Resources[1] The full source code of the cryptography sample applications covered in this chapter. http://www.enterprisej2me.com/book/code/[2] The Bouncy Castle project. http://www.bouncycastle.org/[3] The IAIK JCE-ME library. http://jce.iaik.tugraz.at/products/10_me-jce/index.php[4] Phaos Technology Micro Security products. http://www.phaos.com/products/category/microl[5] NTRU toolkits. http://www.ntru.com/products/toolkits[6] RSA Security's Cryptography FAQ is a good introduction to modern cryptography solutions, including the Public Key Infrastructure. http://www.rsasecurity.com/rsalabs/faq/[7] The NTRU algorithms explained. http://www.ntru.com/cryptolab/algorithms[8] The National Institute of Standards and Technology (NIST) PKI program home page. http://csrc.nist.gov/pki/ |