Notes

1. H. Feistel, “Block Cipher Cryptographic System,” U.S. Patent #3,798,539, March 19, 1974.

2. Data Encryption Standard, FIPS PUB 46-1, Washington, D.C.: National Bureau of Standards, January 15, 1977.

3. ANSI X3.92 “American National Standard for Data Encryption Algorithm, (DEA),” American National Standards Institute, 1981.

4. Lai, X., “On the Design and Security of Block Ciphers,” ETH Series on Information Processing, v. 1, Konstanz: Hartung-Gorre Verlag, 1992.

5. Rivest, R. L., Shamir, A., and Addleman, L. M., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM, v. 21, n. 2, Feb 1978, pp. 120–126.

6. Diffie, W. and Hellman, M., “New Directions in Cryptography,” IEEE Transactions on Information Theory, Vol. IT-22, November 1976, pp. 644–654.

7. El Gamal, T., “A Public-Key Crypto System and a Signature Scheme Based on Discrete Logarithms,” Advances in Cryptography: Proceedings of CRYPTO 84, Springer-Verlag, 1985, pp. 10–18.

8. Koblitz, N., “Elliptic Curve Cryptosystems,” Mathematics of Computation, v. 48, n. 177, 1987, pp. 203–209.

9. Miller, V.S., “Use of Elliptic Curves in Cryptography,” Advances in Cryptology — CRYPTO ‘85 Proceedings, Springer-Verlag, 1986, pp. 417–426.

10. National Institute of Standards and Technology, NIST FIPS PUB 186-3, “Digital Signature Standard,” U.S. Department of Commerce, June 2009.

11. NIST FIPS PUB 180-3, “Secure Hash Standard,” U.S. Department of Commerce, June 2009.

12. Schnorr, C. P., “Efficient ...

Get Web Commerce Security Design and Development now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.