︠83f8cd55-082e-4782-ab91-a259d16c55fei︠
%html
7. References
- [A-SIT] Center for Secure Information Technology - Austria
- [A-SIT ECC] Elliptic Curve Cryptography in Austria
- [A-SIT Software] Survey of the deployment of ECC in standard software by A-SIT
- [ANSI] American National Standards Institute
- [ANSIX9] Financial Industry Standards
- [ANSI X9.63] ANSI X9.63-199x Standard Working Draft
- [BSI] Bundesamt fuer Sicherheit in der Informationstechnik,
- [BSI ECC] BSI ECC Technical Guideline
- [CohenFrey2005] H. Cohen, G. Frey,
- Handbook of Elliptic and Hyperelliptic Curve Cryptography,
- Chapman & Hall / CRC, 2005.
- [CrypToolScript] The CrypTool Script: Cryptography, Mathematics and more
- [ECC sun.com] A brief overview of elliptic curve cryptography by Sun Microsystems Laboratories
- [eCard] eCard, a new German electronic identity card
- [ePass] ePass, the new German electronic passport
- [ePostage] Electronic Postage
- [FiniteFields] Introduction to Finite Fields
- [FIPS 186-2] FIPS PUB 186-2 Standard
- [FIPS 186-3] FIPS PUB 186-3 Draft Standard
- [Groups] Groups as Mathematical Structures
- [Hankerson2004] D. Hankerson, A. Menezes, S. Vanstone,
- Guide to Elliptic Curve Cryptography,
- Springer-Verlag, 2004.
- [IEEE] Institute of Electrical and Electronics Engineers
- [IEEE 1363] The IEEE P1363 Home Page
- [ISO/IEC] ISO/IEC Information Center
- [IVBB] The Berlin-Bonn Information Network
- [Keylength.com] Keylength.com: Cryptographic Key Length Recommendation
- [LenstraVerheul2001] A. Lenstra, E. Verheul,
- Selecting Cryptographic Key Sizes,
- Journal of Cryptology: the journal of the International Association for Cryptologic Research,
Vol. 14, No. 4, pp. 255-293, 2001.
- http://www.win.tue.nl/~klenstra/key.pdf
- [MallZhong2008] D. Mall, Q. Zhong,
- [ModularArithmetic] An explanation of modular arithmetic
- [NIST] American National Institute of Standards and Technology
- [NSA] National Security Agency
- [NSA ECC] The Case for Elliptic Curve Cryptography,
- [OpenSSL] OpenSSL, a popular open source implementation of SSL/TLS
- [ReverseVending] Reverse vending machines
- [Silverman1986] J. Silverman,
- The Arithmetic of Elliptic Curves,
- Graduate Texts in Mathematics, Springer-Verlag, 1986.
- [SilvermanTate1992] J. Silverman, J. Tate,
- The Rational Points on Elliptic Curves,
- Undergraduate Texts in Mathematics, Springer-Verlag, 1992.
- [Stein2008] W. Stein,
- [vanTilborg2000] H. van Tilborg,
- Fundamentals of Cryptology,
- Kluwer Academic Publishers, 2000.
- [Vercauteren2003] F. Vercauteren,
- [Washington2003] L. C. Washington,
- Elliptic Curves: Number Theory and Cryptography,
- Chapman & Hall / CRC, 2003.
︡56f81963-c38c-4e68-93ca-25c6d3283de1︡{"done":true,"html":"7. References
\n\n\n- [A-SIT] Center for Secure Information Technology - Austria
\n\n
\n- [A-SIT ECC] Elliptic Curve Cryptography in Austria
\n\n
\n- [A-SIT Software] Survey of the deployment of ECC in standard software by A-SIT
\n\n
\n- [ANSI] American National Standards Institute
\n\n
\n- [ANSIX9] Financial Industry Standards
\n\n
\n- [ANSI X9.63] ANSI X9.63-199x Standard Working Draft
\n\n
\n- [BSI] Bundesamt fuer Sicherheit in der Informationstechnik,
\n\n
\n- [BSI ECC] BSI ECC Technical Guideline
\n\n
\n- [CohenFrey2005] H. Cohen, G. Frey,
\n\n- Handbook of Elliptic and Hyperelliptic Curve Cryptography,
\n- Chapman & Hall / CRC, 2005.
\n
\n
\n- [CrypToolScript] The CrypTool Script: Cryptography, Mathematics and more
\n\n
\n- [ECC sun.com] A brief overview of elliptic curve cryptography by Sun Microsystems Laboratories
\n\n
\n- [eCard] eCard, a new German electronic identity card
\n\n
\n- [ePass] ePass, the new German electronic passport
\n\n
\n- [ePostage] Electronic Postage
\n\n
\n- [FiniteFields] Introduction to Finite Fields
\n\n
\n- [FIPS 186-2] FIPS PUB 186-2 Standard
\n\n
\n- [FIPS 186-3] FIPS PUB 186-3 Draft Standard
\n\n
\n- [Groups] Groups as Mathematical Structures
\n\n
\n- [Hankerson2004] D. Hankerson, A. Menezes, S. Vanstone,
\n\n- Guide to Elliptic Curve Cryptography,
\n- Springer-Verlag, 2004.
\n
\n
\n- [IEEE] Institute of Electrical and Electronics Engineers
\n\n
\n- [IEEE 1363] The IEEE P1363 Home Page
\n\n
\n- [ISO/IEC] ISO/IEC Information Center
\n\n
\n- [IVBB] The Berlin-Bonn Information Network
\n\n
\n- [Keylength.com] Keylength.com: Cryptographic Key Length Recommendation
\n\n
\n- [LenstraVerheul2001] A. Lenstra, E. Verheul,
\n\n- Selecting Cryptographic Key Sizes,
\n- Journal of Cryptology: the journal of the International Association for Cryptologic Research, \n Vol. 14, No. 4, pp. 255-293, 2001.
\n- http://www.win.tue.nl/~klenstra/key.pdf
\n
\n
\n- [MallZhong2008] D. Mall, Q. Zhong,
\n\n
\n- [ModularArithmetic] An explanation of modular arithmetic
\n\n
\n- [NIST] American National Institute of Standards and Technology
\n\n
\n- [NSA] National Security Agency
\n\n
\n- [NSA ECC] The Case for Elliptic Curve Cryptography,
\n\n
\n- [OpenSSL] OpenSSL, a popular open source implementation of SSL/TLS
\n\n
\n- [ReverseVending] Reverse vending machines
\n\n
\n- [Silverman1986] J. Silverman,
\n\n- The Arithmetic of Elliptic Curves,
\n- Graduate Texts in Mathematics, Springer-Verlag, 1986.
\n
\n
\n- [SilvermanTate1992] J. Silverman, J. Tate,
\n\n- The Rational Points on Elliptic Curves,
\n- Undergraduate Texts in Mathematics, Springer-Verlag, 1992.
\n
\n
\n- [Stein2008] W. Stein,
\n\n
\n- [vanTilborg2000] H. van Tilborg,
\n\n- Fundamentals of Cryptology,
\n- Kluwer Academic Publishers, 2000.
\n
\n
\n- [Vercauteren2003] F. Vercauteren,
\n\n
\n- [Washington2003] L. C. Washington,
\n\n- Elliptic Curves: Number Theory and Cryptography,
\n- Chapman & Hall / CRC, 2003.
\n
\n
"}
︠4ccd861d-fba8-462f-b67d-6a4b1688c949s︠
︡ce09893e-e499-483b-a7aa-9341f301d9db︡{"done":true}︡