Cryptography Reference
In-Depth Information
[69] J. H. Ellis. The history of non-secret encryption.
Cryptologia
,
23
(3):267-273, 1999.
[70] C. Ellison and B. Schneier. Ten risks of PKI: What you're not being told about public
key infrastructure.
Computer Security Journal
,
16
(1):1-7, 2000.
[71] EMVCo. EMV Integrated Circuit Card Specifications for Payment Systems.
EMVCo.
http://www.emvco.com.
[72] J. -J. Quisquater, L. C. Guillou, and T. A. Berson. How to explain zero-knowledge
protocols to your children. In
Advances in Cryptology - CRYPTO '89
, volume 435
of
Lecture Notes in Computer Science
, pages 628-631. Springer-Verlag, 1990.
[73] S. Farrell and R. Housley. RFC 3281, An Internet Attribute Certificate Profile for
Authorization. Internet Engineering Task Force, 2002.
[74] N. Ferguson and B. Schneier.
Practical Cryptography
. Wiley, 2003.
[75] N. Ferguson, B. Schneier, andT. Kohno.
Cryptography Engineering: Design Principles
and Practical Applications
. Wiley, 2010.
[76] FIPS. Automated Password Generator (APG). Federal Information Processing
Standard FIPS 181, 1993.
[77] FIPS. Data Encryption Standard (DES). Federal Information Processing Standard
FIPS 46-3, 1999.
[78] FIPS. Advanced Encryption Standard (AES). Federal Information Processing
Standard FIPS 197, 2001.
[79] FIPS. Security Requirements for Cryptographic Modules. Federal Information
Processing Standard FIPS 140-2, 2001.
[80] FIPS. Secure Hash Standard. Federal Information Processing Standard FIPS 180-2,
2002.
[81] FIPS. The Keyed-Hash Message Authentication Code
(HMAC). Federal
Information Processing Standard FIPS 198, 2002.
[82] FIPS. Digital Signature Standard (DSS). Federal Information Processing Standard
FIPS 186-3, 2009.
[83] W. Ford and M. S. Baum.
Secure Electronic Commerce: Building the Infrastructure
for Digital Signatures and Encryption
, 2nd Edition. Prentice Hall, 2000.
[84] Electronic Frontier Foundation.
Cracking DES
. O'Reilly, 1998.
[85] J. Fridrich.
Steganography in Digital Media: Principles, Algorithms, and Applications
.
Cambridge University Press, 2010.
[86] S. Friedl. An illustrative guide to cryptographic hashes. Unixwiz.net Tech Tips, 2005.
[87] M. Gardner.
Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills)
.
Dover, 2003.
[88] S. Garfinkel and G. Spafford.
Web Security, Privacy and Commerce
. O'Reilly, 2001.
[89] D. Giry. Bluekrypt: Cryptographic key length recommendation.
http://www.
[90] O. Goldreich.
Foundations of Cryptography: Vol 1
. Cambridge University Press,
2001.
[91] O. Goldreich.
Foundations of Cryptography: Vol 2
. Cambridge University Press,
2004.
[92] D. Gollmann.
Computer Security
, 2nd Edition. Wiley, 2007.
[93] P. Gregory and M. A. Simon.
Biometrics For Dummies
. Wiley, 2008.
[94] M. Haahr. Random.org.
http://www.random.org/.
[95] H. Handschuh and B. Preneel. Minding your MAC algorithms.
Information Security
Bulletin
,
9
(6):213-220, 2004.