@article{ALNR11, author = {Christophe Ar{\`e}ne and Tanja Lange and Michael Naehrig and Christophe Ritzenthaler}, title = {Faster Computation of the {Tate} Pairing}, journal = {Journal of Number Theory}, publisher = {Elsevier}, volume = {131}, number = {5}, year = {2011}, pages = {842--857}, note = {\url{http://cryptojedi.org/papers/\#edpair}}, } @inproceedings{ BLS11, author = {Daniel J. Bernstein and Tanja Lange and Peter Schwabe}, title = {On the correct use of the negation map in the Pollard rho method}, booktitle = {Public Key Cryptography -- {PKC 2011}}, editor = {Rosario Gennaro}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {6571}, year = {2011}, pages = {128--146}, note = {Document ID: dde51a91feeb8d746756566ac14323d1, \url{http://cryptojedi.org/papers/\#negation}}, } @inproceedings{ BLPS11, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters and Peter Schwabe}, title = {Really fast syndrome-based hashing}, booktitle = {Progress in Cryptology -- {AFRICACRYPT} 2011}, editor = {Abderrahmane Nitaj and David Pointcheval}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {6737}, year = {2011}, pages = {134--152}, note = {Document-ID: 067a9e99992a54f43b7f859c81b25d16, \url{http://cryptojedi.org/papers/\#rfsb}}, } @inproceedings{ BDL+11, author = {Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo-Yin Yang}, title = {High-speed high-security signatures}, booktitle = {Cryptographic Hardware and Embedded Systems -- {CHES 2011} (to appear)}, editor = {Bart Preneel and Tsuyoshi Takagi}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, year = {2011}, note = {Document-ID: a1a62a2f76d23f65d622484ddd09caf8, \url{http://cryptojedi.org/papers/\#ed25519}}, } @misc{ BT11, author = {Billy Bob Brumley and Nicola Tuveri}, title = {Remote Timing Attacks are Still Practical}, howpublished = {Cryptology ePrint Archive, Report 2011/232}, year = {2011}, note = {\url{http://eprint.iacr.org/2011/232/}}, } @inproceedings{JV11, author = {Antoine Joux and Vanessa Vitse}, title = {A Variant of the F4 Algorithm }, booktitle = {Topics in Cryptology -- {CT-RSA 2011}}, editor = {Aggelos Kiayias}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {6558}, year = {2011}, pages = {356--375}, note = {\url{http://eprint.iacr.org/2010/158/}}, } @article{KKM11, author = {Ann Hibner Koblitz and Neil Koblitz and Alfred Menezes}, title = {Elliptic Curve Cryptography: The Serpentine Course of a Paradigm Shift}, journal = {Journal of Number Theory}, publisher = {Elsevier}, volume = {131}, number = {5}, year = {2011}, pages = {781--814}, note = {\url{http://eprint.iacr.org/2008/390/}}, } @phdthesis{Sch11, author = {Peter Schwabe}, title = {High-Speed Cryptography and Cryptanalysis}, year = {2011}, school = {Eindhoven University of Technology}, note = {\url{http://cryptojedi.org/users/peter/thesis/}}, } @misc{AKL+10, author = {Diego F. Aranha and Koray Karabina and Patrick Longa and Catherine H. Gebotys and Julio L\'opez}, title = {Faster Explicit Formulas for Computing Pairings over Ordinary Curves}, howpublished = {Cryptology ePrint Archive, Report 2010/526}, year = {2010}, note = {\url{http://eprint.iacr.org/2010/526/}}, } @manual{ARM10, author = {ARM}, title = {Cortex-A8 Technical Reference Manual, revision r3p2}, year = {2010}, note = {\url{http://infocenter.arm.com/help/topic/com.arm.doc.ddi0344k/DDI0344K_cortex_a8_r3p2_trm.pdf}}, } @inproceedings{ALH10, author = {Diego F. Aranha and Julio L\'{o}pez and Darrel Hankerson}, title = {{High-Speed Parallel Software Implementation of the $\eta_T$ Pairing}}, booktitle = {Cryptographers' Track at RSA Conference (CT-RSA 2010)}, editor = {Josef Pieprzyk}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {5985}, year = {2010}, pages = {89--105}, } @misc{AHMP10, author = {Jean-Philippe Aumasson and Luca Henzen and Willi Meier and Raphael C.-W. Phan}, title = {SHA-3 proposal BLAKE, version 1.3}, howpublished = {Revised submission to {NIST}}, note = {\url{http://131002.net/blake/blake.pdf}}, year = {2010}, } @misc{BDE10, author = {Jean-Claude Bajard and Silvain Duquesne and Milos D. Ercegovac}, title = {Combining leak-resistant arithmetic for elliptic curves defined over $\mathbb{F}_p$ and RNS representation}, howpublished = {Cryptology ePrint Archive, Report 2010/311}, year = {2010}, note = {\url{http://eprint.iacr.org/2010/311/}}, } @article{Bar10, author = {Paulo S. L. M. Barreto}, title = {A survey on craptological pairing algorithms}, journal = {Journal of Craptology}, volume = {7}, year = {2010}, note = {\url{http://www.anagram.com/~jcrap/Volume_7/Pairings.pdf}}, } @inproceedings{BCC+10, author = {Daniel J. Bernstein and Hsieh-Chung Chen and Chen-Mou Cheng and Tanja Lange and Ruben Niederhagen and Peter Schwabe and Bo-Yin Yang}, title = {{ECC2K-130} on {NVIDIA GPUs}}, booktitle = {Progress in Cryptology -- {INDOCRYPT 2010}}, editor = {Guang Gong and Kishan Chand Gupta}, series = {Lecture Notes in Computer Science}, volume = {6498}, publisher = {Springer-Verlag Berlin Heidelberg}, year = {2010}, note = {Document ID: 1957e89d79c5a898b6ef308dc10b0446, \url{http://cryptojedi.org/users/peter/\#gpuev1l}}, } @misc{Ber10, author = {Daniel J. Bernstein}, title = {The EECM-MPFQ software}, year = {2010}, note = {\url{http://eecm.cr.yp.to/mpfq.html} (accessed 2011-02-26)}, } @inproceedings{BL10, author = {Daniel J. Bernstein and Tanja Lange}, title = {{Type-II} Optimal Polynomial Bases}, booktitle = {Arithmetic of Finite Fields}, editor = {M. Anwar Hasan and Tor Helleseth}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {6087}, year = {2010}, pages = {41--61}, note = {Document ID: 90995f3542ee40458366015df5f2b9de, \url{http://cr.yp.to/papers.html\#opb}}, } @misc{BGM+10, author = {Jean-Luc Beuchat and Jorge E. Gonz\'alez{ D\'iaz} and Shigeo Mitsunari and Eiji Okamoto and Francisco Rodr\'iguez-Henr\'iquez and Tadanori Teruya}, title = {High-Speed Software Implementation of the Optimal Ate Pairing over {Barreto-Naehrig} Curves }, howpublished = {Cryptology ePrint Archive, Report 2010/354}, year = {2010}, note = {\url{http://eprint.iacr.org/2010/354/}}, myXXX = {Change when published}, } @misc{BK10, author = {Alex Biryukov and Dmitry Khovratovich}, title = {Feasible Attack on the 13-round {AES-256}}, howpublished = {Cryptology ePrint Archive, Report 2010/257}, year = {2010}, note = {\url{http://eprint.iacr.org/2010/257/}}, } @inproceedings{Bos10, author = {Joppe Bos}, title = {High-Performance Modular Multiplication on the {C}ell Processor}, booktitle = {Arithmetic of Finite Fields}, editor = {Anwar Hasan and Tor Helleseth}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {6087}, year = {2010}, pages = {7--24}, } @inproceedings{BS10, author = {Joppe W. Bos and Deian Stefan}, title = {Performance Analysis of the {SHA-3} Candidates on Exotic Multi-Core Architectures}, booktitle = {Cryptographic Hardware and Embedded Systems -- {CHES 2010}}, editor = {Stefan Mangard and Fran\c{c}ois-Xavier Standaert}, series = {LNCS}, volume = {6225}, publisher = {Springer}, year = {2010}, pages = {279--293}, note = {\url{http://www.ee.cooper.edu/~stefan/pubs/conference/ches2010.pdf}}, } @inproceedings{BKNS10, author = {Joppe Bos and Thorsten Kleinjung and Ruben Niederhagen and Peter Schwabe}, title = {{ECC2K-130} on {C}ell {CPU}s}, booktitle = {Progress in Cryptology -- {AFRICACRYPT 2010}}, editor = {Daniel J. Bernstein and Tanja Lange}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {6055}, year = {2010}, pages = {225--242}, note = {Document ID: bad46a78a56fdc3a44fcf725175fd253, \url{http://cryptojedi.org/users/peter/\#cbev1l}}, } @misc{BMM+10, author = {``Bushing'' and {Hector Martin ``marcan''} Cantero and Segher Boessenkool and Sven Peter}, title = {{PS3} epic fail}, year = {2010}, note = {\url{http://events.ccc.de/congress/2010/Fahrplan/attachments/1780_27c3_console_hacking_2010.pdf}}, } @inproceedings{CBGW10, author = {Craig Costello and Colin Boyd and Juan Manuel Gonz\'{a}lez Nieto and Kenneth Koon-Ho Wong}, title = {Avoiding Full Extension Field Arithmetic in Pairing Computations}, booktitle = {Progress in Cryptology -- {AFRICACRYPT 2010}}, editor = {Daniel J. Bernstein and Tanja Lange}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {6055}, year = {2010}, pages = {203--224}, note = {\url{http://eprint.iacr.org/2010/104/}}, } @inproceedings{CS10, author = {Craig Costello and Douglas Stebila}, title = {Fixed Argument Pairings}, booktitle = {Progress in Cryptology -- {LATINCRYPT 2010}}, editor = {Michel Abdalla and Paulo S. L. M. Barreto}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {6212}, year = {2010}, pages = {92--108}, note = {\url{http://http://eprint.iacr.org/2010/342.pdf}}, } @inproceedings{BP10, author = {Joan Boyar and Ren\'e Peralta}, title = {A New Combinational Logic Minimization Technique with Applications to Cryptology}, booktitle = {Experimental Algorithms}, editor = {Paola Festa}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {6049}, year = {2010}, pages = {178--189}, note = {\url{http://eprint.iacr.org/2009/191/}}, } @techreport{ECRYPT10, key = {ECRYPT}, editor = {Nigel P. Smart (editor)}, title = {{ECRYPT II} Yearly Report on Algorithms and Keysizes (2009-2010)}, institution = {ECRYPT II -- European Network of Excellence in Cryptology, EU FP7, ICT-2007-216676}, year = {2010}, note = {published as deliverable D.SPA.13, \url{http://www.ecrypt.eu.org/documents/D.SPA.13.pdf}}, } @inproceedings{FBB+10, author = {Junfeng Fan and Daniel V. Bailey and Lejla Batina and Tim G\"uneysu and Christof Paar and Ingrid Verbauwhede}, title = {Breaking Elliptic Curve Cryptosystems using Reconfigurable Hardware}, booktitle = {2010th International Conference on Field Programmable Logic and Applications (FPL 2010)}, publisher = {IEEE}, year = {2010}, note = {\url{http://www.cosic.esat.kuleuven.be/publications/article-1460.pdf}}, } @inproceedings{Fre10, author = {David Mandell Freeman}, title = {Converting pairing-based cryptosystems from composite-order groups to prime-order groups }, booktitle = {Advances in Cryptology -- {EUROCRYPT 2010}}, editor = {Henri Gilbert}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {6110}, year = {2010}, pages = {44--61}, note = {\url{http://theory.stanford.edu/~dfreeman/papers/subgroups.pdf}}, } @manual{Fog10, author = {Agner Fog}, title = {Optimizing subroutines in assembly language: An optimization guide for x86 platforms}, year = {2010}, note = {\url{http://agner.org/optimize/optimizing_assembly.pdf} (accessed version: 2010-09-25)}, } @manual{Fog10a, author = {Agner Fog}, title = {The microarchitecture of {Intel}, {AMD} and {VIA} {CPU}s: An optimization guide for assembly programmers and compiler makers}, year = {2010}, note = {\url{http://www.agner.org/optimize/microarchitecture.pdf} (accessed version: 2010-09-25)}, } @manual{Fog10b, author = {Agner Fog}, title = {Instruction tables: Lists of instruction latencies, throughputs and micro-operation breakdowns for {Intel}, {AMD} and {VIA} {CPU}s}, year = {2010}, note = {\url{http://www.agner.org/optimize/instruction_tables.pdf} (accessed version: 2010-09-25)}, } @article{FST10, author = {David Freeman and Michael Scott and Edlyn Teske}, title = {A Taxonomy of Pairing-Friendly Elliptic Curves}, journal = {Journal of Cryptology}, publisher = {Springer-Verlag New York}, volume = {23}, number = {2}, year = {2010}, pages = {224--280}, note = {\url{http://eprint.iacr.org/2006/372/}}, } @techreport{Hen10, author = {Ryan Henry}, title = {Pippenger's Multiproduct and Multiexponentiation Algorithms (Extended Version)}, institution = {Centre For Applied Cryptographic Research, University of Waterloo}, year = {2010}, note = {\url{www.cacr.math.uwaterloo.ca/techreports/2010/cacr2010-26.pdf}}, } @inproceedings{JHH+10, author = {Keon Jang and Sangjin Han and Seungyeop Han and Sue Moon and KyoungSoo Park}, title = {SSLShader: Cheap SSL acceleration with Commodity Processors}, booktitle = {Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI '11)}, editor = {David G. Andersen and Sylvia Ratnasamy}, publisher = {ACM Press}, year = {2011}, note = {\url{http://www.usenix.org/events/nsdi11/tech/full_papers/Jang.pdf}}, } @article{KM10, author = {Neal Koblitz and Alfred Menezes}, title = {The brave new world of bodacious assumptions in cryptography}, journal = {Notices of the AMS}, volume = {57}, year = {2010}, pages = {357--365}, note = {\url{http://www.ams.org/notices/201003/rtx100300357p.pdf}}, } @inproceedings{MPS10, author = {Andrew Moss and Dan Page and Nigel P. Smart}, title = {Toward Acceleration of {RSA} Using 3D Graphics Hardware}, booktitle = {Cryptography and Coding}, editor = {Steven D. Galbraith}, publisher = {Springer-Verlag Berlin Heidelberg}, series = {Lecture Notes in Computer Science}, year = {2010}, pages = {364--383}, note = {\url{http://www.cs.bris.ac.uk/Publications/Papers/2000772.pdf}}, } @inproceedings{NNS10, author = {Michael Naehrig and Ruben Niederhagen and Peter Schwabe}, title = {New software speed records for cryptographic pairings}, booktitle = {Progress in Cryptology -- {LATINCRYPT 2010}}, editor = {Michel Abdalla and Paulo S. L. M. Barreto}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {6212}, year = {2010}, pages = {109--123}, note = {Document ID: 4d8d6cd8dc32f9524bb84bbe9c148076, updated version: \url{http://cryptojedi.org/users/peter/\#dclxvi}}, } @misc{NPS10, author = {Michael Naehrig and Christiane Peters and Peter Schwabe}, title = {{SHA}-2 will soon retire}, journal = {Journal of Craptology}, volume = {7}, year = {2010}, note = {Docment ID: 5894e5a7cb65f7cb51c5a5077d99cddd, \url{http://cryptojedi.org/users/peter/\#retire}}, } @inproceedings{OBSC10, author = {Dag Arne Osvik and Joppe W. Bos and Deian Stefan and David Canright}, title = {Fast Software AES Encryption }, booktitle = {Fast Software Encryption}, editor = {Seokhie Hong and Tetsu Iwata}, series = {LNCS}, volume = {6147}, publisher = {Springer}, year = {2010}, pages = {75--93}, } @misc{PSNB10, author = {Geovandro C. C. F. Pereira and Marcos A. Simpl\'icio Jr and Michael Naehrig and Paulo S. L. M. Barreto}, title = {A Family of Implementation-Friendly BN Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2010/429}, year = {2010}, note = {\url{http://eprint.iacr.org/2010/429/}}, myXXX = {Change when published, change link to cryptojedi} } @misc{Sco10, author = {Michael Scott}, howpublished = {Personal communication}, year = {2010}, month = {March}, } @article{TOS10, author = {Eran Tromer and Dag Arne Osvik and Adi Shamir}, title = {Efficient Cache Attacks on {AES}, and Countermeasures}, journal = {Journal of Cryptology}, publisher = {Springer-Verlag New York}, volume = {23}, number = {1}, pages = {37--71}, year = {2010}, note = {\url{http://people.csail.mit.edu/tromer/papers/cache-joc-official.pdf}}, } @article{Ver10, author = {Frederik Vercauteren}, title = {Optimal Pairings}, journal = {IEEE Transactions on Information Theory}, volume = {56}, number = {1}, year = {2010}, note = {\url{http://www.cosic.esat.kuleuven.be/publications/article-1039.pdf}}, } @inproceedings{WPAM10, author = {Henry Wong and Misel-Myrto Papadopoulou and Maryam Sadooghi-Alvandi and Andreas Moshovos}, title = {Demystifying {GPU} microarchitecture through microbenchmarking}, booktitle = {International Symposium on Performance Analysis of Systems and Software - ISPASS}, year = {2010}, note = {\url{http://www.stuffedcow.net/files/gpuarch-ispass2010.pdf}}, } @inproceedings{APW09, author = {Martin R. Albrecht, Kenneth G. Paterson and Gaven J. Watson}, title = {Plaintext Recovery Attacks against SSH}, booktitle = {2009 IEEE Symposium on Security and Privacy}, publisher = {The Institute of Electrical and Electronics Engineers, Inc.}, year = {2009}, note = {\url{http://www.isg.rhul.ac.uk/~kp/SandPfinal.pdf}}, } @misc{AFG+09, author = {Daniel Augot and Matthieu Finiasz and Philippe Gaborit and St\'{e}phane Manuel and Nicolas Sendrier}, title = {{SHA}-3 {P}roposal: {FSB}}, year = {2009}, note = {\url{http://www-rocq.inria.fr/secret/CBCrypto/index.php?pg=fsb}}, } @inproceedings{BBB+09, author = {Daniel V. Bailey and Brian Baldwin and Lejla Batina and Daniel J. Bernstein and Peter Birkner and Joppe W. Bos and Gauthier van Damme and Giacomo de Meulenaer and Junfeng Fan and Tim G\"uneysu and Frank Gurkaynak and Thorsten Kleinjung and Tanja Lange and Nele Mentens and Christof Paar and Francesco Regazzoni and Peter Schwabe and Leif Uhsadel}, title = {The {C}erticom Challenges {ECC2-X}}, booktitle = {Workshop Record of SHARCS'09: Special-purpose Hardware for Attacking Cryptographic Systems}, year = {2009}, pages = {51--82}, note = {\url{http://www.hyperelliptic.org/tanja/SHARCS/record2.pdf}}, } @misc{BBB+09a, author = {Daniel V. Bailey and Lejla Batina and Daniel J. Bernstein and Peter Birkner and Joppe W. Bos and Hsieh-Chung Chen and Chen-Mou Cheng and Gauthier Van Damme and Giacomo de Meulenaer and Luis Julian Dominguez Perez and Junfeng Fan and Tim G\"{u}neysu and Frank G\"{u}rkaynak and Thorsten Kleinjung and Tanja Lange and Nele Mentens and Ruben Niederhagen and Christof Paar and Francesco Regazzoni and Peter Schwabe and Leif Uhsadel and Anthony Van Herrewege and Bo-Yin Yang}, title = {Breaking {ECC2K-130}}, howpublished = {Cryptology ePrint Archive, Report 2009/541}, year = {2009}, note = {\url{http://eprint.iacr.org/2009/541/}}, myXXX = {May be published at some point...