Previous: Index, Up: Top


References

[Kal92]
Burton Kaliski, The MD2 Message-Digest Algorithm, RFC 1319.

See http://www.ietf.org/rfc/rfc1319.txt.

     
     

[Kro00]
Ted Krovetz, John Black, Shai Halevi, Alejandro Hevia, Hugo Krawczyk, and Phillip Rogaway, UMAC: Message Authentication Code using Universal Hashing, Internet-Draft, October 2000.

See http://www.cs.ucdavis.edu/~rogaway/umac/draft-krovetz-umac-01.txt.

     
     

[McG02]
David A. McGrew, The Truncated Multi-Modular Hash Function (TMMH), Version Two, Internet-Draft, October 2002.

See http://www.ietf.org/internet-drafts/draft-irtf-cfrg-tmmh-00.txt.

     
     

[MOV96]
Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone (Editor); Handbook of Applied Cryptography (1992 CRC Press); ISBN 0849385237.
     
     

[NIST95]
Federal Information Processing Standards Publication 180-1: Secure Hash Standard. 17 April 1995, National Institute for Standards and Technology.

See http://www.itl.nist.gov/fipspubs/fip180-1.htm.

     
     

[NIST01]
Federal Information Processing Standards Publication 197: Advanced Encryption Standard (AES). 26 November 2001, National Institute for Standards and Technology.

See http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.

     
     

[RFC2631]
Eric Rescorla. Diffie-Hellman Key Agreement Method.

See http://www.ietf.org/rfc/rfc2631.txt.

     
     

[Riv92a]
Ron Rivest, The MD4 Message-Digest Algorithm, RFC 1320.

See http://www.ietf.org/rfc/rfc1320.txt.

     
     

[Riv92b]
Ron Rivest, The MD5 Message-Digest Algorithm, RFC 1321.

See http://www.ietf.org/rfc/rfc1321.txt.

     
     

[Sch95]
Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition (1995 John Wiley & Sons); ISBN 0471117099.
     
     

[Wu02]
Thomas J. Wu, SRP-6: Improvements and Refinements to the Secure Remote Password Protocol (29 October 2002).

See http://srp.stanford.edu/srp6.ps.