Cryptography Reference
In-Depth Information
Literaturverzeichnis
[1] Adams, Carlisle und Stephen Farrell: Internet X.509 Public Key Infrastructure:
Certificate Management Protocol (CMP) . RFC 4210, September 2005.
http://tools.ietf.org/html/rfc4210 .
[2] Adams, Carlisle und Steve Lloyd: Understanding PKI: Concepts, Standards, and
Deployment Considerations . Addison-Wesley, 2. Auflage, 2002.
[3] Aggarwal, Divesh und Ueli M. Maurer: Breaking RSA Generically Is Equivalent to
Factoring . In: Joux, Antoine (Herausgeber): Advances in Cryptology - EUROCRYPT
2009, 28th Annual International Conference on the Theory and Applications of
Cryptographic Techniques, Proceedings , Band 5479 der Reihe Lecture Notes in Computer
Science , Seiten 36-53. Springer, 2009.
[4] Agrawal, Manindra, Neeraj Kayal und Nitin Saxena: PRIMES is in P . Annals of
Mathematics, 160(2):781-793, 2004.
[5] Ajtai, Miklós: Generating Hard Instances of Lattice Problems (Extended Abstract) .In:
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing
(STOC 1996) , Seiten 99-108. ACM Press, 1996.
[6] Ajtai, Miklós und Cynthia Dwork: A Public-Key Cryptosystem with Worst-
Case/Average-Case Equivalence . In: Proceedings of the Twenty-Ninth Annual ACM
Symposium on the Theory of Computing (STOC 1997) , Seiten 284-293. ACM Press,
1997.
[7] Alexi, Werner, Benny Chor, Oded Goldreich und Claus-Peter Schnorr: RSA and Rabin
Functions: Certain Parts are as Hard as the Whole . SIAM Journal on Computing,
17(2):194-209, 1988.
[8] Aoki, Kazumaro und Yu Sasaki: Meet-in-the-Middle Preimage Attacks Against
Reduced SHA-0 and SHA-1 . In: Halevi, Shai (Herausgeber): Advances in Cryptology -
CRYPTO 2009, 29th Annual International Cryptology Conference, Proceedings ,Band
5677 der Reihe Lecture Notes in Computer Science , Seiten 70-89. Springer, 2009.
[9] Asokan, N., Valtteri Niemi und Pekka Laitinen: On the Usefulness of Proof-of-
Possession .In: Proceedings of the 2nd Annual PKI Research Workshop , Seiten 122-127,
2003. http://middleware.internet2.edu/pki03/PKI03-proceedings.html .
[10] Austin, Tom: PKI: A Wiley Tech Brief . John Wiley & Sons, Inc., 2001.
[11] Barkan, Elad, Eli Biham und Nathan Keller: Instant Ciphertext-Only Cryptanalysis of
GSM Encrypted Communication . Journal of Cryptology, 21(3):392-429, 2008.
[12] Bauer, Friedrich L.: Entzifferte Geheimnisse: Methoden und Maximen der Kryptologie .
Springer, 3. Auflage, 2000.
Search WWH ::




Custom Search