This file: ftp://ftp.cert.dfn.de/pub/docs/crypt/01-README information about this subdirectory: A subdirectory for cryptography and related topics. ----- directory: /pub/docs/crypt/ETHZ/ Papers by the Research Group Information Security and Cryptology / ETH Zuerich. - Switzerland. [Mirror from ftp://dinis.inf.ethz.ch/pub/publications/papers/ti/isc/] directory: /pub/docs/crypt/FAQ/ This directory contains cryptography related FAQs. [Mirror from ftp://rtfm.mit.edu/pub/usenet/news.answers/cryptography-faq] directory: /pub/docs/crypt/PKCS/ This is a directory containing various files. These documents describe PKCS, the public-key cryptography standards, developed at RSA Laboratories. directory: /pub/docs/crypt/Ross_Anderson/ Papers written by Cambridge-based cryptographer Ross Anderson. [Mirror from ftp://ftp.cl.cam.ac.uk/users/rja14/] directory: /pub/docs/crypt/US-patents/ This directory contains several descriptions of US patents hold on cryptographic algorithms. directory: /pub/docs/crypt/elliptic/ This directory contains several documents describing the use of elliptic curves within Public Key Cryptosystems. directory: /pub/docs/crypt/ripem.msu.edu/ Several documents dealing with cryptography. [This directory is a mirror from ftp://ripem.msu.edu/pub/crypt/docs] directory: /pub/docs/crypt/wobst_errata/ file: /pub/docs/crypt/2PP.ps.gz (42237 Bytes) Systematic Design of a Family of Attack-Resistant Authentication Protocols / R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva and M. Yung. - In: IEEE Journal on Selected Areas in Communications. - Vol. 11, No. 5, June 1993, pp. 679-693. file: /pub/docs/crypt/3PP.ps.gz (33882 Bytes) A Modular Family of Secure Protocols for Authentication and Key Distribution / R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva and M. Yung. - IBM Research Division. - RZ 2402. - 1992. file: /pub/docs/crypt/3pkd.ps.gz (127727 Bytes) Provably Secure Session Key Distribution - The Three Party Case / Mihir Bellare and Phillip Rogaway. - University of California. - May 1995. [Abstract appearing in: Proceedings of the 27th ACM Symposium on the Theory of Computing] file: /pub/docs/crypt/ABSTRACTS-SRC.REPORTS.gz (46748 Bytes) file: /pub/docs/crypt/ACM_CRYPTO_STUDY.PS.gz (132794 Bytes) Codes, Keys and Conflicts: Issues in U.S. Crypto Policy / Report of a Special Panel of the ACM U.S. Public Policy Committee. - June 1994. file: /pub/docs/crypt/Brickell-Denning-Kent-Maher-Tuchman-SKIPJACK_Review.txt.gz (9097 Bytes) SKIPJACK Review - Interim Report: The SKIPJACK Algorithm / E. F. Brickell, D. E. Denning, S. T. Kent, D. P. Maher, W. Tuchman. - July 28, 1993. [Appendix in TEX] file: /pub/docs/crypt/CEM.ps.gz (62652 Bytes) Certified Electronic Mail / Alireza Bahremann & J. D. Tygar. file: /pub/docs/crypt/CS-R9510.ps.gz (82886 Bytes) Secret-key certificates / Stefan Brands. - Centrum voor Wiskunde en Informatica. - 1995. file: /pub/docs/crypt/CS-R9530.ps.gz (107267 Bytes) On shared randomness and the size of secure signatures / Ronald Cramer. - Centrum voor Wiskunde en Informatica. - 1995. file: /pub/docs/crypt/CS-R9555.ps.gz (81494 Bytes) Secret-key certificates (Continued) / Stefan Brands. - Centrum voor Wiskunde en Informatica. - 1995. file: /pub/docs/crypt/CS-R9557.ps.gz (86151 Bytes) New generation of secure and practical RSA-based signatures / Ronald Cramer. - Centrum voor Wiskunde en Informatica. - 1995. file: /pub/docs/crypt/CS0928.ps.gz (70954 Bytes) Cryptanalysis of the ANSI X9.52 CBCM Mode / Eli Biham and Lars R. Knudsen. - 1998. file: /pub/docs/crypt/EG-Kur1.ps.gz (20354 Bytes) Relationship between ElGamal based publications from 1984-1994 / Holger Petersen. - University of Technology Chemnitz-Zwickau. - December 1994. [this is a figure from: TR-94-19.ps] file: /pub/docs/crypt/EG-Rel.ps.gz (22392 Bytes) Relationship between ElGamal based publications from 1984-1994 / Holger Petersen. - University of Technology Chemnitz-Zwickau. - December 1994. [this is a figure from: TR-94-19.ps] file: /pub/docs/crypt/FJMP_96Stego.ps.gz (41601 Bytes) Computer Based Steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best. / Elke Franz et. al. - July 1996. file: /pub/docs/crypt/IDEA.chap.3.ps.gz (66581 Bytes) The Block Cipher IDEA / Posted to sci.crypt by Germano Caronni. - file: /pub/docs/crypt/PF_KEY.ps.gz (15705 Bytes) A Socket-Based Key Management API D. L. McDonald, B. G. Phan, R. J. Atkinson file: /pub/docs/crypt/PGP_efc.ps.gz (45405 Bytes) Pretty Good Privacy for Mail, Files and Comms / Paul Leyland. - Oxford University Computing Services. - November 1994. file: /pub/docs/crypt/SKEY-paper.ps.gz (27735 Bytes) The S/KEY one-time password system / Neil M. Haller. - Bellcore. - Morristown, NJ. file: /pub/docs/crypt/SRC-039-appendix.ps.gz (31358 Bytes) Appendix to SRC-039.ps.gz file: /pub/docs/crypt/SRC-039.ps.gz (95527 Bytes) The Scope of a Logic of Authentication (Analysis of authentication protocols used in distributed systems) file: /pub/docs/crypt/SRC-067.ps.gz (59757 Bytes) Authentication and Deligation with Smart Cards file: /pub/docs/crypt/SRC-070.ps.gz (89147 Bytes) A Calculus for Access Control in Distributed Systems file: /pub/docs/crypt/SRC-083.ps.gz (127605 Bytes) Authentication in Distributed Systems: Theory and Practice file: /pub/docs/crypt/SRC-090.ps.gz (144891 Bytes) A High-speed DES Implementation for Network Applications file: /pub/docs/crypt/SRC-117.ps.gz (94488 Bytes) Authentication in the Taos Operating System file: /pub/docs/crypt/SRC-125.ps.gz (65517 Bytes) Prudent Engineering Practice for Cryptographic Protocols file: /pub/docs/crypt/TIS-blurb.ps.gz (53709 Bytes) Worldwide Survey of Cryptographic Products / Trusted Information Systems, Inc. file: /pub/docs/crypt/TIS-survey.ps.gz (27687 Bytes) World-Wide Availability of Cryptographic Products / David M. Balenson & Stephen T. Walker. - Trusted Information Systems, Inc. - January 1995. [Slides] file: /pub/docs/crypt/TR-94-1.ps.gz (39495 Bytes) Classification of blind signature schemes and examples of hidden and weak blind signatures / Patrick Horster & Holger Petersen. - University of Technology Chemnitz-Zwickau. - April 1994. file: /pub/docs/crypt/TR-94-10.ps.gz (57531 Bytes) Hidden signature schemes based on the discrete logrithm problem and related concepts / Patrick Horster & Holger Petersen & Markus Michels. - University of Technology Chemnitz-Zwickau. - August 1994. file: /pub/docs/crypt/TR-94-11.ps.gz (71482 Bytes) Das Meta-ElGamal Signaturverfahren und seine Anwendungen / Patrick Horster & Markus Michels & Holger Petersen. - University of Technology Chemnitz-Zwickau. - September 1994. file: /pub/docs/crypt/TR-94-12.ps.gz (64755 Bytes) Meta-Multisignature schemes based on the discrete logarithm problem / Patrick Horster & Markus Michels & Holger Petersen. - University of Technology Chemnitz-Zwickau. - September 1994. file: /pub/docs/crypt/TR-94-13.ps.gz (48340 Bytes) Subliminal Channels in discrete logarithm based signature schemes and how to avoid them / Patrick Horster & Markus Michels & Holger Petersen. - University of Technology Chemnitz-Zwickau. - September 1994. file: /pub/docs/crypt/TR-94-14.ps.gz (47995 Bytes) Generalized signature schemes with (t,n) shared verification based on the discrete logarithm problem / Patrick Horster & Markus Michels & Holger Petersen. - University of Technology Chemnitz-Zwickau. - September 1994. file: /pub/docs/crypt/TR-94-15.ps.gz (36242 Bytes) Some remarks on Schnorr's DSA -Comment / Patrick Horster & Markus Michels & Holger Petersen. - University of Technology Chemnitz-Zwickau. - October 1994. file: /pub/docs/crypt/TR-94-16.ps.gz (58349 Bytes) Meta-ElGamal signature scheme using a composite modul / Patrick Horster & Markus Michels & Holger Petersen. - University of Technology Chemnitz-Zwickau. - October 1994. file: /pub/docs/crypt/TR-94-18.ps.gz (33961 Bytes) Blind Multisignature schemes based on the discrete logarithm problem / Patrick Horster & Markus Michels & Holger Petersen. - University of Technology Chemnitz-Zwickau. - November 1994. file: /pub/docs/crypt/TR-94-19.ps.gz (65871 Bytes) Overview about ElGamal related publications from 1984-1994 / Patrick Horster & Markus Michels & Holger Petersen. - University of Technology Chemnitz-Zwickau. - December 1994. file: /pub/docs/crypt/TR-94-2.ps.gz (32780 Bytes) Authenticated encryption schemes with low communication costs / Patrick Horster & Markus Michels & Holger Petersen. - University of Technology Chemnitz-Zwickau. - May 1994. file: /pub/docs/crypt/TR-94-3.ps.gz (74017 Bytes) Generalized ElGamal signatures for