Cryptography Reference
In-Depth Information
[95] Iwata, Tetsu und Kaoru Kurosawa: OMAC: One-Key CBC MAC . In: Johansson,
Thomas (Herausgeber): Fast Software Encryption, 10th International Workshop, FSE
2003, Revised Papers , Band 2887 der Reihe Lecture Notes in Computer Science ,Seiten
129-153. Springer, 2003.
[96] Iwata, Tetsu und Kaoru Kurosawa: Stronger Security Bounds for OMAC, TMAC, and
XCBC . In: Johansson, Thomas und Subhamoy Maitra (Herausgeber): Progress in
Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India,
Proceedings , Band 2904 der Reihe Lecture Notes in Computer Science , Seiten 402-415.
Springer, 2003.
[97] Joux, Antoine, David Naccache und Emmanuel Thomé: When e-th Roots Become
Easier Than Factoring . In: Kurosawa, Kaoru (Herausgeber): Advances in Cryptology
- ASIACRYPT 2007, 13th International Conference on the Theory and Application of
Cryptology and Information Security, Proceedings , Band 4833 der Reihe Lecture Notes
in Computer Science , Seiten 13-28. Springer, 2007.
[98] Kahn, David: The Codebreakers: The Story of Secret Writing . Scribner, New York City,
2. Auflage, 1996.
[99] Kasiski, Friedrich Wilhelm: Die Geheimschriften und die Dechiffrierkunst . Mittler &
Sohn, Berlin, 1863.
[100] Katz, Jonathan: Digital Signatures . Springer, 1. Auflage, 2010.
[101] Katz, Jonathan und Yehuda Lindell: Introduction to Modern Cryptography . Chapman
& Hall/CRC Press, 2008.
[102] Kaufman, Charlie, Raida Perlman und Mike Speciner: Network Security: Private
Communication in a Public World . Series in Computer Networking and Distributed
Systems. Prentice Hall, 2. Auflage, 2002.
[103] Kerckhoffs, Auguste: La cryptographie militaire . Journal des Sciences militaires,
IX :5-38, Januar 1883.
[104] Kerckhoffs, Auguste: La Cryptographie Militaire . Librairie Militaire de L. Baudoin &
Cie., Paris, 1883.
[105] Kim, Jongsung, Alex Biryukov, Bart Preneel und Seokhie Hong: On the Security of
HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended
Abstract) . In: Prisco, Roberto De und Moti Yung (Herausgeber): Security and
Cryptography for Networks, 5th International Conference, SCN 2006, Proceedings ,Band
4116 der Reihe Lecture Notes in Computer Science , Seiten 242-256. Springer, 2006.
[106] Kleinjung, Thorsten, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel
Thomé, Joppe W. Bos, Pierrick Gaudry, Alexander Kruppa, Peter L. Montgomery,
Dag Arne Osvik, Herman J. J. te Riele, Andrey Timofeev und Paul Zimmermann:
Factorization of a 768-Bit RSA Modulus . In: Rabin, Tal (Herausgeber): Advances in
Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference. Proceedings , Band
6223 der Reihe Lecture Notes in Computer Science , Seiten 333-350. Springer, 2010.
[107] Koblitz, Neal: Elliptic curve cryptosystems . Mathematics of Computation, 48:203-209,
1987.
Search WWH ::




Custom Search