Skip to main content
Top

2015 | OriginalPaper | Chapter

7. Vermischtes

Authors : Albrecht Beutelspacher, Jörg Schwenk, Klaus-Dieter Wolfenstetter

Published in: Moderne Verfahren der Kryptographie

Publisher: Springer Fachmedien Wiesbaden

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Zusammenfassung

In diesem abschließenden Kapitel behandeln wir vier wichtige Themen, nämlich Schlüsselmanagement, Angriffe und Protokolle, die merkwürdigen und bemerkenswerten Oblivious‐Transfer‐Protokolle und die heiß diskutierte Quantenkryptographie.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
[BAN89]
go back to reference Burrows, M., Abadi, M., Needham, R.M.: A Logic of Authentication Rep. 39. Digital Equipment Corporation Systems Research Center, Palo Alto, Calif., Feb. 1989. (1989)CrossRef Burrows, M., Abadi, M., Needham, R.M.: A Logic of Authentication Rep. 39. Digital Equipment Corporation Systems Research Center, Palo Alto, Calif., Feb. 1989. (1989)CrossRef
[BAN90]
go back to reference Burrows, M., Abadi, M., Needham, R.M.: A Logic of Authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)CrossRef Burrows, M., Abadi, M., Needham, R.M.: A Logic of Authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)CrossRef
[BB84]
go back to reference Bennet, C.H., Brassard, G., Quantum Cryptography: Quantum Cryptography: Public Key Distribution and Coin Tossing. Proc. IEEE Conf. on Computers, Systems and Signal Processing, S. 175–179 (1984) Bennet, C.H., Brassard, G., Quantum Cryptography: Quantum Cryptography: Public Key Distribution and Coin Tossing. Proc. IEEE Conf. on Computers, Systems and Signal Processing, S. 175–179 (1984)
[BB85]
go back to reference Bennet, C.H., Brassard, G.: An Update on Quantum Cryptography. CRYPTO ’84 LNCS, Bd. 196. Springer, S. 475–480 (1985) Bennet, C.H., Brassard, G.: An Update on Quantum Cryptography. CRYPTO ’84 LNCS, Bd. 196. Springer, S. 475–480 (1985)
[BBE92]
go back to reference Bennet, C.H., Brassard, G., Ekert, K.: Quanten-Kryptographie. Spektrum der Wissenschaft, 96–104 (1992) Bennet, C.H., Brassard, G., Ekert, K.: Quanten-Kryptographie. Spektrum der Wissenschaft, 96–104 (1992)
[Bra88]
go back to reference Brassard, G.: Modern Cryptology. Springer LNCS 325 Brassard, G.: Modern Cryptology. Springer LNCS 325
[Cre87]
go back to reference Crepeau, C.: Equivalence between two flavours of Oblivious Transfer. Proc. CRYPTO ’87, Springer LNCS 293, 350–354 Crepeau, C.: Equivalence between two flavours of Oblivious Transfer. Proc. CRYPTO ’87, Springer LNCS 293, 350–354
[EGL85]
go back to reference Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Comm. ACM 28(6), 637–647 (1985)MathSciNetCrossRef Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Comm. ACM 28(6), 637–647 (1985)MathSciNetCrossRef
[Kil88]
go back to reference Kilian, J.: Founding Cryptography on Oblivious Transfer. Proc. 20. STOC 1988, 20–31 Kilian, J.: Founding Cryptography on Oblivious Transfer. Proc. 20. STOC 1988, 20–31
[KMM94]
go back to reference Kemmerer, R., Meadows, C., Millen, J.: Three Systems for Cryptographic Protocol Analysis. J. Cryptology 7(2), 79–130 (1994)CrossRefMATH Kemmerer, R., Meadows, C., Millen, J.: Three Systems for Cryptographic Protocol Analysis. J. Cryptology 7(2), 79–130 (1994)CrossRefMATH
[KNT91]
go back to reference Kohl, J.-T., Neuman, B.C., Ts’o, T.Y.: The Evolution of the Kerberos Authentication Service. Proc. 1991 EurOpen Conference, Tromsø, Norway Kohl, J.-T., Neuman, B.C., Ts’o, T.Y.: The Evolution of the Kerberos Authentication Service. Proc. 1991 EurOpen Conference, Tromsø, Norway
[NS78]
go back to reference Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. Comm. ACM 21(12), 993–999 (1978)CrossRefMATH Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. Comm. ACM 21(12), 993–999 (1978)CrossRefMATH
[OR87]
go back to reference Otway, D., Ries, O.: Efficient and Timely Mutual Authentication. Operating Systems Review 21(1), 8–10 (1987)CrossRef Otway, D., Ries, O.: Efficient and Timely Mutual Authentication. Operating Systems Review 21(1), 8–10 (1987)CrossRef
[Pre93]
go back to reference Preneel, B.: Standardization of Cryptographic Techniques. In: Preneel, B., Govaerts, R., Vandewalle, J. (Hrsg.) Computer Security and Industrial Cryptography LNCS, Bd. 741, S. 162–173. Springer (1993)CrossRef Preneel, B.: Standardization of Cryptographic Techniques. In: Preneel, B., Govaerts, R., Vandewalle, J. (Hrsg.) Computer Security and Industrial Cryptography LNCS, Bd. 741, S. 162–173. Springer (1993)CrossRef
[Sal90]
[Sim94]
go back to reference Simmons, G.J.: Cryptanalysis and Protocol Failures. Comm. ACM 37(11), 56–65 (1994)CrossRef Simmons, G.J.: Cryptanalysis and Protocol Failures. Comm. ACM 37(11), 56–65 (1994)CrossRef
[Sim94a]
[TMN90]
go back to reference Tatebayashi, M., Matsuzaki, N., Newman, D.B.: Key Distribution Protocol for Digital Mobile Communication Systems. CRYPTO ’89, Springer LNCS 435, 324–333 Tatebayashi, M., Matsuzaki, N., Newman, D.B.: Key Distribution Protocol for Digital Mobile Communication Systems. CRYPTO ’89, Springer LNCS 435, 324–333
[X.509]
go back to reference ITU-T Recommendation X.509 (1997) | ISO/IEC 9594-8:1997, Information technology – Open Systems Interconnection – The Directory: Authentication framework ITU-T Recommendation X.509 (1997) | ISO/IEC 9594-8:1997, Information technology – Open Systems Interconnection – The Directory: Authentication framework
Metadata
Title
Vermischtes
Authors
Albrecht Beutelspacher
Jörg Schwenk
Klaus-Dieter Wolfenstetter
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-8348-2322-9_7

Premium Partner