Abstract by anuja a sonalker on Asymmetric Key Distribution


Download 217.42 Kb.
Pdf ko'rish
bet42/43
Sana19.04.2023
Hajmi217.42 Kb.
#1365410
1   ...   35   36   37   38   39   40   41   42   43
Bog'liq
etd

References: 
[1] [Sha79] Adi Shamir, How to share a secret, Comm. of the ACM, Vol22, 1979, 
pp. 612-613. 
[2] Tim Bell, Harold Thimberly, Mike Fellows, Ian witten, Neil Koblitz, Explaining 
Cryptosystems to the general public, WISE1 proceedings, ’98. 
[3] [CAE90] H. Gustafson, E. Dawson, W. Caelli, Comparison of block ciphers. In 
Proceedings of AUSCRYPT '90, J. Seberry and J. Piepryzk eds., 208--220, 1990. 
[4] RSA Security’s official Guide to Cryptography, RSA Press, Steve Burnett & 
Stephen Paine, [reprint 2001]. 
[5] National Institute of Standards & Technology, DES: Federal Information Proc. 
Standards Publication; FIPS PUB 46-3, 1977, Reaffirmed Oct 1999. 
[6] Triple DES: Triple Data Encryption Algorithm modes of Operation, ANSI X 9.52 
standard, 1998. 
[7] National Institute of Standards & Technology, AES: Advanced Encryption 
Standard, AES FIPS-197, Nov 2001. 
[8] [RSA78] R.L Rivest, A.Shamir, L. Adleman, A method for Obtaining Digital 
Signatures and Public-Key Cryptosystems, Communications of the ACM, Vol.21, 
Nr.2, S.120-126, 1978. 
[9] [DH]: W. Diffie, M.E Hellman, New Directions in Cryptography, IEEE 
Transactions on Information Theory, IT-22, n.6, Nov 1976, pp. 644-654. 
[10] [ECDH]: ANSI X 9.63, Public Key Cryptography financial service industry - 
Elliptic curve arrangement & Key Transport Algorithms, draft, 1998. 
[11] Niven, I., and Zuckerman, H.S.  An Introduction to the theory of Numbers. 
Wiley, New York, 1972. 
[12] M. Blum, A Santis, S. Micali, G. Persiano, Non Interactive Zero Knowledge, 
SIAM Journal of Computing., 6(4): 1084-1118, 1991. 
[13] Michael Malkin, Thomas Wu, Dan Boneh, Experimenting with shared 
generation of RSA keys, proceedings of the Internet Society’s 1999 Symposium 
on Network and Distributed System Security (SNDSS), pp. 43-56. 


61 
[14] Randy Abernethy, Randy Charles Morin, and Jesús Chahín, COM/DCOM
Unleashed, SAMS, Reprint 2001. ISBN 0-67231-352-9.  
[15] Andreas Vogel and Keith Duddy, John Wiley & Sons, Java Programming with 
CORBA, 1997. ISBN 0-471-17986-8. 
[16] Remote Method Invocation Specification, Java Development Kit,
http://java.sun.com/products/jdk/1.2/docs/guide/rmi/spec/rmiTOC.doc.html 
[17] White paper on Java RMI:
http://java.sun.com/marketing/collateral/javarmi.html
[18] 
Buhler, J.P, Lenstra, H.W. Jr, C. Pomerance, The Development of the Number Field
Sieve, Volume 1554 of Lecture Notes in Computer Science, Springer-Verlag, 1994.
[19] 
Lenstra, A.K and Lenstra, H.W. Jr, Algorithms in Number Theory, Handbook of 
Theoritical Computer Science, Volume A: Algorithms and Complexity, Ed. J van 
Leeuwen, New York : Elsevier, pp. 673-715, 1990.
[20] 
’99 RSA awards: 
http://www.rsasecurity.com/company/rsaawards/99winners.html
, ’99 
RSA awards in mathematics.
[21] Overview of the Federal Reserve System, 
http://www.federalreserve.gov/pf/pf.html
 
[22] The Structure of the World Security Council of the United Nations, 
http://www.un.org/Overview/Organs/sc.html#STRUCTURE
 
[23] Dan Boneh, Matthew Franklin, Experimenting with shared generation of RSA 
keys, proceedings of Crypto' 97, Lecture Notes in Computer Science, Vol. 1233, 
Springer-Verlag, pp. 425--439, 1997.
 
[24] Dan Boneh, Thomas Wu, Michael Malkin, Building Intrusion Tolerant 
Applications, proceedings of the 8th USENIX Security Symposium, pp. 79--91, 
1999.
 
[25] D. Boneh, X. Ding, G. Tsudik, M. Wong, A Method for Fast Revocation of 
Public Key Certificates and Security Capabilities, proceedings of the 10th 
USENIX Security Symposium, pp. 297-308.
 
[26] J Song, R. Poovendran, W. Trappe, K. R. Liu, Dynamic Key Distribution using 
Embedded Source Coding for Secure Multimedia Multicast, SPIE Security for 
Multimedia, Feb. 2001, San Diego.
[27] G. R. Blakley, Safeguarding Cryptographic Keys, proceedings of the National 
Computer Conference, 1979, American Federation of Information Processing 
Societies Proceedings Vol. 48 (1979), 313-317. 


62 
[28] M. Ito, A. Saito and T. Nishizeki, Secret sharing scheme realizing general 
access structure, proceedings of the IEEE Global Telecommunications 
Conference, Globecom '87, IEEE Press, 1987, 99-102.
[29] Victor Shoup, Practical Threshold Signatures, proceedings of Eurocrypt 2000. 
[30] Benaloh and J. Leichter, Generalized secret sharing and monotone functions, in 
proceedings of Crypto ’88, Advances in Cryptology, Lecture Notes in Computer 
Science, vol. 403, S. Goldwasser, ed., Springer-Verlag, Berlin, 1990, pp. 27-35.


Download 217.42 Kb.

Do'stlaringiz bilan baham:
1   ...   35   36   37   38   39   40   41   42   43




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling