Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1007))

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ANSI X3.92-1981, Data Encryption Algorithm, 1981.

    Google Scholar 

  2. ANSI X9.9-1986, Financial Institution Message Authentication, 1986.

    Google Scholar 

  3. G. Brassard, Modern Cryptography, Lecture Notes in Computer Science 325, Springer-Verlag, Berlin-Heidelberg-New York, 1988.

    Google Scholar 

  4. D. Chaum, “Zero-knowledge Undeniable Signatures,” Advances in Cryptology, Proc. Eurocrypt'90, LNCS 473, I.B. Damgård, Ed., Springer-Verlag, 1991, pp. 458–464.

    Google Scholar 

  5. D. Chaum, “Achieving Electronic Privacy,” Scientific American, Vol. 267, No. 2, 1992, pp. 96–101.

    Article  Google Scholar 

  6. D.W. Davies and W.L. Price, Security for Computer Networks, 2nd ed., Wiley & Sons, New York, 1989.

    Google Scholar 

  7. W. Diffie and M.E. Hellman, “New Directions in Cryptography,” IEEE Trans. on Information Theory, Vol. IT-22, 1976, pp. 644–654.

    Article  MathSciNet  Google Scholar 

  8. W. Fumy and H.P. Riess, Kryptographie, 2. Auflage, Oldenbourg, Munich, 1994.

    Google Scholar 

  9. ISO International Standard 7498, Information processing — Open systems interconnection — Basic reference model, 1983.

    Google Scholar 

  10. ISO International Standard 8731-1, Banking — Approved algorithms for message authentication, Part 1: DEA, 1987.

    Google Scholar 

  11. ISO International Standard 7498-2, Information processing — Open systems interconnection-Basic reference model — Part 2: Security Architecture, 1988.

    Google Scholar 

  12. ISO/IEC International Standard 9796, Information technology — Security techniques — Digital signature scheme giving message recovery, 1991.

    Google Scholar 

  13. ISO/IEC International Standard 9797, Information technology — Data cryptographic techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm, 1993.

    Google Scholar 

  14. ISO/IEC Draft International Standard 9798-2, Information technology — Security techniques — Entity authentication mechanisms, Part 2: Entity authentication using symmetric techniques, 1993.

    Google Scholar 

  15. ISO/IEC International Standard 9798-3, Information technology — Security techniques — Entity authentication mechanisms, Part 3: Entity authentication using a public key algorithm, 1993.

    Google Scholar 

  16. ISO/IEC Committee Draft 11770-2, Information technology — Security techniques — Key management, Part 2: Key management mechanisms using symmetric techniques, 1993.

    Google Scholar 

  17. ISO/IEC Committee Draft 11770-3, Information technology — Security techniques — Key management, Part 3: Key management mechanisms using asymmetric techniques, 1993.

    Google Scholar 

  18. ISO/IEC International Standard 10118-1, Information technology — Security techniques — Hash-functions, Part 1: General, 1994.

    Google Scholar 

  19. ISO/IEC International Standard 10118-2, Information technology — Security techniques — Hash-functions, Part 2: Hash functions using an n-bit block cipher algorithm, 1994.

    Google Scholar 

  20. C.H. Meyer and S.M. Matyas, Cryptography: A New Dimension in Computer Data Security, Wiley & Sons, New York, 1982.

    MATH  Google Scholar 

  21. National Bureau of Standards, Data Encryption Standard, Federal Information Processing Standard, Publication 46, US Department of Commerce, January 1977.

    Google Scholar 

  22. G.J. Popek and C.S. Kline, “Encryption and secure computer networks,” ACM Computing Surveys, Vol. 11, 1979, pp. 331–356.

    Article  Google Scholar 

  23. R.A. Rueppel. Analysis and Design of Stream Ciphers, Springer-Verlag, Berlin-Heidelberg, 1986.

    Book  Google Scholar 

  24. R.L. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signature and public key cryptosystems,” Communications of the ACM, Vol. 21, 1978, pp. 120–126.

    Article  MathSciNet  Google Scholar 

  25. V.L. Voydock and S.T. Kent, “Security in high level network protocols,” IEEE Communications Magazine, July 1985, pp. 12–24.

    Article  Google Scholar 

Download references

Authors

Editor information

Antoon Bosselaers Bart Preneel

Rights and permissions

Reprints and permissions

Copyright information

© 1995 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Bosselaers, A., Preneel, B. (1995). Integrity concepts. In: Bosselaers, A., Preneel, B. (eds) Integrity Primitives for Secure Information Systems. Lecture Notes in Computer Science, vol 1007. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-60640-8_2

Download citation

  • DOI: https://doi.org/10.1007/3-540-60640-8_2

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60640-6

  • Online ISBN: 978-3-540-48517-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics