M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In ASIACRYPT, pages 531-545, 2000. Revised in: J. Crypt., 2008.
Google Scholar
D. J. Bernstein. ChaCha, a variant of Salsa20. 28 Jan 2008 manuscript; see also https://cr.yp.to/chacha.html.
D. J. Bernstein. The Poly1305-AES Message-Authentication Code. In Fast Software Encryption, pages 32-49, 2005. See also https://cr.yp.to/mac.html.
J. Black. Authenticated encryption. In Encyclopedia of Cryptography and Security. Springer (editor: Henk C.A. van Tilborg), 2005. Manuscript also online, dated 12 Nov 2003.
Google Scholar
D. Boneh. Twenty years of attacks on the RSA cryptosystem. Notices of AMS, 46(2):203-213, 1999.
Google Scholar
D. Boneh, A. Joux, and P. Q. Nguyen. Why textbook ElGamal and RSA encryption are insecure. In ASIACRYPT, pages 30-43, 2000.
Google Scholar
W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Info. Theory, 22(6):644- 654, 1976.
Google Scholar
W. Diffie and M. E. Hellman. Privacy and authentication: An introduction to cryptography. Proceedings of the IEEE, 67(3):397-427, March 1979.
Google Scholar
N. Ferguson and B. Schneier. Practical Cryptography. Wiley, 2003.
Google Scholar
D. Hankerson, A. Menezes, and S. Vanstone. Guide to Elliptic Curve Cryptography. Springer, 2004.
Google Scholar
IEEE Computer Society. IEEE Std 1619-2007: Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices. 18 April 2008. Defines the XTS-AES encryption mode.
Google Scholar
J. Jonsson. On the security of CTR + CBC-MAC. In Workshop on Selected Areas in Cryptography (SAC), pages 76-93, 2002.
Google Scholar
A. Juels and M. Wattenberg. A fuzzy commitment scheme. In ACM Comp. & Comm. Security (CCS), pages 28-36. ACM, 1999.
Google Scholar
D. Kahn. The Codebreakers. Macmillan, 1967.
Google Scholar
G. H. Kim and E. H. Spafford. The design and implementation of Tripwire: A file system integrity checker. In ACM Comp. & Comm. Security (CCS), pages 18-29. ACM, 1994.
Google Scholar
H. Krawczyk. The order of encryption and authentication for protecting communications (or: How secure is SSL?). In CRYPTO, pages 310-331, 2001.
Google Scholar
H. Krawczyk, M. Bellare, and R. Canetti. RFC 2104: HMAC: Keyed-Hashing for Message Authenti-cation, Feb. 1997. Informational; updated by RFC 6151 (March 2011).
Google Scholar
T. Krovetz and P. Rogaway. The software performance of authenticated-encryption modes. In Fast Software Encryption, pages 306-327, 2011.
Google Scholar
D. McGrew. RFC 5116: An Interface and Algorithms for Authenticated Encryption, Jan. 2008. Pro-posed Standard.
Google Scholar
D. A. McGrew and J. Viega. The Security and Performance of the Galois/Counter Mode (GCM) of Operation. In INDOCRYPT, pages 343-355, 2004.
Google Scholar
A. Menezes. Elliptic Curve Public Key Cryptosystems. Springer, 1993.
Google Scholar
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996. Openly available, http://cacr.uwaterloo.ca/hac/.
Y. Nir and A. Langley. RFC 7539: ChaCha20 and Poly1305 for IETF Protocols, May 2015. Informa-tional.
Google Scholar
NIST. Special Pub 800-38B: Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. May 2005, with updates 6 Oct 2016.
Google Scholar
NIST. Special Pub 800-38C: Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. May 2004, with updates 20 Jul 2007.
Google Scholar
NIST. Special Pub 800-38A: Recommendation for Block Cipher Modes of Operation: Methods and Techniques, Dec. 2001.
Google Scholar
NIST. Special Pub 800-38D: Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC, Nov. 2007.
Google Scholar
NIST. FIPS 198-1: The Keyed-Hash Message Authentication Code (HMAC). U.S. Dept. of Commerce, July 2008.
Google Scholar
NIST. FIPS 186-4: Digital Signature Standard. U.S. Dept. of Commerce, July 2013.
Google Scholar
NIST. Special Pub 800-57 Part 1 r4: Recommendation for Key Management (Part 1: General). U.S. Dept. of Commerce, Jan 2016. (Revision 4).
Google Scholar
NIST. Special Pub 800-67 r2: Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. U.S. Dept. of Commerce, Nov 2017. (Revision 2).
Google Scholar
A. Popov. RFC 7465: Prohibiting RC4 Cipher Suites, Feb. 2015. Proposed Standard.
Google Scholar
B. Preneel. Analysis and Design of Cryptographic Hash Functions. PhD thesis, Katholieke Universiteit Leuven, Belgium, Jan. 1993.
Google Scholar
B. Preneel and P. C. van Oorschot. MDx-MAC and Building Fast MACs from Hash Functions. In CRYPTO, pages 1-14, 1995.
Google Scholar
B. Preneel and P. C. van Oorschot. On the security of iterated message authentication codes. IEEE Trans. Info. Theory, 45(1):188-199, 1999.
Google Scholar
R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM, 21(2):120-126, 1978.
Google Scholar
P. Rogaway. Authenticated-Encryption with Associated-Data. In ACM Comp. & Comm. Security (CCS), pages 98-107, 2002.
Google Scholar
P. Rogaway, M. Bellare, J. Black, and T. Krovetz. OCB: a block-cipher mode of operation for efficient authenticated encryption. In ACM Comp. & Comm. Security (CCS), pages 196-205, 2001. Journal version: ACMTISSEC, 2003.
Google Scholar
S. Singh. The Code Book. Doubleday, 1999.
Google Scholar
S. Turner and L. Chen. RFC 6151: Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms, Mar. 2011. Informational.
Google Scholar
P. C. van Oorschot and M. J. Wiener. Parallel collision search with cryptanalytic applications. Journal of Cryptology, 12(1):1-28, 1999.
Google Scholar
G. Welchman. The Hut Six Story. M&M Baldwin, 2018. First edition 1982, McGraw-Hill.
Google Scholar
D. Whiting, R. Housley, and N. Ferguson. RFC 3610: Counter with CBC-MAC (CCM), Sept. 2003. Informational RFC.
Google Scholar