Cryptography Reference
In-Depth Information
[218] RFC 2632, S/MIME Version 3 certificate handling, describes how an
S/MIME V3 client uses public key infrastructure ( PKI ) to establish that
a public key is valid , June (1999). ( Cited on page 287. )
[219] RFC 2633, S/MIME Version 3 message specification, describes the pro-
tocol for adding cryptographic signature and encryption services to MIME
data, June (1999). ( Cited on page 287. )
[220] RFC 2634, Enhanced security services for S/MIME, describes four op-
tional security service extensions: signed receipts; security labels; secure
mailing lists; and signing certificates , June (1999). ( Cited on page 287. )
[221] RFC 2716, PPP EAP TLS authentication protocol , October (1999). ( Cited
on page 346. )
[222] RFC 2857, The Use of HMAC-RIPEMD-160-96 within ESP and AH , June
(2000). ( Cited on page 588. )
[223] RFC 2984, Use of the CAST-128 Encryption Algorithm in CMS , October
(2000). ( Cited on page 338. )
[224] RFC 3566, The AES-XCBC-MAC-96 algorithm and its use with IPsec ,
September (2003). ( Cited on page 306. )
[225] RFC 3602, The AES-CBC cipher algorithm and its use with IPsec ,
September (2003). ( Cited on page 308. )
[226] RFC 3610, Counter with CBC-MAC ( CCM ), September (2003). ( Cited on
page 262. )
[227] H. Rheingold, Tools for Thought: The History and Future of
Mind-ExpandingTechnology , Prentice-Hall (1986); Second revised edi-
tion by MIT Press (2000). ( Cited on page 387. )
[228] R.L. Rivest, The MD4 Message Digest Algorithm ,in Advances in Cryp-
tology , CRYPTO '90, Springer-Verlag, Berlin, LNCS 537 (1990), 303-311.
( Cited on page 255. )
[229] R.L. Rivest, The MD5 Message-Digest Algorithm , RFC 1321, April (1992).
( Cited on page 255. )
[230] R.L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital
signatures and public-key cryptosystems , Communications of the A.C.M.
21 (1978), 120-126. ( Cited on page 101. )
[231] P. Rogaway, The security of DESX , CryptoBytes 2 (Summer 1996). ( Cited
on page 132. )
[232] E. Schaefer, A simplified data encryption standard algorithm , Cryptologia,
January (1996). ( Cited on pages 115, 123. )
Search WWH ::




Custom Search