-
2
-
-
33745788433
-
On generation of probable primes by incremental search
-
Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
-
Brandt, J., Damgård, I.B.: On generation of probable primes by incremental search. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 358-370. Springer, Heidelberg (1992), http://dx.doi.org/10.1007/3-540-48071-4-26
-
(1992)
LNCS
, vol.740
, pp. 358-370
-
-
Brandt, J.1
Damgård, I.B.2
-
3
-
-
79960094645
-
A note on 'non-secret encryption'
-
last download May 12, 2009
-
Cocks, C.C.: A note on 'non-secret encryption'. CESG Memo (1973) http://www.cesg.gov.uk/publications/media/notense.pdf (last download May 12, 2009)
-
(1973)
CESG Memo
-
-
Cocks, C.C.1
-
4
-
-
79960109376
-
-
Refer to, http://www.openssl. org/ (last download April 21, 2009)
-
Cox, M.J., Engelschall, R., Henson, S., Laurie, B.: OpenSSL 0.9.8j. Open source implementation (2009), http://www.openssl.org/ Refer to, http://www.openssl. org/ (last download April 21, 2009)
-
(2009)
OpenSSL 0.9.8j. Open Source Implementation
-
-
Cox, M.J.1
Engelschall, R.2
Henson, S.3
Laurie, B.4
-
5
-
-
49549114834
-
Counting RSA-integers
-
Decker, A., Moree, P.: Counting RSA-integers. Results in Mathematics 52, 35-39 (2008), http://dx.doi.org/10.1007/s00025-008-0285-5
-
(2008)
Results in Mathematics
, vol.52
, pp. 35-39
-
-
Decker, A.1
Moree, P.2
-
7
-
-
79960076512
-
-
Free Software Foundation, last download April 21,2009
-
Free Software Foundation, GNU Crypto. Open source implementation (2009), http:// www.gnu.org/software/gnu-crypto/ Refer to gnu-crypto-2.0.1.tar.bz2 (last download April 21,2009)
-
(2009)
GNU Crypto. Open Source Implementation
-
-
-
10
-
-
77649257869
-
-
Information Technology Laboratory, Technical report, National Institute of Standards and Technology
-
Information Technology Laboratory, FIPS 186-3: Digital Signature Standard (DSS). Technical report, National Institute of Standards and Technology (2009)
-
(2009)
FIPS 186-3: Digital Signature Standard (DSS)
-
-
-
11
-
-
79960081512
-
-
International Organization for Standards, ISO/IEC 18033-2, Technical report, International Organization for Standards
-
International Organization for Standards, ISO/IEC 18033-2, Encryption algorithms - Part 2: Asymmetric ciphers. Technical report, International Organization for Standards (2006)
-
(2006)
Encryption Algorithms - Part 2: Asymmetric Ciphers
-
-
-
13
-
-
33750736029
-
Fast generation of prime numbers on portable devices: An update
-
Goubin, L., Matsui, M. (eds.) CHES 2006. Springer, Heidelberg ISBN 978-3-540-46559-1. ISSN 0302-9743
-
Joye, M., Paillier, P.: Fast generation of prime numbers on portable devices: An update. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 160-173. Springer, Heidelberg (2006) ISBN 978-3-540-46559-1. ISSN 0302-9743, http://dx.doi.org/ 10.1007/11894063-13
-
(2006)
LNCS
, vol.4249
, pp. 160-173
-
-
Joye, M.1
Paillier, P.2
-
14
-
-
0003657590
-
-
3rd edn., Addison-Wesley, Reading ISBN 0-201-89684-2, 1st edn.
-
Knuth, D.E.: The Art of Computer Programming, Seminumerical Algorithms, 3rd edn., vol. 2. Addison-Wesley, Reading (1998) ISBN 0-201-89684-2, 1st edn. (1969)
-
(1969)
The Art of Computer Programming, Seminumerical Algorithms
, vol.2
-
-
Knuth, D.E.1
-
17
-
-
0029325653
-
Fast Generation of Prime Numbers and Secure Public-Key Cryptographic Parameters
-
Maurer, U.M.: Fast Generation of Prime Numbers and Secure Public-Key Cryptographic Parameters. Journal of Cryptology 8(3), 123-155 (1995), http://dx.doi.org/10.1007/BF00202269
-
(1995)
Journal of Cryptology
, vol.8
, Issue.3
, pp. 123-155
-
-
Maurer, U.M.1
-
18
-
-
67349247912
-
-
NESSIE working group, Technical report, NESSIE
-
NESSIE working group, NESSIE D20 - NESSIE security report. Technical report, NESSIE (2003)
-
(2003)
NESSIE D20 - NESSIE Security Report
-
-
-
19
-
-
0003087344
-
Various techniques used in connection with random digits. Monte Carlo methods
-
National Bureau of Standards
-
von Neumann, J.: Various techniques used in connection with random digits. Monte Carlo methods. National Bureau of Standards, Applied Mathematics Series, vol. 12, pp. 36-38 (1951)
-
(1951)
Applied Mathematics Series
, vol.12
, pp. 36-38
-
-
Von Neumann, J.1
-
20
-
-
79960098974
-
-
Refer to openssh-2.1.1p4.tar.gz (last download April 21,2009)
-
de Raadt, T., Provos, N., Friedl, M., Beck, B., Campbell, A., Song, D.: OpenSSH 2.1.1. Open source implementation (2009), http://www.openssh.org/, Refer to openssh-2.1.1p4.tar.gz (last download April 21,2009)
-
(2009)
OpenSSH 2.1.1. Open Source Implementation
-
-
De Raadt, T.1
Provos, N.2
Friedl, M.3
Beck, B.4
Campbell, A.5
Song, D.6
-
21
-
-
0043126255
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
Massachusetts Institute of Technology, Laboratory for Computer Science, Cambridge, Massachusetts
-
Rivest, R.L., Shamir, A., Adleman, L.M.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Technical Report MIT/LCS/TM-82, Massachusetts Institute of Technology, Laboratory for Computer Science, Cambridge, Massachusetts (1977)
-
(1977)
Technical Report MIT/LCS/TM-82
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
22
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
Rivest, R.L., Shamir, A., Adleman, L.M.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120-126 (1978)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
24
-
-
79960099930
-
-
last download April 21, 2009
-
Skala, M., Roth, M., Hernaeus, N., Guyomarch, R., Koch, W.: GnuPG. Open source implementation (2009), http://www.gnupg.org Refer to gnupg-2.0.9.tar.bz2 (last download April 21, 2009)
-
(2009)
GnuPG. Open Source Implementation
-
-
Skala, M.1
Roth, M.2
Hernaeus, N.3
Guyomarch, R.4
Koch, W.5
-
25
-
-
79960084426
-
Bekanntmachung zur elektronischen Signatur nach dem Signaturgesetz und der Signaturverordnung (Übersicht über geeignete Algorithmen)
-
Wohlmacher, P.: Bekanntmachung zur elektronischen Signatur nach dem Signaturgesetz und der Signaturverordnung (Übersicht über geeignete Algorithmen). Bundesanzeiger 13, 346-350 (2009), http://www.bundesnetzagentur. de/media/archive/14953.pdf
-
(2009)
Bundesanzeiger
, vol.13
, pp. 346-350
-
-
Wohlmacher, P.1
|