Cryptography Reference
In-Depth Information
[52] S. R. Fluhrer, I. Mantin and A. Shamir. Weaknesses in the Key Schedul-
ing Algorithm of RC4. SAC 2001, pages 1-24, vol. 2259, Lecture Notes
in Computer Science, Springer.
[53] S. R. Fluhrer and S. Lucks. Analysis of E 0 encryption system. SAC 2001,
pages 38-48, vol. 2259, Lecture Notes in Computer Science, Springer.
[54] M. Gangne. Identity-based Encryption: a Survey. CryptoBytes, pages
10-19, vol. 6, no. 1, 2003.
[55] O. Goldreich. Foundations of Cryptography: Volume 1, Basic Tools, Cam-
bridge University Press. First edition. January 18, 2007.
[56] S. Goldwasser, S. Micali and C. Rackoff. The Knowledge Complexity of
Interactive Proof Systems. Proceedings of the 17th Annual ACM Sympo-
sium on Theory of Computing (STOC), pages 291-304, May 6-8, 1985,
Providence, Rhode Island, USA.
[57] S. Goldwasser, S. Micali and C. Rackoff. The Knowledge Complexity of
Interactive Proof Systems. SIAM Journal on Computing, pages 186-208,
vol. 18, no. 1, 1989. This is an extended version of [56].
[58] J. Golic. Linear statistical weakness of alleged RC4 keystream generator.
EUROCRYPT 1997, pages 226-238, vol. 1233, Lecture Notes in Com-
puter Science, Springer.
[59] J. Golic. Cryptanalysis of alleged A5 stream cipher. EUROCRYPT 1997,
pages 239-255, vol. 1233, Lecture Notes in Computer Science, Springer,
1997.
[60] J. D. Golic, V. Bagini and G. Morgari. Linear Cryptanalysis of Bluetooth
stream cipher. EUROCRYPT 2002, pages 238-255, vol. 2332, Lecture
Notes in Computer Science, Springer, 2002.
[61] J. Golic and G. Morgari. Iterative Probabilistic Reconstruction of RC4
Internal States. IACR Eprint Server, eprint.iacr.org, number 2008/348,
August 8, 2008 [last accessed on April 30, 2011].
[62] S. W. Golomb. Shift Register Sequences. Aegean Park Press. Second edi-
tion, 1982.
[63] G. Gong, K. C. Gupta, M. Hell and Y. Nawaz. Towards a General RC4-
Like Keystream Generator. CISC 2005, pages 162-174, vol. 3822, Lecture
Notes in Computer Science, Springer.
[64] D. Hankerson, A. Menezes and S. Vanstone. Guide to Elliptic Curve Cryp-
tography. Springer, 2004.
[65] J. Hansen and J. Jaworski. Large components of bipartite random map-
pings. Random Structures & Algorithms, vol. 17, no. 3-4, October 2000,
pages 317-342.
Search WWH ::




Custom Search