[12] P. Rogaway, Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes
OCB and PMAC, Asiacrypt 2004. LNCS vol. 3329. Springer, 2004. Also available at:
http://www.cs.ucdavis.edu/~rogaway/papers/offsets.pdf.
[13] J. Kelsey, Twofish Technical Report #7: Key Separation in Twofish, AES Round 2 public
comment, April 7, 2000
[14] NIST, Secure Hash Standard, FIPS 180-2, August 1, 2002, available at
http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf.
[15] U. Maurer, J. Massey, Cascade Ciphers: The Importance of Being First, Journal of
Cryptology, v. 6, n. 1, 1993
[16] Bruce Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, 1996
[17] Peter Gutmann, Secure Deletion of Data from Magnetic and Solid-State Memory, first
published in the Sixth USENIX Security Symposium Proceedings, San Jose, California,
July 22-25, 1996, available at http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
[18] Serpent home page: http://www.cl.cam.ac.uk/~rja14/serpent.html.
[19] M. E. Smid, AES Issues, AES Round 2 Comments, May 22, 2000, available at
http://csrc.nist.gov/archive/aes/round2/comments/20000523-msmid-2.pdf.
[20] A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC
Press, October 1996
[21] International Organization for Standardization (ISO), Information technology – Security
techniques – Hash-functions – Part 3: Dedicated hash-functions, ISO/IEC 10118-3:2004,
February 24, 2004
[22] NIST, The Keyed-Hash Message Authentication Code (HMAC), Federal Information
Processing Standards Publication 198, March 6, 2002, available at
http://csrc.nist.gov/publications/fips/fips198/fips-198a.pdf.
[23] RSA Laboratories, PKCS #11 v2.20: Cryptographic Token Interface Standard, RSA
Security, Inc. Public-Key Cryptography Standards (PKCS), June 28, 2004, available at
http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/pkcs-11-cryptographic-
token-interface-standard.htm. PDF available at
http://www.cryptsoft.com/pkcs11doc/STANDARD/pkcs-11v2-20.pdf
[24] Morris Dworkin, Recommendation for Block Cipher Modes of Operation: The XTS-AES
Mode for Confidentiality on Storage Devices, NIST Special Publication 800-3E, January
2010, available at http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf.
[25] NIST, Approved Security Functions for FIPS PUB 140-2, Security Requirements for
Cryptographic Modules, October 8, 2010, available at
http://csrc.nist.gov/publications/fips/fips140-2/fips1402annexa.pdf