[Adam] Understanding Public Key Infrastructure Concepts, Standards & Deployment, Macmillan Technical Publishing, Indianapolis, 1999.
, , :[BaSh] Algorithmic Number Theory, Vol. 1, Efficient Algorithms, MIT Press, Cambridge (MA), London, 1996.
, , :[BCGP] Journal of Cryptology, Vol. 1, No. 1, pp. 53–64, 1988.
, , , , , : The generation of random numbers that are probably prime,[Bern] 2003.
: Proving primality after Agrawal–Kayal–Saxena, Draft paper, http://cr.yp.to/papers.html#aks,[Bies] Elektronisch unterschreiben—die digitale Signatur in der Praxis, 2. Auflage, Hüthig, 1999.
, , :[BiSh] Journal of Cryptology, Vol. 4, No. 1, 1991, pp. 3–72.
, , : Differential cryptanalysis of DES-like cryptosystems,[Blum] SIAM Journal on Computing, Vol. 15, No. 2, 1986, pp. 364–383.
, , : A simple unpredictable pseudo-random number generator,[BMBF] Bundesministerium für Bildung, Wissenschaft, Forschung und Technologie: IUKDG—Informations- und Kommunikationsdienste-Gesetz—Umsetzung und Evaluierung, Bonn, 1997.
[BMWT] Bundesministerium für Wirtschaft und Technologie: Entwurf eines Gesetzes über Rahmenbedingungen für elektronische Signaturen—Diskussionsentwurf zur Anhörung und Unterrichtung der beteiligten Fachkreise und Verbände, April 2000.
[Bon2] Advances in Cryptology, ASIACRYPT 2000, Lecture Notes in Computer Science 1976, pp. 30–43, Springer-Verlag, 2000.
, , , : Why Textbook ElGamal and RSA Encryption are Insecure,[Boss] Advances in Cryptology, CRYPTO 93, Lecture Notes in Computer Science No. 773, pp. 175–186, Springer-Verlag, New York, 1994.
, , , : Comparison of three modular reduction functions, in[BSI1] Bundesamt für Sicherheit in der Informationstechnik: Geeignete Algorithmen zur Erfüllung der Anforderungen nach §17 Abs. 1 through 3 SigG of 22 May 2001 in association with Anlage 1 Abschnitt I Nr. 2 SigV of 22 November 2001. Published 13 February 2004 in Bundesanzeiger Nr. 30, pp. 2537–2538.
[BSI2] Bundesamt für Sicherheit in der Informationstechnik: Anwendungshinweise und Interpretation zum Schema (AIS). Funktionalitätsklassen und Evaluations-methodologie für deterministische Zufallszahlengeneratoren. AIS 20. Version 1. Bonn, 1999.
[Burt] Mathematics of Computation, Volume 65, pp. 373–381, 1996.
: Further investigations with the strong probable prime test,[BuZi] 1998.
, , : Fast recursive division, Forschungsbericht MPI-I-98-1-022, Max-Planck-Institut für Informatik, Saarbrücken,[CJRR] A Cautionary Note Regarding Evaluation of AES Candidates on Smart Cards, 1999, http://csrc.nist.gov/encryption/aes/round1/conf2/papers/chari.pdf
, , , , :[Cohe] A Course in Computational Algebraic Number Theory, Springer-Verlag, Berlin, Heidelberg, 1993.
, :[Coro] Advances in Cryptology, CRYPTO '99, Lecture Notes in Computer Science No. 1666, pp. 1–17, Springer-Verlag, New York, 1999.
, , , : On the security of RSA padding, ed. M. Wiener, in[Cowi] Advances in Cryptology, ASIACRYPT '96, Lecture Notes in Computer Science No. 1163, pp. 382–394, Springer-Verlag, Berlin 1996.
, , , , , , : A world wide number field sieve factoring record: on to 512 bits, ed. K. Kim and T. Matsumoto, in[CrPa] Mathematics of Computation, Volume 61, pp. 177–194, 1993.
, , : On the implementation of AKS-class primality tests, http://developer.apple.com/hardware/ ve/pdf/aks3.pdf. [DaLP] , , , : Average case error estimates for the strong probable prime test,[DaRi] AES-Proposal: Rijndael, Doc. Vers. 2.0, September 1999, http://www.nist.gov/encryption/aes
, , :[DR02] 2002.
