% This file was created with JabRef 2.4.1.
% Encoding: UTF8

@TECHREPORT{usb_flash_enc,
  author = {P.J. Bakker et al.},
  title = {Investigating "secure" USB sticks},
  year = {2007},
  month = {November},
  owner = {Peter Peresini},
  timestamp = {2010.04.02}
}

@ARTICLE{rsa-lsb,
  author = {W. Alexi and B. Chor and O. Goldreich and C.P. Schnorr},
  title = {RSA/Rabin Bits are 1/2 + 1/Poly(Log N) Secure},
  journal = {25th Annual Symposium on Foundations of Computer Science (FOCS 1984)},
  year = {1984},
  pages = {449-457},
  owner = {Peter Peresini},
  timestamp = {2010.04.02}
}

@CONFERENCE{pss,
  author = {Mihir Bellare and Phillip Rogaway},
  title = {The Exact Security of Digital Signatures - How to Sign with RSA and
	Rabin},
  booktitle = {Advances in Cryptology – Eurocrypt 96 Proceedings},
  year = {1996},
  note = {Fixme: entry type},
  owner = {Peter Peresini},
  timestamp = {2010.02.26}
}

@INPROCEEDINGS{cocks,
  author = {Clifford Cocks},
  title = {An Identity Based Encryption Scheme Based on Quadratic Residue},
  booktitle = {Proceedings of the 8th IMA International Conference on Cryptography
	and Coding},
  year = {2001},
  owner = {Peter Peresini},
  timestamp = {2010.03.31}
}

@TECHREPORT{ot_equiv,
  author = {Claude Crepau},
  title = {Equivalence Between Two Flawours of Oblivious Transfer},
  institution = {Laboratory for Computer Scienice,
	
	M.I.T},
  note = {FIXME: neni to article, ale neviem presne co za typ to je},
  owner = {Peter Peresini},
  timestamp = {2010.02.20}
}

@MISC{nig,
  author = {Ivan Damgard},
  title = {CPT Notes, Graph Non-Isomorphism,
	
	Zero-Knowledge for NP and Exercises},
  howpublished = {\url{www.daimi.au.dk/~ivan/CPT1.pdf }},
  owner = {Peter Peresini},
  timestamp = {2010.02.21}
}

@ARTICLE{randommap,
  author = {Philippe Flajolet and Andrew M. Odlyzko},
  title = {Random mapping statistics},
  journal = {Advances in Cryptology - EUROCRYPT ‘89},
  year = {89},
  pages = {229-354},
  owner = {Peter Peresini},
  timestamp = {2010.03.01}
}

@ARTICLE{designated_verifier2,
  author = {Fuw-Yi Yang, Cai-Ming Liao},
  title = {A Provably Secure and Efficient Strong Designated Verifer Signature
	Scheme},
  journal = {International Journal of Network Security},
  year = {2010},
  volume = {10},
  pages = {223-227},
  number = {3},
  month = {May},
  owner = {Peter Peresini},
  timestamp = {2010.05.03}
}

@ARTICLE{hellman1980,
  author = {Hellman, M.},
  title = {A cryptanalytic time-memory trade-off},
  journal = {IEEE Transactions on Information Theory},
  year = {1980},
  volume = {26},
  pages = {401--406},
  number = {4},
  month = {July}
}

@ARTICLE{qip-pspace,
  author = {Rahul Jain and Zhengfeng Ji and Sarvagya Upadhyay and John Watrous},
  title = {QIP = PSPACE},
  year = {2009},
  month = {August},
  owner = {Peter Peresini},
  timestamp = {2010.04.02}
}

@MISC{ecdsa,
  author = {Don Johnson and Alfred Menezes and Scott Vanstone},
  title = {The Elliptic Curve Digital Signature Algorithm (ECDSA)},
  owner = {Peter Peresini},
  timestamp = {2010.04.11}
}

@INPROCEEDINGS{Joux04,
  author = {Antoine Joux},
  title = {Multicollisions in Iterated Hash Functions. Application to Cascaded
	Constructions},
  booktitle = {CRYPTO},
  year = {2004},
  pages = {306-316},
  bibsource = {DBLP, http://dblp.uni-trier.de},
  ee = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=3152{\&}spage=306}
}

