[图书][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

[图书][B] Distributed systems

AS Tanenbaum, M Van Steen - 2017 - academia.edu
Distributed Systems Page 1 DS 2006; Ch1 16-Jan-06 Timo Alanko, 2006 1 Distributed
Systems Spring 2006 Timo Alanko 16-Jan-06 2 Sources of material • Tanenbaum, van …

Encrypted key exchange: Password-based protocols secure against dictionary attacks

SM Bellovin, M Merritt - 1992 - academiccommons.columbia.edu
Classic cryptographic protocols based on user-chosen keys allow an attacker to mount
password-guessing attacks. A combination of asymmetric (public-key) and symmetric (secret …

Authentication and authenticated key exchanges

W Diffie, PC Van Oorschot, MJ Wiener - Designs, Codes and cryptography, 1992 - Springer
We discuss two-party mutual authentication protocols providing authenticated key
exchange, focusing on those using asymmetric techniques. A simple, efficient protocol …

[图书][B] Elliptic curve public key cryptosystems

AJ Menezes - 1993 - books.google.com
Elliptic curves have been intensively studied in algebraic geometry and number theory. In
recent years they have been used in devising efficient algorithms for factoring integers and …

[PDF][PDF] The Secure Remote Password Protocol.

TD Wu - NDSS, 1998 - Citeseer
This paper presents a new password authentication and key-exchange protocol suitable for
authenticating users and exchanging keys over an untrusted network. The new protocol …

[图书][B] Algebraic aspects of cryptography

N Koblitz - 2012 - books.google.com
This book is intended as a text for a course on cryptography with emphasis on algebraic
methods. It is written so as to be accessible to graduate or advanced undergraduate …

A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography

DJ Malan, M Welsh, MD Smith - 2004 First Annual IEEE …, 2004 - ieeexplore.ieee.org
We present the first known implementation of elliptic curve cryptography over F/sub 2p/for
sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. Through instrumentation of …

[PDF][PDF] The number field sieve

AK Lenstra, HW Lenstra Jr, MS Manasse… - Proceedings of the …, 1990 - dl.acm.org
The number field sieve is an algorithm to factor integers of the form r, 4-s for small positive r
and s. This note is intended as a'report on work in progress' on this algorithm. We informally …

Теоретико-числовые алгоритмы в криптографии

ЕР Данилкова - ШКОЛА МОЛОДЫХ УЧЕНЫХ, 2021 - elibrary.ru
В статье рассмотрены некоторые элементы теории чисел и показано, как они
используются в современной криптографии. В качестве примеров выбраны наиболее …