2 @unnumbered Bibliography
6 @item @anchor{CBCATT}[CBCATT]
7 Bodo Moeller, "Security of CBC Ciphersuites in SSL/TLS: Problems and
8 Countermeasures", 2002, available from
9 @url{http://www.openssl.org/~bodo/tls-cbc.txt}.
11 @item @anchor{GPGH}[GPGH]
12 Mike Ashley, "The GNU Privacy Handbook", 2002, available from
13 @url{http://www.gnupg.org/gph/en/manual.pdf}.
15 @item @anchor{GUTPKI}[GUTPKI]
16 Peter Gutmann, "Everything you never wanted to know about PKI but were
17 forced to find out", Available from
18 @url{http://www.cs.auckland.ac.nz/~pgut001/}.
20 @item @anchor{KEYPIN}[KEYPIN]
21 Chris Evans and Chris Palmer, "Public Key Pinning Extension for HTTP",
22 Available from @url{http://tools.ietf.org/html/draft-ietf-websec-key-pinning-01}.
24 @item @anchor{NISTSP80057}[NISTSP80057]
25 NIST Special Publication 800-57, "Recommendation for Key Management -
26 Part 1: General (Revised)", March 2007, available from
27 @url{http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57-Part1-revised2_Mar08-2007.pdf}.
29 @item @anchor{RFC2246}[RFC2246]
30 Tim Dierks and Christopher Allen, "The TLS Protocol Version 1.0",
31 January 1999, Available from
32 @url{http://www.ietf.org/rfc/rfc2246.txt}.
34 @item @anchor{RFC4514}[RFC4514]
35 Kurt D. Zeilenga, "Lightweight Directory Access Protocol (LDAP): String Representation of Distinguished Names",
36 June 2006, Available from
37 @url{http://www.ietf.org/rfc/rfc4513.txt}.
39 @item @anchor{RFC4346}[RFC4346]
40 Tim Dierks and Eric Rescorla, "The TLS Protocol Version 1.1", Match
41 2006, Available from @url{http://www.ietf.org/rfc/rfc4346.txt}.
43 @item @anchor{RFC4347}[RFC4347]
44 Eric Rescorla and Nagendra Modadugu, "Datagram Transport Layer Security", April
45 2006, Available from @url{http://www.ietf.org/rfc/rfc4347.txt}.
47 @item @anchor{RFC5246}[RFC5246]
48 Tim Dierks and Eric Rescorla, "The TLS Protocol Version 1.2", August
49 2008, Available from @url{http://www.ietf.org/rfc/rfc5246.txt}.
51 @item @anchor{RFC2440}[RFC2440]
52 Jon Callas, Lutz Donnerhacke, Hal Finney and Rodney Thayer, "OpenPGP
53 Message Format", November 1998, Available from
54 @url{http://www.ietf.org/rfc/rfc2440.txt}.
56 @item @anchor{RFC4880}[RFC4880]
57 Jon Callas, Lutz Donnerhacke, Hal Finney, David Shaw and Rodney
58 Thayer, "OpenPGP Message Format", November 2007, Available from
59 @url{http://www.ietf.org/rfc/rfc4880.txt}.
61 @item @anchor{RFC4211}[RFC4211]
62 J. Schaad, "Internet X.509 Public Key Infrastructure Certificate
63 Request Message Format (CRMF)", September 2005, Available from
64 @url{http://www.ietf.org/rfc/rfc4211.txt}.
66 @item @anchor{RFC2817}[RFC2817]
67 Rohit Khare and Scott Lawrence, "Upgrading to TLS Within HTTP/1.1",
68 May 2000, Available from @url{http://www.ietf.org/rfc/rfc2817.txt}
70 @item @anchor{RFC2818}[RFC2818]
71 Eric Rescorla, "HTTP Over TLS", May 2000, Available from
72 @url{http://www.ietf/rfc/rfc2818.txt}.
74 @item @anchor{RFC2945}[RFC2945]
75 Tom Wu, "The SRP Authentication and Key Exchange System", September
76 2000, Available from @url{http://www.ietf.org/rfc/rfc2945.txt}.
78 @item @anchor{RFC2986}[RFC2986]
79 Magnus Nystrom and Burt Kaliski, "PKCS 10 v1.7: Certification Request
80 Syntax Specification", November 2000, Available from
81 @url{http://www.ietf.org/rfc/rfc2986.txt}.
83 @item @anchor{PKIX}[PKIX]
84 D. Cooper, S. Santesson, S. Farrel, S. Boeyen, R. Housley, W. Polk,
85 "Internet X.509 Public Key Infrastructure Certificate and Certificate
86 Revocation List (CRL) Profile", May 2008, available from
87 @url{http://www.ietf.org/rfc/rfc5280.txt}.
89 @item @anchor{RFC3749}[RFC3749]
90 Scott Hollenbeck, "Transport Layer Security Protocol Compression
91 Methods", May 2004, available from
92 @url{http://www.ietf.org/rfc/rfc3749.txt}.
94 @item @anchor{RFC3820}[RFC3820]
95 Steven Tuecke, Von Welch, Doug Engert, Laura Pearlman, and Mary
96 Thompson, "Internet X.509 Public Key Infrastructure (PKI) Proxy
97 Certificate Profile", June 2004, available from
98 @url{http://www.ietf.org/rfc/rfc3820}.
100 @item @anchor{RFC5746}[RFC5746]
101 E. Rescorla, M. Ray, S. Dispensa, and N. Oskov, "Transport Layer
102 Security (TLS) Renegotiation Indication Extension", February 2010,
103 available from @url{http://www.ietf.org/rfc/rfc5746}.
