1992-10-07 - crypto bibliography

Header Data

From: “Fen Labalme” <fen@genmagic.com>
To: “Cypher Punks” <cypherpunks@toad.com>
Message Hash: c0094d30aae2f264d54c00e2adaab23b7db56a2a200f99c89012212afe70d689
Message ID: <9210070123.AA01922@relay2.UU.NET>
Reply To: N/A
UTC Datetime: 1992-10-07 01:15:28 UTC
Raw Date: Tue, 6 Oct 92 18:15:28 PDT

Raw message

From: "Fen Labalme" <fen@genmagic.com>
Date: Tue, 6 Oct 92 18:15:28 PDT
To: "Cypher Punks" <cypherpunks@toad.com>
Subject: crypto bibliography
Message-ID: <9210070123.AA01922@relay2.UU.NET>
MIME-Version: 1.0
Content-Type: text/plain


Subject:  crypto bibliography

By anonymous ftp from rsa.com:
Fen
~~~

@inproceedings{agnew,
  author = "Agnew, G.B. and Mullin, R.C. and Vanstone, S.A.", 
  year = 1988,
  title = "A secure public key protocol based on discrete exponentiation",
  booktitle = "Advances in Cryptology --- Eurocrypt '88",
  publisher = "Springer-Verlag",
  address = "Berlin"}

@book{bamford,
  author = "Bamford, J.",
  year = 1982,
  title = "The Puzzle Palace",
  publisher = "Houghton Mifflin",
  address = "Boston"}

@article{barlow,
  author = "Barlow, J.P.",
  year = 1992,
  month = "July",
  title = "Decrypting the puzzle palace",
  journal = "Communications of the ACM",
  volume = 35,
  number = 7,
  pages = "25--31"}

@article{beauchemin,
  author = "Beauchemin, P. and Brassard, G. and Crepeau, C. and Goutier, C.
            and Pomerance, C.",
  year = 1988,
  title = "The generation of random numbers that are probably prime",
  journal = "J. of Cryptology", 
  volume = 1, 
  pages = "53--64"}

@inproceedings{berson,
  author = "Berson, T.A.", 
  year = 1992,
  title = "Differential cryptanalysis mod $2^{32}$ with applications to {MD5}",
  booktitle = "Advances in Cryptology --- Eurocrypt '92",
  publisher = "Springer-Verlag",
  address = "Berlin",
  note = "To appear"}

@inproceedings{biham-feal,
  author = "Biham, E. and Shamir, A.", 
  year = 1991,
  title = "Differential cryptanalysis of {F}eal and {N}-hash",
  booktitle = "Advances in Cryptology --- Eurocrypt '91",
  publisher = "Springer-Verlag",
  address = "Berlin"}

@inproceedings{biham-full-des,
  author = "Biham, E. and Shamir, A.", 
  year = 1993,
  title = "Differential cryptanalysis of the full 16-round {DES}", 
  booktitle = "Advances in Cryptology --- Crypto '92",
  publisher = "Springer-Verlag",
  address = "New York",
  note = "To appear"}

@article{bishop,
  author = "Bishop, M.", 
  year = 1991,
  title = "Privacy-enhanced electronic mail", 
  journal = "Internetworking: Research and Experience", 
  volume = 2, 
  pages = "199--233"}

@inproceedings{blum-g,
  author = "Blum, M. and Goldwasser, S.", 
  year = 1985,
  title = "An efficient probabilistic public-key encryption scheme which 
           hides all partial information", 
  booktitle = "Advances in Cryptology --- Crypto '84",
  pages = "289--299", 
  publisher = "Springer-Verlag",
  address = "New York"}

@inproceedings{brandt,
  author = "Brandt, J. and Damgard, I.", 
  year = 1993, 
  title = "On generation of probable primes by incremental search", 
  booktitle = "Advances in Cryptology --- Crypto '92", 
  publisher = "Springer-Verlag", 
  address = "New York",
  note = "To appear"}

@book{brassard,
  author = "Brassard, G.", 
  year = 1988,
  title = "Modern Cryptology", 
  publisher = "Springer-Verlag"}

@book{bressoud,
  author = "Bressoud, D.M.", 
  year = 1989,
  title = "Factorization and Primality Testing", 
  publisher = "Springer-Verlag",
  address = "New York"}

@article{brickell-survey,
  author = "Brickell, E.F. and Odlyzko, A.M.",
  year = 1988,
