Subject: crypto bibliography By anonymous ftp from rsa.com: Fen ~~~ @inproceedings{agnew, author = "Agnew, G.B. and Mullin, R.C. and Vanstone, S.A.", year = 1988, title = "A secure public key protocol based on discrete exponentiation", booktitle = "Advances in Cryptology --- Eurocrypt '88", publisher = "Springer-Verlag", address = "Berlin"} @book{bamford, author = "Bamford, J.", year = 1982, title = "The Puzzle Palace", publisher = "Houghton Mifflin", address = "Boston"} @article{barlow, author = "Barlow, J.P.", year = 1992, month = "July", title = "Decrypting the puzzle palace", journal = "Communications of the ACM", volume = 35, number = 7, pages = "25--31"} @article{beauchemin, author = "Beauchemin, P. and Brassard, G. and Crepeau, C. and Goutier, C. and Pomerance, C.", year = 1988, title = "The generation of random numbers that are probably prime", journal = "J. of Cryptology", volume = 1, pages = "53--64"} @inproceedings{berson, author = "Berson, T.A.", year = 1992, title = "Differential cryptanalysis mod $2^{32}$ with applications to {MD5}", booktitle = "Advances in Cryptology --- Eurocrypt '92", publisher = "Springer-Verlag", address = "Berlin", note = "To appear"} @inproceedings{biham-feal, author = "Biham, E. and Shamir, A.", year = 1991, title = "Differential cryptanalysis of {F}eal and {N}-hash", booktitle = "Advances in Cryptology --- Eurocrypt '91", publisher = "Springer-Verlag", address = "Berlin"} @inproceedings{biham-full-des, author = "Biham, E. and Shamir, A.", year = 1993, title = "Differential cryptanalysis of the full 16-round {DES}", booktitle = "Advances in Cryptology --- Crypto '92", publisher = "Springer-Verlag", address = "New York", note = "To appear"} @article{bishop, author = "Bishop, M.", year = 1991, title = "Privacy-enhanced electronic mail", journal = "Internetworking: Research and Experience", volume = 2, pages = "199--233"} @inproceedings{blum-g, author = "Blum, M. and Goldwasser, S.", year = 1985, title = "An efficient probabilistic public-key encryption scheme which hides all partial information", booktitle = "Advances in Cryptology --- Crypto '84", pages = "289--299", publisher = "Springer-Verlag", address = "New York"} @inproceedings{brandt, author = "Brandt, J. and Damgard, I.", year = 1993, title = "On generation of probable primes by incremental search", booktitle = "Advances in Cryptology --- Crypto '92", publisher = "Springer-Verlag", address = "New York", note = "To appear"} @book{brassard, author = "Brassard, G.", year = 1988, title = "Modern Cryptology", publisher = "Springer-Verlag"} @book{bressoud, author = "Bressoud, D.M.", year = 1989, title = "Factorization and Primality Testing", publisher = "Springer-Verlag", address = "New York"} @article{brickell-survey, author = "Brickell, E.F. and Odlyzko, A.M.", year = 1988, title = "Cryptanalysis: {A} survey of recent results", journal = "Proceedings of the IEEE", volume = 76, pages = "578--593"} @inproceedings{brickell-rsa-hardware, author = "Brickell, E.F.", year = 1989, title = "A survey of hardware implementations of {RSA}", booktitle = "Advances in Cryptology --- Crypto '89", publisher = "Springer-Verlag", address = "New York", pages = "368--370"} @unpublished{buhler, author = "Buhler, J.P. and Lenstra, H.W. and Pomerance, C.", year = 1992, title = "Factoring integers with the number field sieve", note = "To appear"} @article{burmester, author = "Burmester, M.V.D. and Desmedt, Y.G. and Beth, T.", year = 1992, title = "Efficient zero-knowledge identification schemes for smart cards", journal = "Computer Journal", volume = 35, pages = "21--29"} @inproceedings{campbell, author = "Campbell, K.W. and Wiener, M.J.", year = 1993, title = "Proof that {DES} is not a group", booktitle = "Advances in Cryptology --- Crypto '92", publisher = "Springer-Verlag", address = "New York", note = "To appear"} @article{canfield, author = {Canfield, E.R. and Erd\"{o}s, P. and Pomerance, C.