Ross Anderson: Why cryptosystems fail. Comm. ACM 37/11 (1994), 32-40. 6740 Hans-Peter Bischof: Ist Ihr Passwort sicher? Unix/Mail 12 (1994), 522-523. 7608 Matt Blaze a.o.: Minimal key lenghts for symmetric ciphers to provide adequate commercial security. Internet, 10p. 7586 Carlo Blundo/Luiz Frota Mattos/Douglas Stinson: Multiple key distribution maintaining user anonimity via broadcast channels. Internet 1995, 17p. B. den Boer: A simple and key-economical unconditional authentication scheme. J. Computer Security 2 (1993), 65-71. 11282 Marco Campedelli: Crittografia e privacy. Internet 1997, 3p. 11281 Roberto Cereda: Come usare Pretty Good Privacy. Internet ca. 1997, 18p. 11277 Giorgio Chinnici: Guida introduttiva al programma di crittografia a chiave pubblica PGP. Internet 1996, 18p. 11280 Giorgio Chinnici: PGP. Internet 1997, 5p. Simson Garfinkel: PGP - pretty good privacy. O'Reilly 1994, 430p. 1-56592-098-8. DM 50. 24092 Michael Huber: Combinatorial designs for authentication and secrecy codes. Found. Trends Comm. Inf. Theory 5/6 (2008), 581-675. 11450 Marc Joye: Common modulus attack against Lucas-based systems. Univ. Louvain TR CG-1996/10 (1996), 2p. 11247 Manuela Ju''rgens: Zehn Richtlinien zur Aufbewahrung des privaten PGP-Schlu''ssels und dem Umgang mit PGP. Internet 1997, 5p. Ralph Merkle: Secrecy, authentication, and public key systems. PhD thesis, Stanford Univ. 1979. R. Needham/M. Schroeder: Using encryption for authentication in large networks of computers. Comm. ACM 21/12 (1978), 993-999. D. Pei: Authentication codes and combinatorial designs. Chapman & Hall 2006, 240p. $90. 11961 Christoph Po''ppe: Die Geheimfolie. Spektrum 1998/7, 10-14. Das 4-Folien-Prinzip: 2 Bilder (Schlu''ssel und Chiffre) ergeben, u''bereinandergelegt, das Klarbild. 6904 Joey Rogers: Neural network user authentication. AI Expert June 1995, 29-33. Bruce Schneier: E-mail security with PGP and PEM. Wiley 1995. 0-471-05318-X. 11397 Bruce Schneier/John Kelsey: Remote auditing of software outputs using a trusted coprocessor. Internet 1996, 16p. 7656 Donn Seeley: Password cracking - a game of wits. Comm. ACM 32/6 (1989), 700-703. G. Simmons: A survey of information authentication. In Contemporary Cryptology, The Science of Information Technology, IEEE Press 1992, 379-419. 11237 Peter Sonntag: Trust center. Internet ca. 1997, 9p. William Stallings: Datensicherheit mit PGP. Prentice Hall 1995. 3-930436-28-0. 14275 Lincoln Stein: Secure Internet voting with Perl. Perl Journal 20 (2000), 18-27. Douglas Stinson: The combinatorics of authentication and secrecy codes. J. Cryptology 2 (1990), 23-49. Douglas Stinson: Combinatorial characterizations of authentication codes. Designs, Codes, and Cryptography 2 (1992), 175-187. 11374 Alessandro Tiberti: Guida all'installazione e all'uso del PGP. Internet ca. 1996, 4p. 11254 Serge Vaudenay: Hidden collisions on DSS. Internet ca. 1996, 7p. M. Wegman/J. Carter: New hash functions and their use in authentication and set equality. J. Computer and System Sciences 22 (1981), 265-279. 11873 Philip Zimmermann: PGP user's guide - part I. Internet 1994, 31p. Philip Zimmermann: The official PGP user's guide. MIT Press 1995, 220p. 0-262-74017-6. $15. Philipp Zimmermann: PGP source code and internals. MIT Press. 0-26224-039-4. 11370 ZZ: [Wie sicher ist PGP wirklich?] Usenet 1995, 3p. 11278 ZZ: Crittografia - definizione, evoluzione tecnica, diffusione e principali problematiche relative alla sicurezza. Internet ca. 1996, 6p. 11279 ZZ: Sistemi di identificazione elettronica. Internet ca. 1996, 2p. 11246 ZZ: Verordnung zur digitalen Signatur. Fassung des Beschlusses der Bundesregierung vom 8. Oktober 1997.