  title = "Cryptanalysis: {A} survey of recent results", 
  journal = "Proceedings of the IEEE", 
  volume = 76, 
  pages = "578--593"}

@inproceedings{brickell-rsa-hardware,
  author = "Brickell, E.F.", 
  year = 1989,
  title = "A survey of hardware implementations of {RSA}", 
  booktitle = "Advances in Cryptology --- Crypto '89",
  publisher = "Springer-Verlag",
  address = "New York",
  pages = "368--370"}

@unpublished{buhler,
  author = "Buhler, J.P. and Lenstra, H.W. and Pomerance, C.", 
  year = 1992,
  title = "Factoring integers with the number field sieve", 
  note = "To appear"}

@article{burmester,
  author = "Burmester, M.V.D. and Desmedt, Y.G. and Beth, T.", 
  year = 1992,
  title = "Efficient zero-knowledge identification schemes for smart cards", 
  journal = "Computer Journal", 
  volume = 35, 
  pages = "21--29"}

@inproceedings{campbell,
  author = "Campbell, K.W. and Wiener, M.J.", 
  year = 1993,
  title = "Proof that {DES} is not a group",
  booktitle = "Advances in Cryptology --- Crypto '92",
  publisher = "Springer-Verlag",
  address = "New York",
  note = "To appear"}

@article{canfield,
  author = {Canfield, E.R. and Erd\"{o}s, P. and Pomerance, C.},
  year = 1983,
  title = "On a problem of Oppenheim concerning `Factorisatio Numerorum'",
  journal = "J. Number Theory",
  volume = 17,
  pages = "1--28"}

@manual{X.509,
  author = "{CCITT (Consultative Committee in International Telegraphy
                   and Telephony)}",
  year = 1988,
  title = "Recommendation X.509: The Directory---Authentication Framework"}

@manual{etebac,
  author = "{Comit\'{e} Fran\c{c}ais d'Organisation et de Normalisation 
                  Bancaire}",
  year = 1989,
  title = "Echanges T\'{e}l\'ematiques entre les Banques et leurs Clients, 
           Standard ETEBAC 5, v1.1", 
  address = "Paris"}

@manual{gao-edi,
  author = "{Comptroller General of the United States}",
  year = 1991,
  month = "December 13,",
  title = "Matter of {National Institute of Standards and Technology} ---
           {Use} of Electronic Data Interchange Technology to Create
           Valid Obligations",
  note = "File B-245714"}

@article{coppersmith-o-s,
  author = "Coppersmith, D. and Odlyzko, A.M. and Schroeppel, R.", 
  year = 1986,
  title = "Discrete logarithms in {GF(p)}", 
  journal = "Algorithmica", 
  volume = 1, 
  pages = "1--15"}

@article{coppersmith,
  author = "Coppersmith, D.",
  year = 1987,
  title = "Cryptography",
  journal = "IBM J. Res. Develop.",
  volume = 31,
  number = 2,
  month = "March",
  pages = "244--248"}

@techreport{improving-security-UNIX,
  author = "Curry, David A.",
  year = 1990,
  title = "Improving the Security of Your {UNIX} System",
  institution = "{SRI} International",
  number = "ITSTD-721-FR-90-21",
  address = "Menlo Park, CA",
  month = "April"}

@techreport{davida,
  author = "Davida, G.", 
  year = 1982,
  title = "Chosen signature cryptanalysis of the RSA public key cryptosystem",
  number = "TR-CS-82-2", 
  institution = "Dept of EECS, University of Wisconsin, Milwaukee"}

@book{davies-and-price,
  author = "Davies, D.W. and W.L. Price",
  year = 1984,
  title = "Security for Computer Networks: {An} Introduction to Data Security
           in Teleprocessing and Electronic Funds Transfer",
  publisher = "John Wiley \& Sons",
  address = "New York"}

@manual{green-book,
  author = "{Department of Defense}",
  title = "{CSC-STD-002-85}: Department of Defense ({DoD}) Password Management
           Guidelines",
  year = 1985}

@manual{orange-book,
  author = "{Department of Defense}",
  title = "{DoD 5200.28-STD}: Department of Defense ({DoD}) Trusted Computer
            System Evaluation Criteria ({TCSEC})",
  year = 1985}

@article{diffie-hellman,
  author = "Diffie, W. and Hellman, M.E.", 
  year = 1976,
  title = "New directions in cryptography", 
  journal = "IEEE Transactions on Information Theory", 
  volume = "IT-22", 
  pages = "644--654"}

@article{diffie-hellman-des,
  author = "Diffie, W. and Hellman, M.E.", 
  year = 1977,
  title = "Exhaustive cryptanalysis of the {NBS Data Encryption Standard}", 
  journal = "Computer", 
  volume = 10, 
  pages = "74--84"}

@article{Diffie-Hellman-Intro,
  author = "Diffie, W. and M.E. Hellman",
  year = 1979,
  month = "March",
  title = "Privacy and authentication: {An} introduction to cryptography",
  journal = "Proceedings of the IEEE",
  volume = 67,
  number = 3,
  pages = "397--427"}

@article{diffie-10yrs,
  author = "Diffie, W.", 
  year = 1988, 
  title = "The first ten years of public-key cryptography", 
  journal = "Proceedings of the IEEE", 
  volume = 76, 
  pages = "560--577"}

@article{elgamal,
  author = "ElGamal, T.", 
  year = 1985,
  title = "A public-key cryptosystem and a signature scheme based on 
           discrete logarithms", 
  journal = "IEEE Transactions on Information Theory", 
  volume = "IT-31",
  pages = "469--472"}

@inproceedings{fiat,
  author = "Fiat, A. and Shamir, A.", 
  year = 1987,
  title = "How to prove yourself: {Practical} solutions to identification 
           and signature problems", 
  booktitle = "Advances in Cryptology --- Crypto '86", 
  pages = "186--194", 
  publisher = "Springer-Verlag",
  address = "New York"}

@article{goldwasser,
  author = "Goldwasser, S. and Micali, S.", 
  year = 1984,
  title = "Probabilistic encryption", 
  journal = "J. of Computer and System Sciences", 
  volume = 28, 
  pages = "270--299"}

@inproceedings{gordon,
  author = "Gordon, D.M. and McCurley, K.S.", 
  year = 1993,
  title = "Massively parallel computation of discrete logarithms",
  booktitle = "Advances in Cryptology --- Crypto '92",
  publisher = "Springer-Verlag",
  address = "New York",
  note = "To appear"}

@inproceedings{haber,
  author = "Haber, S. and Stornetta, W.S.", 
  year = 1991,
  title = "How to time-stamp a digital document",
  booktitle = "Advances in Cryptology --- Crypto '90",
  publisher = "Springer-Verlag",
  address = "New York",
  pages = "437--455"}

@article{hastad,
  author = "Hastad, J.", 
  year = 1988,
  title = "Solving simultaneous modular equations of low degree",
  journal = "SIAM J. Computing", 
  volume = 17, 
  pages = "336--241"}

@article{hellman,
  author = "Hellman, M.E.", 
  year = 1980,
  title = "A cryptanalytic time-memory trade off", 
  journal = "IEEE Transactions on Information Theory",
  volume = "IT-26", 
  pages = "401--406"}

@manual{iso9796,
  author = "{International Standards Organization}", 
  title = "IS 9796: Information technology, security techniques: digital 
           signature scheme giving message recovery",
  address = "Geneva, Switzerland"}

@book{kahn,
  author = "Kahn, D.", 
  year = 1967,
  title = "The Codebreakers", 
  publisher = "Macmillan Co.", 
  address = "New York"}

@article{kaliski,
  author = "Kaliski Jr., B.S. and Rivest, R.L. and Sherman, A.T.", 
  year = 1988,
  title = "Is the Data Encryption Standard a group?", 
  journal = "J. of Cryptology", 
  volume = 1, 
  pages = "3--36"}

@article{Kaliski-one-way-permutations,
  author = "{Kaliski Jr.}, Burton S.",
  year = 1991,
  title = "One-Way Permutations on Elliptic Curves",
  journal = "Journal of Cryptology",
  volume = 3,
  pages = "187--199"}

@manual{MD2,
  author = "Kaliski, B.",
