next up previous contents
Siguiente: About this document ... Un nivel arriba: Códigos y Criptografía Anterior: Digital Signature Standard

Bibliography

1
F. Bauer. Decrypted secrets: Methods and maxims of cryptology, Springer, 2000.

2
G. Brassard. Modern Cryptology. Volume 325 of Lecture Notes in Computer Science,Springer-Verlag, 1988.

3
W. Diffie and M.E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22: 644-654, 1976.

4
D. Kahn. The Codebreakers. Macmillan Co., New York, 1967.

5
N. Koblitz. A Course in Number Theory and Cryptography. Springer-Verlag, 1994.

6
A.J. Menezes, P.C. van Oorschot, S.A. Vanstone. Handbook of Applied Cryptography, CRC Press, 1996. http://www.cacr.math.uwaterloo.ca/hac/index.html

7
R. Rivest. Cryptography , J. van Leeuwen, ed-itor, Handbook of Theoretical Computer Sci-ence, 719 755, Elsevier Science Publishers, 1990.

8
RSA Laboratories Frequently Asked Questions About Today's Cryptography. http://www.rsasecurity.com

9
B. Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, New York, 2nd edition, 1996.

10
G.J. Simmons, editor. Contemporary Cryptology The Science of Information Integrity. IEEE Press, 1992.

11
D. R. Stinson. Cryptography: Theory and Practice, CRC Press, 1995.


Guillermo Morales-Luna
2000-10-29