\
                 1.2 Security Concepts 9 \\
                 1.3 C and C++ 14 \\
                 1.4 Development Platforms 17 \\
                 1.5 Summary 21 \\
                 1.6 For Further Reading 21 \\
                 2 Strings 23 \\
                 2.1 String Characteristics 23 \\
                 2.2 Common String Manipulation Errors 24 \\
                 2.3 String Vulnerabilities 30 \\
                 2.4 Process Memory Organization 33 \\
                 2.5 Stack Smashing 37 \\
                 2.6 Code Injection 42 \\
                 2.7 Arc Injection 45 \\
                 2.8 Mitigation Strategies 48 \\
                 2.9 Notable Vulnerabilities 66 \\
                 2.10 Summary 68 \\
                 2.11 For Further Reading 70 \\
                 3 Pointer Subterfuge 71 \\
                 3.1 Data Locations 72 \\
                 3.2 Function Pointers 73 \\
                 3.3 Data Pointers 74 \\
                 3.4 Modifying the Instruction Pointer 75 \\
                 3.5 Global Offset Table 76 \\
                 3.6 The .dtors Section 78 \\
                 3.7 Virtual Pointers 80 \\
                 3.8 The atexit() and on_exit() Functions 82 \\
                 3.9 The longjmp() Function 84 \\
                 3.10 Exception Handling 85 \\
                 3.11 Mitigation Strategies 89 \\
                 3.12 Summary 89 \\
                 3.13 For Further Reading 90 \\
                 4 Dynamic Memory Management 91 \\
                 4.1 Dynamic Memory Management 92 \\
                 4.2 Common Dynamic Memory Management Errors 94 \\
                 4.3 Doug Lea's Memory Allocator 100 \\
                 4.4 RtlHeap 113 \\
                 4.5 Mitigation Strategies 129 \\
                 4.6 Notable Vulnerabilities 138 \\
                 4.7 Summary 140 \\
                 4.8 For Further Reading 141 \\
                 5 Integer Security 143 \\
                 5.1 Integers 144 \\
                 5.2 Integer Conversions 151 \\
                 5.3 Integer Error Conditions 156 \\
                 5.4 Integer Operations 159 \\
                 5.5 Vulnerabilities 172 \\
                 5.6 Non-Exceptional Integer Logic Errors 177 \\
                 5.7 Mitigation Strategies 178 \\
                 5.8 Notable Vulnerabilities 187 \\
                 5.9 Summary 190 \\
                 5.10 For Further Reading 191 \\
                 6 Formatted Output 193 \\
                 6.1 Variadic Functions 194 \\
                 6.2 Formatted Output Functions 198 \\
                 6.3 Exploiting Formatted Output Functions 203 \\
                 6.4 Stack Randomization 214 \\
                 6.5 Mitigation Strategies 220 \\
                 6.6 Notable Vulnerabilities 230 \\
                 6.7 Summary 231 \\
                 6.8 For Further Reading 233 \\
                 7 File I/O 235 \\
                 7.1 Concurrency 235 \\
                 7.2 Time of Check, Time of Use 238 \\
                 7.3 Files as Locks and File Locking 240 \\
                 7.4 File System Exploits 242 \\
                 7.5 Mitigation Strategies 249 \\
                 7.6 Summary 259 \\
                 8 Recommended Practices 261 \\
                 8.1 Secure Software Development Principles 263 \\
                 8.2 Systems Quality Requirements Engineering 267 \\
                 8.3 Threat Modeling 269 \\
                 8.4 Use/Misuse Cases 270 \\
                 8.5 Architecture and Design 271 \\
                 8.6 Off-the-Shelf Software 273 \\
                 8.7 Compiler Checks 275 \\
                 8.8 Input Validation 275 \\
                 8.9 Data Sanitization 277 \\
                 8.10 Static Analysis 280 \\
                 8.11 Quality Assurance 283 \\
                 8.12 Memory Permissions 286 \\
                 8.13 Defense in Depth 288 \\
                 8.14 TSP-Secure 289 \\
                 8.15 Summary 292 \\
                 8.16 Further Reading 292",
}

@Book{Sebag-Montefiore:2005:EBC,
  author =       "Hugh Sebag-Montefiore",
  title =        "{Enigma}: the battle for the code",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "352 + 16",
  year =         "2005",
  ISBN =         "0-471-49035-0",
  ISBN-13 =      "978-0-471-49035-7",
  LCCN =         "????",
  bibdate =      "Tue Sep 4 05:57:38 MDT 2012",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939--1945; Electronic intelligence; Great
                 Britain; Cryptography; Secret service",
}

@InProceedings{Seifert:2005:ACR,
  author =       "Jean-Pierre Seifert",
  title =        "On authenticated computing and {RSA}-based
                 authentication",
  crossref =     "Meadows:2005:CPA",
  pages =        "122--127",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Shao:2005:CXY,
  author =       "Zuhua Shao",
  title =        "Cryptanalysis of {Xia--You} group signature scheme",
  journal =      j-J-SYST-SOFTW,
  volume =       "75",
  number =       "1--2",
  pages =        "89--94",
  day =          "15",
  month =        feb,
  year =         "2005",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed May 18 10:27:27 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Shao:2005:IEP,
  author =       "Zuhua Shao",
  title =        "Improvement of efficient proxy signature schemes using
                 self-certified public keys",
  journal =      j-APPL-MATH-COMP,
  volume =       "168",
  number =       "1",
  pages =        "222--234",
  day =          "1",
  month =        sep,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:48 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Shao:2005:NEV,
  author =       "Jun Shao and Zhenfu Cao",
  title =        "A new efficient $ (t n) $ verifiable multi-secret
                 sharing {(VMSS)} based on {YCH} scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "168",
  number =       "1",
  pages =        "135--140",
  day =          "1",
  month =        sep,
  year =         "2005",
  CODEN =        "AMHCBQ",
  DOI =          "https://doi.org/10.1016/j.amc.2004.08.023",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:48 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/applmathcomput2005.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0096300304005922",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Shao:2005:NKA,
  author =       "Zuhua Shao",
  title =        "A new key authentication scheme for cryptosystems
                 based on discrete logarithms",
  journal =      j-APPL-MATH-COMP,
  volume =       "167",
  number =       "1",
  pages =        "143--152",
  day =          "5",
  month =        aug,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:47 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Shao:2005:SMD,
  author =       "Zuhua Shao",
  title =        "Security of {Meta-He} digital signature scheme based
                 on factoring and discrete logarithms",
  journal =      j-APPL-MATH-COMP,
  volume =       "170",
  number =       "2",
  pages =        "976--984",
  day =          "15",
  month =        nov,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:50 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Shehab:2005:SCM,
  author =       "Mohamed Shehab and Elisa Bertino and Arif Ghafoor",
  title =        "Secure collaboration in mediator-free environments",
  crossref =     "Meadows:2005:CPA",
  pages =        "58--67",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Shen:2005:NCB,
  author =       "Victor R. L. Shen and Tzer-Shyong Chen and Kai-Quan
                 Shai",
  title =        "A novel cryptosystem based on grey system theory and
                 genetic algorithm",
  journal =      j-APPL-MATH-COMP,
  volume =       "170",
  number =       "2",
  pages =        "1290--1302",
  day =          "15",
  month =        nov,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:50 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Shen:2005:NIW,
  author =       "Rui-min Shen and Yong-gang Fu and Hong-tao Lu",
  title =        "A novel image watermarking scheme based on support
                 vector regression",
  journal =      j-J-SYST-SOFTW,
  volume =       "78",
  number =       "1",
  pages =        "1--8",
  month =        oct,
  year =         "2005",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:01 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@InProceedings{Sherwood:2005:MTR,
  author =       "Rob Sherwood and Bobby Bhattacharjee and Ryan Braud",
  title =        "Misbehaving {TCP} receivers can cause {Internet}-wide
                 congestion collapse",
  crossref =     "Meadows:2005:CPA",
  pages =        "383--392",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Shi:2005:HEC,
  author =       "Weidong Shi and Hsien-Hsin S. Lee and Mrinmoy Ghosh
                 and Chenghuai Lu and Alexandra Boldyreva",
  title =        "High Efficiency Counter Mode Security Architecture via
                 Prediction and Precomputation",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "33",
  number =       "2",
  pages =        "14--24",
  month =        may,
  year =         "2005",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 09:40:51 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Shim:2005:LPG,
  author =       "Kyungah Shim",
  title =        "Off-line password-guessing attacks on the generalized
                 key agreement and password authentication protocol",
  journal =      j-APPL-MATH-COMP,
  volume =       "169",
  number =       "1",
  pages =        "511--515",
  day =          "1",
  month =        oct,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:49 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Shim:2005:SFA,
  author =       "Kyungah Shim and Young-Ran Lee",
  title =        "Security flaws in authentication and key establishment
                 protocols for mobile communications",
  journal =      j-APPL-MATH-COMP,
  volume =       "169",
  number =       "1",
  pages =        "62--74",
  day =          "1",
  month =        oct,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:49 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Shim:2005:WIB,
  author =       "Kyungah Shim and Sungsik Woo",
  title =        "Weakness in {ID}-based one round authenticated
                 tripartite multiple-key agreement protocol with
                 pairings",
  journal =      j-APPL-MATH-COMP,
  volume =       "166",
  number =       "3",
  pages =        "523--530",
  day =          "26",
  month =        jul,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:46 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Shirase:2005:AEC,
  author =       "Masaaki Shirase and Yasushi Hibino",
  title =        "An architecture for elliptic curve cryptography
                 computation",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "33",
  number =       "1",
  pages =        "124--133",
  month =        mar,
  year =         "2005",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 09:40:37 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Book{Shoup:2005:CIN,
  author =       "Victor Shoup",
  title =        "A computational introduction to number theory and
                 algebra",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "xvi + 517",
  year =         "2005",
  ISBN =         "0-521-85154-8 (hardcover), 0-521-61725-1 (paperback)",
  ISBN-13 =      "978-0-521-85154-1 (hardcover), 978-0-521-61725-3
                 (paperback)",
  LCCN =         "QA241 .V53 2005",
  bibdate =      "Mon Sep 19 08:51:00 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  subject =      "computer science; mathematics; number theory;
                 cryptography; error-correcting codes",
}

@InProceedings{Shparlinski:2005:PHS,
  author =       "Igor E. Shparlinski",
  title =        "Playing ``hide-and-seek'' with numbers: the hidden
                 number problem, lattices, and exponential sums",
  crossref =     "Garrett:2005:PKC",
  pages =        "153--177",
  year =         "2005",
  MRclass =      "11T23 (11H71 11T71 68P25 94A60)",
  MRnumber =     "2211876 (2007c:11142)",
  MRreviewer =   "Igor Wigman",
  bibdate =      "Fri Sep 17 09:12:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Silverman:2005:ECC,
  author =       "Joseph H. Silverman",
  title =        "Elliptic curves and cryptography",
  crossref =     "Garrett:2005:PKC",
  pages =        "91--112",
  year =         "2005",
  MRclass =      "14G50 (94A60)",
  MRnumber =     "2211873 (2006m:14034)",
  MRreviewer =   "Annegret Weng",
  bibdate =      "Fri Sep 17 09:12:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Six:2005:HGS,
  author =       "J. M. Six",
  title =        "Hidden gems [science and technology museums]",
  journal =      j-IEEE-SPECTRUM,
  volume =       "42",
  number =       "1",
  pages =        "70--71",
  month =        jan,
  year =         "2005",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2005.1377881",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Computer displays; Computer science; Cryptography;
                 Design engineering; Engineering management;
                 exhibitions; history; Humans; IEEE Spectrum; Laser
                 theory; Physics; Power engineering and energy; Resource
                 management; reviews; science and technology museums",
}

@Article{Sklavos:2005:ISH,
  author =       "N. Sklavos and O. Koufopavlou",
  title =        "Implementation of the {SHA-2} Hash Family Standard
                 Using {FPGAs}",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "31",
  number =       "3",
  pages =        "227--248",
  month =        mar,
  year =         "2005",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-005-0086-5",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Wed Jul 6 10:36:20 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=31&issue=3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0920-8542&volume=31&issue=3&spage=227",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@InProceedings{Song:2005:ISG,
  author =       "Lin Song and Biao Wang and Dequan He",
  title =        "An Improved Scheme for Group Signature",
  crossref =     "Han:2005:PJI",
  pages =        "96--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Srivatsa:2005:SPS,
  author =       "Mudhakar Srivatsa and Ling Liu",
  title =        "Securing publish-subscribe overlay services with
                 {EventGuard}",
  crossref =     "Meadows:2005:CPA",
  pages =        "289--298",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Stanik:2005:NLO,
  author =       "John Stanik",
  title =        "News 2.0: Losing our Edge? The Real Cost of {Linux};
                 Say No to Crackberries",
  journal =      j-QUEUE,
  volume =       "3",
  number =       "5",
  pages =        "14--14",
  month =        jun,
  year =         "2005",
  CODEN =        "AQCUAE",
  ISSN =         "1542-7730 (print), 1542-7749 (electronic)",
  ISSN-L =       "1542-7730",
  bibdate =      "Mon Aug 1 06:01:27 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Queue: Tomorrow's Computing Today",
}

@InProceedings{Stavrou:2005:CAS,
  author =       "Angelos Stavrou and Angelos D. Keromytis",
  title =        "Countering {DoS} attacks with stateless multipath
                 overlays",
  crossref =     "Meadows:2005:CPA",
  pages =        "249--259",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Steele:2005:PPT,
  author =       "Corey Steele",
  title =        "Paranoid penguin: Two-factor authentication",
  journal =      j-LINUX-J,
  volume =       "2005",
  number =       "139",
  pages =        "10--10",
  month =        nov,
  year =         "2005",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Sat Dec 24 17:46:12 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@TechReport{Steil:2005:MMM,
  author =       "Michael Steil",
  title =        "17 Mistakes {Microsoft} Made in the {Xbox} Security
                 System",
  type =         "Report",
  institution =  "Xbox Linux Project",
  pages =        "13",
  month =        dec,
  year =         "2005",
  bibdate =      "Fri Jan 31 08:12:04 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "http://events.ccc.de/congress/2005/fahrplan/attachments/591-paper_xbox.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "Microsoft; Northbridge; RC4; RC5; Southbridge; TEA;
                 virtual machine; Xbox gaming console; Xbox Linux
                 Project",
}

@Article{Stephanides:2005:GAK,
  author =       "George Stephanides and Nicolae Constantinescu",
  title =        "The {GN}-authenticated key agreement",
  journal =      j-APPL-MATH-COMP,
  volume =       "170",
  number =       "1",
  pages =        "531--544",
  day =          "1",
  month =        nov,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:50 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Stern:2005:MLF,
  author =       "Richard H. Stern",
  title =        "Micro Law: {FTC} cracks down on spyware and {PC}
                 hijacking, but not true lies",
  journal =      j-IEEE-MICRO,
  volume =       "25",
  number =       "1",
  pages =        "6--7, 100--101",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "IEMIDZ",
  DOI =          "https://doi.org/10.1109/MM.2005.11",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Wed Apr 20 08:11:28 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/dl/mags/mi/2005/01/m1006.htm;
                 http://csdl.computer.org/dl/mags/mi/2005/01/m1006.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Micro",
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
}

@Article{Stevenson:2005:SCI,
  author =       "Daniel E. Stevenson and Michael R. Wick and Steven J.
                 Ratering",
  title =        "Steganography and cartography: interesting assignments
                 that reinforce machine representation, bit
                 manipulation, and discrete structures concepts",
  journal =      j-SIGCSE,
  volume =       "37",
  number =       "1",
  pages =        "277--281",
  month =        mar,
  year =         "2005",
  CODEN =        "SIGSD3",
  DOI =          "https://doi.org/10.1145/1047124.1047443",
  ISSN =         "0097-8418 (print), 2331-3927 (electronic)",
  ISSN-L =       "0097-8418",
  bibdate =      "Sat Nov 17 16:57:13 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigcse2000.bib",
  abstract =     "Today's generation of students crave assignments that
                 are relevant to their world, both in terms of graphical
                 interfaces and, more importantly, the application area.
                 To be fully engaged they must find the application of
                 importance. However, we have found that many
                 assignments in computer science attempt to engage the
                 students by moving further and further away from the
                 underlying machine representations. This causes a
                 disconnect between the applications our students write
                 and the material we present on machine representations
                 and architecture. We present examples of assignments
                 based from the fields of Steganography and Cartography
                 that we have found to be valuable in helping to
                 reinforce the importance of machine representations
                 with today's students. We found that the students were
                 excited and intrigued to see how their discipline could
                 play a vital role in the war on terrorism and how what
                 they were learning in their CS 1 course was directly
                 relevant to what they heard on the nightly news and
                 experience on a daily basis via the Internet.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIGCSE Bulletin (ACM Special Interest Group on
                 Computer Science Education)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J688",
}

@InProceedings{Stoklosa:2005:CIC,
  author =       "Janusz Stoklosa and Jaroslaw Bubicz",
  editor =       "Hamid R. Arabnia and Liwen He and Youngsong Mun",
  booktitle =    "{Proceedings of the 2005 International Conference on
                 Security and Management, SAM '05: Las Vegas, Nevada,
                 USA, June 20-23, 2005}",
  title =        "Compound inversive congruential generator as a source
                 of keys for stream ciphers",
  publisher =    "CSREA Press",
  address =      "Las Vegas, NV, USA",
  bookpages =    "528",
  pages =        "473--478",
  year =         "2005",
  ISBN =         "1-932415-82-3",
  ISBN-13 =      "978-1-932415-82-7",
  LCCN =         "TK5105.59 .I57 2005",
  bibdate =      "Mon Mar 5 22:02:35 2012",
  bibsource =    "DBLP;
                 http://dblp.uni-trier.de/db/conf/csreaSAM/csreaSAM2005.html#StoklosaB05;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
}

@Article{Stuck:2005:HVC,
  author =       "B. Stuck and M. Weingarten",
  title =        "How venture capital thwarts innovation",
  journal =      j-IEEE-SPECTRUM,
  volume =       "42",
  number =       "4",
  pages =        "50--55",
  month =        apr,
  year =         "2005",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2005.1413731",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Cryptography; e-commerce business models; Explosions;
                 innovation management; Internet; Investments; Lucent
                 Technologies Inc.; Microcomputers; organizational
                 structures; Research and development; Search engines;
                 Silicon; Surface acoustic waves; Technological
                 innovation; VC-funded start-ups; venture capital;
                 Venture capital",
}

@Article{Su:2005:IBT,
  author =       "Pin-Chang Su and Henry Ker-Chang Chang and Erl-Huei
                 Lu",
  title =        "{ID}-based threshold digital signature schemes on the
                 elliptic curve discrete logarithm problem",
  journal =      j-APPL-MATH-COMP,
  volume =       "164",
  number =       "3",
  pages =        "757--772",
  day =          "25",
  month =        may,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:45 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Su:2005:KPK,
  author =       "Pin-Chang Su and Erl-Huei Lu and Henry Ker-Chang
                 Chang",
  title =        "A knapsack public-key cryptosystem based on elliptic
                 curve discrete logarithm",
  journal =      j-APPL-MATH-COMP,
  volume =       "168",
  number =       "1",
  pages =        "40--46",
  day =          "1",
  month =        sep,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:48 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Sucurovic:2005:JCX,
  author =       "S. Sucurovic and Z. Jovanovic",
  title =        "{Java} Cryptography \& {X.509} Authentication",
  journal =      j-DDJ,
  volume =       "30",
  number =       "2",
  pages =        "40--42",
  year =         "2005",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Mar 24 17:43:34 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 Ingenta database",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Sullivan:2005:CFI,
  author =       "Roger K. Sullivan",
  title =        "The case for federated identity",
  journal =      j-NETWORK-SECURITY,
  volume =       "2005",
  number =       "9",
  pages =        "15--19",
  month =        sep,
  year =         "2005",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(05)70283-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:18 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348580570283X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Sun:2005:CCL,
  author =       "Da-Zhi Sun and Zhen-Fu Cao and Yu Sun",
  title =        "Comment: cryptanalysis of {Lee--Hwang--Li}'s key
                 authentication scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "164",
  number =       "3",
  pages =        "675--678",
  day =          "25",
  month =        may,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:45 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  note =         "See \cite{Zhang:2005:CLH}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Sun:2005:CSS,
  author =       "Qibin Sun and Shuiming Ye and Ching-Yung Lin and
                 Shih-Fu Chang",
  title =        "A Crypto Signature Scheme for Image Authentication
                 over Wireless Channel",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "5",
  number =       "1",
  pages =        "135--??",
  month =        jan,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "0219-4678",
  bibdate =      "Wed Jan 12 05:16:34 MST 2005",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Sun:2005:IPK,
  author =       "Da-Zhi Sun and Zhen-Fu Cao",
  title =        "Improved public key authentication scheme for
                 non-repudiation",
  journal =      j-APPL-MATH-COMP,
  volume =       "168",
  number =       "2",
  pages =        "927--932",
  day =          "15",
  month =        sep,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:48 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Sun:2005:RNK,
  author =       "Da-Zhi Sun and Zhen-Fu Cao and Yu Sun",
  title =        "Remarks on a new key authentication scheme based on
                 discrete logarithms",
  journal =      j-APPL-MATH-COMP,
  volume =       "167",
  number =       "1",
  pages =        "572--575",
  day =          "5",
  month =        aug,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:47 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Sun:2005:SSP,
  author =       "Hung-Min Sun and Bin-Tsan Hsieh and Shin-Mu Tseng",
  title =        "On the security of some proxy blind signature
                 schemes",
  journal =      j-J-SYST-SOFTW,
  volume =       "74",
  number =       "3",
  pages =        "297--302",
  day =          "1",
  month =        feb,
  year =         "2005",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed May 18 10:27:26 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Sun:2005:UMS,
  author =       "Qibin Sun",
  title =        "Understanding Multimedia Security",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "12",
  number =       "4",
  pages =        "88--89",
  month =        oct # "\slash " # dec,
  year =         "2005",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/MMUL.2005.85",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Thu Nov 10 07:41:20 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/comp/mags/mu/2005/04/u4088.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE MultiMedia",
}

@Article{Sun:2005:WIW,
  author =       "Da-Zhi Sun and Ji-Dong Zhong and Yu Sun",
  title =        "Weakness and improvement on {Wang--Li--Tie}'s
                 user-friendly remote authentication scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "170",
  number =       "2",
  pages =        "1185--1193",
  day =          "15",
  month =        nov,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:50 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Swire:2005:SMI,
  author =       "Peter P. Swire",
  title =        "Security market: incentives for disclosure of
                 vulnerabilities",
  crossref =     "Meadows:2005:CPA",
  pages =        "405--405",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Tattersall:2005:ENT,
  author =       "James J. (James Joseph) Tattersall",
  title =        "Elementary number theory in nine chapters",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  edition =      "Second",
  pages =        "xi + 430",
  year =         "2005",
  ISBN =         "0-521-85014-2 (hardcover), 0-521-61524-0 (paperback),
                 0-511-75634-8 (e-book)",
  ISBN-13 =      "978-0-521-85014-8 (hardcover), 978-0-521-61524-2
                 (paperback), 978-0-511-75634-4 (e-book)",
  LCCN =         "????",
  bibdate =      "Tue Sep 20 18:43:26 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 library.ox.ac.uk:210/ADVANCE",
  acknowledgement = ack-nhfb,
  remark =       "Previous edition 1999.",
  subject =      "Number theory",
  tableofcontents = "Frontmatter: i--v \\
                 Contents: vi--viii \\
                 Preface: ix--xii \\
                 1: The intriguing natural numbers: 1--54 \\
                 2: Divisibility: 55--86 \\
                 3: Prime numbers: 87--135 \\
                 4: Perfect and amicable numbers: 136--160 \\
                 5: Modular arithmetic: 161--195 \\
                 6: Congruences of higher degree: 196--225 \\
                 7: Cryptology: 226--257 \\
                 8: Representations: 258--303 \\
                 9: Partitions: 304--325 \\
                 Tables: 326--335 \\
                 Answers to selected exercises: 336--410 \\
                 Bibliography: 411--420 \\
                 Index: 421--430",
}

@InProceedings{Tian:2005:NDF,
  author =       "Junfeng Tian and Weidong Zhao and Ruizhong Du and Zhe
                 Zhang",
  title =        "A New Data Fusion Model of Intrusion
                 Detection---{IDSFM}",
  crossref =     "Han:2005:PJI",
  pages =        "73--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Tian:2005:RWS,
  author =       "Junfeng Tian and Guofu Ma and Shengfu Ma and Yahui
                 Meng",
  title =        "Research on {Web} Server Attacking-Based Intrusion
                 Detection",
  crossref =     "Han:2005:PJI",
  pages =        "159--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Trappe:2005:ICC,
  author =       "Wade Trappe and Lawrence C. Washington",
  title =        "Introduction to cryptography: with coding theory",
  publisher =    pub-PPH,
  address =      pub-PPH:adr,
  edition =      "Second",
  pages =        "xiv + 577",
  year =         "2005",
  ISBN =         "0-13-186239-1",
  ISBN-13 =      "978-0-13-186239-5",
  LCCN =         "QA268 .T73 2005",
  bibdate =      "Mon Jul 14 11:45:40 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.bibsys.no:2100/BIBSYS;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Coding theory; Cryptography",
}

@Article{Tsai:2005:CAE,
  author =       "Chwei-Shyong Tsai and Shu-Chen Lin and Min-Shiang
                 Hwang",
  title =        "Cryptanalysis of an authenticated encryption scheme
                 using self-certified public keys",
  journal =      j-APPL-MATH-COMP,
  volume =       "166",
  number =       "1",
  pages =        "118--122",
  day =          "6",
  month =        jul,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:46 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Tsaur:2005:EAS,
  author =       "Woei-Jiunn Tsaur and Chih-Ho Chou",
  title =        "Efficient algorithms for speeding up the computations
                 of elliptic curve cryptosystems",
  journal =      j-APPL-MATH-COMP,
  volume =       "168",
  number =       "2",
  pages =        "1045--1064",
  day =          "15",
  month =        sep,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:48 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Tsaur:2005:EUA,
  author =       "Woei-Jiunn Tsaur and Chia-Chun Wu and Wei-Bin Lee",
  title =        "An enhanced user authentication scheme for
                 multi-server {Internet} services",
  journal =      j-APPL-MATH-COMP,
  volume =       "170",
  number =       "1",
  pages =        "258--266",
  day =          "1",
  month =        nov,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:50 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Tsaur:2005:SSS,
  author =       "Woei-Jiunn Tsaur",
  title =        "Several security schemes constructed using {ECC}-based
                 self-certified public key cryptosystems",
  journal =      j-APPL-MATH-COMP,
  volume =       "168",
  number =       "1",
  pages =        "447--464",
  day =          "1",
  month =        sep,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:48 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Book{Tynan:2005:CPA,
  author =       "Dan Tynan",
  title =        "Computer privacy annoyances: how to avoid the most
                 annoying invasions of your personal and online
                 privacy",
  publisher =    pub-ORA-MEDIA,
  address =      pub-ORA-MEDIA:adr,
  pages =        "xii + 177",
  year =         "2005",
  ISBN =         "0-596-00775-2 (paperback)",
  ISBN-13 =      "978-0-596-00775-1 (paperback)",
  LCCN =         "QA76.9.A25 T96 2005",
  bibdate =      "Thu Oct 6 07:23:16 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Computers; Access control; Data
                 protection; Identity theft",
}

@Book{Uhl:2005:IVE,
  author =       "Andreas Uhl and Andreas Pommer",
  title =        "Image and video encryption: from digital rights
                 management to secured personal communication",
  volume =       "15",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xvi + 161",
  year =         "2005",
  ISBN =         "0-387-23402-0",
  ISBN-13 =      "978-0-387-23402-1",
  LCCN =         "TA1637 .U72 2005",
  bibdate =      "Wed Sep 28 07:48:07 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Advances in information security",
  acknowledgement = ack-nhfb,
  subject =      "Image processing; Security measures; Data encryption
                 (Computer science)",
}

@Book{vanTilborg:2005:ECS,
  editor =       "Henk C. A. van Tilborg",
  title =        "Encyclopedia of cryptography and security",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "x + 684",
  year =         "2005",
  ISBN =         "0-387-23473-X (hardcover)",
  ISBN-13 =      "978-0-387-23473-1 (hardcover)",
  LCCN =         "Z103 .E53 2005",
  bibdate =      "Fri Oct 28 18:17:56 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  price =        "US\$299.00",
  acknowledgement = ack-nhfb,
  subject =      "Cryptography; Encyclopedias; Data protection;
                 Encyclopedias",
}

@InProceedings{Vasco:2005:NCS,
  author =       "Mar{\'\i}a Isabel Gonz{\'a}lez Vasco and Consuelo
                 Mart{\'\i}nez and Rainer Steinwandt and Jorge L.
                 Villar",
  title =        "A New {Cramer--Shoup} Like Methodology for Group Based
                 Provably Secure Encryption Schemes",
  crossref =     "Kilian:2005:TCS",
  pages =        "495--??",
  year =         "2005",
  bibdate =      "Tue Apr 4 19:15:40 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Theory of cryptography (TCC 2005)",
}

@InProceedings{Vaudenay:2005:SCI,
  author =       "Serge Vaudenay",
  title =        "Secure Communications over Insecure Channels Based on
                 Short Authenticated Strings",
  crossref =     "Shoup:2005:ACC",
  pages =        "309--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_19",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@Article{Voice:2005:OAM,
  author =       "Chris Voice",
  title =        "Online authentication: matching security levels to the
                 risk",
  journal =      j-NETWORK-SECURITY,
  volume =       "2005",
  number =       "12",
  pages =        "15--18",
  month =        dec,
  year =         "2005",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(05)70315-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:21 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485805703159",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Voloshynovskiy:2005:ITD,
  author =       "Sviatoslav Voloshynovskiy and Frederic Deguillaume and
                 Oleksiy Koval and Thierry Pun",
  title =        "Information-Theoretic Data-Hiding: Recent Achievements
                 and Open Problems",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "5",
  number =       "1",
  pages =        "5--??",
  month =        jan,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "0219-4678",
  bibdate =      "Wed Jan 12 05:16:34 MST 2005",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Wachsmann:2005:CAK,
  author =       "Alf Wachsmann",
  title =        "Centralized authentication with {Kerberos 5}, {Part
                 I}",
  journal =      j-LINUX-J,
  volume =       "2005",
  number =       "130",
  pages =        "6--6",
  month =        feb,
  year =         "2005",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Sat Dec 24 17:46:04 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@InProceedings{Walter:2005:DDP,
  author =       "Colin Walter and David Samyde",
  title =        "Data Dependent Power Use in Multipliers",
  crossref =     "IEEE:2005:PIS",
  pages =        "??--??",
  year =         "2005",
  bibdate =      "Wed Jun 22 07:02:55 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://arith17.polito.it/final/paper-126.pdf",
  abstract =     "Recent research has demonstrated the vulnerability of
                 certain smart card architectures to power and
                 electromagnetic analysis when multiplier operations are
                 insufficiently shielded from external monitoring. Here
                 several standard multipliers are investigated in more
                 detail in order to provide the foundation for
                 understanding potential weaknesses and enabling the
                 subsequent successful repair of those systems. A model
                 is built which accurately predicts power use as a
                 function of the Hamming weights of inputs without the
                 combinatorial explosion of exhaustive simulation. This
                 confirms that power use is indeed data dependent at
                 least for those multipliers. Laboratory experiments
                 confirm that EMR also corresponds closely to these
                 power predictions over a wide range of frequencies.",
  acknowledgement = ack-nhfb,
  keywords =     "Differential power analysis; DPA; EMA; multiplication;
                 multiplier; RSA cryptosystem.; smart card",
  pagecount =    "9",
}

@Article{Wang:2005:CHY,
  author =       "Shyh-Yih Wang and Chi-Sung Laih",
  title =        "Cryptanalysis of {Hwang--Yang} scheme for controlling
                 access in large partially ordered hierarchies",
  journal =      j-J-SYST-SOFTW,
  volume =       "75",
  number =       "1--2",
  pages =        "189--192",
  day =          "15",
  month =        feb,
  year =         "2005",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed May 18 10:27:27 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@TechReport{Wang:2005:CSA,
  author =       "Xiaoyun Wang and Yiqun Lisa Yin and Hongbo Yu",
  title =        "Collision Search Attacks on {SHA1}",
  type =         "Technical report",
  institution =  "Shandong University",
  address =      "Shandong, China",
  year =         "2005",
  bibdate =      "Thu Mar 24 07:53:53 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://theory.csail.mit.edu/~yiqun/shanote.pdf",
  acknowledgement = ack-nhfb,
  remark =       "From the paper: ``We have developed a set of new
                 techniques that are very effective for searching
                 collisions in SHA1. Our analysis shows that collisions
                 of SHA1 can be found with complexity less than $ 2^{69}
                 $ hash operations. This is the first attack on the full
                 80-step SHA1 with complexity less than the $ 2^{80} $
                 theoretical bound. Based on our estimation, we expect
                 that real collisions of SHA1 reduced to 70-steps can be
                 found using today's supercomputers.''.",
}

@InProceedings{Wang:2005:DIC,
  author =       "Xuebing Wang and Linhua Zhang and Yong Wu",
  title =        "Design and Implementation of a Chaos-Based Public Key
                 Encryption Scheme",
  crossref =     "Han:2005:PJI",
  pages =        "79--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Wang:2005:EAS,
  author =       "Fei Wang and Yupu Hu and Ying Liu and Zhanpeng Hu",
  title =        "An Efficient Algorithm for Software Generation of the
                 Generalized Self-Shrinking Sequence",
  crossref =     "Han:2005:PJI",
  pages =        "163--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Wang:2005:ECSa,
  author =       "Xiaoyun Wang and Hongbo Yu and Yiqun Lisa Yin",
  title =        "Efficient Collision Search Attacks on {SHA-0}",
  crossref =     "Shoup:2005:ACC",
  pages =        "1--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_1",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "In this paper, we present new techniques for collision
                 search in the hash function SHA-0. Using the new
                 techniques, we can find collisions of the full 80-step
                 SHA-0 with complexity less than $ 2^{39} $ hash
                 operations.",
  acknowledgement = ack-nhfb,
  keywords =     "Collision search attacks; Crypto '2005; cryptography;
                 Hash functions; SHA-0; SHA-1",
}

@Article{Wang:2005:ECSb,
  author =       "Chih-Hung Wang and Yan-Sheng Kuo",
  title =        "An efficient contract signing protocol using the
                 aggregate signature scheme to protect signers' privacy
                 and promote reliability",
  journal =      j-OPER-SYS-REV,
  volume =       "39",
  number =       "4",
  pages =        "66--79",
  month =        oct,
  year =         "2005",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:53 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@TechReport{Wang:2005:FCFa,
  author =       "Xiaoyun Wang and Yiqun Lisa Yin and Hongbo Yu",
  title =        "Finding Collisions in the Full {SHA-1}",
  type =         "Technical report",
  institution =  "Shandong University",
  address =      "Shandong, China",
  day =          "22",
  month =        jun,
  year =         "2005",
  bibdate =      "Fri Jul 15 14:04:29 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://cryptome.org/wang_sha1_v2.zip",
  abstract =     "In this paper, we present new collision search attacks
                 on the hash function SHA-1. We show that collisions of
                 SHA-1 can be found with complexity less than $ 2^{69} $
                 hash operations. This is the first attack on the full
                 80-step SHA-1 with complexity less than the $ 2^{80} $
                 theoretical bound.",
  acknowledgement = ack-nhfb,
}

@InProceedings{Wang:2005:FCFb,
  author =       "Xiaoyun Wang and Yiqun Lisa Yin and Hongbo Yu",
  title =        "Finding Collisions in the Full {SHA-1}",
  crossref =     "Shoup:2005:ACC",
  pages =        "17--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_2",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "In this paper, we present new collision search attacks
                 on the hash function SHA-1. We show that collisions of
                 SHA-1 can be found with complexity less than $ 2^{69} $
                 hash operations. This is the first attack on the full
                 80-step SHA-1 with complexity less than the $ 2^{80} $
                 theoretical bound.",
  acknowledgement = ack-nhfb,
  keywords =     "Collision search attacks; Crypto '2005; cryptography;
                 Hash functions; SHA-0; SHA-1",
}

@InProceedings{Wang:2005:RST,
  author =       "Lijun Wang and Chao Gao",
  title =        "Rough Set Theory's Application on Intrusion Detection
                 Based on System Calls",
  crossref =     "Han:2005:PJI",
  pages =        "83--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Wang:2005:SAI,
  author =       "Yingjie Wang and J. H. Li and L. Tie",
  title =        "Security analysis and improvement of a user-friendly
                 remote authentication protocol",
  journal =      j-APPL-MATH-COMP,
  volume =       "168",
  number =       "1",
  pages =        "47--50",
  day =          "1",
  month =        sep,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:48 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Wang:2005:SCR,
  author =       "Shiuh-Jeng Wang",
  title =        "Steganography of capacity required using modulo
                 operator for embedding secret image",
  journal =      j-APPL-MATH-COMP,
  volume =       "164",
  number =       "1",
  pages =        "99--116",
  day =          "5",
  month =        may,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:44 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Wang:2005:SDR,
  author =       "Kun Wang and Zhen Cai and Lihua Zhou",
  title =        "Study on Disaster Recovery Planning Model",
  crossref =     "Han:2005:PJI",
  pages =        "151--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Wang:2005:TAP,
  author =       "Xinyuan Wang and Shiping Chen and Sushil Jajodia",
  title =        "Tracking anonymous peer-to-peer {VoIP} calls on the
                 {Internet}",
  crossref =     "Meadows:2005:CPA",
  pages =        "81--91",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Wang:2005:TSP,
  author =       "Yu Wang and Yichao Li and Xiaosong Zhang and Jiazhi
                 Zeng",
  title =        "Tracing Single-Packet Attacks to Their Sources",
  crossref =     "Han:2005:PJI",
  pages =        "118--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Weierud:2005:BPS,
  author =       "Frode Weierud",
  title =        "{Bletchley Park}'s {Sturgeon}, the Fish that Laid No
                 Eggs",
  journal =      j-RUTHERFORD-J,
  volume =       "1",
  number =       "??",
  pages =        "??--??",
  month =        "????",
  year =         "2005--2006",
  CODEN =        "????",
  ISSN =         "1177-1380",
  ISSN-L =       "1177-1380",
  bibdate =      "Mon Jan 4 09:52:24 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/rutherfordj.bib",
  URL =          "http://rutherfordjournal.org/article010106.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Rutherford Journal",
  journal-URL =  "http://rutherfordjournal.org/",
}

@InCollection{Weierud:2005:BSF,
  author =       "Frode Weierud",
  title =        "{BP}'s Sturgeon, The {FISH} That Laid No Eggs",
  crossref =     "Copeland:2005:CSB",
  pages =        "??--??",
  year =         "2005",
  bibdate =      "Mon Nov 07 18:31:18 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "BP (Bletchley Park); cryptography",
}

@Book{Welschenbach:2005:CCC,
  author =       "Michael Welschenbach",
  title =        "Cryptography in {C} and {C++}",
  publisher =    pub-APRESS,
  address =      pub-APRESS:adr,
  edition =      "Second",
  pages =        "xxv + 478",
  year =         "2005",
  ISBN =         "1-59059-502-5",
  ISBN-13 =      "978-1-59059-502-2",
  LCCN =         "QA76.9.A25 W4313 2005",
  bibdate =      "Thu Mar 22 12:02:53 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0663/2005002553-d.html;
                 http://www.loc.gov/catdir/toc/ecip057/2005002553.html",
  acknowledgement = ack-nhfb,
  remark =       "The first American edition is a translation of the
                 second German edition, which has been revised and
                 expanded from the first German edition.",
  subject =      "Computer security; Cryptography; C (Computer program
                 language); C++ (Computer program language)",
}

@Article{Wen:2005:TRB,
  author =       "Hsiang-An Wen and Kuo-Chang Lee and Sheng-Yu Hwang and
                 Tzonelih Hwang",
  title =        "On the traceability on {RSA}-based partially signature
                 with low computation",
  journal =      j-APPL-MATH-COMP,
  volume =       "162",
  number =       "1",
  pages =        "421--425",
  day =          "4",
  month =        mar,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:41 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Wen:2005:URE,
  author =       "Hsiang-An Wen and Sheng-Yu Hwang and Tzonelih Hwang",
  title =        "On the unlinkability of randomization-enhanced
                 {Chaum}'s blind signature scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "164",
  number =       "3",
  pages =        "799--803",
  day =          "25",
  month =        may,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:45 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Whyte:2005:TFC,
  author =       "William Whyte",
  title =        "Towards faster cryptosystems, {I}",
  crossref =     "Garrett:2005:PKC",
  pages =        "113--137",
  year =         "2005",
  MRclass =      "94A60 (94-02)",
  MRnumber =     "2211874 (2007c:94178)",
  MRreviewer =   "Boris {\`E}. Kunyavski{\u\i}",
  bibdate =      "Fri Sep 17 09:12:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Windley:2005:DI,
  author =       "Phillip J. Windley",
  title =        "Digital identity",
  publisher =    pub-ORA,
  address =      pub-ORA:adr,
  pages =        "xviii + 234",
  year =         "2005",
  ISBN =         "0-596-00878-3",
  ISBN-13 =      "978-0-596-00878-9",
  LCCN =         "TK5105.59 .W45 2005",
  bibdate =      "Thu Oct 6 07:23:49 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  remark =       "Unmasking Identity Management Architecture (IMA).",
  subject =      "Computer networks; Security measures",
}

@Book{Winkel:2005:GEC,
  editor =       "Brian J. Winkel",
  title =        "The {German Enigma} cipher machine",
  publisher =    pub-ARTECH,
  address =      pub-ARTECH:adr,
  pages =        "????",
  year =         "2005",
  ISBN =         "1-58053-996-3",
  ISBN-13 =      "978-1-58053-996-8",
  LCCN =         "D810.C88 G47 2005",
  bibdate =      "Mon May 8 07:05:27 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Artech House computer security series",
  acknowledgement = ack-nhfb,
  remark =       "Reprints of papers originally published in
                 Cryptologia.",
  subject =      "Enigma cipher system; ULTRA (Intelligence system);
                 World War, 1939--1945; Cryptography; Electronic
                 intelligence; Germany; Great Britain; Secret service",
}

@Book{Winkler:2005:SAU,
  author =       "Ira Winkler",
  title =        "Spies among us: how to stop the spies, terrorists,
                 hackers, and criminals you don't even know you
                 encounter every day",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xix + 326",
  year =         "2005",
  ISBN =         "0-7645-8468-5 (cloth)",
  ISBN-13 =      "978-0-7645-8468-8 (cloth)",
  LCCN =         "UB250 .W55 2005",
  bibdate =      "Mon Nov 7 17:31:20 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip054/2004028735.html;
                 http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764584685.html",
  acknowledgement = ack-nhfb,
  subject =      "Espionage; Business intelligence; Computer crimes;
                 Prevention; Terrorism; Prevention",
}

@InProceedings{Winslett:2005:PLD,
  author =       "Marianne Winslett and Charles C. Zhang and Piero A.
                 Bonatti",
  title =        "{PeerAccess}: a logic for distributed authorization",
  crossref =     "Meadows:2005:CPA",
  pages =        "168--179",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Wolf:2005:NML,
  author =       "Stefan Wolf and J{\"u}rg Wullschleger",
  title =        "New Monotones and Lower Bounds in Unconditional
                 Two-Party Computation",
  crossref =     "Shoup:2005:ACC",
  pages =        "467--??",
  year =         "2005",
  DOI =          "https://doi.org/10.1007/11535218_28",
  bibdate =      "Mon Apr 3 09:26:13 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Crypto '2005; cryptography",
}

@Article{Wollinger:2005:CVH,
  author =       "T. Wollinger and J. Pelzl and C. Paar",
  title =        "{Cantor} versus {Harley}: optimization and analysis of
                 explicit formulae for hyperelliptic curve
                 cryptosystems",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "54",
  number =       "7",
  pages =        "861--872",
  month =        jul,
  year =         "2005",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2005.109",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 16:17:17 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1432669",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Wood:2005:IIM,
  author =       "Peter Wood",
  title =        "Implementing identity management security --- an
                 ethical hacker's view",
  journal =      j-NETWORK-SECURITY,
  volume =       "2005",
  number =       "9",
  pages =        "12--15",
  month =        sep,
  year =         "2005",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(05)70282-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:18 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485805702828",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Book{Wrixon:2005:CCO,
  author =       "Fred B. Wrixon",
  title =        "Codes, Ciphers and Other Cryptic and Clandestine
                 Communication: Making and Breaking Secret Messages from
                 Hieroglyphs to the {Internet}",
  publisher =    "Black Dog \& Leventhal Publishers",
  address =      "New York, NY, USA",
  pages =        "704",
  year =         "2005",
  ISBN =         "1-57912-485-2",
  ISBN-13 =      "978-1-57912-485-4",
  LCCN =         "Z103.3 .W75 1998",
  bibdate =      "Mon Nov 21 06:05:56 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  remark =       "Originally published 1998.",
}

@Article{Wu:2005:CTR,
  author =       "Lin-Chuan Wu and Yi-Shiung Yeh",
  title =        "Comment on traceability on {RSA}-based partially
                 signature with low computation",
  journal =      j-APPL-MATH-COMP,
  volume =       "170",
  number =       "2",
  pages =        "1344--1348",
  day =          "15",
  month =        nov,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:50 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Wu:2005:IAW,
  author =       "Qiong Wu and Guohui Li and Dan Tu",
  title =        "An Image Authentication Watermarking With
                 Self-Localization and Recovery",
  crossref =     "Han:2005:PJI",
  pages =        "960--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Wu:2005:NDI,
  author =       "Hsien-Chu Wu and Chin-Chen Chang",
  title =        "A novel digital image watermarking scheme based on the
                 vector quantization technique",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "460--471",
  month =        sep,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000672",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wu:2005:SSP,
  author =       "Hsien-Chu Wu and Min-Shiang Hwang and Chia-Hsin Liu",
  title =        "A Secure Strong-Password Authentication Protocol",
  journal =      j-FUND-INFO,
  volume =       "68",
  number =       "4",
  pages =        "399--406",
  month =        jun,
  year =         "2005",
  CODEN =        "FUMAAJ",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:03:41 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Book{Wyler:2005:ANS,
  author =       "Neil R. Wyler",
  title =        "Aggressive network self-defense",
  publisher =    pub-SYNGRESS,
  address =      pub-SYNGRESS:adr,
  pages =        "xxx + 383",
  year =         "2005",
  ISBN =         "1-931836-20-5",
  ISBN-13 =      "978-1-931836-20-3",
  LCCN =         "QA76.9.A25 A38 2005; QA76.9.A25 A447 2005",
  bibdate =      "Thu Oct 6 07:25:35 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  URL =          "http://site.ebrary.com/lib/ucsc/Doc?id=10075669",
  acknowledgement = ack-nhfb,
  subject =      "Internet; Security measures; Computer security",
}

@Article{Xiao:2005:SPA,
  author =       "Lu Xiao and Howard M. Heys",
  title =        "A simple power analysis attack against the key
                 schedule of the {Camellia} block cipher",
  journal =      j-INFO-PROC-LETT,
  volume =       "95",
  number =       "3",
  pages =        "409--412",
  day =          "16",
  month =        aug,
  year =         "2005",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 18:41:02 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@InProceedings{Xu:2005:ADR,
  author =       "Jun Xu and Peng Ning and Chongkyung Kil and Yan Zhai
                 and Chris Bookholt",
  title =        "Automatic diagnosis and response to memory corruption
                 vulnerabilities",
  crossref =     "Meadows:2005:CPA",
  pages =        "223--234",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Xu:2005:ETR,
  author =       "Qiu-Liang Xu and Tzer-Shyong Chen",
  title =        "An efficient threshold {RSA} digital signature
                 scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "166",
  number =       "1",
  pages =        "25--34",
  day =          "6",
  month =        jul,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:46 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Yang:2005:CIA,
  author =       "Chou-Chen Yang and Ren-Chiun Wang",
  title =        "Cryptanalysis of improved authenticated multiple-key
                 agreement protocol without using conventional one-way
                 function",
  journal =      j-APPL-MATH-COMP,
  volume =       "162",
  number =       "1",
  pages =        "211--214",
  day =          "4",
  month =        mar,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:41 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Yang:2005:IME,
  author =       "Jun Yang and Lan Gao and Youtao Zhang",
  title =        "Improving memory encryption performance in secure
                 processors",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "54",
  number =       "5",
  pages =        "630--640",
  month =        may,
  year =         "2005",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2005.80",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 16:17:17 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1407851",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Yang:2005:IYS,
  author =       "Chou-Chen Yang and Ren-Chiun Wang and Ting-Yi Chang",
  title =        "An improvement of the {Yang-Shieh} password
                 authentication schemes",
  journal =      j-APPL-MATH-COMP,
  volume =       "162",
  number =       "3",
  pages =        "1391--1396",
  day =          "25",
  month =        mar,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:42 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Yang:2005:SAS,
  author =       "Chou-Chen Yang and Ren-Chiun Wang and Wei-Ting Liu",
  title =        "Secure authentication scheme for session initiation
                 protocol",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "5",
  pages =        "381--386",
  month =        aug,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002640",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yang:2005:SEA,
  author =       "Chou-Chen Yang and Yuan-Liang Tang and Ren-Chiun Wang
                 and Hung-Wen Yang",
  title =        "A secure and efficient authentication protocol for
                 anonymous channel in wireless communications",
  journal =      j-APPL-MATH-COMP,
  volume =       "169",
  number =       "2",
  pages =        "1431--1439",
  day =          "15",
  month =        oct,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:49 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Misc{Yang:2005:TFN,
  author =       "JiXian Yang",
  title =        "{TWOBLOCK}: a Fast New Hash Function",
  pages =        "7",
  year =         "2005",
  bibdate =      "Thu Sep 22 08:14:45 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "World-Wide Web document.",
  URL =          "http://yjxonline.hostrocket.com/Hash2005.pdf",
  abstract =     "In this paper, the author studies the fast
                 cryptographic hash function. This work suggests a
                 different notion with respect to the traditional hash
                 functions, MD5, SHA-1, and Whirlpool. The notion of
                 block cipher based hash function is abandoned.
                 According to the flexibility of attack, it shows how
                 this hash function is no longer vulnerable to the known
                 collision attacks. Finally, the author proves that the
                 TWOBLOCK output bit value problem is NP-hard.",
  acknowledgement = ack-nhfb,
  keywords =     "Block cipher; Collision; Design principle; Fast;
                 Flexibility of attack; Hash function; NP-hard; Provable
                 security; Two block",
}

@Article{Yoon:2005:CFI,
  author =       "Eun-Jun Yoon and Eun-Kyung Ryu and Kee-Young Yoo",
  title =        "Cryptanalysis and further improvement of {Peinado}'s
                 improved {LHL}-key authentication scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "168",
  number =       "2",
  pages =        "788--794",
  day =          "15",
  month =        sep,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:48 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Yoon:2005:CZX,
  author =       "Eun-Jun Yoon and Kee-Young Yoo",
  title =        "Cryptanalysis of {Zhang--Xiao}'s multisignature scheme
                 for specified group of verifiers",
  journal =      j-APPL-MATH-COMP,
  volume =       "170",
  number =       "1",
  pages =        "226--229",
  day =          "1",
  month =        nov,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:50 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Yoon:2005:ICJ,
  author =       "Eun-Jun Yoon and Eun-Kyung Ryu and Kee-Young Yoo",
  title =        "Improvement of {Chien--Jan}'s authenticated
                 multiple-key agreement protocol without using
                 conventional one-way function",
  journal =      j-APPL-MATH-COMP,
  volume =       "167",
  number =       "1",
  pages =        "711--715",
  day =          "5",
  month =        aug,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:47 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Yoon:2005:IFA,
  author =       "Eun-Jun Yoon and Eun-Kyung Ryu and Kee-Young Yoo",
  title =        "Improvement of {Fan} et al.'s deniable authentication
                 protocol based on {Diffie--Hellman} algorithm",
  journal =      j-APPL-MATH-COMP,
  volume =       "167",
  number =       "1",
  pages =        "274--280",
  day =          "5",
  month =        aug,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:47 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Yoon:2005:IHL,
  author =       "Eun-Jun Yoon and Eun-Kyung Ryu and Kee-Young Yoo",
  title =        "An improvement of {Hwang--Lee--Tang}'s simple remote
                 user authentication scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "1",
  pages =        "50--56",
  month =        feb,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001749",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yoon:2005:SWL,
  author =       "Eun-Jun Yoon and Kee-Young Yoo",
  title =        "On the security of {Wu-Lin}'s robust key
                 authentication scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "169",
  number =       "1",
  pages =        "1--7",
  day =          "1",
  month =        oct,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:49 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Yu:2005:EHI,
  author =       "Jia Yu and Daxing Li and Rong Hao",
  title =        "An Efficient Hierarchical {ID}-Based Signature
                 Scheme",
  crossref =     "Han:2005:PJI",
  pages =        "92--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Yurkewych:2005:CIR,
  author =       "Matthew Yurkewych and Brian N. Levine and Arnold L.
                 Rosenberg",
  title =        "On the cost-ineffectiveness of redundancy in
                 commercial {P2P} computing",
  crossref =     "Meadows:2005:CPA",
  pages =        "280--288",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Zafeiriou:2005:BRW,
  author =       "Stefanos Zafeiriou and Anastasios Tefas and Ioannis
                 Pitas",
  title =        "Blind Robust Watermarking Schemes for Copyright
                 Protection of {$3$D} Mesh Objects",
  journal =      j-IEEE-TRANS-VIS-COMPUT-GRAPH,
  volume =       "11",
  number =       "5",
  pages =        "596--607",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "ITVGEA",
  DOI =          "https://doi.org/10.1109/TVCG.2005.71",
  ISSN =         "1077-2626 (print), 1941-0506 (electronic), 2160-9306",
  ISSN-L =       "1077-2626",
  bibdate =      "Thu Nov 10 07:58:55 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransviscomputgraph.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Visualization and Computer
                 Graphics",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2945",
}

@InProceedings{Zhang:2005:AES,
  author =       "Zhikun Zhang and Youping Geng and Tingyan Li and
                 Jianguo Xiao",
  title =        "Analysis of Enhanced Separation of Duty In Role-Based
                 Access Control Model",
  crossref =     "Han:2005:PJI",
  pages =        "69--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Zhang:2005:ASP,
  author =       "Youtao Zhang and Jun Yang and Yongjing Lin and Lan
                 Gao",
  title =        "Architectural support for protecting user privacy on
                 trusted processors",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "33",
  number =       "1",
  pages =        "118--123",
  month =        mar,
  year =         "2005",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 09:40:37 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Zhang:2005:CHC,
  author =       "Fangguo Zhang and Xiaofeng Chen",
  title =        "Cryptanalysis of {Huang--Chang} partially blind
                 signature scheme",
  journal =      j-J-SYST-SOFTW,
  volume =       "76",
  number =       "3",
  pages =        "323--325",
  month =        jun,
  year =         "2005",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed May 18 10:27:28 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Zhang:2005:CLH,
  author =       "Fangguo Zhang and Kwangjo Kim",
  title =        "Cryptanalysis of {Lee--Hwang--Li}'s key authentication
                 scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "161",
  number =       "1",
  pages =        "101--107",
  day =          "4",
  month =        feb,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:40 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  note =         "See comment \cite{Sun:2005:CCL}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Zhang:2005:CSS,
  author =       "Zhenfeng Zhang and Dengguo Feng",
  title =        "Cryptanalysis of some signature schemes with message
                 recovery",
  journal =      j-APPL-MATH-COMP,
  volume =       "170",
  number =       "1",
  pages =        "103--114",
  day =          "1",
  month =        nov,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:50 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Zhang:2005:DMC,
  author =       "Zhiyong Zhang and Jiexin Pu",
  title =        "Delegation Model for {CSCW} Based on {RBAC} Policies
                 and Visual Modeling",
  crossref =     "Han:2005:PJI",
  pages =        "126--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Zhang:2005:ISM,
  author =       "Peng Zhang and Chengqing Ye and Xueying Ma",
  title =        "Improvement of Secure Mobile Agent System In
                 Electronic Commerce",
  crossref =     "Han:2005:PJI",
  pages =        "114--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Zhang:2005:ISS,
  author =       "Jianhong Zhang and Yumin Wang",
  title =        "An improved signature scheme without using one-way
                 {Hash} functions",
  journal =      j-APPL-MATH-COMP,
  volume =       "170",
  number =       "2",
  pages =        "905--908",
  day =          "15",
  month =        nov,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:50 MDT 2008",
  bibsource =    "applmathcomput2005.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Zhang:2005:ITA,
  author =       "Zhang Zhang and Shunsuke Araki and Guozhen Xiao",
  title =        "Improvement of {Tseng} et al.'s authenticated
                 encryption scheme with message linkages",
  journal =      j-APPL-MATH-COMP,
  volume =       "162",
  number =       "3",
  pages =        "1475--1483",
  day =          "25",
  month =        mar,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:42 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Zhang:2005:RPE,
  author =       "N. Zhang and Q. Shi and M. Merabti",
  title =        "Revocation of privacy-enhanced public-key
                 certificates",
  journal =      j-J-SYST-SOFTW,
  volume =       "75",
  number =       "1--2",
  pages =        "205--214",
  day =          "15",
  month =        feb,
  year =         "2005",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed May 18 10:27:27 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Zhang:2005:SCA,
  author =       "Jianhong Zhang and Yumin Wang",
  title =        "On the security of a convertible authenticated
                 encryption",
  journal =      j-APPL-MATH-COMP,
  volume =       "169",
  number =       "2",
  pages =        "1063--1069",
  day =          "15",
  month =        oct,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:49 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Zhao:2005:APA,
  author =       "Meiyuan Zhao and Sean W. Smith and David M. Nicol",
  title =        "Aggregated path authentication for efficient {BGP}
                 security",
  crossref =     "Meadows:2005:CPA",
  pages =        "128--138",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Zhao:2005:MCE,
  author =       "Ze-Mao Zhao and Feng-Yu Liu",
  title =        "Method of constructing elliptic curve authenticated
                 encryption scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "168",
  number =       "1",
  pages =        "146--151",
  day =          "1",
  month =        sep,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:48 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Zhao:2005:SSV,
  author =       "Xin Zhao and Kevin Borders and Atul Prakash",
  title =        "{SVGrid}: a secure virtual environment for untrusted
                 grid applications",
  crossref =     "ACM:2005:MPI",
  pages =        "1--6",
  year =         "2005",
  DOI =          "https://doi.org/10.1145/1101499.1101515",
  bibdate =      "Sat Oct 14 13:51:00 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "Most grid security researches focus on user
                 authentication and secure communication, the protection
                 of grid computers is left to the underlying operating
                 system. Unfortunately, most OS level protection
                 mechanisms can be turned off after an attacker manages
                 to exploit a vulnerability to gain privileged
                 access.This paper proposes SVGrid, a Secure Virtual
                 Grid computing environment, to protect grid computers'
                 filesystem and network from malicious grid
                 applications. SVGrid works by isolating grid
                 applications in one or more grid virtual machines whose
                 filesystem and network service are moved into a
                 dedicated monitor virtual machine. All file and network
                 access requests are then forced to go through the
                 monitor virtual machine, where security policies can be
                 enforced. The resource compartment guarantees that
                 appropriate security policy enforcement cannot be
                 bypassed or disabled, even if a grid virtual machine is
                 compromised. We tested SVGrid against attacks on grid
                 virtual machine using rootkit and Internet worm, SVGrid
                 was able to prevent both of them from maliciously
                 accessing filesystem and network. We also evaluated the
                 performance of SVGrid system and only found that
                 performance cost was reasonable considering the
                 security benefits of SVGrid.",
  acknowledgement = ack-nhfb,
}

@Article{Zhou:2005:APS,
  author =       "Lidong Zhou and Fred B. Schneider and Robbert {Van
                 Renesse}",
  title =        "{APSS}: proactive secret sharing in asynchronous
                 systems",
  journal =      j-TISSEC,
  volume =       "8",
  number =       "3",
  pages =        "259--286",
  month =        aug,
  year =         "2005",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Sat Sep 17 15:42:03 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@InProceedings{Zhou:2005:MBI,
  author =       "Zhenyu Zhou and Jianjing Shen",
  title =        "Multiagent-Based Information Fusion Model for Network
                 Security",
  crossref =     "Han:2005:PJI",
  pages =        "139--??",
  year =         "2005",
  bibdate =      "Fri Mar 23 17:59:18 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Zhou:2005:PSP,
  author =       "Yuan Zhou and ZhenFu Cao and RongXing Lu",
  title =        "Provably secure proxy-protected signature schemes
                 based on factoring",
  journal =      j-APPL-MATH-COMP,
  volume =       "164",
  number =       "1",
  pages =        "83--98",
  day =          "5",
  month =        may,
  year =         "2005",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jul 4 09:15:44 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Zhuang:2005:KAE,
  author =       "Li Zhuang and Feng Zhou and J. D. Tygar",
  title =        "Keyboard acoustic emanations revisited",
  crossref =     "Meadows:2005:CPA",
  pages =        "373--382",
  year =         "2005",
  bibdate =      "Mon Apr 3 08:07:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Zivkovic:2005:AAH,
  author =       "Miroslav {\v{Z}}ivkovi{\'c} and Milind M. Buddhikot
                 and Ko Lagerberg and Jeroen van Bemmel",
  title =        "Authentication across heterogeneous networks",
  journal =      j-BELL-LABS-TECH-J,
  volume =       "10",
  number =       "2",
  pages =        "39--56",
  month =        "Summer",
  year =         "2005",
  CODEN =        "BLTJFD",
  DOI =          "https://doi.org/10.1002/bltj.20093",
  ISSN =         "1089-7089 (print), 1538-7305 (electronic)",
  ISSN-L =       "1089-7089",
  bibdate =      "Fri Nov 26 17:31:36 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Bell Labs Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
  onlinedate =   "3 Aug 2005",
}

@Article{Zou:2005:MED,
  author =       "Cliff C. Zou and Weibo Gong and Don Towsley and Lixin
                 Gao",
  title =        "The monitoring and early detection of {Internet}
                 Worms",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "13",
  number =       "5",
  pages =        "961--974",
  month =        oct,
  year =         "2005",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2005.857113",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Fri Dec 30 06:01:37 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "After many Internet-scale worm incidents in recent
                 years, it is clear that a simple self-propagating worm
                 can quickly spread across the Internet and cause severe
                 damage to our society. Facing this great security
                 threat, we need to build an early detection system that
                 can detect the presence of a worm in the Internet as
                 quickly as possible in order to give people accurate
                 early warning information and possible reaction time
                 for counteractions. This paper first presents an
                 Internet worm monitoring system. Then, based on the
                 idea of ``detecting the trend, not the burst'' of
                 monitored illegitimate traffic, we present a ``trend
                 detection'' methodology to detect a worm at its early
                 propagation stage by using Kalman filter estimation,
                 which is robust to background noise in the monitored
                 data. In addition, for uniform-scan worms such as Code
                 Red, we can effectively predict the overall vulnerable
                 population size, and estimate accurately how many
                 computers are really infected in the global Internet
                 based on the biased monitored data. For monitoring a
                 nonuniform scan worm, especially a sequential-scan worm
                 such as Blaster, we show that it is crucial for the
                 address space covered by the worm monitoring system to
                 be as distributed as possible.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
  keywords =     "Computer network security; early detection; Internet
                 worm; network monitoring",
}

@Article{Zunino:2005:WPE,
  author =       "Roberto Zunino and Pierpaolo Degano",
  title =        "Weakening the perfect encryption assumption in
                 {Dolev--Yao} adversaries",
  journal =      j-THEOR-COMP-SCI,
  volume =       "340",
  number =       "1",
  pages =        "154--178",
  day =          "13",
  month =        jun,
  year =         "2005",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Thu Jul 7 14:28:20 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Abimbola:2006:NSI,
  author =       "A. A. Abimbola and J. M. Munoz and W. J. Buchanan",
  title =        "{NetHost-Sensor}: Investigating the capture of
                 end-to-end encrypted intrusive data",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "445--451",
  month =        sep,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000605",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@TechReport{Aciicmez:2006:PSB,
  author =       "Onur Acii{\c{c}}mez and {\c{C}}etin Kaya Ko{\c{c}} and
                 Jean-Pierre Seifert",
  title =        "On the Power of Simple Branch Prediction Analysis",
  type =         "Technical report",
  institution =  "School of EECS, Oregon State University",
  address =      "Corvallis, OR 97331, USA",
  month =        oct,
  year =         "2006",
  bibdate =      "Mon Nov 20 14:57:23 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://eprint.iacr.org/2006/351;
                 http://eprint.iacr.org/2006/351.pdf",
  abstract =     "Very recently, a new software side-channel attack,
                 called Branch Prediction Analysis (BPA) attack, has
                 been discovered and also demonstrated to be practically
                 feasible on popular commodity PC platforms. While the
                 above recent attack still had the flavor of a classical
                 timing attack against RSA, where one uses many
                 execution-time measurements under the same key in order
                 to statistically amplify some small but key-dependent
                 timing differences, we dramatically improve upon the
                 former result. We prove that a carefully written
                 spy-process running simultaneously with an RSA-process,
                 is able to collect during one \emph{single} RSA signing
                 execution almost all of the secret key bits. We call
                 such an attack, analyzing the CPU's Branch Predictor
                 states through spying on a single quasi-parallel
                 computation process, a \emph{Simple Branch Prediction
                 Analysis (SBPA)} attack --- sharply differentiating it
                 from those one relying on statistical methods and
                 requiring many computation measurements under the same
                 key. The successful extraction of almost all secret key
                 bits by our SBPA attack against an openSSL RSA
                 implementation proves that the often recommended
                 blinding or so called randomization techniques to
                 protect RSA against side-channel attacks are, in the
                 context of SBPA attacks, totally useless. Additional to
                 that very crucial security implication, targeted at
                 such implementations which are assumed to be at least
                 statistically secure, our successful SBPA attack also
                 bears another equally critical security implication.
                 Namely, in the context of simple side-channel attacks,
                 it is widely believed that equally balancing the
                 operations after branches is a secure countermeasure
                 against such simple attacks. Unfortunately, this is not
                 true, as even such ``balanced branch'' implementations
                 can be completely broken by our SBPA attacks. Moreover,
                 despite sophisticated hardware-assisted partitioning
                 methods such as memory protection, sandboxing or even
                 virtualization, SBPA attacks empower an unprivileged
                 process to successfully attack other processes running
                 in parallel on the same processor. Thus, we conclude
                 that SBPA attacks are much more dangerous than
                 previously anticipated, as they obviously do not belong
                 to the same category as pure timing attacks.",
  acknowledgement = ack-nhfb,
  keywords =     "implementation / Branch Prediction; Modular
                 Exponentiation; RSA; Side Channel Analysis;
                 Simultaneous Multithreading; Trusted Computing",
}

@InProceedings{Akavia:2006:BOW,
  author =       "Adi Akavia and Oded Goldreich and Shafi Goldwasser and
                 Dana Moshkovitz",
  title =        "On basing one-way functions on {NP}-hardness",
  crossref =     "ACM:2006:PTE",
  pages =        "701--710",
  year =         "2006",
  bibdate =      "Thu May 25 06:19:54 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See erratum \cite{Akavia:2010:EBO}.",
  acknowledgement = ack-nhfb,
}

@Article{Allman:2006:MAW,
  author =       "Eric Allman",
  title =        "{E-mail} authentication: what, why, how?",
  journal =      j-QUEUE,
  volume =       "4",
  number =       "9",
  pages =        "30--34",
  month =        nov,
  year =         "2006",
  CODEN =        "AQCUAE",
  DOI =          "https://doi.org/10.1145/1180176.1180191",
  ISSN =         "1542-7730 (print), 1542-7749 (electronic)",
  ISSN-L =       "1542-7730",
  bibdate =      "Wed Nov 15 06:50:09 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Queue: Tomorrow's Computing Today",
}

@Article{Anonymous:2006:JHD,
  author =       "Anonymous",
  title =        "Just 12\% of handheld devices encrypted",
  journal =      j-NETWORK-SECURITY,
  volume =       "2006",
  number =       "7",
  pages =        "20--20",
  month =        jul,
  year =         "2006",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(06)70415-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:28 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485806704159",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2006:RC,
  author =       "Anonymous",
  title =        "{RSA{\reg} Conference 2007}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "14",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.162",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Anonymous:2006:SQE,
  author =       "Anonymous",
  title =        "Success for quantum encryption?",
  journal =      j-NETWORK-SECURITY,
  volume =       "2006",
  number =       "5",
  pages =        "20--20",
  month =        may,
  year =         "2006",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(06)70392-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:26 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485806703920",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Book{Anonymous:2006:SSD,
  author =       "Anonymous",
  title =        "{Solaris} Security for Developers Guide",
  publisher =    pub-SUN,
  address =      pub-SUN:adr,
  pages =        "????",
  year =         "2006",
  ISBN =         "0-595-28558-9",
  ISBN-13 =      "978-0-595-28558-7",
  LCCN =         "????",
  bibdate =      "Mon Jun 19 12:17:50 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://docs.sun.com/app/docs/doc/816-4863",
  acknowledgement = ack-nhfb,
  tableofcontents = "Preface \\
                 Solaris Security for Developers (Overview) \\
                 Developing Privileged Applications \\
                 Writing PAM Applications and Services \\
                 Writing Applications That Use GSS-API \\
                 GSS-API Client Example \\
                 GSS-API Server Example \\
                 Writing Applications That Use SASL \\
                 Introduction to the Solaris Cryptographic Framework \\
                 Writing User-Level Cryptographic Applications and
                 Providers \\
                 Using the Smart Card Framework \\
                 Sample C-Based GSS-API Programs \\
                 GSS-API Reference \\
                 Specifying an OID \\
                 Source Code for SASL Example \\
                 SASL Reference Tables \\
                 Packaging and Signing Cryptographic Providers \\
                 Glossary",
}

@Article{Applebaum:2006:C,
  author =       "Benny Applebaum and Yuval Ishai and Eyal Kushilevitz",
  title =        "Cryptography in $ {NC}^0 $",
  journal =      j-SIAM-J-COMPUT,
  volume =       "36",
  number =       "4",
  pages =        "845--888",
  month =        "????",
  year =         "2006",
  CODEN =        "SMJCAT",
  DOI =          "",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Tue May 18 08:21:37 MDT 2010",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/36/4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Article{Ateniese:2006:IPR,
  author =       "Giuseppe Ateniese and Kevin Fu and Matthew Green and
                 Susan Hohenberger",
  title =        "Improved proxy re-encryption schemes with applications
                 to secure distributed storage",
  journal =      j-TISSEC,
  volume =       "9",
  number =       "1",
  pages =        "1--30",
  month =        feb,
  year =         "2006",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Sat Apr 29 09:23:50 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Attrapadung:2006:FSS,
  author =       "Nuttapong Attrapadung and Jun Furukawa and Hideki
                 Imai",
  title =        "Forward-Secure and Searchable Broadcast Encryption
                 with Short Ciphertexts and Private Keys",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "4284",
  pages =        "161--177",
  year =         "2006",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11935230_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 13 08:42:37 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2006a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11935230_11.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11935230",
  book-URL =     "http://www.springerlink.com/content/978-3-540-49476-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Avanzi:2006:ESM,
  author =       "Roberto Avanzi and Vassil Dimitrov and Christophe
                 Doche and Francesco Sica",
  title =        "Extending Scalar Multiplication Using Double Bases",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "4284",
  pages =        "130--144",
  year =         "2006",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11935230_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 13 08:42:37 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2006a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11935230_9.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11935230",
  book-URL =     "http://www.springerlink.com/content/978-3-540-49476-8",
  fjournal =     "Lecture Notes in Computer Science",
  keywords =     "elliptic curves; Koblitz curves; supersingular
                 curves",
}

@Article{Ayoade:2006:SIR,
  author =       "John Ayoade",
  title =        "Security implications in {RFID} and authentication
                 processing framework",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "207--212",
  month =        may,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001951",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Badra:2006:KEA,
  author =       "Mohamad Badra and Ibrahim Hajjeh",
  title =        "Key-Exchange Authentication Using Shared Secrets",
  journal =      j-COMPUTER,
  volume =       "39",
  number =       "3",
  pages =        "58--66",
  month =        mar,
  year =         "2006",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2006.94",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Jul 4 17:16:19 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Bao:2006:CIB,
  author =       "Feng Bao and Cheng-Chi Lee and Min-Shiang Hwang",
  title =        "Cryptanalysis and improvement on batch verifying
                 multiple {RSA} digital signatures",
  journal =      j-APPL-MATH-COMP,
  volume =       "172",
  number =       "2",
  pages =        "1195--1200",
  day =          "15",
  month =        jan,
  year =         "2006",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:52 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@PhdThesis{Barkan:2006:CCP,
  author =       "Elad Pinhas Barkan",
  title =        "Cryptanalysis of ciphers and protocols",
  type =         "Thesis ({Ph.D.})",
  school =       "Faculty of Computer Science, Technion --- Israel
                 Institute of Technology",
  address =      "Haifa, Israel",
  pages =        "vi + 176",
  year =         "2006",
  bibdate =      "Fri May 13 06:21:15 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  advisor =      "Eli Biham",
  remark =       "Added title page and abstract in Hebrew.",
}

@Manual{Barker:2006:ROA,
  author =       "Elaine Barker",
  title =        "Recommendation for Obtaining Assurances for Digital
                 Signature Applications",
  organization = pub-NIST,
  address =      pub-NIST:adr,
  pages =        "v + 33",
  month =        nov,
  year =         "2006",
  bibdate =      "Thu Mar 22 11:05:43 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "NIST Special Publication 800-89.",
  URL =          "http://csrc.nist.gov/CryptoToolkit/dss/SP800-89Nov2006.pdf",
  acknowledgement = ack-nhfb,
}

@Manual{Barker:2006:RRN,
  author =       "Elaine Barker and John Kelsey",
  title =        "Recommendation for Random Number Generation Using
                 Deterministic Random Bit Generators",
  organization = pub-NIST,
  address =      pub-NIST:adr,
  pages =        "viii + 123",
  year =         "2006",
  bibdate =      "Wed Sep 06 07:05:25 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csrc.nist.gov/publications/nistpubs/800-90/SP800-90_DRBG-June2006-final.pdf",
  acknowledgement = ack-nhfb,
}

@Book{Beissinger:2006:CUM,
  author =       "Janet Beissinger and Vera Pless",
  title =        "The Cryptoclub: Using Mathematics to Make and Break
                 Secret Codes",
  publisher =    pub-A-K-PETERS,
  address =      pub-A-K-PETERS:adr,
  pages =        "xvi + 199",
  year =         "2006",
  ISBN =         "1-56881-223-X",
  ISBN-13 =      "978-1-56881-223-6",
  LCCN =         "QA40.5 .B45 2006",
  bibdate =      "Fri Mar 23 19:22:49 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip067/2006002743.html",
  acknowledgement = ack-nhfb,
  subject =      "Mathematics; Juvenile literature; Cryptography",
}

@Book{Bejtlich:2006:EDS,
  author =       "Richard Bejtlich",
  title =        "Extrusion detection: security monitoring for internal
                 intrusions",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xxviii + 385",
  year =         "2006",
  ISBN =         "0-321-34996-2 (paperback)",
  ISBN-13 =      "978-0-321-34996-5 (paperback)",
  LCCN =         "TK5105.59 .B43 2006",
  bibdate =      "Mon Apr 3 07:35:31 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  remark =       "Detecting and controlling intrusions --- Network
                 security monitoring revisited --- Defensible network
                 architecture --- Extrusion detection illustrated ---
                 Enterprise network instrumentation --- Layer 3 network
                 access control --- Network security operations ---
                 Traffic threat assessment --- Network incident response
                 --- Network forensics --- Internal intrusions ---
                 Traffic threat assessment case study --- Malicious
                 bots",
  subject =      "Computer networks; Security measures; Electronic
                 countermeasures",
}

@InProceedings{Bellare:2006:MPP,
  author =       "Mihir Bellare and Thomas Ristenpart",
  editor =       "????",
  booktitle =    "Advances in Cryptology --- {ASIACRYPT 2006}",
  title =        "Multi-property-preserving hash domain extension and
                 the {EMD} transform",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "299--314",
  year =         "2006",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 11:25:56 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 7]{Schneier:2015:SWC}.",
}

@Article{Bisseling:2006:MSM,
  author =       "Rob H. Bisseling and Ildik{\'o} Flesch",
  title =        "{Mondriaan} sparse matrix partitioning for attacking
                 cryptosystems by a parallel block {Lanczos} algorithm
                 --- a case study",
  journal =      j-PARALLEL-COMPUTING,
  volume =       "32",
  number =       "7--8",
  pages =        "551--567",
  month =        sep,
  year =         "2006",
  CODEN =        "PACOEJ",
  ISSN =         "0167-8191 (print), 1872-7336 (electronic)",
  ISSN-L =       "0167-8191",
  bibdate =      "Thu Sep 2 17:51:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01678191",
  acknowledgement = ack-nhfb,
  fjournal =     "Parallel Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01678191",
}

@Article{Blanton:2006:SRF,
  author =       "Marina Blanton and Mikhail Atallah",
  title =        "Succinct representation of flexible and
                 privacy-preserving access rights",
  journal =      j-VLDB-J,
  volume =       "15",
  number =       "4",
  pages =        "334--354",
  month =        nov,
  year =         "2006",
  CODEN =        "VLDBFR",
  ISSN =         "1066-8888 (print), 0949-877X (electronic)",
  ISSN-L =       "1066-8888",
  bibdate =      "Mon Jun 23 10:51:20 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We explore the problem of portable and flexible
                 privacy preserving access rights that permit access to
                 a large collection of digital goods. {\em
                 Privacy-preserving\/} access control means that the
                 service provider can neither learn what access rights a
                 customer has nor link a request to access an item to a
                 particular customer, thus maintaining privacy of both
                 customer activity and customer access rights. {\em
                 Flexible\/} access rights allow a customer to choose a
                 subset of items or groups of items from the repository,
                 obtain access to and be charged only for the items
                 selected. And {\em portability\/} of access rights
                 means that the rights themselves can be stored on small
                 devices of limited storage space and computational
                 capabilities such as smartcards or sensors, and
                 therefore the rights must be enforced using the limited
                 resources available. In this paper, we present and
                 compare two schemes that address the problem of such
                 access rights. We show that much can be achieved if one
                 allows for even a negligible amount of false positives
                 &\#x2013; items that were not requested by the
                 customer, but inadvertently were included in the
                 customer access right representation due to constrained
                 space resources. But minimizing false positives is one
                 of many other desiderata that include protection
                 against sharing of false positives information by
                 unscrupulous users, providing the users with
                 transaction untraceability and unlinkability, and
                 forward compatibility of the scheme. Our first scheme
                 does not place any constraints on the amount of space
                 available on the limited-capacity storage device, and
                 searches for the best representation that meets the
                 requirements. The second scheme, on the other hand, has
                 (modest) requirements on the storage space available,
                 but guarantees a low rate of false positives: with $
                 O(m c) $ storage space available on the smartcard
                 (where $m$ is the number of items or groups of items
                 included in the subscription and $c$ is a selectable
                 parameter), it achieves a rate of false positives of $
                 m^{-c} $.",
  acknowledgement = ack-nhfb,
  fjournal =     "VLDB Journal: Very Large Data Bases",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J869",
  keywords =     "compact representation; flexible access rights;
                 privacy-preserving access rights",
  remark =       "Check month: April or November??",
}

@Article{Blundo:2006:VCS,
  author =       "Carlo Blundo and Stelvio Cimato and Alfredo {De
                 Santis}",
  title =        "Visual cryptography schemes with optimal pixel
                 expansion",
  journal =      j-THEOR-COMP-SCI,
  volume =       "369",
  number =       "1--3",
  pages =        "169--182",
  day =          "15",
  month =        dec,
  year =         "2006",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Mar 29 08:55:31 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Boldyreva:2006:SO,
  author =       "Alexandra Boldyreva and Marc Fischlin",
  title =        "On the Security of {OAEP}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "4284",
  pages =        "210--225",
  year =         "2006",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11935230_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 13 08:42:37 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2006a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11935230_14.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11935230",
  book-URL =     "http://www.springerlink.com/content/978-3-540-49476-8",
  fjournal =     "Lecture Notes in Computer Science",
  keywords =     "OAEP encryption scheme",
}

@Article{Bozga:2006:PBA,
  author =       "L. Bozga and Y. Lakhnech and M. P{\'e}rin",
  title =        "Pattern-based abstraction for verifying secrecy in
                 protocols",
  journal =      j-INT-J-SOFTW-TOOLS-TECHNOL-TRANSFER,
  volume =       "8",
  number =       "1",
  pages =        "57--76",
  month =        feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10009-005-0189-6",
  ISSN =         "1433-2779 (print), 1433-2787 (electronic)",
  ISSN-L =       "1433-2779",
  bibdate =      "Wed Jul 9 18:12:21 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=1433-2779&volume=8&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sttt.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=1433-2779&volume=8&issue=1&spage=57",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal on Software Tools for Technology
                 Transfer: STTT",
  keywords =     "Abstract interpretation; Cryptographic protocols;
                 Security; Verification; Widening",
}

@Article{Brackenridge:2006:IUU,
  author =       "B. Brackenridge",
  title =        "Invention: Ultrawideband Upset",
  journal =      j-IEEE-SPECTRUM,
  volume =       "43",
  number =       "9",
  pages =        "65--66",
  month =        sep,
  year =         "2006",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2006.1688265",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Business; Cryptography; Engineering profession; FCC;
                 Internet; Law; Licenses; Privacy; Radio broadcasting;
                 Ultra wideband technology",
}

@Article{Breveglieri:2006:GEI,
  author =       "L. Breveglieri and I. Koren",
  title =        "{Guest Editors}' Introduction: Special Section on
                 Fault Diagnosis and Tolerance in Cryptography",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "55",
  number =       "9",
  pages =        "1073--1074",
  month =        sep,
  year =         "2006",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2006.149",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 15:35:56 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1668034",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Brustoloni:2006:LEN,
  author =       "Jos{\'e} Carlos Brustoloni",
  title =        "Laboratory experiments for network security
                 instruction",
  journal =      j-JERIC,
  volume =       "6",
  number =       "4",
  pages =        "5:1--5:??",
  month =        dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1248453.1248458",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:35 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We describe a sequence of five experiments on network
                 security that cast students successively in the roles
                 of computer user, programmer, and system administrator.
                 Unlike experiments described in several previous
                 papers, these experiments avoid placing students in the
                 role of attacker. Each experiment starts with an
                 in-class demonstration of an attack by the instructor.
                 Students then learn how to use open-source defense
                 tools appropriate for the role they are playing and the
                 attack at hand. Threats covered include eavesdropping,
                 dictionary, man-in-the-middle, port scanning, and
                 fingerprinting attacks. Defense skills gained by
                 students include how to forward ports with OpenSSH, how
                 to prevent weak passwords with CrackLib, how to salt
                 passwords, how to set up a simple certifying authority,
                 issue and verify certificates, and guarantee
                 communication confidentiality and integrity using
                 OpenSSL, and how to set up firewalls and IPsec-based
                 virtual private networks. At two separate offerings,
                 tests taken before and after each experiment showed
                 that each has a statistically significant and large
                 effect on students' learning. Moreover, surveys show
                 that students finish the sequence of experiments with
                 high interest in further studies and work in the area
                 of security. These results suggest that the experiments
                 are well-suited for introductory security or networking
                 courses.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Journal on Educational Resources in Computing
                 (JERIC)",
  keywords =     "certificate; certifying authority; course; dictionary
                 attack; eavesdropping; education; experiment;
                 fingerprinting; firewall; IPsec; man-in-the-middle;
                 password; port scanning; security; SSH; SSL; VPN",
}

@Article{Buchmann:2006:PCL,
  author =       "Johannes Buchmann and Alexander May and Ulrich
                 Vollmer",
  title =        "Perspectives for cryptographic long-term security",
  journal =      j-CACM,
  volume =       "49",
  number =       "9",
  pages =        "50--55",
  month =        sep,
  year =         "2006",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Aug 22 07:27:40 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  remark =       "Special issue on privacy and security in highly
                 dynamic systems.",
}

@Book{Budiansky:2006:HMS,
  author =       "Stephen Budiansky",
  title =        "{Her Majesty}'s spymaster: {Elizabeth I}, {Sir Francis
                 Walsingham}, and the birth of modern espionage",
  publisher =    "Plume",
  address =      "New York, NY, USA",
  pages =        "xvii + 235 + 8",
  year =         "2006",
  ISBN =         "0-452-28747-2",
  ISBN-13 =      "978-0-452-28747-1",
  LCCN =         "DA358.W2 B83 2006",
  bibdate =      "Mon Dec 19 12:36:42 MST 2016",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Sir Francis Walsingham's official title was principal
                 secretary to Queen Elizabeth I, but in fact this pious,
                 tight-lipped Puritan was England's first spymaster. A
                 ruthless, fiercely loyal civil servant, Walsingham
                 worked brilliantly behind the scenes to foil
                 Elizabeth's rival Mary Queen of Scots and outwit
                 Catholic Spain and France, which had arrayed their
                 forces behind her. Though he cut an incongruous figure
                 in Elizabeth's worldly court, Walsingham managed to win
                 the trust of key players like William Cecil and the
                 Earl of Leceister before launching his own secret
                 campaign against the queen's enemies. Covert operations
                 were Walsingham's genius; he pioneered techniques for
                 exploiting double agents, spreading disinformation, and
                 deciphering codes with the latest code-breaking science
                 that remain staples of international espionage.
                 Budiansky recounts how this legendary spymaster
                 invented the art and science of modern espionage and in
                 the process set Elizabethan England on the path to
                 empire.",
  acknowledgement = ack-nhfb,
  subject =      "Walsingham, Francis, Sir; Elizabeth, I, Queen of
                 England; Relations with cabinet officers; Espionage,
                 British; History; 16th century; Cabinet officers; Great
                 Britain; Biography; Cabinet officers; Diplomatic
                 relations; Espionage, British; Relations with cabinet
                 officers; Foreign relations; 1558--1603; Elizabeth,
                 1558--1603; France",
  subject-dates = "1530?--1590; 1533--1603",
  tableofcontents = "1572: Murder in Paris. An ill-fitting shoe \\
                 Less peril as enemies \\
                 1532--72: Making of a spymaster. A particular kind of
                 gentleman \\
                 The Queen's perilous course \\
                 A most unwelcome guest \\
                 1573--83: Mr. Secretary. Intelligencers and scoundrels
                 \\
                 Adversaries and moles \\
                 1583--87: The bosom serpent. The Throckmorton Plot \\
                 Letters in cipher \\
                 The final act \\
                 1584--90: War at last. Old friends and enemies \\
                 A traitor in Paris \\
                 Forearmed",
}

@TechReport{Buhan:2006:FBL,
  author =       "Ileana Buhan",
  title =        "Feeling is believing: a location limited channel based
                 on grip pattern biometrics and cryptanalysis",
  type =         "{CTIT} technical report",
  number =       "06-29",
  institution =  "Centre for Telematics and Information Technology,
                 University of Twente",
  address =      "Enschede, The Netherlands",
  pages =        "10",
  year =         "2006",
  ISSN =         "1381-3625",
  bibdate =      "Thu May 12 06:43:16 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "biometrie; cryptologie; systeemontwikkeling
                 (informatica)",
}

@Article{Burr:2006:CHS,
  author =       "William E. Burr",
  title =        "Cryptographic Hash Standards: Where Do We Go from
                 Here?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "2",
  pages =        "88--91",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.37",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Butler:2006:FAK,
  author =       "Frederick Butler and Iliano Cervesato and Aaron D.
                 Jaggard and Andre Scedrov and Christopher Walstad",
  title =        "Formal analysis of {Kerberos 5}",
  journal =      j-THEOR-COMP-SCI,
  volume =       "367",
  number =       "1--2",
  pages =        "57--87",
  day =          "24",
  month =        nov,
  year =         "2006",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Mar 29 08:55:27 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Caballero-Gil:2006:SSB,
  author =       "P. Caballero-Gil and C. Hern{\'a}ndez-Goya",
  title =        "Secret sharing based on a hard-on-average problem",
  journal =      j-LINEAR-ALGEBRA-APPL,
  volume =       "414",
  number =       "2--3",
  pages =        "626--631",
  day =          "15",
  month =        apr,
  year =         "2006",
  CODEN =        "LAAPAW",
  ISSN =         "0024-3795 (print), 1873-1856 (electronic)",
  ISSN-L =       "0024-3795",
  bibdate =      "Mon Mar 13 16:56:13 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00243795",
  acknowledgement = ack-nhfb,
  fjournal =     "Linear Algebra and its Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00243795",
}

@Article{Candebat:2006:SPM,
  author =       "Thibault Candebat and David Gray",
  title =        "Secure pseudonym management using mediated
                 identity-based encryption",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "249--267",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:11 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Canetti:2006:SCC,
  author =       "Ran Canetti",
  title =        "Security and composition of cryptographic protocols: a
                 tutorial (part {I})",
  journal =      j-SIGACT,
  volume =       "37",
  number =       "3",
  pages =        "67--92",
  month =        sep,
  year =         "2006",
  CODEN =        "SIGNDM",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Sat Dec 06 15:20:39 2003",
  bibsource =    "DBLP;
                 http://dblp.uni-trier.de/db/journals/sigact/sigact37.html#Canetti06;
                 https://www.math.utah.edu/pub/mirrors/ftp.ira.uka.de/bibliography/Misc/DBLP/2006.bib;
                 https://www.math.utah.edu/pub/mirrors/ftp.ira.uka.de/bibliography/Misc/security.2.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  URL =          "http://doi.acm.org/10.1145/1165555.1165570",
  acknowledgement = ack-nhfb,
  added-at =     "Wed Sep 12 09:24:11 2007",
  added-by =     "msteiner",
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
  online =       "Available also at the Cryptology ePrint Archive,
                 Report 2006/465 (\url{http://eprint.iacr.org/2006})",
}

@InProceedings{Canteaut:2006:OPR,
  author =       "Anne Canteaut",
  title =        "Open Problems Related to Algebraic Attacks on Stream
                 Ciphers",
  crossref =     "Ytrehus:2006:CCI",
  pages =        "120--134",
  year =         "2006",
  bibdate =      "Tue Jun 28 08:19:10 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Casselman:2006:MTE,
  author =       "Bill Casselman",
  title =        "Mathematical theory of the {Enigma} machine",
  journal =      j-NAMS,
  volume =       "53",
  number =       "4",
  pages =        "433--433",
  month =        apr,
  year =         "2006",
  CODEN =        "AMNOAN",
  ISSN =         "0002-9920 (print), 1088-9477 (electronic)",
  ISSN-L =       "0002-9920",
  bibdate =      "Fri Mar 24 17:01:58 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "The front cover of this issue displays eight pages of
                 Alan Turing's description of the Enigma machine. The
                 issue is a special tribute to Kurt G{\"o}del for the
                 centenary of his birth.",
  URL =          "http://www.mathaware.org/;
                 http://www.nationalarchives.gov.uk/;
                 http://www.turingarchive.org/browse.php/C/30",
  acknowledgement = ack-nhfb,
  fjournal =     "Notices of the American Mathematical Society",
  journal-URL =  "http://www.ams.org/notices/",
}

@Article{Chandramouli:2006:BPA,
  author =       "R. Chandramouli and S. Bapatla and K. P. Subbalakshmi
                 and R. N. Uma",
  title =        "Battery power-aware encryption",
  journal =      j-TISSEC,
  volume =       "9",
  number =       "2",
  pages =        "162--180",
  month =        may,
  year =         "2006",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1151414.1151417",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Sat Aug 26 08:10:38 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Minimizing power consumption is crucial in battery
                 power-limited secure wireless mobile networks. In this
                 paper, we (a) introduce a hardware/software set-up to
                 measure the battery power consumption of encryption
                 algorithms through real-life experimentation, (b) based
                 on the profiled data, propose mathematical models to
                 capture the relationships between power consumption and
                 security, and (c) formulate and solve security
                 maximization subject to power constraints. Numerical
                 results are presented to illustrate the gains that can
                 be achieved in using solutions of the proposed security
                 maximization problems subject to power constraints.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Cheon:2006:KPC,
  author =       "Jung Hee Cheon and Woo-Hwan Kim and Hyun Soo Nam",
  title =        "Known-plaintext cryptanalysis of the {Domingo--Ferrer}
                 algebraic privacy homomorphism scheme",
  journal =      j-INFO-PROC-LETT,
  volume =       "97",
  number =       "3",
  pages =        "118--123",
  day =          "14",
  month =        feb,
  year =         "2006",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 18:41:07 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Chin:2006:HSI,
  author =       "Chong Siew Chin and Andrew Teoh Beng Jin and David Ngo
                 Chek Ling",
  title =        "High security {Iris} verification system based on
                 random secret integration",
  journal =      j-COMP-VIS-IMAGE-UNDERSTANDING,
  volume =       "102",
  number =       "2",
  pages =        "169--177",
  month =        may,
  year =         "2006",
  CODEN =        "CVIUF4",
  ISSN =         "1077-3142 (print), 1090-235X (electronic)",
  ISSN-L =       "1077-3142",
  bibdate =      "Sat Apr 2 10:55:50 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/10773142",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Vision and Image Understanding",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10773142",
}

@PhdThesis{Choi:2006:CHP,
  author =       "Su-Jeong Choi",
  title =        "Cryptanalysis of a homomorphic public-key
                 cryptosystem",
  type =         "Thesis ({Ph.D.})",
  school =       "University of London",
  address =      "London, UK",
  pages =        "????",
  year =         "2006",
  bibdate =      "Fri May 13 05:48:56 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Chuang:2006:USF,
  author =       "J.-C. Chuang and C.-C. Chang",
  title =        "Using A Simple and Fast Image Compression Algorithm To
                 Hide Secret Information",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "28",
  number =       "4",
  pages =        "329--333",
  year =         "2006",
  DOI =          "https://doi.org/10.1080/1206212X.2006.11441818",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:23:29 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.1080/1206212X.2006.11441818",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "11 Jul 2015",
}

@Book{Cid:2006:AAA,
  author =       "Carlos Cid and Sean Murphy and Matthew Robshaw",
  title =        "Algebraic Aspects of the {Advanced Encryption
                 Standard}",
  volume =       "310",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "125",
  year =         "2006",
  ISBN =         "0-387-24363-1",
  ISBN-13 =      "978-0-387-24363-4",
  LCCN =         "????",
  bibdate =      "Mon Jun 12 18:49:18 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.gbv.de:20011/gvk",
  series =       "Advances in Information Security",
  URL =          "http://deposit.ddb.de/cgi-bin/dokserv?id=2739239&prov=M&dok\_var=1&dok\_ext=htm",
  acknowledgement = ack-nhfb,
}

@Article{Cimato:2006:PVC,
  author =       "S. Cimato and R. De Prisco and A. {De Santis}",
  title =        "Probabilistic Visual Cryptography Schemes",
  journal =      j-COMP-J,
  volume =       "49",
  number =       "1",
  pages =        "97--107",
  month =        jan,
  year =         "2006",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxh152",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Dec 21 17:38:55 MST 2005",
  bibsource =    "http://comjnl.oxfordjournals.org/content/vol49/issue1/index.dtl;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://comjnl.oxfordjournals.org/cgi/content/abstract/49/1/97;
                 http://comjnl.oxfordjournals.org/cgi/content/full/49/1/97;
                 http://comjnl.oxfordjournals.org/cgi/reprint/49/1/97",
  abstract =     "Visual cryptography schemes allow the encoding of a
                 secret image, consisting of black or white pixels, into
                 n shares which are distributed to the participants. The
                 shares are such that only qualified subsets of
                 participants can `visually' recover the secret image.
                 The secret pixels are shared with techniques that
                 subdivide each secret pixel into a certain number $m$,
                 $ m \geq 2 $ of subpixels. Such a parameter $m$ is
                 called pixel expansion. Recently Yang introduced a
                 probabilistic model. In such a model the pixel
                 expansion $m$ is $1$, that is, there is no pixel
                 expansion. The reconstruction of the image however is
                 probabilistic, meaning that a secret pixel will be
                 correctly reconstructed only with a certain
                 probability. In this paper we propose a generalization
                 of the model proposed by Yang. In our model we fix the
                 pixel expansion $ m \geq 1 $ that can be tolerated and
                 we consider probabilistic schemes attaining such a
                 pixel expansion. For $ m = 1 $ our model reduces to the
                 one of Yang. For big enough values of $m$, for which a
                 deterministic scheme exists, our model reduces to the
                 classical deterministic model. We show that between
                 these two extremes one can trade the probability factor
                 of the scheme with the pixel expansion. Moreover, we
                 prove that there is a one-to-one mapping between
                 deterministic schemes and probabilistic schemes with no
                 pixel expansion, where contrast is traded for the
                 probability factor.",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Cimato:2006:UMU,
  author =       "Stelvio Cimato and Antonella Cresti and Paolo D'Arco",
  title =        "A unified model for unconditionally secure key
                 distribution",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "45--64",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14102",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:04 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Climent:2006:NEC,
  author =       "Joan-Josep Climent and Francisco Ferr{\'a}ndez and
                 Jos{\'e}-Francisco Vicent and Antonio Zamora",
  title =        "A nonlinear elliptic curve cryptosystem based on
                 matrices",
  journal =      j-APPL-MATH-COMP,
  volume =       "174",
  number =       "1",
  pages =        "150--164",
  day =          "1",
  month =        mar,
  year =         "2006",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:53 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Book{Cook:2006:CEG,
  author =       "Debra Cook and Angelos Keromytis",
  title =        "CryptoGraphics: Exploiting Graphics Cards for
                 Security",
  volume =       "25",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  year =         "2006",
  ISBN =         "0-387-29015-X",
  ISBN-13 =      "978-0-387-29015-7",
  LCCN =         "????",
  bibdate =      "Fri Aug 25 15:30:25 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  price =        "US\$99.00",
  series =       "Advances in information security",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0663/2006925092-d.html",
  acknowledgement = ack-nhfb,
  remark =       "From the publishers: ``This book explores the
                 potential for implementing ciphers within GPUs, and
                 describes the relevance of GPU-based encryption to the
                 security of applications involving remote displays. As
                 the processing power of GPUs increases, research
                 involving the use of GPUs for general purpose computing
                 has arisen. This work extends such research by
                 considering the use of a GPU as a parallel processor
                 for encrypting data. The authors evaluate the
                 operations found in symmetric and asymmetric key
                 ciphers to determine if encryption can be programmed in
                 existing GPUs. A detailed description for a GPU based
                 implementation of AES is provided. The feasibility of
                 GPU-based encryption allows the authors to explore the
                 use of a GPU as a trusted system component. Unencrypted
                 display data can be confined to the GPU to avoid
                 exposing it to any malware running on the operating
                 system.''",
}

@Article{Coron:2006:WC,
  author =       "J.-S. Coron",
  title =        "What Is Cryptography?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "70--73",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.29",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588831.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588831",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Correia:2006:CAB,
  author =       "Miguel Correia and Nuno Ferreira Neves and Paulo
                 Ver{\'\i}ssimo",
  title =        "From Consensus to Atomic Broadcast: Time-Free
                 {Byzantine}-Resistant Protocols without Signatures",
  journal =      j-COMP-J,
  volume =       "49",
  number =       "1",
  pages =        "82--96",
  month =        jan,
  year =         "2006",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxh145",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Dec 21 17:38:55 MST 2005",
  bibsource =    "http://comjnl.oxfordjournals.org/content/vol49/issue1/index.dtl;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://comjnl.oxfordjournals.org/cgi/content/abstract/49/1/82;
                 http://comjnl.oxfordjournals.org/cgi/content/full/49/1/82;
                 http://comjnl.oxfordjournals.org/cgi/reprint/49/1/82",
  abstract =     "This paper proposes a stack of three
                 Byzantine-resistant protocols aimed to be used in
                 practical distributed systems: multi-valued consensus,
                 vector consensus and atomic broadcast. These protocols
                 are designed as successive transformations from one to
                 another. The first protocol, multi-valued consensus, is
                 implemented on top of a randomized binary consensus and
                 a reliable broadcast protocol. The protocols share a
                 set of important structural properties. First, they do
                 not use digital signatures constructed with public-key
                 cryptography, a well-known performance bottleneck in
                 this kind of protocols. Second, they are time-free,
                 i.e. they make no synchrony assumptions, since these
                 assumptions are often vulnerable to subtle but
                 effective attacks. Third, they are completely
                 decentralized, thus avoiding the cost of detecting
                 corrupt leaders. Fourth, they have optimal resilience,
                 i.e. they tolerate the failure of $ f = \lfloor (n - 1)
                 / 3 \rfloor $ out of a total of $n$ processes. In terms
                 of time complexity, the multi-valued consensus protocol
                 terminates in a constant expected number of rounds,
                 while the vector consensus and atomic broadcast
                 protocols have $ O(f) $ complexity. The paper also
                 proves the equivalence between multi-valued consensus
                 and atomic broadcast in the Byzantine failure model
                 without signatures. A similar proof is given for the
                 equivalence between multi-valued consensus and vector
                 consensus. These two results have theoretical relevance
                 since they show once more that consensus is a
                 fundamental problem in distributed systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Cortier:2006:SAP,
  author =       "V{\'e}ronique Cortier and St{\'e}phanie Delaune and
                 Pascal Lafourcade",
  title =        "A survey of algebraic properties used in cryptographic
                 protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "1--43",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14101",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:04 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cremers:2006:ISE,
  author =       "C. J. F. Cremers and S. Mauw and E. P. de Vink",
  title =        "Injective synchronisation: an extension of the
                 authentication hierarchy",
  journal =      j-THEOR-COMP-SCI,
  volume =       "367",
  number =       "1--2",
  pages =        "139--161",
  day =          "24",
  month =        nov,
  year =         "2006",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Mar 29 08:55:27 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Das:2006:NRU,
  author =       "Manik Lal Das and Ashutosh Saxena and Ved P. Gulati
                 and Deepak B. Phatak",
  title =        "A novel remote user authentication scheme using
                 bilinear pairings",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "184--189",
  month =        may,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001525",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dean:2006:IMB,
  author =       "Roger Dean",
  title =        "Identity management --- back to the user",
  journal =      j-NETWORK-SECURITY,
  volume =       "2006",
  number =       "12",
  pages =        "4--7",
  month =        dec,
  year =         "2006",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(06)70460-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:34 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485806704603",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Delaune:2006:DPS,
  author =       "St{\'e}phanie Delaune and Florent Jacquemard",
  title =        "Decision Procedures for the Security of Protocols with
                 Probabilistic Encryption against Offline Dictionary
                 Attacks",
  journal =      j-J-AUTOM-REASON,
  volume =       "36",
  number =       "1--2",
  pages =        "85--124",
  month =        jan,
  year =         "2006",
  CODEN =        "JAREEW",
  DOI =          "https://doi.org/10.1007/s10817-005-9017-7",
  ISSN =         "0168-7433 (print), 1573-0670 (electronic)",
  ISSN-L =       "0168-7433",
  bibdate =      "Sat Apr 2 11:12:47 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jautomreason.bib",
  URL =          "http://link.springer.com/article/10.1007/s10817-005-9017-7",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Autom. Reason.",
  fjournal =     "Journal of Automated Reasoning",
  journal-URL =  "http://link.springer.com/journal/10817",
}

@Article{Deng:2006:OOC,
  author =       "Yan-Xiang Deng and Chao-Jang Hwang and Jiang-Lung
                 Liu",
  title =        "An object-oriented cryptosystem based on two-level
                 reconfigurable computing architecture",
  journal =      j-J-SYST-SOFTW,
  volume =       "79",
  number =       "4",
  pages =        "466--479",
  month =        apr,
  year =         "2006",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:01 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@InProceedings{Diene:2006:DLE,
  author =       "Adama Diene and Jintai Ding and Jason E. Gower and
                 Timothy J. Hodges and Zhijun Yin",
  title =        "Dimension of the Linearization Equations of the
                 {Matsumoto--Imai} Cryptosystems",
  crossref =     "Ytrehus:2006:CCI",
  pages =        "242--251",
  year =         "2006",
  bibdate =      "Tue Jun 28 08:19:10 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ding:2006:SSS,
  author =       "Cunsheng Ding and Arto Salomaa",
  title =        "Secret Sharing Schemes with Nice Access Structures",
  journal =      j-FUND-INFO,
  volume =       "73",
  number =       "1--2",
  pages =        "51--63",
  month =        oct,
  year =         "2006",
  CODEN =        "FUMAAJ",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:04:36 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{DiRaimondo:2006:PST,
  author =       "Mario {Di Raimondo} and Rosario Gennaro",
  title =        "Provably secure threshold password-authenticated key
                 exchange",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "72",
  number =       "6",
  pages =        "978--1001",
  month =        sep,
  year =         "2006",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2006.02.002",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:27:01 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S002200000600033X",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Article{Doyle:2006:SCK,
  author =       "Barry Doyle and Stuart Bell and Alan F. Smeaton and
                 Kealan McCusker and Noel E. O'Connor",
  title =        "Security Considerations and Key Negotiation Techniques
                 for Power Constrained Sensor Networks",
  journal =      j-COMP-J,
  volume =       "49",
  number =       "4",
  pages =        "443--453",
  month =        jul,
  year =         "2006",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxl023",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Jun 23 11:56:45 MDT 2006",
  bibsource =    "http://comjnl.oxfordjournals.org/content/vol49/issue4/index.dtl;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://comjnl.oxfordjournals.org/cgi/content/abstract/49/4/443;
                 http://comjnl.oxfordjournals.org/cgi/content/full/49/4/443;
                 http://comjnl.oxfordjournals.org/cgi/reprint/49/4/443",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@PhdThesis{Dunkelman:2006:TCB,
  author =       "Orr Dunkelman",
  title =        "Techniques for cryptanalysis of block ciphers",
  type =         "Thesis ({Ph.D.})",
  school =       "Faculty of Computer Science, Technion --- Israel
                 Institute of Technology",
  address =      "Haifa, Israel",
  pages =        "x + 204",
  year =         "2006",
  bibdate =      "Sat May 14 07:39:53 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  advisor =      "Eli Biham",
  remark =       "Added title page and abstract in Hebrew.",
}

@InProceedings{Faure:2006:NPK,
  author =       "C{\'e}dric Faure and Pierre Loidreau",
  title =        "A New Public-Key Cryptosystem Based on the Problem of
                 Reconstructing $p$-Polynomials",
  crossref =     "Ytrehus:2006:CCI",
  pages =        "304--315",
  year =         "2006",
  bibdate =      "Tue Jun 28 08:19:10 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Felke:2006:ATH,
  author =       "Patrick Felke",
  title =        "On the Affine Transformations of {HFE}-Cryptosystems
                 and Systems with Branches",
  crossref =     "Ytrehus:2006:CCI",
  pages =        "229--241",
  year =         "2006",
  bibdate =      "Tue Jun 28 08:19:10 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Misc{Ferguson:2006:ACE,
  author =       "Niels Ferguson",
  title =        "{AES-CBC} + {Elephant} diffuser: A disk encryption
                 algorithm for {Windows Vista}",
  howpublished = "Unknown",
  year =         "2006",
  bibdate =      "Mon Mar 09 12:02:09 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 36]{Schneier:2015:SWC}.",
}

@MastersThesis{Finnigin:2006:CPN,
  author =       "Kevin M. Finnigin",
  title =        "Cryptanalysis of Pseudorandom Number Generators in
                 Wireless Sensor Networks",
  type =         "{Master}'s thesis",
  school =       "Department of Electrical and Computer Engineering, Air
                 Force Institute of Technology",
  address =      "Wright-Patterson AFB, OH, USA",
  year =         "2006",
  bibdate =      "Fri May 13 06:41:39 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "This work presents a brute-force attack on an elliptic
                 curve cryptosystem implemented on UC Berkeley's TinyOS
                 operating system for wireless sensor networks. The
                 attack exploits the short period of the pseudorandom
                 number generator (PRNG) used by the cryptosystem to
                 generate private keys. The attack assumes a laptop is
                 listening promiscuously to network traffic for key
                 messages and requires only the sensor node's public key
                 and network address to discover the private key.
                 Experimental results show that roughly 50\% of the
                 address space leads to a private key compromise in 25
                 minutes on average. Furthermore, approximately 32\% of
                 the address space leads to a compromise in 17 minutes
                 on average, 11\% in 6 minutes, and the remaining 7\% in
                 2 minutes or less. Two alternatives to the PRNG are
                 examined that mitigate the brute-force attack. The
                 alternatives are implemented on the Mica2 mote and
                 examined to determine CPU cycles for execution and
                 memory requirements. The recommended PRNG requires 73
                 CPU cycles in the worst case and uses 66 bytes of
                 memory. The period of the PRNG is uniform for all mote
                 addresses and theoretically requires 6.6 years on
                 average for a key compromise for the attack used in
                 this thesis.",
  acknowledgement = ack-nhfb,
}

@Article{Frincke:2006:ESI,
  author =       "D. Frincke and S. Oudekirk and B. Popovsky",
  title =        "Editorial: {Special} issue on resources for the
                 computer security and information assurance curriculum:
                 {Issue 1}",
  journal =      j-JERIC,
  volume =       "6",
  number =       "3",
  pages =        "1:1--1:??",
  month =        sep,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1243481.1243482",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:25 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "This editorial introduces a set of articles in the
                 JERIC special issue on resources for the computer
                 security and information assurance curriculum. It
                 begins with a discussion of why such a special edition
                 is needed and continues by outlining the articles in
                 this volume, as follows: an innovative model for
                 security education based on teaching hospitals;
                 teaching context in computer security through
                 metaphors; tools supporting exploration of
                 cryptography; suggestions for a hands-on Linux course
                 geared towards a student population that includes
                 noncomputer scientists; and finally, projects suitable
                 for a course in computer forensics.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Journal on Educational Resources in Computing
                 (JERIC)",
  keywords =     "computer forensics; protection; security",
}

@Article{Furnell:2006:RPS,
  author =       "Steven Furnell and Leith Zekri",
  title =        "Replacing passwords: in search of the secret remedy",
  journal =      j-NETWORK-SECURITY,
  volume =       "2006",
  number =       "1",
  pages =        "4--8",
  month =        jan,
  year =         "2006",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(06)70321-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:22 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348580670321X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Book{Gallagher:2006:HSB,
  author =       "Tom Gallagher and Bryan Jeffries and Lawrence
                 Landauer",
  title =        "Hunting security bugs",
  publisher =    pub-MICROSOFT,
  address =      pub-MICROSOFT:adr,
  pages =        "xxv + 559",
  year =         "2006",
  ISBN =         "0-7356-2187-X",
  ISBN-13 =      "978-0-7356-2187-9",
  LCCN =         "QA76.9.A25 G356 2006",
  bibdate =      "Tue Jul 3 15:44:39 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Secure software development series",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Computer software; Testing;
                 Computer networks; Security measures",
}

@Article{Garcia-Pasquel:2006:GCT,
  author =       "Jes{\'u}s Adolfo Garc{\'\i}a-Pasquel and Jos{\'e}
                 Galaviz",
  title =        "{Ganz{\'u}a}: a cryptanalysis tool for monoalphabetic
                 and polyalphabetic ciphers",
  journal =      j-JERIC,
  volume =       "6",
  number =       "3",
  pages =        "4:1--4:??",
  month =        sep,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1243481.1243485",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:25 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Many introductory courses to cryptology and computer
                 security start with or include a discussion of
                 classical ciphers that usually contemplates some
                 cryptanalysis techniques used to break them. Ganz{\'u}a
                 (picklock in Spanish) is an application designed to
                 assist the cryptanalysis of ciphertext obtained with
                 monoalphabetic or polyalphabetic ciphers. It can use
                 almost arbitrary character sets for the plain and
                 cipher alphabets as well as obtain the standard
                 relative frequencies of many languages and provide
                 other useful data.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Journal on Educational Resources in Computing
                 (JERIC)",
  keywords =     "classical cryptography; cryptology",
}

@Article{Gaudry:2006:ACM,
  author =       "P. Gaudry and T. Houtmann and D. Kohel and C.
                 Ritzenthaler and A. Weng",
  title =        "The $2$-Adic {CM} Method for Genus $2$ Curves with
                 Application to Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "4284",
  pages =        "114--129",
  year =         "2006",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11935230_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 13 08:42:37 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2006a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11935230_8.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11935230",
  book-URL =     "http://www.springerlink.com/content/978-3-540-49476-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gennaro:2006:FPB,
  author =       "Rosario Gennaro and Yehuda Lindell",
  title =        "A framework for password-based authenticated key
                 exchange",
  journal =      j-TISSEC,
  volume =       "9",
  number =       "2",
  pages =        "181--234",
  month =        may,
  year =         "2006",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1151414.1151418",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Sat Aug 26 08:10:38 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "In this paper, we present a general framework for
                 password-based authenticated key exchange protocols, in
                 the common reference string model. Our protocol is
                 actually an abstraction of the key exchange protocol of
                 Katz et al. and is based on the recently introduced
                 notion of smooth projective hashing by Cramer and
                 Shoup. We gain a number of benefits from this
                 abstraction. First, we obtain a modular protocol that
                 can be described using just three high-level
                 cryptographic tools. This allows a simple and intuitive
                 understanding of its security. Second, our proof of
                 security is significantly simpler and more modular.
                 Third, we are able to derive analogs to the Katz et al.
                 protocol under additional cryptographic assumptions.
                 Specifically, in addition to the DDH assumption used by
                 Katz et al., we obtain protocols under both the
                 quadratic and N-residuosity assumptions. In order to
                 achieve this, we construct new smooth projective hash
                 functions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Gennaro:2006:RC,
  author =       "Rosario Gennaro",
  title =        "Randomness in Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "2",
  pages =        "64--67",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.49",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@InProceedings{Gentry:2006:EES,
  author =       "Craig Gentry and Zulfikar Ramzan and David P.
                 Woodruff",
  title =        "Explicit Exclusive Set Systems with Applications to
                 Broadcast Encryption",
  crossref =     "IEEE:2006:AIS",
  pages =        "27--38",
  year =         "2006",
  DOI =          "https://doi.org/10.1109/FOCS.2006.27",
  bibdate =      "Thu Apr 12 09:33:08 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2000.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4031329",
}

@Article{Giraud:2006:RIR,
  author =       "C. Giraud",
  title =        "An {RSA} Implementation Resistant to Fault Attacks and
                 to Simple Power Analysis",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "55",
  number =       "9",
  pages =        "1116--1120",
  month =        sep,
  year =         "2006",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2006.135",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 15:35:56 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1668039",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Gonda:2006:NMR,
  author =       "J. Gonda",
  title =        "The Number of the Modulo $n$ Roots of the Polynomial $
                 x^v $ --- $ x^v $ and the {RSA}",
  journal =      j-J-UCS,
  volume =       "12",
  number =       "9",
  pages =        "1215--1228",
  month =        "????",
  year =         "2006",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Thu Jul 10 06:41:41 MDT 2008",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_12_9/the_number_of_the",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Gordon:2006:UAV,
  author =       "Sarah Gordon",
  title =        "Understanding the Adversary: Virus Writers and
                 Beyond",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "5",
  pages =        "67--70",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.137",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Goshi:2006:ADM,
  author =       "Justin Goshi and Richard E. Ladner",
  title =        "Algorithms for dynamic multicast key distribution",
  journal =      j-ACM-J-EXP-ALGORITHMICS,
  volume =       "11",
  pages =        "1.4:1--1.4:??",
  month =        "????",
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1187436.1210587",
  ISSN =         "1084-6654",
  bibdate =      "Mon Oct 6 16:06:20 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We study the problem of multicast key distribution for
                 group security. Secure group communication systems
                 typically rely on a group key, which is a secret shared
                 among the members of the group. This key is used to
                 provide privacy by encrypting all group communications.
                 Because groups can be large and highly dynamic, it
                 becomes necessary to change the group key in a scalable
                 and secure fashion when members join and leave the
                 group. We present a series of algorithms for solving
                 this problem based on key trees. The algorithms attempt
                 to minimize the worst-case communication cost of
                 updates by maintaining balanced key tree structures. We
                 focus on the trade-off between the communication cost
                 because of the structure of the tree and that due to
                 the overhead of restructuring the tree to maintain its
                 balanced structure. The algorithms are analyzed for
                 worst-case tree structure bounds and evaluated
                 empirically via simulations.",
  acknowledgement = ack-nhfb,
  articleno =    "1.4",
  fjournal =     "Journal of Experimental Algorithmics (JEA)",
  keywords =     "dynamic key distribution; experimental algorithms;
                 multicast",
}

@Article{Granger:2006:SCA,
  author =       "R. Granger and D. Page and M. Stam",
  title =        "On Small Characteristic Algebraic Tori in
                 Pairing-Based Cryptography",
  journal =      j-LMS-J-COMPUT-MATH,
  volume =       "9",
  pages =        "64--85",
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1112/S1461157000001194",
  ISSN =         "1461-1570",
  bibdate =      "Tue Oct 25 07:42:19 MDT 2011",
  bibsource =    "http://journals.cambridge.org/action/displayJournal?jid=JCM;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lms-j-comput-math.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "LMS J. Comput. Math.",
  fjournal =     "LMS Journal of Computation and Mathematics",
  onlinedate =   "01 February 2010",
}

@Article{Gratzer:2006:CLE,
  author =       "Vanessa Gratzer and David Naccache",
  title =        "Cryptography, Law Enforcement, and Mobile
                 Communications",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "67--70",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.148",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Guizzo:2006:BIC,
  author =       "Erico Guizzo",
  title =        "Britain's identity crisis [biometric ID cards]",
  journal =      j-IEEE-SPECTRUM,
  volume =       "43",
  number =       "1",
  pages =        "42--43",
  month =        jan,
  year =         "2006",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2006.1572352",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "biometric ID cards; Biometrics; biometrics (access
                 control); Britain; Computer architecture; Cryptography;
                 Data privacy; Data security; database management
                 systems; Databases; Government; government data
                 processing; government-controlled central database;
                 identity crisis; Identity management systems; identity
                 theft; Insurance; microchip; National security;
                 personal information; terrorism; UK",
}

@TechReport{Gutterman:2006:ALR,
  author =       "Zvi Gutterman and Benny Pinkas and Tzachy Reinman",
  title =        "Analysis of the {Linux} Random Number Generator",
  type =         "Report",
  institution =  "The Hebrew University of Jerusalem and University of
                 Haifa",
  address =      "Jerusalem and Haifa, Israel",
  pages =        "18",
  day =          "6",
  month =        mar,
  year =         "2006",
  bibdate =      "Sat Dec 24 11:30:48 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.pinkas.net/PAPERS/gpr06.pdf",
  abstract =     "Linux is the most popular open source project. The
                 Linux random number generator is part of the kernel of
                 all Linux distributions and is based on generating
                 randomness from entropy of operating system events. The
                 output of this generator is used for almost every
                 security protocol, including TLS/SSL key generation,
                 choosing TCP sequence numbers, and file system and
                 email encryption. Although the generator is part of an
                 open source project, its source code (about 2500 lines
                 of code) is poorly documented, and patched with
                 hundreds of code patches.\par We used dynamic and
                 static reverse engineering to learn the operation of
                 this generator. This paper presents a description of
                 the underlying algorithms and exposes several security
                 vulnerabilities. In particular, we show an attack on
                 the forward security of the generator which enables an
                 adversary who exposes the state of the generator to
                 compute previous states and outputs. In addition we
                 present a few cryptographic flaws in the design of the
                 generator, as well as measurements of the actual
                 entropy collected by it, and a critical analysis of the
                 use of the generator in Linux distributions on
                 disk-less devices.",
  acknowledgement = ack-nhfb,
}

@Article{Hanaoka:2006:USA,
  author =       "Goichiro Hanaoka and Junji Shikata and Yumiko Hanaoka
                 and Hideki Imai",
  title =        "Unconditionally Secure Anonymous Encryption and Group
                 Authentication",
  journal =      j-COMP-J,
  volume =       "49",
  number =       "3",
  pages =        "310--321",
  month =        may,
  year =         "2006",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxh149",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Apr 21 15:45:40 MDT 2006",
  bibsource =    "http://comjnl.oxfordjournals.org/content/vol49/issue3/index.dtl;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://comjnl.oxfordjournals.org/cgi/content/abstract/49/3/310;
                 http://comjnl.oxfordjournals.org/cgi/content/full/49/3/310;
                 http://comjnl.oxfordjournals.org/cgi/reprint/49/3/310",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@InProceedings{Harnik:2006:CNI,
  author =       "Danny Harnik and Moni Naor",
  title =        "On the Compressibility of {NP} Instances and
                 Cryptographic Applications",
  crossref =     "IEEE:2006:AIS",
  pages =        "719--728",
  year =         "2006",
  DOI =          "https://doi.org/10.1109/FOCS.2006.54",
  bibdate =      "Thu Apr 12 09:33:15 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2000.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4031329",
}

@Article{Hars:2006:MIA,
  author =       "Laszlo Hars",
  title =        "Modular Inverse Algorithms Without Multiplications for
                 Cryptographic Applications",
  journal =      j-EURASIP-J-EMBED-SYS,
  volume =       "2006",
  pages =        "1--13",
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1155/ES/2006/32192",
  ISSN =         "1687-3955 (print), 1687-3963 (electronic)",
  ISSN-L =       "1687-3955",
  bibdate =      "Wed Dec 28 09:54:06 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  note =         "Article ID 32192.",
  URL =          "http://downloads.hindawi.com/journals/es/2006/032192.pdf",
  abstract =     "Hardware and algorithmic optimization techniques are
                 presented to the left-shift, right-shift, and the
                 traditional Euclidean-modular inverse algorithms.
                 Theoretical arguments and extensive simulations
                 determined the resulting expected running time. On many
                 computational platforms these turn out to be the
                 fastest known algorithms for moderate operand lengths.
                 They are based on variants of Euclidean-type extended
                 GCD algorithms. On the considered computational
                 platforms for operand lengths used in cryptography, the
                 fastest presented modular inverse algorithms need about
                 twice the time of modular multiplications, or even
                 less. Consequently, in elliptic curve cryptography
                 delaying modular divisions is slower (affine
                 coordinates are the best) and the RSA and ElGamal
                 cryptosystems can be accelerated.",
  acknowledgement = ack-nhfb,
  fjournal =     "EURASIP Journal on Embedded Systems",
}

@Book{Haufler:2006:SWN,
  author =       "Hervie Haufler",
  title =        "The spies who never were: the true story of the {Nazi}
                 spies who were actually {Allied} double agents",
  publisher =    "NAL Caliber",
  address =      "New York, NY, USA",
  pages =        "????",
  year =         "2006",
  ISBN =         "0-451-21751-9 (paperback)",
  ISBN-13 =      "978-0-451-21751-6 (paperback)",
  LCCN =         "D810.S7 H37 2006",
  bibdate =      "Thu Feb 23 07:18:53 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip0517/2005022622.html",
  acknowledgement = ack-nhfb,
  keywords =     "Arthur George Owens; Balloon; Britain's Twenty
                 Committee (XX or Double Cross); Dusko Popov; Eddie
                 Chapman; Elvira Chaudoir; Hamlet; Juan Pujol (Garbo);
                 Lipstick; Puppet",
  remark =       "The most delicious irony -- Masterminds of the double
                 cross -- ``Ultra,'' the double agents' indispensable
                 ally -- In the beginning, snow -- Tricycle, the
                 Abwehr's Yugoslav socialite -- Tate, convert from
                 Naziism -- ZigZag, the most daring -- Codename
                 ``Brutus'' -- Treasure, ``first violin'' in the
                 deception ``orchestra'' -- Garbo, the greatest -- Mutt,
                 Jeff, and other lesser agents -- Tricycle's American
                 misadventure -- Trickery in the Middle East -- For
                 Operation Torch, strategic deceptions -- Anywhere but
                 Sicily -- Prelude to fortitude -- Double cross in
                 jeopardy -- The ``grand strategic deception'' --
                 Deceptions beyond D-Day -- The final reckoning..",
  subject =      "World War, 1939-1945; Secret service; Germany; Great
                 Britain; Espionage; History; 20th century",
}

@Book{Hayashi:2006:QIT,
  author =       "Masahito Hayashi",
  title =        "Quantum Information Theory: An Introduction",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  year =         "2006",
  ISBN =         "3-540-30265-4",
  ISBN-13 =      "978-3-540-30265-0",
  LCCN =         "????",
  bibdate =      "Tue Jun 13 10:22:34 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.bibsys.no:2100/BIBSYS",
  URL =          "http://www.springer.com/dal/home?SGWID=1-102-22-100724694-0",
  acknowledgement = ack-nhfb,
  keywords =     "quantum encryption; quantum state transmission
                 (quantum error-correction); quantum teleportation;
                 superdense coding",
  publishersnote = "This graduate-level textbook provides a unified
                 viewpoint of quantum information theory that merges key
                 topics from both the information-theoretic and quantum-
                 mechanical viewpoints. The text provides a unified
                 viewpoint of quantum information theory and lucid
                 explanations of those basic results, so that the reader
                 fundamentally grasps advances and challenges. This
                 unified approach makes accessible such advanced topics
                 in quantum communication as quantum teleportation,
                 superdense coding, quantum state transmission (quantum
                 error-correction), and quantum encryption.",
}

@PhdThesis{Henderson:2006:CBG,
  author =       "Roger William Henderson",
  title =        "Cryptanalysis of braid group cryptosystem and related
                 combinatorial structures",
  type =         "Thesis ({Ph.D.})",
  school =       "University of London",
  address =      "London, UK",
  pages =        "????",
  year =         "2006",
  bibdate =      "Fri May 13 05:50:36 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Henry:2006:TFA,
  author =       "Paul A. Henry",
  title =        "Two-factor authentication --- a look behind the
                 headlines",
  journal =      j-NETWORK-SECURITY,
  volume =       "2006",
  number =       "4",
  pages =        "18--19",
  month =        apr,
  year =         "2006",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(06)70360-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:25 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485806703609",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hernandez-Castro:2006:SGG,
  author =       "Julio C. Hernandez-Castro and Ignacio Blasco-Lopez and
                 Juan M. Estevez-Tapiador and Arturo
                 Ribagorda-Garnacho",
  title =        "Steganography in games: a general methodology and its
                 application to the game of Go",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "64--71",
  month =        feb,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805002002",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Herranz:2006:DIB,
  author =       "Javier Herranz",
  title =        "Deterministic Identity-Based Signatures for Partial
                 Aggregation",
  journal =      j-COMP-J,
  volume =       "49",
  number =       "3",
  pages =        "322--330",
  month =        may,
  year =         "2006",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxh153",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Apr 21 15:45:40 MDT 2006",
  bibsource =    "http://comjnl.oxfordjournals.org/content/vol49/issue3/index.dtl;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://comjnl.oxfordjournals.org/cgi/content/abstract/49/3/322;
                 http://comjnl.oxfordjournals.org/cgi/content/full/49/3/322;
                 http://comjnl.oxfordjournals.org/cgi/reprint/49/3/322",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Hilley:2006:SSD,
  author =       "Sarah Hilley",
  title =        "{Secret Service} dismantles web forums",
  journal =      j-NETWORK-SECURITY,
  volume =       "2006",
  number =       "4",
  pages =        "20--20",
  month =        apr,
  year =         "2006",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(06)70361-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:25 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485806703610",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hiltgen:2006:SIB,
  author =       "Alain Hiltgen and Thorsten Kramp and Thomas Weigold",
  title =        "Secure {Internet} Banking Authentication",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "2",
  pages =        "21--29",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.50",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@InProceedings{Hoffstein:2006:NNE,
  author =       "J. Hoffstein and N. Howgrave-Graham",
  booktitle =    "{PQCrypto 2006: International Workshop on Post-Quantum
                 Cryptography}",
  title =        "{NTRUEncrypt} and {NTRUSign}: efficient public-key
                 algorithms for a post-quantum world",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "141--158",
  year =         "2006",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Thu Apr 21 13:39:07 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Hoglund:2006:RSW,
  author =       "Greg Hoglund and James Butler",
  title =        "Rootkits: subverting the {Windows} kernel",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xxiii + 324",
  year =         "2006",
  ISBN =         "0-321-29431-9 (paperback)",
  ISBN-13 =      "978-0-321-29431-9 (paperback)",
  LCCN =         "QA76.9.A25 H637 2006",
  bibdate =      "Mon Oct 3 18:58:18 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip0512/2005013061.html",
  acknowledgement = ack-nhfb,
  subject =      "Microsoft Windows (Computer file); Computers; Access
                 control; Computer security",
}

@Article{Hoskins:2006:SO,
  author =       "Matthew E. Hoskins",
  title =        "Securing {openSSH}",
  journal =      j-LINUX-J,
  volume =       "2006",
  number =       "147",
  pages =        "??--??",
  month =        jul,
  year =         "2006",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Wed Aug 23 06:09:28 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Hoskins:2006:SSE,
  author =       "Matthew E. Hoskins",
  title =        "{SSHFS}: super easy file access over {SSH}",
  journal =      j-LINUX-J,
  volume =       "2006",
  number =       "146",
  pages =        "??--??",
  month =        jun,
  year =         "2006",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Wed Aug 23 06:09:27 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Book{Howard:2006:SDL,
  author =       "Michael Howard and Steve Lipner",
  title =        "The security development lifecycle: {SDL}, a process
                 for developing demonstrably more secure software",
  publisher =    pub-MICROSOFT,
  address =      pub-MICROSOFT:adr,
  pages =        "xxii + 320",
  year =         "2006",
  ISBN =         "0-7356-2214-0",
  ISBN-13 =      "978-0-7356-2214-2",
  LCCN =         "QA76.76.D47 H74 2006",
  bibdate =      "Wed Feb 21 14:24:56 MST 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Secure software development series",
  acknowledgement = ack-nhfb,
  subject =      "Computer software; Development; Computer security;
                 Reliability",
}

@Article{Huang:2006:CSV,
  author =       "Biao-Bing Huang and Shao-Xian Tang",
  title =        "A Contrast-Sensitive Visible Watermarking Scheme",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "13",
  number =       "2",
  pages =        "60--66",
  month =        apr # "\slash " # jun,
  year =         "2006",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/MMUL.2006.23",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Thu Jul 2 18:03:18 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Multimedia",
}

@Article{Impagliazzo:2006:LRA,
  author =       "Russell Impagliazzo and Bruce M. Kapron",
  title =        "Logics for reasoning about cryptographic
                 constructions",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "72",
  number =       "2",
  pages =        "286--320",
  month =        mar,
  year =         "2006",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2005.06.008",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:26:59 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000005000929",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@InProceedings{Ishai:2006:CA,
  author =       "Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky
                 and Amit Sahai",
  title =        "Cryptography from Anonymity",
  crossref =     "IEEE:2006:AIS",
  pages =        "239--248",
  year =         "2006",
  DOI =          "https://doi.org/10.1109/FOCS.2006.25",
  bibdate =      "Thu Apr 12 09:33:08 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2000.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4031329",
}

@Article{Iwamoto:2006:SSR,
  author =       "Mitsugu Iwamoto and Hirosuke Yamamoto",
  title =        "Strongly secure ramp secret sharing schemes for
                 general access structures",
  journal =      j-INFO-PROC-LETT,
  volume =       "97",
  number =       "2",
  pages =        "52--57",
  day =          "31",
  month =        jan,
  year =         "2006",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 18:41:06 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Izmerly:2006:CCA,
  author =       "Oleg Izmerly and Tal Mor",
  title =        "Chosen ciphertext attacks on lattice-based public key
                 encryption and modern (non-quantum) cryptography in a
                 quantum environment",
  journal =      j-THEOR-COMP-SCI,
  volume =       "367",
  number =       "3",
  pages =        "308--323",
  day =          "1",
  month =        dec,
  year =         "2006",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Mar 29 08:55:29 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Jain:2006:TMB,
  author =       "A. K. Jain and S. Pankanti",
  title =        "A touch of money [biometric authentication systems]",
  journal =      j-IEEE-SPECTRUM,
  volume =       "43",
  number =       "7",
  pages =        "22--27",
  month =        jul,
  year =         "2006",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2006.1653001",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Authentication; biometric authentication systems;
                 biometric sensors; Biometrics; Biosensors; Companies;
                 computer crime; credit card transactions; Credit cards;
                 credit transactions; data privacy; fingerprint
                 identification; Fingerprint recognition; fingerprint
                 sensors; identity thieves prevention; infrastructure
                 investments; Internet; Internet telephony;
                 Internet-based retailer; Privacy; privacy protection;
                 Protection; Sensor systems; sensors",
}

@Book{Janeczko:2006:TSH,
  author =       "Paul B. Janeczko",
  title =        "Top Secret: a Handbook of Codes, Ciphers and Secret
                 Writing",
  publisher =    "Candlewick Press",
  address =      "Cambridge, MA, USA",
  pages =        "144 (est.)",
  year =         "2006",
  ISBN =         "0-439-87560-9",
  ISBN-13 =      "978-0-439-87560-8",
  LCCN =         "????",
  bibdate =      "Sat May 15 16:59:52 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  subject =      "cryptography; juvenile literature; ciphers",
}

@Article{Jeng:2006:EKM,
  author =       "Fuh-Gwo Jeng and Chung-Ming Wang",
  title =        "An efficient key-management scheme for hierarchical
                 access control based on elliptic curve cryptosystem",
  journal =      j-J-SYST-SOFTW,
  volume =       "79",
  number =       "8",
  pages =        "1161--1167",
  month =        aug,
  year =         "2006",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:01 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Juric:2006:CPW,
  author =       "Matjaz B. Juric and Ivan Rozman and Bostjan Brumen and
                 Matjaz Colnaric and Marjan Hericko",
  title =        "Comparison of performance of {Web} services,
                 {WS-Security}, {RMI}, and {RMI--SSL}",
  journal =      j-J-SYST-SOFTW,
  volume =       "79",
  number =       "5",
  pages =        "689--700",
  month =        may,
  year =         "2006",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:01 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Kacprzak:2006:CBS,
  author =       "Magdalena Kacprzak and Alessio Lomuscio and Artur
                 Niewiadomski and Wojciech Penczek and Franco Raimondi
                 and Maciej Szreter",
  title =        "Comparing {BDD} and {SAT} Based Techniques for Model
                 Checking {Chaum}'s Dining Cryptographers Protocol",
  journal =      j-FUND-INFO,
  volume =       "72",
  number =       "1--3",
  pages =        "215--234",
  month =        sep,
  year =         "2006",
  CODEN =        "FUMAAJ",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:04:24 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Kak:2006:TSQ,
  author =       "Subhash Kak",
  title =        "A Three-Stage Quantum Cryptography Protocol",
  journal =      j-FOUND-PHYS-LETT,
  volume =       "19",
  number =       "3",
  pages =        "293--296",
  month =        jun,
  year =         "2006",
  CODEN =        "FPLEET",
  ISSN =         "0894-9875 (print), 1572-9524 (electronic)",
  ISSN-L =       "0894-9875",
  bibdate =      "Sat Jun 3 17:35:13 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/foundphyslett.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Foundations of Physics Letters",
  journal-URL =  "http://link.springer.com/journal/10702",
}

