Cryptography Reference
In-Depth Information
[166] B. Schneier. Cryptanalysis of SHA-1. Crypto-gram Newsletter February 18th, 2005.
http://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html.
[167] B. Schneier. Why digital signatures are not signatures. Crypto-gram Newsletter
February 15th, 2000. http://www.schneier.com/crypto-gram-0011.html#1.
[168] B. Schneier. Applied Cryptography , 2nd Edition. Wiley, 1996.
[169] B. Schneier. Security pitfalls in cryptography, 1998. http://www.schneier.com/
essay-028.html.
[170] B. Schneier. Secrets and Lies: Digital Security in a Networked World . Wiley,
2004.
[171] B. Schneier, D. Whiting, D. Wagner, C. Hall, N. Ferguson, and J. Kelsey. Twofish
Encryption Algorithm : A 128-Bit Block Cipher . Wiley, 1999.
[172] SECG. Standards for Efficient Cryptography Group. http://www.secg.org.
[173] C. Shannon. A mathematical theory of communication. Bell System Technical
Journal , 27 :379-423 and 623-656, 1948.
[174] C. Shannon. Communication theory of secrecy systems. Bell System Technical
Journal , 28 :656-715, 1949.
[175] S. Singh. Crypto corner. http://www.simonsingh.net/Crypto_Corner.html.
[176] S. Singh. The Code Book: The Secret History of Codes and Code-breaking . Fourth
Estate, 2002.
[177] S. Singh. The Cracking Code Book . HarperCollins, 2009.
[178] N. P. Smart. Cryptography: An Introduction . McGraw-Hill, 2002.
[179] M. Smith. Station X: The Code Breakers of Bletchley Park . Pan, 2004.
[180] R. J. Spillman. Classical and Contemporary Cryptology . Prentice-Hall, 2004.
[181] T. St Denis. Cryptography for Developers . Syngress Media, 2006.
[182] W. Stallings. Cryptography and Network Security , 5th Edition. Pearson, 2010.
[183] W. Stallings. Network Security Essentials: Applications and Standards , 4th Edition.
Pearson, 2010.
[184] N. Stephenson. Cryptonomicon . Arrow, 2000.
[185] D. R. Stinson. Cryptography: Theory and Practice , 3rd Edition. Chapman &
Hall/CRC Press, 2006.
[186] G. Stix. Best kept secrets. Scientific American , 292 :78-83, 2005.
[187] C. Stoll. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage .
Pocket topics, 2005.
[188] X. Suo, Y. Zhu, and G. Scott Owen. Graphical passwords: A survey. In Proceedings
of Annual Computer Security Applications Conference , pages 463-472, 2005.
[189] J. Talbot and D. Welsh. Complexity and Cryptography: An Introduction . Cambridge
University Press, 2006.
[190] J. J. Tattersall. Elementary Number Theory inNine Chapters , 2nd Edition. Cambridge
University Press, 2005.
[191] W. Trappe and L. C. Washington. Introduction to Cryptography: With Coding
Theory , 2nd Edition. Pearson, 2005.
[192] TrueCrypt. Free open-source on-the-fly encryption. http://www.truecrypt.org/.
[193] UKPA. Standard 70: Card Acceptor to Acquirer Interface Standards. UK Payments
Administration, 2010.
[194] S. Vaudenay. A Classical
Introduction to Cryptography: Applications
for
Communications Security . Springer, 2005.
[195] R. Walton. Cryptography and trust.
Information Security Technical Report ,
11 (2):68-71, 2006.
Search WWH ::




Custom Search