[Sadržaj]


Literatura

  1. E. Bach, J. Shallit: Algorithmic Number Theory, Volume I: Efficient Algoritms, MIT Press, Cambridge, MA, 1996.

  2. T. Baigneres, P. Junod, Y. Lu, J. Monnerat, S. Vaudenay: A Classical Introduction to Cryptography Exercise Book, Springer, New York, 2006.

  3. M. W. Baldoni, C. Ciliberto, G. M. Piacentini Cattaneo: Elementary Number Theory, Cryptography and Codes, Springer, Berlin, 2009.

  4. M. Barun, A. Dujella, Z. Franušić, Kriptografija u školi, Poučak 33 (2008), 40-52.

  5. C. P. Bauer: Secret History. The Story of Cryptology, CRC Press, Boca Raton, 2013.

  6. F. L. Bauer: Decrypted Secrets. Methods and Maxims of Cryptology, Springer-Verlag, Berlin, 2000.

  7. B. Beckett: Introduction to Cryptology, Blackwell, Oxford, 1988.

  8. B. Beckman: Codebreakers: Arne Beurling and the Swedish crypto program during World War II, American Mathematical Society, 2002.

  9. H. Beker, F. Piper: Cipher Systemns. The Protection of Communications, Northwood Books, London, 1982.

  10. D. J. Bernstein, J. Buchmann, E. Dahmen (Eds.): Post Quantum Cryptography, Springer, 2009.

  11. A. Beutelspacher: Kryptologie, Vieweg, Braunschweig, 1987.

  12. A. K. Bhandari, D. D. Nagraj, R. Ramakrishnan, T.N. Venkataramana (Eds.): Elliptic Curves, Modular Forms and Cryptography, Hindustan Book Agency, New Delhi, 2003.

  13. E. Biham, A. Shamir: Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, New York, 1993.

  14. I. Blake, G. Seroussi, N. Smart: Elliptic Curves in Cryptography, Cambridge University Press, Cambridge, 1999.

  15. I. Blake, G. Seroussi, N. Smart (Eds): Advances in Elliptic Curve Cryptography, Cambridge University Press, Cambridge, 2005.

  16. D. Boneh: Twenty years of attacks on the RSA cryptosystem, Notices of AMS, 46 (1999), 203-213.

  17. C. Boyd, A. Mathuria: Protocols for Authentication and Key Establishment, Springer, 2003.

  18. J. Buchmann: Introduction to Cryptography, Springer-Verlag, New York, 2000.

  19. J. P. Buhler, P. Stevenhagen (Eds.): Algorithmic Number Theory. Lattices, Number Fields, Curves and Cryptography, Cambridge University Press, Cambridge, 2008.

  20. L. J. Camp: Trust and Risk in Internet Commerce, MIT Press, Cambridge, 2001.

  21. C. Carstensen, B. Fine, G. Rosenberg: Abstract Algebra: Applications to Galois Theory, Algebraic Geometry and cryptography, De Gruyter, 2011.

  22. D. Catalano, R. Cramer, I. Damgard, G. Di Crescenzo, D. Pointcheval, T. Takagi: Contemporary Cryptology, Birkhäuser, Basel, 2005.

  23. B.-Z. Chor: Two Issues in Public Key Cryptography, MIT Press, Cambridge, 1985.

  24. C. Cid, S. Murphy, M. Robshaw: Algebraic Aspects of the Advanced Encryption Standard, Springer, New York, 2006.

  25. H. Cohen, G. Frey (Eds): Handbook of Elliptic and Hyperelliptic Curve Cryptography, Chapman & Hall/CRC, Boca Raton, 2005.

  26. D. Coppersmith: Small solutions to polynomial equations, and low exponent RSA vulnerabilities, J. Cryptology, 10 (1997), 233-260.

  27. S. C. Countinho: The Mathematics of Ciphers. Number Theory and RSA Cryptography, A K Peters, 1999.

  28. R. Crandall, C. Pomerance: Prime Numbers: A Computational Perspective, Springer-Verlag, New York, 2001.

  29. M. Curtin: Brute Force. Cracking the Data Encryption Standard, Copernicus Books, 2005.

  30. H. Čavrak: Enigma, math.e, 3 (2004).

  31. J. Daemen, V. Rijmen: The Design of Rijndael. AES - The Advanced Encryption Standard, Springer-Verlag, Berlin, 2002.

  32. A. Das: Computational Number Theory, CRC Press, Boca Raton, 2013.

  33. C. A. Deavours, L. Kruh: Machine Cryptography and Modern Cryptanalysis, Artech House, Norwood, 1985.

  34. H. Delfs, H. Knebl: Introduction to Cryptography. Principles and Applications, Springer, 2002.

  35. J. Ding, J. E. Gower, D. S. Schmidt: Multivariate public key cryptosystems, Springer, 2006.

  36. A. Dujella: Studentski seminar "Eliptičke krivulje i njihova primjena u kriptografiji", PMF - Matematički odjel, Zagreb.

  37. A. Dujella: Continued fractions and RSA with small secret exponent, Tatra Mt. Math. Publ., 29 (2004), 101-112.

  38. A. Dujella: Vigenereova šifra, math.e, 1 (2004).

  39. A. Dujella: A variant of Wiener's attack on RSA, Computing 85 (2009), 77-83.

  40. A. Dujella: Teorija brojeva i šifriranje, Zadarska smotra 65 (2016), no. 3-4, 163-168.

  41. A. Dujella: Teorija brojeva i kriptografija, NOVIGRAD nekad i sad (S. Kaštela, ur.), Sveučilište u Zadru, 2016, 454-461.

  42. A. Dujella: History of elliptic curves rank records, http://web.math.hr/~duje/tors/rankhist.html

  43. A. Dujella: Teorija brojeva, Skolska knjiga, Zagreb, 2019.

  44. A. Dujella: Number Theory, Skolska knjiga, Zagreb, 2021.

  45. A. Dujella, M. Maretić: Kriptografija, Element, Zagreb, 2007.

  46. A. Dujella, F. Najman: Elliptic curves with large torsion and positive rank over number fields of small degree and ECM factorization, Period. Math. Hungar. 65 (2012), 193-203.

  47. N. El Mrabet, M. Joye: Guide to Pairing-Based Cryptography, Chapman & Hall/CRC, 2016.

  48. Electronic Frontier Foundation: Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design, O'Reilly, Sebastopol, 1998.

  49. N. Ferguson, B. Schneier: Practical Cryptography, John Wiley, New York, 2003.

  50. H. F. Gaines: Cryptanalysis, Dover Publications, New York, 1956.

  51. S. D. Galbraith, Mathematics of Public Key Cryptography, Cambridge University Press, Cambridge, 2012.

  52. P. Garrett, D. Lieman (Eds.): Public-Key Cryptography, American Mathematical Society, Providence, 2005.

  53. P. J. Giblin: Primes and Programming, Cambridge University Press, Cambridge, 1993.

  54. O. Goldreich: Foundations of Cryptography, Cambridge University Press, Cambridge, 2001.

  55. D. Hankerson, A. Menezes, S. Vanstone: Guide to Elliptic Curve Cryptography, Springer-Verlag, New York, 2004.

  56. M. J. Hinek, Cryptanalysis of RSA and Its Variants, CRC Press, Boca Raton, 2009.

  57. P. Hitt, Manual for the Solution of Military Ciphers, Press of the Army Service Schools, Fort Leavenworth, 1916.

  58. J. Hoffstein, J. Pipher, J. H. Silverman: An Introduction to Mathematical Cryptography, Springer, New York, 2008.

  59. B. Ibrahimpašić: Matematičke osnove kriptografije javnog ključa, magistarski rad, Univerzitet u Sarajevu, 2004.

  60. B. Ibrahimpašić: RSA kriptosustav, Osječki matematički list 5 (2005), 101-112.

  61. B. Ibrahimpašić: Metode faktorizacije, Matematičko-fizički list 56 (2005-2006), no. 4, 233-239.

  62. B. Ibrahimpašić: Primjena verižnih razlomaka u diofantskim aproksimacijama i kriptoanalizi, doktorska disertacija, Sveučilište u Zagrebu, 2008.

