[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
crypto bibliography
Subject: crypto bibliography
By anonymous ftp from rsa.com:
Fen
~~~
@inproceedings{agnew,
author = "Agnew, G.B. and Mullin, R.C. and Vanstone, S.A.",
year = 1988,
title = "A secure public key protocol based on discrete exponentiation",
booktitle = "Advances in Cryptology --- Eurocrypt '88",
publisher = "Springer-Verlag",
address = "Berlin"}
@book{bamford,
author = "Bamford, J.",
year = 1982,
title = "The Puzzle Palace",
publisher = "Houghton Mifflin",
address = "Boston"}
@article{barlow,
author = "Barlow, J.P.",
year = 1992,
month = "July",
title = "Decrypting the puzzle palace",
journal = "Communications of the ACM",
volume = 35,
number = 7,
pages = "25--31"}
@article{beauchemin,
author = "Beauchemin, P. and Brassard, G. and Crepeau, C. and Goutier, C.
and Pomerance, C.",
year = 1988,
title = "The generation of random numbers that are probably prime",
journal = "J. of Cryptology",
volume = 1,
pages = "53--64"}
@inproceedings{berson,
author = "Berson, T.A.",
year = 1992,
title = "Differential cryptanalysis mod $2^{32}$ with applications to {MD5}",
booktitle = "Advances in Cryptology --- Eurocrypt '92",
publisher = "Springer-Verlag",
address = "Berlin",
note = "To appear"}
@inproceedings{biham-feal,
author = "Biham, E. and Shamir, A.",
year = 1991,
title = "Differential cryptanalysis of {F}eal and {N}-hash",
booktitle = "Advances in Cryptology --- Eurocrypt '91",
publisher = "Springer-Verlag",
address = "Berlin"}
@inproceedings{biham-full-des,
author = "Biham, E. and Shamir, A.",
year = 1993,
title = "Differential cryptanalysis of the full 16-round {DES}",
booktitle = "Advances in Cryptology --- Crypto '92",
publisher = "Springer-Verlag",
address = "New York",
note = "To appear"}
@article{bishop,
author = "Bishop, M.",
year = 1991,
title = "Privacy-enhanced electronic mail",
journal = "Internetworking: Research and Experience",
volume = 2,
pages = "199--233"}
@inproceedings{blum-g,
author = "Blum, M. and Goldwasser, S.",
year = 1985,
title = "An efficient probabilistic public-key encryption scheme which
hides all partial information",
booktitle = "Advances in Cryptology --- Crypto '84",
pages = "289--299",
publisher = "Springer-Verlag",
address = "New York"}
@inproceedings{brandt,
author = "Brandt, J. and Damgard, I.",
year = 1993,
title = "On generation of probable primes by incremental search",
booktitle = "Advances in Cryptology --- Crypto '92",
publisher = "Springer-Verlag",
address = "New York",
note = "To appear"}
@book{brassard,
author = "Brassard, G.",
year = 1988,
title = "Modern Cryptology",
publisher = "Springer-Verlag"}
@book{bressoud,
author = "Bressoud, D.M.",
year = 1989,
title = "Factorization and Primality Testing",
publisher = "Springer-Verlag",
address = "New York"}
@article{brickell-survey,
author = "Brickell, E.F. and Odlyzko, A.M.",
year = 1988,
title = "Cryptanalysis: {A} survey of recent results",
journal = "Proceedings of the IEEE",
volume = 76,
pages = "578--593"}
@inproceedings{brickell-rsa-hardware,
author = "Brickell, E.F.",
year = 1989,
title = "A survey of hardware implementations of {RSA}",
booktitle = "Advances in Cryptology --- Crypto '89",
publisher = "Springer-Verlag",
address = "New York",
pages = "368--370"}
@unpublished{buhler,
author = "Buhler, J.P. and Lenstra, H.W. and Pomerance, C.",
year = 1992,
title = "Factoring integers with the number field sieve",
note = "To appear"}
@article{burmester,
author = "Burmester, M.V.D. and Desmedt, Y.G. and Beth, T.",
year = 1992,
title = "Efficient zero-knowledge identification schemes for smart cards",
journal = "Computer Journal",
volume = 35,
pages = "21--29"}
@inproceedings{campbell,
author = "Campbell, K.W. and Wiener, M.J.",
year = 1993,
title = "Proof that {DES} is not a group",
booktitle = "Advances in Cryptology --- Crypto '92",
publisher = "Springer-Verlag",
address = "New York",
