5dc6a69
dd255ef
88aaae1
b58c60b
7acac1b
1
2
3
4
5 6 7 8 9 10 11
12 13 14
15 16 17 18 19
20
21 22 23 24 25 26 27 28 29
30
31 32 33 34 35 36 37 38
Title: MiscStuff Author: trac Date: 2016-12-15 22:39 References & Miscellaneous Interesting research and people Advisory board, reviewers etc. Elliptic Curves http://safecurves.cr.yp.to/. Including Curve3617. http://www.nsa.gov/ia/_files/nist-routines.pdf. Details for implementing NIST curves. http://blog.cr.yp.to/20140323-ecdsa.html djb on How to design an elliptic-curve signature system Side channel attacks http://www.cl.cam.ac.uk/~sps32/, Dr Sergei Skorobogatov BSI - Minimum Requirements for Evaluating Side-Channel Attack Resistance of Elliptic Curve Implementations Useful References Remote timing attacks are practical, D. Boneh and D. Brumley. Common Critiera Security Target for the AEP Keyper Cryptographic hardware: how to make it cool, fast and unbreakable, Junfeng Fan, KU Leuven REC FPGA Seminar IAP 1998, Bunnie Huang the formal verification of realistic compilers usable for critical embedded software Somewhat Related Web Sites List of Open SW Alternatives
Title: MiscStuff Author: trac Date: 2016-12-15 22:39
Advisory board, reviewers etc.