-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathref.bib
More file actions
143 lines (120 loc) · 15.1 KB
/
ref.bib
File metadata and controls
143 lines (120 loc) · 15.1 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
\\
%% This BibTeX bibliography file was created using BibDesk.
%% https://bibdesk.sourceforge.io/
%% Created for Julian Privat at 2023-11-01 11:30:27 +0100
%% Saved with string encoding Unicode (UTF-8)
@article{eNumber,
abstract = {Quantum algorithms can greatly speed up computation in solving some classical problems, while the computational power of quantum computers should also be restricted by laws of physics. Due to quantum time-energy uncertainty relation, there is a lower limit of the evolution time for a given quantum operation, and therefore the time complexity must be considered when the number of serial quantum operations is particularly large. When the key length is about at the level of KB (encryption and decryption can be completed in a few minutes by using standard programs), it will take at least 50-100 years for NTC (Neighbor-only, Two-qubit gate, Concurrent) architecture ion-trap quantum computers to execute Shor's algorithm. For NTC architecture superconducting quantum computers with a code distance 27 for error-correcting, when the key length increased to 16 KB, the cracking time will also increase to 100 years that far exceeds the coherence time. This shows the robustness of the updated RSA against practical quantum computing attacks.},
author = {Li, Kai and Cai, Qing-yu},
date = {2021/08/01},
date-added = {2023-11-01 11:25:30 +0100},
date-modified = {2023-11-01 11:25:36 +0100},
id = {Li2021},
isbn = {1572-9575},
journal = {International Journal of Theoretical Physics},
number = {8},
pages = {2733--2744},
title = {Practical Security of RSA Against NTC-Architecture Quantum Computing Attacks},
volume = {60},
year = {2021},
bdsk-url-1 = {https://doi.org/10.1007/s10773-021-04789-x}}
@article{rsaOriginalPaper,
author = {Ron, Rivest and Adi, Shamir and Leonard, Adleman},
title = {A Method for Obtaining Digital Signatures and Public-Key Cryptosystems},
year = {1977},
bdsk-file-1 = {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}}
@book{Beutelspacher2015-jl,
address = {Wiesbaden, Germany},
author = {Beutelspacher, Albrecht and Schwenk, J{\"o}rg and Wolfenstetter, Klaus-Dieter},
edition = 6,
month = aug,
publisher = {Springer Fachmedien},
title = {Moderne Verfahren der Kryptographie},
year = 2015,
bdsk-file-1 = {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}}
@article{1055638,
author = {Diffie, W. and Hellman, M.},
