[Sadržaj]

Literatura

  1. E. Bach, J. Shallit: Algorithmic Number Theory, Volume I: Efficient Algoritms, MIT Press, Cambridge, MA, 1996.

  2. T. Baigneres, P. Junod, Y. Lu, J. Monnerat, S. Vaudenay: A Classical Introduction to Cryptography Exercise Book, Springer, New York, 2006.

  3. M.W. Baldoni, C. Ciliberto, G.M. Piacentini Cattaneo: Elementary Number Theory, Cryptography and Codes, Springer, Berlin, 2009.

  4. C. P. Bauer: Secret History. The Story of Cryptology, CRC Press, Boca Raton, 2013.

  5. F. L. Bauer: Decrypted Secrets. Methods and Maxims of Cryptology, Springer-Verlag, Berlin, 2000.

  6. B. Beckett: Introduction to Cryptology, Blackwell, Oxford, 1988.

  7. D. J. Bernstein, J. Buchmann, E. Dahmen (Eds.): Post Quantum Cryptography, Springer, 2009.

  8. A. Beutelspacher: Kryptologie, Vieweg, Braunschweig, 1987.

  9. A. K. Bhandari, D. D. Nagraj, R. Ramakrishnan, T.N. Venkataramana (Eds.): Elliptic Curves, Modular Forms and Cryptography, Hindustan Book Agency, New Delhi, 2003.

  10. E. Biham, A. Shamir: Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, New York, 1993.

  11. I. Blake, G. Seroussi, N. Smart: Elliptic Curves in Cryptography, Cambridge University Press, Cambridge, 1999.

  12. I. Blake, G. Seroussi, N. Smart (Eds): Advances in Elliptic Curve Cryptography, Cambridge University Press, Cambridge, 2005.

  13. D. Boneh: Twenty years of attacks on the RSA cryptosystem, Notices of AMS, 46 (1999), 203-213.

  14. J. Buchmann: Introduction to Cryptography, Springer-Verlag, New York, 2000.

  15. J. P. Buhler, P. Stevenhagen (Eds.): Algorithmic Number Theory. Lattices, Number Fields, Curves and Cryptography, Cambridge University Press, Cambridge, 2008.

  16. L. J. Camp: Trust and Risk in Internet Commerce, MIT Press, Cambridge, 2001.

  17. D. Catalano, R. Cramer, I. Damgard, G. Di Crescenzo, D. Pointcheval, T. Takagi: Contemporary Cryptology, Birkhäuser, Basel, 2005.

  18. Certicom: ECC Online Tutorial, http://www.certicom.com

  19. B.-Z. Chor: Two Issues in Public Key Cryptography, MIT Press, Cambridge, 1985.

  20. H. Cohen, G. Frey (Eds): Handbook of Elliptic and Hyperelliptic Curve Cryptography, Chapman & Hall/CRC, Boca Raton, 2005.

  21. D. Coppersmith: Small solutions to polynomial equations, and low exponent RSA vulnerabilities, J. Cryptology, 10 (1997), 233-260.

  22. S. C. Countinho: The Mathematics of Ciphers. Number Theory and RSA Cryptography, A K Peters, 1999.

  23. R. Crandall, C. Pomerance: Prime Numbers: A Computational Perspective, Springer-Verlag, New York, 2001.

  24. CryptoDox: The Online Encyclopedia on Cryptography and Information Security, http://cryptodox.com

  25. M. Curtin: Brute Force. Cracking the Data Encryption Standard, Copernicus Books, 2005.

  26. H. Čavrak: Enigma, math.e, 3 (2004).

  27. J. Daemen, V. Rijmen: The Design of Rijndael. AES - The Advanced Encryption Standard, Springer-Verlag, Berlin, 2002.

  28. A. Das: Computational Number Theory, CRC Press, Boca Raton, 2013.

  29. C. A. Deavours, L. Kruh: Machine Cryptography and Modern Cryptanalysis, Artech House, Norwood, 1985.

  30. A. Dujella: Studentski seminar "Eliptičke krivulje i njihova primjena u kriptografiji", PMF - Matematički odjel, Zagreb.

