Cryptography Reference
In-Depth Information
[108] Koblitz, Neal: A Course in Number Theory and Cryptography . Graduate Texts in
Mathematics. Springer, 2. Auflage, 2006.
[109] Kocher, Paul C.: Timing Attacks on Implementations of Die-Hellman, RSA, DSS,
and Other Systems . In: Advances in Cryptology - CRYPTO '96, Proceedings of the
16th Annual International Cryptology Conference , Band 1109 der Reihe Lecture Notes
in Computer Science , Seiten 104-113. Springer, 1996.
[110] Kohlas, Reto und Ueli M. Maurer: Reasoning about Public-Key Certification: On
Bindings between Entities and Public Keys . In: Franklin, Matthew K. (Herausgeber):
Financial Cryptography, Third International Conference, FC'99, Proceedings ,Band
1648 der Reihe Lecture Notes in Computer Science , Seiten 86-103. Springer, 1999.
[111] Kohnfelder, Loren M.: Towards a practical public-key cryptosystem . Bachelorarbeit,
MIT, Mai 1978.
[112] Krawczyk, Hugo: The Order of Encryption and Authentication for Protecting
Communications (or: How Secure Is SSL?) . In: Kilian, Joe (Herausgeber): Advances
in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference,
Proceedings , Band 1462 der Reihe Lecture Notes in Computer Science , Seiten 310-331.
Springer, 2001.
[113] Krawczyk, Hugo, Mihir Bellare und Ran Canetti: HMAC: Keyed-hashing for message
authentication . RFC 2104, February 1997. http://www.ietf.org/rfc/rfc2104.txt .
[114] Krengel, Ulrich: Einführung in die Wahrscheinlichkeitstheorie und Statistik .Vieweg,
Braunschweig u. a., 3. Auflage, 1991.
[115] Leurent, Gaëtan: MD4 is Not One-Way . In: Nyberg, Kaisa (Herausgeber): Fast
Software Encryption, 15th International Workshop, FSE 2008, Revised Selected Papers ,
Band 5086 der Reihe Lecture Notes in Computer Science , Seiten 412-428. Springer,
2008.
[116] Luby, Michael und Charles Rackoff: How to Construct Pseudorandom Permutations
from Pseudorandom Functions . SIAM Journal on Computing, 17(2):373-386, 1988.
[117] Lucks, Stefan: Design Principles for Iterated Hash Functions . Cryptology ePrint
Archive, Report 2004/253, 2004. http://eprint.iacr.org/ .
[118] Lyubashevsky, Vadim, Daniele Micciancio, Chris Peikert und Alon Rosen: SWIFFT: A
Modest Proposal for FFT Hashing . In: Nyberg, Kaisa (Herausgeber): Fast Software
Encryption, 15th International Workshop, FSE 2008, Revised Selected Papers ,Band
5086 der Reihe Lecture Notes in Computer Science , Seiten 54-72. Springer, 2008.
[119] Matsui, Mitsuru: Linear Cryptanalysis Method for DES Cipher . In: Helleseth, Tor
(Herausgeber): Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory
and Application of Cryptographic Techniques, Proceedings , Band 765 der Reihe Lecture
Notes in Computer Science , Seiten 386-397. Springer, 1994.
[120] Matsui, Mitsuru: The First Experimental Cryptanalysis of the Data Encryption
Standard . In: Desmedt, Yvo (Herausgeber): Advances in Cryptology - CRYPTO '94,
Proceedings of the 14th Annual International Cryptology Conference , Band 839 der
Reihe Lecture Notes in Computer Science , Seiten 1-11. Springer, 1994.
Search WWH ::




Custom Search