Cryptography Reference
In-Depth Information
[44] Boneh, Dan: Simplified OAEP for the RSA and Rabin Functions . In: Kilian, Joe
(Herausgeber): Advances in Cryptology - CRYPTO 2001, 21st Annual International
Cryptology Conference, Proceedings , Band 2139 der Reihe Lecture Notes in Computer
Science , Seiten 275-291. Springer, 2001.
[45] Brumley, David und Dan Boneh: Remote timing attacks are practical . Computer
Networks, 48(5):701-716, 2005.
[46] Buhler, Joe P., Hendrik W. Lenstra und Carl B. Pomerance: Factoring integers with the
number field sieve . In: Lenstra, Arjen K. und Jr. Hendrik W. Lenstra (Herausgeber):
The Development of the Number Field Sieve , Seiten 50-94. Springer, 1993.
[47] Callas, Jon, Lutz Donnerhacke, Hal Finney, David Shaw und Rodney Thayer:
OpenPGP Message Format . RFC 4880, November 2007.
http://tools.ietf.org/html/rfc4880 .
[48] Canetti, Ran, Oded Goldreich und Shai Halevi: On the Random-Oracle Methodology as
Applied to Length-Restricted Signature Schemes . In: Naor, Moni (Herausgeber): Theory
of Cryptography, First Theory of Cryptography Conference, TCC 2004, Proceedings ,
Band 2951 der Reihe Lecture Notes in Computer Science , Seiten 40-57. Springer, 2004.
[49] Canetti, Ran, Oded Goldreich und Shai Halevi: The random oracle methodology,
revisited . Journal of the ACM, 51(4):557-594, 2004.
[50] Chaum, David, Eugène van Heijst und Birgit Pfitzmann: Cryptographically Strong
Undeniable Signatures, Unconditionally Secure for the Signer . In: Feigenbaum, Joan
(Herausgeber): Advances in Cryptology - CRYPTO '91, 11th Annual International
Cryptology Conference, Proceedings , Band 576 der Reihe Lecture Notes in Computer
Science , Seiten 470-484. Springer, 1991.
[51] Cochran, Martin: Notes on the Wang et al. 2 63 SHA-1 Differential Path . Cryptology
ePrint Archive, Report 2007/474, 2007. http://eprint.iacr.org/ .
[52] Cocks, Clifford: Split Knowledge Generation of RSA Parameters . In: Darnell,
Michael (Herausgeber): Cryptography and Coding, 6th IMA International Conference,
Cirencester, Proceedings , Band 1355 der Reihe Lecture Notes in Computer Science ,
Seiten 89-95. Springer, 1997.
[53] Contini, Scott und Yiqun Lisa Yin: Forgery and Partial Key-Recovery Attacks
on HMAC and NMAC Using Hash Collisions . In: Lai, Xuejia und Kefei Chen
(Herausgeber): Advances in Cryptology - ASIACRYPT 2006, 12th International
Conference on the Theory and Application of Cryptology and Information Security,
Proceedings , Band 4284 der Reihe Lecture Notes in Computer Science , Seiten 37-53.
Springer, 2006.
[54] Coron, Jean-Sébastien: On the Exact Security of Full Domain Hash . In: Bellare, Mihir
(Herausgeber): Advances in Cryptology - CRYPTO 2000, 20th Annual International
Cryptology Conference, Proceedings , Band 1880 der Reihe Lecture Notes in Computer
Science , Seiten 229-235. Springer, 2000.
[55] Coron, Jean-Sébastien: Optimal Security Proofs for PSS and Other Signature Schemes .
In: Knudsen, Lars R. (Herausgeber): Advances in Cryptology - EUROCRYPT 2002,
Search WWH ::




Custom Search