Cryptography Reference
In-Depth Information
17. Daniel J. Bernstein.
Multidigit multiplication for mathematicians.
URL:
http://
18. Daniel J. Bernstein, Johannes Buchmann, and Erik Dahmen.
Post-Quantum Cryptography
.
Springer, 2009.
19. N. Biggs.
Discrete Mathematics
. Oxford University Press, New York, 2nd edition, 2002.
20. E. Biham. A fast new DES implementation in software. In
Fourth International Workshop
on Fast Software Encryption
, volume 1267 of
LNCS
, pages 260-272. Springer, 1997.
21. Eli Biham and Adi Shamir.
Differential Cryptanalysis of the Data Encryption Standard
.
Springer, 1993.
22. Alex Biryukov, Adi Shamir, and David Wagner. Real time cryptanalysis of A5/1 on a PC. In
FSE: Fast Software Encryption
, pages 1-18. Springer, 2000.
23. J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway. UMAC: Fast and secure
message authentication. In
CRYPTO '99: Proceedings of the 19th Annual International
Cryptology Conference, Advances in Cryptology
, volume 99, pages 216-233. Springer, 1999.
24. I. Blake, G. Seroussi, N. Smart, and J. W. S. Cassels.
Advances in Elliptic Curve Cryptogra-
phy (London Mathematical Society Lecture Note Series)
. Cambridge University Press, New
York, NY, USA, 2005.
25. Ian F. Blake, G. Seroussi, and N. P. Smart.
Elliptic Curves in Cryptography
.
Cambridge
University Press, New York, NY, USA, 1999.
26. Daniel Bleichenbacher, Wieb Bosma, and Arjen K. Lenstra. Some remarks on Lucas-based
cryptosystems. In
CRYPTO '95: Proceedings of the 15th Annual International Cryptology
Conference, Advances in Cryptology
, pages 386-396. Springer, 1995.
27. L Blum, M Blum, and M Shub. A simple unpredictable pseudorandom number generator.
SIAM J. Comput.
, 15(2):364-383, 1986.
28. Manuel Blum and Shafi Goldwasser. An efficient probabilistic public-key encryption scheme
which hides all partial information. In
CRYPTO '84: Proceedings of the 4th Annual Interna-
tional Cryptology Conference, Advances in Cryptology
, pages 289-302, 1984.
29. Andrey Bogdanov, Gregor Leander, Lars R. Knudsen, Christof Paar, Axel Poschmann,
Matthew J.B. Robshaw, Yannick Seurin, and Charlotte Vikkelsoe. PRESENT—An Ultra-
Lightweight Block Cipher. In
CHES '07: Proceedings of the 9th International Workshop on
Cryptographic Hardware and Embedded Systems
, number 4727 in LNCS, pages 450-466.
Springer, 2007.
30. Dan Boneh and Matthew Franklin. Identity-based encryption from the Weil pairing.
SIAM
J. Comput.
, 32(3):586-615, 2003.
31. Dan Boneh and Richard J. Lipton. Algorithms for black-box fields and their application to
cryptography (extended abstract). In
CRYPTO '96: Proceedings of the 16th Annual Interna-
tional Cryptology Conference, Advances in Cryptology
, pages 283-297. Springer, 1996.
32. Dan Boneh, Ron Rivest, Adi Shamir, and Len Adleman. Twenty Years of Attacks on the
RSA Cryptosystem.
Notices of the AMS
, 46:203-213, 1999.
33. Colin A. Boyd and Anish Mathuria.
Protocols for Key Establishment and Authentication
.
Springer, 2003.
34. ECC Brainpool. ECC Brainpool Standard Curves and Curve Generation, 2005.
http://
35. Johannes Buchmann and Jintai Ding, editors.
Post-Quantum Cryptography, Second Interna-
tional Workshop, PQCrypto 2008, Proceedings
, volume 5299 of
LNCS
. Springer, 2008.
36. Johannes Buchmann and Jintai Ding, editors.
PQCrypto 2006: International Workshop on
Post-Quantum Cryptography
, LNCS. Springer, 2008.
37. German Federal Office for Information Security (BSI).
http://www.bsi.
38. Mike Burmester and Yvo Desmedt. A secure and efficient conference key distribution system
(extended abstract). In
Advances in Cryptology — EUROCRYPT'94
, pages 275-286, 1994.
39. C. M. Campbell. Design and specification of cryptographic capabilities.
NBS Special Pub-
lication 500-27: Computer Security and the Data Encryption Standard, U.S. Department of
Commerce, National Bureau of Standards
, pages 54-66, 1977.