  31. A. Dujella: Continued fractions and RSA with small secret exponent, Tatra Mt. Math. Publ., 29 (2004), 101-112.

  32. A. Dujella: Vigenereova šifra, math.e, 1 (2004).

  33. A. Dujella, A variant of Wiener's attack on RSA, Computing 85 (2009), 77-83.

  34. A. Dujella: History of elliptic curves rank records, http://web.math.hr/~duje/tors/rankhist.html

  35. A. Dujella, M. Maretić: Kriptografija, Element, Zagreb, 2007.

  36. N. El Mrabet, M. Joye: Guide to Pairing-Based Cryptography, Chapman & Hall/CRC, 2016.

  37. Electronic Frontier Foundation: Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design, O'Reilly, Sebastopol, 1998.

  38. N. Ferguson, B. Schneier: Practical Cryptography, John Wiley, New York, 2003.

  39. H. F. Gaines: Cryptanalysis, Dover Publications, New York, 1956.

  40. S. D. Galbraith, Mathematics of Public Key Cryptography, Cambridge University Press, Cambridge, 2012.

  41. P. Garrett, D. Lieman (Eds.): Public-Key Cryptography, American Mathematical Society, Providence, 2005.

  42. P. J. Giblin: Primes and Programming, Cambridge University Press, Cambridge, 1993.

  43. O. Goldreich: Foundations of Cryptography, Cambridge University Press, Cambridge, 2001.

  44. D. Hankerson, A. Menezes, S. Vanstone: Guide to Elliptic Curve Cryptography, Springer-Verlag, New York, 2004.

  45. M. J. Hinek, Cryptanalysis of RSA and Its Variants, CRC Press, Boca Raton, 2009.

  46. J. Hoffstein, J. Pipher, J. H. Silverman: An Introduction to Mathematical Cryptography, Springer, New York, 2008.

  47. B. Ibrahimpašić: Matematičke osnove kriptografije javnog ključa, magistarski rad, Univerzitet u Sarajevu, 2004.

  48. B. Ibrahimpašić: RSA kriptosustav, Osječki matematički list, 5 (2005), 101-112.

  49. B. Ibrahimpašić: Metode faktorizacije, Matematičko-fizički list, (2005-2006), no. 4, 233-239.

  50. B. Ibrahimpašić: Kriptografija kroz primjere, Pedagoški fakultet Bihać, 2011.

  51. M.J. Jacobson, H.C. Williams: Solving the Pell Equation, Springer, 2009.

  52. A. Joux: Algorithmic Cryptanalysis, CRC Press, Boca Raton, 2009.

  53. D. Joyner (Ed.): Coding Theory and Cryptography. From Enigma and Geheimschreiber to Quantum Theory, Springer-Verlag, Berlin, 2000.

  54. D. Kahn: The Codebreakers. The Story of Secret Writing, Scribner, New York, 1996. (hrvatski prijevod: Šifranti protiv špijuna, Centar za informacije i publicitet, Zagreb, 1979)

  55. V. Kapitanović: Povijesna vrela i pomoćne znanosti, Filozofski fakultet, Split, 2012.

  56. J. Katz, Y. Lindell: Introduction to Modern Cryptography, CRC Press, Boca Raton, 2007.

  57. S. Katzenbeisser: Recent Advances in RSA Cryptography, Kluwer, Boston, 2001.

  58. S. Katzenbeisser, F. A. P. Petitcolas (Eds.): Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Boston, 2000.

  59. C. Kaufman, R. Perlman, M. Speciner: Network Security. PRIVATE Communication in a PUBLIC World, Prentice Hall, Upper Saddle River, 2002.

  60. R. Kippenhahn: Code Breaking. A History and Exploration, The Overlook Press, Woodstock, 1999.

  61. D. Knuth: The Art of Computer Programming, Vol. 2, Seminumerical Algorithms, Addison-Wesley, Reading, 1981.

  62. N. Koblitz: A Course in Number Theory and Cryptography, Springer-Verlag, New York, 1994.

  63. N. Koblitz: Algebraic Aspects of Cryptography, Springer-Verlag, Berlin, 1999.

  64. D. Kopčinović: Problem diskretnog logaritma za eliptičke krivulje, magistarski rad, Sveučilište u Zagrebu, 2005.

  65. W. Kou: Payment Technologies for E-Commerce, Springer, Berlin, 2003.

  66. E. Kranakis: Primality and Cryptography, Teubner, Stuttgart; John Wiley, Chichester, 1987.

  67. A. Languasco, A. Zaccagnini: Introduzione alla Crittografia, Ulrico Hoepli Editore, Milano, 2004

  68. S. Landau: Standind the test of time: The Data Encryption Standard, Notices of AMS, 47 (2000), 341-349.

  69. S. Landau: Communications security for the twenty-first century: The Advanced Encryption Standard, Notices of AMS, 47 (2000), 450-459.

