Crypto Galore!
暂无分享,去创建一个
[1] Neal Koblitz,et al. Algebraic aspects of cryptography , 1998, Algorithms and computation in mathematics.
[2] Neal Koblitz,et al. Random Curves: Journeys of a Mathematician , 2007 .
[3] Shu Lin,et al. Applied Algebra, Algebraic Algorithms and Error-Correcting Codes , 1999, Lecture Notes in Computer Science.
[4] Michael R. Fellows,et al. Fixed-Parameter Complexity and Cryptography , 1993, AAECC.
[5] Rainer Steinwandt,et al. Attacking a polynomial-based cryptosystem: Polly Cracker , 2002, International Journal of Information Security.
[6] Gilles Brassard,et al. A note on the complexity of cryptography (Corresp.) , 1979, IEEE Trans. Inf. Theory.
[7] Alfred Menezes,et al. Another look at security definitions , 2013, Adv. Math. Commun..
[8] Paul C. van Oorschot. A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms , 1990, CRYPTO.
[9] Michael R. Fellows,et al. Kid Krypto , 1992, CRYPTO.
[10] Ian H. Witten,et al. Explaining cryptographic systems to the general public , 1999 .
[11] Neal Koblitz. Secret Codes and Online Security: A Seminar for Entering Students , 2010, Cryptologia.
[12] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.
[13] Henri Gilbert,et al. Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings , 2010, EUROCRYPT.
[14] Ann Hibner Koblitz,et al. A Convergence of Lives-Sofia Kovalevskaia: Scientist, Writer, Revolutionary , 1984 .
[15] Yevgeniy Dodis,et al. Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model , 2009, CRYPTO.
[16] Vinod Vaikuntanathan,et al. Signature Schemes with Bounded Leakage Resilience , 2009, ASIACRYPT.
[17] Harold W. Thimbleby,et al. Explaining cryptographic systems , 2003, Comput. Educ..
[18] Aggelos Kiayias,et al. BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..
[19] Ernest F. Brickell,et al. Breaking Iterated Knapsacks , 1985, CRYPTO.
[20] Moni Naor,et al. Public-Key Encryption in the Bounded-Retrieval Model , 2010, EUROCRYPT.
[21] Giovanni Di Crescenzo,et al. Perfectly Secure Password Protocols in the Bounded Retrieval Model , 2006, TCC.
[22] David Cash,et al. Intrusion-Resilient Key Exchange in the Bounded Retrieval Model , 2007, TCC.
[23] Stefan Dziembowski,et al. Intrusion-Resilience Via the Bounded-Storage Model , 2006, TCC.
[24] Carsten Lund,et al. Algebraic methods for interactive proof systems , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.
[25] Noga Alon,et al. Colorings and orientations of graphs , 1992, Comb..
[26] H. W. Lenstra,et al. Factoring integers with elliptic curves , 1987 .
[27] Shai Halevi. Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings , 2009, CRYPTO.
[28] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[29] Adi Shamir,et al. A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[30] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[31] Neal Koblitz. Cryptography as a Teaching Tool , 1997, Cryptologia.
[32] Ernest F. Brickell,et al. Advances in Cryptology — CRYPTO’ 92 , 2001, Lecture Notes in Computer Science.