Understanding Cryptography
暂无分享,去创建一个
[1] Joseph H. Silverman,et al. The arithmetic of elliptic curves , 1986, Graduate texts in mathematics.
[2] Christof Paar,et al. Cantor versus Harley: optimization and analysis of explicit formulae for hyperelliptic curve cryptosystems , 2005, IEEE Transactions on Computers.
[3] Jerome A. Solinas,et al. Efficient Arithmetic on Koblitz Curves , 2000, Des. Codes Cryptogr..
[4] Walter Tuchman,et al. A brief history of the data encryption standard , 1997 .
[5] Axel Poschmann,et al. Lightweight cryptography: cryptographic engineering for a pervasive world , 2009, IACR Cryptol. ePrint Arch..
[6] V.F. Kleist,et al. The code book: the science of secrecy from ancient egypt to quantum cryptography [Book Review] , 2002, IEEE Annals of the History of Computing.
[7] Wolfgang Rankl,et al. Smart Card Handbook , 1997 .
[8] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[9] Ronald L. Rivest,et al. The RC4 encryption algorithm , 1992 .
[10] Kenneth H. Rosen. Elementary Number Theory , 2004 .
[11] Jacques Stern,et al. Security Proofs for Signature Schemes , 1996, EUROCRYPT.
[12] Christof Paar,et al. Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents , 2008, CARDIS.
[13] Adi Shamir. Factoring Large Numbers with the Twinkle Device (Extended Abstract) , 1999, CHES.
[14] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[15] Joos Vandewalle,et al. Hash Functions Based on Block Ciphers: A Synthetic Approach , 1993, CRYPTO.
[16] Radha Poovendran,et al. The AES-CMAC Algorithm , 2006, RFC.
[17] Tsuyoshi Takagi,et al. Fast RSA-Type Cryptosystem Modulo pkq , 1998, CRYPTO.
[18] Matthew J. B. Robshaw,et al. New Stream Cipher Designs: The eSTREAM Finalists , 2008 .
[19] Bart Preneel. MDC-2 and MDC-4 , 2011, Encyclopedia of Cryptography and Security.
[20] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[21] Steven Trimberger,et al. A 12 Gbps DES Encryptor/Decryptor Core in an FPGA , 2000, CHES.
[22] Michaël Quisquater,et al. How to Explain Zero-Knowledge Protocols to Your Children , 1989, CRYPTO.
[23] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[24] Christof Paar,et al. Generalizations of the Karatsuba Algorithm for Efficient Implementations , 2006, IACR Cryptol. ePrint Arch..
[25] J. Silverman. Advanced Topics in the Arithmetic of Elliptic Curves , 1994 .
[26] Alessandro Piva,et al. Cryptography and Data Hiding for Media Security , 2008 .
[27] Joseph H. Silverman,et al. A Friendly Introduction to Number Theory , 1996 .
[28] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[29] Russ Housley,et al. Counter with CBC-MAC (CCM) , 2003, RFC.