Further reading
To learn more about the topics that were covered in this chapter, take a look at the following:
- [1] https://csrc.nist.gov/Projects/cryptographic-standards-and-guidelines.
- [2] The Codebreakers, by Kahn.
- [3] Handbook of Applied Cryptography, Discrete Mathematics and Its Applications, by Alfred J. Menezes (Author).
- [4] Cryptography and Network Security, Principles and Practice, by William Stallings.
- [5] https://github.com/robertdavidgraham/ecb-penguin.
- [6] NIST SP800-90A: Recommendation for Random Number Generation Using Deterministic Random Bit Generators: https://csrc.nist.gov/publications/detail/sp/800-90a/rev-1/final.
- [7] NIST SP800-90B: Recommendation for the Entropy Sources Used for Random Bit Generation: https://csrc.nist.gov/pubs/sp/800/90/b/final.
- [8] National Institute of Standards and Technology (2008) The Keyed-Hash Message Authentication Code (HMAC). US Department of Commerce, Washington, DC, Federal Information Processing...