  63. B. Ibrahimpašić: Kriptografija kroz primjere, Pedagoški fakultet Bihać, 2011.

  64. M. J. Jacobson, H.C. Williams: Solving the Pell Equation, Springer, 2009.

  65. A. Joux: Algorithmic Cryptanalysis, CRC Press, Boca Raton, 2009.

  66. D. Joyner (Ed.): Coding Theory and Cryptography. From Enigma and Geheimschreiber to Quantum Theory, Springer-Verlag, Berlin, 2000.

  67. A. Jurasić, M. Rukavina, Pseudoprosti brojevi, Matematičko-fizički list 62 (2011-2012), no. 1, 20-25.

  68. D. Kahn: The Codebreakers. The Story of Secret Writing, Scribner, New York, 1996. (hrvatski prijevod: Šifranti protiv špijuna, Centar za informacije i publicitet, Zagreb, 1979)

  69. V. Kapitanović: Povijesna vrela i pomoćne znanosti, Filozofski fakultet, Split, 2012.

  70. J. Katz, Y. Lindell: Introduction to Modern Cryptography, CRC Press, Boca Raton, 2007.

  71. S. Katzenbeisser: Recent Advances in RSA Cryptography, Kluwer, Boston, 2001.

  72. S. Katzenbeisser, F. A. P. Petitcolas (Eds.): Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Boston, 2000.

  73. C. Kaufman, R. Perlman, M. Speciner: Network Security. PRIVATE Communication in a PUBLIC World, Prentice Hall, Upper Saddle River, 2002.

  74. R. Kippenhahn: Code Breaking. A History and Exploration, The Overlook Press, Woodstock, 1999.

  75. H. Knospe: A Course in Cryptography, American Mathematical Society, Providence, 2019.

  76. D. Knuth: The Art of Computer Programming, Vol. 2, Seminumerical Algorithms, Addison-Wesley, Reading, 1981.

  77. N. Koblitz: A Course in Number Theory and Cryptography, Springer-Verlag, New York, 1994.

  78. N. Koblitz: Algebraic Aspects of Cryptography, Springer-Verlag, Berlin, 1999.

  79. D. Kopčinović: Problem diskretnog logaritma za eliptičke krivulje, magistarski rad, Sveučilište u Zagrebu, 2005.

  80. W. Kou: Payment Technologies for E-Commerce, Springer, Berlin, 2003.

  81. E. Kranakis: Primality and Cryptography, Teubner, Stuttgart; John Wiley, Chichester, 1987.

  82. H. Knospe: A course in cryptography, American Mathematical Society, Providence. 2019.

  83. A. Languasco, A. Zaccagnini: Introduzione alla Crittografia, Ulrico Hoepli Editore, Milano, 2004

  84. S. Landau: Standing the test of time: The Data Encryption Standard, Notices of AMS, 47 (2000), 341-349.

  85. S. Landau: Communications security for the twenty-first century: The Advanced Encryption Standard, Notices of AMS, 47 (2000), 450-459.

  86. A. K. Lenstra, H. W. Lenstra, Jr. (Eds.): The Development of the Number Field Sieve, Springer-Verlag, Berlin, 1993.

  87. A. K. Lenstra, E. R. Verheul: Selecting cryptographic key sizes, J. Cryptology, 14 (2001), 255-293.

  88. S. Ling, H. Wang, C. Xing: Algebraic Curves in Cryptography, CRC Press, Boca Raton, 2013.

  89. J. H. Loxton (Ed.): Number Theory and Cryptography, Cambridge University Press, 1990.

  90. M. Maretić: Eliptičke krivulje u kriptografiji, diplomski rad, PMF-Matematički odjel, Sveučilište u Zagrebu, 2002.

  91. M. Matsui, Linear Cryptanalysis Method for DES Cipher, in: Advances in Cryptology -- EUROCRYPT ’93, Lecture Notes in Comput. Sci., 965 (1993), 386–397.

