[AESAVS]
Lawrence E. Bassham III,
The Advanced Encryption Standard
Algorithm Validation Suite (AESAVS),
National Institute of Standards and Technology, 15 November 2002.
[AES-WRAP]
AES Key Wrap Specification,
National Institute of Standards and Technology,
16 November 2001,
<http://csrc.nist.gov/groups/ST/toolkit/documents/kms/key-wrap.pdf>.
[ANDE01]
Ross Anderson,
Security Engineering,
Wiley, 2001.
[BALE05]
Francesco Balena and Giuseppe Dimauro,
Practical Guidelines and Best Practices for Microsoft Visual Basic and Visual C# Developers,
Microsoft Press, 2005,
ISBN 0735621721.
[CHACHA]
Daniel J. Bernstein, ChaCha, a variant of Salsa20, January 2008, <http://cr.yp.to/chacha/chacha-20080120.pdf>.
[CHACHA-TESTS]
Test Vectors for the Stream Cipher ChaCha,
draft-strombergson-chacha-test-vectors-02, J. Strombergson,
<https://github.com/secworks/chacha_testvectors>, (work in progress), December 2013.
[CHAN]
Mahesh Chand,
Tutorial: Creating C# Class Library (DLL) Using Visual Studio .NET,
<http://www.dotnetheaven.com/Uploadfile/mahesh/pr1202172006014101AM/pr12.aspx> (accessed March 2009).
[CRCALGS]
Ross N. Williams,
A Painless Guide To Crc Error Detection Algorithms,
<ftp.adelaide.edu.au/pub/rocksoft/crc_v3.txt>, 1993.
[DRBGVS]
Timothy A. Hall,
The NIST SP 800-90A Deterministic Random Bit Generator Validation System (DRBGVS),
National Institute of Standards and Technology, Updated 29 October 2015,
DRBGVS.pdf
[FERG03]
Niels Ferguson and Bruce Schneier,
Practical Cryptography,
John Wiley, 2003.
[FIPS46]
Federal Information Processing Standard (FIPS) 46-3,
Data Encryption Standard (DES),
U.S. Department Of Commerce/National Institute of Standards and Technology,
25 October 1999 (now withdrawn).
[FIPS74]
Federal Information Processing Standard 74 (FIPS PUB 74),
Guidelines for Implementing and Using the NBS Data Encryption Standard,
U.S. Department Of Commerce/National Institute of Standards and Technology,
1 April 1981 (now withdrawn).
[FIPS81]
Federal Information Processing Standard (FIPS 81),
DES Modes of Operation,
U.S. Department Of Commerce/National Institute of Standards and Technology,
2 December 1980 (now withdrawn).
[FIPS140]
Federal Information Processing Standards Publication
FIPS PUB 140-2 Security Requirements for Cryptographic Modules,
U.S. Department Of Commerce/National Institute of Standards and Technology,
25 May 2001, updated 3 December 2002.
[FIPS140IG]
Implementation Guidance for
FIPS PUB 140-2 and the Cryptographic
Module Validation Program,
U.S. Department Of Commerce/National Institute of Standards and Technology,
updated 26 July 2007.
[FIPS140XC]
Annex C:
Approved Random Number Generators
for FIPS PUB 140-2,
Security Requirements for
Cryptographic Modules,
U.S. Department Of Commerce/National Institute of Standards and Technology,
19 March 2007.
[FIPS180]
Federal Information Processing Standard,
FIPS PUB 180-4
Secure Hash Standard (SHS),
U.S. Department Of Commerce/National Institute of Standards and Technology, August 2015.
[FIPS197]
Federal Information Processing Standards Publication
FIPS PUB 197
Advanced Encryption Standard (AES),
U.S. Department Of Commerce/National Institute of Standards and Technology,
26 November 2001.
[FIPS198]
Federal Information Processing Standards Publication
FIPS PUB 198 The Keyed-Hash Message Authentication Code (HMAC),
U.S. Department Of Commerce/National Institute of Standards and Technology,
6 March 2002.
[FIPS202]
Federal Information Processing Standards Publication
FIPS PUB 202
SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions,
U.S. Department Of Commerce/National Institute of Standards and Technology,
August 2015.
[FIPSSHS]
Draft Federal Information Processing Standard,
Descriptions of SHA-256, SHA-384, and SHA-512,
<http://csrc.nist.gov/cryptval/shs.html>, 12 October 2000.
