︠0dd0fdf8-7c51-4778-b21f-15943c6f691di︠
%html
7. References
- [A-SIT] Center for Secure Information Technology - Austria
- [A-SIT ECC] Elliptic Curve Cryptography in Austria
- [A-SIT Software] Survey of the deployment of ECC in standard software by A-SIT
- [ANSI] American National Standards Institute
- [ANSIX9] Financial Industry Standards
- [ANSI X9.63] ANSI X9.63-199x Standard Working Draft
- [BSI] Bundesamt fuer Sicherheit in der Informationstechnik,
- [BSI ECC] BSI ECC Technical Guideline
- [CohenFrey2005] H. Cohen, G. Frey,
- Handbook of Elliptic and Hyperelliptic Curve Cryptography,
- Chapman & Hall / CRC, 2005.
- [CrypToolScript] The CrypTool Script: Cryptography, Mathematics and more
- [ECC sun.com] A brief overview of elliptic curve cryptography by Sun Microsystems Laboratories
- [eCard] eCard, a new German electronic identity card
- [ePass] ePass, the new German electronic passport
- [ePostage] Electronic Postage
- [FiniteFields] Introduction to Finite Fields
- [FIPS 186-2] FIPS PUB 186-2 Standard
- [FIPS 186-3] FIPS PUB 186-3 Draft Standard
- [Groups] Groups as Mathematical Structures
- [Hankerson2004] D. Hankerson, A. Menezes, S. Vanstone,
- Guide to Elliptic Curve Cryptography,
- Springer-Verlag, 2004.
- [IEEE] Institute of Electrical and Electronics Engineers
- [IEEE 1363] The IEEE P1363 Home Page
- [ISO/IEC] ISO/IEC Information Center
- [IVBB] The Berlin-Bonn Information Network
- [Keylength.com] Keylength.com: Cryptographic Key Length Recommendation
- [LenstraVerheul2001] A. Lenstra, E. Verheul,
- Selecting Cryptographic Key Sizes,
- Journal of Cryptology: the journal of the International Association for Cryptologic Research,
Vol. 14, No. 4, pp. 255-293, 2001.
- http://www.win.tue.nl/~klenstra/key.pdf
- [MallZhong2008] D. Mall, Q. Zhong,
- [ModularArithmetic] An explanation of modular arithmetic
- [NIST] American National Institute of Standards and Technology
- [NSA] National Security Agency
- [NSA ECC] The Case for Elliptic Curve Cryptography,
- [OpenSSL] OpenSSL, a popular open source implementation of SSL/TLS
- [ReverseVending] Reverse vending machines
- [Silverman1986] J. Silverman,
- The Arithmetic of Elliptic Curves,
- Graduate Texts in Mathematics, Springer-Verlag, 1986.
- [SilvermanTate1992] J. Silverman, J. Tate,
- The Rational Points on Elliptic Curves,
- Undergraduate Texts in Mathematics, Springer-Verlag, 1992.
- [Stein2008] W. Stein,
- [vanTilborg2000] H. van Tilborg,
- Fundamentals of Cryptology,
- Kluwer Academic Publishers, 2000.
- [Vercauteren2003] F. Vercauteren,
- [Washington2003] L. C. Washington,
- Elliptic Curves: Number Theory and Cryptography,
- Chapman & Hall / CRC, 2003.
︡53c6fc0b-55f9-423c-8ea0-7e8b1db6b19b︡{"html": "7. References
\r\n\r\n\r\n- [A-SIT] Center for Secure Information Technology - Austria
\r\n\r\n
\r\n- [A-SIT ECC] Elliptic Curve Cryptography in Austria
\r\n\r\n
\r\n- [A-SIT Software] Survey of the deployment of ECC in standard software by A-SIT
\r\n\r\n
\r\n- [ANSI] American National Standards Institute
\r\n\r\n
\r\n- [ANSIX9] Financial Industry Standards
\r\n\r\n
\r\n- [ANSI X9.63] ANSI X9.63-199x Standard Working Draft
\r\n\r\n
\r\n- [BSI] Bundesamt fuer Sicherheit in der Informationstechnik,
\r\n\r\n
\r\n- [BSI ECC] BSI ECC Technical Guideline
\r\n\r\n
\r\n- [CohenFrey2005] H. Cohen, G. Frey,
\r\n\r\n- Handbook of Elliptic and Hyperelliptic Curve Cryptography,
\r\n- Chapman & Hall / CRC, 2005.
