Cryptography Reference
In-Depth Information
[108] Koblitz, Neal:
A Course in Number Theory and Cryptography
. Graduate Texts in
Mathematics. Springer, 2. Auflage, 2006.
[109] Kocher, Paul C.:
Timing Attacks on Implementations of Die-Hellman, RSA, DSS,
and Other Systems
. In:
Advances in Cryptology - CRYPTO '96, Proceedings of the
16th Annual International Cryptology Conference
, Band 1109 der Reihe
Lecture Notes
in Computer Science
, Seiten 104-113. Springer, 1996.
[110] Kohlas, Reto und Ueli M. Maurer:
Reasoning about Public-Key Certification: On
Bindings between Entities and Public Keys
. In: Franklin, Matthew K. (Herausgeber):
Financial Cryptography, Third International Conference, FC'99, Proceedings
,Band
1648 der Reihe
Lecture Notes in Computer Science
, Seiten 86-103. Springer, 1999.
[111] Kohnfelder, Loren M.:
Towards a practical public-key cryptosystem
. Bachelorarbeit,
MIT, Mai 1978.
[112] Krawczyk, Hugo:
The Order of Encryption and Authentication for Protecting
Communications (or: How Secure Is SSL?)
. In: Kilian, Joe (Herausgeber):
Advances
in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference,
Proceedings
, Band 1462 der Reihe
Lecture Notes in Computer Science
, Seiten 310-331.
Springer, 2001.
[113] Krawczyk, Hugo, Mihir Bellare und Ran Canetti:
HMAC: Keyed-hashing for message
authentication
. RFC 2104, February 1997.
http://www.ietf.org/rfc/rfc2104.txt
.
[114] Krengel, Ulrich:
Einführung in die Wahrscheinlichkeitstheorie und Statistik
.Vieweg,
Braunschweig u. a., 3. Auflage, 1991.
[115] Leurent, Gaëtan:
MD4 is Not One-Way
. In: Nyberg, Kaisa (Herausgeber):
Fast
Software Encryption, 15th International Workshop, FSE 2008, Revised Selected Papers
,
Band 5086 der Reihe
Lecture Notes in Computer Science
, Seiten 412-428. Springer,
2008.
[116] Luby, Michael und Charles Rackoff:
How to Construct Pseudorandom Permutations
from Pseudorandom Functions
. SIAM Journal on Computing, 17(2):373-386, 1988.
[117] Lucks, Stefan:
Design Principles for Iterated Hash Functions
. Cryptology ePrint
Archive, Report 2004/253, 2004.
http://eprint.iacr.org/
.
[118] Lyubashevsky, Vadim, Daniele Micciancio, Chris Peikert und Alon Rosen:
SWIFFT: A
Modest Proposal for FFT Hashing
. In: Nyberg, Kaisa (Herausgeber):
Fast Software
Encryption, 15th International Workshop, FSE 2008, Revised Selected Papers
,Band
5086 der Reihe
Lecture Notes in Computer Science
, Seiten 54-72. Springer, 2008.
[119] Matsui, Mitsuru:
Linear Cryptanalysis Method for DES Cipher
. In: Helleseth, Tor
(Herausgeber):
Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory
and Application of Cryptographic Techniques, Proceedings
, Band 765 der Reihe
Lecture
Notes in Computer Science
, Seiten 386-397. Springer, 1994.
[120] Matsui, Mitsuru:
The First Experimental Cryptanalysis of the Data Encryption
Standard
. In: Desmedt, Yvo (Herausgeber):
Advances in Cryptology - CRYPTO '94,
Proceedings of the 14th Annual International Cryptology Conference
, Band 839 der
Reihe
Lecture Notes in Computer Science
, Seiten 1-11. Springer, 1994.