[DiffieHellman] W. Diffie and M. E. Hellman. "New Directions in Cryptography," IEEE Transactions on Information Theory 22, 1976. [FIPS81] NIST. "DES Modes of Operation." Federal Information Processing Standards Publication 81. http://www.itl.nist.gov/fipspubs/fip81.htm [Schneier01] B. Schneier. "Attack Trees: Modeling Security Threats." Dr. Dobb's Journal 306, December 1999. http://www.schneier.com/paper-attacktrees-ddj-ft.html [Schneier02] B. Schneier. Cryptogram, May 2002. http://www.schneier.com/crypto-gram-0205.html#5 [Schneier03] B. Schneier. "Yarrow: A Secure Pseudorandom Number Generator." http://www.schneier.com/yarrow.html [Schneier04] B. Schneier. "Declassifying Skipjack." Cryptogram, July 1998. http://www.schneier.com/crypto-gram-9807.html#skip [Hashfunc01] H. Lipma. "Hash Functions." http://www.cs.ut.ee/~helger/crypto/link/hash/ [RSA01] RSA Security. "Frequently Asked Questions About Today's Cryptography." http://www.rsasecurity.com/rsalabs/faq/sections.html [RSA02] RSA Security. "What Are Some other Blocks Ciphers." http://www.rsasecurity.com/rsalabs/faq/3-6-7.html [RSA03] RSA Security. "What Is Capstone." http://www.rsasecurity.com/rsalabs/faq/6-2-3.html [AES01] E. Roback and M. Dworkin. "First AES Candidate Conference Report," August 1998. http://csrc.nist.gov/CryptoToolkit/aes/round1/conf1/j41ce-rob.pdf [WeiDai01] Wei Dai. Crypto++ TM Library 5.0 Reference Manual. http://cryptopp.sourceforge.net/docs/ref5/ [WeiDai02] Wei Dai. Crypto++ 5.1 Benchmarks, July 2003. http://www.eskimo.com/~weidai/benchmarks.html [Kaufman] Charlie Kaufman, Radia Perman, and Mike Speciner. Network Security: Private Communication in a Public World. Prentice Hall, 2002. [Goldberg01] Ian Goldberg and David Wagner. "Randomness and the Netscape Browser," Dr. Dobbs' Journal, January 1996. http://www.cs.berkeley.edu/~daw/papers/ddj-netscape.html [RFC1750] D. Eastlake, et al. "Randomness Recommendations for Security," December 1994. http://www.ietf.org/rfc/rfc1750.txt [SCEP01] Cisco. Simple Certificate Enrollment Protocol. http://www.cisco.com/warp/public/cc/pd/sqsw/tech/scep_wp.html [RFC2459] R. Housley, W. Ford, W. Polk, and D. Solo. "Internet X.509 Public Key Infrastructure Certificate and CRL Profile." The Internet Society, January 1999. http://www.ietf.org/rfc/rfc2459.txt. [Moraes] Ian Moraes, Ph.D. "The Use of JNDI in Enterprise Java APIs." JDJ SYS-CON Media, August 1, 2000. http://jdj.sys-con.com/read/36454.htm [Netscape01] A. Frier, P. Karlton, and P. Kocher. The SSL Protocol, Version 3.0, 1996. http://wp.netscape.com/eng/ssl3/ssl-toc.html [RFC2246] T. Dierks and C. Allen. "The TLS Protocol Version 1.0," January 1999. http://www.ietf.org/rfc/rfc2246.txt [RFC2104] H. Krawczyk, et al. "HMAC: Keyed-Hashing for Message Authentication," February 1997. http://www.ietf.org/rfc/rfc2104.txt [ANSIX9.17] American National Standards Institute. American National Standard X9.17: Financial Institution Key Management (Wholesale), 1985. [SSL01] Alan O. Freier, et al. "The SSL Protocol Version 3.0," November 18, 1996. http://wp.netscape.com/eng/ssl3/draft302.txt [RFC2560] M. Meyers et al. "X509 Internet Public Key Infrastructure Online Certificate Status ProtocolOCSP," June 1999. http://www.ietf.org/rfc/rfc2560.txt |