You are on page 1of 4

SUGGESTED READING

ASSIGNMENTS

WILLIAM STALLINGS
Chapter 1 Overview

Why Cryptography Is Harder Than It Looks by Bruce Schneier


1997

A Contemporary Look at Saltzer and Schroeder's 1975 Design Principles


IEEE Security and Privacy, November/December 2012

Chapter 2 Classical Encryption

Johnson, N. Exploring Steganography: Seeing the Unseen.


Computer, February 1998

Chapter 3 Block Ciphers and DES

Tiny Encryption Algorithm


Cryptologia july 1997

Chapter 4 Finite Fields

On Computing Multiplicative Inverses in GF(2 m)


IEEE Transactions on Computers, August 1993

Chapter 5 AES

The Block Cipher Square


Proceedings, Fast Software Encryption 1997

Polynomials in the Nation’s Service: Using Algebra to Design the Advanced


Encryption Standard
AMS Monthly, February 2004

Securing the Enterprise with Intel® AES-NI


Intel Corp White Paper September 2010

Chapter 6 Block Cipher Operation

Block Chaining Modes of Operation


Department of Informatics, U. of Bergen
October 2000

Chapter 7 PRNG and Stream Ciphers

RFC 4086 Randomness Recommendations for Security


-2-
June 2005

Software Generation of Practically Strong Random Numbers


P. Gutman
Proceedings of the 7th USENIX Security Symposium
San Antonio, Texas, January 26-29, 1998

Chapter 8 Number Theory

Some primality testing algorithms, Richard Pinch


AMS Notices, 40, no. 9 (Nov 1993)

Chapter 9 PKCS and RSA

Asymmetric Encryption: Evolution and Enhancements


Cryptobytes Volume 2, No. 1 – Spring 1996 (pdf, 210k)

Chapter 10 Other PKCS

Elliptic-Curve Cryptography
ACM Ubiquity, May 2008

Chapter 11 Hash Functions

Tiger: A Fast New Hash Function,


Fast Software Encryption 3, 1996, LNCS 1039

Chapter 12 MACs

A Logic of Authentication, SRC Research Report 39


ACM Transactions on Computer Systems, February 1990

Deterministic Authenticated-Encryption: A Provable-Security Treatment of


the Key-Wrap Problem
P. ROGAWAY∗ T. SHRIMPTON
UC Davis Report 2007

Chapter 13 Digital Signatures

Akl, S. "Digital Signatures: A Tutorial Survey." Computer, February 1983

Digital Signature Schemes for Computer Communication Networks


Meijer and Akl
SIGCOMM '81 Proceedings of the seventh symposium on Data
communications

-3-
Achieving Electronic Privacy
by David Chaum Scientific American, August 1992

Chapter 14 Key Management

A SURVEY OF KEY MANAGEMENT IN AD HOC NETWORKS


IEEE Communications Surveys, 3rd Quarter 2006

-4-

You might also like