Cryptography and Network Security (4th Edition)

[Page 344 (continued)]

11.6. Recommended Reading

[JUEN85] and [JUEN87] provide a good background on message authentication, with a focus on cryptographic MACs and hash functions. Solid treatments of hash functions and message authentication codes are found in [STIN02] and [MENE97]. A good recent survey is [PREN99].

JUEN85 Jueneman, R.; Matyas, S.; and Meyer, C. "Message Authentication." IEEE Communications Magazine, September 1988.

JUEN87 Jueneman, R. "Electronic Document Authentication." IEEE Network Magazine, April 1987.

MENE97 Menezes, A.; Oorshcot, P.; and Vanstone, S. Handbook of Applied Cryptography. Boca Raton, FL: CRC Press, 1997.

PREN99 Preneel, B. "The State of Cryptographic Hash Functions." Proceedings, EUROCRYPT '96, 1996; published by Springer-Verlag.

STIN02 Stinson, D. Cryptography: Theory and Practice. Boca Raton, FL: CRC Press, 2002.

Категории