Resources[1] The Bouncy Castle project. http://www.bouncycastle.org/[2] The IAIK JCE-ME library. http://jce.iaik.tugraz.at/products/10_me-jce/index.php[3] Phaos Technology Micro Security products. http://www.phaos.com/products/category/microl[4] NTRU toolkits. http://www.ntru.com/products/toolkits[5] The NTRU algorithms explained. http://www.ntru.com/cryptolab/algorithms[6] B3 Security. http://www.b3security.com[7] You can download the iDEN J2ME SDK, including the cryptography API, from Motorola's iDEN phone developer Web site. http://idenphones.motorola.com/iden/developer/developer_home.jsp[8] Bruce Schneier's Applied Cryptography is a classic book that discusses all the algorithms (except NTRU) mentioned in this chapter. http://www.counterpane.com/appliedl[9] To learn more about general security challenges and solutions for mobile Java applications, read Michael Yuan and Ju Long's article "Securing Wireless J2ME" (IBM developerWorks, June 2002). http://www-106.ibm.com/developerworks/wireless/library/wisecj2mel[10] J2ME Foundation Profile 1.1 (JSR 219). http://www.jcp.org/en/jsr/detail?id=219[11] Security and Trust API for J2ME (JSR 177). http://www.jcp.org/en/jsr/detail?id=177 |