Cryptography Reference
In-Depth Information
[166] B. Schneier. Cryptanalysis of SHA-1.
Crypto-gram Newsletter
February 18th, 2005.
[167] B. Schneier. Why digital signatures are not signatures.
Crypto-gram Newsletter
February 15th, 2000.
http://www.schneier.com/crypto-gram-0011.html#1.
[168] B. Schneier.
Applied Cryptography
, 2nd Edition. Wiley, 1996.
[169] B. Schneier. Security pitfalls in cryptography, 1998.
http://www.schneier.com/
[170] B. Schneier.
Secrets and Lies: Digital Security in a Networked World
. Wiley,
2004.
[171] B. Schneier, D. Whiting, D. Wagner, C. Hall, N. Ferguson, and J. Kelsey.
Twofish
Encryption Algorithm : A 128-Bit Block Cipher
. Wiley, 1999.
[172] SECG. Standards for Efficient Cryptography Group.
http://www.secg.org.
[173] C. Shannon. A mathematical theory of communication.
Bell System Technical
Journal
,
27
:379-423 and 623-656, 1948.
[174] C. Shannon. Communication theory of secrecy systems.
Bell System Technical
Journal
,
28
:656-715, 1949.
[175] S. Singh. Crypto corner.
http://www.simonsingh.net/Crypto_Corner.html.
[176] S. Singh.
The Code Book: The Secret History of Codes and Code-breaking
. Fourth
Estate, 2002.
[177] S. Singh.
The Cracking Code Book
. HarperCollins, 2009.
[178] N. P. Smart.
Cryptography: An Introduction
. McGraw-Hill, 2002.
[179] M. Smith.
Station X: The Code Breakers of Bletchley Park
. Pan, 2004.
[180] R. J. Spillman.
Classical and Contemporary Cryptology
. Prentice-Hall, 2004.
[181] T. St Denis.
Cryptography for Developers
. Syngress Media, 2006.
[182] W. Stallings.
Cryptography and Network Security
, 5th Edition. Pearson, 2010.
[183] W. Stallings.
Network Security Essentials: Applications and Standards
, 4th Edition.
Pearson, 2010.
[184] N. Stephenson.
Cryptonomicon
. Arrow, 2000.
[185] D. R. Stinson.
Cryptography: Theory and Practice
, 3rd Edition. Chapman &
Hall/CRC Press, 2006.
[186] G. Stix. Best kept secrets.
Scientific American
,
292
:78-83, 2005.
[187] C. Stoll.
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
.
Pocket topics, 2005.
[188] X. Suo, Y. Zhu, and G. Scott Owen. Graphical passwords: A survey. In
Proceedings
of Annual Computer Security Applications Conference
, pages 463-472, 2005.
[189] J. Talbot and D. Welsh.
Complexity and Cryptography: An Introduction
. Cambridge
University Press, 2006.
[190] J. J. Tattersall.
Elementary Number Theory inNine Chapters
, 2nd Edition. Cambridge
University Press, 2005.
[191] W. Trappe and L. C. Washington.
Introduction to Cryptography: With Coding
Theory
, 2nd Edition. Pearson, 2005.
[192] TrueCrypt. Free open-source on-the-fly encryption.
http://www.truecrypt.org/.
[193] UKPA. Standard 70: Card Acceptor to Acquirer Interface Standards. UK Payments
Administration, 2010.
[194] S. Vaudenay.
A Classical
Introduction to Cryptography: Applications
for
Communications Security
. Springer, 2005.
[195] R. Walton. Cryptography and trust.
Information Security Technical Report
,
11
(2):68-71, 2006.