@Article{Kakarountas:2006:HSF,
  author =       "Athanasios P. Kakarountas and Haralambos Michail and
                 Athanasios Milidonis and Costas E. Goutis and George
                 Theodoridis",
  title =        "High-Speed {FPGA} Implementation of Secure Hash
                 Algorithm for {IPSec} and {VPN} Applications",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "37",
  number =       "2",
  pages =        "179--195",
  month =        aug,
  year =         "2006",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-006-5682-5",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Wed Jul 9 17:32:28 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=37&issue=2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 jsuper.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0920-8542&volume=37&issue=2&spage=179",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
  keywords =     "FPGA; hardware implementation; hash function;
                 high-speed performance; Security",
}

@Article{Kawachi:2006:PQC,
  author =       "A. Kawachi and T. Koshiba",
  title =        "Progress in Quantum Computational Cryptography",
  journal =      j-J-UCS,
  volume =       "12",
  number =       "6",
  pages =        "691--709",
  month =        "????",
  year =         "2006",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Thu Jul 10 06:41:40 MDT 2008",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_12_6/progress_in_quantum_computational",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Keromytis:2006:COS,
  author =       "Angelos D. Keromytis and Jason L. Wright and Theo {De
                 Raadt} and Matthew Burnside",
  title =        "Cryptography as an operating system service: a case
                 study",
  journal =      j-TOCS,
  volume =       "24",
  number =       "1",
  pages =        "1--38",
  month =        feb,
  year =         "2006",
  CODEN =        "ACSYEC",
  DOI =          "https://doi.org/10.1145/1124153.1124154",
  ISSN =         "0734-2071 (print), 1557-7333 (electronic)",
  ISSN-L =       "0734-2071",
  bibdate =      "Fri Apr 7 08:15:08 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tocs/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Cryptographic transformations are a fundamental
                 building block in many security applications and
                 protocols. To improve performance, several vendors
                 market hardware accelerator cards. However, until now
                 no operating system provided a mechanism that allowed
                 both uniform and efficient use of this new type of
                 resource. We present the OpenBSD Cryptographic
                 Framework (OCF), a service virtualization layer
                 implemented inside the operating system kernel, that
                 provides uniform access to accelerator functionality by
                 hiding card-specific details behind a carefully
                 designed API. We evaluate the impact of the OCF in a
                 variety of benchmarks, measuring overall system
                 performance, application throughput and latency, and
                 aggregate throughput when multiple applications make
                 use of it. We conclude that the OCF is extremely
                 efficient in utilizing cryptographic accelerator
                 functionality, attaining 95\% of the theoretical peak
                 device performance and over 800 Mbps aggregate
                 throughput using 3DES. We believe that this validates
                 our decision to opt for ease of use by applications and
                 kernel components through a uniform API and for
                 seamless support for new accelerators. Furthermore, our
                 evaluation points to several bottlenecks in system and
                 operating system design: data copying between user and
                 kernel modes, PCI bus signaling inefficiency, protocols
                 that use small data units, and single-threaded
                 applications. We identify some of these limitations
                 through a set of measurements focusing on
                 application-layer cryptographic protocols such as SSL.
                 We offer several suggestions for improvements and
                 directions for future work. We provide experimental
                 evidence of the effectiveness of a new approach which
                 we call operating system shortcutting. Shortcutting can
                 improve the performance of application-layer
                 cryptographic protocols by 27\% with very small changes
                 to the kernel.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
}

@Article{Kettani:2006:CBN,
  author =       "Houssain Kettani",
  title =        "On the Conversion Between Number Systems",
  journal =      j-IEEE-TRANS-CIRCUITS-SYST-2,
  volume =       "53",
  number =       "11",
  pages =        "1255--1258",
  month =        nov,
  year =         "2006",
  CODEN =        "ICSPE5",
  DOI =          "https://doi.org/10.1109/TCSII.2006.882856",
  ISSN =         "1057-7130 (print), 1558-125X (electronic)",
  ISSN-L =       "1057-7130",
  bibdate =      "Mon Mar 19 10:05:23 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "This brief revisits the problem of conversion between
                 number systems and asks the following question: given a
                 nonnegative decimal number, what is the value of the
                 digit at position in the corresponding base number?
                 Thus, we do not require the knowledge of other digits
                 except the one we are interested in. Accordingly, we
                 present a conversion function that relates each digit
                 in a base system to the decimal value that is equal to
                 the base number in question. We also show some
                 applications of this new algorithm in the areas of
                 parallel computing and cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Circuits and Systems. 2, Analog
                 and Digital Signal Processing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=82",
  keywords =     "Algorithm's efficiency; base numbers; conversion",
}

@Article{Kiely:2006:SSM,
  author =       "Laree Kiely and Terry V. Benzel",
  title =        "Systemic Security Management",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "74--77",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.167",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@InProceedings{Klivans:2006:CHL,
  author =       "Adam R. Klivans and Alexander A. Sherstov",
  title =        "Cryptographic Hardness for Learning Intersections of
                 Halfspaces",
  crossref =     "IEEE:2006:AIS",
  pages =        "553--562",
  year =         "2006",
  DOI =          "https://doi.org/10.1109/FOCS.2006.24",
  bibdate =      "Thu Apr 12 09:33:08 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2000.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4031329",
}

@Article{Kogan:2006:IER,
  author =       "Noam Kogan and Tamir Tassa",
  title =        "Improved efficiency for revocation schemes via
                 {Newton} interpolation",
  journal =      j-TISSEC,
  volume =       "9",
  number =       "4",
  pages =        "461--486",
  month =        nov,
  year =         "2006",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1187441.1187444",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 12 17:51:51 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We present a novel way to implement the
                 secret-sharing-based family of revocation schemes of
                 Naor and Pinkas [2003]. The basic scheme of [Naor and
                 Pinkas 2000] uses Shamir's polynomial secret-sharing to
                 revoke up to r users, where r is the degree of the
                 secret-sharing polynomial, and it is information
                 theoretically secure against coalitions of up to r
                 collaborators. The nonrevoked users use Lagrange
                 interpolation in order to compute the new key. Our
                 basic scheme uses a novel modification of Shamir's
                 polynomial secret-sharing: The secret equals the
                 leading coefficient of the polynomial (as opposed to
                 the free coefficient as in the original scheme) and the
                 polynomial is reconstructed by Newton interpolation
                 (rather than Lagrange interpolation). Comparing our
                 scheme to one variant of the Naor--Pinkas scheme, we
                 offer revocation messages that are shorter by a factor
                 of almost 2, while the computation cost at the user end
                 is smaller by a constant factor of approximately 13/2.
                 Comparing to a second variant of the Naor--Pinkas
                 scheme, our scheme offers a reduction of O ( r ) in the
                 computation cost at the user end, without affecting any
                 of the other performance parameters. We then extend our
                 basic scheme to perform multiround revocation for
                 stateless and stateful receivers, along the lines
                 offered by Naor and Pinkas [2000] and Kogan et al.
                 [2003]. We show that using Newton rather than Lagrange
                 interpolants enables a significantly more efficient
                 transmission of the new revocation message and shorter
                 response time for each round. Pay TV systems that
                 implement broadcast encryption techniques can benefit
                 significantly from the improved efficiency offered by
                 our revocation schemes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "broadcast encryption; Newton interpolation; secret
                 sharing; User revocation",
}

@Article{Kogan:2006:PRS,
  author =       "Noam Kogan and Yuval Shavitt and Avishai Wool",
  title =        "A practical revocation scheme for broadcast encryption
                 using smartcards",
  journal =      j-TISSEC,
  volume =       "9",
  number =       "3",
  pages =        "325--351",
  month =        aug,
  year =         "2006",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Nov 15 06:44:34 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Kumar:2006:ODS,
  author =       "Sandeep Kumar and T. Wollinger and C. Paar",
  title =        "Optimum Digit Serial {$ \mathrm {GF}(2^m) $}
                 Multipliers for Curve-Based Cryptography",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "55",
  number =       "10",
  pages =        "1306--1311",
  month =        oct,
  year =         "2006",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2006.165",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 15:35:57 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1683761",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Kurkowski:2006:QFF,
  author =       "Miros{\l}aw Kurkowski and Marian Srebrny",
  title =        "A Quantifier-free First-order Knowledge Logic of
                 Authentication",
  journal =      j-FUND-INFO,
  volume =       "72",
  number =       "1--3",
  pages =        "263--282",
  month =        sep,
  year =         "2006",
  CODEN =        "FUMAAJ",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:04:24 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Ladd:2006:SPS,
  author =       "David Ladd",
  title =        "A Software Procurement and Security Primer",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "71--73",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.142",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Lamenca-Martinez:2006:LNP,
  author =       "Carlos Lamenca-Martinez and Julio Cesar
                 Hernandez-Castro and Juan M. Estevez-Tapiador and
                 Arturo Ribagorda",
  title =        "{Lamar}: a New Pseudorandom Number Generator Evolved
                 by Means of Genetic Programming",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "4193",
  pages =        "850--859",
  year =         "2006",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11844297_86",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Feb 01 16:33:08 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.springerlink.com/content/c60q42qt2m035685/",
  abstract =     "Pseudorandom number generation is a key component of
                 many Computer Science algorithms, including
                 mathematical modeling, stochastic processes, Monte
                 Carlo simulations, and most cryptographic primitives
                 and protocols. To date, multiple approaches that use
                 Evolutionary Computation (EC) techniques have been
                 proposed for designing useful Pseudorandom Number
                 Generators (PRNGs) for certain non-cryptographic
                 applications. However, none of the proposals have been
                 secure nor efficient enough to be of interest for the
                 much more demanding crypto world. In this work, we
                 present a general scheme, which uses Genetic
                 Programming (GP), for the automatic design of
                 crypto-quality PRNGs by evolving highly nonlinear and
                 extremely efficient functions. A new PRNG named Lamar
                 and obtained using this scheme is proposed, whose C
                 code and preliminary security analysis are provided.",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lavington:2006:FCD,
  author =       "Simon Lavington",
  title =        "In the Footsteps of {Colossus}: a Description of
                 {Oedipus}",
  journal =      j-IEEE-ANN-HIST-COMPUT,
  volume =       "28",
  number =       "2",
  pages =        "44--55",
  month =        apr # "\slash " # jun,
  year =         "2006",
  CODEN =        "IAHCEX",
  DOI =          "https://doi.org/10.1109/MAHC.2006.34",
  ISSN =         "1058-6180 (print), 1934-1547 (electronic)",
  ISSN-L =       "1058-6180",
  bibdate =      "Tue Oct 17 06:34:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "A number of cryptanalysis projects were developed in
                 the UK during the postwar years 1945?1955. One of the
                 most significant of these was Oedipus, a
                 special-purpose rapid analytical machine using novel
                 digital storage. Oedipus was developed by GCHQ and the
                 UK companies Elliott and Ferranti. Oedipus contained a
                 large semiconductor associative memory, a magnetic drum
                 with on-the-fly searching, and a high-speed RAM cache.
                 Its history has only recently been made publicly
                 available.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=85",
}

@Article{Law:2006:SBB,
  author =       "Yee Wei Law and Jeroen Doumen and Pieter Hartel",
  title =        "Survey and benchmark of block ciphers for wireless
                 sensor networks",
  journal =      j-TOSN,
  volume =       "2",
  number =       "1",
  pages =        "65--93",
  month =        feb,
  year =         "2006",
  CODEN =        "????",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Mon Aug 28 07:01:48 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
}

@Article{Lee:2006:DCK,
  author =       "Patrick P. C. Lee and John C. S. Lui and David K. Y.
                 Yau",
  title =        "Distributed collaborative key agreement and
                 authentication protocols for dynamic peer groups",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "14",
  number =       "2",
  pages =        "263--276",
  month =        apr,
  year =         "2006",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2006.872575",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Sat Feb 8 09:00:28 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "We consider several distributed collaborative key
                 agreement and authentication protocols for dynamic peer
                 groups. There are several important characteristics
                 which make this problem different from traditional
                 secure group communication. They are: (1) distributed
                 nature in which there is no centralized key server; (2)
                 collaborative nature in which the group key is
                 contributory (i.e., each group member will
                 collaboratively contribute its part to the global group
                 key); and (3) dynamic nature in which existing members
                 may leave the group while new members may join. Instead
                 of performing individual rekeying operations, i.e.,
                 recomputing the group key after every join or leave
                 request, we discuss an interval-based approach of
                 rekeying. We consider three interval-based distributed
                 rekeying algorithms, or interval-based algorithms for
                 short, for updating the group key: (1) the Rebuild
                 algorithm; (2) the Batch algorithm; and (3) the
                 Queue-batch algorithm. Performance of these three
                 interval-based algorithms under different settings,
                 such as different join and leave probabilities, is
                 analyzed. We show that the interval-based algorithms
                 significantly outperform the individual rekeying
                 approach and that the Queue-batch algorithm performs
                 the best among the three interval-based algorithms.
                 More importantly, the Queue-batch algorithm can
                 substantially reduce the computation and communication
                 workload in a highly dynamic environment. We further
                 enhance the interval-based algorithms in two aspects:
                 authentication and implementation. Authentication
                 focuses on the security improvement, while
                 implementation realizes the interval-based algorithms
                 in real network settings. Our work provides a
                 fundamental understanding about establishing a group
                 key via a distributed and collaborative approach for a
                 dynamic peer group.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Lee:2006:ISC,
  author =       "Wei-Bin Lee and Kuan-Chieh Liao",
  title =        "Improved self-certified group-oriented cryptosystem
                 without a combiner",
  journal =      j-J-SYST-SOFTW,
  volume =       "79",
  number =       "4",
  pages =        "502--506",
  month =        apr,
  year =         "2006",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:01 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Book{Lehtinen:2006:CSB,
  author =       "Rick Lehtinen",
  title =        "Computer Security Basics",
  publisher =    pub-ORA,
  address =      pub-ORA:adr,
  edition =      "Second",
  pages =        "306 (est.)",
  year =         "2006",
  ISBN =         "0-596-00669-1",
  ISBN-13 =      "978-0-596-00669-3",
  LCCN =         "????",
  bibdate =      "Sat Jun 17 20:11:18 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.gbv.de:20011/gvk",
  price =        "EUR 38.00",
  acknowledgement = ack-nhfb,
}

@Book{Lemke:2006:ESC,
  editor =       "Kerstin Lemke and Christof Paar and Marko Wolf",
  title =        "Embedded security in cars: securing current and future
                 automotive {IT} applications",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "x + 273",
  year =         "2006",
  ISBN =         "3-540-28384-6",
  ISBN-13 =      "978-3-540-28384-3",
  LCCN =         "TL275.E53 2006",
  bibdate =      "Mon Jun 12 18:18:03 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 library.mit.edu:9909/mit01",
  acknowledgement = ack-nhfb,
  remark =       "With 53 figures and 25 tables.",
  subject =      "Automobiles; Anti-theft devices; Design and
                 construction; Embedded computer systems; Automobile
                 theft; Prevention",
  tableofcontents = "Embedded IT security in automotive application - an
                 emerging area / Christof Paar \\
                 Aspects of secure vehicle software flashing / Winfried
                 Stephan, Solveig Richter and Markus Muller \\
                 Secure software delivery and installation in embedded
                 systems / Andre Adelsbach, Ulrich Huber and Ahmad-Reza
                 Sadeghi \\
                 Anti-theft protection: electronic immobilizers /
                 Kerstin Lemke, Ahmad-Reza Sadeghi and Christian Stuble
                 \\
                 A review of the digital tachograph system / Igor Furgel
                 and Kerstin Lemke \\
                 Secure in-vehicle communication / Marko Wolf, Andre
                 Weimerskirch and Christof Paar \\
                 A survey of research in inter-vehicle communications /
                 Jun Luo and Jean-Pierre Hubaux \\
                 Fundamentals of symmetric cryptography / Sandeep Kumar
                 and Thomas Wollinger \\
                 Fundamentals of asymmetric cryptography / Thomas
                 Wollinger and Sandeep Kumar \\
                 Security aspects of mobile communication systems / Jan
                 Pelzl and Thomas Wollinger \\
                 Embedded cryptography: side channel attacks / Kai
                 Schramm, Kerstin Lemke and Christof Paar \\
                 Embedded security: physical protection against
                 tampering attacks / Kerstin Lemke \\
                 Automotive digital rights management systems / Marko
                 Wolf, Andre Weimerskirch and Christof Paar \\
                 Security risks and business opportunities in In-Car
                 entertainment / Marcus Heitmann \\
                 In-vehicle M-commerce: business models for navigation
                 systems and location-based services / Klaus Rudiger and
                 Martin Gersch",
}

@InProceedings{Levy-dit-Vehel:2006:WC,
  author =       "Fran{\c{c}}oise Levy-dit-Vehel and Ludovic Perret",
  title =        "On the {Wagner--Magyarik} Cryptosystem",
  crossref =     "Ytrehus:2006:CCI",
  pages =        "316--329",
  year =         "2006",
  bibdate =      "Tue Jun 28 08:19:10 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Li:2006:ESY,
  author =       "Chengqing Li and Shujun Li and Der-Chyuan Lou and Dan
                 Zhang",
  title =        "Erratum to {``On the security of the Yen-Guo's domino
                 signal encryption algorithm (DSEA)'' [The Journal of
                 Systems and Software 79 (2006) 253--258]}",
  journal =      j-J-SYST-SOFTW,
  volume =       "79",
  number =       "12",
  pages =        "1789--1789",
  month =        dec,
  year =         "2006",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:02 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  note =         "See \cite{Li:2006:SYG}.",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Li:2006:PMW,
  author =       "Li Li and Zhigeng Pan and David Zhang",
  title =        "A Public Mesh Watermarking Algorithm Based on Addition
                 Property of {Fourier Transform}",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "6",
  number =       "1",
  pages =        "35--??",
  month =        jan,
  year =         "2006",
  CODEN =        "????",
  ISSN =         "0219-4678",
  bibdate =      "Wed Aug 23 08:55:54 MDT 2006",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Li:2006:SYG,
  author =       "Chengqing Li and Shujun Li and Der-Chyuan Lou and Dan
                 Zhang",
  title =        "On the security of the {Yen--Guo}'s domino signal
                 encryption algorithm {(DSEA)}",
  journal =      j-J-SYST-SOFTW,
  volume =       "79",
  number =       "2",
  pages =        "253--258",
  month =        feb,
  year =         "2006",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:01 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  note =         "See erratum \cite{Li:2006:ESY}.",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Liao:2006:PAS,
  author =       "I-En Liao and Cheng-Chi Lee and Min-Shiang Hwang",
  title =        "A password authentication scheme over insecure
                 networks",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "72",
  number =       "4",
  pages =        "727--740",
  month =        jun,
  year =         "2006",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2005.10.001",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:27:00 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000005001157",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Article{Lindell:2006:CAB,
  author =       "Yehuda Lindell and Anna Lysyanskaya and Tal Rabin",
  title =        "On the composition of authenticated {Byzantine
                 Agreement}",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "6",
  pages =        "881--917",
  month =        nov,
  year =         "2006",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Apr 14 10:54:02 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@Article{Lopez:2006:UPK,
  author =       "Javier Lopez",
  title =        "Unleashing public-key cryptography in wireless sensor
                 networks",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "469--482",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14505",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:18 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lu:2006:FBW,
  author =       "Wei Lu and Hongtao Lu and Fu-Lai Chung",
  title =        "Feature based watermarking using watermark template
                 match",
  journal =      j-APPL-MATH-COMP,
  volume =       "177",
  number =       "1",
  pages =        "377--386",
  day =          "1",
  month =        jun,
  year =         "2006",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:55 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Lu:2006:RDI,
  author =       "Wei Lu and Hongtao Lu and Fu-Lai Chung",
  title =        "Robust digital image watermarking based on
                 subsampling",
  journal =      j-APPL-MATH-COMP,
  volume =       "181",
  number =       "2",
  pages =        "886--893",
  day =          "15",
  month =        oct,
  year =         "2006",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:02:58 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Book{Lucas:2006:PGE,
  author =       "Michael Lucas",
  title =        "{PGP} and {GPG}: email for the practical paranoid",
  publisher =    pub-NO-STARCH,
  address =      pub-NO-STARCH:adr,
  pages =        "216 (est.)",
  year =         "2006",
  ISBN =         "1-59327-071-2",
  ISBN-13 =      "978-1-59327-071-1",
  LCCN =         "TK5102.85 .L83 2006",
  bibdate =      "Tue Jun 27 11:09:36 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip061/2005028824.html;
                 http://www.nostarch.com/pgp.htm",
  acknowledgement = ack-nhfb,
  review =       "http://books.slashdot.org/books/06/06/26/1336200.shtml",
  subject =      "Electronic mail systems; Security measures; PGP
                 (Computer file)",
  tableofcontents = "Cryptography for kindergarteners \\
                 Understanding OpenPGP \\
                 Installing PGP \\
                 Installing GnuPG \\
                 The web of trust \\
                 PGP key management \\
                 Managing GnuPG keys \\
                 OpenPGP and email \\
                 PGP and email \\
                 GnuPG and email \\
                 Other OpenPGP considerations \\
                 The GnuPG command line \\
                 The PGP command line",
}

@Article{Ma:2006:ADS,
  author =       "Mingchao Ma and Steve Woodhead",
  title =        "Authentication delegation for subscription-based
                 remote network services",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "5",
  pages =        "371--378",
  month =        jul,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000575",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{Maloof:2006:MLD,
  editor =       "Marcus A. Maloof",
  title =        "Machine learning and data mining for computer
                 security: methods and applications",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xvi + 210",
  year =         "2006",
  ISBN =         "1-84628-029-X",
  ISBN-13 =      "978-1-84628-029-0",
  LCCN =         "QA76.9.A25 M29 2006",
  bibdate =      "Mon Jun 12 18:09:08 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Advance information knowledge processing",
  acknowledgement = ack-nhfb,
  subject =      "computer security; machine learning; data mining",
}

@Book{Mangard:2006:PAA,
  author =       "Stephan Mangard and Elisabeth Oswald and Thomas Popp",
  title =        "Power Analysis Attacks and Countermeasures for
                 Cryptographic Smart Cards",
  volume =       "450",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "250 (est)",
  year =         "2006",
  ISBN =         "0-387-30857-1",
  ISBN-13 =      "978-0-387-30857-9",
  LCCN =         "????",
  bibdate =      "Mon Jun 12 18:49:25 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.gbv.de:20011/gvk",
  series =       "Advances in Information Security",
  URL =          "http://deposit.ddb.de/cgi-bin/dokserv?id=2739575&prov=M&dok_var=1&dok_ext=htm",
}

@InProceedings{Matusiewicz:2006:FGD,
  author =       "Krystian Matusiewicz and Josef Pieprzyk",
  title =        "Finding Good Differential Patterns for Attacks on
                 {SHA-1}",
  crossref =     "Ytrehus:2006:CCI",
  pages =        "164--177",
  year =         "2006",
  bibdate =      "Tue Jun 28 08:19:10 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Maximov:2006:SWC,
  author =       "Alexander Maximov",
  title =        "Some words on cryptanalysis of stream ciphers",
  publisher =    "Department of Information Technology, Lund
                 University",
  address =      "Lund, Sweden",
  pages =        "xiv + 242",
  year =         "2006",
  ISBN =         "91-7167-039-4",
  ISBN-13 =      "978-91-7167-039-7",
  LCCN =         "????",
  bibdate =      "Thu May 12 07:27:37 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{McDaniel:2006:OAI,
  author =       "Patrick McDaniel and William Aiello and Kevin Butler
                 and John Ioannidis",
  title =        "Origin authentication in interdomain routing",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "50",
  number =       "16",
  pages =        "2953--2980",
  day =          "14",
  month =        nov,
  year =         "2006",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:14 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Book{McGraw:2006:SSB,
  author =       "Gary McGraw",
  title =        "Software security: building security in",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xxxvi + 408",
  year =         "2006",
  ISBN =         "0-321-35670-5 (paperback)",
  ISBN-13 =      "978-0-321-35670-3 (paperback)",
  LCCN =         "QA76.9.A25 M4286 2006",
  bibdate =      "Sat Sep 16 05:39:02 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Addison-Wesley software security series",
  URL =          "http://www.loc.gov/catdir/toc/ecip062/2005031598.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer security",
  tableofcontents = "Contents \\
                 Foreword \\
                 Preface \\
                 Part I. \\
                 Chapter 1. Defining a Discipline \\
                 Chapter 2. A Risk Management Framework \\
                 Part II. Seven Touchpoints for Software Security \\
                 Chapter 3. Introduction to Software Security
                 Touchpoints \\
                 Chapter 4. Code Review with a Tool \\
                 Chapter 5. Architectural Risk Analysis \\
                 Chapter 6. Software Penetration Testing \\
                 Chapter 7. Risk-based Security Testing \\
                 Chapter 8. Abuse Cases \\
                 Chapter 9. Software Security meets Security Operations
                 \\
                 Part III. Software Security Grows Up \\
                 Chapter 10. An Enterprise Software Security Program \\
                 Chapter 11. Knowledge for Software Security \\
                 Chapter 12 A Taxonomy of Coding Errors \\
                 Chapter 13. Annotated Bibliography and References \\
                 Appendix A \\
                 Appendix B \\
                 Appendix C \\
                 Appendix D \\
                 Index",
}

@Article{McLaughlin:2006:PZW,
  author =       "Laurianne McLaughlin",
  title =        "{Philip Zimmermann} on {What's Next after PGP?}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "10--13",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.20",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588818.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588818",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Mishra:2006:PCS,
  author =       "P. M. Mishra",
  title =        "Pipelined computation of scalar multiplication in
                 elliptic curve cryptosystems (extended version)",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "55",
  number =       "8",
  pages =        "1000--1010",
  month =        aug,
  year =         "2006",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2006.129",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 15:35:55 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1650197",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Mislove:2006:EBO,
  author =       "Alan Mislove and Ansley Post and Andreas Haeberlen and
                 Peter Druschel",
  title =        "Experiences in building and operating {ePOST}, a
                 reliable peer-to-peer application",
  journal =      j-OPER-SYS-REV,
  volume =       "40",
  number =       "4",
  pages =        "147--159",
  month =        oct,
  year =         "2006",
  CODEN =        "OSRED8",
  DOI =          "https://doi.org/10.1145/1217935.1217950",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Fri Jun 20 17:14:10 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/opersysrev.bib",
  abstract =     "Peer-to-peer (p2p) technology can potentially be used
                 to build highly reliable applications without a single
                 point of failure. However, most of the existing
                 applications, such as file sharing or web caching, have
                 only moderate reliability demands. Without a
                 challenging proving ground, it remains unclear whether
                 the full potential of p2p systems can be realized. To
                 provide such a proving ground, we have designed,
                 deployed and operated a p2p-based email system. We
                 chose email because users depend on it for their daily
                 work and therefore place high demands on the
                 availability and reliability of the service, as well as
                 the durability, integrity, authenticity and privacy of
                 their email. Our system, ePOST, has been actively used
                 by a small group of participants for over two years. In
                 this paper, we report the problems and pitfalls we
                 encountered in this process. We were able to address
                 some of them by applying known principles of system
                 design, while others turned out to be novel and
                 fundamental, requiring us to devise new solutions. Our
                 findings can be used to guide the design of future
                 reliable p2p systems and provide interesting new
                 directions for future research.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGOPS Operating Systems Review",
  keywords =     "decentralized systems; electronic mail; peer-to-peer;
                 reliability",
}

@Article{Mitchell:2006:PPT,
  author =       "John C. Mitchell and Ajith Ramanathan and Andre
                 Scedrov and Vanessa Teague",
  title =        "A probabilistic polynomial-time process calculus for
                 the analysis of cryptographic protocols",
  journal =      j-THEOR-COMP-SCI,
  volume =       "353",
  number =       "1--3",
  pages =        "118--164",
  day =          "14",
  month =        mar,
  year =         "2006",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Mar 29 06:48:57 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Moses:2006:DSD,
  author =       "Phil Moses",
  title =        "Demons seeking d{\ae}mons---a practical approach to
                 hardening your {openSSH} configuration",
  journal =      j-LINUX-J,
  volume =       "2006",
  number =       "143",
  pages =        "3--3",
  month =        mar,
  year =         "2006",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Thu Mar 9 06:03:14 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Book{Mrayati:2006:TTC,
  editor =       "M. Mrayati and Y. Meer Alam and M. H. at-Tayyan",
  title =        "Three treatises on cryptanalysis of poetry",
  volume =       "5",
  publisher =    "KFCRIS \& KACST",
  address =      "Riyadh, Saudi Arabia",
  pages =        "x + 167",
  year =         "2006",
  ISBN =         "9960-890-56-2",
  ISBN-13 =      "978-9960-890-56-2",
  LCCN =         "????",
  bibdate =      "Thu May 12 06:53:13 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "{Arabic} origins of cryptology",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography / Arab countries / history",
}

@Misc{Mueller:2006:SMG,
  author =       "Maik Mueller and Michael Freidrich and Klaus Kiefer
                 and Ralf Miko and Juergen Schneider",
  title =        "System and method for generating pseudo-random
                 numbers",
  howpublished = "United States Patent 7,894,602.",
  day =          "31",
  month =        mar,
  year =         "2006",
  bibdate =      "Tue Dec 27 16:54:57 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http:www.google.com/patents/US7894602",
  abstract =     "A process and system for generating a pseudo-random
                 number is presented. Input data having entropy is
                 gathered in an Entropy Pool and transformed once by a
                 cryptographic hash function. The transformed data forms
                 the internal state of the pseudo-random number
                 generator. The generator forms the output by applying a
                 second cryptographic hash function to this internal
                 state. Finally, the generator updates the internal
                 state by inputting the current internal state and data
                 from the Entropy Pool into a third cryptographic hash
                 function. The output of the third hash function forms
                 the new internal state of the pseudo-random number
                 generator.",
  acknowledgement = ack-nhfb,
}

@Article{Mullins:2006:CC,
  author =       "J. Mullins",
  title =        "Chaotic communication",
  journal =      j-IEEE-SPECTRUM,
  volume =       "43",
  number =       "1",
  pages =        "11--12",
  month =        jan,
  year =         "2006",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2006.1572336",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "chaotic communication; Chaotic communication;
                 Circuits; Communication industry; Cryptography;
                 cryptography methods; data exchange; digital messages;
                 encryption; Labeling; Laboratories; Lonrenz system;
                 Mesh generation; Monitoring; Nonlinear dynamical
                 systems; Power generation; public key systems;
                 telecommunication security",
}

@Article{Murton:2006:CGH,
  author =       "Daniel Murton",
  title =        "Crypto goes to the heart",
  journal =      j-NETWORK-SECURITY,
  volume =       "2006",
  number =       "5",
  pages =        "19--19",
  month =        may,
  year =         "2006",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(06)70390-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:26 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485806703907",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Mykletun:2006:AIO,
  author =       "Einar Mykletun and Maithili Narasimha and Gene
                 Tsudik",
  title =        "Authentication and integrity in outsourced databases",
  journal =      j-TOS,
  volume =       "2",
  number =       "2",
  pages =        "107--138",
  month =        may,
  year =         "2006",
  CODEN =        "????",
  ISSN =         "1553-3077 (print), 1553-3093 (electronic)",
  ISSN-L =       "1553-3077",
  bibdate =      "Wed Aug 23 05:41:22 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Storage",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J960",
}

@Article{Nagaj:2006:OQE,
  author =       "Daniel Nagaj and Iordanis Kerenidis",
  title =        "On the optimality of quantum encryption schemes",
  journal =      j-J-MATH-PHYS,
  volume =       "47",
  number =       "9",
  pages =        "092102",
  month =        sep,
  year =         "2006",
  CODEN =        "JMAPAQ",
  DOI =          "https://doi.org/10.1063/1.2339014",
  ISSN =         "0022-2488 (print), 1089-7658 (electronic), 1527-2427",
  ISSN-L =       "0022-2488",
  bibdate =      "Wed Oct 26 09:04:34 MDT 2011",
  bibsource =    "http://www.aip.org/ojs/jmp.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jmathphys2005.bib",
  URL =          "http://jmp.aip.org/resource/1/jmapaq/v47/i9/p092102_s1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Physics",
  journal-URL =  "http://jmp.aip.org/",
  onlinedate =   "14 September 2006",
  pagecount =    "14",
}

@Book{Nedjah:2006:NTC,
  editor =       "Nadia Nedjah and Luiza de {Macedo Mourelle}",
  title =        "New trends in cryptographic systems",
  publisher =    "Nova Science Publishers",
  address =      "Hauppauge, NY, USA",
  pages =        "????",
  year =         "2006",
  ISBN =         "1-59454-977-X",
  ISBN-13 =      "978-1-59454-977-9",
  LCCN =         "TK7895.E42 N42 2006",
  bibdate =      "Tue Jun 13 10:23:01 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip066/2006001583.html",
  acknowledgement = ack-nhfb,
  subject =      "Embedded computer systems; Cryptography; Computer
                 security",
}

@Article{Neuenschwander:2006:IMM,
  author =       "Mike Neuenschwander",
  title =        "Identity management market shifts --- who's out
                 there?",
  journal =      j-NETWORK-SECURITY,
  volume =       "2006",
  number =       "12",
  pages =        "7--10",
  month =        dec,
  year =         "2006",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(06)70461-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:34 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485806704615",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@InProceedings{Nikov:2006:RBV,
  author =       "Ventzislav Nikov and Svetla Nikova",
  title =        "On a Relation Between Verifiable Secret Sharing
                 Schemes and a Class of Error-Correcting Codes",
  crossref =     "Ytrehus:2006:CCI",
  pages =        "275--290",
  year =         "2006",
  bibdate =      "Tue Jun 28 08:19:10 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ogata:2006:OSS,
  author =       "Wakaha Ogata and Kaoru Kurosawa and Douglas R.
                 Stinson",
  title =        "Optimum Secret Sharing Scheme Secure against
                 Cheating",
  journal =      j-SIAM-J-DISCR-MATH,
  volume =       "20",
  number =       "1",
  pages =        "79--95",
  month =        jan,
  year =         "2006",
  CODEN =        "SJDMEC",
  DOI =          "https://doi.org/10.1137/S0895480100378689",
  ISSN =         "0895-4801 (print), 1095-7146 (electronic)",
  ISSN-L =       "0895-4801",
  bibdate =      "Tue May 18 21:36:50 MDT 2010",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SIDMA/20/1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjdiscrmath.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Discrete Mathematics",
  journal-URL =  "http://epubs.siam.org/sidma",
}

@TechReport{Oren:2006:PAR,
  author =       "Yossi Oren and Adi Shamir",
  title =        "Power Analysis of {RFID} Tags",
  type =         "Technical report",
  institution =  "Faculty of Mathematics and Computer Science, Weizmann
                 Institute",
  address =      "POB 26, Rehovot 76100, Israel",
  year =         "2006",
  bibdate =      "Sat Apr 15 09:07:58 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.wisdom.weizmann.ac.il/~yossio/rfid/",
  abstract =     "We show the first power analysis attack on passive
                 RFID tags. Compared to standard power analysis attacks,
                 this attack is unique in that it requires no physical
                 contact with the device under attack. While the
                 specific attack described here requires the attacker to
                 actually transmit data to the tag under attack, the
                 power analysis part itself requires only a receive
                 antenna. This means that a variant of this attack can
                 be devised such that the attacker is completely passive
                 while it is acquiring the data, making the attack very
                 hard to detect.\par

                 As a proof of concept, we describe a password
                 extraction attack on Class 1 Generation 1 EPC tags
                 operating in the UHF frequency range. The attack
                 presented below lets an adversary discover the kill
                 password of such a tag and, then, disable it. The
                 attack can be readily adapted to finding the access and
                 kill passwords of Gen 2 tags.\par

                 The main significance of our attack is in its
                 implications --- any cryptographic functionality built
                 into tags needs to be designed to be resistant to power
                 analysis, and achieving this resistance is an
                 undertaking which has an effect both on the price and
                 on the read range of tags.",
  acknowledgement = ack-nhfb,
  keywords =     "RFID tags",
}

@InProceedings{Osvik:2006:CAC,
  author =       "Dag Arne Osvik and Adi Shamir and Eran Tromer",
  editor =       "????",
  booktitle =    "Topics in Cryptology --- {CT-RSA}",
  title =        "Cache attacks and countermeasures: the case of {AES}",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "1--20",
  year =         "2006",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 15:58:08 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 62]{Schneier:2015:SWC}.",
}

@InProceedings{Overbeck:2006:EGA,
  author =       "Raphael Overbeck",
  title =        "Extending {Gibson}'s Attacks on the {GPT}
                 Cryptosystem",
  crossref =     "Ytrehus:2006:CCI",
  pages =        "178--188",
  year =         "2006",
  bibdate =      "Tue Jun 28 08:19:10 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Page:2006:FAP,
  author =       "D. Page and F. Vercauteren",
  title =        "A Fault Attack on Pairing-Based Cryptography",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "55",
  number =       "9",
  pages =        "1075--1080",
  month =        sep,
  year =         "2006",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2006.134",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 15:35:56 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1668035",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Paillier:2006:TOW,
  author =       "Pascal Paillier and Jorge L. Villar",
  title =        "Trading One-Wayness Against Chosen-Ciphertext Security
                 in Factoring-Based Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "4284",
  pages =        "252--266",
  year =         "2006",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11935230_17",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 13 08:42:37 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2006a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11935230_17.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11935230",
  book-URL =     "http://www.springerlink.com/content/978-3-540-49476-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Paterson:2006:LTT,
  author =       "Kenneth G. Paterson and Arnold K. L. Yau",
  title =        "Lost in Translation: Theory and Practice in
                 Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "3",
  pages =        "69--72",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.74",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Pathak:2006:BFT,
  author =       "Vivek Pathak and Liviu Iftode",
  title =        "{Byzantine} fault tolerant public key authentication
                 in peer-to-peer systems",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "50",
  number =       "4",
  pages =        "579--596",
  day =          "15",
  month =        mar,
  year =         "2006",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:09 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Paul:2006:SSC,
  author =       "Souradyuti Paul and Bart Preneel",
  title =        "On the (In)security of Stream Ciphers Based on Arrays
                 and Modular Addition",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "4284",
  pages =        "69--83",
  year =         "2006",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11935230_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 13 08:42:37 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2006a.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11935230_5.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11935230",
  book-URL =     "http://www.springerlink.com/content/978-3-540-49476-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Pelzl:2006:PAC,
  author =       "Jan Pelzl",
  title =        "Practical Aspects of Curve-based Cryptography and
                 Cryptanalysis",
  publisher =    "Europ{\"a}ischer Universit{\"a}tsverlag",
  address =      "Bochum, Germany",
  pages =        "208",
  year =         "2006",
  ISBN =         "3-89966-189-3",
  ISBN-13 =      "978-3-89966-189-7",
  LCCN =         "????",
  bibdate =      "Fri May 13 08:47:36 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "EUR 24.90",
  URL =          "http://verlag.rub.de/g9783899661897.html",
  abstract =     "Algebraic curves have a broad range of application in
                 cryptology: on the one hand, elliptic and hyperelliptic
                 curve cryptosystems are increasingly employed as
                 public-key cryptosystems. On the other hand,
                 cryptanalytical algorithms for attacking cryptosystems
                 utilize algebraic curves. Examples include the elliptic
                 curve method for solving the Factorization Problem (FP)
                 or Pollard's Rho method for solving the Elliptic Curve
                 Discrete Logarithm Problem (ECDLP).\par

                 With this thesis, we contribute to both aspects of
                 cryptology. We present algorithmic improvements in the
                 field of cryptography, namely for Hyperelliptic Curve
                 Cryptosystems. In the field of cryptanalysis, we
                 propose different hardware architectures for
                 cryptanalytical algorithms, resulting in a security
                 evaluation of particular symmetric and asymmetric
                 cryptosystems against attacks with special-purpose
                 hardware. Our implementations in software as well as in
                 hardware form the basis for such an analysis und stress
                 the paramount importance of an efficient implementation
                 or arithmetic primitives regarding the overall
                 performance of cryptologic algorithms. In addition, we
                 present the concept and realization of a cost-optimized
                 and reprogrammable code-breaker which is based on
                 contemporary low-cost FPGAs.",
  acknowledgement = ack-nhfb,
}

@Article{Pereira:2006:IBS,
  author =       "Olivier Pereira and Jean-Jacques Quisquater",
  title =        "On the impossibility of building secure {Cliques}-type
                 authenticated group key agreement protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "197--246",
  month =        "????",
  year =         "2006",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2006-14204",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:08 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Phan:2006:CTP,
  author =       "Raphael C.-W. Phan",
  title =        "Cryptanalysis of two password-based authentication
                 schemes using smart cards",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "52--54",
  month =        feb,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001938",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Phan:2006:FDB,
  author =       "R. C.-W. Phan and M. U. Siddiqi",
  title =        "A Framework for Describing Block Cipher
                 Cryptanalysis",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "55",
  number =       "11",
  pages =        "1402--1409",
  month =        nov,
  year =         "2006",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2006.169",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 15:35:57 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1705449",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Philpott:2006:ITD,
  author =       "Andrew Philpott",
  title =        "Identity theft --- dodging the own-goals",
  journal =      j-NETWORK-SECURITY,
  volume =       "2006",
  number =       "1",
  pages =        "11--13",
  month =        jan,
  year =         "2006",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(06)70323-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:22 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485806703233",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Book{Pincock:2006:CHC,
  author =       "Stephen Pincock",
  title =        "Codebreaker: the history of codes and ciphers, from
                 the ancient pharaohs to quantum cryptography",
  publisher =    "Walker",
  address =      "New York, NY, USA",
  pages =        "176",
  year =         "2006",
  ISBN =         "0-8027-1547-8",
  ISBN-13 =      "978-0-8027-1547-0",
  LCCN =         "Z104 .P56 2006",
  bibdate =      "Sat Jun 13 08:24:07 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0730/2007310362-b.html;
                 http://www.loc.gov/catdir/enhancements/fy0730/2007310362-d.html",
  acknowledgement = ack-nhfb,
  subject =      "Cryptography; History; Ciphers",
  tableofcontents = "1. Originality \\
                 Unbroken codes : the Phaistos disk \\
                 Cultural codes : holy codes \\
                 Cultural codes : codes of the Kama Sutra \\
                 2. Ingenuity \\
                 Cultural codes : Rosslyn's secrets : hidden meaning in
                 architecture and music \\
                 Unbroken codes : the most mysterious book : the Voynich
                 manuscript \\
                 Unbroken codes : the man in the iron mask \\
                 3. Wit \\
                 Specific codes : the ingenious professor Babbage \\
                 Specific codes : the Playfair cipher \\
                 Unbroken codes : hidden treasure, hidden meaning, the
                 Beale papers \\
                 Unbroken codes : the Dorabella cipher, Elgar's other
                 enigma \\
                 4. Perseverance \\
                 Specific codes : the Enigma machine \\
                 Specific codes : invisible ink and other tools of the
                 spying trade \\
                 Specific codes : Purple and Pearl Harbor \\
                 5. Speed \\
                 Unbroken codes : the Zodiac killer \\
                 Specific codes : cracking Poe's Graham Magazine cipher
                 \\
                 Cultural codes : codes in fiction \\
                 6. Vision \\
                 Specific codes : the cat came back \\
                 Specific codes : quantum cryptography, being in two
                 places at once \\
                 Specific codes : quantum cryptography in a box of
                 chocolates \\
                 Appendix. Code challenge \\
                 Glossary",
}

@Article{Popp:2006:CTT,
  author =       "Robert Popp and John Poindexter",
  title =        "Countering Terrorism through Information and Privacy
                 Protection Technologies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "18--27",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.147",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Porras:2006:PEG,
  author =       "Phillip A. Porras",
  title =        "Privacy-Enabled Global Threat Monitoring",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "60--63",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.161",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Potter:2006:CKM,
  author =       "Bruce Potter",
  title =        "Cryptographic key management for the masses",
  journal =      j-NETWORK-SECURITY,
  volume =       "2006",
  number =       "12",
  pages =        "13--14",
  month =        dec,
  year =         "2006",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(06)70463-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:34 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485806704639",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Pucella:2006:SCC,
  author =       "Riccardo Pucella",
  title =        "Security and composition of cryptographic protocols: a
                 tutorial {(Part I)}",
  journal =      j-SIGACT,
  volume =       "37",
  number =       "3",
  pages =        "67--92",
  month =        sep,
  year =         "2006",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1165555.1165570",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 18:30:28 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  abstract =     "What does it mean for a cryptographic protocol to be
                 ``secure''? Capturing the security requirements of
                 cryptographic tasks in a meaningful way is a slippery
                 business: On the one hand, we want security criteria
                 that prevent ``all potential attacks'' against a
                 protocol; on the other hand, we want our criteria not
                 to be overly restrictive and accept ``reasonable
                 protocols''. One of the main reasons for flaws is the
                 often unexpected interactions among different protocol
                 instances that run alongside each other in a composite
                 system. This tutorial studies a general methodology for
                 defining security of cryptographic protocols. The
                 methodology, often dubbed the ``trusted party
                 paradigm'', allows for defining the security
                 requirements of a large variety of cryptographic tasks
                 in a unified and natural way. We first review more
                 basic formulations that capture security in isolation
                 from other protocol instances. Next we address the
                 security problems associated with protocol composition,
                 and review formulations that guarantee security even in
                 composite systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Rajsbaum:2006:ASNb,
  author =       "Sergio Rajsbaum",
  title =        "{ACM} {SIGACT} news distributed computing column 24",
  journal =      j-SIGACT,
  volume =       "37",
  number =       "4",
  pages =        "58--84",
  month =        dec,
  year =         "2006",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1189056.1189074",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 18:30:28 MDT 2012",
  bibsource =    "DBLP;
                 http://dblp.uni-trier.de/db/journals/sigact/sigact37.html#Rajsbaum06a;
                 http://portal.acm.org/;
                 https://www.math.utah.edu/pub/mirrors/ftp.ira.uka.de/bibliography/Misc/DBLP/2006.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  URL =          "http://doi.acm.org/10.1145/1189056.1189074",
  abstract =     "The Distributed Computing Column covers the theory of
                 systems that are composed of a number of interacting
                 computing elements. These include problems of
                 communication and networking, databases, distributed
                 shared memory, multiprocessor architectures, operating
                 systems, verification, Internet, and the Web. This
                 issue consists of:o ``Security and Composition of
                 Cryptographic Protocols: A Tutorial (Part II)'' by Ran
                 Canetti. The first part appeared in the previous SIGACT
                 News, the September 2006 issue. Many thanks to Ran for
                 his contributions to this column.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Rechberger:2006:NCW,
  author =       "Christian Rechberger and Vincent Rijmen and Nicolas
                 Sklavos",
  title =        "The {NIST Cryptographic Workshop on Hash Functions}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "54--56",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.26",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588827.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588827;
                 http://www.csrc.nist.gov/pki/HashWorkshop/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  remark =       "October 31--November 1, 2005 Gaithersburg, MD, USA.
                 Second workshop August 24--25, 2006, Santa Barbara, CA,
                 USA.",
}

@Book{Risen:2006:SWS,
  author =       "James Risen",
  title =        "State of war: the secret history of the {CIA} and the
                 {Bush} administration",
  publisher =    "Free Press",
  address =      "New York, NY, USA",
  pages =        "240",
  year =         "2006",
  ISBN =         "0-7432-7066-5",
  ISBN-13 =      "978-0-7432-7066-3",
  LCCN =         "????",
  bibdate =      "Thu Jan 19 12:29:17 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Bush, George W; (George Walker); Bush, George; United
                 States; Politics and government; 1989--",
  subject-dates = "1946--; 1924--",
}

@Misc{Rose:2006:CSP,
  author =       "Gregory Gordon Rose and Alexander Gantman and Lu
                 Xiao",
  title =        "Cryptographically secure pseudo-random number
                 generator",
  howpublished = "United States Patent 8,019,802.",
  day =          "23",
  month =        aug,
  year =         "2006",
  bibdate =      "Tue Dec 27 16:54:57 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http:www.google.com/patents/US8019802",
  abstract =     "A cryptographically secure pseudo-random number
                 generator is configured to obtain one or more
                 unpredictable sources of entropy that provide a seed. A
                 current internal state of the number generator is
                 modified as a function of the current internal state
                 and the seed to accumulate entropy. The modified
                 internal state may be obtained by using non-linear
                 feedback shift register operations on the internal
                 state and the seed. A pseudo-random number is then
                 generated based on the modified internal state of the
                 number generator. The one or more unpredictable sources
                 of entropy may be combined into the seed. The internal
                 state of the number generator may be continually
                 modified with additional seeds obtained from the one or
                 more unpredictable sources and the current internal
                 state. Additionally, the internal state of the number
                 generator may be modified on demand with a new seed
                 received from a calling application.",
  acknowledgement = ack-nhfb,
}

@Book{Rosen:2006:CZK,
  author =       "Alon Rosen",
  title =        "Concurrent Zero-Knowledge",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiii + 184",
  year =         "2006",
  DOI =          "https://doi.org/10.1007/3-540-32939-0",
  ISBN =         "3-642-06949-5, 3-540-32939-0 (e-book)",
  ISBN-13 =      "978-3-642-06949-9, 978-3-540-32939-8 (e-book)",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "QA76.9.A25 R657 2006",
  MRclass =      "68P25, 68-01, 94A60",
  bibdate =      "Sat Jun 10 08:34:41 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "With Additional Background by Oded Goldreich.",
  series =       "Information Security and Cryptography",
  URL =          "http://www.springerlink.com/content/uu1171",
  abstract =     "Zero-knowledge proofs are fascinating and extremely
                 useful constructs. They have a seemingly contradictory
                 definition: zero-knowledge proofs are both convincing
                 and yet yield nothing beyond the validity of the
                 assertion being proved. Their applicability in the
                 domain of cryptography is considerable.

                 A fundamental question regarding zero-knowledge
                 protocols refers to the preservation of security when
                 many instances of the protocol are executed
                 concurrently, and in particular under a purely
                 asynchronous model. The practical importance of this
                 question, in the days of extensive Internet
                 communication, seems clear. This question is also very
                 interesting from a theoretical viewpoint, and it serves
                 as a benchmark for the study of the security of
                 concurrent executions of protocols and has led to the
                 development of techniques for coping with problems that
                 arise in that setting.

                 Protocols that remain zero-knowledge when many
                 instances are executed concurrently are called
                 concurrent zero-knowledge, and this book is devoted to
                 their study. It presents constructions of concurrent
                 zero-knowledge protocols, along with proofs of security
                 for these protocols. It also shows why ``traditional''
                 proof techniques (i.e., black-box simulations) are not
                 suitable for establishing the concurrent zero-knowledge
                 property of ``round-efficient'' protocols.",
  acknowledgement = ack-nhfb,
  subject =      "Data encryption (Computer science); Zero-knowledge
                 proofs; Cryptography; COMPUTERS; Security;
                 Cryptography; Data encryption (Computer science);
                 Cryptography; Zero-knowledge proofs; Informatique;
                 Cryptography; Data encryption (Computer science);
                 Zero-knowledge proofs.",
  tableofcontents = "Front Matter \\
                 A Brief Introduction to Zero-Knowledge (by Oded
                 Goldreich) \\
                 Introduction to Concurrent Zero-Knowledge \\
                 Preliminaries \\
                 c ZK Proof Systems for NP \\
                 c ZK in Logarithmically Many Rounds \\
                 A Simple Lower Bound \\
                 Black-Box c ZK Requires Logarithmically Many Rounds \\
                 Conclusions and Open Problems \\
                 A Brief Account of Other Developments (by Oded
                 Goldreich) \\
                 Back Matter",
  xxyear =       "2010",
}

@Book{Rosenberg:2006:RAS,
  editor =       "Beth Rosenberg",
  title =        "{RFID}: applications, security, and privacy",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "li + 555",
  year =         "2006",
  ISBN =         "0-321-29096-8",
  ISBN-13 =      "978-0-321-29096-0",
  LCCN =         "TS160 .G37 2005",
  bibdate =      "Mon Oct 3 18:58:20 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip059/2005006610.html",
  acknowledgement = ack-nhfb,
  subject =      "Inventory control; Automation; Radio frequency
                 identification systems; Privacy, Right of; United
                 States",
}

@Article{Rotondi:2006:CHA,
  author =       "Guido Rotondi and Gianpiero Guerrera",
  title =        "A consistent history authentication protocol",
  journal =      j-SIGSOFT,
  volume =       "31",
  number =       "3",
  pages =        "1--7",
  month =        may,
  year =         "2006",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1127878.1127887",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:17 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigsoft2000.bib",
  abstract =     "Traditional strong authentication systems rely on a
                 certification chain to delegate the authority of
                 trusting an intermediate end. However, in some
                 practical life scenarios a relayed authentication is
                 not accepted and thus it would be advisable a straight
                 proof of trustiness with a direct interaction with the
                 involved party. Our protocol introduces a registry of
                 certified operations from which it descends the
                 authentication and the consequent proof of identity.
                 Despite the fact that such system requires for
                 registrar initialization, the Consistent History
                 Protocol provides a reasonable degree of reliability in
                 identifying subjects at the steady state. As
                 application, we deployed the protocol in the indirect
                 electronic data collection scenario, where large data
                 flows have to be exchanged and certified among a set of
                 mutually trusted Institutions. The experimental results
                 report the processing overhead introduced by the
                 authentication protocol, which results negligible with
                 respect a classical strong authentication method built
                 around the OpenSSL library.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ruan:2006:NSC,
  author =       "X. Ruan and R. S. Katti",
  title =        "A New Source Coding Scheme with Small Expected Length
                 and Its Application to Simple Data Encryption",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "55",
  number =       "10",
  pages =        "1300--1305",
  month =        oct,
  year =         "2006",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2006.155",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 15:35:56 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1683760",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Rubin:2006:CSE,
  author =       "Bradley S. Rubin and Donald Cheung",
  title =        "Computer Security Education and Research: Handle with
                 Care",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "56--59",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.146",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@InProceedings{Satoh:2006:DPI,
  author =       "Takakazu Satoh",
  title =        "On Degrees of Polynomial Interpolations Related to
                 Elliptic Curve Cryptography",
  crossref =     "Ytrehus:2006:CCI",
  pages =        "155--163",
  year =         "2006",
  bibdate =      "Tue Jun 28 08:19:10 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Scambray:2006:HEW,
  author =       "Joel Scambray and Mike Shema and Caleb Sima",
  title =        "Hacking exposed: {Web} applications",
  publisher =    pub-MCGRAW-HILL,
  address =      pub-MCGRAW-HILL:adr,
  edition =      "Second",
  pages =        "xxix + 520",
  year =         "2006",
  ISBN =         "0-07-226299-0 (paperback)",
  ISBN-13 =      "978-0-07-226299-5 (paperback)",
  LCCN =         "TK5105.59 .S32 2006",
  bibdate =      "Fri Jun 20 11:44:24 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures; Web sites;
                 Computer security",
}

@Article{Schmidt-Samoa:2006:AFW,
  author =       "K. Schmidt-Samoa and O. Semay and T. Takagi",
  title =        "Analysis of fractional window recoding methods and
                 their application to elliptic curve cryptosystems",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "55",
  number =       "1",
  pages =        "48--57",
  month =        jan,
  year =         "2006",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2006.3",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 15:35:52 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1545750",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Book{Schramm:2006:AMS,
  author =       "Kai Schramm",
  title =        "Advanced Methods in Side Channel Cryptanalysis",
  publisher =    "Europ{\"a}ischer Universit{\"a}tsverlag",
  address =      "Bochum, Germany",
  pages =        "170",
  year =         "2006",
  ISBN =         "3-89966-187-7",
  ISBN-13 =      "978-3-89966-187-3",
  LCCN =         "????",
  bibdate =      "Fri May 13 08:50:45 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "EUR 22.90",
  URL =          "http://verlag.rub.de/g9783899661873.html",
  abstract =     "Side channel cryptanalysis attempts to exploit
                 physical leakages of cipher implementations in order to
                 extract secret key information. The dissertation at
                 hand provides a detailed insight into new and refined
                 side channel attacks and corresponding countermeasures.
                 The attacks proposed in this thesis embrace internal
                 collision attacks against the Data Encryption Standard
                 (DES), the Advanced Encryption Standard (AES) and the
                 block ciphers Serpent and Kasumi. Moreover, an attack
                 which combines the multivariate classification of side
                 channel signals and classic Differential Power Analysis
                 (DPA) is presented.\par

                 The blinding of intermediate, key-dependent variables
                 in a cipher with randomized masks is the most common
                 countermeasure against side channel attacks. In this
                 thesis various variants of the masking countermeasure
                 are investigated and performance figures are given.
                 Furthermore, security aspects are examined. For
                 example, it is shown that masked hardware
                 implementations may not prevent side channel attacks
                 due to glitching activities in masked circuits.",
  acknowledgement = ack-nhfb,
}

@Book{Sergienko:2006:QCC,
  editor =       "Alexander V. Sergienko",
  title =        "Quantum communications and cryptography",
  publisher =    "Taylor and Francis",
  address =      "Boca Raton, FL, USA",
  pages =        "232",
  year =         "2006",
  ISBN =         "0-8493-3684-8",
  ISBN-13 =      "978-0-8493-3684-3",
  LCCN =         "TK5102.94 .Q36 2005",
  bibdate =      "Sun Dec 13 08:42:24 MST 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0648/2005050636-d.html;
                 http://www.loc.gov/catdir/toc/fy0713/2005050636.html",
  acknowledgement = ack-nhfb,
  subject =      "Quantum communication; Security measures;
                 Cryptography; Coding theory; Data encryption (Computer
                 science)",
  tableofcontents = "Quantum Cryptography [A. Ekert] \\
                 Quantum Communications with Optical Fibers [N. Gisin,
                 S. Iblisdir, W. Tittel, and H. Zbinden] \\
                 Advanced Quantum Communications Experiments with
                 Entangled Photons [M. Aspelmeyer, H. R. B{\"o}hm, A.
                 Fedrizzi, S. Gasparoni, M. Lindenthal, G.
                 Molina-Terriza, A. Poppe, K. Resch, R. Ursin, P.
                 Walther, A. Zeilinger, and T. Jennewein] \\
                 The DARPA Quantum Network [C. Elliott] \\
                 Experimental Cryptography Using Continuous Polarization
                 States [S. Lorenz, N. L{\"u}tkenhaus, G. Leuchs, and N.
                 Korolkova] \\
                 Quantum Logic Using Linear Optics [J.D. Franson, B.C.
                 Jacobs, and T.B. Pittman] \\
                 Practical Quantum Cryptography: Secrecy Capacity and
                 Privacy Amplification [G. Gilbert, M. Hamrick, and F.J.
                 Thayer] \\
                 Quantum State Sharing [T. Symul, A.M. Lance, W.P.
                 Bowen, P.K. Lam, B.C. Sanders, and T.C. Ralph] \\
                 Free-Space Quantum Cryptography [C. Kurtsiefer, M.
                 Halder, H. Weinfurter, P. Zarda, P.R. Tapster, P.M.
                 Gorman, and J.G. Rarity] \\
                 Noise-Immune Quantum Key Distribution [Z.D. Walton,
                 A.V. Sergienko, B.E.A. Saleh, and M.C. Teich] \\
                 Index",
}

@Article{Shieh:2006:ERM,
  author =       "Wen-Gong Shieh and Jian-Min Wang",
  title =        "Efficient remote mutual authentication and key
                 agreement",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "72--77",
  month =        feb,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001719",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shumba:2006:THL,
  author =       "Rose Shumba",
  title =        "Teaching hands-on {Linux} host computer security",
  journal =      j-JERIC,
  volume =       "6",
  number =       "3",
  pages =        "5:1--5:??",
  month =        sep,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1243481.1243486",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:25 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "In the summer of 2003, a project to augment and
                 improve the teaching of information assurance courses
                 was started at IUP. Thus far, ten hands-on exercises
                 have been developed. The exercises described in this
                 article, and presented in the appendix, are based on
                 actions required to secure a Linux host. Publicly
                 available resources were used to develop the exercises,
                 which have been successfully utilized since spring 2003
                 to teach cybersecurity basics classes. The experiences
                 and challenges encountered in teaching the course and
                 possible future work are also described.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Journal on Educational Resources in Computing
                 (JERIC)",
  keywords =     "computer security; cryptography; file integrity; file
                 permissions; host security exercises; user accounts",
}

@InProceedings{Simka:2006:MTR,
  author =       "M. Simka and V. Fischer and M. Drutarovsky and J.
                 Fayolle",
  booktitle =    "{ISCAS 2006: 2006 IEEE International Symposium on
                 Circuits and Systems: Circuits and systems: at
                 crossroads of life and technology: proceedings: May
                 21--24: Kos International Convention Centre (KICC),
                 Island of Kos, Greece}",
  title =        "Model of a True Random Number Generator Aimed at
                 Cryptographic Application",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "5619--5623",
  year =         "2006",
  DOI =          "https://doi.org/10.1109/ISCAS.2006.1693909",
  ISBN =         "0-7803-9390-2",
  ISBN-13 =      "978-0-7803-9390-5",
  LCCN =         "????",
  bibdate =      "Tue Jan 31 15:54:54 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  note =         "IEEE catalog number 06CH37717C.",
  URL =          "http://www.ieeexplore.ieee.org/xpl/RecentCon.jsp?punumber=11145",
  acknowledgement = ack-nhfb,
  keywords =     "true random numbers from physical sources",
}

@Article{Singaravelu:2006:RTC,
  author =       "Lenin Singaravelu and Calton Pu and Hermann H{\"a}rtig
                 and Christian Helmuth",
  title =        "Reducing {TCB} complexity for security-sensitive
                 applications: three case studies",
  journal =      j-OPER-SYS-REV,
  volume =       "40",
  number =       "4",
  pages =        "161--174",
  month =        oct,
  year =         "2006",
  CODEN =        "OSRED8",
  DOI =          "https://doi.org/10.1145/1217935.1217951",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Fri Jun 20 17:14:10 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The large size and high complexity of
                 security-sensitive applications and systems software is
                 a primary cause for their poor testability and high
                 vulnerability. One approach to alleviate this problem
                 is to extract the security-sensitive parts of
                 application and systems software, thereby reducing the
                 size and complexity of software that needs to be
                 trusted. At the system software level, we use the Nizza
                 architecture which relies on a kernelized trusted
                 computing base (TCB) and on the reuse of legacy code
                 using trusted wrappers to minimize the size of the TCB.
                 At the application level, we extract the
                 security-sensitive portions of an already existing
                 application into an AppCore. The AppCore is executed as
                 a trusted process in the Nizza architecture while the
                 rest of the application executes on a virtualized,
                 untrusted legacy operating system. In three case
                 studies of real-world applications (e-commerce
                 transaction client, VPN gateway and digital signatures
                 in an e-mail client), we achieved a considerable
                 reduction in code size and complexity. In contrast to
                 the few hundred thousand lines of current application
                 software code running on millions of lines of systems
                 software code, we have AppCores with tens of thousands
                 of lines of code running on a hundred thousand lines of
                 systems software code. We also show the performance
                 penalty of AppCores to be modest (a few percent)
                 compared to current software.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGOPS Operating Systems Review",
  keywords =     "application security; trusted computing base",
}

@Article{Sivonen:2006:MPF,
  author =       "Timo Sivonen",
  title =        "Measuring Performance of {FreeBSD} Disk Encryption",
  journal =      j-LOGIN,
  volume =       "31",
  number =       "5",
  pages =        "40--45",
  month =        oct,
  year =         "2006",
  CODEN =        "LOGNEM",
  ISSN =         "1044-6397",
  ISSN-L =       "1044-6397",
  bibdate =      "Fri Dec 7 11:34:26 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/usenix2000.bib;
                 https://www.usenix.org/publications/login",
  URL =          "https://www.usenix.org/publications/login/october-2006-volume-31-number-5/measuring-performance-freebsd-disk-encryption",
  acknowledgement = ack-nhfb,
  fjournal =     ";login: the USENIX Association newsletter",
}

@Book{Skoudis:2006:CHR,
  author =       "Ed Skoudis and Tom Liston",
  title =        "Counter hack reloaded: a step-by-step guide to
                 computer attacks and effective defenses",
  publisher =    pub-PHPTR,
  address =      pub-PHPTR:adr,
  edition =      "Second",
  pages =        "????",
  year =         "2006",
  ISBN =         "0-13-148104-5 (paperback)",
  ISBN-13 =      "978-0-13-148104-6 (paperback)",
  LCCN =         "TK5105.59 .S57 2006",
  bibdate =      "Mon Apr 3 07:35:11 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip0519/2005027164.html",
  acknowledgement = ack-nhfb,
  remark =       "Rev. ed. of: Counter hack, c2002.",
  subject =      "Computer networks; Security measures; Data
                 protection",
}

@Article{Small:2006:USR,
  author =       "Mike Small",
  title =        "Unify and simplify: re-thinking identity management",
  journal =      j-NETWORK-SECURITY,
  volume =       "2006",
  number =       "7",
  pages =        "11--14",
  month =        jul,
  year =         "2006",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(06)70411-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:28 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485806704111",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@InCollection{Smith:2006:CNS,
  author =       "Adam Smith and Cynthia Dwork and Frank McSherry and
                 Kobbi Nissim",
  booktitle =    "Theory of Cryptography Conference (TCC) 2006
                 conference proceedings",
  title =        "Calibrating Noise to Sensitivity in Private Data
                 Analysis",
  publisher =    "????",
  address =      "????",
  pages =        "??--??",
  year =         "2006",
  bibdate =      "Tue Jan 19 16:18:31 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  remark =       "This paper won the Theory of Cryptography Conference
                 (TCC) 2016 Test of Time award.",
}

@InProceedings{Smith:2006:SID,
  author =       "Matthew Smith and Michael Engel and Thomas Friese and
                 Bernd Freisleben and Gregory A. Koenig and William
                 Yurcik",
  title =        "Security Issues in On-Demand Grid and Cluster
                 Computing",
  crossref =     "Turner:2006:SIS",
  pages =        "24--??",
  year =         "2006",
  bibdate =      "Sat Oct 14 15:36:21 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "In this paper, security issues in on-demand Grid and
                 cluster computing are analyzed, a corresponding threat
                 model is presented and the challenges with respect to
                 authentication, authorization, delegation and single
                 sign-on, secure communication, auditing, safety, and
                 confidentiality are discussed. Three different levels
                 of on-demand computing are identified, based on the
                 number of resource providers, solution producers and
                 users, and the trust relationships between them. It is
                 argued that the threats associated with the first two
                 levels can be handled by employing operating system
                 virtualization technologies based on Xen, whereas the
                 threats of the third level require the use of hardware
                 security modules proposed in the context of the Trusted
                 Computing Platform Alliance (TCPA). The presented
                 security mechanisms increase the resilience of the
                 service hosting environment against both malicious
                 attacks and erroneous code. Thus, our proposal paves
                 the way for large scale hosting of Grid or web services
                 in commercial scenarios.",
  acknowledgement = ack-nhfb,
}

@Article{Solar-Lezama:2006:CSF,
  author =       "Armando Solar-Lezama and Liviu Tancau and Rastislav
                 Bodik and Sanjit Seshia and Vijay Saraswat",
  title =        "Combinatorial sketching for finite programs",
  journal =      j-SIGPLAN,
  volume =       "41",
  number =       "11",
  pages =        "404--415",
  month =        nov,
  year =         "2006",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/1168917.1168907",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Wed Jun 18 10:49:40 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Sketching is a software synthesis approach where the
                 programmer develops a partial implementation --- a
                 sketch --- and a separate specification of the desired
                 functionality. The synthesizer then completes the
                 sketch to behave like the specification. The
                 correctness of the synthesized implementation is
                 guaranteed by the compiler, which allows, among other
                 benefits, rapid development of highly tuned
                 implementations without the fear of introducing bugs.
                 We develop SKETCH, a language for finite programs with
                 linguistic support for sketching. Finite programs
                 include many high-performance kernels, including
                 cryptocodes. In contrast to prior synthesizers, which
                 had to be equipped with domain-specific rules, SKETCH
                 completes sketches by means of a combinatorial search
                 based on generalized boolean satisfiability.
                 Consequently, our combinatorial synthesizer is complete
                 for the class of finite programs: it is guaranteed to
                 complete any sketch in theory, and in practice has
                 scaled to realistic programming problems. Freed from
                 domain rules, we can now write sketches as
                 simple-to-understand partial programs, which are
                 regular programs in which difficult code fragments are
                 replaced with holes to be filled by the synthesizer.
                 Holes may stand for index expressions, lookup tables,
                 or bitmasks, but the programmer can easily define new
                 kinds of holes using a single versatile synthesis
                 operator. We have used SKETCH to synthesize an
                 efficient implementation of the AES cipher standard.
                 The synthesizer produces the most complex part of the
                 implementation and runs in about an hour.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  keywords =     "SAT; sketching",
}

@Article{Spivak:2006:SPT,
  author =       "Michal Spivak and Sivan Toledo",
  title =        "Storing a persistent transactional object heap on
                 flash memory",
  journal =      j-SIGPLAN,
  volume =       "41",
  number =       "7",
  pages =        "22--33",
  month =        jul,
  year =         "2006",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/1134650.1134655",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Wed Jun 18 10:44:55 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We present the design and implementation of TinyStore,
                 a persistent, transactional, garbage-collected
                 memory-management system, designed to be called from
                 the Java virtual machine of a Java Card. The system is
                 designed for flash-based implementations of Java Card,
                 a variant of the Java platform for smart cards. In the
                 Java Card platform, objects are persistent by default.
                 The platform supports transactions: a sequence of
                 accesses to objects can be explicitly declared to
                 constitute a transaction. TinyStore supports explicit
                 transactions and atomically executes individual
                 accesses that are not part of transactions; it also
                 supports garbage collection, even on systems with a
                 small constant amount of ram. TinyStore uses a novel
                 approach and specialized data structures to efficiently
                 manage flash memory. We demonstrate its effectiveness
                 by comparing it to a traditional eeprom-based memory
                 management system for Java Cards.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  keywords =     "flash; Java Card; nor flash; persistent heaps;
                 persistent object stores; smart cards; transactions",
}

@Article{Stabell-Kulo:2006:ESC,
  author =       "Tage Stabell-Kul{\o}",
  title =        "From the {Editor}: Security Community --- Blurring the
                 Line between Authentication and Identification",
  journal =      j-IEEE-DISTRIB-SYST-ONLINE,
  volume =       "7",
  number =       "2",
  pages =        "1--5",
  month =        feb,
  year =         "2006",
  CODEN =        "????",
  ISSN =         "1541-4922 (print), 1558-1683 (electronic)",
  ISSN-L =       "1541-4922",
  bibdate =      "Mon Aug 30 23:14:33 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csdl.computer.org/comp/mags/ds/2006/02/o2002.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Distributed Systems Online",
}

@Article{Staff:2006:NTS,
  author =       "{CACM Staff}",
  title =        "News track: Super Game Plan; {E}-Learning Roots
                 Disputed; {Chinese} History; {U.K.} Seeks Popular
                 Science Input; Encryption Commitment; {{\em
                 Improve}}-ment News; Vid Kid",
  journal =      j-CACM,
  volume =       "49",
  number =       "11",
  pages =        "9--10",
  month =        nov,
  year =         "2006",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Oct 24 06:40:13 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Book{Stamp:2006:ISP,
  author =       "Mark Stamp",
  title =        "Information security: principles and practice",
  publisher =    pub-WILEY-INTERSCIENCE,
  address =      pub-WILEY-INTERSCIENCE:adr,
  pages =        "xxi + 390",
  year =         "2006",
  ISBN =         "0-471-73848-4 (cloth)",
  ISBN-13 =      "978-0-471-73848-0 (cloth)",
  LCCN =         "QA76.9.A25 S69 2006",
  bibdate =      "Sat May 14 10:14:47 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0645/2005005152-b.html;
                 http://www.loc.gov/catdir/enhancements/fy0645/2005005152-d.html;
                 http://www.loc.gov/catdir/toc/ecip058/2005005152.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer security",
  tableofcontents = "Preface \\
                 About The Author \\
                 Acknowledgments \\
                 1. Introduction \\
                 1.1 The Cast of Characters \\
                 1.2 Alice's Online Bank \\
                 1.2.1 Confidentiality, Integrity and \\
                 1.2.2 Beyond CIA \\
                 1.3 About This Book \\
                 1.3.1 Cryptography \\
                 1.3.2 Access Control \\
                 1.3.3 Protocols \\
                 1.3.4 Software \\
                 1.4 The People Problem \\
                 1.5 Theory and Practice \\
                 1.6 Problems \\
                 I. CRYPTO \\
                 2. Crypto Basics \\
                 2.1 Introduction \\
                 2.2 How to Speak Crypto \\
                 2.3 Classic Crypto \\
                 2.3.1 Simple Substitution Cipher \\
                 2.3.2 Cryptanalysis of a Simple Substitution \\
                 2.3.3 Definition of Secure \\
                 2.3.4 Double Transposition Cipher \\
                 2.3.5 One-time Pad \\
                 2.3.6 Project VENONA \\
                 2.3.7 Codebook Cipher \\
                 2.3.8 Ciphers of the Election of 1876 \\
                 2.4 Modern Crypto History \\
                 2.5 A Taxonomy of Cryptography \\
                 2.6 A Taxonomy of Cryptanalysis \\
                 2.7 Summary \\
                 2.8 Problems \\
                 3. Symmetric Key Crypto \\
                 3.1 Introduction \\
                 3.2 Stream Ciphers \\
                 3.2.1 A 5/1.3.2.2 RC 4.3.3 Block Ciphers \\
                 3.3.1 Feistel Cipher \\
                 3.3.2 DES \\
                 3.3.3 Triple DES \\
                 3.3.4 AES \\
                 3.3.5 Three More Block Ciphers \\
                 3.3.6 TEA \\
                 3.3.7 Block Cipher Modes \\
                 3.4 Integrity \\
                 3.5 Summary \\
                 3.6 Problems \\
                 4. Public Key Crypto \\
                 4.1 Introduction \\
                 4.2 Knapsack \\
                 4.3 RSA \\
                 4.3.1 RSA Example \\
                 4.3.2 Repeated Squaring \\
                 4.3.3 Speeding Up RSA \\
                 4.4 Diffie-Hellman \\
                 4.5 Elliptic Curve Cryptography \\
                 4.5.1 Elliptic Curve Math \\
                 4.5.2 ECC Diffie-Hellman \\
                 4.6 Public Key Notation \\
                 4.7 Uses for Public Key Crypto \\
                 4.7.1 Confidentiality in the Real World \\
                 4.7.2 Signatures and Non-repudiation \\
                 4.7.3 Confidentiality and Non-repudiation \\
                 4.8 Public Key Infrastructure \\
                 4.9 Summary \\
                 4.10 Problems \\
                 5. Hash Functions and Other Topics \\
                 5.1 What is a Hash Function? \\
                 5.2 The Birthday Problem \\
                 5.3 Non-cryptographic Hashes \\
                 5.4 Tiger Hash \\
                 5.5 HMAC \\
                 5.6 Uses of Hash Functions \\
                 5.6.1 Online Bids \\
                 5.6.2 Spam Reduction \\
                 5.7 Other Crypto-Related Topics \\
                 5.7.1 Secret Sharing.Key Escrow \\
                 5.7.2 Random Numbers. Texas Hold 'em Poker. Generating
                 Random Bits \\
                 5.7.3 Information Hiding \\
                 5.8 Summary \\
                 5.9 Problems \\
                 6. Advanced Cryptanalysis \\
                 6.1 Introduction \\
                 6.2 Linear and Differential Cryptanalysis \\
                 6.2.1 Quick Review of DES \\
                 6.2.2 ???",
}

@Article{Standaert:2006:SSE,
  author =       "Fran{\c{c}}ois-Xavier Standaert and Gilles Piret and
                 Neil Gershenfeld and Jean-Jacques Quisquater",
  title =        "{SEA}: A Scalable Encryption Algorithm for Small
                 Embedded Applications",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3928",
  pages =        "222--236",
  year =         "2006",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11733447_16",
  ISBN =         "3-540-33311-8 (print), 3-540-33312-6 (e-book)",
  ISBN-13 =      "978-3-540-33311-1 (print), 978-3-540-33312-8
                 (e-book)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Jan 31 18:33:36 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2006a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/11733447_16",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
  remark =       "{Smart Card Research and Advanced Applications: 7th
                 IFIP WG 8.8/11.2 International Conference, CARDIS 2006,
                 Tarragona, Spain, April 19--21, 2006. Proceedings}",
}

@Book{StDenis:2006:BMI,
  author =       "Tom {St Denis} and Greg Rose",
  title =        "{BigNum} Math: Implementing Cryptographic Multiple
                 Precision Arithmetic",
  publisher =    pub-SYNGRESS,
  address =      pub-SYNGRESS:adr,
  pages =        "xviii + 296",
  year =         "2006",
  ISBN =         "1-59749-112-8",
  ISBN-13 =      "978-1-59749-112-9",
  LCCN =         "QA402.5 .S73 2006",
  bibdate =      "Fri Jun 12 07:26:51 MDT 2009",
  bibsource =    "clas.caltech.edu:210/INNOPAC;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 z3950.bibsys.no:2100/BIBSYS; clas.caltech.edu:210/INNOPAC;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib;
                 z3950.bibsys.no:2100/BIBSYS",
  price =        "US\$49.95",
  URL =          "http://www.oreilly.com/catalog/1597491128/index.html",
  acknowledgement = ack-nhfb,
  keywords =     "Karatsuba multiplication; modular exponentiation;
                 Montgomery reduction",
  tableofcontents = "Introduction \\
                 Multiple Precision Arithmetic \\
                 Exercises \\
                 Portability and Stability \\
                 Getting Started \\
                 Maintenance Algorithms \\
                 Basic Operations \\
                 Sign Manipulation \\
                 Basic Arithmetic \\
                 Multiplication and Squaring \\
                 The Multipliers \\
                 Multiplication \\
                 Modular Reduction \\
                 Basics of Modular Reduction \\
                 Exponentiation \\
                 Exponentiation Basics \\
                 Higher Level Algorithms \\
                 Number Theoretic Algorithms",
}

@Article{Stieber:2006:GH,
  author =       "Tony Stieber",
  title =        "{GnuPG} hacks",
  journal =      j-LINUX-J,
  volume =       "2006",
  number =       "143",
  pages =        "2--2",
  month =        mar,
  year =         "2006",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Thu Mar 9 06:03:14 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Stieber:2006:OH,
  author =       "Anthony J. Stieber",
  title =        "{OpenSSL} hacks",
  journal =      j-LINUX-J,
  volume =       "2006",
  number =       "147",
  pages =        "??--??",
  month =        jul,
  year =         "2006",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Wed Aug 23 06:09:28 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Book{Stinson:2006:CTP,
  author =       "Douglas R. (Douglas Robert) Stinson",
  title =        "Cryptography: theory and practice",
  publisher =    pub-CHAPMAN-HALL-CRC,
  address =      pub-CHAPMAN-HALL-CRC:adr,
  edition =      "Third",
  pages =        "593",
  year =         "2006",
  ISBN =         "1-58488-508-4 (hardcover)",
  ISBN-13 =      "978-1-58488-508-5 (hardcover)",
  LCCN =         "QA268 .S75 2006",
  bibdate =      "Sun Dec 13 08:48:03 MST 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "The CRC Press series on discrete mathematics and its
                 applications.",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0647/2006272493-d.html",
  acknowledgement = ack-nhfb,
  subject =      "coding theory; cryptography",
}

@Article{Sun:2006:PBA,
  author =       "Hung-Min Sun and Her-Tyan Yeh",
  title =        "Password-based authentication and key distribution
                 protocols with perfect forward secrecy",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "72",
  number =       "6",
  pages =        "1002--1011",
  month =        sep,
  year =         "2006",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2006.03.005",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:27:01 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000006000481",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Book{Talbot:2006:CCI,
  author =       "J. (John) Talbot and D. J. A. Welsh",
  title =        "Cryptography and complexity: an introduction",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "xii + 292",
  year =         "2006",
  ISBN =         "0-521-85231-5 (hardcover), 0-521-61771-5 (paperback)",
  ISBN-13 =      "978-0-521-85231-9 (hardcover), 978-0-521-61771-0
                 (paperback)",
  LCCN =         "Z103 .T35 2006",
  bibdate =      "Fri Dec 23 07:24:36 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 jenson.stanford.edu:2210/unicorn;
                 z3950.bibsys.no:2100/BIBSYS",
  acknowledgement = ack-nhfb,
  subject =      "Cryptography; Computational complexity",
}

@Article{Tang:2006:CHA,
  author =       "Qiang Tang and Chris J. Mitchell",
  title =        "Cryptanalysis of a hybrid authentication protocol for
                 large mobile networks",
  journal =      j-J-SYST-SOFTW,
  volume =       "79",
  number =       "4",
  pages =        "496--501",
  month =        apr,
  year =         "2006",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:01 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Teepe:2006:PPA,
  author =       "Wouter Teepe",
  title =        "Proving Possession of Arbitrary Secrets While not
                 Giving them Away: New Protocols and a Proof in {GNY}
                 Logic",
  journal =      j-SYNTHESE,
  volume =       "149",
  number =       "2",
  pages =        "409--443",
  month =        mar,
  year =         "2006",
  CODEN =        "SYNTAE",
  DOI =          "https://doi.org/10.1007/s11229-005-3879-4",
  ISSN =         "0039-7857 (print), 1573-0964 (electronic)",
  ISSN-L =       "0039-7857",
  bibdate =      "Mon Sep 25 13:44:15 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/synthese2000.bib",
  URL =          "http://link.springer.com//content/pdf/10.1007/s11229-005-3879-4.pdf;
                 http://link.springer.com/article/10.1007/s11229-005-3879-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Synthese",
  journal-URL =  "http://link.springer.com/journal/11229",
}

@Article{Tomaszewski:2006:YSY,
  author =       "John P. Tomaszewski",
  title =        "Are You Sure You Had a Privacy Incident?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "64--66",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.143",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Book{Trappe:2006:ICC,
  author =       "Wade Trappe and Lawrence C. Washington",
  title =        "Introduction to Cryptography: with Coding Theory",
  publisher =    "Pearson Prentice Hall",
  address =      "Upper Saddle River, NJ, USA",
  edition =      "Second",
  pages =        "xiv + 577",
  year =         "2006",
  ISBN =         "0-13-186239-1, 0-13-198199-4 (paperback)",
  ISBN-13 =      "978-0-13-186239-5, 978-0-13-198199-7 (paperback)",
  LCCN =         "QA268 .T73 2006",
  bibdate =      "Wed Mar 15 06:50:49 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/maple-extract.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathematica.bib;
                 https://www.math.utah.edu/pub/tex/bib/matlab.bib",
  abstract =     "This text is for a course in cryptography for advanced
                 undergraduate and graduate students. Material is
                 accessible to mathematically mature students having
                 little background in number theory and computer
                 programming. Core material is treated in the first
                 eight chapters on areas such as classical
                 cryptosystems, basic number theory, the RSA algorithm,
                 and digital signatures. The remaining nine chapters
                 cover optional topics including secret sharing schemes,
                 games, and information theory. Appendices contain
                 computer examples in Mathematica, Maple, and MATLAB.
                 The text can be taught without computers.",
  acknowledgement = ack-nhfb,
  subject =      "Coding theory; Cryptography; Codage; Cryptographie;
                 Coding theory; Cryptography; Codierungstheorie;
                 Kryptologie; Codierungstheorie; Kryptologie",
  tableofcontents = "1: Overview of Cryptography and Its Applications
                 \\
                 Secure Communications \\
                 Cryptographic Applications \\
                 2: Classical Cryptosystems \\
                 Shift Ciphers \\
                 Affine Ciphers \\
                 The Vigenere Cipher \\
                 Substitution Ciphers \\
                 Sherlock Holmes \\
                 The Playfair and ADFGX Ciphers \\
                 Block Ciphers \\
                 Binary Numbers and ASCII \\
                 One-Time Pads \\
                 Pseudo-random Bit Generation \\
                 LFSR Sequences \\
                 Enigma \\
                 Exercises \\
                 Computer Problems \\
                 3: Basic Number Theory \\
                 Basic Notions \\
                 Solving ax + by = d \\
                 Congruences \\
                 The Chinese Remainder Theorem \\
                 Modular Exponentiation \\
                 Fermat and Euler \\
                 Primitive Roots \\
                 Inverting Matrices Mod n \\
                 Square Roots Mod n \\
                 Legendre and Jacobi Symbols \\
                 Finite Fields \\
                 Continued Fractions \\
                 Exercises \\
                 Computer Problems \\
                 4: The Data Encryption Standard \\
                 A Simplified DES-Type Algorithm \\
                 Differential Cryptanalysis \\
                 DES \\
                 Modes of Operation \\
                 Breaking DES \\
                 Meet-in-the-Middle Attacks \\
                 Password Security \\
                 Exercises \\
                 Computer Problems \\
                 5: The Advanced Encryption Standard: Rijndael \\
                 The Basic Algorithm \\
                 The Layers \\
                 Decryption \\
                 Design Considerations \\
                 Exercises \\
                 6: The RSA Algorithm \\
                 The RSA Algorithm \\
                 Attacks on RSA \\
                 Primality Testing \\
                 Factoring \\
                 The RSA Challenge \\
                 An Application to Treaty Verification \\
                 The Public Key Concept \\
                 Exercises \\
                 Computer Problems \\
                 7: Discrete Logarithms \\
                 Discrete Logarithms \\
                 Computing Discrete Logs \\
                 Bit Commitment \\
                 Diffie-Hellman Key Exchange \\
                 The ElGamal Public Key Cryptosystem \\
                 Exercises \\
                 Computer Problems \\
                 8: Hash Functions \\
                 Hash Functions \\
                 A Simple Hash Example \\
                 The Secure Hash Algorithm \\
                 Birthday Attacks \\
                 Multicollisions \\
                 The Random Oracle Model \\
                 Using Hash Functions to Encrypt \\
                 Exercises \\
                 Computer Problems \\
                 9: Digital Signatures \\
                 RSA Signatures \\
                 The ElGamal Signature Scheme \\
                 Hashing and Signing \\
                 Birthday Attacks on Signatures \\
                 The Digital Signature Algorithm \\
                 Exercises \\
                 Computer Problems \\
                 10: Security Protocols \\
                 Intruders-in-the-Middle and Impostors \\
                 Key Distribution \\
                 Kerberos \\
                 Public Key Infrastructures (PKI) \\
                 X.509 Certificates \\
                 Pretty Good Privacy \\
                 SSL and TLS \\
                 Secure Electronic Transaction \\
                 Exercises \\
                 11: Digital Cash \\
                 Digital Cash \\
                 Exercises \\
                 12: Secret Sharing Schemes \\
                 Secret Splitting \\
                 Threshold Schemes \\
                 Exercises \\
                 Computer Problems \\
                 13: Games \\
                 Flipping Coins over the Telephone \\
                 Poker over the Telephone \\
                 Exercises \\
                 14: Zero-Knowledge Techniques \\
                 The Basic Setup \\
                 The Feige--Fiat--Shamir Identification Scheme \\
                 Exercises \\
                 15: Information Theory \\
                 Probability Review \\
                 Entropy \\
                 Huffman Codes \\
                 Perfect Secrecy \\
                 The Entropy of English \\
                 Exercises \\
                 16: Elliptic Curves \\
                 The Addition Law \\
                 Elliptic Curves Mod p \\
                 Factoring with Elliptic Curves \\
                 Elliptic Curves in Characteristic 2 \\
                 Elliptic Curve Cryptosystems \\
                 Identity-Based Encryption \\
                 Exercises \\
                 Computer Problems \\
                 17: Lattice Methods \\
                 Lattices \\
                 Lattice Reduction \\
                 An Attack on RSA \\
                 NTRU \\
                 Exercises \\
                 18: Error Correcting Codes. Introduction \\
                 Error Correcting Codes \\
                 Bounds on General Codes \\
                 Linear Codes \\
                 Hamming Codes \\
                 Golay Codes \\
                 Cyclic Codes \\
                 BCH Codes \\
                 Reed-Solomon Codes \\
                 The McEliece Cryptosystem \\
                 Other Topics \\
                 Exercises \\
                 Computer Problems \\
                 19: Quantum Techniques in Cryptography \\
                 A Quantum Experiment \\
                 Quantum Key Distribution \\
                 Shor's Algorithm \\
                 Exercises \\
                 A: Mathematica Examples \\
                 B: Maple Examples \\
                 C: Matlab Examples",
}

@Article{Tsaban:2006:FGD,
  author =       "Boaz Tsaban",
  title =        "Fast generators for the {Diffie--Hellman} key
                 agreement protocol and malicious standards",
  journal =      j-INFO-PROC-LETT,
  volume =       "99",
  number =       "4",
  pages =        "145--148",
  day =          "31",
  month =        aug,
  year =         "2006",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 18:41:12 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Book{Vacca:2006:GWN,
  author =       "John R. Vacca",
  title =        "Guide to wireless network security",
  volume =       "20",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xxii + 848",
  year =         "2006",
  ISBN =         "0-387-95425-2",
  ISBN-13 =      "978-0-387-95425-7",
  LCCN =         "QA76.9.A25 C66 2006",
  bibdate =      "Fri Aug 25 15:25:26 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Advances in information security",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0663/2005939009-d.html",
  acknowledgement = ack-nhfb,
  remark =       "From the publisher: ``With the rapid deployment of
                 wireless networks in business environments, IT
                 professionals must implement security mechanisms that
                 are equivalent to those existing today for wire-based
                 networks. This volume is an authoritative,
                 clearly-presented guide to key foundation topics and
                 technology frameworks for designing and maintaining
                 secure, reliable operations. From basic concepts to
                 designing principles to deployment, all critical
                 concepts and phases are explained in detail. The book
                 also includes coverage of wireless security testing
                 techniques and intrusion prevention
                 techniques.\par

                 Through extensive hands-on examples, Guide to Wireless
                 Network Security demonstrates how to install, configure
                 and troubleshoot firewalls and wireless network
                 security applications; evaluate, implement and manage
                 wireless secure remote access technologies; and deploy
                 a variety of Virtual Private Networks, intrusion
                 detection systems and intrusion prevention systems, in
                 conjunction with information warfare
                 countermeasures.''",
  subject =      "Data encryption (Computer science)",
}

@Article{vanDijk:2006:ICS,
  author =       "Marten van Dijk and Tom Kevenaar and Geert-Jan
                 Schrijen and Pim Tuyls",
  title =        "Improved constructions of secret sharing schemes by
                 applying $ (\lambda, \omega) $-decompositions",
  journal =      j-INFO-PROC-LETT,
  volume =       "99",
  number =       "4",
  pages =        "154--157",
  day =          "31",
  month =        aug,
  year =         "2006",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 18:41:12 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@InProceedings{Vergnaud:2006:RBS,
  author =       "Damien Vergnaud",
  title =        "{RSA}-Based Secret Handshakes",
  crossref =     "Ytrehus:2006:CCI",
  pages =        "252--274",
  year =         "2006",
  bibdate =      "Tue Jun 28 08:19:10 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Vernitski:2006:CUM,
  author =       "Alexei Vernitski",
  title =        "Can Unbreakable Mean Incomputable?",
  journal =      j-COMP-J,
  volume =       "49",
  number =       "1",
  pages =        "108--112",
  month =        jan,
  year =         "2006",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxh144",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Dec 21 17:38:55 MST 2005",
  bibsource =    "http://comjnl.oxfordjournals.org/content/vol49/issue1/index.dtl;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://comjnl.oxfordjournals.org/cgi/content/abstract/49/1/108;
                 http://comjnl.oxfordjournals.org/cgi/content/full/49/1/108;
                 http://comjnl.oxfordjournals.org/cgi/reprint/49/1/108",
  abstract =     "Among methods of breaking a cipher, exhaustive key
                 search stands out as the most successful (albeit the
                 least efficient) method. We demonstrate that various
                 algorithmic implementations of exhaustive key search
                 are not equally effective, and cryptosystems can be
                 devised which make some implementations of exhaustive
                 key search unsuccessful (in the sense that the problem
                 these algorithms try to solve turns out to be
                 incomputable). We observe that there are
                 implementations of exhaustive key search that are
                 always successful (i.e. they terminate and generate a
                 correct result irrespective of the cryptosystem they
                 are used against). As to those implementations of
                 exhaustive key search that are not always successful,
                 we describe them and those cryptosystems that can make
                 them unsuccessful.",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Wang:2006:SPS,
  author =       "Chung-Ming Wang and Peng-Cheng Wang",
  title =        "Steganography on point-sampled geometry",
  journal =      j-COMPUTERS-AND-GRAPHICS,
  volume =       "30",
  number =       "2",
  pages =        "244--254",
  month =        apr,
  year =         "2006",
  CODEN =        "COGRD2",
  DOI =          "https://doi.org/10.1016/j.cag.2006.01.030",
  ISSN =         "0097-8493 (print), 1873-7684 (electronic)",
  ISSN-L =       "0097-8493",
  bibdate =      "Mon Feb 13 16:41:53 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compgraph.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00978493",
  URL =          "http://www.sciencedirect.com/science/article/pii/S009784930600032X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Graphics",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00978493",
}

@Article{Weaver:2006:BA,
  author =       "Alfred C. Weaver",
  title =        "Biometric Authentication",
  journal =      j-COMPUTER,
  volume =       "39",
  number =       "2",
  pages =        "96--97",
  month =        feb,
  year =         "2006",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2006.47",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Jul 4 17:16:19 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Wen:2006:PSA,
  author =       "Hsiang-An Wen and Chun-Li Lin and Tzonelih Hwang",
  title =        "Provably secure authenticated key exchange protocols
                 for low power computing clients",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "2",
  pages =        "106--113",
  month =        mar,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001732",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{Whittaker:2006:HBW,
  author =       "James A. Whittaker and Mike Andrews",
  title =        "How to break {Web} software: functional and security
                 testing of {Web} applications and {Web} services",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "????",
  year =         "2006",
  ISBN =         "0-321-36944-0 (paperback)",
  ISBN-13 =      "978-0-321-36944-4 (paperback)",
  LCCN =         "QA76.76.T48 W485 2006",
  bibdate =      "Mon Apr 3 07:34:51 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip064/2005034913.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer software; Testing; World Wide Web; Computer
                 networks; Security measures",
}

@Book{Williams:2006:C,
  author =       "Conrad Williams",
  title =        "The cryptanalyst",
  publisher =    "Leaf",
  address =      "Abercynon, UK",
  pages =        "32",
  year =         "2006",
  ISBN =         "1-905599-23-4",
  ISBN-13 =      "978-1-905599-23-3",
  LCCN =         "????",
  bibdate =      "Thu May 12 06:41:02 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 library.ox.ac.uk:210/ADVANCE",
  acknowledgement = ack-nhfb,
  remark =       "Fiction.",
}

@Article{Xenakis:2006:GCO,
  author =       "Christos Xenakis and Nikolaos Laoutaris and Lazaros
                 Merakos and Ioannis Stavrakakis",
  title =        "A generic characterization of the overheads imposed by
                 {IPsec} and associated cryptographic algorithms",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "50",
  number =       "17",
  pages =        "3225--3241",
  day =          "5",
  month =        dec,
  year =         "2006",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:14 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Yan:2006:ICP,
  author =       "Chenyu Yan and Daniel Englender and Milos Prvulovic
                 and Brian Rogers and Yan Solihin",
  title =        "Improving Cost, Performance, and Security of Memory
                 Encryption and Authentication",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "34",
  number =       "2",
  pages =        "179--190",
  year =         "2006",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Mon Aug 21 15:00:05 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Yen:2006:SED,
  author =       "Chih-Hsu Yen and Bing-Fei Wu",
  title =        "Simple error detection methods for hardware
                 implementation of {Advanced Encryption Standard}",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "55",
  number =       "6",
  pages =        "720--731",
  month =        jun,
  year =         "2006",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2006.90",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 15:35:54 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1628959",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Book{Young:2006:MCC,
  author =       "Anne L. Young",
  title =        "Mathematical ciphers: from {Caesar} to {RSA}",
  volume =       "25",
  publisher =    pub-AMS,
  address =      pub-AMS:adr,
  pages =        "viii + 159",
  year =         "2006",
  ISBN =         "0-8218-3730-3",
  ISBN-13 =      "978-0-8218-3730-6",
  LCCN =         "????",
  bibdate =      "Mon Jun 30 23:13:12 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.bibsys.no:2100/BIBSYS",
  series =       "Mathematical world",
  acknowledgement = ack-nhfb,
  subject =      "Ciphers; Cryptography; Number theory",
}

@Article{Yue:2006:NCB,
  author =       "Yao Yue and Chuang Lin and Zhangxi Tan",
  title =        "{NPCryptBench}: a cryptographic benchmark suite for
                 network processors",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "34",
  number =       "1",
  pages =        "49--56",
  year =         "2006",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Mon Aug 21 15:00:05 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Zhao:2006:NDN,
  author =       "Yunlei Zhao",
  title =        "A note on the {Dwork--Naor} timed deniable
                 authentication",
  journal =      j-INFO-PROC-LETT,
  volume =       "100",
  number =       "1",
  pages =        "1--7",
  day =          "16",
  month =        oct,
  year =         "2006",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 15:52:27 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Zhao:2006:SAP,
  author =       "Zhu Zhao and Zhongqi Dong and Yongge Wang",
  title =        "Security analysis of a password-based authentication
                 protocol proposed to {IEEE} 1363",
  journal =      j-THEOR-COMP-SCI,
  volume =       "352",
  number =       "1--3",
  pages =        "280--287",
  day =          "7",
  month =        mar,
  year =         "2006",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Mar 29 06:48:56 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Zhong:2006:ESC,
  author =       "Sheng Zhong",
  title =        "An Efficient and Secure Cryptosystem for Encrypting
                 Long Messages",
  journal =      j-FUND-INFO,
  volume =       "71",
  number =       "4",
  pages =        "493--497",
  month =        sep,
  year =         "2006",
  CODEN =        "FUMAAJ",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:04:22 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Aciicmez:2007:MAC,
  author =       "Onur Acii{\c{c}}mez and Jean-Pierre Seifert and
                 {\c{C}}etin Kaya Ko{\c{c}}",
  title =        "Micro-Architectural Cryptanalysis",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "62--64",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.91",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Agreste:2007:IAW,
  author =       "Santa Agreste and Guido Andaloro and Daniela
                 Prestipino and Luigia Puccio",
  title =        "An image adaptive, wavelet-based watermarking of
                 digital images",
  journal =      j-J-COMPUT-APPL-MATH,
  volume =       "210",
  number =       "1--2",
  pages =        "13--21",
  day =          "31",
  month =        dec,
  year =         "2007",
  CODEN =        "JCAMDI",
  ISSN =         "0377-0427 (print), 1879-1778 (electronic)",
  ISSN-L =       "0377-0427",
  bibdate =      "Sat Feb 25 13:13:20 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcomputapplmath2005.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0377042706006431",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computational and Applied Mathematics",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03770427",
}

@Article{Ahmad:2007:ADE,
  author =       "Imtiaz Ahmad and A. Shoba Das",
  title =        "Analysis and Detection of Errors in Implementation of
                 {SHA-512} Algorithms on {FPGAs}",
  journal =      j-COMP-J,
  volume =       "50",
  number =       "6",
  pages =        "728--738",
  month =        nov,
  year =         "2007",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxm023",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Apr 28 14:33:33 MDT 2010",
  bibsource =    "http://comjnl.oxfordjournals.org/content/vol50/issue6/index.dtl;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://comjnl.oxfordjournals.org/cgi/content/abstract/50/6/728;
                 http://comjnl.oxfordjournals.org/cgi/content/full/50/6/728;
                 http://comjnl.oxfordjournals.org/cgi/reprint/50/6/728",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Ahmad:2007:CSS,
  author =       "David Ahmad",
  title =        "The Contemporary Software Security Landscape",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "75--77",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.73",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Alon:2007:GSE,
  author =       "Noga Alon and Venkatesan Guruswami and Tali Kaufman
                 and Madhu Sudan",
  title =        "Guessing secrets efficiently via list decoding",
  journal =      j-TALG,
  volume =       "3",
  number =       "4",
  pages =        "42:1--42:??",
  month =        nov,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1290672.1290679",
  ISSN =         "1549-6325 (print), 1549-6333 (electronic)",
  ISSN-L =       "1549-6325",
  bibdate =      "Mon Jun 16 11:55:31 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/talg.bib",
  abstract =     "We consider the guessing secrets problem defined by
                 Chung et al. [2001]. This is a variant of the standard
                 20 questions game where the player has a set of $ k > 1
                 $ secrets from a universe of $N$ possible secrets. The
                 player is asked Boolean questions about the secret. For
                 each question, the player picks one of the $k$ secrets
                 adversarially, and answers according to this
                 secret.\par

                 We present an explicit set of $ O(\log N) $ questions
                 together with an efficient (i.e., $ {\rm poly}(\log N)
                 $ time) algorithm to solve the guessing secrets problem
                 for the case of 2 secrets. This answers the main
                 algorithmic question left unanswered by Chung et al.
                 [2001]. The main techniques we use are small $ \epsilon
                 $-biased spaces and the notion of list decoding.\par

                 We also establish bounds on the number of questions
                 needed to solve the $k$-secrets game for $ k > 2 $, and
                 discuss how list decoding can be used to get partial
                 information about the secrets, specifically to find a
                 small core of secrets that must intersect the actual
                 set of $k$ secrets.",
  acknowledgement = ack-nhfb,
  articleno =    "42",
  fjournal =     "ACM Transactions on Algorithms (TALG)",
  keywords =     "$\epsilon$-biased spaces; $k$-universal sets; 20
                 questions; decoding algorithms; error-correcting
                 codes",
}

@Article{Anderson:2007:SSS,
  author =       "Ross Anderson",
  title =        "Software Security: State of the Art",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "8",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.18",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Anonymous:2007:CPSf,
  author =       "Anonymous",
  title =        "Call for Papers: Special-Purpose Hardware for
                 Cryptography and Cryptanalysis",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "56",
  number =       "7",
  pages =        "1008--1008",
  month =        jul,
  year =         "2007",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2007.070702",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 15:03:40 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Anonymous:2007:CPSh,
  author =       "Anonymous",
  title =        "Call for Papers for Special Section on Special-Purpose
                 Hardware for Cryptography and Cryptanalysis",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "56",
  number =       "10",
  pages =        "1439--1439",
  month =        oct,
  year =         "2007",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2007.70799",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 15:03:42 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Anshel:2007:RME,
  author =       "Michael Anshel and Sarah Levitan",
  title =        "Reducing medical errors using secure {RFID}
                 technology",
  journal =      j-SIGCSE,
  volume =       "39",
  number =       "2",
  pages =        "157--159",
  month =        jun,
  year =         "2007",
  CODEN =        "SIGSD3",
  DOI =          "https://doi.org/10.1145/1272848.1272900",
  ISSN =         "0097-8418 (print), 2331-3927 (electronic)",
  ISSN-L =       "0097-8418",
  bibdate =      "Sat Nov 17 16:57:35 MST 2012",
  bibsource =    "DBLP;
                 http://dblp.uni-trier.de/db/journals/sigcse/sigcse39.html#AnshelL07;
                 http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigcse2000.bib",
  URL =          "https://www.math.utah.edu/pub/mirrors/ftp.ira.uka.de/bibliography/Misc/DBLP/2007.bib",
  abstract =     "RFID technology can successfully be used to reduce
                 medical errors. This technology can aid in the accurate
                 matching of patients with their medications and
                 treatments. The enthusiasm for using RFID technology in
                 medical settings has been tempered by privacy concerns.
                 We discuss new encryption methods that address these
                 concerns.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIGCSE Bulletin (ACM Special Interest Group on
                 Computer Science Education)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J688",
}

@Article{Anton:2007:HEW,
  author =       "Annie I. Ant{\'o}n and Julia B. Eart and Matthew W.
                 Vail and Neha Jain and Carrie M. Gheen and Jack M.
                 Frink",
  title =        "{HIPAA}'s Effect on {Web} Site Privacy Policies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "45--52",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.7",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@PhdThesis{Applebaum:2007:CCP,
  author =       "Benny Applebaum",
  title =        "Cryptography in Constant Parallel Time",
  type =         "{Ph.D.} dissertation",
  school =       "Technion --- Israel Institute of Technology",
  address =      "Haifa, Israel",
  year =         "2007",
  bibdate =      "Thu Jun 12 09:52:37 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Honorable Mention for the ACM 2007 Doctoral
                 Dissertation Award.",
  URL =          "http://www.acm.org/press-room/news-releases/dd-award-07",
  acknowledgement = ack-nhfb,
}

@Article{Arnold:2007:CSE,
  author =       "T. W. Arnold and A. Dames and M. D. Hocker and M. D.
                 Marik and N. A. Pellicciotti and K. Werner",
  title =        "Cryptographic system enhancements for the {IBM System
                 z9}",
  journal =      j-IBM-JRD,
  volume =       "51",
  number =       "1/2",
  pages =        "87--??",
  month =        jan # " \slash " # mar,
  year =         "2007",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  ISSN-L =       "0018-8646",
  bibdate =      "Fri Feb 9 20:31:06 MST 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/rd/511/arnold.html",
  abstract =     "IBM has offered hardware-based cryptographic
                 processors for its mainframe computers for nearly
                 thirty years. Over that period, IBM has continued to
                 update both the hardware and software, providing added
                 features, higher performance, greater physical
                 security, and improved management features. This
                 commitment continues with the System z9e, as
                 demonstrated by the two improvements described in this
                 paper. The first part of the paper describes
                 enhancements to the System z9 to configure and control
                 cryptographic features. The second part describes a new
                 method for the cryptographic coprocessors to securely
                 manage keys which are distributed to remote devices
                 that are not necessarily in secure or well-controlled
                 environments.",
  acknowledgement = ack-nhfb,
  fjournal =     "IBM Journal of Research and Development",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
  ordernumber =  "????",
}

@Article{Badra:2007:AWC,
  author =       "Mohamad Badra",
  title =        "Alternative wireless client authentication and key
                 distribution",
  journal =      j-NETWORK-SECURITY,
  volume =       "2007",
  number =       "7",
  pages =        "9--13",
  month =        jul,
  year =         "2007",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(07)70064-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485807700648",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Baer:2007:CIS,
  author =       "Walter S. Baer and Andrew Parkinson",
  title =        "Cyberinsurance in {IT} Security Management",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "50--56",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.57",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Baker:2007:ISU,
  author =       "Wade H. Baker and Linda Wallace",
  title =        "Is Information Security Under Control?: Investigating
                 Quality in Information Security Management",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "36--44",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.11",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Barak:2007:DC,
  author =       "Boaz Barak and Shien Jin Ong and Salil Vadhan",
  title =        "Derandomization in Cryptography",
  journal =      j-SIAM-J-COMPUT,
  volume =       "37",
  number =       "2",
  pages =        "380--400",
  month =        "????",
  year =         "2007",
  CODEN =        "SMJCAT",
  DOI =          "",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Tue May 18 08:21:45 MDT 2010",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/37/2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Manual{Barker:2007:RRN,
  author =       "Elaine Barker and John Kelsey",
  title =        "Recommendation for random number generation using
                 deterministic random bit generators (revised)",
  type =         "{NIST} Special Publication",
  number =       "800-90",
  organization = pub-NIST,
  address =      pub-NIST:adr,
  pages =        "viii + 124",
  month =        mar,
  year =         "2007",
  bibdate =      "Tue Apr 19 13:35:20 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csrc.nist.gov/publications/nistpubs/800-90/SP800-90revised_March2007.pdf",
  abstract =     "This Recommendation specifies mechanisms for the
                 generation of random bits using deterministic methods.
                 The methods provided are based on either hash
                 functions, block cipher algorithms or number theoretic
                 problems.",
  acknowledgement = ack-nhfb,
  keywords =     "deterministic random bit generator (DRBG); entropy;
                 hash function; random number generator",
}

@Book{Bauer:2007:DSM,
  author =       "Friedrich Ludwig Bauer",
  title =        "Decrypted secrets: methods and maxims of cryptology",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  edition =      "Fourth",
  pages =        "xii + 524",
  year =         "2007",
  ISBN =         "3-540-24502-2",
  ISBN-13 =      "978-3-540-24502-5",
  LCCN =         "QA76.9.A25 B38513 2007",
  bibdate =      "Sun Dec 24 17:52:38 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0824/2006933429-d.html;
                 http://www.loc.gov/catdir/toc/fy0711/2006933429.html",
  acknowledgement = ack-nhfb,
  author-dates = "1924--",
  subject =      "Computer security; Cryptography",
  tableofcontents = "Part I: Cryptography --- The People / 1 \\
                 1 Introductory Synopsis / 9 \\
                 1.1 Cryptography and Steganography / 9 \\
                 1.2 Semagrams / 10 \\
                 1.3 Open Code: Masking / 13 \\
                 1.4 Cues / 17 \\
                 1.5 Open Code: Veiling by Nulls / 19 \\
                 1.6 Open Code: Veiling by Grilles / 23 \\
                 1.7 Classification of Cryptographic Methods / 24 \\
                 2 Aims and Methods of Cryptography / 26 \\
                 2.1 The Nature of Cryptography / 26 \\
                 2.2 Encryption / 32 \\
                 2,3 Cryptosystems / 34 \\
                 2.4 Polyphony / 36 \\
                 2.5 Character Sets / 39 \\
                 2.6 Keys / 41 \\
                 3 Encryption Steps: Simple Substitution / 44 \\
                 3.1 Case V() --- W (Unipartite Simple Substitutions) /
                 44 \\
                 3.2 Special Case V -> V (Permutations) * / 46 \\
                 3.3 Case V(1) --- W (Multipartite Simple Substitutions)
                 / 53 \\
                 3.4 The General Case V(1) --- W(m), Straddling / 55 \\
                 4 Encryption Steps: Polygraphic Substitution and Coding
                 / 58 \\
                 4.1 Case V2 --- W(m) (Digraphic Substitutions) / 58 \\
                 4.2 Special Cases of Playfair and Delastelle:
                 Tomographic Methods / 64 \\
                 4.3 Case V3 --- W(m) (Trigraphic Substitutions) / 68
                 \\
                 4.4 The General Case V(m) --- W(m) : Codes / 68 \\
                 5 Encryption Steps: Linear Substitution / 80 \\
                 5.1 Self-reciprocal Linear Substitutions / 82 \\
                 5.2 Homogeneous Linear Substitutions / 82 \\
                 5.3 Binary Linear Substitutions / 86 \\
                 5.4 General Linear Substitutions / 86 \\
                 5.5 Decomposed Linear Substitutions / 87 \\
                 5.6 Decimated Alphabets / 90 \\
                 5.7 Linear Substitutions with Decimal and Binary
                 Numbers / 91 \\
                 6 Encryption Steps: Transposition / 93 \\
                 6.1 Simplest Methods / 93 \\
                 6.2 Columnar Transpositions / 98 \\
                 6.3 Anagrams / 102 \\
                 7 Polyalphabetic Encryption: Families of Alphabets /
                 106 \\
                 7.1 Iterated Substitutions / 106 \\
                 7.2 Cyclically Shifted and Rotated Alphabets / 107 \\
                 7.3 Rotor Crypto Machines / 110 \\
                 7.4 Shifted Standard Alphabets: Vigenere and Beaufort /
                 127 \\
                 7.5 Unrelated Alphabets / 131 \\
                 8 Polyalphabetic Encryption: Keys / 139 \\
                 8.1 Early Methods with Periodic Keys / 139 \\
                 8.2 'Double Key' / 141 \\
                 8.3 Vernam Encryption / 142 \\
                 8.4 Quasi-nonperiodic Keys / 144 \\
                 8.5 Machines that Generate Their Own Key Sequences /
                 145 \\
                 8.6 Off-Line Forming of Key Sequences / 156 \\
                 8.7 Nonperiodic Keys / 158 \\
                 8.8 Individual, One-Time Keys / 161 \\
                 8.9 Key Negotiation and Key Management / 165 \\
                 9 Composition of Classes of Methods / 169 \\
                 9.1 Group Property / 169 \\
                 9.2 Superencryption / 171 \\
                 9.3 Similarity of Encryption Methods / 173 \\
                 9.4 Shannon's `Pastry Dough Mixing'. / 174 \\
                 9.5 Confusion and Diffusion by Arithmetical Operations
                 / 180 \\
                 9.6 DES and IDEA : / 184 \\
                 10 Open Encryption Key Systems / 193 \\
                 10.1 Symmetric and Asymmetric Encryption Methods / 194
                 \\
                 10.2 One-Way Functions / 196 \\
                 10.3 RSA Method / 203 \\
                 10.4 Cryptanalytic Attack upon RSA / 205 \\
                 10.5 Secrecy Versus Authentication / 208 \\
                 10.6 Security of Public Key Systems / 210 \\
                 11 Encryption Security / 211 \\
                 11.1 Cryptographic Faults / 211 \\
                 11.2 Maxims of Cryptology / 220 \\
                 11.3 Shannon's Yardsticks / 225 \\
                 11.4 Cryptology and Human Rights / 226 \\
                 Part II: Cryptanalysis --- The Machinery / 233 \\
                 12 Exhausting Combinatorial Complexity / 237 \\
                 12.1 Monoalphabetic Simple Encryptions / 238 \\
                 12.2 Monoalphabetic Polygraphic Encryptions / 239 \\
                 12.3 Polyalphabetic Encryptions / 241 \\
                 12.4 General Remarks on Combinatorial Complexity / 244
                 \\
                 12.5 Cryptanalysis by Exhaustion / 244 \\
                 12.6 Unicity Distance / 246 \\
                 12.7 Practical Execution of Exhaustion / 248 \\
                 12.8 Mechanizing the Exhaustion / 251 \\
                 13 Anatomy of Language: Patterns / 252 \\
                 13.1 Invariance of Repetition Patterns / 252 \\
                 13.2 Exclusion of Encryption Methods / 254 \\
                 13.3 Pattern Finding / 255 \\
                 13.4 Finding of Polygraphic Patterns / 259 \\
                 13.5 The Method of the Probable Word / 259 \\
                 13.6 Automatic Exhaustion of the Instantiations of a
                 Pattern / 264 \\
                 13.7 Pangrams / 266 \\
                 14 Polyalphabetic Case: Probable Words / 268 \\
                 14.1 Non-Coincidence Exhaustion of Probable Word
                 Position / 268 \\
                 14.2 Binary Non-Coincidence Exhaustion / 271 \\
                 14.3 The De Viaris Attack / 272 \\
                 14.4 Zig-Zag Exhaustion of Probable Word Position / 280
                 \\
                 14.5 The Method of Isomorphs / 281 \\
                 14.6 A clever brute force method: EINSing / 287 \\
                 14.7 Covert Plaintext-Cryptotext Compromise / 288 \\
                 15 Anatomy of Language: Frequencies / 290 \\
                 15.1 Exclusion of Encryption Methods / 290 \\
                 15.2 Invariance of Partitions / 291 \\
                 15.3 Intuitive Method: Frequency Profile / 293 \\
                 15.4 Frequency Ordering / 294 \\
                 15.5 Cliques and Matching of Partitions / 297 \\
                 15.6 Optimal Matching / 303 \\
                 15.7 Frequency of Multigrams / 305 \\
                 15.8 The Combined Method of Frequency Matching / 310
                 \\
                 15.9 Frequency Matching for Polygraphic Substitutions /
                 316 \\
                 15.10 Free-Style Methods / 317 \\
                 15.11 Unicity Distance Revisited / 318 \\
                 16 Kappa and Chi / 320 \\
                 16.1 Definition and Invariance of Kappa / 320 \\
                 16.2 Definition and Invariance of Chi / 323 \\
                 16.3 The Kappa-Chi Theorem / 325 \\
                 16.4 The Kappa-Phi Theorem / 326 \\
                 16.5 Symmetric Functions of Character Frequencies / 328
                 \\
                 17 Periodicity Examination / 330 \\
                 17.1 The Kappa Test of Friedman / 331 \\
                 17.2 Kappa Test for Multigrams / 332 \\
                 17.3 Cryptanalysis by Machines: Searching for a period
                 / 333 \\
                 17.4 Kasiski Examination / 339 \\
                 17.5 Building a Depth and Phi Test of Kullback / 345
                 \\
                 17.6 Estimating the Period Length / 348 \\
                 18 Alignment of Accompanying Alphabets / 350 \\
                 18.1 Matching the Profile / 350 \\
                 18.2 Aligning Against Known Alphabet / 354 \\
                 18.3 Chi Test: Mutual Alignment of Accompanying
                 Alphabets / 358 \\
                 18.4 Reconstruction of the Primary Alphabet / 363 \\
                 18.5 Kerckhoffs' Symmetry of Position / 365 \\
                 18.6 Stripping off Superencryption: Difference Method /
                 370 \\
                 18.7 Decryption of Code / 373 \\
                 18.8 Reconstruction of the Password / 373 \\
                 19 Compromises / 375 \\
                 19.1 Kerckhoffs' Superimposition / 375 \\
                 19.2 Superimposition for Encryptions with a Key Group /
                 377 \\
                 19.3 COLOSSUS / 401 \\
                 19.4 Adjustment 'in depth' of Messages / 412 \\
                 19.5 Cryptotext--Cryptotext Compromises / 419 \\
                 19.6 Cryptotext--Cryptotext Compromise: ENIGMA
                 Indicator Doubling / 431 \\
                 19.7 Plaintext--Cryptotext Compromise: Feedback Cycle /
                 448 \\
                 20 Linear Basis Analysis / 459 \\
                 20.1 Reduction of Linear Polygraphic Substitutions /
                 459 \\
                 20.2 Reconstruction of the Key / 460 \\
                 20.3 Reconstruction of a Linear Shift Register / 461
                 \\
                 21 Anagramming / 464 \\
                 21.1 Transposition / 464 \\
                 21.2 Double Columnar Transposition / 467 \\
                 21.3 Multiple Anagramming / 467 \\
                 22 Concluding Remarks / 470 \\
                 22.1 Success in Breaking / 471 \\
                 22.2 Mode of Operation of the Unauthorized Decryptor /
                 476 \\
                 22.3 Illusory Security / 482 \\
                 22.4 Importance of Cryptology / 484 \\
                 Appendix: Axiomatic Information Theory / 487 \\
                 Bibliography / 497 \\
                 Index / 501 \\
                 Photo Credits / 525",
}

@Book{Belfield:2007:SUC,
  author =       "Richard Belfield",
  title =        "The six unsolved ciphers: inside the mysterious codes
                 that have confounded the world's greatest
                 cryptographers",
  publisher =    "Ulysses",
  address =      "Berkeley, CA, USA",
  pages =        "ix + 281 + 16",
  year =         "2007",
  ISBN =         "1-56975-628-7 (paperback)",
  ISBN-13 =      "978-1-56975-628-7 (paperback)",
  LCCN =         "Z103 .B45 2007",
  bibdate =      "Sat Jun 13 08:23:57 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  remark =       "First published as ``Can you crack the enigma code?'':
                 Great Britain: Orion, 2006.",
  subject =      "Cryptography; Ciphers",
}

@Book{Bella:2007:FCS,
  author =       "Giampaolo Bella",
  title =        "Formal correctness of security protocols",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xviii + 274 + 62",
  year =         "2007",
  DOI =          "https://doi.org/10.1007/978-3-540-68136-6",
  ISBN =         "3-540-68134-5, 3-540-68136-1 (e-book)",
  ISBN-13 =      "978-3-540-68134-2, 978-3-540-68136-6 (e-book)",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "QA8.9-QA10.3; TK5105.59.B45 2007",
  bibdate =      "Sat Jun 10 08:34:45 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "Information Security and Cryptography",
  abstract =     "Computer network security is critical to fraud
                 prevention and accountability. Network participants are
                 required to observe predefined steps called security
                 protocols, whose proof of correctness is evidence that
                 each protocol step preserves some desired properties.
                 The author investigates proofs of correctness of
                 realistic security protocols in a formal, intuitive
                 setting. The protocols examined include Kerberos
                 versions, smartcard protocols, non-repudiation
                 protocols, and certified email protocols. The method of
                 analysis, the Inductive Method in the theorem prover
                 Isabelle, turns out to be both powerful and flexible.
                 This research advances significant extensions to the
                 method of analysis, while the findings on the protocols
                 analysed are novel and illuminating. This book will
                 benefit researchers and graduate students in the fields
                 of formal methods, information security, inductive
                 methods, and networking.",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures; Security
                 measures; cryptologie; robots; Computer architecture.
                 Operating systems; informatica; programmatielogica;
                 Information systems; logica; Artificial intelligence.
                 Robotics. Simulation. Graphics; wiskunde; Computer
                 science; Mathematical logic; computerbeveiliging;
                 communicatietechnologie; Mass communications",
  tableofcontents = "Introduction \\
                 The Analysis of Security Protocols \\
                 The Inductive Method \\
                 Verifying the Protocol Goals \\
                 The Principle of Goal Availability \\
                 Modelling Timestamping and Verifying a Classical
                 Protocol \\
                 Verifying a Deployed Protocol \\
                 Modelling Agents' Knowledge of Messages \\
                 Verifying Another Deployed Protocol \\
                 Modelling Smartcards \\
                 Verifying a Smartcard Protocol \\
                 Modelling Accountability \\
                 Verifying Two Accountability Protocols \\
                 Conclusions \\
                 Appendices \\
                 References/P",
}

@TechReport{Bernstein:2007:SFS,
  author =       "Daniel J. Bernstein",
  title =        "The {Salsa20} family of stream ciphers",
  type =         "Report",
  institution =  "Department of Mathematics, Statistics, and Computer
                 Science (M/C 249), The University of Illinois at
                 Chicago",
  address =      "Chicago, IL 60607-7045",
  day =          "25",
  month =        dec,
  year =         "2007",
  bibdate =      "Thu Jan 10 12:16:52 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://cr.yp.to/snuffle/salsafamily-20071225.pdf",
  abstract =     "Salsa20 is a family of 256-bit stream ciphers designed
                 in 2005 and submitted to eSTREAM, the ECRYPT Stream
                 Cipher Project. Salsa20 has progressed to the third
                 round of eSTREAM without any changes. The 20-round
                 stream cipher Salsa20/20 is consistently faster than
                 AES and is recommended by the designer for typical
                 cryptographic applications. The reduced-round ciphers
                 Salsa20/12 and Salsa20/8 are among the fastest 256-bit
                 stream ciphers available and are recommended for
                 applications where speed is more important than
                 confidence. The fastest known attacks use $ 2^{153} $
                 simple operations against Salsa20/7, $ 2^{249} $ simple
                 operations against Salsa20/8, and $ 2^{255} $$ simple
                 operations against Salsa20/9, Salsa20/10, etc. In this
                 paper, the Salsa20 designer presents Salsa20 and
                 discusses the decisions made in the Salsa20 design.",
  acknowledgement = ack-nhfb,
}

@Article{Bhargav-Spantzel:2007:PPM,
  author =       "Abhilasha Bhargav-Spantzel and Anna C. Squicciarini
                 and Shimon Modi and Matthew Young and Elisa Bertino and
                 Stephen J. Elliott",
  title =        "Privacy preserving multi-factor authentication with
                 biometrics",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "529--560",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15503",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:42 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Book{Bleumer:2007:EPS,
  author =       "Gerrit Bleumer",
  title =        "Electronic postage systems: technology, security,
                 economics",
  volume =       "26",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xxiii + 248",
  year =         "2007",
  ISBN =         "0-387-29313-2 (hardcover)",
  ISBN-13 =      "978-0-387-29313-4 (hardcover)",
  LCCN =         "HE6125 .B545 2007",
  bibdate =      "Mon Feb 22 15:40:03 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Advances in information security",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0824/2006933129-b.html;
                 http://www.loc.gov/catdir/enhancements/fy0824/2006933129-d.html;
                 http://www.loc.gov/catdir/toc/fy0801/2006933129.html",
  acknowledgement = ack-nhfb,
  subject =      "Postal service; Technological innovations; Data
                 processing; Computer security; 2-D bar codes",
}

@InProceedings{Boneh:2007:BLP,
  author =       "D. Boneh",
  title =        "A Brief Look at Pairings Based Cryptography",
  crossref =     "IEEE:2007:PAI",
  pages =        "19--26",
  year =         "2007",
  DOI =          "https://doi.org/10.1109/FOCS.2007.51",
  bibdate =      "Thu Apr 12 09:33:17 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2000.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4389466",
}

@Article{Boneh:2007:CCS,
  author =       "Dan Boneh and Ran Canetti and Shai Halevi and Jonathan
                 Katz",
  title =        "Chosen-Ciphertext Security from Identity-Based
                 Encryption",
  journal =      j-SIAM-J-COMPUT,
  volume =       "36",
  number =       "5",
  pages =        "1301--1328",
  month =        "????",
  year =         "2007",
  CODEN =        "SMJCAT",
  DOI =          "",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Tue May 18 08:21:39 MDT 2010",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/36/5;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@InProceedings{Boneh:2007:SEI,
  author =       "D. Boneh and C. Gentry and M. Hamburg",
  title =        "Space-Efficient Identity Based Encryption Without
                 Pairings",
  crossref =     "IEEE:2007:PAI",
  pages =        "647--657",
  year =         "2007",
  DOI =          "https://doi.org/10.1109/FOCS.2007.50",
  bibdate =      "Thu Apr 12 09:33:17 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2000.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4389466",
}

@Article{Bresson:2007:PSA,
  author =       "Emmanuel Bresson and Olivier Chevassut and David
                 Pointcheval",
  title =        "Provably secure authenticated group {Diffie--Hellman}
                 key exchange",
  journal =      j-TISSEC,
  volume =       "10",
  number =       "3",
  pages =        "10:1--10:??",
  month =        jul,
  year =         "2007",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1266977.1266979",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 12 17:52:14 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Authenticated key-exchange protocols allow two
                 participants A and B, communicating over a public
                 network and each holding an authentication means to
                 exchange a shared secret value. Methods designed to
                 deal with this cryptographic problem ensure A (resp. B
                 ) that no other participants aside from B (resp. A )
                 can learn any information about the agreed value and
                 often also ensure A and B that their respective partner
                 has actually computed this value. A natural extension
                 to this cryptographic method is to consider a pool of
                 participants exchanging a shared secret value and to
                 provide a formal treatment for it. Starting from the
                 famous two-party Diffie--Hellman (DH) key-exchange
                 protocol and from its authenticated variants, security
                 experts have extended it to the multiparty setting for
                 over a decade and, in the past few years, completed a
                 formal analysis in the framework of modern
                 cryptography. The present paper synthesizes this body
                 of work on the provably-secure authenticated group DH
                 key exchange.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "cryptography; Diffie--Hellman; Group Key Exchange",
}

@Article{Breveglieri:2007:OCA,
  author =       "L. Breveglieri and I. Koren and P. Maistri",
  title =        "An Operation-Centered Approach to Fault Detection in
                 Symmetric Cryptography Ciphers",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "56",
  number =       "5",
  pages =        "635--649",
  month =        may,
  year =         "2007",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2007.1015",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 15:03:38 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4118667",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@InProceedings{Brown:2007:SAN,
  author =       "Daniel R. L. Brown and Kristian Gj{\o}steen",
  title =        "A security analysis of the {NIST SP 800-90} elliptic
                 curve random number generator",
  crossref =     "Menezes:2007:ACC",
  pages =        "466--481",
  year =         "2007",
  bibdate =      "Fri Jan 6 09:50:45 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://dl.acm.org/citation.cfm?id=1777777.1777815",
  abstract =     "An elliptic curve random number generator (ECRNG) has
                 been approved in a NIST standard and proposed for ANSI
                 and SECG draft standards. This paper proves that, if
                 three conjectures are true, then the ECRNG is secure.
                 The three conjectures are hardness of the elliptic
                 curve decisional Diffie--Hellman problem and the
                 hardness of two newer problems, the $x$-logarithm
                 problem and the truncated point problem. The
                 $x$-logarithm problem is shown to be hard if the
                 decisional Diffie-Hellman problem is hard, although the
                 reduction is not tight. The truncated point problem is
                 shown to be solvable when the minimum amount of bits
                 allowed in NIST standards are truncated, thereby making
                 it insecure for applications such as stream ciphers.
                 Nevertheless, it is argued that for nonce and key
                 generation this distinguishability is harmless.",
  acknowledgement = ack-nhfb,
  acmid =        "1777815",
  keywords =     "elliptic curve cryptography, random number
                 generation",
  location =     "Santa Barbara, CA, USA",
  pagecount =    "16",
}

@Article{Bruss:2007:QCS,
  author =       "Dagmar Bruss and G{\'a}bor Erd{\'e}lyi and Tim Meyer
                 and Tobias Riege and J{\"o}rg Rothe",
  title =        "Quantum cryptography: a survey",
  journal =      j-COMP-SURV,
  volume =       "39",
  number =       "2",
  pages =        "1--27",
  month =        "????",
  year =         "2007",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1242471.1242474",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Aug 21 08:49:42 MDT 2007",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We survey some results in quantum cryptography. After
                 a brief introduction to classical cryptography, we
                 provide the quantum-mechanical background needed to
                 present some fundamental protocols from quantum
                 cryptography. In particular, we review quantum key
                 distribution via the BB84 protocol and its security
                 proof, as well as the related quantum bit commitment
                 protocol and its proof of insecurity.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bugliesi:2007:DTA,
  author =       "Michele Bugliesi and Riccardo Focardi and Matteo
                 Maffei",
  title =        "Dynamic types for authentication",
  journal =      j-J-COMP-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "563--617",
  month =        "????",
  year =         "2007",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2007-15602",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:45 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Bugliesi:2007:SIT,
  author =       "Michele Bugliesi and Marco Giunti",
  title =        "Secure implementations of typed channel abstractions",
  journal =      j-SIGPLAN,
  volume =       "42",
  number =       "1",
  pages =        "251--262",
  month =        jan,
  year =         "2007",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/1190216.1190253",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Wed Jun 18 10:53:14 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The challenges hidden in the implementation of
                 high-level process calculi into low-level environments
                 are well understood [3]. This paper develops a secure
                 implementation of a typed pi calculus, in which
                 capability types are employed to realize the policies
                 for the access to communication channels. Our
                 implementation compiles high-level processes of the
                 pi-calculus into low-level principals of a
                 cryptographic process calculus based on the applied-pi
                 calculus [1]. In this translation, the high-level type
                 capabilities are implemented as term capabilities
                 protected by encryption keys only known to the intended
                 receivers. As such, the implementation is effective
                 even when the compiled, low-level principals are
                 deployed in open contexts for which no assumption on
                 trust and behavior may be made. Our technique and
                 results draw on, and extend, previous work on secure
                 implementation of channel abstractions in a dialect of
                 the join calculus [2]. In particular, our translation
                 preserves the forward secrecy of communications in a
                 calculus that includes matching and supports the
                 dynamic exchange of write and read access-rights among
                 processes. We establish the adequacy and full
                 abstraction of the implementation by contrasting the
                 untyped equivalences of the low-level cryptographic
                 calculus, with the typed equivalences of the high-level
                 source calculus.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  keywords =     "full abstraction; language encodings; typed behavioral
                 theories",
}

@InProceedings{Caballero-Gil:2007:PSC,
  author =       "Pino Caballero-Gil and Gerasimos C. Meletiou",
  title =        "Preface of the Symposium 15: Cryptology, Information
                 Security, and Networks",
  crossref =     "Simos:2007:CMS",
  volume =       "2B",
  pages =        "935--936",
  year =         "2007",
  bibdate =      "Thu Feb 21 14:34:40 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://proceedings.aip.org/getpdf/servlet/GetPDFServlet?filetype=pdf&amp;
                 id=APCPCS000963000002000935000001&amp; idtype=cvips",
  acknowledgement = ack-nhfb,
}

@Article{Cai:2007:CSM,
  author =       "Hongxu Cai and Zhong Shao and Alexander Vaynberg",
  title =        "Certified self-modifying code",
  journal =      j-SIGPLAN,
  volume =       "42",
  number =       "6",
  pages =        "66--77",
  month =        jun,
  year =         "2007",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/1250734.1250743",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Wed Jun 18 10:55:30 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Self-modifying code (SMC), in this paper, broadly
                 refers to any program that loads, generates, or mutates
                 code at runtime. It is widely used in many of the
                 world's critical software systems to support runtime
                 code generation and optimization, dynamic loading and
                 linking, OS boot loader, just-in-time compilation,
                 binary translation,or dynamic code encryption and
                 obfuscation. Unfortunately, SMC is also extremely
                 difficult to reason about: existing formal verification
                 techniques-including Hoare logic and type
                 system-consistently assume that program code stored in
                 memory is fixed and immutable; this severely limits
                 their applicability and power.\par

                 This paper presents a simple but novel Hoare-logic-like
                 framework that supports modular verification of general
                 von-Neumann machine code with runtime code
                 manipulation. By dropping the assumption that code
                 memory is fixed and immutable, we are forced to apply
                 local reasoning and separation logic at the very
                 beginning, and treat program code uniformly as regular
                 data structure. We address the interaction between
                 separation and code memory and show how to establish
                 the frame rules for local reasoning even in the
                 presence of SMC. Our framework is realistic, but
                 designed to be highly generic, so that it can support
                 assembly code under all modern CPUs (including both x86
                 and MIPS). Our system is expressive and fully
                 mechanized. We prove its soundness in the Coq proof
                 assistant and demonstrate its power by certifying a
                 series of realistic examples and applications-all of
                 which can directly run on the SPIM simulator or any
                 stock x86 hardware.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  keywords =     "assembly code verification; Hoare logic; modular
                 verification; runtime code manipulation; self-modifying
                 code",
}

@InProceedings{Canetti:2007:CSH,
  author =       "R. Canetti and R. Pass and A. Shelat",
  title =        "Cryptography from Sunspots: How to Use an Imperfect
                 Reference String",
  crossref =     "IEEE:2007:PAI",
  pages =        "249--259",
  year =         "2007",
  DOI =          "https://doi.org/10.1109/FOCS.2007.70",
  bibdate =      "Thu Apr 12 09:33:17 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2000.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4389466",
}

@Book{Capaldi:2007:ADI,
  author =       "Nicholas Capaldi and Miles Smit",
  title =        "The art of deception: an introduction to critical
                 thinking",
  publisher =    "Prometheus Books",
  address =      "Amherst, NY, USA",
  pages =        "277",
  year =         "2007",
  ISBN =         "1-59102-532-X",
  ISBN-13 =      "978-1-59102-532-0",
  LCCN =         "BC177 .C345 2007",
  bibdate =      "Wed Feb 17 16:45:13 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip078/2007001612.html",
  acknowledgement = ack-nhfb,
  subject =      "Logic; Critical thinking; Fallacies (Logic)",
  tableofcontents = "How to: win an argument defend a case recognize a
                 fallacy see through deception persuade a skeptic turn
                 defeat into victory. Identifying arguments \\
                 Formal analysis of arguments \\
                 Presenting your case \\
                 Attacking an argument \\
                 Defending your case \\
                 Cause-and-effect reasoning",
}

@Article{Castiglione:2007:TAD,
  author =       "A. Castiglione and A. {De Santis} and C. Soriente",
  title =        "Taking advantages of a disadvantage: {Digital}
                 forensics and steganography using document metadata",
  journal =      j-J-SYST-SOFTW,
  volume =       "80",
  number =       "5",
  pages =        "750--764",
  month =        may,
  year =         "2007",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:02 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Chai:2007:EIB,
  author =       "Zhenchuan Chai and Zhenfu Cao and Xiaolei Dong",
  title =        "Efficient {ID}-Based Multi-Receiver Threshold
                 Decryption",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "18",
  number =       "5",
  pages =        "987--1004",
  month =        oct,
  year =         "2007",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054107005091",
  ISSN =         "0129-0541 (print), 1793-6373 (electronic)",
  ISSN-L =       "0129-0541",
  bibdate =      "Tue Aug 31 07:37:14 MDT 2010",
  bibsource =    "http://ejournals.wspc.com.sg/ijfcs/mkt/archive.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Book{Chakrabarti:2007:GCS,
  author =       "Anirban Chakrabarti",
  title =        "{Grid} computing security",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiv + 331",
  year =         "2007",
  ISBN =         "3-540-44492-0 (hardcover)",
  ISBN-13 =      "978-3-540-44492-3 (hardcover)",
  LCCN =         "QA76.9.C58 C53 2007",
  bibdate =      "Fri Jun 20 11:55:39 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  subject =      "Computational grids (Computer systems); Computer
                 security",
}