105 @item @anchor{TLSTKT}[TLSTKT]
106 Joseph Salowey, Hao Zhou, Pasi Eronen, Hannes Tschofenig, "Transport
107 Layer Security (TLS) Session Resumption without Server-Side State",
108 January 2008, available from @url{http://www.ietf.org/rfc/rfc5077}.
110 @item @anchor{PKCS12}[PKCS12]
111 RSA Laboratories, "PKCS 12 v1.0: Personal Information Exchange
112 Syntax", June 1999, Available from @url{http://www.rsa.com}.
114 @item @anchor{PKCS11}[PKCS11]
115 RSA Laboratories, "PKCS #11 Base Functionality v2.30: Cryptoki – Draft 4",
116 July 2009, Available from @url{http://www.rsa.com}.
118 @item @anchor{RESCORLA}[RESCORLA]
119 Eric Rescorla, "SSL and TLS: Designing and Building Secure Systems",
122 @item @anchor{SELKEY}[SELKEY]
123 Arjen Lenstra and Eric Verheul, "Selecting Cryptographic Key Sizes",
124 2003, available from @url{http://www.win.tue.nl/~klenstra/key.pdf}.
126 @item @anchor{SSL3}[SSL3]
127 Alan Freier, Philip Karlton and Paul Kocher, "The Secure Sockets Layer (SSL) Protocol Version 3.0",
128 August 2011, Available from @url{http://www.ietf.org/rfc/rfc6101.txt}.
130 @item @anchor{STEVENS}[STEVENS]
131 Richard Stevens, "UNIX Network Programming, Volume 1", Prentice Hall
134 @item @anchor{TLSEXT}[TLSEXT]
135 Simon Blake-Wilson, Magnus Nystrom, David Hopwood, Jan Mikkelsen and
136 Tim Wright, "Transport Layer Security (TLS) Extensions", June 2003,
137 Available from @url{http://www.ietf.org/rfc/rfc3546.txt}.
139 @item @anchor{TLSPGP}[TLSPGP]
140 Nikos Mavrogiannopoulos, "Using OpenPGP keys for TLS authentication",
141 January 2011. Available from
142 @url{http://www.ietf.org/rfc/rfc6091.txt}.
144 @item @anchor{TLSSRP}[TLSSRP]
145 David Taylor, Trevor Perrin, Tom Wu and Nikos Mavrogiannopoulos,
146 "Using SRP for TLS Authentication", November 2007. Available from
147 @url{http://www.ietf.org/rfc/rfc5054.txt}.
149 @item @anchor{TLSPSK}[TLSPSK]
150 Pasi Eronen and Hannes Tschofenig, "Pre-shared key Ciphersuites for
151 TLS", December 2005, Available from
152 @url{http://www.ietf.org/rfc/rfc4279.txt}.
154 @item @anchor{TOMSRP}[TOMSRP]
155 Tom Wu, "The Stanford SRP Authentication Project", Available at
156 @url{http://srp.stanford.edu/}.
158 @item @anchor{WEGER}[WEGER]
159 Arjen Lenstra and Xiaoyun Wang and Benne de Weger, "Colliding X.509
160 Certificates", Cryptology ePrint Archive, Report 2005/067, Available
161 at @url{http://eprint.iacr.org/}.
163 @item @anchor{ECRYPT}[ECRYPT]
164 European Network of Excellence in Cryptology II, "ECRYPT II Yearly
165 Report on Algorithms and Keysizes (2009-2010)", Available
166 at @url{http://www.ecrypt.eu.org/documents/D.SPA.13.pdf}.
168 @item @anchor{RFC5056}[RFC5056]
169 N. Williams, "On the Use of Channel Bindings to Secure Channels",
170 November 2007, available from @url{http://www.ietf.org/rfc/rfc5056}.
172 @item @anchor{RFC5929}[RFC5929]
173 J. Altman, N. Williams, L. Zhu, "Channel Bindings for TLS", July 2010,
174 available from @url{http://www.ietf.org/rfc/rfc5929}.
176 @item @anchor{PKCS11URI}[PKCS11URI]
177 J. Pechanec, D. Moffat, "The PKCS#11 URI Scheme", August 2011,
178 Work in progress, available from @url{http://tools.ietf.org/html/draft-pechanec-pkcs11uri-05}.
180 @item @anchor{ANDERSON}[ANDERSON]
181 R. J. Anderson, "Security Engineering: A Guide to Building Dependable Distributed Systems",
182 John Wiley \& Sons, Inc., 2001.
184 @item @anchor{RFC4821}[RFC4821]
185 M. Mathis, J. Heffner, "Packetization Layer Path MTU Discovery", March 2007,
186 available from @url{http://www.ietf.org/rfc/rfc4821.txt}.
188 @item @anchor{RFC2560}[RFC2560]
189 M. Myers et al, "X.509 Internet Public Key Infrastructure Online
190 Certificate Status Protocol - OCSP", June 1999, Available from
191 @url{http://www.ietf.org/rfc/rfc2560.txt}.
193 @item @anchor{RIVESTCRL}[RIVESTCRL]
194 R. L. Rivest, "Can We Eliminate Certificate Revocation Lists?",
195 Proceedings of Financial Cryptography '98; Springer Lecture Notes in
196 Computer Science No. 1465 (Rafael Hirschfeld, ed.), February 1998),
197 pages 178--183, available from
198 @url{http://people.csail.mit.edu/rivest/Rivest-CanWeEliminateCertificateRevocationLists.pdf}.