[GUTM]
Peter Gutmann, Software Generation of Practically Strong
Random Numbers presented at the 1998 Usenix Security Symposium, and the updated version
dated June 2000, both available from
<http://www.cs.auckland.ac.nz/~pgut001/>.
[HMAC]RFC 2104 HMAC: Keyed-Hashing for Message
Authentication, Krawczyk, Bellare and Canetti, February 1997.
[KELS98]
John Kelsey, Bruce Schneier, David Wagner, Chris Hall,
Cryptanalytic Attacks on Pseudorandom Number Generators, March 1998,
available from
<http://www.schneier.com/paper-prngs.html>.
[KOBL94]
Neal Koblitz,
A Course in Number Theory and Cryptography,
Second Edition, Springer-Verlag, 1994.
[MCGR05]
David A. McGrew and John Viega, The Galois/Counter Mode of Operation (GCM),
Revised specification, 31 May 2005,
<http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/gcm/gcm-revised-spec.pdf>
(accessed March 2009).
[MENE97]
Menezes, van Oorschot and Vanstone,
Handbook of Applied Cryptography,
CRC Press LLC, 1997.
[MOVS]
NIST Special Publication 800-17,
Modes of Operation Validation System
(MOVS): Requirements and Procedures,
National Institute of Standards and Technology, February 1998.
[NISPOM]
DOD 5220.22-M,
National Industry Security Program Operating Manual (NISPOM),
US Department of Defense, January 1995.
[PKCS1]
PKCS #1,
RSA Cryptography Standard,
RSA Laboratories, Version 2.2, October 2012 (republished as [RFC8017]).
[PKCS5]
PKCS #5,
Password-Based Encryption Standard,
RSA Laboratories, Version 2.1, October 2006.
See also [RFC2898].
[PKCS7]
PKCS #7,
Cryptographic Message Syntax Standard,
RSA Laboratories, Version 1.5, November 1993.
See also [RFC2315].
[POLY1305]
Daniel J. Bernstein, The Poly1305-AES message-authentication code, March 2005, <http://cr.yp.to/mac/poly1305-20050329.pdf>.
[RFC1319]RFC 1319
The MD2 Message-Digest Algorithm, R. Rivest, RSA Data Security, Inc., April 1992.
[RFC1321]RFC 1321
The MD5 Message-Digest Algorithm, R. Rivest, RSA Data Security, Inc., April 1992.
[RFC1423]RFC 1423,
Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers,
D. Balenson, February 1993.
[RFC1950]RFC 1950 ZLIB Compressed Data Format Specification version 3.3,
P.Deutsch and J-L Gailly, May 1996.
[RFC1951]RFC 1951 DEFLATE Compressed Data Format Specification version 1.3,
P.Deutsch, May 1996.
[RFC2315]RFC 2315 Cryptographic Message Syntax Version 1.5,
B. Kaliski, March 1998.
[RFC2630]RFC 2630 Cryptographic Message Syntax,
R. Housley, June 1999. (Superseded by
[CMS] and
[RFC3370]).
[RFC2898]RFC 2898 PKCS #5: Password-Based Cryptography Specification Version 2.0,
B. Kalinski, September 2000.
[RFC3369]RFC 3369 Cryptographic Message Syntax (CMS),
R. Housley, August 2002. (Superseded by [CMS]).
[RFC3370]RFC 3370 Cryptographic Message Syntax (CMS) Algorithms,
R. Housley, August 2002.
[RFC4106]RFC 4106 The Use of Galois/Counter Mode (GCM)
in IPsec Encapsulating Security Payload (ESP),
J. Viega, D. McGrew, June 2005.
[RFC4345]RFC 4345 Improved Arcfour Modes for the Secure Shell (SSH) Transport Layer Protocol,
B. Harris, January 2006.
[RFC4648]RFC 4648,
The Base16, Base32, and Base64 Data Encodings,
S. Josefsson, October 2006.
[RFC5116]RFC 5116 An Interface and Algorithms for Authenticated Encryption,
D. McGrew, January 2008.
[RFC6229]RFC 6229 Test Vectors for the Stream Cipher RC4,
J. Strombergson, May 2011.
[RFC7539]RFC 7539 ChaCha20 and Poly1305 for IETF Protocols.
Y. Nir, A. Langley. May 2015.
[RFC7914]RFC 7914 The scrypt Password-Based Key Derivation Function.
