Bibliography

File c4e_aes.h

Advanced Encryption Standard (AES). FIPS Publication 197, National Institute of Standards and Technology, 2001.

Global c4e_aes_decrypt

Advanced Encryption Standard (AES). FIPS Publication 197, National Institute of Standards and Technology, 2001.

Global c4e_aes_encrypt

Advanced Encryption Standard (AES). FIPS Publication 197, National Institute of Standards and Technology, 2001.

File c4e_asn1.h

Information Technology — ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER). ITU-T Recommendation X.690, November 208.

Global c4e_asn1_expect_tag

Information technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER). ITU-T X.690, 11/2008.

Global c4e_bigint_div

D. A. Pope and M. L. Stein: Multiple Precision Arithmetic. CACM, 3:652-654, 1960

G. E. Collins and D. R. Musser: Analysis of the Pope- Stein Division Algorithm. University of Wisconsin Computer Sciences Department, Technical Report #55, Jan 1969

D. E. Knuth: The Art of Computer Programming, Vol. 2 (Semi-Numerical Algorithms). Addison-Wesley, 1997

Global c4e_bigint_gcd

J. Stein: Computational problems associated with Racah algebra. Journal of Computational Physics, 1, 1967.

Bojanczyk, A. and R. P. Brent: A systolic algorithm for extended GCD computation. Computers & Mathematics with Applications, 14(4):233-238, 1987.

Burton S. Kaliski: The Montgomery Inverse and Its Applications. IEEE Transactions on Computers, 44(8):1064-1065, August 1995.

Global c4e_bigint_mod

D. A. Pope and M. L. Stein: Multiple Precision Arithmetic. CACM, 3:652-654, 1960

G. E. Collins and D. R. Musser: Analysis of the Pope- Stein Division Algorithm. University of Wisconsin Computer Sciences Department, Technical Report #55, Jan 1969

D. E. Knuth: The Art of Computer Programming, Vol. 2 (Semi-Numerical Algorithms). Addison-Wesley, 1997

Global c4e_dlc_dh_std

PKCS #3: Diffie-Hellman Key-Agreement Standard. 1993.

E. Rescorla: Diffie-Hellman Key Agreement Method. RFC 2631, IETF, June 1999.

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Public Key Cryptography for the Financial Services Industry: Agreement of Symmetric Keys Using Discrete Logarithm Cryptography. ANSI X9.42, 2003.

Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques. ISO 11770-3, 2008.

Global c4e_dlc_dh_tls

Dierks, T. and E. Rescorla: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246, IETF, August 2008.

Global c4e_dlc_domchk

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Digitale Signature Standard (DSS). FIPS Publication 186-4, National Institute of Standards and Technology, 2013.

NIST Special Publication 800-56A Revision 2: Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography. 2013.

NIST Special Publication 800-89: Recommendation for Obtaining Assurances for Digital Signature Applications. 2006.

Global c4e_dlc_dsa_sign

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Digitale Signature Standard (DSS). FIPS Publication 186-4, National Institute of Standards and Technology, 2013.

Global c4e_dlc_dsa_unisig

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Digitale Signature Standard (DSS). FIPS Publication 186-4, National Institute of Standards and Technology, 2013.

Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9.62, 1998.

Global c4e_dlc_dsa_univfy

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Digitale Signature Standard (DSS). FIPS Publication 186-4, National Institute of Standards and Technology, 2013.

Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9.62, 1998.

Global c4e_dlc_dsa_verify

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Digitale Signature Standard (DSS). FIPS Publication 186-4, National Institute of Standards and Technology, 2013.

Global c4e_dlc_keychk_prv

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Public Key Cryptography for the Financial Services Industry: Agreement of Symmetric Keys Using Diffie-Hellman and MQV Algorithms (draft), ANSI X9.42, 1998.

NIST Special Publication 800-56A Revision 2: Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography. 2013.

Digitale Signature Standard (DSS). FIPS Publication 186-4, National Institute of Standards and Technology, 2013.

Global c4e_dlc_keychk_pub

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

NIST Special Publication 800-56A Revision 2: Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography. 2013.