  92. A. J. Menezes, P. C. Oorschot, S. A. Vanstone: Handbook of Applied Cryptography, CRC Press, Boca Raton, 1996.

  93. M. Mitani, S. Sato, I. Hinoki: The Manga Guide to Cryptography, No Starch Press, 2018.

  94. R. A. Mollin: An Introduction to Cryptography, Chapman & Hall/CRC Press, Boca Raton, 2001.

  95. R. A. Mollin: RSA and Public-Key Cryptography, Chapman & Hall/CRC Press, Boca Raton, 2002.

  96. D. Müller: Ars Cryptographica, http://www.apprendre-en-ligne.net/crypto/menu/

  97. A. Narayanan, J. Bonneau, E. Felten, A. Miller: Bitcoin and Cryptocurrency Technologies, Princeton University Press, 2016.

  98. H. Niederreiter (Ed.): Coding Theory and Cryptology, World Scientific, Singapore, 2002.

  99. Y. Nievergelt: Foundations of logic and mathematics: applications to computer science and cryptography, Birkhäuser, 2002.

  100. Operacijski sustavi 2: Radovi studenata iz područja računalne sigurnosti, Fakultet elektrotehnike i računarstva, Zagreb. http://os2.zemris.fer.hr

  101. C. Paar, J. Pelzl: Understanding Cryptography. A Textbook for Students and Practitioners, Springer, Berlin, 2010.

  102. W. Patterson: Mathematical Cryptology for Computer Scientists and Mathematicians, Rowman & Littlefield, Totowa, 1987.

  103. A. Pethö: Algebraische Algorithmen, Vieweg, Braunschweig, 1999.

  104. F. Piper, S. Murphy, Cryptography: A Very Short Introduction, Oxford University Press, Oxford, 2002.

  105. D. Pleskonjić, N. Maček, B. Đorđević, M. Carić, Sigurnost računarskih sistema i mreža, Mikro knjiga, Beograd, 2007.

  106. C. Pomerance (Ed.): Cryptology and Computational Number Theory, Proceedings of Symposia in Applied Mathematics, Vol. 42, American Mathematical Society, Providence, 1990.

  107. H. Riesel, Prime Numbers and Computer Methods for Factorization, Birkhäuser, Boston, 1994.

  108. A. Rosen: Concurrent zero-knowledge, Springer, 2006.

  109. K. H. Rosen: Elementary Number Theory and Its Applications, Addison-Wesley, Reading, 1993.

  110. M. Rosing: Implementing Elliptic Curve Cryptography, Manning, Greenwich, 1999.

  111. J. Rothe: Complexity Theory and Cryptography. An Introduction to Cryptocomplexity, Springer, Berlin, 2005.

  112. RSA Laboratories: Frequently Asked Questions About Today's Cryptography, version 4.1, 2000.

  113. A. Salomaa: Public-Key Cryptography, Springer-Verlag, Berlin, 1996.

  114. J. J. Savard: A Cryptographic Compendium, http://www.quadibloc.com/crypto/intro.htm

  115. B. Schneier: Applied Cryptography, John Wiley, New York, 1995.

  116. M. R. Schroeder: Number Theory in Science and Communication, Springer-Verlag, Berlin, 1997.

  117. T. R. Shemanske: Modern Cryptography and Elliptic Curves: A Beginner’s Guide, American Mathematical Society, Providence, 2017.

  118. M. H. Sherif: Protocols for Secure Electronic Commerce, CRC Press, Boca Raton, 2000.

  119. I. E. Shparlinski: Finite Fields. Theory and Computation. The Meeting Point of Number Theory, Computer Science, Coding Theory and Cryptography, Kluwer, 1999.