  year = 1992,
  month = "April",
  title = "RFC 1319: The {MD2 Message-Digest Algorithm}",
  organization = "Internet Activities Board"}

@manual{rfc1114,
  author = "Kent, S. and J. Linn",
  year = 1989,
  month = "August",
  title = "RFC 1114: Privacy Enhancement for Internet Electronic Mail: Part
           {II} -- Certificate-Based Key Management",
  organization = "Internet Activities Board"}

@book{knuth,
  author = "Knuth, D.E.", 
  year = 1981,
  title = "The Art of Computer Programming",
  edition = "2nd",
  volume = 2, 
  publisher = "Addison-Wesley",
  address = "Reading, Mass."}

@article{koblitz-ecc,
  author = "Koblitz, N.", 
  year = 1987,
  title = "Elliptic curve cryptosystems", 
  journal = "Mathematics of Computation", 
  volume = 48,
  pages = "203--209"}

@book{koblitz,
  author = "Koblitz, N.", 
  year = 1987,
  title = "A Course in Number Theory and Cryptography", 
  publisher = "Springer-Verlag",
  address = "New York"}

@inproceedings{lai,
  author = "Lai, X. and Massey, J.L.", 
  year = 1991,
  title = "A proposal for a new block encryption standard", 
  booktitle = "Advances in Cryptology --- Eurocrypt '90", 
  pages = "389--404", 
  publisher = "Springer-Verlag",
  address = "Berlin"}

@article{lamacchia,
  author = "LaMacchia, B.A. and Odlyzko, A.M.", 
  year = 1991,
  title = "Computation of discrete logarithms in prime fields", 
  journal = "Designs, Codes and Cryptography", 
  volume = 1, 
  pages = "47--62"}

@article{landau,
  author = "Landau, S.", 
  year = 1988,
  title = "Zero knowledge and the {Department of Defense}", 
  journal = "Notices of the American Mathematical Society", 
  volume = 35, 
  pages = "5--12"}

@article{lenstra-ecm,
  author = "Lenstra Jr., H.W.",
  year = 1987, 
  title = "Factoring integers with elliptic curves", 
  journal = "Ann. of Math.", 
  volume = 126, 
  pages = "649--673"}

@incollection{lenstra-survey,
  author = "Lenstra, A.K. and Lenstra Jr., H.W.", 
  year = 1990,
  title = "Algorithms in number theory", 
  editor = "van Leeuwen, J.", 
  booktitle = "Handbook of Theoretical Computer Science", 
  volume = "A", 
  publisher = "MIT Press/Elsevier", 
  address = "Amsterdam"}

@inproceedings{lenstra-nsf,
  author = "Lenstra, A.K. and Lenstra Jr., H.W. and Mannasse, M.S. and 
            Pollard, J.M.",
  year = 1990,
  title = "The number field sieve", 
  booktitle = "Proc. of the 22nd Annual ACM Symposium on the Theory of 
               Computing", 
  publisher = "ACM Press"}

@inproceedings{lenstra-ppmpqs,
  author = "Lenstra, A.K. and Manasse, M.S.", 
  year = 1991,
  title = "Factoring with two large primes", 
  booktitle = "Advances in Cryptology --- Eurocrypt '90", 
  pages = "72--82", 
  publisher = "Springer-Verlag",
  address = "Berlin"}

@manual{RFC-1113,
  author = "Linn, J.",
  year = 1989,
  month = "August",
  title = "RFC 1113: Privacy Enhancement for Internet Electronic Mail: Part {I}
           -- Message Encipherment and Authentication Procedures",
  organization = "Internet Activities Board"}

@manual{RFC-1115,
  author = "Linn, J.",
  year = 1989,
  month = "August",
  title = "RFC 1115: Privacy Enhancement for Internet Electronic Mail: Part
           {III} -- Algorithms, Modes and Identifiers",
  organization = "Internet Activities Board"}

@article{merkle-hellman,
  author = "Merkle, R.C. and Hellman, M.E.", 
  year = 1978,
  title = "Hiding information and signatures in trapdoor knapsacks", 
  journal = "IEEE Transactions on Information Theory", 
  volume = "IT-24",
  pages = "525--530"}

@article{merkle-hellman-multiple,
  author = "Merkle, R.C. and Hellman, M.E.",
