Cryptography Reference
In-Depth Information
[44] J. Cache and V. Liu.
Hacking Exposed Wireless: Wireless Security Secrets and
Solutions
. McGraw-Hill Osborne, 2007.
[45] Certicom. ECC tutorial.
http://www.certicom.com.
[46] P. Chandra.
Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security
.
Newnes, 2005.
[47] C. Cobb.
Cryptography for Dummies
. Hungry Minds, 2004.
[48] D. De Cock, B. Van Alsenoy, B. Preneel, and J. Dumortier. The Belgian eID
approach. In W. Fumy and M. Paeschke, editors,
Handbook of eID Security -
Concepts, Practical Experiences, Technologies
. Publicis Publishing, 2011.
[49] D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk. RFC 5280,
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List
(CRL) Profile. Internet Engineering Task Force, 2008.
[50] COPACOBANA. A codebreaker
for DES and other ciphers.
http://www.
[51] CommonCriteria. TheCommonCriteriaPortal.
http://www.commoncriteriaportal.
[52] CrypTool. Open source e-learning application.
http://www.cryptool.org.
[53] M. Curtin and J. Dolske. A brute force search of DES keyspace. Technical report,
Usenix, 1998.
[54] J. Daemen and V. Rijmen.
The Design of Rijndael: AES - the Advanced Encryption
Standard
. Springer-Verlag, 2002.
[55] A. W. Dent and C. J. Mitchell.
User's Guide to Cryptography and Standards
. Artech
House, 2004.
[56] G. Dhillon.
Principles of Information Systems Security: Texts and Cases
. Wiley, 2006.
[57] T. Dierks and E. Rescorla. RFC 5246, The Transport Layer Security (TLS) Protocol
Version 1.2. Internet Engineering Task Force, 2008.
[58] W. Diffie. The first ten years of public-key cryptography.
Proceedings of the IEEE
,
76
(5):560-577, 1988.
[59] W. Diffie andM. Hellman. Newdirections in cryptography.
IEEETrans. Information
Theory
,
IT-22
:644-654, 1976.
[60] W. Diffie and M. Hellman. Exhaustive cryptanalysis of the NBS Data Encryption
Standard.
IEEE Computer
,
10
(6):74-84, 1977.
[61] W. Diffie, P.C. van Oorschot, and M.J. Wiener. Authentication and authenticated
key exchanges.
Designs, Codes and Cryptography
,
2:
107-125, 1992.
[62] H. Dobbertin, A. Bosselaers, and B. Preneel. RIPEMD-160, a strengthened version
of RIPEMD. In
Fast Software Encryption
, volume 1039 of
Lecture Notes in Computer
Science
, pages 71-82. Springer-Verlag, 1996.
[63] D. Eastlake, J. Schiller, and S. Crocker. RFC 4086, Randomness Requirements for
Security. Internet Engineering Task Force, 2005.
[64] ECRYPT. The Side Channel Cryptanalysis Lounge. European network of excellence
in cryptology II.
http://www.crypto.ruhr-uni-bochum.de/en_sclounge.html.
[65] C. Mitchell (Ed.).
Trusted Computing
. IET, 2005.
[66] N. Smart (Ed.). ECRYPT II Yearly report on algorithms and keysizes (2010-2011).
European network of excellence in cryptology II, 2011.
http://www.ecrypt.eu.org/.
[67] J. Edney and W. A. Arbaugh.
Real 802.11 Security: WI-Fi Protected Access and
802.11i
. Addison Wesley, 2003.
[68] T. ElGamal. A public-key cryptosystem and a signature scheme based on discrete
logarithms.
IEEE Trans. Information Theory
,
IT-31
:469-472, 1985.