Recommendation for Existing Application-Specific Key Derivation Functions
暂无分享,去创建一个
[1] Sean Turner,et al. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS) , 2010, RFC.
[2] Lidong Chen,et al. Recommendation for Key Derivation Using Pseudorandom Functions (Revised) , 2009 .
[3] Lidong Chen,et al. Recommendation for Key Derivation through Extraction-then-Expansion , 2011 .
[4] Simon Blake-Wilson,et al. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS) , 2002, RFC.
[5] Morris J. Dworkin,et al. SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication , 2005 .
[6] Mats Näslund,et al. The Secure Real-time Transport Protocol (SRTP) , 2004, RFC.
[7] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[8] Tatu Ylönen,et al. The Secure Shell (SSH) Connection Protocol , 2006, RFC.
[9] Elaine B. Barker,et al. SP 800-57. Recommendation for Key Management, Part 1: General (revised) , 2007 .
[10] David A. McGrew. The Use of AES-192 and AES-256 in Secure RTP , 2011, RFC.
[11] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[12] Uri Blumenthal,et al. User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3) , 1998, RFC.
[13] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[14] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[15] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[16] Bert Wijnen,et al. An Architecture for Describing SNMP Management Frameworks , 1998, RFC.
[17] Elaine B. Barker,et al. SP 800-56A. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised) , 2007 .
[18] Baugher,et al. The Secure Real-Time Transport Protocol , 2003 .
[19] Bill Hancock,et al. Elliptical curve cryptography and standards for efficient cryptography group , 1999, Computers & security.
[20] Russ Housley,et al. Cryptographic Message Syntax (CMS) , 2002, RFC.
[21] Henning Schulzrinne,et al. RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.
[22] Elaine B. Barker,et al. SP 800-56B. Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography , 2009 .
[23] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[24] Uri Blumenthal,et al. User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3) , 1999, RFC.
[25] Hugo Krawczyk,et al. On Extract-then-Expand Key Derivation Functions and an HMAC-based KDF ∗ , 2008 .
[26] H. Schulzrinne,et al. A Transport Protocol for Real-time Applications , 2010 .
[27] Tatu Ylönen,et al. The Secure Shell (SSH) Authentication Protocol , 2006, RFC.
[28] Vivek Kapoor,et al. Elliptic curve cryptography , 2008, UBIQ.
[29] Tatu Ylönen,et al. The Secure Shell (ssh) Transport Layer Protocol , 2006 .
[30] Eric Rescorla,et al. Diffie-Hellman Key Agreement Method , 1999, RFC.
[31] William E. Burr,et al. Recommendation for Key Management, Part 1: General (Revision 3) , 2006 .