}, year = 1983, title = "On a problem of Oppenheim concerning `Factorisatio Numerorum'", journal = "J. Number Theory", volume = 17, pages = "1--28"} @manual{X.509, author = "{CCITT (Consultative Committee in International Telegraphy and Telephony)}", year = 1988, title = "Recommendation X.509: The Directory---Authentication Framework"} @manual{etebac, author = "{Comit\'{e} Fran\c{c}ais d'Organisation et de Normalisation Bancaire}", year = 1989, title = "Echanges T\'{e}l\'ematiques entre les Banques et leurs Clients, Standard ETEBAC 5, v1.1", address = "Paris"} @manual{gao-edi, author = "{Comptroller General of the United States}", year = 1991, month = "December 13,", title = "Matter of {National Institute of Standards and Technology} --- {Use} of Electronic Data Interchange Technology to Create Valid Obligations", note = "File B-245714"} @article{coppersmith-o-s, author = "Coppersmith, D. and Odlyzko, A.M. and Schroeppel, R.", year = 1986, title = "Discrete logarithms in {GF(p)}", journal = "Algorithmica", volume = 1, pages = "1--15"} @article{coppersmith, author = "Coppersmith, D.", year = 1987, title = "Cryptography", journal = "IBM J. Res. Develop.", volume = 31, number = 2, month = "March", pages = "244--248"} @techreport{improving-security-UNIX, author = "Curry, David A.", year = 1990, title = "Improving the Security of Your {UNIX} System", institution = "{SRI} International", number = "ITSTD-721-FR-90-21", address = "Menlo Park, CA", month = "April"} @techreport{davida, author = "Davida, G.", year = 1982, title = "Chosen signature cryptanalysis of the RSA public key cryptosystem", number = "TR-CS-82-2", institution = "Dept of EECS, University of Wisconsin, Milwaukee"} @book{davies-and-price, author = "Davies, D.W. and W.L. Price", year = 1984, title = "Security for Computer Networks: {An} Introduction to Data Security in Teleprocessing and Electronic Funds Transfer", publisher = "John Wiley \& Sons", address = "New York"} @manual{green-book, author = "{Department of Defense}", title = "{CSC-STD-002-85}: Department of Defense ({DoD}) Password Management Guidelines", year = 1985} @manual{orange-book, author = "{Department of Defense}", title = "{DoD 5200.28-STD}: Department of Defense ({DoD}) Trusted Computer System Evaluation Criteria ({TCSEC})", year = 1985} @article{diffie-hellman, author = "Diffie, W. and Hellman, M.E.", year = 1976, title = "New directions in cryptography", journal = "IEEE Transactions on Information Theory", volume = "IT-22", pages = "644--654"} @article{diffie-hellman-des, author = "Diffie, W. and Hellman, M.E.", year = 1977, title = "Exhaustive cryptanalysis of the {NBS Data Encryption Standard}", journal = "Computer", volume = 10, pages = "74--84"} @article{Diffie-Hellman-Intro, author = "Diffie, W. and M.E. Hellman", year = 1979, month = "March", title = "Privacy and authentication: {An} introduction to cryptography", journal = "Proceedings of the IEEE", volume = 67, number = 3, pages = "397--427"} @article{diffie-10yrs, author = "Diffie, W.", year = 1988, title = "The first ten years of public-key cryptography", journal = "Proceedings of the IEEE", volume = 76, pages = "560--577"} @article{elgamal, author = "ElGamal, T.", year = 1985, title = "A public-key cryptosystem and a signature scheme based on discrete logarithms", journal = "IEEE Transactions on Information Theory", volume = "IT-31", pages = "469--472"} @inproceedings{fiat, author = "Fiat, A. and Shamir, A.", year = 1987, title = "How to prove yourself: {Practical} solutions to identification and signature problems", booktitle = "Advances in Cryptology --- Crypto '86", pages = "186--194", publisher = "Springer-Verlag", address = "New York"} @article{goldwasser, author = "Goldwasser, S. and Micali, S.", year = 1984, title = "Probabilistic encryption", journal = "J. of Computer and System Sciences", volume = 28, pages = "270--299"} @inproceedings{gordon, author = "Gordon, D.M. and McCurley, K.S.", year = 1993, title = "Massively parallel computation of discrete logarithms", booktitle = "Advances in Cryptology --- Crypto '92", publisher = "Springer-Verlag", address = "New York", note = "To appear"} @inproceedings{haber, author = "Haber, S. and Stornetta, W.S.", year = 1991, title = "How to time-stamp a digital document", booktitle = "Advances in Cryptology --- Crypto '90", publisher = "Springer-Verlag", address = "New York", pages = "437--455"} @article{hastad, author = "Hastad, J.", year = 1988, title = "Solving simultaneous modular equations of low degree", journal = "SIAM J. Computing", volume = 17, pages = "336--241"} @article{hellman, author = "Hellman, M.E.", year = 1980, title = "A cryptanalytic time-memory trade off", journal = "IEEE Transactions on Information Theory", volume = "IT-26", pages = "401--406"} @manual{iso9796, author = "{International Standards Organization}", title = "IS 9796: Information technology, security techniques: digital signature scheme giving message recovery", address = "Geneva, Switzerland"} @book{kahn, author = "Kahn, D.", year = 1967, title = "The Codebreakers", publisher = "Macmillan Co.", address = "New York"} @article{kaliski, author = "Kaliski Jr., B.S. and Rivest, R.L. and Sherman, A.T.", year = 1988, title = "Is the Data Encryption Standard a group?", journal = "J. of Cryptology", volume = 1, pages = "3--36"} @article{Kaliski-one-way-permutations, author = "{Kaliski Jr.}, Burton S.", year = 1991, title = "One-Way Permutations on Elliptic Curves", journal = "Journal of Cryptology", volume = 3, pages = "187--199"} @manual{MD2, author = "Kaliski, B.", year = 1992, month = "April", title = "RFC 1319: The {MD2 Message-Digest Algorithm}", organization = "Internet Activities Board"} @manual{rfc1114, author = "Kent, S. and J. Linn", year = 1989, month = "August", title = "RFC 1114: Privacy Enhancement for Internet Electronic Mail: Part {II} -- Certificate-Based Key Management", organization = "Internet Activities Board"} @book{knuth, author = "Knuth, D.E.", year = 1981, title = "The Art of Computer Programming", edition = "2nd", volume = 2, publisher = "Addison-Wesley", address = "Reading, Mass."} @article{koblitz-ecc, author = "Koblitz, N.", year = 1987, title = "Elliptic curve cryptosystems", journal = "Mathematics of Computation", volume = 48, pages = "203--209"} @book{koblitz, author = "Koblitz, N.", year = 1987, title = "A Course in Number Theory and Cryptography", publisher = "Springer-Verlag", address = "New York"} @inproceedings{lai, author = "Lai, X. and Massey, J.L.", year = 1991, title = "A proposal for a new block encryption standard", booktitle = "Advances in Cryptology --- Eurocrypt '90", pages = "389--404", publisher = "Springer-Verlag", address = "Berlin"} @article{lamacchia, author = "LaMacchia, B.A. and Odlyzko, A.M.", year = 1991, title = "Computation of discrete logarithms in prime fields", journal = "Designs, Codes and Cryptography", volume = 1, pages = "47--62"} @article{landau, author = "Landau, S.", year = 1988, title = "Zero knowledge and the {Department of Defense}", journal = "Notices of the American Mathematical Society", volume = 35, pages = "5--12"} @article{lenstra-ecm, author = "Lenstra Jr., H.W.", year = 1987, title = "Factoring integers with elliptic curves", journal = "Ann. of Math.", volume = 126, pages = "649--673"} @incollection{lenstra-survey, author = "Lenstra, A.K. and Lenstra Jr., H.W.", year = 1990, title = "Algorithms in number theory", editor = "van Leeuwen, J.", booktitle = "Handbook of Theoretical Computer Science", volume = "A", publisher = "MIT Press/Elsevier", address = "Amsterdam"} @inproceedings{lenstra-nsf, author = "Lenstra, A.K. and Lenstra Jr., H.W. and Mannasse, M.S. and Pollard, J.M.", year = 1990, title = "The number field sieve", booktitle = "Proc. of the 22nd Annual ACM Symposium on the Theory of Computing", publisher = "ACM Press"} @inproceedings{lenstra-ppmpqs, author = "Lenstra, A.K. and Manasse, M.S.", year = 1991, title = "Factoring with two large primes", booktitle = "Advances in Cryptology --- Eurocrypt '90", pages = "72--82", publisher = "Springer-Verlag", address = "Berlin"} @manual{RFC-1113, author = "Linn, J.", year = 1989, month = "August", title = "RFC 1113: Privacy Enhancement for Internet Electronic Mail: Part {I} -- Message Encipherment and Authentication Procedures", organization = "Internet Activities Board"} @manual{RFC-1115, author = "Linn, J.", year = 1989, month = "August", title = "RFC 1115: Privacy Enhancement for Internet Electronic Mail: Part {III} -- Algorithms, Modes and Identifiers", organization = "Internet Activities Board"} @article{merkle-hellman, author = "Merkle, R.C. and Hellman, M.E.", year = 1978, title = "Hiding information and signatures in trapdoor knapsacks", journal = "IEEE Transactions on Information Theory", volume = "IT-24", pages = "525--530"} @article{merkle-hellman-multiple, author = "Merkle, R.C. and Hellman, M.E.", year = 1981, title = "On the security of multiple encryption", journal = "Communications of the ACM", volume = 24, pages = "465--467", month = "July"} @article{messmer, author = "Messmer, E.", year = 1992, title = "{NIST} stumbles on proposal for public-key encryption", journal = "Network World", volume = 9, number = 30, month = "July 27,"} @inproceedings{miller, author = "Miller, V.S.", year = 1986, title = "Use of elliptic curves in cryptography", booktitle = "Advances in Cryptology --- Crypto '85", pages = "417--426", publisher = "Springer-Verlag", address = "New York"} @manual{des-77, author = "{National Bureau of Standards}", year = 1977, month = "January", title = "FIPS Publication 46: Announcing the Data Encryption Standard"} @manual{des-modes, author = "{National Bureau of Standards}", year = 1980, title = "FIPS Publication 81: {DES} Modes of Operation", month = "December"} @manual{des-88, author = "{National Bureau of Standards}", year = 1988, month = "January", title = "FIPS Publication 46-1: Data Encryption Standard"} @manual{nist-dss, author = "{National Institute of Standards and Technology (NIST)}", year = 1992, title = "Publication {XX}: Announcement and Specifications for a Digital Signature Standard (DSS)", month = "August 19,"} @manual{nist-shs, author = "{National Institute of Standards and Technology (NIST)}", year = 1992, title = "Publication {YY}: Announcement and Specifications for a {Secure Hash Standard} (SHS)", month = "January 22,"} @article{dss-discuss, author = "{National Institute of Standards and Technology (NIST)}", year = 1992, title = "The {Digital Signature Standard}, proposal and discussion", journal = "Communications of the ACM", volume = 35, number = 7, pages = "36--54", month = "July"} @book{computers-at-risk, author = "National Research Council, System Security Study Committee and others", year = 1991, title = "Computers at Risk: {Safe} Computing in the Electronic Age", publisher = "National Academy Press", address = "Washington, DC"} @inproceedings{odlyzko, author = "Odlyzko, A.M.", year = 1984, title = "Discrete logarithms in finite fields and their cryptographic significance", booktitle = "Advances in Cryptology --- Eurocrypt '84", pages = "224--314", publisher = "Springer-Verlag", address = "Berlin"} @manual{oiw, author = "{OSI Implementors' Workshop}", year = 1992, title = "Draft Working Implementation Agreements For Open Systems Interconnection Protocols", publisher = "NIST", address = "Gaithersburg, Maryland", month = "June"} @article{pohlig-hellman-dlog, author = "Pohlig, S.C. and Hellman, M.E.", year = 1978, title = "An improved algorithm for computing logarithms over $GF(p)$ and its cryptographic significance", journal = "IEEE Transactions on Information