@Article{Chakrabarti:2007:PBA,
  author =       "Saikat Chakrabarti and Mukesh Singhal",
  title =        "Password-Based Authentication: Preventing Dictionary
                 Attacks",
  journal =      j-COMPUTER,
  volume =       "40",
  number =       "6",
  pages =        "68--74",
  month =        jun,
  year =         "2007",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2007.216",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Jul 4 17:13:34 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Chandramouli:2007:ISS,
  author =       "Ramaswamy Chandramouli and Philip Lee",
  title =        "Infrastructure Standards for Smart {ID} Card
                 Deployment",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "92--96",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.34",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Chang:2007:SIH,
  author =       "Chin-Chen Chang and Chih-Yang Lin and Chun-Sen Tseng",
  title =        "Secret Image Hiding and Sharing Based on the $ (t,
                 n)$-Threshold",
  journal =      j-FUND-INFO,
  volume =       "76",
  number =       "4",
  pages =        "399--411",
  month =        dec,
  year =         "2007",
  CODEN =        "FUMAAJ",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:05:24 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Chatterjee:2007:CSC,
  author =       "S. Chatterjee and P. Sarkar",
  title =        "Constant Size Ciphertext {HIBE} in the Augmented
                 Selective-{ID} Model and its Extensions",
  journal =      j-J-UCS,
  volume =       "13",
  number =       "10",
  pages =        "1367--1395",
  month =        "????",
  year =         "2007",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Thu Jul 10 06:41:41 MDT 2008",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_13_10/constant_size_ciphertext_hibe",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Chatzikokolakis:2007:FAP,
  author =       "Konstantinos Chatzikokolakis and Catuscia
                 Palamidessi",
  title =        "A framework for analyzing probabilistic protocols and
                 its application to the {Partial Secrets Exchange}",
  journal =      j-THEOR-COMP-SCI,
  volume =       "389",
  number =       "3",
  pages =        "512--527",
  day =          "15",
  month =        dec,
  year =         "2007",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Mar 28 22:12:00 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Chen:2007:CIS,
  author =       "Wen-Yuan Chen",
  title =        "Color image steganography scheme using set
                 partitioning in hierarchical trees coding, digital
                 {Fourier} transform and adaptive phase modulation",
  journal =      j-APPL-MATH-COMP,
  volume =       "185",
  number =       "1",
  pages =        "432--448",
  day =          "1",
  month =        feb,
  year =         "2007",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:03:01 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Chen:2007:CRA,
  author =       "Chien-Yuan Chen and Cheng-Yuan Ku and David C. Yen",
  title =        "Cryptographic relational algebra for databases using
                 the field authenticator",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "54",
  number =       "1",
  pages =        "38--44",
  month =        jul,
  year =         "2007",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:50:02 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122107001721",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Cherry:2007:MEV,
  author =       "S. Cherry",
  title =        "Making Every E-Vote Count",
  journal =      j-IEEE-SPECTRUM,
  volume =       "44",
  number =       "1",
  pages =        "13--14",
  month =        jan,
  year =         "2007",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2007.273028",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "complete voting system; cryptography; Cryptography;
                 Databases; e-vote; Electronic equipment; Electronic
                 voting; electronic voting systems; government data
                 processing; Information security; Microcomputers;
                 Nominations and elections; Physics computing; Portable
                 computers; Postal services; Punchscan; Southern
                 California",
}

@Book{Chess:2007:SPS,
  author =       "Brian Chess and Jacob West",
  title =        "Secure programming with static analysis",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xxix + 587",
  year =         "2007",
  ISBN =         "0-321-42477-8 (paperback)",
  ISBN-13 =      "978-0-321-42477-8 (paperback)",
  LCCN =         "QA76.9.A25 C443 2007",
  bibdate =      "Mon May 5 12:41:36 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Addison-Wesley software security series",
  URL =          "http://www.loc.gov/catdir/toc/ecip0713/2007010226.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Debugging in computer science;
                 Computer software; Quality control",
}

@Article{Chien:2007:SUL,
  author =       "Hung-Yu Chien and Chen-Wei Huang",
  title =        "Security of ultra-lightweight {RFID} authentication
                 protocols and its improvements",
  journal =      j-OPER-SYS-REV,
  volume =       "41",
  number =       "4",
  pages =        "83--86",
  month =        jul,
  year =         "2007",
  CODEN =        "OSRED8",
  DOI =          "https://doi.org/10.1145/1278901.1278916",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Fri Jun 20 17:17:50 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The design of ultra-lightweight authentication
                 protocols is imperative to the pervasive deployment of
                 low-cost RFIDs. This paper examines the security of two
                 well known ultra-lightweight authentication protocols
                 (LMAP and M2AP) and the improved scheme. We demonstrate
                 our efficient attacks on the protocols, and highlight
                 the key weaknesses of the designs.",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
  keywords =     "authentication; desynchronization; privacy; RFID;
                 security",
}

@InProceedings{Chung:2007:ASF,
  author =       "Jaewook Chung and M. Anwar Hasan",
  title =        "Asymmetric Squaring Formulae",
  crossref =     "Kornerup:2007:PIS",
  pages =        "113--122",
  year =         "2007",
  DOI =          "https://doi.org/10.1109/ARITH.2007.11",
  bibdate =      "Tue Oct 9 16:32:41 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We present efficient squaring formulae based on the
                 Toom--Cook multiplication algorithm. The latter always
                 requires at least one non-trivial constant division in
                 the interpolation step. We show such non-trivial
                 divisions are not needed in the case two operands are
                 equal for three, four and five-way squarings. Our
                 analysis shows that our 3-way squaring algorithms have
                 much less overhead than the best known 3-way Toom--Cook
                 algorithm. Our experimental results show that one of
                 our new 3-way squaring methods performs faster than
                 mpz\_mul() in GNU multiple precision library (GMP) for
                 squaring integers of approximately 2400-6700 bits on
                 Pentium IV Prescott 3.2GHz. For squaring in $ Z[x] $,
                 our 3-way squaring algorithms are much superior to
                 other known squaring algorithms for small input size.
                 In addition, we present 4-way and 5-way squaring
                 formulae which do not require any constant divisions by
                 integers other than a power of 2. Under some reasonable
                 assumptions, our 5-way squaring formula is faster than
                 the recently proposed Montgomery's 5-way Karatsuba-like
                 formulae.",
  acknowledgement = ack-nhfb,
  keywords =     "Cook multiplication algorithm; Karatsuba algorithm;
                 Karatsuba-like formulae; Montgomery's Squaring;
                 Toom-multiple-precision arithmetic",
}

@InProceedings{Chung:2007:MRA,
  author =       "Jaewook Chung and M. Anwar Hasan",
  title =        "{Montgomery} Reduction Algorithm for Modular
                 Multiplication Using Low-Weight Polynomial Form
                 Integers",
  crossref =     "Kornerup:2007:PIS",
  pages =        "230--239",
  year =         "2007",
  DOI =          "https://doi.org/10.1109/ARITH.2007.23",
  bibdate =      "Tue Oct 9 17:16:03 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "In this paper, we extend a recent piece of work on
                 low-weight polynomial form integers (LWPFIs). We
                 present a new coefficient reduction algorithm based on
                 the Montgomery reduction algorithm and provide its
                 detailed analysis results. We give a condition for
                 eliminating the final subtractions at the end of our
                 Montgomery reduction algorithm adapted to perform the
                 coefficient reduction. Our experimental results show
                 that a new coefficient reduction algorithm is indeed
                 more efficient than the one presented in [1].",
  acknowledgement = ack-nhfb,
}

@Article{Chung:2007:SBW,
  author =       "Kuo-Liang Chung and Wei-Ning Yang and Yong-Huai Huang
                 and Shih-Tung Wu and Yu-Chiao Hsu",
  title =        "On {SVD}-based watermarking algorithm",
  journal =      j-APPL-MATH-COMP,
  volume =       "188",
  number =       "1",
  pages =        "54--57",
  day =          "1",
  month =        may,
  year =         "2007",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:03:04 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Cimato:2007:CVC,
  author =       "S. Cimato and R. {De Prisco} and A. {De Santis}",
  title =        "Colored visual cryptography without color darkening",
  journal =      j-THEOR-COMP-SCI,
  volume =       "374",
  number =       "1--3",
  pages =        "261--276",
  day =          "20",
  month =        apr,
  year =         "2007",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Mar 29 08:55:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Clarke:2007:AUA,
  author =       "N. L. Clarke and S. M. Furnell",
  title =        "Advanced user authentication for mobile devices",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "2",
  pages =        "109--119",
  month =        mar,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001428",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collberg:2007:DGB,
  author =       "Christian S. Collberg and Clark Thomborson and Gregg
                 M. Townsend",
  title =        "Dynamic graph-based software fingerprinting",
  journal =      j-TOPLAS,
  volume =       "29",
  number =       "6",
  pages =        "35:1--35:67",
  month =        oct,
  year =         "2007",
  CODEN =        "ATPSDT",
  DOI =          "https://doi.org/10.1145/1286821.1286826",
  ISSN =         "0164-0925 (print), 1558-4593 (electronic)",
  ISSN-L =       "0164-0925",
  bibdate =      "Wed Jun 11 19:22:40 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toplas/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Fingerprinting embeds a secret message into a cover
                 message. In media fingerprinting, the secret is usually
                 a copyright notice and the cover a digital image.
                 Fingerprinting an object discourages intellectual
                 property theft, or when such theft has occurred, allows
                 us to prove ownership.\par

                 The Software Fingerprinting problem can be described as
                 follows. Embed a structure W into a program P such
                 that: W can be reliably located and extracted from P
                 even after P has been subjected to code transformations
                 such as translation, optimization and obfuscation; W is
                 stealthy; W has a high data rate; embedding W into P
                 does not adversely affect the performance of P; and W
                 has a mathematical property that allows us to argue
                 that its presence in P is the result of deliberate
                 actions.\par

                 In this article, we describe a software fingerprinting
                 technique in which a dynamic graph fingerprint is
                 stored in the execution state of a program. Because of
                 the hardness of pointer alias analysis such
                 fingerprints are difficult to attack automatically.",
  acknowledgement = ack-nhfb,
  articleno =    "35",
  fjournal =     "ACM Transactions on Programming Languages and
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J783",
}

@Article{Damaj:2007:PAD,
  author =       "Issam W. Damaj",
  title =        "Parallel Algorithms Development for Programmable
                 Devices with Application from Cryptography",
  journal =      j-INT-J-PARALLEL-PROG,
  volume =       "35",
  number =       "6",
  pages =        "529--572",
  month =        dec,
  year =         "2007",
  CODEN =        "IJPPE5",
  DOI =          "https://doi.org/10.1007/s10766-007-0046-1",
  ISSN =         "0885-7458 (print), 1573-7640 (electronic)",
  ISSN-L =       "0885-7458",
  bibdate =      "Wed Jul 9 16:06:53 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0885-7458&volume=35&issue=6;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0885-7458&volume=35&issue=6&spage=529",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Parallel Programming",
  journal-URL =  "http://link.springer.com/journal/10766",
  keywords =     "data encryption; formal models; gate array;
                 methodologies; Parallel algorithms",
}

@Book{Daswani:2007:FSW,
  author =       "Neil Daswani and Christoph Kern and Anita Kesavan",
  title =        "Foundations of security: what every programmer needs
                 to know",
  publisher =    pub-APRESS,
  address =      pub-APRESS:adr,
  pages =        "xxvii + 290",
  year =         "2007",
  ISBN =         "1-59059-784-2 (paperback)",
  ISBN-13 =      "978-1-59059-784-2 (paperback)",
  LCCN =         "QA76.76.P76 D37 2007",
  bibdate =      "Wed Jan 12 11:18:20 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "The Expert's voice in security",
  acknowledgement = ack-nhfb,
  subject =      "Software protection; Computer security; Data
                 encryption (Computer science)",
  tableofcontents = "Pt. 1. Security design principles \\
                 Security goals \\
                 Secure systems design \\
                 Secure design principles \\
                 Exercises for part 1 \\
                 Pt. 2. Secure programming techniques \\
                 Worms and other malware \\
                 Buffer overflows \\
                 Client-state manipulation \\
                 SQL injection \\
                 Password security \\
                 Cross-domain security in web applications \\
                 Exercises for part 2 \\
                 Pt. 3. Introduction to cryptography \\
                 Symmetric key cryptography \\
                 Asymmetric key cryptography \\
                 Key management and exchange \\
                 MACs and signatures \\
                 Exercises for part 3",
}

@Article{Davis:2007:AAA,
  author =       "Adrian Davis",
  title =        "Authentication across the airwaves",
  journal =      j-NETWORK-SECURITY,
  volume =       "2007",
  number =       "2",
  pages =        "13--19",
  month =        feb,
  year =         "2007",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(07)70019-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:36 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485807700193",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Daza:2007:CTM,
  author =       "Vanesa Daza and Javier Herranz and Paz Morillo and
                 Carla R{\`a}fols",
  title =        "Cryptographic techniques for mobile ad-hoc networks",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "51",
  number =       "18",
  pages =        "4938--4950",
  day =          "19",
  month =        dec,
  year =         "2007",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:22 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{deBorde:2007:STF,
  author =       "Duncan de Borde",
  title =        "Selecting a two-factor authentication system",
  journal =      j-NETWORK-SECURITY,
  volume =       "2007",
  number =       "7",
  pages =        "17--20",
  month =        jul,
  year =         "2007",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(07)70066-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485807700661",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Book{deLeeuw:2007:HIS,
  editor =       "Karl de Leeuw and J. A. Bergstra",
  booktitle =    "The History of Information Security: a Comprehensive
                 Handbook",
  title =        "The History of Information Security: a Comprehensive
                 Handbook",
  publisher =    pub-ELSEVIER,
  address =      pub-ELSEVIER:adr,
  pages =        "xi + 887",
  year =         "2007",
  ISBN =         "0-444-51608-5 (hardcover)",
  ISBN-13 =      "978-0-444-51608-4 (hardcover)",
  LCCN =         "Z103 .H63 2007",
  bibdate =      "Thu Dec 28 09:22:43 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/b/bauer-friedrich-ludwig.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  abstract =     "Information Security is usually achieved through a mix
                 of technical, organizational and legal measures. These
                 may include the application of cryptography, the
                 hierarchical modeling of organizations in order to
                 assure confidentiality, or the distribution of
                 accountability and responsibility by law, among
                 interested parties. The history of Information Security
                 reaches back to ancient times and starts with the
                 emergence of bureaucracy in administration and warfare.
                 Some aspects, such as the interception of encrypted
                 messages during World War II, have attracted huge
                 attention, whereas other aspects have remained largely
                 uncovered. There has never been any effort to write a
                 comprehensive history. This is most unfortunate,
                 because Information Security should be perceived as a
                 set of communicating vessels, where technical
                 innovations can make existing legal or organisational
                 frame-works obsolete and a breakdown of political
                 authority may cause an exclusive reliance on technical
                 means. This book is intended as a first field-survey.
                 It consists of twenty-eight contributions, written by
                 experts in such diverse fields as computer science,
                 law, or history and political science, dealing with
                 episodes, organisations and technical developments that
                 may considered to be exemplary or have played a key
                 role in the development of this field. These include:
                 the emergence of cryptology as a discipline during the
                 Renaissance, the Black Chambers in 18th century Europe,
                 the breaking of German military codes during World War
                 II, the histories of the NSA and its Soviet
                 counterparts and contemporary cryptology. Other
                 subjects are: computer security standards, viruses and
                 worms on the Internet, computer transparency and free
                 software, computer crime, export regulations for
                 encryption software and the privacy debate. Key
                 Features --- Interdisciplinary coverage of the history
                 Information Security --- Written by top experts in law,
                 history, computer and information science --- First
                 comprehensive work in Information Security.",
  acknowledgement = ack-nhfb,
  subject =      "Cryptography; History; Computer security; Copyright;
                 Databescherming",
  tableofcontents = "1: Introduction / Karl de Leeuw / 1--25 \\
                 2: Limitations on the publishing of scientific research
                 / Jack Meadows / 29--51 \\
                 3: Industrialists, inventors and the German patent
                 system, 1877--1957: A comparative perspective / Kees
                 Gispen / 53--81 \\
                 4: Reflecting media: A cultural history of copyright
                 and the media Robert Verhoogt and Chris Schriks /
                 83--119 \\
                 5: The history of copyright protection of computer
                 software: the emancipation of a work of technology
                 toward a work of authorship / Madeleine de Cock Buning
                 / 121--140 \\
                 6: A history of software patents / Robert Plotkin /
                 141--164 \\
                 7: Semiotics of identity management / Pieter Wisse /
                 167--196 \\
                 8: History of document security / Karel Johan Schell /
                 197--241 \\
                 9: From frankpledge to chip and pin: Identification and
                 identity in England, 1475--2005 / Edward Higgs /
                 243--262 \\
                 10: The scientific development of biometrics over the
                 last 40 years / James L. Wayman / 263--274 \\
                 11: The rise of cryptology in the European Renaissance
                 / Gerhard F. Strasser / 277--325 \\
                 12: Cryptology in the Dutch Republic: A case-study /
                 Karl de Leeuw / 327--367 \\
                 13: Intelligence and the emergence of the information
                 society in Eighteenth-Century Britain / Jeremy Black /
                 369--379 \\
                 14: Rotor machines and bombes / Friedrich L. Bauer /
                 381--446 \\
                 15: Tunny and Colossus: Breaking the Lorenz
                 Schl{\"u}sselzusatz traffic / B. Jack Copeland /
                 447--477 \\
                 16: Boris Hagelin and Crypto AG: Pioneers of encryption
                 / Silvan Frik / 479--496 \\
                 17: Eavesdroppers of the Kremlin: KGB sigint during the
                 Cold War / Mathew M. Aid / 497--522 \\
                 18: National Security Agency: The historiography of
                 concealment / Joseph Fitsanakis / 523--563 \\
                 19: An introduction to modern cryptology / Bart Preneel
                 / 565--592 \\
                 20: A history of computer security standards / Jeffrey
                 R. Yost / 595--621 \\
                 21: Security models / Dieter Gollmann / 623--635 \\
                 22: Computer security through correctness and
                 transparency / Hans Meijer, Jaap-Henk Hoepman, Bart
                 Jacobs, Erik Poll / 637--653 \\
                 23: IT security and IT auditing between 1960 and 2000 /
                 Margaret van Biene-Hershey / 655--680 \\
                 24: A history of internet security / Laura DeNardis /
                 681--704 \\
                 25: History of computer crime / Susan W. Brenner /
                 705--721 \\
                 26: The export of cryptography in the 20th and the 21st
                 centuries / Whitfield Diffie and Susan Landau /
                 725--736 \\
                 27: History of privacy / Jan Holvast / 737--769 \\
                 28: Munitions, wiretaps and MP3s: The changing
                 interface between privacy and encryption policy in the
                 information society / Andrew Charlesworth / 771--817
                 \\
                 29: The information revolution and the transformation
                 of warfare / Dan Kuehl / 821--832 \\
                 Biographies / 833--839 \\
                 Author index / 841--860 \\
                 Subject index / 861--887",
}

@Book{Delfs:2007:ICP,
  author =       "Hans Delfs and Helmut Knebl",
  title =        "Introduction to Cryptography: Principles and
                 Applications",
  volume =       "1",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  edition =      "Second",
  pages =        "xvi + 367",
  year =         "2007",
  DOI =          "https://doi.org/10.1007/3-540-49244-5",
  ISBN =         "3-540-49243-7 (hardcover), 3-540-49244-5",
  ISBN-13 =      "978-3-540-49243-6 (hardcover), 978-3-540-49244-3",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "QA76.9A25 D44 2007; QA76.9.D35",
  bibdate =      "Sat Jun 10 08:34:43 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Information Security and Cryptography",
  URL =          "http://www.springerlink.com/content/gm2886",
  abstract =     "In the first part, this book covers the key concepts
                 of cryptography on an undergraduate level, from
                 encryption and digital signatures to cryptographic
                 protocols. Essential techniques are demonstrated in
                 protocols for key exchange, user identification,
                 electronic elections and digital cash. In the second
                 part, more advanced topics are addressed, such as the
                 bit security of one-way functions and computationally
                 perfect pseudorandom bit generators. The security of
                 cryptographic schemes is a central topic. Typical
                 examples of provably secure encryption and signature
                 schemes and their security proofs are given. Though
                 particular attention is given to the mathematical
                 foundations, no special background in mathematics is
                 presumed. The necessary algebra, number theory and
                 probability theory are included in the appendix. Each
                 chapter closes with a collection of exercises.",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Cryptography; Computer networks;
                 Security measures; Cryptography; Security measures;
                 Computer security; Informatique; Security measures;
                 Computer security; Cryptography; Coding theory; Data
                 encryption (Computer science); Data protection; Data
                 structures (Computer science); Number theory; Coding
                 theory; Data encryption (Computer science); Data
                 protection; Data structures (Computer science); Number
                 theory.",
  tableofcontents = "1. Introduction \\
                 2. Symmetric-key encryption \\
                 3. Public-key cryptography \\
                 4. Cryptographic protocols \\
                 5. Probabilistic algorithms \\
                 6. One-way functions and the basic assumptions \\
                 7. Bit security of one-way functions \\
                 8. One-way functions and pseudorandomness \\
                 9. Provably secure encryption \\
                 10. Provably secure digital signatures \\
                 A. Algebra and number theory \\
                 B. Probabilities and information theory \\
                 References \\
                 Index",
}

@InProceedings{Delgado:2007:SCD,
  author =       "Oscar Delgado and Amparo F{\'u}ster",
  title =        "Stream Cipher Design for {MANets}",
  crossref =     "Simos:2007:CMS",
  volume =       "2B",
  pages =        "965--968",
  year =         "2007",
  bibdate =      "Thu Feb 21 14:34:40 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://proceedings.aip.org/getpdf/servlet/GetPDFServlet?filetype=pdf&amp;
                 id=APCPCS000963000002000965000001&amp; idtype=cvips",
  acknowledgement = ack-nhfb,
}

@Article{DeLooze:2007:PWS,
  author =       "Lori DeLooze",
  title =        "Providing {Web} Service Security in a Federated
                 Environment",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "73--75",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.16",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{DeSantis:2007:NRN,
  author =       "Alfredo {De Santis} and Barbara Masucci",
  title =        "New results on non-perfect sharing of multiple
                 secrets",
  journal =      j-J-SYST-SOFTW,
  volume =       "80",
  number =       "2",
  pages =        "216--223",
  month =        feb,
  year =         "2007",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:02 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Book{Diffie:2007:PLP,
  author =       "Whitfield Diffie and Susan Eva Landau",
  title =        "Privacy on the line: the politics of wiretapping and
                 encryption",
  publisher =    pub-MIT,
  address =      pub-MIT:adr,
  edition =      "Updated and expanded",
  pages =        "400 (est.)",
  year =         "2007",
  ISBN =         "0-262-04240-1",
  ISBN-13 =      "978-0-262-04240-6",
  LCCN =         "UB256.U6 D54 2007",
  bibdate =      "Tue Apr 17 14:28:32 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip073/2006035514.html",
  acknowledgement = ack-nhfb,
  subject =      "Electronic intelligence; United States; Wiretapping;
                 Data encryption (Computer science); Law and
                 legislation; Electronic surveillance; Political
                 aspects; Telecommunication; Privacy, Right of",
}

@Article{Dimitriadis:2007:IMC,
  author =       "Christos K. Dimitriadis",
  title =        "Improving Mobile Core Network Security with
                 Honeynets",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "40--47",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.85",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Ding:2007:ESD,
  author =       "Xuhua Ding and Daniele Mazzocchi and Gene Tsudik",
  title =        "Equipping smart devices with public key signatures",
  journal =      j-TOIT,
  volume =       "7",
  number =       "1",
  pages =        "3:1--3:??",
  month =        feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1189740.1189743",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jun 16 10:57:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "One of the major recent trends in computing has been
                 towards so-called smart devices, such as PDAs, cell
                 phones and sensors. Such devices tend to have a feature
                 in common: limited computational capabilities and
                 equally limited power, as most operate on batteries.
                 This makes them ill-suited for public key signatures.
                 This article explores practical and conceptual
                 implications of using Server-Aided Signatures (SAS) for
                 these devices. SAS is a signature method that relies on
                 partially-trusted servers for generating (normally
                 expensive) public key signatures for regular users.
                 Although the primary goal is to aid small,
                 resource-limited devices in signature generation, SAS
                 also offers fast certificate revocation, signature
                 causality and reliable timestamping. It also has some
                 interesting features such as built-in attack detection
                 for users and DoS resistance for servers. Our
                 experimental results also validate the feasibility of
                 deploying SAS on smart devices.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "digital signatures; public key infrastructure",
}

@Article{Domingo-Ferrer:2007:ASC,
  author =       "Josep Domingo-Ferrer and Joachim Posegga and Francesc
                 Seb{\'e} and Vicen{\c{c}} Torra",
  title =        "Advances in smart cards",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "51",
  number =       "9",
  pages =        "2219--2222",
  day =          "20",
  month =        jun,
  year =         "2007",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:18 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Doncel:2007:ODS,
  author =       "Victor Rodriguez Doncel and Nikos Nikolaidis and
                 Ioannis Pitas",
  title =        "An Optimal Detector Structure for the {Fourier}
                 Descriptors Domain Watermarking of {$2$D} Vector
                 Graphics",
  journal =      j-IEEE-TRANS-VIS-COMPUT-GRAPH,
  volume =       "13",
  number =       "5",
  pages =        "851--863",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "ITVGEA",
  DOI =          "https://doi.org/10.1109/TVCG.2007.1050",
  ISSN =         "1077-2626 (print), 1941-0506 (electronic), 2160-9306",
  ISSN-L =       "1077-2626",
  bibdate =      "Thu Jul 3 15:20:23 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Visualization and Computer
                 Graphics",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2945",
}

@TechReport{Dorrendorf:2007:CRNa,
  author =       "Leo Dorrendorf and Zvi Gutterman and Benny Pinkas",
  title =        "Cryptanalysis of the Random Number Generator of the
                 {Windows} Operating System",
  type =         "Technical report",
  number =       "2007/419",
  institution =  "Cryptology ePrint Archive, International Association
                 for Cryptologic Research",
  address =      "San Jose, CA, USA",
  year =         "2007",
  bibdate =      "Fri Nov 16 16:07:16 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://eprint.iacr.org/2007/419",
  abstract =     "The pseudo-random number generator (PRNG) used by the
                 Windows operating system is the most commonly used
                 PRNG. The pseudo-randomness of the output of this
                 generator is crucial for the security of almost any
                 application running in Windows. Nevertheless, its exact
                 algorithm was never published.\par

                 We examined the binary code of a distribution of
                 Windows 2000, which is still the second most popular
                 operating system after Windows XP. (This investigation
                 was done without any help from Microsoft.) We
                 reconstructed, for the first time, the algorithm used
                 by the pseudo-random number generator (namely, the
                 function CryptGenRandom). We analyzed the security of
                 the algorithm and found a non-trivial attack: given the
                 internal state of the generator, the previous state can
                 be computed in $ O(2^{23}) $ work (this is an attack on
                 the forward-security of the generator, an $ O(1) $
                 attack on backward security is trivial). The attack on
                 forward-security demonstrates that the design of the
                 generator is flawed, since it is well known how to
                 prevent such attacks.\par

                 We also analyzed the way in which the generator is run
                 by the operating system, and found that it amplifies
                 the effect of the attacks: The generator is run in user
                 mode rather than in kernel mode, and therefore it is
                 easy to access its state even without administrator
                 privileges. The initial values of part of the state of
                 the generator are not set explicitly, but rather are
                 defined by whatever values are present on the stack
                 when the generator is called.Furthermore, each process
                 runs a different copy of the generator, and the state
                 of the generator is refreshed with system generated
                 entropy only after generating 128 KBytes of output for
                 the process running it. The result of combining this
                 observation with our attack is that learning a single
                 state may reveal 128 Kbytes of the past and future
                 output of the generator.\par

                 The implication of these findings is that a buffer
                 overflow attack or a similar attack can be used to
                 learn a single state of the generator, which can then
                 be used to predict all random values, such as SSL keys,
                 used by a process in all its past and future operation.
                 This attack is more severe and more efficient than
                 known attacks, in which an attacker can only learn SSL
                 keys if it is controlling the attacked machine at the
                 time the keys are used.",
}

@InProceedings{Dorrendorf:2007:CRNb,
  author =       "Leo Dorrendorf and Zvi Gutterman and Benny Pinkas",
  booktitle =    "{CCS '07: Proceedings of the 14th ACM conference on
                 computer and communications security}",
  title =        "Cryptanalysis of the Random Number Generator of the
                 {Windows} Operating System",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "????",
  year =         "2007",
  DOI =          "https://doi.org/10.1145/1315245.1315304",
  ISBN =         "1-59593-703-X",
  ISBN-13 =      "978-1-59593-703-2",
  LCCN =         "????",
  bibdate =      "Fri Jan 06 09:36:58 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  abstract =     "The pseudo-random number generator (PRNG) used by the
                 Windows operating system is the most commonly used
                 PRNG. The pseudo-randomness of the output of this
                 generator is crucial for the security of almost any
                 application running in Windows. Nevertheless, its exact
                 algorithm was never published.\par

                 We examined the binary code of a distribution of
                 Windows 2000, which is still the second most popular
                 operating system after Windows XP. (This investigation
                 was done without any help from Microsoft.) We
                 reconstructed, for the first time, the algorithm used
                 by the pseudo-random number generator (namely, the
                 function CryptGenRandom). We analyzed the security of
                 the algorithm and found a non-trivial attack: given the
                 internal state of the generator, the previous state can
                 be computed in $ O(2^{23}) $ work (this is an attack on
                 the forward-security of the generator, an $ O(1) $
                 attack on backward security is trivial). The attack on
                 the forward-security demonstrates that the design of
                 the generator is flawed, since it is well known how to
                 prevent such attacks.\par

                 We also analyzed the way in which the generator is run
                 by the operating system, and found that it amplifies
                 the effect of the attacks. As a result, learning a
                 single state may reveal 128 Kbytes of the past and
                 future output of the generator. The implication of
                 these findings is that a buffer overflow attack or a
                 similar attack can be used to learn a single state of
                 the generator, which can then be used to predict all
                 random values, such as SSL keys, used by a process in
                 all its past and future operation. This attack is more
                 severe and more efficient than known attacks, in which
                 an attacker can only learn SSL keys if it is
                 controlling the attacked machine at the time the keys
                 are used.",
  acknowledgement = ack-nhfb,
}

@Book{Dowd:2007:ASS,
  author =       "Mark Dowd and John McDonald and Justin Schuh",
  title =        "The art of software security assessment: identifying
                 and preventing software vulnerabilities",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xxi + 1174",
  year =         "2007",
  ISBN =         "0-321-44442-6 (paperback)",
  ISBN-13 =      "978-0-321-44442-4 (paperback)",
  LCCN =         "QA76.9.A25 D75 2007",
  bibdate =      "Wed Feb 21 14:25:34 MST 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip0618/2006023446.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Computer software; Development;
                 Computer networks; Security measures",
}

@TechReport{Drimer:2007:KYE,
  author =       "Saar Drimer and Steven J. Murdoch",
  title =        "Keep Your Enemies Close: Distance Bounding Against
                 {Smartcard} Relay Attacks",
  type =         "Report",
  number =       "??",
  institution =  "Computer Laboratory, University of Cambridge",
  address =      "Cambridge, UK",
  pages =        "16",
  day =          "15",
  month =        may,
  year =         "2007",
  bibdate =      "Thu Nov 04 14:57:14 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Also published in USENIX Security Symposium, August
                 2007, pages 87--102.",
  URL =          "http://www.cl.cam.ac.uk/~sd410/papers/sc_relay.bib",
  abstract =     "Modern smartcards, capable of sophisticated
                 cryptography, provide a high assurance of tamper
                 resistance and are thus commonly used in payment
                 applications. Although extracting secrets out of
                 smartcards requires resources beyond the means of many
                 would-be thieves, the manner in which they are used can
                 be exploited for fraud. Cardholders authorize financial
                 transactions by presenting the card and disclosing a
                 PIN to a terminal without any assurance as to the
                 amount being charged or who is to be paid, and have no
                 means of discerning whether the terminal is authentic
                 or not. Even the most advanced smartcards cannot
                 protect customers from being defrauded by the simple
                 relaying of data from one location to another. We
                 describe the development of such an attack, and show
                 results from live experiments on the UK's EMV
                 implementation, Chip \& PIN. We discuss previously
                 proposed defences, and show that these cannot provide
                 the required security assurances. A new defence based
                 on a distance bounding protocol is described and
                 implemented, which requires only modest alterations to
                 current hardware and software. As far as we are aware,
                 this is the first complete design and implementation of
                 a secure distance bounding protocol. Future smartcard
                 generations could use this design to provide
                 cost-effective resistance to relay attacks, which are a
                 genuine threat to deployed applications. We also
                 discuss the security-economics impact to customers of
                 enhanced authentication mechanisms.",
  acknowledgement = ack-nhfb,
}

@InProceedings{Dziembowski:2007:IRS,
  author =       "S. Dziembowski and K. Pietrzak",
  title =        "Intrusion-Resilient Secret Sharing",
  crossref =     "IEEE:2007:PAI",
  pages =        "227--237",
  year =         "2007",
  DOI =          "https://doi.org/10.1109/FOCS.2007.63",
  bibdate =      "Thu Apr 12 09:33:17 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2000.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4389466",
}

@Article{Eisenbarth:2007:SLC,
  author =       "Thomas Eisenbarth and Christof Paar and Axel Poschmann
                 and Sandeep Kumar and Leif Uhsadel",
  title =        "A Survey of Lightweight Cryptography Implementations",
  journal =      j-IEEE-DES-TEST-COMPUT,
  volume =       "24",
  number =       "6",
  pages =        "522--533",
  month =        nov # "\slash " # dec,
  year =         "2007",
  DOI =          "https://doi.org/10.1109/MDT.2007.178",
  ISSN =         "0740-7475 (print), 1558-1918 (electronic)",
  ISSN-L =       "0740-7475",
  bibdate =      "Sun Dec 30 10:35:24 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  annote =       "dtco-24-06-pos.3d",
  fjournal =     "IEEE Design \& Test of Computers",
}

@Article{English:2007:MAC,
  author =       "Jennifer English and David Coe and Rhonda Gaede and
                 David Hyde and Jeffrey Kulick",
  title =        "{MEMS}-Assisted Cryptography for {CPI} Protection",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "14--21",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.90",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Faliszewski:2007:BRB,
  author =       "Piotr Faliszewski",
  title =        "Book Review: {{\booktitle{Complexity Theory and
                 Cryptology: An Introduction to Cryptocomplexity}}, by
                 J{\"o}rg Rothe, Springer, 2005, 484 pages}",
  journal =      j-SIGACT,
  volume =       "38",
  number =       "2",
  pages =        "20--22",
  month =        jun,
  year =         "2007",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1272729.1272736",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 18:30:29 MDT 2012",
  bibsource =    "DBLP;
                 http://dblp.uni-trier.de/db/journals/sigact/sigact38.html#Faliszewski07;
                 http://portal.acm.org/;
                 https://www.math.utah.edu/pub/mirrors/ftp.ira.uka.de/bibliography/Misc/DBLP/2007.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See \cite{Rothe:2005:CTC}.",
  URL =          "http://doi.acm.org/10.1145/1272729.1272736",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Frith:2007:SAO,
  author =       "David Frith",
  title =        "Steganography approaches, options, and implications",
  journal =      j-NETWORK-SECURITY,
  volume =       "2007",
  number =       "8",
  pages =        "4--7",
  month =        aug,
  year =         "2007",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(07)70071-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:42 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485807700715",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@InProceedings{Garay:2007:RCA,
  author =       "J. A. Garay and J. Katz and Chiu-Yuen Koo and R.
                 Ostrovsky",
  title =        "Round Complexity of Authenticated Broadcast with a
                 Dishonest Majority",
  crossref =     "IEEE:2007:PAI",
  pages =        "658--668",
  year =         "2007",
  DOI =          "https://doi.org/10.1109/FOCS.2007.44",
  bibdate =      "Thu Apr 12 09:33:17 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2000.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4389466",
}

@InProceedings{Gavinsky:2007:ESO,
  author =       "Dmitry Gavinsky and Julia Kempe and Iordanis Kerenidis
                 and Ran Raz and Ronald de Wolf",
  title =        "Exponential separations for one-way quantum
                 communication complexity, with applications to
                 cryptography",
  crossref =     "ACM:2007:SPA",
  pages =        "516--525",
  year =         "2007",
  DOI =          "https://doi.org/10.1145/1250790.1250866",
  bibdate =      "Fri Jun 20 18:28:53 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We give an exponential separation between one-way
                 quantum and classical communication protocols for two
                 partial Boolean functions, both of which are variants
                 of the Boolean Hidden Matching Problem of Bar-Yossef et
                 al. Earlier such an exponential separation was known
                 only for a relational version of the Hidden Matching
                 Problem. Our proofs use the Fourier coefficients
                 inequality of Kahn, Kalai, and Linial. We give a number
                 of applications of this separation. In particular, in
                 the bounded-storage model of cryptography we exhibit a
                 scheme that is secure against adversaries with a
                 certain amount of classical storage, but insecure
                 against adversaries with a similar (or even much
                 smaller) amount of quantum storage; in the setting of
                 privacy amplification, we show that there are strong
                 extractors that yield a classically secure key, but are
                 insecure against a quantum adversary.",
  acknowledgement = ack-nhfb,
  keywords =     "communication complexity; cryptography; quantum",
}

@Article{Geiselmann:2007:SPH,
  author =       "Willi Geiselmann and Rainer Steinwandt",
  title =        "Special-Purpose Hardware in Cryptanalysis: The Case of
                 1,024-Bit {RSA}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "63--66",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.20",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ghafarian:2007:IPU,
  author =       "Ahmad Ghafarian",
  title =        "Ideas for projects in undergraduate information
                 assurance and security courses",
  journal =      j-SIGCSE,
  volume =       "39",
  number =       "3",
  pages =        "322--322",
  month =        sep,
  year =         "2007",
  CODEN =        "SIGSD3",
  DOI =          "https://doi.org/10.1145/1269900.1268889",
  ISSN =         "0097-8418 (print), 2331-3927 (electronic)",
  ISSN-L =       "0097-8418",
  bibdate =      "Sat Nov 17 16:57:36 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigcse2000.bib",
  note =         "Proceedings of the 12th Annual SIGCSE Conference on
                 Innovation and Technology in Computer Science Education
                 (ITiCSE'07).",
  abstract =     "In this work, we present some ideas for projects that
                 can be used in undergraduate Information Assurance and
                 Security (IAS) courses. The projects range from
                 cryptanalysis of ciphertext, network security, security
                 vulnerability analysis, and programming to demonstrate
                 buffer overflow. The projects can be used in IAS
                 courses such as cryptography, network security, and
                 computer security. Alternatively, they can be used as
                 separate modules in computer science courses such as
                 operating systems, networking, and programming. Some of
                 these projects have been piloted by the author and have
                 achieved their objectives.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIGCSE Bulletin (ACM Special Interest Group on
                 Computer Science Education)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J688",
}

@Book{Gillespie:2007:WSC,
  author =       "Tarleton Gillespie",
  title =        "Wired shut: copyright and the shape of digital
                 culture",
  publisher =    pub-MIT,
  address =      pub-MIT:adr,
  pages =        "420 (est.)",
  year =         "2007",
  ISBN =         "0-262-07282-3",
  ISBN-13 =      "978-0-262-07282-3",
  LCCN =         "K1447.15 .G55 2007",
  bibdate =      "Tue Apr 17 14:28:52 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip0620/2006030129.html",
  acknowledgement = ack-nhfb,
  subject =      "Copyright; Electronic information resources; Piracy
                 (Copyright)",
  tableofcontents = "The technological fix \\
                 The copyright balance and the weight of DRM \\
                 The speed bump \\
                 A heroic tale of devilish piracy and glorious progress
                 \\
                 Why SMDI failed \\
                 Protecting DVDs: locks, licenses, and laws \\
                 Raising the broadcast flag \\
                 Effective frustration \\
                 The cultural implications of encryption.",
}

@Article{Goodell:2007:TOR,
  author =       "Geoffrey Goodell and Paul Syverson",
  title =        "Technical opinion: {The} right place at the right
                 time",
  journal =      j-CACM,
  volume =       "50",
  number =       "5",
  pages =        "113--117",
  month =        may,
  year =         "2007",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1230819.1241689",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 16 18:30:27 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Examining the use of network location in
                 authentication and abuse prevention.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@InProceedings{Haitner:2007:SHC,
  author =       "Iftach Haitner and Omer Reingold",
  title =        "Statistically-hiding commitment from any one-way
                 function",
  crossref =     "ACM:2007:SPA",
  pages =        "1--10",
  year =         "2007",
  DOI =          "https://doi.org/10.1145/1250790.1250792",
  bibdate =      "Fri Jun 20 18:28:53 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We give a construction of statistically-hiding
                 commitment schemes (ones where the hiding property
                 holds information theoretically), based on the minimal
                 cryptographic assumption that one-way functions exist.
                 Our construction employs two-phase commitment schemes,
                 recently constructed by Nguyen, Ong and Vadhan (FOCS
                 '06), and universal one-way hash functions introduced
                 and constructed by Naor and Yung (STOC '89) and Rompel
                 (STOC '90).",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; one-way functions; statistically hiding
                 and computationally binding commitment",
}

@Article{Han:2007:FIE,
  author =       "Fengling Han and Jiankun Hu and Xinghuo Yu and Yi
                 Wang",
  title =        "Fingerprint images encryption via multi-scroll chaotic
                 attractors",
  journal =      j-APPL-MATH-COMP,
  volume =       "185",
  number =       "2",
  pages =        "931--939",
  day =          "15",
  month =        feb,
  year =         "2007",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:03:02 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Book{Harman:2007:PDS,
  author =       "G. (Glyn) Harman",
  title =        "Prime-detecting sieves",
  publisher =    pub-PRINCETON,
  address =      pub-PRINCETON:adr,
  pages =        "????",
  year =         "2007",
  ISBN =         "0-691-12437-X",
  ISBN-13 =      "978-0-691-12437-7",
  LCCN =         "QA246 .H375 2007",
  bibdate =      "Thu Nov 15 15:55:11 MST 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "London Mathematical Society monographs",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0731/2007061051-d.html;
                 http://www.loc.gov/catdir/enhancements/fy0731/2007061051-t.html;
                 http://www.loc.gov/catdir/enhancements/fy0734/2007061051-b.html",
  acknowledgement = ack-nhfb,
  remark =       "From the publisher: This book seeks to describe the
                 rapid development in recent decades of sieve methods to
                 detect prime numbers. No other book has undertaken such
                 a systematic treatment of prime-detecting sieves. It
                 contains much that is accessible to beginning graduate
                 students, yet also provides insights that will benefit
                 established researchers.",
  subject =      "sieves (mathematics); numbers, prime; number theory",
}

@Article{Hars:2007:DIH,
  author =       "Laszlo Hars",
  title =        "{Discryption}: Internal Hard-Disk Encryption for
                 Secure Storage",
  journal =      j-COMPUTER,
  volume =       "40",
  number =       "6",
  pages =        "103--105",
  month =        jun,
  year =         "2007",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2007.202",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Jul 4 17:13:34 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@InProceedings{Hasenplaugh:2007:FMR,
  author =       "William Hasenplaugh and Gunnar Gaubatz and Vinodh
                 Gopal",
  title =        "Fast Modular Reduction",
  crossref =     "Kornerup:2007:PIS",
  pages =        "225--229",
  year =         "2007",
  DOI =          "https://doi.org/10.1109/ARITH.2007.18",
  bibdate =      "Tue Oct 9 17:16:03 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "It is widely acknowledged that efficient modular
                 multiplication is a key to high-performance
                 implementation of public-key cryptography, be it
                 classical RSA, Diffie--Hellman, or (hyper-) elliptic
                 curve algorithms. In the recent decade, practitioners
                 have relied mainly on two popular methods: Montgomery
                 Multiplication and regular long-integer multiplication
                 in combination with Barrett's modular reduction
                 technique. In this paper, we propose a modification to
                 Barrett's algorithm that leads to a significant
                 reduction (25\% to 75\%) in multiplications and
                 additions.",
  acknowledgement = ack-nhfb,
}

@Article{Heikkila:2007:ESC,
  author =       "Faith M. Heikkila",
  title =        "Encryption: Security Considerations for Portable Media
                 Devices",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "22--27",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.80",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Hendricks:2007:LOB,
  author =       "James Hendricks and Gregory R. Ganger and Michael K.
                 Reiter",
  title =        "Low-overhead {Byzantine} fault-tolerant storage",
  journal =      j-OPER-SYS-REV,
  volume =       "41",
  number =       "6",
  pages =        "73--86",
  month =        dec,
  year =         "2007",
  CODEN =        "OSRED8",
  DOI =          "https://doi.org/10.1145/1294261.1294269",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Fri Jun 20 17:18:34 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/opersysrev.bib",
  abstract =     "This paper presents an erasure-coded Byzantine
                 fault-tolerant block storage protocol that is nearly as
                 efficient as protocols that tolerate only crashes.
                 Previous Byzantine fault-tolerant block storage
                 protocols have either relied upon replication, which is
                 inefficient for large blocks of data when tolerating
                 multiple faults, or a combination of additional
                 servers, extra computation, and versioned storage. To
                 avoid these expensive techniques, our protocol employs
                 novel mechanisms to optimize for the common case when
                 faults and concurrency are rare. In the common case, a
                 write operation completes in two rounds of
                 communication and a read completes in one round. The
                 protocol requires a short checksum comprised of
                 cryptographic hashes and homomorphic fingerprints. It
                 achieves throughput within 10\% of the crash-tolerant
                 protocol for writes and reads in failure-free runs when
                 configured to tolerate up to 6 faulty servers and any
                 number of faulty clients.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGOPS Operating Systems Review",
  keywords =     "Byzantine fault-tolerant storage",
}

@Article{Herranz:2007:IBR,
  author =       "Javier Herranz",
  title =        "Identity-based ring signatures from {RSA}",
  journal =      j-THEOR-COMP-SCI,
  volume =       "389",
  number =       "1--2",
  pages =        "100--117",
  day =          "10",
  month =        dec,
  year =         "2007",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Mar 28 22:11:59 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Hiary:2007:SSE,
  author =       "Hazem Hiary and Kia Ng",
  title =        "A system for segmenting and extracting paper-based
                 watermark designs",
  journal =      j-INT-J-DIGIT-LIBR,
  volume =       "6",
  number =       "4",
  pages =        "351--361",
  month =        jul,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s00799-007-0008-7",
  ISSN =         "1432-1300 (print), 1432-5012 (electronic)",
  ISSN-L =       "1432-1300",
  bibdate =      "Tue May 7 07:43:24 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjdigitlibr.bib",
  URL =          "https://link.springer.com/article/10.1007/s00799-007-0008-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Digit. Libr.",
  fjournal =     "International Journal on Digital Libraries",
  journal-URL =  "https://link.springer.com/journal/799",
}

@Article{Hines:2007:AIF,
  author =       "Stephen Roderick Hines and Gary Tyson and David
                 Whalley",
  title =        "Addressing instruction fetch bottlenecks by using an
                 instruction register file",
  journal =      j-SIGPLAN,
  volume =       "42",
  number =       "7",
  pages =        "165--174",
  month =        jul,
  year =         "2007",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/1254766.1254800",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Wed Jun 18 10:57:50 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The Instruction Register File (IRF) is an
                 architectural extension for providing improved access
                 to frequently occurring instructions. An optimizing
                 compiler can exploit an IRF by packing an application's
                 instructions, resulting in decreased code size, reduced
                 energy consumption and improved execution time
                 primarily due to a smaller footprint in the instruction
                 cache. The nature of the IRF also allows the execution
                 of packed instructions to overlap with instruction
                 fetch, thus providing a means for tolerating increased
                 fetch latencies, like those experienced by encrypted
                 ICs as well as the presence of low-power L0 caches.
                 Although previous research has focused on the direct
                 benefits of instruction packing, this paper explores
                 the use of increased fetch bandwidth provided by packed
                 instructions. Small L0 caches improve energy efficiency
                 but can increase execution time due to frequent cache
                 misses. We show that this penalty can be significantly
                 reduced by overlapping the execution of packed
                 instructions with miss stalls. The IRF can also be used
                 to supply additional instructions to a more aggressive
                 execution engine, effectively reducing dependence on
                 instruction cache bandwidth. This can improve energy
                 efficiency, in addition to providing additional
                 flexibility for evaluating various design tradeoffs in
                 a pipeline with asymmetric instruction bandwidth. Thus,
                 we show that the IRF is a complementary technique,
                 operating as a buffer tolerating fetch bottlenecks, as
                 well as providing additional fetch bandwidth for an
                 aggressive pipeline backend.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  keywords =     "instruction packing; instruction register file;
                 L0/filter cache",
}

@Article{Hinkelmann:2007:CUN,
  author =       "Markus Hinkelmann and Andreas Jakoby",
  title =        "Communications in unknown networks: {Preserving} the
                 secret of topology",
  journal =      j-THEOR-COMP-SCI,
  volume =       "384",
  number =       "2--3",
  pages =        "184--200",
  day =          "1",
  month =        oct,
  year =         "2007",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Mar 28 22:11:56 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@InProceedings{Howgrave-Graham:2007:HLR,
  author =       "Nick Howgrave-Graham",
  title =        "A hybrid lattice-reduction and meet-in-the-middle
                 attack against {NTRU}",
  crossref =     "Menezes:2007:ACC",
  pages =        "150--169",
  year =         "2007",
  bibdate =      "Thu Apr 21 10:04:37 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://portal.acm.org/citation.cfm?id=1777777.1777791",
  abstract =     "To date the NTRUEncrypt security parameters have been
                 based on the existence of two types of attack: a
                 meet-in-the-middle attack due to Odlyzko, and a
                 conservative extrapolation of the running times of the
                 best (known) lattice reduction schemes to recover the
                 private key. We show that there is in fact a continuum
                 of more efficient attacks between these two attacks. We
                 show that by combining lattice reduction and a
                 meet-in-the-middle strategy one can reduce the number
                 of loops in attacking the NTRUEncrypt private key from
                 $ 2^{84.2} $ to $ 2^{60.3} $, for the $ k = 80 $
                 parameter set. In practice the attack is still
                 expensive (dependent on ones choice of cost-metric),
                 although there are certain space\slash time tradeoffs
                 that can be applied. Asymptotically our attack remains
                 exponential in the security parameter k, but it
                 dictates that NTRUEncrypt parameters must be chosen so
                 that the meet-in-the-middle attack has complexity $ 2^k
                 $ even after an initial lattice basis reduction of
                 complexity $ 2^k $.",
  acknowledgement = ack-nhfb,
  keywords =     "ANSI X9.98-2010; NTRUEncrypt",
}

@Article{Hu:2007:DWD,
  author =       "Ming-Chiang Hu and Der-Chyuan Lou and Ming-Chang
                 Chang",
  title =        "Dual-wrapped digital watermarking scheme for image
                 copyright protection",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "4",
  pages =        "319--330",
  month =        jun,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806002070",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Huang:2007:EPS,
  author =       "Chung-Ming Huang and Jian-Wei Li",
  title =        "Efficient and Provably Secure {IP} Multimedia
                 Subsystem Authentication for {UMTS}",
  journal =      j-COMP-J,
  volume =       "50",
  number =       "6",
  pages =        "739--757",
  month =        nov,
  year =         "2007",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxm029",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Apr 28 14:33:33 MDT 2010",
  bibsource =    "http://comjnl.oxfordjournals.org/content/vol50/issue6/index.dtl;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://comjnl.oxfordjournals.org/cgi/content/abstract/50/6/739;
                 http://comjnl.oxfordjournals.org/cgi/content/full/50/6/739;
                 http://comjnl.oxfordjournals.org/cgi/reprint/50/6/739",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Huang:2007:MPK,
  author =       "Dijiang Huang and Manish Mehta and Appie van de
                 Liefvoort and Deep Medhi",
  title =        "Modeling pairwise key establishment for random key
                 predistribution in large-scale sensor networks",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "15",
  number =       "5",
  pages =        "1204--1215",
  month =        oct,
  year =         "2007",
  CODEN =        "IEANEP",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Thu Jun 19 09:57:26 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Sensor networks are composed of a large number of low
                 power sensor devices. For secure communication among
                 sensors, secret keys are required to be established
                 between them. Considering the storage limitations and
                 the lack of post-deployment configuration information
                 of sensors, RandomKey Predistribution schemes have been
                 proposed. Due to limited number of keys, sensors can
                 only share keys with a subset of the neighboring
                 sensors. Sensors then use these neighbors to establish
                 pairwise keys with the remaining neighbors. In order to
                 study the communication overhead incurred due to
                 pairwise key establishment, we derive probability
                 models to design and analyze pairwise key establishment
                 schemes for large-scale sensor networks. Our model
                 applies the binomial distribution and a modified
                 binomial distribution and analyzes the key path length
                 in a hop-by-hop fashion. We also validate our models
                 through a systematic validation procedure. We then show
                 the robustness of our results and illustrate how our
                 models can be used for addressing sensor network design
                 problems.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
  keywords =     "random key distributions; security; sensor networks",
}

@Article{Hwang:2007:PEA,
  author =       "Ren-Junn Hwang and Sheng-Hua Shiau",
  title =        "Provably Efficient Authenticated Key Agreement
                 Protocol for Multi-Servers",
  journal =      j-COMP-J,
  volume =       "50",
  number =       "5",
  pages =        "602--615",
  month =        sep,
  year =         "2007",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxm030",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Apr 28 14:33:33 MDT 2010",
  bibsource =    "http://comjnl.oxfordjournals.org/content/vol50/issue5/index.dtl;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://comjnl.oxfordjournals.org/cgi/content/abstract/50/5/602;
                 http://comjnl.oxfordjournals.org/cgi/content/full/50/5/602;
                 http://comjnl.oxfordjournals.org/cgi/reprint/50/5/602",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@InProceedings{Ishai:2007:ZKS,
  author =       "Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky
                 and Amit Sahai",
  title =        "Zero-knowledge from secure multiparty computation",
  crossref =     "ACM:2007:SPA",
  pages =        "21--30",
  year =         "2007",
  DOI =          "https://doi.org/10.1145/1250790.1250794",
  bibdate =      "Fri Jun 20 18:28:53 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We present a general construction of a zero-knowledge
                 proof for an NP relation $ R(x, w) $ which only makes a
                 black-box use of a secure protocol for a related
                 multi-party functionality $f$. The latter protocol is
                 only required to be secure against a small number of
                 `honest but curious' players. As an application, we can
                 translate previous results on the efficiency of secure
                 multiparty computation to the domain of zero-knowledge,
                 improving over previous constructions of efficient
                 zero-knowledge proofs. In particular, if verifying $R$
                 on a witness of length $m$ can be done by a circuit $C$
                 of size $s$, and assuming one-way functions exist, we
                 get the following types of zero-knowledge proof
                 protocols.\par

                 \begin{description} \item[Approaching the witness
                 length.] If $C$ has constant depth over $ \land $, $
                 \lor $, $ \oplus $, $ \lnot $ gates of unbounded
                 fan-in, we get a zero-knowledge protocol with
                 communication complexity $m$ \cdot$ \poly (k) $ \cdot$
                 \polylog (s) $, where $k$ is a security parameter. Such
                 a protocol can be implemented in either the standard
                 interactive model or, following a trusted setup, in a
                 non-interactive model.\par

                 \item[`Constant-rate' zero-knowledge.] For an arbitrary
                 circuit $C$ of size $s$ and a bounded fan-in, we get a
                 zero-knowledge protocol with communication complexity $
                 O(s) + \poly (k) $. Thus, for large circuits, the ratio
                 between the communication complexity and the circuit
                 size approaches a constant. This improves over the $
                 O(k s) $ complexity of the best previous
                 protocols.\par

                 \end{description}",
  acknowledgement = ack-nhfb,
  keywords =     "black-box reductions; cryptography; secure
                 computation; zero-knowledge",
}

@Article{Iyer:2007:TAA,
  author =       "Ravishankar K. Iyer and Zbigniew Kalbarczyk and
                 Karthik Pattabiraman and William Healey and Wen-Mei W.
                 Hwu and Peter Klemperer and Reza Farivar",
  title =        "Toward Application-Aware Security and Reliability",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "57--62",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.23",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Jakobsson:2007:DPD,
  author =       "Markus Jakobsson and Steven Myers",
  title =        "Delayed password disclosure",
  journal =      j-SIGACT,
  volume =       "38",
  number =       "3",
  pages =        "56--75",
  month =        sep,
  year =         "2007",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1324215.1324228",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 18:30:29 MDT 2012",
  bibsource =    "DBLP;
                 http://dblp.uni-trier.de/db/journals/sigact/sigact38.html#JakobssonM07;
                 http://portal.acm.org/;
                 https://www.math.utah.edu/pub/mirrors/ftp.ira.uka.de/bibliography/Misc/DBLP/2007.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  URL =          "http://doi.acm.org/10.1145/1324215.1324228",
  abstract =     "We present a new authentication protocol called
                 Delayed Password Disclosure. Based on the traditional
                 username and password paradigm, the protocol's goal is
                 aimed at reducing the effectiveness of
                 phishing/spoofing attacks that are becoming
                 increasingly problematic for Internet users. This is
                 done by providing the user with dynamic feedback while
                 password entry occurs. While this is a process that
                 would normally be frowned upon by the cryptographic
                 community, we argue that it may result in more
                 effective security than that offered by currently
                 proposed ``cryptographically acceptable'' alternatives.
                 While the protocol cannot prevent partial disclosure of
                 one's password to the phisher, it does provide a user
                 with the tools necessary to recognize an ongoing
                 phishing attack, and prevent the disclosure of his/her
                 entire password, providing graceful security
                 degradation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Jakubowska:2007:MCT,
  author =       "Gizela Jakubowska and Wojciech Penczek",
  title =        "Modelling and Checking Timed Authentication of
                 Security Protocols",
  journal =      j-FUND-INFO,
  volume =       "79",
  number =       "3--4",
  pages =        "363--378",
  month =        feb,
  year =         "2007",
  CODEN =        "FUMAAJ",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:05:58 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Johnson:2007:EIS,
  author =       "M. Eric Johnson and Eric Goetz",
  title =        "Embedding Information Security into the Organization",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "16--24",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.59",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Book{Kadrich:2007:ES,
  author =       "Mark Kadrich",
  title =        "Endpoint security",
  publisher =    "Addison Wesley Professional",
  address =      "Indianapolis, IN, USA",
  pages =        "????",
  year =         "2007",
  ISBN =         "0-321-43695-4 (paperback)",
  ISBN-13 =      "978-0-321-43695-5 (paperback)",
  LCCN =         "QA76.9.A25 K325 2007",
  bibdate =      "Fri Apr 20 14:01:47 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Computer networks; Security
                 measures",
}

@Article{Kamp:2007:DEB,
  author =       "Jesse Kamp and David Zuckerman",
  title =        "Deterministic Extractors for Bit-Fixing Sources and
                 Exposure-Resilient Cryptography",
  journal =      j-SIAM-J-COMPUT,
  volume =       "36",
  number =       "5",
  pages =        "1231--1247",
  month =        "????",
  year =         "2007",
  CODEN =        "SMJCAT",
  DOI =          "",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Tue May 18 08:21:39 MDT 2010",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/36/5;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Article{Kamvar:2007:DTM,
  author =       "Maryam Kamvar and Shumeet Baluja",
  title =        "Deciphering Trends in Mobile Search",
  journal =      j-COMPUTER,
  volume =       "40",
  number =       "8",
  pages =        "58--62",
  month =        aug,
  year =         "2007",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2007.270",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Jul 4 17:13:35 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Kaps:2007:CSD,
  author =       "Jens-Peter Kaps and Gunnar Gaubatz and Berk Sunar",
  title =        "Cryptography on a Speck of Dust",
  journal =      j-COMPUTER,
  volume =       "40",
  number =       "2",
  pages =        "38--44",
  month =        feb,
  year =         "2007",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2007.52",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Jul 4 17:13:33 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "As tiny wireless sensors and RFID tags become
                 ubiquitous, they impact privacy, trust, and control.
                 Protecting data on these devices requires new
                 algorithms suitable for ultralow-power implementations.
                 This paper presents a survey of cryptographic
                 algorithms. It also discusses the design
                 recommendations for new algorithms.",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Kashefi:2007:SZK,
  author =       "Elham Kashefi and Iordanis Kerenidis",
  title =        "Statistical {Zero Knowledge} and quantum one-way
                 functions",
  journal =      j-THEOR-COMP-SCI,
  volume =       "378",
  number =       "1",
  pages =        "101--116",
  day =          "3",
  month =        jun,
  year =         "2007",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Mar 29 08:55:47 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Kidwell:2007:CSB,
  author =       "Peggy Aldrich Kidwell",
  title =        "{{\booktitle{Colossus: The Secrets of Bletchley Park's
                 Codebreaking Computers}}} (review)",
  journal =      j-TECH-CULTURE,
  volume =       "48",
  number =       "3",
  pages =        "663--664",
  month =        jul,
  year =         "2007",
  CODEN =        "TECUA3",
  DOI =          "https://doi.org/10.1353/tech.2007.0112",
  ISSN =         "0040-165X (print), 1097-3729 (electronic)",
  ISSN-L =       "0040-165X",
  bibdate =      "Sat Sep 30 08:25:03 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/techculture2000.bib",
  URL =          "https://muse.jhu.edu/pub/1/article/218709",
  acknowledgement = ack-nhfb,
  ajournal =     "Tech. Culture",
  fjournal =     "Technology and Culture",
  journal-URL =  "https://muse.jhu.edu/journal/194",
}

@Article{Kim:2007:SBE,
  author =       "Jin-Ha Kim and Gyu Sang Choi and Chita R. Das",
  title =        "An {SSL} Back-End Forwarding Scheme in Cluster-Based
                 {Web} Servers",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "18",
  number =       "7",
  pages =        "946--957",
  month =        jul,
  year =         "2007",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2007.1062",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Thu Jul 3 14:26:52 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@TechReport{Klein:2007:BDC,
  author =       "Amit Klein",
  title =        "{BIND 9 DNS} Cache Poisoning",
  type =         "Report",
  institution =  "Trusteer, Ltd.",
  address =      "3 Hayetzira Street, Ramat Gan 52521, Israel",
  pages =        "21",
  year =         "2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.trusteer.com/docs/BIND_9_DNS_Cache_Poisoning.pdf",
  abstract =     "The paper shows that BIND 9 DNS queries are
                 predictable i.e. that the source UDP port and DNS
                 transaction ID can be effectively predicted. A
                 predictability algorithm is described that, in optimal
                 conditions, provides very few guesses for the next
                 query (10 in the basic attack, and 1 in the advanced
                 attack), thereby overcoming whatever protection offered
                 by the transaction ID mechanism. This enables a much
                 more effective DNS cache poisoning than the currently
                 known attacks against BIND 9. The net effect is that
                 pharming attacks are feasible against BIND 9 caching
                 DNS servers, without the need to directly attack
                 neither DNS servers nor clients (PCs). The results are
                 applicable to all BIND 9 releases [1], when BIND (the
                 named daemon) is in caching DNS server configuration.",
  remark =       "Part of this work involves reconstructing the state of
                 the pseudo-random number generator to allow prediction
                 of randomized port numbers. The report also discusses
                 birthday attacks.",
}

@Article{Knutson:2007:BPS,
  author =       "Tina R. Knutson",
  title =        "Building Privacy into Software Products and Services",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "72--74",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.55",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@InProceedings{Ko:2007:SRT,
  author =       "Hoon Ko and Jiyeon Kim and Jongjin Jung and Susan Joe
                 and Yongjun Lee and Yoonseok Chang",
  title =        "A Study on the {RFID} Tag Encryption using Fast
                 {SEED}",
  crossref =     "Simos:2007:CMS",
  volume =       "2A",
  pages =        "571--574",
  year =         "2007",
  bibdate =      "Thu Feb 21 14:34:40 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://proceedings.aip.org/getpdf/servlet/GetPDFServlet?filetype=pdf&amp;
                 id=APCPCS000963000002000571000001&amp; idtype=cvips",
  acknowledgement = ack-nhfb,
}

@InProceedings{Kobayashi:2007:AIG,
  author =       "Katsuki Kobayashi and Naofumi Takagi and Kazuyoshi
                 Takagi",
  title =        "An Algorithm for Inversion in {$ \mathrm {GF}(2^m) $}
                 Suitable for Implementation Using a Polynomial Multiply
                 Instruction on {$ \mathrm {GF}(2) $}",
  crossref =     "Kornerup:2007:PIS",
  pages =        "105--112",
  year =         "2007",
  DOI =          "https://doi.org/10.1109/ARITH.2007.9",
  bibdate =      "Tue Oct 9 16:32:41 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "An algorithm for inversion in $ \mathrm {GF}(2^m) $
                 suitable for implementation using a polynomial multiply
                 instruction on $ \mathrm {GF}(2) $ is proposed. It is
                 based on the extended Euclid's algorithm. In the
                 algorithm, operations corresponding to several
                 contiguous iterations of the VLSI algorithm proposed by
                 Brunner et al. is represented as a matrix. They are
                 calculated at once through the matrix efficiently by
                 means of a polynomial multiply instruction on $ \mathrm
                 {GF}(2) $. For example, in the case where the word size
                 of a processor and $m$ are $ 32 $ and $ 571 $,
                 respectively, the algorithm calculates inversion with
                 about the half number of instructions of the
                 conventional algorithm on the average.",
  acknowledgement = ack-nhfb,
}

@Article{Koblitz:2007:URB,
  author =       "Neal Koblitz",
  title =        "The uneasy relationship between mathematics and
                 cryptography",
  journal =      j-NAMS,
  volume =       "54",
  number =       "8",
  pages =        "972--979",
  month =        sep,
  year =         "2007",
  CODEN =        "AMNOAN",
  ISSN =         "0002-9920 (print), 1088-9477 (electronic)",
  ISSN-L =       "0002-9920",
  MRclass =      "00A99 (01A60 11T71 94-03 94A60)",
  MRnumber =     "2340704",
  bibdate =      "Thu Aug 15 07:17:02 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/nams2000.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "Notices Amer. Math. Soc.",
  fjournal =     "Notices of the American Mathematical Society",
  journal-URL =  "http://www.ams.org/notices/",
}

@Article{Komninos:2007:ALS,
  author =       "Nikos Komninos and Dimitrios D. Vergados and Christos
                 Douligeris",
  title =        "Authentication in a layered security approach for
                 mobile ad hoc networks",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "5",
  pages =        "373--380",
  month =        aug,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000041",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kramer:2007:LCC,
  author =       "Simon Kramer",
  title =        "Logical concepts in cryptography",
  journal =      j-SIGACT,
  volume =       "38",
  number =       "4",
  pages =        "65--66",
  month =        dec,
  year =         "2007",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1345189.1345205",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 18:30:29 MDT 2012",
  bibsource =    "DBLP;
                 http://dblp.uni-trier.de/db/journals/sigact/sigact38.html#Kramer07;
                 http://portal.acm.org/;
                 https://www.math.utah.edu/pub/mirrors/ftp.ira.uka.de/bibliography/Misc/DBLP/2007.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  URL =          "http://doi.acm.org/10.1145/1345189.1345205",
  abstract =     "The thesis is about a breadth-first exploration of
                 logical concepts in cryptography and their linguistic
                 abstraction and model-theoretic combination in a
                 comprehensive logical system, called CPL (for
                 Cryptographic Protocol Logic). We focus on two
                 fundamental aspects of cryptography. Namely, the
                 security of communication (as opposed to security of
                 storage) and cryptographic protocols (as opposed to
                 cryptographic operators). The logical concepts explored
                 are the following. Primary concepts: the modal concepts
                 of belief, knowledge, norms, provability, space, and
                 time. Secondary concepts: belief with error control,
                 individual and propositional knowledge, confidentiality
                 norms, truth-functional and relevant (in particular,
                 intuitionistic) implication, multiple and complex truth
                 values, and program types. The distinguishing feature
                 of CPL is that it unifies and refines a variety of
                 existing approaches. This feature is the result of our
                 holistic conception of property-based (modal logics)
                 and model-based (process algebra) formalisms. We
                 illustrate the expressiveness of CPL on representative
                 requirements engineering case studies. Further, we
                 extend (core) CPL (qualitative time) with
                 rational-valued time, i.e., time stamps, timed keys,
                 and potentially drifting local clocks, to tCPL
                 (quantitative time). Our extension is conservative and
                 provides further evidence for Lamport's claim that
                 adding real time to an untimed formalism is really
                 simple. Furthermore, we sketch an extension of (core)
                 CPL with a notion of probabilistic polynomial-time (PP)
                 computation. We illustrate the expressiveness of this
                 extended logic (ppCPL) on tentative formalisation case
                 studies of fundamental and applied concepts.
                 Fundamental concepts: (1) one-way function, (2)
                 hard-core predicate, (3) computational
                 indistinguishability, (4) ($n$-party) interactive
                 proof, and (5) ($n$-prover) zero-knowledge. Applied
                 concepts: (1) security of encryption schemes, (2)
                 unforgeability of signature schemes, (3) attacks on
                 encryption schemes, (4) attacks on signature schemes,
                 and (5) breaks of signature schemes. In the light of
                 logic, adding PP to a formalism for cryptographic
                 protocols is perhaps also simple and can be achieved
                 with an Ockham's razor extension of an existing core
                 logic, namely CPL.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Kumagai:2007:RSK,
  author =       "J. Kumagai",
  title =        "A Robotic Sentry For {Korea}'s {Demilitarized Zone}",
  journal =      j-IEEE-SPECTRUM,
  volume =       "44",
  number =       "3",
  pages =        "16--17",
  month =        mar,
  year =         "2007",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2007.323429",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Cryptography; Daewoo K3; Digital cameras; Embedded
                 software; gun-toting sentry robot; Humans; light
                 camera; Local government; machine gun; military
                 equipment; military service; military systems; mobile
                 robots; Pattern recognition; pattern recognition
                 software; Robot vision systems; Robotic assembly;
                 robotic sentry; Robotics and automation; Samsung
                 Techwin Co.; SGR-AI robot; South Korea;
                 Telecommunications",
}

@Article{Laguillaumie:2007:MDV,
  author =       "Fabien Laguillaumie and Damien Vergnaud",
  title =        "Multi-designated verifiers signatures: anonymity
                 without encryption",
  journal =      j-INFO-PROC-LETT,
  volume =       "102",
  number =       "2--3",
  pages =        "127--132",
  day =          "30",
  month =        apr,
  year =         "2007",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 15:52:39 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Laird:2007:THL,
  author =       "Cameron Laird",
  title =        "Taking a Hard-Line Approach to Encryption",
  journal =      j-COMPUTER,
  volume =       "40",
  number =       "3",
  pages =        "13--15",
  month =        mar,
  year =         "2007",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2007.105",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Jul 4 17:13:33 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@InProceedings{LaMacchia:2007:SSA,
  author =       "Brian LaMacchia and Kristin Lauter and Anton
                 Mityagin",
  editor =       "Willy Susilo and Joseph K. Liu and Yi Mu",
  booktitle =    "{Provable Security First International Conference,
                 ProvSec 2007, Wollongong, Australia, November 1--2,
                 2007. Proceedings}",
  title =        "Stronger security of authenticated key exchange",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "1--16",
  year =         "2007",
  DOI =          "https://doi.org/10.1007/978-3-540-75670-5_1",
  bibdate =      "Fri Jul 29 08:04:28 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://link.springer.com/chapter/10.1007/978-3-540-75670-5_1",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-540-75670-5",
}

@Book{Lambert:2007:SLG,
  author =       "David Lambert",
  title =        "Super little giant book of secret codes",
  publisher =    "Sterling Pub. Co.",
  address =      "New York, NY, USA",
  pages =        "287",
  year =         "2007",
  ISBN =         "1-4027-3739-4 (paperback)",
  ISBN-13 =      "978-1-4027-3739-8 (paperback)",
  LCCN =         "Z103.3 .L36 2007",
  bibdate =      "Sat May 15 09:18:17 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0738/2007276461-d.html",
  abstract =     "Learn to create secret codes using symbols, dots,
                 lines, rearranged letters and more.",
  acknowledgement = ack-nhfb,
  subject =      "cryptography; juvenile literature; ciphers",
}

@Article{Laskari:2007:AEC,
  author =       "E. C. Laskari and G. C. Meletiou and Y. C. Stamatiou
                 and M. N. Vrahatis",
  title =        "Applying evolutionary computation methods for the
                 cryptanalysis of {Feistel} ciphers",
  journal =      j-APPL-MATH-COMP,
  volume =       "184",
  number =       "1",
  pages =        "63--72",
  day =          "1",
  month =        jan,
  year =         "2007",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:03:01 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Lavoue:2007:SSW,
  author =       "Guillaume Lavou{\'e} and Florence Denis and Florent
                 Dupont",
  title =        "Subdivision surface watermarking",
  journal =      j-COMPUTERS-AND-GRAPHICS,
  volume =       "31",
  number =       "3",
  pages =        "480--492",
  month =        jun,
  year =         "2007",
  CODEN =        "COGRD2",
  DOI =          "https://doi.org/10.1016/j.cag.2007.01.022",
  ISSN =         "0097-8493 (print), 1873-7684 (electronic)",
  ISSN-L =       "0097-8493",
  bibdate =      "Mon Feb 13 16:41:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compgraph.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00978493",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0097849307000507",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Graphics",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00978493",
}

@Article{Lee:2007:RKD,
  author =       "Hyoung-joo Lee and Sungzoon Cho",
  title =        "Retraining a keystroke dynamics-based authenticator
                 with impostor patterns",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "4",
  pages =        "300--310",
  month =        jun,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806002057",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lei:2007:CSA,
  author =       "Jun Lei and Xiaoming Fu and Dieter Hogrefe and
                 Jianrong Tan",
  title =        "Comparative studies on authentication and key exchange
                 methods for 802.11 wireless {LAN}",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "5",
  pages =        "401--409",
  month =        aug,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000053",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{Lemke-Rust:2007:MAP,
  author =       "Kerstin Lemke-Rust",
  title =        "Models and Algorithms for Physical Cryptanalysis",
  volume =       "4",
  publisher =    "Europ{\"a}ischer Universit{\"a}tsverlag",
  address =      "Bochum, Germany",
  pages =        "xiv + 232",
  year =         "2007",
  ISBN =         "3-89966-272-5",
  ISBN-13 =      "978-3-89966-272-6",
  ISSN =         "1864-1709",
  LCCN =         "????",
  bibdate =      "Fri May 13 08:45:20 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "EUR 24.90",
  series =       "IT-Security",
  acknowledgement = ack-nhfb,
}

@Article{Li:2007:NBA,
  author =       "Weihai Li and Yuan Yuan",
  title =        "A New Blind Attack Procedure for {DCT}-Based Image
                 Encryption with Spectrum Learning",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "7",
  number =       "3",
  pages =        "481--496",
  month =        jul,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1142/S0219467807002787",
  ISSN =         "0219-4678",
  bibdate =      "Tue Aug 31 08:38:01 MDT 2010",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Li:2007:PBS,
  author =       "F. Li and X. Xin and Y. Hu",
  title =        "A Pairing-Based Signcryption Scheme Using
                 Self-Certified Public Keys",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "29",
  number =       "3",
  pages =        "278--282",
  year =         "2007",
  DOI =          "https://doi.org/10.1080/1206212X.2007.11441857",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:24:05 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.1080/1206212X.2007.11441857",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "11 Jul 2015",
}

@Article{Lian:2007:MDE,
  author =       "S. Lian and Z. Liu and Z. Ren and Z. Wang",
  title =        "Multimedia Data Encryption in Block-Based Codecs",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "29",
  number =       "1",
  pages =        "18--24",
  year =         "2007",
  DOI =          "https://doi.org/10.1080/1206212X.2007.11441828",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:23:43 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.1080/1206212X.2007.11441828",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "11 Jul 2015",
}

@Article{Lin:2007:PFT,
  author =       "Jenn-Wei Lin",
  title =        "Providing fault-tolerant authentication and
                 authorization in wireless mobile {IP} networks",
  journal =      j-J-SYST-SOFTW,
  volume =       "80",
  number =       "2",
  pages =        "149--163",
  month =        feb,
  year =         "2007",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:02 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Liu:2007:IFW,
  author =       "Shao-Hui Liu and Hong-Xun Yao and Wen Gao and
                 Yong-Liang Liu",
  title =        "An image fragile watermark scheme based on chaotic
                 image pattern and pixel-pairs",
  journal =      j-APPL-MATH-COMP,
  volume =       "185",
  number =       "2",
  pages =        "869--882",
  day =          "15",
  month =        feb,
  year =         "2007",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:03:02 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Lopez:2007:SCB,
  author =       "Andr{\'e}s Mar{\'\i}n L{\'o}pez and Daniel D{\'\i}az
                 S{\'a}nchez and Florina Almen{\'a}rez and Carlos
                 Garc{\'\i}a Rubio and Celeste Campo",
  title =        "Smart card-based agents for fair non-repudiation",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "51",
  number =       "9",
  pages =        "2288--2298",
  day =          "20",
  month =        jun,
  year =         "2007",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:18 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Lu:2007:NPL,
  author =       "Rongxing Lu and Zhenfu Cao and Xiaolei Dong",
  title =        "A New Practical Limited Identity-Based Encryption
                 Scheme",
  journal =      j-FUND-INFO,
  volume =       "80",
  number =       "4",
  pages =        "461--474",
  month =        dec,
  year =         "2007",
  CODEN =        "FUMAAJ",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:06:10 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Lu:2007:NSC,
  author =       "HongQian Karen Lu",
  title =        "Network smart card review and analysis",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "51",
  number =       "9",
  pages =        "2234--2248",
  day =          "20",
  month =        jun,
  year =         "2007",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:18 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Lyda:2007:UEA,
  author =       "Robert Lyda and James Hamrock",
  title =        "Using Entropy Analysis to Find Encrypted and Packed
                 Malware",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "40--45",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.48",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lysyanskaya:2007:AI,
  author =       "Anna Lysyanskaya",
  title =        "Authentication without Identification",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "69--71",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.52",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Mabry:2007:USE,
  author =       "Frank J. Mabry and John R. James and Aaron J.
                 Ferguson",
  title =        "{Unicode} Steganographic Exploits: Maintaining
                 Enterprise Border Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "5",
  pages =        "32--39",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.128",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Unicode is rapidly becoming the preferred means for
                 representing symbols used in creating multimedia
                 content, especially for information that's presented in
                 multiple languages. This article discusses a Unicode
                 vulnerability that makes such content susceptible to
                 being used for creation of covert channel
                 communications. We also developed a solution
                 architecture, the Unified Secure Message Augmentation
                 (USMA) service. The USMA service incorporates rules (in
                 an XML vocabulary) that we can apply to Unicode
                 transmissions that will detect an attempt to transmit a
                 potential exploit, alert network managers to the
                 presence of the Unicode anomaly, and take action to
                 mitigate the exploit.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Marti-Farre:2007:NSS,
  author =       "Jaume Mart{\'\i}-Farr{\'e}",
  title =        "A note on secret sharing schemes with three
                 homogeneous access structure",
  journal =      j-INFO-PROC-LETT,
  volume =       "102",
  number =       "4",
  pages =        "133--137",
  day =          "16",
  month =        may,
  year =         "2007",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 15:52:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Martin:2007:SCE,
  author =       "Keye Martin",
  title =        "Secure Communication without Encryption?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "68--71",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.39",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@InProceedings{Matsumoto:2007:FSC,
  author =       "Makoto Matsumoto and Mutsuo Saito and Takuji Nishimura
                 and Mariko Hagita",
  title =        "A Fast Stream Cipher with Huge State Space and
                 Quasigroup Filter for Software",
  crossref =     "Adams:2007:SAC",
  pages =        "246--263",
  year =         "2007",
  DOI =          "https://doi.org/10.1007/978-3-540-77360-3_16",
  bibdate =      "Mon Jun 27 22:48:38 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Recent personal computers have high-spec CPUs and
                 plenty of memory. The motivation of this study is to
                 take these advantages in designing a tough and fast
                 key-stream generator. Natural controversies on using a
                 large state space for a generator are (1) effectiveness
                 is unclear, (2) slower generation speed, (3) expensive
                 initialization, and (4) costs in a hardware
                 implementation.\par

                 Our proposal is to combine a linear feedback shift
                 register (LFSR) and a uniform quasigroup filter with
                 memory of wordsize. We prove theorems which assure the
                 period and the distribution property of such
                 generators, answering to (1). As for (2), the
                 generation speed of a LFSR is independent of the state
                 size. In addition, we propose a filter based on integer
                 multiplication, which is rather fast in modern CPUs. We
                 analyze the algebraic degree of such filters. We answer
                 to (3) by a simple trick to use another small generator
                 to initialize LFSR while outputting. We have no answer
                 to (4), but comment that recent hardwares tend to have
                 larger memory and sophisticated instructions.\par

                 As a concrete example, we propose CryptMT stream
                 generator with period (no less than) $ 2^{19937} - 1 $,
                 1241-dimensional equidistribution property, which is
                 sometimes faster than SNOW2.0 in modern CPUs.",
  acknowledgement = ack-nhfb,
  keywords =     "combined generator; CryptMT; distribution; eSTREAM;
                 filter with memory; multiplicative filter; period;
                 quasigroup filter; stream cipher",
}

@Book{Maurer:2007:ICP,
  author =       "Ueli Maurer and Martin Abadi and Ross Anderson",
  title =        "Introduction to Cryptography: Principles and
                 Applications",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "371",
  year =         "2007",
  ISBN =         "3-540-49244-5, 3-642-08040-5",
  ISBN-13 =      "978-3-540-49244-3, 978-3-642-08040-1",
  LCCN =         "QA76.9.A25.D447 2007eb",
  bibdate =      "Sat Jun 10 08:34:43 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures; Computer
                 security; Cryptography",
  tableofcontents = "Preface to the Second, Extended Edition \\
                 Preface \\
                 Contents \\
                 Notation \\
                 1. Introduction \\
                 2. Symmetric-Key Encryption \\
                 3. Public-Key Cryptography \\
                 4. Cryptographic Protocols \\
                 5. Probabilistic Algorithms \\
                 6. One-Way Functions and the Basic Assumptions \\
                 7. Bit Security of One-Way Functions \\
                 8. One-Way Functions and Pseudorandomness \\
                 9. Provably Secure Encryption \\
                 10. Provably Secure Digital Signatures \\
                 A. Algebra and Number Theory \\
                 B. Probabilities and Information Theory \\
                 References \\
                 Index",
}

@Article{Meseguer:2007:SRA,
  author =       "Jos{\'e} Meseguer and Prasanna Thati",
  title =        "Symbolic reachability analysis using narrowing and its
                 application to verification of cryptographic
                 protocols",
  journal =      j-HIGHER-ORDER-SYMB-COMPUT,
  volume =       "20",
  number =       "1--2",
  pages =        "123--160",
  month =        jun,
  year =         "2007",
  CODEN =        "LSCOEX",
  DOI =          "https://doi.org/10.1007/s10990-007-9000-6",
  ISSN =         "1388-3690 (print), 2212-0793 (electronic)",
  ISSN-L =       "1388-3690",
  bibdate =      "Wed Jul 9 12:34:45 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=1388-3690&volume=20&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/higherordersymbcomput.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=1388-3690&volume=20&issue=1&spage=123",
  acknowledgement = ack-nhfb,
  fjournal =     "Higher-Order and Symbolic Computation",
  keywords =     "Narrowing; Reachability; Rewrite theories; Security
                 protocols",
}

@Book{Moldovyan:2007:IC,
  author =       "Nick Moldovyan and Alex Moldovyan",
  title =        "Innovative cryptography",
  publisher =    "Charles River Media",
  address =      "Boston, MA, USA",
  edition =      "Second",
  pages =        "xiii + 386",
  year =         "2007",
  ISBN =         "1-58450-467-6 (paperback)",
  ISBN-13 =      "978-1-58450-467-2 (paperback)",
  LCCN =         "QA76.9.A25 M665 2007",
  bibdate =      "Sat Jun 13 08:35:09 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Charles River Media programming series",
  URL =          "http://www.loc.gov/catdir/toc/ecip0611/2006009839.html",
  acknowledgement = ack-nhfb,
  subject =      "data encryption (computer science); telecommunication;
                 security measures; cryptography",
}

@Book{Mollin:2007:IC,
  author =       "Richard A. Mollin",
  title =        "An introduction to cryptography",
  publisher =    pub-CHAPMAN-HALL-CRC,
  address =      pub-CHAPMAN-HALL-CRC:adr,
  edition =      "Second",
  pages =        "x + 413",
  year =         "2007",
  ISBN =         "1-58488-618-8",
  ISBN-13 =      "978-1-58488-618-1",
  LCCN =         "QA268 .M65 2007",
  bibdate =      "Sun Dec 13 08:48:47 MST 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Discrete mathematics and its applications",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0664/2006049639-d.html",
  acknowledgement = ack-nhfb,
  subject =      "coding theory; textbooks",
}

@Article{Moore:2007:CQK,
  author =       "Samuel K. Moore",
  title =        "Commercializing Quantum Keys",
  journal =      j-IEEE-SPECTRUM,
  volume =       "44",
  number =       "3",
  pages =        "15--17",
  month =        mar,
  year =         "2007",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2007.323419",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "commercialization; Commercialization; cryptographic
                 key; Cryptography; data decoding; data encoding;
                 Decoding; Distributed computing; encryptor; esoteric
                 quantum properties; ID Quantique; MagiQ; off-the-shelf
                 distribution technology; Optical computing; optical
                 fiber transmission; Optical fibers; photon; photons;
                 Physics; polarization filters; Quantum computing;
                 quantum cryptography; quantum keys; Quantum mechanics;
                 quantum physics; SmartQuantum; Turning",
}

@Book{Mrayati:2007:TTC,
  editor =       "M. Mrayati and Y. Meer Alam and M. H. at-Tayyan",
  title =        "Two treatises on cryptanalysis: the two essays the
                 treatise of {ibn Wahab al-Ka tib}",
  volume =       "6",
  publisher =    "KFCRIS \& KACST",
  address =      "Riyadh, Saudi Arabia",
  pages =        "xii + 125",
  year =         "2007",
  ISBN =         "9960-893-58-8",
  ISBN-13 =      "978-9960-893-58-7",
  LCCN =         "????",
  bibdate =      "Thu May 12 06:53:13 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "{Arabic} origins of cryptology",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography / Arab countries / history",
  remark =       "Translated by Said M. Asaad. Revised by Mohammed
                 Ibrahim Al-Suwaiyel and Marwan Bawab and Ishaq ibn
                 Ibrahim Katib",
}

@Book{Mullen:2007:FFA,
  author =       "Gary L. Mullen and Carl Mummert",
  title =        "Finite Fields and Applications",
  volume =       "41",
  publisher =    pub-AMS,
  address =      pub-AMS:adr,
  pages =        "ix + 175",
  year =         "2007",
  ISBN =         "0-8218-4418-0 (paperback)",
  ISBN-13 =      "978-0-8218-4418-2 (paperback)",
  LCCN =         "QA247.3 .M85 2007",
  bibdate =      "Thu Mar 22 12:12:24 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Student mathematical library",
  acknowledgement = ack-nhfb,
  subject =      "Finite fields (Algebra); Coding theory; Cryptography",
}

@Article{Munilla:2007:HMF,
  author =       "J. Munilla and A. Peinado",
  title =        "{HB-MP}: a further step in the {HB}-family of
                 lightweight authentication protocols",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "51",
  number =       "9",
  pages =        "2262--2267",
  day =          "20",
  month =        jun,
  year =         "2007",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:18 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Nagy:2007:AQK,
  author =       "Naya Nagy and Selim G. Akl",
  title =        "Authenticated Quantum Key Distribution Without
                 Classical Communication",
  journal =      j-PARALLEL-PROCESS-LETT,
  volume =       "17",
  number =       "3",
  pages =        "323--335",
  month =        sep,
  year =         "2007",
  CODEN =        "PPLTEE",
  DOI =          "https://doi.org/10.1142/S0129626407003058",
  ISSN =         "0129-6264 (print), 1793-642X (electronic)",
  bibdate =      "Thu Sep 2 09:08:11 MDT 2010",
  bibsource =    "http://ejournals.wspc.com.sg/ppl/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Parallel Processing Letters",
  journal-URL =  "http://www.worldscientific.com/loi/ppl",
}

@Article{Nahum:2007:ESS,
  author =       "Erich M. Nahum and John Tracey and Charles P. Wright",
  title =        "Evaluating {SIP} server performance",
  journal =      j-SIGMETRICS,
  volume =       "35",
  number =       "1",
  pages =        "349--350",
  month =        jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1254882.1254924",
  ISSN =         "0163-5999 (print), 1557-9484 (electronic)",
  ISSN-L =       "0163-5999",
  bibdate =      "Fri Jun 27 09:42:48 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib",
  abstract =     "SIP is a protocol of growing importance, with uses for
                 VoIP, instant messaging, presence, and more. However,
                 its performance is not well-studied or understood. In
                 this extended abstract we overview our experimental
                 evaluation of common SIP server scenarios using
                 open-source SIP software such as OpenSER and SIP
                 pruning on Linux.\par

                 We show performance varies greatly depending on the
                 server scenario and how the protocol is used. Depending
                 on the configuration, through put can vary from
                 hundreds to thousands of operations per second. For
                 example, we observe that the choice of stateless vs.
                 stateful proxying, using TCP rather than UDP, or
                 including MD5-based authentication can each can affect
                 performance by a factor of 2-4. We also provide kernel
                 and application profiles using Oprofile that help
                 explain and illustrate processing costs. Finally, we
                 provide a simple fix for transaction-stateful proxying
                 that improves performance by a factor of 10. Full
                 details can be found in our accompanying technical
                 report.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGMETRICS Performance Evaluation Review",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J618",
  keywords =     "experimental evaluation; performance; server; SIP",
}

@Article{Nichols:2007:MFD,
  author =       "Elizabeth A. Nichols and Gunnar Peterson",
  title =        "A Metrics Framework to Drive Application Security
                 Improvement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "88--91",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.26",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Obimbo:2007:PAD,
  author =       "Charlie Obimbo and Behzad Salami",
  title =        "A parallel algorithm for determining the inverse of a
                 matrix for use in blockcipher encryption\slash
                 decryption",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "39",
  number =       "2",
  pages =        "113--130",
  month =        feb,
  year =         "2007",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-007-0107-7",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Wed Jul 9 17:32:30 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=39&issue=2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0920-8542&volume=39&issue=2&spage=113",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
  keywords =     "Block Ciphers; Cryptography; Inverse of a matrix;
                 Modular arithmetic; Parallel Algorithms; Row-echelon
                 reduction; Systems of linear equations",
}

@Article{Pan:2007:IBS,
  author =       "Jianping Pan and Lin Cai and Xuemin (Sherman) Shen and
                 Jon W. Mark",
  title =        "Identity-based secure collaboration in wireless ad hoc
                 networks",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "51",
  number =       "3",
  pages =        "853--865",
  day =          "21",
  month =        feb,
  year =         "2007",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:16 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Misc{Panditaratne:2007:TRN,
  author =       "Vidura Panditaratne",
  title =        "True random number generator goes online",
  howpublished = "World-Wide Web document",
  day =          "18",
  month =        jul,
  year =         "2007",
  bibdate =      "Thu Jul 26 14:17:39 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://pressesc.com/01184778212_qrbgs;
                 http://qrbg.irb.hr/; http://random.irb.hr/",
  remark =       "Briefly describes the Quantum Random Bit Generator
                 Service (QRBGS) at the Ruder Bo{\v{s}}kovic Institute
                 (RBI) in Zagreb, Croatia. See also
                 \cite{Stipcevic:2007:QRN}.",
}

@Article{Peeters:2007:CES,
  author =       "Johan Peeters and Paul Dyson",
  title =        "Cost-Effective Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "85--87",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.56",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Peng:2007:BZK,
  author =       "Kun Peng and Colin Boyd and Ed Dawson",
  title =        "Batch zero-knowledge proof and verification and its
                 applications",
  journal =      j-TISSEC,
  volume =       "10",
  number =       "2",
  pages =        "6:1--6:??",
  month =        may,
  year =         "2007",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1237500.1237502",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 12 17:52:05 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The batch verification technique of Bellare et al. is
                 extended to verification of several frequently employed
                 zero-knowledge proofs. The new techniques are correct,
                 sound, efficient, and can be widely applied. Specific
                 applications are discussed in detail, including batch
                 ZK proof and verification of validity of encryption (or
                 reencryption) and batch ZK proof and verification of
                 validity of decryption. Considerable efficiency
                 improvements are gained in these two applications
                 without compromising security. As a result, efficiency
                 of the practical cryptographic systems (such as mix
                 networks) based on these two applications is
                 dramatically improved.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "batch proof and verification of decryption; batch
                 proof and verification of reencryption; mix network",
}

@Article{Perez:2007:URR,
  author =       "O. P{\'e}rez and Y. Berviller and C. Tanougast and S.
                 Weber",
  title =        "The Use of Runtime Reconfiguration on {FPGA} Circuits
                 to Increase the Performance of the {AES} Algorithm
                 Implementation",
  journal =      j-J-UCS,
  volume =       "13",
  number =       "3",
  pages =        "349--362",
  month =        "????",
  year =         "2007",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Thu Jul 10 06:41:41 MDT 2008",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_13_3/the_use_of_runtime",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
  keywords =     "Advanced Encryption Standard",
}

@Article{Pfleeger:2007:GEI,
  author =       "Shari Lawrence Pfleeger and Roland L. Trope and
                 Charles C. Palmer",
  title =        "{Guest Editors}' Introduction: Managing Organizational
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "13--15",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.62",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Pfleeger:2007:IBC,
  author =       "Shari Lawrence Pfleeger and Martin Libicki and Michael
                 Webber",
  title =        "{I}'ll Buy That! Cybersecurity in the {Internet}
                 Marketplace",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "25--31",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.64",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Book{Pfleeger:2007:SC,
  author =       "Charles P. Pfleeger and Shari Lawrence Pfleeger",
  title =        "Security in computing",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  edition =      "Fourth",
  pages =        "xxiii + 845",
  year =         "2007",
  ISBN =         "0-13-239077-9 (hardcover)",
  ISBN-13 =      "978-0-13-239077-4 (hardcover)",
  LCCN =         "QA76.9.A25 P45 2006",
  bibdate =      "Thu Dec 14 17:59:14 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip0619/2006026798.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Data protection; Privacy, Right
                 of",
  xxnote =       "Check year: 2006 or 2007?? Catalogs disagree.",
}

@Article{Potter:2007:CWW,
  author =       "Bruce Potter",
  title =        "Converging wired and wireless authentication",
  journal =      j-NETWORK-SECURITY,
  volume =       "2007",
  number =       "10",
  pages =        "18--20",
  month =        oct,
  year =         "2007",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(07)70096-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:44 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348580770096X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Power:2007:SBB,
  author =       "E. Michael Power and Jonathan Gilhen and Roland L.
                 Trope",
  title =        "Setting Boundaries at Borders: Reconciling Laptop
                 Searches and Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "72--75",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.40",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Prattichizzo:2007:PIH,
  author =       "Domenico Prattichizzo and Mauro Barni and Gloria
                 Menegaz and Alessandro Formaglio and Hong Z. Tan and
                 Seungmoon Choi",
  title =        "Perceptual Issues in Haptic Digital Watermarking",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "14",
  number =       "3",
  pages =        "84--91",
  month =        jul # "\slash " # sep,
  year =         "2007",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/MMUL.2007.58",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Thu Jul 2 18:03:19 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Multimedia",
}

@Article{Preneel:2007:SRD,
  author =       "Bart Preneel",
  title =        "A survey of recent developments in cryptographic
                 algorithms for smart cards",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "51",
  number =       "9",
  pages =        "2223--2233",
  day =          "20",
  month =        jun,
  year =         "2007",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:18 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Pucella:2007:Ib,
  author =       "Riccardo Pucella",
  title =        "Introduction",
  journal =      j-SIGACT,
  volume =       "38",
  number =       "4",
  pages =        "64--64",
  month =        dec,
  year =         "2007",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1345189.1345204",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 18:30:29 MDT 2012",
  bibsource =    "DBLP;
                 http://dblp.uni-trier.de/db/journals/sigact/sigact38.html#Pucella07b;
                 http://portal.acm.org/;
                 https://www.math.utah.edu/pub/mirrors/ftp.ira.uka.de/bibliography/Misc/DBLP/2007.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  URL =          "http://doi.acm.org/10.1145/1345189.1345204",
  abstract =     "A short column this time around. Simon Kramer sent me
                 a synopsis of his Ph.D. thesis, defended earlier this
                 year at l'{\'E}cole Polytechnique F{\'e}d{\'e}rale de
                 Lausanne. He introduces a new logic for reasoning about
                 cryptographic protocol called CPL (Cryptographic
                 Protocol Logic). The result is an intriguing blend of
                 modal logic and process algebra, reminiscent of spatial
                 logics for process calculi, but extended with
                 knowledge, belief, and provability operators.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Ramaswamy:2007:HSP,
  author =       "Ramaswamy Ramaswamy and Tilman Wolf",
  title =        "High-speed prefix-preserving {IP} address
                 anonymization for passive measurement systems",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "15",
  number =       "1",
  pages =        "26--39",
  month =        feb,
  year =         "2007",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2006.890128",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Thu Jun 19 09:53:54 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Passive network measurement and packet header trace
                 collection are vital tools for network operation and
                 research. To protect a user's privacy, it is necessary
                 to anonymize header fields, particularly IP addresses.
                 To preserve the correlation between IP addresses,
                 prefix-preserving anonymization has been proposed. The
                 limitations of this approach for a high-performance
                 measurement system are the need for complex
                 cryptographic computations and potentially large
                 amounts of memory. We propose a new prefix-preserving
                 anonymization algorithm, top-hash subtree-replicated
                 anonymization (TSA), that features three novel
                 improvements: precomputation, replicated subtrees, and
                 top hashing. TSA makes anonymization practical to be
                 implemented on network processors or dedicated logic at
                 Gigabit rates. The performance of TSA is compared with
                 a conventional cryptography based prefix-preserving
                 anonymization scheme which utilizes caching. TSA
                 performs better as it requires no online cryptographic
                 computation and a small number of memory lookups per
                 packet. Our analytic comparison of the susceptibility
                 to attacks between conventional anonymization and our
                 approach shows that TSA performs better for small scale
                 attacks and comparably for medium scale attacks. The
                 processing cost for TSA is reduced by two orders of
                 magnitude and the memory requirements are a few
                 Megabytes. The ability to tune the memory requirements
                 and security level makes TSA ideal for a broad range of
                 network systems with different capabilities.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
  keywords =     "anonymization; network measurement; privacy",
}

@Article{Rich:2007:ATS,
  author =       "Donald Rich",
  title =        "Authentication in Transient Storage Device
                 Attachments",
  journal =      j-COMPUTER,
  volume =       "40",
  number =       "4",
  pages =        "102--104",
  month =        apr,
  year =         "2007",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2007.116",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Jul 4 17:13:34 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Rodwell:2007:NIBa,
  author =       "P. M. Rodwell and S. M. Furnell and P. L. Reynolds",
  title =        "A non-intrusive biometric authentication mechanism
                 utilising physiological characteristics of the human
                 head",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "468--478",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:07 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001095",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rodwell:2007:NIBb,
  author =       "P. M. Rodwell and S. M. Furnell and P. L. Reynolds",
  title =        "A non-intrusive biometric authentication mechanism
                 utilising physiological characteristics of the human
                 head",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "468--478",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001095",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rodwell:2007:NIBc,
  author =       "P. M. Rodwell and S. M. Furnell and P. L. Reynolds",
  title =        "A non-intrusive biometric authentication mechanism
                 utilising physiological characteristics of the human
                 head",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "468--478",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001095",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Roman:2007:SCP,
  author =       "Rodrigo Roman and Cristina Alcaraz and Javier Lopez",
  title =        "A survey of cryptographic primitives and
                 implementations for hardware-constrained sensor network
                 nodes",
  journal =      "Mobile Networks and Applications",
  volume =       "12",
  number =       "4",
  pages =        "231--244",
  month =        aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s11036-007-0024-2",
  ISSN =         "1383-469X",
  bibdate =      "Thu Apr 21 10:25:26 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "In a wireless sensor network environment, a sensor
                 node is extremely constrained in terms of hardware due
                 to factors such as maximizing lifetime and minimizing
                 physical size and overall cost. Nevertheless, these
                 nodes must be able to run cryptographic operations
                 based on primitives such as hash functions, symmetric
                 encryption and public key cryptography in order to
                 allow the creation of secure services. Our objective in
                 this paper is to survey how the existing research-based
                 and commercial-based sensor nodes are suitable for this
                 purpose, analyzing how the hardware can influence the
                 provision of the primitives and how software
                 implementations tackles the task of implementing
                 instances of those primitives. As a result, it will be
                 possible to evaluate the influence of provision of
                 security in the protocols and applications\slash
                 scenarios where sensors can be used.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography, hardware, sensor networks",
}

@Article{Rosenblum:2007:WAC,
  author =       "David Rosenblum",
  title =        "What Anyone Can Know: The Privacy Risks of Social
                 Networking Sites",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "40--49",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.75",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Rothe:2007:BRB,
  author =       "J{\"o}rg Rothe",
  title =        "Book Review: {{\booktitle{Complexity and Cryptography:
                 An Introduction}}, by John Talbot and Dominic Welsh,
                 Cambridge University Press, 2006, 292 pages}",
  journal =      j-SIGACT,
  volume =       "38",
  number =       "2",
  pages =        "16--20",
  month =        jun,
  year =         "2007",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1272729.1272735",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 18:30:29 MDT 2012",
  bibsource =    "DBLP;
                 http://dblp.uni-trier.de/db/journals/sigact/sigact38.html#Rothe07;
                 http://portal.acm.org/;
                 https://www.math.utah.edu/pub/mirrors/ftp.ira.uka.de/bibliography/Misc/DBLP/2007.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See \cite{Talbot:2006:CCI}.",
  URL =          "http://doi.acm.org/10.1145/1272729.1272735",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Sakr:2007:RCB,
  author =       "Ziad Sakr and Nicolas D. Georganas",
  title =        "Robust content-based {MPEG}-4 {XMT} scene structure
                 authentication and multimedia content location",
  journal =      j-TOMCCAP,
  volume =       "3",
  number =       "3",
  pages =        "18:1--18:??",
  month =        aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1236471.1236477",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Mon Jun 16 17:10:32 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "For the past decade, there have been numerous research
                 works focusing on the protection of digital images,
                 audio, video, 3D virtual scenes, and software data from
                 unauthorized use and distribution. With the emerging
                 technology of the MPEG-4 standard, MPEG-4 scenes that
                 may include images, video, audio, and 3D objects can
                 easily be built using the text-based MPEG-4 XMT
                 standard. XMT allows content authors to exchange their
                 content with other authors, tools, or service providers
                 and facilitates interoperability with MPEG-4, X3D, and
                 SMIL. In order for owners and designers to protect
                 and/or authenticate their work, some form of security
                 needs to be applied into the MPEG-4 XMT structure and
                 its media content. Unlike images or videos,
                 watermarking an XMT structure is not an easy task,
                 since the structure contains no noise components to
                 embed the watermark. This article is the first one
                 proposing a novel robust algorithm for the
                 authentication of a given MPEG-4 XMT structured scene
                 and the location of its multimedia content.",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
  keywords =     "MPEG-4; multimedia; polynomial; pseudorandom
                 sequences; steganography; VRML; watermarking; XML;
                 XMT",
}

@InProceedings{Saldamli:2007:SME,
  author =       "Gokay Saldamli and Cetin K. Koc",
  title =        "Spectral Modular Exponentiation",
  crossref =     "Kornerup:2007:PIS",
  pages =        "123--132",
  year =         "2007",
  DOI =          "https://doi.org/10.1109/ARITH.2007.34",
  bibdate =      "Tue Oct 9 16:32:41 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We describe a new method to perform the modular
                 exponentiation operation, i.e., the computation of $ c
                 = m e \bmod n $, where $c$, $m$, $e$ and $n$ are large
                 integers. The new method uses the discrete Fourier
                 transform over a finite ring, and relies on new
                 techniques to perform multiplication and reduction
                 operations. The method yields efficient and highly
                 parallel architectures for hardware realizations of
                 public-key cryptosystems requiring the modular
                 exponentiation as the core computation, such as the RSA
                 and Diffie--Hellman algorithms.",
  acknowledgement = ack-nhfb,
}

@Article{Salido:2007:EBE,
  author =       "Javier Salido and Loukas Lazos and Radha Poovendran",
  title =        "Energy and bandwidth-efficient key distribution in
                 wireless ad hoc networks: a cross-layer approach",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "15",
  number =       "6",
  pages =        "1527--1540",
  month =        dec,
  year =         "2007",
  CODEN =        "IEANEP",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Thu Jun 19 09:58:21 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "We address the problem of resource-efficient access
                 control for group communications in wireless ad hoc
                 networks. Restricting the access to group data can be
                 reduced to the problem of securely distributing
                 cryptographic keys to group members, known as the key
                 distribution problem (KDP). We examine the KDP under
                 four metrics: (a) member key storage, (b) group
                 controller (GC) transmissions, (c) multicast group (MG)
                 update messages, and (d) average update energy. For
                 each metric, we formulate an optimization problem and
                 show that the KDP has unique solutions for metrics (a)
                 and (b), while is NP-complete for (c) and (d). We
                 propose a cross-layer heuristic algorithm called VP3
                 that bounds member key storage, and GC transmissions,
                 while significantly reducing the energy and bandwidth
                 consumption of the network. We define the notion of
                 path divergence as a measure of bandwidth efficiency of
                 multicasting, and establish an analytical worst-case
                 bound for it. Finally, we propose On-line VP3, which
                 dynamically updates the key assignment structure
                 according to the dynamics of the communication group in
                 a resource-efficient way.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
  keywords =     "Ad hoc; key distribution; key management; multicast;
                 secure group communication; security",
}

@Book{Salomon:2007:DCC,
  author =       "David Salomon",
  title =        "Data Compression: The Complete Reference",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xxv + 1092",
  year =         "2007",
  ISBN =         "1-84628-602-6",
  ISBN-13 =      "978-1-84628-602-5",
  LCCN =         "????",
  bibdate =      "Tue Jan 23 14:16:11 MST 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  note =         "With contributions by Giovanni Motta and David
                 Bryant.",
  acknowledgement = ack-nhfb,
}

@Article{Sasse:2007:REB,
  author =       "M. Angela Sasse",
  title =        "Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: a
                 User Experience of Biometric Airport Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "78--81",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.69",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Saxena:2007:TCP,
  author =       "Nitesh Saxena and Gene Tsudik and Jeong Hyun Yi",
  title =        "Threshold cryptography in {P2P} and {MANETs}: {The}
                 case of access control",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "51",
  number =       "12",
  pages =        "3632--3649",
  day =          "22",
  month =        aug,
  year =         "2007",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Scharwaechter:2007:AAE,
  author =       "Hanno Scharwaechter and David Kammler and Andreas
                 Wieferink and Manuel Hohenauer and Kingshuk Karuri and
                 Jianjiang Ceng and Rainer Leupers and Gerd Ascheid and
                 Heinrich Meyr",
  title =        "{ASIP} architecture exploration for efficient {IPSec}
                 encryption: a case study",
  journal =      j-TECS,
  volume =       "6",
  number =       "2",
  pages =        "12:1--12:??",
  month =        may,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1234675.1234679",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Jun 12 15:21:17 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Application-Specific Instruction-Set Processors
                 (ASIPs) are becoming increasingly popular in the world
                 of customized, application-driven System-on-Chip (SoC)
                 designs. Efficient ASIP design requires an iterative
                 architecture exploration loop---gradual refinement of
                 the processor architecture starting from an initial
                 template. To accomplish this task, design automation
                 tools are used to detect bottlenecks in embedded
                 applications, to implement application-specific
                 processor instructions, and to automatically generate
                 the required software tools (such as instruction-set
                 simulator, C-compiler, assembler, and profiler), as
                 well as to synthesize the hardware. This paper
                 describes an architecture exploration loop for an ASIP
                 coprocessor that implements common encryption
                 functionality used in symmetric block cipher algorithms
                 for internet protocol security (IPSec). The coprocessor
                 is accessed via shared memory and, as a consequence,
                 our approach is easily adaptable to arbitrary main
                 processor architectures. This paper presents the
                 extended version of our case study that has been
                 already published on the SCOPES conference in 2004. In
                 both papers, a MIPS architecture is used as the main
                 processor and Blowfish as encryption algorithm.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J840",
  keywords =     "ADL; ASIP; computer-aided design; IPSec",
}

@Article{Schlager:2007:EAA,
  author =       "Christian Schl{\"a}ger and Thomas Nowey",
  title =        "On the effects of authentication and authorisation
                 infrastructures on e-commerce activities",
  journal =      j-INT-J-COMPUT-SYST-SCI-ENG,
  volume =       "22",
  number =       "5",
  pages =        "??--??",
  month =        sep,
  year =         "2007",
  CODEN =        "CSSEEI",
  ISSN =         "0267-6192",
  bibdate =      "Tue Dec 03 12:36:12 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsystscieng.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Systems Science and
                 Engineering",
  remark =       "Special issue: Privacy Data Management",
}

@Article{Schneier:2007:NCS,
  author =       "Bruce Schneier",
  title =        "Nonsecurity Considerations in Security Decisions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "88",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.68",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Book{Sebag-Montefiore:2007:EBC,
  author =       "Hugh Sebag-Montefiore",
  title =        "{Enigma}: the battle for the code",
  publisher =    pub-BN,
  address =      pub-BN:adr,
  pages =        "x + 422 + 16",
  year =         "2007",
  ISBN =         "0-7607-9118-X",
  ISBN-13 =      "978-0-7607-9118-9",
  LCCN =         "D810.C88 S43 2007",
  bibdate =      "Mon Dec 19 12:28:07 MST 2016",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Winston Churchill called the cracking of the German
                 Enigma code 'the secret weapon that won the war.' Now,
                 for the first time, noted British journalist Hugh
                 Sebag-Montefiore reveals the complete story of the
                 breaking of the code by the Allies --- a breakthrough
                 that played a crucial role in the outcome of World War
                 II. This fascinating account recounts the
                 never-before-told, hair-raising stories of the heroic
                 British and American sailors, spies, and secret agents
                 who faced death in order to capture vital codebooks
                 form sinking ships and snatch them from under the noses
                 of Nazi officials. The author also relates new details
                 about the genesis of the code, little-known facts about
                 how the Poles first cracked the Luftwaffe's version of
                 the code (and then passed it along to the British), and
                 the feverish activities at Bletchley Park, where the
                 day-to-day grind to decode Enigma went on.",
  acknowledgement = ack-nhfb,
  remark =       "Reprint. Originally published: New York: John Wiley,
                 2000.",
  subject =      "Turing, Alan Mathison; Hinsley, F. H. (Francis Harry);
                 Schmidt, Hans Thilo; Enigma cipher system; History;
                 World War, 1939--1945; Cryptography; Electronic
                 intelligence; Great Britain; Secret service; France;
                 Naval operations, German; Machine ciphers;
                 Cryptography; Electronic intelligence; Enigma cipher
                 system; Machine ciphers; Military operations, Naval;
                 German; Secret service; Bletchley Park (Milton Keynes,
                 England); England; Milton Keynes; Bletchley Park",
  subject-dates = "1912--1954; 1918; 1888--1943; 1918; 1888--1943;
                 1912--1954",
  tableofcontents = "The betrayal: Belgium and Germany, 1931 \\
                 The leak: Poland, Belgium and Germany, 1929--38 \\
                 An inspired guess: Poland, 1932 \\
                 A terrible mistake: Poland, 1933--9 \\
                 Flight: Germany, Poland, France and England, 1939--40
                 \\
                 The first capture: Scotland, 1940 \\
                 Mission Impossible: Norway and Bletchley Park, 1940 \\
                 Keeping the Enigma secret: France and Bletchley Park,
                 May \\
                 September 1940 \\
                 Deadlock: Bletchley Park, August \\
                 October, 1940 \\
                 The Italian affair: Bletchley Park and the
                 Mediterranean, March 1941 \\
                 The end of the beginning: Norway, March 1941 \\
                 Breakthrough: North of Iceland, May 1941 \\
                 Operation Primrose: the Atlantic, May 1941 \\
                 The knock-out blow: North of Iceland, June 1941 \\
                 Suspicion: Bletchley Park, the Atlantic and Berlin, May
                 \\
                 October 1941 \\
                 A two-edged sword: the Atlantic and the Cape Verde
                 Islands, September 1941 \\
                 Living dangerously: the South Atlantic and Norway,
                 November 1941 \\
                 March 1942 \\
                 The hunt for the Bigram tables: Bletchley Park and
                 Norway, December 1941 \\
                 Black out: the Barents Sea, Bletchley Park, and the
                 admiralty, February \\
                 July 1942 \\
                 Breaking the deadlock: the Mediterranean and Bletchley
                 Park, October \\
                 December 1942 \\
                 The turning point: South France, the Mediterranean and
                 the Atlantic, November 1942 \\
                 September 1943 \\
                 Trapped: South France, November 1942 \\
                 March 1943 \\
                 The arrest: Berlin, March \\
                 September 1943 \\
                 Sinking the Scharnhorst: the Barents Sea, December 1943
                 \\
                 Operation covered: Paris, the Indian Ocean, and the
                 Atlantic, August 1943 \\
                 March 1944 \\
                 The last Hiccough: Germany, France, and the South
                 Atlantic, March \\
                 June 1944 \\
                 Epilogue: Where did they go?",
}

@Article{Sebe:2007:SMO,
  author =       "Francesc Seb{\'e} and Alexandre Viejo and Josep
                 Domingo-Ferrer",
  title =        "Secure many-to-one symbol transmission for
                 implementation on smart cards",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "51",
  number =       "9",
  pages =        "2299--2307",
  day =          "20",
  month =        jun,
  year =         "2007",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:18 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@InProceedings{Shaltiel:2007:LEU,
  author =       "Ronen Shaltiel and Christopher Umans",
  title =        "Low-end uniform hardness vs. randomness tradeoffs for
                 {AM}",
  crossref =     "ACM:2007:SPA",
  pages =        "430--439",
  year =         "2007",
  DOI =          "https://doi.org/10.1145/1250790.1250854",
  bibdate =      "Fri Jun 20 18:28:53 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "In 1998, Impagliazzo and Wigderson [18] proved a
                 hardness vs. randomness tradeoff for BPP in the uniform
                 setting,which was subsequently extended to give optimal
                 tradeoffs for the full range of possible hardness
                 assumptions by Trevisan and Vadhan [29] (in a slightly
                 weaker setting). In 2003, Gutfreund,Shaltiel and
                 Ta-Shma [11] proved a uniform hardness vs. randomness
                 tradeoff for AM, but that result only worked on the
                 `high-end' of possible hardness assumptions.\par

                 In this work, we give uniform hardness vs. randomness
                 tradeoffs for AM that are near-optimal for the full
                 range of possible hardness assumptions. Following [11],
                 we do this by constructing a hitting-set-generator
                 (HSG) for AM with `resilient reconstruction.' Our
                 construction is a recursive variant of the
                 Miltersen-Vinodchandran HSG [24], the only known HSG
                 construction with this required property. The main new
                 idea is to have the reconstruction procedure operate
                 implicitly and locally on superpolynomially large
                 objects, using tools from PCPs(low-degree testing,
                 self-correction) together with a novel use of
                 extractors that are built from Reed--Muller codes [28,
                 26] for a sort of locally-computable error-reduction.
                 As a consequence we obtain gap theorems for AM (and AM
                 $ \cap $ coAM) that state, roughly, that either AM (or
                 AM $ \cap $ coAM)protocols running in time t(n) can
                 simulate all of EXP('Arthur--Merlin games are
                 powerful'), or else all of AM (or AM $ \cap $ coAM) can
                 be simulated in nondeterministic time s(n)
                 ('Arthur--Merlin games can be derandomized'), for a
                 near-optimal relationship between t(n) and s(n). As in
                 GST, the case of AM $ \cap $ coAM yields a particularly
                 clean theorem that is of special interest due to the
                 wide array of cryptographic and other problems that lie
                 in this class.",
  acknowledgement = ack-nhfb,
  keywords =     "Arthur--Merlin games; derandomization; hardness vs.
                 randomness tradeoff; hitting-set generator",
}

@Article{Shehab:2007:WSD,
  author =       "Mohamed Shehab and Kamal Bhattacharya and Arif
                 Ghafoor",
  title =        "{Web} services discovery in secure collaboration
                 environments",
  journal =      j-TOIT,
  volume =       "8",
  number =       "1",
  pages =        "5:1--5:??",
  month =        nov,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1294148.1294153",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jun 16 10:58:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Multidomain application environments where distributed
                 domains interoperate with each other is a reality in
                 Web-services-based infrastructures. Collaboration
                 enables domains to effectively share resources;
                 however, it introduces several security and privacy
                 challenges. In this article, we use the current web
                 service standards such as SOAP and UDDI to enable
                 secure interoperability in a service-oriented
                 mediator-free environment. We propose a multihop SOAP
                 messaging protocol that enables domains to discover
                 secure access paths to access roles in different
                 domains. Then we propose a path authentication
                 mechanism based on the encapsulation of SOAP messages
                 and the SOAP-DISG standard. Furthermore, we provide a
                 service discovery protocol that enables domains to
                 discover service descriptions stored in private UDDI
                 registries.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "encapsulated SOAP; private UDDI registries; protocols;
                 secure access paths; secure collaboration; services",
}

@Article{Shimizu:2007:CBE,
  author =       "K. Shimizu and H. P. Hofstee and J. S. Liberty",
  title =        "{Cell Broadband Engine} processor vault security
                 architecture",
  journal =      j-IBM-JRD,
  volume =       "51",
  number =       "5",
  pages =        "521--??",
  month =        sep,
  year =         "2007",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  ISSN-L =       "0018-8646",
  bibdate =      "Wed Oct 31 11:53:46 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.research.ibm.com/journal/",
  URL =          "http://www.research.ibm.com/journal/rd/515/shimizu.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IBM Journal of Research and Development",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
}

@Misc{Shumow:2007:PBD,
  author =       "Dan Shumow and Niels Ferguson",
  title =        "On the Possibility of a Back Door in the {NIST
                 SP800-90 Dual EC Prng}",
  howpublished = "Web slide show.",
  day =          "21",
  month =        aug,
  year =         "2007",
  bibdate =      "Fri Aug 15 11:45:01 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://rump2007.cr.yp.to/15-shumow.pdf",
  acknowledgement = ack-nhfb,
  remark =       "The authors demonstrate key recovery from encrypted
                 streams produced by the method in the title.",
}

@Article{Slind:2007:PPS,
  author =       "Konrad Slind and Scott Owens and Juliano Iyoda and
                 Mike Gordon",
  title =        "Proof producing synthesis of arithmetic and
                 cryptographic hardware",
  journal =      j-FORM-ASP-COMPUT,
  volume =       "19",
  number =       "3",
  pages =        "343--362",
  month =        aug,
  year =         "2007",
  CODEN =        "FACME5",
  DOI =          "https://doi.org/10.1007/s00165-007-0028-5",
  ISSN =         "0934-5043 (print), 1433-299X (electronic)",
  ISSN-L =       "0934-5043",
  bibdate =      "Tue Mar 17 20:58:24 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/formaspcomput.bib",
  URL =          "http://link.springer.com/article/10.1007/s00165-007-0028-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Formal Aspects of Computing",
  journal-URL =  "http://link.springer.com/journal/165",
}

@TechReport{Song:2007:TAK,
  author =       "Dawn Xiaodong Song and David Wagner and Xuqing Tian",
  title =        "Timing Analysis of Keystrokes and Timing Attacks on
                 {SSH}",
  type =         "Report",
  institution =  "University of California, Berkeley",
  address =      "Berkeley, CA, USA",
  day =          "15",
  month =        jul,
  year =         "2007",
  bibdate =      "Fri Sep 04 13:13:21 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.cs.berkeley.edu/~dawnsong/papers/ssh-timing.pdf",
  abstract =     "SSH is designed to provide a secure channel between
                 two hosts. Despite the encryption and authentication
                 mechanisms it uses, SSH has two weakness: First, the
                 transmitted packets are padded only to an eight-byte
                 boundary (if a block cipher is in use), which reveals
                 the approximate size of the original data. Second, in
                 interactive mode, every individual keystroke that a
                 user types is sent to the remote machine in a separate
                 IP packet immediately after the key is pressed, which
                 leaks the interkeystroke timing information of users
                 typing. In this paper, we show how these seemingly
                 minor weaknesses result in serious security
                 risks.\par

                 First we show that even very simple statistical
                 techniques suffice to reveal sensitive information such
                 as the length of users passwords or even root
                 passwords. More importantly, we further show that by
                 using more advanced statistical techniques on timing
                 information collected from the network, the
                 eavesdropper can learn significant information about
                 what users type in SSH sessions. In particular, we
                 perform a statistical study of users typing patterns
                 and show that these patterns reveal information about
                 the keys typed. By developing a Hidden Markov Model and
                 our key sequence prediction algorithm, we can predict
                 key sequences from the interkeystroke timings. We
                 further develop an attacker system, Herbivore , which
                 tries to learn users passwords by monitoring SSH
                 sessions. By collecting timing information on the
                 network, Herbivore can speed up exhaustive search for
                 passwords by a factor of 50. We also propose some
                 countermeasures.\par

                 In general our results apply not only to SSH, but also
                 to a general class of protocols for encrypting
                 interactive traffic. We show that timing leaks open a
                 new set of security risks, and hence caution must be
                 taken when designing this type of protocol.",
  acknowledgement = ack-nhfb,
}

@Book{Stallings:2007:CSP,
  author =       "William Stallings and Lawrie Brown",
  title =        "Computer Security: Principles and Practice",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  pages =        "????",
  year =         "2007",
  ISBN =         "0-13-600424-5",
  ISBN-13 =      "978-0-13-600424-0",
  LCCN =         "????",
  bibdate =      "Thu Jul 26 12:35:05 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
}

@Book{Stamp:2007:ACB,
  author =       "Mark Stamp and Richard M. Low",
  title =        "Applied cryptanalysis: breaking ciphers in the real
                 world",
  publisher =    pub-WILEY-INTERSCIENCE,
  address =      pub-WILEY-INTERSCIENCE:adr,
  pages =        "xix + 401",
  year =         "2007",
  ISBN =         "0-470-11486-X",
  ISBN-13 =      "978-0-470-11486-5",
  LCCN =         "QA76.9.A25 S687 2007",
  bibdate =      "Sat Jun 13 08:32:27 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.bibsys.no:2100/BIBSYS",
  acknowledgement = ack-nhfb,
}

@Article{Stipcevic:2007:QRN,
  author =       "M. Stip{\c{c}}evi{\'c} and B. Medved Rogina",
  title =        "Quantum random number generator",
  journal =      j-REV-SCI-INSTRUM,
  volume =       "78",
  number =       "045104",
  pages =        "9",
  year =         "2007",
  CODEN =        "RSINAK",
  ISSN =         "1089-7623, 0034-6748",
  ISSN-L =       "0034-6748",
  bibdate =      "Thu Jul 26 14:18:06 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "arXiv:quant-ph/0609043v2.",
  URL =          "http://qrbg.irb.hr/0609043v2.pdf",
  abstract =     "We report upon a novel realization of a fast
                 nondeterministic random number generator whose
                 randomness relies on intrinsic randomness of the
                 quantum physical processes of photonic emission in
                 semiconductors and subsequent detection by the
                 photoelectric effect. Timing information of detected
                 photons is used to generate binary random digits-bits.
                 The bit extraction method based on the restartable
                 clock method theoretically eliminates both bias and
                 autocorrelation while reaching efficiency of almost 0.5
                 bits per random event. A prototype has been built and
                 statistically tested.",
  fjournal =     "Review of scientific instruments",
  journal-URL =  "http://rsi.aip.org/",
}

@Article{Sung:2007:CIB,
  author =       "Jaechul Sung and Deukjo Hong and Seokhie Hong",
  title =        "Cryptanalysis of an involutional block cipher using
                 cellular automata",
  journal =      j-INFO-PROC-LETT,
  volume =       "104",
  number =       "5",
  pages =        "183--185",
  day =          "30",
  month =        nov,
  year =         "2007",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 15:52:52 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Book{Sutton:2007:FBF,
  author =       "Michael Sutton and Adam Greene and Pedram Amini",
  title =        "Fuzzing: brute force vulnerability discovery",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xxvii + 543",
  year =         "2007",
  ISBN =         "0-321-44611-9 (paperback)",
  ISBN-13 =      "978-0-321-44611-4 (paperback)",
  LCCN =         "QA76.9.A25 S89 2007",
  bibdate =      "Mon Jun 30 08:54:19 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip0713/2007011463.html",
  acknowledgement = ack-nhfb,
  subject =      "computer security; computer networks; security
                 measures; computer software; development",
}

@Article{Tague:2007:CSA,
  author =       "Patrick Tague and Radha Poovendran",
  title =        "A canonical seed assignment model for key
                 predistribution in wireless sensor networks",
  journal =      j-TOSN,
  volume =       "3",
  number =       "4",
  pages =        "19:1--19:??",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1281492.1281494",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Mon Jun 16 17:50:34 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosn.bib",
  abstract =     "A promising solution for trust establishment in
                 wireless sensor networks is the assignment of
                 cryptographic seeds (keys, secrets, etc.) to sensor
                 nodes prior to network deployment, known as key
                 predistribution. In this article, we propose a
                 canonical seed assignment model for key predistribution
                 characterizing seed assignment in terms of the
                 probability distribution describing the number of nodes
                 receiving each seed and the algorithm for seed
                 assignment. In addition, we present a sampling
                 framework for seed assignment algorithms in the
                 canonical model. We propose a probabilistic
                 $k$-connectivity model for randomly deployed secure
                 networks using spatial statistics and geometric random
                 graph theory. We analyze key predistribution schemes in
                 the canonical model in terms of network connectivity
                 and resilience to node capture. The analytical results
                 can be used to determine the average or worst-case
                 connectivity or resilience to node capture for a key
                 predistribution scheme. Furthermore, we demonstrate the
                 design of new key predistribution schemes and the
                 inclusion of existing schemes in the canonical model.
                 Finally, we present a general approach to analyze the
                 addition of nodes to an existing secure network and
                 derive results for a well-known scheme.",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
  keywords =     "key establishment; key predistribution; network
                 models; sensor networks",
}

@InProceedings{Tang:2007:MMU,
  author =       "Ping Tak Peter Tang",
  title =        "Modular Multiplication using Redundant Digit
                 Division",
  crossref =     "Kornerup:2007:PIS",
  pages =        "217--224",
  year =         "2007",
  DOI =          "https://doi.org/10.1109/ARITH.2007.22",
  bibdate =      "Tue Oct 9 17:16:03 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Most implementations of the modular exponentiation, $
                 M E \bmod N $, computation in cryptographic algorithms
                 employ Montgomery multiplication, $ (A B R - 1) \bmod N
                 $, instead of modular multiplication, $ A B \bmod N $,
                 even the former requires some transformational
                 overheads. This is so because a state-of-the-art
                 Montgomery multiplication implementation has a
                 performance advantage over direct modular
                 multiplication based on the Barrett algorithm that more
                 than compensates for the overhead. In this paper, we
                 present a direct modular multiplication method that is
                 comparable in speed to Montgomery multiplication. One
                 consequence is that when the exponent in small, direct
                 computation (which does not incur the transformational
                 overhead) using the modular multiplication algorithm
                 presented here results in practical performance gain.
                 For the exponent 17, for instance, which requires five
                 modular multiplication, a saving of up to 40\% can be
                 achieved.",
  acknowledgement = ack-nhfb,
}

@Article{Tang:2007:SGK,
  author =       "Qiang Tang",
  title =        "On The Security of a Group Key Agreement Protocol",
  journal =      j-COMP-J,
  volume =       "50",
  number =       "5",
  pages =        "589--590",
  month =        sep,
  year =         "2007",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxm024",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Apr 28 14:33:33 MDT 2010",
  bibsource =    "http://comjnl.oxfordjournals.org/content/vol50/issue5/index.dtl;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://comjnl.oxfordjournals.org/cgi/content/abstract/50/5/589;
                 http://comjnl.oxfordjournals.org/cgi/content/full/50/5/589;
                 http://comjnl.oxfordjournals.org/cgi/reprint/50/5/589",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Theoharidou:2007:CBK,
  author =       "Marianthi Theoharidou and Dimitris Gritazalis",
  title =        "Common Body of Knowledge for Information Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "64--67",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.32",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Thomas:2007:HQU,
  author =       "David B. Thomas and Wayne Luk",
  title =        "High Quality Uniform Random Number Generation Using
                 {LUT} Optimised State-transition Matrices",
  journal =      j-J-VLSI-SIGNAL-PROC,
  volume =       "47",
  number =       "1",
  pages =        "77--92",
  year =         "2007",
  CODEN =        "JVSPED",
  DOI =          "https://doi.org/10.1007/s11265-006-0014-9",
  ISSN =         "0922-5773",
  ISSN-L =       "0922-5773",
  bibdate =      "Mon Jun 27 22:53:35 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  note =         "From the issue entitled ``Special Issue: Field
                 Programmable Technology. Guest Editors: Gordon Brebner,
                 Samarjit Chakraborty, and Weng-Fai Wong''.",
  abstract =     "This paper presents a family of uniform random number
                 generators designed for efficient implementation in
                 Lookup table (LUT) based FPGA architectures. A
                 generator with a period of $ 2^k - 1 $ can be
                 implemented using $k$ flip-flops and $k$ LUTs, and
                 provides $k$ random output bits each cycle. Each
                 generator is based on a binary linear recurrence, with
                 a state-transition matrix designed to make best use of
                 all available LUT inputs in a given FPGA architecture,
                 and to ensure that the critical path between all
                 registers is a single LUT. This class of generator
                 provides a higher sample rate per area than LFSR and
                 Combined Tausworthe generators, and operates at similar
                 or higher clock-rates. The statistical quality of the
                 generators increases with $k$, and can be used to pass
                 all common empirical tests such as Diehard, Crush and
                 the NIST cryptographic test suite. Theoretical
                 properties such as global equidistribution can also be
                 calculated, and best and average case statistics shown.
                 Due to the large number of random bits generated per
                 cycle these generators can be used as a basis for
                 generators with even higher statistical quality, and an
                 example involving combination through addition is
                 demonstrated.",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of VLSI Signal Processing",
  keywords =     "FPGA; Simulation; Uniform Random Numbers",
}

@Article{Torres:2007:ANS,
  author =       "Joaquin Torres and Antonio Izquierdo and Jose Maria
                 Sierra",
  title =        "Advances in network smart cards authentication",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "51",
  number =       "9",
  pages =        "2249--2261",
  day =          "20",
  month =        jun,
  year =         "2007",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:18 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Trope:2007:CSD,
  author =       "Roland L. Trope and E. Michael Power and Vincent I.
                 Polley and Bradford C. Morley",
  title =        "A Coherent Strategy for Data Security through Data
                 Governance",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "32--39",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.51",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Tsai:2007:TTA,
  author =       "Yuh-Ren Tsai and Shiuh-Jeng Wang",
  title =        "Two-tier authentication for cluster and individual
                 sets in mobile ad hoc networks",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "51",
  number =       "3",
  pages =        "883--900",
  day =          "21",
  month =        feb,
  year =         "2007",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:16 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Tsang:2007:WCT,
  author =       "Patrick P. Tsang",
  title =        "When Cryptographers Turn Lead into Gold",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "76--79",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.49",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Tseng:2007:SAG,
  author =       "Yuh-Min Tseng",
  title =        "A secure authenticated group key agreement protocol
                 for resource-limited mobile devices",
  journal =      j-COMP-J,
  volume =       "50",
  number =       "1",
  pages =        "41--52",
  month =        jan,
  year =         "2007",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxl043",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Apr 28 14:33:32 MDT 2010",
  bibsource =    "http://comjnl.oxfordjournals.org/content/vol50/issue1/index.dtl;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://comjnl.oxfordjournals.org/cgi/content/abstract/50/1/41;
                 http://comjnl.oxfordjournals.org/cgi/content/full/50/1/41;
                 http://comjnl.oxfordjournals.org/cgi/reprint/50/1/41",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{vanOorschot:2007:IRS,
  author =       "P. C. van Oorschot and Tao Wan and Evangelos
                 Kranakis",
  title =        "On interdomain routing security and pretty secure {BGP
                 (psBGP)}",
  journal =      j-TISSEC,
  volume =       "10",
  number =       "3",
  pages =        "11:1--11:??",
  month =        jul,
  year =         "2007",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1266977.1266980",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 12 17:52:14 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "It is well known that the Border Gateway Protocol
                 (BGP), the IETF standard interdomain routing protocol,
                 is vulnerable to a variety of attacks, and that a
                 single misconfigured or malicious BGP speaker could
                 result in large-scale service disruption. In this
                 paper, we present Pretty Secure BGP (psBGP) ---a
                 proposal for securing BGP, including an architectural
                 overview, design details for significant aspects, and
                 preliminary security and operational analysis. psBGP
                 differs from other security proposals (e. g. , S-BGP
                 and soBGP) in that it makes use of a single-level PKI
                 for AS number authentication, a decentralized trust
                 model for verifying the propriety of IP prefix origin,
                 and a rating-based stepwise approach for AS_PATH
                 (integrity) verification. psBGP trades off the strong
                 security guarantees of S-BGP for presumed-simpler
                 operation, e. g. , using a PKI with a simple structure,
                 with a small number of certificate types, and of
                 manageable size. psBGP is designed to successfully
                 defend against various (nonmalicious and malicious)
                 threats from uncoordinated BGP speakers, and to be
                 incrementally deployed with incremental benefits.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "authentication; BGP; certificates; interdomain
                 routing; public-key infrastructure; secure routing
                 protocols; trust",
}

@InProceedings{Vaudenay:2007:POK,
  author =       "Serge Vaudenay and Martin Vuagnoux",
  editor =       "Carlisle Adams and Ali Miri and Michael Wiener",
  booktitle =    "{Selected areas in cryptography: 14th international
                 workshop, SAC 2007, Ottawa, Canada, August 16--17,
                 2007, revised selected papers}",
  title =        "Passive-Only Key Recovery Attacks on {RC4}",
  volume =       "4876",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "344--359",
  year =         "2007",
  ISBN =         "3-540-77359-2 (softcover)",
  ISBN-13 =      "978-3-540-77359-7 (softcover)",
  LCCN =         "QA76.9 2007",
  bibdate =      "Mon Jan 23 06:51:58 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://www.loc.gov/catdir/enhancements/fy0826/2007941250-d.html",
  abstract =     "We present several weaknesses in the key scheduling
                 algorithm of RC4 when the secret key contains an
                 initialization vector --- a cryptographic scheme
                 typically used by the WEP and WPA protocols to protect
                 IEEE 802.11 wireless communications. First, we show how
                 the previously discovered key recovery attacks can be
                 improved by reducing the dependency between the secret
                 key bytes. Then, we describe two new weaknesses related
                 to the modulo operation of the key scheduling
                 algorithm. Finally, we describe a passive-only attack
                 able to significantly improve the key recovery process
                 on WEP with a data complexity of $ 2^{15} $
                 eavesdropped packets.",
  acknowledgement = ack-nhfb,
  remark =       "The Fedora Linux {\tt airsnort} package implements an
                 attack on WEP. See the remark in entry
                 \cite{Fluhrer:2001:WKS}.",
}

