Reading List -

(The paper list is subject to change! Please check regularly for additions/deletions during the semester.)
  • [Garfinkel04a] Simson Garfinkel. Is Encryption Doomed? Technology Review (MIT's Magazine of Innovation), September 2004. ACM/IEEE Transactions on Networking, 9(3), June 2001.
  • [Daemon99a] J. Daemen and V. Rijmen. AES Proposal: Rijndael. (Version 2 of the original submission for the AES competition.)

  • [AES01a] Federal Information Processing Standards Publication 197. Specification for the Advanced Encryption Standard (AES).
Hash Functions
  • [Wang05a] X. Wang and H. Yu. How to Break MD5 and Other Hash Functions. In Proceedings of EUROCRYPT, 2005.

  • [Lenstra05a] A. Lenstra and B. de Weger. On the Possibility of Constructing Meaningful Hash Collisions for Public Keys. In Proceedings of the 10th Australasian Conference on Information Security and Privacy, Brisbane, Australia, July 2005.

   [Please see copyright regarding copying.]