Abstract
Cryptographic long-term security is needed, but difficult to achieve. Use flexible cryptographic tools, and have replacements ready.
- Buchmann, J. et al. An evaluated certification services system for the German national root CA---Legally binding and trustworthy transactions in e-business and e-government. In Proceedings of The 2005 International Conference on e-Business, Enterprise Information Systems, e-Government, and Outsourcing (EEE`05), 103--108.Google Scholar
- Buchmann, J. and Ludwig, C. Practical lattice basis sampling reduction. To appear in Proceedings of the 7th Algorithmic Number Theory Symposium (ANTS-VII). Google ScholarDigital Library
- Buchmann, J. et al. Post quantum signatures; eprint.iacr.org/2004/297.pdf.Google Scholar
- Coronado, C. Provably secure and practical signature schemes. Doctoral Thesis, Technische Universität Darmstadt, 2005; elib.tu-darmstadt.de/diss/000642Google Scholar
- FlexiProvider---A Toolkit for the Java Cryptography Architecture (JCA/JCE); www.flexiprovider.de.Google Scholar
- German Federal Ministry of Health and Social Security. Information on the electronic health card. www.die-gesundheitsreform.de/presse/publikationen/pdf/flyer_elektronische_gesundheitskarte_en.pdf.Google Scholar
- Lenstra, A.K. and Verheul, E.R. Selecting cryptographic key sizes. Journal of Cryptology: The Journal of the International Association for Cryptologic Research 14, 4 (2001), 255--293.Google ScholarDigital Library
- Maseberg, J.S. Fail-safe konzept für public-key infrastrukturen. Doctoral Thesis, Technische Universität Darmstadt, 2002.Google Scholar
- Rivest, R., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 Feb. 1978), 120--126. Google ScholarDigital Library
- Shor, P.W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. In S. Goldwasser, Ed., Proceedings of the 35th Annual Symposium on foundations of Computer Science (FOCS 1994), 124--134Google ScholarDigital Library
Index Terms
- Perspectives for cryptographic long-term security
Recommendations
Security analysis of three cryptographic schemes from other cryptographic schemes
CISC'05: Proceedings of the First SKLOIS conference on Information Security and CryptologyRelations between various cryptographic schemes make it possible to build a new cryptographic scheme from (some components of) other kinds of cryptographic schemes. Recently, three new schemes are proposed by exploiting these relationships: a group ...
Comments