Bibliography

[biblio20_01] (Electronic Frontier Foundation 1998) “Cracking DES,” http://cryptome.org/cracking-des.htm. First published by O’Reilly & Associates, May 1998.

[biblio20_02] (Microsoft 2006a) Microsoft Corporation. .NET Framework Developer’s Guide, “Cryptographic Services,” http://msdn.microsoft.com/library/en-us/cpguide/html/cpconCryptographicServices.asp. MSDN.

[biblio20_03] (Microsoft 2006b) Microsoft Corporation. “Microsoft CryptoAPI System Architecture,” http://msdn.microsoft.com/library/en-us/seccrypto/security/cryptoapi_system_architecture.asp.

[biblio20_04] (Microsoft 2001) Lambert, John. Microsoft Corporation. “Introducing CAPICOM,” http://msdn.microsoft.com/library/en-us/dnsecure/html/intcapicom.asp. MSDN, May 2001.

[biblio20_05] (RFC 2104) Internet Engineering Task Force, Network Working Group. RFC 2104: “HMAC: Keyed-Hashing for Message Authentication,” http://www.ietf.org/rfc/rfc2104.txt. February 1997.

[biblio20_06] (NIST 2005) National Institute of Standards and Technology. Guideline for Implementing Cryptography in the Federal Government, http://csrc.nist.gov/publications/nistpubs/800-21-1/sp800-21-1_Dec2005.pdf.

[biblio20_07] (KeyLength 2006) KeyLength.com. “Cryptographic Key Length Recommendation,” http://www.keylength.com.

[biblio20_08] (RFC 2898) Internet Engineering Task Force, Network Working Group. RFC 2898: “PKCS #5: Password-Based Cryptography Specification, Version 2.0,” http://www.ietf.org/rfc/rfc2898.txt. September 2000.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset