Cryptography Reference
In-Depth Information
References
1. Michel Abdalla, Mihir Bellare, and Phillip Rogaway.
DHAES: An encryption scheme
based
on
the
Diffie-Hellman
problem.
Available
abdalla99dhaes.html
,
1999.
2. Carlisle Adams and Steve Lloyd.
Understanding PKI: Concepts, Standards, and Deployment
Considerations
. Addison-Wesley Longman Publishing, Boston, MA, USA, 2002.
3. ANSI X9.17-1985. American National Standard X9.17: Financial Institution Key Manage-
ment, 1985.
4. ANSI X9.31-1998. American National Standard X9.31, Appendix A.2.4: Public Key Cryp-
tography Using Reversible Algorithms for the Financial Services Industry (rDSA). Technical
5. ANSI X9.42-2003. Public Key Cryptography for the Financial Services Industry: Agreement
of Symmetric Keys Using Discrete Logarithm Cryptography.
Technical report, American
Bankers Association, 2003.
6. ANSI X9.62-1999.
The Elliptic Curve Digital Signature Algorithm (ECDSA).
Technical
report, American Bankers Association, 1999.
7. ANSI X9.62-2001. Elliptic Curve Key Agreement and Key Transport Protocols. Technical
report, American Bankers Association, 2001.
8. Frederik Armknecht.
Algebraic attacks on certain stream ciphers
. PhD thesis,
Department of Mathematics, University of Mannheim, Germany, December 2006.
9. Standards for Efficient Cryptography — SEC 1: Elliptic Curve Cryptography, September
2000. Version 1.0.
10. Daniel V. Bailey and Christof Paar. Efficient arithmetic in finite field extensions with appli-
cation in elliptic curve cryptography.
Journal of Cryptology
, 14, 2001.
11. Elad Barkan, Eli Biham, and Nathan Keller. Instant Ciphertext-Only Cryptanalysis of GSM
Encrypted Communication.
Journal of Cryptology
, 21(3):392-429, 2008.
12. P. S. L. M. Barreto and V. Rijmen. The whirlpool hashing function, September
2999. (revised May 2003),
http://paginas.terra.com.br/informatica/
13. F. L. Bauer.
Decrypted Secrets: Methods and Maxims of Cryptology
. Springer, 4th edition,
2007.
14. Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Keying Hash Functions for Message Au-
thentication. In
CRYPTO '96: Proceedings of the 16th Annual International Cryptology
Conference, Advances in Cryptology
, pages 1-15. Springer, 1996.
15. Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Message Authentication using Hash
Functions—The HMAC Construction.
CRYPTOBYTES
, 2, 1996.
16. C.H. Bennett, E. Bernstein, G. Brassard, and U. Vazirani. The strengths and weaknesses of
quantum computation.
SIAM Journal on Computing
, 26:1510-1523, 1997.