Skip to main content
Book cover

Algorithmik pp 383–406Cite as

Kryptografie und zuverlässige Interaktion

oder wie man es geheim macht

  • Chapter
  • 2098 Accesses

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   34.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   49.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Kapitel 12

  1. A. G. Konheim, Cryptography: A Primer, John Wiley & Sons, 1981.

    Google Scholar 

  2. D. E. R. Denning, Cryptography and Data Security, Addison-Wesley, 1982.

    Google Scholar 

  3. O. Goldreich und L. Lovasz, Modern Cryptography, Probabilistic Proofs and Pseudo-randomness, Springer-Verlag, 1999.

    Google Scholar 

  4. O. Goldreich, Foundations of Cryptography: Basic Tools, Cambridge University Press, 2001.

    Google Scholar 

  5. R. L. Rivest, „Cryptography,“ in Handbook of Theoretical Computer Science, Vol. A, J. van Leeuwen, Hrsg., Elsevier und MIT Press, 1990, S. 717–55.

    Google Scholar 

  6. Journal of Cryptology, abgekürzt als J. Crypt; herausgegeben vom Springer-Verlag.

    Google Scholar 

  7. Cryptologia; herausgegeben von der Militärakademie der Vereinigten Staaten.

    Google Scholar 

  8. W. Diffie und M. Hellman, „New Directions in Cryptography,“ IEEE Trans. Inform. Theory IT-22 (1976), S. 644–54.

    Article  MathSciNet  Google Scholar 

  9. R. L. Rivest, A. Shamir und L. M. Adleman, „A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,“ Comm. Assoc. Comput. Mach. 21 (1978), S. 120–6.

    MATH  MathSciNet  Google Scholar 

  10. M. O. Rabin, „Digitalized Signatures and Public-Key Functions as Intractable as Factorization,“ Technical Report MIT/LCS/TR-212, Mass. Inst. of Tech., Cambridge, MA, 1979.

    Google Scholar 

  11. M. E. Hellman, „The Mathematics of Public-Key Cryptography,“ Scientific American 241:2 (1979), S. 146–57.

    Article  MathSciNet  Google Scholar 

  12. A. Shamir, R. L. Rivest und L. M. Adleman, „Mental Poker,“ in The Mathematical Gardner, D. A. Klarner, Hrsg., Wadsworth International, Belmont, CA, 1981.

    Google Scholar 

  13. R. J. Lipton, „How to Cheat at Mental Poker,“ Proc. AMS Short Course on Cryptology, American Mathematical Society, 1981.

    Google Scholar 

  14. S. Goldwasser und S. Micali, „Probabilistic Encryption,“ J. Comput. Syst. Sci. 28 (1984), S. 270–99.

    Article  MATH  MathSciNet  Google Scholar 

  15. A. Shamir, „How to Share a Secret,“ Comm. Assoc. Comput. Mach. 22 (1979), S. 612–13.

    MATH  MathSciNet  Google Scholar 

  16. M. Blum, „How to Exchange (Secret) Keys,“ ACM Trans. Comput. Syst. 1 (1983), S. 175–93.

    Article  Google Scholar 

  17. A. C. Yao, „How to Generate and Exchange Secrets,“ Proc. 27th IEEE Symp. on Foundations of Computer Science, IEEE Press, S. 162–7, 1986.

    Google Scholar 

  18. S. Goldwasser, S. Micali und C. Rackoff, „The Knowledge Complexity of Interactive Proof Systems,“ SIAM J. Comput. 18 (1989), S. 186–208.

    Article  MATH  MathSciNet  Google Scholar 

  19. C. Lund, L. Fortnow, H. Karloff und N. Nisan, „Algebraic Methods for Interactive Proof Systems,“ J. Assoc. Comput. Mach. 39 (1992), S. 859–68.

    MATH  MathSciNet  Google Scholar 

  20. A. Shamir, „IP = PSPACE,“ J. Assoc. Comput. Mach. 39 (1992), S. 869–77.

    MATH  MathSciNet  Google Scholar 

  21. M. Naor, Y. Naor und O. Reingold, „Applied Kid Cryptography, or How to Convince Your Children That You Are Not Cheating,“ unveröffentlichtes Manuskript, 1999.

    Google Scholar 

  22. O. Goldreich, S. Micali und A. Wigderson, „Proofs that Yield Nothing But Their Validity, or All Languages in NP Have Zero-Knowledge Proof Systems,“ J. Assoc. Comput. Mach. 38 (1991), S. 691–729.

    MATH  MathSciNet  Google Scholar 

  23. U. Feige, S. Goldwasser, L. Lovász, S. Safra und M. Szegedy, „Approximating Clique is Almost NP-complete,“ J. Assoc. Comput. Mach., 43 (1996), S. 268–92.

    MATH  Google Scholar 

  24. S. Arora und S. Safra, „Probabilistic Checking of Proofs: A New Characterization of NP,“ J. Assoc. Comput. Mach., 45 (1998), S. 70–122.

    MATH  MathSciNet  Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

(2006). Kryptografie und zuverlässige Interaktion. In: Algorithmik. Springer, Berlin, Heidelberg . https://doi.org/10.1007/3-540-37437-X_12

Download citation

Publish with us

Policies and ethics