  120. I. E. Shparlinski: Cryptographic Applications of Analytic Number Theory, Birkhauser, Basel, 2003.

  121. G. J. Simmons (Ed.): Contemporary Cryptology, The Science of Information Integrity, IEEE Press, Piscataway, 1992.

  122. S. Singh: The Code Book, Fourth Estate, London, 1999. (hrvatski prijevod: Šifre. Kratka povijest kriptografije, Mozaik knjiga, Zagreb, 2003)

  123. A. Sinkov: Elementary Cryptanalysis. A Mathematical Approach, The Mathematical Association of America, Washington, 1966.

  124. N. Smart: Cryptography. An Introduction, McGraw-Hill, New York, 2002.

  125. W. Stallings: Cryptography and Network Security. Principles and Practice, Prentice Hall, Upper Sadle River, 1999, 2005.

  126. M. Stamp, R. M. Low: Applied Cryptanalysis. Breaking Ciphers in the Real World, Wiley, New York, 2007.

  127. D. R. Stinson: Cryptography. Theory and Practice, CRC Press, Boca Raton, 1996, 2002, 2005.

  128. C. Swenson: Modern Cryptanalysis. Techniques for Advanced Code Breaking, Wiley, Indianapolis, 2008.

  129. J. Talbot, D. Welsh: Complexity and Cryptography. An Introduction, Cambridge University Press, 2006.

  130. H. C. A. van Tilborg (Ed.): Encyclopedia of Cryptography and Security, Springer, 2005.

  131. TheBestVPN: Introduction to Cryptography, https://thebestvpn.com/cryptography/

  132. W. Trappe, L. C. Washington: Introduction to Cryptography with Coding Theory, Prentice Hall, Upper Sadle River, 2002.

  133. O. N. Vasilenko: Number-Theoretic Algorithms in Cryptography, American Mathematical Society, Providence, 2007.

  134. H. C. A. van Tilborg: Fundamentals of Cryptology. A Professional Reference and Interactive Tutorial, Kluwer, Boston, 2000.

  135. S. Vaudenay: A Classical Introduction to Cryptography. Applications for Communication Security, Springer, New York, 2006.

  136. S. Vaudenay (Ed.): Public Key Cryptography, PKC 2005, Lecture Notes in Comput. Sci. 3386, Springer, Berlin, 2005.

  137. E. R. Verheul, H. C. A. van Tilborg: Cryptanalysis of "less short" RSA secret exponents, Appl. Algebra Engrg. Comm. Computing, 8 (1997), 425-435.

  138. T. M. Virtue: Payment Card Industry Data Security Standard Handbook, Wiley, Hoboken, 2009.

  139. S. S. Wagstaff, Jr.: Cryptanalysis of Number Theoretic Ciphers, Chapman and Hall/CRC Press, Boca Raton, 2002.

  140. L. C. Washington: Elliptic Curves: Number Theory and Cryptography, CRC Press, Boca Raton, 2003, 2008.

  141. P. Wayner: Disappearing Cryptography: Information Hiding - Steganography and Watermarking, Morgan Kaufmann, San Francisco, 2002.

  142. M. Welschenbach: Cryptography in C and C++, Apress, Berkeley, 2001.

  143. M. J. Wiener, Cryptanalysis of short RSA secret exponents, IEEE Trans. Inform. Theory, 36 (1990), 553-558.

  144. Wikipedia: Cryptography, http://en.wikipedia.org/wiki/Category:Cryptography

  145. S. Y. Yan: Number Theory for Computing, Springer-Verlag, Berlin, 2002.

  146. S. Y. Yan: Cryptanalytic Attacks on RSA, Springer-Verlag, New York, 2008.

  147. S. Y. Yan: Computational Number Theory and Modern Cryptography, Wiley, Singapore, 2013.

  148. V. V. Yaschenko (Ed.): Cryptography: An Introduction, American Mathematical Society, Providence, 2002.

  149. S. Zeljkovic: Steganografija, math.e, 5 (2005).


[Sadržaj]
Web stranica kolegija Kriptografija Andrej Dujella - osobna stranica