Cryptography Reference
In-Depth Information
[BonRSA]
Boneh, D., DeMillo, R. A., Lipton, R. J., On the Importance
of Checking Cryptographic Protocols for Faults , Advances in
Cryptology — EUROCRYPT '97, Springer, 1997, pp. 37 - 51.
[BonVen]
Boneh, D., Venkatesan, R., Breaking RSA May Not Be
Equivalent to Factoring , Advances in
Cryptology — EUROCRYPT '98, Springer, 1998, pp. 59 - 71.
[BorstIDEA]
Borst, J., Knudsen, L. R., Rijmen, V., Two Attacks on Reduced
IDEA , Advances in Cryptology — EUROCRYPT '97, Springer,
1997, pp. 1 - 13.
[BrickDenn]
Brickell, E., Denning, D. et al., SKIPJACK Review: Interim
Report , in: [Hoff], pp. 119 - 130 (2.2).
[ChanFrTsi]
Chan, A., Frankel, Y., Tsiounis, Y., Easy Come—Easy Go
Divisible Cash , Advances in Cryptology — EUROCRYPT '98,
Springer, 1998, pp. 561 - 575.
[Chaum]
Chaum, D., Fiat, A., Naor, M., Untraceable Electronic Cash ,
in: Advances in Cryptology — CRYPTO '88 Proceedings,
Springer, 1990, pp. 319 - 327.
[CourtPiep]
Cryptanalysis of Block Ciphers with Overdefined Systems of
Equations , in: Advances in Cryptology — Asiacrypt 2002
Proceedings, Springer, Dec. 2002.
[Crutch]
Crutchfield, J. P., Farmer, J. D., Packard, N. H., Shaw, R. S.,
Chaos , Scientific American, Vol. 255/6 (1986), pp. 38 - 49.
[CZ96]
Heiße Chipkarten geben Code preis (Hot Chip Cards Leak
Code), Computer-Zeitung, No. 44, Oct. 31, 1996, p. 1.
[Daeman]
Daeman, J., Cipher and Hash Function Design , PhD
Dissertation, Katholieke Universiteit Leuven, March 1995.
[Denn83]
Denning, D. E. R., Cryptography and Data Security ,
Addison-Wesley, Reading, MA, 1983. This topic is considered
the precursor of Bruce Schneier's seminal work [SchnCr]. It
discusses cryptology in a mathematically compact form, and
computer security. Due to the publication date, many modern
methods are missing, of course.
[DESX]
Kilian, J., Rogaway, P., How to Protect DES Against
Exhaustive Key Search , in: Advances in Cryptology — Crypto
'96, Springer, 1996. This article is included on our Web site.
Search WWH ::




Custom Search