Section 9.3. Recommended Reading and Web Sites


[Page 280 (continued)]

9.3. Recommended Reading and Web Sites

The recommended treatments of encryption listed in Chapter 3 cover public-key as well as symmetric encryption.

[DIFF88] describes in detail the several attempts to devise secure two-key cryptoalgorithms and the gradual evolution of a variety of protocols based on them. [CORM01] provides a concise but complete and readable summary of all of the algorithms relevant to the verification, computation, and cryptanalysis of RSA. [BONE99] discusses various cryptanalytic attacks on RSA. A more recent discussion is [SHAM03].


[Page 281]

BONE99 Boneh, D. "Twenty Years of Attacks on the RSA Cryptosystem." Notices of the American Mathematical Society, February 1999.

CORM01 Cormen, T.; Leiserson, C.; Rivest, R.; and Stein, C. Introduction to Algorithms. Cambridge, MA: MIT Press, 2001.

DIFF88 Diffie, W. "The First Ten Years of Public-Key Cryptography." Proceedings of the IEEE, May 1988. Reprinted in [SIMM92].

SHAM03 Shamir, A., and Tromer, E. "On the Cost of Factoring RSA-1024." CryptoBytes, Summer 2003. http://www.rsasecurity.com/rsalabs


Recommended Web Site

  • RSA Laboratories: Extensive collection of technical material on RSA and other topics in cryptography




Cryptography and Network Security Principles and Practices
Cryptography and Network Security (4th Edition)
ISBN: 0131873164
EAN: 2147483647
Year: 2005
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net