Cryptography Reference
In-Depth Information
40. J.L. Carter and M.N. Wegman. New hash functions and their use in authentication and set
equality. Journal of Computer and System Sciences , 22(3):265-277, 1981.
41. ¸etinKayaKo¸, Tolga Acar, and Burton S. Kaliski. Analyzing and comparing Montgomery
multiplication algorithms. IEEE Micro , 16(3):26-33, 1996.
42. P. Chodowiec and K. Gaj. Very compact FPGA implementation of the AES algorithm. In
C. D. Walter, ¸.K.Ko¸, and C. Paar, editors, CHES '03: Proceedings of the 5th International
Workshop on Cryptographic Hardware and Embedded Systems , volume 2779 of LNCS , pages
319-333. Springer, 2003.
43. C. Cid, S. Murphy, and M. Robshaw. Algebraic Aspects of the Advanced Encryption Stan-
dard . Springer, 2006.
44. H. Cohen, G. Frey, and R. Avanzi. Handbook of Elliptic and Hyperelliptic Curve Cryp-
tography . Discrete Mathematics and Its Applications. Chapman and Hall/CRC, September
2005.
45. T. Collins, D. Hopkins, S. Langford, and M. Sabin. Public key cryptographic apparatus and
method, 1997. United States Patent US 5,848,159. Jan. 1997.
46. Common Criteria for Information Technology Security Evaluation. http://www.
commoncriteriaportal.org/ .
47. COPACOBANA—A
Cost-Optimized
Parallel
Code
Breaker.
http://www.
copacobana.org/ .
48. Sony Corporation. Clefia - new block cipher algorithm based on state-of-
the-art design technologies, 2007. http://www.sony.net/SonyInfo/News/
Press/200703/07-028E/index.html .
49. Ronald Cramer and Victor Shoup. A practical public key cryptosystem provably secure
against adaptive chosen ciphertext attack. CRYPTO '98: Proceedings of the 18th Annual
International Cryptology Conference, Advances in Cryptology , 1462:13-25, 1998.
50. Cryptool
Educational
Tool
for
Cryptography
and
Cryptanalysis.
https://www.cryptool.org/ .
51. J. Daemen and V. Rijmen. AES Proposal: Rijndael. In First Advanced Encryption Standard
(AES) Conference , Ventura, California, USA, 1998.
52. Joan Daemen and Vincent Rijmen. The Design of Rijndael . Springer, 2002.
53. B. den Boer and A. Bosselaers. An attack on the last two rounds of MD4. In CRYPTO '91:
Proceedings of the 11th Annual International Cryptology Conference, Advances in Cryptol-
ogy , LNCS, pages 194-203. Springer, 1992.
54. B. den Boer and A. Bosselaers. Collisions for the compression function of MD5. In Advances
in Cryptology - EUROCRYPT'93 , LNCS, pages 293-304. Springer, 1994.
55. Alexander W. Dent. A brief history of provably-secure public-key encryption. Cryptology
ePrint Archive, Report 2009/090, 2009. http://eprint.iacr.org/ .
56. Diehard
Battery
of
Tests
of
Randomness
CD,
1995.
http://i.cs.hku.hk/
diehard/ .
57. W. Diffie. The first ten years of public-key cryptography. Innovations in Internetworking ,
pages 510-527, 1988.
58. W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Transactions on Infor-
mation Theory , IT-22:644-654, 1976.
59. W. Diffie and M. E. Hellman. Exhaustive cryptanalysis of the NBS Data Encryption Stan-
dard. COMPUTER , 10(6):74-84, June 1977.
60. Whitfield Diffie, Paul C. Van Oorschot, and Michael J. Wiener. Authentication and authenti-
cated key exchanges. Des. Codes Cryptography , 2(2):107-125, 1992.
61. Hans Dobbertin. Alf swindles Ann. CRYPTOBYTES , 3(1), 1995.
62. Hans Dobbertin. The status of MD5 after a recent attack. CRYPTOBYTES , 2(2), 1996.
63. Saar Drimer, Tim G uneysu, and Christof Paar. DSPs, BRAMs and a Pinch of Logic: New
Recipes for AES on FPGAs. IEEE Symposium on Field-Programmable Custom Computing
Machines (FCCM) , 0:99-108, 2008.
64. Morris Dworkin. Recommendation for Block Cipher Modes of Opera-
tion: The CCM Mode for Authentication and Confidentiality, May 2004.
http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C_
updated-July20_2007.pdf .
Search WWH ::




Custom Search