Cryptography Reference
In-Depth Information
Note that cryptography is a field of study that is far too broad to be addressed in
a single topic and that you have to refer to additional material, such as the literature
referenced at the end of each chapter, if you want to learn more about a particular
topic. The aims of this topic are to provide an overview, to give an introduction into
each of the previously mentioned topics and areas of research and development, and
to put everything into perspective. Most importantly, we want to ensure that you no
longer cannot see the forest for the trees.
References
[1]
Shirey, R., Internet Security Glossary , Request for Comments 2828, May 2000.
[2]
Menezes, A., P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography . CRC Press,
Boca Raton, FL, 1996.
[3]
Wayner, P., Disappearing Cryptography , 2nd edition. Morgan Kaufmann Publishers, San Fran-
cisco, CA, 2002.
[4]
Cole, E., Hiding in Plain Sight: Steganography and the Art of Covert Communication . John Wiley
& Sons, New York, 2003.
[5]
Katzenbeisser, S., and F. Petitcolas (Eds.), Information Hiding Techniques for Steganography and
Digital Watermarking . Artech House Publishers, Norwood, MA, 2000.
[6]
Arnold, M., M. Schmucker, and S.D. Wolthusen, Techniques and Applications of Digital Water-
marking and Content Protection . Artech House Publishers, Norwood, MA, 2003.
[7]
Kelsey, J., B. Schneier, and D. Wagner, “Protocol Interactions and the Chosen Protocol Attack,”
Proceedings of the 5th International Workshop on Security Protocols , Springer-Verlag, 1997, pp.
91-104.
[8]
Stinson, D., Cryptography: Theory and Practice , 2nd edition. Chapman & Hall/CRC, Boca
Raton, FL, 2002.
[9]
Diffie, W., and M.E. Hellman, “New Directions in Cryptography,” IEEE Transactions on Infor-
mation Theory , IT-22(6), 1976, pp. 644-654.
[10]
Maurer, U.M., “Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Comput-
ing Discrete Logarithms,” Proceedings of CRYPTO '94 , Springer-Verlag, LNCS 839, 1994, pp.
271-281.
[11]
Rabin, M.O., “Digitalized Signatures and Public-Key Functions as Intractable as Factorization,”
MIT Laboratory for Computer Science, MIT/LCS/TR-212, 1979.
[12]
Kerckhoffs, A., “La Cryptographie Militaire,” Journal des Sciences Militaires , Vol. IX, January
1883, pp. 5-38, February 1883, pp. 161-191.
[13]
Kocher, P., “Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and other
Systems,” Proceedings of CRYPTO '96 , Springer-Verlag, LNCS 1109, 1996, pp. 104-113.
Search WWH ::




Custom Search