m, "NESSIE Security Report," NESSIE Deliverable D20, October 2002, available from [19]. p> [25] B. Preneel, B. Van Rompay, B. Van Rompay, S.B. ВЁ Ors, A. Biryukov, L. Granboulan, E. Dottax, M. Dichtl, M. Schafheutle, P. Serf, S. Pyka, E. Biham, O. Dunkelman, J. Stolin, M. Ciet, J-J. Quisquater, F. Sica, H. Raddum, M. Parker, "Performance of Optimized Implementations of the NESSIE Primitives," NESSIE Deliverable D21, October 2002, available from [19]. p> [26] RIPE, "Integrity Primitives for Secure Information Systems. Final Report of RACE Integrity Primitives Evaluation (RIPE-RACE 1040), "LNCS 1007 , A. Bosselaers, B. Preneel, Eds., Springer-Verlag, 1995. p> [27] P.W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," Proc. 35nd Annual Symposium on Foundations of Computer Science , S. Goldwasser, Ed., IEEE Computer Society Press, 1994, pp. 124-134. p> [28] V. Shoup, "OAEP reconsidered," Advances in Cryptology, Proceedings Crypto 01, LNCS 2139 , J. Kilian, Ed., Springer-Verlag, 2001, pp. 239-259. p> [29] V. Shoup, "A Proposal for an ISO Standard for Public Key Encryption," Version 2.0, September 17, 2001, available from [30] L.M.K. Vandersypen, M. Steffen, G. Breyta, C.S. Yannoni, M.H. Sherwood, I.L. Chuang, Experimental realization of Shors quantum factoring algorithm using nuclear magnetic resonance, " Nature , 414, 2001, pp. 883-887. br/>