Cryptography Reference
In-Depth Information
[34] Biham, Eli und Adi Shamir: Differential Cryptanalysis of the Full 16-Round DES .In:
Advances in Cryptology - CRYPTO '92, Proceedings of the 12th Annual International
Cryptology Conference , Band 740 der Reihe Lecture Notes in Computer Science ,Seiten
487-496. Springer, 1993.
[35] Biryukov, Alex, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich und Adi Shamir:
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10
Rounds . In: Gilbert, Henri (Herausgeber): Advances in Cryptology - EUROCRYPT
2010, Proceedings of the 29th Annual International Conference on the Theory and
Applications of Cryptographic Techniques ,Band6110derReihe Lecture Notes in
Computer Science , Seiten 299-319. Springer, 2010.
[36] Biryukov, Alex, Dmitry Khovratovich und Ivica Nikolic: Distinguisher and Related-Key
Attack on the Full AES-256 . In: Halevi, Shai (Herausgeber): Advances in Cryptology -
CRYPTO 2009, Proceedings of the 29th Annual International Cryptology Conference ,
Band 5677 der Reihe Lecture Notes in Computer Science , Seiten 231-249. Springer,
2009.
[37] Black, John und Phillip Rogaway: CBC MACs for Arbitrary-Length Messages: The
Three-Key Constructions . In: Bellare, Mihir (Herausgeber): Advances in Cryptology -
CRYPTO 2000, 20th Annual International Cryptology Conference, Proceedings ,Band
1880 der Reihe Lecture Notes in Computer Science , Seiten 197-215. Springer, 2000.
[38] Black, John, Phillip Rogaway und Thomas Shrimpton: Black-Box Analysis of the
Block-Cipher-Based Hash-Function Constructions from PGV . In: Yung, Moti
(Herausgeber): Advances in Cryptology - CRYPTO 2002, 22nd Annual International
Cryptology Conference, Proceedings , Band 2442 der Reihe Lecture Notes in Computer
Science , Seiten 320-335. Springer, 2002.
[39] Bleichenbacher, Daniel: Chosen Ciphertext Attacks Against Protocols Based on the RSA
Encryption Standard PKCS #1 . In: Advances in Cryptology - CRYPTO 1998, 18th
Annual Cryptology Conference. Proceedings , Band 1462 der Reihe Lecture Notes in
Computer Science , Seiten 1-12. Springer, 1998.
[40] Blum, Manuel und Silvio Micali: How to Generate Cryptographically Strong Sequences
of Pseudo-Random Bits . SIAM Journal on Computing, 13(4):850-864, 1984.
[41] Boldyreva, Alexandra, David Cash, Marc Fischlin und Bogdan Warinschi: Foundations
of Non-malleable Hash and One-Way Functions . In: Matsui, Mitsuru (Herausgeber):
Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the
Theory and Application of Cryptology and Information Security, Proceedings ,Band5912
der Reihe Lecture Notes in Computer Science , Seiten 524-541. Springer, 2009.
[42] Boneh, Dan: The Decision Die-Hellman Problem . In: Buhler, Joe (Herausgeber):
Algorithmic Number Theory, Proceedings of the Third International Symposium,
ANTS-III , Band 1423 der Reihe Lecture Notes in Computer Science , Seiten 48-63.
Springer, 1998.
[43] Boneh, Dan: Twenty years of attacks on the RSA cryptosystem . Notices of the
American Mathematical Society (AMS), 46(2):203-213, 1999.
Search WWH ::




Custom Search