Cryptography Reference
In-Depth Information
References
[1] William E. Burr. Data Encryption Standard. In NIST SP 958 - A Century of Excellence in Measurements,
Standards, and Technology (2001); http://nvl.nist.gov/pub/nistpubs/sp958-lide/html/
250-253.html1 .
[2] John Daemen and Vincent Rijmen. The Design of Rijndael: AES - The Advanced Encryption Standard, In-
formation Security and Cryptography. (Springer-Verlag, Berlin, 2002).
[3] Morris Dworkin. Recommendation for Block Cipher Modes of Operation. (National Institute of Standards
and Technology, 2001).
[4] Howard M. Heys. A tutorial on linear and differential cryptanalysis. Cryptologia 26 (3): 189-221 (2002).
[5] David Khan. The Codebreakers. (Scribner, New York, 1996).
[6] Donald E. Knuth. The Art of Computer Programming: Seminumerical Algorithms, Vol. 2, 3rd ed. (Addison
Wesley, Boston, 1998).
[7] National Institute of Standards and Technology. Federal Information Processing Standard 197: Advanced
Encryption Standard (AES). (2001).
[8] National Institute of Standards and Technology. Federal Information Processing Standard 46-3: Data En-
cryption Standard. (1999).
[9] National Institute of Standards and Technology. Federal Information Processing Standard 81: DES Modes
of Operation. (1980).
[10] National Institute of Standards and Technology. Secure Hash Standard. (Federal Information Processing
Standards Publication 180-1, 1995).
[11] Rolf Oppliger. Contemporary Cryptography, Computer Security Series. (Artech House, Norwood, MA,
2005).
[12] Ronald L. Rivest. The MD5 Message-Digest Algorithm. (Network Working Group, Request for Comments
1321, 1992).
[13] RSA Laboratories. DES Challenge III. (RSA Laboratories, 1999); http://www.rsa.com/rsalabs/
node.asp?id=2108 .
[14] Bruce Schneier. The Blowfish Encryption Algorithm. Dr. Dobb's Journal 19 (4): 38-40 (1994).
[15] Bruce Schneier. Description of a new variable-length key, 64-bit block cipher (Blowfish). In Fast Sofware
Encryption, Combridge Security Workshop Proceedings, pp. 191-204 (Springer-Verlag, Berlin, 1994).
[16] Bruce Schneier. Applied Cryptography, 2nd ed. (John Wiley, New York, 1995).
[17] U.S. Government. SKIPJACK and KEA Algorithm Specifications. (1998).
[18] Xiaoyun Wang, Yiqun Yin, and Hongbo Yu. Finding collisions in the full SHA-1. In Advances in Crypto-
logy - CRYPTO 2005, (ed. Victor Shoup), pp. 17-36. Lecture Notes in Computer Science, Vol. 3621. (Springer-
Verlag, Berlin, 2005).
Notes
Search WWH ::




Custom Search