8 Bibliografía 0 Prefacio




descargar 199.12 Kb.
título8 Bibliografía 0 Prefacio
página6/6
fecha de publicación05.03.2016
tamaño199.12 Kb.
tipoBibliografía
b.se-todo.com > Documentos > Bibliografía
1   2   3   4   5   6

CRIPTOGRAFIA Y TEORIA DE NUMEROS





  1. C.M. Adams, S.E. Tavares, The structured design of cryptographically good S-boxes, Jornal of cryptology V. 3 n 1, pp 27-42, 1990 (CAST)

  2. E. Biham, A. Shamir, Differential cryptanalysis of the Data Encryption Standard Springer Verlag 1993

  3. I. Blake, X. Gao, A. Menezes, R. Mullin, S. Vanstone, T. Yaghoobian, Applications of Finite Fields, Kluwer Academic Publishers 1992

  4. I. Blake, G. Seroussi, N. Smart, Elliptic Curves in Cryptography LMS 265, Cambridge University Press 1999

  5. D.M. Bressoud, Factorization and primality testing, UTM Springer-Verlag 1989

  6. L. Brown, M. Kwan, J. Pieprzyk, J. Seberry, Improving resistance to differential cryptanalysis and the redesign of LOKI, Advances in Cryptology ASIACRYPT’91 LNCS 739, pp 36-50, 1993

  7. S.C. Coutinho, The Mathematics of Ciphers, A.K. Peters 1998

  8. C. Charnes, L. O’Connor, J. Pieprzyk, R. Safavi-Naini, Y. Zheng, Coments on Soviet encryption algorithm, Advances in Cryptology Eurocrypt’94, LNCS 950, pp 433-438, 1995 (GOST)

  9. C.A. Deavours, L. Kruh, Machine Cryptography and Modern Cryptanalysis, Artech House Inc. 1985

  10. W. Diffie, M.E. Hellman, New Directions in Cryptography, Transactions on Information Theory Vol IT22 No 6, pp 644-654 1976

  11. W. Friedman, Cryptology, Encyclopedia Brittanica, 6, pp 844-851 1967

  12. D. Kahn, The Codebreakers, the Story of Secret Writing, Macmillan Publishing Co. NY 1967

  13. N. Koblitz, A course in Number Theory and Cryptography, Springer Verlag 1994

  14. N. Koblitz, Algebraic Aspects of Cryptography, Springer Verlag 1998

  15. X. Lai, J.R. Massey, A proposal for a new block encryption standard, Advances in Cryptology EUROCRYPT’90, LNCS 473, pp 389-404, 1991

  16. A. K. Lenstra, E. R. Verheul, Selecting Cryptographic Key Sizes, 1999

  17. R. Lidl, H. Niederreiter, Encyclopedia of Mathematics and Its Applications Vol. 20, Addison Wesley 1983

  18. M. Matsui, Linear cryptanalysis method for DES cipher, Advances in Cryptology EUROCRYPT’93, LNCS 765, pp 386-397, 1994

  19. A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, Handbook of Applied Cryptography, CRC Press 1996

  20. A.J. Menezes, M. Qu, S. Vanstone, Some New key agreement protocols providing implicit authentication, SAC’95, pp 18-19, 1995

  21. A.J. Menezes, Elliptic Curve Key cryptosystems, Kluwer Academic Publishers 1993

  22. A.M. Odlyzko, Public Key Cryptography, AT&T Bell Laboratories, Murray Hill, New Jersey 0797, 1993

  23. P. Rogaway, The Security of DESX, CryptoBytes Vol 2, No 2, pp 8-10, 1996

  24. K.H. Rosen, Elementary Number Theory and Its Applications, Addison Wesley 1988

  25. M. Rosing, Implementing Elliptic Curve Cryptography, Manning Publications Co. 1998




  1. R.L. Rivest, A. Shamir, L. Adleman, A Method for Obtaining Digital Signature and Public-Key Cryptosystems, Communication of the ACM Vol 21 No 2 pp 120-126, 1978

