Advanced Encryption Standard (AES). FIPS Publication 197, National Institute of Standards and Technology, 2001.
Advanced Encryption Standard (AES). FIPS Publication 197, National Institute of Standards and Technology, 2001.
Advanced Encryption Standard (AES). FIPS Publication 197, National Institute of Standards and Technology, 2001.
Information Technology — ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER). ITU-T Recommendation X.690, November 208.
Information technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER). ITU-T X.690, 11/2008.
D. A. Pope and M. L. Stein: Multiple Precision Arithmetic. CACM, 3:652-654, 1960
G. E. Collins and D. R. Musser: Analysis of the Pope- Stein Division Algorithm. University of Wisconsin Computer Sciences Department, Technical Report #55, Jan 1969
D. E. Knuth: The Art of Computer Programming, Vol. 2 (Semi-Numerical Algorithms). Addison-Wesley, 1997
J. Stein: Computational problems associated with Racah algebra. Journal of Computational Physics, 1, 1967.
Bojanczyk, A. and R. P. Brent: A systolic algorithm for extended GCD computation. Computers & Mathematics with Applications, 14(4):233-238, 1987.
Burton S. Kaliski: The Montgomery Inverse and Its Applications. IEEE Transactions on Computers, 44(8):1064-1065, August 1995.
D. A. Pope and M. L. Stein: Multiple Precision Arithmetic. CACM, 3:652-654, 1960
G. E. Collins and D. R. Musser: Analysis of the Pope- Stein Division Algorithm. University of Wisconsin Computer Sciences Department, Technical Report #55, Jan 1969
D. E. Knuth: The Art of Computer Programming, Vol. 2 (Semi-Numerical Algorithms). Addison-Wesley, 1997
PKCS #3: Diffie-Hellman Key-Agreement Standard. 1993.
E. Rescorla: Diffie-Hellman Key Agreement Method. RFC 2631, IETF, June 1999.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Public Key Cryptography for the Financial Services Industry: Agreement of Symmetric Keys Using Discrete Logarithm Cryptography. ANSI X9.42, 2003.
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques. ISO 11770-3, 2008.
Dierks, T. and E. Rescorla: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246, IETF, August 2008.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Digitale Signature Standard (DSS). FIPS Publication 186-4, National Institute of Standards and Technology, 2013.
NIST Special Publication 800-56A Revision 2: Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography. 2013.
NIST Special Publication 800-89: Recommendation for Obtaining Assurances for Digital Signature Applications. 2006.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Digitale Signature Standard (DSS). FIPS Publication 186-4, National Institute of Standards and Technology, 2013.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Digitale Signature Standard (DSS). FIPS Publication 186-4, National Institute of Standards and Technology, 2013.
Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9.62, 1998.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Digitale Signature Standard (DSS). FIPS Publication 186-4, National Institute of Standards and Technology, 2013.
Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9.62, 1998.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Digitale Signature Standard (DSS). FIPS Publication 186-4, National Institute of Standards and Technology, 2013.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Public Key Cryptography for the Financial Services Industry: Agreement of Symmetric Keys Using Diffie-Hellman and MQV Algorithms (draft), ANSI X9.42, 1998.
NIST Special Publication 800-56A Revision 2: Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography. 2013.
Digitale Signature Standard (DSS). FIPS Publication 186-4, National Institute of Standards and Technology, 2013.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
NIST Special Publication 800-56A Revision 2: Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography. 2013.
Public Key Cryptography For The Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography. ANSI X9.63, 2001.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Public Key Cryptography For The Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography. ANSI X9.63, 2001.
Standards for Efficient Cryptography Group - SEC 1: Elliptic Curve Cryptography. Certicom Research. 2000.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9.62, 1998.
Public Key Cryptography For The Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography. ANSI X9.63, 2001.
Digitale Signature Standard (DSS). FIPS Publication 186-4, National Institute of Standards and Technology, 2013.
Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9.62, 1998.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Digitale Signature Standard (DSS). FIPS Publication 186-4, National Institute of Standards and Technology, 2013.
Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9.62, 1998.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Public Key Cryptography For The Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography. ANSI X9.63, 2001.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9.62, 1998.
Public Key Cryptography For The Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography. ANSI X9.63, 2001.
Public Key Cryptography For The Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography. ANSI X9.63, 2001.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Public Key Cryptography For The Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography. ANSI X9.63, 2001.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Hankerson, Darrel, Alfred Menezes und Scott Vanstone: Guide to Elliptic Curve Cryptography. Springer, New York, 2004.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Hankerson, Darrel, Alfred Menezes und Scott Vanstone: Guide to Elliptic Curve Cryptography. Springer, New York, 2004.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9.62, 1998.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Hankerson, Darrel, Alfred Menezes und Scott Vanstone: Guide to Elliptic Curve Cryptography. Springer, New York, 2004.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Hankerson, Darrel, Alfred Menezes und Scott Vanstone: Guide to Elliptic Curve Cryptography. Springer, New York, 2004.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9.62, 1998.
Hankerson, Darrel, Alfred Menezes und Scott Vanstone: Guide to Elliptic Curve Cryptography. Springer, New York, 2004.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
NIST Special Publication 800-56A Revision 2: Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography. 2013.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
NIST Special Publication 800-56A Revision 2: Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography. 2013.
Hankerson, Darrel, Alfred Menezes und Scott Vanstone: Guide to Elliptic Curve Cryptography. Springer, New York, 2004.
Crandall, Richard und Carl Pomerance: Prime Numbers. A Computational Perspective. Springer, 2. Auflage, 2005.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9.62, 1998.
Koc, Cetin Kaya: High-Speed RSA Implementation. Technical Report TR-201, RSA Laboratories, 1994. Version 2.0
Garner, Harvey L.: The Residue Number System. IRE Transactions on Electronic Computers, 8(2):140-147, Juni 1959.
Montgomery, P.: Modular multiplication without trial division. Mathematics of Computation, 44(170):519-521, 1985.
Koc, Cetin Kaya, Tolga Acar and Burton S. Kaliski, Jr.: Analyzing and Comparing Montgomery Multiplication Algorithms. IEEE Micro, 16(3):26-33, Juni 1996.
Burton S. Kaliski: The Montgomery Inverse and Its Applications IEEE Transactions on Computers, 44(8):1064-1065, August 1995.
Menezes, Alfred J., P. C. van Oorschot und Scott A. Vanstone: Handbook of applied cryptography. CRC Press Series on Discrete Mathematics and Its Application. CRC Press, 2. Edition, 1992.
Hankerson, Darrel, Alfred Menezes und Scott Vanstone: Guide to Elliptic Curve Cryptography. Springer, New York, 2004.
Crandall, Richard und Carl Pomerance: Prime Numbers. A Computational Perspective. Springer, 2. Auflage, 2005.
Berlekamp, Elwyn R.: Algebraic Coding Theory, Revised 1984 Edition. Aegean Park Press, Laguna Hills, CA, 1984.
Peterson, W. Wesley und E. J. Weldon, Jr.: Error-Correcting Codes. MIT Press, 1972.
Berlekamp, Elwyn R.: Algebraic Coding Theory. Aegean Park Press, 1984.
Peterson, W. Wesley und E. J. Weldon, Jr.: Error-Correcting Codes. MIT Press, 1972.
Berlekamp, Elwyn R.: Algebraic Coding Theory. Aegean Park Press, 1984.
D. A. Pope and M. L. Stein: Multiple Precision Arithmetic. CACM, 3:652-654, 1960
D. E. Knuth: The Art of Computer Programming, Vol. 2 (Semi-Numerical Algorithms). Addison-Wesley, 1997
RSA Encryption Standard. PKCS #1 v1.5, RSA Laboratories, November 1993.
Kaliski, B.: Public-Key Cryptography Standards (PKCS) #1: RSA Encryption Version 1.5. RFC 2313, IETF, March 1998
Kent, S.: Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers. RFC 1423, IETF, February 1993.
Rivest, R.L., A. Shamir und L.M. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
RSA Cryptography Standard. PKCS #1 v2.1, RSA Laboratories, June 2002.
Jonsson, J. and B. Kaliski: Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. RFC 3447, IETF, February 2003
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers. ISO 18033-2, 2006.
M. Bellare and P. Rogaway: Optimal Asymmetric Encryption - How to Encrypt with RSA. In: Advances in Cryptology - EUROCRYPT 94, LNCS 950: 92-111, 1995, Springer-Verlag.
Rivest, R.L., A. Shamir und L.M. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
RSA Encryption Standard. PKCS #1 v1.5, RSA Laboratories, November 1993.
Kaliski, B.: Public-Key Cryptography Standards (PKCS) #1: RSA Encryption Version 1.5. RFC 2313, IETF, March 1998
Kent, S.: Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers. RFC 1423, IETF, February 1993.
Rivest, R.L., A. Shamir und L.M. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
RSA Cryptography Standard. PKCS #1 v2.1, RSA Laboratories, June 2002.
Jonsson, J. and B. Kaliski: Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. RFC 3447, IETF, February 2003
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers. ISO 18033-2, 2006.
