Related Documentation
Additional documents that will help you understand cryptography and authentication, and the associated security issues include:
-
Schneier, Bruce. Applied Cryptography. John Wiley & Sons, 1996.
-
Stinson, D. R. Cryptography: Theory and Practice. CRC Press, 1995.
-
Anderson, R. Why Cryptosystems Fail. Communications of the ACM, v. 37, n. 11, November 1994, pp. 32-40.
-
Cormen, Thomas H., Charles E. Leiserson, Ronald L. Rivest. Introduction to Algorithms. MIT Press, 1990.
-
Davies, D.W. and W.L. Price. Security for Computer Networks. John Wiley & Sons, 1989.
-
Denning, Dorothy E. Cryptography and Data Security. Addison-Wesley, 1982.
-
International Standard ISO/IEC 9594-8, Second Edition, Information Technology—Open Systems Interconnection—The Directory: Authentication Framework.
-
RSA Laboratories, a division of RSA Data Security, Inc., RSA Data Security, Inc. Public-Key Cryptography Standards (PKCS), Copyright© 1991–1993.