References
[1]
U.S. Committee on National Security Systems (CNSS),
National Policy on the Use of the
Advanced Encryption Standard (AES) to Protect National Security Systems and National
Security Information
, CNSS Policy No. 15, Fact Sheet No. 1, June 2003, available at
http://csrc.nist.gov/groups/STM/cmvp/documents/CNSS15FS.pdf.
[2]
C. E. Shannon,
Communication Theory of Secrecy Systems
, Bell System Technical Journal,
v. 28, n. 4, 1949
[3]
NIST,
Advanced Encryption Standard (AES)
, Federal Information Processing Standards
Publication 197, November 26, 2001, available at
http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
.
[4]
J. Nechvatal, E. Barker, L. Bassham, W. Burr, M. Dworkin, J. Foti, E. Roback, NIST,
Report on the Development of the Advanced Encryption Standard (AES)
, October 2, 2000,
Journal of Research of the National Institute of Standards and Technology, Vol. 106, No. 3,
May-June 2001, available at http://nvl.nist.gov/pub/nistpubs/jres/106/3/j63nec.pdf.
[5]
B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, T. Kohno, M. Stay,
The Twofish Team’s Final Comments on AES Selection,
May 15, 2000, available at
http://csrc.nist.gov/archive/aes/round2/comments/20000515-bschneier.pdf
.
[6]
Bruce Schneier,
Beyond Fear: Thinking Sensibly About Security in an Uncertain World
,
Springer, 2003
[7]
RSA Laboratories,
PKCS #5 v2.0: Password-Based Cryptography Standard
,
RSA Data
Security, Inc. Public-Key Cryptography Standards (PKCS), March 25, 1999, available at
ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-5v2/pkcs5v2-0.pdf.
[8]
H. Krawczyk, M. Bellare, R. Canetti,
HMAC: Keyed-Hashing for Message Authentication
,
RFC 2104, February 1997, available at http://www.ietf.org/rfc/rfc2104.txt
.
[9]
M. Nystrom, RSA Security,
Identifiers and Test Vectors for HMAC-SHA-224, HMAC-SHA-
256, HMAC-SHA-384, and HMAC-SHA-512
, RFC 4231, December 2005, available at
http://www.ietf.org/rfc/rfc4231.txt.
[10] Peter Gutmann,
Software Generation of Practically Strong Random Numbers
, presented at
the 1998 Usenix Security Symposium, available at
http://www.cs.auckland.ac.nz/~pgut001/pubs/usenix98.pdf.
[11] Carl Ellison,
Cryptographic Random Numbers
, originally an appendix to the P1363
standard, available at http://world.std.com/~cme/P1363/ranno.html.
150
[12] P. Rogaway,
Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes
OCB and PMAC
, Asiacrypt 2004. LNCS vol. 3329. Springer, 2004. Also available at:
http://www.cs.ucdavis.edu/~rogaway/papers/offsets.pdf.
[13] J. Kelsey,
Twofish Technical Report #7: Key Separation in Twofish
, AES Round 2 public
comment, April 7, 2000
[14] NIST,
Secure Hash Standard
, FIPS 180-2, August 1, 2002, available at
http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf
.
[15] U. Maurer, J. Massey,
Cascade Ciphers: The Importance of Being First
, Journal of
Cryptology, v. 6, n. 1, 1993
[16] Bruce Schneier,
Applied Cryptography
, Second Edition, John Wiley & Sons, 1996
[17] Peter Gutmann,
Secure Deletion of Data from Magnetic and Solid-State Memory
, first
published in the Sixth USENIX Security Symposium Proceedings, San Jose, California,
July 22-25, 1996, available at http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
[18] Serpent home page: http://www.cl.cam.ac.uk/~rja14/serpent.html
.
[19] M. E. Smid,
AES Issues
, AES Round 2 Comments, May 22, 2000, available at
http://csrc.nist.gov/archive/aes/round2/comments/20000523-msmid-2.pdf
.
[20] A. Menezes, P. van Oorschot, S. Vanstone,
Handbook of Applied Cryptography
, CRC
Press, October 1996
[21] International Organization for Standardization (ISO),
Information technology – Security
techniques – Hash-functions – Part 3: Dedicated hash-functions
, ISO/IEC 10118-3:2004,
February 24, 2004
[22] NIST,
The Keyed-Hash Message Authentication Code (HMAC)
, Federal Information
Processing Standards Publication 198, March 6, 2002, available at
http://csrc.nist.gov/publications/fips/fips198/fips-198a.pdf
.
[23] RSA Laboratories,
PKCS #11 v2.20: Cryptographic Token Interface Standard
,
RSA
Security, Inc. Public-Key Cryptography Standards (PKCS), June 28, 2004, available at
ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-11/v2-20/pkcs-11v2-20.pdf.
[24] Morris Dworkin,
Recommendation for Block Cipher Modes of Operation: The XTS-AES
Mode for Confidentiality on Storage Devices
, NIST Special Publication 800-3E, January
2010, available at http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf
.
Dostları ilə paylaş: |