Cryptography Reference
In-Depth Information
[12] ISO/IEC 14888. Information Technology—Security Techniques—Digital Signature with
Appendix. International Organization for Standardization, Geneva, 1998.
[13] PKCS#1v1: RSA Cryptography Standard. An RSA Laboratories Technical Report Version
1.5. RSA Laboratories, 1993.
[14] PKCS#1v2.1: RSA Cryptography Standard. RSA Security Inc. Public-Key Cryptography
Standards. RSA Laboratories, 2002.
[15] Secure Hash Standard. Federal Information Processing Standard publication #180. U.S.
Department of Commerce, National Institute of Standards and Technology, 1993.
[16] Secure Hash Standard. Federal Information Processing Standard publication #180-1. U.S.
Department of Commerce, National Institute of Standards and Technology, 1995.
[17] Secure Hash Standard. Federal Information Processing Standard publication #180-2. U.S.
Department of Commerce, National Institute of Standards and Technology, 2002.
[18] Specification of the Bluetooth System. Vol. 2: Core System Package. Bluetooth Specifi-
cation Version 1.2, 2003.
[19] A.V. Aho, J.E. Hopcroft, J.D. Ullman. The Design and Analysis of Computer Algorithms .
Addison-Wesley, London, 1974.
[20] J.L. Balcazar, J. Dıaz, J. Gabarro. Structural Complexity I . EATC. Springer, NY, 1988.
[21] R. Baldwin, R. Rivest. The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms.
RFC 2040, 1996.
[22] J. Bamford. The Puzzle Palace . Penguin Books, NY, 1983.
[23] D. Bayer, S. Haber, W.S. Stornetta. Improving the Efficiency and Reliability of Digital
Time-Stamping. In Sequences II: Methods in Communication, Security, and Computer
Science . Springer-Verlag, NY, 1993, pp. 329-334
[24] M. Bellare, R. Canetti, H. Krawczyk. Keyed Hash Functions and Message Authentication.
In Advances in Cryptology CRYPTO'96 , Santa Barbara, CA, Lecture Notes in Computer
Science 1109. Springer-Verlag, NY, 1996, pp. 1-15.
[25] M. Bellare, A. Desai, D. Pointcheval, P. Rogaway. Relations among Notions of Security for
Public-Key Encryption Schemes. In Advances in Cryptology CRYPTO'98 , Santa Barbara,
CA, Lecture Notes in Computer Science 1462. Springer-Verlag, NY, 1998, pp. 26-45.
[26] M. Bellare, P. Rogaway. Optimal Asymmetric Encryption—How to Encrypt with RSA.
In Advances in Cryptology EUROCRYPT'94 , Perugia, Italy, Lecture Notes in Computer
Science 950. Springer-Verlag, NY, 1995, pp. 92-111.
[27] J. Benaloh, J. Leichter. Generalized Secret Sharing and Monotone Functions. In Advances
in Cryptology CRYPTO'88 , Santa Barbara, CA, Lecture Notes in Computer Science 403.
Springer-Verlag, NY, 1990, pp. 27-35.
Search WWH ::




Custom Search