Cryptography Reference
In-Depth Information
[44] Boneh, Dan:
Simplified OAEP for the RSA and Rabin Functions
. In: Kilian, Joe
(Herausgeber):
Advances in Cryptology - CRYPTO 2001, 21st Annual International
Cryptology Conference, Proceedings
, Band 2139 der Reihe
Lecture Notes in Computer
Science
, Seiten 275-291. Springer, 2001.
[45] Brumley, David und Dan Boneh:
Remote timing attacks are practical
. Computer
Networks, 48(5):701-716, 2005.
[46] Buhler, Joe P., Hendrik W. Lenstra und Carl B. Pomerance:
Factoring integers with the
number field sieve
. In: Lenstra, Arjen K. und Jr. Hendrik W. Lenstra (Herausgeber):
The Development of the Number Field Sieve
, Seiten 50-94. Springer, 1993.
[47] Callas, Jon, Lutz Donnerhacke, Hal Finney, David Shaw und Rodney Thayer:
OpenPGP Message Format
. RFC 4880, November 2007.
http://tools.ietf.org/html/rfc4880
.
[48] Canetti, Ran, Oded Goldreich und Shai Halevi:
On the Random-Oracle Methodology as
Applied to Length-Restricted Signature Schemes
. In: Naor, Moni (Herausgeber):
Theory
of Cryptography, First Theory of Cryptography Conference, TCC 2004, Proceedings
,
Band 2951 der Reihe
Lecture Notes in Computer Science
, Seiten 40-57. Springer, 2004.
[49] Canetti, Ran, Oded Goldreich und Shai Halevi:
The random oracle methodology,
revisited
. Journal of the ACM, 51(4):557-594, 2004.
[50] Chaum, David, Eugène van Heijst und Birgit Pfitzmann:
Cryptographically Strong
Undeniable Signatures, Unconditionally Secure for the Signer
. In: Feigenbaum, Joan
(Herausgeber):
Advances in Cryptology - CRYPTO '91, 11th Annual International
Cryptology Conference, Proceedings
, Band 576 der Reihe
Lecture Notes in Computer
Science
, Seiten 470-484. Springer, 1991.
[51] Cochran, Martin:
Notes on the Wang et al.
2
63
SHA-1 Differential Path
. Cryptology
ePrint Archive, Report 2007/474, 2007.
http://eprint.iacr.org/
.
[52] Cocks, Clifford:
Split Knowledge Generation of RSA Parameters
. In: Darnell,
Michael (Herausgeber):
Cryptography and Coding, 6th IMA International Conference,
Cirencester, Proceedings
, Band 1355 der Reihe
Lecture Notes in Computer Science
,
Seiten 89-95. Springer, 1997.
[53] Contini, Scott und Yiqun Lisa Yin:
Forgery and Partial Key-Recovery Attacks
on HMAC and NMAC Using Hash Collisions
. In: Lai, Xuejia und Kefei Chen
(Herausgeber):
Advances in Cryptology - ASIACRYPT 2006, 12th International
Conference on the Theory and Application of Cryptology and Information Security,
Proceedings
, Band 4284 der Reihe
Lecture Notes in Computer Science
, Seiten 37-53.
Springer, 2006.
[54] Coron, Jean-Sébastien:
On the Exact Security of Full Domain Hash
. In: Bellare, Mihir
(Herausgeber):
Advances in Cryptology - CRYPTO 2000, 20th Annual International
Cryptology Conference, Proceedings
, Band 1880 der Reihe
Lecture Notes in Computer
Science
, Seiten 229-235. Springer, 2000.
[55] Coron, Jean-Sébastien:
Optimal Security Proofs for PSS and Other Signature Schemes
.
In: Knudsen, Lars R. (Herausgeber):
Advances in Cryptology - EUROCRYPT 2002,