@InProceedings{Vural:2007:IND,
  author =       "Cabir Vural and Serap Kazan",
  title =        "Image Normalization and Discrete Wavelet Transform
                 Based Robust Digital Image Watermarking",
  crossref =     "Simos:2007:CMS",
  volume =       "2B",
  pages =        "1404--1407",
  year =         "2007",
  bibdate =      "Thu Feb 21 14:34:40 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://proceedings.aip.org/getpdf/servlet/GetPDFServlet?filetype=pdf&amp;
                 id=APCPCS000963000002001404000001&amp; idtype=cvips",
  acknowledgement = ack-nhfb,
}

@Article{Wang:2007:NCD,
  author =       "Zhenghong Wang and Ruby B. Lee",
  title =        "New cache designs for thwarting software cache-based
                 side channel attacks",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "35",
  number =       "2",
  pages =        "494--505",
  month =        may,
  year =         "2007",
  CODEN =        "CANED2",
  DOI =          "https://doi.org/10.1145/1250662.1250723",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Tue Jun 17 11:48:43 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Software cache-based side channel attacks are a
                 serious new class of threats for computers. Unlike
                 physical side channel attacks that mostly target
                 embedded cryptographic devices, cache-based side
                 channel attacks can also undermine general purpose
                 systems. The attacks are easy to perform, effective on
                 most platforms, and do not require special instruments
                 or excessive computation power. In recently
                 demonstrated attacks on software implementations of
                 ciphers like AES and RSA, the full key can be recovered
                 by an unprivileged user program performing simple
                 timing measurements based on cache misses.\par

                 We first analyze these attacks, identifying cache
                 interference as the root cause of these attacks. We
                 identify two basic mitigation approaches: the
                 partition-based approach eliminates cache interference
                 whereas the randomization-based approach randomizes
                 cache interference so that zero information can be
                 inferred. We present new security-aware cache designs,
                 the Partition-Locked cache (PLcache) and Random
                 Permutation cache (RPcache), analyze and prove their
                 security, and evaluate their performance. Our results
                 show that our new cache designs with built-in security
                 can defend against cache-based side channel attacks in
                 general-rather than only specific attacks on a given
                 cryptographic algorithm-with very little performance
                 degradation and hardware cost.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
  keywords =     "cache; computer architecture; processor; security;
                 side channel; timing attacks",
}

@Article{Wang:2007:VBW,
  author =       "Feng-Hsing Wang and Lakhmi C. Jain and Jeng-Shyang
                 Pan",
  title =        "{VQ}-based watermarking scheme with genetic codebook
                 partition",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "30",
  number =       "1",
  pages =        "4--23",
  month =        jan,
  year =         "2007",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:43:07 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S108480450500038X",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Williams:2007:FTA,
  author =       "D. Williams and H. Lutfiyya",
  title =        "Fault-Tolerant Authentication Services",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "29",
  number =       "2",
  pages =        "107--114",
  year =         "2007",
  CODEN =        "IJCAFW",
  DOI =          "https://doi.org/10.1080/1206212X.2007.11441838",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:23:55 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.1080/1206212X.2007.11441838",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "11 Jul 2015",
}

@Article{Woody:2007:COS,
  author =       "Carol Woody and Christopher Alberts",
  title =        "Considering Operational Security Risk during System
                 Development",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "30--35",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.3",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Xie:2007:ISP,
  author =       "Tao Xie and Xiao Qin",
  title =        "Improving security for periodic tasks in embedded
                 systems through scheduling",
  journal =      j-TECS,
  volume =       "6",
  number =       "3",
  pages =        "20:1--20:??",
  month =        jul,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1275986.1275992",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Jun 12 15:49:41 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "While many scheduling algorithms for periodic tasks
                 ignore security requirements posed by sensitive
                 applications and are, consequently, unable to perform
                 properly in embedded systems with security constraints,
                 in this paper, we present an approach to scheduling
                 periodic tasks in embedded systems subject to security
                 and timing constraints. We design a necessary and
                 sufficient feasibility check for a set of periodic
                 tasks with security requirements. With the feasibility
                 test in place, we propose a scheduling algorithm, or
                 SASES (security-aware scheduling for embedded systems),
                 which accounts for both security and timing
                 requirements. SASES judiciously distributes slack times
                 among a variety of security services for a set of
                 periodic tasks, thereby optimizing security for
                 embedded systems without sacrificing schedulability. To
                 demonstrate the effectiveness of SASES, we apply the
                 proposed SASES to real-world embedded systems such as
                 an automated flight control system. We show, through
                 extensive simulations, that SASES is able to maximize
                 security for embedded systems while guaranteeing
                 timeliness. In particular, SASES significantly improves
                 security over three baseline algorithms by up to
                 107\%.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J840",
  keywords =     "embedded systems; periodic tasks; real-time systems;
                 scheduling; security-sensitive applications",
}

@Article{Xu:2007:CAD,
  author =       "Changsheng Xu and Namunu C. Maddage and Xi Shao and Qi
                 Tian",
  title =        "Content-adaptive digital music watermarking based on
                 music structure analysis",
  journal =      j-TOMCCAP,
  volume =       "3",
  number =       "1",
  pages =        "??--??",
  month =        feb,
  year =         "2007",
  CODEN =        "????",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Sat Apr 14 11:19:17 MDT 2007",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Book{Yan:2007:CAR,
  author =       "Song Y. Yan",
  title =        "Cryptanalytic attacks on {RSA}",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xx + 254",
  year =         "2007",
  ISBN =         "0-387-48741-7",
  ISBN-13 =      "978-0-387-48741-0",
  LCCN =         "QA76.9.A25 Y34 2007",
  bibdate =      "Fri Mar 23 19:15:13 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.bibsys.no:2100/BIBSYS",
  abstract =     "RSA is a public-key cryptographic system, and is the
                 most famous and widely-used cryptographic system in
                 today's digital world. Cryptanalytic Attacks on RSA, a
                 professional book, covers almost all known
                 cryptanalytic attacks and defenses of the RSA
                 cryptographic system and its variants. Since RSA
                 depends heavily on computational complexity theory and
                 number theory, background information on complexity
                 theory and number theory is presented first, followed
                 by an account of the RSA cryptographic system and its
                 variants. This book is also suitable as a secondary
                 text for advanced-level students in computer science
                 and mathematics",
  acknowledgement = ack-nhfb,
  subject =      "Data encryption (Computer science); Computer networks;
                 Security measures; Cryptography",
}

@Article{Yang:2007:IIS,
  author =       "Ching-Nung Yang and Tse-Shih Chen and Kun Hsuan Yu and
                 Chung-Chun Wang",
  title =        "Improvements of image sharing with steganography and
                 authentication",
  journal =      j-J-SYST-SOFTW,
  volume =       "80",
  number =       "7",
  pages =        "1070--1076",
  month =        jul,
  year =         "2007",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:02 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Ye:2007:NAW,
  author =       "Dengpan Ye and Changfu Zou and Yuewei Dai and Zhiquan
                 Wang",
  title =        "A new adaptive watermarking for real-time {MPEG}
                 videos",
  journal =      j-APPL-MATH-COMP,
  volume =       "185",
  number =       "2",
  pages =        "907--918",
  day =          "15",
  month =        feb,
  year =         "2007",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:03:02 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@PhdThesis{Yekhanin:2007:LDC,
  author =       "Sergey Yekhanin",
  title =        "Locally Decodable Codes and Private Information
                 Retrieval Schemes",
  type =         "{Ph.D.} dissertation",
  school =       "Massachusetts Institute of Technology",
  address =      "Cambridge, MA, USA",
  year =         "2007",
  bibdate =      "Thu Jun 12 09:50:44 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Winner of the ACM 2007 Doctoral Dissertation Award.",
  URL =          "http://www.acm.org/press-room/news-releases/dd-award-07",
  acknowledgement = ack-nhfb,
}

@Article{Yu:2007:NSM,
  author =       "Yuan-Hui Yu and Chin-Chen Chang and Iuon-Chang Lin",
  title =        "A new steganographic method for color and grayscale
                 image hiding",
  journal =      j-COMP-VIS-IMAGE-UNDERSTANDING,
  volume =       "107",
  number =       "3",
  pages =        "183--194",
  month =        sep,
  year =         "2007",
  CODEN =        "CVIUF4",
  ISSN =         "1077-3142 (print), 1090-235X (electronic)",
  ISSN-L =       "1077-3142",
  bibdate =      "Sat Apr 2 10:55:53 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/10773142",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Vision and Image Understanding",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10773142",
}

@Article{Yue:2007:SEV,
  author =       "Tai-Wen Yue and Suchen Chiang",
  title =        "The semipublic encryption for visual cryptography
                 using {Q'tron} neural networks",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "30",
  number =       "1",
  pages =        "24--41",
  month =        jan,
  year =         "2007",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:43:07 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804505000391",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Zheng:2007:SRI,
  author =       "Dong Zheng and Yan Liu and Jiying Zhao and
                 Abdulmotaleb El Saddik",
  title =        "A survey of {RST} invariant image watermarking
                 algorithms",
  journal =      j-COMP-SURV,
  volume =       "39",
  number =       "2",
  pages =        "5:1--5:91",
  month =        jul,
  year =         "2007",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1242471.1242473",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:12 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "In this article, we review the algorithms for
                 rotation, scaling and translation (RST) invariant image
                 watermarking. There are mainly two categories of RST
                 invariant image watermarking algorithms. One is to
                 rectify the RST transformed image before conducting
                 watermark detection. Another is to embed and detect
                 watermark in an RST invariant or semi-invariant domain.
                 In order to help readers understand, we first introduce
                 the fundamental theories and techniques used in the
                 existing RST invariant image watermarking algorithms.
                 Then, we discuss in detail the work principles,
                 embedding process, and detection process of the typical
                 RST invariant image watermarking algorithms. Finally,
                 we analyze and evaluate these typical algorithms
                 through implementation, and point out their advantages
                 and disadvantages.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Digital image watermarking; feature points;
                 Fourier-Mellin transform; ILPM; LPM; moments; Radon
                 transform; RST invariant; template matching",
}

@Article{Zhu:2007:EIB,
  author =       "Robert W. Zhu and Guomin Yang and Duncan S. Wong",
  title =        "An efficient identity-based key exchange protocol with
                 {KGS} forward secrecy for low-power devices",
  journal =      j-THEOR-COMP-SCI,
  volume =       "378",
  number =       "2",
  pages =        "198--207",
  day =          "6",
  month =        jun,
  year =         "2007",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Mar 29 08:55:48 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Zhu:2007:IHH,
  author =       "Sencun Zhu and Sanjeev Setia and Sushil Jajodia and
                 Peng Ning",
  title =        "Interleaved hop-by-hop authentication against false
                 data injection attacks in sensor networks",
  journal =      j-TOSN,
  volume =       "3",
  number =       "3",
  pages =        "14:1--14:??",
  month =        aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1267060.1267062",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Mon Jun 16 17:50:25 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Sensor networks are often deployed in unattended
                 environments, thus leaving these networks vulnerable to
                 false data injection attacks in which an adversary
                 injects false data into the network with the goal of
                 deceiving the base station or depleting the resources
                 of the relaying nodes. Standard authentication
                 mechanisms cannot prevent this attack if the adversary
                 has compromised one or a small number of sensor nodes.
                 We present three interleaved hop-by-hop authentication
                 schemes that guarantee that the base station can detect
                 injected false data immediately when no more than $t$
                 nodes are compromised, where $t$ is a system design
                 parameter. Moreover, these schemes enable an
                 intermediate forwarding node to detect and discard
                 false data packets as early as possible. Our
                 performance analysis shows that our scheme is efficient
                 with respect to the security it provides, and it also
                 allows a tradeoff between security and performance. A
                 prototype implementation of our scheme indicates that
                 our scheme is practical and can be deployed on the
                 current generation of sensor nodes.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
  keywords =     "authentication; filtering false data; interleaved
                 hop-by-hop; sensor networks",
}

@Article{Zirkind:2007:ADC,
  author =       "Givon Zirkind",
  title =        "{AFIS} data compression: an example of how domain
                 specific compression algorithms can produce very high
                 compression ratios",
  journal =      j-COMP-GRAPHICS,
  volume =       "41",
  number =       "4",
  pages =        "1--36",
  month =        nov,
  year =         "2007",
  CODEN =        "CGRADI, CPGPBZ",
  DOI =          "https://doi.org/10.1145/1331098.1331103",
  ISSN =         "0097-8930 (print), 1558-4569 (electronic)",
  ISSN-L =       "0097-8930",
  bibdate =      "Wed Jun 18 10:13:23 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "This article describes the development and
                 implementation of a data compression algorithm designed
                 specifically for fingerprints, referred to as GBP
                 compression. The algorithm is herein discussed. Data
                 Compression algorithms can be designed for general
                 applications, meaning the input data is unknown. This
                 is more commonly referred to as generic data. [LI01]
                 Or, data compression algorithms can be designed for
                 specific applications. E.g. AFIS [Automated Fingerprint
                 Identification Systems] 'When the input is known,
                 higher compression ratios can be achieved with the
                 knowledge of the input data stream.' To-date, the
                 highest compression ratio for an unknown input data
                 stream, for all data compression algorithms, is JPEG
                 with an average compression ratio range of 1:17 ---
                 1:23. [PEN03] The algorithm herein discussed, has a
                 compression ratio range of 1:68 --- 1:92. There is a
                 value, time and place for each design method ---
                 generic or specific --- depending upon a variety of
                 factors. Due to the nature of the use of AFIS for law
                 enforcement and incrimination as well as criminal
                 conviction, there are social issues that make data
                 integrity of paramount concern. This factor influences
                 algorithm selection and design. A lossless algorithm is
                 a must! Also, the nature of AFIS is such that it
                 operates across borders and between states,
                 municipalities and jurisdictions. In addition to the
                 usual issues and resistance to accepting new
                 technology, including software [e.g. resistance to
                 change, fear of system failure, etc.], there are the
                 issues of changing engineering standards [hardware and
                 software] which are governmentally determined as well
                 as governmental policy decisions. Likewise, the
                 portability required in implementing a new algorithm,
                 will have to deal with a variety of hardware and
                 software; as well as be designed to integrate into
                 existing systems. This integration must include the
                 ability to incorporate existing JPEG data files, from
                 existing police databases. This requires a handshaking
                 of standards and conversion programs that maintain data
                 integrity. In addition, there is an in depth discussion
                 of the limits of compression with a novel
                 perspective.",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Graphics",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J166",
  keywords =     "AFIS; automated fingerprint identification systems;
                 compatibility; compression; data compression; data
                 encryption; data integrity; double compression;
                 fingerprinting; graphics; image compression; image
                 quality; limits of compression; portability;
                 retrofitting; serial compression; software
                 engineering",
}

@Article{Aaraj:2008:ADH,
  author =       "Najwa Aaraj and Anand Raghunathan and Niraj K. Jha",
  title =        "Analysis and design of a hardware\slash software
                 trusted platform module for embedded systems",
  journal =      j-TECS,
  volume =       "8",
  number =       "1",
  pages =        "8:1--8:??",
  month =        dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1457246.1457254",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Tue Jan 6 14:36:01 MST 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Trusted platforms have been proposed as a promising
                 approach to enhance the security of general-purpose
                 computing systems. However, for many
                 resource-constrained embedded systems, the size and
                 cost overheads of a separate Trusted Platform Module
                 (TPM) chip are not acceptable. One alternative is to
                 use a software-based TPM, which implements TPM
                 functions using software that executes in a protected
                 execution domain on the embedded processor itself.
                 However, since many embedded systems have limited
                 processing capabilities and are battery-powered, it is
                 also important to ensure that the computational and
                 energy requirements for SW-TPMs are acceptable.\par

                 In this article, we perform an evaluation of the energy
                 and execution time overheads for a SW-TPM
                 implementation on a handheld appliance (Sharp Zaurus
                 PDA). We characterize the execution time and energy
                 required by each TPM command through actual
                 measurements on the target platform. We observe that
                 for most commands, overheads are primarily due to the
                 use of 2,048-bit RSA operations that are performed
                 within the SW-TPM. In order to alleviate SW-TPM
                 overheads, we evaluate the use of Elliptic Curve
                 Cryptography (ECC) as a replacement for the RSA
                 algorithm specified in the Trusted Computing Group
                 (TCG) standards. In addition, we also evaluate the
                 overheads of using the SW-TPM in the context of various
                 end applications, including trusted boot of the Linux
                 operating system (OS), a secure VoIP client, and a
                 secure Web browser. Furthermore, we analyze the
                 computational workload involved in running SW-TPM
                 commands using ECC. We then present a suite of hardware
                 and software enhancements to accelerate these commands
                 --- generic custom instructions and exploitation of
                 parallel processing capabilities in multiprocessor
                 systems-on-chip (SoCs). We report results of evaluating
                 the proposed architectures on a commercial embedded
                 processor (Xtensa from Tensilica). Through uniprocessor
                 and multiprocessor optimizations, we could achieve
                 speed-ups of up to 5.71X for individual TPM commands.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J840",
  keywords =     "Custom instructions; embedded systems; multiprocessor
                 systems",
}

@Article{Abadi:2008:SAC,
  author =       "Mart{\'i}n Abadi and Bogdan Warinschi",
  title =        "Security analysis of cryptographically controlled
                 access to {XML} documents",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "2",
  pages =        "6:1--6:29",
  month =        may,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1346330.1346331",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jun 16 18:08:44 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Some promising recent schemes for XML access control
                 employ encryption for implementing security policies on
                 published data, avoiding data duplication. In this
                 article, we study one such scheme, due to Miklau and
                 Suciu [2003]. That scheme was introduced with some
                 intuitive explanations and goals, but without precise
                 definitions and guarantees for the use of cryptography
                 (specifically, symmetric encryption and secret
                 sharing). We bridge this gap in the present work. We
                 analyze the scheme in the context of the rigorous
                 models of modern cryptography. We obtain formal results
                 in simple, symbolic terms close to the vocabulary of
                 Miklau and Suciu. We also obtain more detailed
                 computational results that establish security against
                 probabilistic polynomial-time adversaries. Our
                 approach, which relates these two layers of the
                 analysis, continues a recent thrust in security
                 research and may be applicable to a broad class of
                 systems that rely on cryptographic data protection.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "Journal of the Association for Computing Machinery",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
  keywords =     "access control; authorization; encryption; XML",
}

@Book{Adjeroh:2008:BWT,
  author =       "Donald Adjeroh and Tim Bell and Amar Mukherjee",
  title =        "The {Burrows--Wheeler} Transform: Data Compression,
                 Suffix Arrays, and Pattern Matching",
  publisher =    "Springer Science+Business Media, LLC",
  address =      "Boston, MA",
  pages =        "xxii + 351",
  year =         "2008",
  DOI =          "https://doi.org/10.1007/978-0-387-78909-5",
  ISBN =         "0-387-78908-1, 0-387-78909-X",
  ISBN-13 =      "978-0-387-78908-8, 978-0-387-78909-5",
  LCCN =         "QA76.9.D33 A35 2008",
  bibdate =      "Fri Mar 23 18:07:56 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.bibsys.no:2100/BIBSYS",
  acknowledgement = ack-nhfb,
  subject =      "Data Structures; Computer Science; Database
                 management; Information Storage and Retrieval; Data
                 structures (Computer science); Information storage and
                 retrieval systems; Data Structures, Cryptology and
                 Information Theory; datakomprimering",
}

@Article{Agarwal:2008:DWS,
  author =       "Rashmi Agarwal and M. S. Santhanam",
  title =        "Digital Watermarking in the Singular Vector Domain",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "8",
  number =       "3",
  pages =        "351--368",
  month =        jul,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1142/S0219467808003131",
  ISSN =         "0219-4678",
  bibdate =      "Tue Aug 31 08:38:02 MDT 2010",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics (IJIG)",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Agreste:2008:NAP,
  author =       "Santa Agreste and Guido Andaloro",
  title =        "A new approach to pre-processing digital image for
                 wavelet-based watermark",
  journal =      j-J-COMPUT-APPL-MATH,
  volume =       "221",
  number =       "2",
  pages =        "274--283",
  day =          "15",
  month =        nov,
  year =         "2008",
  CODEN =        "JCAMDI",
  ISSN =         "0377-0427 (print), 1879-1778 (electronic)",
  ISSN-L =       "0377-0427",
  bibdate =      "Sat Feb 25 13:13:27 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcomputapplmath2005.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0377042707005602",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computational and Applied Mathematics",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03770427",
}

@Article{Ahmad:2008:ATT,
  author =       "David Ahmad",
  title =        "Attack Trends: Two Years of Broken Crypto: {Debian}'s
                 Dress Rehearsal for a Global {PKI} Compromise",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "70--73",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.131",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "A patch to the OpenSSL package maintained by Debian
                 GNU/Linux (an operating system composed of free and
                 open source software that can be used as a desktop or
                 server OS) submitted in 2006 weakened its pseudo-random
                 number generator (PRNG), a critical component for
                 secure key generation. Putting both servers and users
                 at risk, this vulnerability affected OpenSSH, Apache
                 (mod\_ssl), the onion router (TOR), OpenVPN, and other
                 applications. In this article, the author examines
                 these issue and its consequences. OpenSSL is an open
                 source library implementing the SSL (Secure Socket
                 Layer) and TLS (Transport Layer Security) protocols.
                 Several widely deployed applications on many OSs rely
                 on it for secure communications, particularly Linux and
                 BSD-based systems. Where in use, it's a critical part
                 of the OS's security subsystem.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Ahmadi:2008:PFS,
  author =       "O. Ahmadi and D. Hankerson and F.
                 Rodr{\'\i}guez-Henr{\'\i}quez",
  title =        "Parallel Formulations of Scalar Multiplication on
                 {Koblitz} Curves",
  journal =      j-J-UCS,
  volume =       "14",
  number =       "3",
  pages =        "481--504",
  month =        "????",
  year =         "2008",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Thu Jul 10 06:41:41 MDT 2008",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_14_3/parallel_formulations_of_scalar",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
  keywords =     "cryptography",
}

@Book{Aid:2008:NSA,
  author =       "Matthew M. Aid and Thomas R. Johnson",
  title =        "{National Security Agency} releases history of cold
                 war intelligence activities: {Soviet} strategic forces
                 went on alert three times during {September--October
                 1962} because of apprehension over {Cuban} situation,
                 top secret codeword history of {National Security
                 Agency} shows",
  volume =       "260",
  publisher =    "National Security Archive",
  address =      "Washington, DC, USA",
  year =         "2008",
  LCCN =         "JZ5630",
  bibdate =      "Mon Mar 9 12:12:19 MDT 2015",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "National Security Archive electronic briefing book",
  URL =          "http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB260/index.htm",
  abstract =     "In response to a declassification request by the
                 National Security Archive, the secretive National
                 Security Agency has declassified large portions of a
                 four-part top-secret Umbra study, American cryptology
                 during the Cold War. Despite major redactions, this
                 history discloses much new information about the
                 agency's history and the role of SIGINT and
                 communications intelligence (COMINT) during the Cold
                 War. Researched and written by NSA historian Thomas
                 Johnson, the three parts released so far provide a
                 frank assessment of the history of the Agency and its
                 forerunners, warts-and-all.",
  acknowledgement = ack-nhfb,
  remark =       "Posted November 14, 2008",
  subject =      "Military intelligence; History; 20th century;
                 Cryptography; United States; Electronic surveillance;
                 Official secrets; Cold War; Cryptography.; Electronic
                 surveillance.; Military intelligence.; Official
                 secrets.",
}

@InProceedings{Al-Jarrah:2008:NKM,
  author =       "Omar Al-Jarrah and Ramzy Saifan",
  editor =       "Gabriele Kotsis and others",
  booktitle =    "{MoMM '08: Proceedings of the 6th International
                 Conference on Advances in Mobile Computing and
                 Multimedia, 24--26 November 2008, Linz, Austria}",
  title =        "A novel key management algorithm in sensor networks",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  bookpages =    "xvi + 497",
  pages =        "291--294",
  year =         "2008",
  DOI =          "https://doi.org/10.1145/1497185.1497246",
  ISBN =         "1-60558-269-7",
  ISBN-13 =      "978-1-60558-269-6",
  LCCN =         "QA76.59 .I565 2008",
  bibdate =      "Thu Apr 21 10:29:57 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Data security in wireless sensor networks is very
                 important, especially in hostile environment, where we
                 must ensure that data is authentic, confidential, and
                 not tampered on the road. Network authenticity and
                 confidentiality need the existence of shared keys.
                 These keys are highly recommended to be in small scopes
                 so that the compromise of one node will not affect the
                 whole network. Key management is critical to maintain
                 the security functions. In this paper we introduce a
                 new key management algorithm, which ensures that most
                 of the node's neighbors are reliable. The proposed
                 algorithm minimizes interaction with base station,
                 number of transmitted packets, and energy consumption.
                 In addition, it does not use large scope keys.
                 Simulation results proof that the proposed algorithm is
                 scalable in terms of storage and communication
                 overhead, such that there is no correlation between the
                 number of nodes in the network from one side and number
                 of reliable neighbors and number of packets transmitted
                 from the other side.",
  acknowledgement = ack-nhfb,
  numpages =     "4",
}

@Article{Anderson:2008:MMM,
  author =       "M. Anderson",
  title =        "Media: The Mash Monsters",
  journal =      j-IEEE-SPECTRUM,
  volume =       "45",
  number =       "5",
  pages =        "22--23",
  month =        may,
  year =         "2008",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2008.4505306",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Communication system security; copyright; copyright
                 law; Cryptography; Internet; Law; mash-up songs;
                 Mashups; music; Power engineering and energy; Power
                 system security; Telecommunication traffic; Ubiquitous
                 computing; Wireless networks",
}

@Book{Anderson:2008:SEG,
  author =       "Ross Anderson",
  title =        "Security engineering: a guide to building dependable
                 distributed systems",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  edition =      "Second",
  pages =        "xl + 1040",
  year =         "2008",
  ISBN =         "0-470-06852-3 (cloth)",
  ISBN-13 =      "978-0-470-06852-6 (cloth)",
  LCCN =         "QA76.9.A25 A54 2008",
  bibdate =      "Tue Jul 20 17:22:15 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0827/2008006392-d.html;
                 http://www.loc.gov/catdir/enhancements/fy0827/2008006392-t.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Electronic data processing;
                 Distributed processing",
  tableofcontents = "What is security engineering? \\
                 Usability and psychology \\
                 Protocols \\
                 Access control \\
                 Cryptography \\
                 Distributed systems \\
                 Economics \\
                 Multilevel security \\
                 Multilateral security \\
                 Banking and bookkeeping \\
                 Physical protection \\
                 Monitoring and metering \\
                 Nuclear command and control \\
                 Security printing and seals \\
                 Biometrics \\
                 Physical tamper resistance \\
                 Emission security \\
                 API attacks \\
                 Electronic and information warfare \\
                 Telecom system security \\
                 Network attack and defense \\
                 Copyright and DRM \\
                 The bleeding edge \\
                 Terror, justice and freedom \\
                 Managing the development of secure systems \\
                 System evaluation and assurance..",
}

@Article{Anonymous:2008:KAD,
  author =       "Anonymous",
  title =        "{Kaspersky} asks for decryption help",
  journal =      j-NETWORK-SECURITY,
  volume =       "2008",
  number =       "7",
  pages =        "1--2",
  month =        jul,
  year =         "2008",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(08)70081-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:54 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485808700813",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2008:RCB,
  author =       "Anonymous",
  title =        "Researchers crack bot net secrets",
  journal =      j-NETWORK-SECURITY,
  volume =       "2008",
  number =       "5",
  pages =        "2--2",
  month =        may,
  year =         "2008",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(08)70058-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:51 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485808700588",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2008:RES,
  author =       "Anonymous",
  title =        "Researchers encode secret messages in {VoIP} calls",
  journal =      j-NETWORK-SECURITY,
  volume =       "2008",
  number =       "7",
  pages =        "2--2",
  month =        jul,
  year =         "2008",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(08)70083-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:54 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485808700837",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@TechReport{Anonymous:2008:SHS,
  author =       "Anonymous",
  key =          "FIPS-180-3",
  title =        "{Secure Hash Standard (SHS)}",
  type =         "{Federal Information Processing Standards}
                 Publication",
  number =       "FIPS Pub 180-3",
  institution =  pub-NIST,
  address =      pub-NIST:adr,
  pages =        "v + 27",
  month =        oct,
  year =         "2008",
  bibdate =      "Thu Aug 21 06:08:01 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  note =         "Superceded by FIPS 180-4 \cite{Anonymous:2012:SHS}.",
  URL =          "http://csrc.nist.gov/publications/fips/fips180-3/fips180-3_final.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography; Federal Information
                 Processing Standards; hash algorithm; hash function;
                 message digest; Secure Hash Standard",
}

@Article{Askarov:2008:CMF,
  author =       "Aslan Askarov and Daniel Hedin and Andrei Sabelfeld",
  title =        "Cryptographically-masked flows",
  journal =      j-THEOR-COMP-SCI,
  volume =       "402",
  number =       "2--3",
  pages =        "82--101",
  day =          "8",
  month =        aug,
  year =         "2008",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Mar 28 21:21:39 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Avoine:2008:CIT,
  author =       "Gildas Avoine and Pascal Junod and Philippe Oechslin",
  title =        "Characterization and Improvement of Time-Memory
                 Trade-Off Based on Perfect Tables",
  journal =      j-TISSEC,
  volume =       "11",
  number =       "4",
  pages =        "17:1--17:??",
  month =        jul,
  year =         "2008",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1380564.1380565",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Tue Aug 5 19:37:22 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Cryptanalytic time-memory trade-offs have been studied
                 for 25 years and have benefited from several
                 improvements since the original work of Hellman. The
                 ensuing variants definitely improve the original
                 trade-off but their real impact has never been
                 evaluated in practice. We fill this lack by analyzing
                 the {\em perfect\/} form of classic tables,
                 distinguished point-based tables, and rainbow tables.
                 We especially provide a thorough analysis of the latter
                 variant, whose performances have never been formally
                 calculated yet. Our analysis leads to the concept of a
                 {\em characteristic\/} that enables to measure the
                 intrinsic quality of a trade-off. We finally introduce
                 a new technique based on {\em checkpoints\/} that still
                 reduces the cryptanalysis time by ruling out false
                 alarms probabilistically. Our analysis yields the exact
                 gain of this approach and establishes its efficiency
                 when applied on rainbow tables.",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "cryptography; Hellman's time-memory trade-off;
                 password cracking; rainbow tables",
}

@Article{Backes:2008:KDM,
  author =       "Michael Backes and Birgit Pfitzmann and Andre
                 Scedrov",
  title =        "Key-dependent message security under active attacks
                 --- {BRSIM\slash UC}-soundness of {Dolev--Yao}-style
                 encryption with key cycles",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "5",
  pages =        "497--530",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0332",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:03 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@PhdThesis{Baigneres:2008:QSB,
  author =       "Thomas Baign{\`e}res",
  title =        "Quantitative security of block ciphers : designs and
                 cryptanalysis tools",
  type =         "Th{\`e}se",
  number =       "4208",
  school =       "Facult{\'e} informatique et communications IC,
                 Programme doctoral Informatique, Communications et
                 Information, Institut de syst{\`e}mes de communication
                 ISC (Laboratoire de s{\'e}curit{\'e} et de
                 cryptographie LASEC), {\'E}cole polytechnique
                 f{\'e}d{\'e}rale de Lausanne EPFL",
  address =      "Lausanne, Switzerland",
  pages =        "243",
  year =         "2008",
  bibdate =      "Sat May 14 07:12:05 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  advisor =      "Serge Vaudenay",
}

@Article{Bar-Yossef:2008:ESQ,
  author =       "Ziv Bar-Yossef and T. S. Jayram and Iordanis
                 Kerenidis",
  title =        "Exponential Separation of Quantum and Classical
                 One-Way Communication Complexity",
  journal =      j-SIAM-J-COMPUT,
  volume =       "38",
  number =       "1",
  pages =        "366--384",
  month =        "????",
  year =         "2008",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Tue May 18 08:21:55 MDT 2010",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/38/1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@InProceedings{Barkol:2008:CPR,
  author =       "Omer Barkol and Yuval Ishai and Enav Weinreb",
  title =        "Communication in the presence of replication",
  crossref =     "ACM:2008:SPA",
  pages =        "661--670",
  year =         "2008",
  DOI =          "https://doi.org/10.1145/1374376.1374472",
  bibdate =      "Fri Jun 20 18:31:53 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We consider the following problem. Suppose that a big
                 amount of data is distributed among several parties, so
                 that each party misses only few pieces of data. The
                 parties wish to perform some global computation on the
                 data while minimizing the communication between them.
                 This situation is common in many real-life scenarios. A
                 naive solution to this problem is to first perform a
                 synchronization step, letting one party learn all
                 pieces of data, and then let this party perform the
                 required computation locally. We study the question of
                 obtaining better solutions to the problem, focusing
                 mainly on the case of computing low-degree polynomials
                 via non-interactive protocols. We present interesting
                 connections between this problem and the well studied
                 cryptographic problem of secret sharing. We use this
                 connection to obtain nontrivial upper bounds and lower
                 bounds using results and techniques from the domain of
                 secret sharing. The relation with open problems from
                 the area of secret sharing also provides evidence for
                 the difficulty of resolving some of the questions we
                 leave open.",
  acknowledgement = ack-nhfb,
  keywords =     "communication complexity; secret sharing; simultaneous
                 messages",
}

@Article{Bartolini:2008:EIS,
  author =       "S. Bartolini and I. Branovic and R. Giorgi and E.
                 Martinelli",
  title =        "Effects of Instruction-Set Extensions on an Embedded
                 Processor: a Case Study on Elliptic Curve Cryptography
                 over {$ \mathrm {GF}(2^m) $}",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "57",
  number =       "5",
  pages =        "672--685",
  month =        may,
  year =         "2008",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2007.70832",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 12:17:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4358294",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Bauer:2008:EHE,
  author =       "Friedrich L. Bauer",
  title =        "{Erich H{\"u}ttenhain: Entzifferung 1939--1945}.
                 ({German}) [{Erich H{\"u}ttenhain}: deciphering
                 1939--1945]",
  journal =      j-INFORMATIK-SPEKTRUM,
  volume =       "31",
  number =       "3",
  pages =        "??--??",
  month =        "????",
  year =         "2008",
  CODEN =        "INSKDW",
  DOI =          "https://doi.org/10.1007/s00287-008-0242-4",
  ISSN =         "0170-6012 (print), 1432-122X (electronic)",
  ISSN-L =       "0170-6012",
  bibdate =      "Sat Aug 22 15:20:53 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/b/bauer-friedrich-ludwig.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.com/article/10.1007/s00287-008-0242-4",
  acknowledgement = ack-nhfb,
  author-dates = "Friedrich (``Fritz'') Ludwig Bauer (10 June 1924--26
                 March 2015)",
  fjournal =     "Informatik Spektrum",
  journal-URL =  "http://link.springer.com/journal/287",
  language =     "German",
}

@Article{Beimel:2008:CIW,
  author =       "Amos Beimel and Tamir Tassa and Enav Weinreb",
  title =        "Characterizing Ideal Weighted Threshold Secret
                 Sharing",
  journal =      j-SIAM-J-DISCR-MATH,
  volume =       "22",
  number =       "1",
  pages =        "360--397",
  month =        "????",
  year =         "2008",
  CODEN =        "SJDMEC",
  DOI =          "https://doi.org/10.1137/S0895480104445654",
  ISSN =         "0895-4801 (print), 1095-7146 (electronic)",
  ISSN-L =       "0895-4801",
  bibdate =      "Tue May 18 21:37:06 MDT 2010",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SIDMA/22/1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjdiscrmath.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Discrete Mathematics",
  journal-URL =  "http://epubs.siam.org/sidma",
}

@Misc{Bello:2008:OPR,
  author =       "L. Bello",
  title =        "{{\tt openssl}} --- predictable random number
                 generator",
  howpublished = "Debian security advisory 1571-1.",
  year =         "2008",
  bibdate =      "Sat Nov 29 13:51:14 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
}

@TechReport{Bernstein:2008:CVS,
  author =       "Daniel J. Bernstein",
  title =        "{ChaCha}, a variant of {Salsa20}",
  type =         "Report",
  institution =  "Department of Mathematics, Statistics, and Computer
                 Science (M/C 249), The University of Illinois at
                 Chicago",
  address =      "Chicago, IL 60607-7045",
  day =          "28",
  month =        jan,
  year =         "2008",
  bibdate =      "Thu Jan 10 06:56:33 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://cr.yp.to/chacha/chacha-20080128.pdf",
  abstract =     "ChaCha8 is a 256-bit stream cipher based on the
                 8-round cipher Salsa20/8. The changes from Salsa20/8 to
                 ChaCha8 are designed to improve diffusion per round,
                 conjecturally increasing resistance to cryptanalysis,
                 while preserving --- and often improving --- time per
                 round. ChaCha12 and ChaCha20 are analogous
                 modifications of the 12-round and 20-round ciphers
                 Salsa20/12 and Salsa20/20. This paper presents the
                 ChaCha family and explains the differences between
                 Salsa20 and ChaCha.",
  acknowledgement = ack-nhfb,
}

@Article{Bertolotti:2008:ERA,
  author =       "Ivan Cibrario Bertolotti and Luca Durante and Riccardo
                 Sisto and Adriano Valenzano",
  title =        "Efficient representation of the attacker's knowledge
                 in cryptographic protocols analysis",
  journal =      j-FORM-ASP-COMPUT,
  volume =       "20",
  number =       "3",
  pages =        "303--348",
  month =        may,
  year =         "2008",
  CODEN =        "FACME5",
  DOI =          "https://doi.org/10.1007/s00165-008-0078-3",
  ISSN =         "0934-5043 (print), 1433-299X (electronic)",
  ISSN-L =       "0934-5043",
  bibdate =      "Tue Mar 17 20:58:27 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/formaspcomput.bib",
  URL =          "http://link.springer.com/article/10.1007/s00165-008-0078-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Formal Aspects of Computing",
  journal-URL =  "http://link.springer.com/journal/165",
}

@InProceedings{Bhargavan:2008:CVI,
  author =       "Karthikeyan Bhargavan and C{\'e}dric Fournet and
                 Ricardo Corin and Eugen Zalinescu",
  editor =       "????",
  booktitle =    "ACM Conference on Computer and Communications
                 Security",
  title =        "Cryptographically verified implementations for {{\tt
                 tls}}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "459--468",
  year =         "2008",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 11:27:54 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 8]{Schneier:2015:SWC}.",
}

@Article{Bhargavan:2008:VII,
  author =       "Karthikeyan Bhargavan and C{\'e}dric Fournet and
                 Andrew D. Gordon and Stephen Tse",
  title =        "Verified interoperable implementations of security
                 protocols",
  journal =      j-TOPLAS,
  volume =       "31",
  number =       "1",
  pages =        "5:1--5:57",
  month =        dec,
  year =         "2008",
  CODEN =        "ATPSDT",
  DOI =          "https://doi.org/10.1145/1452044.1452049",
  ISSN =         "0164-0925 (print), 1558-4593 (electronic)",
  ISSN-L =       "0164-0925",
  bibdate =      "Tue Dec 23 11:52:52 MST 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toplas/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/toplas.bib",
  abstract =     "We present an architecture and tools for verifying
                 implementations of security protocols. Our
                 implementations can run with both concrete and symbolic
                 implementations of cryptographic algorithms. The
                 concrete implementation is for production and
                 interoperability testing. The symbolic implementation
                 is for debugging and formal verification. We develop
                 our approach for protocols written in F\#, a dialect of
                 ML, and verify them by compilation to ProVerif, a
                 resolution-based theorem prover for cryptographic
                 protocols. We establish the correctness of this
                 compilation scheme, and we illustrate our approach with
                 protocols for Web Services security.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Transactions on Programming Languages and
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J783",
  keywords =     "Functional programming; pi calculus; Web services; XML
                 security",
}

@Article{Bhargavan:2008:VPB,
  author =       "Karthikeyan Bhargavan and C{\'e}dric Fournet and
                 Andrew D. Gordon",
  title =        "Verifying policy-based web services security",
  journal =      j-TOPLAS,
  volume =       "30",
  number =       "6",
  pages =        "30:1--30:59",
  month =        oct,
  year =         "2008",
  CODEN =        "ATPSDT",
  DOI =          "https://doi.org/10.1145/1391956.1391957",
  ISSN =         "0164-0925 (print), 1558-4593 (electronic)",
  ISSN-L =       "0164-0925",
  bibdate =      "Sat Nov 1 20:05:05 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toplas/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/toplas.bib",
  abstract =     "WS-SecurityPolicy is a declarative language for
                 configuring web services security mechanisms. We
                 describe a formal semantics for WS-SecurityPolicy and
                 propose a more abstract language for specifying secure
                 links between web services and their clients. We
                 present the architecture and implementation of tools
                 that (1) compile policy files from link specifications,
                 and (2) verify by invoking a theorem prover whether a
                 set of policy files run by any number of senders and
                 receivers correctly implements the goals of a link
                 specification, in spite of active attackers.
                 Policy-driven web services implementations are prone to
                 the usual subtle vulnerabilities associated with
                 cryptographic protocols; our tools help prevent such
                 vulnerabilities. We can verify policies when first
                 compiled from link specifications, and also re-verify
                 policies against their original goals after any
                 modifications during deployment. Moreover, we present
                 general security theorems for all configurations that
                 rely on compiled policies.",
  acknowledgement = ack-nhfb,
  articleno =    "30",
  fjournal =     "ACM Transactions on Programming Languages and
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J783",
  keywords =     "pi calculus; Web services; XML security",
}

@Book{Biggs:2008:CII,
  author =       "Norman Biggs",
  title =        "Codes: An introduction to Information Communication
                 and Cryptography",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "x + 273",
  year =         "2008",
  ISBN =         "1-84800-273-4 (e-book), 1-84800-272-6 (paperback)",
  ISBN-13 =      "978-1-84800-273-9 (e-book), 978-1-84800-272-2
                 (paperback)",
  LCCN =         "QA268 .B496 2008eb",
  bibdate =      "Fri Mar 23 10:32:24 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 jenson.stanford.edu:2210/unicorn",
  series =       "Springer undergraduate mathematics series",
  abstract =     "This book is an integrated introduction to the
                 mathematics of coding, that is, replacing information
                 expressed in symbols, such as a natural language or a
                 sequence of bits, by another message using (possibly)
                 different symbols. There are three main reasons for
                 doing this: economy, reliability, and security, and
                 each is covered in detail. Only a modest mathematical
                 background is assumed, the mathematical theory being
                 introduced at a level that enables the basic problems
                 to be stated carefully, but without unnecessary
                 abstraction.",
  acknowledgement = ack-nhfb,
  subject =      "Coding theory; Cryptography; Computer Science; IT;
                 COMPUTERS; Information Theory; Kryptologie",
  tableofcontents = "Coding and its uses \\
                 Prefix-free codes \\
                 Economical coding \\
                 Data compression \\
                 Noisy channels \\
                 The problem of reliable communication \\
                 The noisy coding theorems \\
                 Linear codes \\
                 Algebraic coding theory \\
                 Coding natural languages \\
                 The development of cryptography \\
                 Cryptography in theory and practice \\
                 The RSA cryptosystem \\
                 Cryptography and calculation \\
                 Elliptic curve cryptography",
}

@InProceedings{Biham:2008:BA,
  author =       "E. Biham and Y. Carmeli and A. Shamir",
  editor =       "????",
  booktitle =    "{Advances in Cryptology, Proceedings of CRYPTO 08}",
  title =        "Bug attacks",
  volume =       "5157",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "221--240",
  year =         "2008",
  bibdate =      "Thu Sep 22 18:42:07 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Blaszczyk:2008:NMT,
  author =       "M. Blaszczyk and R. A. Guinee",
  booktitle =    "{MILCOM 2008. IEEE Military Communications Conference,
                 2008}",
  title =        "A novel modelled true random binary number generator
                 for key stream generation in cryptographic
                 applications",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "1--7",
  year =         "2008",
  DOI =          "https://doi.org/10.1109/MILCOM.2008.4753211",
  bibdate =      "Fri Jan 6 08:10:49 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4753211",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4723889",
}

@Article{Bogomjakov:2008:PMD,
  author =       "Alexander Bogomjakov and Craig Gotsman and Martin
                 Isenburg",
  title =        "Points and Meshes: Distortion-Free Steganography for
                 Polygonal Meshes",
  journal =      j-CGF,
  volume =       "27",
  number =       "2",
  pages =        "637--642",
  month =        apr,
  year =         "2008",
  CODEN =        "CGFODY",
  DOI =          "https://doi.org/10.1111/j.1467-8659.2008.01161.x",
  ISSN =         "0167-7055 (print), 1467-8659 (electronic)",
  ISSN-L =       "0167-7055",
  bibdate =      "Sat May 11 13:26:43 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cgf.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Com{\-}pu{\-}ter Graphics Forum",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1467-8659/",
  onlinedate =   "24 Apr 2008",
}

@Article{Boldyreva:2008:NMS,
  author =       "Alexandra Boldyreva and Craig Gentry and Adam O'Neill
                 and Dae Hyun Yum",
  title =        "New Multiparty Signature Schemes for Network Routing
                 Applications",
  journal =      j-TISSEC,
  volume =       "12",
  number =       "1",
  pages =        "3:1--3:??",
  month =        oct,
  year =         "2008",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1410234.1410237",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Tue Nov 11 15:54:06 MST 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We construct two new multiparty digital signature
                 schemes that allow multiple signers to sequentially and
                 non-interactively produce a compact, fixed-length
                 signature. First, we introduce a new primitive that we
                 call {\em ordered multisignature\/} (OMS) scheme, which
                 allows signers to attest to a common message as well as
                 the order in which they signed. Our OMS construction
                 substantially improves computational efficiency and
                 scalability over any existing scheme with suitable
                 functionality. Second, we design a new identity-based
                 sequential aggregate signature scheme, where signers
                 can attest to different messages and signature
                 verification does not require knowledge of traditional
                 public keys. The latter property permits savings on
                 bandwidth and storage as compared to public-key
                 solutions. In contrast to the only prior scheme to
                 provide this functionality, ours offers improved
                 security that does not rely on synchronized clocks or a
                 trusted first signer. We provide formal security
                 definitions and support the proposed schemes with
                 security proofs under appropriate computational
                 assumptions. We focus on applications of our schemes to
                 secure network routing, but we believe that they will
                 find other applications as well.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "aggregate signatures; digital signatures;
                 identity-based signatures; multisignatures; network
                 security; pairings",
}

@InProceedings{Boneh:2008:IBI,
  author =       "D. Boneh and P. Papakonstantinou and C. Rackoff and Y.
                 Vahlis and B. Waters",
  title =        "On the Impossibility of Basing Identity Based
                 Encryption on Trapdoor Permutations",
  crossref =     "IEEE:2008:PAI",
  pages =        "283--292",
  year =         "2008",
  DOI =          "https://doi.org/10.1109/FOCS.2008.67",
  bibdate =      "Thu Apr 12 09:33:24 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2000.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4690923",
}

@Article{Bouganim:2008:DAC,
  author =       "Luc Bouganim and Fran{\c{c}}ois Dang Ngoc and Philippe
                 Pucheral",
  title =        "Dynamic access-control policies on {XML} encrypted
                 data",
  journal =      j-TISSEC,
  volume =       "10",
  number =       "4",
  pages =        "4:1--4:??",
  month =        jan,
  year =         "2008",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1284680.1284684",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 12 17:52:24 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The erosion of trust put in traditional database
                 servers and in Database Service Providers and the
                 growing interest for different forms of selective data
                 dissemination are different factors that lead to move
                 the access-control from servers to clients. Different
                 data encryption and key dissemination schemes have been
                 proposed to serve this purpose. By compiling the
                 access-control rules into the encryption process, all
                 these methods suffer from a static way of sharing data.
                 With the emergence of hardware security elements on
                 client devices, more dynamic client-based
                 access-control schemes can be devised. This paper
                 proposes a tamper-resistant client-based XML
                 access-right controller supporting flexible and dynamic
                 access-control policies. The access-control engine is
                 embedded in a hardware-secure device and, therefore,
                 must cope with specific hardware resources. This engine
                 benefits from a dedicated index to quickly converge
                 toward the authorized parts of a potentially streaming
                 XML document. Pending situations (i. e. , where data
                 delivery is conditioned by predicates, which apply to
                 values encountered afterward in the document stream)
                 are handled gracefully, skipping, whenever possible the
                 pending elements and reassembling relevant parts when
                 the pending situation is solved. Additional security
                 mechanisms guarantee that (1) the input document is
                 protected from any form of tampering and (2) no
                 forbidden information can be gained by replay attacks
                 on different versions of the XML document and of the
                 access-control rules. Performance measurements on
                 synthetic and real datasets demonstrate the
                 effectiveness of the approach. Finally, the paper
                 reports on two experiments conducted with a prototype
                 running on a secured hardware platform.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "access-control; data confidentiality; smartcard;
                 ubiquitous data management",
}

@Article{Bucci:2008:FDR,
  author =       "M. Bucci and R. Luzzi",
  title =        "Fully Digital Random Bit Generators for Cryptographic
                 Applications",
  journal =      j-IEEE-TRANS-CIRCUITS-SYST-1,
  volume =       "55",
  number =       "3",
  pages =        "861--875",
  month =        "????",
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/TCSI.2008.916446",
  ISSN =         "1549-8328 (print), 1558-0806 (electronic)",
  ISSN-L =       "1549-8328",
  bibdate =      "Fri Jan 6 08:10:49 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4432925",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8919",
  fjournal =     "IEEE Transactions on Circuits and Systems I: Regular
                 Papers",
}

@InProceedings{Caboara:2008:GBP,
  author =       "Massimo Caboara and Fabrizio Caruso and Carlo
                 Traverso",
  title =        "{Gr{\"o}bner} bases for public key cryptography",
  crossref =     "Jeffrey:2008:PAM",
  pages =        "315--324",
  year =         "2008",
  DOI =          "https://doi.org/10.1145/1390768.1390811",
  bibdate =      "Wed Aug 6 09:11:59 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Up to now, any attempt to use Gr{\"o}bner bases in the
                 design of public key cryptosystems has failed, as
                 anticipated by a classical paper of B. Barkee et al.;
                 we show why, and show that the only residual hope is to
                 use binomial ideals, i.e., lattices. We propose two
                 lattice-based cryptosystems that will show the
                 usefulness of multivariate polynomial algebra and
                 Gr{\"o}bner bases in the construction of public key
                 cryptosystems. The first one tries to revive two
                 cryptosystems Polly Cracker and GGH, that have been
                 considered broken, through a hybrid; the second one
                 improves a cryptosystem (NTRU) that only has heuristic
                 and challenged evidence of security, providing evidence
                 that the extension cannot be broken with some of the
                 standard lattice tools that can be used to break some
                 reduced form of NTRU. Because of the bounds on length,
                 we only sketch the construction of these two
                 cryptosystems, and leave many details of the
                 construction of private and public keys, of the proofs
                 and of the security considerations to forthcoming
                 technical papers.",
  acknowledgement = ack-nhfb,
  keywords =     "Gr{\"o}bner basis; Gr{\"o}bner Hermite normal form;
                 lattice; public key cryptosystem",
}

@Article{Casey:2008:IFD,
  author =       "Eoghan Casey and Gerasimos J. Stellatos",
  title =        "The impact of full disk encryption on digital
                 forensics",
  journal =      j-OPER-SYS-REV,
  volume =       "42",
  number =       "3",
  pages =        "93--98",
  month =        apr,
  year =         "2008",
  CODEN =        "OSRED8",
  DOI =          "https://doi.org/10.1145/1368506.1368519",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Fri Jun 20 17:21:09 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The integration of strong encryption into operating
                 systems is creating challenges for forensic examiners,
                 potentially preventing us from recovering any digital
                 evidence from a computer. Because strong encryption
                 cannot be circumvented without a key or passphrase,
                 forensic examiners may not be able to access data after
                 a computer is shut down, and must decide whether to
                 perform a live forensic acquisition. In addition, with
                 encryption becoming integrated into the operating
                 system, in some cases, virtualization is the most
                 effective approach to performing a forensic examination
                 of a system with FDE. This paper presents the evolution
                 of full disk encryption (FDE) and its impact on digital
                 forensics. Furthermore, by demonstrating how full disk
                 encryption has been dealt with in past investigations,
                 this paper provides forensics examiners with practical
                 techniques for recovering evidence that would otherwise
                 be inaccessible.",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
  keywords =     "computer forensics; full disk encryption; live
                 forensic acquisition; virtual forensic analysis",
}

@Article{Cayrel:2008:SIS,
  author =       "P.-L. Cayrel and P. Gaborit and E. Prouff",
  title =        "Secure Implementation of the {Stern} Authentication
                 and Signature Schemes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "5189",
  pages =        "191--205",
  year =         "2008",
  CODEN =        "LNCSD9",
  DOI =          "",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 31 16:00:05 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
  journal-URL =  "http://link.springer.com/bookseries/558",
  remark =       "roc. IFIP WG 8.8/11.2 Int l Conf. Smart Card Research
                 and Advanced Applications (CARDIS 08)",
}

@Article{Chaitanya:2008:QQM,
  author =       "Shiva Chaitanya and Bhuvan Urgaonkar and Anand
                 Sivasubramaniam",
  title =        "{QDSL}: a queuing model for systems with differential
                 service levels",
  journal =      j-SIGMETRICS,
  volume =       "36",
  number =       "1",
  pages =        "289--300",
  month =        jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1384529.1375490",
  ISSN =         "0163-5999 (print), 1557-9484 (electronic)",
  ISSN-L =       "0163-5999",
  bibdate =      "Fri Jun 27 09:43:29 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "A feature exhibited by many modern computing systems
                 is their ability to improve the quality of output they
                 generate for a given input by spending more computing
                 resources on processing it. Often this improvement
                 comes at the price of degraded performance in the form
                 of reduced throughput or increased response time. We
                 formulate QDSL, a class of constrained optimization
                 problems defined in the context of a queueing server
                 equipped with multiple levels of service. Solutions to
                 QDSL provide rules for dynamically varying the service
                 level to achieve desired trade-offs between output
                 quality and performance. Our approach involves reducing
                 restricted versions of such systems to Markov Decision
                 Processes. We find two variants of such systems worth
                 studying: (i) VarSL, in which a single request may be
                 serviced using a combination of multiple levels during
                 its lifetime and (ii) FixSL in which the service level
                 may not change during the lifetime of a request. Our
                 modeling indicates that optimal service level selection
                 policies in these systems correspond to very simple
                 rules that can be implemented very efficiently in
                 realistic, online systems. We find our policies to be
                 useful in two response-time-sensitive real-world
                 systems: (i) qSecStore, an iSCSI-based secure storage
                 system that has access to multiple encryption
                 functions, and (ii) qPowServer, a server with
                 DVFS-capable processor. As a representative result, in
                 an instance of qSecStore serving disk requests derived
                 from the well-regarded TPC-H traces, we are able to
                 improve the fraction of requests using more reliable
                 encryption functions by 40-60\%, while meeting
                 performance targets. In a simulation of qPowServer
                 employing realistic DVFS parameters, we are able to
                 improve response times significantly while only
                 violating specified server-wide power budgets by less
                 than 5W.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGMETRICS Performance Evaluation Review",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J618",
  keywords =     "differential service levels; dynamic voltage frequency
                 scaling; Markov decision process; secure storage",
}

@Article{Chang:2008:AWM,
  author =       "Chin-Chen Chang and Pei-Yu Lin",
  title =        "Adaptive watermark mechanism for rightful ownership
                 protection",
  journal =      j-J-SYST-SOFTW,
  volume =       "81",
  number =       "7",
  pages =        "1118--1129",
  month =        jul,
  year =         "2008",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:04 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Chang:2008:DAP,
  author =       "Katharine Chang and Kang G. Shin",
  title =        "Distributed {Authentication} of {Program Integrity
                 Verification} in {Wireless Sensor Networks}",
  journal =      j-TISSEC,
  volume =       "11",
  number =       "3",
  pages =        "14:1--14:??",
  month =        mar,
  year =         "2008",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1341731.1341735",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 12 17:52:50 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Security in wireless sensor networks has become
                 important as they are being developed and deployed for
                 an increasing number of applications. The severe
                 resource constraints in each sensor make it very
                 challenging to secure sensor networks. Moreover,
                 sensors are usually deployed in hostile and unattended
                 environments and hence are susceptible to various
                 attacks, including node capture, physical tampering,
                 and manipulation of the sensor program. Park and Shin
                 [2005] proposed a soft tamper-proofing scheme that
                 verifies the integrity of the program in each sensor
                 device, called the program integrity verification
                 (PIV), in which sensors authenticate PIV servers
                 (PIVSs) using centralized and trusted third-party
                 entities, such as authentication servers (ASs). This
                 article presents a distributed authentication protocol
                 of PIVSs (DAPP) without requiring the commonly used
                 ASs. DAPP uses the Blundo scheme [Blundo et al. 1992]
                 for sensors and PIVSs to establish pairwise keys and
                 for PIVSs to authenticate one another. We also present
                 a protocol for PIVSs to cooperatively detect and revoke
                 malicious PIVSs in the network. We implement and
                 evaluate both DAPP and PIV on Mica2 Motes and laptops,
                 showing that DAPP reduces the sensors' communication
                 traffic in the network by more than 90\% and the energy
                 consumption on each sensor by up to 85\%, as compared
                 to the case of using a centralized AS for
                 authenticating PIVSs. We also analyze the security of
                 DAPP under various attack models, demonstrating its
                 capability in dealing with diverse types of attacks.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "distributed authentication; node revocation; program
                 integrity verification; wireless sensor networks",
}

@Article{Chang:2008:EBD,
  author =       "Mei-Chu Chang and Chui Zhi Yao",
  title =        "An Explicit Bound On Double Exponential Sums Related
                 to {Diffie--Hellman} Distributions",
  journal =      j-SIAM-J-DISCR-MATH,
  volume =       "22",
  number =       "1",
  pages =        "348--359",
  month =        "????",
  year =         "2008",
  CODEN =        "SJDMEC",
  DOI =          "https://doi.org/10.1137/070699767",
  ISSN =         "0895-4801 (print), 1095-7146 (electronic)",
  ISSN-L =       "0895-4801",
  bibdate =      "Tue May 18 21:37:06 MDT 2010",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SIDMA/22/1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Discrete Mathematics",
  journal-URL =  "http://epubs.siam.org/sidma",
}

@Article{Chen:2008:BUK,
  author =       "L. Chen and Q. Tang",
  title =        "Bilateral Unknown Key-Share Attacks in Key Agreement
                 Protocols",
  journal =      j-J-UCS,
  volume =       "14",
  number =       "3",
  pages =        "416--440",
  month =        "????",
  year =         "2008",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Thu Jul 10 06:41:41 MDT 2008",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_14_3/bilateral_unknown_key_share",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
  keywords =     "cryptography",
}

@Article{Chen:2008:CCS,
  author =       "L. Chen and W. Susilo and H. Wang and D. S. Wong and
                 E. Dawson and X. Lai and M. Mambo and A. Miyaji and Y.
                 Mu and D. Pointcheval and B. Preneel and N. Smart",
  title =        "Cryptography in Computer System Security",
  journal =      j-J-UCS,
  volume =       "14",
  number =       "3",
  pages =        "314--317",
  month =        "????",
  year =         "2008",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Thu Jul 10 06:41:41 MDT 2008",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_14;
                 http://www.jucs.org/jucs_14_3#;
                 http://www.jucs.org/jucs_14_3/cryptography_in_computer_system",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Chen:2008:CIS,
  author =       "Wen-Yuan Chen",
  title =        "Color image steganography scheme using {DFT}, {SPIHT}
                 codec, and modified differential phase-shift keying
                 techniques",
  journal =      j-APPL-MATH-COMP,
  volume =       "196",
  number =       "1",
  pages =        "40--54",
  day =          "15",
  month =        feb,
  year =         "2008",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:03:10 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Chen:2008:MWS,
  author =       "Wen-Yuan Chen",
  title =        "Multiple-watermarking scheme of the {European Article
                 Number Barcode} using similar code division multiple
                 access technique",
  journal =      j-APPL-MATH-COMP,
  volume =       "197",
  number =       "1",
  pages =        "243--261",
  day =          "15",
  month =        mar,
  year =         "2008",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jul 12 09:03:11 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Chen:2008:NMA,
  author =       "Yalin Chen and Jue-Sam Chou and Hung-Min Sun",
  title =        "A novel mutual authentication scheme based on
                 quadratic residues for {RFID} systems",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "52",
  number =       "12",
  pages =        "2373--2380",
  day =          "22",
  month =        aug,
  year =         "2008",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:27 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Chen:2008:OVBa,
  author =       "Xiaoxin Chen and Tal Garfinkel and E. Christopher
                 Lewis and Pratap Subrahmanyam and Carl A. Waldspurger
                 and Dan Boneh and Jeffrey Dwoskin and Dan R. K. Ports",
  title =        "{Overshadow}: a virtualization-based approach to
                 retrofitting protection in commodity operating
                 systems",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "36",
  number =       "1",
  pages =        "2--13",
  month =        mar,
  year =         "2008",
  CODEN =        "CANED2",
  DOI =          "https://doi.org/10.1145/1346281.1346284",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Tue Jun 17 11:51:35 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Commodity operating systems entrusted with securing
                 sensitive data are remarkably large and complex, and
                 consequently, frequently prone to compromise. To
                 address this limitation, we introduce a
                 virtual-machine-based system called Overshadow that
                 protects the privacy and integrity of application data,
                 even in the event of a total OS compromise. Overshadow
                 presents an application with a normal view of its
                 resources, but the OS with an encrypted view. This
                 allows the operating system to carry out the complex
                 task of managing an application's resources, without
                 allowing it to read or modify them. Thus, Overshadow
                 offers a last line of defense for application
                 data.\par

                 Overshadow builds on multi-shadowing, a novel mechanism
                 that presents different views of 'physical' memory,
                 depending on the context performing the access. This
                 primitive offers an additional dimension of protection
                 beyond the hierarchical protection domains implemented
                 by traditional operating systems and processor
                 architectures.\par

                 We present the design and implementation of Overshadow
                 and show how its new protection semantics can be
                 integrated with existing systems. Our design has been
                 fully implemented and used to protect a wide range of
                 unmodified legacy applications running on an unmodified
                 Linux operating system. We evaluate the performance of
                 our implementation, demonstrating that this approach is
                 practical.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
  keywords =     "cloaking; hypervisors; memory protection;
                 multi-shadowing; operating systems; virtual machine
                 monitors; VMM",
}

@Article{Chen:2008:OVBb,
  author =       "Xiaoxin Chen and Tal Garfinkel and E. Christopher
                 Lewis and Pratap Subrahmanyam and Carl A. Waldspurger
                 and Dan Boneh and Jeffrey Dwoskin and Dan R. K. Ports",
  title =        "{Overshadow}: a virtualization-based approach to
                 retrofitting protection in commodity operating
                 systems",
  journal =      j-OPER-SYS-REV,
  volume =       "42",
  number =       "2",
  pages =        "2--13",
  month =        mar,
  year =         "2008",
  CODEN =        "OSRED8",
  DOI =          "https://doi.org/10.1145/1346281.1346284",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Fri Jun 20 17:20:12 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Commodity operating systems entrusted with securing
                 sensitive data are remarkably large and complex, and
                 consequently, frequently prone to compromise. To
                 address this limitation, we introduce a
                 virtual-machine-based system called Overshadow that
                 protects the privacy and integrity of application data,
                 even in the event of a total OS compromise. Overshadow
                 presents an application with a normal view of its
                 resources, but the OS with an encrypted view. This
                 allows the operating system to carry out the complex
                 task of managing an application's resources, without
                 allowing it to read or modify them. Thus, Overshadow
                 offers a last line of defense for application
                 data.\par

                 Overshadow builds on multi-shadowing, a novel mechanism
                 that presents different views of `physical' memory,
                 depending on the context performing the access. This
                 primitive offers an additional dimension of protection
                 beyond the hierarchical protection domains implemented
                 by traditional operating systems and processor
                 architectures.\par

                 We present the design and implementation of Overshadow
                 and show how its new protection semantics can be
                 integrated with existing systems. Our design has been
                 fully implemented and used to protect a wide range of
                 unmodified legacy applications running on an unmodified
                 Linux operating system. We evaluate the performance of
                 our implementation, demonstrating that this approach is
                 practical.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGOPS Operating Systems Review",
  keywords =     "cloaking; hypervisors; memory protection;
                 multi-shadowing; operating systems; virtual machine
                 monitors; VMM",
}

@Article{Chen:2008:OVBc,
  author =       "Xiaoxin Chen and Tal Garfinkel and E. Christopher
                 Lewis and Pratap Subrahmanyam and Carl A. Waldspurger
                 and Dan Boneh and Jeffrey Dwoskin and Dan R. K. Ports",
  title =        "{Overshadow}: a virtualization-based approach to
                 retrofitting protection in commodity operating
                 systems",
  journal =      j-SIGPLAN,
  volume =       "43",
  number =       "3",
  pages =        "2--13",
  month =        mar,
  year =         "2008",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/1346281.1346284",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Wed Jun 18 11:03:40 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Commodity operating systems entrusted with securing
                 sensitive data are remarkably large and complex, and
                 consequently, frequently prone to compromise. To
                 address this limitation, we introduce a
                 virtual-machine-based system called Overshadow that
                 protects the privacy and integrity of application data,
                 even in the event of a total OS compromise. Overshadow
                 presents an application with a normal view of its
                 resources, but the OS with an encrypted view. This
                 allows the operating system to carry out the complex
                 task of managing an application's resources, without
                 allowing it to read or modify them. Thus, Overshadow
                 offers a last line of defense for application
                 data.\par

                 Overshadow builds on multi-shadowing, a novel mechanism
                 that presents different views of 'physical' memory,
                 depending on the context performing the access. This
                 primitive offers an additional dimension of protection
                 beyond the hierarchical protection domains implemented
                 by traditional operating systems and processor
                 architectures.\par

                 We present the design and implementation of Overshadow
                 and show how its new protection semantics can be
                 integrated with existing systems. Our design has been
                 fully implemented and used to protect a wide range of
                 unmodified legacy applications running on an unmodified
                 Linux operating system. We evaluate the performance of
                 our implementation, demonstrating that this approach is
                 practical.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  keywords =     "cloaking; hypervisors; memory protection;
                 multi-shadowing; operating systems; virtual machine
                 monitors; VMM",
}

@Article{Chen:2008:RCE,
  author =       "Tzung-Her Chen and Wei-Bin Lee and Hsing-Bai Chen",
  title =        "A round- and computation-efficient three-party
                 authenticated key exchange protocol",
  journal =      j-J-SYST-SOFTW,
  volume =       "81",
  number =       "9",
  pages =        "1581--1590",
  month =        sep,
  year =         "2008",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:04 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Chen:2008:SNI,
  author =       "Chien-Chang Chen and Yu-Wei Chien",
  title =        "Sharing Numerous Images Secretly with Reduced
                 Possessing Load",
  journal =      j-FUND-INFO,
  volume =       "86",
  number =       "4",
  pages =        "447--458",
  month =        oct,
  year =         "2008",
  CODEN =        "FUMAAJ",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:07:17 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Cheon:2008:PST,
  author =       "Jung Hee Cheon and Nicholas Hopper and Yongdae Kim and
                 Ivan Osipkov",
  title =        "Provably {Secure Timed-Release Public Key
                 Encryption}",
  journal =      j-TISSEC,
  volume =       "11",
  number =       "2",
  pages =        "4:1--4:??",
  month =        mar,
  year =         "2008",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1330332.1330336",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 12 17:52:41 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "A timed-release cryptosystem allows a sender to
                 encrypt a message so that only the intended recipient
                 can read it only after a specified time. We formalize
                 the concept of a secure timed-release public-key
                 cryptosystem and show that, if a third party is relied
                 upon to guarantee decryption after the specified date,
                 this concept is equivalent to identity-based
                 encryption; this explains the observation that all
                 known constructions use identity-based encryption to
                 achieve timed-release security. We then give several
                 provably-secure constructions of timed-release
                 encryption: a generic scheme based on any
                 identity-based encryption scheme, and two more
                 efficient schemes based on the existence of
                 cryptographically admissible bilinear mappings. The
                 first of these is essentially as efficient as the
                 Boneh--Franklin Identity-Based encryption scheme, and
                 is provably secure and authenticated in the random
                 oracle model; the final scheme is not authenticated but
                 is provably secure in the standard model (i. e. ,
                 without random oracles).",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "authenticated encryption; key-insulated encryption;
                 timed-release",
}

@Article{Chevalier:2008:CRS,
  author =       "Yannick Chevalier and Ralf K{\"u}sters and Micha{\"e}l
                 Rusinowitch and Mathieu Turuani",
  title =        "Complexity results for security protocols with
                 {Diffie--Hellman} exponentiation and commuting public
                 key encryption",
  journal =      j-TOCL,
  volume =       "9",
  number =       "4",
  pages =        "24:1--24:??",
  month =        aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1380572.1380573",
  ISSN =         "1529-3785 (print), 1557-945X (electronic)",
  ISSN-L =       "1529-3785",
  bibdate =      "Fri Aug 29 14:02:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tocl/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We show that the insecurity problem for protocols with
                 modular exponentiation and arbitrary products allowed
                 in exponents is NP-complete. This result is based on a
                 protocol and intruder model which is powerful enough to
                 uncover known attacks on the Authenticated Group
                 Diffie--Hellman (A-GDH.2) protocol suite. To prove our
                 results, we develop a general framework in which the
                 Dolev--Yao intruder is extended by generic intruder
                 rules. This framework is also applied to obtain
                 complexity results for protocols with commuting public
                 key encryption.",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Transactions on Computational Logic",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J773",
  keywords =     "algebraic properties; complexity; Diffie--Hellman
                 exponentiation; Dolev--Yao model; protocols",
}

@Article{Chiang:2008:CPB,
  author =       "Yung-Kuei Chiang and Piyu Tsai and Feng-Long Huang",
  title =        "Codebook Partition Based Steganography without Member
                 Restriction",
  journal =      j-FUND-INFO,
  volume =       "82",
  number =       "1--2",
  pages =        "15--27",
  month =        jul,
  year =         "2008",
  CODEN =        "FUMAAJ",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:06:23 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Chien:2008:EPA,
  author =       "H. Y. Chien",
  title =        "Efficient and Practical Approach to Authenticating
                 Public Terminals",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "30",
  number =       "4",
  pages =        "319--324",
  year =         "2008",
  DOI =          "https://doi.org/10.1080/1206212X.2008.11441911",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:25:20 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.1080/1206212X.2008.11441911",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "11 Jul 2015",
}

@Article{Chien:2008:PAUa,
  author =       "Hung-Yu Chien",
  title =        "Practical anonymous user authentication scheme with
                 security proof",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "216--223",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:11 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000291",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chien:2008:PAUb,
  author =       "Hung-Yu Chien",
  title =        "Practical anonymous user authentication scheme with
                 security proof",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "216--223",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000291",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chien:2008:PAUc,
  author =       "Hung-Yu Chien",
  title =        "Practical anonymous user authentication scheme with
                 security proof",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "216--223",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000291",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chien:2008:SCA,
  author =       "Hung-Yu Chien",
  title =        "Selectively Convertible Authenticated Encryption in
                 the Random Oracle Model",
  journal =      j-COMP-J,
  volume =       "51",
  number =       "4",
  pages =        "419--434",
  month =        jul,
  year =         "2008",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxm090",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Apr 28 14:33:34 MDT 2010",
  bibsource =    "http://comjnl.oxfordjournals.org/content/vol51/issue4/index.dtl;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://comjnl.oxfordjournals.org/cgi/content/abstract/51/4/419;
                 http://comjnl.oxfordjournals.org/cgi/content/full/51/4/419;
                 http://comjnl.oxfordjournals.org/cgi/reprint/51/4/419",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Cho:2008:DNP,
  author =       "Young H. Cho and William H. Mangione-Smith",
  title =        "Deep network packet filter design for reconfigurable
                 devices",
  journal =      j-TECS,
  volume =       "7",
  number =       "2",
  pages =        "21:1--21:??",
  month =        feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1331331.1331345",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Jun 12 15:22:00 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Most network routers and switches provide some
                 protection against the network attacks. However, the
                 rapidly increasing amount of damages reported over the
                 past few years indicates the urgent need for tougher
                 security. Deep-packet inspection is one of the
                 solutions to capture packets that can not be identified
                 using the traditional methods. It uses a list of
                 signatures to scan the entire content of the packet,
                 providing the means to filter harmful packets out of
                 the network. Since one signature does not depend on the
                 other, the filtering process has a high degree of
                 parallelism. Most software and hardware deep-packet
                 filters that are in use today execute the tasks under
                 Von Neuman architecture. Such architecture can not
                 fully take advantage of the parallelism. For instance,
                 one of the most widely used network intrusion-detection
                 systems, Snort, configured with 845 patterns, running
                 on a dual 1-GHz Pentium III system, can sustain a
                 throughput of only 50 Mbps. The poor performance is
                 because of the fact that the processor is programmed to
                 execute several tasks sequentially instead of
                 simultaneously. We designed scalable deep-packet
                 filters on field-programmable gate arrays (FPGAs) to
                 search for all data-independent patterns
                 simultaneously. With FPGAs, we have the ability to
                 reprogram the filter when there are any changes to the
                 signature set. The smallest full-pattern matcher
                 implementation for the latest Snort NIDS fits in a
                 single 400k Xilinx FPGA (Spartan 3-XC3S400) with a
                 sustained throughput of 1.6 Gbps. Given a larger FPGA,
                 the design can scale linearly to support a greater
                 number of patterns, as well as higher data
                 throughput.",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J840",
  keywords =     "firewall; network intrusion detection; string filter;
                 virus; worm",
}

@Article{Choo:2008:PLP,
  author =       "Kim-Kwang Raymond Choo",
  title =        "Privacy on the Line: The Politics of Wiretapping and
                 Encryption, Updated and Expanded Edition",
  journal =      j-COMP-J,
  volume =       "51",
  number =       "6",
  pages =        "744",
  month =        nov,
  year =         "2008",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxn026",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Apr 28 14:33:34 MDT 2010",
  bibsource =    "http://comjnl.oxfordjournals.org/content/vol51/issue6/index.dtl;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://comjnl.oxfordjournals.org/cgi/content/full/51/6/744;
                 http://comjnl.oxfordjournals.org/cgi/reprint/51/6/744",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@PhdThesis{Chowdhury:2008:CBG,
  author =       "Milton M. Chowdhury",
  title =        "Cryptanalysis of braid group based protocols",
  type =         "Thesis ({MPhil})",
  school =       "Faculty of Engineering and Physical Sciences,
                 University of Manchester",
  address =      "Manchester, UK",
  pages =        "230",
  year =         "2008",
  bibdate =      "Fri May 13 05:55:49 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Chu:2008:EOT,
  author =       "C.-K. Chu and W.-G. Tzeng",
  title =        "Efficient $k$-out-of-$n$ Oblivious Transfer Schemes",
  journal =      j-J-UCS,
  volume =       "14",
  number =       "3",
  pages =        "397--415",
  month =        "????",
  year =         "2008",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Thu Jul 10 06:41:41 MDT 2008",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_14_3/efficient_k_out_of",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
  keywords =     "cryptography",
}

@Book{Cox:2008:DWS,
  author =       "I. J. (Ingemar J.) Cox and Matthew L. Miller and
                 Jeffrey A. Bloom and Jessica Fridrich and Ton Kalker",
  title =        "Digital Watermarking and Steganography",
  publisher =    pub-MORGAN-KAUFMANN,
  address =      pub-MORGAN-KAUFMANN:adr,
  edition =      "Second",
  pages =        "xxviii + 593",
  year =         "2008",
  ISBN =         "0-12-372585-2 (casebound)",
  ISBN-13 =      "978-0-12-372585-1 (casebound)",
  LCCN =         "QA76.9.A25 C68 2008",
  bibdate =      "Fri Aug 15 11:29:08 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "The Morgan Kaufmann series in multimedia information
                 and systems; The Morgan Kaufmann series in computer
                 security",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0808/2007040595-d.html;
                 http://www.loc.gov/catdir/toc/ecip081/2007040595.html",
  abstract =     "Digital audio, video, images, and documents are flying
                 through cyberspace to their respective owners.
                 Unfortunately, along the way, individuals may choose to
                 intervene and take this content for themselves. Digital
                 watermarking and steganography technology greatly
                 reduces the instances of this by limiting or
                 eliminating the ability of third parties to decipher
                 the content that he has taken. The many techiniques of
                 digital watermarking (embedding a code) and
                 steganography (hiding information) continue to evolve
                 as applications that necessitate them do the same. The
                 authors of this second edition provide an update on the
                 framework for applying these techniques that they
                 provided researchers and professionals in the first
                 well-received edition. Steganography and steganalysis
                 (the art of detecting hidden information) have been
                 added to a robust treatment of digital watermarking, as
                 many in each field research and deal with the other.
                 New material includes watermarking with side
                 information, QIM, and dirty-paper codes. The revision
                 and inclusion of new material by these influential
                 authors has created a must-own book for anyone in this
                 profession. This new edition now contains essential
                 information on steganalysis and steganography. New
                 concepts and new applications including QIM introduced
                 digital watermark embedding is given a complete update
                 with new processes and applications.",
  acknowledgement = ack-nhfb,
  remark =       "Prev. ed. entered under Cox.",
  subject =      "Computer security; Digital watermarking; Data
                 protection",
  tableofcontents = "Cover \\
                 Contents \\
                 Preface to the First Edition \\
                 Preface to the Second Edition \\
                 Example Watermarking Systems \\
                 Chapter 1. Introduction \\
                 1.1 Information Hiding, Steganography, and Watermarking
                 \\
                 1.2 History of Watermarking \\
                 1.3 History of Steganography \\
                 1.4 Importance of Digital Watermarking \\
                 1.5 Importance of Steganography \\
                 Chapter 2. Applications and Properties \\
                 2.1 Applications of Watermarking \\
                 2.2 Applications of Steganography \\
                 2.3 Properties of Watermarking Systems \\
                 2.4 Evaluating Watermarking Systems \\
                 2.5 Properties of Steganographic and Steganalysis
                 Systems \\
                 2.6 Evaluating and Testing Steganographic Systems \\
                 2.7 Summary \\
                 Chapter 3. Models of Watermarking \\
                 3.1 Notation \\
                 3.2 Communications \\
                 3.3 Communication-Based Models of Watermarking \\
                 3.4 Geometric Models of Watermarking \\
                 3.5 Modeling Watermark Detection by Correlation \\
                 3.6 Summary \\
                 Chapter 4. Basic Message Coding \\
                 4.1 Mapping Messages into Message Vectors \\
                 4.2 Error Correction Coding \\
                 4.3 Detecting Multisymbol Watermarks \\
                 4.4 Summary \\
                 Chapter 5. Watermarking with Side Information \\
                 5.1 Informed Embedding \\
                 5.2 Watermarking Using Side Information \\
                 5.3 Dirty-Paper Codes \\
                 5.4 Summary \\
                 Chapter 6. Practical Dirty-Paper Codes \\
                 6.1 Practical Considerations for Dirty-Paper Codes \\
                 6.2 Broad Approaches to Dirty-Paper Code Design \\
                 6.3 Implementing DM with A Simple Lattice Code \\
                 6.4 Typical Tricks in Implementing Lattice Codes \\
                 6.5 Coding with Better Lattices \\
                 6.6 Making Lattice Codes Survive Valumetric Scaling \\
                 6.7 Dirty-Paper Trellis Codes \\
                 6.8 Summary \\
                 Chapter 7. Analyzing Errors \\
                 7.1 Message Errors \\
                 7.2 False Positive Errors \\
                 7.3 False Negative Errors \\
                 7.4 ROC Curves \\
                 7.5 The Effect of Whitening on Error Rates \\
                 7.6 Analysis of Normalized Correlation \\
                 7.7 Summary \\
                 Chapter 8. Using Perceptual Models \\
                 8.1 Evaluating Perceptual Impact of Watermarks \\
                 8.2 General Form of A Perceptual Model \\
                 8.3 Two Examples of Perceptual Models \\
                 8.4 Perceptually Adaptive Watermarking \\
                 8.5 Summary \\
                 Chapter 9. Robust Watermarking \\
                 9.1 Approaches \\
                 9.2 Robustness to Valumetric Distortions \\
                 9.3 Robustness to Temporal and Geometric Distortions
                 \\
                 9.4 Summary \\
                 Chapter 10. Watermark Security \\
                 10.1 Security Requirements \\
                 10.2 Watermark Security and Cryptography \\
                 10.3 Some Significant Known Attacks \\
                 10.4 Summary \\
                 Chapter 11. Content Authentication \\
                 11.1 Exact Authentication \\
                 11.2 Selective Authentication \\
                 11.3 Localization \\
                 11.4 Restoration \\
                 11.5 Summary \\
                 Chapter 12. Steganography \\
                 12.1 Steganographic Communication \\
                 12.2 Notation and Terminology \\
                 12.3 Information-Theoretic Foundations of Steganography
                 \\
                 12.4 Practical Steganographic Methods \\
                 12.5 Minimizing the Embedding Impact \\
                 12.6 Summary \\
                 Chapter 13. Steganalysis \\
                 13.1 Steganalysis Scenarios \\
                 13.2 Some Significant Steganographic Algorithms \\
                 13.3 Summary \\
                 Appendix A: Background concepts \\
                 A.1 Information Theory \\
                 A.2 Coding Theory \\
                 A.3 Cryptography \\
                 Appendix B: Selected Theoretical Results \\
                 B.1 Information-theoretic Analysis of Watermarking
                 (Moulin and O'Sullivan) \\
                 B.2 Error Probabilites Uising Normalized Correlation
                 Detectors (Miller and Bloom) \\
                 B.3 Effect of Quantization Noise on Watermarks (Eggers
                 and Girod) \\
                 Appendix C: Notation and Common Variables \\
                 Glossary \\
                 References \\
                 Index \\
                 About the Authors",
}

@InProceedings{Czeskis:2008:DED,
  author =       "Alexei Czeskis and David J. {St. Hilaire} and Karl
                 Koscher and Steven D. Gribble and Tadayoshi Kohno and
                 Bruce Schneier",
  editor =       "????",
  booktitle =    "{Proceedings of the 3rd Conference on Hot Topics in
                 Security, 2008}",
  title =        "Defeating encrypted and deniable file systems:
                 {Truecrypt V5}.1a and the case of the tattling {OS} and
                 applications",
  publisher =    "????",
  address =      "????",
  pages =        "??--??",
  year =         "2008",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 11:45:43 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 21]{Schneier:2015:SWC}.",
}

@Article{Damgaard:2008:CBQ,
  author =       "Ivan B. Damg{\aa}rd and Serge Fehr and Louis Salvail
                 and Christian Schaffner",
  title =        "Cryptography in the Bounded-Quantum-Storage Model",
  journal =      j-SIAM-J-COMPUT,
  volume =       "37",
  number =       "6",
  pages =        "1865--1890",
  month =        "????",
  year =         "2008",
  CODEN =        "SMJCAT",
  DOI =          "",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Tue May 18 08:21:53 MDT 2010",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/37/6;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Article{Das:2008:BQC,
  author =       "S. R. Das",
  title =        "Breaking Quantum Cryptography's 150-Kilometer Limit
                 [Update]",
  journal =      j-IEEE-SPECTRUM,
  volume =       "45",
  number =       "9",
  pages =        "15--15",
  month =        sep,
  year =         "2008",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2008.4607918",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Cryptography; Dielectric substrates; Glass;
                 International Space Station; Lead compounds;
                 Microelectronics; Quantum entanglement; Satellites;
                 Space stations; Temperature",
}

@InProceedings{Delaune:2008:FAP,
  author =       "St{\'e}phanie Delaune and Steve Kremer and Graham
                 Steel",
  editor =       "????",
  booktitle =    "{IEEE Computer Security Foundations Symposium}",
  title =        "Formal analysis of {PKCS\#11}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "331--344",
  year =         "2008",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 11:49:05 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 25]{Schneier:2015:SWC}.",
}

@Article{denHartog:2008:TMC,
  author =       "Jerry den Hartog",
  title =        "Towards mechanized correctness proofs for
                 cryptographic algorithms: {Axiomatization} of a
                 probabilistic {Hoare} style logic",
  journal =      j-SCI-COMPUT-PROGRAM,
  volume =       "74",
  number =       "1--2",
  pages =        "52--63",
  day =          "1",
  month =        dec,
  year =         "2008",
  CODEN =        "SCPGD4",
  ISSN =         "0167-6423 (print), 1872-7964 (electronic)",
  ISSN-L =       "0167-6423",
  bibdate =      "Fri Apr 1 18:39:23 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01676423",
  acknowledgement = ack-nhfb,
  fjournal =     "Science of Computer Programming",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01676423",
}

@Book{Dewson:2008:BSS,
  author =       "Robin Dewson",
  title =        "Beginning {SQL Server 2008} for developers: from
                 novice to professional; [the quick and efficient path
                 to proficiency in {SQL Server 2008}]",
  publisher =    pub-APRESS,
  address =      pub-APRESS:adr,
  pages =        "xxiv + 471",
  year =         "2008",
  DOI =          "https://doi.org/10.1007/978-1-4302-0584-5",
  ISBN =         "1-59059-958-6",
  ISBN-13 =      "978-1-59059-958-7",
  LCCN =         "????",
  bibdate =      "Tue Oct 28 16:10:58 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.gbv.de:20011/gvk",
  series =       "The expert's voice in SQL Server",
  acknowledgement = ack-nhfb,
  subject =      "Data structures (Computer science); Computer Science;
                 Data Structures, Cryptology and Information Theory",
}

@Article{Dimitrov:2008:DBN,
  author =       "Vassil Dimitrov and Laurent Imbert and Pradeep K.
                 Mishra",
  title =        "The double-base number system and its application to
                 elliptic curve cryptography",
  journal =      j-MATH-COMPUT,
  volume =       "77",
  number =       "262",
  pages =        "1075--1104",
  month =        apr,
  year =         "2008",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (print), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Tue Jul 8 06:24:28 MDT 2008",
  bibsource =    "http://www.ams.org/mcom/2008-77-262;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.ams.org/mcom/2008-77-262/S0025-5718-07-02048-0/home.html;
                 http://www.ams.org/mcom/2008-77-262/S0025-5718-07-02048-0/S0025-5718-07-02048-0.dvi;
                 http://www.ams.org/mcom/2008-77-262/S0025-5718-07-02048-0/S0025-5718-07-02048-0.pdf;
                 http://www.ams.org/mcom/2008-77-262/S0025-5718-07-02048-0/S0025-5718-07-02048-0.ps",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
}

@TechReport{Dinur:2008:CAT,
  author =       "Itai Dinur and Adi Shamir",
  title =        "Cube Attacks on Tweakable Black Box Polynomials",
  type =         "Technical report",
  institution =  "Computer Science Department, The Weizmann Institute",
  address =      "Rehobot 76100, Israel",
  day =          "13",
  month =        sep,
  year =         "2008",
  bibdate =      "Tue Jan 13 13:46:55 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://cryptome.org/cube-attacks.pdf",
  abstract =     "Almost any cryptographic scheme can be described by
                 tweakable polynomials over GF(2), which contain both
                 secret variables (e.g., key bits) and public variables
                 (e.g., plaintext bits or IV bits). The cryptanalyst is
                 allowed to tweak the polynomials by choosing arbitrary
                 values for the public variables, and his goal is to
                 solve the resultant system of polynomial equations in
                 terms of their common secret variables. In this paper
                 we develop a new technique (called a cube attack) for
                 solving such tweakable polynomials, which is a major
                 improvement over several previously published attacks
                 of the same type. For example, on the stream cipher
                 Trivium with a reduced number of initialization rounds,
                 the best previous attack (due to Fischer, Khazaei, and
                 Meier) requires a barely practical complexity of 255 to
                 attack 672 initialization rounds, whereas a cube attack
                 can find the complete key of the same variant in 219
                 bit operations (which take less than a second on a
                 single PC). Trivium with 735 initialization rounds
                 (which could not be attacked by any previous technique)
                 can now be broken with 230 bit operations, and by
                 extrapolating our experimentally verified complexities
                 for various sizes, we have reasons to believe that cube
                 attacks will remain faster than exhaustive search even
                 for 1024 initialization rounds. Whereas previous
                 attacks were heuristic, had to be adapted to each
                 cryptosystem, had no general complexity bounds, and
                 were not expected to succeed on random looking
                 polynomials, cube attacks are provably successful when
                 applied to random polynomials of degree $d$ over $n$
                 secret variables whenever the number $m$ of public
                 variables exceeds $ d + \log_d n $. Their complexity is
                 $ 2^{d - 1n} + n^2 $ bit operations, which is
                 polynomial in $n$ and amazingly low when $d$ is small.
                 Cube attacks can be applied to any block cipher, stream
                 cipher, or MAC which is provided as a black box (even
                 when nothing is known about its internal structure) as
                 long as at least one output bit can be represented by
                 (an unknown) polynomial of relatively low degree in the
                 secret and public variables. In particular, they can be
                 easily and automatically combined with any type of side
                 channel attack that leaks some partial information
                 about the early stages of the encryption process (which
                 can typically be represented by a very low degree
                 polynomial), such as the Hamming weight of a byte
                 written into a register.",
  acknowledgement = ack-nhfb,
  keywords =     "algebraic attacks; cryptanalysis; cube attacks; side
                 channel attacks; stream ciphers; Trivium; tweakable
                 black box polynomials",
}

@Article{Dodis:2008:OFE,
  author =       "Y. Dodis and P. J. Lee and D. H. Yum",
  title =        "Optimistic Fair Exchange in a Multi-user Setting",
  journal =      j-J-UCS,
  volume =       "14",
  number =       "3",
  pages =        "318--346",
  month =        "????",
  year =         "2008",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Thu Jul 10 06:41:41 MDT 2008",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_14_3/optimistic_fair_exchange_in",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
  keywords =     "cryptography",
}

@InProceedings{Drutarovsky:2008:CSC,
  author =       "M. Drutarovsky and M. Varchola",
  booktitle =    "{2008. DDECS 2008. 11th IEEE Workshop on Design and
                 Diagnostics of Electronic Circuits and Systems}",
  title =        "Cryptographic System on a Chip based on {Actel ARM7}
                 Soft-Core with Embedded True Random Number Generator",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "1--6",
  year =         "2008",
  DOI =          "https://doi.org/10.1109/DDECS.2008.4538778",
  bibdate =      "Fri Jan 6 08:10:49 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4538778",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4534845",
}

@Article{Dujella:2008:VWA,
  author =       "Andrej Dujella",
  title =        "A variant of {Wiener}'s attack on {RSA} with small
                 secret exponent",
  journal =      j-ACM-COMM-COMP-ALGEBRA,
  volume =       "42",
  number =       "1--2",
  pages =        "50--51",
  month =        mar # "/" # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1394042.1394065",
  ISSN =         "1932-2232 (print), 1932-2240 (electronic)",
  ISSN-L =       "1932-2232",
  bibdate =      "Tue Aug 12 17:30:40 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Communications in Computer Algebra",
  keywords =     "cryptography",
}

@Article{Dunkelman:2008:TIV,
  author =       "Orr Dunkelman and Nathan Keller",
  title =        "Treatment of the initial value in {Time-Memory-Data
                 Tradeoff} attacks on stream ciphers",
  journal =      j-INFO-PROC-LETT,
  volume =       "107",
  number =       "5",
  pages =        "133--137",
  day =          "16",
  month =        aug,
  year =         "2008",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 15:53:08 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@InProceedings{Dziembowski:2008:LRC,
  author =       "S. Dziembowski and K. Pietrzak",
  title =        "Leakage-Resilient Cryptography",
  crossref =     "IEEE:2008:PAI",
  pages =        "293--302",
  year =         "2008",
  DOI =          "https://doi.org/10.1109/FOCS.2008.56",
  bibdate =      "Thu Apr 12 09:33:24 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2000.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4690923",
}

@Article{Elbirt:2008:AAI,
  author =       "A. J. Elbirt",
  title =        "Accelerated {AES} implementations via generalized
                 instruction set extensions",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "265--288",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16302",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:56 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Elmallah:2008:LK,
  author =       "Ehab S. Elmallah and Mohamed G. Gouda and Sandeep S.
                 Kulkarni",
  title =        "Logarithmic keying",
  journal =      j-TAAS,
  volume =       "3",
  number =       "4",
  pages =        "18:1--18:??",
  month =        nov,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1452001.1452008",
  ISSN =         "1556-4665 (print), 1556-4703 (electronic)",
  bibdate =      "Fri Apr 24 17:35:25 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Consider a communication network where each process
                 needs to securely exchange messages with its
                 neighboring processes. In this network, each sent
                 message is encrypted using one or more symmetric keys
                 that are shared only between two processes: the process
                 that sends the message and the neighboring process that
                 receives the message. A straightforward scheme for
                 assigning symmetric keys to the different processes in
                 such a network is to assign each process {\em O\/}
                 ({\em d\/}) keys, where {\em d\/} is the maximum number
                 of neighbors of any process in the network. In this
                 article, we present a more efficient scheme for
                 assigning symmetric keys to the different processes in
                 a communication network. This scheme, which is referred
                 to as logarithmic keying, assigns {\em O\/} (log {\em
                 d\/}) symmetric keys to each process in the network. We
                 show that logarithmic keying can be used in rich
                 classes of communication networks that include star
                 networks, acyclic networks, limited-cycle networks,
                 planar networks, and dense bipartite networks. In
                 addition, we present a construction that utilizes
                 efficient keying schemes for general bipartite networks
                 to construct efficient keying schemes for general
                 networks.",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Transactions on Autonomous and Adaptive Systems
                 (TAAS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1010",
  keywords =     "keying scheme; secure communications; symmetric keys",
}

@Book{Erickson:2008:HAE,
  author =       "Jon Erickson",
  title =        "Hacking: the art of exploitation",
  publisher =    pub-NO-STARCH,
  address =      pub-NO-STARCH:adr,
  edition =      "Second",
  pages =        "x + 472",
  year =         "2008",
  ISBN =         "1-59327-144-1",
  ISBN-13 =      "978-1-59327-144-2",
  LCCN =         "QA76.9.A25 E75 2008",
  bibdate =      "Wed Apr 30 17:57:44 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  URL =          "http://proquest.safaribooksonline.com/9781593271442",
  abstract =     "Hacking is the art of creative problem solving,
                 whether that means finding an unconventional solution
                 to a difficult problem or exploiting holes in sloppy
                 programming. Rather than merely showing how to run
                 existing exploits, Hacking: The Art of Exploitation,
                 2nd Edition author Jon Erickson explains how arcane
                 hacking techniques actually work. Using the included
                 Ubuntu LiveCD, get your hands dirty debugging code,
                 overflowing buffers, hijacking network communications,
                 bypassing protections, exploiting cryptographic
                 weaknesses, and perhaps even inventing new exploits.",
  acknowledgement = ack-nhfb,
  subject =      "computer security; computer hackers; computer
                 networks; security measures",
  tableofcontents = "1. Introduction \\
                 2. Programming \\
                 3. Exploitation \\
                 4. Networking \\
                 5. Shellcode \\
                 6. Countermeasures \\
                 7. Cryptology \\
                 8. Conclusion",
}

@Article{Fan:2008:RSB,
  author =       "Ming-Quan Fan and Hong-Xia Wang and Sheng-Kun Li",
  title =        "Restudy on {SVD}-based watermarking scheme",
  journal =      j-APPL-MATH-COMP,
  volume =       "203",
  number =       "2",
  pages =        "926--930",
  day =          "15",
  month =        sep,
  year =         "2008",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Fri Sep 3 10:53:23 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@InProceedings{Fortnow:2008:IIC,
  author =       "Lance Fortnow and Rahul Santhanam",
  title =        "Infeasibility of instance compression and succinct
                 {PCPs} for {NP}",
  crossref =     "ACM:2008:SPA",
  pages =        "133--142",
  year =         "2008",
  DOI =          "https://doi.org/10.1145/1374376.1374398",
  bibdate =      "Fri Jun 20 18:31:53 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The OR-SAT problem asks, given Boolean formulae $
                 \Phi_1, \ldots {}, \Phi_m $ each of size at most $n$,
                 whether at least one of the $ \Phi_i$'s is satisfiable.
                 We show that there is no reduction from OR-SAT to any
                 set A where the length of the output is bounded by a
                 polynomial in $n$, unless NP $ \subseteq $ coNP/poly,
                 and the Polynomial-Time Hierarchy collapses. This
                 result settles an open problem proposed by Bodlaender
                 et. al. [4] and Harnik and Naor [15] and has a number
                 of implications. A number of parametric NP problems,
                 including Satisfiability, Clique, Dominating Set and
                 Integer Programming, are not instance compressible or
                 polynomially kernelizable unless NP $ \subseteq $
                 coNP/poly. Satisfiability does not have PCPs of size
                 polynomial in the number of variables unless NP $
                 \subseteq $ coNP/poly. An approach of Harnik and Naor
                 to constructing collision-resistant hash functions from
                 one-way functions is unlikely to be viable in its
                 present form. (Buhrman-Hitchcock) There are no
                 subexponential-size hard sets for NP unless NP is in
                 co-NP/poly. We also study probabilistic variants of
                 compression, and show various results about and
                 connections between these variants. To this end, we
                 introduce a new strong derandomization hypothesis, the
                 Oracle Derandomization Hypothesis, and discuss how it
                 relates to traditional derandomization assumptions.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; instance compression; parameterized
                 complexity; polynomial hierarchy; succinct PCPs",
}

@Article{Fournet:2008:CSI,
  author =       "C{\'e}dric Fournet and Tamara Rezk",
  title =        "Cryptographically sound implementations for typed
                 information-flow security",
  journal =      j-SIGPLAN,
  volume =       "43",
  number =       "1",
  pages =        "323--335",
  month =        jan,
  year =         "2008",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/1328897.1328478",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Wed Jun 18 11:02:13 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "In language-based security, confidentiality and
                 integrity policies conveniently specify the permitted
                 flows of information between different parts of a
                 program with diverse levels of trust. These policies
                 enable a simple treatment of security, and they can
                 often be verified by typing. However, their enforcement
                 in concrete systems involves delicate compilation
                 issues.\par

                 We consider cryptographic enforcement mechanisms for
                 imperative programs with untrusted components. Such
                 programs may represent, for instance, distributed
                 systems connected by some untrusted network. In source
                 programs, security depends on an abstract
                 access-control policy for reading and writing the
                 shared memory. In their implementations, shared memory
                 is unprotected and security depends instead on
                 encryption and signing.\par

                 We build a translation from well-typed source programs
                 and policies to cryptographic implementations. To
                 establish its correctness, we develop a type system for
                 the target language. Our typing rules enforce a correct
                 usage of cryptographic primitives against active
                 adversaries; from an information-flow viewpoint, they
                 capture controlled forms of robust declassification and
                 endorsement. We show type soundness for a variant of
                 the non-interference property, then show that our
                 translation preserves typeability.\par

                 We rely on concrete primitives and hypotheses for
                 cryptography, stated in terms of probabilistic
                 polynomial-time algorithms and games. We model these
                 primitives as commands in our target language. Thus, we
                 develop a uniform language-based model of security,
                 ranging from computational non-interference for
                 probabilistic programs down to standard cryptographic
                 hypotheses.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  keywords =     "compilers; computational model; confidentiality;
                 cryptography; integrity; non-interference;
                 probabilistic programs; secure information flow; type
                 systems",
}

@Article{Galindo:2008:ICB,
  author =       "David Galindo and Paz Morillo and Carla R{\`a}fols",
  title =        "Improved certificate-based encryption in the standard
                 model",
  journal =      j-J-SYST-SOFTW,
  volume =       "81",
  number =       "7",
  pages =        "1218--1226",
  month =        jul,
  year =         "2008",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:04 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Galindo:2008:SPK,
  author =       "David Galindo and Javier Herranz",
  title =        "On the security of public key cryptosystems with a
                 double decryption mechanism",
  journal =      j-INFO-PROC-LETT,
  volume =       "108",
  number =       "5",
  pages =        "279--283",
  day =          "15",
  month =        nov,
  year =         "2008",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 15:53:16 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Gambino:2008:ITW,
  author =       "Nicola Gambino and Richard Garner",
  title =        "The identity type weak factorisation system",
  journal =      j-THEOR-COMP-SCI,
  volume =       "409",
  number =       "1",
  pages =        "94--109",
  day =          "6",
  month =        dec,
  year =         "2008",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Mar 28 21:21:44 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Ganeriwal:2008:STS,
  author =       "Saurabh Ganeriwal and Christina P{\"o}pper and Srdjan
                 {\v{C}}apkun and Mani B. Srivastava",
  title =        "Secure Time Synchronization in Sensor Networks",
  journal =      j-TISSEC,
  volume =       "11",
  number =       "4",
  pages =        "23:1--23:??",
  month =        jul,
  year =         "2008",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1380564.1380571",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Tue Aug 5 19:37:22 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Time synchronization is critical in sensor networks at
                 many layers of their design. It enables better
                 duty-cycling of the radio, accurate and secure
                 localization, beamforming, and other collaborative
                 signal processing tasks. These benefits make
                 time-synchronization protocols a prime target of
                 malicious adversaries who want to disrupt the normal
                 operation of a sensor network. In this article, we
                 analyze attacks on existing time synchronization
                 protocols for wireless sensor networks and we propose a
                 secure time synchronization toolbox to counter these
                 attacks. This toolbox includes protocols for secure
                 pairwise and group synchronization of nodes that either
                 lie in the neighborhood of each other or are separated
                 by multiple hops. We provide an in-depth analysis of
                 the security and the energy overhead of the proposed
                 protocols. The efficiency of these protocols has been
                 tested through an experimental study on Mica2 motes.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "delay; message authentication code; sensor networks;
                 time synchronization",
}

@Article{Ganti:2008:PAL,
  author =       "Ashwin Ganti",
  title =        "{Plan 9} authentication in {Linux}",
  journal =      j-OPER-SYS-REV,
  volume =       "42",
  number =       "5",
  pages =        "27--33",
  month =        jul,
  year =         "2008",
  CODEN =        "OSRED8",
  DOI =          "https://doi.org/10.1145/1400097.1400101",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Wed Aug 6 16:54:12 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux.bib;
                 https://www.math.utah.edu/pub/tex/bib/opersysrev.bib;
                 https://www.math.utah.edu/pub/tex/bib/plan9.bib;
                 https://www.math.utah.edu/pub/tex/bib/unix.bib",
  abstract =     "In Linux, applications like su and login currently run
                 as root in order to access authentication information
                 and set or alter the identity of the process. In such
                 cases, if the application is compromised while running
                 as a privileged user, the entire system can become
                 vulnerable. An alternative approach is taken by the
                 Plan 9 operating system from Bell Labs, which runs such
                 applications as a non-privileged user and relies on a
                 kernel-based capability device working in coordination
                 with an authentication server to provide the same
                 services. This avoids the risk of an application
                 vulnerability becoming a system vulnerability.\par

                 This paper discusses the extension of Linux
                 authentication mechanisms to allow the use of the Plan
                 9 approach with existing Linux applications in order to
                 reduce the security risks mentioned earlier. It
                 describes the port of the Plan 9 capability device as a
                 character device driver for the Linux kernel. It also
                 describes the port of the Plan 9 authentication server
                 and the implementation of a PAM module which allows the
                 use of these new facilities. {\em It is now possible to
                 restrain processes like login and su from the
                 uncontrolled setuid bit and make them run on behalf of
                 an unprivileged user in Linux}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGOPS Operating Systems Review",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J597",
  keywords =     "authentication",
}

@Article{Gassend:2008:CPR,
  author =       "Blaise Gassend and Marten {Van Dijk} and Dwaine Clarke
                 and Emina Torlak and Srinivas Devadas and Pim Tuyls",
  title =        "Controlled physical random functions and
                 applications",
  journal =      j-TISSEC,
  volume =       "10",
  number =       "4",
  pages =        "3:1--3:??",
  month =        jan,
  year =         "2008",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1284680.1284683",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 12 17:52:24 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "The cryptographic protocols that we use in everyday
                 life rely on the secure storage of keys in consumer
                 devices. Protecting these keys from invasive attackers,
                 who open a device to steal its key, is a challenging
                 problem. We propose controlled physical random
                 functions (CPUFs) as an alternative to storing keys and
                 describe the core protocols that are needed to use
                 CPUFs. A physical random functions (PUF) is a physical
                 system with an input and output. The functional
                 relationship between input and output looks like that
                 of a random function. The particular relationship is
                 unique to a specific instance of a PUF, hence, one
                 needs access to a particular PUF instance to evaluate
                 the function it embodies. The cryptographic
                 applications of a PUF are quite limited unless the PUF
                 is combined with an algorithm that limits the ways in
                 which the PUF can be evaluated; this is a CPUF. A major
                 difficulty in using CPUFs is that you can only know a
                 small set of outputs of the PUF---the unknown outputs
                 being unrelated to the known ones. We present protocols
                 that get around this difficulty and allow a chain of
                 trust to be established between the CPUF manufacturer
                 and a party that wishes to interact securely with the
                 PUF device. We also present some elementary
                 applications, such as certified execution.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "certified execution; physical random function;
                 physical security; physical unclonable function;
                 trusted computing",
}

@Article{Gaubatz:2008:SCD,
  author =       "G. Gaubatz and E. Savas and B. Sunar",
  title =        "Sequential Circuit Design for Embedded Cryptographic
                 Applications Resilient to Adversarial Faults",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "57",
  number =       "1",
  pages =        "126--138",
  month =        jan,
  year =         "2008",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2007.70784",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 12:17:39 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4358236",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@InProceedings{Gavinsky:2008:CIC,
  author =       "Dmitry Gavinsky",
  title =        "Classical interaction cannot replace a quantum
                 message",
  crossref =     "ACM:2008:SPA",
  pages =        "95--102",
  year =         "2008",
  DOI =          "https://doi.org/10.1145/1374376.1374393",
  bibdate =      "Fri Jun 20 18:31:53 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We demonstrate a two-player communication problem that
                 can be solved in the one-way quantum model by a 0-error
                 protocol of cost $ O(\log n) $ but requires
                 exponentially more communication in the classical
                 interactive (bounded error) model.",
  acknowledgement = ack-nhfb,
  keywords =     "communication complexity; quantum",
}

@Article{Gebotys:2008:EAW,
  author =       "Catherine H. Gebotys and Brian A. White",
  title =        "{EM} analysis of a wireless {Java}-based {PDA}",
  journal =      j-TECS,
  volume =       "7",
  number =       "4",
  pages =        "44:1--44:??",
  month =        jul,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1376804.1376812",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Tue Aug 5 19:32:59 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "The susceptibility of wireless portable devices to
                 electromagnetic (EM) attacks is largely unknown. If
                 analysis of electromagnetic (EM) waves emanating from
                 the wireless device during a cryptographic computation
                 do leak sufficient information, it may be possible for
                 an attacker to reconstruct the secret key. Possession
                 of the secret cryptographic key would render all future
                 wireless communications insecure and cause further
                 potential problems, such as identity theft. Despite the
                 complexities of a PDA wireless device, such as
                 operating system events, interrupts, cache misses, and
                 other interfering events, this article demonstrates
                 that, for the first time, repeatable EM differential
                 attacks are possible. The proposed differential
                 analysis methodology involves precharacterization of
                 the PDA device (thresholding and pattern recognition),
                 and a new frequency-based differential analysis. Unlike
                 previous research, the new methodology does not require
                 perfect alignment of EM frames and is repeatable in the
                 presence of a complex embedded system (including cache
                 misses, operating system events, etc), thus supporting
                 attacks on real embedded systems. This research is
                 important for future wireless embedded systems, which
                 will increasingly demand higher levels of security.",
  acknowledgement = ack-nhfb,
  articleno =    "44",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J840",
  keywords =     "countermeasures; EM analysis; power attacks;
                 Side-channel analysis",
}

@Article{Geng:2008:DSA,
  author =       "Xiutang Geng and Linqiang Pan and Jin Xu",
  title =        "A {DNA} sticker algorithm for bit-substitution in a
                 block cipher",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "68",
  number =       "9",
  pages =        "1201--1206",
  month =        sep,
  year =         "2008",
  CODEN =        "JPDCER",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Wed Sep 1 16:27:22 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/07437315",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@InProceedings{Gentry:2008:THL,
  author =       "Craig Gentry and Chris Peikert and Vinod
                 Vaikuntanathan",
  title =        "Trapdoors for hard lattices and new cryptographic
                 constructions",
  crossref =     "ACM:2008:SPA",
  pages =        "197--206",
  year =         "2008",
  DOI =          "https://doi.org/10.1145/1374376.1374407",
  bibdate =      "Fri Jun 20 18:31:53 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We show how to construct a variety of `trapdoor'
                 cryptographic tools assuming the worst-case hardness of
                 standard lattice problems (such as approximating the
                 length of the shortest nonzero vector to within certain
                 polynomial factors). Our contributions include a new
                 notion of trapdoor function with preimage sampling,
                 simple and efficient `hash-and-sign' digital signature
                 schemes, and identity-based encryption. A core
                 technical component of our constructions is an
                 efficient algorithm that, given a basis of an arbitrary
                 lattice, samples lattice points from a discrete
                 Gaussian probability distribution whose standard
                 deviation is essentially the length of the longest
                 Gram--Schmidt vector of the basis. A crucial security
                 property is that the output distribution of the
                 algorithm is oblivious to the particular geometry of
                 the given basis.",
  acknowledgement = ack-nhfb,
  keywords =     "lattice-based cryptography; trapdoor functions",
}

@Article{Goldberg:2008:PQM,
  author =       "Sharon Goldberg and David Xiao and Eran Tromer and
                 Boaz Barak and Jennifer Rexford",
  title =        "Path-quality monitoring in the presence of
                 adversaries",
  journal =      j-SIGMETRICS,
  volume =       "36",
  number =       "1",
  pages =        "193--204",
  month =        jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1384529.1375480",
  ISSN =         "0163-5999 (print), 1557-9484 (electronic)",
  ISSN-L =       "0163-5999",
  bibdate =      "Fri Jun 27 09:43:29 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Edge networks connected to the Internet need effective
                 monitoring techniques to drive routing decisions and
                 detect violations of Service Level Agreements (SLAs).
                 However, existing measurement tools, like ping,
                 traceroute, and trajectory sampling, are vulnerable to
                 attacks that can make a path look better than it really
                 is. In this paper, we design and analyze path-quality
                 monitoring protocols that reliably raise an alarm when
                 the packet-loss rate and delay exceed a threshold, even
                 when an adversary tries to bias monitoring results by
                 selectively delaying, dropping, modifying, injecting,
                 or preferentially treating packets.\par

                 Despite the strong threat model we consider in this
                 paper, our protocols are efficient enough to run at
                 line rate on high-speed routers. We present a secure
                 sketching protocol for identifying when packet loss and
                 delay degrade beyond a threshold. This protocol is
                 extremely lightweight, requiring only 250-600 bytes of
                 storage and periodic transmission of a comparably sized
                 IP packet to monitor billions of packets. We also
                 present secure sampling protocols that provide faster
                 feedback and accurate round-trip delay estimates, at
                 the expense of somewhat higher storage and
                 communication costs. We prove that all our protocols
                 satisfy a precise definition of secure path-quality
                 monitoring and derive analytic expressions for the
                 trade-off between statistical accuracy and system
                 overhead. We also compare how our protocols perform in
                 the client-server setting, when paths are asymmetric,
                 and when packet marking is not permitted.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGMETRICS Performance Evaluation Review",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J618",
  keywords =     "cryptography; path-quality monitoring; sampling;
                 sketching",
}

@Book{Goldstein:2008:BHO,
  author =       "Emmanuel Goldstein",
  title =        "The best of 2600: a hacker odyssey",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xvi + 871",
  year =         "2008",
  ISBN =         "0-470-29419-1 (cloth)",
  ISBN-13 =      "978-0-470-29419-2 (cloth)",
  LCCN =         "QA76.9.A25 G643 2008",
  bibdate =      "Wed Feb 17 16:56:18 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0833/2008018567-d.html;
                 http://www.loc.gov/catdir/enhancements/fy0833/2008018567-t.html",
  acknowledgement = ack-nhfb,
  subject =      "computer security; history; computer crimes; computer
                 hackers; telecommunication; security measures;
                 wiretapping",
}

@InProceedings{Goldwasser:2008:CAP,
  author =       "Shafi Goldwasser and Dan Gutfreund and Alexander Healy
                 and Tali Kaufman and Guy N. Rothblum",
  title =        "A (de)constructive approach to program checking",
  crossref =     "ACM:2008:SPA",
  pages =        "143--152",
  year =         "2008",
  DOI =          "https://doi.org/10.1145/1374376.1374399",
  bibdate =      "Fri Jun 20 18:31:53 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Program checking, program self-correcting and program
                 self-testing were pioneered by [Blum and Kannan] and
                 [Blum, Luby and Rubinfeld] in the mid eighties as a new
                 way to gain confidence in software, by considering
                 program correctness on an input by input basis rather
                 than full program verification. Work in the field of
                 program checking focused on designing, for specific
                 functions, checkers, testers and correctors which are
                 more efficient than the best program known for the
                 function. These were designed utilizing specific
                 algebraic, combinatorial or completeness properties of
                 the function at hand. In this work we introduce a novel
                 composition methodology for improving the efficiency of
                 program checkers. We use this approach to design a
                 variety of program checkers that are provably more
                 efficient, in terms of circuit depth, than the optimal
                 program for computing the function being checked.
                 Extensions of this methodology for the cases of program
                 testers and correctors are also presented. In
                 particular, we show: For all $ i \geq 1 $, every
                 language in RNC$^i$ (that is NCO-hard under
                 NCZ-reductions) has a program checker in RNC$^{i - 1}$.
                 In addition, for all $ i \geq 1 $, every language in
                 RNC$^i$ (that is NCO-hard under ACZ-reductions) has a
                 program corrector, tester and checker in RAC$^{i - 1}$.
                 This is the first time checkers are designed for a wide
                 class of functions characterized only by its
                 complexity, rather than by algebraic or combinatorial
                 properties. This characterization immediately yields
                 new and efficient checkers for languages such as graph
                 connectivity, perfect matching and bounded-degree graph
                 isomorphism. Constant-depth checkers, testers and
                 correctors for matrix multiplication, inversion,
                 determinant and rank. All previous program checkers,
                 testers and correctors for these problems run in nearly
                 logarithmic depth. Moreover, except for matrix
                 multiplication, they all require the use of the library
                 notion of [Blum-Luby-Rubinfeld], in which checkers have
                 access to a library of programs for various matrix
                 functions, rather than only having access to a program
                 for the function being checked. Furthermore, we provide
                 conditions under which program libraries can be
                 eliminated. Important ingredients in these results are
                 new and very efficient checkers for complete languages
                 in low complexity classes (e.g. NCO). These
                 constructions are based on techniques that were
                 developed in the field of cryptography.",
  acknowledgement = ack-nhfb,
  keywords =     "program checking; program correcting; program
                 testing",
}

@Article{Golle:2008:DCS,
  author =       "Philippe Golle and Frank McSherry and Ilya Mironov",
  title =        "Data Collection with Self-Enforcing Privacy",
  journal =      j-TISSEC,
  volume =       "12",
  number =       "2",
  pages =        "9:1--9:??",
  month =        dec,
  year =         "2008",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1455518.1455521.",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Tue Dec 23 11:58:14 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Consider a pollster who wishes to collect private,
                 sensitive data from a number of distrustful
                 individuals. How might the pollster convince the
                 respondents that it is trustworthy? Alternately, what
                 mechanism could the respondents insist upon to ensure
                 that mismanagement of their data is detectable and
                 publicly demonstrable?\par

                 We detail this problem, and provide simple data
                 submission protocols with the properties that a)
                 leakage of private data by the pollster results in
                 evidence of the transgression and b) the evidence
                 cannot be fabricated without breaking cryptographic
                 assumptions. With such guarantees, a responsible
                 pollster could post a ``privacy-bond,'' forfeited to
                 anyone who can provide evidence of leakage. The
                 respondents are assured that appropriate penalties are
                 applied to a leaky pollster, while the protection from
                 spurious indictment ensures that any honest pollster
                 has no disincentive to participate in such a scheme.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "data collection; privacy",
}

@Article{Goodrich:2008:NFI,
  author =       "Michael T. Goodrich and Roberto Tamassia and Danfeng
                 (Daphne) Yao",
  title =        "Notarized federated {ID} management and
                 authentication",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "399--418",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0324",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@InProceedings{Gordon:2008:CFS,
  author =       "Dov S. Gordon and Hazay Carmit and Jonathan Katz and
                 Yehuda Lindell",
  title =        "Complete fairness in secure two-party computation",
  crossref =     "ACM:2008:SPA",
  pages =        "413--422",
  year =         "2008",
  DOI =          "https://doi.org/10.1145/1374376.1374436",
  bibdate =      "Fri Jun 20 18:31:53 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "In the setting of secure two-party computation, two
                 mutually distrusting parties wish to compute some
                 function of their inputs while preserving, to the
                 extent possible, various security properties such as
                 privacy, correctness, and more. One desirable property
                 is fairness, which guarantees that if either party
                 receives its output, then the other party does too.
                 Cleve (STOC 1986) showed that complete fairness cannot
                 be achieved in general in the two-party setting;
                 specifically, he showed (essentially) that it is
                 impossible to compute Boolean XOR with complete
                 fairness. Since his work, the accepted folklore has
                 been that nothing non-trivial can be computed with
                 complete fairness, and the question of complete
                 fairness in secure two-party computation has been
                 treated as closed since the late '80s.\par

                 In this paper, we demonstrate that this widely held
                 folklore belief is false by showing completely-fair
                 secure protocols for various non-trivial two-party
                 functions including Boolean AND/OR as well as Yao's
                 `millionaires' problem'. Surprisingly, we show that it
                 is even possible to construct completely-fair protocols
                 for certain functions containing an `embedded XOR',
                 although in this case we also prove a lower bound
                 showing that a super-logarithmic number of rounds are
                 necessary. Our results demonstrate that the question of
                 completely-fair secure computation without an honest
                 majority is far from closed.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; fairness; secure computation",
}

@Article{Guneysu:2008:CC,
  author =       "T. Guneysu and T. Kasper and M. Novotny and C. Paar
                 and A. Rupp",
  title =        "Cryptanalysis with {COPACOBANA}",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "57",
  number =       "11",
  pages =        "1498--1513",
  month =        nov,
  year =         "2008",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2008.80",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 12:17:44 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4515858",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Guneysu:2008:SPH,
  author =       "Tim G{\"u}neysu and Christof Paar and Jan Pelzl",
  title =        "Special-Purpose Hardware for Solving the Elliptic
                 Curve Discrete Logarithm Problem",
  journal =      j-TRETS,
  volume =       "1",
  number =       "2",
  pages =        "8:1--8:??",
  month =        jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1371579.1371580",
  ISSN =         "1936-7406 (print), 1936-7414 (electronic)",
  ISSN-L =       "1936-7406",
  bibdate =      "Tue Nov 4 17:12:42 MST 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The resistance against powerful index-calculus attacks
                 makes Elliptic Curve Cryptosystems (ECC) an interesting
                 alternative to conventional asymmetric cryptosystems,
                 like RSA. Operands in ECC require significantly less
                 bits at the same level of security, resulting in a
                 higher computational efficiency compared to RSA. With
                 growing computational capabilities and continuous
                 technological improvements over the years, however, the
                 question of the security of ECC against attacks based
                 on special-purpose hardware arises. In this context,
                 recently emerged low-cost FPGAs demand for attention in
                 the domain of hardware-based cryptanalysis: the
                 extraordinary efficiency of modern programmable
                 hardware devices allow for a low-budget implementation
                 of hardware-based ECC attacks---without the requirement
                 of the expensive development of ASICs.\par

                 With focus on the aspect of cost-efficiency, this
                 contribution presents and analyzes an FPGA-based
                 architecture of an attack against ECC over prime
                 fields. A multi-processing hardware architecture for
                 Pollard's Rho method is described. We provide results
                 on actually used key lengths of ECC (128 bits and
                 above) and estimate the expected runtime for a
                 successful attack.\par

                 As a first result, currently used elliptic curve
                 cryptosystems with a security of 160 bit and above turn
                 out to be infeasible to break with available
                 computational and financial resources. However, some of
                 the security standards proposed by the Standards for
                 Efficient Cryptography Group (SECG) become subject to
                 attacks based on low-cost FPGAs.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Transactions on Reconfigurable Technology and
                 Systems (TRETS)",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J1151",
  keywords =     "cryptanalysis; discrete logarithm; elliptic curve
                 cryptosystem; Pollard's rho",
}

@InProceedings{Gupta:2008:FAT,
  author =       "Manish Gupta and Amit Pathak and Soumen Chakrabarti",
  editor =       "{ACM}",
  booktitle =    "International World Wide Web Conference Proceeding of
                 the 17th international conference on World Wide Web",
  title =        "Fast algorithms for top-$k$ personalized {PageRank}
                 queries",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "1225--1226",
  year =         "2008",
  DOI =          "https://doi.org/10.1145/775152.775191",
  ISBN =         "1-60558-085-6",
  ISBN-13 =      "978-1-60558-085-2",
  LCCN =         "????",
  bibdate =      "Sat May 8 18:33:09 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/pagerank.bib",
  abstract =     "In entity-relation (ER) graphs $ (V, E) $, nodes $V$
                 represent typed entities and edges $E$ represent typed
                 relations. For dynamic personalized PageRank queries,
                 nodes are ranked by their steady-state probabilities
                 obtained using the standard random surfer model. In
                 this work, we propose a framework to answer top-$k$
                 graph conductance queries. Our top-$k$ ranking
                 technique leads to a 4$ \times $ speedup, and overall,
                 our system executes queries 200-1600$ \times $ faster
                 than whole-graph PageRank. Some queries might contain
                 hard predicates i.e. predicates that must be satisfied
                 by the answer nodes. E.g. we may seek authoritative
                 papers on public key cryptography, but only those
                 written during 1997. We extend our system to handle
                 hard predicates. Our system achieves these substantial
                 query speedups while consuming only 10--20\% of the
                 space taken by a regular text index.",
  acknowledgement = ack-nhfb,
  keywords =     "HubRank; node-deletion; pagerank; personalized;
                 top-$k$",
}

@TechReport{Halderman:2008:LWRa,
  author =       "J. Alex Halderman and Seth D. Schoen and Nadia
                 Heninger and William Clarkson and William Paul and
                 Joseph A. Calandrino and Ariel J. Feldman and Jacob
                 Appelbaum and Edward W. Felten",
  title =        "Lest We Remember: Cold Boot Attacks on Encryption
                 Keys",
  type =         "Technical report",
  institution =  "Princeton University",
  address =      "Princeton, NJ, USA",
  pages =        "22",
  day =          "21",
  month =        feb,
  year =         "2008",
  bibdate =      "Fri Feb 22 17:51:32 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://citp.princeton.edu.nyud.net/pub/coldboot.pdf",
  abstract =     "Contrary to popular assumption, DRAMs used in most
                 modern computers retain their contents for seconds to
                 minutes after power is lost, even at room temperature
                 and even if removed from a motherboard. Although DRAMs
                 become less reliable when they are not refreshed, they
                 are not immediately erased, and their contents persist
                 sufficiently for malicious (or forensic) acquisition of
                 usable full-system memory images. We show that this
                 phenomenon limits the ability of an operating system to
                 protect cryptographic key material from an attacker
                 with physical access. We use cold reboots to mount
                 successful attacks on popular disk encryption systems
                 using no special devices or materials. We
                 experimentally characterize the extent and
                 predictability of memory remanence and report that
                 remanence times can be increased dramatically with
                 simple techniques. We offer new algorithms for finding
                 cryptographic keys in memory images and for correcting
                 errors caused by bit decay. Though we discuss several
                 strategies for partially mitigating these risks, we
                 know of no simple remedy that would eliminate them.",
  acknowledgement = ack-nhfb,
}

@InProceedings{Halderman:2008:LWRb,
  author =       "J. Alex Halderman and Seth D. Schoen and Nadia
                 Heninger and William Clarkson and William Paul and
                 Joseph A. Calandrino and Ariel J. Feldman and Jacob
                 Appelbaum and Edward W. Felten",
  editor =       "????",
  booktitle =    "Usenix Security",
  title =        "Lest we remember: cold-boot attacks on encryption
                 keys",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  pages =        "??--??",
  year =         "2008",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 12:06:03 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 40]{Schneier:2015:SWC}.",
}

@Article{Han:2008:PBPa,
  author =       "Song Han and Elizabeth Chang and Tharam Dillon",
  title =        "Pairing-based public-key encryption schemes with
                 backward-and-forward security",
  journal =      j-INT-J-COMPUT-SYST-SCI-ENG,
  volume =       "23",
  number =       "1",
  pages =        "??--??",
  month =        jan,
  year =         "2008",
  CODEN =        "CSSEEI",
  ISSN =         "0267-6192",
  bibdate =      "Tue Dec 03 12:39:15 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsystscieng.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Systems Science and
                 Engineering",
  remark =       "Special issue: Privacy Data Management",
}

@Article{Han:2008:PBPb,
  author =       "Song Han and Elizabeth Chang and Tharam Dillon",
  title =        "Pairing-based public-key encryption schemes with
                 backward-and-forward security",
  journal =      j-INT-J-COMPUT-SYST-SCI-ENG,
  volume =       "23",
  number =       "4",
  pages =        "??--??",
  month =        jul,
  year =         "2008",
  CODEN =        "CSSEEI",
  ISSN =         "0267-6192",
  bibdate =      "Tue Dec 03 12:42:19 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsystscieng.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Systems Science and
                 Engineering",
  remark =       "Special issue: Privacy Data Management",
}

@Article{Hemaspaandra:2008:EDA,
  author =       "Lane A. Hemaspaandra and J{\"o}rg Rothe and Amitabh
                 Saxena",
  title =        "Enforcing and defying associativity, commutativity,
                 totality, and strong noninvertibility for worst-case
                 one-way functions",
  journal =      j-THEOR-COMP-SCI,
  volume =       "401",
  number =       "1--3",
  pages =        "27--35",
  day =          "23",
  month =        jul,
  year =         "2008",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Mar 28 21:21:38 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Book{Higgins:2008:NSC,
  author =       "Peter M. Higgins",
  title =        "Number story: from counting to cryptography",
  publisher =    "Copernicus",
  address =      "New York, NY, USA",
  pages =        "323",
  year =         "2008",
  ISBN =         "1-84800-000-6 (hardcover), 1-84800-001-4 (ebook)",
  ISBN-13 =      "978-1-84800-000-1 (hardcover), 978-1-84800-001-8
                 (ebook)",
  LCCN =         "QA241 .H48 2008",
  bibdate =      "Wed Nov 26 22:46:29 MST 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/fy0804/2007936363.html",
  acknowledgement = ack-nhfb,
  subject =      "number theory",
}

@Book{Hoffstein:2008:IMC,
  author =       "Jeffrey Hoffstein and Jill Catherine Pipher and Joseph
                 H. Silverman",
  title =        "An Introduction to Mathematical Cryptography",
  volume =       "666",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xv + 523",
  year =         "2008",
  ISBN =         "0-387-77993-0 (hardcover)",
  ISBN-13 =      "978-0-387-77993-5 (hardcover)",
  LCCN =         "QA268 .H64 2008",
  bibdate =      "Thu Mar 22 12:29:21 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Undergraduate texts in mathematics",
  acknowledgement = ack-nhfb,
  subject =      "Coding theory; Cryptography; Mathematics",
  tableofcontents = "An introduction to cryptography \\
                 Discrete logarithms and Diffie-Hellman \\
                 Integer factorization and RSA \\
                 Combinatorics, probability, and information theory \\
                 Elliptic curves and cryptography \\
                 Lattices and cryptography \\
                 Digital signatures \\
                 Additional topics in cryptography",
}

@Article{Hongfeng:2008:ECP,
  author =       "Zhu Hongfeng and Liu Tianhua and Liu Jie",
  title =        "{EV-C2C-PAKE}: An improved client-to-client
                 password-authenticated key exchange protocol",
  journal =      j-INT-J-COMPUT-SYST-SCI-ENG,
  volume =       "23",
  number =       "3",
  pages =        "??--??",
  month =        may,
  year =         "2008",
  CODEN =        "CSSEEI",
  ISSN =         "0267-6192",
  bibdate =      "Tue Dec 03 12:41:11 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsystscieng.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Systems Science and
                 Engineering",
  remark =       "Special issue: Privacy Data Management",
}

@Article{Hu:2008:NNP,
  author =       "Yupu Hu and Baocang Wang and Wencai He",
  title =        "{NTRUSign} With a New Perturbation",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "54",
  number =       "7",
  pages =        "3216--3221",
  month =        jul,
  year =         "2008",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.2008.924662",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  bibdate =      "Thu Apr 21 10:57:48 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "NTRUSign, a digital signature scheme, is suffering an
                 effective attack. In this correspondence, we insert a
                 new perturbation into NTRUSign primitive. With the new
                 perturbation, each signature value is a linear
                 combination of the private keys, and the combination
                 coefficients have a hidden distribution. By a large
                 number of signatures, the attacker obtains the value of
                 some complicated function of the private keys. It
                 appears as hard problem computing the private keys from
                 this value. Our scheme is smaller in size, presents a
                 higher efficiency, and provides a clearer security
                 proof than NTRUSign with the old perturbation.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
  keywords =     "ANSI X9.98-2010; NTRUSign",
}

@Article{Huang:2008:NCK,
  author =       "Hui-Feng Huang and Chin-Chen Chang",
  title =        "A Novel Cryptographic Key Assignment Scheme with
                 {ID}-Based Access Control in a Hierachy",
  journal =      j-FUND-INFO,
  volume =       "84",
  number =       "3--4",
  pages =        "353--361",
  month =        sep,
  year =         "2008",
  CODEN =        "FUMAAJ",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:07:00 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Huffmire:2008:DSS,
  author =       "Ted Huffmire and Brett Brotherton and Nick Callegari
                 and Jonathan Valamehr and Jeff White and Ryan Kastner
                 and Tim Sherwood",
  title =        "Designing secure systems on reconfigurable hardware",
  journal =      j-TODAES,
  volume =       "13",
  number =       "3",
  pages =        "44:1--44:??",
  month =        jul,
  year =         "2008",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/1367045.1367053",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Tue Aug 5 18:41:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/todaes/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The extremely high cost of custom ASIC fabrication
                 makes FPGAs an attractive alternative for deployment of
                 custom hardware. Embedded systems based on
                 reconfigurable hardware integrate many functions onto a
                 single device. Since embedded designers often have no
                 choice but to use soft IP cores obtained from third
                 parties, the cores operate at different trust levels,
                 resulting in mixed-trust designs. The goal of this
                 project is to evaluate recently proposed security
                 primitives for reconfigurable hardware by building a
                 real embedded system with several cores on a single
                 FPGA and implementing these primitives on the system.
                 Overcoming the practical problems of integrating
                 multiple cores together with security mechanisms will
                 help us to develop realistic security-policy
                 specifications that drive enforcement mechanisms on
                 embedded systems.",
  acknowledgement = ack-nhfb,
  articleno =    "44",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems (TODAES)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
  keywords =     "Advanced Encryption Standard (AES); controlled
                 sharing; enforcement mechanisms; execution monitors;
                 Field programmable gate arrays (FPGAs); hardware
                 security; isolation; memory protection; reference
                 monitors; security policies; security primitives;
                 separation; static analysis; systems-on-a-chip (SoCs)",
}

@Article{Hwang:2008:CPK,
  author =       "Y. H. Hwang and J. K. Liu and S. S. Chow",
  title =        "Certificateless Public Key Encryption Secure against
                 Malicious {KGC} Attacks in the Standard Model",
  journal =      j-J-UCS,
  volume =       "14",
  number =       "3",
  pages =        "463--480",
  month =        "????",
  year =         "2008",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Thu Jul 10 06:41:41 MDT 2008",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_14_3/certificateless_public_key_encryption",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
  keywords =     "cryptography",
}

@Article{Inoue:2008:FAC,
  author =       "Hiroaki Inoue and Junji Sakai and Sunao Torii and
                 Masato Edahiro",
  title =        "{FIDES}: an advanced chip multiprocessor platform for
                 secure next generation mobile terminals",
  journal =      j-TECS,
  volume =       "8",
  number =       "1",
  pages =        "1:1--1:??",
  month =        dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1457246.1457247",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Tue Jan 6 14:36:01 MST 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We propose a secure platform on a chip multiprocessor,
                 FIDES, in order to enable next generation mobile
                 terminals to execute downloaded native applications for
                 Linux. Its most important feature is the higher
                 security based on multigrained separation mechanisms.
                 Four new technologies support the FIDES platform: bus
                 filter logic, XIP kernels, policy separation, and
                 dynamic access control. With these technologies, the
                 FIDES platform can tolerate both application-level and
                 kernel-level bugs on an actual download subsystem.
                 Thus, the best-suited platform to secure next
                 generation mobile terminals is FIDES.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J840",
  keywords =     "chip multiprocessor; Secure mobile terminal; SELinux",
}

@Article{Iqbal:2008:CDV,
  author =       "Razib Iqbal and Shervin Shirmohammadi and Abdulmotaleb
                 El Saddik and Jiying Zhao",
  title =        "Compressed-Domain Video Processing for Adaptation,
                 Encryption, and Authentication",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "15",
  number =       "2",
  pages =        "38--50",
  month =        apr # "\slash " # jun,
  year =         "2008",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/MMUL.2008.23",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Thu Jul 2 18:03:20 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Multimedia",
}

@InProceedings{Ishai:2008:CCC,
  author =       "Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky
                 and Amit Sahai",
  title =        "Cryptography with constant computational overhead",
  crossref =     "ACM:2008:SPA",
  pages =        "433--442",
  year =         "2008",
  DOI =          "https://doi.org/10.1145/1374376.1374438",
  bibdate =      "Fri Jun 20 18:31:53 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Current constructions of cryptographic primitives
                 typically involve a large multiplicative computational
                 overhead that grows with the desired level of security.
                 We explore the possibility of implementing basic
                 cryptographic primitives, such as encryption,
                 authentication, signatures, and secure two-party
                 computation, while incurring only a constant
                 computational overhead compared to insecure
                 implementations of the same tasks. Here we make the
                 usual security requirement that the advantage of any
                 polynomial-time attacker must be negligible in the
                 input length.\par

