7604 Ronald Rivest: Cryptology. Internet, 47p. [7920] 5817 H. Lenstra: Integer programming and cryptography. Math. Intell. 6/3 (1984), 14-19. [7920] 7605 Ronald Rivest: The RC5 encryption algorithm. Internet, 11p. [7920] 7607 Ronald Rivest: Multi-grade cryptography. Internet 1995, 8p. [7920] 7611 Terry Ritter: Ritter's cipher boutique. Web page. [7920] 7610 Terry Ritter: Ritter's crypto glossary. Internet, 18p. [7920] 7585 Douglas Stinson: On the connections between universal hashing, combinatorial designs and error-correcting codes. Internet 1996, 21p. [7920] 7592 Avi Widgerson: Lectures on the fusion method and derandomization. Technical Report SOCS-95.2, School of Computer Science, McGill University 1995. [7920] 7629 P. Larson: Dynamic hash tables. Comm. ACM 31/4 (1988), 446-457. [7920] 7658 Andrew Binstock: Hashing rehashed. Dr Dobbs' Journal April 1996, 24-33. [7920] 7587 M. Atici/S. Magliveras/Douglas Stinson/W.D. Wei: Some recursive constructions for perfect hash families. Internet 1995, 17p. [7920] 7628 Ronald Rivest: Optimal arrangement of keys in a hash table. J. ACM 25/2 (1978), 200-209. [7920] Bibliography on secret sharing schemes, maintained by Douglas Stinson. 7656 Donn Seeley: Password cracking - a game of wits. Comm. ACM 32/6 (1989), 700-703. [7920] 7657 Eugene Spafford: Crisis and aftermath. Comm. ACM 32/6 (1989), 678-687. How the Internet worm operated. [7920] Pagamenti su Internet - c'e' da fidarsi? 7586 Carlo Blundo/Luiz Frota Mattos/Douglas Stinson: Multiple key distribution maintaining user anonimity via broadcast channels. Internet 1995, 17p. [7920] 7588 Carlo Blundo/Douglas Stinson: Anonymous secret sharing schemes. Internet 1996, 15p. [7920] 7589 Giuseppe Ateniese/Carlo Blundo/Alfredo De Santis/Douglas Stinson: Visual cryptography for general access structures. Internet 1995, 32p. [7920] 7590 Douglas Stinson: On some methods for unconditionally secure key distribution and broadcast encryption. Internet 1995, 30p. [7920] 7606 Ronald Rivest/Adi Shamir: Payword and Micromint. Two simple micropayment schemes. Internet 1996, 12p. [7920] 7608 Matt Blaze a.o.: Minimal key lenghts for symmetric ciphers to provide adequate commercial security. Internet, 10p. [7920] 7612 Ian Goldberg/David Wagner: Randomness and the Netscape browser. Dr Dobb's J. January 1996, ... [7920] EFH Pretty Good Privacy Workshop. 2129/3 Donald Knuth: The art of computer programming III. Addison-Wesley 1973. Hashing is discussed on pages 506-570 [7920].