Cryptography Reference
In-Depth Information
Bibliography
[1] L.M. Adleman and M. Huang. Primality Testing and Abelian Varieties Over Finite Fields .
Springer-Verlag Lecture Notes in Computer Science (Vol. 1512), 1992. (Preliminary ver-
sion in 19th ACM Symposium on the Theory of Computing , 1987.)
[2] W. Aiello and J. Hastad. Perfect Zero-Knowledge Languages Can Be Recognized in Two
Rounds. In 28th IEEE Symposium on Foundations of Computer Science , pages 439- 448,
1987.
[3] M. Ajtai. Generating Hard Instances of Lattice Problems. In 28th ACM Symposium on the
Theory of Computing , pages 99-108, 1996.
[4] M. Ajtai, J. Komlos, and E. Szemeredi. Deterministic Simulation in LogSpace. In 19th
ACM Symposium on the Theory of Computing , pages 132-140, 1987.
[5] W. Alexi, B. Chor, O. Goldreich, and C.P. Schnorr. RSA / Rabin Functions: Certain Parts
Are as Hard as the Whole. SIAM Journal on Computing , Vol. 17, April, pages 194-209,
1988.
[6] N. Alon and J.H. Spencer. The Probabilistic Method . Wiley, 1992.
[7] T.M. Apostol. Introduction to Analytic Number Theory . Springer, 1976.
[8] L. Babai. Trading Group Theory for Randomness. In 17th ACM Symposium on the Theory
of Computing , pages 421- 420, 1985.
[9] E. Bach. Analytic Methods in the Analysis and Design of Number-Theoretic Algorithms .
ACM Distinguished Dissertation (1984). MIT Press, Cambridge, MA, 1985.
[10] E. Bach and J. Shallit. Algorithmic Number Theory . Vol. I: Efficient Algorithms . MIT
Press, Cambridge, MA, 1996.
[11] D. Beaver. Foundations of Secure Interactive Computing. In Crypto91 , Springer-Verlag
Lecture Notes in Computer Science (Vol. 576), pages 377-391, 1992.
[12] D. Beaver. Secure Multi-Party Protocols and Zero-Knowledge Proof Systems Tolerating
a Faulty Minority. Journal of Cryptology , Vol. 4, pages 75-122, 1991.
[13] M. Bellare. A Note on Negligible Functions. Tech. Rep. CS97-529, Department of Com-
puter Science and Engineering, UCSD, March 1997.
[14] M. Bellare, R. Canetti, and H. Krawczyk. Pseudorandom Functions Revisited: The
Cascade Construction and Its Concrete Security. In 37th IEEE Symposium on Founda-
tions of Computer Science , pages 514-523, 1996.
[15] M. Bellare, R. Canetti, and H. Krawczyk. Keying Hash Functions for Message Authen-
tication. In Crypto96 , Springer-Verlag Lecture Notes in Computer Science (Vol. 1109),
pages 1-15, 1996.
Search WWH ::




Custom Search