Cryptography Reference
In-Depth Information
[100] S. Katzenbeisser. Recent Advances in RSA Cryptography . Advances in Information Secu-
rity vol. 3. Kluwer Academic Publishers, Boston, 2001.
[101] J. Kelsey, B. Schneier, N. Ferguson. Yarrow-160: Notes on the Design and Analysis of the
Yarrow Cryptographic Pseudorandom Number Generator. In Selected Areas in Cryptogra-
phy'99 , Kingston, ON, Canada, Lecture Notes in Computer Science 1758. Springer-Verlag,
NY, 2000, pp. 13-33.
[102] N. Koblitz. A Course in Number Theory and Cryptography . Graduate Texts in Mathematics
114. Springer-Verlag, NY, 1994.
[103] P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other
Systems. In Advances in Cryptology CRYPTO'96 , Santa Barbara, CA, Lecture Notes in
Computer Science 1109. Springer-Verlag, NY, 1996, pp. 104-113.
[104] P. Kocher. Differential Power Analysis. In Advances inCryptology CRYPTO'99 , Santa Bar-
bara, CA, Lecture Notes in Computer Science 1666. Springer-Verlag, NY, 1999, pp. 388-
397.
[105] J. Kohl, C. Neuman. The Kerberos Network Authentication Service (V5). Internet Stan-
dard. RFC 1510, 1993.
[106] H. Krawczyk. How to Predict Congruential Generators. In Advances in Cryptology
CRYPTO'89 , Santa Barbara, CA, Lecture Notes in Computer Science 435. Springer-
Verlag, NY, 1990, pp. 138-153.
[107] H. Krawczyk. How to Predict Congruential Generators. Journal of Algorithms , vol. 13,
pp. 527-545, 1992.
[108] H. Krawczyk. LFSR-Based Hashing and Authentication. In Advances in Cryptology
CRYPTO'94 , Santa Barbara, CA, Lecture Notes in Computer Science 839. Springer-
Verlag, NY, 1994, pp. 129-139.
[109] H. Krawczyk, M. Bellare, R. Canetti. HMAC: Keyed-Hashing for Message Authentication.
RFC 2104, 1997.
[110] X. Lai. On the Design and Security of Block Ciphers . ETH Series in Information Process-
ing, vol. 1. Hartung-Gorre Verlag Konstanz, 1992.
[111] X. Lai, J.L. Massey, S. Murphy. Markov Ciphers and Differential Cryptanalysis. In Ad-
vances in Cryptology EUROCRYPT'91 , Brighton, UK, Lecture Notes in Computer Science
547. Springer-Verlag, NY, 1991, pp. 17-38.
[112] G. Lame. Mentioned in J.O. Shallit, Historia Mathematica , vol. 21, pp. 401-419, 1994.
[113] L. Lamport. Constructing Digital Signatures from a One Way Function, Technical Report
CSL-98, SRI Intl., 1979.
[114] H.W. Lenstra. Factoring Integers with Elliptic Curves. Annals of Mathematics , vol. 126,
pp. 649-673, 1987.
Search WWH ::




Custom Search