Cryptography Reference
In-Depth Information
[146] Shanks, Daniel: Class number, a theory of factorization and genera . In: Proceedings
Symposia Pure Mathematics 20 , Seiten 415-440. AMS, Providence, R.I., 1971.
[147] Shannon, Claude Elwood: A Mathematical Theory of Communication, Part I .Bel
System Technical Journal, 27:379-423, July 1948.
[148] Shannon, Claude Elwood: A Mathematical Theory of Communication, Part II .Bel
System Technical Journal, 27:623-656, October 1948.
[149] Shannon, Claude Elwood: Communication Theory of Secrecy Systems . Bell System
Technical Journal, 28(4):656-715, 1949. Ursprünglich erschienen in einem vertraulichen
Bericht vom 1. September 1945 mit dem Titel A Mathematical Theory of Cryptography .
[150] Shor, Peter W.: Polynomial-Time Algorithms for Prime Factorization and Discrete
Logarithms on a Quantum Computer . SIAM Journal on Computing, 26(5):1484-1509,
1997.
[151] Shoup, Victor: OAEP Reconsidered . In: Kilian, Joe (Herausgeber): Advances in
Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference,
Proceedings , Band 2139 der Reihe Lecture Notes in Computer Science , Seiten 239-259.
Springer, 2001.
[152] Shoup, Victor: Sequences of games: a tool for taming complexity in security proofs .
Cryptology ePrint Archive, Report 2004/332, 2004. http://eprint.iacr.org/ .
[153] Shoup, Victor: A Computational Introduction to Number Theory and Algebra .
Cambridge University Press, 2005. Online verfügbar unter http://www.shoup.net/ntb .
[154] Singh, Simon: The code book: the evolution of secrecy from Mary, Queen of Scots, to
quantum cryptography . Doubleday New York, NY, USA, 1999.
[155] Stevens, Marc, Arjen K. Lenstra und Benne de Weger: Predicting the winner of the
2008 US presidential elections using a Sony PlayStation 3 . http://www.win.tue.nl/
hashclash/Nostradamus/ , 2007.
[156] Stevens, Marc, Alexander Sotirov, Jacob Appelbaum, Arjen K. Lenstra, David Molnar,
Dag Arne Osvik und Benne de Weger: Short Chosen-Prefix Collisions for MD5 and
the Creation of a Rogue CA Certificate . In: Halevi, Shai (Herausgeber): Advances
in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference,
Proceedings , Band 5677 der Reihe Lecture Notes in Computer Science , Seiten 55-69.
Springer, 2009.
[157] Stinson, Douglas R.: Cryptography — Theory and Practice . Discrete Mathematics and
its Applications. Chapman & Hall/CRC, 3. Auflage, 2006.
[158] Suetonius Tranquillus, Gaius: Vita Divi Iuli, 56 . http://www.thelatinlibrary.com/
suetonius/suet.caesar.html#56 .
[159] Tromer, Eran, Dag Arne Osvik und Adi Shamir: Ecient Cache Attacks on AES, and
Countermeasures . Journal of Cryptology, 23(1):37-71, 2010.
Search WWH ::




Custom Search