[Imported from Trac: page Bibliography, version 50]

dcoder 2010-03-09 03:13:42 +00:00
parent 794beb60f0
commit bc3c0a66b7

@ -15,6 +15,10 @@ Here are some papers that are potentially of interest.
[HKDF full paper](http://webee.technion.ac.il/~hugo/kdf/kdf.pdf) defines and analyzes the *HKDF* Key-Derivation Algorithm; A KDF is a linchpin component of our crypto schemes. [HKDF full paper](http://webee.technion.ac.il/~hugo/kdf/kdf.pdf) defines and analyzes the *HKDF* Key-Derivation Algorithm; A KDF is a linchpin component of our crypto schemes.
[Bitsliced AES implementation](http://www.cryptojedi.org/crypto/index.shtml#aesbs) The faster and timing resistant implementation of AES-CTR in bitsliced mode by Peter Schwabe and Emilia Kasper.
[Vector permutations and AES](http://crypto.stanford.edu/vpaes/) The fast and timing-resistant implementations of Mike Hamburg using vector permute instructions (read: pshufb and vperm).
### Elliptic Curve Cryptography ### Elliptic Curve Cryptography
[ECC Brainpool Standard Curves and Curve Generation](http://tools.ietf.org/html/draft-lochter-pkix-brainpool-ecc-03) new elliptic curve parameters which come with a proof that they were generated deterministically and pseudorandomly from the first few bits of pi, as well as proofs that they are immune to certain other potential cryptographic weaknesses. [ECC Brainpool Standard Curves and Curve Generation](http://tools.ietf.org/html/draft-lochter-pkix-brainpool-ecc-03) new elliptic curve parameters which come with a proof that they were generated deterministically and pseudorandomly from the first few bits of pi, as well as proofs that they are immune to certain other potential cryptographic weaknesses.
@ -23,10 +27,6 @@ Here are some papers that are potentially of interest.
[The Certicom Challenges ECC2-X](http://eprint.iacr.org/2009/466) other crypto gurus launch an effort to brute-force-crack 130-bit and 160-bit ECC. [The Certicom Challenges ECC2-X](http://eprint.iacr.org/2009/466) other crypto gurus launch an effort to brute-force-crack 130-bit and 160-bit ECC.
[Bitsliced AES implementation](http://www.cryptojedi.org/crypto/index.shtml#aesbs) The faster and timing resistant implementation of AES-CTR in bitsliced mode by Peter Schwabe and Emilia Kasper.
[Vector permutations and AES](http://crypto.stanford.edu/vpaes/) The fast and timing-resistant implementations of Mike Hamburg using vector permute instructions (read: pshufb and vperm).
## Erasure Coding ## Erasure Coding
[a tutorial](http://www.cs.utk.edu/~plank/plank/gflib/index.html) and some [a tutorial](http://www.cs.utk.edu/~plank/plank/gflib/index.html) and some