note = "To appear"}
@article{canfield,
author = {Canfield, E.R. and Erd\"{o}s, P. and Pomerance, C.},
year = 1983,
title = "On a problem of Oppenheim concerning `Factorisatio Numerorum'",
journal = "J. Number Theory",
volume = 17,
pages = "1--28"}
@manual{X.509,
author = "{CCITT (Consultative Committee in International Telegraphy
and Telephony)}",
year = 1988,
title = "Recommendation X.509: The Directory---Authentication Framework"}
@manual{etebac,
author = "{Comit\'{e} Fran\c{c}ais d'Organisation et de Normalisation
Bancaire}",
year = 1989,
title = "Echanges T\'{e}l\'ematiques entre les Banques et leurs Clients,
Standard ETEBAC 5, v1.1",
address = "Paris"}
@manual{gao-edi,
author = "{Comptroller General of the United States}",
year = 1991,
month = "December 13,",
title = "Matter of {National Institute of Standards and Technology} ---
{Use} of Electronic Data Interchange Technology to Create
Valid Obligations",
note = "File B-245714"}
@article{coppersmith-o-s,
author = "Coppersmith, D. and Odlyzko, A.M. and Schroeppel, R.",
year = 1986,
title = "Discrete logarithms in {GF(p)}",
journal = "Algorithmica",
volume = 1,
pages = "1--15"}
@article{coppersmith,
author = "Coppersmith, D.",
year = 1987,
title = "Cryptography",
journal = "IBM J. Res. Develop.",
volume = 31,
number = 2,
month = "March",
pages = "244--248"}
@techreport{improving-security-UNIX,
author = "Curry, David A.",
year = 1990,
title = "Improving the Security of Your {UNIX} System",
institution = "{SRI} International",
number = "ITSTD-721-FR-90-21",
address = "Menlo Park, CA",
month = "April"}
@techreport{davida,
author = "Davida, G.",
year = 1982,
title = "Chosen signature cryptanalysis of the RSA public key cryptosystem",
number = "TR-CS-82-2",
institution = "Dept of EECS, University of Wisconsin, Milwaukee"}
@book{davies-and-price,
author = "Davies, D.W. and W.L. Price",
year = 1984,
title = "Security for Computer Networks: {An} Introduction to Data Security
in Teleprocessing and Electronic Funds Transfer",
publisher = "John Wiley \& Sons",
address = "New York"}
@manual{green-book,
author = "{Department of Defense}",
title = "{CSC-STD-002-85}: Department of Defense ({DoD}) Password Management
Guidelines",
year = 1985}
@manual{orange-book,
author = "{Department of Defense}",
title = "{DoD 5200.28-STD}: Department of Defense ({DoD}) Trusted Computer
System Evaluation Criteria ({TCSEC})",
year = 1985}
@article{diffie-hellman,
author = "Diffie, W. and Hellman, M.E.",
year = 1976,
title = "New directions in cryptography",
journal = "IEEE Transactions on Information Theory",
volume = "IT-22",
pages = "644--654"}
@article{diffie-hellman-des,
author = "Diffie, W. and Hellman, M.E.",
year = 1977,
title = "Exhaustive cryptanalysis of the {NBS Data Encryption Standard}",
journal = "Computer",
volume = 10,
pages = "74--84"}
@article{Diffie-Hellman-Intro,
author = "Diffie, W. and M.E. Hellman",
year = 1979,
month = "March",
title = "Privacy and authentication: {An} introduction to cryptography",
journal = "Proceedings of the IEEE",
volume = 67,
number = 3,
pages = "397--427"}
@article{diffie-10yrs,
author = "Diffie, W.",
year = 1988,
title = "The first ten years of public-key cryptography",
journal = "Proceedings of the IEEE",
volume = 76,
pages = "560--577"}
@article{elgamal,
author = "ElGamal, T.",
year = 1985,
title = "A public-key cryptosystem and a signature scheme based on
discrete logarithms",
journal = "IEEE Transactions on Information Theory",
volume = "IT-31",
pages = "469--472"}
@inproceedings{fiat,
author = "Fiat, A. and Shamir, A.",
year = 1987,
title = "How to prove yourself: {Practical} solutions to identification
and signature problems",
booktitle = "Advances in Cryptology --- Crypto '86",
pages = "186--194",
publisher = "Springer-Verlag",
address = "New York"}
@article{goldwasser,
author = "Goldwasser, S. and Micali, S.",
year = 1984,
title = "Probabilistic encryption",
