-
2
-
-
79953813800
-
-
US Department of Commerce/N.I.S.T, Springfield, Virginia, November
-
FIPS Pub 197 (2001), Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, US Department of Commerce/N.I.S.T, Springfield, Virginia, November.
-
(2001)
Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197
-
-
FIPS Pub 1971
-
3
-
-
0000239931
-
The block cipher Rijndael
-
J.J. Quisquater and B. Schneier (Eds) Springer-Verlag
-
Rijmen, V. and Daemen, J. (2000) ‘The block cipher Rijndael’, in J.J. Quisquater and B. Schneier (Eds). Smart Card Research and Applications, LNCS 1820, pp.288–296, Springer-Verlag.
-
(2000)
Smart Card Research and Applications, LNCS 1820
, pp. 288-296
-
-
Rijmen, V.1
Daemen, J.2
-
4
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
Bellare, M., Kilian, J. and Rogaway, P. (2000) ‘The security of the cipher block chaining message authentication code’, Journal of Computer and System Sciences, Vol. 61, No. 3, pp.362–399.
-
(2000)
Journal of Computer and System Sciences
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
5
-
-
0038628696
-
-
RFC 3610, September
-
Whiting, D., Housley, R. and Ferguson, N. (2003) ‘Counter with CBC-MAC (CCM)’, RFC 3610, September.
-
(2003)
Counter with CBC-MAC (CCM)
-
-
Whiting, D.1
Housley, R.2
Ferguson, N.3
-
8
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.L., Shamir, A. and Adleman, L.M. (1978) ‘A method for obtaining digital signatures and public-key cryptosystems’, Communications of the ACM, Vol. 21, No. 2, pp.120–126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
9
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal, T. (1985) ‘A public key cryptosystem and a signature scheme based on discrete logarithms’, IEEE Transactions on Information Theory, Vol. 31, pp.469–472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
ElGamal, T.1
-
13
-
-
0000653210
-
Selecting cryptographic key sizes
-
Lenstra, A. and Verheul, E. (2001) ‘Selecting cryptographic key sizes’, Journal of Cryptology, Vol. 14, No. 4, pp.255–293.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.1
Verheul, E.2
-
14
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
Summer
-
Perrig, A., Canetti, R., Song, D. and Tygar, D. (2002) ‘The TESLA broadcast authentication protocol’, RSA Cryptobytes, Summer.
-
(2002)
RSA Cryptobytes
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
16
-
-
84952958410
-
-
Here MAC is short for Message Authentication Code, not for Medium Access Control
-
Here MAC is short for Message Authentication Code, not for Medium Access Control.
-
-
-
-
17
-
-
85086953882
-
-
p, and (mod p) is assumed whenever necessary
-
p, and (mod p) is assumed whenever necessary.
-
-
-
|