Cryptography Reference
In-Depth Information
[68] Dodis, Yevgeniy, Thomas Ristenpart und Thomas Shrimpton:
Salvaging Merkle-
Damgård for Practical Applications
.In:
Advances in Cryptology - EUROCRYPT 2009,
28th Annual International Conference on the Theory and Applications of Cryptographic
Techniques, Proceedings
, Band 5479 der Reihe
Lecture Notes in Computer Science
,
Seiten 371-388. Springer, 2009.
[69] Dolev, Danny, Cynthia Dwork und Moni Naor:
Non-malleable Cryptography
.SIAM
Journal on Computing, 30(2):391-437, 2000.
[70] Electronic Frontier Foundation:
Cracking DES: Secrets of Encryption Research, Wiretap
Politics and Chip Design
. O'Reilly & Associates, Inc., Sebastopol, CA, USA, 1998.
[71] ElGamal, Taher:
A Public Key Cryptosystem and a Signature Scheme Based on
Discrete Logarithms
.In:
Advances in Cryptology, Proceedings of CRYPTO '84
,Band
196 der Reihe
Lecture Notes in Computer Science
, Seiten 10-18. Springer, 1985.
[72] Ellision, Carl und Bruce Schneier:
TenRisksofPKI:WhatYou'reNotBeingTold
About Public Key Infrastructure
. Computer Security Journal, 16(1):1-7, 2000.
[73] Feistel, Horst:
Cryptography and Computer Privacy
. Scientific American, 228(5):15-23,
1973.
[74] Fiat, Amos und Adi Shamir:
How to Prove Yourself: Practical Solutions to
Identification and Signature Problems
. In:
Advances in Cryptology - CRYPTO '86,
Proceedings
, Band 263 der Reihe
Lecture Notes in Computer Science
, Seiten 186-194.
Springer, 1986.
[75] Fouque, Pierre-Alain, Gaëtan Leurent und Phong Q. Nguyen:
Full Key-Recovery
Attacks on HMAC/NMAC-MD4 and NMAC-MD5
. In: Menezes, Alfred (Herausgeber):
Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology
Conference, Proceedings
, Band 4622 der Reihe
Lecture Notes in Computer Science
,
Seiten 13-30. Springer, 2007.
[76] Friedman, William F.:
Edgar Allan Poe, Cryptographer
. American Literature,
8(3):266-280, November 1936.
[77] Fujisaki, Eiichiro, Tatsuaki Okamoto, David Pointcheval und Jacques Stern:
RSA-
OAEP Is Secure under the RSA Assumption
. In: Kilian, Joe (Herausgeber):
Advances
in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference,
Proceedings
, Band 2139 der Reihe
Lecture Notes in Computer Science
, Seiten 260-274.
Springer, 2001.
[78] Garcia, Flavio D., Peter van Rossum, Roel Verdult und Ronny Wichers Schreur:
Wirelessly Pickpocketing a Mifare Classic Card
. In:
30th IEEE Symposium on Security
and Privacy (S&P 2009)
, Seiten 3-15. IEEE Computer Society, 2009.
[79] Goethe, Johann Wolfgang von:
Wilhelm Meisters Lehrjahre
. Unger, 1795. Siehe auch
http://www.gutenberg.org/browse/authors/g
für eine elektronische Fassung.
[80] Goldreich, Oded:
Foundations of Cryptography - Basic Tools
, Band I. Cambridge
University Press, 2001.