Cryptography Reference
In-Depth Information
[42] J.L. Carter, M.N. Wegman. Universal Classes of Hash Functions. Journal of Computer
and System Sciences , vol. 18, pp. 143-154, 1979.
[43] F. Chabaud, A. Joux. Differential Collisions in SHA-0. In Advances in Cryptology
CRYPTO'98 , Santa Barbara, CA, Lecture Notes in Computer Science 1462. Springer-
Verlag, NY, 1998, pp. 56-71.
[44] F. Chabaud, S. Vaudenay. Links between Differential and Linear Cryptanalysis. In Advances
in Cryptology EUROCRYPT'94 , Perugia, Italy, Lecture Notes in Computer Science 950.
Springer-Verlag, NY, 1995, pp. 356-365.
[45] D. Chaum, H. van Antwerpen. Undeniable Signatures. In Advances in Cryptology
CRYPTO'89 , Santa Barbara, CA, Lecture Notes in Computer Science 435. Springer-
Verlag, NY, 1990, pp. 212-217.
[46] P. Chown. Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security
(TLS). Internet Standard. RFC 3268, The Internet Society, 2002.
[47] S.A. Cook. The Complexity of Theorem-Proving Procedures. In Proceedings of the 3rd
ACM Symposium on Theory of Computing , Atlanta, GA. ACM Press, NY, 1971, pp. 151-
158.
[48] D. Coppersmith. The Data Encryption Standard (DES) and Its Strength against Attacks.
IBM Journal of Research and Development , vol. 38, pp. 243-250, 1994.
[49] D. Coppersmith. Finding a Small Root of a Univariate Modular Equation. In Advances in
Cryptology EUROCRYPT'96 , Zaragoza, Spain, Lecture Notes in Computer Science 1070.
Springer-Verlag, NY, 1996, pp. 155-165.
[50] D. Coppersmith, M. Franklin, J. Patarin, M. Reiter. Low-Exponent RSA with Related
Messages. In Advances in Cryptology EUROCRYPT'96 , Zaragoza, Spain, Lecture Notes
in Computer Science 1070. Springer-Verlag, NY, 1996, pp. 1-9.
[51] J.-S. Coron, D. Naccache, J.P. Stern. On the Security of RSA Padding. In Advances in
Cryptology CRYPTO'99 , Santa Barbara, CA, Lecture Notes in Computer Science 1666.
Springer-Verlag, NY, 1999, pp. 1-18.
[52] T. Cover, J. Thomas. Elements of Information Theory . John Wiley & Sons, NY, 1991.
[53] R. Crandall, C. Pomerance. Prime Numbers: A Computational Perspective . Springer, NY,
2001.
[54] J. Daemen, V. Rijmen. The Design of Rijndael . Information Security and Cryptography,
Springer, NY, 2002.
[55] J. Daemen, L. Knudsen, V. Rijmen. The Block Cipher SQUARE. In Fast Software Encryp-
tion'97 , Haifa, Israel, Lecture Notes in Computer Science 1267. Springer-Verlag, NY,
1997, pp. 149-165.
Search WWH ::




Custom Search