Cryptography Reference
In-Depth Information
[81] Goldreich, Oded: Foundations of Cryptography - Basic Applications ,BandII.
Cambridge University Press, 2004.
[82] Goldreich, Oded, Shafi Goldwasser und Silvio Micali: How to Construct Random
Functions (Extended Abstract) . In: 25th Annual Symposium on Foundations of
Computer Science (FOCS 1984) , Seiten 464-479. IEEE Computer Society, 1984.
[83] Goldreich, Oded, Shafi Goldwasser und Silvio Micali: On the Cryptographic Applications
of Random Functions . In: Blakley, G. R. und David Chaum (Herausgeber): Advances
in Cryptology, Proceedings of CRYPTO '84, Proceedings , Band 196 der Reihe Lecture
Notes in Computer Science , Seiten 276-288. Springer, 1984.
[84] Goldreich, Oded, Shafi Goldwasser und Silvio Micali: How to construct random
functions . Journal of the ACM, 33(4):792-807, 1986.
[85] Goldwasser, Shafi und Silvio Micali: Probabilistic Encryption and How to Play Mental
Poker Keeping Secret All Partial Information . In: Proceedings of the Fourteenth
Annual ACM Symposium on Theory of Computing , Seiten 365-377. ACM Press, 1982.
[86] Goldwasser, Shafi und Silvio Micali: Probabilistic Encryption . Journal of Computer and
System Sciences, 28(2):270-299, April 1984. Zunächst erschienen in STOC 1982.
[87] Goldwasser, Shafi, Silvio Micali und Ron L. Rivest: A digital signature scheme secure
against adaptive chosen-message attacks . SIAM Journal on Computing, 17(2):281-308,
1988.
[88] Goldwasser, Shafi, Silvio Micali und Andrew Chi-Chih Yao: Strong Signature Schemes .
In: Proceedings of the Fifteenth Annual ACM Symposium on Theory of Computing ,
Seiten 431-439. ACM Press, 1983.
[89] Gordon, Dan M.: Discrete logarithms in GF(p) using the number field sieve . SIAM
Journal on Discrete Mathematics, 6:124-138, 1993.
[90] Gutmann, Peter: PKI: it's not dead, just resting . Computer, 35(8):41-49, August 2002.
[91] Håstad, Johan und Mats Näslund: The security of all RSA and discrete log bits .
Journal of the ACM, 51(2):187-230, 2004.
[92] Heys, Howard M.: A Tutorial on Linear and Differential Cryptanalysis . Cryptologia,
26:189-221, 2002.
[93] Hohenberger, Susan und Brent Waters: Short and Stateless Signatures from the RSA
Assumption . In: Halevi, Shai (Herausgeber): Advances in Cryptology - CRYPTO 2009,
29th Annual International Cryptology Conference, Proceedings , Band 5677 der Reihe
Lecture Notes in Computer Science , Seiten 654-670. Springer, 2009.
[94] Impagliazzo, Russell und Michael Luby: One-way Functions are Essential for
Complexity Based Cryptography (Extended Abstract) . In: 30th Annual Symposium
on Foundations of Computer Science (FOCS 1989) , Seiten 230-235. IEEE Computer
Society, 1989.
Search WWH ::




Custom Search