next up previous
Next: Über dieses Dokument Up: No Title Previous: Voting

Literatur

1
A. Beutelspacher, J. Schwenk, K.-D. Wolfenstetter: Moderne Verfahren der Kryptographie, 2. verbesserte Auflage, Vieweg 1998

2
M. Bellare, A. Desai, E. Jokipii and P. Rogaway: A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation, FOCS'97. 1997
http://www-cse.ucsd.edu/users/mihir/papers/sym-enc.html

3
M. Bellare and P. Rogaway, Entity Authentication and key distribution, Crypto 93, 1993 http://www-cse.ucsd.edu/users/mihir/papers/key-distribution.html

4
B. Chor, S. Goldwasser, S. Micali, B. Awerbuch: Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults, FOCS'85, 383 - 395, 1985

5
J. Cohen, M. Fischer: A Robust and Verifiable Secure Election Scheme, FOCS'85, 372 - 382, 1985

6
S. Even, O. Goldreich, A. Lempel: A Randomized Protocol for Signing Contracts, Communications of the ACM, Vol. 28, No. 6, 637 - 647, 1985

7
M. Fischer, S. Micali, C. Rackoff: Secure Protocol for the Oblivious Transfer (Extended Abstract), Journal of Cryptology, 9(3), 191 - 195, Summer 1996.

8
S. Goldwasser, M. Bellare: Lecture Notes on Cryptography, MIT 1997,
http://www-cse.ucsd.edu/users/mihir/papers/gb.html

9
O. Goldreich: Foundations of Cryptography (Fragments of a Book), Weizmann Institute of Science, 1995,
//theory.lcs.mit.edu/~oded/frag.html

10
O. Goldreich: Foundations of Cryptography (Lecture Notes from 1989), Lectures 14-15: Cryptographic Protocols,
//theory.lcs.mit.edu/~oded/ln89.html

11
O. Goldreich: Probabilistic Proof Systems (A Survey), ECCC Technical Report Series, No. TR94-008, 1994,
ftp://ftp.eccc.uni-trier.de/pub/eccc/reports/1994/TR94-008/index.html

12
C.H. Papadimitriou: Computational Complexity, Addison-Wesley, 1994

13
R. L. Rivest: Cryptography, Chapter 13 in: Handbook of Theoretical Computer Science, Vol. A, MIT Press/Elsevier, 1990

14
B. Schneier: Angewandte Kryptographie, Addison-Wesley, 1996


Claus Rick
Tue Jun 30 15:13:35 MET DST 1998