Proceedings of the 4th International Workshop on Information Hiding (IHW 2001), volume 2127 of Lecture Notes in Computer Science, Springer-Verlag, 2001.
Theoretical Computer Science (259) 1-2, pp. 671-678, 2001
Okiok Ltd white paper,
Cryptology ePrint Archive, Report 2001/082, 2001.
Zeroknowledge Inc white paper,
(and the following other short entries: Certificate of primality; Primality proving algorithm; Primality test; Certificate of primality; Primality proving algorithm; Primality test; Prime generation; Probalistic primality test; Pseudoprime; Safe prime; Strong prime;)
Entry in the Encyclopedia of Cryptography and
Security, Tilborg, Henk
Using SPML to provision dynamic XACML rules to manage privacy and access control in Web security infrastructure. Available at: http://lotos.site.uottawa.ca/ncac05/vigeant_18500162.pdf
Ottawa New Challenges for Access Control Workshop, 27 April, 2005
Initial version August 2002, last updated October 2004.
Class notes in cryptology
(these class notes are now maintained by Claude Crépeau)
NotesA: Basic number theory (GCD calculations and multiplicative inverse, Legendre and Jacobi Symbols, Fermat-Euler, Fast modular exponentiation, Prime numbers, Extracting square roots modulo p, Chinese remainder theory, Quadratic Residuosity problem), Finite fields.
NotesB: Symmetric crypto system, Classic simple systems, Cryptanalysis: classes of attacks, Authentication codes (symmetric, strongly universal hash functions), Identification schemes,
NotesC: Information theory, Perfect Secrecy, Key Equivocation, Unicity Distance, Pseudo-Randomness
NotesD: Modes of operation, DES,