Usable Security Project
Western Illinois University
 
 
Welcome to Usable Security Education Project Home Page
  

Section 6: Advanced Cryptography - Reference

Publications

  1. Introduction to Cryptography with Coding Theory, 2nd edition, Wade Trappe and Lawrence C. Washington, Prentice Hall, 2005.
  2. Network Security: Private Communication in a Public World, 2nd Edition, by Charlie Kaufman, Radia Perlman and Mike Speciner, Prentice Hall, 2002.
  3. Selecting the Advanced Encryption Standard, WILLIAM E. BURR, National Institute of Standards and Technology.
  4. Cryptographic Techniques For Computers, Dennie Van Tassel, San Jose State College, San Jose, California
  5. Federal Information Processing Standards Publication 197, November 26, 2001
  6. FaultBased Attack of RSA Authentication, Andrea Pellegrini, Valeria Bertacco, Todd Austin, University of Michigan.
  7. An Elliptic Curve Cryptography based Authentication and Key Agreement Protocol for Wireless Communication, M. Aydos, B. Sunar, and C . K. Koc Electrical & Computer Engineering Oregon State University.
  8. Browser validation and extended validation SSL certiicates: an empirical study, Robert Biddle, Tara Whalen, Andrew S. Patrick, Jennifer Sobey, P.C. van Oorschot, ACM cloud computing workshop, Chicago, USA, 2009.
  9. Making the impossible easy: Usable PKI, D. Balfanz, G. Durfee, and D. K. Smetters, Cranor and Garfinkel (eds), Security and Usability, 2005.
  10. Crying wolf: an empirical study of SSL warning effectiveness, J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. Cranor, USENIX security, 2009.
  11. Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition, B. Schneier, Wiley, 1996.

Links

  1. Intel AES New Instruction Set.
  2. BlackBerry PGP Support Package
  3. Advanced Crypto Software Collection
  4. Enhancing COPACOBANA

Top

 
 
 
 
Usable Security Education © 2008
Stipes 447I
Computer Science Department
Western Illinois University
1 University Circle
Macomb IL-61455
Western Illinois University Valid XHTML 1.0 Transitional Valid XHTML 1.0 Transitional National Science Foundation
 
 
 
 

This material is based upon work supported by the National Science Foundation under Grant No. 0736643. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.