journal = "J. of Computer and System Sciences",
volume = 28,
pages = "270--299"}
@inproceedings{gordon,
author = "Gordon, D.M. and McCurley, K.S.",
year = 1993,
title = "Massively parallel computation of discrete logarithms",
booktitle = "Advances in Cryptology --- Crypto '92",
publisher = "Springer-Verlag",
address = "New York",
note = "To appear"}
@inproceedings{haber,
author = "Haber, S. and Stornetta, W.S.",
year = 1991,
title = "How to time-stamp a digital document",
booktitle = "Advances in Cryptology --- Crypto '90",
publisher = "Springer-Verlag",
address = "New York",
pages = "437--455"}
@article{hastad,
author = "Hastad, J.",
year = 1988,
title = "Solving simultaneous modular equations of low degree",
journal = "SIAM J. Computing",
volume = 17,
pages = "336--241"}
@article{hellman,
author = "Hellman, M.E.",
year = 1980,
title = "A cryptanalytic time-memory trade off",
journal = "IEEE Transactions on Information Theory",
volume = "IT-26",
pages = "401--406"}
@manual{iso9796,
author = "{International Standards Organization}",
title = "IS 9796: Information technology, security techniques: digital
signature scheme giving message recovery",
address = "Geneva, Switzerland"}
@book{kahn,
author = "Kahn, D.",
year = 1967,
title = "The Codebreakers",
publisher = "Macmillan Co.",
address = "New York"}
@article{kaliski,
author = "Kaliski Jr., B.S. and Rivest, R.L. and Sherman, A.T.",
year = 1988,
title = "Is the Data Encryption Standard a group?",
journal = "J. of Cryptology",
volume = 1,
pages = "3--36"}
@article{Kaliski-one-way-permutations,
author = "{Kaliski Jr.}, Burton S.",
year = 1991,
title = "One-Way Permutations on Elliptic Curves",
journal = "Journal of Cryptology",
volume = 3,
pages = "187--199"}
@manual{MD2,
author = "Kaliski, B.",
year = 1992,
month = "April",
title = "RFC 1319: The {MD2 Message-Digest Algorithm}",
organization = "Internet Activities Board"}
@manual{rfc1114,
author = "Kent, S. and J. Linn",
year = 1989,
month = "August",
title = "RFC 1114: Privacy Enhancement for Internet Electronic Mail: Part
{II} -- Certificate-Based Key Management",
organization = "Internet Activities Board"}
@book{knuth,
author = "Knuth, D.E.",
year = 1981,
title = "The Art of Computer Programming",
edition = "2nd",
volume = 2,
publisher = "Addison-Wesley",
address = "Reading, Mass."}
@article{koblitz-ecc,
author = "Koblitz, N.",
year = 1987,
title = "Elliptic curve cryptosystems",
journal = "Mathematics of Computation",
volume = 48,
pages = "203--209"}
@book{koblitz,
author = "Koblitz, N.",
year = 1987,
title = "A Course in Number Theory and Cryptography",
publisher = "Springer-Verlag",
address = "New York"}
@inproceedings{lai,
author = "Lai, X. and Massey, J.L.",
year = 1991,
title = "A proposal for a new block encryption standard",
booktitle = "Advances in Cryptology --- Eurocrypt '90",
pages = "389--404",
publisher = "Springer-Verlag",
address = "Berlin"}
@article{lamacchia,
author = "LaMacchia, B.A. and Odlyzko, A.M.",
year = 1991,
title = "Computation of discrete logarithms in prime fields",
journal = "Designs, Codes and Cryptography",
volume = 1,
pages = "47--62"}
@article{landau,
author = "Landau, S.",
year = 1988,
title = "Zero knowledge and the {Department of Defense}",
journal = "Notices of the American Mathematical Society",
volume = 35,
pages = "5--12"}
@article{lenstra-ecm,
author = "Lenstra Jr., H.W.",
year = 1987,
title = "Factoring integers with elliptic curves",
journal = "Ann. of Math.",
volume = 126,
pages = "649--673"}
@incollection{lenstra-survey,
author = "Lenstra, A.K. and Lenstra Jr., H.W.",
year = 1990,
title = "Algorithms in number theory",
editor = "van Leeuwen, J.",
booktitle = "Handbook of Theoretical Computer Science",
volume = "A",
publisher = "MIT Press/Elsevier",
address = "Amsterdam"}
@inproceedings{lenstra-nsf,
author = "Lenstra, A.K. and Lenstra Jr., H.W. and Mannasse, M.S. and
Pollard, J.M.",
year = 1990,
