Skip to main content

Foundations of Cryptology

  • Chapter
Complexity Theory and Cryptology

Part of the book series: Texts in Theoretical Computer Science An EATCS Series ((TTCS))

  • 1448 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

4.5 Summary and Bibliographic Remarks

  1. F. Bauer. Decrypted Secrets: Methods and Maxims of Cryptology. Springer-Verlag, second edition, 2000.

    Google Scholar 

  2. F. Bauer. Entzifferte Geheimnisse: Methoden und Maximen der Kryptologie. Springer-Verlag, third edition, 2000. In German.

    Google Scholar 

  3. A. Beutelspacher. Kryptologie. Vieweg, 6th edition, 2002. In German.

    Google Scholar 

  4. A. Beutelspacher. Cryptology. Spectrum series. Mathematical Association of America, 1994.

    Google Scholar 

  5. A. Beygelzimer, L. Hemaspaandra, C. Homan, and J. Rothe. One-way functions in worst-case cryptography: Algebraic and security properties are on the house. SIGACT News, 30(4):25–40, December 1999.

    Article  Google Scholar 

  6. A. Beutelspacher, J. Schwenk, and K. Wolfenstetter. Moderne Verfahren der Kryptographie. Vieweg, 4th edition, 2001. In German.

    Google Scholar 

  7. J. Buchmann. Introduction to Cryptography. Undergraduate Texts in Mathematics. Springer-Verlag, 2001.

    Google Scholar 

  8. J. Cai. Some recent progress on the complexity of lattice problems. In Proceedings of the 14th Annual IEEE Conference on Computational Complexity, pages 158–179. IEEE Computer Society Press, May 1999.

    Google Scholar 

  9. J. Daemen and V. Rijmen. The Design of Rijndael. Springer-Verlag, 2001.

    Google Scholar 

  10. J. Feigenbaum. Overview of interactive proof systems and zero-knowledge. In G. Simmons, editor, Contemporary Cryptology: The Science of Information Integrity, pages 423–439. IEEE Computer Society Press, 1992.

    Google Scholar 

  11. O. Goldreich. Foundations of Cryptography. Cambridge University Press, 2001.

    Google Scholar 

  12. O. Goldreich. Randomness, interactive proofs, and zero-knowledge—A survey. In R. Herken, editor, The Universal Turing Machine: A Half-Century Survey, pages 377–405. Oxford University Press, Oxford, 1988.

    Google Scholar 

  13. S. Goldwasser. Interactive proof systems. In J. Hartmanis, editor, Computational Complexity Theory, pages 108–128. AMS Short Course Lecture Notes: Introductory Survey Lectures, Proceedings of Symposia in Applied Mathematics, Volume 38, American Mathematical Society, 1989.

    Google Scholar 

  14. O. Goldreich. Modern cryptography, probabilistic proofs, and pseudorandomness, volume 17 of Algorithms and Combinatorics. Springer-Verlag, 1999.

    Google Scholar 

  15. D. Kahn. The Codebreakers: The Story of Secret Writing. MacMillan Publishing Company, 1967.

    Google Scholar 

  16. B. Kaliski Jr., R. Rivest, and A. Sherman. Is the data encryption standard a group? (Results of cycling experiments on DES). Journal of Cryptology, 1(1):3–36, 1988.

    Article  Google Scholar 

  17. R. Kumar and D. Sivakumar. Complexity of SVP-A reader's digest. SIGACT News, 32(3):40–52, June 2001.

    Article  Google Scholar 

  18. M. Luby. Pseudorandomness and Cryptographic Applications. Princeton Computer Science Notes. Princeton University Press, Princeton, New Jersey, 1996.

    Google Scholar 

  19. D. Micciancio and S. Goldwasser. Complexity of Lattice Problems: A Cryptographic Perspective, volume 671 of The Kluwer International Series in Engineering and Computer Science. Kluwer Academic Publishers, Boston, Massachusetts, March 2002.

    Google Scholar 

  20. P. Nguyen and J. Stern. The two faces of lattices in cryptology. In Proceedings of the International Conference on Cryptography and Lattices, pages 146–180. Springer-Verlag Lecture Notes in Computer Science #2146, 2001.

    Google Scholar 

  21. J. Rothe. Some facets of complexity theory and cryptography: A five-lecture tutorial. ACM Computing Surveys, 34(4):504–549, December 2002.

    Article  Google Scholar 

  22. J. Rothe. Kriptográfia (Cryptography). In A. Iváanyi, editor, Informatikai Algoritmusok I (Algorithms of Computer Science I), pages 94–124. ELTE Eötvös Kiadó, 2004. In Hungarian. German version available on-line at http://www.cs.uni-duesseldorf.de/~rothe/TONY/main.pdf.

    Google Scholar 

  23. R. Rueppel. Analysis and Design of Stream Ciphers. Springer-Verlag, Berlin, Heidelberg, New York, 1986.

    Google Scholar 

  24. A. Salomaa. Public-Key Cryptography, volume 23 of EATCS Monographs on Theoretical Computer Science. Springer-Verlag, second edition, 1996.

    Google Scholar 

  25. B. Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley and Sons, New York, second edition, 1996.

    Google Scholar 

  26. A. Selman. A survey of one-way functions in complexity theory. Mathematical Systems Theory, 25(3):203–221, 1992.

    Article  Google Scholar 

  27. C. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28(4):657–715, 1949.

    Google Scholar 

  28. S. Singh. The Code Book. The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Fourth Estate, London, 1999.

    Google Scholar 

  29. D. Stinson. Cryptography: Theory and Practice. CRC Press, Boca Raton, second edition, 2002.

    Google Scholar 

  30. D. Welsh. Codes and Cryptography. Oxford science publications. Clarendon Press, Oxford, 6th edition, 1998. Reprinted with corrections.

    Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

(2005). Foundations of Cryptology. In: Complexity Theory and Cryptology. Texts in Theoretical Computer Science An EATCS Series. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-28520-2_4

Download citation

  • DOI: https://doi.org/10.1007/3-540-28520-2_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22147-0

  • Online ISBN: 978-3-540-28520-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics