References

CNS14

P. Rogaway C. Namprempre and T. Shrimpton. Reconsidering generic composition. 2014.

Kes17

Gary C. Kessler. An Overview of Cryptography. 2017.

Knu18

Jonathan Knudsen. Java cryptography. https://www.safaribooksonline.com/library/view/java-cryptography/1565924029/ch07s02.html, 05.01.2018.

Kra01

H. Krawczyk. The order of encryption and authentication for protecting communications (or: how secure is ssl?). 2001.

MB07

C. Nampremere M. Bellare. Authenticated encryption: relations among notions and analysis of the generic composition paradigm. 2007.

Mar18

M. Marlinspike. blog: The Cryptographic Doom Principle,. https://moxie.org/blog/the-cryptographic-doom-principle/, Dec.1, 2017, 05.01.2018.

Oak18

Madhura Oak. Symmetric Cryptography. https://madhuraoakblog.wordpress.com/2014/06/29/symmetric-cryptography/, 05.01.2018.

ssl2buy18

ssl2buy. Difference Between Hashing and Encryption. https://www.ssl2buy.com/wiki/difference-between-hashing-and-encryption, 05.01.2018.

Tam06

Abdel-Karim Al Tamimi. Performance Analysis of Data Encryption Algorithms. 2006.

Wel82

Gordon Welchman. The Hut Six Story: Breaking the Enigma Codes. 1982.