title = "The number field sieve",
booktitle = "Proc. of the 22nd Annual ACM Symposium on the Theory of
Computing",
publisher = "ACM Press"}
@inproceedings{lenstra-ppmpqs,
author = "Lenstra, A.K. and Manasse, M.S.",
year = 1991,
title = "Factoring with two large primes",
booktitle = "Advances in Cryptology --- Eurocrypt '90",
pages = "72--82",
publisher = "Springer-Verlag",
address = "Berlin"}
@manual{RFC-1113,
author = "Linn, J.",
year = 1989,
month = "August",
title = "RFC 1113: Privacy Enhancement for Internet Electronic Mail: Part {I}
-- Message Encipherment and Authentication Procedures",
organization = "Internet Activities Board"}
@manual{RFC-1115,
author = "Linn, J.",
year = 1989,
month = "August",
title = "RFC 1115: Privacy Enhancement for Internet Electronic Mail: Part
{III} -- Algorithms, Modes and Identifiers",
organization = "Internet Activities Board"}
@article{merkle-hellman,
author = "Merkle, R.C. and Hellman, M.E.",
year = 1978,
title = "Hiding information and signatures in trapdoor knapsacks",
journal = "IEEE Transactions on Information Theory",
volume = "IT-24",
pages = "525--530"}
@article{merkle-hellman-multiple,
author = "Merkle, R.C. and Hellman, M.E.",
year = 1981,
title = "On the security of multiple encryption",
journal = "Communications of the ACM",
volume = 24,
pages = "465--467",
month = "July"}
@article{messmer,
author = "Messmer, E.",
year = 1992,
title = "{NIST} stumbles on proposal for public-key encryption",
journal = "Network World",
volume = 9,
number = 30,
month = "July 27,"}
@inproceedings{miller,
author = "Miller, V.S.",
year = 1986,
title = "Use of elliptic curves in cryptography",
booktitle = "Advances in Cryptology --- Crypto '85",
pages = "417--426",
publisher = "Springer-Verlag",
address = "New York"}
@manual{des-77,
author = "{National Bureau of Standards}",
year = 1977,
month = "January",
title = "FIPS Publication 46: Announcing the Data Encryption Standard"}
@manual{des-modes,
author = "{National Bureau of Standards}",
year = 1980,
title = "FIPS Publication 81: {DES} Modes of Operation",
month = "December"}
@manual{des-88,
author = "{National Bureau of Standards}",
year = 1988,
month = "January",
title = "FIPS Publication 46-1: Data Encryption Standard"}
@manual{nist-dss,
author = "{National Institute of Standards and Technology (NIST)}",
year = 1992,
title = "Publication {XX}: Announcement and Specifications for a Digital
Signature Standard (DSS)",
month = "August 19,"}
@manual{nist-shs,
author = "{National Institute of Standards and Technology (NIST)}",
year = 1992,
title = "Publication {YY}: Announcement and Specifications for a
{Secure Hash Standard} (SHS)",
month = "January 22,"}
@article{dss-discuss,
author = "{National Institute of Standards and Technology (NIST)}",
year = 1992,
title = "The {Digital Signature Standard}, proposal and discussion",
journal = "Communications of the ACM",
volume = 35,
number = 7,
pages = "36--54",
month = "July"}
@book{computers-at-risk,
author = "National Research Council, System Security Study Committee and
others",
year = 1991,
title = "Computers at Risk: {Safe} Computing in the Electronic Age",
publisher = "National Academy Press",
address = "Washington, DC"}
@inproceedings{odlyzko,
author = "Odlyzko, A.M.",
year = 1984,
title = "Discrete logarithms in finite fields and their cryptographic
significance",
booktitle = "Advances in Cryptology --- Eurocrypt '84",
pages = "224--314",
publisher = "Springer-Verlag",
address = "Berlin"}
@manual{oiw,
author = "{OSI Implementors' Workshop}",
year = 1992,
title = "Draft Working Implementation Agreements For Open Systems
Interconnection Protocols",
publisher = "NIST",
address = "Gaithersburg, Maryland",
month = "June"}
@article{pohlig-hellman-dlog,
author = "Pohlig, S.C. and Hellman, M.E.",
year = 1978,
title = "An improved algorithm for computing logarithms over $GF(p)$ and
its cryptographic significance",
journal = "IEEE Transactions on Information Theory",