M. Bellare and P. Rogaway: Optimal Asymmetric Encryption - How to Encrypt with RSA. In: Advances in Cryptology - EUROCRYPT 94, LNCS 950: 92-111, 1995, Springer-Verlag.
Rivest, R.L., A. Shamir und L.M. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
NIST Special Publication 800-56B: Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography. 2009.
NIST Special Publication 800-56B: Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography. 2009.
RSA Encryption Standard. PKCS #1 v1.5, RSA Laboratories, November 1993.
Kaliski, B.: Public-Key Cryptography Standards (PKCS) #1: RSA Encryption Version 1.5. RFC 2313, IETF, March 1998
Rivest, R.L., A. Shamir und L.M. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
RSA Cryptography Standard. PKCS #1 v2.1, RSA Laboratories, June 2002.
Jonsson, J. and B. Kaliski: Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. RFC 3447, IETF, February 2003
Standard Specifications For Public-Key Cryptography - Amendment 1: Additional Techniques. IEEE Std 1363a-2004.
M. Bellare and P. Rogaway: The Exact Security of Digital Signatures - How to Sign with RSA and Rabin. In: Advances in Cryptology - EUROCRYPT 96, LNCS 1070: 399-416, 1996, Springer-Verlag.
Rivest, R.L., A. Shamir and L.M. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
RSA Encryption Standard. PKCS #1 v1.5, RSA Laboratories, November 1993.
Kaliski, B.: Public-Key Cryptography Standards (PKCS) #1: RSA Encryption Version 1.5. RFC 2313, IETF, March 1998
Rivest, R.L., A. Shamir and L.M. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
RSA Cryptography Standard. PKCS #1 v2.1, RSA Laboratories, June 2002.
Jonsson, J. and B. Kaliski: Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. RFC 3447, IETF, February 2003
Standard Specifications For Public-Key Cryptography - Amendment 1: Additional Techniques. IEEE Std 1363a-2004.
M. Bellare and P. Rogaway: The Exact Security of Digital Signatures - How to Sign with RSA and Rabin. In: Advances in Cryptology - EUROCRYPT 96, LNCS 1070: 399-416, 1996, Springer-Verlag.
Rivest, R.L., A. Shamir and L.M. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
Secure Hash Standard. FIPS Publication 180-1, National Institute of Standards and Technology, 1993.
Public Key Cryptography Using Irreversible Algorithms - Part 2: The Secure Hash Algorithm (SHA-1). ANSI X9.30-2, 1997.
Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions. ISO 10118-3, 2004.
Secure Hash Standard. FIPS Publication 180-1, National Institute of Standards and Technology, 1993.
Public Key Cryptography Using Irreversible Algorithms - Part 2: The Secure Hash Algorithm (SHA-1). ANSI X9.30-2, 1997.
Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions. ISO 10118-3, 2004.
Secure Hash Standard. FIPS Publication 180-1, National Institute of Standards and Technology, 1993.
Public Key Cryptography Using Irreversible Algorithms - Part 2: The Secure Hash Algorithm (SHA-1). ANSI X9.30-2, 1997.
Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions. ISO 10118-3, 2004.
Secure Hash Standard. FIPS Publication 180-1, National Institute of Standards and Technology, 1993.
Public Key Cryptography Using Irreversible Algorithms - Part 2: The Secure Hash Algorithm (SHA-1). ANSI X9.30-2, 1997.
Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions. ISO 10118-3, 2004.
Secure Hash Standard (SHS). FIPS Publication 180-3, National Institute of Standards and Technology, 2008.
Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions. ISO 10118-3, 2004.
Secure Hash Standard (SHS). FIPS Publication 180-3, National Institute of Standards and Technology, 2008.
Public Key Cryptography Using Irreversible Algorithms - Part 2: The Secure Hash Algorithm (SHA-1). ANSI X9.30-2, 1997.
Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions. ISO 10118-3, 2004.
Secure Hash Standard (SHS). FIPS Publication 180-3, National Institute of Standards and Technology, 2008.
Public Key Cryptography Using Irreversible Algorithms - Part 2: The Secure Hash Algorithm (SHA-1). ANSI X9.30-2, 1997.
Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions. ISO 10118-3, 2004.
Secure Hash Standard (SHS). FIPS Publication 180-3, National Institute of Standards and Technology, 2008.
Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions. ISO 10118-3, 2004.
Polk, W., Housley, R. and L. Bassham: Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3279, IETF, April 2002.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.
Digitale Signature Standard. FIPS Publication 186, National Institute of Standards and Technology, 1994.
Polk, W., Housley, R. and L. Bassham: Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3279, IETF, April 2002.
Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.