Cryptography Reference
In-Depth Information
17. Daniel J. Bernstein.
Multidigit multiplication for mathematicians.
URL: http://
cr.yp.to/papers.html .
18. Daniel J. Bernstein, Johannes Buchmann, and Erik Dahmen. Post-Quantum Cryptography .
Springer, 2009.
19. N. Biggs. Discrete Mathematics . Oxford University Press, New York, 2nd edition, 2002.
20. E. Biham. A fast new DES implementation in software. In Fourth International Workshop
on Fast Software Encryption , volume 1267 of LNCS , pages 260-272. Springer, 1997.
21. Eli Biham and Adi Shamir.
Differential Cryptanalysis of the Data Encryption Standard .
Springer, 1993.
22. Alex Biryukov, Adi Shamir, and David Wagner. Real time cryptanalysis of A5/1 on a PC. In
FSE: Fast Software Encryption , pages 1-18. Springer, 2000.
23. J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway. UMAC: Fast and secure
message authentication. In CRYPTO '99: Proceedings of the 19th Annual International
Cryptology Conference, Advances in Cryptology , volume 99, pages 216-233. Springer, 1999.
24. I. Blake, G. Seroussi, N. Smart, and J. W. S. Cassels. Advances in Elliptic Curve Cryptogra-
phy (London Mathematical Society Lecture Note Series) . Cambridge University Press, New
York, NY, USA, 2005.
25. Ian F. Blake, G. Seroussi, and N. P. Smart.
Elliptic Curves in Cryptography .
Cambridge
University Press, New York, NY, USA, 1999.
26. Daniel Bleichenbacher, Wieb Bosma, and Arjen K. Lenstra. Some remarks on Lucas-based
cryptosystems. In CRYPTO '95: Proceedings of the 15th Annual International Cryptology
Conference, Advances in Cryptology , pages 386-396. Springer, 1995.
27. L Blum, M Blum, and M Shub. A simple unpredictable pseudorandom number generator.
SIAM J. Comput. , 15(2):364-383, 1986.
28. Manuel Blum and Shafi Goldwasser. An efficient probabilistic public-key encryption scheme
which hides all partial information. In CRYPTO '84: Proceedings of the 4th Annual Interna-
tional Cryptology Conference, Advances in Cryptology , pages 289-302, 1984.
29. Andrey Bogdanov, Gregor Leander, Lars R. Knudsen, Christof Paar, Axel Poschmann,
Matthew J.B. Robshaw, Yannick Seurin, and Charlotte Vikkelsoe. PRESENT—An Ultra-
Lightweight Block Cipher. In CHES '07: Proceedings of the 9th International Workshop on
Cryptographic Hardware and Embedded Systems , number 4727 in LNCS, pages 450-466.
Springer, 2007.
30. Dan Boneh and Matthew Franklin. Identity-based encryption from the Weil pairing. SIAM
J. Comput. , 32(3):586-615, 2003.
31. Dan Boneh and Richard J. Lipton. Algorithms for black-box fields and their application to
cryptography (extended abstract). In CRYPTO '96: Proceedings of the 16th Annual Interna-
tional Cryptology Conference, Advances in Cryptology , pages 283-297. Springer, 1996.
32. Dan Boneh, Ron Rivest, Adi Shamir, and Len Adleman. Twenty Years of Attacks on the
RSA Cryptosystem. Notices of the AMS , 46:203-213, 1999.
33. Colin A. Boyd and Anish Mathuria.
Protocols for Key Establishment and Authentication .
Springer, 2003.
34. ECC Brainpool. ECC Brainpool Standard Curves and Curve Generation, 2005. http://
www.ecc-brainpool.org/ecc-standard.htm .
35. Johannes Buchmann and Jintai Ding, editors. Post-Quantum Cryptography, Second Interna-
tional Workshop, PQCrypto 2008, Proceedings , volume 5299 of LNCS . Springer, 2008.
36. Johannes Buchmann and Jintai Ding, editors. PQCrypto 2006: International Workshop on
Post-Quantum Cryptography , LNCS. Springer, 2008.
37. German Federal Office for Information Security (BSI). http://www.bsi.
de/english/publications/bsi_standards/index.htm .
38. Mike Burmester and Yvo Desmedt. A secure and efficient conference key distribution system
(extended abstract). In Advances in Cryptology — EUROCRYPT'94 , pages 275-286, 1994.
39. C. M. Campbell. Design and specification of cryptographic capabilities. NBS Special Pub-
lication 500-27: Computer Security and the Data Encryption Standard, U.S. Department of
Commerce, National Bureau of Standards , pages 54-66, 1977.
Search WWH ::




Custom Search