                 We obtain affirmative answers to this question for most
                 central cryptographic primitives under plausible,
                 albeit sometimes nonstandard, intractability
                 assumptions. We start by showing that
                 pairwise-independent hash functions can be computed by
                 linear-size circuits, disproving a conjecture of
                 Mansour, Nisan, and Tiwari (STOC 1990). This
                 construction does not rely on any unproven assumptions
                 and is of independent interest. Our hash functions can
                 be used to construct message authentication schemes
                 with constant overhead from any one-way function. Under
                 an intractability assumption that generalizes a
                 previous assumption of Alekhnovich (FOCS 2003), we get
                 (public and private key) encryption schemes with
                 constant overhead. Using an exponentially strong
                 version of the previous assumption, we get signature
                 schemes of similar complexity. Assuming the existence
                 of pseudorandom generators in NC $z$ with polynomial
                 stretch together with the existence of an (arbitrary)
                 oblivious transfer protocol, we get similar results for
                 the seemingly very complex task of secure two-party
                 computation. More concretely, we get general protocols
                 for secure two-party computation in the semi-honest
                 model in which the two parties can be implemented by
                 circuits whose size is a constant multiple of the size
                 $s$ of the circuit to be evaluated. In the malicious
                 model, we get protocols whose communication complexity
                 is a constant multiple of $s$ and whose computational
                 complexity is slightly super-linear in $s$. For natural
                 relaxations of security in the malicious model that are
                 still meaningful in practice, we can also keep the
                 computational complexity linear in $s$. These results
                 extend to the case of a constant number of parties,
                 where an arbitrary subset of the parties can be
                 corrupted.\par

                 Our protocols rely on non-black-box techniques, and
                 suggest the intriguing possibility that the ultimate
                 efficiency in this area of cryptography can be obtained
                 via such techniques.",
  acknowledgement = ack-nhfb,
  keywords =     "constant computational overhead; cryptography;
                 universal hashing",
}

@Article{Iwami:2008:AIA,
  author =       "Maki Iwami",
  title =        "An attack on improved algebraic surface public-key
                 cryptosystem (abstract only)",
  journal =      j-ACM-COMM-COMP-ALGEBRA,
  volume =       "42",
  number =       "1--2",
  pages =        "71--74",
  month =        mar # "/" # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1394042.1394083",
  ISSN =         "1932-2232 (print), 1932-2240 (electronic)",
  ISSN-L =       "1932-2232",
  bibdate =      "Tue Aug 12 17:30:40 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Public key cryptography is widely used because it
                 enables secure communication with a party accessing the
                 site for the first time. But it is widely known that
                 the quantum computers become available then the public
                 key cryptosystems based on the discrete logarithm
                 problem such as RSA cryptosystem and Elliptic Curve
                 cryptosystem will no longer be secure. To address these
                 issues, Akiyama-Goto algebraic Surface Public-key
                 Cryptosystem (ASC) was developed [1], and opened to
                 general public at website as a research news of Toshiba
                 corporation in 2005. Its security is based on a
                 decision randomizing polynomial problem which is
                 related to a problem of finding sections on fibered
                 algebraic surfaces. This problem can be reduced to
                 solving a multivariate equation system and it is known
                 to be NP-complete. In 2007, in the case that public-key
                 is in a certain form, Uchiyama and Tokunaga successed
                 to attack in the sense of getting plain text from
                 cipher text using reductions efficiently without
                 solving section finding problem [2].And the abstract is
                 introduced in CRYPTREC report 2006 [3] in the Appendix
                 Chapter, which is known to be the important report
                 related to e-Government recommended ciphers in Japan.
                 Note that, at this point, the cryptosystem can be used
                 safely if only we avoid to adopt using public key with
                 vulnerability in the key generation step. However, the
                 author suggested two algorithms applicable to all cases
                 [5] i.e. the cryptosystem is completely broken. One is
                 the generalization of Uchiyama-Tokunagas attack from
                 polynomial ring over IFp to polynomial ring over
                 rational function field. And the other takes advantages
                 of Gr{\"o}bner base techniques so as to deal with in
                 the polynomial ring over IFp. And in [6], the author
                 also suggested methods for calculating zero point of
                 the algebraic surface and a new attack utilizing it,
                 and the approach resulted in the difficulty of making a
                 suggestion of the invulnerable algebraic surface
                 public-key cryptosystem without changing ideas
                 progressively. On the other hand, Inanov-Volochs attack
                 using trace map [9] was developed. In these background,
                 Akiyama-Goto developed improved version of their
                 Algebraic surface public-key cryptosystem (improved
                 ASC) [8] on January 2008 [8] which has tolerance to
                 Uchiyama-Gotos attack using reduction and Volochs
                 attack using the trace map. Ivanov and Voloch suggested
                 the substitution attack briefly on improved ASC in
                 section 3 in [9], but the details are unspecified. In
                 section 2, the improved ASC is described, and then, in
                 section 3, a new reduction attack on the improved ASC
                 is presented.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Communications in Computer Algebra",
  keywords =     "cryptography",
}

@Article{Jankowski:2008:BRBb,
  author =       "Richard Jankowski",
  title =        "Book Review: {{\booktitle{Privacy on the Line: The
                 Politics of Wiretapping and Encryption}}, by Whitfield
                 Diffie and Susan Landau}",
  journal =      j-SIGACT,
  volume =       "39",
  number =       "4",
  pages =        "30--32",
  month =        dec,
  year =         "2008",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1466390.1466397",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 18:30:30 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See \cite{Diffie:1998:PLP,Diffie:2007:PLP}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Jankvist:2008:TMH,
  author =       "Uffe Thomas Jankvist",
  title =        "A teaching module on the history of public-key
                 cryptography and {RSA}",
  journal =      j-BSHM-BULL,
  volume =       "23",
  number =       "3",
  pages =        "157--168",
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1080/17498430802304032",
  ISSN =         "1749-8430 (print), 1749-8341 (electronic)",
  ISSN-L =       "1749-8341",
  bibdate =      "Tue Jun 20 11:40:31 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bshm.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.tandfonline.com/doi/full/10.1080/17498430802304032",
  acknowledgement = ack-nhfb,
  ajournal =     "BSHM Bull.",
  fjournal =     "BSHM Bulletin: Journal of the British Society for the
                 History of Mathematics",
  journal-URL =  "http://www.tandfonline.com/loi/tbsh20",
  onlinedate =   "06 Nov 2008",
}

@Article{Jeong:2008:PKE,
  author =       "I. R. Jeong and D. H. Lee",
  title =        "Parallel Key Exchange",
  journal =      j-J-UCS,
  volume =       "14",
  number =       "3",
  pages =        "377--396",
  month =        "????",
  year =         "2008",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Thu Jul 10 06:41:41 MDT 2008",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_14_3/parallel_key_exchange",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
  keywords =     "cryptography",
}

@Article{Jones:2008:RAA,
  author =       "Josh Jones",
  title =        "The {RSA} algorithm (abstract only)",
  journal =      j-ACM-COMM-COMP-ALGEBRA,
  volume =       "42",
  number =       "1--2",
  pages =        "74--74",
  month =        mar # "/" # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1394042.1394084",
  ISSN =         "1932-2232 (print), 1932-2240 (electronic)",
  ISSN-L =       "1932-2232",
  bibdate =      "Tue Aug 12 17:30:40 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "My project is a brief introduction for the RSA
                 Algorithm. This project will include a very brief
                 history of where RSA originated, as well as how the RSA
                 algorithm works. Following this, the mathematical proof
                 of RSA is presented along with the two necessary
                 theorems needed to prove RSA. The final portion of my
                 presentation includes some of the potential threats to
                 RSA and how to prevent these attacks, including a chart
                 of the strength of RSA based on time required to crack
                 RSA in MIPS-Years where the only factor is the size of
                 the key.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Communications in Computer Algebra",
  keywords =     "cryptography",
}

@Article{Kato:2008:QSC,
  author =       "Kentaro Kato and Osamu Hirota",
  editor =       "Ronald E. Meyers and Yanhua Shih and Keith S. Deacon",
  title =        "A quantum stream cipher by {Yuen 2000} protocol with
                 nonlinear random number generator",
  journal =      j-PROC-SPIE,
  volume =       "7092",
  number =       "1",
  pages =        "70920H",
  year =         "2008",
  CODEN =        "PSISDG",
  DOI =          "https://doi.org/10.1117/12.794584",
  ISSN =         "0277-786X (print), 1996-756X (electronic)",
  ISSN-L =       "0277-786X",
  bibdate =      "Mon Jan 16 15:57:34 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  note =         "Quantum Communications and Quantum Imaging VI.",
  URL =          "http://link.aip.org/link/?PSI/7092/70920H/1",
  acknowledgement = ack-nhfb,
  eid =          "70920H",
  fjournal =     "Proceedings of the SPIE --- The International Society
                 for Optical Engineering",
  location =     "San Diego, CA, USA",
  numpages =     "8",
}

@Book{Katz:2008:IMC,
  author =       "Jonathan Katz and Yehuda Lindell",
  title =        "Introduction to modern cryptography: Principles and
                 Protocols",
  publisher =    pub-CHAPMAN-HALL-CRC,
  address =      pub-CHAPMAN-HALL-CRC:adr,
  pages =        "xviii + 534",
  year =         "2008",
  ISBN =         "1-58488-551-3",
  ISBN-13 =      "978-1-58488-551-1",
  LCCN =         "QA76.9.A25 K36 2008",
  bibdate =      "Thu Mar 22 12:29:41 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Chapman and Hall/CRC cryptography and network
                 security",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0807/2007017861-d.html;
                 http://www.loc.gov/catdir/toc/ecip0716/2007017861.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Cryptography",
  tableofcontents = "I. Introduction and Classical Cryptography \\
                 1. Introduction \\
                 2. Perfectly-Secret Encryption \\
                 II. Private-Key (Symmetric) Cryptography \\
                 3. Private-Key Encryption and Pseudorandomness \\
                 4. Message Authentication Codes and Collision-Resistant
                 Hash Functions \\
                 5. Practical Constructions of Pseudorandom Permutations
                 (Block Ciphers) \\
                 6. Theoretical Constructions of Pseudorandom Objects
                 \\
                 III. Public-Key (Asymmetric) Cryptography \\
                 7. Number Theory and Cryptographic Hardness Assumptions
                 \\
                 8. Factoring and Computing Discrete Logarithms \\
                 9. Private-Key Management and the Public-Key Revolution
                 \\
                 10. Public-Key Encryption \\
                 11. Additional Public-Key Encryption Schemes \\
                 12. Digital Signature Schemes \\
                 13. Public-Key Cryptosystems in the Random Oracle Model
                 \\
                 A. Mathematical Background \\
                 B. Supplementary Algorithmic Number Theory",
}

@Article{Kausar:2008:SEK,
  author =       "Firdous Kausar and Sajid Hussain and Laurence T. Yang
                 and Ashraf Masood",
  title =        "Scalable and efficient key management for
                 heterogeneous sensor networks",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "45",
  number =       "1",
  pages =        "44--65",
  month =        jul,
  year =         "2008",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-008-0184-2",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Wed Jul 9 17:32:35 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=45&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0920-8542&volume=45&issue=1&spage=44",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
  keywords =     "Authentication; Heterogeneous sensor networks; Key
                 management; Random key predistribution; Security",
}

@Article{Kayem:2008:RCK,
  author =       "Anne V. D. M. Kayem and Selim G. Akl and Patrick
                 Martin",
  title =        "On replacing cryptographic keys in hierarchical key
                 management systems",
  journal =      j-J-COMP-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "289--309",
  month =        "????",
  year =         "2008",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-16303",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:23:56 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@InProceedings{Kol:2008:GEI,
  author =       "Gillat Kol and Moni Naor",
  title =        "Games for exchanging information",
  crossref =     "ACM:2008:SPA",
  pages =        "423--432",
  year =         "2008",
  DOI =          "https://doi.org/10.1145/1374376.1374437",
  bibdate =      "Fri Jun 20 18:31:53 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We consider the rational versions of two of the
                 classical problems in foundations of cryptography:
                 secret sharing and multiparty computation, suggested by
                 Halpern and Teague (STOC 2004). Our goal is to design
                 games and fair strategies that encourage rational
                 participants to exchange information about their inputs
                 for their mutual benefit, when the only mean of
                 communication is a broadcast channel.\par

                 We show that protocols for the above information
                 exchanging tasks, where players' values come from a
                 bounded domain, cannot satisfy some of the most
                 desirable properties. In contrast, we provide a
                 rational secret sharing scheme with simultaneous
                 broadcast channel in which shares are taken from an
                 unbounded domain, but have finite (and polynomial
                 sized) expectation.\par

                 Previous schemes (mostly cryptographic) have required
                 computational assumptions, making them inexact and
                 susceptible to backward induction, or used stronger
                 communication channels. Our scheme is
                 non-cryptographic, immune to backward induction, and
                 satisfies a stronger rationality concept (strict Nash
                 equilibrium). We show that our solution can also be
                 used to construct an $ \epsilon $-Nash equilibrium
                 secret sharing scheme for the case of a
                 non-simultaneous broadcast channel.",
  acknowledgement = ack-nhfb,
  keywords =     "backward induction; cryptography; game theory;
                 multiparty computation; Nash equilibrium; secret
                 sharing",
}

@Article{Kuhn:2008:BSS,
  author =       "Ulrich K{\"u}hn",
  title =        "Breaking the {Shin--Shin--Rhee} remotely keyed
                 encryption schemes",
  journal =      j-INFO-PROC-LETT,
  volume =       "105",
  number =       "6",
  pages =        "236--240",
  day =          "16",
  month =        mar,
  year =         "2008",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 15:52:59 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Lai:2008:JIA,
  author =       "Charlie Lai",
  title =        "{Java} Insecurity: Accounting for Subtleties That Can
                 Compromise Code",
  journal =      j-IEEE-SOFTWARE,
  volume =       "25",
  number =       "1",
  pages =        "13--19",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "IESOEG",
  DOI =          "https://doi.org/10.1109/MS.2008.9",
  ISSN =         "0740-7459 (print), 0740-7459 (electronic)",
  ISSN-L =       "0740-7459",
  bibdate =      "Thu Jul 3 12:17:31 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Software",
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/software",
}

@Article{Lakshminarayanan:2008:SUC,
  author =       "Karthik Lakshminarayanan and Daniel Adkins and Adrian
                 Perrig and Ion Stoica",
  title =        "Securing user-controlled routing infrastructures",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "16",
  number =       "3",
  pages =        "549--561",
  month =        jun,
  year =         "2008",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2007.903980",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Wed Oct 22 08:52:30 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Designing infrastructures that give untrusted third
                 parties (such as end-hosts) control over routing is a
                 promising research direction for achieving flexible and
                 efficient communication. However, serious concerns
                 remain over the deployment of such infrastructures,
                 particularly the new security vulnerabilities they
                 introduce. The flexible control plane of these
                 infrastructures can be exploited to launch many types
                 of powerful attacks with little effort. In this paper,
                 we make several contributions towards studying security
                 issues in forwarding infrastructures (FIs). We present
                 a general model for an FI, analyze potential security
                 vulnerabilities, and present techniques to address
                 these vulnerabilities. The main technique that we
                 introduce in this paper is the use of simple
                 lightweight cryptographic constraints on forwarding
                 entries. We show that it is possible to prevent a large
                 class of attacks on end-hosts and bound the flooding
                 attacks that can be launched on the infrastructure
                 nodes to a small constant value. Our mechanisms are
                 general and apply to a variety of earlier proposals
                 such as $i$ 3, DataRouter, and Network Pointers.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
  keywords =     "internet architecture; overlay networks; security",
}

@Article{Laud:2008:CSC,
  author =       "Peeter Laud",
  title =        "On the computational soundness of cryptographically
                 masked flows",
  journal =      j-SIGPLAN,
  volume =       "43",
  number =       "1",
  pages =        "337--348",
  month =        jan,
  year =         "2008",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/1328897.1328479",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Wed Jun 18 11:02:13 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "To speak about the security of information flow in
                 programs employing cryptographic operations,
                 definitions based on computational indistinguishability
                 of distributions over program states have to be used.
                 These definitions, as well as the accompanying analysis
                 tools, are complex and error-prone to argue about.
                 Cryptographically masked flows, proposed by Askarov,
                 Hedin and Sabelfeld, are an abstract execution model
                 and security definition that attempt to abstract away
                 the details of computational security. This abstract
                 model is useful because analysis of programs can be
                 conducted using the usual techniques for enforcing
                 non-interference.\par

                 In this paper we investigate under which conditions
                 this abstract model is computationally sound, i.e. when
                 does the security of a program in their model imply the
                 computational security of this program. This paper
                 spells out a reasonable set of conditions and then
                 proposes a simpler abstract model that is nevertheless
                 no more restrictive than the cryptographically masked
                 flows together with these conditions for soundness.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  keywords =     "computational soundness; cryptographically masked
                 flows; encryption; secure information flow",
}

@Book{Laughlin:2008:CRC,
  author =       "Robert B. Laughlin",
  title =        "The crime of reason: and the closing of the scientific
                 mind",
  publisher =    pub-BASIC-BOOKS,
  address =      pub-BASIC-BOOKS:adr,
  pages =        "186 (est.)",
  year =         "2008",
  ISBN =         "0-465-00507-1",
  ISBN-13 =      "978-0-465-00507-9",
  LCCN =         "JC598 .L38 2008",
  bibdate =      "Sat Oct 25 14:43:32 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Freedom of information; Information policy; Academic
                 freedom; Communication of technical information;
                 Intellectual freedom; Knowledge management",
  tableofcontents = "The end of reason \\
                 Dangerous knowledge \\
                 The master cryptographer \\
                 Games of chance \\
                 Patently absurd \\
                 The nuclear precedent \\
                 The facts of life \\
                 Clone wars \\
                 Spam spam spam spam \\
                 The troubled utopia",
}

@Article{Lavasani:2008:IFA,
  author =       "Ahmad Lavasani and Reza Mohammadi",
  title =        "Implementing a feasible attack against {ECC2K-130}
                 certicom challenge (abstract only)",
  journal =      j-ACM-COMM-COMP-ALGEBRA,
  volume =       "42",
  number =       "1--2",
  pages =        "61--62",
  month =        mar # "/" # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1394042.1394072",
  ISSN =         "1932-2232 (print), 1932-2240 (electronic)",
  ISSN-L =       "1932-2232",
  bibdate =      "Tue Aug 12 17:30:40 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Communications in Computer Algebra",
  keywords =     "cryptography",
}

@Article{Lee:2008:SAF,
  author =       "Changhoon Lee and Jongsung Kim and Seokhie Hong and
                 Jaechul Sung and Sangjin Lee",
  title =        "Security analysis of the full-round {DDO-64} block
                 cipher",
  journal =      j-J-SYST-SOFTW,
  volume =       "81",
  number =       "12",
  pages =        "2328--2335",
  month =        dec,
  year =         "2008",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:04 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Levieil:2008:CTC,
  author =       "Eric Levieil and David Naccache",
  title =        "Cryptographic Test Correction",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "2",
  pages =        "69--71",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.30",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Li:2008:CAM,
  author =       "Zhongwen Li and Qiong Chen and Yang Xiang",
  title =        "A cross-authentication model and implementation",
  journal =      j-INT-J-COMPUT-SYST-SCI-ENG,
  volume =       "23",
  number =       "3",
  pages =        "??--??",
  month =        may,
  year =         "2008",
  CODEN =        "CSSEEI",
  ISSN =         "0267-6192",
  bibdate =      "Tue Dec 03 12:41:11 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsystscieng.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Systems Science and
                 Engineering",
  remark =       "Special issue: Privacy Data Management",
}

@Article{Li:2008:CRR,
  author =       "Shujun Li and Chengqing Li and Guanrong Chen and
                 Kwok-Tung Lo",
  title =        "Cryptanalysis of the {RCES/RSES} image encryption
                 scheme",
  journal =      j-J-SYST-SOFTW,
  volume =       "81",
  number =       "7",
  pages =        "1130--1143",
  month =        jul,
  year =         "2008",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:04 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Li:2008:DEO,
  author =       "Lvzhou Li and Daowen Qiu",
  title =        "Determining the equivalence for one-way quantum finite
                 automata",
  journal =      j-THEOR-COMP-SCI,
  volume =       "403",
  number =       "1",
  pages =        "42--51",
  day =          "20",
  month =        aug,
  year =         "2008",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Mar 28 21:21:40 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Li:2008:ISS,
  author =       "Chua-Ta Li and Min-Shiang Hwang and Yen-Ping Chu",
  title =        "Improving the security of a secure anonymous routing
                 protocol with authenticated key exchange for ad hoc
                 networks",
  journal =      j-INT-J-COMPUT-SYST-SCI-ENG,
  volume =       "23",
  number =       "3",
  pages =        "??--??",
  month =        may,
  year =         "2008",
  CODEN =        "CSSEEI",
  ISSN =         "0267-6192",
  bibdate =      "Tue Dec 03 12:41:11 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsystscieng.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Systems Science and
                 Engineering",
  remark =       "Special issue: Privacy Data Management",
}

@Article{Liu:2008:ARL,
  author =       "Donggang Liu and Peng Ning and An Liu and Cliff Wang
                 and Wenliang Kevin Du",
  title =        "Attack-Resistant Location Estimation in Wireless
                 Sensor Networks",
  journal =      j-TISSEC,
  volume =       "11",
  number =       "4",
  pages =        "22:1--22:??",
  month =        jul,
  year =         "2008",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1380564.1380570",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Tue Aug 5 19:37:22 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Many sensor network applications require sensors'
                 locations to function correctly. Despite the recent
                 advances, location discovery for sensor networks in
                 {\em hostile environments\/} has been mostly
                 overlooked. Most of the existing localization protocols
                 for sensor networks are vulnerable in hostile
                 environments. The security of location discovery can
                 certainly be enhanced by authentication. However, the
                 possible node compromises and the fact that location
                 determination uses certain physical features (e.g.,
                 received signal strength) of radio signals make
                 authentication not as effective as in traditional
                 security applications. This article presents two
                 methods to tolerate malicious attacks against
                 range-based location discovery in sensor networks. The
                 first method filters out malicious beacon signals on
                 the basis of the ``consistency'' among multiple beacon
                 signals, while the second method tolerates malicious
                 beacon signals by adopting an iteratively refined
                 voting scheme. Both methods can survive malicious
                 attacks even if the attacks bypass authentication,
                 provided that the benign beacon signals constitute the
                 majority of the beacon signals. This article also
                 presents the implementation and experimental evaluation
                 (through both field experiments and simulation) of all
                 the secure and resilient location estimation schemes
                 that can be used on the current generation of sensor
                 platforms (e.g., MICA series of motes), including the
                 techniques proposed in this article, in a network of
                 MICAz motes. The experimental results demonstrate the
                 effectiveness of the proposed methods, and also give
                 the secure and resilient location estimation scheme
                 most suitable for the current generation of sensor
                 networks.",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "localization; security; sensor networks",
}

@Article{Liu:2008:DEA,
  author =       "Hongjun Liu and Ping Luo and Daoshun Wang",
  title =        "A distributed expansible authentication model based on
                 {Kerberos}",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "31",
  number =       "4",
  pages =        "472--486",
  month =        nov,
  year =         "2008",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:43:22 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804508000027",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Liu:2008:GPV,
  author =       "Jen-Chang Liu and Ming-Hong Shih",
  title =        "Generalizations of Pixel-Value Differencing
                 Steganography for Data Hiding in Images",
  journal =      j-FUND-INFO,
  volume =       "83",
  number =       "3",
  pages =        "319--335",
  month =        aug,
  year =         "2008",
  CODEN =        "FUMAAJ",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:06:46 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Liu:2008:SAM,
  author =       "Hongjun Liu and Ping Luo and Daoshun Wang",
  title =        "A scalable authentication model based on public keys",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "31",
  number =       "4",
  pages =        "375--386",
  month =        nov,
  year =         "2008",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:43:22 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804508000106",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Lu:2008:PTZ,
  author =       "Li Lu and Jinsong Han and Yunhao Liu and Lei Hu and
                 Jin-Peng Huai and Lionel Ni and Jian Ma",
  title =        "Pseudo Trust: Zero-Knowledge Authentication in
                 Anonymous {P2Ps}",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "19",
  number =       "10",
  pages =        "1325--1337",
  month =        oct,
  year =         "2008",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2008.15",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Thu May 13 12:06:56 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Lysyanskaya:2008:CHK,
  author =       "Anna Lysyanskaya",
  title =        "Cryptography: How to Keep Secrets Safe",
  journal =      j-SCI-AMER,
  volume =       "299",
  number =       "3",
  pages =        "88--95",
  month =        sep,
  year =         "2008",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican0908-88",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Fri May 17 10:29:45 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam2000.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v299/n3/full/scientificamerican0908-88.html;
                 http://www.nature.com/scientificamerican/journal/v299/n3/pdf/scientificamerican0908-88.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Article{Malan:2008:IPK,
  author =       "David J. Malan and Matt Welsh and Michael D. Smith",
  title =        "Implementing public-key infrastructure for sensor
                 networks",
  journal =      j-TOSN,
  volume =       "4",
  number =       "4",
  pages =        "22:1--22:??",
  month =        aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1387663.1387668",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Tue Mar 16 15:22:19 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We present a critical evaluation of the first known
                 implementation of elliptic curve cryptography over
                 F$_{2 {\em p \/ }}$ for sensor networks based on the
                 8-bit, 7.3828-MHz MICA2 mote. We offer, along the way,
                 a primer for those interested in the field of
                 cryptography for sensor networks. We discuss, in
                 particular, the decisions underlying our design and
                 alternatives thereto. And we elaborate on the
                 methodologies underlying our evaluation.\par

                 Through instrumentation of UC Berkeley's TinySec
                 module, we argue that, although symmetric cryptography
                 has been tractable in this domain for some time, there
                 has remained a need, unfulfilled until recently, for an
                 efficient, secure mechanism for distribution of secret
                 keys among nodes. Although public-key infrastructure
                 has been thought impractical, we show, through analysis
                 of our original implementation for TinyOS of point
                 multiplication on elliptic curves, that public-key
                 infrastructure is indeed viable for TinySec keys'
                 distribution, even on the MICA2. We demonstrate that
                 public keys can be generated within 34 seconds and that
                 shared secrets can be distributed among nodes in a
                 sensor network within the same time, using just over 1
                 kilobyte of SRAM and 34 kilobytes of ROM. We
                 demonstrate that communication costs are minimal, with
                 only 2 packets required for transmission of a public
                 key among nodes. We make available all of our source
                 code for other researchers to download and use. And we
                 discuss recent results based on our work that
                 corroborate and improve upon our conclusions.",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
  keywords =     "Diffie--Hellman; DLP; ECC; ECDLP; elliptic curve
                 cryptography; MICA2; motes; sensor networks; TinyOS;
                 TinySec",
}

@Article{Mandviwalla:2008:MBW,
  author =       "Munir Mandviwalla and Abhijit Jain and Julie
                 Fesenmaier and Jeff Smith and Paul Weinberg and Greg
                 Meyers",
  title =        "Municipal broadband wireless networks",
  journal =      j-CACM,
  volume =       "51",
  number =       "2",
  pages =        "72--80",
  month =        feb,
  year =         "2008",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1314215.1314228",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 16 18:35:40 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "'\ldots{} people lack many things: jobs, shelter,
                 food, health care and drinkable water. Today, being cut
                 off from basic telecommunications services is a
                 hardship almost as acute as these other deprivations,
                 and may indeed reduce the chances of finding remedies
                 to them.' ---UN Secretary General, Kofi Annan, in a
                 keynote address to the International Telecommunication
                 Union, Oct. 9, 1999.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Book{Mann:2008:HHS,
  author =       "Ian Mann",
  title =        "Hacking the human: social engineering techniques and
                 security countermeasures",
  publisher =    "Gower",
  address =      "Aldershot, England",
  pages =        "vii + 254",
  year =         "2008",
  ISBN =         "0-566-08773-1",
  ISBN-13 =      "978-0-566-08773-8",
  LCCN =         "HM668 .M36 2008",
  bibdate =      "Mon Oct 26 09:54:16 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip0817/2008019977.html",
  acknowledgement = ack-nhfb,
  subject =      "social engineering; social systems; planning",
  tableofcontents = "What is social engineering? \\
                 Understanding your risks \\
                 People, your weakest link \\
                 Limitations to current security thinking \\
                 Trust me \\
                 Reading a person \\
                 Subconscious mind \\
                 Parent, adult, child \\
                 Vulnerability mapping \\
                 Protection systems \\
                 Awareness and training \\
                 Testing",
}

@Article{Martin:2008:CCI,
  author =       "Luther Martin",
  title =        "Crypto Corner: Identity-Based Encryption and Beyond",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "62--64",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.120",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Martin:2008:IBE,
  author =       "Luther Martin",
  title =        "Identity-Based Encryption Comes of Age",
  journal =      j-COMPUTER,
  volume =       "41",
  number =       "8",
  pages =        "93--95",
  month =        aug,
  year =         "2008",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2008.299",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Tue Aug 12 18:24:27 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
  keywords =     "cryptography",
}

@Article{McAndrew:2008:TCO,
  author =       "Alasdair McAndrew",
  title =        "Teaching cryptography with open-source software",
  journal =      j-SIGCSE,
  volume =       "40",
  number =       "1",
  pages =        "325--329",
  month =        mar,
  year =         "2008",
  CODEN =        "SIGSD3",
  DOI =          "https://doi.org/10.1145/1352322.1352247",
  ISSN =         "0097-8418 (print), 2331-3927 (electronic)",
  ISSN-L =       "0097-8418",
  bibdate =      "Sat Nov 17 15:44:10 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigcse2000.bib",
  note =         "Proceedings of SIGCSE 08.",
  abstract =     "Cryptography has become an important topic in
                 undergraduate curricula in mathematics and computer
                 science, not just for its intrinsic interest---``about
                 the most fun you can have with mathematics''
                 \cite{ferg04}, but for its current standing as the
                 basis for almost all computer security. From wireless
                 networking to secure email to password protection,
                 cryptographic methods are used to secure information,
                 to protect users, and to protect data. At Victoria
                 University, cryptography has been taught as part of a
                 mathematics and computer science degree for several
                 years. The students all have had at least a year of
                 tertiary mathematics, and some exposure to a computer
                 algebra system (Maple). However, the cost of Maple, and
                 the current licensing agreement, means that students
                 are unable to experiment with the software away from
                 the computer laboratories at the University. For this
                 reason we have decided to investigate the use of
                 open-source computer algebra systems Maxima and Axiom.
                 Although not as full-featured and powerful as the
                 commercial systems Maple and Mathematica, we show they
                 are in fact admirably suited for a subject such as
                 cryptography. In some ways Maxima and Axiom even
                 surpass Maple and Mathematica. Student response to the
                 introduction of these systems has been very positive.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIGCSE Bulletin (ACM Special Interest Group on
                 Computer Science Education)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J688",
}

@Article{McCamant:2008:QIF,
  author =       "Stephen McCamant and Michael D. Ernst",
  title =        "Quantitative information flow as network flow
                 capacity",
  journal =      j-SIGPLAN,
  volume =       "43",
  number =       "6",
  pages =        "193--205",
  month =        jun,
  year =         "2008",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/1375581.1375606",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Wed Jun 18 11:04:53 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We present a new technique for determining how much
                 information about a program's secret inputs is revealed
                 by its public outputs. In contrast to previous
                 techniques based on reachability from secret inputs
                 (tainting), it achieves a more precise quantitative
                 result by computing a maximum flow of information
                 between the inputs and outputs. The technique uses
                 static control-flow regions to soundly account for
                 implicit flows via branches and pointer operations, but
                 operates dynamically by observing one or more program
                 executions and giving numeric flow bounds specific to
                 them (e.g., '17 bits'). The maximum flow in a network
                 also gives a minimum cut (a set of edges that separate
                 the secret input from the output), which can be used to
                 efficiently check that the same policy is satisfied on
                 future executions. We performed case studies on 5 real
                 C, C++, and Objective C programs, 3 of which had more
                 than 250K lines of code. The tool checked multiple
                 security policies, including one that was violated by a
                 previously unknown bug.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  keywords =     "dynamic analysis; implicit flow; information-flow
                 analysis",
}

@Article{McDonald:2008:SID,
  author =       "J. Todd McDonald and Yong C. Kim and Alec Yasinsac",
  title =        "Software issues in digital forensics",
  journal =      j-OPER-SYS-REV,
  volume =       "42",
  number =       "3",
  pages =        "29--40",
  month =        apr,
  year =         "2008",
  CODEN =        "OSRED8",
  DOI =          "https://doi.org/10.1145/1368506.1368512",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Fri Jun 20 17:21:09 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Whether we accept it or not, computer systems and the
                 operating systems that direct them are at the heart of
                 major forms of malicious activity. Criminals can use
                 computers as the actual target of their malicious
                 activity (stealing funds electronically from a bank) or
                 use them to support the conduct of criminal activity in
                 general (using a spreadsheet to track drug shipments).
                 In either case, law enforcement needs the ability (when
                 required) to collect evidence from such platforms in a
                 reliable manner that preserves the fingerprints of
                 criminal activity. Though such discussion touches on
                 privacy issues and rules of legal veracity, we focus
                 purely on technological support in this paper.
                 Specifically, we examine and set forth principles of
                 operating system (OS) design that may significantly
                 increase the success of (future) forensic collection
                 efforts. We lay out several OS design attributes that
                 synergistically enhance forensics activities.
                 Specifically, we pose the use of circuit encryption
                 techniques to provide an additional layer of protection
                 above hardware-enforced approaches. We conclude by
                 providing an overarching framework to incorporate these
                 enhancements within the context of OS design.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGOPS Operating Systems Review",
  keywords =     "circuit encryption; digital forensics; evidence
                 collection; forensic software; obfuscation; operating
                 system extensions; operating systems; security",
}

@Article{Micciancio:2008:OCC,
  author =       "Daniele Micciancio and Saurabh Panjwani",
  title =        "Optimal communication complexity of generic multicast
                 key distribution",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "16",
  number =       "4",
  pages =        "803--813",
  month =        aug,
  year =         "2008",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1137/0213053",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Wed Oct 22 08:53:12 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We prove a tight lower bound on the communication
                 complexity of secure multicast key distribution
                 protocols in which rekey messages are built using
                 symmetric-key encryption, pseudo-random generators, and
                 secret sharing schemes. Our lower bound shows that the
                 amortized cost of updating the group key for each group
                 membership change (as a function of the current group
                 size) is at least $ \log_2 (n) - o(1) $ basic rekey
                 messages. This lower bound matches, up to a subconstant
                 additive term, the upper bound due to Canetti et al.
                 [Proc. INFOCOM 1999], who showed that $ \log_2 (n) $
                 basic rekey messages (each time a user joins and/or
                 leaves the group) are sufficient. Our lower bound is,
                 thus, optimal up to a small subconstant additive term.
                 The result of this paper considerably strengthens
                 previous lower bounds by Canetti et al. [Proc.
                 Eurocrypt 1999] and Snoeyink et al. [Computer Networks,
                 47(3):2005], which allowed for neither the use of
                 pseudorandom generators and secret sharing schemes nor
                 the iterated (nested) application of the encryption
                 function. Our model (which allows for arbitrarily
                 nested combinations of encryption, pseudorandom
                 generators and secret sharing schemes) is much more
                 general and, in particular, encompasses essentially all
                 known multicast key distribution protocols of practical
                 interest.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
  keywords =     "key distribution; lower bounds; multicast; nested
                 encryption; secret sharing; security",
}

@Article{Miltchev:2008:DAC,
  author =       "Stefan Miltchev and Jonathan M. Smith and Vassilis
                 Prevelakis and Angelos Keromytis and Sotiris
                 Ioannidis",
  title =        "Decentralized access control in distributed file
                 systems",
  journal =      j-COMP-SURV,
  volume =       "40",
  number =       "3",
  pages =        "10:1--10:30",
  month =        aug,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1380584.1380588",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Aug 12 12:48:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The Internet enables global sharing of data across
                 organizational boundaries. Distributed file systems
                 facilitate data sharing in the form of remote file
                 access. However, traditional access control mechanisms
                 used in distributed file systems are intended for
                 machines under common administrative control, and rely
                 on maintaining a centralized database of user
                 identities. They fail to scale to a large user base
                 distributed across multiple organizations. We provide a
                 survey of decentralized access control mechanisms in
                 distributed file systems intended for large scale, in
                 both administrative domains and users. We identify
                 essential properties of such access control mechanisms.
                 We analyze both popular production and experimental
                 distributed file systems in the context of our
                 survey.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "authentication; authorization; certificates;
                 credentials; decentralized access control; networked
                 file systems; trust management",
}

@InProceedings{Mironov:2008:SAE,
  author =       "Ilya Mironov and Moni Naor and Gil Segev",
  title =        "Sketching in adversarial environments",
  crossref =     "ACM:2008:SPA",
  pages =        "651--660",
  year =         "2008",
  DOI =          "https://doi.org/10.1145/1374376.1374471",
  bibdate =      "Fri Jun 20 18:31:53 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We formalize a realistic model for computations over
                 massive data sets. The model, referred to as the {\em
                 adversarial sketch model}, unifies the well-studied
                 sketch and data stream models together with a
                 cryptographic flavor that considers the execution of
                 protocols in `hostile environments', and provides a
                 framework for studying the complexity of many tasks
                 involving massive data sets.\par

                 The adversarial sketch model consists of several
                 participating parties: honest parties, whose goal is to
                 compute a pre-determined function of their inputs, and
                 an adversarial party. Computation in this model
                 proceeds in two phases. In the first phase, the
                 adversarial party chooses the inputs of the honest
                 parties. These inputs are sets of elements taken from a
                 large universe, and provided to the honest parties in
                 an on-line manner in the form of a sequence of insert
                 and delete operations. Once an operation from the
                 sequence has been processed it is discarded and cannot
                 be retrieved unless explicitly stored. During this
                 phase the honest parties are not allowed to
                 communicate. Moreover, they do not share any secret
                 information and any public information they share is
                 known to the adversary in advance. In the second phase,
                 the honest parties engage in a protocol in order to
                 compute a pre-determined function of their
                 inputs.\par

                 In this paper we settle the complexity (up to
                 logarithmic factors) of two fundamental problems in
                 this model: testing whether two massive data sets are
                 equal, and approximating the size of their symmetric
                 difference. We construct explicit and efficient
                 protocols with sublinear sketches of essentially
                 optimal size, poly-logarithmic update time during the
                 first phase, and poly-logarithmic communication and
                 computation during the second phase. Our main technical
                 contribution is an explicit and deterministic encoding
                 scheme that enjoys two seemingly conflicting
                 properties: incrementality and high distance, which may
                 be of independent interest.",
  acknowledgement = ack-nhfb,
  keywords =     "data stream model; massive data sets; sketch model",
}

@Article{Misic:2008:TEC,
  author =       "Jelena Mi{\v{s}}i{\'c}",
  title =        "Traffic and energy consumption of an {IEEE 802.15.4}
                 network in the presence of authenticated, {ECC}
                 {Diffie--Hellman} ephemeral key exchange",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "52",
  number =       "11",
  pages =        "2227--2236",
  day =          "8",
  month =        aug,
  year =         "2008",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:27 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Mohanty:2008:IWB,
  author =       "Saraju P. Mohanty and Bharat K. Bhargava",
  title =        "Invisible watermarking based on creation and robust
                 insertion-extraction of image adaptive watermarks",
  journal =      j-TOMCCAP,
  volume =       "5",
  number =       "2",
  pages =        "12:1--12:??",
  month =        nov,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1413862.1413865",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Tue Mar 16 18:52:17 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "This article presents a novel invisible robust
                 watermarking scheme for embedding and extracting a
                 digital watermark in an image. The novelty lies in
                 determining a perceptually important subimage in the
                 host image. Invisible insertion of the watermark is
                 performed in the most significant region of the host
                 image such that tampering of that portion with an
                 intention to remove or destroy will degrade the
                 esthetic quality and value of the image. One feature of
                 the algorithm is that this subimage is used as a region
                 of interest for the watermarking process and eliminates
                 the chance of watermark removal. Another feature of the
                 algorithm is the creation of a compound watermark using
                 the input user watermark (logo) and attributes of the
                 host image. This facilitates the homogeneous fusion of
                 a watermark with the cover image, preserves the quality
                 of the host image, and allows robust
                 insertion-extraction. Watermark creation consists of
                 two distinct phases. During the first phase, a
                 statistical image is synthesized from a perceptually
                 important subimage of the image. A compound watermark
                 is created by embedding a watermark (logo) into the
                 statistical synthetic image by using a visible
                 watermarking technique. This compound watermark is
                 invisibly embedded into the important block of the host
                 image. The authentication process involves extraction
                 of the perceptive logo as well statistical testing for
                 two-layer evidence. Results of the experimentation
                 using standard benchmarks demonstrates the robustness
                 and efficacy of the proposed watermarking approach.
                 Ownership proof could be established under various
                 hostile attacks.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
  keywords =     "content protection; copyright protection; image;
                 invisible watermarking; Watermarking",
}

@Article{Monteiro:2008:AVM,
  author =       "Steena D. S. Monteiro and Robert F. Erbacher",
  title =        "An authentication and validation mechanism for
                 analyzing syslogs forensically",
  journal =      j-OPER-SYS-REV,
  volume =       "42",
  number =       "3",
  pages =        "41--50",
  month =        apr,
  year =         "2008",
  CODEN =        "OSRED8",
  DOI =          "https://doi.org/10.1145/1368506.1368513",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Fri Jun 20 17:21:09 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "This research proposes a novel technique for
                 authenticating and validating syslogs for forensic
                 analysis. This technique uses a modification of the
                 Needham Schroeder protocol, which uses nonces (numbers
                 used only once) and public keys. Syslogs, which were
                 developed from an event-logging perspective and not
                 from an evidence-sustaining one, are system treasure
                 maps that chart out and pinpoint attacks and attack
                 attempts. Over the past few years, research on securing
                 syslogs has yielded enhanced syslog protocols that
                 focus on tamper prevention and detection. However, many
                 of these protocols, though efficient from a security
                 perspective, are inadequate when forensics comes into
                 play. From a legal perspective, any kind of evidence
                 found at a crime scene needs to be validated. In
                 addition, any digital forensic evidence when presented
                 in court needs to be admissible, authentic, believable,
                 and reliable [4]. Currently, a patchy log on the server
                 side and client side cannot be considered as formal
                 authentication of a wrong doer [5]. This paper presents
                 a method that ties together, authenticates, and
                 validates all the entities involved in the crime
                 scene---the user using the application, the system that
                 is being used, and the application being used on the
                 system by a user. This means that instead of merely
                 transmitting the header and the message, which is the
                 standard syslog protocol format, the syslog entry along
                 with the user fingerprint, application fingerprint, and
                 system fingerprint are transmitted to the logging
                 server. The assignment of digital fingerprints and the
                 addition of a challenge response mechanism to the
                 underlying syslogging mechanism aim to validate
                 generated syslogs forensically.",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
  keywords =     "authentication and validation; forensic validity;
                 model; system log files",
}

@Article{Munro:2008:DE,
  author =       "Ken Munro",
  title =        "Desktop encryption",
  journal =      j-NETWORK-SECURITY,
  volume =       "2008",
  number =       "12",
  pages =        "4--6",
  month =        dec,
  year =         "2008",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(08)70138-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:59 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485808701387",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Muresan:2008:PCA,
  author =       "R. Muresan and S. Gregori",
  title =        "Protection Circuit against Differential Power Analysis
                 Attacks for Smart Cards",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "57",
  number =       "11",
  pages =        "1540--1549",
  month =        nov,
  year =         "2008",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2008.107",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 12:17:44 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4585359",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Ning:2008:MAA,
  author =       "Peng Ning and An Liu and Wenliang Du",
  title =        "Mitigating {DoS} attacks against broadcast
                 authentication in wireless sensor networks",
  journal =      j-TOSN,
  volume =       "4",
  number =       "1",
  pages =        "1:1--1:??",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1325651.1325652",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Mon Jun 16 17:50:44 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Broadcast authentication is a critical security
                 service in wireless sensor networks. There are two
                 general approaches for broadcast authentication in
                 wireless sensor networks: digital signatures and $ \mu
                 $TESLA-based techniques. However, both signature-based
                 and $ \mu $TESLA-based broadcast authentication are
                 vulnerable to Denial of Services (DoS) attacks: An
                 attacker can inject bogus broadcast packets to force
                 sensor nodes to perform expensive signature
                 verifications (in case of signature-based broadcast
                 authentication) or packet forwarding (in case of $ \mu
                 $TESLA-based broadcast authentication), thus exhausting
                 their limited battery power. This paper presents an
                 efficient mechanism called message-specific puzzle to
                 mitigate such DoS attacks. In addition to
                 signature-based or $ \mu $TESLA-based broadcast
                 authentication, this approach adds a weak authenticator
                 in each broadcast packet, which can be efficiently
                 verified by a regular sensor node, but takes a
                 computationally powerful attacker a substantial amount
                 of time to forge. Upon receiving a broadcast packet,
                 each sensor node first verifies the weak authenticator,
                 and performs the expensive signature verification (in
                 signature-based broadcast authentication) or packet
                 forwarding (in $ \mu $TESLA-based broadcast
                 authentication) only when the weak authenticator is
                 valid. A weak authenticator cannot be precomputed
                 without a non-reusable (or short-lived) key disclosed
                 only in a valid packet. Even if an attacker has
                 intensive computational resources to forge one or more
                 weak authenticators, it is difficult to reuse these
                 forged weak authenticators. Thus, this weak
                 authentication mechanism substantially increases the
                 difficulty of launching successful DoS attacks against
                 signature-based or $ \mu $TESLA-based broadcast
                 authentication. A limitation of this approach is that
                 it requires a powerful sender and introduces
                 sender-side delay. This article also reports an
                 implementation of the proposed techniques on TinyOS, as
                 well as initial experimental evaluation in a network of
                 MICAz motes.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
  keywords =     "broadcast authentication; DoS attacks; security;
                 sensor networks",
}

@Article{Onieva:2008:MNS,
  author =       "Jose A. Onieva and Jianying Zhou and Javier Lopez",
  title =        "Multiparty nonrepudiation: a survey",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "1",
  pages =        "5:1--5:43",
  month =        dec,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1456650.1456655",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jan 12 16:47:51 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Nonrepudiation is a security service that plays an
                 important role in many Internet applications.
                 Traditional two-party nonrepudiation has been studied
                 intensively in the literature. This survey focuses on
                 multiparty scenarios and provides a comprehensive
                 overview. It starts with a brief introduction of
                 fundamental issues on nonrepudiation, including the
                 types of nonrepudiation service and cryptographic
                 evidence, the roles of trusted third-party,
                 nonrepudiation phases and requirements, and the status
                 of standardization. Then it describes the general
                 multiparty nonrepudiation problem, and analyzes
                 state-of-the-art mechanisms. After this, it presents in
                 more detail the 1-N multiparty nonrepudiation solutions
                 for distribution of different messages to multiple
                 recipients. Finally, it discusses advanced solutions
                 for two typical multiparty nonrepudiation applications,
                 namely, multiparty certified email and multiparty
                 contract signing.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Multiparty applications; multiparty protocols;
                 nonrepudiation",
}

@Article{Oppliger:2008:STSa,
  author =       "Rolf Oppliger and Ralf Hauser and David Basin",
  title =        "{SSL\slash TLS} session-aware user authentication
                 revisited",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "3--4",
  pages =        "64--70",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:10 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000102",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Oppliger:2008:STSb,
  author =       "Rolf Oppliger and Ralf Hauser and David Basin",
  title =        "{SSL\slash TLS} Session-Aware User Authentication",
  journal =      j-COMPUTER,
  volume =       "41",
  number =       "3",
  pages =        "59--65",
  month =        mar,
  year =         "2008",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2008.98",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Jul 4 17:13:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Oury:2008:PP,
  author =       "Nicolas Oury and Wouter Swierstra",
  title =        "The power of {Pi}",
  journal =      j-SIGPLAN,
  volume =       "43",
  number =       "9",
  pages =        "39--50",
  month =        sep,
  year =         "2008",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/1411203.1411213",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Tue Sep 23 17:31:25 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "This paper exhibits the power of programming with
                 dependent types by dint of embedding three
                 domain-specific languages: Cryptol, a language for
                 cryptographic protocols; a small data description
                 language; and relational algebra. Each example
                 demonstrates particular design patterns inherent to
                 dependently-typed programming. Documenting these
                 techniques paves the way for further research in
                 domain-specific embedded type systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  keywords =     "dependent types; domain-specific embedded languages",
}

@Article{Palanivel:2008:MPA,
  author =       "S. Palanivel and B. Yegnanarayana",
  title =        "Multimodal person authentication using speech, face
                 and visual speech",
  journal =      j-COMP-VIS-IMAGE-UNDERSTANDING,
  volume =       "109",
  number =       "1",
  pages =        "44--55",
  month =        jan,
  year =         "2008",
  CODEN =        "CVIUF4",
  ISSN =         "1077-3142 (print), 1090-235X (electronic)",
  ISSN-L =       "1077-3142",
  bibdate =      "Sat Apr 2 10:55:54 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/10773142",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Vision and Image Understanding",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10773142",
}

@Article{Pang:2008:AQR,
  author =       "HweeHwa Pang and Kyriakos Mouratidis",
  title =        "Authenticating the query results of text search
                 engines",
  journal =      j-PROC-VLDB-ENDOWMENT,
  volume =       "1",
  number =       "1",
  pages =        "126--137",
  month =        aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1453856.1453875",
  ISSN =         "2150-8097",
  bibdate =      "Fri May 13 14:54:36 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the VLDB Endowment",
}

@Article{Pang:2008:VCR,
  author =       "Hweehwa Pang and Kian-Lee Tan",
  title =        "Verifying {Completeness} of {Relational Query Answers}
                 from {Online Servers}",
  journal =      j-TISSEC,
  volume =       "11",
  number =       "2",
  pages =        "5:1--5:??",
  month =        mar,
  year =         "2008",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1330332.1330337",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 12 17:52:41 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "The number of successful attacks on the Internet shows
                 that it is very difficult to guarantee the security of
                 online servers over extended periods of time. A
                 breached server that is not detected in time may return
                 incorrect query answers to users. In this article, we
                 introduce authentication schemes for users to verify
                 that their query answers from an online server are
                 complete (i. e. , no qualifying tuples are omitted) and
                 authentic (i. e. , all the result values are
                 legitimate). We introduce a scheme that supports range
                 selection, projection as well as primary key-foreign
                 key join queries on relational databases. We also
                 present authentication schemes for single- and
                 multi-attribute range aggregate queries. The schemes
                 complement access control mechanisms that rewrite
                 queries dynamically, and are computationally secure. We
                 have implemented the proposed schemes, and experiment
                 results showed that they are practical and feasible
                 schemes with low overheads.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "query answer verification; secure database systems",
}

@Article{Park:2008:SRB,
  author =       "Taejoon Park and Kang G. Shin",
  title =        "Secure routing based on distributed key sharing in
                 large-scale sensor networks",
  journal =      j-TECS,
  volume =       "7",
  number =       "2",
  pages =        "20:1--20:??",
  month =        feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1331331.1331344",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Jun 12 15:22:00 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Sensor networks, usually built with a large number of
                 small, low-cost sensor nodes, are characterized by
                 their large-scale and unattended deployment,
                 necessitating ``secure'' communications between nearby,
                 as well as remote, sensor nodes for their intended
                 applications and services. Key setup/sharing is crucial
                 to the protection of such applications/services from
                 attacks, but existing (public-key, cluster-based, or
                 pairwise) solutions become too expensive (hence,
                 inefficient) when the underlying applications/services
                 require communications between distant sensor nodes. To
                 remedy this inefficiency, we propose a novel
                 distributed key-sharing scheme, in which each
                 participating sensor node shares unique keys with a
                 small number of other sensor nodes---called distributed
                 key servers (DKSs)---chosen according to their
                 geographic distance and communication direction. Using
                 DKSs, we develop two secure routing protocols: (1)
                 secure geographic forwarding that delivers packets by
                 using a chain of DKS lookups, each secured with its own
                 key and forwarded geographically; and (2) key
                 establishment that creates a secure session between two
                 distant sensor nodes based solely on symmetric-ciphers.
                 These protocols enable low-cost, low-power sensors to
                 provide high-level security at a very low cost.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J840",
  keywords =     "attack tolerance; distributed key sharing and servers;
                 key establishment; large-scale sensor networks; secure
                 geographic forwarding",
}

@Article{Pass:2008:NIC,
  author =       "Rafael Pass and Alon Rosen",
  title =        "New and Improved Constructions of Nonmalleable
                 Cryptographic Protocols",
  journal =      j-SIAM-J-COMPUT,
  volume =       "38",
  number =       "2",
  pages =        "702--752",
  month =        "????",
  year =         "2008",
  CODEN =        "SMJCAT",
  DOI =          "",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Tue May 18 08:21:57 MDT 2010",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/38/2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Article{Pavlou:2008:FAD,
  author =       "Kyriacos E. Pavlou and Richard T. Snodgrass",
  title =        "Forensic analysis of database tampering",
  journal =      j-TODS,
  volume =       "33",
  number =       "4",
  pages =        "30:1--30:??",
  month =        nov,
  year =         "2008",
  CODEN =        "ATDSD3",
  DOI =          "https://doi.org/10.1145/1412331.1412342",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  bibdate =      "Tue Dec 23 11:45:08 MST 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tods/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tods.bib",
  abstract =     "Regulations and societal expectations have recently
                 expressed the need to mediate access to valuable
                 databases, even by insiders. One approach is tamper
                 detection via cryptographic hashing. This article shows
                 how to determine when the tampering occurred, what data
                 was tampered with, and perhaps, ultimately, who did the
                 tampering, via forensic analysis. We present four
                 successively more sophisticated forensic analysis
                 algorithms: the Monochromatic, RGBY, Tiled Bitmap, and
                 a3D algorithms, and characterize their ``forensic
                 cost'' under worst-case, best-case, and average-case
                 assumptions on the distribution of corruption sites. A
                 lower bound on forensic cost is derived, with RGBY and
                 a3D being shown optimal for a large number of
                 corruptions. We also provide validated cost formul{\ae}
                 for these algorithms and recommendations for the
                 circumstances in which each algorithm is indicated.",
  acknowledgement = ack-nhfb,
  articleno =    "30",
  fjournal =     "ACM Transactions on Database Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
  keywords =     "a3D algorithm; compliant records; forensic analysis
                 algorithm; forensic cost; Monochromatic algorithm;
                 Polychromatic algorithm; RGBY algorithm; Tiled Bitmap
                 algorithm",
}

@InProceedings{Peikert:2008:LTF,
  author =       "Chris Peikert and Brent Waters",
  title =        "Lossy trapdoor functions and their applications",
  crossref =     "ACM:2008:SPA",
  pages =        "187--196",
  year =         "2008",
  DOI =          "https://doi.org/10.1145/1374376.1374406",
  bibdate =      "Fri Jun 20 18:31:53 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We propose a new general primitive called lossy
                 trapdoor functions (lossy TDFs), and realize it under a
                 variety of different number theoretic assumptions,
                 including hardness of the decisional Diffie--Hellman
                 (DDH) problem and the worst-case hardness of lattice
                 problems.\par

                 Using lossy TDFs, we develop a new approach for
                 constructing several important cryptographic
                 primitives, including (injective) trapdoor functions,
                 collision-resistant hash functions, oblivious transfer,
                 and chosen ciphertext-secure cryptosystems. All of the
                 constructions are simple, efficient, and
                 black-box.\par

                 These results resolve some long-standing open problems
                 in cryptography. They give the first known injective
                 trapdoor functions based on problems not directly
                 related to integer factorization, and provide the first
                 known CCA-secure cryptosystem based solely on the
                 worst-case complexity of lattice problems.",
  acknowledgement = ack-nhfb,
  keywords =     "public key encryption; trapdoor functions",
}

@InProceedings{Petit:2008:BCB,
  author =       "C. Petit and F. Standaert and O. Pereira and T. Malkin
                 and M. Yung",
  editor =       "????",
  booktitle =    "ASIAN ACM Symposium on Information, Computer and
                 Communications Security (ASIACCS)",
  title =        "A block cipher based pseudo random number generator
                 secure against side-channel key recovery",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "56--65",
  year =         "2008",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Tue Jan 31 15:51:35 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
}

@Book{Petzold:2008:ATG,
  author =       "Charles Petzold",
  title =        "The annotated {Turing}: a guided tour through {Alan
                 Turing}'s historic paper on computability and the
                 {Turing Machine}",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xii + 372",
  year =         "2008",
  ISBN =         "0-470-22905-5 (paperback)",
  ISBN-13 =      "978-0-470-22905-7 (paperback)",
  LCCN =         "QA267 .P48 2008",
  bibdate =      "Sat Nov 20 21:31:14 MST 2010",
  bibsource =    "catalog.princeton.edu:7090/voyager;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Publisher's note: ``Mathematician Alan Turing invented
                 an imaginary computer known as the Turing Machine; in
                 an age before computers, he explored the concept of
                 what it meant to be computable, creating the field of
                 computability theory in the process, a foundation of
                 present-day computer programming. The book expands
                 Turing's original 36-page paper with additional
                 background chapters and extensive annotations; the
                 author elaborates on and clarifies many of Turing's
                 statements, making the original difficult-to-read
                 document accessible to present day programmers,
                 computer science majors, math geeks, and others.
                 Interwoven into the narrative are the highlights of
                 Turing's own life: his years at Cambridge and
                 Princeton, his secret work in cryptanalysis during
                 World War II, his involvement in seminal computer
                 projects, his speculations about artificial
                 intelligence, his arrest and prosecution for the crime
                 of ``gross indecency,'' and his early death by apparent
                 suicide at the age of 41.''",
  acknowledgement = ack-nhfb,
  subject =      "Turing, Alan Mathison; Turing machines; Computational
                 complexity",
  subject-dates = "1912--1954",
  tableofcontents = "This tomb holds Diophantus \\
                 The irrational and the transcendental \\
                 Centuries of progress \\
                 The education of Alan Turing \\
                 Machines at work \\
                 Addition and multiplication \\
                 Also known as subroutines \\
                 Everything is a number \\
                 The universal machine \\
                 Computers and computability \\
                 Of machines and men \\
                 Logic and computability \\
                 Computable functions \\
                 The major proof \\
                 The lambda calculus \\
                 Conceiving the continuum \\
                 Is everything a turing machine? \\
                 The long sleep of Diophantus",
}

@Article{Poulos:2008:TSE,
  author =       "Marios Poulos and George Bokos and Fotios Vaioulis",
  title =        "Towards the semantic extraction of digital signatures
                 for librarian image-identification purposes",
  journal =      j-J-AM-SOC-INF-SCI-TECHNOL,
  volume =       "59",
  number =       "5",
  pages =        "708--718",
  month =        mar,
  year =         "2008",
  CODEN =        "JASIEF",
  DOI =          "https://doi.org/10.1002/asi.20753",
  ISSN =         "1532-2882 (print), 1532-2890 (electronic)",
  ISSN-L =       "1532-2882",
  bibdate =      "Fri Sep 11 10:42:48 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jasist.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of the American Society for Information
                 Science and Technology: JASIST",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1532-2890",
  onlinedate =   "6 Feb 2008",
}

@Article{Rahaman:2008:CTB,
  author =       "H. Rahaman and J. Mathew and D. K. Pradhan and A. M.
                 Jabir",
  title =        "{C}-testable bit parallel multipliers over {$ {\rm
                 GF}(2^m) $}",
  journal =      j-TODAES,
  volume =       "13",
  number =       "1",
  pages =        "5:1--5:??",
  month =        jan,
  year =         "2008",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/1297666.1297671",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Thu Jun 12 18:10:00 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/todaes/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We present a C-testable design of polynomial basis
                 (PB) bit-parallel (BP) multipliers over GF(2 m ) for
                 100\% coverage of stuck-at faults. Our design method
                 also includes the method for test vector generation,
                 which is simple and efficient. C-testability is
                 achieved with three control inputs and approximately
                 6\% additional hardware. Only 8 constant vectors are
                 required irrespective of the sizes of the fields and
                 primitive polynomial. We also present a Built-In
                 Self-Test (BIST) architecture for generating the test
                 vectors efficiently, which eliminates the need for the
                 extra control inputs. Since these circuits have
                 critical applications as parts of cryptography (e. g. ,
                 Elliptic Curve Crypto (ECC) systems) hardware, the BIST
                 architecture may provide with added level of security,
                 as the tests would be done internally and without the
                 requirement of probing by external testing equipment.
                 Finally we present experimental results comprising the
                 area, delay and power of the testable multipliers of
                 various sizes with the help of the Synopsys{\reg} tools
                 using UMC 0. 18 micron CMOS technology library.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems (TODAES)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
  keywords =     "built-in self-test; C-testable; cryptography; digital
                 signal processing; error control code; fault; Galois
                 field; multiplier; polynomials; stuck-at fault;
                 testing; TPG; VLSI design",
}

@Article{Rechberger:2008:NRN,
  author =       "C. Rechberger and V. Rijmen",
  title =        "New Results on {NMAC\slash HMAC} when Instantiated
                 with Popular Hash Functions",
  journal =      j-J-UCS,
  volume =       "14",
  number =       "3",
  pages =        "347--376",
  month =        "????",
  year =         "2008",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Thu Jul 10 06:41:41 MDT 2008",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 jucs.bib",
  URL =          "http://www.jucs.org/jucs_14_3/new_results_on_nmac",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
  keywords =     "cryptography",
}

@Article{Rijmen:2008:RSA,
  author =       "Vincent Rijmen and Paulo S. L. M. Barreto and
                 D{\'e}cio L. Gazzoni Filho",
  title =        "Rotation symmetry in algebraically generated
                 cryptographic substitution tables",
  journal =      j-INFO-PROC-LETT,
  volume =       "106",
  number =       "6",
  pages =        "246--250",
  day =          "15",
  month =        jun,
  year =         "2008",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 15:53:04 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Rubin:2008:CFF,
  author =       "K. Rubin and A. Silverberg",
  title =        "Compression in Finite Fields and Torus-Based
                 Cryptography",
  journal =      j-SIAM-J-COMPUT,
  volume =       "37",
  number =       "5",
  pages =        "1401--1428",
  month =        "????",
  year =         "2008",
  CODEN =        "SMJCAT",
  DOI =          "",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Tue May 18 08:21:51 MDT 2010",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/37/5;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Article{Sarikaya:2008:SPT,
  author =       "Behcet Sarikaya and Xiao Zheng",
  title =        "{SIP} paging and tracking of wireless {LAN} hosts for
                 {VoIP}",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "16",
  number =       "3",
  pages =        "539--548",
  month =        jun,
  year =         "2008",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2007.900408",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Wed Oct 22 08:52:30 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "This paper introduces a new paging technique to track
                 and wake up a mobile node (MN) attached to an access
                 point (AP) in a wireless LAN network after a session
                 initiation protocol (SIP) INVITE message is initiated
                 by a caller. A tracking agent (TA) keeps track of the
                 mobiles' handoffs between the APs. A paging agent (PA)
                 triggers the TA to page the mobile when a SIP INVITE is
                 received for one of its users. The context transfer
                 feature of our paging protocol allows the paging
                 messages to deliver the station context in order to
                 enable faster session reestablishment. The AP then does
                 onlink paging in a wireless link. SIP extensions are
                 needed to trigger the PA to start paging MNs to notify
                 their dormant status using an extended SIP REGISTER
                 method. Tracking protocol is analyzed to compare soft-
                 and hard-state approaches for state inconsistency
                 ratio, message rate, and the overall cost. The
                 simulation model we developed enables us to evaluate
                 the traffic introduced by the tracking protocol and the
                 cache (state) size. Paging protocol is analyzed for CPU
                 processing times and the transmission delays in the SIP
                 session setup with paging. Simulation of the paging
                 with context transfer is used to show the gains in
                 reauthentication.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
  keywords =     "context transfer; fluid flow and random walk mobility
                 model; onlink paging; paging agent (PA); session
                 initiation protocol (SIP); tracking agent (TA)",
}

@Book{Schneier:2008:SS,
  author =       "Bruce Schneier",
  title =        "Schneier on Security",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "viii + 328",
  year =         "2008",
  ISBN =         "0-470-39535-4",
  ISBN-13 =      "978-0-470-39535-6",
  LCCN =         "QA76.9.A25.S35145 2008",
  bibdate =      "Tue Sep 23 17:53:51 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 library.mit.edu:9909/mit01",
  acknowledgement = ack-nhfb,
  subject =      "computer security; United States; computer networks;
                 security measures; privacy, right of; terrorism;
                 prevention",
  tableofcontents = "1. Terrorism and Security \\
                 2. National Security Policy \\
                 3. Airline Travel \\
                 4. Privacy and Surveillance \\
                 5. ID Cards and Security \\
                 6. Election Security \\
                 7. Security and Disasters \\
                 8. Economics of Security \\
                 9. Psychology of Security \\
                 10. Business of Security \\
                 11. Cybercrime and Cyberwar \\
                 12. Computer and Information Security \\
                 A. References",
}

@Article{Seidl:2008:FOV,
  author =       "Helmut Seidl and Kumar Neeraj Verma",
  title =        "Flat and one-variable clauses: {Complexity} of
                 verifying cryptographic protocols with single blind
                 copying",
  journal =      j-TOCL,
  volume =       "9",
  number =       "4",
  pages =        "28:1--28:??",
  month =        aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1380572.1380577",
  ISSN =         "1529-3785 (print), 1557-945X (electronic)",
  ISSN-L =       "1529-3785",
  bibdate =      "Fri Aug 29 14:02:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tocl/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tocl.bib",
  abstract =     "Cryptographic protocols with single blind copying were
                 defined and modeled by Comon and Cortier using the new
                 class C of first-order clauses. They showed its
                 satisfiability problem to be in 3-DEXPTIME. We improve
                 this result by showing that satisfiability for this
                 class is NEXPTIME-complete, using new resolution
                 techniques. We show satisfiability to be
                 DEXPTIME-complete if clauses are Horn, which is what is
                 required for modeling cryptographic protocols. While
                 translation to Horn clauses only gives a DEXPTIME upper
                 bound for the secrecy problem for these protocols, we
                 further show that this secrecy problem is actually
                 DEXPTIME-complete.",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Transactions on Computational Logic",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J773",
  keywords =     "cryptographic protocols; first-order logic; Horn
                 clauses; instantiation-based theorem proving;
                 resolution",
}

@InProceedings{Shaltiel:2008:HAP,
  author =       "Ronen Shaltiel and Emanuele Viola",
  title =        "Hardness amplification proofs require majority",
  crossref =     "ACM:2008:SPA",
  pages =        "589--598",
  year =         "2008",
  DOI =          "https://doi.org/10.1145/1374376.1374461",
  bibdate =      "Fri Jun 20 18:31:53 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Hardness amplification is the fundamental task of
                 converting a $ \delta $-hard function $ f : (0, 1)^n
                 \rightarrow (0, 1) $ into a ($ 1 / 2 - \epsilon $
                 )-hard function $ \Amp (f) $, where $f$ is $ \gamma
                 $-hard if small circuits fail to compute $f$ on at
                 least a $ \gamma $ fraction of the inputs. Typically, $
                 \epsilon $, $ \delta $ are small (and $ \delta = 2^{-k}
                 $ captures the case where $f$ is worst-case hard).
                 Achieving $ \epsilon = 1 / n^{\Omega (1)} $ is a
                 prerequisite for cryptography and most
                 pseudorandom-generator constructions.\par

                 In this paper we study the complexity of black-box
                 proofs of hardness amplification. A class of circuits
                 cal $D$ {\em proves\/} a hardness amplification result
                 if for any function $h$ that agrees with $ \Amp (f) $
                 on a $ 1 / 2 + e $ fraction of the inputs there exists
                 an oracle circuit $ D \in D $ such that $ D^h $ agrees
                 with $f$ on a $ 1 - \delta $ fraction of the inputs. We
                 focus on the case where every $ D \in D $ makes {\em
                 non-adaptive\/} queries to $h$. This setting captures
                 most hardness amplification techniques. We prove two
                 main results:\par

                 (1) The circuits in $D$ `can be used' to compute the
                 majority function on $ 1 / \epsilon $ bits. In
                 particular, these circuits have large depth when $
                 \epsilon \leq 1 / \poly \log n $. \par

                 (2) The circuits in $D$ must make $ \Omega \log (1 /
                 \delta) / e^2 $ oracle queries.\par

                 Both our bounds on the depth and on the number of
                 queries are tight up to constant factors.\par

                 Our results explain why hardness amplification
                 techniques have failed to transform known lower bounds
                 against constant-depth circuit classes into strong
                 average-case lower bounds. When coupled with the
                 celebrated `Natural Proofs' result by Razborov and
                 Rudich (J. CSS '97) and the pseudorandom functions by
                 Naor and Reingold (J. ACM '04), our results show that
                 {\em standard techniques for hardness amplification can
                 only be applied to those circuit classes for which
                 standard techniques cannot prove circuit lower
                 bounds.}\par

                 Our results reveal a contrast between Yao's XOR Lemma
                 ($ \Amp (f) := f(x_1) \oplus \ldots {} \oplus f(x_t)
                 \in z o $ and the Direct-Product Lemma $ (\Amp (f) :=
                 f(x_1) \circ \ldots {} \circ f(x_t) \in z o^t) $; here
                 $ \Amp (f) $ is non-Boolean). Our results (1) and (2)
                 apply to Yao's XOR lemma, whereas known proofs of the
                 direct-product lemma violate both (1) and (2).\par

                 One of our contributions is a new technique to handle
                 `non-uniform' reductions, i.e. the case when $D$
                 contains many circuits.",
  acknowledgement = ack-nhfb,
  keywords =     "amplification; average-case complexity; black-box;
                 constant-depth circuits; hardness; majority; natural
                 proofs",
}

@Article{Shi:2008:UAU,
  author =       "Minghui Shi and Xuemin (Sherman) Shen and Jon W. Mark
                 and Dongmei Zhao and Yixin Jiang",
  title =        "User authentication and undeniable billing support for
                 agent-based roaming service in {WLAN\slash cellular}
                 integrated mobile networks",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "52",
  number =       "9",
  pages =        "1693--1702",
  day =          "26",
  month =        jun,
  year =         "2008",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:26 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Book{Shih:2008:DWS,
  author =       "Frank Y. Shih",
  title =        "Digital Watermarking and Steganography: Fundamentals
                 and Techniques",
  publisher =    pub-TAYLOR-FRANCIS,
  address =      pub-TAYLOR-FRANCIS:adr,
  pages =        "180",
  year =         "2008",
  ISBN =         "1-4200-4757-4",
  ISBN-13 =      "978-1-4200-4757-8",
  LCCN =         "QA76.9.A25 S467 2008",
  bibdate =      "Wed Jul 7 08:55:32 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0745/2007034224-d.html;
                 http://www.loc.gov/catdir/toc/ecip0725/2007034224.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Multimedia systems; Security
                 measures; Intellectual property",
  tableofcontents = "Ch. 1. Introduction \\
                 Ch. 2. Classification in Digital Watermarking \\
                 Ch. 3. Mathematical Preliminaries \\
                 Ch. 4. Digital Watermarking Fundamentals \\
                 Ch. 3. Watermarking Attacks and Tools \\
                 Ch. 6. Combinational Digital Watermarking in the
                 Spatial and Frequency Domains \\
                 Ch. 7. Genetic Algorithm-Based Digital Watermarking \\
                 Ch. 8. Adjusted-Purpose Digital Watermarking \\
                 Ch. 9. Robust High-Capacity Digital Watermarking \\
                 Ch. 10. Introduction to Digital Steganography \\
                 Ch. 11. Steganalysis \\
                 Ch. 12. Genetic Algorithm-Based Steganography",
}

@Article{Smith-Miles:2008:CDP,
  author =       "Kate A. Smith-Miles",
  title =        "Cross-disciplinary perspectives on meta-learning for
                 algorithm selection",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "1",
  pages =        "6:1--6:25",
  month =        dec,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1456650.1456656",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jan 12 16:47:51 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The algorithm selection problem [Rice 1976] seeks to
                 answer the question: {\em Which algorithm is likely to
                 perform best for my problem?\/} Recognizing the problem
                 as a learning task in the early 1990's, the machine
                 learning community has developed the field of
                 meta-learning, focused on learning about learning
                 algorithm performance on classification problems. But
                 there has been only limited generalization of these
                 ideas beyond classification, and many related attempts
                 have been made in other disciplines (such as AI and
                 operations research) to tackle the algorithm selection
                 problem in different ways, introducing different
                 terminology, and overlooking the similarities of
                 approaches. In this sense, there is much to be gained
                 from a greater awareness of developments in
                 meta-learning, and how these ideas can be generalized
                 to learn about the behaviors of other (nonlearning)
                 algorithms. In this article we present a unified
                 framework for considering the algorithm selection
                 problem as a learning problem, and use this framework
                 to tie together the crossdisciplinary developments in
                 tackling the algorithm selection problem. We discuss
                 the generalization of meta-learning concepts to
                 algorithms focused on tasks including sorting,
                 forecasting, constraint satisfaction, and optimization,
                 and the extension of these ideas to bioinformatics,
                 cryptography, and other fields.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Algorithm selection; classification; combinatorial
                 optimization; constraint satisfaction; dataset
                 characterization; empirical hardness; forecasting;
                 landscape analysis; meta-learning; model selection;
                 sorting",
}

@Article{Smith:2008:CFI,
  author =       "Don Smith",
  title =        "The challenge of federated identity management",
  journal =      j-NETWORK-SECURITY,
  volume =       "2008",
  number =       "4",
  pages =        "7--9",
  month =        apr,
  year =         "2008",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(08)70051-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:59:50 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485808700515",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Book{Stein:2008:ENT,
  author =       "William Stein",
  title =        "Elementary number theory: primes, congruences, and
                 secrets",
  volume =       "666",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "175 (est.)",
  year =         "2008",
  ISBN =         "0-387-85524-6",
  ISBN-13 =      "978-0-387-85524-0",
  LCCN =         "????",
  bibdate =      "Wed Nov 26 15:02:38 MST 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Undergraduate texts in mathematics",
  acknowledgement = ack-nhfb,
}

@Article{Steinwandt:2008:GEI,
  author =       "Rainer Steinwandt and Willi Geiselmann and {\c{C}}etin
                 Kaya Ko{\c{c}}",
  title =        "{Guest Editors}' Introduction to the Special Section
                 on Special-Purpose Hardware for Cryptography and
                 Cryptanalysis",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "57",
  number =       "11",
  pages =        "1441--1442",
  month =        nov,
  year =         "2008",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2008.188",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 12:17:44 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4633726",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Sun:2008:BWN,
  author =       "Shusen Sun and Zhigeng Pan and Tae-Wan Kim",
  title =        "Blind Watermarking of Non-Uniform {B}-Spline
                 Surfaces",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "8",
  number =       "3",
  pages =        "439--454",
  month =        jul,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1142/S0219467808003179",
  ISSN =         "0219-4678",
  bibdate =      "Tue Aug 31 08:38:02 MDT 2010",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics (IJIG)",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Sutherland:2008:AVO,
  author =       "Iain Sutherland and Jon Evans and Theodore Tryfonas
                 and Andrew Blyth",
  title =        "Acquiring volatile operating system data tools and
                 techniques",
  journal =      j-OPER-SYS-REV,
  volume =       "42",
  number =       "3",
  pages =        "65--73",
  month =        apr,
  year =         "2008",
  CODEN =        "OSRED8",
  DOI =          "https://doi.org/10.1145/1368506.1368516",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Fri Jun 20 17:21:09 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The current approach to forensic examination during
                 search and seizure has predominantly been to pull the
                 plug on the suspect machine and subsequently perform a
                 post mortem examination on the storage medium. However,
                 with the advent of larger capacities of memory, drive
                 encryption and anti-forensics, this procedure may
                 result in the loss of valuable evidence. Volatile data
                 may be vital in determining criminal activity; it may
                 contain passwords used for encryption, indications of
                 anti-forensic techniques, memory resident malware which
                 would otherwise go unnoticed by the investigator. This
                 paper emphasizes the importance of understanding the
                 potential value of volatile data and how best to
                 collate forensic artifacts to the benefit of the
                 investigation, ensuring the preservation and integrity
                 of the evidence. The paper will review current methods
                 for volatile data collection, assessing the
                 capabilities, limitations and liabilities of current
                 tools and techniques available to the forensic
                 investigator.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGOPS Operating Systems Review",
  keywords =     "forensics; live acquisition; volatile data",
}

@Book{Swenson:2008:MCT,
  author =       "Christopher Swenson",
  title =        "Modern cryptanalysis: techniques for advanced code
                 breaking",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xxviii + 236",
  year =         "2008",
  ISBN =         "0-470-13593-X (cloth)",
  ISBN-13 =      "978-0-470-13593-8 (cloth)",
  LCCN =         "QA76.9.A25 S932 2008",
  bibdate =      "Sat May 15 09:17:07 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0806/2007051636-d.html;
                 http://www.loc.gov/catdir/enhancements/fy0808/2007051636-t.html;
                 http://www.loc.gov/catdir/enhancements/fy0810/2007051636-b.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Data encryption (Computer science);
                 Cryptography",
  tableofcontents = "Simple ciphers \\
                 Number theoretical ciphers \\
                 Factoring and discrete logarithms \\
                 Block ciphers \\
                 General cryptanalytic methods \\
                 Linear cryptanalysis \\
                 Differential cryptanalysis",
}

@Article{Terai:2008:BRB,
  author =       "S. Terai",
  title =        "Book Review: {{\booktitle{Cryptography in C and C++}},
                 by Michael Welschenbach, Apress, 2005}",
  journal =      j-SIGACT,
  volume =       "39",
  number =       "1",
  pages =        "12--16",
  month =        mar,
  year =         "2008",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1360443.1360446",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 18:30:30 MDT 2012",
  bibsource =    "DBLP;
                 http://dblp.uni-trier.de/db/journals/sigact/sigact39.html#Terai08;
                 http://portal.acm.org/;
                 https://www.math.utah.edu/pub/mirrors/ftp.ira.uka.de/bibliography/Misc/DBLP/2008.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See
                 \cite{Welschenbach:2001:CCC,Welschenbach:2005:CCC}.",
  URL =          "http://doi.acm.org/10.1145/1360443.1360446",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@InProceedings{Thamrin:2008:PBR,
  author =       "N. M. Thamrin and G. Witjaksono and A. Nuruddin and M.
                 S. Abdullah",
  booktitle =    "{Ninth ACIS International Conference on Software
                 Engineering, Artificial Intelligence, Networking, and
                 Parallel\slash Distributed Computing 2008. SNPD '08}",
  title =        "A Photonic-based Random Number Generator for
                 Cryptographic Application",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "356--361",
  year =         "2008",
  DOI =          "https://doi.org/10.1109/SNPD.2008.151",
  bibdate =      "Fri Jan 6 08:10:49 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4617397",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4617324",
}

@Article{Toll:2008:CSE,
  author =       "David C. Toll and Paul A. Karger and Elaine R. Palmer
                 and Suzanne K. McIntosh and Sam Weber",
  title =        "The {Caernarvon} secure embedded operating system",
  journal =      j-OPER-SYS-REV,
  volume =       "42",
  number =       "1",
  pages =        "32--39",
  month =        jan,
  year =         "2008",
  CODEN =        "OSRED8",
  DOI =          "https://doi.org/10.1145/1341312.1341320",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Fri Jun 20 17:19:29 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The Caernarvon operating system was developed to
                 demonstrate that a high assurance system for smart
                 cards was technically feasible and commercially viable.
                 The entire system has been designed to be evaluated
                 under the Common Criteria at EAL7, the highest defined
                 level of assurance.\par

                 Historically, smart card processors have not supported
                 the hardware protection features necessary to separate
                 the OS from the applications, and one application from
                 another. The Caernarvon OS has taken advantage of the
                 first smart card processors with such features to be
                 the first smart card OS to provide this kind of
                 protection. Even when compared with conventional
                 systems where the hardware protection is routine, the
                 Caernarvon OS is noteworthy, because of the EAL7
                 assurance.\par

                 This approach facilitated implementation of a formally
                 specified, mandatory security policy providing
                 multi-level security (MLS) suitable for both government
                 agencies and commercial users. The mandatory security
                 policy requires effective authentication of its users
                 that is independent of applications. For this reason,
                 the Caernarvon OS also contains a privacy-preserving,
                 two-way authentication protocol integrated with the
                 Mandatory Security Policy.\par

                 The Caernarvon OS includes a strong cryptographic
                 library that has been separately certified under the
                 Common Criteria at EAL5+ for use with other systems.
                 The Caernarvon OS implements a secure method for
                 downloading trusted and untrusted application software
                 and data in the field, with the assumption that all
                 applications are potentially hostile. While the initial
                 platform for the operating system was smart cards, the
                 design could also be used in other embedded devices,
                 such as USB tokens, PDAs, cell phones, etc.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGOPS Operating Systems Review",
  keywords =     "common criteria evaluation; embedded systems;
                 mandatory access controls; mobile phones; operating
                 systems; PDAs; smart cards",
}

@Article{Troutman:2008:VMM,
  author =       "Justin Troutman",
  title =        "The Virtues of Mature and Minimalist Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "62--65",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.99",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Tsai:2008:EMS,
  author =       "Jia-Lun Tsai",
  title =        "Efficient multi-server authentication scheme based on
                 one-way hash function without verification table",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "3--4",
  pages =        "115--121",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:10 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000084",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Unay:2008:SQE,
  author =       "Ozan {\"U}nay and Taflan I. G{\"u}ndem",
  title =        "A survey on querying encrypted {XML} documents for
                 databases as a service",
  journal =      j-SIGMOD,
  volume =       "37",
  number =       "1",
  pages =        "12--20",
  month =        mar,
  year =         "2008",
  CODEN =        "SRECD8",
  DOI =          "https://doi.org/10.1145/1374780.1374783",
  ISSN =         "0163-5808 (print), 1943-5835 (electronic)",
  ISSN-L =       "0163-5808",
  bibdate =      "Tue Jun 17 16:20:43 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "'Database as a service' paradigm has gained a lot of
                 interest in recent years. This has raised questions
                 about the security of data in the servers. Firms
                 outsourcing their XML databases to untrusted parties
                 started to look for new ways to securely store data and
                 efficiently query them. In this paper, encrypted XML
                 documents, their crypto index structures and query
                 processing using these structures are investigated. A
                 comparison of various algorithms in the literature is
                 given.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGMOD Record",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J689",
  keywords =     "database as a service; encryption; querying encrypted
                 XML document algorithms; XML",
}

@Article{vanOorschot:2008:PMU,
  author =       "P. C. van Oorschot and Julie Thorpe",
  title =        "On predictive models and user-drawn graphical
                 passwords",
  journal =      j-TISSEC,
  volume =       "10",
  number =       "4",
  pages =        "5:1--5:??",
  month =        jan,
  year =         "2008",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1284680.1284685",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 12 17:52:24 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "In commonplace text-based password schemes, users
                 typically choose passwords that are easy to recall,
                 exhibit patterns, and are thus vulnerable to
                 brute-force dictionary attacks. This leads us to ask
                 whether other types of passwords (e. g. , graphical)
                 are also vulnerable to dictionary attack because of
                 users tending to choose memorable passwords. We suggest
                 a method to predict and model a number of such classes
                 for systems where passwords are created solely from a
                 user's memory. We hypothesize that these classes define
                 weak password subspaces suitable for an attack
                 dictionary. For user-drawn graphical passwords, we
                 apply this method with cognitive studies on visual
                 recall. These cognitive studies motivate us to define a
                 set of password complexity factors (e. g. , reflective
                 symmetry and stroke count), which define a set of
                 classes. To better understand the size of these classes
                 and, thus, how weak the password subspaces they define
                 might be, we use the ``Draw-A-Secret'' (DAS) graphical
                 password scheme of Jermyn et al. [1999] as an example.
                 We analyze the size of these classes for DAS under
                 convenient parameter choices and show that they can be
                 combined to define apparently popular subspaces that
                 have bit sizes ranging from 31 to 41---a surprisingly
                 small proportion of the full password space (58 bits).
                 Our results quantitatively support suggestions that
                 user-drawn graphical password systems employ measures,
                 such as graphical password rules or guidelines and
                 proactive password checking.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "dictionary attack; Draw-a-Secret; graphical
                 dictionary; Graphical passwords; memorable passwords;
                 modeling user choice; password complexity factors",
}

@Article{Vo:2008:SMA,
  author =       "Duc-Liem Vo and Kwangjo Kim",
  title =        "A secure mutual authentication scheme with key
                 agreement using smart card from bilinear pairings",
  journal =      j-INT-J-COMPUT-SYST-SCI-ENG,
  volume =       "23",
  number =       "3",
  pages =        "??--??",
  month =        may,
  year =         "2008",
  CODEN =        "CSSEEI",
  ISSN =         "0267-6192",
  bibdate =      "Tue Dec 03 12:41:11 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsystscieng.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Systems Science and
                 Engineering",
  remark =       "Special issue: Privacy Data Management",
}

@Article{Voyiatzis:2008:SFS,
  author =       "Artemios G. Voyiatzis and Dimitrios N. Serpanos",
  title =        "The security of the {Fiat--Shamir} scheme in the
                 presence of transient hardware faults",
  journal =      j-TECS,
  volume =       "7",
  number =       "3",
  pages =        "31:1--31:??",
  month =        apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1347375.1347384",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Jun 12 15:22:21 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Implementation cryptanalysis has emerged as a
                 realistic threat for cryptographic systems. It consists
                 of two classes of attacks: fault-injection and
                 side-channel attacks. In this work, we examine the
                 resistance of the Fiat--Shamir scheme to
                 fault-injection attacks, since Fiat--Shamir is a
                 popular scheme for ``light'' consumer devices, such as
                 smartcards, in a wide range of consumer services. We
                 prove that an existing attack, known as the Bellcore
                 attack, is incomplete. We propose an extension to the
                 protocol that proactively secures Fiat--Shamir systems
                 from the Bellcore attack and we prove its strength.
                 Finally, we introduce a new attack model, which, under
                 stronger assumptions, can derive the secret keys from
                 both the original Fiat--Shamir scheme as well as its
                 proposed extension. Our approach demonstrates that
                 countermeasures for implementation cryptanalysis must
                 be carefully designed and that deployed systems must
                 include appropriate protection mechanisms for all known
                 attacks and be flexible enough to incorporate
                 countermeasures for new ones.",
  acknowledgement = ack-nhfb,
  articleno =    "31",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J840",
  keywords =     "Bellcore attack; cryptography; Fiat--Shamir
                 identification scheme; side-channel attacks;
                 smartcards",
}

@Article{Wang:2008:DCP,
  author =       "Xing-Yuan Wang and Xiao-Juan Wang",
  title =        "Design of chaotic pseudo-random bit generator and its
                 applications in stream-cipher cryptography",
  journal =      j-INT-J-MOD-PHYS-C,
  volume =       "19",
  number =       "5",
  pages =        "813--820",
  month =        may,
  year =         "2008",
  CODEN =        "IJMPEO",
  DOI =          "https://doi.org/10.1142/S0129183108012479",
  ISSN =         "0129-1831 (print), 1793-6586 (electronic)",
  bibdate =      "Thu Feb 23 22:12:58 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.worldscinet.com/ijmpc/19/1905/S0129183108012479.html",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Modern Physics C [Physics and
                 Computers]",
  journal-URL =  "http://www.worldscientific.com/loi/ijmpc",
}

@Article{Wang:2008:HQS,
  author =       "Chung-Ming Wang and Nan-I Wu and Chwei-Shyong Tsai and
                 Min-Shiang Hwang",
  title =        "A high quality steganographic method with pixel-value
                 differencing and modulus function",
  journal =      j-J-SYST-SOFTW,
  volume =       "81",
  number =       "1",
  pages =        "150--158",
  month =        jan,
  year =         "2008",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Wang:2008:NAD,
  author =       "Xiang-Yang Wang and Pan-Pan Niu and Wei Qi",
  title =        "A new adaptive digital audio watermarking based on
                 support vector machine",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "31",
  number =       "4",
  pages =        "735--749",
  month =        nov,
  year =         "2008",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:43:22 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804507000525",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Washington:2008:BRB,
  author =       "Lawrence C. Washington",
  title =        "Book Review: {{\booktitle{Handbook of Elliptic and
                 Hyperelliptic Curve Cryptography}}, by H. Cohen and G.
                 Frey, Chapman \& Hall\slash CRC, 2006, 1-58488-518-1}",
  journal =      j-SIGACT,
  volume =       "39",
  number =       "1",
  pages =        "19--22",
  month =        mar,
  year =         "2008",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1360443.1360448",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 18:30:30 MDT 2012",
  bibsource =    "DBLP;
                 http://dblp.uni-trier.de/db/journals/sigact/sigact39.html#Washington08;
                 http://portal.acm.org/;
                 https://www.math.utah.edu/pub/mirrors/ftp.ira.uka.de/bibliography/Misc/DBLP/2008.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See \cite{Cohen:2006:HEH}.",
  URL =          "http://doi.acm.org/10.1145/1360443.1360448",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Book{Washington:2008:ECN,
  author =       "Lawrence C. Washington",
  title =        "Elliptic curves: number theory and cryptography",
  publisher =    pub-CHAPMAN-HALL-CRC,
  address =      pub-CHAPMAN-HALL-CRC:adr,
  edition =      "Second",
  pages =        "xviii + 513",
  year =         "2008",
  ISBN =         "1-4200-7146-7 (hardcover)",
  ISBN-13 =      "978-1-4200-7146-7 (hardcover)",
  LCCN =         "QA567.2.E44 W37 2008",
  bibdate =      "Sat Jun 13 08:32:16 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Discrete mathematics and its applications",
  acknowledgement = ack-nhfb,
  subject =      "curves, elliptic; number theory; cryptography",
}

@Article{Watters:2008:VDL,
  author =       "Paul Watters and Frances Martin and H. Steffen
                 Stripf",
  title =        "Visual detection of {LSB}-encoded natural image
                 steganography",
  journal =      j-TAP,
  volume =       "5",
  number =       "1",
  pages =        "5:1--5:??",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1279640.1328775",
  ISSN =         "1544-3558 (print), 1544-3965 (electronic)",
  ISSN-L =       "1544-3558",
  bibdate =      "Mon Jun 16 14:17:20 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Many steganographic systems embed hidden messages
                 inside the least significant bit layers of colour
                 natural images. The presence of these messages can be
                 difficult to detect by using statistical steganalysis.
                 However, visual steganalysis by humans may be more
                 successful in natural image discrimination. This study
                 examined whether humans could detect least-significant
                 bit steganography in 15 color natural images from the
                 VisTex database using a controlled same/different task
                 ($ N = 58 $ ) and a yes/no task ($ N = 61 $ ). While $
                 d \prime > 1 $ was observed for color layers 4--8,
                 layers 1--3 had $ d \prime < 1 $ in both experiments.
                 Thus, layers 1--3 appear to be highly resistant to
                 visual steganalysis.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Transactions on Applied Perception (TAP)",
  keywords =     "counterterrorism; Steganography",
}

@Article{Webb:2008:IZN,
  author =       "Charles F. Webb",
  title =        "{IBM z10}: The Next-Generation Mainframe
                 Microprocessor",
  journal =      j-IEEE-MICRO,
  volume =       "28",
  number =       "2",
  pages =        "19--29",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "IEMIDZ",
  DOI =          "https://doi.org/10.1109/MM.2008.26",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Wed Jul 2 21:58:04 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The IBM system z10 includes four microprocessor cores
                 --- each with a private 3-Mbyte cache --- and
                 integrated accelerators for decimal floating-point
                 computation, cryptography, and data compression. A
                 separate SMP hub chip provides a shared third-level
                 cache and interconnect fabric for multiprocessor
                 scaling. This article focuses on the high-frequency
                 design techniques used to achieve a 4.4-GHz system, and
                 on the pipeline design that optimizes z10's CPU
                 performance.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Micro",
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
  keywords =     "decimal floating-point arithmetic",
}

@Article{Weigold:2008:RCA,
  author =       "Thomas Weigold and Thorsten Kramp and Michael
                 Baentsch",
  title =        "Remote Client Authentication",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "36--43",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.93",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Weitzner:2008:IA,
  author =       "Daniel J. Weitzner and Harold Abelson and Tim
                 Berners-Lee and Joan Feigenbaum and James Hendler and
                 Gerald Jay Sussman",
  title =        "Information accountability",
  journal =      j-CACM,
  volume =       "51",
  number =       "6",
  pages =        "82--87",
  month =        jun,
  year =         "2008",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1349026.1349043",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jun 16 18:37:21 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "With access control and encryption no longer capable
                 of protecting privacy, laws and systems are needed that
                 hold people accountable for the misuse of personal
                 information, whether public or secret.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Wu:2008:RPG,
  author =       "Tzong-Chen Wu and Thsia-Tzu Huang and Chien-Lung Hsu
                 and Kuo-Yu Tsai",
  title =        "Recursive protocol for group-oriented authentication
                 with key distribution",
  journal =      j-J-SYST-SOFTW,
  volume =       "81",
  number =       "7",
  pages =        "1227--1239",
  month =        jul,
  year =         "2008",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:04 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Wu:2008:RWM,
  author =       "Xiaomao Wu and Lizhuang Ma and Zhuoqun Dong and Lionel
                 Rev{\'e}ret",
  title =        "Robust watermarking motion data with {DL-STDM}",
  journal =      j-COMPUTERS-AND-GRAPHICS,
  volume =       "32",
  number =       "3",
  pages =        "320--329",
  month =        jun,
  year =         "2008",
  CODEN =        "COGRD2",
  DOI =          "https://doi.org/10.1016/j.cag.2008.04.002",
  ISSN =         "0097-8493 (print), 1873-7684 (electronic)",
  ISSN-L =       "0097-8493",
  bibdate =      "Mon Feb 13 16:41:57 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compgraph.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00978493",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0097849308000447",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Graphics",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00978493",
}

@Article{Xiang:2008:CPA,
  author =       "Tao Xiang and Kwok-wo Wong and Xiaofeng Liao",
  title =        "Cryptanalysis of a password authentication scheme over
                 insecure networks",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "74",
  number =       "5",
  pages =        "657--661",
  month =        aug,
  year =         "2008",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2007.05.001",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:27:08 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000007000657",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Article{Yang:2008:FSD,
  author =       "G. Yang and D. S. Wong and X. Deng",
  title =        "Formal Security Definition and Efficient Construction
                 for Roaming with a Privacy-Preserving Extension",
  journal =      j-J-UCS,
  volume =       "14",
  number =       "3",
  pages =        "441--462",
  month =        "????",
  year =         "2008",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Thu Jul 10 06:41:41 MDT 2008",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_14_3/formal_security_definition_and",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
  keywords =     "cryptography",
}

@Article{Yang:2008:NFD,
  author =       "Guomin Yang and Jing Chen and Duncan S. Wong and
                 Xiaotie Deng and Dongsheng Wang",
  title =        "A new framework for the design and analysis of
                 identity-based identification schemes",
  journal =      j-THEOR-COMP-SCI,
  volume =       "407",
  number =       "1--3",
  pages =        "370--388",
  day =          "6",
  month =        nov,
  year =         "2008",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Mar 28 21:21:42 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Yang:2008:TFM,
  author =       "Guomin Yang and Duncan S. Wong and Huaxiong Wang and
                 Xiaotie Deng",
  title =        "Two-factor mutual authentication based on smart cards
                 and passwords",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "74",
  number =       "7",
  pages =        "1160--1172",
  month =        nov,
  year =         "2008",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2008.04.002",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:27:08 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000008000482",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Article{Yang:2008:VCS,
  author =       "Ching-Nung Yang and Chung-Chun Wang and Tse-Shih
                 Chen",
  title =        "Visual Cryptography Schemes with Reversing",
  journal =      j-COMP-J,
  volume =       "51",
  number =       "6",
  pages =        "710--722",
  month =        nov,
  year =         "2008",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxm118",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Apr 28 14:33:34 MDT 2010",
  bibsource =    "http://comjnl.oxfordjournals.org/content/vol51/issue6/index.dtl;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://comjnl.oxfordjournals.org/cgi/content/abstract/51/6/710;
                 http://comjnl.oxfordjournals.org/cgi/content/full/51/6/710;
                 http://comjnl.oxfordjournals.org/cgi/reprint/51/6/710",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Yardi:2008:HAC,
  author =       "Sarita Yardi and Pamela Krolikowski and Taneshia
                 Marshall and Amy Bruckman",
  title =        "An {HCI} Approach to Computing in the Real World",
  journal =      j-JERIC,
  volume =       "8",
  number =       "3",
  pages =        "9:1--9:??",
  month =        oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1404935.1404938",
  ISSN =         "1531-4278",
  bibdate =      "Fri Oct 10 12:52:01 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We describe the implementation of a six-week course to
                 teach Human-Computer Interaction (HCI) to high school
                 students. Our goal was to explore the potential of HCI
                 in motivating students to pursue future studies in
                 related computing fields. Participants in our course
                 learned to make connections between the types of
                 technology they use in their daily lives and the design
                 processes that went into creating these technologies.
                 We suggest that by portraying computing through the
                 lens of HCI, as an innovative, creative, and
                 challenging field with authentic, real-world
                 applications, we may be able to motivate students to
                 become more interested in computing.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Journal on Educational Resources in Computing
                 (JERIC)",
  keywords =     "broadening participation in computing; education;
                 human-computer interaction; K-12 curriculum;
                 motivation",
}

@Article{Yasuda:2008:DLP,
  author =       "Masaya Yasuda",
  title =        "The discrete logarithm problem on elliptic curves
                 defined over {$Q$} (abstract only)",
  journal =      j-ACM-COMM-COMP-ALGEBRA,
  volume =       "42",
  number =       "1--2",
  pages =        "64--66",
  month =        mar # "/" # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1394042.1394074",
  ISSN =         "1932-2232 (print), 1932-2240 (electronic)",
  ISSN-L =       "1932-2232",
  bibdate =      "Tue Aug 12 17:30:40 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Communications in Computer Algebra",
  keywords =     "cryptography",
}

@Article{Yeh:2008:STB,
  author =       "Jyh-haw Yeh",
  title =        "A secure time-bound hierarchical key assignment scheme
                 based on {RSA} public key cryptosystem",
  journal =      j-INFO-PROC-LETT,
  volume =       "105",
  number =       "4",
  pages =        "117--120",
  day =          "15",
  month =        feb,
  year =         "2008",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 15:52:57 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Yiu:2008:ODC,
  author =       "Wai-Pun Ken Yiu and Shueng-Han Gary Chan",
  title =        "Offering data confidentiality for multimedia overlay
                 multicast: {Design} and analysis",
  journal =      j-TOMCCAP,
  volume =       "5",
  number =       "2",
  pages =        "13:1--13:??",
  month =        nov,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1413862.1413866",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Tue Mar 16 18:52:17 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Application layer multicast (ALM) has been proposed to
                 overcome current limitations in IP multicast for
                 large-group multimedia communication. We address
                 offering data confidentiality tailored for ALM. To
                 achieve confidentiality, a node may need to
                 continuously {\em re-encrypt\/} packets before
                 forwarding them downstream. Furthermore, keys have to
                 be changed whenever there is a membership change,
                 leading to {\em rekey\/} processing overhead at the
                 nodes. For a large and dynamic group, these
                 reencryption and rekeying operations incur high
                 processing overhead at the nodes. We propose and
                 analyze a scalable scheme called Secure Overlay
                 Multicast (SOM) which clusters ALM peers so as to
                 localize rekeying within a cluster and to limit
                 re-encryption at cluster boundaries, thereby minimizing
                 the total nodal processing overhead. We describe the
                 operations of SOM and compare its nodal processing
                 overhead with two other basic approaches, namely,
                 host-to-host encryption and whole group encryption. We
                 also present a simplified analytic model for SOM and
                 show that there exists an optimal cluster size to
                 minimize the total nodal processing overhead. By
                 comparing with a recently proposed ALM scheme (DT
                 protocol), SOM achieves a substantial reduction in
                 nodal processing overhead with similar network
                 performance in terms of network stress and delay.",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
  keywords =     "Key management; multicast security; overlay multicast;
                 performance analysis",
}

@Article{Youn:2008:WRB,
  author =       "Taek-Young Youn and Young-Ho Park and Changhan Kim and
                 Jongin Lim",
  title =        "Weakness in a {RSA}-based password authenticated key
                 exchange protocol",
  journal =      j-INFO-PROC-LETT,
  volume =       "108",
  number =       "6",
  pages =        "339--342",
  day =          "30",
  month =        nov,
  year =         "2008",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 15:53:17 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Zhang:2008:CLR,
  author =       "Yu Zhang",
  title =        "Cryptographic logical relations",
  journal =      j-THEOR-COMP-SCI,
  volume =       "394",
  number =       "1--2",
  pages =        "39--63",
  day =          "31",
  month =        mar,
  year =         "2008",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Mar 28 21:49:13 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Zhang:2008:FIC,
  author =       "Qing Zhang and Ting Yu and Peng Ning",
  title =        "A Framework for Identifying Compromised Nodes in
                 Wireless Sensor Networks",
  journal =      j-TISSEC,
  volume =       "11",
  number =       "3",
  pages =        "12:1--12:??",
  month =        mar,
  year =         "2008",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1341731.1341733",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 12 17:52:50 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Sensor networks are often subject to physical attacks.
                 Once a node's cryptographic key is compromised, an
                 attacker may completely impersonate it and introduce
                 arbitrary false information into the network. Basic
                 cryptographic mechanisms are often not effective in
                 this situation. Most techniques to address this problem
                 focus on detecting and tolerating false information
                 introduced by compromised nodes. They cannot pinpoint
                 exactly where the false information is introduced and
                 who is responsible for it. \par

                 In this article, we propose an application-independent
                 framework for accurately identifying compromised sensor
                 nodes. The framework provides an appropriate
                 abstraction of application-specific detection
                 mechanisms and models the unique properties of sensor
                 networks. Based on the framework, we develop alert
                 reasoning algorithms to identify compromised nodes. The
                 algorithm assumes that compromised nodes may collude at
                 will. We show that our algorithm is optimal in the
                 sense that it identifies the largest number of
                 compromised nodes without introducing false positives.
                 We evaluate the effectiveness of the designed algorithm
                 through comprehensive experiments.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "intrusion detection; sensor networks",
}

@Article{Zhong:2008:GPT,
  author =       "Sheng Zhong and Zhiqiang Yang",
  title =        "Guided perturbation: towards private and accurate
                 mining",
  journal =      j-VLDB-J,
  volume =       "17",
  number =       "5",
  pages =        "1165--1177",
  month =        aug,
  year =         "2008",
  CODEN =        "VLDBFR",
  DOI =          "https://doi.org/10.1007/s00778-007-0056-z",
  ISSN =         "1066-8888 (print), 0949-877X (electronic)",
  ISSN-L =       "1066-8888",
  bibdate =      "Thu Jul 10 10:00:50 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbj.bib",
  abstract =     "There have been two methods for privacy- preserving
                 data mining: the perturbation approach and the
                 cryptographic approach. The perturbation approach is
                 typically very efficient, but it suffers from a
                 tradeoff between accuracy and privacy. In contrast, the
                 cryptographic approach usually maintains accuracy, but
                 it is more expensive in computation and communication
                 overhead. We propose a novel perturbation method,
                 called guided perturbation. Specifically, we focus on a
                 central problem of privacy-preserving data mining--the
                 secure scalar product problem of vertically partitioned
                 data, and give a solution based on guided perturbation,
                 with good, provable privacy guarantee. Our solution
                 achieves accuracy comparable to the cryptographic
                 solutions, while keeping the efficiency of perturbation
                 solutions. Our experimental results show that it can be
                 more than one hundred times faster than a typical
                 cryptographic solution.",
  acknowledgement = ack-nhfb,
  fjournal =     "VLDB Journal: Very Large Data Bases",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J869",
}

@Article{Ababneh:2009:CSE,
  author =       "Sufyan Ababneh and Rashid Ansari and Ashfaq Khokhar",
  title =        "Compensated Signature Embedding for Multimedia Content
                 Authentication",
  journal =      j-JDIQ,
  volume =       "1",
  number =       "3",
  pages =        "17:1--17:??",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1659225.1659230",
  ISSN =         "1936-1955",
  bibdate =      "Wed Mar 17 14:47:55 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jdqi/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "One of the main goals of digital content
                 authentication and preservation techniques is to
                 guarantee the originality and quality of the
                 information. In this article, robust watermarking is
                 used to embed content-based fragile signatures in
                 multimedia signals to achieve efficient authentication
                 without requiring any third-party reference or side
                 information. To overcome the signature alteration
                 caused by the embedding perturbation and other possible
                 encoding operations, a closed-form compensation
                 technique is proposed for ensuring signature
                 consistency by employing a Lagrangian-based approach. A
                 minimum distortion criterion is used to ensure signal
                 quality. The effectiveness of the proposed approach is
                 investigated with simulations of examples of image
                 authentication in which signatures are designed to
                 reveal tamper localization. Results using quantitative
                 performance criteria show successful authentication
                 over a range of robustness in embedding watermarks
                 using both QIM-DM and spread-spectrum techniques. A
                 comparison with two iterative compensation schemes is
                 also presented.",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "Journal of Data and Information Quality (JDIQ)",
  keywords =     "compensated signature embedding; Content
                 authentication; watermarking",
}

@Article{Acquisti:2009:PSS,
  author =       "Alessandro Acquisti and Ralph Gross",
  title =        "Predicting {Social Security} numbers from public
                 data",
  journal =      j-PROC-NATL-ACAD-SCI-USA,
  volume =       "106",
  number =       "27",
  pages =        "10975--10980",
  day =          "7",
  month =        jul,
  year =         "2009",
  CODEN =        "PNASA6",
  DOI =          "https://doi.org/10.1073/pnas.0904891106",
  ISSN =         "0027-8424 (print), 1091-6490 (electronic)",
  ISSN-L =       "0027-8424",
  bibdate =      "Wed Jul 08 14:24:20 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.pnas.org/content/early/2009/07/02/0904891106.full.pdf",
  abstract =     "Information about an individual's place and date of
                 birth can be exploited to predict his or her Social
                 Security number (SSN). Using only publicly available
                 information, we observed a correlation between
                 individuals' SSNs and their birth data and found that
                 for younger cohorts the correlation allows statistical
                 inference of private SSNs. The inferences are made
                 possible by the public availability of the Social
                 Security Administration's Death Master File and the
                 widespread accessibility of personal information from
                 multiple sources, such as data brokers or profiles on
                 social networking sites. Our results highlight the
                 unexpected privacy consequences of the complex
                 interactions among multiple data sources in modern
                 information economies and quantify privacy risks
                 associated with information revelation in public
                 forums.",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the National Academy of Sciences of the
                 United States of America",
  journal-URL =  "http://www.pnas.org/search",
  keywords =     "SSN insecurity",
}

@Article{Adao:2009:SCF,
  author =       "Pedro Ad{\~a}o and Gergei Bana and Jonathan Herzog and
                 Andre Scedrov",
  title =        "Soundness and completeness of formal encryption: The
                 cases of key cycles and partial information leakage",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "737--797",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0358",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Adee:2009:CDT,
  author =       "S. Adee",
  title =        "Chip design thwarts sneak attack on data",
  journal =      j-IEEE-SPECTRUM,
  volume =       "46",
  number =       "11",
  pages =        "16--16",
  month =        nov,
  year =         "2009",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2009.5292036",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Books; Chip scale packaging; Computer architecture;
                 Computer security; Cryptography; Data security;
                 Degradation; Electrical engineering; Information
                 retrieval; Power engineering computing",
}

@InProceedings{Adikari:2009:HBT,
  author =       "Jithra Adikari and Vassil Dimitrov and Laurent
                 Imbert",
  title =        "Hybrid Binary-Ternary Joint Form and Its Application
                 in Elliptic Curve Cryptography",
  crossref =     "Bruguera:2009:PIS",
  pages =        "76--83",
  year =         "2009",
  bibdate =      "Fri Jun 12 12:34:25 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Multi-exponentiation is a common and time consuming
                 operation in public-key cryptography. Its elliptic
                 curve counterpart, called multi-scalar multiplication
                 is extensively used for digital signature verification.
                 Several algorithms have been proposed to speed-up those
                 critical computations. They are based on simultaneously
                 recoding a set of integers in order to minimize the
                 number of general multiplications or point additions.
                 When signed-digit recoding techniques can be used, as
                 in the world of elliptic curves, Joint Sparse Form
                 (JSF) and interleaving w-NAF are the most efficient
                 algorithms. In this paper, a novel recoding algorithm
                 for a pair of integers is proposed, based on a
                 decomposition that mixes powers of 2 and powers of 3.
                 The so-called Hybrid Binary-Ternary Joint Form require
                 fewer digits and is sparser than the JSF and the
                 interleaving w-NAF. Its advantages are illustrated for
                 elliptic curve double-scalar multiplication; the
                 operation counts show a gain of up to 19\%.",
  acknowledgement = ack-nhfb,
  keywords =     "ARITH-19",
}

@Article{Akinwande:2009:AHC,
  author =       "M. Akinwande",
  title =        "Advances in Homomorphic Cryptosystems",
  journal =      j-J-UCS,
  volume =       "15",
  number =       "3",
  pages =        "506--??",
  month =        "????",
  year =         "2009",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Wed Aug 25 22:38:58 MDT 2010",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_15_3/advances_in_homomorphic_cryptosystems",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Alomair:2009:ITS,
  author =       "B. Alomair and R. Poovendran",
  title =        "Information Theoretically Secure Encryption with
                 Almost Free Authentication",
  journal =      j-J-UCS,
  volume =       "15",
  number =       "15",
  pages =        "2937--??",
  month =        "????",
  year =         "2009",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Wed Aug 25 21:52:59 MDT 2010",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_15_15/information_theoretically_secure_encryption",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Ambainis:2009:NEQ,
  author =       "Andris Ambainis and Jan Bouda and Andreas Winter",
  title =        "Nonmalleable encryption of quantum information",
  journal =      j-J-MATH-PHYS,
  volume =       "50",
  number =       "4",
  pages =        "042106",
  month =        apr,
  year =         "2009",
  CODEN =        "JMAPAQ",
  DOI =          "https://doi.org/10.1063/1.3094756",
  ISSN =         "0022-2488 (print), 1089-7658 (electronic), 1527-2427",
  ISSN-L =       "0022-2488",
  bibdate =      "Wed Oct 26 09:06:48 MDT 2011",
  bibsource =    "http://www.aip.org/ojs/jmp.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jmathphys2005.bib",
  URL =          "http://jmp.aip.org/resource/1/jmapaq/v50/i4/p042106_s1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Physics",
  journal-URL =  "http://jmp.aip.org/",
  onlinedate =   "17 April 2009",
  pagecount =    "8",
}

@Article{Anonymous:2009:BG,
  author =       "Anonymous",
  title =        "Breaking GSM",
  journal =      j-IEEE-SPECTRUM,
  volume =       "46",
  number =       "12",
  pages =        "13--13",
  month =        dec,
  year =         "2009",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2009.5340238",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Cameras; Charge coupled devices; Communication system
                 security; Cryptography; Dairy products; GSM; Magnetic
                 domains; Mobile handsets; Optical arrays; Silicon",
}

@TechReport{Anonymous:2009:DSS,
  author =       "Anonymous",
  key =          "FIPS-186-3",
  title =        "{Digital Signature Standard (DSS)}",
  type =         "{Federal Information Processing Standards}
                 Publication",
  number =       "FIPS Pub 186-3",
  institution =  pub-NIST,
  address =      pub-NIST:adr,
  pages =        "ix + 119",
  month =        jun,
  year =         "2009",
  bibdate =      "Thu Aug 21 06:15:29 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  note =         "Superceded by FIPS 186-4 \cite{Anonymous:2013:DSS}.",
  URL =          "http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography; Digital Signature
                 Standard (DSS); Federal Information Processing
                 Standards",
}

@Article{Anonymous:2009:PCA,
  author =       "Anonymous",
  title =        "Proof of concept attack further discredits {MD5}",
  journal =      j-NETWORK-SECURITY,
  volume =       "2009",
  number =       "1",
  pages =        "2--2",
  month =        jan,
  year =         "2009",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(09)70003-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:00:00 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485809700030",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
  remark =       "Discusses successful production of a rogue SSL
                 certificate with the same checksum as an existing valid
                 certificate.",
}

@Misc{Anonymous:2009:TCA,
  author =       "Anonymous",
  title =        "The Transitioning of Cryptographic Algorithms and Key
                 Sizes",
  howpublished = "Web document",
  pages =        "10",
  day =          "2",
  month =        jul,
  year =         "2009",
  bibdate =      "Thu Apr 11 14:05:20 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://csrc.nist.gov/csrc/media/projects/key-management/documents/transitions/transitioning_cryptoalgos_070209.pdf",
  abstract =     "At the beginning of the century, NIST began the task
                 of providing cryptographic key management guidance.
                 This included lessons learned over many years of
                 dealing with key management issues, and attempts to
                 encourage the definition and implementation of
                 appropriate key management procedures, to use
                 algorithms that adequately protect sensitive
                 information, and to plan ahead for possible changes in
                 the use of cryptography because of algorithm breaks or
                 the availability of more powerful computing techniques.
                 This guidance is provided in NIST Special Publication
                 (SP) 800-57.",
  acknowledgement = ack-nhfb,
  remark =       "Revised 7 May 2012.",
}

@Article{Anyanwu:2009:DCS,
  author =       "Matthew N. Anyanwu and Lih-Yuan Deng and Dipankar
                 Dasgupta",
  title =        "Design of Cryptographically Strong Generator By
                 Linearly Generated Sequences",
  journal =      j-IJCSS,
  volume =       "3",
  number =       "3",
  pages =        "186--200",
  month =        jun,
  year =         "2009",
  CODEN =        "????",
  ISSN =         "1985-1553",
  ISSN-L =       "1985-1553",
  bibdate =      "Fri Mar 09 15:20:22 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.cscjournals.org/csc/manuscript/Journals/IJCSS/volume3/Issue3/IJCSS-78.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Science and Security
                 (IJCSS)",
}

@Article{Ashraf:2009:SBE,
  author =       "Manzur Ashraf and Syed Mahfuzul Aziz and M. Lutful
                 Kabir and Biswajit K. Dey",
  title =        "A {SIM}-based electronic transaction authentication
                 system",
  journal =      j-INT-J-COMPUT-SYST-SCI-ENG,
  volume =       "24",
  number =       "4",
  pages =        "??--??",
  month =        jul,
  year =         "2009",
  CODEN =        "CSSEEI",
  ISSN =         "0267-6192",
  bibdate =      "Tue Dec 03 12:48:36 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsystscieng.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Systems Science and
                 Engineering",
  remark =       "Special issue: Privacy Data Management",
}

@Book{Atallah:2009:ATC,
  editor =       "Mikhail J. Atallah and Marina Blanton",
  title =        "Algorithms and theory of computation handbook. General
                 concepts and techniques",
  publisher =    pub-CHAPMAN-HALL-CRC,
  address =      pub-CHAPMAN-HALL-CRC:adr,
  edition =      "Second",
  pages =        "????",
  year =         "2009",
  ISBN =         "1-58488-822-9 (print), 1-58488-823-7 (e-book)",
  ISBN-13 =      "978-1-58488-822-2 (print), 978-1-58488-823-9
                 (e-book)",
  LCCN =         "QA76.9.A43 A432 2009",
  bibdate =      "Sat May 14 09:19:32 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Chapman and Hall/CRC applied algorithms and data
                 structures series",
  URL =          "http://www.crcnetbase.com/isbn/9781584888239",
  acknowledgement = ack-nhfb,
  subject =      "computer algorithms; computer science; computational
                 complexity",
  tableofcontents = "I. Front Matter \\
                 Chapter 1. Algorithm Design and Analysis Techniques /
                 Edward M. Reingold \\
                 Chapter 2. Searching / Ricardo Baeza-Yates, Patricio V.
                 Poblete \\
                 Chapter 3. Sorting and Order Statistics / Vladimir
                 Estivill-Castro \\
                 Chapter 4. Basic Data Structures / Roberto Tamassia,
                 Bryan Cantrill \\
                 Chapter 5. Topics in Data Structures / Giuseppe F.
                 Italiano, Rajeev Raman \\
                 Chapter 6. Multidimensional Data Structures for Spatial
                 Applications / Hanan Samet \\
                 Chapter 7. Basic Graph Algorithms / Samir Khuller,
                 Balaji Raghavachari \\
                 Chapter 8. Advanced Combinatorial Algorithms / Samir
                 Khuller, Balaji Raghavachari \\
                 Chapter 9. Dynamic Graph Algorithms / Camil Demetrescu,
                 David Eppstein, Zvi Galil, Giuseppe F. Italiano \\
                 Chapter 10. External-Memory Algorithms and Data
                 Structures / Lars Arge, Norbert Zeh \\
                 Chapter 11. Average Case Analysis of Algorithms /
                 Wojciech Szpankowski \\
                 Chapter 12. Randomized Algorithms / Rajeev Motwani,
                 Prabhakar Raghavan \\
                 Chapter 13. Pattern Matching in Strings / Maxime
                 Crochemore, Christophe Hancart \\
                 Chapter 14. Text Data Compression Algorithms / Maxime
                 Crochemore, Thierry Lecroq \\
                 Chapter 15. General Pattern Matching / Alberto
                 Apostolico \\
                 Chapter 16. Computational Number Theory / Samuel S.
                 Wagstaff \\
                 Chapter 17. Algebraic and Numerical Algorithms /
                 Ioannis Z. Emiris, Victor Y. Pan, Elias P. Tsigaridas
                 \\
                 Chapter 18. Applications of FFT and Structured Matrices
                 / Ioannis Z. Emiris, Victor Y. Pan \\
                 Chapter 19. Basic Notions in Computational Complexity /
                 Tao Jiang, Ming Li, Bala Ravikumar \\
                 Chapter 20. Formal Grammars and Languages / Tao Jiang,
                 Ming Li, Bala Ravikumar, Kenneth W. Regan \\
                 Chapter 21. Computability / Tao Jiang, Ming Li, Bala
                 Ravikumar, Kenneth W. Regan \\
                 Chapter 22. Complexity Classes / Eric Allender, Michael
                 C. Loui, Kenneth W. Regan \\
                 Chapter 23. Reducibility and Completeness / Eric
                 Allender, Michael C. Loui, Kenneth W. Regan \\
                 Chapter 24. Other Complexity Classes and Measures /
                 Eric Allender, Michael C. Loui, Kenneth W. Regan \\
                 Chapter 25. Parameterized Algorithms / Rodney G.
                 Downey, Catherine McCartin \\
                 Chapter 26. Computational Learning Theory / Sally A.
                 Goldman \\
                 Chapter 27. Algorithmic Coding Theory / Atri Rudra \\
                 Chapter 28. Parallel Computation / Raymond Greenlaw, H.
                 James Hoover \\
                 Chapter 29. Distributed Computing / Eli Gafni \\
                 Chapter 30. Linear Programming / Vijay Chandru, M. R.
                 Rao \\
                 Chapter 31. Integer Programming / Vijay Chandru, M. R.
                 Rao \\
                 Chapter 32. Convex Optimization / Florian Jarre,
                 Stephen A. Vavasis \\
                 Chapter 33. Simulated Annealing Techniques / Albert Y.
                 Zomaya, Rick Kazman \\
                 Chapter 34. Approximation Algorithms for NP-Hard
                 Optimization Problems / Philip N. Klein, Neal E.
                 Young",
}

@TechReport{Atighehchi:2009:EPA,
  author =       "K{\'e}vin Atighehchi and Adriana Enache and Traian
                 Muntean and Gabriel Risterucci",
  title =        "An Efficient Parallel Algorithm for {Skein} Hash
                 Functions",
  type =         "Report",
  institution =  "ERISCS Research Group, Universit{\'e} de la
                 M{\'e}diterran{\'e}e",
  address =      "Parc Scientifique de Luminy-Marseille, France",
  pages =        "11",
  day =          "30",
  month =        sep,
  year =         "2009",
  bibdate =      "Sat Dec 10 15:35:59 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Bajard:2009:SRB,
  author =       "J. C. Bajard and M. Kaihara and T. Plantard",
  title =        "Selected {RNS} Bases for Modular Multiplication",
  crossref =     "Bruguera:2009:PIS",
  pages =        "25--31",
  year =         "2009",
  bibdate =      "Fri Jun 12 12:34:25 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  abstract =     "The selection of the elements of the bases in an RNS
                 modular multiplication method is crucial and has a
                 great impact in the overall performance. This work
                 proposes specific sets of optimal RNS moduli with
                 elements of Hamming weight three whose inverses used in
                 the MRS reconstruction have very small Hamming weight.
                 This property is exploited in RNS bases conversions, to
                 completely remove and replace the products by few
                 additions/subtractions and shifts, reducing the time
                 complexity of modular multiplication. These bases are
                 specially crafted to computation with operands of sizes
                 256 or more and are suitable for cryptographic
                 applications such as the ECC protocols.",
  acknowledgement = ack-nhfb,
  keywords =     "ARITH-19",
}

@Article{Baldwin:2009:PSS,
  author =       "Adrian Baldwin and Chris Dalton and Simon Shiu and
                 Krzysztof Kostienko and Qasim Rajpoot",
  title =        "Providing secure services for a virtual
                 infrastructure",
  journal =      j-OPER-SYS-REV,
  volume =       "43",
  number =       "1",
  pages =        "44--51",
  month =        jan,
  year =         "2009",
  CODEN =        "OSRED8",
  DOI =          "https://doi.org/10.1145/1496909.1496919",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Thu Jan 22 17:21:31 MST 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/opersysrev.bib",
  abstract =     "Virtualization brings flexibility to the data center
                 and enables separations allowing for better security
                 properties. For these security properties to be fully
                 utilized, virtual machines need to be able to connect
                 to secure services such as networking and storage. This
                 paper addresses the problems associated with managing
                 the cryptographic keys upon which such services rely by
                 ensuring that keys remain within the trusted computing
                 base. Here we describe a general architecture for
                 managing keys tied to the underlying virtualized
                 systems, with a specific example given for secure
                 storage.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGOPS Operating Systems Review",
  keywords =     "key management; storage; TCG; virtualization",
}

@Book{Bard:2009:AC,
  author =       "Gregory V. Bard",
  title =        "Algebraic cryptanalysis",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xxxiii + 356",
  year =         "2009",
  ISBN =         "0-387-88757-1 (ebook), 0-387-88756-3",
  ISBN-13 =      "978-0-387-88757-9 (ebook), 978-0-387-88756-2",
  LCCN =         "Z103 .B37 2009eb",
  bibdate =      "Sat May 15 10:23:47 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 sirsi.library.utoronto.ca:2200/UNICORN",
  URL =          "http://link.library.utoronto.ca/eir/EIRdetail.cfm?Resources\_\_ID=896123&T=F",
  acknowledgement = ack-nhfb,
  subject =      "Cryptography; Data encryption (Computer science)",
}

@Article{Barthe:2009:FCC,
  author =       "Gilles Barthe and Benjamin Gr{\'e}goire and Santiago
                 Zanella B{\'e}guelin",
  title =        "Formal certification of code-based cryptographic
                 proofs",
  journal =      j-SIGPLAN,
  volume =       "44",
  number =       "1",
  pages =        "90--101",
  month =        jan,
  year =         "2009",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/1480881.1480894",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Fri Oct 9 08:40:38 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "As cryptographic proofs have become essentially
                 unverifiable, cryptographers have argued in favor of
                 developing techniques that help tame the complexity of
                 their proofs. Game-based techniques provide a popular
                 approach in which proofs are structured as sequences of
                 games and in which proof steps establish the validity
                 of transitions between successive games. Code-based
                 techniques form an instance of this approach that takes
                 a code-centric view of games, and that relies on
                 programming language theory to justify proof steps.
                 While code-based techniques contribute to formalize the
                 security statements precisely and to carry out proofs
                 systematically, typical proofs are so long and involved
                 that formal verification is necessary to achieve a high
                 degree of confidence. We present Certicrypt, a
                 framework that enables the machine-checked construction
                 and verification of code-based proofs. Certicrypt is
                 built upon the general-purpose proof assistant Coq, and
                 draws on many areas, including probability, complexity,
                 algebra, and semantics of programming languages.
                 Certicrypt provides certified tools to reason about the
                 equivalence of probabilistic programs, including a
                 relational Hoare logic, a theory of observational
                 equivalence, verified program transformations, and
                 game-based techniques such as reasoning about failure
                 events. The usefulness of Certicrypt is demonstrated
                 through various examples, including a proof of semantic
                 security of OAEP (with a bound that improves upon
                 existing published results), and a proof of existential
                 unforgeability of FDH signatures. Our work provides a
                 first yet significant step towards Halevi's ambitious
                 programme of providing tool support for cryptographic
                 proofs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  keywords =     "coq proof assistant; cryptographic proofs;
                 observational equivalence; program transformations;
                 relational Hoare logic",
}

@Article{Basso:2009:NBB,
  author =       "Alessandro Basso and Francesco Bergadano and Davide
                 Cavagnino and Victor Pomponiu and Annamaria Vernone",
  title =        "A Novel Block-based Watermarking Scheme Using the
                 {SVD} Transform",
  journal =      j-ALGORITHMS-BASEL,
  volume =       "2",
  number =       "1",
  pages =        "46--75",
  month =        mar,
  year =         "2009",
  CODEN =        "ALGOCH",
  DOI =          "https://doi.org/10.3390/a2010046",
  ISSN =         "1999-4893 (electronic)",
  ISSN-L =       "1999-4893",
  bibdate =      "Fri May 3 13:50:12 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/algorithms.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.mdpi.com/1999-4893/2/1/46",
  acknowledgement = ack-nhfb,
  fjournal =     "Algorithms (Basel)",
  journal-URL =  "https://www.mdpi.com/journal/algorithms",
  pubdates =     "Received: 29 August 2008 / Revised: 11 December 2008 /
                 Accepted: 14 January 2009 / Published: 22 January
                 2009",
}

@InProceedings{Bellare:2009:HPK,
  author =       "Mihir Bellare and Zvika Brakerski and Moni Naor and
                 Thomas Ristenpart and Gil Segev and Hovav Shacham and
                 Scott Yilek",
  editor =       "????",
  booktitle =    "Advances in Cryptology -- {ASIACRYPT 2009}",
  title =        "Hedged public-key encryption: How to protect against
                 bad randomness",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "232--249",
  year =         "2009",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 11:22:26 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 5]{Schneier:2015:SWC}.",
}

@Article{Berbain:2009:QMS,
  author =       "C{\^o}me Berbain and Henri Gilbert and Jacques
                 Patarin",
  title =        "{QUAD}: a multivariate stream cipher with provable
                 security",
  journal =      j-J-SYMBOLIC-COMP,
  volume =       "44",
  number =       "12",
  pages =        "1703--1723",
  month =        dec,
  year =         "2009",
  CODEN =        "JSYCEH",
  ISSN =         "0747-7171 (print), 1095-855X (electronic)",
  ISSN-L =       "0747-7171",
  bibdate =      "Wed Aug 25 20:13:20 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/07477171",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Symbolic Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07477171",
}

@Article{Bergmann:2009:DKR,
  author =       "Seth D. Bergmann",
  title =        "Degenerate keys for {RSA} encryption",
  journal =      j-SIGCSE,
  volume =       "41",
  number =       "2",
  pages =        "95--98",
  month =        jun,
  year =         "2009",
  CODEN =        "SIGSD3",
  DOI =          "https://doi.org/10.1145/1595453.1595483",
  ISSN =         "0097-8418 (print), 2331-3927 (electronic)",
  ISSN-L =       "0097-8418",
  bibdate =      "Sat Nov 17 15:44:23 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigcse.bib",
  abstract =     "Some keys for the RSA public key cryptosystem fail to
                 encrypt all possible plaintext messages. A necessary
                 and sufficient condition for these degenerate keys is
                 given. The probability of choosing such a key, when
                 choosing keys at random, is presented. The impact of
                 degenerate keys in an academic setting is discussed.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIGCSE Bulletin (ACM Special Interest Group on
                 Computer Science Education)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J688",
}

@InCollection{Bernstein:2009:IPQ,
  author =       "Daniel J. Bernstein",
  title =        "Introduction to post-quantum cryptography",
  crossref =     "Bernstein:2009:PQC",
  pages =        "1--14",
  year =         "2009",
  bibdate =      "Thu Apr 21 17:17:18 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Bertoni:2009:RPK,
  author =       "Guido Bertoni and Joan Daemen and Micha{\"e}l Peeters
                 and Gilles {Van Assche}",
  editor =       "Helena Handschuh and Stefan Lucks and Bart Preneel and
                 Phillip Rogaway",
  booktitle =    "Symmetric Cryptography",
  title =        "The Road from {Panama} to {Keccak} via
                 {RadioGat{\'u}n}",
  number =       "09031",
  publisher =    "Schloss Dagstuhl --- Leibniz-Zentrum f{\"u}r
                 Informatik, Germany",
  address =      "Dagstuhl, Germany",
  pages =        "??--??",
  year =         "2009",
  ISSN =         "1862-4405",
  ISSN-L =       "1862-4405",
  bibdate =      "Fri Dec 14 10:26:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  series =       "Dagstuhl Seminar Proceedings",
  URL =          "http://drops.dagstuhl.de/opus/volltexte/2009/1958",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; hash function",
  pagecount =    "9",
}

@Article{Bethencourt:2009:NTP,
  author =       "John Bethencourt and Dawn Song and Brent Waters",
  title =        "New Techniques for Private Stream Searching",
  journal =      j-TISSEC,
  volume =       "12",
  number =       "3",
  pages =        "16:1--16:??",
  month =        jan,
  year =         "2009",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1455526.1455529",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Mon Feb 2 18:03:37 MST 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "A system for private stream searching, introduced by
                 Ostrovsky and Skeith, allows a client to provide an
                 untrusted server with an encrypted search query. The
                 server uses the query on a stream of documents and
                 returns the matching documents to the client while
                 learning nothing about the nature of the query. We
                 present a new scheme for conducting private keyword
                 search on streaming data which requires $ O(m) $ server
                 to client communication complexity to return the
                 content of the matching documents, where $m$ is an
                 upper bound on the size of the documents. The required
                 storage on the server conducting the search is also $
                 O(m) $. The previous best scheme for private stream
                 searching was shown to have $ O(m \log m) $
                 communication and storage complexity. Our solution
                 employs a novel construction in which the user
                 reconstructs the matching files by solving a system of
                 linear equations. This allows the matching documents to
                 be stored in a compact buffer rather than relying on
                 redundancies to avoid collisions in the storage buffer
                 as in previous work. This technique requires a small
                 amount of metadata to be returned in addition to the
                 documents; for this the original scheme of Ostrovsky
                 and Skeith may be employed with $ O(m \log m) $
                 communication and storage complexity. We also present
                 an alternative method for returning the necessary
                 metadata based on a unique encrypted Bloom filter
                 construction. This method requires $ O(m \log (t / m))
                 $ communication and storage complexity, where $t$ is
                 the number of documents in the stream. In this article
                 we describe our scheme, prove it secure, analyze its
                 asymptotic performance, and describe a number of
                 extensions. We also provide an experimental analysis of
                 its scalability in practice. Specifically, we consider
                 its performance in the demanding scenario of providing
                 a privacy preserving version of the Google News Alerts
                 service.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "Bloom filter; private information retrieval; private
                 stream searching; public key program obfuscation",
}

@Article{Bhatnagar:2009:RRW,
  author =       "Gaurav Bhatnagar and Balasubramanian Raman",
  title =        "Robust Reference-Watermarking Scheme Using Wavelet
                 Packet Transform and Bidiagonal-Singular Value
                 Decomposition",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "9",
  number =       "3",
  pages =        "449--477",
  month =        jul,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1142/S0219467809003538",
  ISSN =         "0219-4678",
  bibdate =      "Tue Aug 31 08:38:02 MDT 2010",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics (IJIG)",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Bhattacharyya:2009:VPA,
  author =       "D. Bhattacharyya and P. Das and T.-h. Kim and S. K.
                 Bandyopadhyay",
  title =        "Vascular Pattern Analysis towards Pervasive Palm Vein
                 Authentication",
  journal =      j-J-UCS,
  volume =       "15",
  number =       "5",
  pages =        "1081--??",
  month =        "????",
  year =         "2009",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Wed Aug 25 22:38:58 MDT 2010",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_15_5/vascular_pattern_analysis_towards",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Bi:2009:MCE,
  author =       "Chengpeng Bi",
  title =        "A {Monte Carlo} {EM} Algorithm for {De Novo Motif}
                 Discovery in Biomolecular Sequences",
  journal =      j-TCBB,
  volume =       "6",
  number =       "3",
  pages =        "370--386",
  month =        jul,
  year =         "2009",
  CODEN =        "ITCBCY",
  DOI =          "https://doi.org/10.1109/TCBB.2008.103",
  ISSN =         "1545-5963 (print), 1557-9964 (electronic)",
  ISSN-L =       "1545-5963",
  bibdate =      "Tue Aug 11 18:13:22 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Motif discovery methods play pivotal roles in
                 deciphering the genetic regulatory codes (i.e., motifs)
                 in genomes as well as in locating conserved domains in
                 protein sequences. The Expectation Maximization (EM)
                 algorithm is one of the most popular methods used in de
                 novo motif discovery. Based on the position weight
                 matrix (PWM) updating technique, this paper presents a
                 Monte Carlo version of the EM motif-finding algorithm
                 that carries out stochastic sampling in local alignment
                 space to overcome the conventional EM's main drawback
                 of being trapped in a local optimum. The newly
                 implemented algorithm is named as Monte Carlo EM Motif
                 Discovery Algorithm (MCEMDA). MCEMDA starts from an
                 initial model, and then it iteratively performs Monte
                 Carlo simulation and parameter update until
                 convergence. A log-likelihood profiling technique
                 together with the top-$k$ strategy is introduced to
                 cope with the phase shifts and multiple modal issues in
                 motif discovery problem. A novel grouping motif
                 alignment (GMA) algorithm is designed to select motifs
                 by clustering a population of candidate local
                 alignments and successfully applied to subtle motif
                 discovery. MCEMDA compares favorably to other popular
                 PWM-based and word enumerative motif algorithms tested
                 using simulated $ (l, d) $-motif cases, documented
                 prokaryotic, and eukaryotic DNA motif sequences.
                 Finally, MCEMDA is applied to detect large blocks of
                 conserved domains using protein benchmarks and exhibits
                 its excellent capacity while compared with other
                 multiple sequence alignment methods.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE/ACM Transactions on Computational Biology and
                 Bioinformatics",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J954",
  keywords =     "Expectation maximization (EM); Monte Carlo EM; motif
                 discovery; multiple sequence alignment; transcriptional
                 regulation.",
}

