= References & Miscellaneous = == Interesting research and people == Advisory board, reviewers etc. === Elliptic Curves === * [http://safecurves.cr.yp.to/]. Including Curve3617. * [http://www.nsa.gov/ia/_files/nist-routines.pdf]. Details for implementing NIST curves. * [http://blog.cr.yp.to/20140323-ecdsa.html] djb on How to design an elliptic-curve signature system === Side channel attacks === * [http://www.cl.cam.ac.uk/~sps32/], Dr Sergei Skorobogatov * [https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_46_ECCGuide_e_pdf.pdf BSI - Minimum Requirements for Evaluating Side-Channel Attack Resistance of Elliptic Curve Implementations] == Useful References == * [https://crypto.stanford.edu/~dabo/pubs/abstracts/ssl-timing.html Remote timing attacks are practical], D. Boneh and D. Brumley. * [http://www.cybersecurity.my/mycc/document/mycpr/C037/AEP_Keyper_EAL4_ASE_1.3.pdf Common Critiera Security Target for the AEP Keyper] * [https://www.cosic.esat.kuleuven.be/ches2012/tutorials.shtml Cryptographic hardware: how to make it cool, fast and unbreakable], Junfeng Fan, KU Leuven * [http://web.mit.edu/bunnie/www/xi/rec.html REC FPGA Seminar IAP 1998], Bunnie Huang * [http://compcert.inria.fr/ the formal verification of realistic compilers usable for critical embedded software] == Somewhat Related Web Sites == * [https://prism-break.org/ List of Open SW Alternatives]