Information Technology Reference
In-Depth Information
References
1. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and
public-key cryptosystems. ACM Commun. 26, 96-99 (1983)
2. Menezes, A.J., Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC
Press, Florida (1996)
3. Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.)
CRYPTO 1985. LNCS, vol. 218, pp. 417-426. Springer, Heidelberg (1986)
4. Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48, 203-209 (1987)
5. Menezes, A.J.: Elliptic curve public key cryptosystems. Kluwer Academic Publish-
ers, Boston (1993)
6. ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete
logarithm. IEEE Trans. Inform. Theory 31, 469-472 (1985)
7. Preneel, B.: A survey of recent developments in cryptographic algorithms for smart
cards. Comput. Netw. 51, 2223-2233 (2007)
8. Oracle Corporation. Java Card Technology, http://java.sun.com/javacard/
9. MAOSCO Limited. MULTOS smart card technology, http://www.multos.com
10. Cohen, H., Frey, G.: Handbook of elliptic and hyperelliptic curve cryptography.
Chapman and Hall, Florida (2006)
11. Silverman, J.H.: The arithmetic of elliptic curves. Springer, New York (1986)
12. Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to elliptic curve cryptography.
Springer, New York (2004)
13. NIST FIPS 186-3. Digital Signature Standard (DSS). National Institute of Stan-
dards and Technology (2009)
14. ANSI X9.63. Public Key Cryptography for the Financial Services Industry: Key
Agreement and Key Transport Using Elliptic Curve Cryptography. American Na-
tional Standards Institute (2001)
15. IEEE 1363a. Standard Specifications for Public Key Cryptography - Amendment
1: Additional Techniques. Institute of Electrical and Electronics Engineers (2004)
16. ISO/IEC 18033-2. Information Technology - Security Techniques - Encryption
Algorithms - Part 2: Asymmetric Ciphers. International Organization for Stan-
dardization / International Electrotechnical Commission (2006)
17. NXP Semiconductors. Smart Solutions for Smart Services, http://www.nxp.com/
acrobat_download2/literature/9397/75016728.pdf
18. NXP Semiconductors. P5CT072 - Secure Dual Interface PKI Smart
Card Controller (2004), http://www.nxp.com/acrobat_download2/other/
identification/sfs085512.pdf
19. NXP Semiconductors. P5Cx012/02x/40/73/80/144 family - Secure Dual Interface
and Contact PKI Smart Card Controller (2008), http://www.nxp.com/documents/
data_sheet/P5CX012_02X_40_73_80_144_FAM_SDS.pdf
20. IETF RFC 2104. HMAC: Keyed Hashing for Message Authentication. Internet
Engineering Task Force (1997), http://www.ietf.org/rfc/rfc2104
21. Rankl, W., Eng, W.: Smart card handbook. John Wiley & Sons, West Sussex
(2003)
22. Oracle Corporation. Java smart card I/O API, http://jcp.org/en/jsr/detail?
id=268
 
Search WWH ::




Custom Search