Cryptography Reference
In-Depth Information
154. J. H. Silverman. The Arithmetic of Elliptic Curves . Springer, 1986.
155. J. H. Silverman. Advanced Topics in the Arithmetic of Elliptic Curves . Springer, 1994.
156. J. H. Silverman. A Friendly Introduction to Number Theory . Prentice Hall, 3rd edition, 2006.
157. Simon Singh. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum
Cryptography . Anchor, August 2000.
158. Jerome A. Solinas. Efficient arithmetic on Koblitz curves. Designs, Codes and Cryptography ,
19(2-3):195-249, 2000.
159. J.H.
Song,
R.
Poovendran,
J.
Lee,
and
T.
Iwata.
RFC
4493:
The
AES-CMAC
Algorithm.
Technical
report,
Corporation
for
National
Research
Initiatives,
Inter-
net
Engineering
Task
Force,
Network
Working
Group,
June
2006.
Available
at
http://rfc.net/rfc4493.html .
160. NIST Special Publication SP800-38D: Recommendation for Block Cipher Modes of Oper-
ation: Galois Counter Mode (GCM) and GMAC, November 2007. Available at http://
csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf .
161. W. Stallings. Cryptography and Network Security: Principles and Practice .PrenticeHall,
4th edition, 2005.
162. Tsuyoshi Takagi. Fast RSA-type cryptosystem modulo p k q .In CRYPTO '98: Proceedings of
the 18th Annual International Cryptology Conference, Advances in Cryptology , pages 318-
326. Springer, 1998.
163. S. Trimberger, R. Pang, and A. Singh. A 12 Gbps DES Encryptor/Decryptor Core in an
FPGA. In ¸. K. Ko¸ and C. Paar, editors, CHES '00: Proceedings of the 2nd International
Workshop on Cryptographic Hardware and Embedded Systems , volume 1965 of LNCS , pages
157-163. Springer, August 17-18, 2000.
164. Trivium Specifications. http://www.ecrypt.eu.org/stream/p3ciphers/
trivium/trivium_p3.pdf .
165. Walter Tuchman. A brief history of the data encryption standard. In Internet Besieged:
Countering Cyberspace Scofflaws , pages 275-280. ACM Press/Addison-Wesley, 1998.
166. Annual
Workshop
on
Elliptic
Curve
Cryptography,
ECC.
http://cacr.math.
uwaterloo.ca/conferences/ .
167. Digital Signature Law Survey. https://dsls.rechten.uvt.nl/ .
168. Henk C. A. van Tilborg, editor. Encyclopedia of Cryptography and Security . Springer, 2005.
169. Ingrid Verbauwhede, Frank Hoornaert, Joos Vandewalle, and Hugo De Man.
ASIC
cryptographical
processor
based
on
DES,
1991.
http://www.ivgroup.ee.
ucla.edu/pdf/1991euroasic.pdf .
170. SHARCS
—-
Special-purpose
Hardware
for
Attacking
Cryptographic
Systems.
http://www.sharcs.org/ .
171. WAIFI
International
Workshop
on
the
Arithmetic
of
Finite
Fields.
http://
www.waifi.org/ .
172. Andre
Weimerskirch
and
Christof
Paar.
Generalizations
of
the
Karatsuba
algo-
rithm
for
efficient
implementations.
Cryptology
ePrint
Archive,
Report
2006/224.
http://eprint.iacr.org/2006/224 .
173. D. Whiting, R. Housley, and N. Ferguson. RFC 3610: Counter with CBC-MAC (CCM).
Technical report, Corporation for National Research Initiatives, Internet Engineering Task
Force, Network Working Group, September 2003.
174. M.J. Wiener.
Efficient DES Key Search: An Update.
CRYPTOBYTES , 3(2):6-8, Autumn
1997.
175. Thomas Wollinger, Jan Pelzl, and Christof Paar. Cantor versus Harley: Optimization and
analysis of explicit formulae for hyperelliptic curve cryptosystems. IEEE Transactions on
Computers , 54(7):861-872, 2005.
 
Search WWH ::




Custom Search