Cryptography Reference
In-Depth Information
References
1. Michel Abdalla, Mihir Bellare, and Phillip Rogaway.
DHAES: An encryption scheme
based
on
the
Diffie-Hellman
problem.
Available
at citeseer.ist.psu.edu/
abdalla99dhaes.html , 1999.
2. Carlisle Adams and Steve Lloyd. Understanding PKI: Concepts, Standards, and Deployment
Considerations . Addison-Wesley Longman Publishing, Boston, MA, USA, 2002.
3. ANSI X9.17-1985. American National Standard X9.17: Financial Institution Key Manage-
ment, 1985.
4. ANSI X9.31-1998. American National Standard X9.31, Appendix A.2.4: Public Key Cryp-
tography Using Reversible Algorithms for the Financial Services Industry (rDSA). Technical
report, Accredited Standards Committee X9, Available at http://www.x9.org , 2001.
5. ANSI X9.42-2003. Public Key Cryptography for the Financial Services Industry: Agreement
of Symmetric Keys Using Discrete Logarithm Cryptography.
Technical report, American
Bankers Association, 2003.
6. ANSI X9.62-1999.
The Elliptic Curve Digital Signature Algorithm (ECDSA).
Technical
report, American Bankers Association, 1999.
7. ANSI X9.62-2001. Elliptic Curve Key Agreement and Key Transport Protocols. Technical
report, American Bankers Association, 2001.
8. Frederik Armknecht. Algebraic attacks on certain stream ciphers . PhD thesis,
Department of Mathematics, University of Mannheim, Germany, December 2006.
http://madoc.bib.uni-mannheim.de/madoc/volltexte/2006/1352/ .
9. Standards for Efficient Cryptography — SEC 1: Elliptic Curve Cryptography, September
2000. Version 1.0.
10. Daniel V. Bailey and Christof Paar. Efficient arithmetic in finite field extensions with appli-
cation in elliptic curve cryptography. Journal of Cryptology , 14, 2001.
11. Elad Barkan, Eli Biham, and Nathan Keller. Instant Ciphertext-Only Cryptanalysis of GSM
Encrypted Communication. Journal of Cryptology , 21(3):392-429, 2008.
12. P. S. L. M. Barreto and V. Rijmen. The whirlpool hashing function, September
2999. (revised May 2003), http://paginas.terra.com.br/informatica/
paulobarreto/WhirlpoolPage.html .
13. F. L. Bauer. Decrypted Secrets: Methods and Maxims of Cryptology . Springer, 4th edition,
2007.
14. Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Keying Hash Functions for Message Au-
thentication. In CRYPTO '96: Proceedings of the 16th Annual International Cryptology
Conference, Advances in Cryptology , pages 1-15. Springer, 1996.
15. Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Message Authentication using Hash
Functions—The HMAC Construction. CRYPTOBYTES , 2, 1996.
16. C.H. Bennett, E. Bernstein, G. Brassard, and U. Vazirani. The strengths and weaknesses of
quantum computation. SIAM Journal on Computing , 26:1510-1523, 1997.
Search WWH ::




Custom Search