Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
ANSI X3.92-1981, Data Encryption Algorithm, 1981.
ANSI X9.9-1986, Financial Institution Message Authentication, 1986.
G. Brassard, Modern Cryptography, Lecture Notes in Computer Science 325, Springer-Verlag, Berlin-Heidelberg-New York, 1988.
D. Chaum, “Zero-knowledge Undeniable Signatures,” Advances in Cryptology, Proc. Eurocrypt'90, LNCS 473, I.B. Damgård, Ed., Springer-Verlag, 1991, pp. 458–464.
D. Chaum, “Achieving Electronic Privacy,” Scientific American, Vol. 267, No. 2, 1992, pp. 96–101.
D.W. Davies and W.L. Price, Security for Computer Networks, 2nd ed., Wiley & Sons, New York, 1989.
W. Diffie and M.E. Hellman, “New Directions in Cryptography,” IEEE Trans. on Information Theory, Vol. IT-22, 1976, pp. 644–654.
W. Fumy and H.P. Riess, Kryptographie, 2. Auflage, Oldenbourg, Munich, 1994.
ISO International Standard 7498, Information processing — Open systems interconnection — Basic reference model, 1983.
ISO International Standard 8731-1, Banking — Approved algorithms for message authentication, Part 1: DEA, 1987.
ISO International Standard 7498-2, Information processing — Open systems interconnection-Basic reference model — Part 2: Security Architecture, 1988.
ISO/IEC International Standard 9796, Information technology — Security techniques — Digital signature scheme giving message recovery, 1991.
ISO/IEC International Standard 9797, Information technology — Data cryptographic techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm, 1993.
ISO/IEC Draft International Standard 9798-2, Information technology — Security techniques — Entity authentication mechanisms, Part 2: Entity authentication using symmetric techniques, 1993.
ISO/IEC International Standard 9798-3, Information technology — Security techniques — Entity authentication mechanisms, Part 3: Entity authentication using a public key algorithm, 1993.
ISO/IEC Committee Draft 11770-2, Information technology — Security techniques — Key management, Part 2: Key management mechanisms using symmetric techniques, 1993.
ISO/IEC Committee Draft 11770-3, Information technology — Security techniques — Key management, Part 3: Key management mechanisms using asymmetric techniques, 1993.
ISO/IEC International Standard 10118-1, Information technology — Security techniques — Hash-functions, Part 1: General, 1994.
ISO/IEC International Standard 10118-2, Information technology — Security techniques — Hash-functions, Part 2: Hash functions using an n-bit block cipher algorithm, 1994.
C.H. Meyer and S.M. Matyas, Cryptography: A New Dimension in Computer Data Security, Wiley & Sons, New York, 1982.
National Bureau of Standards, Data Encryption Standard, Federal Information Processing Standard, Publication 46, US Department of Commerce, January 1977.
G.J. Popek and C.S. Kline, “Encryption and secure computer networks,” ACM Computing Surveys, Vol. 11, 1979, pp. 331–356.
R.A. Rueppel. Analysis and Design of Stream Ciphers, Springer-Verlag, Berlin-Heidelberg, 1986.
R.L. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signature and public key cryptosystems,” Communications of the ACM, Vol. 21, 1978, pp. 120–126.
V.L. Voydock and S.T. Kent, “Security in high level network protocols,” IEEE Communications Magazine, July 1985, pp. 12–24.
Editor information
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Bosselaers, A., Preneel, B. (1995). Integrity concepts. In: Bosselaers, A., Preneel, B. (eds) Integrity Primitives for Secure Information Systems. Lecture Notes in Computer Science, vol 1007. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-60640-8_2
Download citation
DOI: https://doi.org/10.1007/3-540-60640-8_2
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60640-6
Online ISBN: 978-3-540-48517-9
eBook Packages: Springer Book Archive