Cryptography Reference
In-Depth Information
Literaturverzeichnis
[1] Adams, Carlisle und Stephen Farrell:
Internet X.509 Public Key Infrastructure:
Certificate Management Protocol (CMP)
. RFC 4210, September 2005.
http://tools.ietf.org/html/rfc4210
.
[2] Adams, Carlisle und Steve Lloyd:
Understanding PKI: Concepts, Standards, and
Deployment Considerations
. Addison-Wesley, 2. Auflage, 2002.
[3] Aggarwal, Divesh und Ueli M. Maurer:
Breaking RSA Generically Is Equivalent to
Factoring
. In: Joux, Antoine (Herausgeber):
Advances in Cryptology - EUROCRYPT
2009, 28th Annual International Conference on the Theory and Applications of
Cryptographic Techniques, Proceedings
, Band 5479 der Reihe
Lecture Notes in Computer
Science
, Seiten 36-53. Springer, 2009.
[4] Agrawal, Manindra, Neeraj Kayal und Nitin Saxena:
PRIMES is in P
. Annals of
Mathematics, 160(2):781-793, 2004.
[5] Ajtai, Miklós:
Generating Hard Instances of Lattice Problems (Extended Abstract)
.In:
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing
(STOC 1996)
, Seiten 99-108. ACM Press, 1996.
[6] Ajtai, Miklós und Cynthia Dwork:
A Public-Key Cryptosystem with Worst-
Case/Average-Case Equivalence
. In:
Proceedings of the Twenty-Ninth Annual ACM
Symposium on the Theory of Computing (STOC 1997)
, Seiten 284-293. ACM Press,
1997.
[7] Alexi, Werner, Benny Chor, Oded Goldreich und Claus-Peter Schnorr:
RSA and Rabin
Functions: Certain Parts are as Hard as the Whole
. SIAM Journal on Computing,
17(2):194-209, 1988.
[8] Aoki, Kazumaro und Yu Sasaki:
Meet-in-the-Middle Preimage Attacks Against
Reduced SHA-0 and SHA-1
. In: Halevi, Shai (Herausgeber):
Advances in Cryptology -
CRYPTO 2009, 29th Annual International Cryptology Conference, Proceedings
,Band
5677 der Reihe
Lecture Notes in Computer Science
, Seiten 70-89. Springer, 2009.
[9] Asokan, N., Valtteri Niemi und Pekka Laitinen:
On the Usefulness of Proof-of-
Possession
.In:
Proceedings of the 2nd Annual PKI Research Workshop
, Seiten 122-127,
2003.
http://middleware.internet2.edu/pki03/PKI03-proceedings.html
.
[10] Austin, Tom:
PKI: A Wiley Tech Brief
. John Wiley & Sons, Inc., 2001.
[11] Barkan, Elad, Eli Biham und Nathan Keller:
Instant Ciphertext-Only Cryptanalysis of
GSM Encrypted Communication
. Journal of Cryptology, 21(3):392-429, 2008.
[12] Bauer, Friedrich L.:
Entzifferte Geheimnisse: Methoden und Maximen der Kryptologie
.
Springer, 3. Auflage, 2000.