O'Reilly logo

Disappearing Cryptography, 3rd Edition by Peter Wayner

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Bibliography

Bibliography

AFYZ04 James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, and Sheng Zhong. Towards a theory of data entanglement. In Proceedings of the 2004 European Symposium on Research in Computer Security, 2004.

Age95 National Security Agency. N.S.A. press release: Venona documents released. Technical report, National Security Agency, July 1995.

AHU83 A.V. Aho, J.E. Hopcroft, J.D. Ullman, Data Structures and Algorithms 1983 Addison-Wesley Reading, MA

AK91 Dana Angluin, Michael Kharitonov, When won't membership queries help? Proceedings of the Twenty-Third Annual ACM Symposium on Theory of Computing 1991 ACM Press444-454 to appear in JCSS.

AKSK00 S. Areepongsa, N. Kaewkamnerd, Y. F. Syed, and K.R. Rao. Exploring steganography ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required