one message block / Patrick Horster & Markus Michels & Holger Petersen. - University of Technology Chemnitz-Zwickau. - May 1994. file: /pub/docs/crypt/TR-94-4.ps.gz (60839 Bytes) Meta signature schemes giving message recovery based on the discrete logarithm problem / Patrick Horster & Markus Michels & Holger Petersen. - University of Technology Chemnitz-Zwickau. - May 1994. file: /pub/docs/crypt/TR-94-5.ps.gz (85056 Bytes) Meta-ElGamal signature schemes / Patrick Horster & Markus Michels & Holger Petersen. - University of Technology Chemnitz-Zwickau. - May 1994. file: /pub/docs/crypt/TR-94-5a.ps.gz (75251 Bytes) Meta-ElGamal signature schemes / Patrick Horster & Holger Petersen & Markus Michels. - University of Technology Chemnitz-Zwickau. - May 1994. [appeared in: Proc. 2nd ACM Conf. on Computer and Comm. Security, Fairfax] file: /pub/docs/crypt/TR-94-6.ps.gz (34803 Bytes) Efficient blind signature schemes based on the discrete logarithm problem / Patrick Horster & Markus Michels & Holger Petersen. - University of Technology Chemnitz-Zwickau. - June 1994. file: /pub/docs/crypt/TR-94-7.ps.gz (65113 Bytes) Meta signature scheme giving message recovery based on the discrete logarithm problem and some applications / Patrick Horster & Markus Michels & Holger Petersen. - University of Technology Chemnitz-Zwickau. - July 1994. file: /pub/docs/crypt/TR-94-8.ps.gz (58981 Bytes) Generalized blind signature schemes based on the discrete logarithm problem / Patrick Horster & Markus Michels & Holger Petersen. - University of Technology Chemnitz-Zwickau. - July 1994. file: /pub/docs/crypt/TR-94-9.ps.gz (100169 Bytes) Meta Message recovery and Meta blind signature schemes based on the discrete logarithm problem and their applications / Patrick Horster & Markus Michels & Holger Petersen. - University of Technology Chemnitz-Zwickau. - July 1994. file: /pub/docs/crypt/TR-94-9a.ps.gz (53647 Bytes) Meta Message recovery and Meta blind signature schemes based on the discrete logarithm problem and their applications / Patrick Horster & Markus Michels & Holger Petersen. - University of Technology Chemnitz-Zwickau. - 1994. [appeared in: Proc. Asiacrypt '94] file: /pub/docs/crypt/TR-95-1.ps.gz (53017 Bytes) Digital signature scheme based on Lucas functions / Patrick Horster & Holger Petersen & Markus Michels. - University of Technology Chemnitz-Zwickau. - February 1995. file: /pub/docs/crypt/TR-95-10.ps.gz (41016 Bytes) Breaking and repairing a convertible undeniable signature scheme / Markus Michels et al. - University of Technology Chemnitz-Zwickau. - June 1995. file: /pub/docs/crypt/TR-95-11.ps.gz (28639 Bytes) Comment: "Cryptanalysis" of the lbind signatures based on the discrete logartihm problem / Partick Horster et al. - University of Technology Chemnitz-Zwickau. - July 1995. file: /pub/docs/crypt/TR-95-12a.ps.gz (35465 Bytes) Some remarks on a receipt-free and universally verifiable Mix-type voting scheme / Markus Michels & Patrick Horster. - University of Technology Chemnitz-Zwickau. file: /pub/docs/crypt/TR-95-13.ps.gz (51257 Bytes) Undetectable On-Line Password Guessing Attacks / Yun Ding & Patrick Horster. - University of Technology Chemnitz-Zwickau. - July 1995. file: /pub/docs/crypt/TR-95-14.ps.gz (58743 Bytes) GOST 34.10: A brief overview of Russia's DSA / Markus Michels et al. - University of Technology Chemnitz-Zwickau. - August 1995. file: /pub/docs/crypt/TR-95-16.ps.gz (58672 Bytes) Blind multisignature schemes and their relevance to electronic voting / Patrick Horster et al. - University of Technology Chemnitz-Zwickau. - August 1995. file: /pub/docs/crypt/TR-95-17.ps.gz (42201 Bytes) On the cardinality of bounded subset products / Holger Petersen. - University of Technology Chemnitz-Zwickau. - August 1995. file: /pub/docs/crypt/TR-95-19a.ps.gz (41366 Bytes) On the risk of disruption in several multiparty signature schemes / Markus Michels & Patrick Horster. - University of Technology Chemnitz-Zwickau. file: /pub/docs/crypt/TR-95-2.ps.gz (31666 Bytes) Comment: Digital signature with (t,n) shared verification based on the discrete logarithm problem / Patrick Horster et al. - University of Technology Chemnitz-Zwickau. - June 1995. file: /pub/docs/crypt/TR-95-4.ps.gz (95714 Bytes) A new key escrow system with