Cryptography Reference
In-Depth Information
[159] B. Schneier. Applied Cryptography . John Wiley & Sons, NY, 1996. French version: Cryp-
tographie Appliquee . Vuibert, Paris, 1996.
[160] C.P. Schnorr. Efficient Identification and Signature for Smart Cards. In Advances in
Cryptology CRYPTO'89 , Santa Barbara, CA, Lecture Notes in Computer Science 435.
Springer-Verlag, NY, 1990, 235-251.
[161] C.P. Schnorr. Efficient Identification and Signature for Smart Cards. Journal of Cryptology ,
vol. 4, pp. 161-174, 1991.
[162] C.P. Schnorr, S. Vaudenay. Black Box Cryptanalysis of Hash Networks Based on Multi-
permutations. In Advances in Cryptology EUROCRYPT'94 , Perugia, Italy, Lecture Notes
in Computer Science 950. Springer-Verlag, NY, 1995, pp. 47-57.
[163] A. Shamir. How to Share a Secret. Communications of the ACM , vol. 22, pp. 612-613,
1979.
[164] A. Shamir. A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryp-
tosystem. In Proceedings of the 23rd IEEE Symposium on Foundations of Computer Sci-
ence , Chicago, IL. IEEE, 1982, pp. 145-152.
[165] A. Shamir. On the Security of DES. In Advances in Cryptology CRYPTO'85 , Santa
Barbara, CA, Lecture Notes in Computer Science 218. Springer-Verlag, NY, 1986, pp. 280-
281.
[166] A. Shamir. IP = PSPACE. In Proceedings of the 22nd ACM Symposium on Theory of Com-
puting , Baltimore, MD. ACM Press, NY, 1990, pp. 11-15.
[167] C.E. Shannon. Communication Theory of Secrecy Systems. Bell SystemTechnical Journal ,
vol. 28, pp. 656-715, 1969. Re-edited in ClaudeElwood Shannon—CollectedPapers. IEEE
Press, New York, 1993.
[168] R. Shirey. Internet Security Glossary. RFC 2828, The Internet Society, 2000.
[169] V. Shoup. OAEP Reconsidered. In Advances in Cryptology CRYPTO'01 , Santa Barbara,
CA, Lecture Notes in Computer Science 2139. Springer-Verlag, NY, 2001, pp. 239-259.
[170] V. Shoup. A Computational Introduction to Number Theory and Algebra . Online textbook,
2004. Available at http://shoup.net/ntb .
[171] J.H. Silverman. The Arithmetic of Elliptic Curves. Graduate Texts in Mathematics 106.
Springer-Verlag, NY, 1986.
[172] G.J. Simmons. A “Weak” Privacy Protocol Using the RSA Crypto Algorithm. Cryptologia ,
vol. 7, pp. 180-182, 1983.
[173] S. Singh. The Code Book . Fourth Estate, London, 1999.
[174] R. Solovay, V. Strassen. A Fast Monte-Carlo Test for Primality. SIAM Journal on Comput-
ing , vol. 6, pp. 84-86, 1977.
Search WWH ::




Custom Search