x x

Related Documents

Related Documents

Following is a list of documents referenced in this book and suggested material for further reading.

1.The Public-Key Cryptography Standards (PKCS), RSA Laboratories. (http://www.rsasecurity.com/rsalabs/PKCS/)

2.Frequently Asked Questions (FAQ) About Today’s Cryptography, RSA Laboratories.

(http://www.rsasecurity.com/rsalabs/faq/)

3.The following Internet Standard documents:

RFCs 1421, 1422, 1423, 1424 on Privacy Enhancement for Internet Electronic Mail.

RFCs 1319 (MD2), 1321 (MD5).

4.The following CCITT Recommendation documents:

X.690: Specifications for the Basic Encoding Rules (BER) for Abstract Notation One (ASN.1).

X.509: The Directory — Authentication Framework.

5.Rivest, Shamir, and Adleman, A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.

6.A. Shamir, How to share a secret. Communications of the ACM, 22(11):

612-613, November 1979.

7.W. Diffie and M. E. Hellman, New directions in cryptography. IEEE Transactions on Information Theory, IT-22:644-654, 1976.

8.Data Encryption Standard, FIPS Pub 46-2, National Institute of Standards and Technology. Available from http://www.nist.gov.itl/div897/pubs/index.htm.

9.DES Modes of Operations, FIPS Pub 81, National Institute of Standards and Technology, 1980.

10.Digital Signature Standard and Secure Hashing Algorithm (DSS and SHA):

FIPS Pub 180-1

X9.30 Part III

11.The following reports from RSA Laboratories (http://www.rsasecurity.com/

rsalabs/technotes and http://www.rsasecurity.com/rsalabs/bulletins):

Stream Ciphers

MD2, MD4, MD5, SHA and Other Hash Functions

On Pseudo-collisions in MD5

R S A B S A F E C r y p t o - C D e v e l o p e r ’s G u i d e

Page 20
Image 20
RSA Security 5.2.2 manual Related Documents, A B S a F E C r y p t o C D e v e l o p e r ’s G u i d e