- BDJR97
 - 
Mihir Bellare, Anand Desai, E. Jokipii, and Phillip Rogaway, A concrete
  security treatment of symmetric encryption., FOCS, 1997, pp. 394-403.
 - BGI+01
 - 
Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai,
  Salil P. Vadhan, and Ke Yang, On the (im)possibility of obfuscating
  programs., CRYPTO, 2001, pp. 1-18.
 - Bon01
 - 
Dan Boneh, Simplified oaep for the rsa and rabin functions., CRYPTO,
  2001, pp. 275-291.
 - BS91
 - 
Eli Biham and Adi Shamir, Differential cryptanalysis of des-like
  cryptosystems., J. Cryptology 4 (1991), no. 1, 3-72.
 - DH76
 - 
W. Diffie and M.E. Hellman, New directions in cryptography, IEEE
  Transactions on Information Theory (1976).
 - DJV01
 - 
A. Menezes D. Johnson and S. Vanstone, The elliptic curve digital
  signature scheme, International Journal on Information Security (2001).
 - ElG85
 - 
T. ElGamal, A public key cryptosystem and a signature scheme based on
  discrete logarithms, IEEE Transactions on Information Theory (1985).
 - GB01
 - 
Shafi Goldwasser and Mihir Bellare, Lecture notes on cryptography, 2001,
  available online.
 - GL89
 - 
O. Goldreich and L.A. Levin, Hard-core predicates for one-way functions,
  21st ACM Symposium on the Theory of Computing, 1989, pp. 25-32.
 - GM84
 - 
S. Goldwasser and S. Micali, Probabilistic encryption, Journal of
  Computer and System Science (1984).
 - GMR89
 - 
Shafi Goldwasser, Silvio Micali, and Charles Rackoff, The knowledge
  complexity of interactive proof systems., SIAM J. Comput. 18
  (1989), no. 1, 186-208.
 - Gol01
 - 
Oded Goldreich, Foundations of cryptography: Basic tools, Cambridge
  University Press, 2001.
 - Gol04
 - 
Oded Goldreich, Foundations of cryptography: Basic applications, Cambridge
  University Press, 2004.
 - HILL99
 - 
Johan Håstad, Russell Impagliazzo, Leonid A. Levin, and Michael Luby,
  A pseudorandom generator from any one-way function., SIAM J. Comput.
  28 (1999), no. 4, 1364-1396.
 - LPS04
 - 
Ben Lynn, Manoj Prabhakaran, and Amit Sahai, Positive results and
  techniques for obfuscation., EUROCRYPT, 2004, pp. 20-39.
 - Mat94
 - 
Mitsuru Matsui, The first experimental cryptanalysis of the data
  encryption standard., CRYPTO, 1994, pp. 1-11.
 - RSA78
 - 
A. Shamir, R. Rivest and L. Adleman, A method for obtaining digital
  signatures and public key cryptosystems, Communications of the ACM (1978).
 - Sha49
 - 
C.E. Shannon, Communication theory of secrecy systems, Bell Systems
  Technical Journal (1949).
 - Sti02
 - 
Douglas R. Stinson, Cryptography: Theory and practice, 2nd ed., Chapman
  & Hall/CRC, 2002.
 - FFS88
 - 
A. Fiat, U. Feige, and A. Shamir, Zero-knowledge proofs of identity,
  Journal of Cryptology (1988).
 - WiC98
 - 
Explorations in quantum computing, Springer-Verlag New York, 1998.
 - Yao82
 - 
A.C. Yao, Theory and application of trapdoor functions, 23rd IEEE
  Symposium on Foundations of Computer Science, 1982, pp. 80-91.
 
Johannes Nowak
2005-01-18