2013-05-07 22:36:03 +02:00
|
|
|
\section{Literaturverzeichnis}
|
|
|
|
|
|
|
|
\textbf{Beutelspacher, A., Neumann, H. B. und Schwarzpaul, T.:}\\
|
|
|
|
Kryptografie in Theorie und Praxis.\\
|
|
|
|
Wiesbaden, Vieweg+Teubner Verlag, 2005.
|
|
|
|
|
|
|
|
\textbf{Brill, M.:}\\
|
|
|
|
Mathematik für Informatiker.\\
|
|
|
|
Wien, Hanser Verlag, 2004.
|
|
|
|
|
|
|
|
\textbf{Forster, O.:}\\
|
|
|
|
Algorithmische Zahlentheorie.\\
|
|
|
|
Wiesbaden, Vieweg Braunschweig/Wiesbaden, 1996.
|
|
|
|
|
|
|
|
\textbf{Pethö, A. und Pohst, M.:}\\
|
|
|
|
Algebraische Algorithmen.\\
|
|
|
|
Wiesbaden, Vieweg+Teubner Verlag, 1999.
|
|
|
|
|
|
|
|
\textbf{Reiss, K. und Schmieder, G.:}\\
|
|
|
|
Basiswissen Zahlentheorie.\\
|
|
|
|
Berlin Heidelberg, Springer-Verlag, 2007.
|
|
|
|
|
|
|
|
\textbf{Rothe, J.:}\\
|
|
|
|
Komplexitätstheorie und Kryptologie.\\
|
|
|
|
Berlin, Springer, 2008.
|
|
|
|
|
|
|
|
\textbf{Wrixon, F. B.:}\\
|
|
|
|
Geheimsprachen.\\
|
|
|
|
Königswinter, Tandem Verlag GmbH, 2006.
|
|
|
|
|
|
|
|
\newpage
|
|
|
|
\subsection*{Internetadressen}
|
2013-05-12 15:28:03 +02:00
|
|
|
{\footnotesize
|
|
|
|
\begin{tabular}{lp{12cm}}
|
|
|
|
{[Berendt]} &
|
|
|
|
\parbox{12cm}{Berendt, Gerhard.\\
|
|
|
|
Seminar über Zahlentheorie/Kryptographie.\hfill10.04.2008\\
|
2013-05-12 15:39:37 +02:00
|
|
|
URL: http://userpage.fu-berlin.de/$\sim$berendt/lehre2008\_neu.html\\
|
2013-05-12 15:28:03 +02:00
|
|
|
{[Stand: 09.01.2010]}} \\\\
|
|
|
|
{[Birthälmer]} &
|
|
|
|
\parbox{12cm}{Birthälmer, Melita.\\
|
|
|
|
Kryptografie\hfill13.04.2008\\
|
|
|
|
URL: http://www.birthaelmer.com/fileadmin/birthaelmer/portfolio/Kryptografie\_web.pdf\\
|
|
|
|
{[Stand: 09.01.2010]}} \\\\
|
|
|
|
{[msri]} &
|
|
|
|
\parbox{12cm}{SIAM News.\\
|
|
|
|
Still Guarding Secrets after Years of Attacks, RSA Earns Accolades for its Founders.\hfill17.06.2003\\
|
|
|
|
URL: http://www.msri.org/people/members/sara/articles/rsa.pdf\\
|
|
|
|
{[Stand: 09.01.2010]}} \\\\
|
|
|
|
{[Paixão]} &
|
|
|
|
\parbox{12cm}{Paixão, Cesar A. M.. \\
|
|
|
|
An efficient variant of the RSA cryptosystem.\hfill11.08.2009\\
|
|
|
|
URL: http://eprint.iacr.org/2003/159.pdf\\
|
|
|
|
{[Stand: 26.11.2009]}} \\\\
|
|
|
|
{[Petitcolas]} &
|
|
|
|
\parbox{12cm}{Petitcolas, Fabien. \\
|
|
|
|
DESIDERATA DE LA CRYPTOGRAPHIE MILITAIRE.\hfill20.06.2009\\
|
|
|
|
URL: http://www.petitcolas.net/fabien/kerckhoffs/la\_cryptographie\_militaire\_i.htm\#desiderata \\
|
|
|
|
{[Stand: 09.01.2010]}} \\\\
|
|
|
|
{[RSA-2190]} &
|
|
|
|
\parbox{12cm}{RSA Laboratories.\\
|
|
|
|
What are the best factoring methods in use today?\hfill03.11.2009\\
|
|
|
|
URL: http://www.rsa.com/rsalabs/node.asp?id=2190\\
|
|
|
|
{[Stand: 09.01.2010]}} \\\\
|
|
|
|
{[RSA-2191]} &
|
|
|
|
\parbox{12cm}{RSA Laboratories.\\
|
|
|
|
What improvements are likely in factoring capability?\hfill03.11.2009\\
|
|
|
|
URL: http://www.rsa.com/rsalabs/node.asp?id=2191\\
|
|
|
|
{[Stand: 09.01.2010]}} \\\\
|
|
|
|
{[RSA-2216]} &
|
|
|
|
\parbox{12cm}{RSA Laboratories.\\
|
|
|
|
What would it take to break the RSA cryptosystem?\hfill03.11.2009\\
|
|
|
|
URL: http://www.rsa.com/rsalabs/node.asp?id=2216\\
|
|
|
|
{[Stand: 09.01.2010]}} \\\\
|
|
|
|
{[RSA-2964]} &
|
|
|
|
\parbox{12cm}{RSA Laboratories.\\
|
|
|
|
RSA-640 factored!\hfill03.01.2010\\
|
|
|
|
URL: http://www.rsa.com/rsalabs/node.asp?id=2964\\
|
|
|
|
{[Stand: 09.01.2010]}} \\\\
|
|
|
|
{[wiki-RSA]} &
|
|
|
|
\parbox{12cm}{Ladenthin, Bernhard.\\
|
|
|
|
RSA-Kryptosystem.\hfill08.01.2010\\
|
|
|
|
URL: http://de.wikipedia.org/wiki/RSA-Kryptosystem\#Erzeugung\_des\_öffentlichen\_und\_privaten\_Schlüssels\\
|
|
|
|
{[Stand: 09.01.2010]}}
|
2013-05-08 17:39:50 +02:00
|
|
|
\end{tabular}
|
2013-05-12 15:28:03 +02:00
|
|
|
}
|