C. Percival, S. Josefsson. 2016.
[RFC8017]RFC 8017
PKCS #1: RSA Cryptography Specifications Version 2.2.
K. Moriarty, Ed., B. Kaliski, J. Jonsson, A. Rusch. November 2016.
[RFC8878]RFC 8878 Zstandard Compression and the 'application/zstd' Media Type.
Y. Collet, M. Kucherawy, Ed. Facebook. February 2021.
[RIJN]
Joan Daemen and Vincent Rijmen, AES Proposal: Rijndael,
Document Version 2, 3 September 1999.
[RIJNVALS]
AES Candidate Algorithm Submissions,
Rijndael Test values: Known Answer Tests and Monte Carlo Tests,
<http://csrc.nist.gov/CryptoToolkit/aes/rijndael/rijndael-vals.zip>,
update 17 Feb 1998.
[RMD]
Antoon Bosselaers, The RIPEMD-160 Page,
<http://homes.esat.kuleuven.be/~bosselae/ripemd160.html>, last updated 25 August 2004.
[SALSA20]
Daniel J. Bernstein, Salsa20 specification, <http://cr.yp.to/snuffle/spec.pdf>.
[SCHN96]
Bruce Schneier,
Applied Cryptography - Protocols, Algorithms and Source Code in C,
second edition, John Wiley, 1996.
[SHA3]
National Institute of Standards and Technology, U.S. Department of Commerce,
SHA-3 Standard - Permutation- Based Hash and Extendable-Output Functions,
FIPS PUB 202
August 2015.
[SIMO97]
Richard J Simon,
Windows NT Win32 API SuperBible,
Waite Group Press, 1997.
[SP80020]
NIST Special Publication 800-20,
Modes of Operation Validation System for the Triple Data
Encryption Algorithm (TMOVS): Requirements and Procedures,
National Institute of Standards and Technology, April 2000.
[SP80038A]
NIST Special Publication 800-38A,
Recommendation for Block Cipher Modes of Operation: Methods and Techniques,
National Institute of Standards and Technology, December 2001.
[SP80038B]
NIST Special Publication 800-38B,
Recommendation for Block
Cipher Modes of Operation:
The CMAC Mode for
Authentication,
National Institute of Standards and Technology, May 2005.
[SP80038B-UX]
NIST Special Publication 800-38B,
Updated CMAC Examples,
National Institute of Standards and Technology,
<http://csrc.nist.gov/publications/nistpubs/800-38B/Updated_CMAC_Examples.pdf>
(accessed August 2007).
[SP80038D]
NIST Special Publication 800-38D,
Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC,
National Institute of Standards and Technology,
November 2007.
[SP80067]
NIST Special Publication 800-67,
Recommendation for the Triple
Data Encryption Algorithm
(TDEA) Block Cipher,
National Institute of Standards and Technology, Version 1.1, Revised May 2008.
[SP80090A]
NIST Special Publication 800-90A,
Recommendation for Random Number Generation Using Deterministic Random Bit Generators,
Elaine Barker and John Kelsey,
National Institute of Standards and Technology, June 2015.
NIST.SP.800-90Ar1.
[SP800185]
NIST Special Publication 800-185,
SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash and ParallelHash,
John Kelsey, Shu-jen Chang, Ray Perlner,
National Institute of Standards and Technology, December 2016.
NIST.SP.800-185.pdf.
[STAL05]
William Stallings,
Cryptography and Network Security: Principles and Practice,
4th edition, Prentice Hall, 2005, ISBN 0131873164.
[VIEG03]
John Viega and Matt Messier,
Secure Programming Cookbook for C and C++,
O'Reilly, 2003.
[WRAP-3DES]RFC 3217,
Triple-DES and RC2 Key Wrapping,
R. Housley, December 2001.
[X9-23]
ANSI X9.23-1998,
Financial Institution Encryption of Wholesale Financial Messages,
American National Standards Institute, 1998.
[X9-31]
ANSI X9.31-1998
Digital Signatures using Reversible
Public Key Cryptography for the Financial Services Industry (rDSA),
Appendix A,
American National Standards Institute,
1998.
[X9-52]
ANSI X9.52
Triple Data Encryption Algorithm Modes Of Operation, X9.52 -
1998, Accredited Standards Committee X9, American National
Standards Institute, 1998.
[XMLENC]
W3C Recommendation,
XML Encryption Syntax and Processing Version 1.1,
<https://www.w3.org/TR/xmlenc-core1/>, 11 April 2013.