Cryptography Reference
In-Depth Information
[28] E. Biham, A. Shamir. Differential Cryptanalysis of DES-like Cryptosystems. In Advances
in Cryptology CRYPTO'90 , Santa Barbara, CA, Lecture Notes in Computer Science 537.
Springer-Verlag, NY, 1991, pp. 2-21.
[29] E. Biham, A. Shamir. Differential Cryptanalysis of DES-Like Cryptosystems. Journal of
Cryptology , vol. 4, pp. 3-72, 1991.
[30] E. Biham, A. Shamir. Differential Cryptanalysis of the Full 16-Round DES. In Advances
in Cryptology CRYPTO'92 , Santa Barbara, CA, Lecture Notes in Computer Science 740.
Springer-Verlag, NY, 1993, pp. 487-496.
[31] E. Biham, A. Shamir. Differential Cryptanalysis of the Data Encryption Standard .
Springer-Verlag, NY, 1993.
[32] A. Biryukov, A. Shamir, D. Wagner. Real Time Cryptanalysis of A5/1 on a PC. In Fast
Software Encryption'00 , New York, Lecture Notes in Computer Science 1978. Springer-
Verlag, NY, 2001, pp. 1-18.
[33] D. Bleichenbacher. Generating ElGamal Signatures without Knowing the Secret Key. In
Advances in Cryptology EUROCRYPT'96 , Zaragoza, Spain, Lecture Notes in Computer
Science 1070. Springer-Verlag, NY, 1996, pp. 10-18.
[34] D. Bleichenbacher. Chosen Ciphertext Attack against Protocols Based on the RSA En-
cryption Standard PKCS#1. In Advances in Cryptology CRYPTO'98 , Santa Barbara, CA,
Lecture Notes in Computer Science 1462. Springer-Verlag, NY, 1998, pp. 1-12.
[35] D. Boneh, R.A. DeMillo, R.J. Lipton. On the Importance of Checking Cryptographic
Protocols for Faults. In Advances in Cryptology EUROCRYPT'97 , Konstanz, Germany,
Lecture Notes in Computer Science 1233. Springer-Verlag, NY, 1997, pp. 37-51.
[36] J. Boyar. Inferring Sequences Produced by Pseudorandom Number Generators. Journal of
the ACM , vol. 36, pp. 129-144, 1989.
[37] C. Boyd, A. Mathuria. Protocols for Authentication and Key Establishment . Springer, NY,
2003.
[38] E. Brickell, D. Pointcheval, S. Vaudenay, M. Yung. Design Validations for Discrete
Logarithm Based Signature Schemes. In Public Key Cryptography'00 , Melbourne,
Australia, Lecture Notes in Computer Science 1751. Springer-Verlag, NY, 2000, pp. 276-
292.
[39] C. Cachin. Entropy Measures and Unconditional Security in Cryptography . Hartung-
Gorre, Konstang, ETH Series in Information Security and Cryptography, vol. 1, 1997.
[40] J. Callas, L. Donnerhacke, H. Finney, R. Thayer. OpenPGP Message Format. Internet
Standard. RFC 2440, The Internet Society, 1998.
[41] B. Canvel, A. Hiltgen, S. Vaudenay, M. Vuagnoux. Password Interception in a SSL/TLS
Channel. In Advances in Cryptology CRYPTO'03 , Santa Barbara, CA, Lecture Notes in
Computer Science 2729. Springer-Verlag, NY, 2003, pp. 583-599.
Search WWH ::




Custom Search