  year = 1981,
  title = "On the security of multiple encryption",
  journal = "Communications of the ACM",
  volume = 24,
  pages = "465--467",
  month = "July"}

@article{messmer,
  author = "Messmer, E.", 
  year = 1992,
  title = "{NIST} stumbles on proposal for public-key encryption", 
  journal = "Network World", 
  volume = 9, 
  number = 30, 
  month = "July 27,"}

@inproceedings{miller,
  author = "Miller, V.S.", 
  year = 1986,
  title = "Use of elliptic curves in cryptography", 
  booktitle = "Advances in Cryptology --- Crypto '85", 
  pages = "417--426",
  publisher = "Springer-Verlag",
  address = "New York"}

@manual{des-77,
  author = "{National Bureau of Standards}",
  year = 1977,
  month = "January",
  title = "FIPS Publication 46: Announcing the Data Encryption Standard"}

@manual{des-modes,
  author = "{National Bureau of Standards}", 
  year = 1980,
  title = "FIPS Publication 81: {DES} Modes of Operation", 
  month = "December"}

@manual{des-88,
  author = "{National Bureau of Standards}",
  year = 1988,
  month = "January",
  title = "FIPS Publication 46-1: Data Encryption Standard"}

@manual{nist-dss,
  author = "{National Institute of Standards and Technology (NIST)}", 
  year = 1992,
  title = "Publication {XX}: Announcement and Specifications for a Digital
           Signature Standard (DSS)", 
  month = "August 19,"}

@manual{nist-shs,
  author = "{National Institute of Standards and Technology (NIST)}",
  year = 1992,
  title = "Publication {YY}: Announcement and Specifications for a 
           {Secure Hash Standard} (SHS)",
  month = "January 22,"}

@article{dss-discuss,
  author = "{National Institute of Standards and Technology (NIST)}",
  year = 1992,
  title = "The {Digital Signature Standard}, proposal and discussion",
  journal = "Communications of the ACM", 
  volume = 35, 
  number = 7,
  pages = "36--54", 
  month = "July"}

@book{computers-at-risk,
  author = "National Research Council, System Security Study Committee and
            others",
  year = 1991,
  title = "Computers at Risk: {Safe} Computing in the Electronic Age",
  publisher = "National Academy Press",
  address = "Washington, DC"}

@inproceedings{odlyzko,
  author = "Odlyzko, A.M.", 
  year = 1984,
  title = "Discrete logarithms in finite fields and their cryptographic 
           significance", 
  booktitle = "Advances in Cryptology --- Eurocrypt '84", 
  pages = "224--314", 
  publisher = "Springer-Verlag",
  address = "Berlin"}

@manual{oiw,
  author = "{OSI Implementors' Workshop}", 
  year = 1992,
  title = "Draft Working Implementation Agreements For Open Systems 
           Interconnection Protocols", 
  publisher = "NIST", 
  address = "Gaithersburg, Maryland",
  month = "June"}

@article{pohlig-hellman-dlog,
  author = "Pohlig, S.C. and Hellman, M.E.",
  year = 1978,
  title = "An improved algorithm for computing logarithms over $GF(p)$ and
           its cryptographic significance",
  journal = "IEEE Transactions on Information Theory",
  volume = "IT-24",
  pages = "106--110"}

@article{pollard1,
  author = "Pollard, J.", 
  year = 1974,
  title = "Theorems of factorization and primality testing", 
  journal = "Proc. Cambridge Philos. Soc.", 
  volume = 76, 
  pages = "521--528"}

@article{pollard2,
  author = "Pollard, J.", 
  year = 1975,
  title = "{Monte Carlo} method for factorization", 
  journal = "BIT", 
  volume = 15, 
  pages = "331--334"}

@techreport{rabin,
  author = "Rabin, M.O.", 
  year = 1979,
  title = "Digitalized signatures as intractable as factorization",
  institution = "MIT",
  number = "MIT/LCS/TR-212"}

@article{rsa,