Global C4E_EC_FIELD_BITS_MAX

Public Key Cryptography For The Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography. ANSI X9.63, 2001.

Global c4e_ecc2n_dh

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Public Key Cryptography For The Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography. ANSI X9.63, 2001.

Standards for Efficient Cryptography Group - SEC 1: Elliptic Curve Cryptography. Certicom Research. 2000.

Global c4e_ecc2n_domchk

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9.62, 1998.

Public Key Cryptography For The Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography. ANSI X9.63, 2001.

Global c4e_ecc2n_dsa_sign

Digitale Signature Standard (DSS). FIPS Publication 186-4, National Institute of Standards and Technology, 2013.

Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9.62, 1998.

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Global c4e_ecc2n_dsa_verify

Digitale Signature Standard (DSS). FIPS Publication 186-4, National Institute of Standards and Technology, 2013.

Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9.62, 1998.

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Global c4e_ecc2n_keychk_prv

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Public Key Cryptography For The Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography. ANSI X9.63, 2001.

Global c4e_ecc2n_keychk_pub

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9.62, 1998.

Public Key Cryptography For The Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography. ANSI X9.63, 2001.

Global c4e_ecc2n_os2pt

Public Key Cryptography For The Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography. ANSI X9.63, 2001.

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Global c4e_ecc2n_pt2os

Public Key Cryptography For The Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography. ANSI X9.63, 2001.

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Global c4e_ecgf2n_add

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Hankerson, Darrel, Alfred Menezes und Scott Vanstone: Guide to Elliptic Curve Cryptography. Springer, New York, 2004.

Global c4e_ecgf2n_dbl

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Hankerson, Darrel, Alfred Menezes und Scott Vanstone: Guide to Elliptic Curve Cryptography. Springer, New York, 2004.

Global c4e_ecgf2n_gety

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9.62, 1998.

Global c4e_ecgf2n_mul

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Hankerson, Darrel, Alfred Menezes und Scott Vanstone: Guide to Elliptic Curve Cryptography. Springer, New York, 2004.

Global c4e_ecgf2n_neg

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Hankerson, Darrel, Alfred Menezes und Scott Vanstone: Guide to Elliptic Curve Cryptography. Springer, New York, 2004.

Global c4e_ecgf2n_sign

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Global c4e_ecgf2n_validate

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9.62, 1998.

Hankerson, Darrel, Alfred Menezes und Scott Vanstone: Guide to Elliptic Curve Cryptography. Springer, New York, 2004.

Global c4e_elem_e2os

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

NIST Special Publication 800-56A Revision 2: Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography. 2013.

Global c4e_elem_os2e

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

NIST Special Publication 800-56A Revision 2: Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography. 2013.

Global c4e_gf2n_inv

Hankerson, Darrel, Alfred Menezes und Scott Vanstone: Guide to Elliptic Curve Cryptography. Springer, New York, 2004.

Crandall, Richard und Carl Pomerance: Prime Numbers. A Computational Perspective. Springer, 2. Auflage, 2005.

Global c4e_gf2n_qsolve

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9.62, 1998.

Global c4e_modn_crt

Koc, Cetin Kaya: High-Speed RSA Implementation. Technical Report TR-201, RSA Laboratories, 1994. Version 2.0

Garner, Harvey L.: The Residue Number System. IRE Transactions on Electronic Computers, 8(2):140-147, Juni 1959.

Global c4e_modn_pow

Montgomery, P.: Modular multiplication without trial division. Mathematics of Computation, 44(170):519-521, 1985.

Koc, Cetin Kaya, Tolga Acar and Burton S. Kaliski, Jr.: Analyzing and Comparing Montgomery Multiplication Algorithms. IEEE Micro, 16(3):26-33, Juni 1996.

Burton S. Kaliski: The Montgomery Inverse and Its Applications IEEE Transactions on Computers, 44(8):1064-1065, August 1995.

Global c4e_poly_gcd

Menezes, Alfred J., P. C. van Oorschot und Scott A. Vanstone: Handbook of applied cryptography. CRC Press Series on Discrete Mathematics and Its Application. CRC Press, 2. Edition, 1992.

