Bibliography

BDJR97
Mihir Bellare, Anand Desai, E. Jokipii, and Phillip Rogaway, A concrete security treatment of symmetric encryption., FOCS, 1997, pp. 394-403.

BGI+01
Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil P. Vadhan, and Ke Yang, On the (im)possibility of obfuscating programs., CRYPTO, 2001, pp. 1-18.

Bon01
Dan Boneh, Simplified oaep for the rsa and rabin functions., CRYPTO, 2001, pp. 275-291.

BS91
Eli Biham and Adi Shamir, Differential cryptanalysis of des-like cryptosystems., J. Cryptology 4 (1991), no. 1, 3-72.

DH76
W. Diffie and M.E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory (1976).

DJV01
A. Menezes D. Johnson and S. Vanstone, The elliptic curve digital signature scheme, International Journal on Information Security (2001).

ElG85
T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory (1985).

GB01
Shafi Goldwasser and Mihir Bellare, Lecture notes on cryptography, 2001, available online.

GL89
O. Goldreich and L.A. Levin, Hard-core predicates for one-way functions, 21st ACM Symposium on the Theory of Computing, 1989, pp. 25-32.

GM84
S. Goldwasser and S. Micali, Probabilistic encryption, Journal of Computer and System Science (1984).

GMR89
Shafi Goldwasser, Silvio Micali, and Charles Rackoff, The knowledge complexity of interactive proof systems., SIAM J. Comput. 18 (1989), no. 1, 186-208.

Gol01
Oded Goldreich, Foundations of cryptography: Basic tools, Cambridge University Press, 2001.

Gol04
Oded Goldreich, Foundations of cryptography: Basic applications, Cambridge University Press, 2004.

HILL99
Johan Håstad, Russell Impagliazzo, Leonid A. Levin, and Michael Luby, A pseudorandom generator from any one-way function., SIAM J. Comput. 28 (1999), no. 4, 1364-1396.

LPS04
Ben Lynn, Manoj Prabhakaran, and Amit Sahai, Positive results and techniques for obfuscation., EUROCRYPT, 2004, pp. 20-39.

Mat94
Mitsuru Matsui, The first experimental cryptanalysis of the data encryption standard., CRYPTO, 1994, pp. 1-11.

RSA78
A. Shamir, R. Rivest and L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM (1978).

Sha49
C.E. Shannon, Communication theory of secrecy systems, Bell Systems Technical Journal (1949).

Sti02
Douglas R. Stinson, Cryptography: Theory and practice, 2nd ed., Chapman & Hall/CRC, 2002.

FFS88
A. Fiat, U. Feige, and A. Shamir, Zero-knowledge proofs of identity, Journal of Cryptology (1988).

WiC98
Explorations in quantum computing, Springer-Verlag New York, 1998.

Yao82
A.C. Yao, Theory and application of trapdoor functions, 23rd IEEE Symposium on Foundations of Computer Science, 1982, pp. 80-91.



Johannes Nowak 2005-01-18