Cryptography Reference
In-Depth Information
[121] Maurer, Ueli M.:
New Approaches to Digital Evidence
. Proceedings of the IEEE,
92(6):933-947, 2004.
[122] Maurer, Ueli M. und Stefan Wolf:
The Relationship Between Breaking the Di
e-
Hellman Protocol and Computing Discrete Logarithms
. SIAM Journal on Computing,
28(5):1689-1721, 1999.
[123] Menezes, Alfred J., Paul C. van Oorschot und Scott A. Vanstone:
Handbook of applied
cryptography
. CRC Press series on discrete mathematics and its applications. CRC
Press, 1996.
[124] Merkle, Ralph C.:
One Way Hash Functions and DES
. In: Brassard, Gilles
(Herausgeber):
Advances in Cryptology - CRYPTO '89, 9th Annual International
Cryptology Conference, Proceedings
, Band 435 der Reihe
Lecture Notes in Computer
Science
, Seiten 428-446. Springer, 1989.
[125] Micciancio, Daniele und Shafi Goldwasser:
Complexity of Lattice Problems — A
Cryptographic Perspective
. Springer International Series in Engineering and Computer
Science. Springer, 2002.
[126] Miller, Gary L.:
Riemann's Hypothesis and Tests for Primality
. Journal of Computer
and System Sciences, 13(3):300-317, 1976.
[127] Miller, Victor S.:
Use of Elliptic Curves in Cryptography
. In: Williams, Hugh C.
(Herausgeber):
Advances in Cryptology - CRYPTO '85, Proceedings
, Band 218 der
Reihe
Lecture Notes in Computer Science
, Seiten 417-426. Springer, 1986.
[128] Miyaguchi, Shoji, Kazuo Ohta und Masahiko Iwata:
Confirmation that Some Hash
Functions Are Not Collision Free
. In: Damgård, Ivan (Herausgeber):
Advances
in Cryptology - EUROCRYPT '90, Workshop on the Theory and Application of
Cryptographic Techniques, Proceedings
, Band 473 der Reihe
Lecture Notes in Computer
Science
, Seiten 326-343. Springer, 1991.
[129] Naor, Moni und Moti Yung:
Universal One-Way Hash Functions and their
Cryptographic Applications
. In:
Proceedings of the Twenty-First Annual ACM
Symposium on Theory of Computing
, Seiten 33-43. ACM Press, 1989.
[130] Naor, Moni und Moti Yung:
Public-key Cryptosystems Provably Secure against Chosen
Ciphertext Attacks
. In:
Proceedings of the Twenty Second Annual ACM Symposium on
Theory of Computing (STOC 1990)
, Seiten 427-437. ACM Press, 1990.
[131] Nielsen, Michael A. und Isaac L. Chuang:
Quantum Computation and Quantum
Information
. Cambridge University Press, 2000.
[132] Odlyzko, Andrew M.:
Discrete Logarithms: The Past and the Future
. Designs, Codes,
and Cryptography, 19(2/3):129-145, 2000.
[133] Pohlig, Stephen C. und Martin E. Hellman:
An Improved Algorithm for Computing
Logarithms over GF(p) and its Cryptographic Significance
. IEEE Transactions on
Information Theory, 24(1):106-110, 1978.
[134] Pollard, John M.:
Factoring with cubic integers
. In: Lenstra, Arjen K. und Jr. Hendrik
W. Lenstra (Herausgeber):
The Development of the Number Field Sieve
, Seiten 4-10.
Springer, 1993.