  2. R.L. Rivest, The RC5 encryption algorithm, Fast software Encryption LNCS 1008, pp 86-96, 1995

  3. B. Schneier, Applied Cryptography, John Wiley & Sons, Inc. 1996

  4. B. Schneier, Description of a new variable-length key, 64-bit block cipher (Blowfish) FSE, LNCS 809, pp 191-204, 1994

  5. A. Shimizu, S. Miyaguchi, Fast data encipherment algorithm FEAL, Advances in Cryptology Eurocrypt’87¸ LNCS 304, pp 267-278, 1988

  6. G.J. Simmons, Cryptology, The new Encyclopaedia Britannica, Macropaedia Vol 16, pp 913-924B

  7. C.P. Schnorr, Efficient identification and signatures for smart cards, Advances in cryptology CRYPTO’89, LNCS 435, pp 239-252, 1990

  8. D.R. Stinson, Cryptography Theory and Practice, CRC Press Inc. 1995

  9. P. van Oorschot, M. Wiener, A Known-plaintext attack on two-kwy triple encryption, Advances in Cryptology EUROCRYPT ’90, LNCS 473, pp 318-325, 1991

  10. M.J. Wiener, Cryptanalysis of short RSA secret exponents, IEEE Transactions on Information theory, 32, pp 553-558, 1990

  11. H.C. Williams, A Modification of the RSA public-key encryption procedure, IEEE Transaction on Information Theory, No 26, pp 726-729 1980

  12. ANSI X3.92 “American National Standard- Data Encryption Algorithm” American National Standards Institute 1981

  13. ANSI X3.106 “American National Standard- Data Encryption Algorithm- Modes of Operation”, American National Standards Institute 1983

  14. ANSI X9.31 “American National Standard for Finalcial Services- Public key cryptography using RSA for financial services industry” The RSA signature algorithm 1995 (part 1), hash algorithm for RSA (part 2) 1995

  15. ANSI X9.42 “Public key cryptography for financial services industry: Management of symmetric algorithm keys using Diffie-Hellman” 1995

  16. ANSI X9.57 “Public key cryptography for financial services industry” Certificate management” 1995

  17. FIPS 46-2 (1993) “Data Encryption Standard”

  18. FIPS 46-3 (1999) “TDES”

  19. FIPS 81 “DES modes of operation” 1980

  20. FIPS 186 “Digital signature standards” 1994

  21. ISO 8372 “Information processing – Modes of operation for a 64-bit block cipher algorithm”, 1997, 1992

  22. ISO 9731-1,2 “Banking – Approved algorithms for message authentication” 1987,1992

  23. ISO 11166-1,2 “Banking – Key management by means of asymmetric algorithms 1994, 1995

  24. ISO 11568-1,2,3,4,5,6 “Banking – Key management” 1994, 1996

  25. ISO 10118-1,2,3,4 “Information technology- security techniques- hash functions” 1994, 1996

  26. ISO/IEC 14888-1,2,3 “Information technology – security techniques- digital signature with appendix” 1996

  27. RFC 1321 “The MD5 message digest algorithm”, Internet Request for Comments 1992

  28. RFC 1750 “Randomness requirements for security”, Internet Request for Comments 1994

  29. RFC 2104 “HMAC: keyed-Hashing for Message Authentication”, Internet Request for Comments 1997



  1. http://www.esat.kuleuven.ac.be/~bosselae/ripemd160.html

  2. http://www.cs.ucdavis.edu/~rogaway/papers/

  3. http://theory.lcs.mit.edu/~rivest/

  4. http://www.rsasecurity.com

  5. http://www.certicom.com

  6. http://www.counterpane.com

  7. http://www.cacr.math.uwaterloo.ca/

  8. http://www.cryptography.com/

  9. http://www.zurich.ibm.com/Technology/Security/

  10. http://csrc.nist.gov/encryption/aes/aes_home.htm

  11. http://grouper.ieee.org/groups/1363/index.html

  12. http://www.cacr.math.uwaterloo.ca/hac/

PROTOCOLOS ( SSL, SET )


