Cryptography Reference
In-Depth Information
[160] Tsiounis, Yiannis und Moti Yung: On the Security of ElGamal Based Encryption .
In: Imai, Hideki und Yuliang Zheng (Herausgeber): Public Key Cryptography, First
International Workshop on Practice and Theory in Public Key Cryptography, PKC '98,
Proceedings , Band 1431 der Reihe Lecture Notes in Computer Science , Seiten 117-134.
Springer, 1998.
[161] Vernam, Gilbert S.: US Patent no. 1,310,719 .Beziehbarunter http://patft.uspto.
gov/netahtml/PTO/srchnum.htm mit Suchbegriff »Utility: 1,310,719«. 22. Juli 1919.
[162] Vigenère, Blaise de: Traicté Chiffres . In: Manuel de cryptographie . Payot, Paris, 1951.
Abschnitt 145.
[163] Wang, Xiaoyun, Xuejia Lai, Dengguo Feng, Hui Chen und Xiuyuan Yu: Cryptanalysis
of the Hash Functions MD4 and RIPEMD . In: Cramer, Ronald (Herausgeber):
Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on
the Theory and Applications of Cryptographic Techniques, Proceedings , Band 3494 der
Reihe Lecture Notes in Computer Science , Seiten 1-18. Springer, 2005.
[164] Wang, Xiaoyun, Yiqun Lisa Yin und Hongbo Yu: Finding Collisions in the Full SHA-1 .
In: Shoup, Victor (Herausgeber): Advances in Cryptology - CRYPTO 2005: 25th
Annual International Cryptology Conference, Proceedings , Band 3621 der Reihe Lecture
Notes in Computer Science , Seiten 17-36. Springer, 2005.
[165] Wang, Xiaoyun und Hongbo Yu: How to Break MD5 and Other Hash Functions .In:
Cramer, Ronald (Herausgeber): Advances in Cryptology - EUROCRYPT 2005, 24th
Annual International Conference on the Theory and Applications of Cryptographic
Techniquees, Proceedings , Band 3494 der Reihe Lecture Notes in Computer Science ,
Seiten 19-35. Springer, 2005.
[166] Wang, Xiaoyun, Hongbo Yu, Wei Wang, Haina Zhang und Tao Zhan: Cryptanalysis on
HMAC/NMAC-MD5 and MD5-MAC . In: Joux, Antoine (Herausgeber): Advances in
Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory
and Applications of Cryptographic Techniques, Proceedings , Band 5479 der Reihe
Lecture Notes in Computer Science , Seiten 121-133. Springer, 2009.
[167] Wang, Xiaoyun, Hongbo Yu und Yiqun Lisa Yin: E cient Collision Search Attacks on
SHA-0 . In: Shoup, Victor (Herausgeber): Advances in Cryptology - CRYPTO 2005:
25th Annual International Cryptology Conference, Proceedings , Band 3621 der Reihe
Lecture Notes in Computer Science , Seiten 1-16. Springer, 2005.
[168] Washington, Lawrence C.: Elliptic Curves: Number Theory and Cryptography .Discrete
Mathematics and Its Applications. Chapman & Hall/CRC Press, 2003.
[169] Wayner, Peter: British Document Outlines Early Encryption Discovery .TheNew
York Times, 24. Dezember 1997. http://www.nytimes.com/library/cyber/week/
122497encrypt.html .
[170] Yao, Andrew Chi-Chih: Theory and Applications of Trapdoor Functions (Extended
Abstract) . In: 23rd Annual Symposium on Foundations of Computer Science (FOCS
1982) , Seiten 80-91. IEEE Computer Society, 1982.
[171] Zimmermann, Philip R.: The Ocial PGP User's Guide . MIT Press, 1995.
Search WWH ::




Custom Search