Theory", volume = "IT-24", pages = "106--110"} @article{pollard1, author = "Pollard, J.", year = 1974, title = "Theorems of factorization and primality testing", journal = "Proc. Cambridge Philos. Soc.", volume = 76, pages = "521--528"} @article{pollard2, author = "Pollard, J.", year = 1975, title = "{Monte Carlo} method for factorization", journal = "BIT", volume = 15, pages = "331--334"} @techreport{rabin, author = "Rabin, M.O.", year = 1979, title = "Digitalized signatures as intractable as factorization", institution = "MIT", number = "MIT/LCS/TR-212"} @article{rsa, author = "Rivest, R.L. and A. Shamir and L. Adleman", year = 1978, month = "February", title = "A method for obtaining digital signatures and public-key cryptosystems", journal = "Communications of the ACM", volume = 21, number = 2, pages = "120--126"} @inproceedings{rivest-md4, author = "Rivest, R.L", year = 1991, title = "The {MD4} message digest algorithm", booktitle = "Advances in Cryptology --- Crypto '90", pages = "303--311", publisher = "Springer-Verlag", address = "New York"} @inproceedings{rivest-prob-prime, author = "Rivest, R.L.", year = 1990, title = "Finding four million random primes", booktitle = "Advances in Cryptology --- Crypto '90", pages = "625--626", publisher = "Springer-Verlag", address = "New York"} @incollection{rivest-survey, author = "Rivest, R.L.", year = 1990, title = "Cryptography", editor = "van Leeuwen, J.", booktitle = "Handbook of Theoretical Computer Science", volume = "A", publisher = "MIT Press/Elsevier", address = "Amsterdam"} @manual{rfc-md5, author = "Rivest, R.L.", year = 1992, title = "{RFC} 1321: The {MD5 Message-Digest Algorithm}", month = "April", organization = "Internet Activities Board"} @article{rivest-dss-response, author = "Rivest, R.L.", year = 1992, title = "Response to {NIST}'s Proposal", journal = "Communications of the ACM", volume = 35, pages = "41--47", month = "July"} @manual{PKCS-5, author = "{RSA Data Security, Inc.}", year = 1991, month = "June", title = "PKCS \#5: Password-Based Encryption Standard", note = "Version 1.4"} @book{computer-security-basics, author = "Russell, Deborah and G.T. Gangemi Sr.", year = 1991, title = "Computer Security Basics", publisher = "O'Reilly and Associates", address = "Sebastopol, CA"} @inproceedings{schnorr, author = "Schnorr, C.P.", year = 1990, title = "Efficient identification and signatures for smart cards", booktitle = "Advances in Cryptology --- Crypto '89", pages = "239--251", publisher = "Springer-Verlag", address = "New York"} @book{protecting-information, author = "Schweitzer, James A.", year = 1983, title = "Protection Information in the Electronic Workplace: A Guide for Managers", publisher = "Prentice-Hall", address = "Reston, VA"} @article{silverman, author = "Silverman, R.D.", year = 1987, title = "The multiple polynomial quadratic sieve", journal = "Math. Comp.", volume = 48, pages = "329--339"} @article{smid-des, author = "Smid, M.E. and Branstad, D.K.", year = 1988, title = "The {Data Encryption Standard}: {Past} and future", journal = "Proceedings of the IEEE", volume = 76, pages = "550--559"} @inproceedings{smid, author = "Smid, M.E. and Branstad, D.K.", year = 1993, title = "Response to comments on the {NIST} proposed {Digital Signature Standard}", booktitle = "Advances in Cryptology --- Crypto '92", publisher = "Springer-Verlag", note = "To appear"} @manual{australia, author = "{Standards Australia}", year = 1990, title = "AS 2805.6.5.3: Electronic Funds Transfer --- Key Management"} @book{cuckoo's-egg, author = "Stoll, Cliff", year = 1989, title = "The Cuckoo's Egg: Tracing a Spy Through the Maze of Computer Espionage", publisher = "Doubleday", address = "New York"} @article{wiener, author = "Wiener, M.J.", year = 1990, title = "Cryptanalysis of short {RSA} secret exponents", journal = "IEEE Trans. Information Theory", volume = 36, pages = "553--558"}