doi = {10.1109/TIT.1976.1055638},
journal = {IEEE Transactions on Information Theory},
number = {6},
pages = {644-654},
title = {New directions in cryptography},
volume = {22},
year = {1976},
bdsk-file-1 = {YnBsaXN0MDDSAQIDBFxyZWxhdGl2ZVBhdGhZYWxpYXNEYXRhXxAyLi4vUXVlbGxlbi9QZGZzL05ldyBkaXJlY3Rpb25zIGluIGNyeXB0b2dyYXBoeS5wZGZPEQH4AAAAAAH4AAIAAAxNYWNpbnRvc2ggSEQAAAAAAAAAAAAAAAAAAADhGLJRQkQAAf////8fTmV3IGRpcmVjdGlvbnMgaW4gI0ZGRkZGRkZGLnBkZgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/////+FdiVgAAAAAAAAAAAABAAMAAAogY3UAAAAAAAAAAAAAAAAABFBkZnMAAgBtLzpVc2VyczpqdWxpYW5wcml2YXQ6TmV4dGNsb3VkOjAwX1NjaHVsZToyMDIyXzIzOjExX1dfU2VtaW5hcjpRdWVsbGVuOlBkZnM6TmV3IGRpcmVjdGlvbnMgaW4gY3J5cHRvZ3JhcGh5LnBkZgAADgBGACIATgBlAHcAIABkAGkAcgBlAGMAdABpAG8AbgBzACAAaQBuACAAYwByAHkAcAB0AG8AZwByAGEAcABoAHkALgBwAGQAZgAPABoADABNAGEAYwBpAG4AdABvAHMAaAAgAEgARAASAGtVc2Vycy9qdWxpYW5wcml2YXQvTmV4dGNsb3VkLzAwX1NjaHVsZS8yMDIyXzIzLzExX1dfU2VtaW5hci9RdWVsbGVuL1BkZnMvTmV3IGRpcmVjdGlvbnMgaW4gY3J5cHRvZ3JhcGh5LnBkZgAAEwABLwAAFQACABP//wAAAAgADQAaACQAWQAAAAAAAAIBAAAAAAAAAAUAAAAAAAAAAAAAAAAAAAJV}}
@book{schwenk2010sicherheit,
author = {Schwenk, J.},
address = {Wiesbaden, Germany},
isbn = {9783834808141},
edition = {6},
publisher = {Vieweg+Teubner Verlag},
title = {Sicherheit und Kryptographie im Internet: Von sicherer E-Mail bis zu IP-Verschl{\"u}sselung},
year = {2010},
bdsk-file-1 = {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}}
@book{teschl2008mathematik,
author = {Teschl, G. and Teschl, S.},
isbn = {9783540774310},
address = {Wiesbaden, Germany},
publisher = {Springer Berlin Heidelberg},
series = {eXamen.press},
title = {Mathematik f{\"u}r Informatiker: Band 1: Diskrete Mathematik und Lineare Algebra},
year = {2008},
bdsk-file-1 = {YnBsaXN0MDDSAQIDBFxyZWxhdGl2ZVBhdGhZYWxpYXNEYXRhbxBfAC4ALgAvAFEAdQBlAGwAbABlAG4ALwBQAGQAZgBzAC8ATQBhAHQAaABlAG0AYQB0AGkAawAgAGYAdQMIAHIAIABJAG4AZgBvAHIAbQBhAHQAaQBrAGUAcgAgAEIAYQBuAGQAIAAxACAARABpAHMAawByAGUAdABlACAATQBhAHQAaABlAG0AYQB0AGkAawAgAHUAbgBkACAATABpAG4AZQBhAHIAZQAgAEEAbABnAGUAYgByAGEALgBwAGQAZk8RAq4AAAAAAq4AAgAADE1hY2ludG9zaCBIRAAAAAAAAAAAAAAAAAAAAOEYslFCRAAB/////x9NYXRoZW1hdGlrIGafciBJbmYjRkZGRkZGRkYucGRmAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/////4V2I2QAAAAAAAAAAAAEAAwAACiBjdQAAAAAAAAAAAAAAAAAEUGRmcwACAJsvOlVzZXJzOmp1bGlhbnByaXZhdDpOZXh0Y2xvdWQ6MDBfU2NodWxlOjIwMjJfMjM6MTFfV19TZW1pbmFyOlF1ZWxsZW46UGRmczpNYXRoZW1hdGlrIGZ1zIhyIEluZm9ybWF0aWtlciBCYW5kIDEgRGlza3JldGUgTWF0aGVtYXRpayB1bmQgTGluZWFyZSBBbGdlYnJhLnBkZgAADgCgAE8ATQBhAHQAaABlAG0AYQB0AGkAawAgAGYAdQMIAHIAIABJAG4AZgBvAHIAbQBhAHQAaQBrAGUAcgAgAEIAYQBuAGQAIAAxACAARABpAHMAawByAGUAdABlACAATQBhAHQAaABlAG0AYQB0AGkAawAgAHUAbgBkACAATABpAG4AZQBhAHIAZQAgAEEAbABnAGUAYgByAGEALgBwAGQAZgAPABoADABNAGEAYwBpAG4AdABvAHMAaAAgAEgARAASAJlVc2Vycy9qdWxpYW5wcml2YXQvTmV4dGNsb3VkLzAwX1NjaHVsZS8yMDIyXzIzLzExX1dfU2VtaW5hci9RdWVsbGVuL1BkZnMvTWF0aGVtYXRpayBmdcyIciBJbmZvcm1hdGlrZXIgQmFuZCAxIERpc2tyZXRlIE1hdGhlbWF0aWsgdW5kIExpbmVhcmUgQWxnZWJyYS5wZGYAABMAAS8AABUAAgAT//8AAAAIAA0AGgAkAOUAAAAAAAACAQAAAAAAAAAFAAAAAAAAAAAAAAAAAAADlw==}}
@article{rowland,
author = {Henry Rowland},
month = {dec},
title = {The Role Of Prime Numbers in RSA Cryptosystems},
year = {2016},
bdsk-file-1 = {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}}
@article{bsireco,
author = {BSI},
title = {Cryptographic Mechanisms: Recommendations and Key Lengths},
version = {2023-01},
bdsk-file-1 = {YnBsaXN0MDDSAQIDBFxyZWxhdGl2ZVBhdGhZYWxpYXNEYXRhXxBMLi4vUXVlbGxlbi9QZGZzL0NyeXB0b2dyYXBoaWMgTWVjaGFuaXNtcyBSZWNvbW1lbmRhdGlvbnMgYW5kIEtleSBMZW5ndGhzLnBkZk8RAmAAAAAAAmAAAgAADE1hY2ludG9zaCBIRAAAAAAAAAAAAAAAAAAAAOEYslFCRAAB/////x9DcnlwdG9ncmFwaGljIE1lY2gjRkZGRkZGRkYucGRmAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/////4Ti9xQAAAAAAAAAAAAEAAwAACiBjdQAAAAAAAAAAAAAAAAAEUGRmcwACAIcvOlVzZXJzOmp1bGlhbnByaXZhdDpOZXh0Y2xvdWQ6MDBfU2NodWxlOjIwMjJfMjM6MTFfV19TZW1pbmFyOlF1ZWxsZW46UGRmczpDcnlwdG9ncmFwaGljIE1lY2hhbmlzbXMgUmVjb21tZW5kYXRpb25zIGFuZCBLZXkgTGVuZ3Rocy5wZGYAAA4AegA8AEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABNAGUAYwBoAGEAbgBpAHMAbQBzACAAUgBlAGMAbwBtAG0AZQBuAGQAYQB0AGkAbwBuAHMAIABhAG4AZAAgAEsAZQB5ACAATABlAG4AZwB0AGgAcwAuAHAAZABmAA8AGgAMAE0AYQBjAGkAbgB0AG8AcwBoACAASABEABIAhVVzZXJzL2p1bGlhbnByaXZhdC9OZXh0Y2xvdWQvMDBfU2NodWxlLzIwMjJfMjMvMTFfV19TZW1pbmFyL1F1ZWxsZW4vUGRmcy9DcnlwdG9ncmFwaGljIE1lY2hhbmlzbXMgUmVjb21tZW5kYXRpb25zIGFuZCBLZXkgTGVuZ3Rocy5wZGYAABMAAS8AABUAAgAT//8AAAAIAA0AGgAkAHMAAAAAAAACAQAAAAAAAAAFAAAAAAAAAAAAAAAAAAAC1w==}}
@article{frauenhofer,
author = {Schuller, Anton and Trottenberg, Ulrich and Wienands, Roman and Koziol, Michael and Schneider, Rebekka},
month = {feb},
title = {RSA -- Primzahlen zur Verschlusselung von Nachrichten},
version = {1.2},
year = {2017},
bdsk-file-1 = {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}}
@online{hwlang,
author = {Prof. Dr. Hans Werner, Lang},
title = {Multiplikativ inverses Element modulo n},
url = {https://hwlang.de/krypto/grund/inverses-element.htm},
urldate = {2023-07-06},
bdsk-url-1 = {https://hwlang.de/krypto/grund/inverses-element.htm}}
@online{hwlang_euklid,
author = {Prof. Dr. Hans Werner, Lang},
title = {Euklidischer Algorithmus},
url = {https://hwlang.de/krypto/algo/euklid.htm},
urldate = {2023-07-06},
bdsk-url-1 = {https://hwlang.de/krypto/algo/euklid.htm}}
@online{other_keys,
