References

[FIPS113] Federal Information Processing Standards Publication 113. "Computer Data Authentication." U.S. Department of Commerce, National Bureau of Standards, National Technical Information Service. Springfield, Virginia, 1985.

[KR95] Kaliski, B. and M. Robshaw. "The Secure Use of RSA." RSA Laboratories' CryptoBytes 1, no. 3 (Autumn 1995).

[MvOV97] Menezes, A., P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. Boca Raton: CRC Press, 1997.

[RFC2104] Krawczyk, H., M. Bellare, and R. Canetti. "HMAC: Keyed Hashing for Message Authentication." Internet Request for Comments 2104. (February 1997).

[RFC2144] Adams, C. "The CAST-128 Encryption Algorithm." Internet Request for Comments 2144. (May 1997).

[RFC2401] Kent, S. ...

Get Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.