Cryptography Reference
In-Depth Information
[100] S. Katzenbeisser.
Recent Advances in RSA Cryptography
. Advances in Information Secu-
rity vol. 3. Kluwer Academic Publishers, Boston, 2001.
[101] J. Kelsey, B. Schneier, N. Ferguson. Yarrow-160: Notes on the Design and Analysis of the
Yarrow Cryptographic Pseudorandom Number Generator. In
Selected Areas in Cryptogra-
phy'99
, Kingston, ON, Canada, Lecture Notes in Computer Science 1758. Springer-Verlag,
NY, 2000, pp. 13-33.
[102] N. Koblitz.
A Course in Number Theory and Cryptography
. Graduate Texts in Mathematics
114. Springer-Verlag, NY, 1994.
[103] P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other
Systems. In
Advances in Cryptology CRYPTO'96
, Santa Barbara, CA, Lecture Notes in
Computer Science 1109. Springer-Verlag, NY, 1996, pp. 104-113.
[104] P. Kocher. Differential Power Analysis. In
Advances inCryptology CRYPTO'99
, Santa Bar-
bara, CA, Lecture Notes in Computer Science 1666. Springer-Verlag, NY, 1999, pp. 388-
397.
[105] J. Kohl, C. Neuman. The Kerberos Network Authentication Service (V5). Internet Stan-
dard. RFC 1510, 1993.
[106] H. Krawczyk. How to Predict Congruential Generators. In
Advances in Cryptology
CRYPTO'89
, Santa Barbara, CA, Lecture Notes in Computer Science 435. Springer-
Verlag, NY, 1990, pp. 138-153.
[107] H. Krawczyk. How to Predict Congruential Generators.
Journal of Algorithms
, vol. 13,
pp. 527-545, 1992.
[108] H. Krawczyk. LFSR-Based Hashing and Authentication. In
Advances in Cryptology
CRYPTO'94
, Santa Barbara, CA, Lecture Notes in Computer Science 839. Springer-
Verlag, NY, 1994, pp. 129-139.
[109] H. Krawczyk, M. Bellare, R. Canetti. HMAC: Keyed-Hashing for Message Authentication.
RFC 2104, 1997.
[110] X. Lai.
On the Design and Security of Block Ciphers
. ETH Series in Information Process-
ing, vol. 1. Hartung-Gorre Verlag Konstanz, 1992.
[111] X. Lai, J.L. Massey, S. Murphy. Markov Ciphers and Differential Cryptanalysis. In
Ad-
vances in Cryptology EUROCRYPT'91
, Brighton, UK, Lecture Notes in Computer Science
547. Springer-Verlag, NY, 1991, pp. 17-38.
[112] G. Lame. Mentioned in J.O. Shallit,
Historia Mathematica
, vol. 21, pp. 401-419, 1994.
[113] L. Lamport. Constructing Digital Signatures from a One Way Function, Technical Report
CSL-98, SRI Intl., 1979.
[114] H.W. Lenstra. Factoring Integers with Elliptic Curves.
Annals of Mathematics
, vol. 126,
pp. 649-673, 1987.
Search WWH ::
Custom Search