Cryptography Reference
In-Depth Information
[160] Tsiounis, Yiannis und Moti Yung:
On the Security of ElGamal Based Encryption
.
In: Imai, Hideki und Yuliang Zheng (Herausgeber):
Public Key Cryptography, First
International Workshop on Practice and Theory in Public Key Cryptography, PKC '98,
Proceedings
, Band 1431 der Reihe
Lecture Notes in Computer Science
, Seiten 117-134.
Springer, 1998.
[161] Vernam, Gilbert S.:
US Patent no. 1,310,719
.Beziehbarunter
http://patft.uspto.
gov/netahtml/PTO/srchnum.htm
mit Suchbegriff »Utility: 1,310,719«. 22. Juli 1919.
[162] Vigenère, Blaise de:
Traicté Chiffres
. In:
Manuel de cryptographie
. Payot, Paris, 1951.
Abschnitt 145.
[163] Wang, Xiaoyun, Xuejia Lai, Dengguo Feng, Hui Chen und Xiuyuan Yu:
Cryptanalysis
of the Hash Functions MD4 and RIPEMD
. In: Cramer, Ronald (Herausgeber):
Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on
the Theory and Applications of Cryptographic Techniques, Proceedings
, Band 3494 der
Reihe
Lecture Notes in Computer Science
, Seiten 1-18. Springer, 2005.
[164] Wang, Xiaoyun, Yiqun Lisa Yin und Hongbo Yu:
Finding Collisions in the Full SHA-1
.
In: Shoup, Victor (Herausgeber):
Advances in Cryptology - CRYPTO 2005: 25th
Annual International Cryptology Conference, Proceedings
, Band 3621 der Reihe
Lecture
Notes in Computer Science
, Seiten 17-36. Springer, 2005.
[165] Wang, Xiaoyun und Hongbo Yu:
How to Break MD5 and Other Hash Functions
.In:
Cramer, Ronald (Herausgeber):
Advances in Cryptology - EUROCRYPT 2005, 24th
Annual International Conference on the Theory and Applications of Cryptographic
Techniquees, Proceedings
, Band 3494 der Reihe
Lecture Notes in Computer Science
,
Seiten 19-35. Springer, 2005.
[166] Wang, Xiaoyun, Hongbo Yu, Wei Wang, Haina Zhang und Tao Zhan:
Cryptanalysis on
HMAC/NMAC-MD5 and MD5-MAC
. In: Joux, Antoine (Herausgeber):
Advances in
Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory
and Applications of Cryptographic Techniques, Proceedings
, Band 5479 der Reihe
Lecture Notes in Computer Science
, Seiten 121-133. Springer, 2009.
[167] Wang, Xiaoyun, Hongbo Yu und Yiqun Lisa Yin:
E
cient Collision Search Attacks on
SHA-0
. In: Shoup, Victor (Herausgeber):
Advances in Cryptology - CRYPTO 2005:
25th Annual International Cryptology Conference, Proceedings
, Band 3621 der Reihe
Lecture Notes in Computer Science
, Seiten 1-16. Springer, 2005.
[168] Washington, Lawrence C.:
Elliptic Curves: Number Theory and Cryptography
.Discrete
Mathematics and Its Applications. Chapman & Hall/CRC Press, 2003.
[169] Wayner, Peter:
British Document Outlines Early Encryption Discovery
.TheNew
York Times, 24. Dezember 1997.
http://www.nytimes.com/library/cyber/week/
122497encrypt.html
.
[170] Yao, Andrew Chi-Chih:
Theory and Applications of Trapdoor Functions (Extended
Abstract)
. In:
23rd Annual Symposium on Foundations of Computer Science (FOCS
1982)
, Seiten 80-91. IEEE Computer Society, 1982.
[171] Zimmermann, Philip R.:
The Ocial PGP User's Guide
. MIT Press, 1995.