Cryptography Reference
In-Depth Information
154. J. H. Silverman.
The Arithmetic of Elliptic Curves
. Springer, 1986.
155. J. H. Silverman.
Advanced Topics in the Arithmetic of Elliptic Curves
. Springer, 1994.
156. J. H. Silverman.
A Friendly Introduction to Number Theory
. Prentice Hall, 3rd edition, 2006.
157. Simon Singh.
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum
Cryptography
. Anchor, August 2000.
158. Jerome A. Solinas. Efficient arithmetic on Koblitz curves.
Designs, Codes and Cryptography
,
19(2-3):195-249, 2000.
159. J.H.
Song,
R.
Poovendran,
J.
Lee,
and
T.
Iwata.
RFC
4493:
The
AES-CMAC
Algorithm.
Technical
report,
Corporation
for
National
Research
Initiatives,
Inter-
net
Engineering
Task
Force,
Network
Working
Group,
June
2006.
Available
at
160. NIST Special Publication SP800-38D: Recommendation for Block Cipher Modes of Oper-
ation: Galois Counter Mode (GCM) and GMAC, November 2007. Available at
http://
161. W. Stallings.
Cryptography and Network Security: Principles and Practice
.PrenticeHall,
4th edition, 2005.
162. Tsuyoshi Takagi. Fast RSA-type cryptosystem modulo
p
k
q
.In
CRYPTO '98: Proceedings of
the 18th Annual International Cryptology Conference, Advances in Cryptology
, pages 318-
326. Springer, 1998.
163. S. Trimberger, R. Pang, and A. Singh. A 12 Gbps DES Encryptor/Decryptor Core in an
FPGA. In ¸. K. Ko¸ and C. Paar, editors,
CHES '00: Proceedings of the 2nd International
Workshop on Cryptographic Hardware and Embedded Systems
, volume 1965 of
LNCS
, pages
157-163. Springer, August 17-18, 2000.
164. Trivium Specifications.
http://www.ecrypt.eu.org/stream/p3ciphers/
165. Walter Tuchman. A brief history of the data encryption standard. In
Internet Besieged:
Countering Cyberspace Scofflaws
, pages 275-280. ACM Press/Addison-Wesley, 1998.
166. Annual
Workshop
on
Elliptic
Curve
Cryptography,
ECC.
168. Henk C. A. van Tilborg, editor.
Encyclopedia of Cryptography and Security
. Springer, 2005.
169. Ingrid Verbauwhede, Frank Hoornaert, Joos Vandewalle, and Hugo De Man.
ASIC
cryptographical
processor
based
on
DES,
1991.
170. SHARCS
—-
Special-purpose
Hardware
for
Attacking
Cryptographic
Systems.
171. WAIFI
—
International
Workshop
on
the
Arithmetic
of
Finite
Fields.
http://
172. Andre
Weimerskirch
and
Christof
Paar.
Generalizations
of
the
Karatsuba
algo-
rithm
for
efficient
implementations.
Cryptology
ePrint
Archive,
Report
2006/224.
173. D. Whiting, R. Housley, and N. Ferguson. RFC 3610: Counter with CBC-MAC (CCM).
Technical report, Corporation for National Research Initiatives, Internet Engineering Task
Force, Network Working Group, September 2003.
174. M.J. Wiener.
Efficient DES Key Search: An Update.
CRYPTOBYTES
, 3(2):6-8, Autumn
1997.
175. Thomas Wollinger, Jan Pelzl, and Christof Paar. Cantor versus Harley: Optimization and
analysis of explicit formulae for hyperelliptic curve cryptosystems.
IEEE Transactions on
Computers
, 54(7):861-872, 2005.