Cryptography Reference
In-Depth Information
[19] M ENEZES ,A.J.;O ORSCHOT ,P.C.;V ANSTONE , S. A.: Handbook of applied cryptogra-
phy . CRC Press, Boca Raton-New York-London-Tokyo, 1997
[20] M ILLER ,M.: Symmetrische Verschlüsselungsverfahren . Teubner-Verlag, Wiesbaden,
2003
[21] N ATIONAL B UREAU OF S TANDARDS (Hrsg.): Data Encryption Standard . U. S. Depart-
ment of Commerce: National Bureau of Standards, Jan. 1977
[22] R IVEST ,R.L.;S HAMIR ,A.;A DLEMAN , L. : Amethod for obtaining digital signatures
and public-key cyptosystems. In: Comm. ACM 21 (1978), S. 120-126
[23] R OSENBAUM , U. : A lower bound on authentication after having observed a sequence
of messages. In: J. Cryptology 6 (1993), S. 135-156
[24] S CHÖNHAGE ,A.;S TRASSEN , V. : Schnelle Multiplikation großer Zahlen. In: Compu-
ting 7 (1973), S. 281-292
[25] S CHOOF , R. : Nonsingular plane cubic curves over finite fields. In: J. Combin. Theory
Ser. A 46 (1987), S. 183-211
[26] S ILVERMAN , J. H.: The arithmetic of elliptic curves . Springer-Verlag, Berlin-Heidelberg-
New York, 1986
[27] S TINSON ,D.R.: Cryptography . 2. Aufl. CRC Press, Boca Raton-London, 2002
[28] W ATERHOUSE , E. : Abelian varieties over finite fields. In: Ann. Sci. École Norm. Sup.
2 (1969), S. 521-560
[29] W ERNER ,A.: Elliptische Kurven in der Kryptographie .
Springer-Verlag, Berlin-
Heidelberg-New York, 2001
[30] W IENER , M. J.: Cryptanalysis of short RSA secret exponents. In: IEEE Trans. Informa-
tion Theory (1990), S. 553-558
[31] W ÄTJEN ,D.: Kryptographie . SpektrumAkademischer Verlag, Heidelberg-Berlin, 2004
Search WWH ::




Custom Search