From b092ffbcbe2c9398494f7dc9db6f0796971633e0 Mon Sep 17 00:00:00 2001 From: Rob Austein Date: Sun, 13 Sep 2020 23:04:30 +0000 Subject: Import Cryptech wiki dump --- raw-wiki-dump/MiscStuff | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 raw-wiki-dump/MiscStuff (limited to 'raw-wiki-dump/MiscStuff') diff --git a/raw-wiki-dump/MiscStuff b/raw-wiki-dump/MiscStuff new file mode 100644 index 0000000..7ac0d1e --- /dev/null +++ b/raw-wiki-dump/MiscStuff @@ -0,0 +1,27 @@ += References & Miscellaneous = + +== Interesting research and people == +Advisory board, reviewers etc. + +=== Elliptic Curves === +* [http://safecurves.cr.yp.to/]. Including Curve3617. +* [http://www.nsa.gov/ia/_files/nist-routines.pdf]. Details for implementing NIST curves. +* [http://blog.cr.yp.to/20140323-ecdsa.html] djb on How to design an elliptic-curve signature system + + +=== Side channel attacks === +* [http://www.cl.cam.ac.uk/~sps32/], Dr Sergei Skorobogatov +* [https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_46_ECCGuide_e_pdf.pdf BSI - Minimum Requirements for Evaluating Side-Channel Attack Resistance of Elliptic Curve Implementations] + +== Useful References == + +* [https://crypto.stanford.edu/~dabo/pubs/abstracts/ssl-timing.html Remote timing attacks are practical], D. Boneh and D. Brumley. +* [http://www.cybersecurity.my/mycc/document/mycpr/C037/AEP_Keyper_EAL4_ASE_1.3.pdf Common Critiera Security Target for the AEP Keyper] +* [https://www.cosic.esat.kuleuven.be/ches2012/tutorials.shtml Cryptographic hardware: how to make it cool, fast and unbreakable], + Junfeng Fan, KU Leuven +* [http://web.mit.edu/bunnie/www/xi/rec.html REC FPGA Seminar IAP 1998], Bunnie Huang +* [http://compcert.inria.fr/ the formal verification of realistic compilers usable for critical embedded software] + +== Somewhat Related Web Sites == + +* [https://prism-break.org/ List of Open SW Alternatives] -- cgit v1.2.3