Cryptography Reference
In-Depth Information
[Pfitzfinger]
Pfitzmann, B.,
Anonymous Fingerprinting
, Advances in
Cryptology — EUROCRYPT '97, pp. 88 - 102, Springer, 1997,
LNCS 1233.
[PfitzFSS]
Pfitzmann, B.,
Digital Signature Schemes, General Framework
and Fail-Stop Signatures
, Springer, LNCS 1100, 1996.
[Pfitzstego]
Franz, E., Pfitzmann, A.,
Ableitung eines neuen
Stegoparadigmas mit Hilfe empirischer Untersuchungen
(Deriving a New Stego-Paradigm by Empiric Studies), 2nd
International Workshop on Information Hiding, Portland, OR,
April 1998, Springer, LNCS.
[RSA]
Rivest, R. L., Shamir, A., Adleman, L. M.,
A Method for
Obtaining Digital Signatures and Public-Key Systems
, Comm.
ACM, Vol. 21 (1978) No. 2, pp. 120 - 126.
[Rabin]
Rabin, M. O.,
Probabilistic Algorithm for Testing Primality
,
Journal of Number Theory, Vol. 12 (1980), No.1, pp.
128 - 138.
[RivRC5]
Rivest, R.,
The RC5 Encryption Algorithm
, in: Fast Software
Encryption — Second International Workshop, Leuven,
Belgium, Springer, 1995, LNCS 1008, pp. 86 - 96.
[RogChMD2]
Rogier, N., Chauvaud, P.,
The Compression Function of MD2
is not Collision Free
, introduced at the Cryptography '95
conference, Ottawa, Canada, May 18/19, 1995.
[RogCoSeal]
Rogaway, P., Coppersmith, D.,
A Software-Oriented
Encryption Algorithm
, in: Fast Software Encryption,
Cambridge Security Workshop Proceedings, Springer, 1994,
pp. 56 - 63.
[SchHad]
Schulzki-Haddouti, C., Ruhmann, I.,
Abhor-Dschungel
(The
Eavesdropping Jungle), c't 5/98, pp. 82 ff.
[Schmeh]
Schmeh, K.,
Safer Net. Kryptografie im Internet und Intranet
(Cryptography in the Internet and intranets), dpunkt.verlag,
1998, ISBN 3-932588-23-1. An easily readable introduction to
cryptography and its use in networks. Though the author
doesn't deal with things in depth, the topic discusses many
issues. Also available in English.
[SchnBlow1]
Schneier, B.,
Description of a New Variable-Length Key,
64-Bit Block Cipher
, in: Fast Software Encryption, Cambridge
Security Workshop Proceedings, Springer, 1994, pp. 191 - 204.