\r\n
\r\n
\r\n- [CrypToolScript] The CrypTool Script: Cryptography, Mathematics and more
\r\n\r\n
\r\n- [ECC sun.com] A brief overview of elliptic curve cryptography by Sun Microsystems Laboratories
\r\n\r\n
\r\n- [eCard] eCard, a new German electronic identity card
\r\n\r\n
\r\n- [ePass] ePass, the new German electronic passport
\r\n\r\n
\r\n- [ePostage] Electronic Postage
\r\n\r\n
\r\n- [FiniteFields] Introduction to Finite Fields
\r\n\r\n
\r\n- [FIPS 186-2] FIPS PUB 186-2 Standard
\r\n\r\n
\r\n- [FIPS 186-3] FIPS PUB 186-3 Draft Standard
\r\n\r\n
\r\n- [Groups] Groups as Mathematical Structures
\r\n\r\n
\r\n- [Hankerson2004] D. Hankerson, A. Menezes, S. Vanstone,
\r\n\r\n- Guide to Elliptic Curve Cryptography,
\r\n- Springer-Verlag, 2004.
\r\n
\r\n
\r\n- [IEEE] Institute of Electrical and Electronics Engineers
\r\n\r\n
\r\n- [IEEE 1363] The IEEE P1363 Home Page
\r\n\r\n
\r\n- [ISO/IEC] ISO/IEC Information Center
\r\n\r\n
\r\n- [IVBB] The Berlin-Bonn Information Network
\r\n\r\n
\r\n- [Keylength.com] Keylength.com: Cryptographic Key Length Recommendation
\r\n\r\n
\r\n- [LenstraVerheul2001] A. Lenstra, E. Verheul,
\r\n\r\n- Selecting Cryptographic Key Sizes,
\r\n- Journal of Cryptology: the journal of the International Association for Cryptologic Research, \r\n Vol. 14, No. 4, pp. 255-293, 2001.
\r\n- http://www.win.tue.nl/~klenstra/key.pdf
\r\n
\r\n
\r\n- [MallZhong2008] D. Mall, Q. Zhong,
\r\n\r\n
\r\n- [ModularArithmetic] An explanation of modular arithmetic
\r\n\r\n
\r\n- [NIST] American National Institute of Standards and Technology
\r\n\r\n
\r\n- [NSA] National Security Agency
\r\n\r\n
\r\n- [NSA ECC] The Case for Elliptic Curve Cryptography,
\r\n\r\n
\r\n- [OpenSSL] OpenSSL, a popular open source implementation of SSL/TLS
\r\n\r\n
\r\n- [ReverseVending] Reverse vending machines
\r\n\r\n
\r\n- [Silverman1986] J. Silverman,
\r\n\r\n- The Arithmetic of Elliptic Curves,
\r\n- Graduate Texts in Mathematics, Springer-Verlag, 1986.
\r\n
\r\n
\r\n- [SilvermanTate1992] J. Silverman, J. Tate,
\r\n\r\n- The Rational Points on Elliptic Curves,
\r\n- Undergraduate Texts in Mathematics, Springer-Verlag, 1992.
\r\n
\r\n
\r\n- [Stein2008] W. Stein,
\r\n\r\n
\r\n- [vanTilborg2000] H. van Tilborg,
\r\n\r\n- Fundamentals of Cryptology,
\r\n- Kluwer Academic Publishers, 2000.
\r\n
\r\n
\r\n- [Vercauteren2003] F. Vercauteren,
\r\n\r\n
\r\n- [Washington2003] L. C. Washington,
\r\n\r\n- Elliptic Curves: Number Theory and Cryptography,
\r\n- Chapman & Hall / CRC, 2003.
\r\n
\r\n
"}︡