Hankerson, Darrel, Alfred Menezes und Scott Vanstone: Guide to Elliptic Curve Cryptography. Springer, New York, 2004.

Crandall, Richard und Carl Pomerance: Prime Numbers. A Computational Perspective. Springer, 2. Auflage, 2005.

Berlekamp, Elwyn R.: Algebraic Coding Theory, Revised 1984 Edition. Aegean Park Press, Laguna Hills, CA, 1984.

Global c4e_poly_mod

Peterson, W. Wesley und E. J. Weldon, Jr.: Error-Correcting Codes. MIT Press, 1972.

Berlekamp, Elwyn R.: Algebraic Coding Theory. Aegean Park Press, 1984.

Global c4e_poly_mul

Peterson, W. Wesley und E. J. Weldon, Jr.: Error-Correcting Codes. MIT Press, 1972.

Berlekamp, Elwyn R.: Algebraic Coding Theory. Aegean Park Press, 1984.

Global c4e_pstdiv_step

D. A. Pope and M. L. Stein: Multiple Precision Arithmetic. CACM, 3:652-654, 1960

D. E. Knuth: The Art of Computer Programming, Vol. 2 (Semi-Numerical Algorithms). Addison-Wesley, 1997

Global c4e_rsa_decrypt_pkcs1v1

RSA Encryption Standard. PKCS #1 v1.5, RSA Laboratories, November 1993.

Kaliski, B.: Public-Key Cryptography Standards (PKCS) #1: RSA Encryption Version 1.5. RFC 2313, IETF, March 1998

Kent, S.: Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers. RFC 1423, IETF, February 1993.

Rivest, R.L., A. Shamir und L.M. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.

Global c4e_rsa_decrypt_pkcs1v2

RSA Cryptography Standard. PKCS #1 v2.1, RSA Laboratories, June 2002.

Jonsson, J. and B. Kaliski: Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. RFC 3447, IETF, February 2003

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers. ISO 18033-2, 2006.

M. Bellare and P. Rogaway: Optimal Asymmetric Encryption - How to Encrypt with RSA. In: Advances in Cryptology - EUROCRYPT 94, LNCS 950: 92-111, 1995, Springer-Verlag.

Rivest, R.L., A. Shamir und L.M. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.

Global c4e_rsa_encrypt_pkcs1v1

RSA Encryption Standard. PKCS #1 v1.5, RSA Laboratories, November 1993.

Kaliski, B.: Public-Key Cryptography Standards (PKCS) #1: RSA Encryption Version 1.5. RFC 2313, IETF, March 1998

Kent, S.: Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers. RFC 1423, IETF, February 1993.

Rivest, R.L., A. Shamir und L.M. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.

Global c4e_rsa_encrypt_pkcs1v2

RSA Cryptography Standard. PKCS #1 v2.1, RSA Laboratories, June 2002.

Jonsson, J. and B. Kaliski: Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. RFC 3447, IETF, February 2003

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers. ISO 18033-2, 2006.

M. Bellare and P. Rogaway: Optimal Asymmetric Encryption - How to Encrypt with RSA. In: Advances in Cryptology - EUROCRYPT 94, LNCS 950: 92-111, 1995, Springer-Verlag.

Rivest, R.L., A. Shamir und L.M. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.

Global c4e_rsa_keychk_prv

NIST Special Publication 800-56B: Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography. 2009.

Global c4e_rsa_keychk_pub

NIST Special Publication 800-56B: Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography. 2009.

Global c4e_rsa_sign_pkcs1v1

RSA Encryption Standard. PKCS #1 v1.5, RSA Laboratories, November 1993.

Kaliski, B.: Public-Key Cryptography Standards (PKCS) #1: RSA Encryption Version 1.5. RFC 2313, IETF, March 1998

Rivest, R.L., A. Shamir und L.M. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.

Global c4e_rsa_sign_pkcs1v2

RSA Cryptography Standard. PKCS #1 v2.1, RSA Laboratories, June 2002.

Jonsson, J. and B. Kaliski: Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. RFC 3447, IETF, February 2003

Standard Specifications For Public-Key Cryptography - Amendment 1: Additional Techniques. IEEE Std 1363a-2004.

