1 |
K. Scarfone, M. Souppaya, and M. Sexton, "Guide to Storage Encryption Technologies for End User Devices," SP 800-111, NIST, Nov. 2007.
|
2 |
S. Bruce, Applied Cryptography 2nd edition : protocols, algorithms, and source code in C, John Wiley & Sons, 2007.
|
3 |
Cryptsetup Project, [OnLine]. Available: http://code.google.com/p/cryptsetup
|
4 |
N. Ferguson, "AES-CBC + Elephant diffuser A Disk Encryption Algorithm for Windows Vista," Microsoft White Paper, Aug. 2006.
|
5 |
J. S. Heidemann, G. J. Popek, "File system development with stackable layers," ACM Transactions on computer systems, vol 12, no. 1, pp. 58-89, Feb. 1994.
DOI
ScienceOn
|
6 |
E. Zadok, I. Badulescu, and A. Shender, "Cryptfs: A stackable vnode level encryption file system," Technical Report CUCS-021-98, Computer Science Department, Columbia University, Jun. 1998.
|
7 |
C. P. Wright, M. C. Martino, and E. Zadok, "NCryptfs:A Secure and Convenient Cryptographic File System," Proceedings of the General Track: 2003 USENIX Annual Technical Conferance, pp. 197-210, Jun. 2003.
|
8 |
J. Alex Halderman, S.D. Scheon, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Applebaum, and E. W. Felten, "Lest We Remember: Cold Boot Attacks on Encryption Keys," Proc. 17th USENIX Security Symposium, Jul. 2008.
|
9 |
M. Dworkin, "Recommendation for Block Cipher Modes of Operation : Methods and Techniques," SP 800-38A, NIST, Dec. 2001.
|
10 |
G. V. Bard, "The Vulnerability of SSL to chosen-plaintext attack," Cryptology ePrint Archive, Report 2004/111, 2004.
|
11 |
RSA Laboratories, "PKCS#11:Cryptographic Token Interface Standard," [OnLine]. Available: ftp://ftp.rsasecurity. com/pub/pkcs/pkcs-11/v2-20/pkcs- 11v2-20.pdf
|