Cryptography Reference
In-Depth Information
[ISO8730] „Banking - Requirements for message authentication“ and „Banking - Approved
algorithms for message authentication“, International Organization for Standardization
[ISO9796] „Digital signature schemes giving message recovery“, ISO, International Organi-
zation for Standardization
[ISO9797] “Message Authentication Codes (MACs)” International Organization for Stan-
dardization, 1999
[ISO9798-1/2] International Organization for Standardization: “Security Techniques, Entity
Authentication Mechanism”, 1997/1999
[JC06] „Webseiten zur JavaCard™-Technologie“, http://java.sun.com/products/javacard/,
Herausgeber: SUN Microsystems
[JCRE03] “Runtime Environment Specification JavaCard™ Platform 2.2.1”, SUN Microsys-
tems October 2003
[K67] D. Kahn, „The Codebreakers, The story of secret writing“, MacMillan 1967
[KES05] G. Illies, W. Schindler, „Kollisionsangriffe gegen Hash-Funktionen“, KES Fachzeit-
schrift Ausgabe 2005/05
[Ko96] N. Koblitz, „Introduction to Elliptic Curves and Modular Forms“, Springer, 1996
[Kraw96] H. Krawczyk,, „SKEME: A Versatile Secure Key Exchange Mechanism for Inter-
net", from IEEE Proceedings of the 1996 Symposium on Network and Distributed Systems
Security.
[LiFaBr00] P. Lipp, J. Farmer, D. Bratko, W. Platzer, A. Sterbenz, „Sicherheit und Krypto-
garphie in Java™ - Einführung, Anwendungen und Lösungen” Herausgeber: Addison-Wesley,
2000
[LiYe99] T. Lindholm, F. Yelling, “The JavaTM Virtual Machine Specification, Second Edi-
tion”, 1999, http://java.sun.com/docs/books/vmspec/
[LM90] X. Lai, J. L. Massey, “A proposal for a new block encryption standard”, Eurocrypt
'90, Springer, LNCS 473 (1991), 389-404
[Lo95] G. Lowe, “An attack on the Needham-Schroeder public key authentication protocol”,
Information Processing Letters, 56(3):131-136, November 1995
[MKT98] Deutsche Telekom, GMD, TÜV-IT, TELETRUST, „MKT-Spezifikation Teil 3“,
Herausgeber: Arbeitsgemeinschaft „Karten im Gesundheitswesen“, 1998
[NIST00] AES, National Institute of Standards and Technology, 2000,
http://www.nist.gov/aes
[NIST07] „NIST's Plan for New Cryptographic Hash Functions“,
http://www.csrc.nist.gov/pki/HashWorkshop/index.html
[NIST99] NIST, „Recommended Elliptic Curves for Federal Government Use”, July 1999
Search WWH ::




Custom Search