  70. A. K. Lenstra, H. W. Lenstra, Jr. (Eds.): The Development of the Number Field Sieve, Springer-Verlag, Berlin, 1993.

  71. A. K. Lenstra, E. R. Verheul: Selecting cryptographic key sizes, J. Cryptology, 14 (2001), 255-293.

  72. S. Ling, H. Wang, C. Xing: Algebraic Curves in Cryptography, CRC Press, Boca Raton, 2013.

  73. J. H. Loxton (Ed.): Number Theory and Cryptography, Cambridge University Press, 1990.

  74. M. Maretić: Eliptičke krivulje u kriptografiji, diplomski rad, PMF-Matematički odjel, Sveučilište u Zagrebu, 2002.

  75. M. Matsui, Linear Cryptanalysis Method for DES Cipher, in: Advances in Cryptology -- EUROCRYPT ’93, Lecture Notes in Comput. Sci., 965 (1993), 386–397.

  76. A. J. Menezes, P. C. Oorschot, S. A. Vanstone: Handbook of Applied Cryptography, CRC Press, Boca Raton, 1996.

  77. R. A. Mollin: An Introduction to Cryptography, Chapman & Hall/CRC Press, Boca Raton, 2001.

  78. R. A. Mollin: RSA and Public-Key Cryptography, Chapman & Hall/CRC Press, Boca Raton, 2002.

  79. D. Müller: Ars Cryptographica, http://www.apprendre-en-ligne.net/crypto/menu/

  80. A. Narayanan, J. Bonneau, E. Felten, A. Miller: Bitcoin and Cryptocurrency Technologies, Princeton University Press, 2016.

  81. H. Niederreiter (Ed.): Coding Theory and Cryptology, World Scientific, Singapore, 2002.

  82. NIST: AES Round 2 Information, http://csrc.nist.gov/CryptoToolkit/aes/round2/round2.htm

  83. Operacijski sustavi 2: Radovi studenata iz područja računalne sigurnosti, Fakultet elektrotehnike i računarstva, Zagreb. http://os2.zemris.fer.hr

  84. C. Paar, J. Pelzl: Understanding Cryptography. A Textbook for Students and Practitioners, Springer, Berlin, 2010.

  85. W. Patterson: Mathematical Cryptology for Computer Scientists and Mathematicians, Rowman & Littlefield, Totowa, 1987.

  86. A. Pethö: Algebraische Algorithmen, Vieweg, Braunschweig, 1999.

  87. F. Piper, S. Murphy, Cryptography: A Very Short Introduction, Oxford University Press, Oxford, 2002.

  88. D. Pleskonjić, N. Maček, B. Đorđević, M. Carić, Sigurnost računarskih sistema i mreža, Mikro knjiga, Beograd, 2007.

  89. C. Pomerance (Ed.): Cryptology and Computational Number Theory, Proceedings of Symposia in Applied Mathematics, Vol. 42, American Mathematical Society, Providence, 1990.

