Cryptography Reference
In-Depth Information
[81] Goldreich, Oded:
Foundations of Cryptography - Basic Applications
,BandII.
Cambridge University Press, 2004.
[82] Goldreich, Oded, Shafi Goldwasser und Silvio Micali:
How to Construct Random
Functions (Extended Abstract)
. In:
25th Annual Symposium on Foundations of
Computer Science (FOCS 1984)
, Seiten 464-479. IEEE Computer Society, 1984.
[83] Goldreich, Oded, Shafi Goldwasser und Silvio Micali:
On the Cryptographic Applications
of Random Functions
. In: Blakley, G. R. und David Chaum (Herausgeber):
Advances
in Cryptology, Proceedings of CRYPTO '84, Proceedings
, Band 196 der Reihe
Lecture
Notes in Computer Science
, Seiten 276-288. Springer, 1984.
[84] Goldreich, Oded, Shafi Goldwasser und Silvio Micali:
How to construct random
functions
. Journal of the ACM, 33(4):792-807, 1986.
[85] Goldwasser, Shafi und Silvio Micali:
Probabilistic Encryption and How to Play Mental
Poker Keeping Secret All Partial Information
. In:
Proceedings of the Fourteenth
Annual ACM Symposium on Theory of Computing
, Seiten 365-377. ACM Press, 1982.
[86] Goldwasser, Shafi und Silvio Micali:
Probabilistic Encryption
. Journal of Computer and
System Sciences, 28(2):270-299, April 1984. Zunächst erschienen in STOC 1982.
[87] Goldwasser, Shafi, Silvio Micali und Ron L. Rivest:
A digital signature scheme secure
against adaptive chosen-message attacks
. SIAM Journal on Computing, 17(2):281-308,
1988.
[88] Goldwasser, Shafi, Silvio Micali und Andrew Chi-Chih Yao:
Strong Signature Schemes
.
In:
Proceedings of the Fifteenth Annual ACM Symposium on Theory of Computing
,
Seiten 431-439. ACM Press, 1983.
[89] Gordon, Dan M.:
Discrete logarithms in GF(p) using the number field sieve
. SIAM
Journal on Discrete Mathematics, 6:124-138, 1993.
[90] Gutmann, Peter:
PKI: it's not dead, just resting
. Computer, 35(8):41-49, August 2002.
[91] Håstad, Johan und Mats Näslund:
The security of all RSA and discrete log bits
.
Journal of the ACM, 51(2):187-230, 2004.
[92] Heys, Howard M.:
A Tutorial on Linear and Differential Cryptanalysis
. Cryptologia,
26:189-221, 2002.
[93] Hohenberger, Susan und Brent Waters:
Short and Stateless Signatures from the RSA
Assumption
. In: Halevi, Shai (Herausgeber):
Advances in Cryptology - CRYPTO 2009,
29th Annual International Cryptology Conference, Proceedings
, Band 5677 der Reihe
Lecture Notes in Computer Science
, Seiten 654-670. Springer, 2009.
[94] Impagliazzo, Russell und Michael Luby:
One-way Functions are Essential for
Complexity Based Cryptography (Extended Abstract)
. In:
30th Annual Symposium
on Foundations of Computer Science (FOCS 1989)
, Seiten 230-235. IEEE Computer
Society, 1989.