Cryptography Reference
In-Depth Information
[218] RFC 2632,
S/MIME Version 3 certificate handling, describes how an
S/MIME V3 client uses public key infrastructure
(
PKI
)
to establish that
a public key is valid
, June (1999). (
Cited on page 287.
)
[219] RFC 2633, S/MIME Version 3 message specification, describes the pro-
tocol for adding cryptographic signature and encryption services to MIME
data, June (1999). (
Cited on page 287.
)
[220] RFC 2634,
Enhanced security services for S/MIME, describes four op-
tional security service extensions: signed receipts; security labels; secure
mailing lists; and signing certificates
, June (1999). (
Cited on page 287.
)
[221] RFC 2716,
PPP EAP TLS authentication protocol
, October (1999). (
Cited
on page 346.
)
[222] RFC 2857,
The Use of HMAC-RIPEMD-160-96 within ESP and AH
, June
(2000). (
Cited on page 588.
)
[223] RFC 2984,
Use of the CAST-128 Encryption Algorithm in CMS
, October
(2000). (
Cited on page 338.
)
[224] RFC 3566,
The AES-XCBC-MAC-96 algorithm and its use with IPsec
,
September (2003). (
Cited on page 306.
)
[225] RFC 3602,
The AES-CBC cipher algorithm and its use with IPsec
,
September (2003). (
Cited on page 308.
)
[226] RFC 3610,
Counter with CBC-MAC
(
CCM
), September (2003). (
Cited on
page 262.
)
[227] H. Rheingold,
Tools for Thought: The History and Future of
Mind-ExpandingTechnology
, Prentice-Hall (1986); Second revised edi-
tion by MIT Press (2000). (
Cited on page 387.
)
[228] R.L. Rivest,
The MD4 Message Digest Algorithm
,in
Advances in Cryp-
tology
, CRYPTO '90, Springer-Verlag, Berlin, LNCS
537
(1990), 303-311.
(
Cited on page 255.
)
[229] R.L. Rivest,
The MD5 Message-Digest Algorithm
, RFC 1321, April (1992).
(
Cited on page 255.
)
[230] R.L. Rivest, A. Shamir, and L. Adleman,
A method for obtaining digital
signatures and public-key cryptosystems
, Communications of the A.C.M.
21
(1978), 120-126. (
Cited on page 101.
)
[231] P. Rogaway,
The security of DESX
, CryptoBytes
2
(Summer 1996). (
Cited
on page 132.
)
[232] E. Schaefer,
A simplified data encryption standard algorithm
, Cryptologia,
January (1996). (
Cited on pages 115, 123.
)
Search WWH ::
Custom Search