, , : The Design of Rijndael: AES: The Advanced Encryption Standard, Springer-Verlag, Heidelberg,[Dene] Software-Engineering, Springer-Verlag, Heidelberg, 1991. [deWe] , : Cryptanalysis of RSA with small prime difference, Cryptology ePrint Archive, Report 2000/016, 2000.
, :[Diff] New Directions in Cryptography, IEEE Trans. Information Theory, pp. 644–654, Vol. IT-22, 1976.
, , :[DoBP] Fast Software Encryption, Third International Workshop, Lecture Notes in Computer Science No. 1039, pp. 71–82, Springer-Verlag, Berlin, Heidelberg, 1996.
, , , : RIPEMD-160, a strengthened version of RIPEMD, ed. D. Gollman, in[DuKa] Advances in Cryptology, EUROCRYPT '90, Lecture Notes in Computer Science No. 473, pp. 230–244, Springer-Verlag, New York, 1990.
, , : A cryptographic library for the Motorola DSP56000, in[Dunc] Advanced OS/2-Programming: The Microsoft Guide to the OS/2-Kernel for Assembly Language and C Programmers, Microsoft Press, Redmond, Washington, 1981.
, :[Elli] The Possibility of Non-Secret Encryption, 1970, http://www.cesg.gov.uk/htmsite/publications/media/possnse.pdf.
:[EESSI] European Electronic Signature Standardization Initiative: Algorithms and Parameters for Secure Electronic Signatures, V.1.44 DRAFT, 2001.
[EU99] Richtlinie 1999/93/EG des Europäischen Parlaments und des Rates vom 13. Dezember 1999 über gemeinschaftliche Rahmenbedingungen für elektronische Signaturen.
[Evan] Splint Users Guide, Version 3.1.1-1, Secure Programming Group University of Virginia Department of Computer Science, June 2003.
, :[Fiat] Advances in Cryptology, CRYPTO '86, Lecture Notes in Computer Science No. 263, pp. 186–194, Springer-Verlag, New York, 1987.
, , : How to prove yourself: practical solutions to identification and signature problems, in[FIPS] Federal Information Processing Standard Publication 140 - 1: Security requirements for cryptographic modules, US Department of Commerce/ National Institute of Standards and Technology (NIST), 1994.
[F180] National Institute of Standards and Technology: Secure Hash Algorithm, Federal Information Processing Standard 180-2, NIST, 2001.
[FI81] National Institute of Standards and Technology: DES Modes of Operation, Federal Information Processing Standard 81, NIST, 1980.
[F197] National Institute of Standards and Technology: ADVANCED ENCRYPTION STANDARD (AES), Federal Information Processing Standards Publication 197, November 26, 2001
[Fisc] Einführung in die Algebra, Teubner, 1974. [Fors] , : Algorithmische Zahlenthorie, Vieweg, Braunschweig, 1996.
, , :[Glad] Digitale Signatur & Sicherheitssensitive Anwendungen, DuD-Fachbeiträge, Vieweg, 1995. [Gldm] , : A Specification for Rijndael, the AES Algorithm, http://fp.gladman.plus.com, 2001.
, , , , editors:[GoPa] Proceedings of CHES'99, Lecture Notes in Computer Science, No. 1717, Springer-Verlag, 1999.
, , Jacques Patarin DES and differential power analysis,[Gord] Advances in Cryptology, Proceedings of Eurocrypt '84, pp. 216–223, Springer-Verlag, Berlin, Heidelberg, 1985.
: Strong primes are easy to find,[Gut1] Usenix Security Symposium, 1998
, : Software generation of Practically Strong Random Numbers,[Hatt] Developing Software for High-Integrity and Safety-Critical Systems, McGraw-Hill, London, 1995.
: :[HKW] Mathematische Methoden der Kryptoanalyse, DuD-Fachbeiträge, Vieweg, Braunschweig, 1985.
, , , :[IEEE] IEEE P1363 / D13: Standard Specifications for Public Key Cryptography, Draft Version 13, November 1999.
[ISO1] ISO/IEC 10118-3: Information Technology—Security Techniques—Hash-Functions. Part 3: Dedicated Hash-Functions, CD, 1996.
