Cryptography Reference
In-Depth Information
References
[1] William E. Burr. Data Encryption Standard. In
NIST SP 958 - A Century of Excellence in Measurements,
Standards, and Technology
(2001);
http://nvl.nist.gov/pub/nistpubs/sp958-lide/html/
[2] John Daemen and Vincent Rijmen.
The Design of Rijndael: AES - The Advanced Encryption Standard,
In-
formation Security and Cryptography. (Springer-Verlag, Berlin, 2002).
[3] Morris Dworkin.
Recommendation for Block Cipher Modes of Operation.
(National Institute of Standards
and Technology, 2001).
[4] Howard M. Heys. A tutorial on linear and differential cryptanalysis.
Cryptologia
26 (3): 189-221 (2002).
[5] David Khan.
The Codebreakers.
(Scribner, New York, 1996).
[6] Donald E. Knuth.
The Art of Computer Programming: Seminumerical Algorithms,
Vol. 2, 3rd ed. (Addison
Wesley, Boston, 1998).
[7] National Institute of Standards and Technology.
Federal Information Processing Standard 197: Advanced
Encryption Standard (AES).
(2001).
[8] National Institute of Standards and Technology.
Federal Information Processing Standard 46-3: Data En-
cryption Standard.
(1999).
[9] National Institute of Standards and Technology.
Federal Information Processing Standard 81: DES Modes
of Operation.
(1980).
[10] National Institute of Standards and Technology.
Secure Hash Standard.
(Federal Information Processing
Standards Publication 180-1, 1995).
[11] Rolf Oppliger.
Contemporary Cryptography,
Computer Security Series. (Artech House, Norwood, MA,
2005).
[12] Ronald L. Rivest.
The MD5 Message-Digest Algorithm.
(Network Working Group, Request for Comments
1321, 1992).
[13] RSA Laboratories.
DES Challenge III.
(RSA Laboratories, 1999);
http://www.rsa.com/rsalabs/
[14] Bruce Schneier. The Blowfish Encryption Algorithm.
Dr. Dobb's Journal
19 (4): 38-40 (1994).
[15] Bruce Schneier. Description of a new variable-length key, 64-bit block cipher (Blowfish). In
Fast Sofware
Encryption, Combridge Security Workshop Proceedings,
pp. 191-204 (Springer-Verlag, Berlin, 1994).
[16] Bruce Schneier.
Applied Cryptography,
2nd ed. (John Wiley, New York, 1995).
[17] U.S. Government.
SKIPJACK and KEA Algorithm Specifications.
(1998).
[18] Xiaoyun Wang, Yiqun Yin, and Hongbo Yu. Finding collisions in the full SHA-1.
In Advances in Crypto-
logy - CRYPTO 2005,
(ed. Victor Shoup), pp. 17-36. Lecture Notes in Computer Science, Vol. 3621. (Springer-
Verlag, Berlin, 2005).
Notes
Search WWH ::
Custom Search