Cryptography Reference
In-Depth Information
[23] Bellare, Mihir und Chanathip Namprempre:
Authenticated Encryption: Relations
among Notions and Analysis of the Generic Composition Paradigm
. In: Okamoto,
T. (Herausgeber):
Advances in Cryptology - ASIACRYPT 2000, 6th International
Conference on the Theory and Application of Cryptology and Information Security,
Proceedings
, Band 1976 der Reihe
Lecture Notes in Computer Science
, Seiten 531-545.
Springer, 2000.
[24] Bellare, Mihir und Phillip Rogaway:
Random Oracles are Practical: A Paradigm for
Designing Ecient Protocols
. In:
ACM Conference on Computer and Communications
Security (CCS 1993)
, Seiten 62-73. ACM Press, 1993.
[25] Bellare, Mihir und Phillip Rogaway:
Optimal asymmetric encryption — How to
encrypt with RSA
. In: Santis, Alfredo De (Herausgeber):
Advances in Cryptology,
EUROCRYPT 1994, Workshop on the Theory and Application of Cryptographic
Techniques
, Band 950 der Reihe
Lecture Notes in Computer Science
, Seiten 92-111.
Springer, 1995.
[26] Bellare, Mihir und Phillip Rogaway:
The Exact Security of Digital Signatures - How to
Sign with RSA and Rabin
. In: Maurer, Ueli M. (Herausgeber):
Advances in Cryptology
- EUROCRYPT '96, International Conference on the Theory and Application of
Cryptographic Techniques, Proceeding
, Band 1070 der Reihe
Lecture Notes in Computer
Science
, Seiten 399-416. Springer, 1996.
[27] Bellare, Mihir und Phillip Rogaway:
Code-Based Game-Playing Proofs and the
Security of Triple Encryption
. Cryptology ePrint Archive, Report 2004/331, 2004.
http://eprint.iacr.org/
.
[28] Bellare, Mihir, Phillip Rogaway und David Wagner:
The EAX Mode of Operation
.
In: Roy, Bimal K. und Willi Meier (Herausgeber):
Fast Software Encryption,
11th International Workshop, FSE 2004, Revised Papers
, Band 3017 der Reihe
Lecture Notes in Computer Science
, Seiten 389-407. Springer, 2004. Siehe auch
http://csrc.nist.gov/groups/ST/toolkit/BCM/modes_development.html
für weitere
bei NIST eingereichte Betriebsarten.
[29] Bernstein, Daniel J.:
Cache-timing Attacks on AES
, 2005. Technischer Bericht.
http://cr.yp.to/papers.html#cachetiming
.
[30] Bertoni, Guido, Joan Daemen, Michael Peeters und Gilles Van Assche:
On the
Indifferentiability of the Sponge Construction
. In: Smart, Nigel P. (Herausgeber):
Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on
the Theory and Applications of Cryptographic Techniques, Proceedings
, Band 4965 der
Reihe
Lecture Notes in Computer Science
, Seiten 181-197. Springer, 2008.
[31] Biham, Eli und Orr Dunkelman:
A Framework for Iterative Hash Functions - HAIFA
.
Cryptology ePrint Archive, Report 2007/278, 2007.
http://eprint.iacr.org/
.
[32] Biham, Eli und Adi Shamir:
Differential Cryptanalysis of DES-like Cryptosystems
.
Journal of Cryptology, 4(1):3-72, 1991.
[33] Biham, Eli und Adi Shamir:
Differential Cryptanalysis of the Data Encryption Standard
.
Springer, 1993.