Green Cryptography: Cleaner Engineering through Recycling
暂无分享,去创建一个
[1] Morris J. Dworkin,et al. SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication , 2005 .
[2] Justin Troutman. The Virtues of Mature and Minimalist Cryptography , 2008, IEEE Security & Privacy.
[3] Serge Vaudenay,et al. Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS , 2002, EUROCRYPT.
[4] Steven M. Bellovin,et al. Problem Areas for the IP Security Protocols , 1996, USENIX Security Symposium.
[5] Paulo S. L. M. Barreto,et al. The MAELSTROM-0 Hash Function , 2006, Anais do VI Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2006).
[6] Chanathip Namprempre,et al. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2000, Journal of Cryptology.
[7] Vincent Rijmen,et al. The Wide Trail Design Strategy , 2001, IMACC.
[8] Daniel Bleichenbacher,et al. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1 , 1998, CRYPTO.
[9] Simon Heron,et al. Encryption: Advanced Encryption Standard (AES) , 2009 .
[10] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[11] James Manger,et al. A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0 , 2001, CRYPTO.
[12] Vincent Rijmen,et al. Security of a Wide Trail Design , 2002, INDOCRYPT.
[13] Shai Halevi,et al. Scream: A Software-Efficient Stream Cipher , 2002, FSE.
[14] Vincent Rijmen,et al. The WHIRLPOOL Hashing Function , 2003 .
[15] Hugo Krawczyk,et al. The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) , 2001, CRYPTO.
[16] John Black,et al. Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption , 2002, USENIX Security Symposium.
[17] Mihir Bellare,et al. The EAX Mode of Operation , 2004, FSE.