  author = "Rivest, R.L. and A. Shamir and L. Adleman",
  year = 1978,
  month = "February",
  title = "A method for obtaining digital signatures and public-key
           cryptosystems",
  journal = "Communications of the ACM",
  volume = 21,
  number = 2,
  pages = "120--126"}

@inproceedings{rivest-md4,
  author = "Rivest, R.L", 
  year = 1991,
  title = "The {MD4} message digest algorithm", 
  booktitle = "Advances in Cryptology --- Crypto '90", 
  pages = "303--311", 
  publisher = "Springer-Verlag",
  address = "New York"}

@inproceedings{rivest-prob-prime,
  author = "Rivest, R.L.", 
  year = 1990,
  title = "Finding four million random primes", 
  booktitle = "Advances in Cryptology --- Crypto '90", 
  pages = "625--626",
  publisher = "Springer-Verlag", 
  address = "New York"}

@incollection{rivest-survey,
  author = "Rivest, R.L.", 
  year = 1990,
  title = "Cryptography",
  editor = "van Leeuwen, J.", 
  booktitle = "Handbook of Theoretical Computer Science", 
  volume = "A", 
  publisher = "MIT Press/Elsevier", 
  address = "Amsterdam"}

@manual{rfc-md5,
  author = "Rivest, R.L.",
  year = 1992,
  title = "{RFC} 1321: The {MD5 Message-Digest Algorithm}",
  month = "April",
  organization = "Internet Activities Board"}

@article{rivest-dss-response,
  author = "Rivest, R.L.", 
  year = 1992,
  title = "Response to {NIST}'s Proposal", 
  journal = "Communications of the ACM",
  volume = 35, 
  pages = "41--47", 
  month = "July"}

@manual{PKCS-5,
  author = "{RSA Data Security, Inc.}",
  year = 1991,
  month = "June",
  title = "PKCS \#5: Password-Based Encryption Standard",
  note = "Version 1.4"}

@book{computer-security-basics,
  author = "Russell, Deborah and G.T. Gangemi Sr.",
  year = 1991,
  title = "Computer Security Basics",
  publisher = "O'Reilly and Associates",
  address = "Sebastopol, CA"}

@inproceedings{schnorr,
  author = "Schnorr, C.P.", 
  year = 1990,
  title = "Efficient identification and signatures for smart cards", 
  booktitle = "Advances in Cryptology --- Crypto '89", 
  pages = "239--251", 
  publisher = "Springer-Verlag",
  address = "New York"}

@book{protecting-information,
  author = "Schweitzer, James A.",
  year = 1983,
  title = "Protection Information in the Electronic Workplace: A Guide for
           Managers",
  publisher = "Prentice-Hall",
  address = "Reston, VA"}

@article{silverman,
  author = "Silverman, R.D.", 
  year = 1987,
  title = "The multiple polynomial quadratic sieve", 
  journal = "Math. Comp.", 
  volume = 48, 
  pages = "329--339"}

@article{smid-des,
  author = "Smid, M.E. and Branstad, D.K.", 
  year = 1988,
  title = "The {Data Encryption Standard}: {Past} and future", 
  journal = "Proceedings of the IEEE", 
  volume = 76, 
  pages = "550--559"}

@inproceedings{smid,
  author = "Smid, M.E. and Branstad, D.K.", 
  year = 1993,
  title = "Response to comments on the {NIST} proposed {Digital Signature 
           Standard}", 
  booktitle = "Advances in Cryptology --- Crypto '92", 
  publisher = "Springer-Verlag", 
  note = "To appear"}

@manual{australia,
  author = "{Standards Australia}", 
  year = 1990,
  title = "AS 2805.6.5.3: Electronic Funds Transfer --- Key Management"}

@book{cuckoo's-egg,
  author = "Stoll, Cliff",
  year = 1989,
  title = "The Cuckoo's Egg: Tracing a Spy Through the Maze of Computer
           Espionage",
  publisher = "Doubleday",
  address = "New York"}

@article{wiener,
  author = "Wiener, M.J.", 
  year = 1990,
  title = "Cryptanalysis of short {RSA} secret exponents", 
  journal = "IEEE Trans. Information Theory", 
  volume = 36, 
  pages = "553--558"}







Thread