Cryptography Reference
In-Depth Information
131. Philippe Oechslin. Making a Faster Cryptanalytic Time-Memory Trade-Off. In
CRYPTO
'03: Proceedings of the 23rd Annual International Cryptology Conference, Advances in
Cryptology
, volume 2729 of
LNCS
, pages 617-630, 2003.
133. European Parliament. Directive 1999/93/EC of the European Parliament and of
the Council of 13 December 1999 on a Community framework for electronic
signatures, 1999.
http://europa.eu/eur-lex/pri/en/oj/dat/2000/l_
134. D. Pointcheval and J. Stern. Security proofs for signature schemes. In U. Maurer, editor,
Ad-
vances in Cryptology — EUROCRYPT'96
, volume 1070 of
LNCS
, pages 387-398. Springer,
1996.
135. Axel
Poschmann.
Lightweight
Cryptography
—
Cryptographic
Engineering
for
a
Pervasive
World
.
PhD
thesis,
Department
of
Electrical
Engineering
and
Com-
puter
Sciences,
Ruhr-University
Bochum,
Germany,
April
2009.
136. B. Preneel, R. Govaerts, and J. Vandewalle. Hash functions based on block ciphers: A syn-
thetic approach.
LNCS
, 773:368-378, 1994.
137. Bart Preneel. MDC-2 and MDC-4. In Henk C. A. van Tilborg, editor,
Encyclopedia of
Cryptography and Security
. Springer, 2005.
138. Electronic Signatures in Global and National Commerce Act, United States of America,
2000.
139. Jean-Jacques Quisquater, Louis Guillou, Marie Annick, and Tom Berson. How to explain
zero-knowledge protocols to your children. In
CRYPTO '89: Proceedings of the 9th Annual
International Cryptology Conference, Advances in Cryptology
, pages 628-631. Springer,
1989.
140. M. O. Rabin. Digitalized Signatures and Public-Key Functions as Intractable as Factoriza-
tion. Technical report, Massachusetts Institute of Technology, 1979.
141. W. Rankl and W. Effing.
Smart Card Handbook
. John Wiley & Sons, Inc., 2003.
143. R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and
public-key cryptosystems.
Communications of the ACM
, 21(2):120-126, February 1978.
144. Ron
Rivest.
The
RC4
Encryption
Algorithm,
March
1992.
145. Dorothy Elizabeth Robling Denning.
Cryptography and Data Security
.
Addison-Wesley
Longman Publishing Co., Inc., 1982.
146. Matthew Robshaw and Olivier Billet, editors.
New Stream Cipher Designs: The eSTREAM
Finalists
, volume 4986 of
LNCS
. Springer, 2008.
147. Carsten Rolfes, Axel Poschmann, Gregor Leander, and Christof Paar. Ultra-lightweight im-
plementations for smart devices-security for 1000 gate equivalents. In
Proceedings of the 8th
Smart Card Research and Advanced Application IFIP Conference - CARDIS 2008
, volume
5189 of
LNCS
, pages 89-103. Springer, 2008.
148. K. H. Rosen.
Elementary Number Theory, 5th Edition
. Addison-Wesley, 2005.
149. Public Key Cryptography Standard (PKCS), 1991.
http://www.rsasecurity.
150. Claus-Peter Schnorr. Efficient signature generation by smartcards.
Journal of Cryptology
,
4:161-174, 1991.
151. A. Shamir. Factoring large numbers with the TWINKLE device. In
CHES '99: Proceed-
ings of the 1st International Workshop on Cryptographic Hardware and Embedded Systems
,
volume 1717 of
LNCS
, pages 2-12. Springer, August 1999.
152. A. Shamir and E. Tromer. Factoring Large Numbers with the TWIRL Device. In
CRYPTO
'03: Proceedings of the 23rd Annual International Cryptology Conference, Advances in
Cryptology
, volume 2729 of
LNCS
, pages 1-26. Springer, 2003.
153. P. Shor. Polynomial-time algorithms for prime factorization and discrete logarithms.
SIAM
Journal on Computing, Communication Theory of Secrecy Systems
, 26:1484-1509, 1997.