Author | Title | |
John Gordon | Terms used in the disciplines of cryptography, IT security and Risk analysis | (in postscript) |
Lars R. Knudsen and Fauzan Mirza | Deletion Cryptanalysis | (in postscript) |
Keef M. Martin and Vincent Rijndael | The first official crypto-world rankings | (in postscript) |
Author | Title |
Boris Kazak | A Drunken Family (html) |
John Black | Strengthening Cryptosystems by Re-Keying (postscript) |
David Beynon | Practical Key Recovery (html) |
Moni Naor, Yael Naor, Omer Reingold | Applied Kid Cryptography or How To Convince Your Children You Are Not Cheating (postscript) |
Author | Title |
Jussi Leiwo | The PGB Cryptosystem (postscript) |
Steven D Galbraith | On the efficiency of elliptic curves arising in French literature (html) |
Lars R Knudsen | New directions in cryptography (volume II) (postscript) |