active investigator / Patrick Horster et al. - University of Technology Chemnitz-Zwickau. - April 1995. file: /pub/docs/crypt/TR-95-5.ps.gz (81140 Bytes) A new approach for delegation using hierarchical delegation tokens / Yun Ding & Holger Petersen. - University of Technology Chemnitz-Zwickau. - April 1995. file: /pub/docs/crypt/TR-95-6.ps.gz (106633 Bytes) Eine Klassifikation von Authentifikationsmodellen / Yun Ding & Holger Petersen. - University of Technology Chemnitz-Zwickau. - April 1995. [NOTE: German language] file: /pub/docs/crypt/TR-95-7.ps.gz (81954 Bytes) Selbstzertifizierende oeffentliche Schluessel / Yun Ding et al. - University of Technology Chemnitz-Zwickau. - April 1995. [NOTE: German language] file: /pub/docs/crypt/TR-95-8.ps.gz (54984 Bytes) Der Vertrauensaspekt in elektronischen Wahlen / Patrick Horster & Markus Michels. - University of Technology Chemnitz-Zwickau. - May 1995. [NOTE: German language] file: /pub/docs/crypt/TR-96-1.ps.gz (49948 Bytes) Cryptanalysis of a voting scheme / Markus Michels & Patrick Horster. - University of Technology Chemnitz-Zwickau. - February 1997. file: /pub/docs/crypt/TR-96-2.ps.gz (130568 Bytes) Taxonomie digitaler Signatursysteme / Holger Petersen et al. - University of Technology Chemnitz-Zwickau. - 1996. [NOTE: German language] file: /pub/docs/crypt/TR-96-3.ps.gz (35588 Bytes) Comments on some group signature schemes / Markus Michels. - University of Technology Chemnitz-Zwickau. - November 1996. file: /pub/docs/crypt/TR94-16.ps.gz (35826 Bytes) Paving the road to network security or the value of small cobblestones file: /pub/docs/crypt/TR94-34.ps.gz (21230 Bytes) A Simple Scheme to Make Passwords Based on One-Way Functions Much Harder to Crack file: /pub/docs/crypt/TR95-02.ps.gz (48050 Bytes) Protocol Latency: MIPS and Reality file: /pub/docs/crypt/TR95-03.ps.gz (34302 Bytes) Fast Key Exchange with Elliptic Curve Systems file: /pub/docs/crypt/TR95-04.ps.gz (19775 Bytes) Towards High Performance Cryptographic Software file: /pub/docs/crypt/TR95-15.ps.gz (29086 Bytes) Evolving an Implementation of a Network Level Security Protocol file: /pub/docs/crypt/YZheng-PhDthesis.1.ps.gz (135760 Bytes) Principles for Designing Secure Block Ciphers and One-Way Hash Functions / Zuliang Zheng. - Yokohama National University. - Doctor Thesis. - Dec 25, 1990. - [Part 1 of 2]. file: /pub/docs/crypt/YZheng-PhDthesis.2.ps.gz (112181 Bytes) Principles for Designing Secure Block Ciphers and One-Way Hash Functions / Zuliang Zheng. - Yokohama National University. - Doctor Thesis. - Dec 25, 1990. - [Part 2 of 2]. file: /pub/docs/crypt/a5.ps.gz (98344 Bytes) Real Time Cryptanalysis of the Alleged A5/1 on a PC (preliminary draft) / Alex Biryukov and Adi Shamir. - Dec 9, 1999. file: /pub/docs/crypt/aeke.ps.gz (34173 Bytes) Augmented Encrypted Key Exchange: a Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise / Steven Bellovin & Michael Merritt. - AT&T. file: /pub/docs/crypt/auth-pilot-report.ps.gz (496051 Bytes) Final Report and Recommendations of the ESNET Authentication Pilot Project file: /pub/docs/crypt/bck2.ps.gz (74801 Bytes) Keying Hash Functions for Message Authentication file: /pub/docs/crypt/bisconf.ps.gz (68750 Bytes) A Bump in the Stack Encryptor for MS-DOS Systems file: /pub/docs/crypt/braided.ps.gz (64016 Bytes) Secure and Minimal Protocols for Authenticated Key Distribution / P. Janson and G. Tsudik. - IBM Research Division. - RZ 2538. - 1993. file: /pub/docs/crypt/card_cipher.ps.gz (35590 Bytes) High-Bandwidth Encryption with Low-Bandwidth Smartcards / Matt Blaze. - AT&T Bell Labs. - January 18, 1995. file: /pub/docs/crypt/cbc.ps.gz (76928 Bytes) The Security of the Cipher Block Chaining Message Authentication Code / Mihir Bellare et al. - University of California. - October 20, 1995. file: /pub/docs/crypt/cfs.ps.gz (41376 Bytes) A Cryptographic File System for Unix / Matt Blaze. - AT&T Bell Laboratories. - November 3-5, 1993. file: /pub/docs/crypt/cfskey.ps.gz (38807 Bytes) Key Management in an Encrypting File System / Matt Blaze. file: /pub/docs/crypt/chosen-proto.ps.gz (65155 Bytes) Protocol Interactions and the Chosen Protocol Attack / John Kelsey et al. - 1997. file: /pub/docs/crypt/cke.ps.gz (35405 Bytes) Commercial Key Escrow: Something for Everyone Now