  90. H. Riesel, Prime Numbers and Computer Methods for Factorization, Birkhäuser, Boston, 1994.

  91. K. H. Rosen: Elementary Number Theory and Its Applications, Addison-Wesley, Reading, 1993.

  92. M. Rosing: Implementing Elliptic Curve Cryptography, Manning, Greenwich, 1999.

  93. J. Rothe: Complexity Theory and Cryptography. An Introduction to Cryptocomplexity, Springer, Berlin, 2005.

  94. RSA Laboratories: Frequently Asked Questions About Today's Cryptography, version 4.1, 2000.

  95. A. Salomaa: Public-Key Cryptography, Springer-Verlag, Berlin, 1996.

  96. J. J. Savard: A Cryptographic Compendium, http://www.quadibloc.com/crypto/intro.htm

  97. B. Schneier: Applied Cryptography, John Wiley, New York, 1995.

  98. M. R. Schroeder: Number Theory in Science and Communication, Springer-Verlag, Berlin, 1997.

  99. M. H. Sherif: Protocols for Secure Electronic Commerce, CRC Press, Boca Raton, 2000.

  100. I. Shparlinski: Cryptographic Applications of Analytic Number Theory, Birkhauser, Basel, 2003.

  101. G. J. Simmons (Ed.): Contemporary Cryptology, The Science of Information Integrity, IEEE Press, Piscataway, 1992.

  102. S. Singh: The Code Book, Fourth Estate, London, 1999. (hrvatski prijevod: Šifre. Kratka povijest kriptografije, Mozaik knjiga, Zagreb, 2003)

  103. A. Sinkov: Elementary Cryptanalysis. A Mathematical Approach, The Mathematical Association of America, Washington, 1966.

  104. N. Smart: Cryptography. An Introduction, McGraw-Hill, New York, 2002.

  105. W. Stallings: Cryptography and Network Security. Principles and Practice, Prentice Hall, Upper Sadle River, 1999, 2005.

  106. M. Stamp, R. M. Low: Applied Cryptanalysis. Breaking Ciphers in the Real World, Wiley, New York, 2007.

  107. D. R. Stinson: Cryptography. Theory and Practice, CRC Press, Boca Raton, 1996, 2002, 2005.

  108. C. Swenson: Modern Cryptanalysis. Techniques for Advanced Code Breaking, Wiley, Indianapolis, 2008.

  109. TheBestVPN: The Beginner’s Guide to Cryptography, https://thebestvpn.com/cryptography/

  110. W. Trappe, L. C. Washington: Introduction to Cryptography with Coding Theory, Prentice Hall, Upper Sadle River, 2002.

  111. H. C. A. van Tilborg: Fundamentals of Cryptology. A Professional Reference and Interactive Tutorial, Kluwer, Boston, 2000.

  112. S. Vaudenay: A Classical Introduction to Cryptography. Applications for Communication Security, Springer, New York, 2006.

  113. S. Vaudenay (Ed.): Public Key Cryptography, PKC 2005, Lecture Notes in Comput. Sci. 3386, Springer, Berlin, 2005.

  114. E. R. Verheul, H. C. A. van Tilborg: Cryptanalysis of "less short" RSA secret exponents, Appl. Algebra Engrg. Comm. Computing, 8 (1997), 425-435.

  115. T. M. Virtue: Payment Card Industry Data Security Standard Handbook, Wiley, Hoboken, 2009.

  116. S. S. Wagstaff, Jr.: Cryptanalysis of Number Theoretic Ciphers, Chapman and Hall/CRC Press, Boca Raton, 2002.

  117. L. C. Washington: Elliptic Curves: Number Theory and Cryptography, CRC Press, Boca Raton, 2003, 2008.

  118. P. Wayner: Disappearing Cryptography: Information Hiding - Steganography and Watermarking, Morgan Kaufmann, San Francisco, 2002.

  119. M. Welschenbach: Cryptography in C and C++, Apress, Berkeley, 2001.

  120. M. J. Wiener, Cryptanalysis of short RSA secret exponents, IEEE Trans. Inform. Theory, 36 (1990), 553-558.

  121. Wikipedia: Cryptography, http://en.wikipedia.org/wiki/Category:Cryptography

  122. S. Y. Yan: Number Theory for Computing, Springer-Verlag, Berlin, 2002.

  123. S. Y. Yan: Cryptanalytic Attacks on RSA, Springer-Verlag, New York, 2008.

  124. S. Y. Yan: Computational Number Theory and Modern Cryptography, Wiley, Singapore, 2013.

  125. V. V. Yaschenko (Ed.): Cryptography: An Introduction, American Mathematical Society, Providence, 2002.

  126. S. Zeljkovic: Steganografija, math.e, 5 (2005).


[Sadržaj]
Web stranica kolegija Kriptografija Andrej Dujella - osobna stranica