  1. G. N. Drew, Using Set for Secure Electronic Commerce, , Prentice Hall, NJ 1999

  2. D.C. Lynch, L. Lundquist, Digital Money, John Wiley & Sons 1996

  3. L. Loeb, Secure Electronic Transactions, Introduction and Technical Reference, Artech House, 1998

  4. M.S. Merkow, J. Breithaupt, Building SET Applications for Secure Transactions, John Wiley &Sons 1998

  5. http://directory.netscape.com/Computers/Security/Internet/SSL-TLS

  6. http://www.ietf.org/html.charters/tls-charter.html

  7. http://www.setco.org/


INFRAESTRUCTURAS DE CLAVES PUBLICAS Y CERTIFICADOS DIGITALES





  1. W. Ford, M. S. Baum, Secure Electronic Commerce: Building the Infrastructure for Digital Signature and Encryption, Prentice-Hall, Englewood Cliffs, NJ 1997

  2. J. Feghhi, J. Feghhi, P. Williams, Digital Certificates Applied Internet Security, Addison Wesley, 1999

  3. L.M. Kohnfelder, Toward a practical public-key cryptosystem, B.Sc. thesis, MIT Department of Electrical Engineering, 1978

  4. http://www-08.nist.gov/pki/program/welcome.html

  5. http://www.ietf.org/html.charters/pkix-charter.html

  6. http://theory.lcs.mit.edu/~rivest/sdsi10.html

  7. http://www.certco.com/

  8. http://www.verisign.com/

  9. http://www.entrust.com/

  10. http://www.xcert.com/

CRIPTOGRAFIA VISUAL




  1. M.Naor and B.Pinkas, Visual authentication and identification, in "Advances in Cryptology -- CRYPTO '97", B. Kaliski, Jr., ed., Lecture Notes in Computer Science 1294 (1997), 322-336

  2. M.Naor and A.Shamir, Visual cryptography, in "Advances in Cryptology -- EUROCRYPT '94", A. De Santis, ed., Lecture Notes in Computer Science 950 (1995), 1-12.

  3. M. Naor and A. Shamir, Visual cryptography II: improving the constrast via the cover base, in "Security Protocols", M. Lomas, ed., Lecture Notes in Computer Science 1189 (1997), 197-202.

  4. D. R. Stinson, Visual cryptography and threshold schemes, Dr. Dobb's Journal,,(1998), 36-43

  5. http://www.cacr.math.uwaterloo.ca/~dstinson/visual.html

COMPARTICION DE SECRETOS




  1. A. Shamir, How to share a secret, Communications of the ACM V. 22 1979, 612-613

  2. http://www.cacr.math.uwaterloo.ca/~dstinson/ssbib.html
1   2   3   4   5   6

similar:

8 Bibliografía 0 Prefacio iconBibliografíA 271 prefacio a la edición de 1976 El presente libro...

8 Bibliografía 0 Prefacio iconPrefácio

8 Bibliografía 0 Prefacio iconPrefacio

8 Bibliografía 0 Prefacio icon1 Prefacio

8 Bibliografía 0 Prefacio iconPrefacio

8 Bibliografía 0 Prefacio iconPrefacio a la edición de 1976

8 Bibliografía 0 Prefacio iconLibro uno bella prefacio

8 Bibliografía 0 Prefacio iconLibro uno bella prefacio

8 Bibliografía 0 Prefacio icon3. Bibliografía citada en estos apuntes y bibliografía adicional

8 Bibliografía 0 Prefacio iconBibliografía. Consigna los libros de los cuales se extrajeron las...




Todos los derechos reservados. Copyright © 2019
contactos
b.se-todo.com