Cryptography Reference
In-Depth Information
[GoPa] Goubin, Louis, Jacques Patarin DES and differential power analysis,
Proceedings of CHES'99 , Lecture Notes in Computer Science, No. 1717,
Springer-Verlag, 1999.
[Gord] Gordon, J. A.: Strong primes are easy to find, Advances in Cryptology,
Proceedings of Eurocrypt '84 , pp. 216-223, Springer-Verlag, Berlin, Heidelberg,
1985.
[Gut1] Gutmann, Peter: Software generation of Practically Strong Random Numbers,
Usenix Security Symposium , 1998
[Gut2] Gutmann, Peter: Random Number Generation , www.cs.auckland.ac.nz/ ˜ pgut001 ,
2000.
[Halm] Halmos, Paul, R.: Naive Set Theory , Springer-Verlag New York, 1987.
[Harb] Harbison, Samuel P, Guy L. Steele, Jr.: C: A Reference Manual , 4th Edition,
Prentice Hall, Englewood Cliffs, 1995.
[Hatt] Hatton, Les: Safer C: Developing Software for High-Integrity and Safety-Critical
Systems , McGraw-Hill, London, 1995.
[Heid] Heider, Franz-Peter: Quadratische Kongruenzen , unpublished manuscript,
Cologne, 1997.
[Henr] Henricson, Mats, Erik Nyquist: Industrial Strength C++ , Prentice Hall,
New Jersey, 1997.
[HeQu] Heise, Werner, Pasquale Quattrocchi: Informations- und Codierungstheorie ,
Springer-Verlag, Berlin, Heidelberg, 1983.
[HKW] Heider, Franz-Peter, Detlef Kraus, Michael Welschenbach: Mathematische
Methoden der Kryptoanalyse , DuD-Fachbeiträge, Vieweg, Braunschweig, 1985.
[Herk] Herkommer, Mark: Number Theory: A Programmer's Guide , McGraw-Hill, 1999.
[HoLe] Howard, Michael, David LeBlanc: Writing Secure Code , Microsoft Press, 2002.
[IEEE] IEEE P1363 / D13: Standard Specifications for Public Key Cryptography , Draft
Version 13, November 1999.
[ISO1] ISO/IEC 10118-3: Information Technology—Security Techniques—Hash-
Functions. Part 3: Dedicated Hash-Functions, CD, 1996.
[ISO2] ISO/IEC 9796: Information Technology—Security Techniques—Digital
Signature Scheme giving Message Recovery , 1991.
[ISO3] ISO/IEC 9796-2: Information Technology—Security Techniques—Digital
Signature Scheme Giving Message Recovery, Part 2: Mechanisms Using a
Hash-Function , 1997.
[Koeu] Koeune, F., G. Hachez, J.-J. Quisquater: Implementation of Four AES Candidates
on Two Smart Cards , UCL Crypto Group, 2000.
[Knut] Knuth, Donald Ervin: The Art of Computer Programming, Vol. 2: Seminumerical
Algorithms , 3rd Edition, Addison-Wesley, Reading, MA, 1998.
[Kobl] Koblitz, Neal: A Course in Number Theory and Cryptography , Springer-Verlag,
New York, 2nd Edition 1994.
[Kob2] Koblitz, Neal: Algebraic Aspects of Cryptography , Springer-Verlag, Berlin,
Heidelberg, 1998.
[KoJJ] Kocher, Paul, Joshua Jaffe, Benjamin Jun: Introduction to Differential Power
Analysis and Related Attacks , 1998,
http://www.cryptography.com/dpa/technical/
[Kran] Kranakis, Evangelos: Primality and Cryptography , Wiley-Teubner Series in
Computer Science, 1986.
Search WWH ::




Custom Search