organize

[Imported from Trac: page Bibliography, version 67]
zooko 2012-08-08 07:10:04 +00:00
parent 39c26b6e83
commit cf2fc3bb03

@ -6,20 +6,17 @@ Here are some papers that are potentially of interest.
### Symmetric Primitives ### Symmetric Primitives
#### Hash Functions
* [On the Security of Hash Function Combiners](http://tuprints.ulb.tu-darmstadt.de/2094/1/thesis.lehmann.pdf) Anja Lehman's dissertation on hash function combiners
#### Ciphers #### Ciphers
* [Chosen-Ciphertext Security of Multiple Encryption](http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.65.8477) by Dodis, Katz 2005 ; combining two or more ciphers together
* [Salsa20 Design](http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.9522) a fast and secure cipher * [Salsa20 Design](http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.9522) a fast and secure cipher
* [Salsa20 Security Arguments](http://cr.yp.to/snuffle.html#security) why Salsa20 is probably safe against this and that threat * [Salsa20 Security Arguments](http://cr.yp.to/snuffle.html#security) why Salsa20 is probably safe against this and that threat
* [The European Stream Cipher project](http://www.ecrypt.eu.org/stream) which evaluated many stream ciphers including Salsa20 * [The European Stream Cipher project](http://www.ecrypt.eu.org/stream) which evaluated many stream ciphers including Salsa20
##### Cipher Combiners a.k.a. Multiple Encryption a.k.a. Cascade Ciphers ##### Combiners a.k.a. Multiple Encryption a.k.a. Cascade Ciphers
* [John Ritter's web page on the topic](http://www.ciphersbyritter.com/GLOSSARY.HTM#MultipleEncryption) * [On the Security of Hash Function Combiners](http://tuprints.ulb.tu-darmstadt.de/2094/1/thesis.lehmann.pdf) Anja Lehman's dissertation on hash function combiners
* [web page on multiple encryption](http://www.ciphersbyritter.com/GLOSSARY.HTM#MultipleEncryption) by John Ritter
* [Chosen-Ciphertext Security of Multiple Encryption](http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.65.8477) by Dodis, Katz 2005 ; combining two or more ciphers together
### Public Key Cryptography ### Public Key Cryptography