Cryptography Reference
In-Depth Information
[Lamport]
Lamport, L., Password Authentication with Insecure
Communication , Comm. ACM, 24 (1981) No.11, pp.
770 - 772.
[Lenstra]
Lenstra, A. K., Lenstra, H. W., The Development of the
Number Field Sieve , Lecture Notes in Mathematics 1554,
Springer, 1993.
[LenstraMD5]
Lenstra, A., Wang, X., Weger, B., Colliding X.509 Certificates ,
eprint.iacr.org/eprint/2005/067/.
[MM]
Meyer, C., Matyas, S., Cryptography: A New Dimension in
Computer Data Security , Wiley, 1982.
[MenOoVan]
Menezes, A. J., van Oorschot, P. C., Vanstone, S. A.,
Handbook of Applied Cryptography , CRC Press, 1997, ISBN
0-8493-8523-7. A very extensive and mathematically sound
work on modern cryptography. In particular, it contains the
tables of contents of all proceedings of the ASIACRYPT/
AUSCRYPT, CRYPTO, EUROCRYPT, and Fast Software
Encryption conferences, as well as the tables of contents of the
Journal of Cryptology . One of the most important sources for
cryptology, but only for readers with mathematical knowledge.
[Mikle]
Mikle, O., Practical Attacks on Digital Signatures Using MD5
Message Digest , eprint.iacr.org/eprint/2004/356/.
[Mupf]
Muller, G., Pfitzmann, A. (eds), Mehrseitige Sicherheit in der
Informationstechnik (Multi-sided Security in Information
Technology), Addison-Wesley, 1997. In addition to a large
number of technical problems, this work also discusses legal
issues, in particular the German signature law.
[MurFEAL]
Murphy, S., The Cryptanalysis of FEAL-4 with 20 Chosen
Plaintexts , Journal of Cryptology, Vol. 2 (1990), No. 3,
pp. 145 - 154.
[NISTmod]
http://csrc.nist.gov/CryptoToolkit/modes/
ModesPage .html
[PetAndMark]
Petitcolas, A. P., Anderson, R., Kuhn, M., Attacks on
Copyright Marking Systems , 2nd International Workshop on
Information Hiding, Portland, OR, April 1998, Springer,
LNCS.
[Peters]
Peters, T., Das Tom Peters Seminar. Management in
chaotischen Zeiten (Management in Chaotic Times), Campus
Verlag, Frankfurt/New York, 1995.
Search WWH ::




Custom Search