@ARTICLE{stanek,
  author = {Martin Stanek, Ľubica Staneková},
  title = {Generalized Merkle trees and their applications},
  journal = {Tatra Mountains},
  year = {2007},
  volume = {37},
  pages = {35-48},
  owner = {Peter Peresini},
  timestamp = {2010.04.13}
}

@ARTICLE{merkle,
  author = {R Merkle},
  title = {A certified digital signature},
  journal = {Advances in Cryptology},
  year = {1989},
  owner = {Peter Peresini},
  timestamp = {2010.04.12}
}

@INCOLLECTION{Oechslin2003Making,
  author = {Oechslin, Philippe},
  title = {Making a Faster Cryptanalytic Time-Memory Trade-Off},
  year = {2003},
  pages = {617--630},
  journal = {Advances in Cryptology - CRYPTO 2003},
  posted-at = {2009-05-26 12:29:21},
  url = {http://www.springerlink.com/content/u9gxwd29p2tnx3wl}
}

@ARTICLE{designated_verifier_stanek,
  author = {Michal Rjaško and Martin Stanek},
  title = {On Designated Verifier Signature Schemes},
  year = {2010},
  note = {\url{http://eprint.iacr.org/}},
  howpublished = {Cryptology ePrint Archive, Report 2010/191}
}

@MISC{drive_enc,
  author = {Juergen Schmidt},
  title = {NIST-certified USB Flash drives with hardware encryption cracked},
  howpublished = {\url{http://www.h-online.com/security/news/item/NIST-certified-USB-Flash-drives-with-hardware-encryption-cracked-895308.html}},
  month = {January},
  year = {2010},
  note = {Online accessed 2.4.2010},
  owner = {Peter Peresini},
  timestamp = {2010.04.02}
}

@ARTICLE{designated_verifier,
  author = {Shahrokh Saeednia, Steve Kremer, Olivier Markowitch},
  title = {An Efficient Strong Designated Verifier Signature Scheme},
  journal = {Information Security and Cryptology},
  year = {2003},
  pages = {40-54},
  owner = {Peter Peresini},
  timestamp = {2010.05.03}
}

@ARTICLE{ip-pspace,
  author = {Adi Shami},
  title = {IP = PSPACE},
  journal = {Journal of the ACM (JACM)},
  year = {1992},
  volume = {39},
  pages = {869 - 877},
  month = {October},
  owner = {Peter Peresini},
  timestamp = {2010.04.02}
}

@TECHREPORT{merkle_iter,
  author = {Michael Szydlo},
  title = {Merkle Tree Traversal in Log Space and Time},
  institution = {RSA Laboratories, Bedford, MA 01730},
  note = {FIXME: je to techreport alebo iny typ clanku?},
  owner = {Peter Peresini},
  timestamp = {2010.04.13}
}

@ARTICLE{birthday,
  author = {David Wagner},
  title = {A generalized birthday problem},
  journal = {Advances in Cryptology - CRYPTO ‘02},
  year = {2002},
  owner = {Vlado Boza},
  timestamp = {2010.04.01}
}

@INPROCEEDINGS{yao,
  author = {A. C. Yao},
  title = {Protocols for Secure Computations (extended abstract)},
  year = {1982},
  pages = {160-164},
  organization = {Proceedings of the 21st Annual IEEE Symposium on the Foundations
	of Computer Science},
  owner = {Peter Peresini},
  timestamp = {2010.02.20}
}

@STANDARD{fips186,
  title = {Digital Signature Standard (DSS)},
  organization = {FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION},
  institution = {National Institute of Standards and Technology},
  month = {June},
  year = {2009},
  owner = {Peter Peresini},
  timestamp = {2010.04.11}
}

@comment{jabref-meta: selector_publisher:}

@comment{jabref-meta: selector_author:}

@comment{jabref-meta: selector_journal:}

@comment{jabref-meta: selector_keywords:}

