Cryptography Reference
In-Depth Information
[96] D. Hankerson, A. J. Menezes, and S. Vanstone.
Guide to Elliptic Curve Cryptography
.
Springer, 2004.
[97] D. Harel.
Computers Ltd, What they really can't do
. Oxford University Press, 2000.
[98] R. Harris.
Enigma
. Arrow, 2009.
[99] A. Hodges.
Alan Turing: The Enigma
. Vintage, 1992.
[100] J. Pipher, J. Hoffstein, and J. H. Silverman.
An Introduction to Mathematical
Cryptography
. Springer, 2008.
[101] A. K. Jain, P. Flynn, and A. A. Ross (Eds.).
Handbook of Biometrics
. Springer, 2007.
[102] D. Johnson, A. Menezes, and S. Vanstone. The Elliptic Curve Digital Signature
Algorithm (ECDSA). Certicom, 2001.
[103] M. Joye and G. Neven (Eds.).
Identity-based Cryptography
. IOS Press, 2008.
[104] D. Kahn.
The Codebreakers: The Comprehensive History of Secret Communication
from Ancient Times to the Internet
. Simon & Schuster, 1997.
[105] J. Katz and Y. Lindell.
Introduction to Modern Cryptography
. CRC Press, 2007.
[106] C. Kaufman. RFC 4306, Internet Key Exchange (IKEv2) Protocol. Internet
Engineering Task Force, 2005.
[107] K. Kenan.
Cryptography in the Database: The Last Line of Defense
. Addison-Wesley,
2005.
[108] A. Kerkchoffs. La cryptographie militaire.
Journal des
sciences militaires
,
IX
:161-191, 1883.
[109] N. Koblitz.
A Course in Number Theory and Cryptography
. Springer-Verlag, 2001.
[110] B.-J. Koops. Crypto Law Survey.
http://rechten.uvt.nl/koops/cryptolaw/.
[111] KPMG. Digital certificates, authentication, and trust on the Internet. KPMG Risk
and Advisory Services, 2002.
[112] KPMG. Keymanagement and policy framework. KPMGRisk andAdvisory Services,
2002.
[113] H. Krawczyk, M. Bellare, and R. Canetti. RFC 2104, HMAC: Keyed-Hashing for
Message Authentication. Internet Engineering Task Force, 1997.
[114] RSALaboratories. One-Time Password Specifications (OTPS).
http://www.rsa.com/
[115] RSA Laboratories. Public-key Cryptography Standards (PKCS).
http://www.rsa.
[116] X. Lai and J. L. Massey. A proposal for a new block encryption standard. In
Advances in cryptology - EUROCRYPT '90: Workshop on the theory and application
of cryptographic techniques
, volume 473 of
Lecture Notes in Computer Science
,
pages 389-404. Springer-Verlag, 1991.
[117] S. Levy.
Crypto: How the Code Rebels Beat the Government: Saving Privacy in the
Digital Age
. Penguin, 2002.
[118] S. Levy.
Crypto: Secrecy and Privacy in the New Cold War
. Penguin, 2002.
[119] W. Mao.
Modern Cryptography
. Prentice Hall, 2004.
[120] K. Mayes and K. Markantonakis (Eds.).
Smart Cards, Tokens, Security and
Applications
. Springer, 2008.
[121] G. McGraw.
Software Security: Building Security In
. Addison-Wesley, 2006.
[122] H. X. Mel and D. Baker.
Cryptography Decrypted
. Addison-Wesley, 2001.
[123] A. Menezes, P. van Oorschot, and S. Vanstone.
Handbook of Applied Cryptography
.
CRC Press, 1997.
[124] D. L. Mills. RFC 1305, Network Time Protocol (Version 3). Internet Engineering
Task Force, 1992.