Cryptography Reference
In-Depth Information
[44] J. Cache and V. Liu. Hacking Exposed Wireless: Wireless Security Secrets and
Solutions . McGraw-Hill Osborne, 2007.
[45] Certicom. ECC tutorial. http://www.certicom.com.
[46] P. Chandra. Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security .
Newnes, 2005.
[47] C. Cobb. Cryptography for Dummies . Hungry Minds, 2004.
[48] D. De Cock, B. Van Alsenoy, B. Preneel, and J. Dumortier. The Belgian eID
approach. In W. Fumy and M. Paeschke, editors, Handbook of eID Security -
Concepts, Practical Experiences, Technologies . Publicis Publishing, 2011.
[49] D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk. RFC 5280,
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List
(CRL) Profile. Internet Engineering Task Force, 2008.
[50] COPACOBANA. A codebreaker
for DES and other ciphers. http://www.
copacobana.org/.
[51] CommonCriteria. TheCommonCriteriaPortal. http://www.commoncriteriaportal.
org/.
[52] CrypTool. Open source e-learning application. http://www.cryptool.org.
[53] M. Curtin and J. Dolske. A brute force search of DES keyspace. Technical report,
Usenix, 1998.
[54] J. Daemen and V. Rijmen. The Design of Rijndael: AES - the Advanced Encryption
Standard . Springer-Verlag, 2002.
[55] A. W. Dent and C. J. Mitchell. User's Guide to Cryptography and Standards . Artech
House, 2004.
[56] G. Dhillon. Principles of Information Systems Security: Texts and Cases . Wiley, 2006.
[57] T. Dierks and E. Rescorla. RFC 5246, The Transport Layer Security (TLS) Protocol
Version 1.2. Internet Engineering Task Force, 2008.
[58] W. Diffie. The first ten years of public-key cryptography. Proceedings of the IEEE ,
76 (5):560-577, 1988.
[59] W. Diffie andM. Hellman. Newdirections in cryptography. IEEETrans. Information
Theory , IT-22 :644-654, 1976.
[60] W. Diffie and M. Hellman. Exhaustive cryptanalysis of the NBS Data Encryption
Standard. IEEE Computer , 10 (6):74-84, 1977.
[61] W. Diffie, P.C. van Oorschot, and M.J. Wiener. Authentication and authenticated
key exchanges. Designs, Codes and Cryptography , 2: 107-125, 1992.
[62] H. Dobbertin, A. Bosselaers, and B. Preneel. RIPEMD-160, a strengthened version
of RIPEMD. In Fast Software Encryption , volume 1039 of Lecture Notes in Computer
Science , pages 71-82. Springer-Verlag, 1996.
[63] D. Eastlake, J. Schiller, and S. Crocker. RFC 4086, Randomness Requirements for
Security. Internet Engineering Task Force, 2005.
[64] ECRYPT. The Side Channel Cryptanalysis Lounge. European network of excellence
in cryptology II. http://www.crypto.ruhr-uni-bochum.de/en_sclounge.html.
[65] C. Mitchell (Ed.). Trusted Computing . IET, 2005.
[66] N. Smart (Ed.). ECRYPT II Yearly report on algorithms and keysizes (2010-2011).
European network of excellence in cryptology II, 2011. http://www.ecrypt.eu.org/.
[67] J. Edney and W. A. Arbaugh. Real 802.11 Security: WI-Fi Protected Access and
802.11i . Addison Wesley, 2003.
[68] T. ElGamal. A public-key cryptosystem and a signature scheme based on discrete
logarithms. IEEE Trans. Information Theory , IT-31 :469-472, 1985.
Search WWH ::




Custom Search