@TechReport{Biryukov:2009:KRA,
  author =       "Alex Biryukov and Orr Dunkelman and Nathan Keller and
                 Dmitry Khovratovich and Adi Shamir",
  title =        "Key Recovery Attacks of Practical Complexity on {AES}
                 Variants With Up To 10 Rounds",
  type =         "Report",
  institution =  "University of Luxembourg, Luxembourg; {\'E}cole
                 Normale Sup{\'e}rieure, 45 rue d'Ulm, 75230 Paris,
                 France. Einstein Institute of Mathematics, Hebrew
                 University, Jerusalem 91904, Israel; Computer Science
                 department, The Weizmann Institute, Rehovot 76100,
                 Israel",
  day =          "8",
  month =        nov,
  year =         "2009",
  bibdate =      "Mon Nov 09 15:21:59 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://eprint.iacr.org/2009/374.pdf",
  abstract =     "AES is the best known and most widely used block
                 cipher. Its three versions (AES-128, AES-192, and
                 AES-256) differ in their key sizes (128 bits, 192 bits
                 and 256 bits) and in their number of rounds (10, 12,
                 and 14, respectively). In the case of AES-128, there is
                 no known attack which is faster than the $ 2^{128} $
                 complexity of exhaustive search. However, AES-192 and
                 AES-256 were recently shown to be breakable by attacks
                 which require $ 2^{176} $ and $ 2^{119} $ time,
                 respectively. While these complexities are much faster
                 than exhaustive search, they are completely
                 non-practical, and do not seem to pose any real threat
                 to the security of AES-based systems. In this paper we
                 describe several attacks which can break with practical
                 complexity variants of AES-256 whose number of rounds
                 are comparable to that of AES-128. One of our attacks
                 uses only two related keys and $ 2^{39} $ time to
                 recover the complete 256-bit key of a 9-round version
                 of AES-256 (the best previous attack on this variant
                 required 4 related keys and $ 2^{120} $ time). Another
                 attack can break a 10 round version of AES-256 in $
                 2^{45} $ time, but it uses a stronger type of related
                 subkey attack (the best previous attack on this variant
                 required 64 related keys and $ 2^{172} $ time). While
                 neither AES-128 nor AES-256 can be directly broken by
                 these attacks, the fact that their hybrid (which
                 combines the smaller number of rounds from AES-128
                 along with the larger key size from AES-256) can be
                 broken with such a low complexity raises serious
                 concern about the remaining safety margin offered by
                 the AES family of cryptosystems.",
  acknowledgement = ack-nhfb,
}

@InProceedings{Blaszczyk:2009:EVT,
  author =       "Marta Blaszczyk and Richard A. Guinee",
  booktitle =    "{IET Irish Signals and Systems Conference (ISSC
                 2009)}",
  title =        "Experimental validation of a true random binary digit
                 generator fusion with a pseudo random number generator
                 for cryptographic module application",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "1--6",
  year =         "2009",
  DOI =          "https://doi.org/10.1049/cp.2009.1708",
  bibdate =      "Fri Jan 6 08:10:49 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5524689",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5510084",
  keywords =     "true random numbers from physical sources",
}

@Book{Blunden:2009:RAE,
  author =       "Bill Blunden",
  title =        "The rootkit arsenal: escape and evasion in the dark
                 corners of the system",
  publisher =    "Wordware Publishing",
  address =      "Plano, TX, USA",
  pages =        "xxvii + 908",
  year =         "2009",
  ISBN =         "1-59822-061-6 (paperback)",
  ISBN-13 =      "978-1-59822-061-2 (paperback)",
  LCCN =         "QA76.9.A25 B585 2009",
  bibdate =      "Wed Jan 12 11:17:37 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computers; Access control; Computer viruses; Computer
                 hackers",
}

@Article{Boyer:2009:SBB,
  author =       "Michel Boyer and Ran Gelles and Tal Mor",
  title =        "Security of the {Bennett--Brassard} Quantum Key
                 Distribution Protocol against Collective Attacks",
  journal =      j-ALGORITHMS-BASEL,
  volume =       "2",
  number =       "2",
  pages =        "790--807",
  month =        jun,
  year =         "2009",
  CODEN =        "ALGOCH",
  DOI =          "https://doi.org/10.3390/a2020790",
  ISSN =         "1999-4893 (electronic)",
  ISSN-L =       "1999-4893",
  bibdate =      "Fri May 3 13:50:12 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/algorithms.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.mdpi.com/1999-4893/2/2/790",
  acknowledgement = ack-nhfb,
  fjournal =     "Algorithms (Basel)",
  journal-URL =  "https://www.mdpi.com/journal/algorithms",
  pubdates =     "Received: 16 October 2008 / Revised: 17 April 2009 /
                 Accepted: 7 May 2009 / Published: 3 June 2009",
}

@InCollection{Buchmann:2009:HBD,
  author =       "Johannes Buchmann and Erik Dahmen and Michael Szydlo",
  title =        "Hash-based Digital Signature Schemes",
  crossref =     "Bernstein:2009:PQC",
  pages =        "35--94",
  year =         "2009",
  bibdate =      "Thu Apr 21 17:17:18 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Buchmann:2009:PQC,
  author =       "Johannes Buchmann and Richard Lindner and Markus
                 R{\"u}ckert and Michael Schneider",
  title =        "Post-quantum cryptography: lattice signatures",
  journal =      j-COMPUTING,
  volume =       "85",
  number =       "1--2",
  pages =        "105--125",
  month =        jun,
  year =         "2009",
  CODEN =        "CMPTA2",
  ISSN =         "0010-485X (print), 1436-5057 (electronic)",
  ISSN-L =       "0010-485X",
  bibdate =      "Sun Oct 31 11:09:57 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0010-485X&volume=85&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0010-485X&volume=85&issue=1&spage=105",
  acknowledgement = ack-nhfb,
  fjournal =     "Computing: Archiv f{\"u}r informatik und numerik",
  journal-URL =  "http://link.springer.com/journal/607",
}

@PhdThesis{Bulygin:2009:PSS,
  author =       "Stanislav Bulygin",
  title =        "Polynomial system solving for decoding linear codes
                 and algebraic cryptanalysis",
  type =         "{Ph.D.} thesis (??)",
  school =       "Technische Universit{\"a}t Kaiserslautern",
  address =      "Kaiserslautern, Germany",
  year =         "2009",
  bibdate =      "Fri May 13 07:35:16 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Burmester:2009:UCR,
  author =       "Mike Burmester and Tri Van Le and Breno {De Medeiros}
                 and Gene Tsudik",
  title =        "Universally Composable {RFID} Identification and
                 Authentication Protocols",
  journal =      j-TISSEC,
  volume =       "12",
  number =       "4",
  pages =        "21:1--21:??",
  month =        apr,
  year =         "2009",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1513601.1513603",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu May 14 13:53:50 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "As the number of RFID applications grows, concerns
                 about their security and privacy become greatly
                 amplified. At the same time, the acutely restricted and
                 cost-sensitive nature of RFID tags rules out simple
                 reuse of traditional security/privacy solutions and
                 calls for a new generation of extremely lightweight
                 identification and authentication protocols.\par

                 This article describes a universally composable
                 security framework designed especially for RFID
                 applications. We adopt RFID-specific setup,
                 communication, and concurrency assumptions in a model
                 that guarantees strong security, privacy, and
                 availability properties. In particular, the framework
                 supports modular deployment, which is most appropriate
                 for ubiquitous applications. We also describe a set of
                 simple, efficient, secure, and anonymous (untraceable)
                 RFID identification and authentication protocols that
                 instantiate the proposed framework. These protocols
                 involve minimal interaction between tags and readers
                 and place only a small computational load on the tag,
                 and a light computational burden on the back-end
                 server. We show that our protocols are provably secure
                 within the proposed framework.",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "authentication and key-exchange protocols; RFID
                 security; universal composability",
}

@Article{Butler:2009:LIB,
  author =       "Kevin R. B. Butler and Sunam Ryu and Patrick Traynor
                 and Patrick D. McDaniel",
  title =        "Leveraging Identity-Based Cryptography for Node {ID}
                 Assignment in Structured {P2P} Systems",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "20",
  number =       "12",
  pages =        "1803--1815",
  month =        dec,
  year =         "2009",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2008.249",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Thu May 13 12:06:56 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Caballero-Gil:2009:GBA,
  author =       "P. Caballero-Gil and A. F{\'u}ster-Sabater and C.
                 Hern{\'a}ndez-Goya",
  title =        "Graph-Based Approach to the Edit Distance
                 Cryptanalysis of Irregularly Clocked Linear Feedback
                 Shift Registers",
  journal =      j-J-UCS,
  volume =       "15",
  number =       "15",
  pages =        "2981--??",
  month =        "????",
  year =         "2009",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Wed Aug 25 21:52:59 MDT 2010",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_15_15/graph_based_approach_to",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Cachin:2009:TC,
  author =       "Christian Cachin and Idit Keidar and Alexander
                 Shraer",
  title =        "Trusting the cloud",
  journal =      j-SIGACT,
  volume =       "40",
  number =       "2",
  pages =        "81--86",
  month =        jun,
  year =         "2009",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1556154.1556173",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 18:30:31 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  abstract =     "More and more users store data in ``clouds'' that are
                 accessed remotely over the Internet. We survey
                 well-known cryptographic tools for providing integrity
                 and consistency for data stored in clouds and discuss
                 recent research in cryptography and distributed
                 computing addressing these problems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Caputo:2009:DIT,
  author =       "Deanna Caputo and Marcus Maloof and Gregory Stephens",
  title =        "Detecting Insider Theft of Trade Secrets",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "14--21",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.110",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Castelluccia:2009:EPS,
  author =       "Claude Castelluccia and Aldar C-F. Chan and Einar
                 Mykletun and Gene Tsudik",
  title =        "Efficient and provably secure aggregation of encrypted
                 data in wireless sensor networks",
  journal =      j-TOSN,
  volume =       "5",
  number =       "3",
  pages =        "20:1--20:??",
  month =        may,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1525856.1525858",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Tue Mar 16 15:23:43 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Wireless sensor networks (WSNs) are composed of tiny
                 devices with limited computation and battery
                 capacities. For such resource-constrained devices, data
                 transmission is a very energy-consuming operation. To
                 maximize WSN lifetime, it is essential to minimize the
                 number of bits sent and received by each device. One
                 natural approach is to aggregate sensor data along the
                 path from sensors to the sink. Aggregation is
                 especially challenging if end-to-end privacy between
                 sensors and the sink (or aggregate integrity) is
                 required. In this article, we propose a simple and
                 provably secure encryption scheme that allows efficient
                 additive aggregation of encrypted data. Only one
                 modular addition is necessary for ciphertext
                 aggregation. The security of the scheme is based on the
                 indistinguishability property of a pseudorandom
                 function (PRF), a standard cryptographic primitive. We
                 show that aggregation based on this scheme can be used
                 to efficiently compute statistical values, such as
                 mean, variance, and standard deviation of sensed data,
                 while achieving significant bandwidth savings. To
                 protect the integrity of the aggregated data, we
                 construct an end-to-end aggregate authentication scheme
                 that is secure against outsider-only attacks, also
                 based on the indistinguishability property of PRFs.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
  keywords =     "Authentication; cryptography; privacy; pseudorandom
                 functions; secure data aggregation; stream ciphers;
                 wireless sensor networks",
}

@Article{Cetin:2009:NSA,
  author =       "Ozdemir Cetin and A. Turan Ozcerit",
  title =        "A new steganography algorithm based on color
                 histograms for data embedding into raw video streams",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "670--682",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480900042X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chang:2009:FDI,
  author =       "Chin-Chen Chang and Yung-Chen Chou",
  title =        "A Fragile Digital Image Authentication Scheme Inspired
                 by Wet Paper Codes",
  journal =      j-FUND-INFO,
  volume =       "90",
  number =       "1--2",
  pages =        "17--26",
  month =        jan,
  year =         "2009",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2009-0002",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:08:04 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Chang:2009:PCC,
  author =       "Chin-Chen Chang and Tzung-Her Chen and Li-Jen Liu",
  title =        "Preventing Cheating in Computational Visual
                 Cryptography",
  journal =      j-FUND-INFO,
  volume =       "92",
  number =       "1--2",
  pages =        "27--42",
  month =        jan,
  year =         "2009",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2009-0064",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:08:27 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Chao:2009:HCS,
  author =       "Min-Wen Chao and Chao-hung Lin and Cheng-Wei Yu and
                 Tong-Yee Lee",
  title =        "A High Capacity {$3$D} Steganography Algorithm",
  journal =      j-IEEE-TRANS-VIS-COMPUT-GRAPH,
  volume =       "15",
  number =       "2",
  pages =        "274--284",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "ITVGEA",
  DOI =          "https://doi.org/10.1109/TVCG.2008.94",
  ISSN =         "1077-2626 (print), 1941-0506 (electronic), 2160-9306",
  ISSN-L =       "1077-2626",
  bibdate =      "Thu Jul 2 10:22:33 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Visualization and Computer
                 Graphics",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2945",
}

@Article{Chen:2009:AKD,
  author =       "Bee-Chung Chen and Kristen Lefevre and Raghu
                 Ramakrishnan",
  title =        "Adversarial-knowledge dimensions in data privacy",
  journal =      j-VLDB-J,
  volume =       "18",
  number =       "2",
  pages =        "429--467",
  month =        apr,
  year =         "2009",
  CODEN =        "VLDBFR",
  DOI =          "https://doi.org/10.1007/s00778-008-0118-x",
  ISSN =         "1066-8888 (print), 0949-877X (electronic)",
  ISSN-L =       "1066-8888",
  bibdate =      "Mon Apr 13 09:15:13 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Privacy is an important issue in data publishing. Many
                 organizations distribute non-aggregate personal data
                 for research, and they must take steps to ensure that
                 an adversary cannot predict sensitive information
                 pertaining to individuals with high confidence. This
                 problem is further complicated by the fact that, in
                 addition to the published data, the adversary may also
                 have access to other resources (e.g., public records
                 and social networks relating individuals), which we
                 call adversarial knowledge. A robust privacy framework
                 should allow publishing organizations to analyze data
                 privacy by means of not only data dimensions (data that
                 a publishing organization has), but also
                 adversarial-knowledge dimensions (information not in
                 the data). In this paper, we first describe a general
                 framework for reasoning about privacy in the presence
                 of adversarial knowledge. Within this framework, we
                 propose a novel multidimensional approach to
                 quantifying adversarial knowledge. This approach allows
                 the publishing organization to investigate privacy
                 threats and enforce privacy requirements in the
                 presence of various types and amounts of adversarial
                 knowledge. Our main technical contributions include a
                 multidimensional privacy criterion that is more
                 intuitive and flexible than previous approaches to
                 modeling background knowledge. In addition, we identify
                 an important congregation property of the
                 adversarial-knowledge dimensions. Based on this
                 property, we provide algorithms for measuring
                 disclosure and sanitizing data that improve
                 computational efficiency several orders of magnitude
                 over the best known techniques.",
  acknowledgement = ack-nhfb,
  fjournal =     "VLDB Journal: Very Large Data Bases",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J869",
  keywords =     "Anonymization; Knowledge expression;
                 Privacy-preserving data publishing; Probabilistic
                 inference; Skyline; Worst-case privacy",
}

@Article{Chen:2009:FCV,
  author =       "Tzung-Her Chen and Kai-Hsiang Tsao and Yan-Ting Yang",
  title =        "Friendly Color Visual Secret Sharing by Random Grids",
  journal =      j-FUND-INFO,
  volume =       "96",
  number =       "1--2",
  pages =        "61--70",
  month =        jan,
  year =         "2009",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2009-167",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:09:21 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Chen:2009:SRP,
  author =       "Yingying Chen and Konstantinos Kleisouris and Xiaoyan
                 Li and Wade Trappe and Richard P. Martin",
  title =        "A security and robustness performance analysis of
                 localization algorithms to signal strength attacks",
  journal =      j-TOSN,
  volume =       "5",
  number =       "1",
  pages =        "2:1--2:??",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1464420.1464422",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Tue Mar 16 15:22:49 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosn.bib",
  abstract =     "Recently, it has been noted that localization
                 algorithms that use signal strength are susceptible to
                 noncryptographic attacks, which consequently threatens
                 their viability for sensor applications. In this work,
                 we examine several localization algorithms and evaluate
                 their robustness to attacks where an adversary
                 attenuates or amplifies the signal strength at one or
                 more landmarks. We study both point-based and
                 area-based methods that employ received signal strength
                 for localization, and propose several performance
                 metrics that quantify the estimator's precision, bias,
                 and error, including H{\"o}lder metrics, which quantify
                 the variability in position space for a given
                 variability in signal strength space. We then conduct a
                 trace-driven evaluation of a set of representative
                 algorithms, where we measured their performance as we
                 applied attacks on real data from two different
                 buildings. We found the median error degraded
                 gracefully, with a linear response as a function of the
                 attack strength. We also found that area-based
                 algorithms experienced a decrease and a spatial-shift
                 in the returned area under attack, implying that
                 precision increases though bias is introduced for these
                 schemes. Additionally, we observed similar values for
                 the average H{\"o}lder metric across most of the
                 algorithms, thereby providing strong experimental
                 evidence that nearly all the algorithms have similar
                 average responses to signal strength attacks with the
                 exception of the Bayesian Networks algorithm.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
  keywords =     "Localization; robustness; sensor networks; signal
                 strength attacks; susceptibility",
}

@Article{Cheng:2009:NAS,
  author =       "Yu-Ming Cheng and Chung-Ming Wang",
  title =        "A Novel Approach to Steganography in
                 High-Dynamic-Range Images",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "16",
  number =       "3",
  pages =        "70--80",
  month =        jul # "\slash " # sep,
  year =         "2009",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/MMUL.2009.43",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Thu May 13 11:33:52 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Multimedia",
}

@Article{Chhabra:2009:MSP,
  author =       "Siddhartha Chhabra and Brian Rogers and Yan Solihin
                 and Milos Prvulovic",
  title =        "Making secure processors {OS}- and
                 performance-friendly",
  journal =      j-TACO,
  volume =       "5",
  number =       "4",
  pages =        "16:1--16:??",
  month =        mar,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1498690.1498691",
  ISSN =         "1544-3566 (print), 1544-3973 (electronic)",
  ISSN-L =       "1544-3566",
  bibdate =      "Wed Mar 18 21:35:33 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "In today's digital world, computer security issues
                 have become increasingly important. In particular,
                 researchers have proposed designs for secure processors
                 that utilize hardware-based memory encryption and
                 integrity verification to protect the privacy and
                 integrity of computation even from sophisticated
                 physical attacks. However, currently proposed schemes
                 remain hampered by problems that make them impractical
                 for use in today's computer systems: lack of virtual
                 memory and Inter-Process Communication support as well
                 as excessive storage and performance overheads. In this
                 article, we propose (1) address independent seed
                 encryption (AISE), a counter-mode-based memory
                 encryption scheme using a novel seed composition, and
                 (2) bonsai Merkle trees (BMT), a novel Merkle
                 tree-based memory integrity verification technique, to
                 eliminate these system and performance issues
                 associated with prior counter-mode memory encryption
                 and Merkle tree integrity verification schemes. We
                 present both a qualitative discussion and a
                 quantitative analysis to illustrate the advantages of
                 our techniques over previously proposed approaches in
                 terms of complexity, feasibility, performance, and
                 storage. Our results show that AISE+BMT reduces the
                 overhead of prior memory encryption and integrity
                 verification schemes from 12\% to 2\% on average for
                 single-threaded benchmarks on uniprocessor systems, and
                 from 15\% to 4\% for coscheduled benchmarks on
                 multicore systems while eliminating critical
                 system-level problems.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Transactions on Architecture and Code Optimization
                 (TACO)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J924",
  keywords =     "memory encryption; memory integrity verification;
                 Secure processor architectures; virtualization",
}

@Article{Chien:2009:EBL,
  author =       "Hung-Yu Chien and Chi-Sung Laih",
  title =        "{ECC}-based lightweight authentication protocol with
                 untraceability for low-cost {RFID}",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "69",
  number =       "10",
  pages =        "848--853",
  month =        oct,
  year =         "2009",
  CODEN =        "JPDCER",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Wed Sep 1 16:27:26 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/07437315",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@Article{Choi:2009:KDK,
  author =       "Seung Geol Choi and Javier Herranz and Dennis Hofheinz
                 and Jung Yeon Hwang and Eike Kiltz and Dong Hoon Lee
                 and Moti Yung",
  title =        "The {Kurosawa--Desmedt} key encapsulation is not
                 chosen-ciphertext secure",
  journal =      j-INFO-PROC-LETT,
  volume =       "109",
  number =       "16",
  pages =        "897--901",
  day =          "31",
  month =        jul,
  year =         "2009",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 15:53:38 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Chou:2009:ATI,
  author =       "Chang-Min Chou and Din-Chang Tseng",
  title =        "Affine-Transformation-Invariant Public Fragile
                 Watermarking for {$3$D} Model Authentication",
  journal =      j-IEEE-CGA,
  volume =       "29",
  number =       "2",
  pages =        "72--79",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "ICGADZ",
  DOI =          "https://doi.org/10.1109/MCG.2009.20",
  ISSN =         "0272-1716 (print), 1558-1756 (electronic)",
  ISSN-L =       "0272-1716",
  bibdate =      "Thu Jul 2 09:13:50 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Computer Graphics and Applications",
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/cga",
}

@Article{Chow:2009:ADN,
  author =       "Stanley T. Chow and Christophe Gustave and Dmitri
                 Vinokurov",
  title =        "Authenticating displayed names in telephony",
  journal =      j-BELL-LABS-TECH-J,
  volume =       "14",
  number =       "1",
  pages =        "267--282",
  month =        "Spring",
  year =         "2009",
  CODEN =        "BLTJFD",
  DOI =          "https://doi.org/10.1002/bltj.20367",
  ISSN =         "1089-7089 (print), 1538-7305 (electronic)",
  ISSN-L =       "1089-7089",
  bibdate =      "Fri Nov 26 17:31:42 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Bell Labs Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
  onlinedate =   "18 May 2009",
}

@Book{Conti:2009:GSH,
  author =       "Greg Conti",
  title =        "Googling security: how much does {Google} know about
                 you?",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xxi + 332",
  year =         "2009",
  ISBN =         "0-321-51866-7 (paperback)",
  ISBN-13 =      "978-0-321-51866-8 (paperback)",
  LCCN =         "QA76.9.A25 C6678 2009",
  bibdate =      "Wed Feb 17 16:44:31 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip0824/2008032687.html",
  acknowledgement = ack-nhfb,
  subject =      "computer security; computer networks; security
                 measures; Google",
  tableofcontents = "Googling \\
                 Information flows and leakage \\
                 Footprints, fingerprints, and connections \\
                 Search \\
                 Communications \\
                 Mapping, directions, and imagery \\
                 Advertising and embedded content \\
                 Googlebot \\
                 Countermeasures \\
                 Conclusions and a look to the future",
}

@Article{Crosby:2009:OLR,
  author =       "Scott A. Crosby and Dan S. Wallach and Rudolf H.
                 Riedi",
  title =        "Opportunities and Limits of Remote Timing Attacks",
  journal =      j-TISSEC,
  volume =       "12",
  number =       "3",
  pages =        "17:1--17:??",
  month =        jan,
  year =         "2009",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1455526.1455530",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Mon Feb 2 18:03:37 MST 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Many algorithms can take a variable amount of time to
                 complete depending on the data being processed. These
                 timing differences can sometimes disclose confidential
                 information. Indeed, researchers have been able to
                 reconstruct an RSA private key purely by querying an
                 SSL Web server and timing the results. Our work
                 analyzes the limits of attacks based on accurately
                 measuring network response times and jitter over a
                 local network and across the Internet. We present the
                 design of filters to significantly reduce the effects
                 of jitter, allowing an attacker to measure events with
                 15--100$ \mu $ s accuracy across the Internet, and as
                 good as 100ns over a local network. Notably,
                 security-related algorithms on Web servers and other
                 network servers need to be carefully engineered to
                 avoid timing channel leaks at the accuracy demonstrated
                 in this article.",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "Information leakage; jitter; timing attacks",
}

@Book{Cusick:2009:CBF,
  author =       "Thomas W. Cusick and Pantelimon St{\u{a}}nic{\u{a}}",
  title =        "Cryptographic {Boolean} functions and applications",
  publisher =    pub-ELSEVIER-ACADEMIC,
  address =      pub-ELSEVIER-ACADEMIC:adr,
  pages =        "xii + 232",
  year =         "2009",
  ISBN =         "0-12-374890-9 (hardcover)",
  ISBN-13 =      "978-0-12-374890-4 (hardcover)",
  LCCN =         "QA10.3 .C87 2009",
  bibdate =      "Sat May 15 09:33:02 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 prodorbis.library.yale.edu:7090/voyager",
  acknowledgement = ack-nhfb,
  subject =      "Algebra, Boolean; Cryptography; Data encryption
                 (Computer science); Computer algorithms",
  tableofcontents = "A bit of history \\
                 Fourier analysis of Boolean functions \\
                 Avalanche and propogation criteria \\
                 Correlation immune and resilient Boolean functions \\
                 Bent Boolean functions \\
                 Stream cipher design \\
                 Block cyphers \\
                 Boolean Cayley graphs",
}

@Article{Czernik:2009:CRN,
  author =       "Pawel Czernik and Jakub Olszyna",
  editor =       "Ryszard S. Romaniuk and Krzysztof S. Kulpa",
  title =        "Cryptographic random number generators for low-power
                 distributed measurement system",
  journal =      j-PROC-SPIE,
  volume =       "7502",
  number =       "1",
  pages =        "75022A",
  year =         "2009",
  CODEN =        "PSISDG",
  DOI =          "https://doi.org/10.1117/12.837994",
  ISSN =         "0277-786X (print), 1996-756X (electronic)",
  ISSN-L =       "0277-786X",
  bibdate =      "Mon Jan 16 15:57:34 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  note =         "Photonics Applications in Astronomy, Communications,
                 Industry, and High-Energy Physics Experiments 2009.",
  URL =          "http://link.aip.org/link/?PSI/7502/75022A/1",
  acknowledgement = ack-nhfb,
  eid =          "75022A",
  fjournal =     "Proceedings of the SPIE --- The International Society
                 for Optical Engineering",
  keywords =     "true random numbers from physical sources",
  location =     "Wilga, Poland",
  numpages =     "8",
}

@Article{Daemen:2009:CAE,
  author =       "Joan Daemen and Mario Lamberger and Norbert
                 Pramstaller and Vincent Rijmen and Frederik
                 Vercauteren",
  title =        "Computational aspects of the expected differential
                 probability of 4-round {AES} and {AES}-like ciphers",
  journal =      j-COMPUTING,
  volume =       "85",
  number =       "1--2",
  pages =        "85--104",
  month =        jun,
  year =         "2009",
  CODEN =        "CMPTA2",
  ISSN =         "0010-485X (print), 1436-5057 (electronic)",
  ISSN-L =       "0010-485X",
  bibdate =      "Sun Oct 31 11:09:57 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0010-485X&volume=85&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0010-485X&volume=85&issue=1&spage=85",
  acknowledgement = ack-nhfb,
  fjournal =     "Computing: Archiv f{\"u}r informatik und numerik",
  journal-URL =  "http://link.springer.com/journal/607",
}

@Article{Deepthi:2009:DIA,
  author =       "P. P. Deepthi and P. S. Sathidevi",
  title =        "Design, implementation and analysis of hardware
                 efficient stream ciphers using {LFSR} based hash
                 functions",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "3--4",
  pages =        "229--241",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:16 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808001193",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Denev:2009:SFQ,
  author =       "Dimitar Denev and Arturas Mazeika and Marc Spaniol and
                 Gerhard Weikum",
  title =        "{SHARC}: framework for quality-conscious {Web}
                 archiving",
  journal =      j-PROC-VLDB-ENDOWMENT,
  volume =       "2",
  number =       "1",
  pages =        "586--597",
  month =        aug,
  year =         "2009",
  CODEN =        "????",
  ISSN =         "2150-8097",
  bibdate =      "Fri May 13 14:54:50 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the VLDB Endowment",
}

@Article{Deng:2009:SCA,
  author =       "Robert H. Deng and Yanjiang Yang",
  title =        "A study of content authentication in proxy-enabled
                 multimedia delivery systems: {Model}, techniques, and
                 applications",
  journal =      j-TOMCCAP,
  volume =       "5",
  number =       "4",
  pages =        "28:1--28:??",
  month =        oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1596990.1596992",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Tue Mar 16 18:53:03 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Compared with the direct server-user approach, the
                 server-proxy-user architecture for multimedia delivery
                 promises significantly improved system scalability. The
                 introduction of the intermediary transcoding proxies
                 between content servers and end users in this
                 architecture, however, brings unprecedented challenges
                 to content security. In this article, we present a
                 systematic study on the end-to-end content
                 authentication problem in the server-proxy-user
                 context, where intermediary proxies transcode
                 multimedia content dynamically. We present a formal
                 model for the authentication problem, propose a
                 concrete construction for authenticating generic data
                 modality and formally prove its security. We then apply
                 the generic construction to authenticating specific
                 multimedia formats, for example, JPEG2000 code-streams
                 and MPEG-4 video streams. The prototype implementation
                 shows that our scheme is suitable for practical
                 applications.",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
  keywords =     "end-to-end authentication; Multimedia content
                 delivery; security",
}

@InCollection{Ding:2009:MPK,
  author =       "Jintai Ding and Bo-Yin Yang",
  title =        "Multivariate Public Key Cryptography",
  crossref =     "Bernstein:2009:PQC",
  pages =        "198--242",
  year =         "2009",
  bibdate =      "Thu Apr 21 17:17:18 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Diqun:2009:QSP,
  author =       "Yan Diqun and Wang Rangding and Zhang Liguang",
  title =        "Quantization Step Parity-based Steganography for {MP3}
                 Audio",
  journal =      j-FUND-INFO,
  volume =       "97",
  number =       "1--2",
  pages =        "1--14",
  month =        jan,
  year =         "2009",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2009-190",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:09:35 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@InProceedings{Dodis:2009:CAI,
  author =       "Yevgeniy Dodis and Yael Tauman Kalai and Shachar
                 Lovett",
  title =        "On cryptography with auxiliary input",
  crossref =     "ACM:2009:SPA",
  pages =        "621--630",
  year =         "2009",
  bibdate =      "Wed Sep 1 10:42:23 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Dodis:2009:NME,
  author =       "Yevgeniy Dodis and Daniel Wichs",
  title =        "Non-malleable extractors and symmetric key
                 cryptography from weak secrets",
  crossref =     "ACM:2009:SPA",
  pages =        "601--610",
  year =         "2009",
  bibdate =      "Wed Sep 1 10:42:23 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Dorrendorf:2009:CRN,
  author =       "Leo Dorrendorf and Zvi Gutterman and Benny Pinkas",
  title =        "Cryptanalysis of the random number generator of the
                 {Windows} operating system",
  journal =      j-TISSEC,
  volume =       "13",
  number =       "1",
  pages =        "10:1--10:32",
  month =        oct,
  year =         "2009",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1609956.1609966",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Tue Mar 16 10:18:12 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The PseudoRandom Number Generator (PRNG) used by the
                 Windows operating system is the most commonly used
                 PRNG. The pseudorandomness of the output of this
                 generator is crucial for the security of almost any
                 application running in Windows. Nevertheless, its exact
                 algorithm was never published.\par

                 We examined the binary code of a distribution of
                 Windows 2000. This investigation was done without any
                 help from Microsoft.We reconstructed the algorithm used
                 by the pseudorandom number generator (namely, the
                 function CryptGenRandom). We analyzed the security of
                 the algorithm and found a nontrivial attack: Given the
                 internal state of the generator, the previous state can
                 be computed in 223 steps. This attack on forward
                 security demonstrates that the design of the generator
                 is flawed, since it is well known how to prevent such
                 attacks. After our analysis was published, Microsoft
                 acknowledged that Windows XP is vulnerable to the same
                 attack.\par

                 We also analyzed the way in which the generator is used
                 by the operating system and found that it amplifies the
                 effect of the attack: The generator is run in user mode
                 rather than in kernel mode; therefore, it is easy to
                 access its state even without administrator privileges.
                 The initial values of part of the state of the
                 generator are not set explicitly, but rather are
                 defined by whatever values are present on the stack
                 when the generator is called. Furthermore, each process
                 runs a different copy of the generator, and the state
                 of the generator is refreshed with system-generated
                 entropy only after generating 128KB of output for the
                 process running it. The result of combining this
                 observation with our attack is that learning a single
                 state may reveal 128KB of the past and future output of
                 the generator.\par

                 The implication of these findings is that a buffer
                 overflow attack or a similar attack can be used to
                 learn a single state of the generator, which can then
                 be used to predict all random values, such as SSL keys,
                 used by a process in all its past and future
                 operations. This attack is more severe and more
                 efficient than known attacks in which an attack",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Doyle:2009:LTD,
  author =       "Julie Doyle and Herna Viktor and Eric Paquet",
  title =        "Long-term digital preservation: preserving
                 authenticity and usability of {$3$-D} data",
  journal =      j-INT-J-DIGIT-LIBR,
  volume =       "10",
  number =       "1",
  pages =        "33--47",
  month =        may,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s00799-009-0051-7",
  ISSN =         "1432-1300 (print), 1432-5012 (electronic)",
  ISSN-L =       "1432-1300",
  bibdate =      "Tue May 7 07:43:27 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjdigitlibr.bib",
  URL =          "https://link.springer.com/article/10.1007/s00799-009-0051-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Digit. Libr.",
  fjournal =     "International Journal on Digital Libraries",
  journal-URL =  "https://link.springer.com/journal/799",
}

@Article{Dujella:2009:VWA,
  author =       "Andrej Dujella",
  title =        "A variant of {Wiener}'s attack on {RSA}",
  journal =      j-COMPUTING,
  volume =       "85",
  number =       "1--2",
  pages =        "77--83",
  month =        jun,
  year =         "2009",
  CODEN =        "CMPTA2",
  ISSN =         "0010-485X (print), 1436-5057 (electronic)",
  ISSN-L =       "0010-485X",
  bibdate =      "Sun Oct 31 11:09:57 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0010-485X&volume=85&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0010-485X&volume=85&issue=1&spage=77",
  acknowledgement = ack-nhfb,
  fjournal =     "Computing: Archiv f{\"u}r informatik und numerik",
  journal-URL =  "http://link.springer.com/journal/607",
}

@Article{Edman:2009:AES,
  author =       "Matthew Edman and B{\"u}lent Yener",
  title =        "On anonymity in an electronic society: a survey of
                 anonymous communication systems",
  journal =      j-COMP-SURV,
  volume =       "42",
  number =       "1",
  pages =        "5:1--5:35",
  month =        dec,
  year =         "2009",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1592451.1592456",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 15 11:55:39 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The past two decades have seen a growing interest in
                 methods for anonymous communication on the Internet,
                 both from the academic community and the general
                 public. Several system designs have been proposed in
                 the literature, of which a number have been implemented
                 and are used by diverse groups, such as journalists,
                 human rights workers, the military, and ordinary
                 citizens, to protect their identities on the
                 Internet.\par

                 In this work, we survey the previous research done to
                 design, develop, and deploy systems for enabling
                 private and anonymous communication on the Internet. We
                 identify and describe the major concepts and
                 technologies in the field, including mixes and mix
                 networks, onion routing, and Dining Cryptographers
                 networks. We will also review powerful traffic analysis
                 attacks that have motivated improvements and variations
                 on many of these anonymity protocols made since their
                 introduction. Finally, we will summarize some of the
                 major open problems in anonymous communication research
                 and discuss possible directions for future work in the
                 field.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Anonymity; anonymous communication; DC-nets; mix
                 networks; mixes; onion routing; privacy; traffic
                 analysis",
}

@PhdThesis{Ekeraa:2009:DCM,
  author =       "Martin Eker{\aa}",
  title =        "Differential cryptanalysis of {MD5}",
  volume =       "8",
  type =         "{Ph.D.} thesis (??)",
  school =       "Skolan f{\"o}r datavetenskap och kommunikation,
                 Kungliga Tekniska h{\"o}gskolan",
  address =      "Stockholm, Sweden",
  pages =        "113",
  year =         "2009",
  ISSN =         "1653-5715",
  bibdate =      "Thu May 12 07:30:19 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "Trita-CSC-E",
  acknowledgement = ack-nhfb,
}

@Book{Elbirt:2009:UAC,
  author =       "Adam J. Elbirt",
  title =        "Understanding and Applying Cryptography and Data
                 Security",
  publisher =    pub-CRC,
  address =      pub-CRC:adr,
  pages =        "xxvii + 637",
  year =         "2009",
  ISBN =         "1-4200-6160-7",
  ISBN-13 =      "978-1-4200-6160-4",
  LCCN =         "QA76.9.A25 E43 2009",
  bibdate =      "Thu Mar 22 13:10:01 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip0821/2008028154.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Cryptography",
}

@Article{Evans:2009:BRS,
  author =       "James Evans",
  title =        "Book Review: The Saga of the {Antikythera} Mechanism,
                 {{\booktitle{Decoding the Heavens: a $ 2000$-Year-Old
                 Computer and the Century-Long Search to Discover its
                 Secrets}}}",
  journal =      j-J-HIST-ASTRON,
  volume =       "40",
  number =       "3",
  pages =        "362--364",
  month =        aug,
  year =         "2009",
  CODEN =        "JHSAA2",
  DOI =          "https://doi.org/10.1177/002182860904000316",
  ISSN =         "0021-8286 (print), 1753-8556 (electronic)",
  ISSN-L =       "0021-8286",
  bibdate =      "Mon Sep 29 17:18:42 MDT 2014",
  bibsource =    "http://jha.sagepub.com/content/40/3.toc;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jhistastron.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal for the History of Astronomy",
  journal-URL =  "https://journals.sagepub.com/home/JHA",
}

@Article{Faugere:2009:EAD,
  author =       "Jean-Charles Faug{\`e}re and Ludovic Perret",
  title =        "An efficient algorithm for decomposing multivariate
                 polynomials and its applications to cryptography",
  journal =      j-J-SYMBOLIC-COMP,
  volume =       "44",
  number =       "12",
  pages =        "1676--1689",
  month =        dec,
  year =         "2009",
  CODEN =        "JSYCEH",
  ISSN =         "0747-7171 (print), 1095-855X (electronic)",
  ISSN-L =       "0747-7171",
  bibdate =      "Wed Aug 25 20:13:20 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/07477171",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Symbolic Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07477171",
}

@InProceedings{Faugere:2009:IBC,
  author =       "Jean-Charles Faug{\`e}re",
  title =        "Interactions between computer algebra ({Gr{\"o}bner}
                 bases) and cryptology",
  crossref =     "May:2009:PIS",
  pages =        "383--384",
  year =         "2009",
  bibdate =      "Tue Aug 11 18:45:25 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@InCollection{Feldhofer:2009:HIS,
  author =       "Martin Feldhofer and Johannes Wolkerstorfer",
  editor =       "Paris Kitsos and Yan Zhang",
  booktitle =    "{RFID} Security: Techniques, Protocols and
                 System-on-Chip Design",
  title =        "Hardware Implementation of Symmetric Algorithms for
                 {RFID} Security",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  bookpages =    "xii + 443",
  pages =        "373--415",
  year =         "2009",
  DOI =          "https://doi.org/10.1007/978-0-387-76481-8_15",
  ISBN =         "0-387-76481-X (e-book), 0-387-76480-1 (hardcover)",
  ISBN-13 =      "978-0-387-76481-8 (e-book), 978-0-387-76480-1
                 (hardcover)",
  LCCN =         "TK6553 .R45 2008eb",
  bibdate =      "Wed Feb 01 16:58:10 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib;
                 jenson.stanford.edu:2210/unicorn",
  URL =          "http://www.springerlink.com/content/q1160h1036371331/",
  abstract =     "This book chapter provides an overview about hardware
                 implementations of symmetric crypto algorithms for RFID
                 security. Hardware design for RFID tags is challenging
                 due to the fierce constraints concerning power
                 consumption and chip area. After a general overview
                 about RFID security, the requirements for passive RFID
                 tags will be worked out. Different design measures for
                 low-resource hardware implementations will be presented
                 and their efficiency will be analyzed. The
                 implementation part of this chapter presents a survey
                 of implemented algorithms that are optimized for
                 application in passive RFID tags. The evaluated
                 algorithms include the block ciphers AES, TEA, and XTEA
                 and the commonly used hash functions SHA-256, SHA-1,
                 and MD5. These algorithms are compared with the new
                 upcoming stream ciphers Grain and Trivium. The
                 comparison of the achieved results favors the use of
                 the AES algorithm for application of symmetric
                 cryptography in RFID security.",
  acknowledgement = ack-nhfb,
  tableofcontents = "Part I: Fundamentals \\
                 Fundamentals and Applications \\
                 An Anticounterfeiting Tool \\
                 Security and Privacy \\
                 Part II: Security Protocols and Techniques \\
                 Trade-Offs for Realistic Privacy \\
                 Security: Cryptography and Physics Perspectives \\
                 Anticounterfeiting: An Architectural Perspective \\
                 An Efficient and Secure RFID Security Method with
                 Ownership Transfer \\
                 Digital Signature Transponder \\
                 Scalability Issues in Privacy-Compliant RFID Protocols
                 \\
                 Dynamic Privacy Protection for Mobile RFID Service \\
                 Using RFID-based ``Touch'' for Intuitive User
                 Interaction with Smart Space Security \\
                 Readers Deployment for Scalable Identification of
                 Private Tags \\
                 Part III: Encryption and Hardware Implementations \\
                 Public-Key Cryptography for RFID Tags and Applications
                 \\
                 New Designs in Lightweight Symmetric Encryption \\
                 Hardware Implementation of Symmetric Algorithms for
                 RFID Security \\
                 Hardware Implementation of a TEA-Based Lightweight
                 Encryption for RFID Security \\
                 Index",
}

@InCollection{Field:2009:BCB,
  author =       "J. V. Field",
  title =        "British cryptanalysis : the breaking of `Fish'
                 traffic",
  crossref =     "Maas:2009:SRW",
  pages =        "??--??",
  year =         "2009",
  bibdate =      "Sat May 14 10:07:09 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Forte:2009:DM,
  author =       "Dario Forte",
  title =        "The death of {MD5}",
  journal =      j-NETWORK-SECURITY,
  volume =       "2009",
  number =       "2",
  pages =        "18--20",
  month =        feb,
  year =         "2009",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(09)70020-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:00:01 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485809700200",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
  remark =       "Discusses collision attacks against SHA-0, MD4, MD5,
                 HAVAL-128, and RIPEMD.",
}

@Article{Garera:2009:CTG,
  author =       "Sujata Garera and Jorge Vasconcelos",
  title =        "Challenges in teaching a graduate course in applied
                 cryptography",
  journal =      j-SIGCSE,
  volume =       "41",
  number =       "2",
  pages =        "103--107",
  month =        jun,
  year =         "2009",
  CODEN =        "SIGSD3",
  DOI =          "https://doi.org/10.1145/1595453.1595485",
  ISSN =         "0097-8418 (print), 2331-3927 (electronic)",
  ISSN-L =       "0097-8418",
  bibdate =      "Sat Nov 17 15:44:23 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigcse2000.bib",
  abstract =     "We describe our experience in creating and teaching a
                 graduate course in cryptography at the Johns Hopkins
                 University. We emphasize on the importance of such a
                 course for a graduate student in an information
                 security program. We discuss the course implementation
                 and discuss the challenges in teaching this course to
                 students from varied backgrounds. Based on our
                 observations, we suggest specific improvements that
                 could be applied to this course in the future.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIGCSE Bulletin (ACM Special Interest Group on
                 Computer Science Education)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J688",
}

@Article{Gavinsky:2009:ESO,
  author =       "Dmitry Gavinsky and Julia Kempe and Iordanis Kerenidis
                 and Ran Raz and Ronald de Wolf",
  title =        "Exponential Separation for One-Way Quantum
                 Communication Complexity, with Applications to
                 Cryptography",
  journal =      j-SIAM-J-COMPUT,
  volume =       "38",
  number =       "5",
  pages =        "1695--1708",
  month =        "????",
  year =         "2009",
  CODEN =        "SMJCAT",
  DOI =          "",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Tue May 18 08:22:04 MDT 2010",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/38/5;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Article{Geetha:2009:BIS,
  author =       "S. Geetha and Siva S. Sivatha Sindhu and N. Kamaraj",
  title =        "Blind image steganalysis based on content independent
                 statistical measures maximizing the specificity and
                 sensitivity of the system",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "683--697",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000285",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@PhdThesis{Gentry:2009:FHEa,
  author =       "Craig Gentry",
  title =        "A fully homomorphic encryption scheme",
  type =         "Ph.D. thesis",
  school =       "Department of Computer Science, Stanford University",
  address =      "Stanford, CA, USA",
  pages =        "x + 199",
  year =         "2009",
  bibdate =      "Wed May 08 08:04:35 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 jenson.stanford.edu:2210/unicorn",
  URL =          "http://crypto.stanford.edu/craig/;
                 http://crypto.stanford.edu/craig/craig-thesis.pdf",
  acknowledgement = ack-nhfb,
  advisor =      "Dan Boneh",
}

@InProceedings{Gentry:2009:FHEb,
  author =       "Craig Gentry",
  title =        "Fully homomorphic encryption using ideal lattices",
  crossref =     "ACM:2009:SPA",
  pages =        "169--178",
  year =         "2009",
  bibdate =      "Wed Sep 1 10:42:23 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Goulding:2009:ESA,
  author =       "Tom Goulding",
  title =        "An encryption system in assembly language: a game-like
                 project for novice programmers",
  journal =      j-SIGCSE,
  volume =       "41",
  number =       "4",
  pages =        "40--44",
  month =        dec,
  year =         "2009",
  CODEN =        "SIGSD3",
  DOI =          "https://doi.org/10.1145/1709424.1709442",
  ISSN =         "0097-8418 (print), 2331-3927 (electronic)",
  ISSN-L =       "0097-8418",
  bibdate =      "Sat Nov 17 15:44:27 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigcse2000.bib",
  abstract =     "This case study discusses the incorporation of
                 encryption systems development into the educational
                 journey of undergraduate computer science or game
                 development majors. We discuss the experience of first
                 semester Daniel Webster College sophomores who
                 attempted to develop the German WWII ENIGMA encryption
                 system in assembly language. By incorporating a real
                 world encryption system project into a beginning
                 computer architecture class students become deeply
                 immersed in numbering systems, hardware logic design,
                 operating system services and, of course instruction
                 set architectures. Of necessity, they also must refine
                 and develop their programming skills to an
                 extraordinary degree. During the past seven years we
                 have found that most students can develop a complete
                 software version of the complex and amazing ENIGMA
                 encryption system. We outline in this paper the
                 strategy that seems to lead to a successful outcome for
                 most students.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIGCSE Bulletin (ACM Special Interest Group on
                 Computer Science Education)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J688",
}

@Article{Grassl:2009:CAS,
  author =       "Markus Grassl and Rainer Steinwandt",
  title =        "Cryptanalysis of an authentication scheme using
                 truncated polynomials",
  journal =      j-INFO-PROC-LETT,
  volume =       "109",
  number =       "15",
  pages =        "861--863",
  day =          "16",
  month =        jul,
  year =         "2009",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 15:53:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Grothoff:2009:TBS,
  author =       "Christian Grothoff and Krista Grothoff and Ryan
                 Stutsman and Ludmila Alkhutova and Mikhail Atallah",
  title =        "Translation-based steganography",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "269--303",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0320",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:18 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Guette:2009:ATK,
  author =       "Gilles Guette",
  title =        "Automating trusted key rollover in {DNSSEC}",
  journal =      j-J-COMP-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "839--854",
  month =        "????",
  year =         "2009",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0343",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:31 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@InProceedings{Guinee:2009:NTR,
  author =       "R. A. Guinee and M. Blaszczyk",
  booktitle =    "{ICITST 2009. International Conference for Internet
                 Technology and Secured Transactions, 2009}",
  title =        "A novel true random binary sequence generator based on
                 a chaotic double scroll oscillator combination with a
                 pseudo random generator for cryptographic
                 applications",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "1--6",
  year =         "2009",
  bibdate =      "Fri Jan 6 08:10:49 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5402536",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5393958",
}

@Article{Haitner:2009:SHC,
  author =       "Iftach Haitner and Minh-Huyen Nguyen and Shien Jin Ong
                 and Omer Reingold and Salil Vadhan",
  title =        "Statistically Hiding Commitments and Statistical
                 Zero-Knowledge Arguments from Any One-Way Function",
  journal =      j-SIAM-J-COMPUT,
  volume =       "39",
  number =       "3",
  pages =        "1153--1218",
  month =        "????",
  year =         "2009",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Tue May 18 08:22:12 MDT 2010",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/39/3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Article{Halderman:2009:LWR,
  author =       "J. Alex Halderman and Seth D. Schoen and Nadia
                 Heninger and William Clarkson and William Paul and
                 Joseph A. Calandrino and Ariel J. Feldman and Jacob
                 Appelbaum and Edward W. Felten",
  title =        "Lest we remember: cold-boot attacks on encryption
                 keys",
  journal =      j-CACM,
  volume =       "52",
  number =       "5",
  pages =        "91--98",
  month =        may,
  year =         "2009",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1506409.1506429",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Apr 23 12:42:30 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Contrary to widespread assumption, dynamic RAM (DRAM),
                 the main memory in most modern computers, retains its
                 contents for several seconds after power is lost, even
                 at room temperature and even if removed from a
                 motherboard. Although DRAM becomes less reliable when
                 it is not refreshed, it is not immediately erased, and
                 its contents persist sufficiently for malicious (or
                 forensic) acquisition of usable full-system memory
                 images. We show that this phenomenon limits the ability
                 of an operating system to protect cryptographic key
                 material from an attacker with physical access to a
                 machine. It poses a particular threat to laptop users
                 who rely on disk encryption: we demonstrate that it
                 could be used to compromise several popular disk
                 encryption products without the need for any special
                 devices or materials. We experimentally characterize
                 the extent and predictability of memory retention and
                 report that remanence times can be increased
                 dramatically with simple cooling techniques. We offer
                 new algorithms for finding cryptographic keys in memory
                 images and for correcting errors caused by bit decay.
                 Though we discuss several strategies for mitigating
                 these risks, we know of no simple remedy that would
                 eliminate them.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@InCollection{Hallgren:2009:QC,
  author =       "Sean Hallgren and Ulrich Vollmer",
  title =        "Quantum computing",
  crossref =     "Bernstein:2009:PQC",
  pages =        "15--34",
  year =         "2009",
  bibdate =      "Thu Apr 21 17:17:18 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Han:2009:ICS,
  author =       "Dong-Guk Han and Dooho Choi and Howon Kim",
  title =        "Improved Computation of Square Roots in Specific
                 Finite Fields",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "58",
  number =       "2",
  pages =        "188--196",
  month =        feb,
  year =         "2009",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2008.201",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 11:37:39 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4663058",
  abstract =     "In this paper, we study exponentiation in the specific
                 finite fields $ F_q $ with very special exponents such
                 as those that occur in algorithms for computing square
                 roots. Here, $q$ is a prime power, $ q = p^k $, where $
                 k > 1 $, and $k$ is odd. Our algorithmic approach
                 improves the corresponding exponentiation resulted from
                 the better rewritten exponent. To the best of our
                 knowledge, it is the first major improvement to the
                 Tonelli--Shanks algorithm, for example, the number of
                 multiplications can be reduced to at least 60 percent
                 on the average when $ p \equiv 1 \pmod 16 $. Several
                 numerical examples are given that show the speedup of
                 the proposed methods.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "cryptography; efficient computation; finite fields;
                 square roots",
}

@Book{Hardy:2009:AAC,
  author =       "Darel W. Hardy and Carol L. Walker and Fred Richman",
  title =        "Applied algebra: codes, ciphers, and discrete
                 algorithms",
  publisher =    pub-CRC,
  address =      pub-CRC:adr,
  edition =      "Second",
  pages =        "410",
  year =         "2009",
  ISBN =         "1-4200-7142-4 (hardcover)",
  ISBN-13 =      "978-1-4200-7142-9 (hardcover)",
  LCCN =         "QA268 .H365 2009",
  bibdate =      "Sat Jun 13 08:24:16 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Discrete mathematics and its applications",
  acknowledgement = ack-nhfb,
  remark =       "A Chapman and Hall book.",
  subject =      "Coding theory; Computer security; Mathematics",
}

@Article{Harn:2009:DDB,
  author =       "Lein Harn and Jian Ren and Changlu Lin",
  title =        "Design of {DL}-based certificateless digital
                 signatures",
  journal =      j-J-SYST-SOFTW,
  volume =       "82",
  number =       "5",
  pages =        "789--793",
  month =        may,
  year =         "2009",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Hasan:2009:PHF,
  author =       "Ragib Hasan and Radu Sion and Marianne Winslett",
  title =        "Preventing history forgery with secure provenance",
  journal =      j-TOS,
  volume =       "5",
  number =       "4",
  pages =        "12:1--12:??",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1629080.1629082",
  ISSN =         "1553-3077 (print), 1553-3093 (electronic)",
  ISSN-L =       "1553-3077",
  bibdate =      "Tue Mar 16 15:34:12 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tos/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tos.bib",
  abstract =     "As increasing amounts of valuable information are
                 produced and persist digitally, the ability to
                 determine the origin of data becomes important. In
                 science, medicine, commerce, and government, data
                 provenance tracking is essential for rights protection,
                 regulatory compliance, management of intelligence and
                 medical data, and authentication of information as it
                 flows through workplace tasks. While significant
                 research has been conducted in this area, the
                 associated security and privacy issues have not been
                 explored, leaving provenance information vulnerable to
                 illicit alteration as it passes through untrusted
                 environments.\par

                 In this article, we show how to provide strong
                 integrity and confidentiality assurances for data
                 provenance information at the kernel, file system, or
                 application layer. We describe Sprov, our
                 provenance-aware system prototype that implements
                 provenance tracking of data writes at the application
                 layer, which makes Sprov extremely easy to deploy. We
                 present empirical results that show that, for real-life
                 workloads, the runtime overhead of Sprov for recording
                 provenance with confidentiality and integrity
                 guarantees ranges from 1\% to 13\%, when all file
                 modifications are recorded, and from 12\% to 16\%, when
                 all file read and modifications are tracked.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Transactions on Storage",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J960",
  keywords =     "audit; confidentiality; integrity; lineage;
                 provenance; security",
}

@Article{Heger:2009:CTQ,
  author =       "M. Heger",
  title =        "Cryptographers take on quantum computers ---
                 [update]",
  journal =      j-IEEE-SPECTRUM,
  volume =       "46",
  number =       "1",
  pages =        "14--14",
  month =        jan,
  year =         "2009",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2009.4734299",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Cryptography; Quantum computing",
}

@Article{Heron:2009:AES,
  author =       "Simon Heron",
  title =        "{Advanced Encryption Standard (AES)}",
  journal =      j-NETWORK-SECURITY,
  volume =       "2009",
  number =       "12",
  pages =        "8--12",
  month =        dec,
  year =         "2009",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(10)70006-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:00:11 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485810700064",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Herzberg:2009:DBE,
  author =       "Amir Herzberg",
  title =        "{DNS}-based email sender authentication mechanisms: a
                 critical review",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "8",
  pages =        "731--742",
  month =        nov,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:18 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000492",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InCollection{Hirose:2009:SAD,
  author =       "S. Hirose",
  title =        "Security analysis of {DRBG} using {HMAC} in {NIST SP
                 800-90}",
  crossref =     "Chung:2009:ISA",
  pages =        "278--291",
  year =         "2009",
  bibdate =      "Tue Mar 18 11:22:57 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Holcomb:2009:PSS,
  author =       "D. E. Holcomb and W. P. Burleson and K. Fu",
  title =        "Power-Up {SRAM} State as an Identifying Fingerprint
                 and Source of True Random Numbers",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "58",
  number =       "9",
  pages =        "1198--1210",
  month =        sep,
  year =         "2009",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2008.212",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 11:37:43 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4674345",
  abstract =     "Intermittently powered applications create a need for
                 low-cost security and privacy in potentially hostile
                 environments, supported by primitives including
                 identification and random number generation. Our
                 measurements show that power-up of SRAM produces a
                 physical fingerprint. We propose a system of
                 fingerprint extraction and random numbers in SRAM
                 (FERNS) that harvests static identity and randomness
                 from existing volatile CMOS memory without requiring
                 any dedicated circuitry. The identity results from
                 manufacture-time physically random device threshold
                 voltage mismatch, and the random numbers result from
                 runtime physically random noise. We use experimental
                 data from high-performance SRAM chips and the embedded
                 SRAM of the WISP UHF RFID tag to validate the
                 principles behind FERNS. For the SRAM chip, we
                 demonstrate that 8-byte fingerprints can uniquely
                 identify circuits among a population of 5,120 instances
                 and extrapolate that 24-byte fingerprints would
                 uniquely identify all instances ever produced. Using a
                 smaller population, we demonstrate similar identifying
                 ability from the embedded SRAM. In addition to
                 identification, we show that SRAM fingerprints capture
                 noise, enabling true random number generation. We
                 demonstrate that a 512-byte SRAM fingerprint contains
                 sufficient entropy to generate 128-bit true random
                 numbers and that the generated numbers pass the NIST
                 tests for runs, approximate entropy, and block
                 frequency.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Hopper:2009:PSS,
  author =       "N. Hopper and L. von Ahn and J. Langford",
  title =        "Provably Secure Steganography",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "58",
  number =       "5",
  pages =        "662--676",
  month =        may,
  year =         "2009",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2008.199",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 11:37:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4663056",
  abstract =     "Steganography is the problem of hiding secret messages
                 in ``innocent-looking'' public communication so that
                 the presence of the secret messages cannot be detected.
                 This paper introduces a cryptographic formalization of
                 steganographic security in terms of computational
                 indistinguishability from a channel, an indexed family
                 of probability distributions on cover messages. We use
                 cryptographic and complexity-theoretic proof techniques
                 to show that the existence of one-way functions and the
                 ability to sample from the channel are necessary
                 conditions for secure steganography. We then construct
                 a steganographic protocol, based on rejection sampling
                 from the channel, that is provably secure and has
                 nearly optimal bandwidth under these conditions. This
                 is the first known example of a general provably secure
                 steganographic protocol. We also give the first
                 formalization of ``robust'' steganography, where an
                 adversary attempts to remove any hidden messages
                 without unduly disrupting the cover channel. We give a
                 necessary condition on the amount of disruption the
                 adversary is allowed in terms of a worst case measure
                 of mutual information. We give a construction that is
                 provably secure and computationally efficient and has
                 nearly optimal bandwidth, assuming repeatable access to
                 the channel distribution.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "cryptographic protocols; probability; steganography",
}

@Book{Hromkovic:2009:AAH,
  author =       "Juraj Hromkovic",
  title =        "Algorithmic adventures: from knowledge to magic",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiii + 363",
  year =         "2009",
  ISBN =         "3-540-85986-1",
  ISBN-13 =      "978-3-540-85986-4",
  LCCN =         "QA76.9.A43 H76 2009",
  bibdate =      "Tue May 7 09:24:29 MDT 2013",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  URL =          "http://site.ebrary.com/lib/upcatalunya/docDetail.action?docID=10313472",
  acknowledgement = ack-nhfb,
  tableofcontents = "Preface \\
                 Contents \\
                 A Short Story About the Development of Computer Science
                 or Why Computer Science Is Not a Computer Driving
                 Licence \\
                 Algorithmics, or What Have Programming and Baking in
                 Common? \\
                 Infinity Is Not Equal to Infinity, or Why Infinity Is
                 Infinitely Important in Computer Science \\
                 Limits of Computability or Why Do There Exist Tasks
                 That Cannot Be Solved Automatically by Computers \\
                 Complexity Theory or What to Do When the Energy of the
                 Universe Doesn't Suffice for Performing a Computation?
                 \\
                 Randomness in Nature and as a Source of Efficiency in
                 Algorithmics \\
                 Cryptography, or How to Transform Drawbacks into
                 Advantages \\
                 Computing with DNA Molecules, or Biological Computer
                 Technology on the Horizon \\
                 Quantum Computers, or Computing in the Wonderland of
                 Particles \\
                 How to Make Good Decisions for an Unknown Future or How
                 to Foil an Adversary \\
                 References \\
                 Index",
}

@Article{Hu:2009:TRN,
  author =       "Yue Hu and Xiaofeng Liao and Kwok wo Wong and Qing
                 Zhou",
  title =        "A true random number generator based on mouse movement
                 and chaotic cryptography",
  journal =      j-CHAOS-SOLITONS-FRACTALS,
  volume =       "40",
  number =       "5",
  pages =        "2286--2293",
  year =         "2009",
  CODEN =        "CSFOEH",
  ISSN =         "0960-0779 (print), 1873-2887 (electronic)",
  ISSN-L =       "0960-0779",
  bibdate =      "Wed Jan 18 21:52:48 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Chaos, solitons \& fractals",
}

@Article{Huang:2009:OSW,
  author =       "Y. L. Huang and P. H. Lu and J. D. Tygar and A. D.
                 Joseph",
  title =        "{OSNP}: Secure wireless authentication protocol using
                 one-time key",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "8",
  pages =        "803--815",
  month =        nov,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:18 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000558",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hung:2009:FBA,
  author =       "Kuo Lung Hung and Shin-Wei He",
  title =        "Feature Based Affine Invariant Watermarking Robust to
                 Geometric Distortions",
  journal =      j-FUND-INFO,
  volume =       "92",
  number =       "1--2",
  pages =        "131--143",
  month =        jan,
  year =         "2009",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2009-0069",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:08:27 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Hwang:2009:KDB,
  author =       "Seong-seob Hwang and Sungzoon Cho and Sunghoon Park",
  title =        "Keystroke dynamics-based authentication for mobile
                 devices",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "1--2",
  pages =        "85--93",
  month =        feb # "\slash " # mar,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:15 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000965",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jain:2009:NBC,
  author =       "Rahul Jain and Shengyu Zhang",
  title =        "New bounds on classical and quantum one-way
                 communication complexity",
  journal =      j-THEOR-COMP-SCI,
  volume =       "410",
  number =       "26",
  pages =        "2463--2477",
  day =          "6",
  month =        jun,
  year =         "2009",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Mar 28 21:21:51 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Jain:2009:PQR,
  author =       "Rahul Jain and Jaikumar Radhakrishnan and Pranab Sen",
  title =        "A property of quantum relative entropy with an
                 application to privacy in quantum communication",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "6",
  pages =        "33:1--33:32",
  month =        sep,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1568318.1568323",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Sep 4 13:33:31 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We prove the following information-theoretic property
                 about quantum states.\par

                 {\em Substate theorem:\/} Let $ \rho $ and $ \sigma $
                 be quantum states in the same Hilbert space with
                 relative entropy $ S(\rho || \sigma) : T r \rho (l o g
                 \rho - l o g \sigma) = c $. Then for all $ \epsilon > 0
                 $, there is a state $ \rho \prime $ such that the trace
                 distance $ || \rho \prime - \rho ||_{tr} : T r \sqrt
                 (\rho \prime - \rho)^2 \leq \epsilon $, and $ \rho
                 \prime / 2^{O(c / \epsilon 2)} \leq \sigma $.\par

                 It states that if the relative entropy of $ \rho $ and
                 $ \sigma $ is small, then there is a state $ \rho
                 \prime $ close to $ \rho $, i.e. with small trace
                 distance $ || \rho \prime - \rho ||_{tr} $, that when
                 scaled down by a factor $ 2^{\em O \/ }(c) $ `sits
                 inside', or becomes a `substate' of, $ \sigma $. This
                 result has several applications in quantum
                 communication complexity and cryptography. Using the
                 substate theorem, we derive a privacy trade-off for the
                 {\em set membership problem\/} in the two-party quantum
                 communication model. Here Alice is given a subset $ A
                 \subseteq [n] $, Bob an input $ i \in [n] $, and they
                 need to determine if $ i \in A $.\par

                 {\em Privacy trade-off for set membership:\/} In any
                 two-party quantum communication protocol for the set
                 membership problem, if Bob reveals only $k$ bits of
                 information about his input, then Alice must reveal at
                 least $ n / 2^{O(k)} $ bits of information about her
                 input.\par

                 We also discuss relationships between various
                 information theoretic quantities that arise naturally
                 in the context of the substate theorem.",
  acknowledgement = ack-nhfb,
  articleno =    "33",
  fjournal =     "Journal of the Association for Computing Machinery",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
  keywords =     "Privacy; quantum communication complexity; quantum
                 information theory",
}

@Article{Jao:2009:EGB,
  author =       "David Jao and Stephen D. Miller and Ramarathnam
                 Venkatesan",
  title =        "Expander graphs based on {GRH} with an application to
                 elliptic curve cryptography",
  journal =      j-J-NUMBER-THEORY,
  volume =       "129",
  number =       "6",
  pages =        "1491--1504",
  month =        jun,
  year =         "2009",
  CODEN =        "JNUTA9",
  DOI =          "https://doi.org/10.1016/j.jnt.2008.11.006",
  ISSN =         "0022-314X (print), 1096-1658 (electronic)",
  ISSN-L =       "0022-314X",
  bibdate =      "Wed Jul 15 08:48:36 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnumbertheory2000.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022314X09000213",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Number Theory",
  fjournal =     "Journal of Number Theory",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0022314X",
}

@Article{Jaworski:2009:RKP,
  author =       "J. Jaworski and M. Ren and K. Rybarczyk",
  title =        "Random key predistribution for wireless sensor
                 networks using deployment knowledge",
  journal =      j-COMPUTING,
  volume =       "85",
  number =       "1--2",
  pages =        "57--76",
  month =        jun,
  year =         "2009",
  CODEN =        "CMPTA2",
  ISSN =         "0010-485X (print), 1436-5057 (electronic)",
  ISSN-L =       "0010-485X",
  bibdate =      "Sun Oct 31 11:09:57 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0010-485X&volume=85&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0010-485X&volume=85&issue=1&spage=57",
  acknowledgement = ack-nhfb,
  fjournal =     "Computing: Archiv f{\"u}r informatik und numerik",
  journal-URL =  "http://link.springer.com/journal/607",
}

@Article{Jennings:2009:SLL,
  author =       "Trevor J. Jennings",
  title =        "{SPARK}: the {Libre} language and toolset for
                 high-assurance software engineering",
  journal =      j-SIGADA-LETTERS,
  volume =       "29",
  number =       "3",
  pages =        "9--10",
  month =        dec,
  year =         "2009",
  CODEN =        "AALEE5",
  DOI =          "https://doi.org/10.1145/1653616.1647426",
  ISSN =         "1094-3641 (print), 1557-9476 (electronic)",
  ISSN-L =       "1094-3641",
  bibdate =      "Mon Jun 21 14:04:37 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigada.bib",
  abstract =     "Level -Intermediate\par

                 SPARK is an annotated sub-language of Ada which is
                 unambiguous and suitable for rigorous static analysis.
                 It has been extensively used in industrial applications
                 where safety and security are paramount, such as
                 military aerospace, rail signaling, and high-grade
                 cryptographic systems.\par

                 The design of SPARK aligns closely with rigorous
                 engineering approaches such as PSP/TSP, Six- Sigma, and
                 the principles of the Lean Engineering movement in
                 taking a 'zero tolerance' approach to defect
                 reduction.\par

                 In this light, SPARK is far more than 'just a
                 programming language' - it offers a distinct
                 engineering mindset and discipline for the development
                 of high-assurance systems.\par

                 The tutorial, which is extracted from the four-day
                 'Software Engineering with SPARK' course will cover:
                 The rationale and design goals of SPARK, the core SPARK
                 language, and SPARK analyses including information
                 flow, exception freedom, and formal verification, and
                 the impact of SPARK on software process. The tutorial
                 will also cover the 'Libre' release of the SPARK
                 technology and the research topics that this opens,
                 such as more advanced forms of analysis and proof,
                 model checking, and language extensions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGAda Ada Letters",
  keywords =     "Ada; engineering; software",
}

@Book{Joux:2009:AC,
  author =       "Antoine Joux",
  title =        "Algorithmic Cryptanalysis",
  publisher =    pub-CRC,
  address =      pub-CRC:adr,
  pages =        "501",
  year =         "2009",
  ISBN =         "1-4200-7002-9 (hardcover)",
  ISBN-13 =      "978-1-4200-7002-6 (hardcover)",
  LCCN =         "QA76.9.A43; QA76.9.A43 J693 2009",
  bibdate =      "Sat May 15 09:31:38 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 library.mit.edu:9909/mit01",
  series =       "Chapman and Hall/CRC cryptography and network
                 security",
  acknowledgement = ack-nhfb,
  remark =       "I. Background \\
                 1. A bird's-eye view of modern cryptography \\
                 2. Elementary number theory and algebra background \\
                 II. Algorithms \\
                 3. Linear algebra \\
                 4. Sieve algorithms \\
                 5. Brute force cryptanalysis \\
                 6. The birthday paradox: Sorting or not? \\
                 7. Birthday-based algorithms for functions \\
                 8. Birthday attacks through quadrisection \\
                 9. Fourier and Hadamard-Walsh transforms \\
                 10. Lattice reduction \\
                 11. Polynomial systems and Grabner base computations
                 \\
                 III. Applications \\
                 12. Attacks on stream ciphers \\
                 13. Lattice-based cryptanalysis \\
                 14. Elliptic curves and pairings \\
                 15. Index calculus algorithms..",
  subject =      "Computer algorithms; Cryptography",
}

@InProceedings{Kalai:2009:SEU,
  author =       "Y. T. Kalai and Xin Li and A. Rao",
  title =        "$2$-Source Extractors under Computational Assumptions
                 and Cryptography with Defective Randomness",
  crossref =     "IEEE:2009:PAI",
  pages =        "617--626",
  year =         "2009",
  DOI =          "https://doi.org/10.1109/FOCS.2009.61",
  bibdate =      "Thu Apr 12 09:33:33 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2000.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5438528",
}

@InProceedings{Kamal:2009:FIN,
  author =       "A. A. Kamal and A. M. Youssef",
  title =        "An {FPGA} implementation of the {NTRUEncrypt}
                 cryptosystem",
  crossref =     "IEEE:2009:ISI",
  pages =        "209--??",
  year =         "2009",
  DOI =          "https://doi.org/10.1109/ICM.2009.5418649",
  bibdate =      "Thu Apr 21 10:33:23 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "The NTRU encryption algorithm, also known as
                 NTRUEncrypt, is a parameterized family of lattice-based
                 public key cryptosystems. Both the encryption and
                 decryption operations in NTRU are based on simple
                 polynomial multiplication which makes it very fast
                 compared to other alternatives such as RSA, and
                 elliptic-curve-based systems. Recently, the NTRU system
                 has been accepted to the IEEE P1363 standards under the
                 specifications for lattice-based public-key
                 cryptography (IEEE P1363.1). In this paper, we
                 investigate several hardware implementation options for
                 the NTRU encryption algorithm. In particular, by
                 utilizing the statistical properties of the distance
                 between the non-zero elements in the polynomials
                 involved in the encryption and decryption operations,
                 we present an architecture that offers different
                 area-speed trade-off and analyze its performance. A
                 prototype for the proposed design is implemented using
                 the virtex-E xcv1600e-8-fg860 FPGA chip.",
  acknowledgement = ack-nhfb,
  keywords =     "ANSI X9.98-2010; elliptic curve cryptography; elliptic
                 curve-based systems; elliptic curves; field
                 programmable gate arrays; FPGA chip; hardware;
                 information systems; lattice-based public key
                 cryptography; lattice-based public key cryptosystems;
                 microelectronics; NTRU encryption algorithm;
                 NTRUEncrypt; NTRUEncrypt cryptosystem; Performance
                 analysis; polynomial multiplication; Polynomials;
                 Public key; Public key cryptography",
}

@Article{Kamat:2009:TPW,
  author =       "Pandurang Kamat and Wenyuan Xu and Wade Trappe and
                 Yanyong Zhang",
  title =        "Temporal privacy in wireless sensor networks: {Theory}
                 and practice",
  journal =      j-TOSN,
  volume =       "5",
  number =       "4",
  pages =        "28:1--28:??",
  month =        nov,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1614379.1614380",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Tue Mar 16 15:24:11 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Although the content of sensor messages describing
                 ``events of interest'' may be encrypted to provide
                 confidentiality, the context surrounding these events
                 may also be sensitive and therefore should be protected
                 from eavesdroppers. An adversary armed with knowledge
                 of the network deployment, routing algorithms, and the
                 base-station (data sink) location can infer the
                 temporal patterns of interesting events by merely
                 monitoring the arrival of packets at the sink, thereby
                 allowing the adversary to remotely track the
                 spatio-temporal evolution of a sensed event. In this
                 paper we introduce the problem of temporal privacy for
                 delay-tolerant sensor networks, and propose adaptive
                 buffering at intermediate nodes on the source-sink
                 routing path to obfuscate temporal information from the
                 adversary. We first present the effect of buffering on
                 temporal privacy using an information-theoretic
                 formulation, and then examine the effect that delaying
                 packets has on buffer occupancy. We observe that
                 temporal privacy and efficient buffer utilization are
                 contrary objectives, and then present an adaptive
                 buffering strategy that effectively manages these
                 tradeoffs. Finally, we evaluate our privacy enhancement
                 strategies using simulations, where privacy is
                 quantified in terms of the adversary's mean square
                 error.",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
  keywords =     "privacy; security; Sensor networks; temporal privacy",
}

@Article{Kamel:2009:RSW,
  author =       "Ibrahim Kamel and Qutaiba Albluwi",
  title =        "A robust software watermarking for copyright
                 protection",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "6",
  pages =        "395--409",
  month =        sep,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480900008X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Kasper:2009:FTA,
  author =       "Emilia K{\"a}sper and Peter Schwabe",
  editor =       "????",
  booktitle =    "{Cryptographic Hardware and Embedded Systems--CHES
                 2009}",
  title =        "Faster and timing-attack resistant {AES--GCM}",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "1--17",
  year =         "2009",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 12:19:13 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 45]{Schneier:2015:SWC}.",
}

@Article{Katz:2009:ESA,
  author =       "Jonathan Katz and Rafail Ostrovsky and Moti Yung",
  title =        "Efficient and secure authenticated key exchange using
                 weak passwords",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "1",
  pages =        "3:1--3:39",
  month =        nov,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1613676.1613679",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 15 11:20:08 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Mutual authentication and authenticated key exchange
                 are fundamental techniques for enabling secure
                 communication over public, insecure networks. It is
                 well known how to design secure protocols for achieving
                 these goals when parties share {\em high-entropy\/}
                 cryptographic keys in advance of the authentication
                 stage. Unfortunately, it is much more common for users
                 to share weak, {\em low-entropy\/} passwords which
                 furthermore may be chosen from a known space of
                 possibilities (say, a dictionary of English words). In
                 this case, the problem becomes much more difficult as
                 one must ensure that protocols are immune to {\em
                 off-line dictionary attacks\/} in which an adversary
                 exhaustively enumerates all possible passwords in an
                 attempt to determine the correct one.\par

                 We propose a 3-round protocol for password-only
                 authenticated key exchange, and provide a rigorous
                 proof of security for our protocol based on the
                 decisional Diffie--Hellman assumption. The protocol
                 assumes only public parameters --- specifically, a
                 ``common reference string'' --- which can be
                 ``hard-coded'' into an implementation of the protocol;
                 in particular, and in contrast to some previous work,
                 our protocol does {\em not\/} require either party to
                 pre-share a public key. The protocol is also remarkably
                 efficient, requiring computation only (roughly) 4 times
                 greater than ``classical'' Diffie--Hellman key exchange
                 that provides no authentication at all. Ours is the
                 first protocol for password-only authentication that is
                 both {\em practical\/} and {\em provably-secure using
                 standard cryptographic assumptions}.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
  keywords =     "Authentication; cryptography; passwords",
}

@Article{Kejariwal:2009:ELL,
  author =       "Arun Kejariwal and Alexander V. Veidenbaum and
                 Alexandru Nicolau and Milind Girkar and Xinmin Tian and
                 Hideki Saito",
  title =        "On the exploitation of loop-level parallelism in
                 embedded applications",
  journal =      j-TECS,
  volume =       "8",
  number =       "2",
  pages =        "10:1--10:??",
  month =        jan,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1457255.1457257",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Feb 5 19:15:05 MST 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Advances in the silicon technology have enabled
                 increasing support for hardware parallelism in embedded
                 processors. Vector units, multiple processors/cores,
                 multithreading, special-purpose accelerators such as
                 DSPs or cryptographic engines, or a combination of the
                 above have appeared in a number of processors. They
                 serve to address the increasing performance
                 requirements of modern embedded applications. To what
                 extent the available hardware parallelism can be
                 exploited is directly dependent on the amount of
                 parallelism inherent in the given application and the
                 congruence between the granularity of hardware and
                 application parallelism. This paper discusses how
                 loop-level parallelism in embedded applications can be
                 exploited in hardware and software. Specifically, it
                 evaluates the efficacy of automatic loop
                 parallelization and the performance potential of
                 different types of parallelism, viz., true thread-level
                 parallelism (TLP), speculative thread-level parallelism
                 and vector parallelism, when executing loops.
                 Additionally, it discusses the interaction between
                 parallelization and vectorization. Applications from
                 both the industry-standard EEMBC{\reg},$^1$ 1.1, EEMBC
                 2.0 and the academic MiBench embedded benchmark suites
                 are analyzed using the Intel{\reg}$^2$ C compiler. The
                 results show the performance that can be achieved today
                 on real hardware and using a production compiler,
                 provide upper bounds on the performance potential of
                 the different types of thread-level parallelism, and
                 point out a number of issues that need to be addressed
                 to improve performance. The latter include
                 parallelization of libraries such as libc and design of
                 parallel algorithms to allow maximal exploitation of
                 parallelism. The results also point to the need for
                 developing new benchmark suites more suitable to
                 parallel compilation and execution.\par

                 $^1$ Other names and brands may be claimed as the
                 property of others.\par

                 $^2$ Intel is a trademark of Intel Corporation or its
                 subsidiaries in the United States and other
                 countries.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J840",
  keywords =     "libraries; Multi-cores; multithreading; parallel
                 loops; programming models; system-on-chip (Soc);
                 thread-level speculation; vectorization",
}

@Article{Keller:2009:ECC,
  author =       "Maurice Keller and Andrew Byrne and William P.
                 Marnane",
  title =        "Elliptic Curve Cryptography on {FPGA} for Low-Power
                 Applications",
  journal =      j-TRETS,
  volume =       "2",
  number =       "1",
  pages =        "2:1--2:??",
  month =        mar,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1502781.1502783",
  ISSN =         "1936-7406 (print), 1936-7414 (electronic)",
  ISSN-L =       "1936-7406",
  bibdate =      "Mon Jun 1 18:15:27 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Elliptic curve cryptography has generated a lot of
                 research interest due to its ability to provide greater
                 security per bit compared to public key systems such as
                 RSA. The designer of an elliptic curve hardware
                 accelerator is faced with many choices at design time,
                 each of which can impact the performance of the
                 accelerator in different ways. There are many examples
                 in the literature of how these design choices can
                 effect the area and/or speed of an elliptic curve
                 hardware accelerator. The effect of design choices on
                 power and energy consumption in elliptic curve hardware
                 has been less well studied. This article studies the
                 effect of design choices on the power and energy
                 consumption of an FPGA-based reconfigurable elliptic
                 curve hardware accelerator. A reconfigurable processor
                 has been used for different system parameters and the
                 power and energy consumption measured. The power and
                 energy results are presented and compared.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Transactions on Reconfigurable Technology and
                 Systems (TRETS)",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J1151",
  keywords =     "Cryptography; elliptic curves; FPGA; low-power",
}

@Article{Kieu:2009:HSI,
  author =       "The Duc Kieu and Chin-Chen Chang",
  title =        "A high stego-image quality steganographic scheme with
                 reversibility and high payload using multiple embedding
                 strategy",
  journal =      j-J-SYST-SOFTW,
  volume =       "82",
  number =       "10",
  pages =        "1743--1752",
  month =        oct,
  year =         "2009",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Kieu:2009:IAB,
  author =       "The Duc Kieu and Chin-Chen Chang",
  title =        "An Image Authentication Based on Discrete {Fourier}
                 Transform",
  journal =      j-FUND-INFO,
  volume =       "97",
  number =       "4",
  pages =        "369--379",
  month =        dec,
  year =         "2009",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2009-207",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:09:48 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Kiltz:2009:DCC,
  author =       "Eike Kiltz and David Galindo",
  title =        "Direct chosen-ciphertext secure identity-based key
                 encapsulation without random oracles",
  journal =      j-THEOR-COMP-SCI,
  volume =       "410",
  number =       "47--49",
  pages =        "5093--5111",
  day =          "6",
  month =        nov,
  year =         "2009",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Mar 28 21:21:56 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Kim:2009:DCA,
  author =       "Jongtack Kim and Saewoong Bahk",
  title =        "Design of certification authority using secret
                 redistribution and multicast routing in wireless mesh
                 networks",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "53",
  number =       "1",
  pages =        "98--109",
  day =          "16",
  month =        jan,
  year =         "2009",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:29 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Kim:2009:SVN,
  author =       "Soongohn Kim and Seoksoo Kim and Geuk Lee",
  title =        "Secure verifiable non-interactive oblivious transfer
                 protocol using {RSA} and bit commitment on distributed
                 environment",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "25",
  number =       "3",
  pages =        "352--357",
  month =        mar,
  year =         "2009",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Sat Sep 11 13:08:14 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Klivans:2009:CHL,
  author =       "Adam R. Klivans and Alexander A. Sherstov",
  title =        "Cryptographic hardness for learning intersections of
                 halfspaces",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "75",
  number =       "1",
  pages =        "2--12",
  month =        jan,
  year =         "2009",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2008.07.008",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:27:09 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000008000706",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Article{Klonowski:2009:SGS,
  author =       "Marek Klonowski and Lukasz Krzywiecki and Miroslaw
                 Kutylowski and Anna Lauks",
  title =        "Step-out group signatures",
  journal =      j-COMPUTING,
  volume =       "85",
  number =       "1--2",
  pages =        "137--151",
  month =        jun,
  year =         "2009",
  CODEN =        "CMPTA2",
  ISSN =         "0010-485X (print), 1436-5057 (electronic)",
  ISSN-L =       "0010-485X",
  bibdate =      "Sun Oct 31 11:09:57 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0010-485X&volume=85&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0010-485X&volume=85&issue=1&spage=137",
  acknowledgement = ack-nhfb,
  fjournal =     "Computing: Archiv f{\"u}r informatik und numerik",
  journal-URL =  "http://link.springer.com/journal/607",
}

@Article{Koo:2009:SVN,
  author =       "Woo Kwon Koo and Jung Yeon Hwang and Dong Hoon Lee",
  title =        "Security vulnerability in a non-interactive {ID}-based
                 proxy re-encryption scheme",
  journal =      j-INFO-PROC-LETT,
  volume =       "109",
  number =       "23--24",
  pages =        "1260--1262",
  day =          "15",
  month =        nov,
  year =         "2009",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 15:53:45 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Kornblum:2009:IBD,
  author =       "Jesse D. Kornblum",
  title =        "Implementing {BitLocker} drive encryption for forensic
                 analysis",
  journal =      "Digital Investigation",
  volume =       "5",
  number =       "3",
  pages =        "75--84",
  month =        "????",
  year =         "2009",
  DOI =          "????",
  bibdate =      "Mon Mar 09 12:26:07 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 50]{Schneier:2015:SWC}.",
}

@Article{Kumar:2009:UAU,
  author =       "Ajay Kumar and David Zhang",
  title =        "User Authentication Using Fusion of Face and
                 Palmprint",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "9",
  number =       "2",
  pages =        "251--270",
  month =        apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1142/S0219467809003423",
  ISSN =         "0219-4678",
  bibdate =      "Tue Aug 31 08:38:02 MDT 2010",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Lao:2009:ORA,
  author =       "Yuanwei Lao and Yuan F. Zheng",
  title =        "Optimal Rate Allocation for Logo Watermarking",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "9",
  number =       "1",
  pages =        "1--25",
  month =        jan,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1142/S0219467809003319",
  ISSN =         "0219-4678",
  bibdate =      "Tue Aug 31 08:38:02 MDT 2010",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics (IJIG)",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Lavoue:2009:LRM,
  author =       "Guillaume Lavou{\'e}",
  title =        "A local roughness measure for {$3$D} meshes and its
                 application to visual masking",
  journal =      j-TAP,
  volume =       "5",
  number =       "4",
  pages =        "21:1--21:??",
  month =        jan,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1462048.1462052",
  ISSN =         "1544-3558 (print), 1544-3965 (electronic)",
  ISSN-L =       "1544-3558",
  bibdate =      "Mon Feb 2 14:38:02 MST 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "3D models are subject to a wide variety of processing
                 operations such as compression, simplification or
                 watermarking, which may introduce some geometric
                 artifacts on the shape. The main issue is to maximize
                 the compression/simplification ratio or the watermark
                 strength while minimizing these visual degradations.
                 However few algorithms exploit the human visual system
                 to {\em hide\/} these degradations, while perceptual
                 attributes could be quite relevant for this task.
                 Particularly, the {\em masking effect\/} defines the
                 fact that one visual pattern can hide the visibility of
                 another. In this context we introduce an algorithm for
                 estimating the {\em roughness\/} of a 3D mesh, as a
                 local measure of geometric noise on the surface.
                 Indeed, a textured (or {\em rough\/}) region is able to
                 hide geometric distortions much better than a smooth
                 one. Our measure is based on curvature analysis on
                 local windows of the mesh and is independent of the
                 resolution/connectivity of the object. The accuracy and
                 the robustness of our measure, together with its
                 relevance regarding visual masking have been
                 demonstrated through extensive comparisons with
                 state-of-the-art and subjective experiment. Two
                 applications are also presented, in which the roughness
                 is used to lead (and improve) respectively compression
                 and watermarking algorithms.",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Transactions on Applied Perception (TAP)",
  keywords =     "3D mesh; Curvature; Masking; Roughness; subjective
                 evaluation",
}

@Article{Law:2009:EEL,
  author =       "Yee Wei Law and Marimuthu Palaniswami and Lodewijk
                 {Van Hoesel} and Jeroen Doumen and Pieter Hartel and
                 Paul Havinga",
  title =        "Energy-efficient link-layer jamming attacks against
                 wireless sensor network {MAC} protocols",
  journal =      j-TOSN,
  volume =       "5",
  number =       "1",
  pages =        "6:1--6:??",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1464420.1464426",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Tue Mar 16 15:22:49 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "A typical wireless sensor node has little protection
                 against radio jamming. The situation becomes worse if
                 energy-efficient jamming can be achieved by exploiting
                 knowledge of the data link layer. Encrypting the
                 packets may help to prevent the jammer from taking
                 actions based on the content of the packets, but the
                 temporal arrangement of the packets induced by the
                 nature of the protocol might unravel patterns that the
                 jammer can take advantage of, even when the packets are
                 encrypted.\par

                 By looking at the packet interarrival times in three
                 representative MAC protocols, S-MAC, LMAC, and B-MAC,
                 we derive several jamming attacks that allow the jammer
                 to jam S-MAC, LMAC, and B-MAC energy efficiently. The
                 jamming attacks are based on realistic assumptions. The
                 algorithms are described in detail and simulated. The
                 effectiveness and efficiency of the attacks are
                 examined. In addition, we validate our simulation model
                 by comparing its results with measurements obtained
                 from actual implementation on our sensor node
                 prototypes. We show that it takes little effort to
                 implement such effective jammers, making them a
                 realistic threat.\par

                 Careful analysis of other protocols belonging to the
                 respective categories of S-MAC, LMAC, and B-MAC reveals
                 that those protocols are, to some extent, also
                 susceptible to our attacks. The result of this
                 investigation provides new insights into the security
                 considerations of MAC protocols.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
  keywords =     "clustering; denial-of-service attacks; expectation
                 maximization; jamming; MAC protocols",
}

@Article{Lawson:2009:SCA,
  author =       "Nate Lawson",
  title =        "Side-Channel Attacks on Cryptographic Software",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "65--68",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.165",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Misc{Lawson:2009:TAG,
  author =       "Nate Lawson",
  title =        "Timing attack in {Google Keyczar} library",
  howpublished = "Web site.",
  year =         "2009",
  bibdate =      "Mon Mar 09 15:51:15 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://rdist.root.org/2009/05/28/timing-attack-in-google-keyczar-library",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 54]{Schneier:2015:SWC}.",
}

@Article{Lee:2009:CET,
  author =       "Tian-Fu Lee and Jenn-Long Liu and Mei-Jiun Sung and
                 Shiueng-Bien Yang and Chia-Mei Chen",
  title =        "Communication-efficient three-party protocols for
                 authentication and key agreement",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "58",
  number =       "4",
  pages =        "641--648",
  month =        aug,
  year =         "2009",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:50:28 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122109003757",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Lee:2009:NCA,
  author =       "Cheng-Chi Lee and Min-Shiang Hwang and Shiang-Feng
                 Tzeng",
  title =        "A New Convertible Authenticated Encryption Scheme
                 Based on the {ElGamal} Cryptosystem",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "20",
  number =       "2",
  pages =        "351--359",
  month =        apr,
  year =         "2009",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054109006607",
  ISSN =         "0129-0541 (print), 1793-6373 (electronic)",
  ISSN-L =       "0129-0541",
  bibdate =      "Tue Aug 31 07:37:14 MDT 2010",
  bibsource =    "http://ejournals.wspc.com.sg/ijfcs/mkt/archive.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Lee:2009:SAF,
  author =       "C. Lee and J. Kim and S. Hong and Y.-S. Lee",
  title =        "Security Analysis of the Full-Round {CHESS}-64 Cipher
                 Suitable for Pervasive Computing Environments",
  journal =      j-J-UCS,
  volume =       "15",
  number =       "5",
  pages =        "1007--??",
  month =        "????",
  year =         "2009",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Wed Aug 25 22:38:58 MDT 2010",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_15_5/security_analysis_of_the",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Levi:2009:ULM,
  author =       "Albert Levi and Can Berk G{\"u}der",
  title =        "Understanding the limitations of {S/MIME} digital
                 signatures for e-mails: a {GUI} based approach",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "3--4",
  pages =        "105--120",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:16 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000783",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2009:ATN,
  author =       "Jiangtao Li and Ninghui Li and William H.
                 Winsborough",
  title =        "Automated trust negotiation using cryptographic
                 credentials",
  journal =      j-TISSEC,
  volume =       "13",
  number =       "1",
  pages =        "2:1--2:??",
  month =        oct,
  year =         "2009",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1609956.1609958",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Tue Mar 16 10:18:12 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Liang:2009:AIE,
  author =       "Zhenkai Liang and Weiqing Sun and V. N.
                 Venkatakrishnan and R. Sekar",
  title =        "{Alcatraz}: An Isolated Environment for Experimenting
                 with Untrusted Software",
  journal =      j-TISSEC,
  volume =       "12",
  number =       "3",
  pages =        "14:1--14:37",
  month =        jan,
  year =         "2009",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1455526.1455527",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Mon Feb 2 18:03:37 MST 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "In this article, we present an approach for realizing
                 a {\em safe execution environment (SEE)\/} that enables
                 users to ``try out'' new software (or configuration
                 changes to existing software) without the fear of
                 damaging the system in any manner. A key property of
                 our SEE is that it faithfully reproduces the behavior
                 of applications, as if they were running natively on
                 the underlying (host) operating system. This is
                 accomplished via {\em one-way isolation\/}: processes
                 running within the SEE are given read-access to the
                 environment provided by the host OS, but their write
                 operations are prevented from escaping outside the SEE.
                 As a result, SEE processes cannot impact the behavior
                 of host OS processes, or the integrity of data on the
                 host OS. SEEs support a wide range of tasks, including:
                 study of malicious code, controlled execution of
                 untrusted software, experimentation with software
                 configuration changes, testing of software patches, and
                 so on. It provides a convenient way for users to
                 inspect system changes made within the SEE. If these
                 changes are not accepted, they can be rolled back at
                 the click of a button. Otherwise, the changes can be
                 committed so as to become visible outside the SEE. We
                 provide consistency criteria that ensure semantic
                 consistency of the committed results. We develop two
                 different implementation approaches, one in {\em
                 user-land\/} and the other in the {\em OS kernel}, for
                 realizing a safe-execution environment. Our
                 implementation results show that most software,
                 including fairly complex server and client
                 applications, can run successfully within our SEEs. It
                 introduces low performance overheads, typically below
                 10 percent.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "Isolation; one-way isolation",
}

@Article{Lim:2009:OPG,
  author =       "Sun Sun Lim and Hichang Cho and Milagros Rivera
                 Sanchez",
  title =        "Online privacy, government surveillance and national
                 {ID} cards",
  journal =      j-CACM,
  volume =       "52",
  number =       "12",
  pages =        "116--120",
  month =        dec,
  year =         "2009",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1610252.1610283",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:05 MST 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "This study explores whether internet users' concerns
                 for personal information privacy, principally
                 manifested as online privacy, are related to their
                 attitudes to government surveillance and national ID
                 cards (often perceived as a surveillance tool). This is
                 a relationship which needs to be explored in-depth
                 because of three concurrent trends -- first, the push
                 towards e-government, where citizen-government
                 transactions are increasingly conducted online; second,
                 the growing use of smart cards, RFID tags and other
                 portable information collection and transmission
                 devices by governments and businesses; and third, calls
                 for greater government surveillance, both online and
                 offline, to counter terrorism in the post 9/11
                 environment.\par

                 While prior research has dealt with individual concerns
                 about online privacy and individual concerns about
                 government surveillance, studies exploring the
                 relationship between the two are limited. This study
                 seeks to fill that gap by surveying Internet users
                 across five cities which vary in their experience of
                 government surveillance and the use of national ID
                 cards -- Bangalore, New York, Seoul, Singapore and
                 Sydney.\par

                 Personal information privacy is the individual's
                 ability to personally control information about
                 him/herself. Such information could include anything
                 from one's birth registration details, to the
                 identities and coordinates of one's next-of-kin, income
                 and expenditure patterns and even health records. In
                 countries where day-to-day transactions with commercial
                 and government entities are increasingly being
                 conducted online, involving the electronic collection
                 of personal information, online privacy is the
                 principal manifestation of personal information
                 privacy.\par

                 As e-commerce and e-government services become more
                 pervasive, Internet users' concerns about online
                 privacy are likely to grow. Individual online privacy
                 concerns have been classified into improper
                 acquisition, improper use and privacy invasion.$^{12}$
                 Concerns about improper acquisition relate to
                 unauthorized access to personal information, improper
                 collection of one's private information and improper
                 monitoring of consumers' online activities. Concerns
                 about improper use cover unauthorized analysis of
                 consumers' online shopping behavior and the subsequent
                 business-to-business transfer of such analyses.
                 Concerns about privacy invasion refer to the
                 transmission of information to Internet users without
                 their prior consent, such as spam, as well as the
                 improper storage of personal information. To maintain
                 their online privacy, Internet users can engage in
                 self-protective behaviour such as opting out, using
                 privacy enhancing technologies, reading privacy
                 policies, or checking trust marks.\par

                 Studies have been conducted to test concern about
                 online privacy as a function of demographic variables.
                 Sheehan$^{10}$ found that gender was a significant
                 factor in that female consumers were generally more
                 concerned about their personal privacy than male
                 consumers. In general, older consumers$^2$ were also
                 more concerned about online privacy. The relationship
                 between consumers' experience with the Internet and
                 online privacy concerns has also been explored. Bellman
                 et al.$^2$ reported that consumers' online privacy
                 concerns diminished with Internet experience. As more
                 consumers use the Internet and the average level of
                 experience rises, online privacy concerns should
                 gradually diminish. In general, studies have
                 demonstrated that demographic variables and
                 Internet-related experiences significantly affect
                 Internet users' concern about online privacy.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Lin:2009:DMG,
  author =       "Song Lin and Biao Wang and Zhoujun Li",
  title =        "Digital multisignature on the generalized conic curve
                 over {$ Z_n $}",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "1--2",
  pages =        "100--104",
  month =        feb # "\slash " # mar,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:15 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000801",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{Lunde:2009:BCU,
  editor =       "Paul Lunde",
  title =        "The book of codes: understanding the world of hidden
                 messages: an illustrated guide to signs, symbols,
                 ciphers, and secret languages",
  publisher =    "University of California Press",
  address =      "Berkeley, CA",
  pages =        "279",
  year =         "2009",
  ISBN =         "0-520-26013-9",
  ISBN-13 =      "978-0-520-26013-9",
  LCCN =         "Z103 .B56 2009",
  bibdate =      "Sat May 15 09:17:33 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/enhancements/fy1002/2009281679-b.html;
                 http://www.loc.gov/catdir/enhancements/fy1002/2009281679-d.html",
  acknowledgement = ack-nhfb,
  subject =      "Ciphers; Cryptography",
  tableofcontents = "THE FIRST CODES: Reading the landscape \\
                 Tracking animals \\
                 Bushcraft signs \\
                 Early petroglyphs \\
                 First writing systems \\
                 Reading cuneiform \\
                 Alphabets and scripts \\
                 The evolution of numerical systems \\
                 Linear A and Linear B \\
                 The Phaistos disc \\
                 The mystery of hieroglyphs \\
                 Hieroglyphs revealed \\
                 The riddle of the Maya \\
                 Indigenous traditions \\
                 SECTS, SYMBOLS, and SECRET SOCIETIES: Early Christians
                 \\
                 The pentangle \\
                 Divination \\
                 Heresies, sects and cults \\
                 Rosslyn Chapel \\
                 Alchemy \\
                 Kabbalism \\
                 Necromancy \\
                 Rosicrucians \\
                 Freemasons \\
                 CODES FOR SECRECY: The art of concealment \\
                 For your eyes only \\
                 Frequency analysis \\
                 Disguising ciphers \\
                 Medieval cipher systems \\
                 The Babington plot \\
                 The da Vinci code \\
                 Ciphertexts and keys \\
                 Grilles \\
                 Spies and black chambers \\
                 Mechanical devices \\
                 Hidden in plain sight \\
                 COMMUNICATING AT A DISTANCE: Long-distance alarms \\
                 Flag signals \\
                 Semaphore and the telegraph \\
                 Morse code \\
                 Person to person \\
                 CODES OF WAR: Classical codes of war \\
                 The 'indecipherable' code \\
                 The great cipher \\
                 19th-century innovations \\
                 Military map codes \\
                 Field signals \\
                 The Zimmermann telegram \\
                 Enigma: the 'unbreakable' system \\
                 WWII codes and code breakers \\
                 Cracking enigma \\
                 Navajo windtalkers \\
                 Cold war codes \\
                 CODES OF THE UNDERWORLD: Street slang \\
                 From Samurai to Yakuza \\
                 Cockney rhyming slang \\
                 The Mob \\
                 Ramblers' sign language \\
                 Cops and codes \\
                 The zodiac mystery \\
                 The zodiac legacy \\
                 Graffiti \\
                 Youth codes \\
                 Digital subversion \\
                 .. ENCODING THE WORLD: Describing time \\
                 Describing form \\
                 Force and motion \\
                 Mathematics: the indescribable \\
                 The periodic table \\
                 Defining the world \\
                 Encoding the landscape \\
                 Navigation \\
                 Taxonomy \\
                 The genetic code \\
                 Genetic ancestry \\
                 Using the genetic code \\
                 CODES OF CIVILIZATION: Codes of construction \\
                 Taoist mysticism \\
                 South Asian sacred imagery \\
                 The language of Buddhism \\
                 The patterns of Islam \\
                 Mysteries of the North \\
                 Medieval visual sermons \\
                 Stained glass windows \\
                 Renaissance iconography \\
                 The age of reason \\
                 Victoriana \\
                 Textiles, carpets, and embroidery \\
                 CODES OF COMMERCE: Commercial codes \\
                 Brands and trademarks \\
                 Makers' marks \\
                 Codes of work \\
                 Currency and counterfeits \\
                 The book in your hands \\
                 CODES OF HUMAN BEHAVIOR: Body language \\
                 Survival signals \\
                 Sporting codes \\
                 Etiquette \\
                 Dressing your message \\
                 Heraldry \\
                 Formal dress codes \\
                 Decoding the unconscious \\
                 The language of dreams \\
                 VISUAL CODES: Signs and signage \\
                 Highway codes \\
                 Challenged communication \\
                 Describing music \\
                 Musical scores \\
                 Animal talk \\
                 Extraterrestrials \\
                 IMAGINARY CODES: Modern magic and mayhem \\
                 The Bible code \\
                 The Beale Papers \\
                 Mystery and imagination \\
                 Fantasy codes \\
                 Doomsday codes \\
                 THE DIGITAL AGE. The first computers \\
                 Supercomputers \\
                 Talking to computers \\
                 Alice, Bob, and Eve \\
                 Future medicine \\
                 Where are codes taking us?",
}

@Article{Ma:2009:NAS,
  author =       "Di Ma and Gene Tsudik",
  title =        "A new approach to secure logging",
  journal =      j-TOS,
  volume =       "5",
  number =       "1",
  pages =        "2:1--2:??",
  month =        mar,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1502777.1502779",
  ISSN =         "1553-3077 (print), 1553-3093 (electronic)",
  ISSN-L =       "1553-3077",
  bibdate =      "Tue Mar 16 15:33:38 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tos/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tos.bib",
  abstract =     "The need for secure logging is well-understood by the
                 security professionals, including both researchers and
                 practitioners. The ability to efficiently verify all
                 (or some) log entries is important to any application
                 employing secure logging techniques. In this article,
                 we begin by examining the state of the art in secure
                 logging and identify some problems inherent to systems
                 based on trusted third-party servers. We then propose a
                 different approach to secure logging based upon
                 recently developed Forward-Secure Sequential Aggregate
                 (FssAgg) authentication techniques. Our approach offers
                 both space-efficiency and provable security. We
                 illustrate two concrete schemes --- one
                 private-verifiable and one public-verifiable --- that
                 offer practical secure logging without any reliance on
                 online trusted third parties or secure hardware. We
                 also investigate the concept of immutability in the
                 context of forward-secure sequential aggregate
                 authentication to provide finer grained verification.
                 Finally we evaluate proposed schemes and report on our
                 experience with implementing them within a secure
                 logging system.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Transactions on Storage",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J960",
  keywords =     "forward secure sequential aggregate (FssAgg)
                 authentication; forward-secure stream integrity; MACs;
                 Secure logging; signatures; truncation attack",
}

@Article{Mahdian:2009:UNI,
  author =       "Babak Mahdian and Stanislav Saic",
  title =        "Using noise inconsistencies for blind image
                 forensics",
  journal =      j-IMAGE-VIS-COMPUT,
  volume =       "27",
  number =       "10",
  pages =        "1497--1503",
  year =         "2009",
  CODEN =        "IVCODK",
  DOI =          "https://doi.org/10.1016/j.imavis.2009.02.001",
  ISSN =         "0262-8856",
  ISSN-L =       "0262-8856",
  bibdate =      "Wed Jan 28 10:08:12 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/benfords-law.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Special Section: Computer Vision Methods for Ambient
                 Intelligence",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0262885609000146",
  abstract =     "A commonly used tool to conceal the traces of
                 tampering is the addition of locally random noise to
                 the altered image regions. The noise degradation is the
                 main cause of failure of many active or passive image
                 forgery detection methods. Typically, the amount of
                 noise is uniform across the entire authentic image.
                 Adding locally random noise may cause inconsistencies
                 in the image's noise. Therefore, the detection of
                 various noise levels in an image may signify tampering.
                 In this paper, we propose a novel method capable of
                 dividing an investigated image into various partitions
                 with homogeneous noise levels. In other words, we
                 introduce a segmentation method detecting changes in
                 noise level. We assume the additive white Gaussian
                 noise. Several examples are shown to demonstrate the
                 proposed method's output. An extensive quantitative
                 measure of the efficiency of the noise estimation part
                 as a function of different noise standard deviations,
                 region sizes and various {JPEG} compression qualities
                 is proposed as well.",
  acknowledgement = ack-nhfb,
  fjournal =     "Image and Vision Computing",
  keywords =     "Benford's Law; Digital forgery; Image forensics; Image
                 segmentation; Image tampering; Noise inconsistency",
}

@Article{Majzoobi:2009:TDI,
  author =       "Mehrdad Majzoobi and Farinaz Koushanfar and Miodrag
                 Potkonjak",
  title =        "Techniques for Design and Implementation of Secure
                 Reconfigurable {PUFs}",
  journal =      j-TRETS,
  volume =       "2",
  number =       "1",
  pages =        "5:1--5:??",
  month =        mar,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1502781.1502786",
  ISSN =         "1936-7406 (print), 1936-7414 (electronic)",
  ISSN-L =       "1936-7406",
  bibdate =      "Mon Jun 1 18:15:27 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Physically unclonable functions (PUFs) provide a basis
                 for many security and digital rights management
                 protocols. PUF-based security approaches have numerous
                 comparative strengths with respect to traditional
                 cryptography-based techniques, including resilience
                 against physical and side channel attacks and
                 suitability for lightweight protocols. However,
                 classical delay-based PUF structures have a number of
                 drawbacks including susceptibility to guessing, reverse
                 engineering, and emulation attacks, as well as
                 sensitivity to operational and environmental
                 variations.\par

                 To address these limitations, we have developed a new
                 set of techniques for FPGA-based PUF design and
                 implementation. We demonstrate how reconfigurability
                 can be exploited to eliminate the stated PUF
                 limitations. We also show how FPGA-based PUFs can be
                 used for privacy protection. Furthermore,
                 reconfigurability enables the introduction of new
                 techniques for PUF testing. The effectiveness of all
                 the proposed techniques is validated using extensive
                 implementations, simulations, and statistical
                 analysis.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Transactions on Reconfigurable Technology and
                 Systems (TRETS)",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J1151",
  keywords =     "hardware security; physically unclonable functions;
                 process variation; Reconfigurable systems",
}

@Article{Manulis:2009:SMF,
  author =       "Mark Manulis and J{\"o}rg Schwenk",
  title =        "Security model and framework for information
                 aggregation in sensor networks",
  journal =      j-TOSN,
  volume =       "5",
  number =       "2",
  pages =        "13:1--13:??",
  month =        mar,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1498915.1498919",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Tue Mar 16 15:23:16 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosn.bib",
  abstract =     "Information aggregation is an important operation in
                 wireless sensor networks (WSNs) executed for the
                 purpose of monitoring and reporting environmental data.
                 Due to the performance constraints of sensor nodes the
                 in-network form of the aggregation is especially
                 attractive since it allows saving expensive resources
                 during frequent network queries. Easy accessibility of
                 networks and nodes and almost no physical protection
                 against corruptions raise high security challenges.
                 Protection against attacks aiming to falsify the
                 aggregated result is considered to be of prime
                 importance.\par

                 In this article we design the first general framework
                 for secure information aggregation in WSNs focusing on
                 scenarios where aggregation is performed by one of its
                 nodes. The framework achieves security against node
                 corruptions and is based solely on the symmetric
                 cryptographic primitives that are more suitable for
                 WSNs in terms of efficiency. We analyze performance of
                 the framework and unlike many previous approaches
                 increase confidence in it by a rigorous proof of
                 security within the specially designed {\em formal
                 security model.\/}",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
  keywords =     "Aggregation; framework; in-network processing;
                 provable security; wireless sensor network",
}

@Article{Mashatan:2009:ITC,
  author =       "Atefeh Mashatan and Douglas R. Stinson",
  title =        "Interactive two-channel message authentication based
                 on {Interactive--Collision Resistant} hash functions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "1",
  pages =        "49--60",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0063-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0063-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Interactive--Collision Resistant (ICR) hash function",
}

@Article{McEvoy:2009:IWH,
  author =       "Robert P. McEvoy and Colin C. Murphy and William P.
                 Marnane and Michael Tunstall",
  title =        "Isolated {WDDL}: a Hiding Countermeasure for
                 Differential Power Analysis on {FPGAs}",
  journal =      j-TRETS,
  volume =       "2",
  number =       "1",
  pages =        "3:1--3:??",
  month =        mar,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1502781.1502784",
  ISSN =         "1936-7406 (print), 1936-7414 (electronic)",
  ISSN-L =       "1936-7406",
  bibdate =      "Mon Jun 1 18:15:27 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Security protocols are frequently accelerated by
                 implementing the underlying cryptographic functions in
                 reconfigurable hardware. However, unprotected hardware
                 implementations are susceptible to side-channel
                 attacks, and Differential Power Analysis (DPA) has been
                 shown to be especially powerful. In this work, we
                 evaluate and compare the effectiveness of common hiding
                 countermeasures against DPA in FPGA-based designs,
                 using the Whirlpool hash function as a case study. In
                 particular, we develop a new design flow called
                 Isolated WDDL (IWDDL). In contrast with previous works,
                 IWDDL isolates the direct and complementary circuit
                 paths, and also provides DPA resistance in the Hamming
                 distance power model. The analysis is supported using
                 actual implementation results.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Transactions on Reconfigurable Technology and
                 Systems (TRETS)",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J1151",
  keywords =     "DPA; FPGA; secure logic; Side-channel attacks;
                 Whirlpool",
}

@InCollection{Micciancio:2009:LBC,
  author =       "Daniele Micciancio and Oded Regev",
  title =        "Lattice-based Cryptography",
  crossref =     "Bernstein:2009:PQC",
  pages =        "147--192",
  year =         "2009",
  bibdate =      "Thu Apr 21 17:17:18 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Mihaljevic:2009:ASC,
  author =       "Miodrag J. Mihaljevi{\'c} and Hideki Imai",
  title =        "An approach for stream ciphers design based on joint
                 computing over random and secret data",
  journal =      j-COMPUTING,
  volume =       "85",
  number =       "1--2",
  pages =        "153--168",
  month =        jun,
  year =         "2009",
  CODEN =        "CMPTA2",
  ISSN =         "0010-485X (print), 1436-5057 (electronic)",
  ISSN-L =       "0010-485X",
  bibdate =      "Sun Oct 31 11:09:57 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0010-485X&volume=85&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0010-485X&volume=85&issue=1&spage=153",
  acknowledgement = ack-nhfb,
  fjournal =     "Computing: Archiv f{\"u}r informatik und numerik",
  journal-URL =  "http://link.springer.com/journal/607",
}

@Article{Moralis:2009:KSA,
  author =       "Athanasios Moralis and Vassiliki Pouli and Symeon
                 Papavassiliou and Vasilis Maglaris",
  title =        "A {Kerberos} security architecture for {Web} services
                 based instrumentation grids",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "25",
  number =       "7",
  pages =        "804--818",
  month =        jul,
  year =         "2009",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Sat Sep 11 13:08:15 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Mouratidis:2009:PMD,
  author =       "Kyriakos Mouratidis and Dimitris Sacharidis and
                 Hweehwa Pang",
  title =        "Partially materialized digest scheme: an efficient
                 verification method for outsourced databases",
  journal =      j-VLDB-J,
  volume =       "18",
  number =       "1",
  pages =        "363--381",
  month =        jan,
  year =         "2009",
  CODEN =        "VLDBFR",
  DOI =          "https://doi.org/10.1007/s00778-008-0108-z",
  ISSN =         "1066-8888 (print), 0949-877X (electronic)",
  ISSN-L =       "1066-8888",
  bibdate =      "Tue Sep 15 15:49:59 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbj.bib",
  abstract =     "In the outsourced database model, a data owner
                 publishes her database through a third-party server;
                 i.e., the server hosts the data and answers user
                 queries on behalf of the owner. Since the server may
                 not be trusted, or may be compromised, users need a
                 means to verify that answers received are both
                 authentic and complete, i.e., that the returned data
                 have not been tampered with, and that no qualifying
                 results have been omitted. We propose a result
                 verification approach for one-dimensional queries,
                 called Partially Materialized Digest scheme (PMD), that
                 applies to both static and dynamic databases. PMD uses
                 separate indexes for the data and for their associated
                 verification information, and only partially
                 materializes the latter. In contrast with previous
                 work, PMD avoids unnecessary costs when processing
                 queries that do not request verification, achieving the
                 performance of an ordinary index (e.g., a B$^+$ -tree).
                 On the other hand, when an authenticity and
                 completeness proof is required, PMD outperforms the
                 existing state-of-the-art technique by a wide margin,
                 as we demonstrate analytically and experimentally.
                 Furthermore, we design two verification methods for
                 spatial queries. The first, termed Merkle R-tree
                 (MR-tree), extends the conventional approach of
                 embedding authentication information into the data
                 index (i.e., an R-tree). The second, called Partially
                 Materialized KD-tree (PMKD), follows the PMD paradigm
                 using separate data and verification indexes. An
                 empirical evaluation with real data shows that the PMD
                 methodology is superior to the traditional approach for
                 spatial queries too.",
  acknowledgement = ack-nhfb,
  fjournal =     "VLDB Journal: Very Large Data Bases",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J869",
  keywords =     "Authentication in outsourced databases; Query result
                 verification",
}

@Article{Muller:2009:BPE,
  author =       "Christoph M{\"u}ller and Steffen Frey and Magnus
                 Strengert and Carsten Dachsbacher and Thomas Ertl",
  title =        "Best Paper of {EGPGV --- Eurographics Symposium on
                 Parallel Graphics and Visualization}, {Guest Editor
                 Jean Favre}: a Compute Unified System Architecture for
                 Graphics Clusters Incorporating Data Locality",
  journal =      j-IEEE-TRANS-VIS-COMPUT-GRAPH,
  volume =       "15",
  number =       "4",
  pages =        "605--617",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "ITVGEA",
  DOI =          "https://doi.org/10.1109/TVCG.2008.188",
  ISSN =         "1077-2626 (print), 1941-0506 (electronic), 2160-9306",
  ISSN-L =       "1077-2626",
  bibdate =      "Thu Jul 2 10:22:33 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Visualization and Computer
                 Graphics",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2945",
}

@InProceedings{Myers:2009:BEC,
  author =       "S. Myers and A. Shelat",
  title =        "Bit Encryption Is Complete",
  crossref =     "IEEE:2009:PAI",
  pages =        "607--616",
  year =         "2009",
  DOI =          "https://doi.org/10.1109/FOCS.2009.65",
  bibdate =      "Thu May 06 10:11:33 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Under CPA and CCA1 attacks, a secure bit encryption
                 scheme can be applied bit-by-bit to construct a secure
                 many-bit encryption scheme. The same construction
                 fails, however, under a CCA2 attack. In fact, since the
                 notion of CCA2 security was introduced by Rackoff and
                 Simon [21], it has been an open question to determine
                 whether single bit CCA2 secure encryption implies the
                 existence of many-bit CCA2 security. We positively
                 resolve this long-standing question and establish that
                 bit encryption is complete for CPA, CCA1, and CCA2
                 notions. Our construction is black-box, and thus
                 requires novel techniques to avoid known impossibility
                 results concerning trapdoor predicates [10]. To the
                 best of our knowledge, our work is also the first
                 example of a non-shielding reduction (introduced in
                 [9]) in the standard (i.e., not random-oracle) model.",
  acknowledgement = ack-nhfb,
  keywords =     "bit encryption; CCA1 attack; CCA2 secure encryption;
                 Chosen-ciphertext secure public key encryption; CPA
                 attack; many-bit CCA2 security; many-bit encryption
                 scheme; public key cryptography; secure bit encryption
                 scheme",
}

@Article{Nghiem:2009:FBI,
  author =       "Thao P. Nghiem and Tae Ho Cho",
  title =        "A fuzzy-based interleaved multi-hop authentication
                 scheme in wireless sensor networks",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "69",
  number =       "5",
  pages =        "441--450",
  month =        may,
  year =         "2009",
  CODEN =        "JPDCER",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Wed Sep 1 17:08:39 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/07437315",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@Article{Nigrini:2009:DDU,
  author =       "Mark J. Nigrini and Steven J. Miller",
  title =        "Data Diagnostics Using Second-Order Tests of
                 {Benford's Law}",
  journal =      j-AUDITING,
  volume =       "28",
  number =       "2",
  pages =        "305--324",
  month =        nov,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.2308/aud.2009.28.2.305",
  ISSN =         "0278-0380 (print), 1558-7991 (electronic)",
  ISSN-L =       "0278-0380",
  bibdate =      "Tue Nov 15 09:11:56 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/benfords-law.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://aaapubs.org/loi/ajpt;
                 http://link.aip.org/link/AJPTXX/v28/i2/p305/s1",
  abstract =     "Auditors are required to use analytical procedures to
                 identify the existence of unusual transactions, events,
                 and trends. Benford's Law gives the expected patterns
                 of the digits in numerical data, and has been advocated
                 as a test for the authenticity and reliability of
                 transaction level accounting data. This paper describes
                 a new second-order test that calculates the digit
                 frequencies of the differences between the ordered
                 (ranked) values in a data set. These digit frequencies
                 approximate the frequencies of Benford's Law for most
                 data sets. The second-order test is applied to four
                 sets of transactional data. The second-order test
                 detected errors in data downloads, rounded data, data
                 generated by statistical procedures, and the inaccurate
                 ordering of data. The test can be applied to any data
                 set and nonconformity usually signals an unusual issue
                 related to data integrity that might not have been
                 easily detectable using traditional analytical
                 procedures",
  acknowledgement = ack-nhfb,
  fjournal =     "Auditing: A Journal of Practice \& Theory",
}

@Article{Nitaj:2009:CRCo,
  author =       "Abderrahmane Nitaj",
  title =        "Cryptanalysis of {RSA} with Constrained Keys",
  journal =      j-INT-J-NUMBER-THEORY,
  volume =       "5",
  number =       "2",
  pages =        "311--325",
  month =        mar,
  year =         "2009",
  DOI =          "https://doi.org/10.1142/S1793042109002122",
  ISSN =         "1793-0421 (print), 1793-7310 (electronic)",
  ISSN-L =       "1793-0421",
  bibdate =      "Tue Jul 21 10:01:19 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijnt.bib",
  URL =          "https://www.worldscientific.com/doi/10.1142/S1793042109002122",
  abstract =     "Let n = pq be an RSA modulus with unknown prime
                 factors of equal bit-size. Let e be the public exponent
                 and d be the secret exponent satisfying ed \equiv 1 mod
                 \varphi (n) where \varphi (n) is the Euler totient
                 function. To reduce the decryption time or the
                 signature generation time, one might be tempted to use
                 a small private exponent d. Unfortunately, in 1990,
                 Wiener showed that private exponents smaller than are
                 insecure and in 1999, Boneh and Durfee improved the
                 bound to n$^{0.292}$. In this paper, we show that
                 instances of RSA with even large private exponents can
                 be efficiently broken if there exist positive integers
                 X, Y such that |eY - XF(u)| and Y are suitably small
                 where F is a function of publicly known expression for
                 which there exists an integer u \neq 0 satisfying F(u)
                 \approx n and pu or qu is computable from F(u) and n.
                 We show that the number of such exponents is at least
                 O(n$^{3 / 4 - \varepsilon }$) when F(u) = p(q - u).",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Number Theory (IJNT)",
  journal-URL =  "https://www.worldscientific.com/worldscinet/ijnt",
}

@TechReport{Ohigashi:2009:PMF,
  author =       "Toshihiro Ohigashi and Masakatu Morii",
  title =        "A Practical Message Falsification Attack on {WPA}",
  type =         "Technical Report",
  institution =  "Hiroshima University",
  address =      "1-4-2 Kagamiyama, Higashi-Hiroshima, 739-8511 Japan",
  day =          "15",
  month =        jul,
  year =         "2009",
  bibdate =      "Thu Aug 27 15:20:34 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://jwis2009.nsysu.edu.tw/location/paper/A%20Practical%20Message%20Falsification%20Attack%20on%20WPA.pdf",
  abstract =     "In 2008, Beck and Tews have proposed a practical
                 attack on WPA. Their attack (called the Beck--Tews
                 attack) can recover plaintext from an encrypted short
                 packet, and can falsify it. The execution time of the
                 Beck--Tews attack is about 12--15 minutes. However, the
                 attack has the limitation, namely, the targets are only
                 WPA implementations that support IEEE802.11e QoS
                 features. In this paper, we propose a practical message
                 falsification attack on any WPA implementation. In
                 order to ease targets of limitation of wireless LAN
                 products, we apply the Beck--Tews attack to the
                 man-in-the-middle attack. In the man-in-the-middle
                 attack, the user's communication is intercepted by an
                 attacker until the attack ends. It means that the users
                 may detect our attack when the execution time of the
                 attack is large. Therefore, we give methods for
                 reducing the execution time of the attack. As a result,
                 the execution time of our attack becomes about one
                 minute in the best case.",
  acknowledgement = ack-nhfb,
  keywords =     "falsification attack; man-in-the-middle attack; TKIP;
                 WPA",
}

@Article{Oiwa:2009:IMS,
  author =       "Yutaka Oiwa",
  title =        "Implementation of the memory-safe full {ANSI-C}
                 compiler",
  journal =      j-SIGPLAN,
  volume =       "44",
  number =       "6",
  pages =        "259--269",
  month =        jun,
  year =         "2009",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/1542476.1542505",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Tue Jun 16 14:41:16 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "This paper describes a completely memory-safe compiler
                 for C language programs that is fully compatible with
                 the ANSI C specification.\par

                 Programs written in C often suffer from nasty errors
                 due to dangling pointers and buffer overflow. Such
                 errors in Internet server programs are often exploited
                 by malicious attackers to crack an entire system. The
                 origin of these errors is usually corruption of
                 in-memory data structures caused by out-of-bound array
                 accesses. Usual C compilers do not provide any
                 protection against such out-of-bound access, although
                 many other languages such as Java and ML do provide
                 such protection. There have been several proposals for
                 preventing such memory corruption from various aspects:
                 runtime buffer overrun detectors, designs for new
                 C-like languages, and compilers for (subsets of) the C
                 language. However, as far as we know, none of them have
                 achieved full memory protection and full compatibility
                 with the C language specification at the same
                 time.\par

                 We propose the most powerful solution to this problem
                 ever presented. We have developed {\em Fail-Safe C}, a
                 memory-safe implementation of the full ANSI C language.
                 It detects and disallows all unsafe operations, yet
                 conforms to the full ANSI C standard (including casts
                 and unions). This paper introduces several
                 techniques--both compile-time and runtime--to reduce
                 the overhead of runtime checks, while still maintaining
                 100\% memory safety. This compiler lets programmers
                 easily make their programs safe without heavy rewriting
                 or porting of their code. It also supports many of the
                 'dirty tricks' commonly used in many existing C
                 programs, which do not strictly conform to the standard
                 specification. In this paper, we demonstrate several
                 real-world server programs that can be processed by our
                 compiler and present technical details and benchmark
                 results for it.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  keywords =     "C language; memory safety",
}

@InCollection{Overbeck:2009:CBC,
  author =       "Raphael Overbeck and Nicolas Sendrier",
  title =        "Code-based cryptography",
  crossref =     "Bernstein:2009:PQC",
  pages =        "95--146",
  year =         "2009",
  bibdate =      "Thu Apr 21 17:17:18 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Paar:2009:UCT,
  author =       "Christof Paar and Jan Pelzl",
  title =        "Understanding cryptography: a textbook for students
                 and practitioners",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xviii + 372",
  year =         "2009",
  DOI =          "https://doi.org/10.1007/978-3-642-04101-3",
  ISBN =         "3-642-04100-0 (hardcover), 3-642-04101-9 (paperback)",
  ISBN-13 =      "978-3-642-04100-6 (hardcover), 978-3-642-04101-3
                 (paperback)",
  LCCN =         "A76.9.A25 P437 2009",
  bibdate =      "Wed Jul 7 18:54:40 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "cryptography; mathematics; data encryption (computer
                 science)",
}

@InProceedings{Pareschi:2009:PAC,
  author =       "F. Pareschi and G. Scotti and L. Giancane and R.
                 Rovatti and G. Setti and A. Trifiletti",
  booktitle =    "{2009. ISCAS 2009. IEEE International Symposium on
                 Circuits and Systems}",
  title =        "Power analysis of a chaos-based random number
                 generator for cryptographic security",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "2858--2861",
  year =         "2009",
  DOI =          "https://doi.org/10.1109/ISCAS.2009.5118398",
  bibdate =      "Fri Jan 6 08:10:49 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5118398",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5076158",
}

@Article{Paulson:2009:NBT,
  author =       "Linda Dailey Paulson",
  title =        "News Briefs: Technique Makes Strong Encryption Easier
                 to Use",
  journal =      j-COMPUTER,
  volume =       "42",
  number =       "4",
  pages =        "24--27",
  month =        apr,
  year =         "2009",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2009.132",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Thu Jul 2 08:29:13 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Magazine",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Pecho:2009:APW,
  author =       "P. Pecho and F. {Zboril, Jr.} and M. Drahansky and P.
                 Hanacek",
  title =        "Agent Platform for Wireless Sensor Network with
                 Support for Cryptographic Protocols",
  journal =      j-J-UCS,
  volume =       "15",
  number =       "5",
  pages =        "992--??",
  month =        "????",
  year =         "2009",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Wed Aug 25 22:38:58 MDT 2010",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_15_5/agent_platform_for_wireless",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@InProceedings{Peikert:2009:PKC,
  author =       "Chris Peikert",
  title =        "Public-key cryptosystems from the worst-case shortest
                 vector problem: extended abstract",
  crossref =     "ACM:2009:SPA",
  pages =        "333--342",
  year =         "2009",
  bibdate =      "Wed Sep 1 10:42:23 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Article{Peng:2009:DIE,
  author =       "Jun Peng and Du Zhang and Xiaofeng Liao",
  title =        "A Digital Image Encryption Algorithm Based on
                 Hyper-chaotic Cellular Neural Network",
  journal =      j-FUND-INFO,
  volume =       "90",
  number =       "3",
  pages =        "269--282",
  month =        mar,
  year =         "2009",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2009-0018",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:08:06 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@InProceedings{Perlner:2009:QRP,
  author =       "Ray A. Perlner and David A. Cooper",
  title =        "Quantum resistant public key cryptography: a survey",
  crossref =     "Seamons:2009:IPS",
  pages =        "85--93",
  year =         "2009",
  DOI =          "https://doi.org/10.1145/1527017.1527028",
  bibdate =      "Thu Apr 21 10:00:54 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Public key cryptography is widely used to secure
                 transactions over the Internet. However, advances in
                 quantum computers threaten to undermine the security
                 assumptions upon which currently used public key
                 cryptographic algorithms are based. In this paper, we
                 provide a survey of some of the public key
                 cryptographic algorithms that have been developed that,
                 while not currently in widespread use, are believed to
                 be resistant to quantum computing based attacks and
                 discuss some of the issues that protocol designers may
                 need to consider if there is a need to deploy these
                 algorithms at some point in the future.",
  acknowledgement = ack-nhfb,
  keywords =     "ANSI X9.98-2010; Diffie-Hellman ECC (elliptic curve
                 cryptography); DSA; Lamport signature; Lamport--Merkle;
                 MCELIECE; NTRU; NTRUEncrypt; NTRUSign; public key
                 cryptography; Quantum computers; RSA",
  remark =       "This paper is authored by employees of the U.S.
                 Government and is in the public domain.",
}

@Article{Petrakos:2009:CTA,
  author =       "Nikolaos Petrakos and George W. Dinolt and James Bret
                 Michael and Pantelimon Stanica",
  title =        "Cube-Type Algebraic Attacks on {Wireless Encryption
                 Protocols}",
  journal =      j-COMPUTER,
  volume =       "42",
  number =       "10",
  pages =        "103--105",
  month =        oct,
  year =         "2009",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2009.318",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Wed May 12 23:09:46 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Raghavan:2009:SPC,
  author =       "Barath Raghavan and Patric Verkaik and Alex C.
                 Snoeren",
  title =        "Secure and policy-compliant source routing",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "17",
  number =       "3",
  pages =        "764--777",
  month =        jun,
  year =         "2009",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2008.2007949",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Fri Jul 17 16:07:33 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "In today's Internet, inter-domain route control
                 remains elusive; nevertheless, such control could
                 improve the performance, reliability, and utility of
                 the network for end users and ISPs alike. While
                 researchers have proposed a number of source routing
                 techniques to combat this limitation, there has thus
                 far been no way for independent ASes to ensure that
                 such traffic does not circumvent local traffic
                 policies, nor to accurately determine the correct party
                 to charge for forwarding the traffic.\par

                 We present Platypus, an authenticated source routing
                 system built around the concept of network
                 capabilities, which allow for accountable, fine-grained
                 path selection by cryptographically attesting to policy
                 compliance at each hop along a source route.
                 Capabilities can be composed to construct routes
                 through multiple ASes and can be delegated to third
                 parties. Platypus caters to the needs of both end users
                 and ISPs: users gain the ability to pool their
                 resources and select routes other than the default,
                 while ISPs maintain control over where, when, and whose
                 packets traverse their networks. We describe the design
                 and implementation of an extensive Platypus policy
                 framework that can be used to address several issues in
                 wide-area routing at both the edge and the core, and
                 evaluate its performance and security. Our results show
                 that incremental deployment of Platypus can achieve
                 immediate gains.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
  keywords =     "authentication; capabilities; overlay networks; source
                 routing",
}

@Article{Regev:2009:LLE,
  author =       "Oded Regev",
  title =        "On lattices, learning with errors, random linear
                 codes, and cryptography",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "6",
  pages =        "34:1--34:40",
  month =        sep,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1568318.1568324",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Sep 4 13:33:31 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Our main result is a reduction from worst-case lattice
                 problems such as GapSVP and SIVP to a certain learning
                 problem. This learning problem is a natural extension
                 of the ``learning from parity with error'' problem to
                 higher moduli. It can also be viewed as the problem of
                 decoding from a random linear code. This, we believe,
                 gives a strong indication that these problems are hard.
                 Our reduction, however, is quantum. Hence, an efficient
                 solution to the learning problem implies a {\em
                 quantum\/} algorithm for GapSVP and SIVP. A main open
                 question is whether this reduction can be made
                 classical (i.e., nonquantum).\par

                 We also present a (classical) public-key cryptosystem
                 whose security is based on the hardness of the learning
                 problem. By the main result, its security is also based
                 on the worst-case quantum hardness of GapSVP and SIVP.
                 The new cryptosystem is much more efficient than
                 previous lattice-based cryptosystems: the public key is
                 of size $ \Otilde (n^2) $ and encrypting a message
                 increases its size by a factor of $ \Otilde (n) $ (in
                 previous cryptosystems these values are $ \Otilde (n^4)
                 $ and $ \Otilde (n^2) $, respectively). In fact, under
                 the assumption that all parties share a random bit
                 string of length $ \Otilde (n^2) $, the size of the
                 public key can be reduced to $ \Otilde (n) $.",
  acknowledgement = ack-nhfb,
  articleno =    "34",
  fjournal =     "Journal of the Association for Computing Machinery",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
  keywords =     "average-case hardness; cryptography; Lattice; public
                 key encryption; quantum computation",
}

@Article{Ren:2009:CWT,
  author =       "Jian Ren",
  title =        "A cryptographic watermarking technique for multimedia
                 signals",
  journal =      j-ADV-COMPUT-MATH,
  volume =       "31",
  number =       "1--3",
  pages =        "267--281",
  month =        oct,
  year =         "2009",
  CODEN =        "ACMHEX",
  DOI =          "https://doi.org/10.1007/s10444-008-9096-1",
  ISSN =         "1019-7168 (print), 1572-9044 (electronic)",
  ISSN-L =       "1019-7168",
  MRclass =      "94A62 (94A60)",
  MRnumber =     "2511582",
  bibdate =      "Sat Feb 3 18:22:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/advcomputmath.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://link.springer.com/article/10.1007/s10444-008-9096-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Advances in Computational Mathematics",
  journal-URL =  "http://link.springer.com/journal/10444",
}

@Article{Ren:2009:FCS,
  author =       "Yanli Ren and Dawu Gu",
  title =        "Fully {CCA2} secure identity based broadcast
                 encryption without random oracles",
  journal =      j-INFO-PROC-LETT,
  volume =       "109",
  number =       "11",
  pages =        "527--533",
  day =          "16",
  month =        may,
  year =         "2009",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 15:53:31 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Renaud:2009:VPC,
  author =       "Karen Renaud and Antonella {De Angeli}",
  title =        "Visual passwords: cure-all or snake-oil?",
  journal =      j-CACM,
  volume =       "52",
  number =       "12",
  pages =        "135--140",
  month =        dec,
  year =         "2009",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1610252.1610287",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:05 MST 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Users of computer systems are accustomed to being
                 asked for passwords -- it is as universal as it is
                 frustrating. In the past there was little tolerance for
                 the problems experienced remembering passwords, and
                 many users still remember, with embarrassment, having
                 to go hat-in-hand to request a password change and
                 being treated with disdain by a lofty administrator.
                 Latterly there is more understanding of the problems
                 experienced by users, especially since the ' {\em
                 password conundrum\/} ' has reached epidemic
                 proportions for Web users, who are asked for passwords
                 with unrelenting predictability.\par

                 The problems with passwords are clear --- users cannot
                 remember numbers of meaningless alphanumeric strings
                 with ease. Hence, they react by choosing simple and
                 predictable words or numbers related to their everyday
                 life, and engaging in insecure practices, such as
                 writing passwords down or sharing them. These practices
                 cause a breach affecting even the most secure and
                 protected network system. Hence the user is often
                 called the weakest link of the security chain, with
                 system administrators despairing of trying to maintain
                 security with the weak link so often reaching breaking
                 point. Users forgetting passwords has serious
                 economical consequences for organizations.\par

                 Both academia and industry have been investigating
                 alternatives to passwords, with varying degrees of
                 success. One of the most well-known solutions is the
                 biometric -- measurement of either behavioral or
                 physiological characteristics of the end-user. This is
                 obviously superior to the password because it removes
                 the burden on the user's memory. So why don't we just
                 switch to biometrics and give the poor user a break?
                 There are some valid and hard-to-overcome reasons for
                 the slow uptake of biometrics, but before we can
                 discuss them we need to consider the mechanics of
                 authentication.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Book{Robinson:2009:LLE,
  author =       "Andrew Robinson",
  title =        "Lost languages: the enigma of the world's undeciphered
                 scripts",
  publisher =    "Thames and Hudson",
  address =      "London, UK",
  pages =        "352",
  year =         "2009",
  ISBN =         "0-500-51453-4 (hardcover), 0-500-28816-X (paperback)",
  ISBN-13 =      "978-0-500-51453-5 (hardcover), 978-0-500-28816-0
                 (paperback)",
  LCCN =         "CN120 .R63 2009",
  bibdate =      "Thu Sep 17 05:47:41 MDT 2015",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Beginning with the stories of three great
                 decipherments Egyptian hieroglyphs, Minoan Linear B and
                 Mayan glyphs Lost Languages moves on to dissect the
                 most well-known and enigmatic undeciphered scripts from
                 around the world. They include the Etruscan alphabet of
                 Italy, the Indus Valley seal script, Rongorongo from
                 remote Easter Island, the Zapotec script of Mexico
                 (probably the first writing system in the Americas),
                 and the unique Phaistos disc of Crete. Lost Languages
                 reports from the front lines of scholarship where
                 obsessions, genius, occasional delusion and sometimes
                 bitter rivalry are de rigueur among those currently
                 competing for the rare honour of cracking these ancient
                 codes and giving voice to forgotten worlds.",
  acknowledgement = ack-nhfb,
  author-dates = "1957--",
  remark =       "Originally published: New York: McGraw-Hill, 2002.",
  subject =      "Extinct languages; Inscriptions, Ancient; Inschrift.;
                 Tote Sprache.; Writing; History.; Language and
                 languages.; {\'e}criture; langue morte.; Extinct
                 languages.; Inscriptions, Ancient.",
  tableofcontents = "Introduction : writing systems, coded civilizations
                 and undeciphered scripts \\
                 Part 1. Three great decipherments. Voices of the
                 Pharaohs: Egyptian hieroglyphs (Egypt) \\
                 Labyrinth of Minos : Linear B (Green) \\
                 Bishop de Landa's inquisition: Mayan glyphs (Central
                 America) \\
                 Voices of the black pharoahs : the Meroitic script
                 (Sudan) \\
                 Greek but not Greek : the Etruscan alphabet (Italy) \\
                 Mediterranean mystery : Linear A (the Aegean) \\
                 Secrets of the ancient ledgers : the proto-Elamite
                 script (Iran)",
}

