Section 11.6. Recommended Reading


[Page 344 (continued)]

11.6. Recommended Reading

[JUEN85] and [JUEN87] provide a good background on message authentication, with a focus on cryptographic MACs and hash functions. Solid treatments of hash functions and message authentication codes are found in [STIN02] and [MENE97]. A good recent survey is [PREN99].

JUEN85 Jueneman, R.; Matyas, S.; and Meyer, C. "Message Authentication." IEEE Communications Magazine, September 1988.

JUEN87 Jueneman, R. "Electronic Document Authentication." IEEE Network Magazine, April 1987.

MENE97 Menezes, A.; Oorshcot, P.; and Vanstone, S. Handbook of Applied Cryptography. Boca Raton, FL: CRC Press, 1997.

PREN99 Preneel, B. "The State of Cryptographic Hash Functions." Proceedings, EUROCRYPT '96, 1996; published by Springer-Verlag.

STIN02 Stinson, D. Cryptography: Theory and Practice. Boca Raton, FL: CRC Press, 2002.





Cryptography and Network Security Principles and Practices
Cryptography and Network Security (4th Edition)
ISBN: 0131873164
EAN: 2147483647
Year: 2005
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net