summaryrefslogtreecommitdiff
path: root/pelican/content/MiscStuff.md
diff options
context:
space:
mode:
Diffstat (limited to 'pelican/content/MiscStuff.md')
-rw-r--r--pelican/content/MiscStuff.md36
1 files changed, 36 insertions, 0 deletions
diff --git a/pelican/content/MiscStuff.md b/pelican/content/MiscStuff.md
new file mode 100644
index 0000000..8742c7b
--- /dev/null
+++ b/pelican/content/MiscStuff.md
@@ -0,0 +1,36 @@
+# References & Miscellaneous
+
+## Interesting research and people
+Advisory board, reviewers etc.
+
+### Elliptic Curves
+
+* [http://safecurves.cr.yp.to/](http://safecurves.cr.yp.to/). Including Curve3617.
+* [http://www.nsa.gov/ia/_files/nist-routines.pdf](http://www.nsa.gov/ia/_files/nist-routines.pdf). Details for implementing NIST curves.
+* [http://blog.cr.yp.to/20140323-ecdsa.html](http://blog.cr.yp.to/20140323-ecdsa.html) djb on How to design an elliptic-curve signature system
+
+
+
+### Side channel attacks
+
+* [http://www.cl.cam.ac.uk/~sps32/](http://www.cl.cam.ac.uk/~sps32/), Dr Sergei Skorobogatov
+* [BSI - Minimum Requirements for Evaluating Side-Channel Attack Resistance of Elliptic Curve Implementations](https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_46_ECCGuide_e_pdf.pdf)
+
+
+## Useful References
+
+
+* [Remote timing attacks are practical](https://crypto.stanford.edu/~dabo/pubs/abstracts/ssl-timing.html), D. Boneh and D. Brumley.
+* [Common Critiera Security Target for the AEP Keyper](http://www.cybersecurity.my/mycc/document/mycpr/C037/AEP_Keyper_EAL4_ASE_1.3.pdf)
+* [Cryptographic hardware: how to make it cool, fast and unbreakable](https://www.cosic.esat.kuleuven.be/ches2012/tutorials.shtml),
+
+ Junfeng Fan, KU Leuven
+
+* [REC FPGA Seminar IAP 1998](http://web.mit.edu/bunnie/www/xi/rec.html), Bunnie Huang
+* [the formal verification of realistic compilers usable for critical embedded software](http://compcert.inria.fr/)
+
+
+## Somewhat Related Web Sites
+
+
+* [List of Open SW Alternatives](https://prism-break.org/)