Cryptography Reference
In-Depth Information
[146] Shanks, Daniel:
Class number, a theory of factorization and genera
. In:
Proceedings
Symposia Pure Mathematics 20
, Seiten 415-440. AMS, Providence, R.I., 1971.
[147] Shannon, Claude Elwood:
A Mathematical Theory of Communication, Part I
.Bel
System Technical Journal, 27:379-423, July 1948.
[148] Shannon, Claude Elwood:
A Mathematical Theory of Communication, Part II
.Bel
System Technical Journal, 27:623-656, October 1948.
[149] Shannon, Claude Elwood:
Communication Theory of Secrecy Systems
. Bell System
Technical Journal, 28(4):656-715, 1949. Ursprünglich erschienen in einem vertraulichen
Bericht vom 1. September 1945 mit dem Titel
A Mathematical Theory of Cryptography
.
[150] Shor, Peter W.:
Polynomial-Time Algorithms for Prime Factorization and Discrete
Logarithms on a Quantum Computer
. SIAM Journal on Computing, 26(5):1484-1509,
1997.
[151] Shoup, Victor:
OAEP Reconsidered
. In: Kilian, Joe (Herausgeber):
Advances in
Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference,
Proceedings
, Band 2139 der Reihe
Lecture Notes in Computer Science
, Seiten 239-259.
Springer, 2001.
[152] Shoup, Victor:
Sequences of games: a tool for taming complexity in security proofs
.
Cryptology ePrint Archive, Report 2004/332, 2004.
http://eprint.iacr.org/
.
[153] Shoup, Victor:
A Computational Introduction to Number Theory and Algebra
.
Cambridge University Press, 2005. Online verfügbar unter
http://www.shoup.net/ntb
.
[154] Singh, Simon:
The code book: the evolution of secrecy from Mary, Queen of Scots, to
quantum cryptography
. Doubleday New York, NY, USA, 1999.
[155] Stevens, Marc, Arjen K. Lenstra und Benne de Weger:
Predicting the winner of the
2008 US presidential elections using a Sony PlayStation 3
.
http://www.win.tue.nl/
hashclash/Nostradamus/
, 2007.
[156] Stevens, Marc, Alexander Sotirov, Jacob Appelbaum, Arjen K. Lenstra, David Molnar,
Dag Arne Osvik und Benne de Weger:
Short Chosen-Prefix Collisions for MD5 and
the Creation of a Rogue CA Certificate
. In: Halevi, Shai (Herausgeber):
Advances
in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference,
Proceedings
, Band 5677 der Reihe
Lecture Notes in Computer Science
, Seiten 55-69.
Springer, 2009.
[157] Stinson, Douglas R.:
Cryptography — Theory and Practice
. Discrete Mathematics and
its Applications. Chapman & Hall/CRC, 3. Auflage, 2006.
[158] Suetonius Tranquillus, Gaius:
Vita Divi Iuli, 56
.
http://www.thelatinlibrary.com/
suetonius/suet.caesar.html#56
.
[159] Tromer, Eran, Dag Arne Osvik und Adi Shamir:
Ecient Cache Attacks on AES, and
Countermeasures
. Journal of Cryptology, 23(1):37-71, 2010.