AES KEYWRAP | AES Key Wrap Specification (Draft) http://csrc.nist.gov/groups/ST/toolkit/documents/kms/key-wrap.pdf. |
ANSI C | ANSI/ISO. American National Standard for Programming Languages - C. 1990. |
ANSI X9.31 | Accredited Standards Committee X9. Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA). 1998. |
ANSI X9.42 | Accredited Standards Committee X9. Public Key Cryptography for the Financial Services Industry: Agreement of Symmetric Keys Using Discrete Logarithm Cryptography. 2003. |
ANSI X9.62 | Accredited Standards Committee X9. Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). 1998. |
ANSI X9.63 | Accredited Standards Committee X9. Public Key Cryptography for the Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography. 2001. |
ARIA | National Security Research Institute, Korea, "Block Cipher Algorithm ARIA", URL: http://www.nsri.re.kr/ARIA/index-e.html. |
CC/PP | W3C. Composite Capability/Preference Profiles (CC/PP): Structure and Vocabularies. World Wide Web Consortium, January 2004. URL: http://www.w3.org/TR/CCPP-struct-vocab/ |
CDPD | Ameritech Mobile Communications et al. Cellular Digital Packet Data System Specifications: Part 406: Airlink Security. 1993. |
CT-KIP | RSA Laboratories. Cryptographic Token Key Initialization Protocol. Version 1.0, December 2005. URL: ftp://ftp.rsasecurity.com/pub/otps/ct-kip/ct-kip-v1-0.pdf. |
FIPS PUB 113 | NIST. FIPS 113: Computer Data Authentication. May 30, 1985. URL: http://csrc.nist.gov/publications/fips/index.html |
FIPS PUB 180-2 | NIST. FIPS 180-2: Secure Hash Standard. August 1, 2002. URL: http://csrc.nist.gov/publications/fips/index.html |
FIPS PUB 186-2 | NIST. FIPS 186-2: Digital Signature Standard. January 27, 2000. URL: http://csrc.nist.gov/publications/fips/index.html |
FIPS PUB 197 | NIST. FIPS 197: Advanced Encryption Standard (AES). November 26, 2001. URL: http://csrc.nist.gov/publications/fips/index.html |
FIPS PUB 74 | NIST. FIPS 74: Guidelines for Implementing and Using the NBS Data Encryption Standard. April 1, 1981. URL: http://csrc.nist.gov/publications/fips/index.html |
FIPS PUB 81 | NIST. FIPS 81: DES Modes of Operation. December 1980. URL: http://csrc.nist.gov/publications/fips/index.html |
FORTEZZA CIPG | NSA, Workstation Security Products. FORTEZZA Cryptologic Interface Programmers Guide, Revision 1.52. November 1995. |
GCM | McGrew, D. and J. Viega, "The Galois/Counter Mode of Operation (GCM)," J Submission to NIST, January 2004. URL: http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/gcm/gcm-spec.pdf. |
GCS-API | X/Open Company Ltd. Generic Cryptographic Service API (GCS-API), Base - Draft 2. February 14, 1995. |
GOST 28147-89 | "Information Processing Systems. Cryptographic Protection. Cryptographic Algorithm", GOST 28147-89, Gosudarstvennyi Standard of USSR, Government Committee of the USSR for Standards, 1989. (In Russian). |
GOST R 34.10-2001 | "Information Technology. Cryptographic Data Security. Formation and Verification Processes of [Electronic] Digital Signature", GOST R 34.10-2001, Gosudarstvennyi Standard of the Russian Federation, Government Committee of the Russian Federation for Standards, 2001. (In Russian). |
GOST R 34.11-94 | "Information Technology. Cryptographic Data Security. Hashing function", GOST R 34.11-94, Gosudarstvennyi Standard of the Russian Federation, Government Committee of the Russian Federation for Standards, 1994. (In Russian). |
ISO/IEC 7816-1 | ISO. Information Technology " Identification Cards " Integrated Circuit(s) with Contacts " Part 1: Physical Characteristics. 1998. |
ISO/IEC 7816-4 | ISO. Information Technology " Identification Cards " Integrated Circuit(s) with Contacts " Part 4: Interindustry Commands for Interchange. 1995. |
ISO/IEC 8824-1 | ISO. Information Technology-- Abstract Syntax Notation One (ASN.1): Specification of Basic Notation. 2002. |
ISO/IEC 8825-1 | ISO. Information Technology"ASN.1 Encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER), and Distinguished Encoding Rules (DER). 2002. |
ISO/IEC 9594-1 | ISO. Information Technology " Open Systems Interconnection " The Directory: Overview of Concepts, Models and Services. 2001. |
ISO/IEC 9594-8 | ISO. Information Technology " Open Systems Interconnection " The Directory: Public-key and Attribute Certificate Frameworks. 2001. |
ISO/IEC 9796-2 | ISO. Information Technology " Security Techniques " Digital Signature Scheme Giving Message Recovery " Part 2: Integer factorization based mechanisms. 2002. |
Java MIDP | Java Community Process. Mobile Information Device Profile for Java 2 Micro Edition. November 2002. URL: http://jcp.org/jsr/detail/118.jsp |
MeT-PTD | MeT. MeT PTD Definition - Personal Trusted Device Definition, Version 1.0, February 2003. URL: http://www.mobiletransaction.org |
NIST AESCTS | National Institute for Standards and Technology, Proposal To Extend CBC Mode By "Ciphertext Stealing" . URL: http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/ciphertext%20stealing% 20proposal.pdf |
NIST sp800-38a | National Institute for Standards and Technology, ''Recommendation for Block Cipher Modes of Operation, NIST SP 800-38A. URL: http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf |
NIST sp800-38b | National Institute for Standards and Technology, ''Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentications, Special Publication 800-38B. URL: http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf |
PCMCIA | Personal Computer Memory Card International Association. PC Card Standard, Release 2.1,. July 1993. |
PKCS #1 | RSA Laboratories. RSA Cryptography Standard. v2.1, June 14, 2002. |
PKCS #11-B | RSA Laboratories. PKCS #11 Base Functionality, April 2009. |
PKCS #11-C | RSA Laboratories. PKCS #11: Conformance Profile Specification, October 2000. |
PKCS #11-P | RSA Laboratories. PKCS #11 Profiles for mobile devices, June 2003. |
PKCS #12 | RSA Laboratories. Personal Information Exchange Syntax Standard. v1.0, June 1999. |
PKCS #3 | RSA Laboratories. Diffie-Hellman Key-Agreement Standard. v1.4, November 1993. |
PKCS #5 | RSA Laboratories. Password-Based Encryption Standard. v2.0, March 25, 1999 |
PKCS #7 | RSA Laboratories. Cryptographic Message Syntax Standard. v1.5, November 1993 |
PKCS #8 | RSA Laboratories. Private-Key Information Syntax Standard. v1.2, November 1993. |
RFC 1319 | B. Kaliski. RFC 1319: The MD2 Message-Digest Algorithm. RSA Laboratories, April 1992. URL: http://ietf.org/rfc/rfc1319.txt |
RFC 1321 | R. Rivest. RFC 1321: The MD5 Message-Digest Algorithm. MIT Laboratory for Computer Science and RSA Data Security, Inc., April 1992. URL: http://ietf.org/rfc/rfc1321.txt |
RFC 1421 | J. Linn. RFC 1421: Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures. IAB IRTF PSRG, IETF PEM WG, February 1993. URL: http://ietf.org/rfc/rfc1421.txt |
RFC 2045 | Freed, N., and N. Borenstein. RFC 2045: Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies. November 1996. URL: http://ietf.org/rfc/rfc2045.txt |
RFC 2104 | Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed-Hashing for Message Authentication", February 1997. |
RFC 2246 | T. Dierks & C. Allen. RFC 2246: The TLS Protocol Version 1.0. Certicom, January 1999. URL: http://ietf.org/rfc/rfc2246.txt |
RFC 2279 | F. Yergeau. RFC 2279: UTF-8, a transformation format of ISO 10646 Alis Technologies, January 1998. URL: http://ietf.org/rfc/rfc2279.txt |
RFC 2534 | Masinter, L., Wing, D., Mutz, A., and K. Holtman. RFC 2534: Media Features for Display, Print, and Fax. March 1999. URL: http://ietf.org/rfc/rfc2534.txt |
RFC 2630 | R. Housley. RFC 2630: Cryptographic Message Syntax. June 1999. URL: http://ietf.org/rfc/rfc2630.txt |
RFC 2743 | J. Linn. RFC 2743: Generic Security Service Application Program Interface Version 2, Update 1. RSA Laboratories, January 2000. URL: http://ietf.org/rfc/rfc2743.txt |
RFC 2744 | J. Wray. RFC 2744: Generic Security Services API Version 2: C-bindings. Iris Associates, January 2000. URL: http://ietf.org/rfc/rfc2744.txt |
RFC 2865 | Rigney et al, "Remote Authentication Dial In User Service (RADIUS)", IETF RFC2865, June 2000. URL: http://ietf.org/rfc/rfc2865.txt. |
RFC 3394 | Advanced Encryption Standard (AES) Key Wrap Algorithm: http://www.ietf.org/rfc/rfc3394.txt. |
RFC 3610 | Whiting, D., Housley, R., and N. Ferguson, "Counter with CBC-MAC (CCM)", IETF RFC 3610, September 2003. URL: http://www.ietf.org/rfc/rfc3610.txt |
RFC 3686 | Housley, "Using Advanced Encryption Standard (AES) Counter Mode With IPsec Encapsulating Security Payload (ESP)," IETF RFC 3686, January 2004. URL: http://ietf.org/rfc/rfc3686.txt. |
RFC 3717 | Matsui, et al, "A Description of the Camellia Encryption Algorithm," IETF RFC 3717, April 2004. URL: http://ietf.org/rfc/rfc3713.txt. |
RFC 3748 | Aboba et al, "Extensible Authentication Protocol (EAP)", IETF RFC 3748, June 2004. URL: http://ietf.org/rfc/rfc3748.txt. |
RFC 3874 | Smit et al, "A 224-bit One-way Hash Function: SHA-224," IETF RFC 3874, June 2004. URL: http://ietf.org/rfc/rfc3874.txt. |
RFC 4269 | South Korean Information Security Agency (KISA) "The SEED Encryption Algorithm", December 2005. ftp://ftp.rfc-editor.org/in-notes/rfc4269.txt |
RFC 4309 | Housley, R., "Using Advanced Encryption Standard (AES) CCM Mode with IPsec Encapsulating Security Payload (ESP)," IETF RFC 4309, December 2005. URL: http://ietf.org/rfc/rfc4309.txt |
RFC 4357 | V. Popov, I. Kurepkin, S. Leontiev "Additional Cryptographic Algorithms for Use with GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94 Algorithms", January 2006. |
RFC 4490 | S. Leontiev, Ed. G. Chudov, Ed. "Using the GOST 28147-89, GOST R 34.11-94,GOST R 34.10-94, and GOST R 34.10-2001 Algorithms with Cryptographic Message Syntax (CMS)", May 2006. |
RFC 4491 | S. Leontiev, Ed., D. Shefanovski, Ed., "Using the GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94 Algorithms with the Internet X.509 Public Key Infrastructure Certificate and CRL Profile", May 2006. |
RFC 4493 | J. Song et al. RFC 4493: The AES-CMAC Algorithm. June 2006. URL: http://www.ietf.org/rfc/rfc4493.txt |
SEC 1 | Standards for Efficient Cryptography Group (SECG). Standards for Efficient Cryptography (SEC) 1: Elliptic Curve Cryptography. Version 1.0, September 20, 2000. |
SEC 2 | Standards for Efficient Cryptography Group (SECG). Standards for Efficient Cryptography (SEC) 2: Recommended Elliptic Curve Domain Parameters. Version 1.0, September 20, 2000. |
TLS | IETF. RFC 2246: The TLS Protocol Version 1.0 . January 1999. URL: http://ietf.org/rfc/rfc2246.txt |
WIM | WAP. Wireless Identity Module. " WAP-260-WIM-20010712-a. July 2001. URL: http://www.wapforum.org/ |
WPKI | WAP. Wireless PKI. " WAP-217-WPKI-20010424-a. April 2001. URL: http://www.wapforum.org/ |
WTLS | WAP. Wireless Transport Layer Security Version " WAP-261-WTLS-20010406-a. April 2001. URL: http://www.wapforum.org/. |
X.500 | ITU-T. Information Technology " Open Systems Interconnection " The Directory: Overview of Concepts, Models and Services. February 2001.X.509ITU-T. Information Technology — Open Systems Interconnection — The Directory: Public-key and Attribute Certificate Frameworks. March 2000. |
X.680 | ITU-T. Information Technology — Abstract Syntax Notation One (ASN.1): Specification of Basic Notation. July 2002. |
X.690 | ITU-T. Information Technology " ASN.1 Encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER), and Distinguished Encoding Rules (DER). July 2002. |