From 5e1fffa87191c3566bcbe20c6e8d29d5f21651d5 Mon Sep 17 00:00:00 2001 From: Mounir IDRASSI Date: Sat, 13 May 2017 17:34:16 +0200 Subject: Add HTML documentation. --- doc/html/References.html | 238 +++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 238 insertions(+) create mode 100644 doc/html/References.html (limited to 'doc/html/References.html') diff --git a/doc/html/References.html b/doc/html/References.html new file mode 100644 index 00000000..a31f4327 --- /dev/null +++ b/doc/html/References.html @@ -0,0 +1,238 @@ + + + + +VeraCrypt - Free Open source disk encryption with strong security for the Paranoid + + + + + + +
+VeraCrypt +
+ + + +
+

+Documentation +>> +References +

+ +
+

References

+

 

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+[1] +U.S. Committee on National Security Systems (CNSS), National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information, CNSS Policy No. 15, Fact Sheet + No. 1, June 2003, available at +http://csrc.nist.gov/groups/STM/cmvp/documents/CNSS15FS.pdf.
+[2] +C. E. Shannon, Communication Theory of Secrecy Systems, Bell System Technical Journal, v. 28, n. 4, 1949
+[3] +NIST, Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, November 26, 2001, available at + +http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
+[4] +J. Nechvatal, E. Barker, L. Bassham, W. Burr, M. Dworkin, J. Foti, E. Roback, NIST, +Report on the Development of the Advanced Encryption Standard (AES), October 2, 2000, Journal of Research of the National Institute of Standards and Technology, Vol. 106, No. 3, May-June 2001, available at + +http://csrc.nist.gov/archive/aes/round2/r2report.pdf.
+[5] +B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, T. Kohno, M. Stay, +The Twofish Team's Final Comments on AES Selection, +May 15, 2000, available at +http://csrc.nist.gov/archive/aes/round2/comments/20000515-bschneier.pdf.
+[6] +Bruce Schneier, Beyond Fear: Thinking Sensibly About Security in an Uncertain World, Springer, 2003 +
+[7] +RSA Laboratories, PKCS #5 v2.0: Password-Based Cryptography Standard, RSA Data Security, Inc. Public-Key Cryptography Standards (PKCS), March 25, 1999, available at + +https://www.emc.com/emc-plus/rsa-labs/standards-initiatives/pkcs-5-password-based-cryptography-standard.htm.
+[8] +H. Krawczyk, M. Bellare, R. Canetti, HMAC: Keyed-Hashing for Message Authentication, RFC 2104, February 1997, available at + +http://www.ietf.org/rfc/rfc2104.txt.
+[9] +M. Nystrom, RSA Security, Identifiers and Test Vectors for HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512, RFC 4231, December 2005, available at + +http://www.ietf.org/rfc/rfc4231.txt.
+[10] +Peter Gutmann, Software Generation of Practically Strong Random Numbers, presented at the 1998 Usenix Security Symposium, available at + +http://www.cs.auckland.ac.nz/~pgut001/pubs/usenix98.pdf.
+[11] +Carl Ellison, Cryptographic Random Numbers, originally an appendix to the P1363 standard, available at + +http://world.std.com/~cme/P1363/ranno.html.
+[12] +P. Rogaway, Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC, Asiacrypt 2004. LNCS vol. 3329. Springer, 2004. Also available at: + +http://www.cs.ucdavis.edu/~rogaway/papers/offsets.pdf.
+[13] +J. Kelsey, Twofish Technical Report #7: Key Separation in Twofish, AES Round 2 public comment, April 7, 2000
+[14] +NIST, Secure Hash Standard, FIPS 180-2, August 1, 2002, available at + +http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf.
+[15] +U. Maurer, J. Massey, Cascade Ciphers: The Importance of Being First, Journal of Cryptology, v. 6, n. 1, 1993 +
+[16] +Bruce Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, 1996 +
+[17] +Peter Gutmann, Secure Deletion of Data from Magnetic and Solid-State Memory, first published in the Sixth USENIX Security Symposium Proceedings, San Jose, California, July 22-25, 1996, available at + +http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html.
+[18] +Serpent home page: +http://www.cl.cam.ac.uk/~rja14/serpent.html.
+[19] +M. E. Smid, AES Issues, AES Round 2 Comments, May 22, 2000, available at + +http://csrc.nist.gov/archive/aes/round2/comments/20000523-msmid-2.pdf.
+[20] +A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, October 1996
+[21] +International Organization for Standardization (ISO), +Information technology – Security techniques – Hash-functions – Part 3: Dedicated hash-functions, ISO/IEC 10118-3:2004, February 24, 2004
+[22] +NIST, The Keyed-Hash Message Authentication Code (HMAC), Federal Information Processing Standards Publication 198, March 6, 2002, available at + +http://csrc.nist.gov/publications/fips/fips198/fips-198a.pdf.
+[23] +RSA Laboratories, PKCS #11 v2.20: Cryptographic Token Interface Standard, RSA Security, Inc. Public-Key Cryptography Standards (PKCS), June 28, 2004, available at + +https://www.emc.com/emc-plus/rsa-labs/standards-initiatives/pkcs-11-cryptographic-token-interface-standard.htm. +PDF available at +https://www.cryptsoft.com/pkcs11doc/STANDARD/pkcs-11v2-20.pdf
+[24] +

Morris Dworkin, Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices, NIST Special Publication 800-3E, January 2010, available at + +http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf.

+
+[25] +

NIST, Approved Security Functions for FIPS PUB 140-2, Security Requirements for Cryptographic Modules, October 8, 2010, available at + +http://csrc.nist.gov/publications/fips/fips140-2/fips1402annexa.pdf

+
+

 

+
\ No newline at end of file -- cgit v1.2.3