|
|
Cryptography Tutorials - Herong's Tutorial Notes |
Dr. Herong Yang, Version 4.00 |
|
|
|
|
References
- Handbook of Applied Cryptography, A. Megezes, P. van Oorschot, and
S. Vanstone, CRC Press, 1996,
http://www.cacr.math.uwaterloo.ca/hac
- Federal Information Processing Standards Publication 1981 Guidelines
for Implementing and Using the NBS Data Encryption Standard, 1981
http://www.itl.nist.gov/fipspubs/fip74.htm
- DES Modes of Operation, 1980
http://www.itl.nist.gov/fipspubs/fip81.htm
- The DES Algorithm Illustrated, J. Orlin Grabbe,
http://www.orlingrabbe.com/des.htm
- PKCS #5: Password-Based Encryption Standard, 1993, An RSA Laboratories Technical Note,
ftp://ftp.rsasecurity.com/pub/pkcs/doc/pkcs-5.doc
- Java Cryptography Architecture API Specification & Reference, 2004,
http://java.sun.com/j2se/1.5.0/docs/guide/security/CryptoSpec.html
- SourceForge.net: mcrypt - Encryption command and library,
http://sourceforge.net/projects/mcrypt
- Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish),
Bruce Schneier, December 1993,
http://www.schneier.com/paper-blowfish-fse.html
- The Blowfish Algorithm,
Asian School of Cyber Laws,
http://www.asianlaws.org/infosec/library/algo/blowfish.pdf
- Encryption Using the Blowfish Algorithm,
Kevin Hackett, 1998,
http://www.ee.ualberta.ca/~elliott/ee552/studentAppNotes/1998f/blowfish_encryption
- Coder's Lagoon - Homepage of BlowfishJ,
Markus Hahn,
http://come.to/hahn
- Primer on Public Key Encryption, MyCrypto.net,
http://www.mycrypto.net/encryption/encryption_public.html
- Public Key Encryption, Charlie Fletcher,
http://www.krellinst.org/UCES/archive/modules/charlie/pke/
- OpenSSL: The Open Source Toolkit for SSL/TLS, The OpenSSL Project,
http://www.openssl.org/
- Herong's Tutorial Notes on Data Encoding, Dr. Herong Yang,
http://www.geocities.com/herong_yang/data/
- PEM, Privacy Enhanced Mail,
http://www.networksorcery.com/enp/data/pem.htm
- RFC 1421 - Privacy Enhancement for Internet Electronic Mail:
Part I: Message Encryption and Authentication Procedures, February 1993,
http://www.faqs.org/rfcs/rfc1421.html
- RFC 3548 - The Base16, Base32, and Base64 Data Encodings, July 2003,
http://www.faqs.org/rfcs/rfc3548.html
- MD5 Homepage (unofficial),
http://userpages.umbc.edu/~mabzug1/cs/md5/md5.html
- RFC 1321 - The MD5 Message-Digest Algorithm, April 1992,
http://www.ietf.org/rfc/rfc1321.txt
- MD5 in 8 lines of perl5, John Allen,
http://www.cypherspace.org/adam/rsa/md5.html
- MD5, Wikipedia,
http://en.wikipedia.org/wiki/MD5
- Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD,
Xiaoyun Wang, Dengguo Feng, Xuejia Lai and Hongbo Yu,
http://eprint.iacr.org/2004/199
- FIPS PUB 180-1 - Secure Hash Algorithm, 1993 May 11,
http://www.itl.nist.gov/fipspubs/fip180-1.htm
- RFC 1321 - US Secure Hash Algorithm 1 (SHA1), September 2001
http://www.ietf.org/rfc/rfc3174.txt
- SHA in 8 lines of perl5, John Allen,
http://www.cypherspace.org/adam/rsa/sha.html
- SHA hash functions, Wikipedia,
http://en.wikipedia.org/wiki/SHA-1
- Collision Search Attacks on SHA1, Xiaoyun Wang. Yiqun Lisa Yin and Hongbo Yu,
http://theory.lcs.mit.edu/~yiqun/shanote.pdf
|
|
|
Dr. Herong Yang, updated in 2007 |
|
|
Cryptography Tutorials - Herong's Tutorial Notes - References |
|
|
|
|
|