Siguiente: About this document ...
Un nivel arriba: Códigos y Criptografía
Anterior: Digital Signature Standard
- 1
- F. Bauer. Decrypted secrets: Methods and maxims of cryptology, Springer, 2000.
- 2
- G. Brassard. Modern Cryptology. Volume 325 of Lecture Notes in Computer Science,Springer-Verlag, 1988.
- 3
- W. Diffie and M.E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22: 644-654, 1976.
- 4
- D. Kahn. The Codebreakers. Macmillan Co., New York, 1967.
- 5
- N. Koblitz. A Course in Number Theory and Cryptography. Springer-Verlag, 1994.
- 6
- A.J. Menezes, P.C. van Oorschot, S.A. Vanstone. Handbook of Applied Cryptography,
CRC Press, 1996. http://www.cacr.math.uwaterloo.ca/hac/index.html
- 7
- R. Rivest. Cryptography , J. van Leeuwen, ed-itor, Handbook of Theoretical Computer Sci-ence, 719 755, Elsevier Science Publishers, 1990.
- 8
- RSA Laboratories Frequently Asked Questions About Today's Cryptography. http://www.rsasecurity.com
- 9
- B. Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, New York, 2nd edition, 1996.
- 10
- G.J. Simmons, editor. Contemporary Cryptology The Science of Information Integrity. IEEE Press, 1992.
- 11
- D. R. Stinson. Cryptography: Theory and Practice, CRC Press, 1995.
Guillermo Morales-Luna
2000-10-29