Cryptography Reference
In-Depth Information
Literaturverzeichnis
[1] A LFORD ,W.;G RANVILLE ,A.;P OMERANCE , C. : There are infinitely many Carmi-
chael numbers. In: Ann. Math. (2) 139 (1994), S. 703-722
[2] B EUTELSPACHER ,A.;N EUMANN ,H.B.;S CHWARZPAUL ,T.: Kryptografie in Theorie
und Praxis . Vieweg-Verlag, Wiesbaden, 2005
[3] B IHAM ,E.;S HAMIR , A. : Differential cryptanalysis of DES-like cryptosystems. In: J.
Cryptology 4 (1991), S. 3-72
[4] B LAKE ,I.;S EROUSSI ,G.;S MART ,N.: Elliptic curves in cryptography . Cambridge Univ.
Press, Cambridge, 1999 (Lect. Notes London Math. Soc. 265)
[5] B RÜDERN ,J.: Einführung in die analytische Zahlentheorie . Springer-Verlag, Berlin-
Heidelberg-New York, 1995
[6] B UCHMANN ,J.: Einführung in die Kryptographie . 4. Aufl. Springer-Verlag, Berlin-
Heidelberg-New York, 2008
[7] C OHEN ,H.: A course in computional algebraic number theory . Springer-Verlag, Berlin-
Heidelberg-New York, 1993
[8] D AEMEN ,J.;R IJMEN ,V.: AES - The advanced encryption standard . Springer-Verlag,
Berlin-Heidelberg-New York, 2002
[9] D IFFIE ,W.;H ELLMAN , M. E.: New directions in crytography. In: IEEE Trans. Infor-
mation Theory 22 (1976), S. 644-654
[10] E DWARDS , H. M.: A normal form for elliptic curves.
In: Bull. Amer. Math. Soc. 44
(2007), S. 393-422
[11] F ÅK , V. : Repeated use of codes which detect deception. In: IEEE Trans. Information
Theory 25 (1979), S. 233-234
[12] F ORSTER ,O.: Algorithmische Zahlentheorie . Vieweg-Verlag, Wiesbaden, 1996
[13] K APLAN ,M.: Computeralgebra . Springer-Verlag, Berlin-Heidelberg-New York, 2005
[14] K ARPFINGER ,C.;M EYBERG ,K.: Algebra . Spektrum Akademischer Verlag, Heidel-
berg, 2008
[15] K NAPP ,A.: Elliptic curves . Princeton Univ. Press, 1992
[16] M ATSUI , M. : Linear cryptanalysis method for the DES Cipher. In: H ELLESETH ,T.
(Hrsg.): EUROCRYPT '93 , Springer Verlag, 1993 (Lect. Notes Comput. Sci. 765), S.
386-397
[17] M AY , A. : Computing the RSA secret key is deterministic polynomial time equiva-
lent to factoring. In: Advances in Cryptology - Crypto 2004 , Springer-Verlag, Berlin-
Heidelberg-New York, 2005 (Lect. Notes Comput. Sci. 2729), S. 213-219
[18] M ENEZES , A. J.: Elliptic curve public key cryptosystems . Kluwer Academic Publishers,
Doldrecht-Boston-London, 1993
Search WWH ::




Custom Search