@InCollection{Rousseau:2009:CCP,
  author =       "Christiane Rousseau and Yvan Saint-Aubin",
  title =        "La cryptographie {\`a} cle publique: le code {RSA}
                 (1978)",
  crossref =     "Rousseau:2009:MT",
  pages =        "213--244",
  year =         "2009",
  DOI =          "https://doi.org/10.1007/978-0-387-69213-5_7",
  bibdate =      "Tue Jul 20 16:43:36 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  language =     "French",
}

@Book{Rupp:2009:CAC,
  author =       "Andy Rupp",
  title =        "Computational aspects of cryptography and
                 cryptanalysis",
  volume =       "6",
  publisher =    "Europ{\"a}ischer Universit{\"a}tsverlag",
  address =      "Berlin, Germany",
  pages =        "xviii + 245",
  year =         "2009",
  ISBN =         "3-89966-337-3",
  ISBN-13 =      "978-3-89966-337-2",
  LCCN =         "????",
  bibdate =      "Fri May 13 07:31:25 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "IT-Security",
  acknowledgement = ack-nhfb,
}

@Article{Samtani:2009:WTO,
  author =       "Rajan Samtani",
  title =        "{Web} Technologies: Ongoing Innovation in Digital
                 Watermarking",
  journal =      j-COMPUTER,
  volume =       "42",
  number =       "3",
  pages =        "92--94",
  month =        mar,
  year =         "2009",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2009.93",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Thu Jul 2 08:29:12 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Magazine",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Sauvage:2009:ERF,
  author =       "Laurent Sauvage and Sylvain Guilley and Yves Mathieu",
  title =        "Electromagnetic Radiations of {FPGAs}: High Spatial
                 Resolution Cartography and Attack on a Cryptographic
                 Module",
  journal =      j-TRETS,
  volume =       "2",
  number =       "1",
  pages =        "4:1--4:??",
  month =        mar,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1502781.1502785",
  ISSN =         "1936-7406 (print), 1936-7414 (electronic)",
  ISSN-L =       "1936-7406",
  bibdate =      "Mon Jun 1 18:15:27 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Since the first announcement of a Side Channel
                 Analysis (SCA) about ten years ago, considerable
                 research has been devoted to studying these attacks on
                 Application Specific Integrated Circuits (ASICs), such
                 as smart cards or TPMs. In this article, we compare
                 power-line attacks with ElectroMagnetic (EM) attacks,
                 specifically targeting Field Programmable Gate Array
                 devices (FPGAs), as they are becoming widely used for
                 sensitive applications involving cryptography.\par

                 We show experimentally that ElectroMagnetic Analysis
                 (EMA) is always faster than the historical Differential
                 Power Analysis (DPA) in retrieving keys of symmetric
                 ciphers. In addition, these analyses prove to be very
                 convenient to conduct, as they are totally
                 non-invasive.\par

                 Research reports indicate that EMA can be conducted
                 globally, typically with macroscopic home-made coils
                 circling the device under attack, with fair results.
                 However, as accurate professional EM antennas are now
                 becoming more accessible, it has become commonplace to
                 carry out EM analyses locally.\par

                 Cartography has been carried out by optical means on
                 circuits realized with technology greater than 250
                 nanometers. Nonetheless, for deep submicron
                 technologies, the feature size of devices that are
                 spied upon is too small to be visible with photographic
                 techniques. In addition, the presence of the 6+
                 metallization layers obviously prevents a direct
                 observation of the layout. Therefore, EM imaging is
                 emerging as a relevant means to discover the underlying
                 device structure.\par

                 In this article, we present the first images of
                 deep-submicron FPGAs. The resolution is not as accurate
                 as photographic pictures: we notably compare the layout
                 of toy design examples placed at the four corners of
                 the FPGAs with the EM images we collected. We observe
                 that EM imaging has the advantage of revealing active
                 regions, which can be useful in locating a particular
                 processor (visible while active---invisible when
                 inactive).\par

                 In the context of EM attacks, we stress that the exact
                 localization of the cryptographic target is not
                 necessary: the coarse resolution we obtain is
                 sufficient. We note that the EM imaging does not reveal
                 the exact layout of the FPGA, but instead directly
                 guides the attacker towards the areas which are leaking
                 the most. We achieve attacks with an accurate sensor,
                 both far from (namely on a SMC capacitor on the board)
                 and close to (namely directly over the FPGA) the
                 encryption co-processor. As compared to the previously
                 published attacks, we report a successful attack on a
                 DES module in fewer than 6,300 measurements, which is
                 currently the best cracking performance against this
                 encryption algorithm implemented in FPGAs.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Transactions on Reconfigurable Technology and
                 Systems (TRETS)",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J1151",
  keywords =     "cartography; DPA; EMA; FPGA; SCA; security",
}

@Article{Schaumont:2009:GEI,
  author =       "Patrick R. Schaumont and Alex K. Jones and Steve
                 Trimberger",
  title =        "{Guest Editors}' Introduction to Security in
                 Reconfigurable Systems Design",
  journal =      j-TRETS,
  volume =       "2",
  number =       "1",
  pages =        "1:1--1:??",
  month =        mar,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1502781.1502782",
  ISSN =         "1936-7406 (print), 1936-7414 (electronic)",
  ISSN-L =       "1936-7406",
  bibdate =      "Mon Jun 1 18:15:27 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "This special issue on Security in Reconfigurable
                 Systems Design reports on recent research results in
                 the design and implementation of trustworthy
                 reconfigurable systems. Five articles cover topics
                 including power-efficient implementation of public-key
                 cryptography, side-channel analysis of electromagnetic
                 radiation, side-channel resistant design, design of
                 robust unclonable functions on an FPGA, and Trojan
                 detection in an FPGA bitstream.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Transactions on Reconfigurable Technology and
                 Systems (TRETS)",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J1151",
  keywords =     "physically unclonable function; side-channel resistant
                 design; Trojan; Trustworthy design",
}

@Book{Schmeh:2009:VBF,
  author =       "Klaus Schmeh",
  title =        "{Versteckte Botschaften: die faszinierende Geschichte
                 der Steganografie}. (German) [{Hidden} Messages. {The}
                 Fascinating Story of Steganography]",
  publisher =    "Heise",
  address =      "Hannover, Germany",
  pages =        "xi + 234",
  year =         "2009",
  ISBN =         "3-936931-54-2 (paperback)",
  ISBN-13 =      "978-3-936931-54-9 (paperback)",
  LCCN =         "????",
  bibdate =      "Mon Oct 25 14:05:55 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.gbv.de:20011/gvk",
  price =        "SFR 32.00; EUR 18.00",
  series =       "Telepolis",
  acknowledgement = ack-nhfb,
  language =     "German",
}

@Book{Seacord:2009:CCS,
  author =       "Robert C. Seacord",
  title =        "The {CERT} {C} secure coding standard",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xxxiii + 682",
  year =         "2009",
  ISBN =         "0-321-56321-2 (paperback)",
  ISBN-13 =      "978-0-321-56321-7 (paperback)",
  LCCN =         "QA76.73.C15 S4155 2008",
  bibdate =      "Wed Oct 15 14:18:28 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "C (Computer program language); Computer security",
}

@Article{Seddik:2009:IWB,
  author =       "Hassen Seddik and Mounir Sayadi and Farhat Fnaiech and
                 Mohamed Cheriet",
  title =        "Image Watermarking Based on the {Hessenberg}
                 Transform",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "9",
  number =       "3",
  pages =        "411--433",
  month =        jul,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1142/S0219467809003514",
  ISSN =         "0219-4678",
  bibdate =      "Tue Aug 31 08:38:02 MDT 2010",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics (IJIG)",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Shaikh:2009:SAU,
  author =       "Siraj A. Shaikh and Vicky J. Bush and Steve A.
                 Schneider",
  title =        "Specifying authentication using signal events in
                 {CSP}",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "5",
  pages =        "310--324",
  month =        jul,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000953",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shmueli:2009:DEO,
  author =       "Erez Shmueli and Ronen Vaisenberg and Yuval Elovici
                 and Chanan Glezer",
  title =        "Database encryption: an overview of contemporary
                 challenges and design considerations",
  journal =      j-SIGMOD,
  volume =       "38",
  number =       "3",
  pages =        "29--34",
  month =        sep,
  year =         "2009",
  CODEN =        "SRECD8",
  DOI =          "https://doi.org/10.1145/1815933.1815940",
  ISSN =         "0163-5808 (print), 1943-5835 (electronic)",
  ISSN-L =       "0163-5808",
  bibdate =      "Mon Jun 21 18:07:29 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "This article describes the major challenges and design
                 considerations pertaining to database encryption. The
                 article first presents an attack model and the main
                 relevant challenges of data security, encryption
                 overhead, key management, and integration footprint.
                 Next, the article reviews related academic work on
                 alternative encryption configurations pertaining to
                 encryption locus; indexing encrypted data; and key
                 management. Finally, the article concludes with a
                 benchmark using the following design criteria:
                 encryption configuration, encryption granularity and
                 keys storage.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGMOD Record",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J689",
  keywords =     "database encryption; privacy; security",
}

@Article{Shu:2009:RCA,
  author =       "Chang Shu and Soonhak Kwon and K. Gaj",
  title =        "Reconfigurable Computing Approach for {Tate} Pairing
                 Cryptosystems over Binary Fields",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "58",
  number =       "9",
  pages =        "1221--1237",
  month =        sep,
  year =         "2009",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2009.64",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 4 11:37:43 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4815221",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Book{Sinkov:2009:ECM,
  author =       "Abraham Sinkov",
  title =        "Elementary cryptanalysis: a mathematical view",
  volume =       "22",
  publisher =    pub-MATH-ASSOC-AMER,
  address =      pub-MATH-ASSOC-AMER:adr,
  edition =      "Second",
  pages =        "xiv + 212",
  year =         "2009",
  ISBN =         "0-88385-647-6",
  ISBN-13 =      "978-0-88385-647-5",
  LCCN =         "????",
  bibdate =      "Sat May 14 07:20:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  note =         "Revised and updated by Todd Feil.",
  series =       "Anneli lax new mathematical library",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0914/2009927623-d.html;
                 http://www.loc.gov/catdir/enhancements/fy0914/2009927623-t.html",
  acknowledgement = ack-nhfb,
  author-dates = "1907--",
}

@Article{Spiekermann:2009:ACR,
  author =       "Sarah Spiekermann and Sergei Evdokimov",
  title =        "Authentication: Critical {RFID} Privacy-Enhancing
                 Technologies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "56--62",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.31",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Storer:2009:PSR,
  author =       "Mark W. Storer and Kevin M. Greenan and Ethan L.
                 Miller and Kaladhar Voruganti",
  title =        "{POTSHARDS} --- a secure, recoverable, long-term
                 archival storage system",
  journal =      j-TOS,
  volume =       "5",
  number =       "2",
  pages =        "5:1--5:??",
  month =        jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1534912.1534914",
  ISSN =         "1553-3077 (print), 1553-3093 (electronic)",
  ISSN-L =       "1553-3077",
  bibdate =      "Tue Mar 16 15:33:46 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Users are storing ever-increasing amounts of
                 information digitally, driven by many factors including
                 government regulations and the public's desire to
                 digitally record their personal histories.
                 Unfortunately, many of the security mechanisms that
                 modern systems rely upon, such as encryption, are
                 poorly suited for storing data for indefinitely long
                 periods of time; it is very difficult to manage keys
                 and update cryptosystems to provide secrecy through
                 encryption over periods of decades. Worse, an adversary
                 who can compromise an archive need only wait for
                 cryptanalysis techniques to catch up to the encryption
                 algorithm used at the time of the compromise in order
                 to obtain ``secure'' data. To address these concerns,
                 we have developed POTSHARDS, an archival storage system
                 that provides long-term security for data with very
                 long lifetimes without using encryption. Secrecy is
                 achieved by using unconditionally secure secret
                 splitting and spreading the resulting shares across
                 separately managed archives. Providing availability and
                 data recovery in such a system can be difficult; thus,
                 we use a new technique, approximate pointers, in
                 conjunction with secure distributed RAID techniques to
                 provide availability and reliability across independent
                 archives. To validate our design, we developed a
                 prototype POTSHARDS implementation. In addition to
                 providing us with an experimental testbed, this
                 prototype helped us to understand the design issues
                 that must be addressed in order to maximize security.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Transactions on Storage",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J960",
  keywords =     "approximate pointers; Archival storage; secret
                 splitting",
}

@Article{Sun:2009:CPR,
  author =       "Fuyan Sun and Shutang Liu",
  title =        "Cryptographic pseudo-random sequence from the spatial
                 chaotic map",
  journal =      j-CHAOS-SOLITONS-FRACTALS,
  volume =       "41",
  number =       "5",
  pages =        "2216--2219",
  month =        "????",
  year =         "2009",
  CODEN =        "CSFOEH",
  ISSN =         "0960-0779 (print), 1873-2887 (electronic)",
  ISSN-L =       "0960-0779",
  bibdate =      "Wed Jan 18 21:56:15 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Chaos, solitons \& fractals",
}

@Article{Sun:2009:TDS,
  author =       "Hung-Min Sun and Mu-En Wu and M. Jason Hinek and
                 Cheng-Ta Yang and Vincent S. Tseng",
  title =        "Trading decryption for speeding encryption in
                 {Rebalanced-RSA}",
  journal =      j-J-SYST-SOFTW,
  volume =       "82",
  number =       "9",
  pages =        "1503--1512",
  month =        sep,
  year =         "2009",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Tiwari:2009:CIF,
  author =       "Mohit Tiwari and Hassan M. G. Wassel and Bita Mazloom
                 and Shashidhar Mysore and Frederic T. Chong and Timothy
                 Sherwood",
  title =        "Complete information flow tracking from the gates up",
  journal =      j-SIGPLAN,
  volume =       "44",
  number =       "3",
  pages =        "109--120",
  month =        mar,
  year =         "2009",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/1508284.1508258",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Tue Jun 16 14:39:26 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "For many mission-critical tasks, tight guarantees on
                 the flow of information are desirable, for example,
                 when handling important cryptographic keys or sensitive
                 financial data. We present a novel architecture capable
                 of tracking all information flow within the machine,
                 including all explicit data transfers and all implicit
                 flows (those subtly devious flows caused by not
                 performing conditional operations). While the problem
                 is impossible to solve in the general case, we have
                 created a machine that avoids the general-purpose
                 programmability that leads to this impossibility
                 result, yet is still programmable enough to handle a
                 variety of critical operations such as public-key
                 encryption and authentication. Through the application
                 of our novel gate-level information flow tracking
                 method, we show how all flows of information can be
                 precisely tracked. From this foundation, we then
                 describe how a class of architectures can be
                 constructed, from the gates up, to completely capture
                 all information flows and we measure the impact of
                 doing so on the hardware implementation, the ISA, and
                 the programmer.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  keywords =     "gate level; information flow tracking; provably
                 sound",
}

@InProceedings{Tong:2009:RAPa,
  author =       "Qiaoling Tong and Xuecheng Zou and Hengqing Tong",
  booktitle =    "{2009. CSO 2009. International Joint Conference on
                 Computational Sciences and Optimization}",
  title =        "A {RFID} Authentication Protocol Based on Infinite
                 Dimension Pseudo Random Number Generator",
  volume =       "1",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "292--294",
  year =         "2009",
  DOI =          "https://doi.org/10.1109/CSO.2009.436",
  bibdate =      "Fri Jan 6 08:10:49 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5193698",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5193618",
}

@InProceedings{Tong:2009:RAPb,
  author =       "Qiaoling Tong and Xuecheng Zou and Hengqing Tong",
  booktitle =    "{2009. ICBBE 2009. 3rd International Conference on
                 Bioinformatics and Biomedical Engineering}",
  title =        "A {RFID} Authentication Protocol Based on Infinite
                 Dimension Pseudo Random Number Generator for Face
                 Recognition System",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "1--4",
  year =         "2009",
  DOI =          "https://doi.org/10.1109/ICBBE.2009.5162237",
  bibdate =      "Fri Jan 6 08:10:49 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5162237",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5162127",
}

@Article{Troutman:2009:CCGa,
  author =       "Justin Troutman and Vincent Rijmen",
  title =        "Crypto Corner: Green Cryptography: Cleaner Engineering
                 through Recycling",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "4",
  pages =        "71--73",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.91",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Troutman:2009:CCGb,
  author =       "Justin Troutman and Vincent Rijmen",
  title =        "Crypto Corner: Green Cryptography: Cleaner Engineering
                 through Recycling, Part 2",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "5",
  pages =        "64--65",
  month =        sep # "\slash " # oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.120",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Oct 14 17:01:10 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Tsolis:2009:ARM,
  author =       "Dimitrios Tsolis and Spiridon Nikolopoulos and Lambros
                 Drossos and Spyros Sioutas and Theodore Papatheodorou",
  title =        "Applying robust multibit watermarks to digital
                 images",
  journal =      j-J-COMPUT-APPL-MATH,
  volume =       "227",
  number =       "1",
  pages =        "213--220",
  day =          "1",
  month =        may,
  year =         "2009",
  CODEN =        "JCAMDI",
  ISSN =         "0377-0427 (print), 1879-1778 (electronic)",
  ISSN-L =       "0377-0427",
  bibdate =      "Sat Feb 25 13:13:31 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcomputapplmath2005.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0377042708003543",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computational and Applied Mathematics",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03770427",
}

@InProceedings{Uchida:2009:FPR,
  author =       "A. Uchida and T. Honjo and K. Amano and K. Hirano and
                 H. Someya and H. Okumura and S. Yoshimori and K.
                 Yoshimura and P. Davis and Y. Tokura",
  booktitle =    "{Lasers and Electro-Optics 2009 and the European
                 Quantum Electronics Conference. CLEO Europe - EQEC
                 2009. European Conference on}",
  title =        "Fast physical random bit generator based on chaotic
                 semiconductor lasers: Application to quantum
                 cryptography",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "1",
  year =         "2009",
  DOI =          "https://doi.org/10.1109/CLEOE-EQEC.2009.5192510",
  bibdate =      "Fri Jan 6 08:10:49 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5192510",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5164156",
}

@Article{Uz:2009:MBT,
  author =       "Tamer Uz and George Bebis and Ali Erol and Salil
                 Prabhakar",
  title =        "Minutiae-based template synthesis and matching for
                 fingerprint authentication",
  journal =      j-COMP-VIS-IMAGE-UNDERSTANDING,
  volume =       "113",
  number =       "9",
  pages =        "979--992",
  month =        sep,
  year =         "2009",
  CODEN =        "CVIUF4",
  ISSN =         "1077-3142 (print), 1090-235X (electronic)",
  ISSN-L =       "1077-3142",
  bibdate =      "Sat Apr 2 10:55:59 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/10773142",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Vision and Image Understanding",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10773142",
}

@Article{Vassev:2009:STA,
  author =       "Emil Vassev and Mike Hinchey",
  title =        "Software Technologies: {ASSL}: a Software Engineering
                 Approach to Autonomic Computing",
  journal =      j-COMPUTER,
  volume =       "42",
  number =       "6",
  pages =        "90--93",
  month =        jun,
  year =         "2009",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2009.174",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Thu Jul 2 08:29:13 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Magazine",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Vlachos:2009:OPV,
  author =       "Michail Vlachos and Aris Anagnostopoulos and Olivier
                 Verscheure and Philip S. Yu",
  title =        "Online pairing of {VoIP} conversations",
  journal =      j-VLDB-J,
  volume =       "18",
  number =       "1",
  pages =        "77--98",
  month =        jan,
  year =         "2009",
  CODEN =        "VLDBFR",
  DOI =          "https://doi.org/10.1007/s00778-007-0087-5",
  ISSN =         "1066-8888 (print), 0949-877X (electronic)",
  ISSN-L =       "1066-8888",
  bibdate =      "Tue Sep 15 15:49:59 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "This paper answers the following question; given a
                 multiplicity of evolving 1-way conversations, can a
                 machine or an algorithm discern the conversational
                 pairs in an online fashion, without understanding the
                 content of the communications? Our analysis indicates
                 that this is possible, and can be achieved just by
                 exploiting the temporal dynamics inherent in a
                 conversation. We also show that our findings are
                 applicable for anonymous and encrypted conversations
                 over VoIP networks. We achieve this by exploiting the
                 aperiodic inter-departure time of VoIP packets, hence
                 trivializing each VoIP stream into a binary
                 time-series, indicating the voice activity of each
                 stream. We propose effective techniques that
                 progressively pair conversing parties with high
                 accuracy and in a limited amount of time. Our findings
                 are verified empirically on a dataset consisting of
                 1,000 conversations. We obtain very high pairing
                 accuracy that reaches 97\% after 5 min of voice
                 conversations. Using a modeling approach we also
                 demonstrate analytically that our result can be
                 extended over an unlimited number of conversations.",
  acknowledgement = ack-nhfb,
  fjournal =     "VLDB Journal: Very Large Data Bases",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J869",
  keywords =     "Binary time-series clustering; Conversation pairing;
                 Stream clustering; Voice-over-IP",
}

@InProceedings{Volos:2009:IEP,
  author =       "C. K. Volos and I. M. Kyprianidis and I. N.
                 Stouboulos",
  booktitle =    "{2009 16th International Conference on Digital Signal
                 Processing}",
  title =        "Image encryption process based on a chaotic {True
                 Random Bit Generator}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "1--4",
  year =         "2009",
  DOI =          "https://doi.org/10.1109/ICDSP.2009.5201107",
  bibdate =      "Fri Jan 6 08:10:49 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5201107",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5176123",
}

@Article{Wallich:2009:SGP,
  author =       "P. Wallich",
  title =        "The supercomputer goes personal",
  journal =      j-IEEE-SPECTRUM,
  volume =       "46",
  number =       "4",
  pages =        "64--64",
  month =        apr,
  year =         "2009",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2009.4808388",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 12:29:46 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/super.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Cryptography; Games; Graphics; Proteins;
                 Supercomputers",
}

@Article{Wang:2009:DSM,
  author =       "J. Wang and J. L{\"u} and S. Lian and G. Liu",
  title =        "On the Design of Secure Multimedia Authentication",
  journal =      j-J-UCS,
  volume =       "15",
  number =       "2",
  pages =        "426--??",
  month =        "????",
  year =         "2009",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Wed Aug 25 22:38:58 MDT 2010",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.jucs.org/jucs_15_2/on_the_design_of",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Wang:2009:NWA,
  author =       "Chung-Chuan Wang and Chin-Chen Chang and Jinn-Ke Jan",
  title =        "Novel Watermarking Authentication Schemes for Binary
                 Images Based on Dual-Pair Block Pixel Patterns",
  journal =      j-FUND-INFO,
  volume =       "90",
  number =       "1--2",
  pages =        "125--155",
  month =        jan,
  year =         "2009",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2009-0010",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:08:04 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Wang:2009:NWM,
  author =       "Yu-Ping Wang and Shi-Min Hu",
  title =        "A New Watermarking Method for {$3$D} Models Based on
                 Integral Invariants",
  journal =      j-IEEE-TRANS-VIS-COMPUT-GRAPH,
  volume =       "15",
  number =       "2",
  pages =        "285--294",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "ITVGEA",
  DOI =          "https://doi.org/10.1109/TVCG.2008.101",
  ISSN =         "1077-2626 (print), 1941-0506 (electronic), 2160-9306",
  ISSN-L =       "1077-2626",
  bibdate =      "Thu Jul 2 10:22:33 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Visualization and Computer
                 Graphics",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2945",
}

@Article{Wang:2009:RDA,
  author =       "Xiang-Yang Wang and Pan-Pan Niu and Hong-Ying Yang",
  title =        "A Robust, Digital-Audio Watermarking Method",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "16",
  number =       "3",
  pages =        "60--69",
  month =        jul # "\slash " # sep,
  year =         "2009",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/MMUL.2009.44",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Thu May 13 11:33:52 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Multimedia",
}

@Article{Wang:2009:SST,
  author =       "Ronghua Wang and Wenliang Du and Xiaogang Liu and Peng
                 Ning",
  title =        "{ShortPK}: a short-term public key scheme for
                 broadcast authentication in sensor networks",
  journal =      j-TOSN,
  volume =       "6",
  number =       "1",
  pages =        "9:1--9:??",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1653760.1653769",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Tue Mar 16 15:24:34 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "Broadcast authentication is an important functionality
                 in sensor networks. Energy constraints on sensor nodes
                 and the real-time nature of the broadcasts render many
                 of the existing solutions impractical: previous works
                 focusing primarily on symmetric key schemes have
                 difficulties in achieving real-time authentication.
                 Public Key Cryptography (PKC), however, can satisfy the
                 real-time requirements, and recent trends indicate that
                 public key is becoming feasible for sensor
                 networks.\par

                 However, PKC operations are still expensive
                 computations. It is impractical to use PKC in the
                 conventional ways for broadcast authentication in
                 sensor networks. To reduce costs, we propose {\em
                 ShortPK}, an efficient Short-term Public Key broadcast
                 authentication scheme. The basic idea is to use
                 short-length public/private keys, but limit their
                 lifetime to only a short period of time. To cover a
                 long period of time, we need to use many public/private
                 key pairs; distributing these public keys to sensors is
                 a challenging problem. We describe a progressive key
                 distribution scheme that is secure, efficient, and
                 packet-loss resilient. We compare our scheme with the
                 traditional 160-bit ECC public key schemes, and show
                 that our scheme can achieve a significant improvement
                 on energy consumption.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
  keywords =     "communication; public key; Sensor networks",
}

@Book{Wayner:2009:DCI,
  author =       "Peter Wayner",
  title =        "Disappearing cryptography: information hiding:
                 steganography and watermarking",
  publisher =    pub-MORGAN-KAUFMANN,
  address =      pub-MORGAN-KAUFMANN:adr,
  edition =      "Third",
  pages =        "xv + 439",
  year =         "2009",
  ISBN =         "0-12-374479-2, 0-08-092270-8 (e-book)",
  ISBN-13 =      "978-0-12-374479-1, 978-0-08-092270-6 (e-book)",
  LCCN =         "TK5105.59 .W39 2009",
  bibdate =      "Wed Aug 27 07:34:37 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.sciencedirect.com/science/book/9780123744791",
  abstract =     "Cryptology is the practice of hiding digital
                 information by means of various obfuscatory and
                 steganographic techniques. The application of said
                 techniques facilitates message confidentiality and
                 sender/receiver identity authentication, and helps to
                 ensure the integrity and security of computer
                 passwords, ATM card information, digital signatures,
                 DVD and HDDVD content, and electronic commerce.
                 Cryptography is also central to digital rights
                 management (DRM), a group of techniques for
                 technologically controlling the use of copyrighted
                 material that is being widely implemented and deployed
                 at the behest of corporations that own and create
                 revenue from the hundreds of thousands of
                 mini-transactions that take place daily on programs
                 like iTunes. This new edition of our best-selling book
                 on cryptography and information hiding delineates a
                 number of different methods to hide information in all
                 types of digital media files. These methods include
                 encryption, compression, data embedding and
                 watermarking, data mimicry, and scrambling. During the
                 last 5 years, the continued advancement and exponential
                 increase of computer processing power have enhanced the
                 efficacy and scope of electronic espionage and content
                 appropriation. Therefore, this edition has amended and
                 expanded outdated sections in accordance with new
                 dangers, and includes 5 completely new chapters that
                 introduce newer more sophisticated and refined
                 cryptographic algorithms and techniques (such as
                 fingerprinting, synchronization, and quantization)
                 capable of withstanding the evolved forms of attack.
                 Each chapter is divided into sections, first providing
                 an introduction and high-level summary for those who
                 wish to understand the concepts without wading through
                 technical explanations, and then presenting concrete
                 examples and greater detail for those who want to write
                 their own programs. This combination of practicality
                 and theory allows programmers and system designers to
                 not only implement tried and true encryption
                 procedures, but also consider probable future
                 developments in their designs, thus fulfilling the need
                 for preemptive caution that is becoming ever more
                 explicit as the transference of digital media
                 escalates.",
  acknowledgement = ack-nhfb,
  author-dates = "1964--",
  subject =      "Computer networks; Security measures; Cryptography;
                 Internet",
  tableofcontents = "Framing information \\
                 Encryption \\
                 Error correction \\
                 Secret sharing \\
                 Compression \\
                 Basic mimicry \\
                 Grammars and mimicry \\
                 Turing and reverse \\
                 Life in the noise \\
                 Anonymous remailers \\
                 Secret broadcasts \\
                 Keys \\
                 Ordering and reordering \\
                 Spreading \\
                 Synthetic worlds \\
                 Watermarks \\
                 Steganalysis \\
                 Obfuscation \\
                 Synchronization \\
                 Translucent databases \\
                 Plain sight \\
                 Coda",
}

@Article{Weir:2009:UPS,
  author =       "Catherine S. Weir and Gary Douglas and Martin
                 Carruthers and Mervyn Jack",
  title =        "User perceptions of security, convenience and
                 usability for ebanking authentication tokens",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "1--2",
  pages =        "47--62",
  month =        feb # "\slash " # mar,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:15 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000941",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{White:2009:EOD,
  author =       "Tobin White",
  title =        "Encrypted objects and decryption processes:
                 problem-solving with functions in a learning
                 environment based on cryptography",
  journal =      j-EDUC-STUD-MATH,
  volume =       "72",
  number =       "1",
  pages =        "17--37",
  month =        sep,
  year =         "2009",
  CODEN =        "EDSMAN",
  DOI =          "https://doi.org/10.1007/s10649-008-9180-y",
  ISSN =         "0013-1954 (print), 1573-0816 (electronic)",
  ISSN-L =       "0013-1954",
  bibdate =      "Sat Jan 14 17:14:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/educstudmath.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/s10649-008-9180-y.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Educational Studies in Mathematics",
  journal-URL =  "http://link.springer.com/journal/10649",
}

@Article{Wuensche:2009:CAE,
  author =       "Andrew Wuensche",
  title =        "{Cellular Automata Encryption}: the reverse algorithm,
                 {Z}-parameter and chain-rules",
  journal =      j-PARALLEL-PROCESS-LETT,
  volume =       "19",
  number =       "2",
  pages =        "283--297",
  month =        jun,
  year =         "2009",
  CODEN =        "PPLTEE",
  DOI =          "https://doi.org/10.1142/S0129626409000225",
  ISSN =         "0129-6264 (print), 1793-642X (electronic)",
  bibdate =      "Thu Sep 2 09:08:12 MDT 2010",
  bibsource =    "http://ejournals.wspc.com.sg/ppl/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Parallel Processing Letters",
  journal-URL =  "http://www.worldscientific.com/loi/ppl",
}

@Article{Xu:2009:AVB,
  author =       "Songhua Xu and Wenxia Yang and Francis C. M. Lau",
  title =        "Applications: a Visualization Based Approach for
                 Digital Signature Authentication",
  journal =      j-CGF,
  volume =       "28",
  number =       "3",
  pages =        "935--942",
  month =        jun,
  year =         "2009",
  CODEN =        "CGFODY",
  DOI =          "https://doi.org/10.1111/j.1467-8659.2009.01455.x",
  ISSN =         "0167-7055 (print), 1467-8659 (electronic)",
  ISSN-L =       "0167-7055",
  bibdate =      "Sat May 11 13:27:22 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cgf.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Com{\-}pu{\-}ter Graphics Forum",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1467-8659/",
  onlinedate =   "27 Jul 2009",
}

@Article{Yang:2009:AIO,
  author =       "Yin Yang and Stavros Papadopoulos and Dimitris
                 Papadias and George Kollios",
  title =        "Authenticated indexing for outsourced spatial
                 databases",
  journal =      j-VLDB-J,
  volume =       "18",
  number =       "3",
  pages =        "631--648",
  month =        jun,
  year =         "2009",
  CODEN =        "VLDBFR",
  DOI =          "https://doi.org/10.1007/s00778-008-0113-2",
  ISSN =         "1066-8888 (print), 0949-877X (electronic)",
  ISSN-L =       "1066-8888",
  bibdate =      "Tue Sep 15 14:55:19 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "In spatial database outsourcing, a data owner
                 delegates its data management tasks to a location-based
                 service (LBS), which indexes the data with an
                 authenticated data structure (ADS). The LBS receives
                 queries (ranges, nearest neighbors) originating from
                 several clients/subscribers. Each query initiates the
                 computation of a verification object (VO) based on the
                 ADS. The VO is returned to the client that can verify
                 the result correctness using the public key of the
                 owner. Our first contribution is the MR-tree, a
                 space-efficient ADS that supports fast query processing
                 and verification. Our second contribution is the
                 MR*-tree, a modified version of the MR-tree, which
                 significantly reduces the VO size through a novel
                 embedding technique. Finally, whereas most ADSs must be
                 constructed and maintained by the owner, we outsource
                 the MR- and MR*-tree construction and maintenance to
                 the LBS, thus relieving the owner from this
                 computationally intensive task.",
  acknowledgement = ack-nhfb,
  fjournal =     "VLDB Journal: Very Large Data Bases",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J869",
  keywords =     "Authenticated index; Database outsourcing; Mobile
                 computing; Spatial database",
}

@Article{Yang:2009:CGA,
  author =       "Seung S. Yang and Hongsik Choi",
  title =        "A complement to the {GridOne} authentication method",
  journal =      j-NETWORK-SECURITY,
  volume =       "2009",
  number =       "12",
  pages =        "12--18",
  month =        dec,
  year =         "2009",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(10)70007-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:00:11 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485810700076",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Yang:2009:CLW,
  author =       "Cheng-Hsing Yang and Chi-Yao Weng and Shiuh-Jeng Wang
                 and Hung-Min Sun",
  title =        "Codebook-linked Watermarking Scheme for Digital
                 Images",
  journal =      j-FUND-INFO,
  volume =       "92",
  number =       "4",
  pages =        "397--409",
  month =        jun,
  year =         "2009",
  CODEN =        "FUMAAJ",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:08:38 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Yang:2009:ETP,
  author =       "Jen-Ho Yang and Chin-Chen Chang",
  title =        "An efficient three-party authenticated key exchange
                 protocol using elliptic curve cryptography for
                 mobile-commerce environments",
  journal =      j-J-SYST-SOFTW,
  volume =       "82",
  number =       "9",
  pages =        "1497--1502",
  month =        sep,
  year =         "2009",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Yang:2009:IBR,
  author =       "Jen-Ho Yang and Chin-Chen Chang",
  title =        "An {ID}-based remote mutual authentication with key
                 agreement scheme for mobile devices on elliptic curve
                 cryptosystem",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "3--4",
  pages =        "138--143",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:16 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808001120",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yao:2009:CAR,
  author =       "Danfeng Yao and Roberto Tamassia",
  title =        "Compact and Anonymous Role-Based Authorization Chain",
  journal =      j-TISSEC,
  volume =       "12",
  number =       "3",
  pages =        "15:1--15:??",
  month =        jan,
  year =         "2009",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1455526.1455528",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Mon Feb 2 18:03:37 MST 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  abstract =     "We introduce a decentralized delegation model called
                 anonymous role-based cascaded delegation. In this
                 model, a delegator can issue authorizations on behalf
                 of her role without revealing her identity. This type
                 of delegation protects the sensitive membership
                 information of a delegator and hides the internal
                 structure of an organization. To provide an efficient
                 storage and transmission mechanism for credentials used
                 in anonymous role-based cascaded delegation, we present
                 a new digital signature scheme that supports both
                 signer anonymity and signature aggregation. Our scheme
                 has compact role signatures that make it especially
                 suitable for ubiquitous computing environments, where
                 users may have mobile computing devices with narrow
                 communication bandwidth and small storage units.",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "aggregate signature; anonymity; Delegation",
}

@Article{Yi:2009:SSG,
  author =       "Ke Yi and Feifei Li and Graham Cormode and Marios
                 Hadjieleftheriou and George Kollios and Divesh
                 Srivastava",
  title =        "Small synopses for group-by query verification on
                 outsourced data streams",
  journal =      j-TODS,
  volume =       "34",
  number =       "3",
  pages =        "15:1--15:??",
  month =        aug,
  year =         "2009",
  CODEN =        "ATDSD3",
  DOI =          "https://doi.org/10.1145/1567274.1567277",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  bibdate =      "Mon Aug 31 16:11:01 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tods/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/tods.bib",
  abstract =     "Due to the overwhelming flow of information in many
                 data stream applications, data outsourcing is a natural
                 and effective paradigm for individual businesses to
                 address the issue of scale. In the standard data
                 outsourcing model, the data owner outsources streaming
                 data to one or more third-party servers, which answer
                 queries posed by a potentially large number of clients
                 on the data owner's behalf. Data outsourcing
                 intrinsically raises issues of trust, making outsourced
                 query assurance on data streams a problem with
                 important practical implications. Existing solutions
                 proposed in this model all build upon cryptographic
                 primitives such as signatures and collision-resistant
                 hash functions, which only work for certain types of
                 queries, for example, simple selection/aggregation
                 queries.\par

                 In this article, we consider another common type of
                 queries, namely, ``GROUP BY, SUM'' queries, which
                 previous techniques fail to support. Our new solutions
                 are not based on cryptographic primitives, but instead
                 use algebraic and probabilistic techniques to compute a
                 small synopsis on the true query result, which is then
                 communicated to the client so as to verify the
                 correctness of the query result returned by the server.
                 The synopsis uses a constant amount of space
                 irrespective of the result size, has an extremely small
                 probability of failure, and can be maintained using no
                 extra space when the query result changes as elements
                 stream by. We then generalize our synopsis to allow
                 some tolerance on the number of erroneous groups, in
                 order to support semantic load shedding on the server.
                 When the number of erroneous groups is indeed
                 tolerable, the synopsis can be strengthened so that we
                 can locate and even correct these errors. Finally, we
                 implement our techniques and perform an empirical
                 evaluation using live network traffic.",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Transactions on Database Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
  keywords =     "data streams; outsourcing; Synopses",
}

@InProceedings{Yilek:2009:WPK,
  author =       "Scott Yilek and Eric Rescorla and Hovav Shacham and
                 Brandon Enright and Stefan Savage",
  editor =       "????",
  booktitle =    "ACM Internet Measurement Conference",
  title =        "When private keys are public: Results from the {2008
                 Debian OpenSSL} vulnerability",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "??--??",
  year =         "2009",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 16:09:39 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 79]{Schneier:2015:SWC}.",
}

@InProceedings{Youssef:2009:IEU,
  author =       "M. I. Youssef and M. Zahara and A. E. Emam and M. A.
                 Elghany",
  booktitle =    "{NRSC 2009. National Radio Science Conference, 2009}",
  title =        "Image encryption using pseudo random number and
                 chaotic sequence generators",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "1--15",
  year =         "2009",
  bibdate =      "Fri Jan 6 08:10:49 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5233974",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5210443",
}

@Article{Zhang:2009:CII,
  author =       "Fangguo Zhang and Xiaofeng Chen",
  title =        "Cryptanalysis and improvement of an {ID}-based ad-hoc
                 anonymous identification scheme at {CT-RSA 05}",
  journal =      j-INFO-PROC-LETT,
  volume =       "109",
  number =       "15",
  pages =        "846--849",
  day =          "16",
  month =        jul,
  year =         "2009",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 15:53:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@InProceedings{Zhang:2009:IBR,
  author =       "Jianhong Zhang and Cheng Ji",
  editor =       "{IEEE}",
  booktitle =    "{Proceedings of the International Conference on
                 Computational Intelligence and Software Engineering,
                 2009. CiSE 2009, December 11--13, 2009, Wuhan, China}",
  title =        "An Id-Based and Repairing {NTRUSign}-Based Anonymous
                 Multi-Proxy Signature Scheme",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  bookpages =    "????",
  pages =        "1--??",
  year =         "2009",
  DOI =          "https://doi.org/10.1109/CISE.2009.5366284",
  ISBN =         "1-4244-4507-8",
  ISBN-13 =      "978-1-4244-4507-3",
  LCCN =         "QA76.758 2009",
  bibdate =      "Thu Apr 21 11:00:03 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 library.mit.edu:9909/mit01",
  note =         "IEEE catalog number CFP0926H.",
  URL =          "http://ieeexplore.ieee.org/servlet/opac?punumber=5362500",
  abstract =     "Proxy signature is an important delegation technology,
                 it allows an original signer to delegate her signing
                 capability to a proxy signer and the proxy signer can
                 produce a signature on behalf of the original signer.
                 In this paper, we propose an ID-based and repairing
                 NTRUSign-based anonymous multi-proxy signature scheme.
                 With the characteristic of NTRUSign, our scheme has
                 more effective the key generation and rapid computation
                 speed than other similar schemes based on RSA or ECC.
                 The signers in our scheme are all anonymous so that no
                 one can forge the signing key composed of the hash
                 value of the original and all the proxy signers'
                 identities. The secretly chosen small polynomials were
                 transmitted among signers according to a certain order
                 without secure channels. The signing key is the
                 combination of the original and all the proxy signers'
                 keys. We also show our INBAMPS scheme satisfies all the
                 properties of the general multi-signature scheme. And
                 we point out that our scheme is resistant to
                 existential message attack based on repairing NTRUSign.
                 Thus, our INBAMPS scheme is secure.",
  acknowledgement = ack-nhfb,
  keywords =     "ANSI X9.98-2010; NTRUSign",
}

@InProceedings{Akavia:2010:EBO,
  author =       "Adi Akavia and Oded Goldreich and Shafi Goldwasser and
                 Dana Moshkovitz",
  title =        "Erratum for: {{\em On basing one-way functions on
                 NP-hardness}}",
  crossref =     "ACM:2010:PAI",
  pages =        "795--796",
  year =         "2010",
  bibdate =      "Wed Sep 1 10:42:57 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See \cite{Akavia:2006:BOW}.",
  acknowledgement = ack-nhfb,
}

@InProceedings{Chang:2010:PRN,
  author =       "Weiling Chang and Binxing Fang and Xiaochun Yun and
                 Shupeng Wang and Xiangzhan Yu",
  booktitle =    "{2010 Data Compression Conference (DCC)}",
  title =        "A pseudo-random number generator based on {LZSS}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "524",
  year =         "2010",
  DOI =          "https://doi.org/10.1109/DCC.2010.77",
  bibdate =      "Fri Jan 6 07:45:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5453503",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5453382",
  keywords =     "L12RC4; LZSS compression algorithm; RC4 stream
                 cipher",
}

@InProceedings{Lan:2010:RNG,
  author =       "Jingjing Lan and Wang Ling Goh and Zhi Hui Kong and
                 Kiat Seng Yeo",
  booktitle =    "{2010 International SoC Design Conference (ISOCC)}",
  title =        "A random number generator for low power cryptographic
                 application",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "328--331",
  year =         "2010",
  DOI =          "https://doi.org/10.1109/SOCDC.2010.5682906",
  bibdate =      "Fri Jan 6 07:45:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5682906",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5678854",
}

@Article{Marton:2010:RDC,
  author =       "Kinga Marton and Alin Suciu and Iosif Ignat",
  title =        "Randomness in Digital Cryptography: a Survey",
  journal =      "Romanian Journal of Information Science and
                 Technology",
  volume =       "13",
  number =       "3",
  pages =        "219--240",
  month =        "????",
  year =         "2010",
  CODEN =        "????",
  ISSN =         "1453-8245",
  ISSN-L =       "1453-8245",
  bibdate =      "Tue Jan 31 15:21:48 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http:www.imt.ro/romjist/Volum13/Number13_3/pdf/KMarton.pdf",
  acknowledgement = ack-nhfb,
  ajournal =     "Rom. J. Inf. Sci. Technol.",
}

@InProceedings{Moghadam:2010:DRN,
  author =       "I. Zarei Moghadam and A. S. Rostami and M. R.
                 Tanhatalab",
  booktitle =    "{2010 International Conference on Computer Design and
                 Applications (ICCDA)}",
  title =        "Designing a random number generator with novel
                 parallel {LFSR} substructure for key stream ciphers",
  volume =       "5",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "V5--598--V5--601",
  year =         "2010",
  DOI =          "https://doi.org/10.1109/ICCDA.2010.5541188",
  bibdate =      "Fri Jan 6 07:45:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5541188",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5520349",
}

@InProceedings{Navin:2010:ETU,
  author =       "A. H. Navin and Z. Navadad and B. Aasadi and M.
                 Mirnia",
  booktitle =    "{2010 International Conference on Computational
                 Intelligence and Communication Networks (CICN)}",
  title =        "Encrypted Tag by Using Data-Oriented Random Number
                 Generator to Increase Security in Wireless Sensor
                 Network",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "335--338",
  year =         "2010",
  DOI =          "https://doi.org/10.1109/CICN.2010.75",
  bibdate =      "Fri Jan 6 07:45:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5701989",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5701810",
}

@InProceedings{Peris-Lopez:2010:CSP,
  author =       "Pedro Peris-Lopez and Enrique {San Mill{\'a}n} and Jan
                 C. A. van der Lubbe and Luis A. Entrena",
  booktitle =    "{2010 International Conference for Internet Technology
                 and Secured Transactions (ICITST)}",
  title =        "Cryptographically secure pseudo-random bit generator
                 for {RFID} tags",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "1--6",
  year =         "2010",
  bibdate =      "Fri Jan 6 07:45:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5678035",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5672505",
}

@InProceedings{Xin:2010:IEB,
  author =       "Hong Xin and Zhu Shujing and Chen Weibin and Jian
                 Chongjun",
  booktitle =    "{2010 International Conference on Computer Application
                 and System Modeling (ICCASM)}",
  title =        "An image encryption base on non-linear pseudo-random
                 number generator",
  volume =       "9",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "V9--238--V9--241",
  year =         "2010",
  DOI =          "https://doi.org/10.1109/ICCASM.2010.5623043",
  bibdate =      "Fri Jan 6 07:45:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5623043",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5602791",
}

@Article{Bahi:2011:ECS,
  author =       "Jacques M. Bahi and Rapha{\"e}l Couturier and
                 Christophe Guyeux and Pierre-Cyrille H{\'e}am",
  title =        "Efficient and Cryptographically Secure Generation of
                 Chaotic Pseudorandom Numbers on {GPU}",
  journal =      "arxiv.org",
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "22",
  month =        dec,
  year =         "2011",
  bibdate =      "Thu Jan 19 17:58:12 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://arxiv.org/abs/1112.5239",
  abstract =     "In this paper we present a new pseudorandom number
                 generator (PRNG) on graphics processing units (GPU).
                 This PRNG is based on the so-called chaotic iterations.
                 It is firstly proven to be chaotic according to the
                 Devaney's formulation. We thus propose an efficient
                 implementation for GPU that successfully passes the
                 BigCrush tests, deemed to be the hardest battery of
                 tests in TestU01. Experiments show that this PRNG can
                 generate about 20 billion of random numbers per second
                 on Tesla C1060 and NVidia GTX280 cards. It is then
                 established that, under reasonable assumptions, the
                 proposed PRNG can be cryptographically secure. A
                 chaotic version of the Blum--Goldwasser asymmetric key
                 encryption scheme is finally proposed.",
  acknowledgement = ack-nhfb,
}

@InProceedings{Seyedzadeh:2011:IEA,
  author =       "Seyed Mohammad Seyedzadeh and Yasaman Hashemi",
  booktitle =    "{2011 11th International Conference on Intelligent
                 Systems Design and Applications (ISDA)}",
  title =        "Image encryption algorithm based on {Choquet Fuzzy
                 Integral} with self-adaptive pseudo-random number
                 generator",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "642--647",
  year =         "2011",
  DOI =          "https://doi.org/10.1109/ISDA.2011.6121728",
  bibdate =      "Fri Jan 6 07:45:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6121728",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6112291",
}

@InProceedings{Seyedzadeh:2011:IES,
  author =       "S. M. Seyedzadeh and S. Mirzakuchaki",
  booktitle =    "{2011 International Symposium on Artificial
                 Intelligence and Signal Processing (AISP)}",
  title =        "Image encryption scheme based on {Choquet} fuzzy
                 integral with pseudo-random keystream generator",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "101--106",
  year =         "2011",
  DOI =          "https://doi.org/10.1109/AISP.2011.5960982",
  bibdate =      "Fri Jan 6 07:45:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5960982",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5955054",
}

@InProceedings{Stipcevic:2011:QRN,
  author =       "M. Stipcevic",
  booktitle =    "{2011 Proceedings of the 34th International Convention
                 MIPRO}",
  title =        "Quantum random number generators and their use in
                 cryptography",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "1474--1479",
  year =         "2011",
  bibdate =      "Fri Jan 6 07:45:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5967293",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5945021",
}

@Article{Xing-Yuan:2011:PRS,
  author =       "Wang Xing-Yuan and Qin Xue and Xie Yi-Xin",
  title =        "Pseudo-Random Sequences Generated by a Class of
                 One-Dimensional Smooth Map",
  journal =      j-CHIN-PHYS-LETT,
  volume =       "28",
  number =       "8",
  pages =        "080501",
  year =         "2011",
  CODEN =        "CPLEEU",
  DOI =          "https://doi.org/10.1088/0256-307X/28/8/080501",
  ISSN =         "0256-307X (print), 1741-3540 (electronic)",
  ISSN-L =       "0256-307X",
  bibdate =      "Wed Feb 22 08:59:20 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://stacks.iop.org/0256-307X/28/i=8/a=080501",
  abstract =     "We extend a class of a one-dimensional smooth map. We
                 make sure that for each desired interval of the
                 parameter the map's Lyapunov exponent is positive. Then
                 we propose a novel parameter perturbation method based
                 on the good property of the extended one-dimensional
                 smooth map. We perturb the parameter $r$ in each
                 iteration by the real number $ x_i$ generated by the
                 iteration. The auto-correlation function and NIST
                 statistical test suite are taken to illustrate the
                 method's randomness finally. We provide an application
                 of this method in image encryption. Experiments show
                 that the pseudo-random sequences are suitable for this
                 application.",
  acknowledgement = ack-nhfb,
  fjournal =     "Chinese Physics Letters",
}

@TechReport{Anonymous:2012:SHS,
  author =       "Anonymous",
  key =          "FIPS-180-4",
  title =        "{Secure Hash Standard (SHS)}",
  type =         "{Federal Information Processing Standards}
                 Publication",
  number =       "FIPS Pub 180-4",
  institution =  pub-NIST,
  address =      pub-NIST:adr,
  pages =        "v + 30",
  month =        mar,
  year =         "2012",
  bibdate =      "Wed Jan 30 09:27:44 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf;
                 http://csrc.nist.gov/publications/PubsFIPS.html#fips180-4",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography; Federal Information
                 Processing Standards; hash algorithm; hash function;
                 message digest; Secure Hash Standard",
}

@TechReport{Anonymous:2013:DSS,
  author =       "Anonymous",
  key =          "FIPS-186-4",
  title =        "{Digital Signature Standard (DSS)}",
  type =         "{Federal Information Processing Standards}
                 Publication",
  number =       "FIPS Pub 186-4",
  institution =  pub-NIST,
  address =      pub-NIST:adr,
  pages =        "vii + 121",
  month =        jul,
  year =         "2013",
  DOI =          "https://doi.org/10.6028/NIST.FIPS.186-4",
  bibdate =      "Thu Aug 21 06:15:29 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography; Digital Signature
                 Standard (DSS); Federal Information Processing
                 Standards",
}

@Article{He:2013:GME,
  author =       "Q. Y. He and M. D. Reid",
  title =        "Genuine Multipartite {Einstein--Podolsky--Rosen}
                 Steering",
  journal =      j-PHYS-REV-LET,
  volume =       "111",
  number =       "25",
  pages =        "250403",
  month =        dec,
  year =         "2013",
  CODEN =        "PRLTAO",
  DOI =          "https://doi.org/10.1103/PhysRevLett.111.250403",
  ISSN =         "0031-9007 (print), 1079-7114 (electronic), 1092-0145",
  ISSN-L =       "0031-9007",
  bibdate =      "Wed Mar 26 14:58:12 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/einstein.bib",
  URL =          "http://link.aps.org/doi/10.1103/PhysRevLett.111.250403;
                 http://www.scientificcomputing.com/news/2014/03/einsteins-entanglement-produces-quantum-encryption;
                 http://www.swinburne.edu.au/engineering/caous/news_and_events/mulitipartite%20EPR%20steering%20paper.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Physical Review Letters",
  journal-URL =  "http://prl.aps.org/browse",
  keywords =     "$N$-partite Einstein-Podolsky-Rosen (EPR) steering;
                 quantum cryptography; quantum secret sharing",
  numpages =     "5",
}

@Article{Mukhopadhyay:2014:EMP,
  author =       "Debapriyay Mukhopadhyay and Subhas C. Nandy",
  title =        "Efficient multiple-precision integer division
                 algorithm",
  journal =      j-INFO-PROC-LETT,
  volume =       "114",
  number =       "3",
  pages =        "152--157",
  month =        mar,
  year =         "2014",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2013.10.005",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Dec 9 09:33:47 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  note =         "This paper provides a correction to the algorithm
                 presented in \cite{Huang:2005:EMP}, and also supplies a
                 complicated correctness proof.",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019013002627",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "computational arithmetic; cryptography; division
                 algorithm; normalization",
}

@Article{Ahmed:2017:IRD,
  author =       "Kareem Ahmed and Ibrahim El-Henawy",
  title =        "Increasing robustness of {Data Encryption Standard} by
                 integrating {DNA} cryptography",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "39",
  number =       "2",
  pages =        "91--105",
  year =         "2017",
  DOI =          "https://doi.org/10.1080/1206212X.2017.1289690",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:31:06 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.1080/1206212X.2017.1289690",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "22 Feb 2017",
}

@Misc{Gutmann:20xx:ESR,
  author =       "Peter Gutmann",
  title =        "Encryption and Security-related Resources",
  howpublished = "World-Wide Web site.",
  year =         "20xx",
  bibdate =      "Mon Dec 08 09:54:15 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.cs.auckland.ac.nz/~pgut001/links.html",
  acknowledgement = ack-nhfb,
}

@Book{Mrayati:20xx:AET,
  editor =       "M. Mrayati and Y. Meer Alam and M. H. at-Tayyan",
  title =        "Analysis and editing of three {Arabic} manuscripts:
                 {Al-Kindi}, {Ibn-Adlan}, {Ibn-Al-Durahim}",
  publisher =    "KFCRIS \& KACST",
  address =      "Riyadh, Saudi Arabia",
  pages =        "????",
  year =         "20xx",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Thu May 12 06:53:13 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Introduction by Chaker Faham.",
  series =       "Origins of Arab cryptography and cryptanalysis",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography / Arab countries / history",
  remark =       "Translated by Said M. Asaad. Revised by Mohammed
                 Ibrahim Al-Suwaiyel and Marwan Bawab and Ishaq ibn
                 Ibrahim Katib",
}

@Misc{Sale:20xx:CRP,
  author =       "Tony Sale",
  title =        "The {Colossus} Rebuild Project",
  howpublished = "World-Wide Web site.",
  year =         "20xx",
  bibdate =      "Wed Apr 20 12:07:15 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.codesandciphers.org.uk/lorenz/rebuild.htm",
  acknowledgement = ack-nhfb,
}

%%% Journal Papers Submitted and in Refereeing
%%%
%%% Last (unsuccessful) OCLC Article1st search for these on: Tue Sep 21 07:26:44 1999
%%% [13-May-2024]: another Web search and check of journal bibliography
%%% contents does NOT find these:
%%%
%%% B LIN and S J SHEPHERD, "Strengthening stream ciphers with Latin arrays",
%%% Journal of Cryptology.
%%%
%%% S J SHEPHERD, "More new solutions of a^(p-1) = 1 (mod p^2)", Journal of
%%% Mathematics of Computation.
%%%
%%% B LIN and S J SHEPHERD, "The Analysis and Synthesis of Ciphers using Finite
%%% Automata", SIAM Journal on Computing.
%%%
%%% M G PARKER, A H KEMP and S J SHEPHERD, "Fast Blum sequence generation using
%%% Montgomery Multiplication", IEEE Transactions on VLSI Systems.
%%%
%%% S J SHEPHERD, M G PARKER and C TELLAMBURA, "Reducing computation in
%%% Ramanujan's asymptotic series for the partition function", Journal of
%%% Mathematics of Computation.
%%% ====================================================================
%%% Cross-referenced entries must come last:
@Proceedings{Pellikaan:1996:AGC,
  editor =       "R. Pellikaan and M. Perret and S. G. Vladut",
  booktitle =    "Arithmetic, geometry, and coding theory: proceedings
                 of the international conference held at Centre
                 international de rencontres math{\'e}matiques {(CIRM),
                 Luminy, France, June 28--July 2, 1993}",
  title =        "Arithmetic, geometry, and coding theory: proceedings
                 of the international conference held at Centre
                 international de rencontres math{\'e}matiques {(CIRM),
                 Luminy, France, June 28--July 2, 1993}",
  publisher =    pub-GRUYTER,
  address =      pub-GRUYTER:adr,
  pages =        "xii + 288",
  year =         "1996",
  ISBN =         "3-11-014616-9",
  ISBN-13 =      "978-3-11-014616-5",
  LCCN =         "QA268 .A75 1996",
  bibdate =      "Wed Jan 16 09:27:31 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "UK\pounds 102.45",
  acknowledgement = ack-nhfb,
  keywords =     "coding theory --- congresses; geometry, algebraic ---
                 congresses; number theory --- congresses",
}

@Proceedings{Williams:1999:QCQ,
  editor =       "Colin P. Williams",
  booktitle =    "Quantum computing and quantum communications: First
                 {NASA} International Conference, {QCQS} [i.e., {QCQC}]
                 '98, Palm Springs, California, {USA}, February 17--20,
                 1998: selected papers",
  title =        "Quantum computing and quantum communications: First
                 {NASA} International Conference, {QCQS} [i.e., {QCQC}]
                 '98, Palm Springs, California, {USA}, February 17--20,
                 1998: selected papers",
  volume =       "1509",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "x + 480",
  year =         "1999",
  ISBN =         "3-540-65514-X (softcover)",
  ISBN-13 =      "978-3-540-65514-5 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.889 .Q37 1998",
  bibdate =      "Sat Jul 3 09:51:14 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
  keywords =     "optical communications --- congresses; quantum
                 computers --- congresses",
}

@Proceedings{ACM:2000:PTS,
  editor =       "{ACM}",
  booktitle =    "Proceedings of the thirty second annual {ACM}
                 Symposium on Theory of Computing: Portland, Oregon, May
                 21--23, [2000]",
  title =        "Proceedings of the thirty second annual {ACM}
                 Symposium on Theory of Computing: Portland, Oregon, May
                 21--23, [2000]",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "ix + 756",
  year =         "2000",
  ISBN =         "1-58113-184-4",
  ISBN-13 =      "978-1-58113-184-0",
  bibdate =      "Sat Oct 28 16:10:32 MDT 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "ACM order number 508000.",
  acknowledgement = ack-nhfb,
  keywords =     "computational complexity -- congresses; computer
                 programming -- congresses; electronic data processing
                 -- congresses; electronic digital computers --
                 congresses; online resources",
}

@Proceedings{Anonymous:2000:CCI,
  editor =       "Anonymous",
  booktitle =    "Cool Chips {III}: An International Symposium on
                 Low-Power and High-Speed Chips, Kikai-Shinko-Kaikan,
                 Tokyo, Japan April 24--25, 2000",
  title =        "Cool Chips {III}: An International Symposium on
                 Low-Power and High-Speed Chips, Kikai-Shinko-Kaikan,
                 Tokyo, Japan April 24--25, 2000",
  publisher =    "????",
  address =      "????",
  pages =        "????",
  year =         "2000",
  ISBN =         "",
  ISBN-13 =      "",
  LCCN =         "",
  bibdate =      "Mon Jan 08 09:19:21 2001",
  bibsource =    "http://www.coolchips.org/index-cool3.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{Bellare:2000:ACC,
  editor =       "Mihir Bellare",
  booktitle =    "Advances in cryptology --- {CRYPTO} 2000: 20th annual
                 International Cryptology Conference, Santa Barbara,
                 California, {USA}, August 20--24, 2000: proceedings",
  title =        "Advances in cryptology --- {CRYPTO} 2000: 20th annual
                 International Cryptology Conference, Santa Barbara,
                 California, {USA}, August 20--24, 2000: proceedings",
  volume =       "1880",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 543",
  year =         "2000",
  ISBN =         "3-540-67907-3",
  ISBN-13 =      "978-3-540-67907-3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 C79 2000 Bar",
  bibdate =      "Mon Oct 16 18:31:56 MDT 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; cryptography ---
                 congresses",
}

@Proceedings{Buchmann:2000:CTC,
  editor =       "Johannes Buchmann",
  booktitle =    "Coding theory, cryptography, and related areas:
                 proceedings of an International Conference on Coding
                 Theory, Cryptography, and Related Areas, held in
                 Guanajuato, Mexico, in April 1998",
  title =        "Coding theory, cryptography, and related areas:
                 proceedings of an International Conference on Coding
                 Theory, Cryptography, and Related Areas, held in
                 Guanajuato, Mexico, in April 1998",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "viii + 259",
  year =         "2000",
  ISBN =         "3-540-66248-0 (softcover)",
  ISBN-13 =      "978-3-540-66248-8 (softcover)",
  LCCN =         "TK5102.94 .I58 1998",
  bibdate =      "Wed Feb 13 12:10:46 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.springer.com/mathematics/numbers/book/978-3-540-66248-8",
  acknowledgement = ack-nhfb,
  keywords =     "coding theory --- congresses; data encryption
                 (computer science) --- congresses; data transmission
                 systems --- security measures --- congresses",
}

@Proceedings{Christianson:2000:SPI,
  editor =       "Bruce Christianson",
  booktitle =    "{Security protocols: 7th International Workshop,
                 Cambridge, UK, April 19--21, 1999: Proceedings}",
  title =        "{Security protocols: 7th International Workshop,
                 Cambridge, UK, April 19--21, 1999: Proceedings}",
  volume =       "1796",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xii + 227",
  year =         "2000",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-67381-4 (softcover)",
  ISBN-13 =      "978-3-540-67381-1 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA267.A1 L43 no.1796",
  bibdate =      "Mon Oct 16 18:31:56 MDT 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t1796.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=1796",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; computers --- access
                 control --- congresses; cryptography --- congresses",
}

@Proceedings{Domingo-Ferrer:2000:SCR,
  editor =       "Josep Domingo-Ferrer and David Chan and Anthony
                 Watson",
  booktitle =    "Smart card research and advanced applications: {IFIP
                 TC8\slash WG8.8 Fourth Working Conference on Smart Card
                 Research and Advanced Applications, September 20--22,
                 2000, Bristol, United Kingdom}",
  title =        "Smart card research and advanced applications: {IFIP
                 TC8\slash WG8.8 Fourth Working Conference on Smart Card
                 Research and Advanced Applications, September 20--22,
                 2000, Bristol, United Kingdom}",
  volume =       "52",
  publisher =    pub-KLUWER,
  address =      pub-KLUWER:adr,
  pages =        "ix + 388",
  year =         "2000",
  ISBN =         "0-7923-7953-5",
  ISBN-13 =      "978-0-7923-7953-9",
  LCCN =         "TK7895.S62 I34 2000",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "IFIP",
  acknowledgement = ack-nhfb,
  keywords =     "smart cards --- congresses",
}

@Proceedings{ElAbbadi:2000:VPI,
  editor =       "Amr {El Abbadi} and Michael L. Brodie and Sharma
                 Chakravarthy and Umeshwar Dayal and Nabil Kamel and
                 Gunter Schlageter and Kyu-Young Whang",
  booktitle =    "{VLDB} 2000, Proceedings of 26th International
                 Conference on Very Large Data Bases, September 10--14,
                 2000, Cairo, Egypt",
  title =        "{VLDB} 2000, Proceedings of 26th International
                 Conference on Very Large Data Bases, September 10--14,
                 2000, Cairo, Egypt",
  publisher =    pub-MORGAN-KAUFMANN,
  address =      pub-MORGAN-KAUFMANN:adr,
  pages =        "????",
  year =         "2000",
  ISBN =         "1-55860-715-3",
  ISBN-13 =      "978-1-55860-715-6",
  LCCN =         "????",
  bibdate =      "Thu Jan 11 12:34:25 2001",
  bibsource =    "DBLP; http://dblp.uni-trier.de;
                 http://www.vldb.org/dblp/db/conf/vldb/vldb2000.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{Heys:2000:SAC,
  editor =       "Howard Heys and Carlisle Adams",
  booktitle =    "Selected areas in cryptography: 6th annual
                 international workshop, {SAC'99}, Kingston, Ontario,
                 Canada, August 9--10, 1999: proceedings",
  title =        "Selected areas in cryptography: 6th annual
                 international workshop, {SAC}'99, Kingston, Ontario,
                 Canada, August 9--10, 1999: proceedings",
  volume =       "1758",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "viii + 241",
  year =         "2000",
  ISBN =         "3-540-67185-4",
  ISBN-13 =      "978-3-540-67185-5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA267.A1 L43 no.1758",
  bibdate =      "Mon Oct 16 09:20:30 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Contents: A universal encryption standard / Helena
                 Handschuh and Serge Vaudenay --- Yarrow-160: notes on
                 the design and analysis of the Yarrow cryptographic
                 pseudorandom number generator / John Kelsey, Bruce
                 Schneier, and Niels Ferguson --- Elliptic curve
                 pseudorandom sequence generators / Guang Gong, Thomas
                 A. Berson, and Douglas R. Stinson --- Adaptive-attack
                 norm for decorrelation and super-pseudorandomness /
                 Serge Vaudenay --- Guesswork and variation distance as
                 measures of cipher security / John O. Pliam ---
                 Modeling linear characteristics of
                 substitution-permutation networks / Liam Keliher, Henk
                 Meijer, and Stafford Tavares --- Strong linear
                 dependence and unbiased distribution of non-propagative
                 vectors / Yuliang Zheng and Xian-Mo Zhang --- Security
                 of E2 against truncated differential cryptanalysis /
                 Shiho Moriai \ldots{} [et al..] --- Key-schedule
                 cryptanalysis of DEAL / John Kelsey and Bruce Schneier
                 --- Efficient evaluation of security against
                 generalized interpolation attack / Kazumaro Aoki ---
                 Efficient implementation of cryptosystems based on
                 non-maximal imaginary quadratic orders / Detlef
                 Huhnlein --- Improving and extending the Lim/Lee
                 exponentiation algorithm / Biljana Cubaleska, Andreas
                 Rieke, and Thomas Hermann --- Software optimization of
                 decorrelation module / Fabrice Noilhan --- Pseudonym
                 systems / Anna Lysyanskaya \ldots{} [et al.] ---
                 Unconditionally secure proactive secret sharing scheme
                 with combinatorial structures / Douglas R. Stinson and
                 R. Wei --- Protecting a mobile agent's route against
                 collusions / Dirk Westhoff \ldots{} [et al.] ---
                 Photuris: design criteria / William Allen Simpson",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; data encryption
                 (computer science) --- congresses",
}

@Proceedings{IEEE:2000:ASF,
  editor =       "{IEEE}",
  booktitle =    "41st Annual Symposium on Foundations of Computer
                 Science: proceedings: 12--14 November, 2000, Redondo
                 Beach, California",
  title =        "41st Annual Symposium on Foundations of Computer
                 Science: proceedings: 12--14 November, 2000, Redondo
                 Beach, California",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xiv + 688",
  year =         "2000",
  CODEN =        "ASFPDV",
  ISBN =         "0-7695-0850-2, 0-7695-0851-0 (case), 0-7695-0852-9
                 (microfiche)",
  ISBN-13 =      "978-0-7695-0850-4, 978-0-7695-0851-1 (case),
                 978-0-7695-0852-8 (microfiche)",
  ISSN =         "0272-5428",
  LCCN =         "TK7885.A1 S92 2000",
  bibdate =      "Thu Apr 05 06:27:02 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "IEEE Computer Society order number PR00850.",
  acknowledgement = ack-nhfb,
}

@Proceedings{Imai:2000:PKC,
  editor =       "Hideki Imai and Yuliang Zheng",
  booktitle =    "Public key cryptography: third International Workshop
                 on Practice and Theory in Public Key Cryptosystems,
                 {PKC} 2000, Melbourne, Victoria, Australia, January
                 18--20, 2000: proceedings",
  title =        "Public key cryptography: third International Workshop
                 on Practice and Theory in Public Key Cryptosystems,
                 {PKC} 2000, Melbourne, Victoria, Australia, January
                 18--20, 2000: proceedings",
  volume =       "1751",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 483",
  year =         "2000",
  ISBN =         "3-540-66967-1",
  ISBN-13 =      "978-3-540-66967-8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA267.A1 L43 no.1751",
  bibdate =      "Mon Oct 16 18:31:56 MDT 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; computers --- access
                 control --- congresses; data encryption (computer
                 science) --- congresses",
}

@Proceedings{Joyner:2000:CTC,
  editor =       "David Joyner",
  booktitle =    "Coding theory and cryptography: from {Enigma} and
                 {Geheimschreiber} to quantum theory",
  title =        "Coding theory and cryptography: from {Enigma} and
                 {Geheimschreiber} to quantum theory",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "vi + 256",
  year =         "2000",
  DOI =          "https://doi.org/10.1007/978-3-642-59663-6",
  ISBN =         "3-540-66336-3 (softcover), 3-642-59663-0 (e-book)",
  ISBN-13 =      "978-3-540-66336-2 (softcover), 978-3-642-59663-6
                 (e-book)",
  LCCN =         "QA268 .C67 1999",
  bibdate =      "Wed Jan 16 09:17:51 2002",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/maple-extract.bib",
  note =         "Proceedings of the Conference on Coding Theory,
                 Cryptography and Number Theory held at the U.S. Naval
                 Academy during October 25--26, 1998",
  price =        "UK\pounds 44.50",
  URL =          "http://frode.home.cern.ch/frode/pubs/cryptoday.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "coding theory --- congresses; cryptography ---
                 congresses",
  tableofcontents = "P. Hilton: Reminiscences and Reflections of a
                 Codebreaker \\
                 W. T. Tutte: FISH and I \\
                 F. Weierud: Sturgeon, The FISH BP Never Really Caught
                 \\
                 D. A. Hatch: ENIGMA and PURPLE: How the Allies Broke
                 German and Japanese Codes During the War \\
                 L. Ulfving and F. Weierud: The Geheimschreiber Secret
                 \\
                 B. Wardlaw: The RSA Public Key Cryptosystem \\
                 J. Cosgrave: Number Theory and Cryptography (using
                 Maple) \\
                 S. J. Lomonaco, Jr.: A Talk on Quantum Cryptography or
                 How Alice Outwits Eve \\
                 T. S. Michael: The Rigidity Theorems of Hamada and
                 Ohmori, Revisited \\
                 A. Shokrollahi: Counting Prime Divisors on Elliptic
                 Curves and Multiplication in Finite Fields \\
                 A. Shokrollahi: On Cyclic MDS-Codes \\
                 S. Gao and A. Shokrollahi: Computing Roots of
                 Polynomials Over Function Fields of Curves \\
                 D. Joyner and S. Shokranian: Remarks on Codes From
                 Modular Curves: MAPLE Applications \\
                 Index",
}

@Proceedings{NIST:2000:TAE,
  editor =       "{NIST}",
  booktitle =    "The Third {Advanced Encryption Standard} Candidate
                 Conference, April 13--14, 2000, New York, {NY}, {USA}",
  title =        "The Third {Advanced Encryption Standard} Candidate
                 Conference, April 13--14, 2000, New York, {NY}, {USA}",
  publisher =    pub-NIST,
  address =      pub-NIST:adr,
  pages =        "358",
  year =         "2000",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Tue Feb 06 15:28:26 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://csrc.nist.gov/encryption/aes/round2/conf3/aes3conf.htm;
                 http://csrc.nist.gov/encryption/aes/round2/conf3/papers/AES3Proceedings-1.pdf;
                 http://csrc.nist.gov/encryption/aes/round2/conf3/papers/AES3Proceedings-2.pdf;
                 http://csrc.nist.gov/encryption/aes/round2/conf3/papers/AES3Proceedings-3.pdf;
                 http://csrc.nist.gov/encryption/aes/round2/conf3/papers/AES3Proceedings.pdf",
  acknowledgement = ack-nhfb,
}

@Proceedings{Okamoto:2000:ACA,
  editor =       "Tatsuaki Okamoto",
  booktitle =    "Advances in cryptology --- {ASIACRYPT} 2000: 6th
                 International Conference on the Theory and Application
                 of Cryptology and Information Security, Kyoto, Japan,
                 December 3--7, 2000: proceedings",
  title =        "Advances in cryptology --- {ASIACRYPT} 2000: 6th
                 International Conference on the Theory and Application
                 of Cryptology and Information Security, Kyoto, Japan,
                 December 3--7, 2000: proceedings",
  volume =       "1976",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xii + 630",
  year =         "2000",
  ISBN =         "3-540-41404-5 (softcover)",
  ISBN-13 =      "978-3-540-41404-9 (softcover)",
  LCCN =         "QA76.9.A25 I555 2000",
  bibdate =      "Thu Jan 17 11:49:19 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; cryptography ---
                 congresses",
}

@Proceedings{Preneel:2000:ACE,
  editor =       "Bart Preneel",
  booktitle =    "Advances in cryptology: {EUROCRYPT} 2000:
                 International Conference on the Theory and Application
                 of Cryptographic Techniques, Bruges, Belgium, May
                 14--18, 2000: proceedings",
  title =        "Advances in cryptology: {EUROCRYPT} 2000:
                 International Conference on the Theory and Application
                 of Cryptographic Techniques, Bruges, Belgium, May
                 14--18, 2000: proceedings",
  volume =       "1807",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiii + 608",
  year =         "2000",
  ISBN =         "3-540-67517-5",
  ISBN-13 =      "978-3-540-67517-4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA267.A1 L43 no.1807",
  bibdate =      "Mon Oct 16 18:31:56 MDT 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- congresses; data encryption (computer
                 science) --- congresses; online resources",
}

@Proceedings{Quisquater:2000:SCR,
  editor =       "J.-J. Quisquater and Bruce Schneier",
  booktitle =    "Smart card research and applications: third
                 international conference, {CARDIS'98},
                 {Louvain-la-Neuve}, Belgium, September 1998:
                 proceedings",
  title =        "Smart card research and applications: third
                 international conference, {CARDIS'98},
                 {Louvain-la-Neuve}, Belgium, September 1998:
                 proceedings",
  volume =       "1820",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 379",
  year =         "2000",
  ISBN =         "3-540-67923-5",
  ISBN-13 =      "978-3-540-67923-3",
  LCCN =         "TK7895.S62 C36 1998",
  bibdate =      "Wed Feb 06 08:18:26 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
  keywords =     "smart cards --- congresses",
}

@Book{Rojas:2000:FCH,
  editor =       "Ra{\'u}l Rojas and Ulf Hashagen",
  booktitle =    "The First Computers: History and Architectures",
  title =        "The First Computers: History and Architectures",
  publisher =    pub-MIT,
  address =      pub-MIT:adr,
  pages =        "xii + 457",
  year =         "2000",
  ISBN =         "0-262-18197-5 (hardcover), 0-585-35535-5
                 (electronic)",
  ISBN-13 =      "978-0-262-18197-6 (hardcover), 978-0-585-35535-1
                 (electronic)",
  LCCN =         "QA76.17 .F57 2000",
  bibdate =      "Sat Nov 20 19:51:29 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/b/bauer-friedrich-ludwig.bib;
                 https://www.math.utah.edu/pub/bibnet/authors/r/rutishauser-heinz.bib;
                 https://www.math.utah.edu/pub/bibnet/authors/s/stiefel-eduard.bib;
                 https://www.math.utah.edu/pub/bibnet/authors/v/von-neumann-john.bib;
                 https://www.math.utah.edu/pub/bibnet/authors/w/wilkes-maurice-v.bib;
                 https://www.math.utah.edu/pub/tex/bib/annhistcomput.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "History of computing",
  acknowledgement = ack-nhfb,
  author-dates = "Eduard Stiefel (21 April 1909--25 November 1978);
                 Friedrich (``Fritz'') Ludwig Bauer (10 June 1924--26
                 March 2015); Heinz Rutishauser (30 January 1918--10
                 November 1970); John von Neumann (28 December 1903--8
                 February 1957); Sir Maurice Vincent Wilkes (26 June
                 1913--29 November 2010)",
  subject =      "Computers; History; Computer architecture",
  tableofcontents = "A preview of things to come: some remarks on the
                 first generation of computers / Michael R. Williams /
                 1--13 \\
                 The structures of computation / Michael S. Mahoney /
                 17--32 \\
                 Reconstructions, historical and otherwise: the
                 challenge of high-tech artifacts / Robert W. Seidel /
                 33--52 \\
                 A classification scheme for program controlled
                 calculators / Andreas Brennecke / 53--68 \\
                 Hardware components and computer design / Harry D.
                 Huskey / 69--87 \\
                 Reconstruction of the Atanasoff--Berry Computer / John
                 Gustafson / 91--106 \\
                 Howard Aiken and the dawn of the computer age / I.
                 Bernard Cohen / 107--120 \\
                 The ENIAC: history, operation, and reconstruction in
                 VLSI / Jan Van der Spiegel, James F. Tau, Titiimaea F.
                 Ala'ilima, Lin Ping Ang / 121--178 \\
                 The Institute for Advanced Study Computer: a case study
                 in the application of concepts from the history of
                 technology / William Aspray / 179--193 \\
                 Nothing new since von Neumann: a historian looks at
                 computer architecture, 1945--1995 / Paul Ceruzzi /
                 195--217 \\
                 The DEHOMAG D11 tabulator: a milestone in the history
                 of data processing / Friedrich W. Kistermann / 221--235
                 \\
                 The architecture of Konrad Zuse's early computing
                 machines / Ra{\'u}l Rojas / 237--261 \\
                 Konrad Zuse's Z4: architecture, programming, and
                 modifications at the ETH Zurich / Ambros P. Speiser /
                 263--276 \\
                 The Plankalk{\"u}l of Konrad Zuse revisited / Friedrich
                 L. Bauer / 277--293 \\
                 The G1 and the G{\"o}ttingen family of digital
                 computers / Wilhelm Hopmann / 295--313 \\
                 Konrad Zuse and industrial manufacturing of electronic
                 computers in Germany / Hartmut Petzold / 315--322 \\
                 Helmut Hoelzer: inventor of the electronic analog
                 computer / Thomas Lange / 323--348 \\
                 The Colossus of Bletchley Park: the German cipher
                 system / Anthony E. Sale / 351--364 \\
                 The Manchester Mark 1 computers / R. B. E. Napper /
                 365--377 \\
                 Rebuilding the first Manchester computer / Christopher
                 P. Burton / 379--386 \\
                 The Atlas computer / Frank H. Sumner / 387--396 \\
                 Past into present: the EDSAC simulator / Martin
                 Campbell-Kelly / 397--416 \\
                 The first Japanese computers and their software
                 simulators / Seiichi Okoma / 419--434 \\
                 The {Parametron Computer PC-1} and its initial input
                 routine / Eiiti Wada / 435--452",
}

@Proceedings{Roy:2000:PCI,
  editor =       "Bimal Roy",
  booktitle =    "Progress in cryptology: {INDOCRYPT} 2000: First
                 International Conference in Cryptology in India,
                 Calcutta, India, December 10--13, 2000: proceedings",
  title =        "Progress in cryptology: {INDOCRYPT} 2000: First
                 International Conference in Cryptology in India,
                 Calcutta, India, December 10--13, 2000: proceedings",
  volume =       "1977",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "x + 294",
  year =         "2000",
  ISBN =         "3-540-41452-5",
  ISBN-13 =      "978-3-540-41452-0",
  LCCN =         "QA267.A1 L43 no.1977",
  bibdate =      "Thu Jan 17 11:49:19 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; cryptography ---
                 congresses",
}

@Proceedings{Schmalz:2000:MAD,
  editor =       "Mark S. Schmalz",
  booktitle =    "{Mathematics and applications of data\slash image
                 coding, compression, and encryption III: 2 August 2000,
                 San Diego, USA}",
  title =        "{Mathematics and applications of data\slash image
                 coding, compression, and encryption III: 2 August 2000,
                 San Diego, USA}",
  volume =       "4122",
  publisher =    pub-SPIE,
  address =      pub-SPIE:adr,
  pages =        "v + 218",
  year =         "2000",
  ISBN =         "0-8194-3767-0",
  ISBN-13 =      "978-0-8194-3767-9",
  LCCN =         "TA1637 .M378 2000",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Earlier conferences have title: Mathematics of
                 data\slash image coding, compression, and encryption.",
  series =       "SPIE proceedings series",
  acknowledgement = ack-nhfb,
  keywords =     "data encryption (computer science) --- congresses;
                 image compression --- congresses; image processing ---
                 digital techniques --- congresses; image processing ---
                 mathematics --- congresses",
}

@Proceedings{Song:2000:ISC,
  editor =       "JooSeok Song",
  booktitle =    "Information security and cryptology --- {ICISC'99:
                 second international conference, Seoul, Korea, December
                 9--10, 1999: proceedings}",
  title =        "Information security and cryptology --- {ICISC'99:
                 second international conference, Seoul, Korea, December
                 9--10, 1999: proceedings}",
  volume =       "1787",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 277",
  year =         "2000",
  ISBN =         "3-540-67380-6 (softcover)",
  ISBN-13 =      "978-3-540-67380-4 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA267.A1 L43 no.1787",
  bibdate =      "Mon Oct 16 18:31:56 MDT 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; cryptography ---
                 congresses",
  tableofcontents = "On provable security for conventional cryptography
                 / Serge Vaudenay \\
                 Correlation properties of the Bluetooth combiner
                 generator / Miia Hermelin and Kaisa Nyberg \\
                 Preventing double-spent coins from revealing user's
                 whole secret / DaeHun Nyang and JooSeok Song \\
                 On the optimal diffusion layers with practical security
                 against differential and linear cryptanalysis / Ju-Sung
                 Kang \ldots{} [et al.] \\
                 Non-linear complexity of the Naor--Reingold
                 pseudo-random function / William D. Banks \ldots{} [et
                 al.] \\
                 Relationships between bent functions and complementary
                 plateaued functions / Yuliang Zheng and Xian-Mo Zhang
                 \\
                 A technique for boosting the security of cryptographic
                 systems with one-way hash functions / Takeshi Koshiba
                 \\
                 Over $F^p$ vs. over $F2^n$ and on Pentium vs. on Alpha
                 in software implementation of hyperelliptic curve
                 cryptosystems / Yasuyuki Sakai and Kouichi Sakurai \\
                 Speeding up elliptic scalar multiplication with
                 precomputation / Chae Hoon Lim and Hyo Sun Hwang \\
                 Why hierarchical key distribution is appropriate for
                 multicast networks / Chandana Gamage, Jussipekka Leiwo,
                 and Yuliang Zheng \\
                 Secure selection protocols / Kapali Viswanathan, Colin
                 Boyd, and Ed Dawson \\
                 Efficient 3-pass password-based key exchange protocol
                 with low computational cost for client / Hyoungkyu Lee
                 \ldots{} [et al.] \\
                 A 2-pass authentication and key agreement protocol for
                 mobile communications / Kook-Heui Lee \ldots{} [et al.]
                 \\
                 Verifiable secret sharing and time capsules / Josef
                 Pieprzyk and Eiji Okamoto \\
                 A new approach to robust threshold RSA signature
                 schemes / Rei Safavi-Naini, Huaxiong Wang, and Kwok-Yan
                 Lam \\
                 On threshold RSA-signing with no dealer / Shingo
                 Miyazaki, Kouichi Sakurai, and Moti Yung \\
                 A new approach to efficient verifiable secret sharing
                 for threshold KCDSA signature / Ho-Sun Yoon and
                 Heung-Youl Youm \\
                 A hardware-oriented algorithm for computing in
                 Jacobians and its implementation for hyperelliptic
                 curve cryptosystems / Tetsuya Tamura, Kouichi Sakurai,
                 and Tsutomu Matsumoto \\
                 A security design for a wide-area distributed system /
                 Jussipekka Leiwo \ldots{} [et al.] \\
                 Self-escrowed public-key infrastructures / Pascal
                 Paillier and Moti Yung \\
                 Electronic funds transfer protocol using
                 domain-verifiable signcryption scheme / Moonseog Seo
                 and Kwangjo Kim",
}

@Proceedings{USENIX:2000:PFSa,
  editor =       "{USENIX}",
  booktitle =    "Proceedings of the Fourteenth Systems Administration
                 Conference {(LISA} {XIV)}, December 3--8, 2000, New
                 Orleans, Louisiana, {USA}",
  title =        "Proceedings of the Fourteenth Systems Administration
                 Conference ({LISA} {XIV}), December 3--8, 2000, New
                 Orleans, Louisiana, {USA}",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  pages =        "vii + 378",
  year =         "2000",
  ISBN =         "1-880446-13-8",
  ISBN-13 =      "978-1-880446-13-3",
  LCCN =         "????",
  bibdate =      "Wed Oct 16 05:12:45 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/usenix2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/lisa2000/technical.html",
  acknowledgement = ack-nhfb,
}

@Proceedings{USENIX:2000:PFW,
  editor =       "USENIX",
  booktitle =    "Proceedings of the First Workshop on Industrial
                 Experiences with Systems Software {(WIESS 2000)},
                 October 22, 2000, Paradise Point Resort, San Diego,
                 California, {USA}",
  title =        "Proceedings of the First Workshop on Industrial
                 Experiences with Systems Software ({WIESS} 2000),
                 October 22, 2000, Paradise Point Resort, San Diego,
                 California, {USA}",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  pages =        "84",
  year =         "2000",
  ISBN =         "1-880446-15-4",
  ISBN-13 =      "978-1-880446-15-7",
  LCCN =         "QA76.76.S95 W67 2000",
  bibdate =      "Wed Oct 16 05:52:48 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/osdi2000/wiess2000/",
  acknowledgement = ack-nhfb,
}

@Proceedings{USENIX:2000:PLI,
  editor =       "{USENIX}",
  booktitle =    "Proceedings of the 3rd Large Installation System
                 Administration of Windows {NT/2000} Conference: August
                 1--2, 2000, Seattle, Washington, {USA}",
  title =        "Proceedings of the 3rd Large Installation System
                 Administration of Windows {NT}/2000 Conference: August
                 1--2, 2000, Seattle, Washington, {USA}",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  pages =        "69",
  year =         "2000",
  ISBN =         "1-880446-19-7",
  ISBN-13 =      "978-1-880446-19-5",
  LCCN =         "????",
  bibdate =      "Wed Oct 16 07:17:23 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://db.usenix.org/publications/library/proceedings/lisa-nt2000/",
  acknowledgement = ack-nhfb,
  keywords =     "LISA-NT",
}

@Proceedings{USENIX:2000:PNU,
  editor =       "{USENIX}",
  booktitle =    "Proceedings of the Ninth {USENIX} Security Symposium,
                 August 14--17, 2000, Denver, Colorado",
  title =        "Proceedings of the Ninth {USENIX} Security Symposium,
                 August 14--17, 2000, Denver, Colorado",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  pages =        "275",
  year =         "2000",
  ISBN =         "1-880446-18-9",
  ISBN-13 =      "978-1-880446-18-8",
  LCCN =         "????",
  bibdate =      "Wed Oct 16 06:36:41 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/sec2000",
  acknowledgement = ack-nhfb,
}

@Proceedings{ACM:2001:PAA,
  editor =       "{ACM}",
  booktitle =    "{Proceedings of the 33rd Annual ACM Symposium on
                 Theory of Computing: Hersonissos, Crete, Greece, July
                 6--8, 2001}",
  title =        "{Proceedings of the 33rd Annual ACM Symposium on
                 Theory of Computing: Hersonissos, Crete, Greece, July
                 6--8, 2001}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "xii + 757",
  year =         "2001",
  ISBN =         "1-58113-349-9",
  ISBN-13 =      "978-1-58113-349-3",
  LCCN =         "QA76.6 .A13 2001",
  bibdate =      "Wed Feb 20 17:51:33 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  note =         "ACM order number 508010.",
  acknowledgement = ack-nhfb,
}

@Proceedings{ACM:2001:SHP,
  editor =       "{ACM}",
  booktitle =    "{SC2001}: High Performance Networking and Computing.
                 Denver, {CO}, November 10--16, 2001",
  title =        "{SC2001}: High Performance Networking and Computing.
                 Denver, {CO}, November 10--16, 2001",
  publisher =    pub-ACM # " and " # pub-IEEE,
  address =      pub-ACM:adr # " and " # pub-IEEE:adr,
  pages =        "????",
  year =         "2001",
  ISBN =         "1-58113-293-X",
  ISBN-13 =      "978-1-58113-293-9",
  LCCN =         "????",
  bibdate =      "Thu Feb 21 18:29:36 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{Alster:2001:PKC,
  editor =       "Kazimierz Alster and Jerzy Urbanowicz and Hugh C.
                 Williams",
  booktitle =    "Public-key cryptography and computational number
                 theory: proceedings of the international conference
                 organized by the Stefan Banach International
                 Mathematical Center, Warsaw, Poland, September 11-15,
                 2000",
  title =        "Public-key cryptography and computational number
                 theory: proceedings of the international conference
                 organized by the Stefan Banach International
                 Mathematical Center, Warsaw, Poland, September 11-15,
                 2000",
  publisher =    pub-GRUYTER,
  address =      pub-GRUYTER:adr,
  pages =        "xii + 331",
  year =         "2001",
  ISBN =         "3-11-017046-9 (cloth)",
  ISBN-13 =      "978-3-11-017046-7 (cloth)",
  LCCN =         "QA268 .P83 2001",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  keywords =     "coding theory --- congresses; public key cryptography
                 --- congresses",
}

@Proceedings{Apers:2001:PTS,
  editor =       "Peter M. G. Apers and Paolo Atzeni and Stefano Ceri
                 and Stefano Paraboschi and Kotagiri Ramamohanarao and
                 Richard T. Snodgrass",
  booktitle =    "Proceedings of the Twenty-seventh International
                 Conference on Very Large Data Bases: Roma, Italy,
                 11--14th September, 2001",
  title =        "Proceedings of the Twenty-seventh International
                 Conference on Very Large Data Bases: Roma, Italy,
                 11--14th September, 2001",
  publisher =    pub-MORGAN-KAUFMANN,
  address =      pub-MORGAN-KAUFMANN:adr,
  pages =        "xviv + 727",
  year =         "2001",
  ISBN =         "1-55860-804-4",
  ISBN-13 =      "978-1-55860-804-7",
  LCCN =         "QA76.9.D3 I559 2001",
  bibsource =    "DBLP; http://dblp.uni-trier.de;
                 http://www.dia.uniroma3.it/vldb2001/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{Attali:2001:JSC,
  editor =       "Isabelle Attali and Thomas Jensen",
  booktitle =    "{Java on smart cards: programming and security: first
                 international workshop, JavaCard 2000, Cannes, France,
                 September 14, 2000: revised papers}",
  title =        "{Java on smart cards: programming and security: first
                 international workshop, JavaCard 2000, Cannes, France,
                 September 14, 2000: revised papers}",
  volume =       "2041",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "x + 162",
  year =         "2001",
  ISBN =         "3-540-42167-X (paperback)",
  ISBN-13 =      "978-3-540-42167-2 (paperback)",
  LCCN =         "QA76.73.J38 J3635 2000; QA267.A1 L43 no.2041",
  bibdate =      "Mon May 6 06:26:30 MDT 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Also available via the World Wide Web.",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2041.htm",
  acknowledgement = ack-nhfb,
  keywords =     "electronic texts; Java (computer program language);
                 online resources",
}

@Proceedings{Attali:2001:SCP,
  editor =       "Isabelle Attali and Thomas Jensen",
  booktitle =    "Smart card programming and security: International
                 Conference on Research in Smart Cards, {E}-smart 2001,
                 Cannes, France, {September19-21}, 2001: proceedings",
  title =        "Smart card programming and security: International
                 Conference on Research in Smart Cards, {E}-smart 2001,
                 Cannes, France, {September19-21}, 2001: proceedings",
  volume =       "2140",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "viii + 254",
  year =         "2001",
  ISBN =         "3-540-42610-8 (paperback)",
  ISBN-13 =      "978-3-540-42610-3 (paperback)",
  LCCN =         "TK7895.S62 I54 2001",
  bibdate =      "Thu Jan 17 11:49:19 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2140.htm",
  acknowledgement = ack-nhfb,
  keywords =     "Java (computer program language); smart cards",
}

@Proceedings{Bigun:2001:AVB,
  editor =       "Josef Bigun and Fabrizio Smeraldi",
  booktitle =    "{Audio-and video-based biometric person
                 authentication: Third International Conference, AVBPA
                 2001, Halmstad, Sweden, June 6--8, 2001: Proceedings}",
  title =        "{Audio-and video-based biometric person
                 authentication: Third International Conference, AVBPA
                 2001, Halmstad, Sweden, June 6--8, 2001: Proceedings}",
  volume =       "2091",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiii + 374",
  year =         "2001",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-42216-1 (paperback)",
  ISBN-13 =      "978-3-540-42216-7 (paperback)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "TK7882.S65 .A944 2001; QA267.A1 L43 no.2091",
  bibdate =      "Thu Jan 17 11:49:19 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2091.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2091",
  acknowledgement = ack-nhfb,
  keywords =     "automatic speech recognition --- congresses; biometry
                 --- congresses; optical pattern recognition --
                 congresses",
}

@Book{Bouwmeester:2001:PQI,
  editor =       "Dirk Bouwmeester and Artur Ekert and Anton Zeilinger",
  booktitle =    "The physics of quantum information: Quantum
                 cryptography, quantum teleportation, quantum
                 computation",
  title =        "The physics of quantum information: Quantum
                 cryptography, quantum teleportation, quantum
                 computation",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xvi + 314",
  year =         "2001",
  ISBN =         "3-540-66778-4",
  ISBN-13 =      "978-3-540-66778-0",
  LCCN =         "QA76.889 .P47 2000",
  bibdate =      "Sat Nov 5 08:49:29 MDT 2011",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/shps-b.bib",
  series =       "Physics and astronomy online library",
  acknowledgement = ack-nhfb,
}

@Proceedings{Boyd:2001:ACA,
  editor =       "Colin Boyd",
  booktitle =    "Advances in cryptology --- {ASIACRYPT} 2001: 7th
                 International Conference on the Theory and Application
                 of Cryptology and Information Security, Gold Coast,
                 Australia, December 9--13, 2001: proceedings",
  title =        "Advances in cryptology --- {ASIACRYPT} 2001: 7th
                 International Conference on the Theory and Application
                 of Cryptology and Information Security, Gold Coast,
                 Australia, December 9--13, 2001: proceedings",
  volume =       "2248",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 601",
  year =         "2001",
  ISBN =         "3-540-42987-5 (paperback)",
  ISBN-13 =      "978-3-540-42987-6 (paperback)",
  LCCN =         "QA76.9.A25 I555 2001",
  bibdate =      "Wed Feb 13 17:10:50 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2248.htm",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; cryptography ---
                 congresses",
}

@Proceedings{Burgess:2001:ISC,
  editor =       "N. Burgess and L. Ciminiera",
  booktitle =    "{15th IEEE Symposium on Computer Arithmetic: ARITH-15
                 2001: proceedings: Vail, Colorado, 11--13 June, 2001}",
  title =        "{15th IEEE Symposium on Computer Arithmetic: ARITH-15
                 2001: proceedings: Vail, Colorado, 11--13 June, 2001}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xii + 285",
  year =         "2001",
  ISBN =         "0-7695-1150-3; 0-7695-1152-X",
  ISBN-13 =      "978-0-7695-1150-4; 978-0-7695-1152-8",
  ISSN =         "1063-6889",
  LCCN =         "QA76.9.C62 S95 2001",
  bibdate =      "Fri May 03 14:20:49 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/elefunt.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  note =         "IEEE order no. PR01150.",
  price =        "US\$145",
  acknowledgement = ack-nhfb,
  keywords =     "ARITH-15",
  xxnote =       "Check dates: 11--13 or 11--17??",
  xxtitle =      "Computer Arithmetic: Papers presented at the {15th
                 IEEE Symposium on Computer Arithmetic (Arith-15 2001),
                 11--17 June, 2001, Vail, CO}",
}

@Proceedings{Christianson:2001:SPI,
  editor =       "Bruce Christianson",
  booktitle =    "{Security protocols: 8th International Workshop,
                 Cambridge, UK, April 3--5, 2000: Revised Papers}",
  title =        "{Security protocols: 8th International Workshop,
                 Cambridge, UK, April 3--5, 2000: Revised Papers}",
  volume =       "2133",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "viii + 255",
  year =         "2001",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-42566-7 (softcover)",
  ISBN-13 =      "978-3-540-42566-3 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA267.A1 L43 no.2133",
  bibdate =      "Thu Jan 17 11:49:19 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2133.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2133",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; computers --- access
                 control --- congresses; cryptography --- congresses",
}

@Proceedings{Eloff:2001:AIS,
  editor =       "Jan H. P. Eloff and Les Labuschagne and Rossouw von
                 Solms",
  booktitle =    "Advances in Information Security Management and Small
                 Systems Security: {IFIP TC11 WG11.1\slash WG11.2}
                 Eighth Annual Working Conference on Information
                 Security Management and Small Systems Security,
                 September 27--28, 2001, Las Vegas, Nevada, {USA}",
  title =        "Advances in Information Security Management and Small
                 Systems Security: {IFIP TC11 WG11.1\slash WG11.2}
                 Eighth Annual Working Conference on Information
                 Security Management and Small Systems Security,
                 September 27--28, 2001, Las Vegas, Nevada, {USA}",
  volume =       "72",
  publisher =    pub-KLUWER,
  address =      pub-KLUWER:adr,
  pages =        "232",
  year =         "2001",
  ISBN =         "0-7923-7506-8",
  ISBN-13 =      "978-0-7923-7506-7",
  LCCN =         "QA76.9.A25 I465 2001",
  bibdate =      "Wed Jan 16 09:32:38 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "UK\pounds 97.00",
  series =       "International Federation for Information Processing",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- management congresses",
}

@Proceedings{Frankel:2001:FCI,
  editor =       "Yair Frankel",
  booktitle =    "{Financial cryptography: 4th International Conference,
                 FC 2000, Anguilla, British West Indies, February
                 20--24, 2000: Proceedings}",
  title =        "{Financial cryptography: 4th International Conference,
                 FC 2000, Anguilla, British West Indies, February
                 20--24, 2000: Proceedings}",
  volume =       "1962",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 378",
  year =         "2001",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-42700-7 (softcover)",
  ISBN-13 =      "978-3-540-42700-1 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA267.A1 L43 no.1962; HG1710 .F35 2000",
  bibdate =      "Thu Jan 17 11:49:19 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t1962.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=1962",
  acknowledgement = ack-nhfb,
  keywords =     "computer networks --- security measures ---
                 congresses; data encryption (computer science) ---
                 congresses; electronic commerce --- security measures
                 congresses; electronic funds transfers --- security
                 measures --- congresses; Internet --- security measures
                 --- congresses",
}

@Book{Hinsley:2001:CIS,
  editor =       "F. H. (Francis Harry) Hinsley and Alan Stripp",
  booktitle =    "Codebreakers: the inside story of {Bletchley Park}",
  title =        "Codebreakers: the inside story of {Bletchley Park}",
  publisher =    pub-OXFORD,
  address =      pub-OXFORD:adr,
  pages =        "xxi + 321 + 8",
  year =         "2001",
  ISBN =         "0-19-280132-5",
  ISBN-13 =      "978-0-19-280132-6",
  LCCN =         "D810.C88 C63 2001",
  bibdate =      "Thu Dec 28 09:44:08 MST 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  remark =       "Originally published: 1993. Includes indexes.",
  subject =      "World War, 1939--1945; Cryptography; Secret service;
                 Great Britain; Electronic intelligence; Personal
                 narratives, British; Cryptography; Electronic
                 intelligence; Secret service; Bletchley Park (Milton
                 Keynes, England); History; England; Milton Keynes;
                 Bletchley Park",
  tableofcontents = "Introduction : The influence of Ultra in the Second
                 World War / F. H. Hinsley \\
                 The production of Ultra intelligence: Life in and out
                 of Hut 3 / William Millward \\
                 The duty officer, Hut 3 / Ralph Bennett \\
                 A naval officer in Hut 3 / Edward Thomas \\
                 The Z Watch in Hut 4, part I / Alec Dakin \\
                 The Z Watch in Hut 4, part II / Walter Eytan \\
                 Italian naval decrypts / Patrick Wilkinson \\
                 Naval Section VI / Vivienne Alford \\
                 Anglo-American signals intelligence co-operation /
                 Telford Taylor \\
                 An American at Bletchley Park / Robert M. Slusser \\
                 Bletchley Park, the Admiralty, and naval Enigma / F. H.
                 Hinsley \\
                 Enigma: The Enigma machine : its mechanism and use /
                 Alan Stripp \\
                 Hut 6 : early days / Stuart Milner-Barry \\
                 Hut 6 : 1941--1945 / Derek Taunt \\
                 Hut 8 and naval Enigma, part I / Joan Murray \\
                 Hut 8 and naval Enigma, part II / Rolf Noskwith \\
                 The Abwehr Enigma / Peter Twinn \\
                 The bombers / Diana Payne \\
                 Fish: An introduction to Fish / F. H. Hinsley \\
                 Enigma and Fish / Jack Good \\
                 The Tunny machine / Ken Halton \\
                 Operation Tunny / Gil Hayward \\
                 Field ciphers and tactical codes: Recollections of
                 Bletchley Park, France, and Cairo / Henry Dryden \\
                 Army Ultra's poor relations / Noel Currer-Briggs \\
                 Navy Ultra's poor relations / Christopher Morris \\
                 Tactical signals of the German Air Force / Peter Gray
                 Lucas \\
                 Japanese codes: Japanese naval codes / Michael Loewe
                 \\
                 Bedford--Bletchley--Kilindini--Colombo / Hugh Denham
                 \\
                 Japanese military codes / Maurice Wiles \\
                 Japanese Army Air Force codes at Bletchley Park and
                 Delhi / Alan Stripp \\
                 Recollections of temps perdu at Bletchley Park / Carmen
                 Blacker \\
                 Appendix: how the Bletchley Park buildings took shape /
                 Bob Watson",
}

@Proceedings{Honary:2001:CCI,
  editor =       "Bahram Honary",
  booktitle =    "Cryptography and coding: 8th {IMA} international
                 conference, Cirencester, {UK}, December 17--19, 2001:
                 proceedings",
  title =        "Cryptography and coding: 8th {IMA} international
                 conference, Cirencester, {UK}, December 17--19, 2001:
                 proceedings",
  volume =       "2260",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "ix + 416",
  year =         "2001",
  ISBN =         "3-540-43026-1",
  ISBN-13 =      "978-3-540-43026-1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA268 .C76 2001",
  bibdate =      "Wed Feb 13 12:10:46 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2260.htm",
  acknowledgement = ack-nhfb,
  keywords =     "coding theory --- congresses; cryptography ---
                 congresses",
}

@Proceedings{IEEE:2001:EIW,
  editor =       "IEEE",
  booktitle =    "{Eighth IEEE Workshop on Hot Topics in Operating
                 Systems (HotOS-VIII). May 20--23, 2001, Schloss Elmau,
                 Germany}",
  title =        "{Eighth IEEE Workshop on Hot Topics in Operating
                 Systems (HotOS-VIII). May 20--23, 2001, Schloss Elmau,
                 Germany}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  year =         "2001",
  ISBN =         "0-7695-1040-X",
  ISBN-13 =      "978-0-7695-1040-8",
  bibdate =      "Mon May 28 08:55:24 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  note =         "IEEE catalog number PR01040.",
  price =        "US\$135.00",
  URL =          "http://computer.org/CSPRESS/CATALOG/pr01040.htm",
}

@Proceedings{IEEE:2001:ISF,
  editor =       "{IEEE}",
  booktitle =    "{42nd IEEE Symposium on Foundations of Computer
                 Science: proceedings: October 14--17, 2001, Las Vegas,
                 Nevada, USA}",
  title =        "{42nd IEEE Symposium on Foundations of Computer
                 Science: proceedings: October 14--17, 2001, Las Vegas,
                 Nevada, USA}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xiii + 670",
  year =         "2001",
  CODEN =        "ASFPDV",
  ISBN =         "0-7695-1390-5, 0-7695-1391-3 (case), 0-7695-1392-1
                 (microfiche)",
  ISBN-13 =      "978-0-7695-1390-4, 978-0-7695-1391-1 (case),
                 978-0-7695-1392-8 (microfiche)",
  ISSN =         "0272-5428",
  LCCN =         "????",
  bibdate =      "Thu Feb 21 19:19:40 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2000.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{Kilian:2001:ACC,
  editor =       "Joe Kilian",
  booktitle =    "Advances in cryptology --- {CRYPTO} 2001: 21st Annual
                 International Cryptology Conference, Santa Barbara,
                 California, {USA}, August 19--23, 2001: proceedings",
  title =        "Advances in cryptology --- {CRYPTO} 2001: 21st Annual
                 International Cryptology Conference, Santa Barbara,
                 California, {USA}, August 19--23, 2001: proceedings",
  volume =       "2139",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 598",
  year =         "2001",
  ISBN =         "3-540-42456-3 (paperback)",
  ISBN-13 =      "978-3-540-42456-7 (paperback)",
  LCCN =         "QA76.9.A25 C79 2001; QA267.A1 L43 no.2139",
  bibdate =      "Thu Jan 17 11:49:19 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  price =        "UK\pounds 47.00",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; cryptography ---
                 congresses",
}

@Proceedings{Kim:2001:PKC,
  editor =       "Kwangjo Kim",
  booktitle =    "{Public key cryptography: 4th International Workshop
                 on Practice and Theory in Public Key Cryptosystems, PKC
                 2001, Cheju Island, Korea, February 13--15, 2001:
                 Proceedings}",
  title =        "{Public key cryptography: 4th International Workshop
                 on Practice and Theory in Public Key Cryptosystems, PKC
                 2001, Cheju Island, Korea, February 13--15, 2001:
                 Proceedings}",
  volume =       "1992",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 421",
  year =         "2001",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-41658-7 (softcover)",
  ISBN-13 =      "978-3-540-41658-6 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 I567 2001; QA267.A1 L43 no.1992",
  bibdate =      "Thu Jan 17 11:49:19 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t1992.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=1992",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; computers --- access
                 control --- congresses; data encryption (computer
                 science) --- congresses; public key cryptography ---
                 congresses",
}

@Proceedings{Koc:2001:CHEa,
  editor =       "{\c{C}}etin K. Ko{\c{c}} and Christof Paar",
  booktitle =    "{Cryptographic hardware and embedded systems --- CHES
                 2000: Second International Workshop, Worcester, MA,
                 USA, August 17--18, 2000: Proceedings}",
  title =        "{Cryptographic hardware and embedded systems --- CHES
                 2000: Second International Workshop, Worcester, MA,
                 USA, August 17--18, 2000: Proceedings}",
  volume =       "1965",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 354",
  year =         "2001",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-41455-X (softcover)",
  ISBN-13 =      "978-3-540-41455-1 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "TK7895.E42 C454 2000",
  bibdate =      "Thu Jan 17 11:49:19 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t1965.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=1965",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; cryptography --
                 congresses; embedded computer systems --- congresses",
}

@Proceedings{Koc:2001:CHEb,
  editor =       "{\c{C}}etin K. Ko{\c{c}} and David Naccache and
                 Christof Paar",
  booktitle =    "{Cryptographic hardware and embedded systems --- CHES
                 2001: Third International Workshop, Paris, France, May
                 14--16, 2001: Proceedings}",
  title =        "{Cryptographic hardware and embedded systems --- CHES
                 2001: Third International Workshop, Paris, France, May
                 14--16, 2001: Proceedings}",
  volume =       "2162",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiv + 410",
  year =         "2001",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-42521-7",
  ISBN-13 =      "978-3-540-42521-2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "TK7895.E42 C454 2001; QA267.A1 L43 no.2162",
  bibdate =      "Thu Jan 17 11:49:19 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS # " and " # ser-LNAI,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2162.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2162",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; cryptography --
                 congresses; embedded computer systems --- congresses",
}

@Proceedings{Naccache:2001:TCC,
  editor =       "David Naccache",
  booktitle =    "{Topics in cryptology, CT-RSA 2001: the
                 Cryptographers' Track at RSA Conference 2001, San
                 Francisco, CA, USA, April 8--12, 2001: Proceedings}",
  title =        "{Topics in cryptology, CT-RSA 2001: the
                 Cryptographers' Track at RSA Conference 2001, San
                 Francisco, CA, USA, April 8--12, 2001: Proceedings}",
  volume =       "2020",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xii + 471",
  year =         "2001",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-41898-9 (paperback)",
  ISBN-13 =      "978-3-540-41898-6 (paperback)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA267.A1 L43 no.2020; QA76.9.A25 R753 2001",
  bibdate =      "Thu Jan 17 11:49:19 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2020.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2020",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; cryptography ---
                 congresses",
}

@Proceedings{Pfitzmann:2001:ACE,
  editor =       "Birgit Pfitzmann",
  booktitle =    "Advances in cryptology: {EUROCRYPT} 2001:
                 International Conference on the Theory and Application
                 of Cryptographic Techniques, Innsbruck, Austria, May
                 6--10, 2001: proceedings",
  title =        "Advances in cryptology: {EUROCRYPT} 2001:
                 International Conference on the Theory and Application
                 of Cryptographic Techniques, Innsbruck, Austria, May
                 6--10, 2001: proceedings",
  volume =       "2045",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xii + 544",
  day =          "25",
  month =        apr,
  year =         "2001",
  ISBN =         "3-540-42070-3",
  ISBN-13 =      "978-3-540-42070-5",
  LCCN =         "QA76.9.A25 E964 2001; QA76.9.A25 E96 2001",
  bibdate =      "Thu Jan 17 11:49:19 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2045.htm;
                 http://link.springer.de/link/service/series/0558/tocs/t2045.htm",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- congresses; data encryption (computer
                 science) --- congresses",
}

@Proceedings{Rangan:2001:PCI,
  editor =       "C. Pandu Rangan and C. Ding",
  booktitle =    "Progress in cryptology: {INDOCRYPT} 2001: Second
                 International Conference on Cryptology in India,
                 Chennai, India, December 16--20, 2001: proceedings",
  title =        "Progress in cryptology: {INDOCRYPT} 2001: Second
                 International Conference on Cryptology in India,
                 Chennai, India, December 16--20, 2001: proceedings",
  volume =       "2247",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiii + 349",
  year =         "2001",
  ISBN =         "3-540-43010-5",
  ISBN-13 =      "978-3-540-43010-0",
  LCCN =         "QA76.9.A25 I5535 2001",
  bibdate =      "Thu Jan 17 16:49:16 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2247.htm",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; cryptography ---
                 congresses",
}

@Proceedings{Schmalz:2001:MDI,
  editor =       "Mark S. Schmalz",
  booktitle =    "{Mathematics of data\slash image coding, compression,
                 and encryption IV, with applications: 30--31 July,
                 2001, San Diego, [California] USA}",
  title =        "{Mathematics of data\slash image coding, compression,
                 and encryption IV, with applications: 30--31 July,
                 2001, San Diego, [California] USA}",
  volume =       "4475",
  publisher =    pub-SPIE,
  address =      pub-SPIE:adr,
  pages =        "ix + 286",
  year =         "2001",
  ISBN =         "0-8194-4189-9",
  ISBN-13 =      "978-0-8194-4189-8",
  LCCN =         "TA1637 .M375 2001",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Previous conference has title: Mathematics and
                 applications of data/image coding, compression, and
                 encryption III",
  series =       "SPIE proceedings series",
  acknowledgement = ack-nhfb,
  keywords =     "data encryption (computer science) --- congresses;
                 image compression --- congresses; image processing ---
                 digital techniques --- congresses; image processing ---
                 mathematics --- congresses",
}

@Proceedings{Schneier:2001:FSE,
  editor =       "Bruce Schneier",
  booktitle =    "{Fast software encryption: 7th International Workshop,
                 FSE 2000, New York, NY, USA, April 10--12, 2000:
                 Proceedings}",
  title =        "{Fast software encryption: 7th International Workshop,
                 FSE 2000, New York, NY, USA, April 10--12, 2000:
                 Proceedings}",
  volume =       "1978",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "viii + 313",
  year =         "2001",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-41728-1",
  ISBN-13 =      "978-3-540-41728-6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA267.A1 L43 no. 1978",
  bibdate =      "Wed Jan 16 10:50:16 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t1978.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=1978",
  acknowledgement = ack-nhfb,
}

@Proceedings{Silverman:2001:CLI,
  editor =       "Joseph H. Silverman",
  booktitle =    "{Cryptography and lattices: International Conference,
                 CaLC 2001, Providence RI, USA, March 29--30, 2001:
                 Revised Papers}",
  title =        "{Cryptography and lattices: International Conference,
                 CaLC 2001, Providence RI, USA, March 29--30, 2001:
                 Revised Papers}",
  volume =       "2146",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "vi + 217",
  year =         "2001",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-42488-1 (paperback)",
  ISBN-13 =      "978-3-540-42488-8 (paperback)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA268 .C35 2001; QA267.A1 L43 no.2146",
  bibdate =      "Thu Jan 17 11:49:19 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS # " and " # ser-LNAI,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2146.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2146",
  acknowledgement = ack-nhfb,
  keywords =     "coding theory --- congresses; cryptography ---
                 congresses; lattice theory --- congresses",
}

@Proceedings{Stinson:2001:SAC,
  editor =       "Douglas R. Stinson and Stafford Tavares",
  booktitle =    "Selected areas in cryptography: 7th annual
                 international workshop, {SAC} 2000, Waterloo, Ontario,
                 Canada, August 14--15, 2000: proceedings",
  title =        "Selected areas in cryptography: 7th annual
                 international workshop, {SAC} 2000, Waterloo, Ontario,
                 Canada, August 14--15, 2000: proceedings",
  volume =       "2012",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "ix + 338",
  year =         "2001",
  ISBN =         "3-540-42069-X (paperback)",
  ISBN-13 =      "978-3-540-42069-9 (paperback)",
  LCCN =         "QA76.9.A25 S22 2000; QA267.A1 L43 no.2012",
  bibdate =      "Thu Jan 17 11:49:19 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2012.htm",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; data encryption
                 (computer science) --- congresses",
}

@Proceedings{Tian:2001:ICE,
  editor =       "Jun Tian and Tieniu Tan and Liangpei Zhang",
  booktitle =    "Image compression and encryption technologies: {22--24
                 October 2001, Wuhan, China}",
  title =        "Image compression and encryption technologies: {22--24
                 October 2001, Wuhan, China}",
  volume =       "4551",
  publisher =    pub-SPIE,
  address =      pub-SPIE:adr,
  pages =        "xii + 284",
  year =         "2001",
  ISBN =         "0-8194-4279-8",
  ISBN-13 =      "978-0-8194-4279-6",
  LCCN =         "TK5105.59 .I43 2001",
  bibdate =      "Thu Apr 4 08:00:09 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "SPIE proceedings series",
  acknowledgement = ack-nhfb,
  keywords =     "computer networks --- security measures ---
                 congresses; data encryption (computer science) ---
                 congresses; image compression --- congresses",
}

@Proceedings{USENIX:2001:PFT,
  editor =       "{USENIX}",
  booktitle =    "Proceedings of the {FREENIX} Track: 2001 {USENIX}
                 Annual Technical Conference: June 25--30, 2001,
                 Marriott Copley Place Hotel, Boston, Massachusetts,
                 {USA}",
  title =        "Proceedings of the {FREENIX} Track: 2001 {USENIX}
                 Annual Technical Conference: June 25--30, 2001,
                 Marriott Copley Place Hotel, Boston, Massachusetts,
                 {USA}",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  pages =        "346",
  year =         "2001",
  ISBN =         "1-880446-10-3",
  ISBN-13 =      "978-1-880446-10-2",
  LCCN =         "QA76.8.U65 U84 2001",
  bibdate =      "Mon Oct 14 07:43:52 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/usenix01/freenix01/technical.html",
  acknowledgement = ack-nhfb,
}

@Proceedings{USENIX:2001:PTU,
  editor =       "{USENIX}",
  booktitle =    "Proceedings of the Tenth {USENIX} Security Symposium,
                 August 13--17, 2001, Washington, {DC}, {USA}",
  title =        "Proceedings of the Tenth {USENIX} Security Symposium,
                 August 13--17, 2001, Washington, {DC}, {USA}",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  pages =        "363",
  year =         "2001",
  ISBN =         "1-880446-18-9, 1-880446-07-3",
  ISBN-13 =      "978-1-880446-18-8, 978-1-880446-07-2",
  LCCN =         "QA76.9.A25 U565 2001",
  bibdate =      "Tue Oct 15 16:46:48 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/sec01/technical.html",
  acknowledgement = ack-nhfb,
}

@Proceedings{USENIX:2001:PUA,
  editor =       "{USENIX}",
  booktitle =    "Proceedings of the 2001 {USENIX} Annual Technical
                 Conference: June 25--30, 2001, Marriott Copley Place
                 Hotel, Boston, Massachusetts, {USA}",
  title =        "Proceedings of the 2001 {USENIX} Annual Technical
                 Conference: June 25--30, 2001, Marriott Copley Place
                 Hotel, Boston, Massachusetts, {USA}",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  pages =        "346",
  year =         "2001",
  ISBN =         "1-880446-09-X",
  ISBN-13 =      "978-1-880446-09-6",
  LCCN =         "QA76.8.U65 U84 2001",
  bibdate =      "Mon Oct 14 07:43:52 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/usenix01/technical.html",
  acknowledgement = ack-nhfb,
}

@Proceedings{Vaudenay:2001:SAC,
  editor =       "Serge Vaudenay and Amr M. Youssef",
  booktitle =    "Selected Areas in Cryptography: 8th Annual
                 International Workshop, {SAC 2001}, Toronto, Ontario,
                 Canada, August 16--17, 20001: proceedings",
  title =        "Selected Areas in Cryptography: 8th Annual
                 International Workshop, {SAC} 2001, Toronto, Ontario,
                 Canada, August 16--17, 20001: proceedings",
  volume =       "2259",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 357",
  year =         "2001",
  ISBN =         "3-540-43066-0",
  ISBN-13 =      "978-3-540-43066-7",
  LCCN =         "QA76.9.A25 S22 2001",
  bibdate =      "Fri Mar 08 07:38:18 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
}

@Proceedings{Won:2001:ISC,
  editor =       "Dongho Won",
  booktitle =    "{Information security and cryptology: ICISC 2000,
                 Third International Conference, Seoul, Korea, December
                 8--9, 2000: Proceedings}",
  title =        "{Information security and cryptology: ICISC 2000,
                 Third International Conference, Seoul, Korea, December
                 8--9, 2000: Proceedings}",
  volume =       "2015",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "x + 260",
  year =         "2001",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-41782-6 (softcover)",
  ISBN-13 =      "978-3-540-41782-8 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 I32 2000; QA267.A1 L43 no.2015",
  bibdate =      "Thu Jan 17 11:49:19 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2015.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2015",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; cryptography ---
                 congresses",
}

@Proceedings{ACM:2002:PTF,
  editor =       "{ACM}",
  booktitle =    "Proceedings of the Thiry-Fourth Annual {ACM} Symposium
                 on Theory of Computing, Montr{\'e}al, Qu{\'e}bec,
                 Canada, May 19--21, 2002",
  title =        "Proceedings of the Thiry-Fourth Annual {ACM} Symposium
                 on Theory of Computing, Montr{\'e}al, Qu{\'e}bec,
                 Canada, May 19--21, 2002",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "xv + 824",
  year =         "2002",
  ISBN =         "1-58113-495-9",
  ISBN-13 =      "978-1-58113-495-7",
  LCCN =         "QA75.5 .A22 2002",
  bibdate =      "Tue Jan 13 06:29:11 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "ACM order number 508020.",
  acknowledgement = ack-nhfb,
}

@Book{Anonymous:2002:QCQ,
  editor =       "Anonymous",
  booktitle =    "Quantum computation and quantum cryptography",
  title =        "Quantum computation and quantum cryptography",
  volume =       "34(4)",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "309--559",
  year =         "2002",
  CODEN =        "ALGOEJ",
  ISSN =         "0178-4617 (print), 1432-0541 (electronic)",
  ISSN-L =       "0178-4617",
  MRclass =      "68-06 (00B15 81P68 94A60)",
  MRnumber =     "MR1943509",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/index-table-a.html#algorithmica;
                 MathSciNet database",
  series =       j-ALGORITHMICA,
}

@Proceedings{Bernstein:2002:VPT,
  editor =       "Philip A. Bernstein and others",
  booktitle =    "{VLDP 2002}: proceedings of the Twenty-Eighth
                 International Conference on Very Large Data Bases, Hong
                 Kong {SAR}, China, 20--23 August 2002",
  title =        "{VLDP 2002}: proceedings of the Twenty-Eighth
                 International Conference on Very Large Data Bases, Hong
                 Kong {SAR}, China, 20--23 August 2002",
  publisher =    pub-MORGAN-KAUFMANN,
  address =      pub-MORGAN-KAUFMANN:adr,
  pages =        "xxvi + 1118",
  year =         "2002",
  ISBN =         "1-55860-869-9",
  ISBN-13 =      "978-1-55860-869-6",
  LCCN =         "????",
  bibdate =      "Mon Dec 22 18:37:23 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{Bertlmann:2002:QUB,
  editor =       "Reinhold A. Bertlmann and Anton Zeilinger",
  booktitle =    "{Quantum [Un]speakables: From Bell to Quantum
                 Information: Conference in Commemoration of the
                 Physicist John S. Bell, 10--14 November 2000, Vienna}",
  title =        "{Quantum [Un]speakables: From Bell to Quantum
                 Information: Conference in Commemoration of the
                 Physicist John S. Bell, 10--14 November 2000, Vienna}",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xxii + 483",
  year =         "2002",
  ISBN =         "3-540-42756-2",
  ISBN-13 =      "978-3-540-42756-8",
  LCCN =         "????",
  bibdate =      "Thu Jun 14 06:22:25 2012",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/s/schroedinger-erwin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  subject-dates = "John S. Bell (1928--1990)",
}

@Proceedings{Christianson:2002:SPI,
  editor =       "Bruce Christianson and Bruno Crispo and James A.
                 Malcolm and Michael Roe",
  booktitle =    "{Security Protocols: 9th International Workshop
                 Cambridge, UK, April 25--27, 2001. Revised Papers}",
  title =        "{Security Protocols: 9th International Workshop
                 Cambridge, UK, April 25--27, 2001. Revised Papers}",
  volume =       "2467",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "ix + 238",
  year =         "2002",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-44263-4",
  ISBN-13 =      "978-3-540-44263-9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 S443 2002",
  bibdate =      "Thu Nov 11 19:26:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2467.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2467",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; computers --- access
                 control --- congresses; cryptography --- congresses",
  xxbooktitle =  "{Security protocols: 9th International Workshop,
                 Cambridge, {UK}, April 25--27, 2001: Revised Papers}",
  xxtitle =      "{Security protocols: 9th International Workshop,
                 Cambridge, {UK}, April 25--27, 2001: Revised Papers}",
}

@Proceedings{Daemen:2002:FSE,
  editor =       "Joan Daemen and Vincent Rijmen",
  booktitle =    "{Fast software encryption: 9th International Workshop,
                 FSE 2002, Leuven, Belgium, February 4--6, 2002: Revised
                 Papers}",
  title =        "{Fast Software Encryption: 9th International Workshop,
                 FSE 2002, Leuven, Belgium, February 4--6, 2002. Revised
                 Papers}",
  volume =       "2365",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 276",
  year =         "2002",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-44009-7 (softcover)",
  ISBN-13 =      "978-3-540-44009-3 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 F77 2002b",
  bibdate =      "Thu Nov 11 19:26:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2365.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2365",
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control --- passwords ---
                 congresses; data encryption (computer science) ---
                 congresses",
}

@Proceedings{Desmedt:2002:PKC,
  editor =       "Yvo G. Desmedt",
  booktitle =    "{Public Key Cryptography---PKC 2003: 6th International
                 Workshop on Practice and Theory in Public Key
                 Cryptography Miami, FL, USA, January 6--8, 2003.
                 Proceedings}",
  title =        "{Public Key Cryptography---PKC 2003: 6th International
                 Workshop on Practice and Theory in Public Key
                 Cryptography Miami, FL, USA, January 6--8, 2003.
                 Proceedings}",
  volume =       "2567",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 364",
  year =         "2002",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-00324-X (softcover)",
  ISBN-13 =      "978-3-540-00324-3 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 I567 2003",
  bibdate =      "Thu Nov 11 19:26:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Also available via the World Wide Web.",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2567.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2567",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; computers --- access
                 control --- congresses; data encryption (computer
                 science) --- congresses; public key cryptography ---
                 congresses",
}

@Proceedings{Franklin:2002:PAS,
  editor =       "Michael Franklin and Bongki Moon and Anastassia
                 Ailamaki",
  booktitle =    "Proceedings of the {ACM} {SIGMOD} International
                 Conference on Management of Data, June 3--6, 2002,
                 Madison, {WI}, {USA}",
  title =        "Proceedings of the {ACM} {SIGMOD} International
                 Conference on Management of Data, June 3--6, 2002,
                 Madison, {WI}, {USA}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "xiv + 641",
  year =         "2002",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Fri Oct 31 08:15:18 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "ACM order number 475020.",
  acknowledgement = ack-nhfb,
}

@Proceedings{IEEE:2002:PAI,
  editor =       "{IEEE}",
  booktitle =    "{Proceedings of the 43rd Annual IEEE Symposium on
                 Foundations of Computer Science, FOCS 2002, Vancouver,
                 BC, Canada, 16--19 November 2002}",
  title =        "{Proceedings of the 43rd Annual IEEE Symposium on
                 Foundations of Computer Science, FOCS 2002, Vancouver,
                 BC, Canada, 16--19 November 2002}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xvi + 813",
  year =         "2002",
  CODEN =        "ASFPDV",
  DOI =          "https://doi.org/10.1109/SFCS.2002.1181875",
  ISBN =         "0-7695-1822-2",
  ISBN-13 =      "978-0-7695-1822-0",
  ISSN =         "0272-5428",
  LCCN =         "QA267",
  bibdate =      "Fri Jul 15 14:24:23 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "IEEE Computer Society Order Number PR01822",
  URL =          "http://ieeexplore.ieee.org/iel5/8411/26517/01181875.pdf",
  acknowledgement = ack-nhfb,
}

@Proceedings{Kaliski:2002:CHE,
  editor =       "Burton S. {Kaliski Jr.} and {\c{C}}etin K. Ko{\c{c}}
                 and Christof Paar",
  booktitle =    "{Cryptographic Hardware and Embedded Systems---CHES
                 2002: 4th International Workshop Redwood Shores, CA,
                 USA, August 13--15, 20. Revised Papers}",
  title =        "{Cryptographic Hardware and Embedded Systems---CHES
                 2002: 4th International Workshop Redwood Shores, CA,
                 USA, August 13--15, 20. Revised Papers}",
  volume =       "2523",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiv + 609",
  year =         "2002",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-00409-2 (softcover)",
  ISBN-13 =      "978-3-540-00409-7 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "TK7895.E42 C454 2002",
  bibdate =      "Thu Nov 11 19:26:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Also available via the World Wide Web.",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2523.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2523",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; cryptography ---
                 congresses; embedded computer systems --- congresses",
}

@Proceedings{Kim:2002:ISC,
  editor =       "Kwangjo Kim",
  booktitle =    "{Information security and cryptology --- ICISC 2001:
                 4th International Conference, Seoul, Korea, December
                 6--7, 2001: Proceedings}",
  title =        "{Information security and cryptology --- ICISC 2001:
                 4th International Conference, Seoul, Korea, December
                 6--7, 2001: Proceedings}",
  volume =       "2288",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiii + 456",
  year =         "2002",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-43319-8 (paperback)",
  ISBN-13 =      "978-3-540-43319-4 (paperback)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 I32 2001",
  bibdate =      "Wed Sep 11 11:56:55 MDT 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2288.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2288",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; cryptography
                 congresses",
}

@Proceedings{Knudsen:2002:ACE,
  editor =       "Lars Knudsen",
  booktitle =    "{Advances in Cryptology---EUROCRYPT 2002:
                 International Conference on the Theory and Applications
                 of Cryptographic Techniques, Amsterdam, The
                 Netherlands, April 28--May 2, 2002. Proceedings}",
  title =        "{Advances in Cryptology---EUROCRYPT 2002:
                 International Conference on the Theory and Applications
                 of Cryptographic Techniques, Amsterdam, The
                 Netherlands, April 28--May 2, 2002. Proceedings}",
  volume =       "2332",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xii + 545",
  year =         "2002",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-43553-0 (softcover)",
  ISBN-13 =      "978-3-540-43553-2 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 E964 2002",
  bibdate =      "Thu Nov 11 19:26:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2332.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2332",
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control --- congresses;
                 cryptography --- congresses; data transmission systems
                 --- security measures --- congresses",
}

@Proceedings{Matsui:2002:FSE,
  editor =       "Mitsuru Matsui",
  booktitle =    "{Fast software encryption: 8th International Workshop,
                 FSE 2001, Yokohama, Japan, April 2--4, 2001: Revised
                 Papers}",
  title =        "{Fast software encryption: 8th International Workshop,
                 FSE 2001, Yokohama, Japan, April 2--4, 2001: Revised
                 Papers}",
  volume =       "2355",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "ix + 350",
  year =         "2002",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-43869-6 (softcover)",
  ISBN-13 =      "978-3-540-43869-4 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 F77 2002",
  bibdate =      "Thu Nov 11 19:26:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2355.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2355",
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control --- passwords ---
                 congresses",
}

@Proceedings{Menezes:2002:PCI,
  editor =       "A. J. (Alfred J.) Menezes and Palash Sarkar",
  booktitle =    "{Progress in cryptology: INDOCRYPT 2002: Third
                 International Conference on Cryptology in India,
                 Hyderabad, India, December 16--18, 2002: Proceedings}",
  title =        "{Progress in cryptology: INDOCRYPT 2002: Third
                 International Conference on Cryptology in India,
                 Hyderabad, India, December 16--18, 2002: Proceedings}",
  volume =       "2551",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 435",
  year =         "2002",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-00263-4 (softcover)",
  ISBN-13 =      "978-3-540-00263-5 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 I5535 2002",
  bibdate =      "Thu Nov 11 19:26:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Also available via the World Wide Web.",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2551.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2551",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; cryptography ---
                 congresses",
}

@Proceedings{Naccache:2002:PKC,
  editor =       "David Naccache and Pascal Paillier",
  booktitle =    "{Public key cryptography: 4th [i.e., 5th]
                 International Workshop on Practice and Theory in Public
                 Key Cryptosystems, PKC 2002, Paris, France, February
                 12--14, 2002: Proceedings}",
  title =        "{Public key cryptography: 4th [i.e., 5th]
                 International Workshop on Practice and Theory in Public
                 Key Cryptosystems, PKC 2002, Paris, France, February
                 12--14, 2002: Proceedings}",
  volume =       "2274",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 383",
  year =         "2002",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-43168-3",
  ISBN-13 =      "978-3-540-43168-8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 I567 2002",
  bibdate =      "Wed Sep 11 11:56:55 MDT 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2274.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2274",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; computers --- access
                 control --- congresses; data encryption (computer
                 science) --- congresses; public key cryptography ---
                 congresses",
}

@Proceedings{Preneel:2002:TCC,
  editor =       "Bart Preneel",
  booktitle =    "{Topics in cryptology, CT-RSA 2002: the
                 Cryptographers' Track at RSA Conference 2002, San Jose,
                 CA, USA, February 18--22, 2002: Proceedings}",
  title =        "{Topics in cryptology, CT-RSA 2002: the
                 Cryptographers' Track at RSA Conference 2002, San Jose,
                 CA, USA, February 18--22, 2002: Proceedings}",
  volume =       "2271",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "x + 309",
  year =         "2002",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-43224-8",
  ISBN-13 =      "978-3-540-43224-1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 R753 2002",
  bibdate =      "Wed Sep 11 11:56:55 MDT 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2271.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2271",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; cryptography ---
                 congresses",
}

@Proceedings{Syverson:2002:FCI,
  editor =       "Paul F. Syverson",
  booktitle =    "{Financial Cryptography: 5th International Conference,
                 FC 2001, Grand Cayman, British West Indies, February
                 19--22, 2001. Proceedings}",
  title =        "{Financial Cryptography: 5th International Conference,
                 FC 2001, Grand Cayman, British West Indies, February
                 19--22, 2001. Proceedings}",
  volume =       "2339",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "ix + 377",
  year =         "2002",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-44079-8 (softcover)",
  ISBN-13 =      "978-3-540-44079-6 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "HG1710 .F35 2001",
  bibdate =      "Thu Nov 11 19:26:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2339.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2339",
  acknowledgement = ack-nhfb,
}

@Proceedings{Tistarelli:2002:BAI,
  editor =       "Massimo Tistarelli and Josef Bigun and Anil K. Jain",
  booktitle =    "{Biometric authentication: International ECCV 2002
                 Workshop, Copenhagen, Denmark, June 1, 2002:
                 Proceedings}",
  title =        "{Biometric authentication: International ECCV 2002
                 Workshop, Copenhagen, Denmark, June 1, 2002:
                 Proceedings}",
  volume =       "2359",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xii + 372",
  year =         "2002",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-43723-1 (softcover)",
  ISBN-13 =      "978-3-540-43723-9 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "TK7882.P3 I568 2002",
  bibdate =      "Wed Sep 11 11:56:55 MDT 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2359.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2359",
  acknowledgement = ack-nhfb,
  keywords =     "biometric identification congresses; identification --
                 automation congresses; pattern recognition systems --
                 congresses",
}

@Proceedings{USENIX:2002:PBF,
  editor =       "{USENIX}",
  booktitle =    "Proceedings of {BSDCon 2002}: February 11--14, 2002,
                 Cathedral Hill Hotel, San Francisco, {CA}",
  title =        "Proceedings of {BSDCon} 2002: February 11--14, 2002,
                 Cathedral Hill Hotel, San Francisco, {CA}",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  pages =        "viii + 151",
  year =         "2002",
  ISBN =         "1-880446-02-2",
  ISBN-13 =      "978-1-880446-02-7",
  LCCN =         "QA76.76.O63 B736 2002",
  bibdate =      "Tue Oct 15 12:45:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/bsdcon02/tech.html",
  acknowledgement = ack-nhfb,
}

@Proceedings{USENIX:2002:PFT,
  editor =       "{USENIX}",
  booktitle =    "Proceedings of the {FREENIX} Track: 2002 {USENIX}
                 Annual Technical Conference, June 10--15, 2002,
                 Monterey, California, {USA}",
  title =        "Proceedings of the {FREENIX} Track: 2002 {USENIX}
                 Annual Technical Conference, June 10--15, 2002,
                 Monterey, California, {USA}",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  pages =        "308",
  year =         "2002",
  ISBN =         "1-880446-01-4",
  ISBN-13 =      "978-1-880446-01-0",
  LCCN =         "QA76.8.U65 P765 2002",
  bibdate =      "Tue Oct 15 11:36:01 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/usenix2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/usenix02/",
  acknowledgement = ack-nhfb,
}

@Proceedings{USENIX:2002:PUS,
  editor =       "{USENIX}",
  booktitle =    "Proceedings of the 11th {USENIX} Security Symposium
                 2002, August 5--9, 2002, San Francisco, {CA}",
  title =        "Proceedings of the 11th {USENIX} Security Symposium
                 2002, August 5--9, 2002, San Francisco, {CA}",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  pages =        "ix + 353",
  year =         "2002",
  ISBN =         "1-931971-00-5",
  ISBN-13 =      "978-1-931971-00-3",
  LCCN =         "????",
  bibdate =      "Tue Oct 15 07:55:57 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://www.usenix.org/publications/library/proceedings/sec02/",
  acknowledgement = ack-nhfb,
}

