Cryptography Reference
In-Depth Information
[96] D. Hankerson, A. J. Menezes, and S. Vanstone. Guide to Elliptic Curve Cryptography .
Springer, 2004.
[97] D. Harel. Computers Ltd, What they really can't do . Oxford University Press, 2000.
[98] R. Harris. Enigma . Arrow, 2009.
[99] A. Hodges. Alan Turing: The Enigma . Vintage, 1992.
[100] J. Pipher, J. Hoffstein, and J. H. Silverman. An Introduction to Mathematical
Cryptography . Springer, 2008.
[101] A. K. Jain, P. Flynn, and A. A. Ross (Eds.). Handbook of Biometrics . Springer, 2007.
[102] D. Johnson, A. Menezes, and S. Vanstone. The Elliptic Curve Digital Signature
Algorithm (ECDSA). Certicom, 2001.
[103] M. Joye and G. Neven (Eds.). Identity-based Cryptography . IOS Press, 2008.
[104] D. Kahn. The Codebreakers: The Comprehensive History of Secret Communication
from Ancient Times to the Internet . Simon & Schuster, 1997.
[105] J. Katz and Y. Lindell. Introduction to Modern Cryptography . CRC Press, 2007.
[106] C. Kaufman. RFC 4306, Internet Key Exchange (IKEv2) Protocol. Internet
Engineering Task Force, 2005.
[107] K. Kenan. Cryptography in the Database: The Last Line of Defense . Addison-Wesley,
2005.
[108] A. Kerkchoffs. La cryptographie militaire.
Journal des
sciences militaires ,
IX :161-191, 1883.
[109] N. Koblitz. A Course in Number Theory and Cryptography . Springer-Verlag, 2001.
[110] B.-J. Koops. Crypto Law Survey. http://rechten.uvt.nl/koops/cryptolaw/.
[111] KPMG. Digital certificates, authentication, and trust on the Internet. KPMG Risk
and Advisory Services, 2002.
[112] KPMG. Keymanagement and policy framework. KPMGRisk andAdvisory Services,
2002.
[113] H. Krawczyk, M. Bellare, and R. Canetti. RFC 2104, HMAC: Keyed-Hashing for
Message Authentication. Internet Engineering Task Force, 1997.
[114] RSALaboratories. One-Time Password Specifications (OTPS). http://www.rsa.com/
rsalabs/.
[115] RSA Laboratories. Public-key Cryptography Standards (PKCS). http://www.rsa.
com/rsalabs/.
[116] X. Lai and J. L. Massey. A proposal for a new block encryption standard. In
Advances in cryptology - EUROCRYPT '90: Workshop on the theory and application
of cryptographic techniques , volume 473 of Lecture Notes in Computer Science ,
pages 389-404. Springer-Verlag, 1991.
[117] S. Levy. Crypto: How the Code Rebels Beat the Government: Saving Privacy in the
Digital Age . Penguin, 2002.
[118] S. Levy. Crypto: Secrecy and Privacy in the New Cold War . Penguin, 2002.
[119] W. Mao. Modern Cryptography . Prentice Hall, 2004.
[120] K. Mayes and K. Markantonakis (Eds.). Smart Cards, Tokens, Security and
Applications . Springer, 2008.
[121] G. McGraw. Software Security: Building Security In . Addison-Wesley, 2006.
[122] H. X. Mel and D. Baker. Cryptography Decrypted . Addison-Wesley, 2001.
[123] A. Menezes, P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography .
CRC Press, 1997.
[124] D. L. Mills. RFC 1305, Network Time Protocol (Version 3). Internet Engineering
Task Force, 1992.
Search WWH ::




Custom Search