Cryptography Reference
In-Depth Information
[19] M
ENEZES
,A.J.;O
ORSCHOT
,P.C.;V
ANSTONE
, S. A.:
Handbook of applied cryptogra-
phy
. CRC Press, Boca Raton-New York-London-Tokyo, 1997
[20] M
ILLER
,M.:
Symmetrische Verschlüsselungsverfahren
. Teubner-Verlag, Wiesbaden,
2003
[21] N
ATIONAL
B
UREAU OF
S
TANDARDS
(Hrsg.):
Data Encryption Standard
. U. S. Depart-
ment of Commerce: National Bureau of Standards, Jan. 1977
[22] R
IVEST
,R.L.;S
HAMIR
,A.;A
DLEMAN
, L. : Amethod for obtaining digital signatures
and public-key cyptosystems. In:
Comm. ACM
21 (1978), S. 120-126
[23] R
OSENBAUM
, U. : A lower bound on authentication after having observed a sequence
of messages. In:
J. Cryptology
6 (1993), S. 135-156
[24] S
CHÖNHAGE
,A.;S
TRASSEN
, V. : Schnelle Multiplikation großer Zahlen. In:
Compu-
ting
7 (1973), S. 281-292
[25] S
CHOOF
, R. : Nonsingular plane cubic curves over finite fields. In:
J. Combin. Theory
Ser. A
46 (1987), S. 183-211
[26] S
ILVERMAN
, J. H.:
The arithmetic of elliptic curves
. Springer-Verlag, Berlin-Heidelberg-
New York, 1986
[27] S
TINSON
,D.R.:
Cryptography
. 2. Aufl. CRC Press, Boca Raton-London, 2002
[28] W
ATERHOUSE
, E. : Abelian varieties over finite fields. In:
Ann. Sci. École Norm. Sup.
2 (1969), S. 521-560
[29] W
ERNER
,A.:
Elliptische Kurven in der Kryptographie
.
Springer-Verlag, Berlin-
Heidelberg-New York, 2001
[30] W
IENER
, M. J.: Cryptanalysis of short RSA secret exponents. In:
IEEE Trans. Informa-
tion Theory
(1990), S. 553-558
[31] W
ÄTJEN
,D.:
Kryptographie
. SpektrumAkademischer Verlag, Heidelberg-Berlin, 2004