- BDJR97
-
Mihir Bellare, Anand Desai, E. Jokipii, and Phillip Rogaway, A concrete
security treatment of symmetric encryption., FOCS, 1997, pp. 394-403.
- BGI+01
-
Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai,
Salil P. Vadhan, and Ke Yang, On the (im)possibility of obfuscating
programs., CRYPTO, 2001, pp. 1-18.
- Bon01
-
Dan Boneh, Simplified oaep for the rsa and rabin functions., CRYPTO,
2001, pp. 275-291.
- BS91
-
Eli Biham and Adi Shamir, Differential cryptanalysis of des-like
cryptosystems., J. Cryptology 4 (1991), no. 1, 3-72.
- DH76
-
W. Diffie and M.E. Hellman, New directions in cryptography, IEEE
Transactions on Information Theory (1976).
- DJV01
-
A. Menezes D. Johnson and S. Vanstone, The elliptic curve digital
signature scheme, International Journal on Information Security (2001).
- ElG85
-
T. ElGamal, A public key cryptosystem and a signature scheme based on
discrete logarithms, IEEE Transactions on Information Theory (1985).
- GB01
-
Shafi Goldwasser and Mihir Bellare, Lecture notes on cryptography, 2001,
available online.
- GL89
-
O. Goldreich and L.A. Levin, Hard-core predicates for one-way functions,
21st ACM Symposium on the Theory of Computing, 1989, pp. 25-32.
- GM84
-
S. Goldwasser and S. Micali, Probabilistic encryption, Journal of
Computer and System Science (1984).
- GMR89
-
Shafi Goldwasser, Silvio Micali, and Charles Rackoff, The knowledge
complexity of interactive proof systems., SIAM J. Comput. 18
(1989), no. 1, 186-208.
- Gol01
-
Oded Goldreich, Foundations of cryptography: Basic tools, Cambridge
University Press, 2001.
- Gol04
-
Oded Goldreich, Foundations of cryptography: Basic applications, Cambridge
University Press, 2004.
- HILL99
-
Johan Håstad, Russell Impagliazzo, Leonid A. Levin, and Michael Luby,
A pseudorandom generator from any one-way function., SIAM J. Comput.
28 (1999), no. 4, 1364-1396.
- LPS04
-
Ben Lynn, Manoj Prabhakaran, and Amit Sahai, Positive results and
techniques for obfuscation., EUROCRYPT, 2004, pp. 20-39.
- Mat94
-
Mitsuru Matsui, The first experimental cryptanalysis of the data
encryption standard., CRYPTO, 1994, pp. 1-11.
- RSA78
-
A. Shamir, R. Rivest and L. Adleman, A method for obtaining digital
signatures and public key cryptosystems, Communications of the ACM (1978).
- Sha49
-
C.E. Shannon, Communication theory of secrecy systems, Bell Systems
Technical Journal (1949).
- Sti02
-
Douglas R. Stinson, Cryptography: Theory and practice, 2nd ed., Chapman
& Hall/CRC, 2002.
- FFS88
-
A. Fiat, U. Feige, and A. Shamir, Zero-knowledge proofs of identity,
Journal of Cryptology (1988).
- WiC98
-
Explorations in quantum computing, Springer-Verlag New York, 1998.
- Yao82
-
A.C. Yao, Theory and application of trapdoor functions, 23rd IEEE
Symposium on Foundations of Computer Science, 1982, pp. 80-91.
Johannes Nowak
2005-01-18