[ISO2] ISO/IEC 9796: Information Technology—Security Techniques—Digital Signature Scheme giving Message Recovery, 1991.
[ISO3] ISO/IEC 9796-2: Information Technology—Security Techniques—Digital Signature Scheme Giving Message Recovery, Part 2: Mechanisms Using a Hash-Function, 1997.
[Koeu] Koeune, F., G. Hachez, J.-J. Quisquater: Implementation of Four AES Candidates on Two Smart Cards, UCL Crypto Group, 2000.
[Knut] The Art of Computer Programming, Vol. 2: Seminumerical Algorithms, 3rd Edition, Addison-Wesley, Reading, MA, 1998.
, :[KoJJ] Introduction to Differential Power Analysis and Related Attacks, 1998, http://www.cryptography.com/dpa/technical/
, , , :[Matt] Suggestions for Random Number Generation in Software, RSA Data Security Engineering Report, December 1995.
, :[Mied] Signaturregulierung im Rechtsvergleich, Der Elektronische Rechtsverkehr 1, Nomos Verlagsgesellschaft Baden-Baden, 2000.
, :[Mont] Mathematics of Computation, pp. 519–521, 44 (170), 1985.
, : Modular multiplication without trial division,[N38A] National Institute of Standards and Technology: Recommendation for Block Cipher Modes of Operation, NIST Special Publication 800-38A, 2001.
[N38B] National Institute of Standards and Technology: DRAFT Recommendation for Block Cipher Modes of Operation: The RMAC Authentication Mode, NIST Special Publication 800-38B, 2002.
[N38C] National Institute of Standards and Technology: Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality, NIST Special Publication 800-38C, 2004.
[NIST] Report on the Development of the Advanced Encryption Standard, National Institute of Standards and Technology, 2000.
, , , , , , , :[Nive] Einführung in die Zahlentheorie vols. I und II, Bibliographisches Institut, Mannheim, 1972.
, , :[Petz] Programming Windows: The Microsoft Guide to Writing Applications for Windows 3.1, Microsoft Press, Redmond, Washington, 1992.
, :[Pren] Analysis and Design of Cryptographic Hash Functions, Dissertation at the Katholieke Universiteit Leuven, 1993.
, :[Rabi] Digital Signatures and Public-Key Functions as Intractable as Factorization, MIT Laboratory for Computer Science, Technical Report, MIT/LCS/TR-212, 1979.
, :[RDS1] RSA Laboratories: Public Key Cryptography Standards, PKCS #1: RSA Encryption, Version 2.1, RSA Security Inc., 2002.
[RDS2] RSA Security, Inc.: Recent Results on Signature Forgery, RSA Laboratories Bulletin, 1999, http://www.rsasecurity.com/.
[RegT] Regulierungsbehörde für Telekommunikation und Post (RegTP): Bekanntmachung zur elektronischen Signatur nach dem Signaturgesetz und Signaturverordnung (Übersicht über geeignete Algorithmen), January 2, 2005.
[Rive] Communications of the ACM 21, pp. 120–126, 1978.
, , , : A method for obtaining digital signatures,[Sali] Sichere Implementierung und Integration kryptographischer Softwarekomponenten am Beispiel der Zufallszahlengenerierung, Diplomarbeit an der Universität Bonn, 2002.
, :[Scho] Theoretical Computer Science, pp. 229–242, Vol. 1, 1975.
, : A lower bound on the length of addition chains,[Schr] Number Theory in Science and Communications, 3rd edition, Springer-Verlag, Berlin, Heidelberg, 1997.
, :[SigG] Gesetz über Rahmenbedingungen für elektronische Signaturen und zur Änderung weiterer Vorschriften, at http://www.iid.de/iukdg, 2001.
[Skal] Software Solutions in C, Academic Press, pp. 343–454, 1994.
, : Multiple precision arithmetic in C, edited by Dale Schumacher, in[Squa] Fast Software Encryption, Lecture Notes in Computer Science No. 1267, pp. 149–165, Springer-Verlag, 1997.
, , , : The block cipher square,[Wien] IEEE Transactions on Information Theory, 36(3): pp. 553–558, 1990.
, : Cryptanalysis of short RSA secret exponents, in18.226.34.25