volume = "IT-24",
pages = "106--110"}
@article{pollard1,
author = "Pollard, J.",
year = 1974,
title = "Theorems of factorization and primality testing",
journal = "Proc. Cambridge Philos. Soc.",
volume = 76,
pages = "521--528"}
@article{pollard2,
author = "Pollard, J.",
year = 1975,
title = "{Monte Carlo} method for factorization",
journal = "BIT",
volume = 15,
pages = "331--334"}
@techreport{rabin,
author = "Rabin, M.O.",
year = 1979,
title = "Digitalized signatures as intractable as factorization",
institution = "MIT",
number = "MIT/LCS/TR-212"}
@article{rsa,
author = "Rivest, R.L. and A. Shamir and L. Adleman",
year = 1978,
month = "February",
title = "A method for obtaining digital signatures and public-key
cryptosystems",
journal = "Communications of the ACM",
volume = 21,
number = 2,
pages = "120--126"}
@inproceedings{rivest-md4,
author = "Rivest, R.L",
year = 1991,
title = "The {MD4} message digest algorithm",
booktitle = "Advances in Cryptology --- Crypto '90",
pages = "303--311",
publisher = "Springer-Verlag",
address = "New York"}
@inproceedings{rivest-prob-prime,
author = "Rivest, R.L.",
year = 1990,
title = "Finding four million random primes",
booktitle = "Advances in Cryptology --- Crypto '90",
pages = "625--626",
publisher = "Springer-Verlag",
address = "New York"}
@incollection{rivest-survey,
author = "Rivest, R.L.",
year = 1990,
title = "Cryptography",
editor = "van Leeuwen, J.",
booktitle = "Handbook of Theoretical Computer Science",
volume = "A",
publisher = "MIT Press/Elsevier",
address = "Amsterdam"}
@manual{rfc-md5,
author = "Rivest, R.L.",
year = 1992,
title = "{RFC} 1321: The {MD5 Message-Digest Algorithm}",
month = "April",
organization = "Internet Activities Board"}
@article{rivest-dss-response,
author = "Rivest, R.L.",
year = 1992,
title = "Response to {NIST}'s Proposal",
journal = "Communications of the ACM",
volume = 35,
pages = "41--47",
month = "July"}
@manual{PKCS-5,
author = "{RSA Data Security, Inc.}",
year = 1991,
month = "June",
title = "PKCS \#5: Password-Based Encryption Standard",
note = "Version 1.4"}
@book{computer-security-basics,
author = "Russell, Deborah and G.T. Gangemi Sr.",
year = 1991,
title = "Computer Security Basics",
publisher = "O'Reilly and Associates",
address = "Sebastopol, CA"}
@inproceedings{schnorr,
author = "Schnorr, C.P.",
year = 1990,
title = "Efficient identification and signatures for smart cards",
booktitle = "Advances in Cryptology --- Crypto '89",
pages = "239--251",
publisher = "Springer-Verlag",
address = "New York"}
@book{protecting-information,
author = "Schweitzer, James A.",
year = 1983,
title = "Protection Information in the Electronic Workplace: A Guide for
Managers",
publisher = "Prentice-Hall",
address = "Reston, VA"}
@article{silverman,
author = "Silverman, R.D.",
year = 1987,
title = "The multiple polynomial quadratic sieve",
journal = "Math. Comp.",
volume = 48,
pages = "329--339"}
@article{smid-des,
author = "Smid, M.E. and Branstad, D.K.",
year = 1988,
title = "The {Data Encryption Standard}: {Past} and future",
journal = "Proceedings of the IEEE",
volume = 76,
pages = "550--559"}
@inproceedings{smid,
author = "Smid, M.E. and Branstad, D.K.",
year = 1993,
title = "Response to comments on the {NIST} proposed {Digital Signature
Standard}",
booktitle = "Advances in Cryptology --- Crypto '92",
publisher = "Springer-Verlag",
note = "To appear"}
@manual{australia,
author = "{Standards Australia}",
year = 1990,
title = "AS 2805.6.5.3: Electronic Funds Transfer --- Key Management"}
@book{cuckoo's-egg,
author = "Stoll, Cliff",
year = 1989,
title = "The Cuckoo's Egg: Tracing a Spy Through the Maze of Computer
Espionage",
publisher = "Doubleday",
address = "New York"}
@article{wiener,
author = "Wiener, M.J.",
year = 1990,
title = "Cryptanalysis of short {RSA} secret exponents",
journal = "IEEE Trans. Information Theory",
volume = 36,
pages = "553--558"}