Cryptography Reference
In-Depth Information
[28] E. Biham, A. Shamir. Differential Cryptanalysis of DES-like Cryptosystems. In
Advances
in Cryptology CRYPTO'90
, Santa Barbara, CA, Lecture Notes in Computer Science 537.
Springer-Verlag, NY, 1991, pp. 2-21.
[29] E. Biham, A. Shamir. Differential Cryptanalysis of DES-Like Cryptosystems.
Journal of
Cryptology
, vol. 4, pp. 3-72, 1991.
[30] E. Biham, A. Shamir. Differential Cryptanalysis of the Full 16-Round DES. In
Advances
in Cryptology CRYPTO'92
, Santa Barbara, CA, Lecture Notes in Computer Science 740.
Springer-Verlag, NY, 1993, pp. 487-496.
[31] E. Biham, A. Shamir.
Differential Cryptanalysis of the Data Encryption Standard
.
Springer-Verlag, NY, 1993.
[32] A. Biryukov, A. Shamir, D. Wagner. Real Time Cryptanalysis of A5/1 on a PC. In
Fast
Software Encryption'00
, New York, Lecture Notes in Computer Science 1978. Springer-
Verlag, NY, 2001, pp. 1-18.
[33] D. Bleichenbacher. Generating ElGamal Signatures without Knowing the Secret Key. In
Advances in Cryptology EUROCRYPT'96
, Zaragoza, Spain, Lecture Notes in Computer
Science 1070. Springer-Verlag, NY, 1996, pp. 10-18.
[34] D. Bleichenbacher. Chosen Ciphertext Attack against Protocols Based on the RSA En-
cryption Standard PKCS#1. In
Advances in Cryptology CRYPTO'98
, Santa Barbara, CA,
Lecture Notes in Computer Science 1462. Springer-Verlag, NY, 1998, pp. 1-12.
[35] D. Boneh, R.A. DeMillo, R.J. Lipton. On the Importance of Checking Cryptographic
Protocols for Faults. In
Advances in Cryptology EUROCRYPT'97
, Konstanz, Germany,
Lecture Notes in Computer Science 1233. Springer-Verlag, NY, 1997, pp. 37-51.
[36] J. Boyar. Inferring Sequences Produced by Pseudorandom Number Generators.
Journal of
the ACM
, vol. 36, pp. 129-144, 1989.
[37] C. Boyd, A. Mathuria.
Protocols for Authentication and Key Establishment
. Springer, NY,
2003.
[38] E. Brickell, D. Pointcheval, S. Vaudenay, M. Yung. Design Validations for Discrete
Logarithm Based Signature Schemes. In
Public Key Cryptography'00
, Melbourne,
Australia, Lecture Notes in Computer Science 1751. Springer-Verlag, NY, 2000, pp. 276-
292.
[39] C. Cachin.
Entropy Measures and Unconditional Security in Cryptography
. Hartung-
Gorre, Konstang, ETH Series in Information Security and Cryptography, vol. 1, 1997.
[40] J. Callas, L. Donnerhacke, H. Finney, R. Thayer. OpenPGP Message Format. Internet
Standard. RFC 2440, The Internet Society, 1998.
[41] B. Canvel, A. Hiltgen, S. Vaudenay, M. Vuagnoux. Password Interception in a SSL/TLS
Channel. In
Advances in Cryptology CRYPTO'03
, Santa Barbara, CA, Lecture Notes in
Computer Science 2729. Springer-Verlag, NY, 2003, pp. 583-599.
Search WWH ::
Custom Search