Cryptography Reference
In-Depth Information
[DuKa] Dussé, Stephen R., Burton. S. Kaliski: A cryptographic library for the Motorola
DSP56000, in Advances in Cryptology, EUROCRYPT '90, Lecture Notes in Computer
Science No. 473 , pp. 230-244, Springer-Verlag, New York, 1990.
[Dunc] Duncan, Ray: Advanced OS/2-Programming: The Microsoft Guide to the OS/2-
Kernel for Assembly Language and C Programmers , Microsoft Press, Redmond,
Washington, 1981.
[East] Eastlake, D., S. Crocker, J. Schiller: Randomness Recommendations for Security ,
RFC1750, 1994.
[Elli] Ellis, J. H.: The Possibility of Non-Secret Encryption , 1970,
http://www.cesg.gov.uk/htmsite/publications/media/possnse.pdf .
[ElSt] Ellis, Margaret A., Bjarne Stroustrup: The Annotated C++ Reference Manual ,
Addison-Wesley, Reading, MA, 1990.
[Endl] Endl, Kurth, Wolfgang Luh: Analysis I , Akademische Verlagsgesellschaft
Wiesbaden, 1977.
[Enge] Engel-Flechsig, Stefan, Alexander Roßnagel eds., Multimedia-Recht ,
C. H. Beck, Munich, 1998.
[EESSI] European Electronic Signature Standardization Initiative: Algorithms and
Parameters for Secure Electronic Signatures , V.1.44 DRAFT, 2001.
[EU99] Richtlinie 1999/93/EG des Europäischen Parlaments und des Rates vom 13.
Dezember 1999 über gemeinschaftliche Rahmenbedingungen für elektronische
Signaturen .
[Evan] Evans, David: Splint Users Guide , Version 3.1.1-1, Secure Programming Group
University of Virginia Department of Computer Science, June 2003.
[Fegh] Feghhi, Jalal, Jalil Feghhi, Peter Williams: Digital Certificates: Applied Internet
Security , Addison-Wesley, Reading, MA, 1999.
[Fiat] Fiat, Amos, Adi Shamir: How to prove yourself: practical solutions to
identification and signature problems, in Advances in Cryptology, CRYPTO '86,
Lecture Notes in Computer Science No. 263 , pp. 186-194, Springer-Verlag, New
York, 1987.
[FIPS] Federal Information Processing Standard Publication 140 - 1: Security
requirements for cryptographic modules , US Department of Commerce/ National
Institute of Standards and Technology (NIST), 1994.
[F180] National Institute of Standards and Technology: Secure Hash Algorithm ,
Federal Information Processing Standard 180-2, NIST, 2001.
[FI81] National Institute of Standards and Technology: DES Modes of Operation ,
Federal Information Processing Standard 81, NIST, 1980.
[F197] National Institute of Standards and Technology: ADVANCED ENCRYPTION
STANDARD (AES) , Federal Information Processing Standards Publication 197,
November 26, 2001
[Fisc] Fischer, Gerd, Reinhard Sacher: Einführung in die Algebra , Teubner, 1974.
[Fors] Forster, Otto: Algorithmische Zahlenthorie , Vieweg, Braunschweig,1996.
[Fumy] Fumy, Walter, Hans Peter Rieß: Kryptographie , 2. Auflage, Oldenbourg, 1994.
[Gimp] Gimpel Software: PC-lint, A Diagnostic Facility for C and C++ .
[Glad] Glade, Albert, Helmut Reimer, Bruno Struif, editors: Digitale Signatur &
Sicherheitssensitive Anwendungen , DuD-Fachbeiträge, Vieweg, 1995.
[Gldm] Gladman, Brian: A Specification for Rijndael, the AES Algorithm,
http://fp.gladman.plus.com , 2001.
Search WWH ::




Custom Search