Cryptography Reference
In-Depth Information
[GoPa]
Goubin, Louis, Jacques Patarin DES and differential power analysis,
Proceedings of CHES'99
, Lecture Notes in Computer Science, No. 1717,
Springer-Verlag, 1999.
[Gord]
Gordon, J. A.: Strong primes are easy to find,
Advances in Cryptology,
Proceedings of Eurocrypt '84
, pp. 216-223, Springer-Verlag, Berlin, Heidelberg,
1985.
[Gut1]
Gutmann, Peter: Software generation of Practically Strong Random Numbers,
Usenix Security Symposium
, 1998
2000.
[Halm]
Halmos, Paul, R.:
Naive Set Theory
, Springer-Verlag New York, 1987.
[Harb]
Harbison, Samuel P, Guy L. Steele, Jr.:
C: A Reference Manual
, 4th Edition,
Prentice Hall, Englewood Cliffs, 1995.
[Hatt]
Hatton, Les: Safer C:
Developing Software for High-Integrity and Safety-Critical
Systems
, McGraw-Hill, London, 1995.
[Heid]
Heider, Franz-Peter:
Quadratische Kongruenzen
, unpublished manuscript,
Cologne, 1997.
[Henr]
Henricson, Mats, Erik Nyquist:
Industrial Strength C++
, Prentice Hall,
New Jersey, 1997.
[HeQu]
Heise, Werner, Pasquale Quattrocchi:
Informations- und Codierungstheorie
,
Springer-Verlag, Berlin, Heidelberg, 1983.
[HKW]
Heider, Franz-Peter, Detlef Kraus, Michael Welschenbach:
Mathematische
Methoden der Kryptoanalyse
, DuD-Fachbeiträge, Vieweg, Braunschweig, 1985.
[Herk]
Herkommer, Mark:
Number Theory: A Programmer's Guide
, McGraw-Hill, 1999.
[HoLe]
Howard, Michael, David LeBlanc:
Writing Secure Code
, Microsoft Press, 2002.
[IEEE]
IEEE P1363 / D13:
Standard Specifications for Public Key Cryptography
, Draft
Version 13, November 1999.
[ISO1]
ISO/IEC 10118-3:
Information Technology—Security Techniques—Hash-
Functions. Part 3: Dedicated Hash-Functions,
CD, 1996.
[ISO2]
ISO/IEC 9796:
Information Technology—Security Techniques—Digital
Signature Scheme giving Message Recovery
, 1991.
[ISO3]
ISO/IEC 9796-2:
Information Technology—Security Techniques—Digital
Signature Scheme Giving Message Recovery, Part 2: Mechanisms Using a
Hash-Function
, 1997.
[Koeu]
Koeune, F., G. Hachez, J.-J. Quisquater:
Implementation of Four AES Candidates
on Two Smart Cards
, UCL Crypto Group, 2000.
[Knut]
Knuth, Donald Ervin:
The Art of Computer Programming, Vol. 2: Seminumerical
Algorithms
, 3rd Edition, Addison-Wesley, Reading, MA, 1998.
[Kobl]
Koblitz, Neal:
A Course in Number Theory and Cryptography
, Springer-Verlag,
New York, 2nd Edition 1994.
[Kob2]
Koblitz, Neal:
Algebraic Aspects of Cryptography
, Springer-Verlag, Berlin,
Heidelberg, 1998.
[KoJJ]
Kocher, Paul, Joshua Jaffe, Benjamin Jun:
Introduction to Differential Power
Analysis and Related Attacks
, 1998,
[Kran]
Kranakis, Evangelos:
Primality and Cryptography
, Wiley-Teubner Series in
Computer Science, 1986.