Cryptography Reference
In-Depth Information
[125] R. A. Mollin. An Introduction to Cryptography . Chapman & Hall/CRC Press, 2001.
[126] T. Moses. Quantum computing and cryptography: Their impact on cryptographic
practice. Entrust, Inc., 2009.
[127] M. Myers, C. Adams, D. Solo, and D. Kemp. RFC 2511, Internet X.509 Certificate
Request Message Format. Internet Engineering Task Force, 1999.
[128] M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams. RFC 2560, X.509
Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP.
Internet Engineering Task Force, 1999.
[129] C. Neuman, T. Yu, S. Hartman, and K. Raeburn. RFC 4120, The Kerberos Network
Authentication Service (v5). Internet Engineering Task Force, 2005.
[130] V. Niemi and K. Nyberg. UMTS Security . Wiley-Blackwell, 2003.
[131] NIST. Computer Security Resource Center. National Institute of Standards and
Technology. http://csrc.nist.gov/.
[132] NIST. Cryptographic Hash Project. National Institute of Standards and
Technology, Computer Security Resource Center. http://csrc.nist.gov/groups/ST/
hash/index.html.
[133] NIST. Introduction to public key technology and the Federal PKI infrastructure.
National Institute of Standards and Technology Special Publication 800-32,
2001.
[134] NIST. Recommendations for block cipher modes of operation. National Institute of
Standards and Technology Special Publication 800-38A, 2001.
[135] NIST. Recommendations for block cipher modes of operation: The CCMmode for
authentication and confidentiality. National Institute of Standards and Technology
Special Publication 800-38C, 2004.
[136] NIST. Guidelines for the selection and use of Transport Layer Security
implementations. National
Institute of Standards and Technology Special
Publication 800-52, 2005.
[137] NIST. Guidelines for media sanitization. National Institute of Standards and
Technology Special Publication 800-88, 2006.
[138] NIST. Guidelines on electronic mail security. National Institute of Standards and
Technology Special Publication 800-45, 2007.
[139] NIST. Recommendations for key management. National Institute of Standards and
Technology Special Publication 800-57, 2007.
[140] NIST. Recommendations for the Triple Data Encryption Algorithm (TDEA) block
cipher. National Institute of Standards and Technology Special Publication 800-67,
2008.
[141] NIST. Recommendation for key derivation using pseudorandom functions
(revised). National Institute of Standards and Technology Special Publication
800-108, 2009.
[142] NIST. A framework for designing cryptographic key management systems. Draft
National Institute of Standards and Technology Special Publication 800-130,
2010.
[143] NIST. Recommendation for password-based key derivation, Part 1: storage
applications. National Institute of Standards and Technology Special Publication
800-132, 2010.
[144] NIST. Recommendations for block cipher modes of operation: The XTS-AES
mode for confidentiality on storage devices. National Institute of Standards and
Technology Special Publication 800-38E, 2010.
Search WWH ::




Custom Search