Abstract by anuja a sonalker on Asymmetric Key Distribution
Download 217.42 Kb. Pdf ko'rish
|
etd
References:
[1] [Sha79] Adi Shamir, How to share a secret, Comm. of the ACM, Vol22, 1979, pp. 612-613. [2] Tim Bell, Harold Thimberly, Mike Fellows, Ian witten, Neil Koblitz, Explaining Cryptosystems to the general public, WISE1 proceedings, ’98. [3] [CAE90] H. Gustafson, E. Dawson, W. Caelli, Comparison of block ciphers. In Proceedings of AUSCRYPT '90, J. Seberry and J. Piepryzk eds., 208--220, 1990. [4] RSA Security’s official Guide to Cryptography, RSA Press, Steve Burnett & Stephen Paine, [reprint 2001]. [5] National Institute of Standards & Technology, DES: Federal Information Proc. Standards Publication; FIPS PUB 46-3, 1977, Reaffirmed Oct 1999. [6] Triple DES: Triple Data Encryption Algorithm modes of Operation, ANSI X 9.52 standard, 1998. [7] National Institute of Standards & Technology, AES: Advanced Encryption Standard, AES FIPS-197, Nov 2001. [8] [RSA78] R.L Rivest, A.Shamir, L. Adleman, A method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, Vol.21, Nr.2, S.120-126, 1978. [9] [DH]: W. Diffie, M.E Hellman, New Directions in Cryptography, IEEE Transactions on Information Theory, IT-22, n.6, Nov 1976, pp. 644-654. [10] [ECDH]: ANSI X 9.63, Public Key Cryptography financial service industry - Elliptic curve arrangement & Key Transport Algorithms, draft, 1998. [11] Niven, I., and Zuckerman, H.S. An Introduction to the theory of Numbers. Wiley, New York, 1972. [12] M. Blum, A Santis, S. Micali, G. Persiano, Non Interactive Zero Knowledge, SIAM Journal of Computing., 6(4): 1084-1118, 1991. [13] Michael Malkin, Thomas Wu, Dan Boneh, Experimenting with shared generation of RSA keys, proceedings of the Internet Society’s 1999 Symposium on Network and Distributed System Security (SNDSS), pp. 43-56. 61 [14] Randy Abernethy, Randy Charles Morin, and Jesús Chahín, COM/DCOM Unleashed, SAMS, Reprint 2001. ISBN 0-67231-352-9. [15] Andreas Vogel and Keith Duddy, John Wiley & Sons, Java Programming with CORBA, 1997. ISBN 0-471-17986-8. [16] Remote Method Invocation Specification, Java Development Kit, http://java.sun.com/products/jdk/1.2/docs/guide/rmi/spec/rmiTOC.doc.html [17] White paper on Java RMI: http://java.sun.com/marketing/collateral/javarmi.html [18] Buhler, J.P, Lenstra, H.W. Jr, C. Pomerance, The Development of the Number Field Sieve, Volume 1554 of Lecture Notes in Computer Science, Springer-Verlag, 1994. [19] Lenstra, A.K and Lenstra, H.W. Jr, Algorithms in Number Theory, Handbook of Theoritical Computer Science, Volume A: Algorithms and Complexity, Ed. J van Leeuwen, New York : Elsevier, pp. 673-715, 1990. [20] ’99 RSA awards: http://www.rsasecurity.com/company/rsaawards/99winners.html , ’99 RSA awards in mathematics. [21] Overview of the Federal Reserve System, http://www.federalreserve.gov/pf/pf.html [22] The Structure of the World Security Council of the United Nations, http://www.un.org/Overview/Organs/sc.html#STRUCTURE [23] Dan Boneh, Matthew Franklin, Experimenting with shared generation of RSA keys, proceedings of Crypto' 97, Lecture Notes in Computer Science, Vol. 1233, Springer-Verlag, pp. 425--439, 1997. [24] Dan Boneh, Thomas Wu, Michael Malkin, Building Intrusion Tolerant Applications, proceedings of the 8th USENIX Security Symposium, pp. 79--91, 1999. [25] D. Boneh, X. Ding, G. Tsudik, M. Wong, A Method for Fast Revocation of Public Key Certificates and Security Capabilities, proceedings of the 10th USENIX Security Symposium, pp. 297-308. [26] J Song, R. Poovendran, W. Trappe, K. R. Liu, Dynamic Key Distribution using Embedded Source Coding for Secure Multimedia Multicast, SPIE Security for Multimedia, Feb. 2001, San Diego. [27] G. R. Blakley, Safeguarding Cryptographic Keys, proceedings of the National Computer Conference, 1979, American Federation of Information Processing Societies Proceedings Vol. 48 (1979), 313-317. 62 [28] M. Ito, A. Saito and T. Nishizeki, Secret sharing scheme realizing general access structure, proceedings of the IEEE Global Telecommunications Conference, Globecom '87, IEEE Press, 1987, 99-102. [29] Victor Shoup, Practical Threshold Signatures, proceedings of Eurocrypt 2000. [30] Benaloh and J. Leichter, Generalized secret sharing and monotone functions, in proceedings of Crypto ’88, Advances in Cryptology, Lecture Notes in Computer Science, vol. 403, S. Goldwasser, ed., Springer-Verlag, Berlin, 1990, pp. 27-35. Download 217.42 Kb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling