Cryptography Reference
In-Depth Information
[69] J. H. Ellis. The history of non-secret encryption. Cryptologia , 23 (3):267-273, 1999.
[70] C. Ellison and B. Schneier. Ten risks of PKI: What you're not being told about public
key infrastructure. Computer Security Journal , 16 (1):1-7, 2000.
[71] EMVCo. EMV Integrated Circuit Card Specifications for Payment Systems.
EMVCo. http://www.emvco.com.
[72] J. -J. Quisquater, L. C. Guillou, and T. A. Berson. How to explain zero-knowledge
protocols to your children. In Advances in Cryptology - CRYPTO '89 , volume 435
of Lecture Notes in Computer Science , pages 628-631. Springer-Verlag, 1990.
[73] S. Farrell and R. Housley. RFC 3281, An Internet Attribute Certificate Profile for
Authorization. Internet Engineering Task Force, 2002.
[74] N. Ferguson and B. Schneier. Practical Cryptography . Wiley, 2003.
[75] N. Ferguson, B. Schneier, andT. Kohno. Cryptography Engineering: Design Principles
and Practical Applications . Wiley, 2010.
[76] FIPS. Automated Password Generator (APG). Federal Information Processing
Standard FIPS 181, 1993.
[77] FIPS. Data Encryption Standard (DES). Federal Information Processing Standard
FIPS 46-3, 1999.
[78] FIPS. Advanced Encryption Standard (AES). Federal Information Processing
Standard FIPS 197, 2001.
[79] FIPS. Security Requirements for Cryptographic Modules. Federal Information
Processing Standard FIPS 140-2, 2001.
[80] FIPS. Secure Hash Standard. Federal Information Processing Standard FIPS 180-2,
2002.
[81] FIPS. The Keyed-Hash Message Authentication Code
(HMAC). Federal
Information Processing Standard FIPS 198, 2002.
[82] FIPS. Digital Signature Standard (DSS). Federal Information Processing Standard
FIPS 186-3, 2009.
[83] W. Ford and M. S. Baum. Secure Electronic Commerce: Building the Infrastructure
for Digital Signatures and Encryption , 2nd Edition. Prentice Hall, 2000.
[84] Electronic Frontier Foundation. Cracking DES . O'Reilly, 1998.
[85] J. Fridrich. Steganography in Digital Media: Principles, Algorithms, and Applications .
Cambridge University Press, 2010.
[86] S. Friedl. An illustrative guide to cryptographic hashes. Unixwiz.net Tech Tips, 2005.
http://unixwiz.net/techtips/iguide-crypto-hashes.html.
[87] M. Gardner. Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills) .
Dover, 2003.
[88] S. Garfinkel and G. Spafford. Web Security, Privacy and Commerce . O'Reilly, 2001.
[89] D. Giry. Bluekrypt: Cryptographic key length recommendation. http://www.
keylength.com.
[90] O. Goldreich. Foundations of Cryptography: Vol 1 . Cambridge University Press,
2001.
[91] O. Goldreich. Foundations of Cryptography: Vol 2 . Cambridge University Press,
2004.
[92] D. Gollmann. Computer Security , 2nd Edition. Wiley, 2007.
[93] P. Gregory and M. A. Simon. Biometrics For Dummies . Wiley, 2008.
[94] M. Haahr. Random.org. http://www.random.org/.
[95] H. Handschuh and B. Preneel. Minding your MAC algorithms. Information Security
Bulletin , 9 (6):213-220, 2004.
Search WWH ::




Custom Search