Cryptography Reference
In-Depth Information
[68] Dodis, Yevgeniy, Thomas Ristenpart und Thomas Shrimpton: Salvaging Merkle-
Damgård for Practical Applications .In: Advances in Cryptology - EUROCRYPT 2009,
28th Annual International Conference on the Theory and Applications of Cryptographic
Techniques, Proceedings , Band 5479 der Reihe Lecture Notes in Computer Science ,
Seiten 371-388. Springer, 2009.
[69] Dolev, Danny, Cynthia Dwork und Moni Naor: Non-malleable Cryptography .SIAM
Journal on Computing, 30(2):391-437, 2000.
[70] Electronic Frontier Foundation: Cracking DES: Secrets of Encryption Research, Wiretap
Politics and Chip Design . O'Reilly & Associates, Inc., Sebastopol, CA, USA, 1998.
[71] ElGamal, Taher: A Public Key Cryptosystem and a Signature Scheme Based on
Discrete Logarithms .In: Advances in Cryptology, Proceedings of CRYPTO '84 ,Band
196 der Reihe Lecture Notes in Computer Science , Seiten 10-18. Springer, 1985.
[72] Ellision, Carl und Bruce Schneier: TenRisksofPKI:WhatYou'reNotBeingTold
About Public Key Infrastructure . Computer Security Journal, 16(1):1-7, 2000.
[73] Feistel, Horst: Cryptography and Computer Privacy . Scientific American, 228(5):15-23,
1973.
[74] Fiat, Amos und Adi Shamir: How to Prove Yourself: Practical Solutions to
Identification and Signature Problems . In: Advances in Cryptology - CRYPTO '86,
Proceedings , Band 263 der Reihe Lecture Notes in Computer Science , Seiten 186-194.
Springer, 1986.
[75] Fouque, Pierre-Alain, Gaëtan Leurent und Phong Q. Nguyen: Full Key-Recovery
Attacks on HMAC/NMAC-MD4 and NMAC-MD5 . In: Menezes, Alfred (Herausgeber):
Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology
Conference, Proceedings , Band 4622 der Reihe Lecture Notes in Computer Science ,
Seiten 13-30. Springer, 2007.
[76] Friedman, William F.: Edgar Allan Poe, Cryptographer . American Literature,
8(3):266-280, November 1936.
[77] Fujisaki, Eiichiro, Tatsuaki Okamoto, David Pointcheval und Jacques Stern: RSA-
OAEP Is Secure under the RSA Assumption . In: Kilian, Joe (Herausgeber): Advances
in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference,
Proceedings , Band 2139 der Reihe Lecture Notes in Computer Science , Seiten 260-274.
Springer, 2001.
[78] Garcia, Flavio D., Peter van Rossum, Roel Verdult und Ronny Wichers Schreur:
Wirelessly Pickpocketing a Mifare Classic Card . In: 30th IEEE Symposium on Security
and Privacy (S&P 2009) , Seiten 3-15. IEEE Computer Society, 2009.
[79] Goethe, Johann Wolfgang von: Wilhelm Meisters Lehrjahre . Unger, 1795. Siehe auch
http://www.gutenberg.org/browse/authors/g für eine elektronische Fassung.
[80] Goldreich, Oded: Foundations of Cryptography - Basic Tools , Band I. Cambridge
University Press, 2001.
Search WWH ::




Custom Search