blob: 7ac0d1e716ad7de50cb5d4db00b834ed615a7f34 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
|
= References & Miscellaneous =
== Interesting research and people ==
Advisory board, reviewers etc.
=== Elliptic Curves ===
* [http://safecurves.cr.yp.to/]. Including Curve3617.
* [http://www.nsa.gov/ia/_files/nist-routines.pdf]. Details for implementing NIST curves.
* [http://blog.cr.yp.to/20140323-ecdsa.html] djb on How to design an elliptic-curve signature system
=== Side channel attacks ===
* [http://www.cl.cam.ac.uk/~sps32/], Dr Sergei Skorobogatov
* [https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_46_ECCGuide_e_pdf.pdf BSI - Minimum Requirements for Evaluating Side-Channel Attack Resistance of Elliptic Curve Implementations]
== Useful References ==
* [https://crypto.stanford.edu/~dabo/pubs/abstracts/ssl-timing.html Remote timing attacks are practical], D. Boneh and D. Brumley.
* [http://www.cybersecurity.my/mycc/document/mycpr/C037/AEP_Keyper_EAL4_ASE_1.3.pdf Common Critiera Security Target for the AEP Keyper]
* [https://www.cosic.esat.kuleuven.be/ches2012/tutorials.shtml Cryptographic hardware: how to make it cool, fast and unbreakable],
Junfeng Fan, KU Leuven
* [http://web.mit.edu/bunnie/www/xi/rec.html REC FPGA Seminar IAP 1998], Bunnie Huang
* [http://compcert.inria.fr/ the formal verification of realistic compilers usable for critical embedded software]
== Somewhat Related Web Sites ==
* [https://prism-break.org/ List of Open SW Alternatives]
|