and for the Future / Stephen T. Walker et. al. - Trusted Information Systems, Inc. - January 3, 1995. [TIS Report #541] file: /pub/docs/crypt/clipper.ps.gz (29410 Bytes) The CLIPPER Initiative : All Americans have a Right to Privacy! But Key Escrow Won't Help / Stephen Walker. - Trusted Information Systems, Inc. - Apr 16, 1993. file: /pub/docs/crypt/clipper.txt.gz (16346 Bytes) The Clipper Initiative : All Americans have a Right to Privacy! But Key Escrow Won't Help / Stephen Walker. -Trusted Information Systems, Inc. - Aug 31, 1993. - [text version of clipper.ps] file: /pub/docs/crypt/clipper2.ps.gz (12554 Bytes) What's Happened to Clipper? / Stephen Walker. -Trusted Information Systems, Inc. - Dec 3, 1993. file: /pub/docs/crypt/cmea.ps.gz (82501 Bytes) Cryptanalysis of the Cellular Message Encryption Algorithm / David Wagner, Bruce Schneier, John Kelsey. file: /pub/docs/crypt/cpw.ps.gz (61189 Bytes) Robust and Secure Password/Key Change Method / R. Hauser, P. Janson, R. Molva, G. Tsudik and E. van Herreweghen. - IBM Research Division, RZ 2409. - 1993. file: /pub/docs/crypt/cryptosizes.pdf (472166 Bytes) Selecting Cryptographic Key Sizes / Arjen Lenstra and Eric Verheul. - November 15, 1999. [see also http://www.cryptosavvy.com/] file: /pub/docs/crypt/cryptovirology.ps.gz (69530 Bytes) Cryptovirology: Extortion-Based Security Threats and Countermeasures A. Young, M. Yung file: /pub/docs/crypt/cs.ps.gz (55087 Bytes) A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack / R. Cramer & V. Shoup. - May 1998. file: /pub/docs/crypt/cs708.ps.gz (42947 Bytes) Differential Cryptanalysis of the full 16-round DES / Eli Biham & Adi Shamir. - 1994. file: /pub/docs/crypt/des-break.ps.gz (43222 Bytes) Using Content-Adressable Search Engines To Encrypt and Break DES / Peter C. Wayner. - Cornell University. file: /pub/docs/crypt/des_key_search.ps.gz (108509 Bytes) Efficient DES Key Search / Michael J. Wiener. - Bell-Northern Research. August 20, 1993. file: /pub/docs/crypt/diamond2.ps.gz (32772 Bytes) The Diamond2 Block Cipher / Michael Paul Jonhson. - 1995. file: /pub/docs/crypt/dnshack.ps.gz (51073 Bytes) Using the Domain Name System for System Break-ins S. M. Bellovin file: /pub/docs/crypt/dobbertin.ps.gz (18324 Bytes) Cryptanalysis of MD5 Compress file: /pub/docs/crypt/drc.ps.gz (31192 Bytes) Initial Description and Specification of the TIS Commercial Key Escrow System / Carl M. Ellison. - Trusted Information Systems, Inc. - January 9, 1995. file: /pub/docs/crypt/dss.ps.gz (13982 Bytes) Digitial Signature Standard can do better! / Stephen Walker. - Trusted Information Systems, Inc. - Jul 28, 1993. file: /pub/docs/crypt/dss.txt.gz (7931 Bytes) [text version of dss.ps] file: /pub/docs/crypt/dss2.ps.gz (47710 Bytes) Robust Treshold DSS Signatures / Rosario Gennaro et al. - MIT. file: /pub/docs/crypt/e-mail_security_protocol.ps.gz (29487 Bytes) An Improved E-Mail Security Protocol / Bruce Schneier and Crhis Hall. - Counterpane Systems. - December 1997. [see also http://www.counterpane.com/e-mail_security_protocol.html] file: /pub/docs/crypt/eakd.ps.gz (99595 Bytes) Entity Authentication and Key Distribution / Mihir Bellare and Phillip Rogaway. - University of California. - August 1993. file: /pub/docs/crypt/ees-comments.ps.gz (9531 Bytes) Proposed FIPS for Escrowed Encryption Standard / Director of Computer Systems Laboratory, National Institute of Standards and Technology. - Gaithersburg, MD. - Sep 28, 1993. [NOTE: Previously known as ees.ps] file: /pub/docs/crypt/ees-comments.txt.gz (4418 Bytes) [text version of ees-comments.ps] file: /pub/docs/crypt/eesproto.ps.gz (45492 Bytes) Protocol Failure in the Escrowed Encryption Standard / Matt Blaze. - AT&T Bell Laboratories. - November 1994. file: /pub/docs/crypt/ellisdox.ps.gz (21275 Bytes) The story of non-secret encryption / J.H. Ellis. file: /pub/docs/crypt/euro-clipper.ps.gz (57032 Bytes) A Proposed Architecture for Trusted Third Party Services / Nigel Jefferies, Chris Mitchell, Michael Walker, 1995 file: /pub/docs/crypt/exactsigs.ps.gz (127269 Bytes) The Exact Security of Digital Signatures - How to Sign with RSA and Rabin / Mihir Bellare and Phillip Rogaway. - University of California. - February 1996. [Appears in: Advances in Cryptology - Eurocrypt 96 Proceedings] file: /pub/docs/crypt/export.txt.gz (5894 Bytes) My life as an international arms courier / Matt Blaze. - January, 1995. file: /pub/docs/crypt/fag-pgp.ps.gz (49753 Bytes) Fun and Games with PGP / Gary Howland. - 8th August 1997. file: /pub/docs/crypt/fall95.ps.gz (37571 Bytes) An experience teaching a graduate course in cryptography file: /pub/docs/crypt/field.ps.gz (55413 Bytes) Computation of Discrete Logarithms in Prime Fields / B. A. LaMacchia, A. M. Odlyzko. - AT&T Bell Labs. - Murray Hill, New Jersey. - 1991. file: /pub/docs/crypt/foiling-cracker.ps.gz (29134 Bytes) Foiling the Cracker : A Survey of, and Improvements to, Password Security / Daniel V. Klein. - Carnegie Mellon University. - [His dicts are available under /pub/tools/dicts] file: /pub/docs/crypt/gost-spec.tar.gz (20464 Bytes) This tar archive contains a translation of the Russian equivalent of the U.S. Data Encryption Standard. It incorporates several tex files. file: /pub/docs/crypt/gost-spec2.ps.gz (37844 Bytes) Soviet Encryption Algorithm / from Russian translated by Josef Pieprzyk, Leonid Tombak. - University of Wollongong. - Nov 21, 1993. file: /pub/docs/crypt/hash.ps.gz (42874 Bytes) Message Authentication with One-Way Hash Functions / G. Tsudik. - In: IEEE Infocom 1992. - pp. 2055-2059. file: /pub/docs/crypt/ice-update.ps.gz (9837 Bytes) International Cryptography Experiment (ICE) Status Report / Stephen T. Walker. - Trusted Information Systems, Inc. - August 10, 1994. [TIS Report #535] file: /pub/docs/crypt/ice-update2.ps.gz (16085 Bytes) International Cryptography Experiment (ICE) Status Report / Stephen T. Walker & David M. Balenson. - Trusted Information Systems, Inc. - January 6, 1995. [TIS Report #535-2 / DRAFT] file: /pub/docs/crypt/ice.ps.gz (10417 Bytes) An International Cryptographic Experiment : A Solution to the International Use of Cryptography? / Stephen T. Walker. - Trusted Information Systems, Inc. - April 12, 1994. file: /pub/docs/crypt/ice.txt.gz (4716 Bytes) [text version of ice.ps] file: /pub/docs/crypt/idiotic.ps.gz (65199 Bytes) Authentication Method with Impersonal Token Cards / R. Molva and G. Tsudik. - In: "1993 IEEE Symposium on Security and Privacy. - pp. 56-65. file: /pub/docs/crypt/inc1.ps.gz (72139 Bytes) Incremental Cryptography: The Case of Hashing and Signing / Mihir Bellare et al. - University of California. - October 20, 1995. [Appears in: Advances in Cryptology - Crypto 94 Proceedings] file: /pub/docs/crypt/inc2.ps.gz (84854 Bytes) Incremental Cryptography and Application to Virus Protection / Mihir Bellare et al. - University of California. - May 1995. file: /pub/docs/crypt/inet-95.ps.gz (90217 Bytes) Design and Implementation of SKIP / Ashar Aziz & Martin Patterson. - Sun Microsystems, Inc. - June 28, 1995. [this paper was originally presented at the INET '95 conference] file: /pub/docs/crypt/intro.ps.gz (15302 Bytes) Introduction to Public-Key Technology / Burt Kaliski. - RSA Laboratories. - 1993. - [Slides] file: /pub/docs/crypt/k1.ps.gz (11538 Bytes) Key Exchange Algorithm K-1 / Carl Ellison. - August 29, 1995. file: /pub/docs/crypt/keydist.ps.gz (56817 Bytes) On Simple and Secure Key Distribution / G. Tsudik and E. van Herreweghen. - In: "1993 ACM Conference on Computer and Communications Security. - pp. 49-57. file: /pub/docs/crypt/keylength.ps.gz (38428 Bytes) Minimal Key Length for Symmetric Ciphers to Provide Adequate Commercial Security / Matt Blaze et al. - January 1996. file: /pub/docs/crypt/keysched-icics97.ps.gz (82508 Bytes) Related-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA / John Kelsey et al. - 1997. file: /pub/docs/crypt/kmd5.ps.gz (127610 Bytes) Keying Hash Functions for Message Authentication / Mihir Bellare et al. - Universtiy of California. - January 25, 1996 [Preliminary version] file: /pub/docs/crypt/kocher_timing_attack.ps.gz (32042 Bytes) Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using Timing Attacks / Paul C. Kocher. - December 7, 1995. [Extended Abstract] file: /pub/docs/crypt/kryptoknight.ps.gz (66792 Bytes) KryptoKnight Authentication and Key Distribution System / Refik Molva; Gene Tsudik; Els Van Herreweghen; Stefano Zatti. - EURECOM Institute and IBM Research Laboratory. - In: 1992 European Symposium on Research in Computer Security. - pp. 