M. Bellare and P. Rogaway: The Exact Security of Digital Signatures - How to Sign with RSA and Rabin. In: Advances in Cryptology - EUROCRYPT 96, LNCS 1070: 399-416, 1996, Springer-Verlag.

Rivest, R.L., A. Shamir and L.M. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.

Global c4e_rsa_verify_pkcs1v1

RSA Encryption Standard. PKCS #1 v1.5, RSA Laboratories, November 1993.

Kaliski, B.: Public-Key Cryptography Standards (PKCS) #1: RSA Encryption Version 1.5. RFC 2313, IETF, March 1998

Rivest, R.L., A. Shamir and L.M. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.

Global c4e_rsa_verify_pkcs1v2

RSA Cryptography Standard. PKCS #1 v2.1, RSA Laboratories, June 2002.

Jonsson, J. and B. Kaliski: Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. RFC 3447, IETF, February 2003

Standard Specifications For Public-Key Cryptography - Amendment 1: Additional Techniques. IEEE Std 1363a-2004.

M. Bellare and P. Rogaway: The Exact Security of Digital Signatures - How to Sign with RSA and Rabin. In: Advances in Cryptology - EUROCRYPT 96, LNCS 1070: 399-416, 1996, Springer-Verlag.

Rivest, R.L., A. Shamir and L.M. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.

Global c4e_sha1_mem

Secure Hash Standard. FIPS Publication 180-1, National Institute of Standards and Technology, 1993.

Public Key Cryptography Using Irreversible Algorithms - Part 2: The Secure Hash Algorithm (SHA-1). ANSI X9.30-2, 1997.

Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions. ISO 10118-3, 2004.

Global c4e_sha1_next

Secure Hash Standard. FIPS Publication 180-1, National Institute of Standards and Technology, 1993.

Public Key Cryptography Using Irreversible Algorithms - Part 2: The Secure Hash Algorithm (SHA-1). ANSI X9.30-2, 1997.

Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions. ISO 10118-3, 2004.

Global c4e_sha1_start

Secure Hash Standard. FIPS Publication 180-1, National Institute of Standards and Technology, 1993.

Public Key Cryptography Using Irreversible Algorithms - Part 2: The Secure Hash Algorithm (SHA-1). ANSI X9.30-2, 1997.

Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions. ISO 10118-3, 2004.

Global c4e_sha1_stop

Secure Hash Standard. FIPS Publication 180-1, National Institute of Standards and Technology, 1993.

Public Key Cryptography Using Irreversible Algorithms - Part 2: The Secure Hash Algorithm (SHA-1). ANSI X9.30-2, 1997.

Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions. ISO 10118-3, 2004.

Global c4e_sha2_mem

Secure Hash Standard (SHS). FIPS Publication 180-3, National Institute of Standards and Technology, 2008.

Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions. ISO 10118-3, 2004.

Global c4e_sha2_next

Secure Hash Standard (SHS). FIPS Publication 180-3, National Institute of Standards and Technology, 2008.

Public Key Cryptography Using Irreversible Algorithms - Part 2: The Secure Hash Algorithm (SHA-1). ANSI X9.30-2, 1997.

Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions. ISO 10118-3, 2004.

Global c4e_sha2_start

Secure Hash Standard (SHS). FIPS Publication 180-3, National Institute of Standards and Technology, 2008.

Public Key Cryptography Using Irreversible Algorithms - Part 2: The Secure Hash Algorithm (SHA-1). ANSI X9.30-2, 1997.

Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions. ISO 10118-3, 2004.

Global c4e_sha2_stop

Secure Hash Standard (SHS). FIPS Publication 180-3, National Institute of Standards and Technology, 2008.

Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions. ISO 10118-3, 2004.

Class C4eDlcDomain

Polk, W., Housley, R. and L. Bassham: Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3279, IETF, April 2002.

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

Digitale Signature Standard. FIPS Publication 186, National Institute of Standards and Technology, 1994.

Class C4eEcDomain

Polk, W., Housley, R. and L. Bassham: Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3279, IETF, April 2002.

Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.