@Proceedings{Yung:2002:ACC,
  editor =       "Moti Yung",
  booktitle =    "Advances in cryptology --- {CRYPTO 2002}: 22nd Annual
                 International Cryptology Conference, Santa Barbara,
                 California, {USA}, August 18--22, 2002: Proceedings",
  title =        "Advances in cryptology --- {CRYPTO 2002}: 22nd Annual
                 International Cryptology Conference, Santa Barbara,
                 California, {USA}, August 18--22, 2002: Proceedings",
  volume =       "2442",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiv + 626",
  year =         "2002",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-44050-X (paperback)",
  ISBN-13 =      "978-3-540-44050-5 (paperback)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 C79 2002",
  bibdate =      "Thu Nov 11 19:26:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS # " and " # ser-LNAI,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2442.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2442",
  acknowledgement = ack-nhfb,
  keywords =     "computer security -- congresses; cryptography ---
                 congresses",
}

@Proceedings{Zheng:2002:ACA,
  editor =       "Yuliang Zheng",
  booktitle =    "{Advances in Cryptology---ASIACRYPT 2002: 8th
                 International Conference on the Theory and Application
                 of Cryptology and Information Security, Queenstown, New
                 Zealand, December 1--5, 2002. Proceedings}",
  title =        "{Advances in Cryptology---ASIACRYPT 2002: 8th
                 International Conference on the Theory and Application
                 of Cryptology and Information Security, Queenstown, New
                 Zealand, December 1--5, 2002. Proceedings}",
  volume =       "2501",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiii + 578",
  year =         "2002",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-00171-9 (paperback)",
  ISBN-13 =      "978-3-540-00171-3 (paperback)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 I555 2002",
  bibdate =      "Thu Nov 11 19:26:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Also available via the World Wide Web.",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2501.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2501",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; cryptography ---
                 congresses",
}

@Proceedings{ACM:2003:PAS,
  editor =       "{ACM}",
  booktitle =    "{Proceedings of the 2003 ACM SIGMOD International
                 Conference on Management of Data 2003, San Diego,
                 California, June 09--12, 2003}",
  title =        "{Proceedings of the 2003 ACM SIGMOD International
                 Conference on Management of Data 2003, San Diego,
                 California, June 09--12, 2003}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "xvi + 687",
  year =         "2003",
  ISBN =         "1-58113-634-X",
  ISBN-13 =      "978-1-58113-634-0",
  LCCN =         "????",
  bibdate =      "Fri Oct 31 08:24:52 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{ACM:2003:PTF,
  editor =       "{ACM}",
  booktitle =    "{Proceedings of the Thirty-Fifth ACM Symposium on
                 Theory of Computing, San Diego, CA, USA, June 9--11,
                 2003}",
  title =        "{Proceedings of the Thirty-Fifth ACM Symposium on
                 Theory of Computing, San Diego, CA, USA, June 9--11,
                 2003}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "xii + 728",
  year =         "2003",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "QA75.5 .A22 2003",
  bibdate =      "Tue Jan 13 06:29:11 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "ACM order number 508030.",
  acknowledgement = ack-nhfb,
}

@Proceedings{ACM:2003:PTS,
  editor =       "{ACM}",
  booktitle =    "{Proceedings of the Twenty-Second ACM
                 SIGMOD-SIGACT-SIGART Symposium on Principles of
                 Database Systems: PODS 2003: San Diego, Calif., June
                 9--11, 2003}",
  title =        "{Proceedings of the Twenty-Second ACM
                 SIGMOD-SIGACT-SIGART Symposium on Principles of
                 Database Systems: PODS 2003: San Diego, Calif., June
                 9--11, 2003}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "viii + 308",
  year =         "2003",
  ISBN =         "1-58113-670-6",
  ISBN-13 =      "978-1-58113-670-8",
  LCCN =         "QA76.9.D3 A296 2003",
  bibdate =      "Fri Oct 31 08:19:07 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "ACM order number 475030",
  acknowledgement = ack-nhfb,
}

@Proceedings{Bajard:2003:ISC,
  editor =       "Jean Claude Bajard and Michael Schulte",
  booktitle =    "{16th IEEE Symposium on Computer Arithmetic: ARITH-16
                 2003: proceedings: Santiago de Compostela, Spain, June
                 15--18, 2003}",
  title =        "{16th IEEE Symposium on Computer Arithmetic: ARITH-16
                 2003: proceedings: Santiago de Compostela, Spain, June
                 15--18, 2003}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "????",
  year =         "2003",
  ISBN =         "0-7695-1894-X",
  ISBN-13 =      "978-0-7695-1894-7",
  ISSN =         "1063-6889",
  LCCN =         "????",
  bibdate =      "Sat Jul 20 17:45:12 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "IEEE order no. PR01894.",
  URL =          "http://www.dec.usc.es/arith16/",
  acknowledgement = ack-nhfb,
}

@Proceedings{Biham:2003:ACE,
  editor =       "Eli Biham",
  booktitle =    "{Advances in cryptology --- EUROCRYPT 2003:
                 International Conference on the Theory and Applications
                 of Cryptographic Techniques, Warsaw, Poland, May 4--8,
                 2003: Proceedings}",
  title =        "{Advances in cryptology --- EUROCRYPT 2003:
                 International Conference on the Theory and Applications
                 of Cryptographic Techniques, Warsaw, Poland, May 4--8,
                 2003: Proceedings}",
  volume =       "2656",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiv + 648",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-14039-5 (paperback)",
  ISBN-13 =      "978-3-540-14039-9 (paperback)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 E964 2003",
  bibdate =      "Thu Aug 21 09:09:03 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Also available via the World Wide Web.",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2656.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2656",
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control --- congresses;
                 cryptography --- congresses; data transmission systems
                 --- security measures --- congresses",
}

@Proceedings{Blaze:2003:FCI,
  editor =       "Matt Blaze",
  booktitle =    "{Financial cryptography: 6th International Conference,
                 FC 2002, Southampton, Bermuda, March 11--14, 2002:
                 Revised Papers}",
  title =        "{Financial cryptography: 6th International Conference,
                 FC 2002, Southampton, Bermuda, March 11--14, 2002:
                 Revised Papers}",
  volume =       "2357",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "viii + 299",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-00646-X (softcover)",
  ISBN-13 =      "978-3-540-00646-6 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "HG1710 .F35 2002",
  bibdate =      "Thu Aug 21 09:09:03 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2357.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2357",
  acknowledgement = ack-nhfb,
  keywords =     "computer networks --- security measures congresses;
                 data encryption (computer science) --- congresses;
                 electronic commerce --- security measures congresses;
                 electronic funds transfers --- security measures ---
                 congresses; Internet --- security measures congresses",
}

@Proceedings{Boneh:2003:ACC,
  editor =       "Dan Boneh",
  booktitle =    "Advances in {Cryptology---CRYPTO 2003}: 23rd Annual
                 International Cryptology Conference Santa Barbara,
                 California, {USA}, August 17--21, 2003 Proceedings",
  title =        "Advances in Cryptology---{CRYPTO 2003}: 23rd Annual
                 International Cryptology Conference Santa Barbara,
                 California, {USA}, August 17--21, 2003 Proceedings",
  volume =       "2729",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xii + 630",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b11817",
  ISBN =         "3-540-40674-3",
  ISBN-13 =      "978-3-540-40674-7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 C79 2003",
  bibdate =      "Thu Nov 18 18:53:10 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2729.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2729;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b11817",
  acknowledgement = ack-nhfb,
}

@Proceedings{Cimato:2003:SCN,
  editor =       "Stelvio Cimato and Clemente Galdi and Guiseppe
                 Persiano",
  booktitle =    "{Security in communication networks: Third
                 International Conference, SCN 2002, Amalfi, Italy,
                 September 11--13, 2002: Revised Papers}",
  title =        "{Security in communication networks: Third
                 International Conference, SCN 2002, Amalfi, Italy,
                 September 11--13, 2002: Revised Papers}",
  volume =       "2576",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "ix + 363",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-00420-3 (softcover)",
  ISBN-13 =      "978-3-540-00420-2 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "TK5105.59 .S385 2002",
  bibdate =      "Thu Aug 21 09:09:03 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Also available via the World Wide Web.",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2576.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2576",
  acknowledgement = ack-nhfb,
  keywords =     "computer networks --- security measures ---
                 congresses; computer security --- congresses;
                 cryptography --- congresses",
}

@Proceedings{Freytag:2003:VPI,
  editor =       "Johann Christoph Freytag and Peter C. Lockemann and
                 Serge Abiteboul and Michael J. Carey and Patricia G.
                 Selinger and Andreas Heuer",
  booktitle =    "{VLDB 2003}: Proceedings of 29th International
                 Conference on Very Large Data Bases, September 9--12,
                 2003, Berlin, Germany",
  title =        "{VLDB 2003}: Proceedings of 29th International
                 Conference on Very Large Data Bases, September 9--12,
                 2003, Berlin, Germany",
  publisher =    pub-MORGAN-KAUFMANN,
  address =      pub-MORGAN-KAUFMANN:adr,
  pages =        "1151",
  year =         "2003",
  ISBN =         "0-12-722442-4",
  ISBN-13 =      "978-0-12-722442-8",
  LCCN =         "????",
  bibdate =      "Mon Dec 22 18:35:48 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{IEEE:2003:PAI,
  editor =       "{IEEE}",
  booktitle =    "{Proceedings: 44th Annual IEEE Symposium on
                 Foundations of Computer Science, FOCS 2003, 11--14
                 October 2003, Cambridge, Massachusetts}",
  title =        "{Proceedings: 44th Annual IEEE Symposium on
                 Foundations of Computer Science, FOCS 2003, 11--14
                 October 2003, Cambridge, Massachusetts}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xiii + 661",
  year =         "2003",
  CODEN =        "ASFPDV",
  ISBN =         "0-7695-2040-5",
  ISBN-13 =      "978-0-7695-2040-7",
  ISSN =         "0272-5428",
  LCCN =         "QA76 .S979 2003",
  bibdate =      "Fri Jul 15 14:29:27 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "IEEE Computer Society Order Number PR02040.",
  URL =          "http://ieeexplore.ieee.org/iel5/8767/27770/01238173.pdf;
                 http://ieeexplore.ieee.org/xpl/RecentCon.jsp?punumber=8767&conhome=1000292",
  acknowledgement = ack-nhfb,
}

@Proceedings{Johansson:2003:FSE,
  editor =       "Thomas Johansson",
  booktitle =    "{Fast Software Encryption: 10th International
                 Workshop, FSE 2003, Lund, Sweden, February 24--26,
                 2003: Revised Papers}",
  title =        "{Fast Software Encryption: 10th International
                 Workshop, FSE 2003, Lund, Sweden, February 24--26,
                 2003: Revised Papers}",
  volume =       "2887",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "ix + 395",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b93938",
  ISBN =         "3-540-20449-0",
  ISBN-13 =      "978-3-540-20449-7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 F77 2003",
  bibdate =      "Tue Nov 16 05:54:34 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2887.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2887;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b93938",
  acknowledgement = ack-nhfb,
}

@Proceedings{Johansson:2003:PCI,
  editor =       "Thomas Johansson and Subhamoy Maitra",
  booktitle =    "{Progress in Cryptology---INDOCRYPT 2003: 4th
                 International Conference on Cryptology in India, New
                 Delhi, India, December 8--10, 2003: Proceedings}",
  title =        "{Progress in Cryptology---INDOCRYPT 2003: 4th
                 International Conference on Cryptology in India, New
                 Delhi, India, December 8--10, 2003: Proceedings}",
  volume =       "2904",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 429",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b94593",
  ISBN =         "3-540-20609-4",
  ISBN-13 =      "978-3-540-20609-5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 I5535 2003",
  bibdate =      "Tue Nov 16 06:03:39 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2904.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2904;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b94593",
  acknowledgement = ack-nhfb,
}

@Proceedings{Joye:2003:TCC,
  editor =       "Marc Joye",
  booktitle =    "{Topics in cryptology, CT-RSA 2003: the
                 Cryptographers' Track at the RSA Conference 2003, San
                 Francisco, CA, USA, April 13--17, 2003: Proceedings}",
  title =        "{Topics in cryptology, CT-RSA 2003: the
                 Cryptographers' Track at the RSA Conference 2003, San
                 Francisco, CA, USA, April 13--17, 2003: Proceedings}",
  volume =       "2612",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 416",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-00847-0",
  ISBN-13 =      "978-3-540-00847-7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 C822 2003",
  bibdate =      "Thu Aug 21 09:09:03 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2612.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2612",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; cryptography ---
                 congresses",
}

@Proceedings{Kittler:2003:AVB,
  editor =       "Josef Kittler and Mark S. Nixon",
  booktitle =    "{Audio-and video-based biometric person
                 authentication: 4th International Conference, AVBPA
                 2003, Guildford, UK, June 9--11, 2003: Proceedings}",
  title =        "{Audio-and video-based biometric person
                 authentication: 4th International Conference, AVBPA
                 2003, Guildford, UK, June 9--11, 2003: Proceedings}",
  volume =       "2688",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xvii + 978",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-40302-7 (softcover)",
  ISBN-13 =      "978-3-540-40302-9 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "TK7882.S65 A944 2003",
  bibdate =      "Thu Aug 21 09:09:03 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2688.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2688",
  acknowledgement = ack-nhfb,
  keywords =     "automatic speech recognition --- congresses; biometric
                 identification congresses; optical pattern recognition
                 --- congresses",
}

@Proceedings{Laih:2003:ACA,
  editor =       "Chi Sung Laih",
  booktitle =    "{Advances in Cryptology---ASIACRYPT 2003: 9th
                 International Conference on the Theory and Application
                 of Cryptology and Information Security, Taipei, Taiwan,
                 November 30--December 4, 2003: Proceedings}",
  title =        "{Advances in Cryptology---ASIACRYPT 2003: 9th
                 International Conference on the Theory and Application
                 of Cryptology and Information Security, Taipei, Taiwan,
                 November 30--December 4, 2003: Proceedings}",
  volume =       "2894",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiii + 542",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b94617",
  ISBN =         "3-540-20592-6",
  ISBN-13 =      "978-3-540-20592-0",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 I555 2003",
  bibdate =      "Tue Nov 16 05:58:33 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2894.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2894;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b94617",
  acknowledgement = ack-nhfb,
}

@Proceedings{Lee:2003:ISC,
  editor =       "Pil Joong Lee and Chae Hoon Lim",
  booktitle =    "{Information security and cryptology --- ICISC 2002:
                 5th International Conference, Seoul, Korea, November
                 28--29, 2002: Revised Papers}",
  title =        "{Information security and cryptology --- ICISC 2002:
                 5th International Conference, Seoul, Korea, November
                 28--29, 2002: Revised Papers}",
  volume =       "2587",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 536",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-00716-4",
  ISBN-13 =      "978-3-540-00716-6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 I32 2002",
  bibdate =      "Thu Aug 21 09:09:03 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Also available via the World Wide Web.",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2587.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2587",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; cryptography ---
                 congresses",
}

@Proceedings{Nyberg:2003:SAC,
  editor =       "Kaisa Nyberg and Howard Heys",
  booktitle =    "{Selected areas in cryptography: 9th annual
                 International Workshop, SAC 2002, St. John's,
                 Newfoundland, Canada, August 15--16, 2002: Revised
                 Papers}",
  title =        "{Selected areas in cryptography: 9th annual
                 International Workshop, SAC 2002, St. John's,
                 Newfoundland, Canada, August 15--16, 2002: Revised
                 Papers}",
  volume =       "2595",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 404",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-00622-2",
  ISBN-13 =      "978-3-540-00622-0",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 S22 2002",
  bibdate =      "Thu Aug 21 09:09:03 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Also available via the World Wide Web.",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2595.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2595",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; data encryption
                 (computer science)",
}

@Proceedings{Paterson:2003:CCI,
  editor =       "Kenneth G. Paterson",
  booktitle =    "{Cryptography and Coding: 9th IMA International
                 Conference, Cirencester, UK, December 16--18, 2003:
                 Proceedings}",
  title =        "{Cryptography and Coding: 9th IMA International
                 Conference, Cirencester, UK, December 16--18, 2003:
                 Proceedings}",
  volume =       "2898",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "ix + 383",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b93924",
  ISBN =         "3-540-20663-9",
  ISBN-13 =      "978-3-540-20663-7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA268 .C76 2003",
  bibdate =      "Thu Nov 11 19:26:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2898.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2898;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b93924",
  acknowledgement = ack-nhfb,
}

@Proceedings{Petitcolas:2003:DWF,
  editor =       "Fabien A. P. Petitcolas and Hyoung Joong Kim",
  booktitle =    "{Digital watermarking: First International Workshop,
                 IWDW 2002, Seoul, Korea, November 21--22, 2002: Revised
                 Papers}",
  title =        "{Digital watermarking: First International Workshop,
                 IWDW 2002, Seoul, Korea, November 21--22, 2002: Revised
                 Papers}",
  volume =       "2613",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 263",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-01217-6 (softcover)",
  ISBN-13 =      "978-3-540-01217-7 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 I939 2002",
  bibdate =      "Thu Aug 21 09:09:03 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "Also available via the World Wide Web.",
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2613.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2613",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; data protection ---
                 congresses; digital watermarking congresses",
}

@Proceedings{Schmalz:2003:MDI,
  editor =       "Mark S. Schmalz and others",
  booktitle =    "{Mathematics of data/image coding, compression, and
                 encryption V, with applications: 9--10 July 2002,
                 Seattle, Washington, USA}",
  title =        "{Mathematics of data/image coding, compression, and
                 encryption V, with applications: 9--10 July 2002,
                 Seattle, Washington, USA}",
  volume =       "4793",
  publisher =    "SPIE",
  address =      "Bellingham, Wash., USA",
  pages =        "vii + 324",
  year =         "2003",
  ISBN =         "0-8194-4560-6",
  ISBN-13 =      "978-0-8194-4560-5",
  ISSN =         "0277-786X (print), 1996-756X (electronic)",
  LCCN =         "TA1637 .M382 2003; TA1637 .M38 2002; TA1637 .M38 2003;
                 TA1637 .M38 2003eb; TA1637; TS510 .S63; Internet",
  bibdate =      "Sat Dec 24 08:47:41 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  series =       "SPIE proceedings series",
  URL =          "http://link.spie.org/PSISDG/4793/1;
                 http://uclibs.org/PID/39661",
  acknowledgement = ack-nhfb,
  subject =      "Image processing; Mathematics; Congresses; Digital
                 techniques; Image compression; Data encryption
                 (Computer science)",
}

@Proceedings{Walter:2003:CHE,
  editor =       "Colin D. Walter and {\c{C}}etin K. Ko{\c{c}} and
                 Christof Paar",
  booktitle =    "Cryptographic Hardware and Embedded {Systems---CHES
                 2003}: 5th International Workshop, Cologne, Germany,
                 September 8--10, 2003: Proceedings",
  title =        "Cryptographic Hardware and Embedded Systems---{CHES
                 2003}: 5th International Workshop, Cologne, Germany,
                 September 8--10, 2003: Proceedings",
  volume =       "2779",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiii + 440",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b13240",
  ISBN =         "3-540-40833-9",
  ISBN-13 =      "978-3-540-40833-8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "TK7895.E42",
  bibdate =      "Thu Nov 11 19:26:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2779.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2779;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b13240",
  acknowledgement = ack-nhfb,
}

@Proceedings{Wright:2003:FCI,
  editor =       "Rebecca N. Wright",
  booktitle =    "Financial cryptography: {7th International Conference,
                 FC 2003, Guadeloupe, French West Indies, January
                 27--30, 2003: revised papers}",
  title =        "Financial cryptography: {7th International Conference,
                 FC 2003, Guadeloupe, French West Indies, January
                 27--30, 2003: revised papers}",
  volume =       "2742",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "viii + 320",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b11831",
  ISBN =         "3-540-40663-8",
  ISBN-13 =      "978-3-540-40663-1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "HG1710 .F35 2003",
  bibdate =      "Mon Nov 15 17:53:12 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2742;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b11831",
  acknowledgement = ack-nhfb,
  meetingname =  "FC 2003 (2003: Guadeloupe)",
  subject =      "Computer networks; Congresses; Data encryption
                 (Computer science); Electronic funds transfers;
                 Electronic commerce; Internet; Security measures",
}

@Proceedings{Zhou:2003:ACN,
  editor =       "Jianying Zhou and Moti Yung and Yongfei Han",
  booktitle =    "{Applied Cryptography and Network Security: First
                 Title: International Conference, ACNS 2003, Kunming,
                 China, October 16--19, 2003: Proceedings}",
  title =        "{Applied Cryptography and Network Security: First
                 Title: International Conference, ACNS 2003, Kunming,
                 China, October 16--19, 2003: Proceedings}",
  volume =       "2846",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 436",
  year =         "2003",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b13996",
  ISBN =         "3-540-20208-0",
  ISBN-13 =      "978-3-540-20208-0",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "TK5102.94 .A28 2003",
  bibdate =      "Thu Nov 11 19:26:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2846.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2846;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b13996",
  acknowledgement = ack-nhfb,
}

@Proceedings{ACM:2004:PAA,
  editor =       "ACM",
  booktitle =    "{Proceedings of the 36th Annual ACM Symposium on the
                 Theory of Computing: Chicago, Illinois, USA, June
                 13--15, 2004}",
  title =        "{Proceedings of the 36th Annual ACM Symposium on the
                 Theory of Computing: Chicago, Illinois, USA, June
                 13--15, 2004}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "xvii + 646",
  year =         "2004",
  ISBN =         "1-58113-852-0",
  ISBN-13 =      "978-1-58113-852-8",
  LCCN =         "QA75.5 .A22 2004",
  bibdate =      "Wed Apr 5 06:05:06 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  meetingname =  "ACM Symposium on Theory of Computing (36th: 2004:
                 Chicago, Ill.)",
  remark =       "ACM order number 508040.",
  subject =      "Electronic digital computers; Congresses; Computer
                 programming; Computational complexity; Electronic data
                 processing",
}

@Proceedings{ACM:2004:PAS,
  editor =       "{ACM}",
  booktitle =    "Proceedings of the 2004 {ACM} {SIGMOD} International
                 Conference on Management of Data 2004, Paris, France,
                 June 13--18, 2004",
  title =        "Proceedings of the 2004 {ACM} {SIGMOD} International
                 Conference on Management of Data 2004, Paris, France,
                 June 13--18, 2004",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "xix + 974",
  year =         "2004",
  ISBN =         "1-58113-859-8",
  ISBN-13 =      "978-1-58113-859-7",
  LCCN =         "QA76.9.D3",
  bibdate =      "Fri Oct 31 08:24:52 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{Bao:2004:PKC,
  editor =       "Feng Bao and Robert Deng and Jianying Zhou",
  booktitle =    "{Public Key Cryptography---PKC 2004: 7th International
                 Workshop on Practice and Theory in Public Key
                 Cryptography, Singapore, March 1--4, 2004:
                 Proceedings}",
  title =        "{Public Key Cryptography---PKC 2004: 7th International
                 Workshop on Practice and Theory in Public Key
                 Cryptography, Singapore, March 1--4, 2004:
                 Proceedings}",
  volume =       "2947",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 454",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b95631",
  ISBN =         "3-540-21018-0",
  ISBN-13 =      "978-3-540-21018-4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 I567 2004",
  bibdate =      "Tue Nov 16 06:43:18 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2947.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2947;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b95631",
  acknowledgement = ack-nhfb,
}

@Proceedings{Cachin:2004:ACE,
  editor =       "Christian Cachin and Jan Camenisch",
  booktitle =    "{Advances in Cryptology---EUROCRYPT 2004:
                 International Conference on the Theory and Applications
                 of Cryptographic Techniques, Interlaken, Switzerland,
                 May 2--6, 2004: Proceedings}",
  title =        "{Advances in Cryptology---EUROCRYPT 2004:
                 International Conference on the Theory and Applications
                 of Cryptographic Techniques, Interlaken, Switzerland,
                 May 2--6, 2004: Proceedings}",
  volume =       "3027",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xii + 628",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b97182",
  ISBN =         "3-540-21935-8",
  ISBN-13 =      "978-3-540-21935-4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Thu Nov 11 19:26:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t3027.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3027;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b97182",
  acknowledgement = ack-nhfb,
}

@Proceedings{Canteaut:2004:PCI,
  editor =       "Anne Canteaut and Kapaleeswaran Viswanathan",
  booktitle =    "{Progress in cryptology: INDOCRYPT 2004: 5th
                 International Conference on Cryptology in India,
                 Chennai, India, December 20--22, 2004: Proceedings}",
  title =        "{Progress in cryptology: INDOCRYPT 2004: 5th
                 International Conference on Cryptology in India,
                 Chennai, India, December 20--22, 2004: Proceedings}",
  volume =       "3348",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiv + 429",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b104579",
  ISBN =         "3-540-24130-2",
  ISBN-13 =      "978-3-540-24130-0",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 I5535 2004",
  bibdate =      "Thu Jun 2 09:13:47 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0302-9743&volume=3348;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3348;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b104579",
  acknowledgement = ack-nhfb,
  meetingname =  "International Conference in Cryptology in India (5th:
                 2004: Chennai, India)",
  subject =      "Computer security; Congresses; Cryptography;
                 Congresses",
}

@Book{Copeland:2004:ETS,
  editor =       "B. Jack Copeland",
  booktitle =    "The Essential {Turing}: Seminal Writings in Computing,
                 Logic, Philosophy, Artificial Intelligence, and
                 Artificial Life, plus The Secrets of {Enigma}",
  title =        "The Essential {Turing}: Seminal Writings in Computing,
                 Logic, Philosophy, Artificial Intelligence, and
                 Artificial Life, plus The Secrets of {Enigma}",
  publisher =    pub-OXFORD,
  address =      pub-OXFORD:adr,
  pages =        "viii + 613",
  year =         "2004",
  ISBN =         "0-19-825079-7 (hardcover), 0-19-825080-0 (paperback)",
  ISBN-13 =      "978-0-19-825079-1 (hardcover), 978-0-19-825080-7
                 (paperback)",
  LCCN =         "QA29.T8 E77 2004",
  bibdate =      "Sat Nov 19 18:33:05 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/a/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  URL =          "ftp://uiarchive.cso.uiuc.edu/pub/etext/gutenberg/;
                 http://www.loc.gov/catdir/toc/fy053/2004275594.html",
  acknowledgement = ack-nhfb,
  remark =       "This useful volumes reprints important Turing papers
                 and letters, with substantial introductions to each.",
  subject =      "Cognitive science; Electronic data processing;
                 Artificial intelligence; Turing, Alan Mathison",
  subject-dates = "1912--1954",
  tableofcontents = "Alan Turing 1912--1954 / Jack Copeland 1--3 \\
                 Computable Numbers: A Guide / Jack Copeland 5--57 \\
                 1. On Computable Numbers, with an Application to the
                 Entscheidensproblem (1936) 58--90 \\
                 2. On Computable Numbers: Corrections and Critiques /
                 Alan Turing, Emil Post, and Donald W. Davies 91--124
                 \\
                 3. Systems of Logic Based on Ordinals (1938), including
                 excerpts of Turing's correspondence, 1936--1938
                 125--204\\
                 4. Letters on Logic to Max Newman (c. 1940) 205--216
                 \\
                 Enigma / Jack Copeland 217--264 \\
                 5. History of Hut 8 to December 1941 (1945), featuring
                 an excerpt from Turing's 'Treatise on the Enigma' /
                 Patrick Mahon 265--312 \\
                 6. Bombe and Spider (1940) 313--335 \\
                 7. Letter to Winston Churchill (1941) 336--340 \\
                 8. Memorandum to OP-20-G on Naval Enigma (c. 1941)
                 341--352 \\
                 Artificial Intelligence / Jack Copeland 353--361 \\
                 9. Lecture on the Automatic Computing Machine (1947)
                 362--394 \\
                 10. Intelligent Machinery (1948) 395--432 \\
                 11. Computing Machinery and Intelligence (1950)
                 433--464 \\
                 12. Intelligent Machinery, A Heretical Theory (c. 1951)
                 465--475 \\
                 13. Can Digital Computers Think? 476--486 \\
                 14. Can Automatic Calculating Machines Be Said to
                 Think? (1952) / Alan Turing, Richard Braithwaite,
                 Geoffrey Jefferson, and Max Newman 487--506 \\
                 Artificial Life / Jack Copeland 517--518 \\
                 15. The Chemical Basis of Morphogenesis (1952) 519--561
                 \\
                 16. Chess (1953) 562--575 \\
                 17. Solvable and Unsolvable Problems (1954) 576--595",
}

@Proceedings{Franklin:2004:ACC,
  editor =       "Matt Franklin",
  booktitle =    "{Advances in Cryptology --- CRYPTO 2004: 24th Annual
                 International Cryptology Conference, Santa Barbara,
                 California, USA, August 15--19, 2004. Proceedings}",
  title =        "{Advances in Cryptology --- CRYPTO 2004: 24th Annual
                 International Cryptology Conference, Santa Barbara,
                 California, USA, August 15--19, 2004. Proceedings}",
  volume =       "3152",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 578",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b99099",
  ISBN =         "3-540-22668-0",
  ISBN-13 =      "978-3-540-22668-0",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "10.1007/b99099",
  bibdate =      "Sat Jun 04 08:10:04 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3152;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b99099",
  acknowledgement = ack-nhfb,
}

@Proceedings{Handschuh:2004:SAC,
  editor =       "Helena Handschuh and M. Anwar Hasan",
  booktitle =    "{Selected Areas in Cryptography: 11th international
                 workshop, SAC 2004, Waterloo, Canada, August 9--10,
                 2004: Revised selected papers}",
  title =        "{Selected Areas in Cryptography: 11th international
                 workshop, SAC 2004, Waterloo, Canada, August 9--10,
                 2004: Revised selected papers}",
  volume =       "3357",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 353",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b105103",
  ISBN =         "3-540-24327-5",
  ISBN-13 =      "978-3-540-24327-4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 S22 2004",
  bibdate =      "Thu Jun 02 07:52:30 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3357;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b105103",
  acknowledgement = ack-nhfb,
}

@Proceedings{IEEE:2004:PAI,
  editor =       "{IEEE}",
  booktitle =    "{Proceedings: 45th Annual IEEE Symposium on
                 Foundations of Computer Science: FOCS 2004, 17--19
                 October, 2004, Rome, Italy}",
  title =        "{Proceedings: 45th Annual IEEE Symposium on
                 Foundations of Computer Science: FOCS 2004, 17--19
                 October, 2004, Rome, Italy}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xiv + 632",
  year =         "2004",
  CODEN =        "ASFPDV",
  ISBN =         "0-7695-2228-9",
  ISBN-13 =      "978-0-7695-2228-9",
  ISSN =         "0272-5428",
  LCCN =         "QA276",
  bibdate =      "Fri Jul 15 14:47:05 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  note =         "IEEE Computer Society Order Number P2228",
  URL =          "http://ieeexplore.ieee.org/iel5/9430/29918/01366212.pdf;
                 http://ieeexplore.ieee.org/servlet/opac?punumber=9430",
  acknowledgement = ack-nhfb,
  subject =      "Electronic data processing; Congresses; Machine
                 theory; Congresses",
}

@Proceedings{Jakobsson:2004:ACN,
  editor =       "Markus Jakobsson and Moti Yung and Jianying Zhou",
  booktitle =    "{Applied Cryptography and Network Security: Second
                 International Conference, ACNS 2004, Yellow Mountain,
                 China, June 8--11, 2004: Proceedings}",
  title =        "{Applied Cryptography and Network Security: Second
                 International Conference, ACNS 2004, Yellow Mountain,
                 China, June 8--11, 2004: Proceedings}",
  volume =       "3089",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiv + 510",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b98360",
  ISBN =         "3-540-22217-0",
  ISBN-13 =      "978-3-540-22217-0",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "TK5102.94 .A28 2004",
  bibdate =      "Tue Nov 16 08:24:05 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t3089.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3089;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b98360",
  acknowledgement = ack-nhfb,
}

@Proceedings{Joye:2004:CHE,
  editor =       "Marc Joye and Jean-Jacques Quisquater",
  booktitle =    "{Cryptographic Hardware and Embedded Systems---CHES
                 2004: 6th International Workshop Cambridge, MA, USA,
                 August 11--13, 2004. Proceedings}",
  title =        "{Cryptographic Hardware and Embedded Systems---CHES
                 2004: 6th International Workshop Cambridge, MA, USA,
                 August 11--13, 2004. Proceedings}",
  volume =       "3156",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiii + 454",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b99451",
  ISBN =         "3-540-22666-4",
  ISBN-13 =      "978-3-540-22666-6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Thu Nov 11 19:26:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t3156.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3156;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b99451",
  acknowledgement = ack-nhfb,
}

@Proceedings{Juels:2004:FCI,
  editor =       "Ari Juels",
  booktitle =    "{Financial Cryptography: 8th International Conference,
                 FC 2004, Key West, FL, USA, February 9--12, 2004:
                 Revised Papers}",
  title =        "{Financial Cryptography: 8th International Conference,
                 FC 2004, Key West, FL, USA, February 9--12, 2004:
                 Revised Papers}",
  volume =       "3110",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 280",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b98935",
  ISBN =         "3-540-22420-3",
  ISBN-13 =      "978-3-540-22420-4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "HG1710 .F35 2004",
  bibdate =      "Thu Nov 11 19:26:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t3110.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3110;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b98935",
  acknowledgement = ack-nhfb,
}

@Proceedings{Kalker:2004:DWS,
  editor =       "Ton Kalker and Ingemar J. Cox and Yong Man Ro",
  booktitle =    "{Digital Watermarking: Second International Workshop,
                 IWDW 2003, Seoul, Korea, October 20--22, 2003: Revised
                 Papers}",
  title =        "{Digital Watermarking: Second International Workshop,
                 IWDW 2003, Seoul, Korea, October 20--22, 2003: Revised
                 Papers}",
  volume =       "2939",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xii + 602",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b95658",
  ISBN =         "3-540-21061-X",
  ISBN-13 =      "978-3-540-21061-0",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 I89 2003",
  bibdate =      "Tue Nov 16 06:35:48 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2939.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2939;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b95658",
  acknowledgement = ack-nhfb,
}

@Proceedings{Katsikas:2004:PKI,
  editor =       "Sokratis K. Katsikas and Stefanos Gritzalis and Javier
                 Lopez",
  booktitle =    "{Public Key Infrastructure: First European PKI
                 Workshop: Research and Applications, EuroPKI 2004,
                 Samos Island, Greece, June 25--26, 2004: Proceedings}",
  title =        "{Public Key Infrastructure: First European PKI
                 Workshop: Research and Applications, EuroPKI 2004,
                 Samos Island, Greece, June 25--26, 2004: Proceedings}",
  volume =       "3093",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiii + 380",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b98201",
  ISBN =         "3-540-22216-2",
  ISBN-13 =      "978-3-540-22216-3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 E973 2004",
  bibdate =      "Tue Nov 16 08:26:16 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t3093.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3093;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b98201",
  acknowledgement = ack-nhfb,
}

@Proceedings{Lee:2004:ACA,
  editor =       "Pil Joong Lee",
  booktitle =    "{Advances in cryptology, ASIACRYPT 2004: 10th
                 International Conference on the Theory and Application
                 of Cryptology and Information Security, Jeju Island,
                 Korea, December 5--9, 2004: Proceedings}",
  title =        "{Advances in cryptology, ASIACRYPT 2004: 10th
                 International Conference on the Theory and Application
                 of Cryptology and Information Security, Jeju Island,
                 Korea, December 5--9, 2004: Proceedings}",
  volume =       "3329",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xvi + 546",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b104116",
  ISBN =         "3-540-23975-8 (paperback)",
  ISBN-13 =      "978-3-540-23975-8 (paperback)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 I555 2004; QA75.5 .L48 no. 3329",
  bibdate =      "Thu Jun 2 09:13:35 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0302-9743&volume=3329;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b104116",
  acknowledgement = ack-nhfb,
  meetingname =  "International Conference on the Theory and Application
                 of Cryptology and Information Security (10th: 2004:
                 Jeju Island, Korea)",
  subject =      "Computer security; Congresses; Cryptography;
                 Congresses",
}

@Proceedings{Li:2004:ABP,
  editor =       "Stan Z. Li and Jianhuang Lai and Tieniu Tan and Guocan
                 Feng and Yunhong Wang",
  booktitle =    "{Advances in Biometric Person Authentication: 5th
                 Chinese Conference on Biometric Recognition,
                 SINOBIOMETRICS 2004, Guangzhou, China, December 13--14,
                 2004: Proceedings}",
  title =        "{Advances in Biometric Person Authentication: 5th
                 Chinese Conference on Biometric Recognition,
                 SINOBIOMETRICS 2004, Guangzhou, China, December 13--14,
                 2004: Proceedings}",
  volume =       "3338",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xviii + 699",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b104239",
  ISBN =         "3-540-24029-2",
  ISBN-13 =      "978-3-540-24029-7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "TK7882.B56 C4 2004",
  bibdate =      "Thu Jun 02 07:52:30 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3338;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b104239",
  acknowledgement = ack-nhfb,
}

@Proceedings{Lim:2004:ISC,
  editor =       "Jong In Lim and Dong Hoon Lee",
  booktitle =    "{Information Security and Cryptology---ICISC 2003: 6th
                 International Conference, Seoul, Korea, November
                 27--28, 2003: Revised Papers}",
  title =        "{Information Security and Cryptology---ICISC 2003: 6th
                 International Conference, Seoul, Korea, November
                 27--28, 2003: Revised Papers}",
  volume =       "2971",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xii + 458",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b96249",
  ISBN =         "3-540-21376-7",
  ISBN-13 =      "978-3-540-21376-5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Thu Nov 11 19:26:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2971.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2971;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b96249",
  acknowledgement = ack-nhfb,
}

@Proceedings{Maltoni:2004:BAE,
  editor =       "Davide Maltoni and Anil K. Jain",
  booktitle =    "{Biometric Authentication: ECCV 2004 International
                 Workshop, BioAW 2004, Prague, Czech Republic, May 15th,
                 2004: Proceedings}",
  title =        "{Biometric Authentication: ECCV 2004 International
                 Workshop, BioAW 2004, Prague, Czech Republic, May 15th,
                 2004: Proceedings}",
  volume =       "3087",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiii + 341",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b99174",
  ISBN =         "3-540-22499-8",
  ISBN-13 =      "978-3-540-22499-0",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "TK7882.P3E27 2004",
  bibdate =      "Thu Nov 11 19:26:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t3087.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3087;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b99174",
  acknowledgement = ack-nhfb,
}

@Proceedings{Matsui:2004:SAC,
  editor =       "Mitsuru Matsui and Robert Zuccherato",
  booktitle =    "{Selected Areas in Cryptography: 10th Annual
                 International Workshop, SAC 2003, Ottawa, Canada,
                 August 14--15, 2003, Revised Papers}",
  title =        "{Selected Areas in Cryptography: 10th Annual
                 International Workshop, SAC 2003, Ottawa, Canada,
                 August 14--15, 2003, Revised Papers}",
  volume =       "3006",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 360",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b96837",
  ISBN =         "3-540-21370-8",
  ISBN-13 =      "978-3-540-21370-3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Thu Nov 11 19:26:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t3006.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3006;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b96837",
  acknowledgement = ack-nhfb,
}

@Proceedings{Naor:2004:TCF,
  editor =       "Moni Naor",
  booktitle =    "{Theory of Cryptography: First Theory of Cryptography
                 Conference, TCC 2004, Cambridge, MA, USA, February
                 19--21, 2004: Proceedings}",
  title =        "{Theory of Cryptography: First Theory of Cryptography
                 Conference, TCC 2004, Cambridge, MA, USA, February
                 19--21, 2004: Proceedings}",
  volume =       "2951",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 521",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b95566",
  ISBN =         "3-540-21000-8",
  ISBN-13 =      "978-3-540-21000-9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 C6676 2004",
  bibdate =      "Tue Nov 16 06:47:00 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2951.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2951;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b95566",
  acknowledgement = ack-nhfb,
}

@Proceedings{Okamoto:2004:TCC,
  editor =       "Tatsuaki Okamoto",
  booktitle =    "{Topics in Cryptology---CT-RSA 2004: The
                 Cryptographers' Track at the RSA Conference 2004, San
                 Francisco, CA, USA, February 23--27, 2004:
                 Proceedings}",
  title =        "{Topics in Cryptology---CT-RSA 2004: The
                 Cryptographers' Track at the RSA Conference 2004, San
                 Francisco, CA, USA, February 23--27, 2004:
                 Proceedings}",
  volume =       "2964",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 386",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b95630",
  ISBN =         "3-540-20996-4",
  ISBN-13 =      "978-3-540-20996-6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 C822 2004",
  bibdate =      "Tue Nov 16 06:53:23 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t2964.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2964;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b95630",
  acknowledgement = ack-nhfb,
}

@Book{Paun:2004:CTT,
  editor =       "Gheorghe P{\u{a}}un and Grzegorz Rozenberg and Arto
                 Salomaa",
  booktitle =    "Current trends in theoretical computer science: the
                 challenge of the new century",
  title =        "Current trends in theoretical computer science: the
                 challenge of the new century",
  publisher =    pub-WORLD-SCI,
  address =      pub-WORLD-SCI:adr,
  pages =        "????",
  year =         "2004",
  ISBN =         "981-238-783-8 (set), 981-238-966-0 (vol. 1),
                 981-238-965-2 (vol. 2)",
  ISBN-13 =      "978-981-238-783-7 (set), 978-981-238-966-4 (vol. 1),
                 978-981-238-965-7 (vol. 2)",
  LCCN =         "QA76 .C878 2004",
  bibdate =      "Wed Apr 5 05:38:43 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  remark =       "Vol 1. Algorithms and complexity; vol. 2. Formal
                 models and semantics.",
  subject =      "Computer science",
}

@Proceedings{Roy:2004:FSE,
  editor =       "Bimal Roy and Willi Meier",
  booktitle =    "{Fast Software Encryption: 11th International
                 Workshop, FSE 2004: Delhi, India, February 5--7, 2004:
                 Revised Papers}",
  title =        "{Fast Software Encryption: 11th International
                 Workshop, FSE 2004: Delhi, India, February 5--7, 2004:
                 Revised Papers}",
  volume =       "3017",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 484",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b98177",
  ISBN =         "3-540-22171-9",
  ISBN-13 =      "978-3-540-22171-5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Thu Nov 11 19:26:30 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t3017.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3017;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b98177",
  acknowledgement = ack-nhfb,
}

@Proceedings{Schmalz:2004:MDIa,
  editor =       "Mark S. Schmalz",
  booktitle =    "{Mathematics of data\slash image coding, compression,
                 and encryption VI, with applications: 5 and 7 August
                 2003, San Diego, California, USA}",
  title =        "{Mathematics of data\slash image coding, compression,
                 and encryption VI, with applications: 5 and 7 August
                 2003, San Diego, California, USA}",
  volume =       "5208",
  publisher =    pub-SPIE,
  address =      pub-SPIE:adr,
  pages =        "viii + 236",
  year =         "2004",
  ISBN =         "0-8194-5081-2",
  ISBN-13 =      "978-0-8194-5081-4",
  ISSN =         "0277-786X (print), 1996-756X (electronic)",
  LCCN =         "TA1637 .M375 2005",
  bibdate =      "Wed Sep 28 08:28:22 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  series =       "SPIE proceedings series",
  acknowledgement = ack-nhfb,
  subject =      "Image processing; Mathematics; Congresses; Image
                 processing; Digital techniques; Congresses; Image
                 compression; Congresses; Data encryption (Computer
                 science); Congresses",
}

@Proceedings{Schmalz:2004:MDIb,
  editor =       "Mark S. Schmalz",
  booktitle =    "{Mathematics of data\slash image coding, compression,
                 and encryption VII, with applications: 4--5 August,
                 2004, Denver, Colorado, USA}",
  title =        "{Mathematics of data\slash image coding, compression,
                 and encryption VII, with applications: 4--5 August,
                 2004, Denver, Colorado, USA}",
  volume =       "5561",
  publisher =    pub-SPIE,
  address =      pub-SPIE:adr,
  pages =        "viii + 176",
  year =         "2004",
  ISBN =         "0-8194-5499-0",
  ISBN-13 =      "978-0-8194-5499-7",
  ISSN =         "0277-786X (print), 1996-756X (electronic)",
  LCCN =         "TA1637 .M375 2004",
  bibdate =      "Sat Dec 24 08:47:41 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  series =       "SPIE proceedings series",
  URL =          "http://uclibs.org/PID/57292",
  acknowledgement = ack-nhfb,
  subject =      "Image processing; Digital techniques; Congresses; Data
                 encryption (Computer science); Image compression",
}

@Proceedings{Zhang:2004:BAF,
  editor =       "David Zhang and Anil K. Jain",
  booktitle =    "{Biometric Authentication: First International
                 Conference, ICBA 2004, Hong Kong, China, July 15--17,
                 2004, Proceedings}",
  title =        "{Biometric Authentication: First International
                 Conference, ICBA 2004, Hong Kong, China, July 15--17,
                 2004, Proceedings}",
  volume =       "3072",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xvii + 800",
  year =         "2004",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b98225",
  ISBN =         "3-540-22146-8",
  ISBN-13 =      "978-3-540-22146-3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76 A1 L43 3072 (LC)",
  bibdate =      "Tue Nov 16 08:18:03 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t3072.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3072;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b98225",
  acknowledgement = ack-nhfb,
}

@Proceedings{ACM:2005:MPI,
  editor =       "{ACM}",
  booktitle =    "{MGC'05: Proceedings of the 3rd International Workshop
                 on Middleware for Grid Computing, Grenoble, France,
                 November 28--December 02, 2005}",
  title =        "{MGC'05: Proceedings of the 3rd International Workshop
                 on Middleware for Grid Computing, Grenoble, France,
                 November 28--December 02, 2005}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "????",
  year =         "2005",
  ISBN =         "1-59593-269-0",
  ISBN-13 =      "978-1-59593-269-3",
  LCCN =         "????",
  bibdate =      "Sat Oct 14 13:52:46 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{ACM:2005:PTF,
  editor =       "{ACM}",
  booktitle =    "{Proceedings of the Twenty-Fourth ACM
                 SIGMOD-SIGACT-SIGART Symposium on Principles of
                 Database Systems: PODS 2005: Baltimore, Maryland, June
                 13-15, 2005}",
  title =        "{Proceedings of the Twenty-Fourth ACM
                 SIGMOD-SIGACT-SIGART Symposium on Principles of
                 Database Systems: PODS 2005: Baltimore, Maryland, June
                 13-15, 2005}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "x + 380",
  year =         "2005",
  ISBN =         "1-59593-062-0",
  ISBN-13 =      "978-1-59593-062-0",
  LCCN =         "QA76.9.D3 A296 2005",
  bibdate =      "Wed Aug 23 12:13:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  note =         "ACM order number 475050.",
  acknowledgement = ack-nhfb,
}

@Proceedings{ACM:2005:SPA,
  editor =       "{ACM}",
  booktitle =    "{STOC '05: proceedings of the 37th Annual ACM
                 Symposium on Theory of Computing: Baltimore, Maryland,
                 USA, May 22--24, 2005}",
  title =        "{STOC '05: proceedings of the 37th Annual ACM
                 Symposium on Theory of Computing: Baltimore, Maryland,
                 USA, May 22--24, 2005}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "xiv + 770",
  year =         "2005",
  ISBN =         "1-58113-960-8",
  ISBN-13 =      "978-1-58113-960-0",
  LCCN =         "QA75.5 A22 2005",
  bibdate =      "Wed Apr 5 05:53:41 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  meetingname =  "ACM Symposium on Theory of Computing (37th: 2005:
                 Baltimore, MD)",
  remark =       "ACM order number 508050.",
  subject =      "Electronic digital computers; Congresses; Electronic
                 data processing; Computer programming; Computational
                 complexity",
}

@Proceedings{Barni:2005:DWI,
  editor =       "Mauro Barni and Ingemar Cox and Ton Kalker and Hyoung
                 Joong Kim",
  booktitle =    "{Digital watermarking: 4th international workshop,
                 IWDW 2005, Siena, Italy, September 15--17, 2005:
                 proceedings}",
  title =        "{Digital watermarking: 4th international workshop,
                 IWDW 2005, Siena, Italy, September 15--17, 2005:
                 proceedings}",
  volume =       "3710",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "483",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11551492",
  ISBN =         "3-540-28768-X",
  ISBN-13 =      "978-3-540-28768-1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Thu Sep 29 06:46:02 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
}

@Proceedings{Blundo:2005:SCN,
  editor =       "Carlo Blundo and Stelvio Cimato",
  booktitle =    "{Security in communication networks: 4th international
                 conference, SCN 2004, Amalfi, Italy, September 8--10,
                 2004: Revised selected papers}",
  title =        "{Security in communication networks: 4th international
                 conference, SCN 2004, Amalfi, Italy, September 8--10,
                 2004: Revised selected papers}",
  volume =       "3352",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 379",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b105083",
  ISBN =         "3-540-24301-1",
  ISBN-13 =      "978-3-540-24301-4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "TK5105.59 .S385 2004",
  bibdate =      "Thu Jun 2 09:14:04 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0302-9743&volume=3352;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3352;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b105083",
  acknowledgement = ack-nhfb,
  meetingname =  "SCN 2004 (2004: Amalfi, Italy)",
  subject =      "Computer networks; Security measures; Congresses;
                 Computer security; Congresses; Cryptography;
                 Congresses",
}

@Proceedings{Chadwick:2005:PKI,
  editor =       "David Chadwick and Gansen Zhao",
  booktitle =    "{Public key infrastructure: Second European PKI
                 Workshop: Research and Applications, EuroPKI 2005,
                 Canterbury, UK, June 30--July 1, 2005: revised selected
                 papers}",
  title =        "{Public key infrastructure: Second European PKI
                 Workshop: Research and Applications, EuroPKI 2005,
                 Canterbury, UK, June 30--July 1, 2005: revised selected
                 papers}",
  volume =       "3545",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 270",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-28062-6",
  ISBN-13 =      "978-3-540-28062-0",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 E976 2005",
  bibdate =      "Wed Apr 5 16:52:24 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3545",
  acknowledgement = ack-nhfb,
  meetingname =  "European PKI Workshop: Research and Applications (2nd:
                 2005: Canterbury, England)",
  subject =      "Public key cryptography; Congresses; Data encryption
                 (Computer science); Computer security; Computer
                 networks; Security measures",
}

@Proceedings{Christianson:2005:SPI,
  editor =       "Bruce Christianson and Bruno Crispo and James A.
                 Malcolm and Michael Roe",
  booktitle =    "{Security Protocols: 11th International Workshop,
                 Cambridge, UK, April 2--4, 2003, Revised Selected
                 Papers}",
  title =        "{Security Protocols: 11th International Workshop,
                 Cambridge, UK, April 2--4, 2003, Revised Selected
                 Papers}",
  volume =       "3364",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "ix + 349",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11542322",
  ISBN =         "3-540-28389-7",
  ISBN-13 =      "978-3-540-28389-8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Wed Sep 28 13:34:31 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3364",
  acknowledgement = ack-nhfb,
}

@Book{Copeland:2005:CSB,
  editor =       "B. Jack Copeland",
  booktitle =    "{Colossus}: the secrets of {Bletchley Park}'s
                 codebreaking computers",
  title =        "{Colossus}: the secrets of {Bletchley Park}'s
                 codebreaking computers",
  publisher =    pub-OXFORD,
  address =      pub-OXFORD:adr,
  pages =        "344 (est.)",
  year =         "2005",
  ISBN =         "0-19-284055-X",
  ISBN-13 =      "978-0-19-284055-4",
  LCCN =         "D810.C88 C66 2006",
  bibdate =      "Mon Nov 07 18:29:47 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  remark =       "From the cover: ``At last --- the secrets of Bletchley
                 Parks' codebreaking computers''",
  subject =      "Lorenz cipher system; World War, 1939-1945;
                 Cryptography; Electronic intelligence; Great Britain;
                 Germany; History",
  tableofcontents = "A brief history of cryptography from Caesar to
                 Bletchley Park / Simon Singh\par

                 How it began: Bletchley Park goes to war / Michael
                 Smith\par

                 The German Tunny machine / Jack Copeland\par

                 Colossus, codebreaking, and the digital age / Stephen
                 Budiansky \par

                 Machine against machine / Jack Copeland\par

                 D-Day at Bletchley Park / Thomas H.
                 Flowers\par

                 Intercept! / Jack Copeland\par

                 Colossus / Thomas H. Flowers\par

                 Colossus and the rise of the modern computer / Jack
                 Copeland\par

                 The PC-user's guide to Colossus / Benjamin Wells\par

                 Of men and machines / Brian Randell\par

                 The Colossus rebuild / Tony Sale\par

                 Mr. Newman's section / Jack Copeland, with Catherine
                 Caughey \ldots{} [et al.]\par

                 Max Newman: mathematician, codebreaker, and computer
                 pioneer / William Newman\par

                 Living with Fish: breaking Tunny in the Newmanry and
                 the Testery / Peter Hilton\par

                 From Hut 8 to the Newmanry / Jack Good\par

                 Codebreaking and Colossus / Donald Michie\par

                 Major Tester's section / Jerry Roberts\par

                 Setter and breaker / Roy Jenkins\par

                 An ATS girl in the Testery / Helen Currie\par

                 The Testery and the breaking of Fish / Peter
                 Edgerley\par

                 Dollis Hill at war / Jack Copeland, with David Bolam
                 \ldots{} [et al.]\par

                 The British Tunny machine / Gil Hayward\par

                 How Colossus was built and operated: one of its
                 engineers reveals its secrets / Harry
                 Fensom\par

                 Bletchley Park's Sturgeon: the Fish that laid no eggs /
                 Frode Weierud\par

                 German teleprinter traffic and Swedish wartime
                 intelligence / Craig McKay.",
  xxbooktitle =  "{Colossus}: The First Electronic Computer",
  xxtitle =      "{Colossus}: The First Electronic Computer",
}

@Proceedings{Cox:2005:DWT,
  editor =       "I. J. (Ingemar J.) Cox and Ton Kalker and Heung-Kyu
                 Lee",
  booktitle =    "{Digital watermarking: third international workshop,
                 IWDW 2004, Seoul, Korea, October 30--November 1, 2004:
                 revised selected papers}",
  title =        "{Digital watermarking: third international workshop,
                 IWDW 2004, Seoul, Korea, October 30--November 1, 2004:
                 revised selected papers}",
  volume =       "3304",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "ix + 306",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b106346",
  ISBN =         "3-540-24839-0 (softcover)",
  ISBN-13 =      "978-3-540-24839-2 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 I89 2004",
  bibdate =      "Sat Jun 4 05:55:40 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3304",
  acknowledgement = ack-nhfb,
  meetingname =  "IWDW 2004 (2004: Seoul, Korea)",
  subject =      "Computer security; Congresses; Data protection;
                 Congresses; Digital watermarking; Congresses",
}

@Proceedings{Cramer:2005:ACE,
  editor =       "Ronald Cramer",
  booktitle =    "{Advances in cryptology: EUROCRYPT 2005: 24th Annual
                 International Conference on the Theory and Applications
                 of Cryptographic Techniques, Aarhus, Denmark, May
                 22--26, 2005, proceedings}",
  title =        "{Advances in cryptology: EUROCRYPT 2005: 24th Annual
                 International Conference on the Theory and Applications
                 of Cryptographic Techniques, Aarhus, Denmark, May
                 22--26, 2005, proceedings}",
  volume =       "3494",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiv + 576",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b136415",
  ISBN =         "3-540-25910-4 (softcover)",
  ISBN-13 =      "978-3-540-25910-7 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Thu Jun 2 09:15:53 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3494;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b136415",
  acknowledgement = ack-nhfb,
}

@Proceedings{Dawson:2005:PCM,
  editor =       "Ed Dawson and Serge Vaudenay",
  booktitle =    "{Progress in cryptology --- MYCRYPT 2005: first
                 international conference on cryptology in Malaysia,
                 Kuala Lumpur, Malaysia, September 28--30, 2005,
                 proceedings}",
  title =        "{Progress in cryptology --- MYCRYPT 2005: first
                 international conference on cryptology in Malaysia,
                 Kuala Lumpur, Malaysia, September 28--30, 2005,
                 proceedings}",
  volume =       "3715",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "327",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11554868",
  ISBN =         "3-540-28938-0",
  ISBN-13 =      "978-3-540-28938-8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Thu Sep 29 06:46:02 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
}

@Proceedings{Desmedt:2005:CNS,
  editor =       "Yvo G. Desmedt and Huaxiong Wang and Yi Mu and
                 Yongqing Li",
  booktitle =    "{Cryptology and network security: 4th international
                 conference, CANS 2005, Xiamen, China, December 14--16,
                 2005: proceedings}",
  title =        "{Cryptology and network security: 4th international
                 conference, CANS 2005, Xiamen, China, December 14--16,
                 2005: proceedings}",
  volume =       "3810",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 348",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11599371",
  ISBN =         "3-540-30849-0",
  ISBN-13 =      "978-3-540-30849-2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 I5534 2004",
  bibdate =      "Wed Apr 5 09:42:14 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3810",
  acknowledgement = ack-nhfb,
  meetingname =  "International Conference on Cryptology and Network
                 Security (4th: 2005: Xiamen, Xiamen Shi, China)",
  subject =      "Computer security; Congresses; Cryptography",
}

@Proceedings{Dittmann:2005:CMS,
  editor =       "Jana Dittmann and Stefan Katzenbeisser and Andreas
                 Uhl",
  booktitle =    "{Communications and multimedia security: 9th IFIP TC-6
                 TC-11 International Conference, CMS 2005, Salzburg,
                 Austria, September 19--21, 2005: proceedings}",
  title =        "{Communications and multimedia security: 9th IFIP TC-6
                 TC-11 International Conference, CMS 2005, Salzburg,
                 Austria, September 19--21, 2005: proceedings}",
  volume =       "3677",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "357",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11552055",
  ISBN =         "3-540-28791-4",
  ISBN-13 =      "978-3-540-28791-9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Thu Sep 29 06:46:02 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
}

@Proceedings{diVimercati:2005:CSE,
  editor =       "Sabrina de Capitani di Vimercati and Paul Syverson and
                 Dieter Gollmann",
  booktitle =    "{Computer security --- ESORICS 2005: 10th European
                 symposium on research in computer security, Milan,
                 Italy, September 12--14, 2005: proceedings}",
  title =        "{Computer security --- ESORICS 2005: 10th European
                 symposium on research in computer security, Milan,
                 Italy, September 12--14, 2005: proceedings}",
  volume =       "3679",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "508",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11555827",
  ISBN =         "3-540-28963-1",
  ISBN-13 =      "978-3-540-28963-0",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Thu Sep 29 06:46:02 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
}

@Proceedings{Dobbertin:2005:AES,
  editor =       "Hans Dobbertin and Vincent Rijmen and Aleksandra
                 Sowa",
  booktitle =    "{Advanced encryption standard --- AES: 4th
                 international conference, AES 2004, Bonn, Germany, May
                 10--12, 2004, revised selected and invited papers}",
  title =        "{Advanced encryption standard --- AES: 4th
                 international conference, AES 2004, Bonn, Germany, May
                 10--12, 2004, revised selected and invited papers}",
  volume =       "3373",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "x + 188",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b137765",
  ISBN =         "3-540-26557-0",
  ISBN-13 =      "978-3-540-26557-3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Sat Jun 04 09:11:08 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3373",
  acknowledgement = ack-nhfb,
}

@Proceedings{Garrett:2005:PKC,
  editor =       "Paul Garrett and Daniel Lieman",
  booktitle =    "{Public-key cryptography: American Mathematical
                 Society short course, January 13--14, 2003, Baltimore,
                 Maryland}",
  title =        "{Public-key cryptography: American Mathematical
                 Society short course, January 13--14, 2003, Baltimore,
                 Maryland}",
  volume =       "62",
  publisher =    pub-AMS,
  address =      pub-AMS:adr,
  pages =        "vii + 183",
  year =         "2005",
  ISBN =         "0-8218-3365-0",
  ISBN-13 =      "978-0-8218-3365-0",
  LCCN =         "QA76.9.A25 P82 2005",
  bibdate =      "Fri Sep 17 08:55:23 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Proceedings of symposia in applied mathematics [AMS
                 short course lecture notes]",
  URL =          "http://www.loc.gov/catdir/toc/fy0612/2005048178.html",
  acknowledgement = ack-nhfb,
  subject =      "computers; access control; congresses; public key
                 cryptography",
  tableofcontents = "Cryptographic primitives / Paul Garrett \\
                 Cryptography in the real world today / Daniel Lieman
                 \\
                 Public-key cryptography and proofs of security / Nick
                 Howgrave-Graham \\
                 Elliptic curves and cryptography / Joseph H. Silverman
                 \\
                 Towards faster cryptosystems, I / William Whyte \\
                 Towards faster cryptosystems, II / William D. Banks \\
                 Playing ``hide-and-seek'' with numbers : the hidden
                 number problem, lattices, and exponential sums / Igor
                 E. Shparlinski",
}

@Proceedings{Gilbert:2005:FSE,
  editor =       "Henri Gilbert and Helena Handschuh",
  booktitle =    "{Fast Software Encryption: 12th International
                 Workshop, FSE 2005, Paris, France, February 21--23,
                 2005, Revised Selected Papers}",
  title =        "{Fast Software Encryption: 12th International
                 Workshop, FSE 2005, Paris, France, February 21--23,
                 2005, Revised Selected Papers}",
  volume =       "3557",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 441",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11502760_25",
  ISBN =         "3-540-26541-4",
  ISBN-13 =      "978-3-540-26541-2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 F77 2005",
  bibdate =      "Thu Sep 29 06:46:02 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3557",
  acknowledgement = ack-nhfb,
}

@Proceedings{Gorodetsky:2005:CNS,
  editor =       "Vladimir Gorodetsky and Igor Kotenko and Victor
                 Skormin",
  booktitle =    "{Computer network security: third international
                 workshop on mathematical methods, models, and
                 architectures for computer network security, MMM-ACNS
                 2005, St. Petersburg, Russia, September 24--28, 2005,
                 proceedings}",
  title =        "{Computer network security: third international
                 workshop on mathematical methods, models, and
                 architectures for computer network security, MMM-ACNS
                 2005, St. Petersburg, Russia, September 24--28, 2005,
                 proceedings}",
  volume =       "3685",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "477",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11560326",
  ISBN =         "3-540-29113-X",
  ISBN-13 =      "978-3-540-29113-8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Thu Sep 29 06:46:02 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
}

@Proceedings{Han:2005:PJI,
  editor =       "Yiliang Han and Xiaoyuan Yang and Jian Zhang",
  booktitle =    "{Proceedings of the 11th Joint International Computer
                 Conference --- JICC 2005}",
  title =        "{Proceedings of the 11th Joint International Computer
                 Conference --- JICC 2005}",
  publisher =    pub-WORLD-SCI,
  address =      pub-WORLD-SCI:adr,
  pages =        "980 (est.)",
  year =         "2005",
  ISBN =         "981-270-153-2",
  ISBN-13 =      "978-981-270-153-4",
  LCCN =         "????",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://eproceedings.worldscinet.com/9812701532/9812701532.0031.html",
  abstract =     "The known solutions to achieve confidentiality and
                 authentication simultaneously fail to provide
                 verifiability using standard elliptic curve signature
                 [10][1]. An elliptic curve based signcryption scheme
                 SC-ECDSA was proposed. A one time padding cipher with a
                 session key generated by respective secret knowledge
                 was constructed to encrypt messages. The standardized
                 signature scheme ECDSA was used to sign and verify.
                 Proof shows that SC-ECDSA matches the three security
                 notions: unforgeability, non-repudiation and
                 confidentiality (provable CUF-CPA). For typical
                 security parameters, SC-ECDSA saves 80\% computation
                 time and 4.7\% message expansion than other schemes. It
                 presents a 29.2\% reduction in computation time and a
                 6.9\% reduction in message expansion than traditional
                 Sign-then-Encrypt.",
  acknowledgement = ack-nhfb,
}

@Proceedings{Handschuh:2005:SAC,
  editor =       "Helena Handschuh and M. Anwar Hasan",
  booktitle =    "{Selected areas in cryptography: 11th international
                 workshop, SAC 2004, Waterloo, Canada, August 9--10,
                 2004: Revised selected papers}",
  title =        "{Selected areas in cryptography: 11th international
                 workshop, SAC 2004, Waterloo, Canada, August 9--10,
                 2004: Revised selected papers}",
  volume =       "3357",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 353",
  year =         "2005",
  CODEN =        "LNCSD9",
  ISBN =         "3-540-24327-5",
  ISBN-13 =      "978-3-540-24327-4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 S22 2004",
  bibdate =      "Thu Jun 2 09:13:50 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0302-9743&volume=3357;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3357",
  acknowledgement = ack-nhfb,
  meetingname =  "SAC 2004 (2004: Waterloo, Canada)",
  subject =      "Computer security; Congresses; Data encryption
                 (Computer science); Congresses; Cryptography;
                 Congresses",
}

@Proceedings{IEEE:2005:AIS,
  editor =       "{IEEE}",
  booktitle =    "{46th Annual IEEE Symposium on Foundations of Computer
                 Science: FOCS 2005: 23--25 October, 2005, Pittsburgh,
                 Pennsylvania, USA}",
  title =        "{46th Annual IEEE Symposium on Foundations of Computer
                 Science: FOCS 2005: 23--25 October, 2005, Pittsburgh,
                 Pennsylvania, USA}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xiii + 668",
  year =         "2005",
  ISBN =         "0-7695-2468-0, 0-7695-2362-5",
  ISBN-13 =      "978-0-7695-2468-9, 978-0-7695-2362-0",
  ISSN =         "0272-5428",
  LCCN =         "QA76 .S979 2005",
  bibdate =      "Thu May 6 08:31:47 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  note =         "IEEE Computer Society order number P2468.",
  acknowledgement = ack-nhfb,
  meetingname =  "Symposium on Foundations of Computer Science (46th:
                 2005: Pittsburgh, PA)",
  subject =      "electronic data processing; congresses; machine
                 theory",
}

@Proceedings{IEEE:2005:PIS,
  editor =       "{IEEE}",
  booktitle =    "{Proceedings of the 17th IEEE Symposium on Computer
                 Arithmetic, ARITH-17, June 27--29, 2005, Cape Cod,
                 Massachusetts, USA}",
  title =        "{Proceedings of the 17th IEEE Symposium on Computer
                 Arithmetic, ARITH-17, June 27--29, 2005, Cape Cod,
                 Massachusetts, USA}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "????",
  year =         "2005",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Tue Jun 21 19:02:16 2005",
  bibsource =    "http://arith17.polito.it/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
  xxnote =       "Not yet published: check editor??",
}

@Proceedings{Ioannidis:2005:ACN,
  editor =       "John Ioannidis and Angelos Keromytis and Moti Yung",
  booktitle =    "{Applied Cryptography and Network Security: Third
                 International Conference, ACNS 2005, New York, NY, USA,
                 June 7--10, 2005, proceedings}",
  title =        "{Applied Cryptography and Network Security: Third
                 International Conference, ACNS 2005, New York, NY, USA,
                 June 7--10, 2005, proceedings}",
  volume =       "3531",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 530",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b137093",
  ISBN =         "3-540-26223-7 (softcover)",
  ISBN-13 =      "978-3-540-26223-7 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "TK5102.85 .A26 2005",
  bibdate =      "Thu Jun 2 09:16:22 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3531;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b137093",
  acknowledgement = ack-nhfb,
  subject =      "Telecommunication; Security measures; Congresses; Data
                 encryption (Computer science); Cryptography",
}

@Proceedings{Kanade:2005:AVB,
  editor =       "Takeo Kanade and Anil Jain and Nalini K. Ratha",
  booktitle =    "{Audio- and Video-Based Biometric Person
                 Authentication: 5th International Conference, AVBPA
                 2005, Hilton Rye Town, NY, USA, July 20--22, 2005.
                 Proceedings}",
  title =        "{Audio- and Video-Based Biometric Person
                 Authentication: 5th International Conference, AVBPA
                 2005, Hilton Rye Town, NY, USA, July 20--22, 2005.
                 Proceedings}",
  volume =       "3546",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xx + 1134",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11527923_25",
  ISBN =         "3-540-27887-7",
  ISBN-13 =      "978-3-540-27887-0",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "TK7882.S65 I565 2005",
  bibdate =      "Thu Sep 29 06:46:02 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
}

@Proceedings{Kilian:2005:TCS,
  editor =       "Joe Kilian",
  booktitle =    "{Theory of cryptography: Second theory of cryptography
                 conference, TCC 2005, Cambridge, MA, USA, February
                 10--12, 2005, proceedings}",
  title =        "{Theory of cryptography: Second theory of cryptography
                 conference, TCC 2005, Cambridge, MA, USA, February
                 10--12, 2005, proceedings}",
  volume =       "3378",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xii + 619",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b106171",
  ISBN =         "3-540-24573-1 (softcover)",
  ISBN-13 =      "978-3-540-24573-5 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 T44 2005",
  bibdate =      "Thu Jun 2 09:14:25 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3378;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b106171",
  acknowledgement = ack-nhfb,
}

@Proceedings{Li:2005:ABPa,
  editor =       "S. Z. Li",
  booktitle =    "{Advances in biometric person authentication: 5th
                 Chinese conference on biometric recognition,
                 SINOBIOMETRICS 2004, Guangzhou, China, December 13--14,
                 2004, proceedings}",
  title =        "{Advances in biometric person authentication: 5th
                 Chinese conference on biometric recognition,
                 SINOBIOMETRICS 2004, Guangzhou, China, December 13--14,
                 2004, proceedings}",
  volume =       "3338",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xviii + 699",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-24029-2 (softcover)",
  ISBN-13 =      "978-3-540-24029-7 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "TK7882.B56 C4 2004",
  bibdate =      "Thu Jun 2 09:13:42 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3338",
  acknowledgement = ack-nhfb,
}

@Proceedings{Li:2005:ABPb,
  editor =       "Stan Z. Li and Zhenan Sun and Tieniu Tan and Sharath
                 Pankanti and G{\'e}rard Chollet and David Zhang",
  booktitle =    "{Advances in biometric person authentication:
                 International Workshop on Biometric Recognition
                 Systems, IWBRS 2005, Beijing, China, October 22--23,
                 2005: proceedings}",
  title =        "{Advances in biometric person authentication:
                 International Workshop on Biometric Recognition
                 Systems, IWBRS 2005, Beijing, China, October 22--23,
                 2005: proceedings}",
  volume =       "3781",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 250",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11569947",
  ISBN =         "3-540-29431-7",
  ISBN-13 =      "978-3-540-29431-3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "TK7882.B56 I58 2005",
  bibdate =      "Wed Apr 5 09:41:52 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3781",
  acknowledgement = ack-nhfb,
  meetingname =  "International Workshop on Biometric Recognition
                 Systems (2005: Beijing, China)",
  subject =      "Biometric identification; Congresses; Optical pattern
                 recognition; Face perception; Identification;
                 Automation; Image processing; Digital techniques",
}

@Proceedings{Martin:2005:PET,
  editor =       "David Martin and Andrei Serjantov",
  booktitle =    "{Privacy Enhancing Technologies: 4th International
                 Workshop, PET 2004, Toronto, Canada, May 26--28, 2004.
                 Revised Selected Papers}",
  title =        "{Privacy Enhancing Technologies: 4th International
                 Workshop, PET 2004, Toronto, Canada, May 26--28, 2004.
                 Revised Selected Papers}",
  volume =       "3424",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "viii + 343",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11423409_22",
  ISBN =         "3-540-26203-2",
  ISBN-13 =      "978-3-540-26203-9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 P49 2004",
  bibdate =      "Thu Sep 29 06:46:02 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
}

@Proceedings{Meadows:2005:CPA,
  editor =       "Catherine Meadows and Paul Syverson",
  booktitle =    "{CCS '05: proceedings of the 12th ACM Conference on
                 Computer and Communications Security: November 7--11,
                 2005, Alexandria, Virginia, USA}",
  title =        "{CCS '05: proceedings of the 12th ACM Conference on
                 Computer and Communications Security: November 7--11,
                 2005, Alexandria, Virginia, USA}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "x + 408",
  year =         "2005",
  ISBN =         "1-59593-226-7",
  ISBN-13 =      "978-1-59593-226-6",
  LCCN =         "QA76.9.A25",
  bibdate =      "Mon Apr 3 08:02:50 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  note =         "ACM order number 459050.",
  acknowledgement = ack-nhfb,
  meetingname =  "ACM Conference on Computer and Communications Security
                 (12th: 2005: Alexandria, VA)",
  subject =      "Computer security; Congresses; Telecommunication
                 systems; Security measures",
}

@Proceedings{Menezes:2005:TCC,
  editor =       "Alfred Menezes",
  booktitle =    "{Topics in cryptology CT-RSA 2005: The cryptographers'
                 track at the RSA Conference 2005, San Francisco, CA,
                 USA, February 14--18, 2005. Proceedings}",
  title =        "{Topics in cryptology CT-RSA 2005: The cryptographers'
                 track at the RSA Conference 2005, San Francisco, CA,
                 USA, February 14--18, 2005. Proceedings}",
  volume =       "3376",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "x + 383",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b105222",
  ISBN =         "3-540-24399-2 (softcover)",
  ISBN-13 =      "978-3-540-24399-1 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 R753 2005",
  bibdate =      "Thu Jun 2 09:14:23 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3376;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b105222",
  acknowledgement = ack-nhfb,
}

@Proceedings{Park:2005:ISC,
  editor =       "Choonsik Park and Seongtaek Chee",
  booktitle =    "{Information security and cryptology: ICISC 2004: 7th
                 international conference, Seoul, Korea, December 2--3,
                 2004. Revised selected papers}",
  title =        "{Information security and cryptology: ICISC 2004: 7th
                 international conference, Seoul, Korea, December 2--3,
                 2004. Revised selected papers}",
  volume =       "3506",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiv + 490",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b137120",
  ISBN =         "3-540-26226-1 (softcover)",
  ISBN-13 =      "978-3-540-26226-8 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Thu Jun 2 09:16:03 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3506;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b137120",
  acknowledgement = ack-nhfb,
}

@Proceedings{Patrick:2005:FCD,
  editor =       "Andrew S. Patrick and Moti Yung",
  booktitle =    "{Financial cryptography and data security: 9th
                 international conference, FC 2005, Roseau, The
                 Commonwealth of Dominica, February 28--March 3, 2005:
                 revised papers}",
  title =        "{Financial cryptography and data security: 9th
                 international conference, FC 2005, Roseau, The
                 Commonwealth of Dominica, February 28--March 3, 2005:
                 revised papers}",
  volume =       "3570",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xii + 376",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-26656-9",
  ISBN-13 =      "978-3-540-26656-3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "HG1710 .F35 2005; HG1710 .F35 2005eb; HG1710;
                 Internet",
  bibdate =      "Wed Apr 5 16:55:11 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3570",
  acknowledgement = ack-nhfb,
  meetingname =  "FC 2005 (2005 : Roseau, Dominica)",
  subject =      "Electronic funds transfers; Security measures;
                 Congresses; Data encryption (Computer science);
                 Electronic commerce; Internet; Computer networks",
}

@Proceedings{Rao:2005:CHE,
  editor =       "Josyula R. Rao and Berk Sunar",
  booktitle =    "{Cryptographic Hardware and Embedded Systems --- CHES
                 2005: 7th International Workshop, Edinburgh, UK, August
                 29--September 1, 2005. Proceedings}",
  title =        "{Cryptographic Hardware and Embedded Systems --- CHES
                 2005: 7th International Workshop, Edinburgh, UK, August
                 29--September 1, 2005. Proceedings}",
  volume =       "3659",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "455",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11545262",
  ISBN =         "3-540-28474-5",
  ISBN-13 =      "978-3-540-28474-1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Wed Apr 5 11:51:26 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3659",
  acknowledgement = ack-nhfb,
}

@Proceedings{Roy:2005:ACA,
  editor =       "Bimal Roy",
  booktitle =    "{Advances in cryptology: ASIACRYPT 2005: 11th
                 International Conference on the Theory and Application
                 of Cryptology and Information Security, Chennai, India,
                 December 4--8, 2005}",
  title =        "{Advances in cryptology: ASIACRYPT 2005: 11th
                 International Conference on the Theory and Application
                 of Cryptology and Information Security, Chennai, India,
                 December 4--8, 2005}",
  volume =       "3788",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiv + 701",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11593447",
  ISBN =         "3-540-30684-6",
  ISBN-13 =      "978-3-540-30684-9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 I555 2005",
  bibdate =      "Wed Apr 5 09:42:09 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3788",
  acknowledgement = ack-nhfb,
  meetingname =  "International Conference on the Theory and Application
                 of Cryptology and Information Security (11th: 2005:
                 Chennai, India)",
  remark =       "Association for Cryptologic Research, IACR.",
  subject =      "Computer security; Congresses; Cryptography",
}

@Proceedings{Schmalz:2005:MDI,
  editor =       "Mark S. Schmalz",
  booktitle =    "Mathematics of data\slash image coding, compression,
                 and encryption {VIII}, with applications: 1--3 August,
                 2005, San Diego, California, {USA}",
  title =        "Mathematics of data\slash image coding, compression,
                 and encryption {VIII}, with applications: 1--3 August,
                 2005, San Diego, California, {USA}",
  volume =       "5915",
  publisher =    pub-SPIE,
  address =      pub-SPIE:adr,
  pages =        "????",
  year =         "2005",
  ISBN =         "0-8194-5920-8",
  ISBN-13 =      "978-0-8194-5920-6",
  ISSN =         "0277-786X (print), 1996-756X (electronic)",
  LCCN =         "TA1637 .M375 2005; TA1637; Internet",
  bibdate =      "Sat Dec 24 08:47:41 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  series =       "Proceedings of SPIE",
  URL =          "http://uclibs.org/PID/98054",
  acknowledgement = ack-nhfb,
  subject =      "Image processing; Mathematics; Congresses; Digital
                 techniques; Image compression; Data encryption
                 (Computer science)",
}

@Proceedings{Shoup:2005:ACC,
  editor =       "Victor Shoup",
  booktitle =    "{Advances in cryptology: CRYPTO 2005: 25th Annual
                 International Cryptology Conference, Santa Barbara,
                 California, USA, August 14--18, 2005: proceedings}",
  title =        "{Advances in cryptology: CRYPTO 2005: 25th Annual
                 International Cryptology Conference, Santa Barbara,
                 California, USA, August 14--18, 2005: proceedings}",
  volume =       "3621",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 568",
  year =         "2005",
  ISBN =         "3-540-28114-2",
  ISBN-13 =      "978-3-540-28114-6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  LCCN =         "QA76.9.A25 C79 2005; QA76.9 .A25; QA76.9 C79 2005;
                 QA76.9 C794 2005; QA76.9; Internet",
  bibdate =      "Mon Apr 3 08:16:05 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 melvyl.cdlib.org:210/CDL90",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3621",
  acknowledgement = ack-nhfb,
  meetingname =  "CRYPTO (Conference) (25th: 2005: Santa Barbara, CA)",
  subject =      "Computers; Access control; Congresses; Cryptography;
                 Data transmission systems; Security measures",
}

@Proceedings{Smart:2005:CCI,
  editor =       "Nigel P. Smart",
  booktitle =    "{Cryptography and Coding: 10th IMA international
                 Conference, Cirencester, UK, December 19--21, 2005.
                 Proceedings}",
  title =        "{Cryptography and Coding: 10th IMA international
                 Conference, Cirencester, UK, December 19--21, 2005.
                 Proceedings}",
  volume =       "3796",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11586821",
  ISBN =         "3-540-30276-X (softcover)",
  ISBN-13 =      "978-3-540-30276-6 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Wed Apr 5 19:46:53 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3796",
  acknowledgement = ack-nhfb,
}

@Proceedings{Vaudenay:2005:PKC,
  editor =       "Serge Vaudenay",
  booktitle =    "{Public key cryptography --- PKC 2005: 8th
                 International Workshop on Theory and Practice in Public
                 Key Cryptography, Les Diablerets, Switzerland, January
                 23--26, 2005: Proceedings}",
  title =        "{Public key cryptography --- PKC 2005: 8th
                 International Workshop on Theory and Practice in Public
                 Key Cryptography, Les Diablerets, Switzerland, January
                 23--26, 2005: Proceedings}",
  volume =       "3386",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiii + 431",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/b105124",
  ISBN =         "3-540-24454-9 (paperback)",
  ISBN-13 =      "978-3-540-24454-7 (paperback)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 I567 2005",
  bibdate =      "Thu Jun 2 09:14:32 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0302-9743&volume=3386;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3386;
                 http://www.springerlink.com/openurl.asp?genre=volume&id=doi:10.1007/b105124",
  acknowledgement = ack-nhfb,
  meetingname =  "International Workshop on Theory and Practice in
                 Public Key Cryptography (8th: 2005: Les Diablerets,
                 Switzerland)",
  subject =      "Computer security; Congresses; Computers; Access
                 control; Congresses; Data encryption (Computer
                 science); Congresses; Public key cryptology;
                 Congresses",
}

@Proceedings{ACM:2006:PTE,
  editor =       "{ACM}",
  booktitle =    "{Proceedings of the Thirty-Eighth Annual ACM Symposium
                 on Theory of Computing 2006, Seattle, WA, USA, May
                 21--23, 2006}",
  title =        "{Proceedings of the Thirty-Eighth Annual ACM Symposium
                 on Theory of Computing 2006, Seattle, WA, USA, May
                 21--23, 2006}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "xiv + 768",
  year =         "2006",
  ISBN =         "1-59593-134-1",
  ISBN-13 =      "978-1-59593-134-4",
  LCCN =         "QA75.5 .A22 2006",
  bibdate =      "Thu May 25 06:13:58 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "ACM order number 508060.",
  URL =          "http://portal.acm.org/citation.cfm?id=1132516",
  acknowledgement = ack-nhfb,
}

@Proceedings{Atzeni:2006:PKI,
  editor =       "Andrea S. Atzeni and Antonio Lioy",
  booktitle =    "{Public Key Infrastructure: Third European PKI
                 Workshop: Theory and Practice, EUROPKI 2006, Turin,
                 Italy, June 19--20, 2006. Proceedings}",
  title =        "{Public Key Infrastructure: Third European PKI
                 Workshop: Theory and Practice, EUROPKI 2006, Turin,
                 Italy, June 19--20, 2006. Proceedings}",
  volume =       "4043",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2006",
  ISBN =         "3-540-35151-5 (softcover)",
  ISBN-13 =      "978-3-540-35151-1 (softcover)",
  LCCN =         "????",
  bibdate =      "Tue Jun 13 16:14:38 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
}

@Book{Cohen:2006:HEH,
  editor =       "Henri Cohen and Gerhard Frey and Roberto Avanzi and
                 others",
  booktitle =    "Handbook of Elliptic and Hyperelliptic Curve
                 Cryptography",
  title =        "Handbook of Elliptic and Hyperelliptic Curve
                 Cryptography",
  publisher =    pub-CHAPMAN-HALL-CRC,
  address =      pub-CHAPMAN-HALL-CRC:adr,
  pages =        "xxxiv + 808",
  year =         "2006",
  ISBN =         "1-58488-518-1",
  ISBN-13 =      "978-1-58488-518-4",
  LCCN =         "QA567.2.E44 H36 2006",
  bibdate =      "Thu Mar 22 12:20:50 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Discrete mathematics and its applications",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0647/2005041841-d.html",
  acknowledgement = ack-nhfb,
  subject =      "Curves, Elliptic; Handbooks, manuals, etc;
                 Cryptography; Mathematics; Machine theory",
}

@Book{Copeland:2006:CSB,
  editor =       "B. Jack Copeland",
  booktitle =    "{Colossus}: the secrets of {Bletchley Park}'s
                 codebreaking computers",
  title =        "{Colossus}: the secrets of {Bletchley Park}'s
                 codebreaking computers",
  publisher =    pub-OXFORD,
  address =      pub-OXFORD:adr,
  pages =        "xvi + 462 + 16",
  year =         "2006",
  ISBN =         "0-19-284055-X (hardcover), 0-19-957814-1 (paperback)",
  ISBN-13 =      "978-0-19-284055-4 (hardcover), 978-0-19-957814-6
                 (paperback)",
  LCCN =         "D810.C88 C66 2006",
  bibdate =      "Tue Jun 26 07:56:07 2012",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/annhistcomput.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 library.ox.ac.uk:210/ADVANCE",
  URL =          "http://www.colossus-computer.com/",
  acknowledgement = ack-nhfb,
  subject =      "Lorenz cipher system; World War, 1939--1945;
                 Cryptography; Electronic intelligence; Great Britain;
                 History; Germany; Computers",
  tableofcontents = "A brief history of cryptography from Caesar to
                 Bletchley Park / Simon Singh \\
                 How it began: Bletchley Park goes to war / Michael
                 Smith \\
                 The German Tunny machine / Jack Copeland \\
                 Colossus, codebreaking, and the digital age / Stephen
                 Budiansky \\
                 Machine against machine / Jack Copeland \\
                 D-Day at Bletchley Park / Thomas H. Flowers \\
                 Intercept! / Jack Copeland \\
                 Colossus / Thomas H. Flowers \\
                 Colossus and the rise of the modern computer / Jack
                 Copeland \\
                 The PC user's guide to Colossus / Benjamin Wells \\
                 Of men and machines / Brian Randell \\
                 The Colossus rebuild / Tony Sale \\
                 Mr. Newman's section / Jack Copeland, with Catherine
                 Caughey \ldots{} [et al.] \\
                 Max Newman: mathematician, codebreaker, and computer
                 pioneer / William Newman \\
                 Living with Fish: breaking Tunny in the Newmanry and
                 the Testery / Peter Hilton \\
                 From Hut 8 to the Newmanry / Irving John ``Jack'' Good
                 \\
                 Codebreaking and Colossus / Donald Michie \\
                 Major Tester's section / Jerry Roberts \\
                 Setter and breaker / Roy Jenkins \\
                 An ATS girl in the Testery / Helen Currie \\
                 The Testery and the breaking of Fish / Peter Edgerley
                 \\
                 Dollis Hill at war / Jack Copeland, with David Bolam
                 \ldots{} [et al.] \\
                 The British Tunny machine / Gil Hayward \\
                 How Colossus was built and operated: one of its
                 engineers reveals its secrets / Harry Fensom \\
                 Bletchley Park's Sturgeon: the Fish that laid no eggs /
                 Frode Weierud \\
                 German teleprinter traffic and Swedish wartime
                 intelligence / Craig McKay",
}

@Proceedings{Domingo-Ferrer:2006:SCR,
  editor =       "Josep Domingo-Ferrer and Joachim Posegga and Daniel
                 Schreckling",
  booktitle =    "{Smart Card Research and Advanced Applications: 7th
                 IFIP WG 8.8/11.2 International Conference, CARDIS 2006,
                 Tarragona, Spain, April 19--21, 2006. Proceedings}",
  title =        "{Smart Card Research and Advanced Applications: 7th
                 IFIP WG 8.8/11.2 International Conference, CARDIS 2006,
                 Tarragona, Spain, April 19--21, 2006. Proceedings}",
  volume =       "3928",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "358 (est.)",
  year =         "2006",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11733447",
  ISBN =         "3-540-33311-8",
  ISBN-13 =      "978-3-540-33311-1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Wed Apr 5 09:35:58 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3928",
  acknowledgement = ack-nhfb,
}

@Proceedings{Feng:2006:ISC,
  editor =       "Dengguo Feng and Dongdai Lin and Moti Yung",
  booktitle =    "{Information Security and Cryptology: First SKLOIS
                 Conference, CISC 2005, Beijing, China, December 15--17,
                 2005. Proceedings}",
  title =        "{Information Security and Cryptology: First SKLOIS
                 Conference, CISC 2005, Beijing, China, December 15--17,
                 2005. Proceedings}",
  volume =       "3822",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2006",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11599548",
  ISBN =         "3-540-30855-5 (softcover)",
  ISBN-13 =      "978-3-540-30855-3 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Wed Apr 5 19:52:37 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3822",
  acknowledgement = ack-nhfb,
}

@Proceedings{Halevi:2006:TCT,
  editor =       "Shai Halevi and Tal Rabin",
  booktitle =    "{Theory of Cryptography: Third Theory of Cryptography
                 Conference, TCC 2006, New York, NY, USA, March 4--7,
                 2006. Proceedings}",
  title =        "{Theory of Cryptography: Third Theory of Cryptography
                 Conference, TCC 2006, New York, NY, USA, March 4--7,
                 2006. Proceedings}",
  volume =       "3876",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2006",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11681878",
  ISBN =         "3-540-32731-2 (softcover)",
  ISBN-13 =      "978-3-540-32731-8 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Wed Apr 5 20:03:23 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3876",
  acknowledgement = ack-nhfb,
}

@Proceedings{IEEE:2006:AIS,
  editor =       "{IEEE}",
  booktitle =    "{47th Annual IEEE Symposium on Foundations of Computer
                 Science: FOCS 2006: 21--24 October, 2006, Berkeley,
                 California}",
  title =        "{47th Annual IEEE Symposium on Foundations of Computer
                 Science: FOCS 2006: 21--24 October, 2006, Berkeley,
                 California}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xiv + 750",
  year =         "2006",
  ISBN =         "0-7695-2720-5, 0-7695-2362-5",
  ISBN-13 =      "978-0-7695-2720-8, 978-0-7695-2362-0",
  ISSN =         "0272-5428",
  LCCN =         "QA76 .S974 2006",
  bibdate =      "Thu May 6 08:30:22 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  note =         "IEEE Computer Society Order Number P2720.",
  URL =          "http://ieeexplore.ieee.org/servlet/opac?punumber=4031329",
  acknowledgement = ack-nhfb,
  meetingname =  "Symposium on Foundations of Computer Science (47th:
                 2006: Berkeley, California)",
  subject =      "electronic data processing; congresses; machine
                 theory",
}

@Proceedings{Maitra:2006:PCI,
  editor =       "Subhamoy Maitra and C. E. Veni Madhavan and
                 Ramarathnam Venkatesan",
  booktitle =    "{Progress in Cryptology --- INDOCRYPT 2005: 6th
                 International Conference on Cryptology in India,
                 Bangalore, India, December 10--12, 2005. Proceedings}",
  title =        "{Progress in Cryptology --- INDOCRYPT 2005: 6th
                 International Conference on Cryptology in India,
                 Bangalore, India, December 10--12, 2005. Proceedings}",
  volume =       "3797",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2006",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11596219",
  ISBN =         "3-540-30805-9 (softcover)",
  ISBN-13 =      "978-3-540-30805-8 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Wed Apr 5 19:47:13 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3797",
  acknowledgement = ack-nhfb,
}

@Proceedings{Pointcheval:2006:TCC,
  editor =       "David Pointcheval",
  booktitle =    "{Topics in Cryptology --- CT-RSA 2006: The
                 Cryptographers' Track at the RSA Conference 2006, San
                 Jose, CA, USA, February 13--17, 2006, proceedings}",
  title =        "{Topics in Cryptology --- CT-RSA 2006: The
                 Cryptographers' Track at the RSA Conference 2006, San
                 Jose, CA, USA, February 13--17, 2006, proceedings}",
  volume =       "3860",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 364",
  year =         "2006",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11605805",
  ISBN =         "3-540-31033-9",
  ISBN-13 =      "978-3-540-31033-4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Wed Apr 5 09:35:58 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3860",
  acknowledgement = ack-nhfb,
}

@Proceedings{Preneel:2006:SAC,
  editor =       "Bart Preneel and Stafford Tavares",
  booktitle =    "{Selected Areas in Cryptography: 12th International
                 Workshop, SAC 2005, Kingston, ON, Canada, August
                 11--12, 2005, Revised Selected Papers}",
  title =        "{Selected Areas in Cryptography: 12th International
                 Workshop, SAC 2005, Kingston, ON, Canada, August
                 11--12, 2005, Revised Selected Papers}",
  volume =       "3897",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2006",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11693383",
  ISBN =         "3-540-33108-5 (softcover)",
  ISBN-13 =      "978-3-540-33108-7 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Wed Apr 5 20:10:26 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3897",
  acknowledgement = ack-nhfb,
}

@Book{Schroeder:2006:NTS,
  author =       "Manfred Robert Schroeder",
  booktitle =    "Number Theory in Science and Communication: With
                 Applications in Cryptography, Physics, Digital
                 Information, Computing, and Self-Similarity",
  title =        "Number Theory in Science and Communication: With
                 Applications in Cryptography, Physics, Digital
                 Information, Computing, and Self-Similarity",
  volume =       "7",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  edition =      "Fourth",
  pages =        "xxvi + 367",
  year =         "2006",
  DOI =          "https://doi.org/10.1007/3-540-26598-8",
  ISBN =         "3-540-26598-8, 3-540-26596-1",
  ISBN-13 =      "978-3-540-26598-6, 978-3-540-26596-2",
  ISSN =         "0720-678X",
  LCCN =         "QA241",
  bibdate =      "Fri Mar 9 08:36:40 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib;
                 z3950.bibsys.no:2100/BIBSYS",
  series =       "Springer Series in Information Sciences",
  acknowledgement = ack-nhfb,
  subject =      "physics; coding theory; number theory; mathematical
                 physics; coding and information theory; mathematical
                 methods in physics; distribution (probability theory);
                 numerical and computational methods; probability theory
                 and stochastic processes",
}

@Proceedings{Turner:2006:SIS,
  editor =       "Stephen John Turner and Bu Sung Lee and Wientong Cai",
  booktitle =    "{Sixth International Symposium on Cluster Computing
                 and the Grid CCGrid 06: 16--19 May, 2006, Singapore}",
  title =        "{Sixth International Symposium on Cluster Computing
                 and the Grid CCGrid 06: 16--19 May, 2006, Singapore}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xxiii + 662",
  year =         "2006",
  ISBN =         "0-7695-2585-7",
  ISBN-13 =      "978-0-7695-2585-3",
  LCCN =         "QA76.9.C58",
  bibdate =      "Sat Oct 14 15:36:24 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib;
                 z3950.loc.gov:7090/Voyager",
  note =         "IEEE Computer Society Order Number P2585.",
  acknowledgement = ack-nhfb,
}

@Proceedings{Won:2006:ISC,
  editor =       "Dongho Won and Seungjoo Kim",
  booktitle =    "{Information security and cryptology --- ICISC 2005:
                 8th international conference, Seoul, Korea, December
                 1--2, 2005, revised selected papers}",
  title =        "{Information security and cryptology --- ICISC 2005:
                 8th international conference, Seoul, Korea, December
                 1--2, 2005, revised selected papers}",
  volume =       "3935",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiv + 458",
  year =         "2006",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-33354-1 (softcover)",
  ISBN-13 =      "978-3-540-33354-8 (softcover)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "????",
  bibdate =      "Wed Apr 5 20:15:09 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3935",
  acknowledgement = ack-nhfb,
}

@Proceedings{Ytrehus:2006:CCI,
  editor =       "{\O}yvind Ytrehus",
  booktitle =    "Coding and Cryptography: {International Workshop, WCC
                 2005, Bergen, Norway, March 14--18, 2005}. Revised
                 Selected Papers",
  title =        "Coding and Cryptography: {International Workshop, WCC
                 2005, Bergen, Norway, March 14--18, 2005}. Revised
                 Selected Papers",
  volume =       "3969",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  year =         "2006",
  DOI =          "https://doi.org/10.1007/11779360",
  ISBN =         "3-540-35481-6",
  ISBN-13 =      "978-3-540-35481-9",
  LCCN =         "QA76.9.A25 I557 2005",
  bibdate =      "Mon Jun 27 22:43:21 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
  subject =      "computers; access control; congresses; coding theory;
                 cryptography",
}

@Proceedings{Yung:2006:PKC,
  editor =       "Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and
                 Tal Malkin",
  booktitle =    "{Public Key Cryptography: PPK 2006: 9th International
                 Conference on Theory and Practice in Public-Key
                 Cryptography, New York, NY, USA, April 24--26, 2006.
                 Proceedings}",
  title =        "{Public Key Cryptography: PPK 2006: 9th International
                 Conference on Theory and Practice in Public-Key
                 Cryptography, New York, NY, USA, April 24--26, 2006.
                 Proceedings}",
  volume =       "3958",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiv + 543",
  year =         "2006",
  ISBN =         "3-540-33851-9 (softcover)",
  ISBN-13 =      "978-3-540-33851-2 (softcover)",
  LCCN =         "????",
  bibdate =      "Tue Jun 13 10:22:42 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3958",
  acknowledgement = ack-nhfb,
}

@Proceedings{ACM:2007:SPA,
  editor =       "{ACM}",
  booktitle =    "{STOC '07: proceedings of the 39th Annual ACM
                 Symposium on Theory of Computing, San Diego,
                 California, USA, June 11--13, 2007}",
  title =        "{STOC '07: proceedings of the 39th Annual ACM
                 Symposium on Theory of Computing, San Diego,
                 California, USA, June 11--13, 2007}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "xv + 718",
  year =         "2007",
  ISBN =         "1-59593-631-9",
  ISBN-13 =      "978-1-59593-631-8",
  LCCN =         "QA75.5 .A22 2007",
  bibdate =      "Fri Jun 20 18:35:01 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.bibsys.no:2100/BIBSYS",
  acknowledgement = ack-nhfb,
}

@Proceedings{Adams:2007:SAC,
  editor =       "Carlisle Adams and Ali Miri and Michael Wiener",
  booktitle =    "{Selected areas in cryptography: 14th international
                 workshop, SAC 2007, Ottawa, Canada, August 16--17,
                 2007; revised selected papers}",
  title =        "{Selected areas in cryptography: 14th international
                 workshop, SAC 2007, Ottawa, Canada, August 16--17,
                 2007; revised selected papers}",
  volume =       "4876",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  year =         "2007",
  DOI =          "https://doi.org/10.1007/978-3-540-77360-3",
  ISBN =         "3-540-77360-6",
  ISBN-13 =      "978-3-540-77360-3",
  LCCN =         "????",
  bibdate =      "Mon Jun 27 22:48:38 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
}

@Proceedings{Biryukov:2007:FSE,
  editor =       "Alex Biryukov",
  booktitle =    "{Fast software encryption: 14th international
                 workshop, FSE 2007, Luxembourg, Luxembourg, March
                 26--28, 2007, revised selected papers}",
  title =        "{Fast software encryption: 14th international
                 workshop, FSE 2007, Luxembourg, Luxembourg, March
                 26--28, 2007, revised selected papers}",
  volume =       "4593",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 465",
  year =         "2007",
  ISBN =         "3-540-74617-X (softcover)",
  ISBN-13 =      "978-3-540-74617-1 (softcover)",
  LCCN =         "QA76.9.A25 F77 2007",
  bibdate =      "Sat Dec 15 11:14:00 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Lecture notes in computer science",
  URL =          "http://www.springerlink.com/openurl.asp?genre=book\%26isbn=978-3-540-74617-1",
  acknowledgement = ack-nhfb,
}

@Proceedings{IEEE:2007:PAI,
  editor =       "{IEEE}",
  booktitle =    "{Proceedings of the 48th Annual IEEE Symposium on
                 Foundations of Computer Science: [FOCS 2007]: October
                 20--23, 2007, Providence, Rhode Island}",
  title =        "{Proceedings of the 48th Annual IEEE Symposium on
                 Foundations of Computer Science: [FOCS 2007]: October
                 20--23, 2007, Providence, Rhode Island}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xiv + 736",
  year =         "2007",
  ISBN =         "0-7695-3010-9",
  ISBN-13 =      "978-0-7695-3010-9",
  ISSN =         "0272-5428",
  LCCN =         "QA76 .S974 2007",
  bibdate =      "Thu May 6 08:33:34 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  note =         "IEEE Computer Society order number P3010.",
  URL =          "http://ieeexplore.ieee.org/servlet/opac?punumber=4389466",
  acknowledgement = ack-nhfb,
  meetingname =  "Symposium on Foundations of Computer Science (48th:
                 2007: Providence, RI)",
  subject =      "Electronic data processing; Congresses; Machine
                 theory",
}

@Proceedings{Kornerup:2007:PIS,
  editor =       "Peter Kornerup and Jean-Michel Muller",
  booktitle =    "{Proceedings of the 18th IEEE Symposium on Computer
                 Arithmetic, June 25--27, 2007, Montpellier, France}",
  title =        "{Proceedings of the 18th IEEE Symposium on Computer
                 Arithmetic, June 25--27, 2007, Montpellier, France}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xii + 269",
  year =         "2007",
  ISBN =         "0-7695-2854-6",
  ISBN-13 =      "978-0-7695-2854-0",
  ISSN =         "1063-6889",
  LCCN =         "????",
  bibdate =      "Tue Jun 27 10:26:43 2006",
  bibsource =    "http://www.lirmm.fr/arith18/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 odin2.bib.sdu.dk:210/Horizon",
  URL =          "http://www.lirmm.fr/arith18/",
  acknowledgement = ack-nhfb,
}

@Proceedings{Menezes:2007:ACC,
  editor =       "A. J. (Alfred J.) Menezes",
  booktitle =    "{Advances in cryptology --- CRYPTO 2007: 27th Annual
                 International Cryptology Conference, Santa Barbara, CA,
                 USA, August 19--23, 2007: proceedings}",
  title =        "{Advances in cryptology --- CRYPTO 2007: 27th Annual
                 International Cryptology Conference, Santa Barbara, CA,
                 USA, August 19--23, 2007: proceedings}",
  volume =       "4622",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiv + 630",
  year =         "2007",
  ISBN =         "3-540-74142-9 (paperback)",
  ISBN-13 =      "978-3-540-74142-8 (paperback)",
  LCCN =         "QA76.9.A25 C79 2007",
  bibdate =      "Thu Apr 21 10:08:28 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  series =       "Lecture notes in computer science, 0302-9743",
  URL =          "http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=4622",
  acknowledgement = ack-nhfb,
  meetingname =  "CRYPTO (Conference) (27th : 2007 : Santa Barbara,
                 Calif.)",
  subject =      "International conference proceedings. International
                 Association for Cryptologic Research; computers; access
                 control; congresses; cryptography",
  tableofcontents = "I: Cryptanalysis I \\
                 Practical Cryptanalysis of SFLASH \\
                 Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
                 \\
                 II: Secure Searching \\
                 How Should We Solve Search Problems Privately? \\
                 Public Key Encryption That Allows PIR Queries \\
                 III: Invited Talk \\
                 Information Security Economics - and Beyond \\
                 IV: Theory I \\
                 Cryptography with Constant Input Locality \\
                 Universally-Composable Two-Party Computation in Two
                 Rounds \\
                 Indistinguishability Amplification \\
                 V: Lattices \\
                 A Hybrid Lattice-Reduction and Meet-in-the-Middle
                 Attack Against NTRU \\
                 Improved Analysis of Kannan's Shortest Lattice Vector
                 Algorithm (Extended Abstract) \\
                 VI: Random Oracles \\
                 Domain Extension of Public Random Functions: Beyond the
                 Birthday Barrier \\
                 Random Oracles and Auxiliary Input \\
                 VII: Hash Functions \\
                 Security-Amplifying Combiners for Collision-Resistant
                 Hash Functions \\
                 Hash Functions and the (Amplified) Boomerang Attack \\
                 Amplifying Collision Resistance: A Complexity-Theoretic
                 Treatment \\
                 VIII: Theory II \\
                 How Many Oblivious Transfers Are Needed for Secure
                 Multiparty Computation? \\
                 Simulatable VRFs with Applications to Multi-theorem
                 NIZK \\
                 Cryptography in the Multi-string Model \\
                 IX: Quantum Cryptography \\
                 Secure Identification and QKD in the
                 Bounded-Quantum-Storage Model \\
                 A Tight High-Order Entropic Quantum Uncertainty
                 Relation with Applications \\
                 X: Cryptanalysis II \\
                 Finding Small Roots of Bivariate Integer Polynomial
                 Equations: A Direct Approach \\
                 A Polynomial Time Attack on RSA with Private
                 CRT-Exponents Smaller Than N<sup>0.073</sup> \\
                 XI: Encryption \\
                 Invertible Universal Hashing and the TET Encryption
                 Mode \\
                 Reducing Trust in the PKG in Identity Based
                 Cryptosystems \\
                 Pirate Evolution: How to Make the Most of Your Traitor
                 Keys \\
                 XII: Protocol Analysis \\
                 A Security Analysis of the NIST SP 800-90 Elliptic
                 Curve Random Number Generator \\
                 A Generalization of DDH with Applications to Protocol
                 Analysis and Computational Soundness \\
                 Chernoff-Type Direct Product Theorems \\
                 XIII: Public-Key Encryption \\
                 Rerandomizable RCCA Encryption \\
                 Deterministic and Efficiently Searchable Encryption \\
                 Secure Hybrid Encryption from Weakened Key
                 Encapsulation \\
                 XIV: Multi-party Computation \\
                 Scalable and Unconditionally Secure Multiparty
                 Computation \\
                 On Secure Multi-party Computation in Black-Box Groups
                 \\
                 A Note on Secure Computation of the Moore-Penrose
                 Pseudoinverse and Its Application to Secure Linear
                 Algebra \\
                 Author Index",
}

@Proceedings{Simos:2007:CMS,
  editor =       "Theodore E. Simos and George Maroulis",
  booktitle =    "{Computation in Modern Science and Engineering:
                 Proceedings of the [Fifth] International Conference on
                 Computational Methods in Science and Engineering 2007
                 (ICCMSE 2007), Corfu, Greece, 25--30 September 2007}",
  title =        "{Computation in Modern Science and Engineering:
                 Proceedings of the [Fifth] International Conference on
                 Computational Methods in Science and Engineering 2007
                 (ICCMSE 2007), Corfu, Greece, 25--30 September 2007}",
  volume =       "2A, 2B",
  publisher =    pub-AIP,
  address =      pub-AIP:adr,
  bookpages =    "xxvi + 730 + 10 (vol. 2A)",
  pages =        "xxvi + 730 + 10 (vol. 2A)",
  year =         "2007",
  ISBN =         "0-7354-0476-3 (set), 0-7354-0477-1 (vol. 1),
                 0-7354-0478-X (vol. 2)",
  ISBN-13 =      "978-0-7354-0476-2 (set), 978-0-7354-0477-9 (vol. 1),
                 978-0-7354-0478-6 (vol. 2)",
  ISSN =         "0094-243X (print), 1551-7616 (electronic), 1935-0465",
  LCCN =         "Q183.9 .I524 2007",
  bibdate =      "Thu Feb 21 14:15:15 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  series =       "AIP Conference Proceedings (\#963)",
  URL =          "http://www.springer.com/physics/atoms/book/978-0-7354-0478-6",
  abstract =     "All papers have been peer-reviewed. The aim of ICCMSE
                 2007 is to bring together computational scientists and
                 engineers from several disciplines in order to share
                 methods, methodologies and ideas. The potential readers
                 of these proceedings are all the scientists with
                 interest in the following fields: Computational
                 Mathematics, Theoretical Physics, Computational
                 Physics, Theoretical Chemistry, Computational
                 Chemistry, Mathematical Chemistry, Computational
                 Engineering, Computational Mechanics, Computational
                 Biology and Medicine, Scientific Computation, High
                 Performance Computing, Parallel and Distributed
                 Computing, Visualization, Problem Solving Environments,
                 Software Tools, Advanced Numerical Algorithms, Modeling
                 and Simulation of Complex Systems, Web-based Simulation
                 and Computing, Grid-based Simulation and Computing,
                 Computational Grids, and Computer Science.",
  acknowledgement = ack-nhfb,
  remark =       "Two volumes.",
}

@Proceedings{ACM:2008:SPA,
  editor =       "{ACM}",
  booktitle =    "{STOC '08: proceedings of the 40th Annual ACM
                 Symposium on Theory of Computing, Victoria, British
                 Columbia, Canada, May 17--20, 2008}",
  title =        "{STOC '08: proceedings of the 40th Annual ACM
                 Symposium on Theory of Computing, Victoria, British
                 Columbia, Canada, May 17--20, 2008}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "xv + 798",
  year =         "2008",
  ISBN =         "1-60558-047-3",
  ISBN-13 =      "978-1-60558-047-0",
  LCCN =         "QA76.6 .A152 2008",
  bibdate =      "Fri Jun 20 18:35:01 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.bibsys.no:2100/BIBSYS",
  acknowledgement = ack-nhfb,
}

@Proceedings{Buchmann:2008:PQC,
  editor =       "Johannes Buchmann and Jintai Ding",
  booktitle =    "{Post-Quantum Cryptography: Second International
                 Workshop, PQCrypto 2008 Cincinnati, OH, USA, October
                 17--19, 2008 Proceedings}",
  title =        "{Post-Quantum Cryptography: Second International
                 Workshop, PQCrypto 2008 Cincinnati, OH, USA, October
                 17--19, 2008 Proceedings}",
  volume =       "5299",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "x + 231",
  year =         "2008",
  DOI =          "https://doi.org/10.1007/978-3-540-88403-3",
  ISBN =         "3-540-88402-5 (paperback), 3-540-88403-3 (pdf),
                 3-540-88701-6",
  ISBN-13 =      "978-3-540-88402-6 (paperback), 978-3-540-88403-3
                 (pdf), 978-3-540-88701-0",
  LCCN =         "QA76.9.A25 P63 2008",
  bibdate =      "Thu Apr 21 17:24:28 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.bibsys.no:2100/BIBSYS",
  series =       ser-LNCS,
  URL =          "http://www.springer.com/computer/security+and+cryptology/book/978-3-540-88402-6",
  abstract =     "This book constitutes the refereed proceedings of the
                 Second International Workshop on Post-Quantum
                 Cryptography, PQCrypto 2008, held in Cincinnati, OH,
                 USA, in October 2008. The 15 revised full papers
                 presented were carefully reviewed and selected from
                 numerous submissions. Quantum computers are predicted
                 to break existing public key cryptosystems within the
                 next decade. Post-quantum cryptography is a new fast
                 developing area, where public key schemes are studied
                 that could resist these emerging attacks. The papers
                 present four families of public key cryptosystems that
                 have the potential to resist quantum computers: the
                 code-based public key cryptosystems, the hash-based
                 public key cryptosystems, the lattice-based public key
                 cryptosystems and the multivariate public key
                 cryptosystems.",
  acknowledgement = ack-nhfb,
  keywords =     "access control; AES; authentication; code-based
                 cryptography; cryptanalysis; cryptographic attacks;
                 cryptographic protocols; cryptography; cryptology;
                 cryptosystems; digital signatures; elliptic curves;
                 hash functions; map decomposition; McEliece
                 cryptosystem; Merkle signatures; multivariate
                 cryptography; pairing computation; post quantum
                 cryptography; provable security; public key
                 cryptography; quantum cryptography; rational
                 polynomials; ring signatures; RSA cryptosystems;
                 security analysis; side channel attacks; signature
                 schemes; stream ciphers; symmetric key cryptosystems",
  subject =      "Algorithm Analysis and Problem Complexity; Computer
                 Communication Networks; Computer Science; Computer
                 software; Data Encryption; Data encryption (Computer
                 science); Data protection; Information Systems;
                 Information Systems Applications; Management of
                 Computing and Information Systems; Systems and Data
                 Security",
  tableofcontents = "A New Efficient Threshold Ring Signature Scheme
                 Based on Coding Theory \\
                 Square-Vinegar Signature Scheme \\
                 Attacking and Defending the McEliece Cryptosystem \\
                 McEliece Cryptosystem Implementation: Theory and
                 Practice \\
                 Merkle Tree Traversal Revisited \\
                 Explicit Hard Instances of the Shortest Vector Problem
                 \\
                 Practical-Sized Instances of Multivariate PKCs:
                 Rainbow, TTS, and?IC-Derivatives \\
                 Digital Signatures Out of Second-Preimage Resistant
                 Hash Functions \\
                 Cryptanalysis of Rational Multivariate Public Key
                 Cryptosystems \\
                 Syndrome Based Collision Resistant Hashing \\
                 Nonlinear Piece In Hand Perturbation Vector Method for
                 Enhancing Security of Multivariate Public Key
                 Cryptosystems \\
                 On the Power of Quantum Encryption Keys \\
                 Secure PRNGs from Specialized Polynomial Maps over Any
                 \\
                 MXL2: Solving Polynomial Equations over GF(2) Using an
                 Improved Mutant Strategy \\
                 Side Channels in the McEliece PKC",
  xxeditor =     "David Hutchison and Moni Naor and Doug Tygar and
                 Jintai Ding and Madhu Sudan and Takeo Kanade and Josef
                 Kittler and Moshe Y Vardi and C {Pandu Rangan} and
                 Gerhard Weikum and Jon M Kleinberg and John C Mitchell
                 and Oscar Nierstrasz and Bernhard Steffen and Johannes
                 Buchmann and Friedemann Mattern and Demetri
                 Terzopoulos",
}

@Proceedings{IEEE:2008:PAI,
  editor =       "{IEEE}",
  booktitle =    "{Proceedings of the 49th Annual IEEE Symposium on
                 Foundations of Computer Science: October 25--23, 2008,
                 Philadelphia, Pennsylvania, USA}",
  title =        "{Proceedings of the 49th Annual IEEE Symposium on
                 Foundations of Computer Science: October 25--23, 2008,
                 Philadelphia, Pennsylvania, USA}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xvi + 835",
  year =         "2008",
  ISBN =         "0-7695-3436-8",
  ISBN-13 =      "978-0-7695-3436-7",
  ISSN =         "0272-5428",
  LCCN =         "QA76 .S95 2008",
  bibdate =      "Thu May 6 08:34:02 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  note =         "IEEE Computer Society order number P3436.",
  URL =          "http://ieeexplore.ieee.org/servlet/opac?punumber=4690923",
  acknowledgement = ack-nhfb,
  meetingname =  "Symposium on Foundations of Computer Science (49th:
                 2008: Philadelphia, Pa.)",
  subject =      "electronic data processing; congresses; machine
                 theory",
}

@Proceedings{Jeffrey:2008:PAM,
  editor =       "David Jeffrey",
  booktitle =    "{Proceedings of the 21st annual meeting of the
                 International Symposium on Symbolic Computation, ISSAC
                 2008, July 20--23, 2008, Hagenberg, Austria}",
  title =        "{Proceedings of the 21st annual meeting of the
                 International Symposium on Symbolic Computation, ISSAC
                 2008, July 20--23, 2008, Hagenberg, Austria}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "x + 338",
  year =         "2008",
  ISBN =         "1-59593-904-0",
  ISBN-13 =      "978-1-59593-904-3",
  LCCN =         "????",
  bibdate =      "Fri Jun 20 08:53:37 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{ACM:2009:SPA,
  editor =       "{ACM}",
  booktitle =    "{STOC '09: proceedings of the 2009 ACM International
                 Symposium on Theory of Computing, Bethesda, Maryland,
                 USA, May 31--June 2, 2009}",
  title =        "{STOC '09: proceedings of the 2009 ACM International
                 Symposium on Theory of Computing, Bethesda, Maryland,
                 USA, May 31--June 2, 2009}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "xiii + 736",
  year =         "2009",
  ISBN =         "1-60558-613-7",
  ISBN-13 =      "978-1-60558-613-7",
  LCCN =         "QA75.5 .A22 2009",
  bibdate =      "Wed Sep 1 10:36:45 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.bibsys.no:2100/BIBSYS",
  acknowledgement = ack-nhfb,
  remark =       "41st annual STOC meeting.",
}

@Proceedings{Bernstein:2009:PQC,
  editor =       "Daniel J. (Daniel Julius) Bernstein and Johannes
                 Buchmann and Erik Dahm{\'e}n",
  booktitle =    "{Post-quantum cryptography: [First International
                 Workshop on Post-Quantum Cryptography \ldots{} at the
                 Katholieke Universiteit Leuven in 2006]}",
  title =        "{Post-quantum cryptography: [First International
                 Workshop on Post-Quantum Cryptography \ldots{} at the
                 Katholieke Universiteit Leuven in 2006]}",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "viii + 245",
  year =         "2009",
  ISBN =         "3-540-88701-6 (hardcover), 3-642-10019-8 (softcover)",
  ISBN-13 =      "978-3-540-88701-0 (hardcover), 978-3-642-10019-2
                 (softcover)",
  LCCN =         "QA76.9.A25 P67 2009",
  bibdate =      "Thu Apr 21 17:10:30 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "data encryption (computer science); cryptography;
                 chiffrement (informatique); cryptographie",
  tableofcontents = "Introduction to post-quantum cryptography / Daniel
                 J. Bernstein \\
                 Quantum computing / Sean Hallgren, Ulrich Vollmer \\
                 Hash-based digital signature schemes / Johannes
                 Buchmann, Erik Dahmen, Michael Szydlo \\
                 Code-based cryptography / Raphael Overbeck, Nicolas
                 Sendrier \\
                 Lattice-based cryptography / Daniele Micciancio, Oded
                 Regev \\
                 Multivariate public key cryptography / Jintai Ding,
                 Bo-Yin Yang",
}

@Proceedings{Bruguera:2009:PIS,
  editor =       "Javier D. Bruguera and Marius Cornea and Debjit
                 DasSarma and John Harrison",
  booktitle =    "{Proceedings of the 19th IEEE Symposium on Computer
                 Arithmetic, June 8--10, 2009, Portland, Oregon, USA}",
  title =        "{Proceedings of the 19th IEEE Symposium on Computer
                 Arithmetic, June 8--10, 2009, Portland, Oregon, USA}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xi + 235",
  year =         "2009",
  ISBN =         "0-7695-3670-0, 1-4244-4329-6",
  ISBN-13 =      "978-0-7695-3670-5, 978-1-4244-4329-1",
  ISSN =         "1063-6889",
  LCCN =         "QA76.6 .S887 2009",
  bibdate =      "Fri Jun 12 12:24:37 2009",
  bibsource =    "http://www.ac.usc.es/arith19/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/elefunt.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathcw.bib",
  URL =          "http://www.ac.usc.es/arith19/",
  acknowledgement = ack-nhfb,
  keywords =     "ARITH-19",
  tableofcontents = "Keynote Talk \\
                 Anton: A Specialized Machine for Millisecond-Scale
                 Molecular Dynamics Simulations of Proteins / David E.
                 Shaw / 3 \\
                 Session 1: Algorithms and Number Systems \\
                 Efficient Data Structure and Algorithms for Sparse
                 Integers, Sets and Predicates / Jean E. Vuillemin / 7
                 \\
                 A Dual-Purpose Real/Complex Logarithmic Number System
                 ALU / Mark G. Arnold and Sylvain Collange / 15 \\
                 Selected RNS Bases for Modular Multiplication / J. C.
                 Bajard, M. Kaihara, and T. Plantard / 25 \\
                 Invited Talk \\
                 A Historical Perspective on Computer Arithmetic /
                 Stanley Mazor / 35 \\
                 Session 2: Arithmetic Hardware \\
                 Higher Radix Squaring Operations Employing
                 Left-to-Right Dual Recoding / David W. Matula / 39 \\
                 Advanced Clockgating Schemes for
                 Fused-Multiply-Add-Type Floating-Point Units / Jochen
                 Preiss, Maarten Boersma, and Silvia Melitta Mueller /
                 48 \\
                 Unified Approach to the Design of Modulo-(2^n \pm 1)$
                 Adders Based on Signed-LSB Representation of Residues /
                 Ghassem Jaberipur and Behrooz Parhami / 57 \\
                 Session 3: Finite Fields and Cryptography \\
                 Subquadratic Space Complexity Multiplier for a Class of
                 Binary Fields Using Toeplitz Matrix Approach / M. A.
                 Hasan and C. Negre / 67 \\
                 Hybrid Binary-Ternary Joint Form and Its Application in
                 Elliptic Curve / Cryptography / Jithra Adikari, Vassil
                 Dimitrov, and Laurent Imbert / 76 \\
                 Polynomial Multiplication over Finite Fields Using
                 Field Extensions and Interpolation / Murat Cenk, Cetin
                 Kaya Koc, and Ferruh Ozbudak / 84 \\
                 Session 4: Mathematical Software \\
                 A New Binary Floating-Point Division Algorithm and Its
                 Software Implementation on the ST231 Processor /
                 Claude-Pierre Jeannerod, Herve Knochel, Christophe
                 Monat, Guillaume Revy, and Gilles Villard / 95 \\
                 Fast and Accurate Bessel Function Computation / John
                 Harrison / 104 \\
                 Implementation Specific Verification of Divide and
                 Square Root Instructions / Elena Guralnik, Ariel J.
                 Birnbaum, Anatoly Koyfinan, and Avi Kaplan / 114 \\
                 Session 5: Decimal Hardware \\
                 A Decimal Floating-Point Adder with Decoded Operands
                 and a Decimal Leading-Zero Anticipator / Liang-Kai Wang
                 and Michael J. Schulte / 125 \\
                 A High-Performance Significand BCD Adder with IEEE
                 754-2008 Decimal Rounding / Alvaro Vazquez and Elisardo
                 Antelo / 135 \\
                 Fully Redundant Decimal Arithmetic / Saeid Gorgin and
                 Ghassem Jaberipur / 145 \\
                 Session 6: Floating-Point Techniques \\
                 On the Computation of Correctly-Rounded Sums / P.
                 Kornerup, V. Lefevre, N. Louvet, and J. M. Muller / 155
                 \\
                 Multi-operand Floating-Point Addition / Alexandre F.
                 Tenca / 161 \\
                 Certified and Fast Computation of Supremum Norms of
                 Approximation Errors / Sylvain Chevillard, Mioara
                 Jolde{\c{s}}, and Christoph Lauter / 169 \\
                 Session 7: Decimal Transcendentals \\
                 Computation of Decimal Transcendental Functions Using
                 the CORDIC Algorithm / {\'A}lvaro V{\'a}zquez, Julio
                 Villalba, and Elisardo Antelo / 179 \\
                 Decimal Transcendentals via Binary / John Harrison /
                 187 \\
                 A 32-bit Decimal Floating-Point Logarithmic Converter /
                 Dongdong Chen, Yu Zhang, Younhee Choi, Moon Ho Lee, and
                 Seok-Bum Ko / 195 \\
                 Special Session on Automated Synthesis of Arithmetic
                 Operations \\
                 Datapath Synthesis for Standard-Cell Design / Reto
                 Zimmermann / 207 \\
                 Design Space Exploration for Power-Efficient
                 Mixed-Radix Ling Adders / Chung-Kuan Cheng / 212 \\
                 Challenges in Automatic Optimization of Arithmetic
                 Circuits / Ajay K. Verma, Philip Brisk, and Paolo Ienne
                 / 213 \\
                 Panel on Decimal Arithmetic in Industry \\
                 Energy and Delay Improvement via Decimal Floating Point
                 Units / Hossam A. H. Fahmy, Ramy Raafat, Amira M.
                 Abdel-Majeed, Rodina Samy, Torek ElDeeb, and Yasmin
                 Farouk / 221 \\
                 IEEE 754-2008 Decimal Floating-Point for Intel
                 Architecture Processors / Marius Cornea / 225 \\
                 Special Session on Interval Arithmetic \\
                 IEEE Interval Standard Working Group --- P1788: Current
                 Status / William Edmonson and Guillaume Melquiond / 231
                 \\
                 Author Index",
}

@Proceedings{Chung:2009:ISA,
  editor =       "Kyo-Il Chung and Kiwook Sohn and Moti Yung",
  booktitle =    "{Information Security Applications: 9th International
                 Workshop, WISA 2008, Jeju Island, Korea, September
                 23--25, 2008, Revised Selected Papers}",
  title =        "{Information Security Applications: 9th International
                 Workshop, WISA 2008, Jeju Island, Korea, September
                 23--25, 2008, Revised Selected Papers}",
  volume =       "5379",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "277 (est.)",
  year =         "2009",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-00306-6",
  ISBN =         "3-642-00305-2 (print), 3-642-00306-0 (e-book)",
  ISBN-13 =      "978-3-642-00305-9 (print), 978-3-642-00306-6
                 (e-book)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  LCCN =         "????",
  bibdate =      "Wed Dec 19 15:21:30 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/content/978-3-642-00306-6",
  acknowledgement = ack-nhfb,
}

@Proceedings{IEEE:2009:ISI,
  editor =       "IEEE",
  booktitle =    "{ICM '09: 21th [sic] International Conference on
                 Microelectronics (ICM 2009): took place from Dec 19,
                 2009 to Dec 22, 2009 in Marrakech, Morocco}",
  title =        "{ICM '09: 21th [sic] International Conference on
                 Microelectronics (ICM 2009): took place from Dec 19,
                 2009 to Dec 22, 2009 in Marrakech, Morocco}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "????",
  year =         "2009",
  ISBN =         "1-4244-5814-5, 1-4244-5816-1",
  ISBN-13 =      "978-1-4244-5814-1, 978-1-4244-5816-5",
  LCCN =         "TK7870 2009",
  bibdate =      "Thu Apr 21 10:34:45 MDT 2011",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "http://ieeexplore.ieee.org/servlet/opac?punumber=5412667",
  acknowledgement = ack-nhfb,
  meetingname =  "International Conference on Microelectronics (1988- )
                 (21st : 2009 : Marrakech, Morocco)",
  subject =      "printed circuits; congresses; integrated circuits;
                 microelectronics",
}

@Proceedings{IEEE:2009:PAI,
  editor =       "{IEEE}",
  booktitle =    "{Proceedings of the 50th Annual IEEE Symposium on
                 Foundations of Computer Science: October 25--27, 2009,
                 Atlanta, Georgia, USA}",
  title =        "{Proceedings of the 50th Annual IEEE Symposium on
                 Foundations of Computer Science: October 25--27, 2009,
                 Atlanta, Georgia, USA}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xvi + 835",
  year =         "2009",
  ISBN =         "0-7695-3850-9",
  ISBN-13 =      "978-0-7695-3850-1",
  LCCN =         "QA76 .S95 2009",
  bibdate =      "Thu May 6 08:34:02 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 melvyl.cdlib.org:210/CDL90",
  note =         "IEEE Computer Society order number P3850.",
  acknowledgement = ack-nhfb,
  subject =      "electronic data processing; congresses; machine
                 theory",
}

@Book{Maas:2009:SRW,
  author =       "Ad Maas and Hans Hooijmaijers",
  booktitle =    "Scientific research in {World War II}: what scientists
                 did in the war",
  title =        "Scientific research in {World War II}: what scientists
                 did in the war",
  publisher =    "Routledge/Taylor and Francis",
  address =      "New York, NY",
  pages =        "xii + 240",
  year =         "2009",
  ISBN =         "0-203-88318-7 (e-book), 0-7103-1340-3 (hardcover)",
  ISBN-13 =      "978-0-203-88318-1 (e-book), 978-0-7103-1340-9
                 (hardcover)",
  LCCN =         "Q141 .H195 2009",
  bibdate =      "Sat May 14 10:03:20 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Routledge studies in modern history",
  URL =          "http://www.loc.gov/catdir/toc/ecip0824/2008033118.html",
  acknowledgement = ack-nhfb,
  subject =      "Scientists; History; 20th century; Congresses; World
                 War, 1939-1945; Science; Research",
  tableofcontents = "Introduction : Ordinary scientists in extraordinary
                 circumstances / Ad Maas \\
                 The mobilization of science and science-based
                 technology during the Second World War : a comparative
                 history / Mark Walker \\
                 To work or not to work in war research? The case of the
                 Italian physicist G. P. S. Occhialini during World War
                 II / Leonardo Gariboldi \\
                 Scientific research in the Second World War : the case
                 for Bacinol, Dutch penicillin / Marlene Burns \\
                 Preventing theft : the Kamerlingh Onnes Laboratory in
                 wartime / Dirk van Delft \\
                 Electron microscopy in Second World War Delft / Marian
                 Fournier \\
                 `Splendid isolation`? Aviation medicine in World War II
                 / Alexander von L{\"u}nen \\
                 National Socialism, human genetics and eugenics in the
                 Netherlands, 1940--1945 / Stephen Snelders \\
                 The birth of a modern instrument and its development
                 during World War II : electron microscopy in Germany
                 from the 1930s to 1945 / Falk M{\"u}ller \\
                 Aerodynamic research at the Nationaal
                 Luchtvaartlaboratorium (NLL) in Amsterdam under German
                 occupation during World War II / Florian Schmaltz \\
                 Masa Takeuchi and his involvement in the Japanese
                 nuclear weapons research programme / Masakatsu Yamazaki
                 \\
                 The cyclotron and the war : construction of the 60-inch
                 cyclotron in Japan / Keiko Nagase-Reimer \\
                 Forging a new discipline : reflections on the wartime
                 infrastructure for research and development in feedback
                 control in the US, the UK, Germany and the USSR / Chris
                 C. Bissell \\
                 British cryptanalysis : the breaking of `Fish' traffic
                 / J. V. Field",
}

@Proceedings{May:2009:PIS,
  editor =       "John P. May",
  booktitle =    "{Proceedings of the 2009 international symposium on
                 Symbolic and algebraic computation, KIAS, Seoul, Korea,
                 July 28--31, 2009}",
  title =        "{Proceedings of the 2009 international symposium on
                 Symbolic and algebraic computation, KIAS, Seoul, Korea,
                 July 28--31, 2009}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "xi + 389",
  year =         "2009",
  ISBN =         "1-60558-609-9",
  ISBN-13 =      "978-1-60558-609-0",
  LCCN =         "????",
  bibdate =      "Fri Jun 20 08:53:37 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  acknowledgement = ack-nhfb,
}

@Book{Rousseau:2009:MT,
  editor =       "Christiane Rousseau and Yvan Saint-Aubin",
  booktitle =    "Math{\'e}matiques et Technologie",
  title =        "Math{\'e}matiques et Technologie",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2009",
  DOI =          "https://doi.org/10.1007/978-0-387-69213-5",
  ISBN =         "0-387-69213-4",
  ISBN-13 =      "978-0-387-69213-5",
  LCCN =         "????",
  bibdate =      "Tue Jul 20 16:39:29 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.gbv.de:20011/gvk",
  series =       "Springer Undergraduate Texts in Mathematics and
                 Technology",
  URL =          "http://d-nb.info/997902213/34;
                 http://nbn-resolving.de/urn:nbn:de:1111-20091103138;
                 http://www.springerlink.com/content/r61844",
  acknowledgement = ack-nhfb,
  language =     "French",
  subject =      "Computer science; Distribution (Probability theory);
                 Mathematics; PageRank",
}

@Proceedings{Seamons:2009:IPS,
  editor =       "Kent Seamons and Neal McBurnett and Tim Polk and
                 others",
  booktitle =    "{IDtrust2009: proceedings of the 8th Symposium on
                 Identity and Trust on the Internet: April 14--16, 2009,
                 Gaitherburg, Maryland, USA}",
  title =        "{IDtrust2009: proceedings of the 8th Symposium on
                 Identity and Trust on the Internet: April 14--16, 2009,
                 Gaitherburg, Maryland, USA}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "xiv + 117",
  year =         "2009",
  ISBN =         "1-60558-474-6",
  ISBN-13 =      "978-1-60558-474-4",
  LCCN =         "QA76.9.A25 S954 2009",
  bibdate =      "Thu Apr 21 10:08:58 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 library.mit.edu:9909/mit01",
  URL =          "http://portal.acm.org/toc.cfm?id=1527017&coll=portal&dl=ACM",
  acknowledgement = ack-nhfb,
  meetingname =  "Symposium on Identity and Trust on the Internet (8th:
                 2009: Gaithersburg, MD)",
  subject =      "Computer security; Congresses; Computer networks;
                 Security measures; Access control; Public key
                 infrastructure (Computer security)",
}

@Proceedings{ACM:2010:PAI,
  editor =       "{ACM}",
  booktitle =    "{Proceedings of the 2010 ACM International Symposium
                 on Theory of Computing: June 5--8, 2010, Cambridge, MA,
                 USA}",
  title =        "{Proceedings of the 2010 ACM International Symposium
                 on Theory of Computing: June 5--8, 2010, Cambridge, MA,
                 USA}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "xiv + 797",
  year =         "2010",
  ISBN =         "1-60558-817-2",
  ISBN-13 =      "978-1-60558-817-9",
  LCCN =         "QA 76.6 .A152 2010",
  bibdate =      "Wed Sep 1 10:37:53 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 z3950.gbv.de:20011/gvk",
  URL =          "http://www.gbv.de/dms/tib-ub-hannover/63314455x.",
  acknowledgement = ack-nhfb,
  remark =       "42nd annual STOC meeting.",
}

@Book{Copeland:2010:CSB,
  editor =       "B. Jack Copeland",
  booktitle =    "{Colossus}: the secrets of {Bletchley Park}'s
                 codebreaking computers",
  title =        "{Colossus}: the secrets of {Bletchley Park}'s
                 codebreaking computers",
  publisher =    pub-OXFORD,
  address =      pub-OXFORD:adr,
  pages =        "xvi + 462 + 16",
  year =         "2010",
  ISBN =         "0-19-284055-X (hardcover), 0-19-957814-1 (paperback)",
  ISBN-13 =      "978-0-19-284055-4 (hardcover), 978-0-19-957814-6
                 (paperback)",
  LCCN =         "D810.C88 C66 2010",
  bibdate =      "Mon Mar 12 13:35:02 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 library.ox.ac.uk:210/ADVANCE",
  URL =          "http://www.colossus-computer.com/",
  acknowledgement = ack-nhfb,
  remark =       "Originally published: 2006.",
  subject =      "Lorenz cipher system; World War, 1939--1945;
                 Cryptography; Electronic intelligence; Great Britain;
                 History; Germany; Computers",
  tableofcontents = "A brief history of cryptography from Caesar to
                 Bletchley Park / Simon Singh \\
                 How it began: Bletchley Park goes to war / Michael
                 Smith \\
                 The German Tunny machine / Jack Copeland \\
                 Colossus, codebreaking, and the digital age / Stephen
                 Budiansky \\
                 Machine against machine / Jack Copeland \\
                 D-Day at Bletchley Park / Thomas H. Flowers \\
                 Intercept! / Jack Copeland \\
                 Colossus / Thomas H. Flowers \\
                 Colossus and the rise of the modern computer / Jack
                 Copeland \\
                 The PC user's guide to Colossus / Benjamin Wells \\
                 Of men and machines / Brian Randell \\
                 The Colossus rebuild / Tony Sale \\
                 Mr. Newman's section / Jack Copeland, with Catherine
                 Caughey \ldots{} [et al.] \\
                 Max Newman: mathematician, codebreaker, and computer
                 pioneer / William Newman \\
                 Living with Fish: breaking Tunny in the Newmanry and
                 the Testery / Peter Hilton \\
                 From Hut 8 to the Newmanry / Irving John ``Jack'' Good
                 \\
                 Codebreaking and Colossus / Donald Michie \\
                 Major Tester's section / Jerry Roberts \\
                 Setter and breaker / Roy Jenkins \\
                 An ATS girl in the Testery / Helen Currie \\
                 The Testery and the breaking of Fish / Peter Edgerley
                 \\
                 Dollis Hill at war / Jack Copeland, with David Bolam
                 \ldots{} [et al.] \\
                 The British Tunny machine / Gil Hayward \\
                 How Colossus was built and operated: one of its
                 engineers reveals its secrets / Harry Fensom \\
                 Bletchley Park's Sturgeon: the Fish that laid no eggs /
                 Frode Weierud \\
                 German teleprinter traffic and Swedish wartime
                 intelligence / Craig McKay",
}