Cryptography Reference
In-Depth Information
[DuKa]
Dussé, Stephen R., Burton. S. Kaliski: A cryptographic library for the Motorola
DSP56000, in
Advances in Cryptology, EUROCRYPT '90, Lecture Notes in Computer
Science No. 473
, pp. 230-244, Springer-Verlag, New York, 1990.
[Dunc]
Duncan, Ray:
Advanced OS/2-Programming: The Microsoft Guide to the OS/2-
Kernel for Assembly Language and C Programmers
, Microsoft Press, Redmond,
Washington, 1981.
[East]
Eastlake, D., S. Crocker, J. Schiller:
Randomness Recommendations for Security
,
RFC1750, 1994.
[Elli]
Ellis, J. H.:
The Possibility of Non-Secret Encryption
, 1970,
[ElSt]
Ellis, Margaret A., Bjarne Stroustrup:
The Annotated C++ Reference Manual
,
Addison-Wesley, Reading, MA, 1990.
[Endl]
Endl, Kurth, Wolfgang Luh:
Analysis I
, Akademische Verlagsgesellschaft
Wiesbaden, 1977.
[Enge]
Engel-Flechsig, Stefan, Alexander Roßnagel eds.,
Multimedia-Recht
,
C. H. Beck, Munich, 1998.
[EESSI]
European Electronic Signature Standardization Initiative:
Algorithms and
Parameters for Secure Electronic Signatures
, V.1.44 DRAFT, 2001.
[EU99]
Richtlinie 1999/93/EG des Europäischen Parlaments und des Rates vom 13.
Dezember 1999 über gemeinschaftliche Rahmenbedingungen für elektronische
Signaturen
.
[Evan]
Evans, David:
Splint Users Guide
, Version 3.1.1-1, Secure Programming Group
University of Virginia Department of Computer Science, June 2003.
[Fegh]
Feghhi, Jalal, Jalil Feghhi, Peter Williams:
Digital Certificates: Applied Internet
Security
, Addison-Wesley, Reading, MA, 1999.
[Fiat]
Fiat, Amos, Adi Shamir: How to prove yourself: practical solutions to
identification and signature problems, in
Advances in Cryptology, CRYPTO '86,
Lecture Notes in Computer Science No. 263
, pp. 186-194, Springer-Verlag, New
York, 1987.
[FIPS]
Federal Information Processing Standard Publication 140 - 1:
Security
requirements for cryptographic modules
, US Department of Commerce/ National
Institute of Standards and Technology (NIST), 1994.
[F180]
National Institute of Standards and Technology:
Secure Hash Algorithm
,
Federal Information Processing Standard 180-2, NIST, 2001.
[FI81]
National Institute of Standards and Technology:
DES Modes of Operation
,
Federal Information Processing Standard 81, NIST, 1980.
[F197]
National Institute of Standards and Technology:
ADVANCED ENCRYPTION
STANDARD (AES)
, Federal Information Processing Standards Publication 197,
November 26, 2001
[Fisc]
Fischer, Gerd, Reinhard Sacher:
Einführung in die Algebra
, Teubner, 1974.
[Fors]
Forster, Otto:
Algorithmische Zahlenthorie
, Vieweg, Braunschweig,1996.
[Fumy]
Fumy, Walter, Hans Peter Rieß:
Kryptographie
, 2. Auflage, Oldenbourg, 1994.
[Gimp]
Gimpel Software:
PC-lint, A Diagnostic Facility for C and C++
.
[Glad]
Glade, Albert, Helmut Reimer, Bruno Struif, editors:
Digitale Signatur &
Sicherheitssensitive Anwendungen
, DuD-Fachbeiträge, Vieweg, 1995.
[Gldm]
Gladman, Brian: A Specification for Rijndael, the AES Algorithm,
http://fp.gladman.plus.com
,
2001.