155-174. file: /pub/docs/crypt/mcg.ps.gz (37604 Bytes) The MacGuffin Block Cipher Algorithm / Matt Blaze and Bruce Schneider. - AT&T Bell Labs. file: /pub/docs/crypt/mdxmac_crypto95.ps.gz (55206 Bytes) MDx-MAC and Building Fast MACs from Hash Functions (MAC: message authentication code) file: /pub/docs/crypt/mkcs.ps.gz (14450 Bytes) Master-Key Cryptosystems / Matt Blaze, Joan Feigenbaum, F.T. Leighton. - September 7, 1995. file: /pub/docs/crypt/mobile.ps.gz (64432 Bytes) Authentication of Mobile Users / R. Molva, D. Samfat and G. Tsudik. - In: IEEE Network. - To appear in 1994. - [Also, IBM RZ 2493]. file: /pub/docs/crypt/neke.ps.gz (61018 Bytes) Encrypted Key Exchange : Password-Based Protocols Secure Against Dictionary Attacks / Steven M. Bellovin, Michael Merrit. - AT&T Bell Laboratories. - Presented on: IEEE Symposium on Research in Security and Privacy, Oakland. - May 1992. file: /pub/docs/crypt/oae.ps.gz (74521 Bytes) Optimal Asymmetric Encryption - How to Encrypt with RSA / Mihir Bellare and Phillip Rogaway. - University of California. - November 19, 1995. file: /pub/docs/crypt/oral.ps.gz (16560 Bytes) Oral Testimony by Stephen Walker, President Trusted Information Systems, Inc. for Subcommittee on Policy Trade and Environment, Committee on Foreign Affairs, U.S. House of Representatives. - Oct 12, 1993. file: /pub/docs/crypt/painless-guide-to-crc.txt.gz (26708 Bytes) A painless guide to crc error detection algorithms / Ross N. Williams. - Rocksoft Pty Ltd. - Aug 19, 1993. file: /pub/docs/crypt/password-security.ps.gz (15354 Bytes) Password Security : A Case History / Robert T. Morris (Sr.), Ken Thompson. - AT&T. file: /pub/docs/crypt/pseudorandom_number.ps.zip (63495 Bytes) Cryptanalytic Attacks on Pseudorandum Number Generators / John Kelsey et al. - 1998. file: /pub/docs/crypt/rc5-dfa-paper.ps.gz (102031 Bytes) 6.857 Computer & Network Security Final Prohejct: Differential Fault Analysis / Jered J. Floyd et. al. - December 19, 1996. file: /pub/docs/crypt/recog.ps.gz (40067 Bytes) A Programmable Plaintext Recognizer (encryption key search machine) file: /pub/docs/crypt/ripemd160.ps.gz (81146 Bytes) RIPEMD-160: A Strengthened Version of RIPEMD (message digest algorithms) file: /pub/docs/crypt/rsa.ps.gz (54377 Bytes) Robust and Efficient Sharing of RSA Functions / Rosario Gennaro et al. - MIT. file: /pub/docs/crypt/rsa129.ps.gz (88465 Bytes) THE MAGIC WORDS ARE SQUEAMISH OSSIFRAGE / Derek Atkins et. al. - 1995 [Extended Abstract] file: /pub/docs/crypt/rsaconf.ps.gz (46173 Bytes) Keyed Hash Functions and Message Authentication file: /pub/docs/crypt/ruby_m4.ps.gz (67603 Bytes) Ruby Block Cipher Mark 4 / Michael P. Johnson. - December 20, 1995. file: /pub/docs/crypt/safer_1.ps.gz (26185 Bytes) SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm / James L. Massey. - Swiss Federal Institute of Technolgy. - 1994. [Description of the software available in /pub/tools/crypt/safer] file: /pub/docs/crypt/sdsi.ps.gz (88044 Bytes) SDSI - A Simple Distributed Security Infrastructure / Ronald L. Rivest and Butler Lampson. - April 26, 1996. file: /pub/docs/crypt/secret.ps.gz (64055 Bytes) Secret Agents - A Security Architecrure for the KQML Agent Communication Language file: /pub/docs/crypt/security_estimates.pdf (142180 Bytes) Security Estimates for 512-bit RSA / M. Robshaw. - June 1995. file: /pub/docs/crypt/seskrb.ps.gz (101198 Bytes) SESAME V2 Public Key and Authorization Extensions to Kerberos / P.V. McMahon. - Febr. 95 ISOC Symposium San Diego. file: /pub/docs/crypt/sesscrypt.ps.gz (41127 Bytes) Session-Layer Encryption / Matt Blaze and Steven M. Bellovin. - AT&T Bell Labs. file: /pub/docs/crypt/ske-update.ps.gz (13810 Bytes) Software Key Escrow: A Better Solution for Law Enforcement's needs? / Stephen T. Walker. - Trusted Information Systems, Inc. - August 30, 1994. [TIS Report #533] file: /pub/docs/crypt/ske.ps.gz (31924 Bytes) A New Approach to Software Key Escrow Encryption / David M. Balenson et. al. - Trusted Information Systems, Inc. - August 15, 1994. [TIS Report #520] file: /pub/docs/crypt/spx-guide.ps.gz (41580 Bytes) SPX Guide: A Prototype Public Key Authentication Service file: /pub/docs/crypt/spx-ieee.ps.gz (35936 Bytes) SPX: Global Authentication Using Public Key Cetificates file: /pub/docs/crypt/ssh-x11.ps.gz (84020 Bytes) The Interaction between SSH and X11 / Thoughts on the Security of the Secure Shell. - Ulrich Flegel. - Braunschweig, Germany. - September 1997. file: /pub/docs/crypt/std-crypto.ps.gz (11282 Bytes) Standardized Cryptographic Interface Specification / Trusted Information Systems, Inc. - November 5, 1993. [TIS Report #471] file: /pub/docs/crypt/stretch.ps.gz (61969 Bytes) Preserving Integrity in Remote File Location and Retrieval file: /pub/docs/crypt/swipe-26ietf.ps.gz (16481 Bytes) swIPe: Network-Layer Security for IP / John Ioannidis & Matt Blaze & Phil Karn. - March 1993 [Slides of the 26th IETF - see also: usenix-sec93.ps.gz] file: /pub/docs/crypt/testimony.ps.gz (39074 Bytes) Testimony by Stephen Walker, President Trusted Information Systems, Inc. for Subcommittee on Policy Trade and Environment, Committee on Foreign Affairs, U.S. House of Representatives. - Oct 12, 1993. file: /pub/docs/crypt/testimony2.ps.gz (36768 Bytes) Testimony for Committee on the Judiciary Subcommittee on Technology and the Law United States Senate / Stephen T. Walker. - Trusted Information Systems, Inc. - May 3, 1994. file: /pub/docs/crypt/thoughts.ps.gz (12789 Bytes) Thoughts on Key Escrow Acceptability / Stephen Walker. - Trusted Information Systems, Inc. - November 3, 1994. [TIS Report #534D / DRAFT] file: /pub/docs/crypt/tr-92-2.ps.gz (72208 Bytes) Immunizing Public Key Cryptosystems against Chosen Ciphertext Attacks / Jennifer Seberry and Yuliang Zheng. - University of Wollongong. - TR-92-2. - Sep 21, 1992. file: /pub/docs/crypt/tr-93-1.ps.gz (66944 Bytes) Highly Nonlinear Balanced Boolean Functions Satisfying High Degree Propagation Criterion / Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng. - University of Wollongong. - TR-93-1. file: /pub/docs/crypt/tr-93-13.HAVALcode.gz (7892 Bytes) Addendum for: University of Wollongong. - TR-93-13. file: /pub/docs/crypt/tr-93-13.ps.gz (90539 Bytes) HAVAL --- A One-Way Hashing Algorithm with Variable Length of Output / Yuliang Zheng, Josef Pieprzyk and Jennifer Seberry . - University of Wollongong. - TR-93-13. file: /pub/docs/crypt/tr-93-14.ps.gz (108011 Bytes) "Systematic Generation of Cryptographically Robust S-boxes / Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng. - University of Wollongong. - TR-93-14. file: /pub/docs/crypt/tr-93-17.ps.gz (34110 Bytes) Amending Leighton and Micali's Key Distribution Protocol / Yuliang Zheng. - University of Wollongong. - TR-93-17. file: /pub/docs/crypt/tr-93-2.ps.gz (451230 Bytes) New Solutions to the Problem of Access Control in a Hierarchy / Yuliang Zheng, Thomas Hardjono and Jennifer Seberry. - University of Wollongong. - TR-93-2. file: /pub/docs/crypt/tr-93-4.ps.gz (115680 Bytes) Nonlinearity and Propagation Characteristics of Balanced Boolean Functions / Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng. - University of Wollongong. - TR-93-4. file: /pub/docs/crypt/tr-93-5.ps.gz (78630 Bytes) On Constructions and Nonlinearity of Correlation Immune Functions / Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng. - University of Wollongong. - TR-93-5. file: /pub/docs/crypt/tr-93-9.ps.gz (41418 Bytes) Improving the Strict Avalanche Characteristics of Cryptographic Functions / Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng.- University of Wollongong. - TR-93-9. file: /pub/docs/crypt/tr.ps.gz (123860 Bytes) Translucent Cryptography - An Alternative to Key Escrow, and its Implementation via Fractional Oblivious Transfer / Mihir Bellare and Ronald L. Rivest. - February 1996. file: /pub/docs/crypt/twomacs.ps.gz (60192 Bytes) On the Security of Two MAC Algorithms file: /pub/docs/crypt/usenix-sec93.ps.gz (36673 Bytes) The Architecture and Implementation of Network-Layer Security Under Unix / John Ioannidis & Matt Blaze. - 1993. file: /pub/docs/crypt/weak.ps.gz (52466 Bytes) Some Remarks on Protecting Weak Secrets and Poorly-Chosen Keys from Guessing Attacks / G. Tsudik and E. van Herreweghen. - In: 1993 IEEE Symposium on Reliable Distributed Systems. - pp. 136-142. file: /pub/docs/crypt/whycrypto.pdf (45348 Bytes) Why cryptography is harder than it looks / Bruce Schneier. file: /pub/docs/crypt/whycrypto.ps.zip (451500 Bytes) Why cryptography is harder than it looks / Bruce Schneier.