title = {Comparing SSH Keys - RSA, DSA, ECDSA, or EdDSA?},
url = {https://goteleport.com/blog/comparing-ssh-keys/},
urldate = {2023-11-01}
}
@article{mono,
author = {Virtual Labs},
title = {Mono alphabetic substitution cipher},
url = {https://cse29-iiith.vlabs.ac.in/exp/substitution-cipher/docs/monoalphacipher.pdf},
urldate = {2023-10-05},
bdsk-url-1 = {https://cse29-iiith.vlabs.ac.in/exp/substitution-cipher/docs/monoalphacipher.pdf},
bdsk-file-1 = {YnBsaXN0MDDSAQIDBFxyZWxhdGl2ZVBhdGhZYWxpYXNEYXRhXxA3Li4vUXVlbGxlbi9QZGZzL01vbm8gYWxwaGFiZXRpYyBzdWJzdGl0dXRpb24gY2lwaGVyLnBkZk8RAgoAAAAAAgoAAgAADE1hY2ludG9zaCBIRAAAAAAAAAAAAAAAAAAAAOEYslFCRAAB/////x9Nb25vIGFscGhhYmV0aWMgc3UjRkZGRkZGRkYucGRmAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/////4Va+YwAAAAAAAAAAAAEAAwAACiBjdQAAAAAAAAAAAAAAAAAEUGRmcwACAHIvOlVzZXJzOmp1bGlhbnByaXZhdDpOZXh0Y2xvdWQ6MDBfU2NodWxlOjIwMjJfMjM6MTFfV19TZW1pbmFyOlF1ZWxsZW46UGRmczpNb25vIGFscGhhYmV0aWMgc3Vic3RpdHV0aW9uIGNpcGhlci5wZGYADgBQACcATQBvAG4AbwAgAGEAbABwAGgAYQBiAGUAdABpAGMAIABzAHUAYgBzAHQAaQB0AHUAdABpAG8AbgAgAGMAaQBwAGgAZQByAC4AcABkAGYADwAaAAwATQBhAGMAaQBuAHQAbwBzAGgAIABIAEQAEgBwVXNlcnMvanVsaWFucHJpdmF0L05leHRjbG91ZC8wMF9TY2h1bGUvMjAyMl8yMy8xMV9XX1NlbWluYXIvUXVlbGxlbi9QZGZzL01vbm8gYWxwaGFiZXRpYyBzdWJzdGl0dXRpb24gY2lwaGVyLnBkZgATAAEvAAAVAAIAE///AAAACAANABoAJABeAAAAAAAAAgEAAAAAAAAABQAAAAAAAAAAAAAAAAAAAmw=}}
@misc{wikipedia_keygen,
url = {https://upload.wikimedia.org/wikipedia/commons/thumb/3/3f/Public_key_making.svg/440px-Public_key_making.svg.png},
urldate = {2023-09-26},
bdsk-url-1 = {https://upload.wikimedia.org/wikipedia/commons/thumb/3/3f/Public_key_making.svg/440px-Public_key_making.svg.png}}
@misc{wikipedia_enc_dec,
url = {https://upload.wikimedia.org/wikipedia/commons/thumb/a/a2/Orange_blue_public_key_cryptography_de.svg/440px-Orange_blue_public_key_cryptography_de.svg.png},
urldate = {2023-09-26},
bdsk-url-1 = {https://upload.wikimedia.org/wikipedia/commons/thumb/a/a2/Orange_blue_public_key_cryptography_de.svg/440px-Orange_blue_public_key_cryptography_de.svg.png}}
@misc{digitalsignature,
url = {https://www.docusign.de/static-c-assets/Dokument_digitale_Signatur.png},
urldate = {2023-09-26},
bdsk-url-1 = {https://www.docusign.de/static-c-assets/Dokument_digitale_Signatur.png}}
@misc{rsatime,
url = {https://www.semanticscholar.org/paper/A-Comparison-of-Cryptographic-Algorithms%3A-DES%2C-AES%2C-Wahid-Ali/6133bb355672b8a6c4f1c410bc41abc6a94162a7/figure/7},
urldate = {2023-10-13},
bdsk-url-1 = {https://www.semanticscholar.org/paper/A-Comparison-of-Cryptographic-Algorithms%3A-DES%2C-AES%2C-Wahid-Ali/6133bb355672b8a6c4f1c410bc41abc6a94162a7/figure/7}}