}, } @inproceedings{BLN+09, author = {Daniel J. Bernstein and Tanja Lange and Ruben Niederhagen and Christiane Peters and Peter Schwabe}, title = {{FSBDay}: Implementing {W}agner's generalized birthday attack against the {SHA}-3 round-1 candidate {FSB}}, booktitle = {Progress in Cryptology -- {INDOCRYPT 2009}}, editor = {Bimal Roy and Nicolas Sendrier}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {5922}, year = {2009}, pages = {18--38}, note = {Document ID: ded1984108ff55330edb8631e7bc410c, \url{http://cryptojedi.org/users/peter/\#fsbday}}, } @inproceedings{Ber09, author = {Daniel J. Bernstein}, title = {Optimizing linear maps modulo 2.}, booktitle = {Workshop Record of SPEED-CC: Software Performance Enhancement for Encryption and Decryption and Cryptographic Compilers}, year = {2009}, pages = {3--18}, note = {Document ID: e5c3095f5c423e2fe19fa072e23bd5d7, \url{http://www.hyperelliptic.org/SPEED/record09.pdf}}, } @inproceedings{Ber09a, author = {Daniel J. Bernstein}, title = {Batch binary {Edwards}}, booktitle = {Advances in Cryptology -- {CRYPTO 2009}}, editor = {Shai Halevi}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {5677}, year = {2009}, pages = {317--336}, note = {Document ID: 4d7766189e82c1381774dc840d05267b, \url{http://cr.yp.to/papers.html\#bbe}}, } @misc{Ber09b, author = {Daniel J. Bernstein}, title = {Minimum number of bit operations for multiplication}, year = {2009}, note = {\url{http://binary.cr.yp.to/m.html} (accessed 2010-09-07)}, } @inproceedings{BCC+09, author = {Daniel J. Bernstein and Tien-Ren Chen and Chen-Mou Cheng and Tanja Lange and Bo-Yin Yang}, title = {{ECM} on Graphics Cards}, booktitle = {Advances in Cryptology -- {EUROCRYPT 2009}}, editor = {Antoine Joux}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {5479}, year = {2009}, pages = {483--501}, note = {Document ID: 6904068c52463d70486c9c68ba045839, \url{http://eprint.iacr.org/2008/480/}}, } @inproceedings{BCC+09a, author = {Daniel J. Bernstein and Hsieh-Chung Chen and Ming-Shing Chen and Chen-Mou Cheng and Chun-Hung Hsiao and Tanja Lange and Zong-Chin Lin and Bo-Yin Yang}, title = {The Billion-Mulmod-Per-Second {PC}}, booktitle = {Workshop Record of SHARCS'09: Special-purpose Hardware for Attacking Cryptographic Systems}, year = {2009}, pages = {131--144}, note = {\url{http://www.hyperelliptic.org/tanja/SHARCS/record2.pdf}}, } @inproceedings{BK09, author = {Alex Biryukov and Dmitry Khovratovich}, title = {Related-Key Cryptanalysis of the Full {AES-192} and {AES-256}}, booktitle = {Advances in Cryptology -- {ASIACRYPT 2009}}, editor = {Mitsuru Matsui}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {5912}, year = {2009}, pages = {1--18}, note = {\url{http://eprint.iacr.org/2009/317/}}, } @inproceedings{BKN09, author = {Alex Biryukov and Dmitry Khovratovich and Ivica Nikoli\'c}, title = {Distinguisher and Related-Key Attack on the Full {AES-256}}, booktitle = {Advances in Cryptology -- {CRYPTO 2009}}, editor = {Shai Halevi}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {5677}, year = {2009}, pages = {231--249}, note = {Extended version at \url{http://eprint.iacr.org/2009/241/}}, } @misc{BKK+09, author = {Joppe W. Bos and Marcelo E. Kaihara and Thorsten Kleinjung and Arjen K. Lenstra and Peter L. Montgomery}, title = {On the Security of 1024-bit {RSA} and 160-bit Elliptic Curve Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2009/389}, year = {2009}, note = {version 2.1, \url{http://eprint.iacr.org/2009/389/}}, } @inproceedings{BKM09, author = {Joppe W. Bos and Marcelo E. Kaihara and Peter L. Montgomery}, title = {Pollard Rho on the {PlayStation} 3}, booktitle = {Workshop Record of SHARCS'09: Special-purpose Hardware for Attacking Cryptographic Systems}, year = {2009}, pages = {35--50}, note = {\url{http://www.hyperelliptic.org/tanja/SHARCS/record2.pdf}}, } @inproceedings{CS09, author = {Neil Costigan and Peter Schwabe}, title = {Fast elliptic-curve cryptography on the {Cell Broadband Engine}}, booktitle = {Progress in Cryptology -- {AFRICACRYPT 2009}}, editor = {Bart Preneel}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {5580}, year = {2009}, pages = {368--385}, note = {Document ID: a33572712a64958c0bf522e608f25f0d, \url{http://cryptojedi.org/users/peter/\#celldh}} } @techreport{ECRYPT09, key = {ECRYPT}, editor = {Nigel P. Smart (editor)}, title = {{ECRYPT II} Yearly Report on Algorithms and Keysizes (2008-2009)}, institution = {ECRYPT II -- European Network of Excellence in Cryptology, EU FP7, ICT-2007-216676}, year = {2009}, note = {published as deliverable D.SPA.7, \url{http://www.ecrypt.eu.org/documents/D.SPA.7.pdf}}, } @inproceedings{GLS09, author = {Steven D. Galbraith and Xibin Lin and Michael Scott}, title = {Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves}, booktitle = {Advances in Cryptology -- {EUROCRYPT 2009}}, editor = {Antoine Joux}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {5479}, year = {2009}, pages = {518--535}, note = {\url{http://http://eprint.iacr.org/2008/194/}}, } @inproceedings{GGP09, author = {Philipp Grabher and Johann Gro{\ss}sch\"{a}dl and Dan Page}, title = {On Software Parallel Implementation of Cryptographic Pairings}, booktitle = {Selected Areas in Cryptography}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {5381}, year = {2009}, pages = {35--50}, note = {\url{http://eprint.iacr.org/2008/205/}}, } @inproceedings{GS10, author = {Robert Granger and Michael Scott}, title = {Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions}, booktitle = {Public Key Cryptography -- {PKC 2010}}, editor = {Phong Q. Nguyen and David Pointcheval}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {6056}, year = {2010}, pages = {209--223}, note = {\url{http://eprint.iacr.org/2009/565/}}, } @inproceedings{Ham09, author = {Mike Hamburg}, title = {Accelerating AES with Vector Permute Instructions}, booktitle = {Cryptographic Hardware and Embedded Systems -- {CHES 2009}}, editor = {Christophe Clavier and Kris Gaj}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {5747}, year = {2009}, pages = {18--32}, note = {\url{http://mikehamburg.com/papers/vector_aes/vector_aes.pdf}}, } @inproceedings{KS09, author = {Emilia K\"asper and Peter Schwabe}, title = {Faster and Timing-Attack Resistant {AES-GCM}}, booktitle = {Cryptographic Hardware and Embedded Systems -- {CHES 2009}}, editor = {Christophe Clavier and Kris Gaj}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {5747}, year = {2009}, pages = {1--17}, note = {Document ID: cc3a43763e7c5016ddc9cfd5d06f8218, \url{http://cryptojedi.org/users/peter/\#aesbs}}, } @inproceedings{KZS+09, author = {David Kammler and Diandian Zhang and Peter Schwabe and Hanno Scharwaechter and Markus Langenberg and Dominik Auras and Gerd Ascheid and Rudolf Mathar}, title = {Designing an {ASIP} for Cryptographic Pairings over {Barreto-Naehrig} Curves}, booktitle = {Cryptographic Hardware and Embedded Systems -- {CHES 2009}}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {5747}, year = {2009}, pages = {254--271}, note = {Document ID: 7e38974d56cc76a7f572f328ee4a3761, \url{http://cryptojedi.org/users/peter/\#bnchip}}, } @article{LLP09, author = {Eunjeong Lee and Hyang-Sook Lee and Cheol-Min Park}, title = {Efficient and Generalized Pairing Computation on Abelian Varieties}, journal = {IEEE Transactions on Information Theory}, volume = {55}, number = {4}, year = {2009}, pages = {1793--1803}, note = {\url{http://eprint.iacr.org/2008/040/}}, } @inproceedings{MS09, author = {Lorenz Minder and Alistair Sinclair}, title = {The extended $k$-tree algorithm}, booktitle = {Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms}, editor = {Claire Mathieu}, publisher = {Society for Industrial and Applied Mathematics}, year = {2009}, pages = {586--595}, note = {\url{http://www.cs.berkeley.edu/~sinclair/ktree.pdf}}, } @phdthesis{Nae09, author = {Michael Naehrig}, title = {Constructive and Computational Aspects of Cryptographic Pairings}, year = {2009}, school = {Technische Universiteit Eindhoven}, note = {\url{http://www.cryptojedi.org/users/michael/data/thesis/2009-05-13-diss.pdf}} } @article{NSW09, author = {Gregory Neven, Nigel Smart, and Bogdan Warinschi}, title = {Hash function requirements for Schnorr signatures}, journal = {Journal of Mathematical Cryptology}, volume = {3}, number = {1}, year = {2009}, pages = {69--87}, note = {\url{http://www.zurich.ibm.com/~nev/papers/schnorr.html}}, } @manual{DSS-FIPS, key = {NIST}, organization = {{U.S. DEPARTMENT OF COMMERCE/National Institute of Standards and Technology}}, title = {{Digital Signature Standards ({DSS})}}, year = {2009}, note = {Federal Information Processing Standards Publication 186-3, \url{http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf}}, } @inproceedings{SBC+09, author = {Michael Scott and Naomi Benger and Manuel Charlemagne and Luis J. Dominguez Perez and Ezekiel J. Kachisa}, title = {On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic Curves}, booktitle = {Pairing-Based Cryptography -- {Pairing 2009}}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {5671}, year = {2009}, pages = {78--88}, note = {\url{http://eprint.iacr.org/2008/490/}}, } @misc{Dan08, author = {Hadmut Danisch}, title = {Adele und die Fledermaus}, year = {2008}, note = {version 0.14, \url{XXX}}, } @inproceedings{GS08, author = {Jens Groth and Amit Sahai}, title = {Efficient Non-interactive Proof Systems for Bilinear Groups}, booktitle = {Advances in Cryptology -- {EUROCRYPT 2008}}, editor = {Nigel P. Smart}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {4965}, year = {2008}, pages = {415--432}, note = {full version: \url{http://www.brics.dk/~jg/WImoduleFull.pdf}}, } @inproceedings{BS08, author = {Daniel J. Bernstein and Peter Schwabe}, title = {New {AES} software speed records}, booktitle = {Progress in Cryptology -- {INDOCRYPT 2008}}, editor = {Dipanwita Roy Chowdhury and Vincent Rijmen}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {5365}, year = {2008}, pages = {322--336}, note = {Document ID: b90c51d2f7eef86b78068511135a231f, \url{http://cryptojedi.org/users/peter/\#aesspeed}}, } @misc{Can08, author = {Christophe De Canni\`ere}, title = {The {eSTREAM} Project: software performance}, year = {2008}, note = {\url{http://www.ecrypt.eu.org/stream/perf/} (accessed 2010-09-07)}, } @techreport{CBC+08, author = {James Coke and Harikrishna Baliga and Niranjan Cooray and Edward Gamsaragan and Peter Smith and Ki Yoon and James Abel and Antonio Valles}, title = {Improvements in the {I}ntel\textsuperscript{\textregistered} {C}ore\textsuperscript{\texttrademark} 2 {P}enryn Processor Family Architecture and Microarchitecture}, institution = {Intel Corporation}, year = {2008}, note = {\url{http://download.intel.com/technology/itj/2008/v12i3/Paper2.pdf}}, } @inproceedings{FMT+08, author = {Grigori Fursin and Cupertino Miranda and Olivier Temam and Mircea Namolaru and Elad Yom-Tov and Ayal Zaks and Bilha Mendelson and Phil Barnard and Elton Ashton and Eric Courtois and Francois Bodin and Edwin Bonilla and John Thomson and Hugh Leather and Chris Williams and Michael O'Boyle}, title = {MILEPOST GCC: machine learning based research compiler}, booktitle = {Proceedings of the GCC Developers' Summit}, year = {2008}, pages = {7--20}, note = {\url{http://www.gccsummit.org/2008/gcc-2008-proceedings.pdf}}, } @incollection{HMS08, author = {Darrel Hankerson and Alfred Menezes and Michael Scott}, title = {Software Implementation of Pairings}, editor = {Marc Joye and Gregory Neven}, booktitle = {Identity-Based Cryptography}, publisher = {IOS Press}, year = {2008}, note = {Draft available online: \url{http://www.math.uwaterloo.ca/~ajmeneze/publications/pairings_software.pdf}}, } @inproceedings{HW08, author = {Owen Harrison and John Waldron}, title = {Practical Symmetric Key Cryptography on Modern Graphics Hardware}, booktitle = {Proceedings of the 17th USENIX Security Symposium}, editor = {Paul C. van Oorschot}, publisher = {USENIX Association}, year = {2008}, pages = {{195--210}}, note = {\url{http://www.usenix.org/events/sec08/tech/full_papers/harrison/harrison.pdf}}, } @inproceedings{HWCD08, author = {Huseyin Hisil and Kenneth Koon-Ho Wong and Gary Carter and and Ed Dawson}, title = {Twisted Edwards Curves Revisited}, booktitle = {Advances in Cryptology -- {ASIACRYPT 2008}}, editor = {Josef Pieprzyk}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {5350}, year = {2008}, pages = {326--343}, note = {\url{http://eprint.iacr.org/2008/522/}}, } @misc{IBM08, author = {{IBM DeveloperWorks}}, title = {Cell {B}roadband {E}ngine Programming Handbook (version 1.11)}, year = {2008}, note = {\url{https://www-01.ibm.com/chips/techlib/techlib.nsf/techdocs/1741C509C5F64B3300257460006FD68D}}, } @misc{IBM08a, author = {{IBM DeveloperWorks}}, title = {{SPU} Assembly Language Specification (version 1.7)}, year = {2008}, note = {\url{http://www-01.ibm.com/chips/techlib/techlib.nsf/techdocs/EFA2B196893B550787257060006FC9FB}}, } @misc{Gir08, author = {Damien Giry}, title = {Keylength -- Cryptographic Key Length Recommendation}, year = {2008}, note = {\url{http://www.keylength.com/} (accessed 2010-09-07)}, } @techreport{Gue08, author = {Shay Gueron}, title = {{Advanced Encryption Standard} ({AES}) Instructions Set}, institution = {Intel Corporation}, year = {2008}, note = {\url{http://softwarecommunity.intel.com/isn/downloads/intelavx/AES-Instructions-Set_WP.pdf}}, } @misc{Int08, key = {Intel}, title = {{I}ntel\textsuperscript{\textregistered} Turbo Boost Technology in {I}ntel\textsuperscript{\textregistered} Core\textsuperscript{\texttrademark} Microarchitecture ({N}ehalem) Processors}, howpublished = {White paper, Intel}, year = {2008}, note = {\url{http://download.intel.com/design/processor/applnots/320354.pdf}}, } @inproceedings{Koe08, author = {Robert K{\"o}nighofer}, title = {A Fast and Cache-Timing Resistant Implementation of the {AES}}, booktitle = {Topics in Cryptology -- {CT-RSA 2008}}, editor = {Tal Malkin}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {4964}, year = {2008}, pages = {187--202}, } @misc{LM08, author = {Ahmad Lavasani and Reza Mohammadi}, title = {Implementing a feasible attack against {ECC2K-130} {Certicom} challenge}, year = {2008}, note = {Poster abstract from {ANTS-8}}, } @inproceedings{ NBS08, author = {Michael Naehrig and Paulo S. L. M. Barreto and Peter Schwabe}, title = {On compressible pairings and their computation}, booktitle = {Progress in Cryptology -- {AFRICACRYPT 2008}}, editor = {Serge Vaudenay}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {5023}, year = {2008}, pages = {371--388}, note = {\url{http://cryptojedi.org/users/peter/\#ocpatc}}, } @inproceedings{SG08, author = {Robert Szerwinski and Tim G\"uneysu}, title = {Exploiting the Power of {GPUs} for Asymmetric Cryptography}, booktitle = {Cryptographic Hardware and Embedded Systems -- {CHES 2008}}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {5154}, year = {2008}, pages = {79--99}, note = {\url{http://www.crypto.ruhr-uni-bochum.de/imperia/md/content/texte/publications/conferences/ches2008_szerwinski_etal_asymmcryptoongpus.pdf}}, } @misc{BBB+07, author = {Elaine Barker and William Barker and William Burr and William Polk and Miles Smid}, title = {Recommendation for Key Management -- Part 1: General (Revised)}, institution = {National Institute of Standards and Technology}, year = {2007}, note = {Published as NIST Special Publication 800-57, \url{http://csrc.nist.gov/groups/ST/toolkit/documents/SP800-57Part1_3-8-07.pdf}}, } @inproceedings{Ber07, author = {Daniel J. Bernstein}, title = {Better price-performance ratios for generalized birthday attacks}, booktitle = {Workshop Record of SHARCS'07: Special-purpose Hardware for Attacking Cryptographic Systems}, year = {2007}, note = {Document ID: 7cf298bebf853705133a84bea84d4a07, \url{http://cr.yp.to/papers.html\#genbday}}, } @inproceedings{BL07, author = {Daniel J. Bernstein and Tanja Lange}, title = {Faster addition and doubling on elliptic curves}, booktitle = {Advances in Cryptology -- {ASIACRYPT 2007}}, editor = {Kaoru Kurosawa}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {4833}, year = {2007}, pages = {29--50}, note = {Document ID: 95616567a6ba20f575c5f25e7cebaf83, \url{http://cr.yp.to/papers.html\#newelliptic}}, } @inproceedings{BK07, author = {Johannes Bl\"omer and Volker Krummel}, title = {Analysis of countermeasures against access driven cache attacks on {AES}}, booktitle = {Selected Areas in Cryptography}, editor = {Carlisle Adams and Ali Miri and Michael Wiener}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {4876}, year = {2007}, pages = {96--109}, note = {\url{www.cs.uni-paderborn.de/uploads/tx_sibibtex/cachefull.pdf}}, } @inproceedings{CS07, author = {Neil Costigan and Michael Scott}, title = {Accelerating {SSL} using the Vector processors in {IBM}'s {C}ell {B}roadband {E}ngine for {S}ony's {P}laystation 3}, booktitle = {Workshop Record of SPEED 2007: Software Performance Enhancement for Encryption and Decryption}, year = {2007}, pages = {65--76}, note = {\url{http://www.hyperelliptic.org/SPEED/record.pdf}}, } @inproceedings{DSD07, author = {Augusto J. Devegili and Michael Scott and Ricardo Dahab}, title = {Implementing Cryptographic Pairings over {Barreto-Naehrig} Curves}, booktitle = {Pairing-Based Cryptography -- {Pairing 2007}}, editor = {Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto and Takeshi Okamoto}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {4575}, year = {2007}, pages = {197--207}, note = {\url{http://eprint.iacr.org/2007/390/}}, } @inproceedings{GSS07, author = {Joachim von zur Gathen and Amin Shokrollahi and Jamshid Shokrollahi}, title = {Efficient Multiplication Using Type 2 Optimal Normal Bases}, booktitle = {Arithmetic of Finite Fields}, editor = {Claude Carlet and Berk Sunar}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {4547}, year = {2007}, pages = {55--68}, note = {\url{http://cosec.bit.uni-bonn.de/fileadmin/user_upload/publications/pubs/gatsho07.pdf}}, } @inproceedings{GT07, author = {Pierrick Gaudry and Emmanuel Thom\'e}, title = {The {\tt mp}$\mathbb{F}_q$ library and implementing curve-based key exchanges}, booktitle = {Workshop Record of SPEED 2007: Software Performance Enhancement for Encryption and Decryption}, year = {2007}, note = {\url{http://www.hyperelliptic.org/SPEED/record.pdf}}, pages = {49--64}, } @book{HP07, author = {John L. Hennessy and David A. Patterson}, title = {Computer Architecture -- A Quantitative Approach}, publisher = {Elsevier/Morgan Kaufmann Publishers}, edition = {fourth}, year = {2007}, } @article{KM07, author = {Neal Koblitz and Alfred Menezes}, title = {Another look at ``Provable Security''}, journal = {Journal of Cryptology}, publisher = {Springer-Verlag New York}, volume = {20}, number = {1}, year = {2007}, pages = {3--37}, note = {\url{http://eprint.iacr.org/2004/152/}}, } @inproceedings{MN07, author = {Mitsuru Matsui and Junko Nakajima}, title = {On the Power of Bitslice Implementation on {Intel} {Core2} Processor}, booktitle = {Cryptographic Hardware and Embedded Systems -- {CHES 2007}}, editor = {Pascal Paillier and Ingrid Verbauwhede}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {4727}, year = {2007}, pages = {121--134}, } @inproceedings{NS07, author = {Michael Neve and Jean-Pierre Seifert}, title = {Advances on Access-Driven Cache Attacks on {AES}}, booktitle = {Selected Areas in Cryptography}, editor = {Eli Biham and Amr M. Youssef}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {4356}, year = {2007}, pages = {147--162}, } @article{BGOS07, author = {Paulo S. L. M. Barreto and Stephen D. Galbraith and \'O{ h\'E}igeartaigh, Colm and Michael Scott}, title = {Efficient pairing computation on supersingular Abelian varieties}, journal = {Designs, Codes and Cryptography}, publisher = {Kluwer Academic Publishers}, address = {Norwell, MA, USA}, volume = {42}, number = {3}, year = {2007}, pages = {239--271}, note = {\url{http://eprint.iacr.org/2004/375/}}, } @misc{Dwo07, author = {Morris Dworkin}, title = {Recommendation for Block Cipher Modes of Operation: {Galois/Counter Mode (GCM)} and {GMAC}}, howpublished = {{NIST} Special Publication 800-38D}, year = {2007}, note = {\url{http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf}}, } @inproceedings{Sco07, author = {Michael Scott}, title = {Optimal Irreducible Polynomials for {GF}($2^m$) Arithmetic}, booktitle = {Workshop Record of SPEED 2007: Software Performance Enhancement for Encryption and Decryption}, year = {2007}, pages = {105--116}, note = {\url{http://www.hyperelliptic.org/SPEED/record.pdf}}, } @phdthesis{Sho07, author = {Jamshid Shokrollahi}, title = {Efficient implementation of elliptic curve cryptography on FPGAs}, year = {2007}, school = {Rheinische Friedrich-Wilhelms Universit\"at Bonn}, note = {\url{http://nbn-resolving.de/urn:nbn:de:hbz:5N-09601}}, } @article{NIST07, key = {NIST}, organization = {{U.S. DEPARTMENT OF COMMERCE/National Institute of Standards and Technology}}, title = {Announcing Request for Candidate Algorithm Nominations for a New Cryptographic Hash Algorithm ({SHA-3}) Family}, journal = {Federal Register}, volume = {72}, number = {212}, year = {2007}, pages = {62212--62220}, note = {\url{http://csrc.nist.gov/groups/ST/hash/documents/FR_Notice_Nov07.pdf}}, } @inproceedings{YG07, author = {Jason Yang and James Goodman}, title = {Symmetric Key Cryptography on Modern Graphics Hardware}, booktitle = {Advances in Cryptology -- {ASIACRYPT 2007}}, editor = {Kaoru Kurosawa}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {4833}, year = {2007}, pages = {249--264}, note = {\url{http://developer.amd.com/gpu_assets/asiacrypt2007.pdf}}, } @inproceedings{ASK06, author = {Onur Ac{\i}i{\c c}mez and Werner Schindler and {\c C}etin K. Ko{\c c}}, title = {Cache Based Remote Timing Attack on the {AES}}, booktitle = {Topics in Cryptology -- {CT-RSA 2007}}, editor = {Masayuki Abe}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {4377}, year = {2006}, pages = {271--286}, note = {\url{http://www.cs.ucsb.edu/~koc/docs/c38.pdf}}, } @inproceedings{AK06, author = {Onur Ac{\i}i{\c c}mez and {\c C}etin K. Ko{\c c}}, title = {Trace-Driven Cache Attacks on AES (Short Paper)}, booktitle = {Information and Communications Security}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {4307}, year = {2006}, pages = {112--121}, note = {Full paper available at \url{eprint.iacr.org/2006/138/}}, } @inproceedings{ABG+06, author = {Adrian Antipa and Daniel Brown and Robert Gallant and Rob Lambert and Ren\'e Struik and Scott Vanstone}, title = {Accelerated Verification of ECDSA Signatures}, booktitle = {Selected Areas in Cryptography}, editor = {Bart Preneel and Stafford Tavares}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {3897}, year = {2006}, pages = {307--318}, } @book{ACD+06, author = {Roberto Avanzi and Henri Cohen and Christophe Doche and Gerhard Frey and Tanja Lange and Kim Nguyen and Frederik Vercauteren}, title = {Handbook of Elliptic and Hyperelliptic Curve Cryptography}, publisher = {Chapman \& Hall/CRC}, year = {2006}, } @inproceedings{BGG+06, author = {Rajkishore Barik and Christian Grothoff and Rahul Gupta and Vinayaka Pandit and Raghavendra Udupa}, title = {Optimal Bitwise Register Allocation using Integer Linear Programming}, booktitle = {Languages and Compilers for Parallel Computing}, editor = {George Alm\'asi and Calin Cascaval and Peng Wu}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {4382}, year = {2006}, pages = {267--282}, note = {\url{http://http://grothoff.org/christian/lcpc2006.pdf}}, } @inproceedings{BN06, author = {Paulo S. L. M. Barreto and Michael Naehrig}, title = {Pairing-Friendly Elliptic Curves of Prime Order}, booktitle = {Selected Areas in Cryptography}, editor = {Bart Preneel and Stafford Tavares}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {3897}, year = {2006}, pages = {319--331}, note = {\url{http://eprint.iacr.org/2005/133/}}, } @inproceedings{Ber06, author = {Daniel J. Bernstein}, title = {Curve25519: new {D}iffie-{H}ellman speed records}, booktitle = {Public Key Cryptography -- {PKC 2006}}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {3958}, year = {2006}, pages = {207--228}, note = {Document ID: 4230efdfa673480fc079449d90f322c0, \url{http://cr.yp.to/papers.html\#curve25519}}, } @inproceedings{BM06, author = {Joseph Bonneau and Ilya Mironov}, title = {Cache-Collision Timing Attacks Against {AES}}, booktitle = {Cryptographic Hardware and Embedded Systems -- {CHES 2006}}, editor = {Louis Goubin and Mitsuru Matsui}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {4249}, year = {2006}, pages = {201--215}, note = {\url{http://www.jbonneau.com/AES_timing_full.pdf}}, } @misc{BGNS06, author = {Ernie Brickell and Gary Graunke and Michael Neve and Jean-Pierre Seifert}, title = {Software mitigations to hedge {AES} against cache-based software side channel vulnerabilities}, howpublished = {Cryptology ePrint Archive, Report 2006/052}, year = {2006}, note = {\url{http://eprint.iacr.org/2006/052/}}, } @inproceedings{BDQ06, author = {Philippe Bulens and Guerric Meurice de Dormale and Jean-Jacques Quisquater}, title = {Hardware for Collision Search on Elliptic Curve over GF($2^m$)}, booktitle = {Workshop Record of SHARCS'06: Special-purpose Hardware for Attacking Cryptographic Systems}, year = {2006}, } @book{CK06, author = {Debra L. Cook and Angelos D. Keromytis}, title = {{CryptoGraphics}: Exploiting Graphics Cards For Security}, series = {Advances in Information Security}, publisher = {Springer Science+Business Media LLC}, volume = {20}, year = {2006}, } @misc{DOSD06, author = {Augusto J. Devegili and Colm {\'{O}' h\'Eigeartaigh} and Michael Scott and Ricardo Dahab}, title = {Multiplication and Squaring on Pairing-Friendly Fields}, howpublished = {Cryptology ePrint Archive, Report 2006/471}, year = {2006}, note = {\url{http://eprint.iacr.org/2006/471/}}, } @article{HSV06, author = {Florian Hess and Nigel P. Smart and Frederik Vercauteren}, title = {The {Eta} Pairing Revisited}, journal = {IEEE Transactions on Information Theory}, volume = {52}, number = {10}, year = {2006}, pages = {4595--4602}, note = {\url{http://homes.esat.kuleuven.ac.be/~fvercaut/papers/ate.pdf}}, } @misc{Lip06, author = {Helger Lipmaa}, title = {{AES/Rijndael}: speed}, year = {2006}, note = {\url{http://research.cyber.ee/~lipmaa/research/aes/rijndael.html} (accessed 2010-10-15)}, } @misc{Lip06a, author = {Helger Lipmaa}, title = {{AES} ciphers: speed in no-feedback mode}, year = {2006}, note = {\url{http://research.cyber.ee/~lipmaa/research/aes/nfb.html} (accessed 2010-10-15)}, } @inproceedings{Mat06, author = {Mitsuru Matsui}, title = {How Far Can We Go on the x64 Processors?}, booktitle = {Fast Software Encryption}, editor = {Matthew Robshaw}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {4047}, year = {2006}, pages = {341--358}, note = {\url{http://www.iacr.org/archive/fse2006/40470344/40470344.pdf}}, } @inproceedings{NSW06, author = {Michael Neve and Jean-Pierre Seifert and Zhenghong Wang}, title = {A refined look at {Bernstein}'s {AES} side-channel analysis}, booktitle = {ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security}, publisher = {ACM New York}, year = {2006}, pages = {369--369}, note = {\url{http://palms.ee.princeton.edu/PALMSopen/neve06refined.pdf}}, } @inproceedings{OST06, author = {Dag Arne Osvik and Adi Shamir and Eran Tromer}, title = {Cache Attacks and Countermeasures: the Case of {AES}}, booktitle = {Topics in Cryptology -- {CT-RSA 2006}}, editor = {David Pointcheval}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {3860}, year = {2006}, pages = {1--20}, note = {\url{http://eprint.iacr.org/2005/271/}}, } @inproceedings{RSD06, author = {Chester Rebeiro and David Selvakumar and A. S. L. Devi}, title = {Bitslice Implementation of AES}, booktitle = {Cryptology and Network Security}, editor = {David Pointcheval and Yi Mu and Kefei Chen}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {4301}, year = {2006}, pages = {203--212}, } @techreport{Sco06, author = {Michael Scott}, title = {Implementing Cryptographic Pairings}, year = {2006}, institution = {Dublin City University}, note = {\url{ftp://ftp.computing.dcu.ie/pub/resources/crypto/pairings.pdf}}, } @article{Sun06, author = {Berk Sunar}, title = {A {E}uclidean Algorithm for Normal Bases}, journal = {Acta Applicandae Mathematicae}, publisher = {Springer Netherlands}, volume = {93}, year = {2006}, pages = {57--74}, } @inproceedings{ZD06, author = {Paul Zimmermann and Bruce Dodson}, title = {20 Years of {ECM}}, booktitle = {Algorithmic Number Theory}, editor = {Florian Hess and Sebastian Pauli and Michael Pohst}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {4076}, year = {2006}, pages = {525--542}, note = {\url{http://www.loria.fr/~zimmerma/papers/40760525.pdf}}, } @manual{CBE, title = {{Cell Broadband Engine} Architecture, Version 1.01}, organization = {Sony Corporation}, year = {2006}, note = {\url{http://cell.scei.co.jp/pdf/CBE_Architecture_v101.pdf}}, } @inproceedings{ASK05, author = {Onur Ac{\i}i{\c c}mez and Werner Schindler and {\c C}etin K. Ko{\c c}}, title = {Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations}, booktitle = {{CCS '05} Proceedings of the 12th ACM conference on Computer and communications security}, publisher = {ACM}, address = {New York, NY, USA}, year = {2005}, } @inproceedings{AFS05, author = {Daniel Augot and Matthieu Finiasz and Nicolas Sendrier}, title = {A Family of Fast Syndrome Based Cryptographic Hash Functions}, booktitle = {Progress in Cryptology -- {Mycrypt 2005}}, editor = {Serge Vaudenay}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {3715}, year = {2005}, pages = {64--83}, note = {\url{http://lasecwww.epfl.ch/pub/lasec/doc/AFS05.pdf}}, } @inproceedings{BZB+05, author = {Guido Bertoni and Vittorio Zaccaria and Luca Breveglieri and Matteo Monchiero and Gianluca Palermo}, title = {{AES} Power Attack Based on Induced Cache Miss and Countermeasure}, booktitle = {{ITCC '05}: Proceedings of the International Conference on Information Technology: Coding and Computing ({ITCC'05}) - Volume I}, publisher = {IEEE Computer Society}, address = {Washington, DC, USA}, year = {2005}, pages = {586--591}, note = {\url{http://home.dei.polimi.it/gpalermo/papers/ITCC05.pdf}}, } @book{BSS05, author = {Ian Blake and Gadiel Seroussi and Nigel P. Smart}, title = {Advances in Elliptic Curve Cryptography}, series = {London Mathematical Society Lecture Note Series}, publisher = {Cambridge University Press}, address = {Cambridge, {UK}}, number = {317}, year = {2005}, } @inproceedings{Can05, author = {David Canright}, title = {A Very Compact {S}-Box for {AES} }, booktitle = {Cryptographic Hardware and Embedded Systems -- {CHES 2005}}, editor = {Berk Sunar and Josyula R. Rao}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {3659}, year = {2005}, pages = {441--455}, } @misc{CRDI05, author = {Thomas Chen and Ram Raghavan and Jason Dale and Eiji Iwata}, title = {{Cell Broadband Engine} Architecture and its first implementation}, year = {2005}, note = {\url{http://www-128.ibm.com/developerworks/power/library/pa-cellperf/}}, } @inproceedings{CIKL05, author = {Debra L. Cook and John Ioannidis and Angelos D. Keromytis and Jake Luck}, title = {{CryptoGraphics}: Secret Key Cryptography Using Graphics Cards}, booktitle = {Topics in Cryptology -- {CT-RSA 2005}}, editor = {Alfred Menezes}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {3376}, year = {2005}, pages = {334--350}, note = {\url{http://www.cs.columbia.edu/~angelos/Papers/2004/gc_ctrsa.pdf}}, } @mastersthesis{Dah05, author = {Erik Dahmen}, title = {Efficient Algorithms for Multi-Scalar Multiplication}, year = {2005}, school = {Technical University of Darmstadt}, note = {\url{http://www.cdc.informatik.tu-darmstadt.de/~dahmen/papers/dahmen_diplthesis.pdf}}, } @inproceedings{EOO+05, author = {Alexandre E. Eichenberger and Kathryn O'Brien and Kevin O'Brien and Peng Wu and Tong Chen and Peter H. Oden and Daniel A. Prener and Janice C. Shepherd and Byoungro So and Zehra Sura and Amy Wang and Tao Zhang and Peng Zhao and and Michael Gschwind}, title = {Optimizing Compiler for a CELL Processor}, booktitle = {{PACT '05} Proceedings of the 14th International Conference on Parallel Architectures and Compilation Techniques}, publisher = {IEEE Computer Society Washington, DC}, year = {2005}, note = {\url{http://www.research.ibm.com/cellcompiler/papers/eichen-pact05.pdf}}, } @article{GN05, author = {Joachim von zur Gathen and Michael N{\"o}cker}, title = {Polynomial and Normal Bases for Finite Fields}, journal = {Journal of Cryptology}, publisher = {Springer-Verlag New York}, volume = {18}, number = {4}, year = {2005}, pages = {337--355}, } @manual{FB05, author = {Matthieu Finiasz and Thomas Baigni\`eres}, title = {iChair Manual }, year = {2005}, note = {\url{http://lasecwww.epfl.ch/iChair/iChair_manual.pdf}} } @inproceedings{MV05, author = {David A. McGrew and John Viega}, title = {The Security and Performance of the {G}alois/{C}ounter {M}ode ({GCM}) of Operation}, booktitle = {Progress in Cryptology -- {INDOCRYPT 2004}}, editor = {Anne Canteaut and Kapaleeswaran Viswanathan}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {3348}, year = {2005}, pages = {343--355}, note = {full version: \url{http://eprint.iacr.org/2004/193/}}, } @inproceedings{MF05, author = {Mitsuru Matsui and Sayaka Fukuda}, title = {How to Maximize Software Performance of Symmetric Primitives on {Pentium} {III} and 4 Processors}, booktitle = {Fast Software Encryption}, editor = {Henri Gilbert and Helena Handschuh}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {3557}, year = {2005}, pages = {398--412}, } @misc{SBP05, author = {Kanna Shimizu and Daniel Brokenshire and Mohammad Peyravian}, title = {{Cell Broadband Engine} Support for Privacy, Security, and Digital Rights Management Applications}, howpublished = {White paper, IBM}, year = {2005}, note = {\url{http://www-01.ibm.com/chips/techlib/techlib.nsf/techdocs/3F88DA69A1C0AC40872570AB00570985}}, } @inproceedings{WW05, author = {Khaing Khaing Kyi Win and Weng-Fai Wong}, title = {Cooperative instruction scheduling with linear scan register allocation}, booktitle = {High Performance Computing -- {HiPC 2005}}, editor = {David A. Bader and Manish Parashar and Sridhar Varadarajan and Viktor K. Prasanna}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {3769}, year = {2005}, pages = {528--537}, note = {\url{http://www.comp.nus.edu.sg/~wongwf/papers/hipc05.pdf}}, } @article{BLS04, author = {Paulo S. L. M. Barreto and Ben Lynn and Michael Scott}, title = {Efficient Implementation of Pairing-Based Cryptosystems}, journal = {Journal of Cryptology}, publisher = {Springer-Verlag New York}, year = {2004}, volume = {17}, pages = {221--234}, } @misc{Ber04, author = {Daniel J. Bernstein}, title = {Cache-timing attacks on {AES}}, year = {2004}, note = {Document ID: cd9faae9bd5308c440df50fc26a517b4, \url{http://cr.yp.to/papers.html\#cachetiming}}, } @misc{Ber04a, author = {Daniel J. Bernstein}, title = {Floating-point arithmetic and message authentication}, year = {2004}, note = {Document ID: dabadd3095644704c5cbe9690ea3738e, \url{http://cr.yp.to/papers.html\#hash127}}, } @inproceedings{BCOP04, author = {Dan Boneh and Giovanni Di Crescenzo and Rafail Ostrovsky and Giuseppe Persiano}, title = {Public Key Encryption with Keyword Search}, booktitle = {Advances in Cryptology -- {EUROCRYPT 2004}}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, year = {2004}, volume = {3027}, pages = {506--522}, note = {\url{http://crypto.stanford.edu/~dabo/papers/encsearch.pdf}}, } @article{BLS04a, author = {Dan Boneh and Ben Lynn and Hovav Shacham}, title = {Short signatures from the {Weil} pairing}, journal = {Journal of Cryptology}, publisher = {Springer-Verlag New York}, volume = {17}, number = {4}, year = {2004}, pages = {297--319}, note = {\url{http://crypto.stanford.edu/~dabo/pubs/papers/weilsigs.ps}}, } @misc{CJ04, author = {Jean-S\'{e}bastien Coron and Antoine Joux}, title = {Cryptanalysis of a provably secure cryptographic hash function}, howpublished = {Cryptology ePrint Archive, Report 2004/013}, year = {2004}, note = {\url{http://eprint.iacr.org/2004/013/}}, } @book{HMV04, author = {Darrel Hankerson and Alfred Menezes and Scott A. Vanstone}, title = {Guide to Elliptic Curve Cryptography}, publisher = {Springer-Verlag New York}, year = {2004}, } @article{Jou04, author = {Antoine Joux}, title = {A One Round Protocol for Tripartite {D}iffie-{H}ellman}, journal = {Journal of Cryptology}, publisher = {Springer-Verlag New York}, year = {2004}, volume = {17}, number = {4}, pages = {263--276}, } @misc{MV04, author = {David A. McGrew and John Viega}, title = {The {G}alois/{C}ounter {M}ode of Operation ({GCM})}, year = {2004}, note = {\url{http://www.cryptobarn.com/papers/gcm-spec.pdf}}, } @article{Mil04, author = {Victor S. Miller}, title = {The {Weil} Pairing, and Its Efficient Calculation}, journal = {Journal of Cryptology}, publisher = {Springer-Verlag New York}, year = {2004}, volume = {17}, pages = {235--261}, } @phdthesis{Riy04, author = {Sattam S. Al-Riyami}, title = {Cryptographic Schemes based on Elliptic Curve Pairings}, school = {University of London}, year = {2004}, note = {\url{www.isg.rhul.ac.uk/~kp/theses/SARthesis.pdf}}, } @article{Wie04, author = {Michael J. Wiener}, title = {The Full Cost of Cryptanalytic Attacks}, journal = {Journal of Cryptology}, volume = {17}, number = {2}, year = {2004}, pages = {105--124}, note = {\url{http://cr.yp.to/2005-590/wiener.pdf}}, } @misc{AFS03, author = {Daniel Augot and Matthieu Finiasz and Nicolas Sendrier}, title = {A fast provably secure cryptographic hash function}, howpublished = {Cryptology ePrint Archive, Report 2003/230}, year = {2003}, note = {\url{http://eprint.iacr.org/2003/230/}}, } @article{BF03, author = {Dan Boneh and Matthew Franklin}, title = {Identity-based encryption from the {Weil} pairing}, journal = {{SIAM} Journal of Computing}, publisher = {Society for Industrial and Applied Mathematics}, volume = {32}, number = {3}, year = {2003}, pages = {586--615}, note = {\url{http://crypto.stanford.edu/~dabo/pubs/papers/bfibe.pdf}}, } @inproceedings{BB03, author = {David Brumley and Dan Boneh}, title = {Remote Timing Attacks are Practical}, booktitle = {Proceedings of the 12th USENIX Security Symposium}, editor = {Vern Paxson}, publisher = {USENIX Association}, year = {2003}, pages = {1--14}, note = {\url{http://www.usenix.org/publications/library/proceedings/sec03/tech/brumley/brumley.pdf}}, } @manual{Int03, author = {{Intel Corporation}}, title = {Intel\textsuperscript{\textregistered} {P}entium\textsuperscript{\textregistered} 4 Processor and {I}ntel\textsuperscript{\textregistered} {875P} and {I}ntel\textsuperscript{\textregistered} {850E} Chipset Performance Brief}, year = {2003}, note = {\url{http://www.intel.com/performance/resources/briefs/pentium4.pdf}}, }, @article{NS03, author = {Phong Q. Nguyen and Igor E. Shparlinski}, title = {The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces}, journal = {Designs, Codes and Cryptography}, publisher = {Kluwer Academic Publishers}, address = {Norwell, MA, USA}, volume = {30}, number = {22}, year = {2003}, pages = {201--217}, note = {\url{http://www.ics.mq.edu.au/~igor/EC-DSA.ps}}, } @techreport{Pro03, author = {John Proos}, title = {Joint Sparse Forms and Generating Zero Columns when Combing}, institution = {Centre For Applied Cryptographic Research, University of Waterloo}, year = {2003}, note = {\url{http://www.cacr.math.uwaterloo.ca/techreports/2003/corr2003-23.ps}}, } @misc{Osv03, author = {Dag Arne Osvik}, title = {Fast assembler implementations of the {AES}}, year = {2003}, note = {\url{http://www.ii.uib.no/~osvik/pres/crypto2003.html} (accessed 2010-10-20)}, } @article{RBBK03, author = {Phillip Rogaway and Mihir Bellare and John Black and Ted Krovetz}, title = {OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption}, journal = {ACM Transactions on Information and System Security}, publisher = {ACM}, address = {New York, NY, USA}, volume = {6}, number = {3}, pages = {365--403}, } @article{SL03, author = {Bart de Smit and Hendrik W. Lenstra Jr.}, title = {Artful Mathematics: The Heritage of M. C. Escher}, journal = {Notices of the AMS}, publisher = {American Mathematical Society}, volume = {50}, number = {4}, note = {\url{http://www.ams.org/notices/200304/fea-escher.pdf }}, } @inproceedings{TSS+03, author = {Yukiyasu Tsunoo and Teruo Saito and Tomoyasu Suzaki and Maki Shigeri and Hiroshi Miyauchi}, title = {Cryptanalysis of {DES} implemented on computers with cache}, booktitle = {Cryptographic Hardware and Embedded Systems -- {CHES 2003}}, editor = {Colin D. Walter and {\c C}etin K. Ko{\c c} and Christof Paar}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {2779}, year = {2003}, pages = {62--76}, } @misc{Pag02, author = {Dan Page}, title = {Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel}, howpublished = {Cryptology ePrint Archive, Report 2002/169}, year = {2002}, note = {\url{http://eprint.iacr.org/2002/169/}}, } @inproceedings{TTMM02, author = {Yukiyasu Tsunoo and Etsuko Tsujihara and Kazuhiko Minematsu and Hiroshi Miyauchi}, title = {Cryptanalysis of Block Ciphers Implemented on Computers with Cache}, booktitle = {Proceedings of the International Symposium on Information Theory and Its Applications, ISITA 2002}, year = {2002}, pages = {803--806}, } @incollection{Wag02, author = {David Wagner}, title = {A generalized birthday problem (extended abstract)}, booktitle = {Advances in Cryptology -- {CRYPTO 2002}}, editor = {Moti Yung}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {2442}, year = {2002}, pages = {288--304}, note = {See also newer version~\cite{Wag02a}. \url{http://www.cs.berkeley.edu/~daw/papers/genbday.html}}, } @misc{Wag02a, author = {David Wagner}, title = {A generalized birthday problem (full version)}, year = {2002}, note = {See also older version~\cite{Wag02}. \url{http://www.cs.berkeley.edu/~daw/papers/genbday.html}}, } @misc{BR01, author = {Paulo S. L. M. Barreto and Vincent Rijmen}, title = {The {WHIRLPOOL} {H}ashing {F}unction}, year = {2001}, note = {\url{http://www.larc.usp.br/~pbarreto/WhirlpoolPage.html} (accessed 2010-09-07)}, } @misc{Ber01, author = {Daniel J. Bernstein}, title = {Pippenger's exponentiation algorithm}, year = {2001}, note = {\url{http://cr.yp.to/papers.html#pippenger}}, } @inproceedings{BLS01, author = {Dan Boneh and Ben Lynn and Hovav Shacham}, title = {Short signatures from the {Weil} pairing}, booktitle = {Advances in Cryptology -- Asiacrypt 2001}, editor = {Colin Boyd}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {2248}, year = {2001}, pages = {514--532}, note = {\url{http://www.iacr.org/archive/asiacrypt2001/22480516.pdf}}, } @inproceedings{BF01, author = {Dan Boneh and Matt Franklin}, title = {Identity-based encryption from the {Weil} pairing}, booktitle = {Advances in Cryptology -- {CRYPTO 2001}}, editor = {Joe Kilian}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {2139}, year = {2001}, pages = {213--229}, note = {\url{http://www.iacr.org/archive/crypto2001/21390212.pdf }}, } @inproceedings{BHH01, author = {Dan Boneh and Shai Halevi and Nick Howgrave-Graham}, title = {The Modular Inversion Hidden Number Problem}, booktitle = {Advances in Cryptology -- {ASIACRYPT 2001}}, editor = {Colin Boyd}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {2248}, year = {2001}, pages = {36--51}, note = {\url{http://www.research.ibm.com/people/s/shaih/pubs/bhh01.pdf}}, } @manual{AES-FIPS, key = {NIST}, organization = {{National Institute of Standards and Technology}}, title = {Announcing the {Advanced Encryption Standard} ({AES})}, year = {2001}, note = {Federal Information Processing Standards Publication 197, \url{http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf}}, } @inproceedings{Len01, author = {Arjen K. Lenstra}, title = {Unbelievable Security, Matching AES security using public key systems}, booktitle = {Advances in Cryptology -- {ASIACRYPT 2001}}, editor = {Colin Boyd}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {2248}, year = {2001}, pages = {67--86}, note = {\url{http://www.win.tue.nl/~klenstra/aes_match.pdf}}, } @article{Tes01, author = {Edlyn Teske}, title = {On random walks for {P}ollard's rho method}, journal = {Mathematics of Computation}, publisher = {American Mathematical Society}, volume = {70}, number = {234}, year = {2001}, pages = {809--825}, note = {\url{http://www.ams.org/journals/mcom/2001-70-234/S0025-5718-00-01213-8/S0025-5718-00-01213-8.pdf}}, } @inproceedings{AL00, author = {Kazumaro Aoki and Helger Lipmaa}, title = {Fast Implementations of {AES} Candidates}, booktitle = {{AES} Candidate Conference}, year = {2000}, pages = {106--120}, } @article{GLV00, author = {Robert P. Gallant and Robert J. Lambert and Scott A. Vanstone}, title = {Improving the parallelized {Pollard} lambda search on anomalous binary curves}, journal = {Mathematics of Computation}, publisher = {American Mathematical Society}, volume = {69}, number = {232}, year = {2000}, pages = {1699--1705}, note = {\url{http://www.ams.org/journals/mcom/2000-69-232/S0025-5718-99-01119-9/S0025-5718-99-01119-9.pdf}}, } @misc{Har00, author = {Robert Harley}, title = {Elliptic Curve Discrete Logarithms Project}, year = {2000}, howpublished = {\url{http://pauillac.inria.fr/~harley/ecdl/} (accessed 2010-09-07)}, } @inproceedings{Jou00, author = {Antoine Joux}, title = {A One Round Protocol for Tripartite {D}iffie-{H}ellman}, booktitle = {Algorithmic Number Theory}, editor = {Wieb Bosma}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {1838}, year = {2000}, pages = {385--393}, } @article{KSWH00, author = {John Kelsey and Bruce Schneier and David Wagner and Chris Hall}, title = {Side Channel Cryptanalysis of Product Ciphers}, journal = {Journal of Computer Security}, publisher = {IOS Press}, volume = {8}, number = {2-3}, year = {2000}, pages = {141--158}, note = {\url{http://www.schneier.com/paper-side-channel2.pdf}}, } @techreport{NBB+00, author = {James Nechvatal and Elaine Barker and Lawrence Bassham and William Burr and Morris Dworkin and James Foti and Edward Roback}, title = {Report on the Development of the {Advanced Encryption Standard} ({AES})}, institution = {{National Institute of Standards and Technology}}, year = {2000}, note = {\url{http://csrc.nist.gov/archive/aes/round2/r2report.pdf}}, } @inproceedings{Osv00, author = {Dag Arne Osvik}, title = {Speeding up {S}erpent}, booktitle = {{AES} Candidate Conference}, year = {2000}, pages = {317--329}, note = {\url{http://www.ii.uib.no/~osvik/pub/aes3.pdf}}, } @article{PS00, author = {David Pointcheval and Jacques Stern}, title = {Security arguments for digital signatures and blind signatures}, journal = {Journal of Cryptology}, volume = {13}, pages = {361--396}, year = {2000}, note = {\url{ftp://ftp.di.ens.fr/pub/users/pointche/Papers/2000_joc.pdf}}, } @article{SK00, author = {Erkay Sava{\c s} and {\c C}etin K. Ko{\c c}}, title = {The Montgomery Modular Inverse - Revisited}, journal = {{IEEE} Transactions on Computers}, volume = {49}, number = {7}, year = {2000}, note = {\url{http://islab.oregonstate.edu/papers/j52moinv.pdf}}, } @inproceedings{SW00, author = {Bruce Schneier and Doug Whiting}, title = {A Performance Comparison of the Five {AES} Finalists}, booktitle = {{AES} Candidate Conference}, year = {2000}, pages = {123--135}, note = {\url{http://csrc.nist.gov/archive/aes/round2/conf3/papers/17-bschneier.pdf}}, } @inproceedings{WB00, author = {Richard Weiss and Nathan L. Binkert}, title = {A Comparison of {AES} Candidates on the {Alpha} 21264}, booktitle = {{AES} Candidate Conference}, year = {2000}, pages = {75--81}, note = {\url{http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.1.7685&rep=rep1&type=pdf}}, } @inproceedings{WLH00, author = {Kent Wilken and Jack Liu and Mark Heffernan}, title = {Optimal Instruction Scheduling Using Integer Programming}, booktitle = {Proceedings of the ACM SIGPLAN 2000 Conference on Programming Language Design and Implementation}, publisher = {ACM}, address = {New York, NY, USA}, year = {2000}, pages = {121--133}, note = {\url{http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.86.755&rep=rep1&type=pdf}}, } @inproceedings{WWCW00, author = {John Worley and Bill Worley and Tom Christian and Christopher Worley}, title = {{AES} Finalists on {PA-RISC} and {IA-64}: Implementations \& Performance}, booktitle = {{AES} Candidate Conference}, year = {2000}, pages = {57--74}, note = {\url{http://csrc.nist.gov/archive/aes/round2/conf3/presentations/worley.pdf}}, } @misc{DR99, author = {Joan Daemen and Vincent Rijmen}, title = {{AES} proposal: {Rijndael}, version 2}, year = {1999}, note = {\url{http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf}}, } @article{OW99, author = {Paul C. van Oorschot and Michael J. Wiener}, title = {Parallel Collision Search with Cryptanalytic Applications}, journal = {Journal of Cryptology}, publisher = {Springer-Verlag New York}, volume = {12}, number = {1}, year = {1999}, pages = {1--28}, note = {\url{http://www.scs.carleton.ca/~paulv/papers/JoC97.pdf}}, } @article{PS99, author = {Massimiliano Poletto and Vivek Sarkar}, title = {Linear Scan Register Allocation}, journal = {ACM Transactions on Programming Languages and Systems (TOPLAS)}, publisher = {ACM}, address = {New York, NY, USA}, volume = {21}, number = {5}, pages = {895--913}, note = {\url{www.research.ibm.com/jalapeno/papers/toplas99.pdf}}, } @article{TH99, author = {Shreekant (Ticky) Thakkar and Tom Huff}, title = {The Internet Streaming {SIMD} Extensions}, journal = {Intel Technology Journal}, volume = {Q2}, year = {1999}, note = {\url{http://download.intel.com/technology/itj/Q21999/PDF/simd_ext.pdf}}, } @inproceedings{BGR98, author = {Mihir Bellare and Juan A. Garay and Tal Rabin}, title = {Batch verification with applications to cryptography and checking}, booktitle = {{LATIN'98}: Theoretical Informatics}, editor = {Cl\'audio L. Lucchesi and Arnaldo V. Moura}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {1380}, year = {1998}, pages = {170--191}, note = {\url{http://people.csail.mit.edu/rivest/voting/papers/BellareGarayRabin-BatchVerificationWithApplicationsToCryptographyAndChecking.pdf}}, } @inproceedings{BGT98, author = {Hans Bodlaender and Jens Gustedt and Jan Arne Telle}, title = {Linear-time register allocation for a fixed number of registers}, booktitle = {Proceedings of the Ninth Annual ACM-SIAM Symposium on Discrete Algorithms -- {SODA'98}}, publisher = {ACM/SIAM}, year = {1998}, pages = {574--583}, note = {\url{http://www.ii.uib.no/~telle/bib/BGT.pdf}}, } @article{CGH98, author = {Ran Canetti and Oded Goldreich and Shai Halevi}, title = {The Random Oracle Model, Revisited}, myXXX = {complete}, } @techreport{Ser98, author = {Gadiel Seroussi}, title = {Compact Representation of Elliptic Curve Points over {GF}$(2^n)$}, institution = {Research Contribution to IEEE P1363}, year = {1998}, } @inproceedings{WZ98, author = {Michael J. Wiener and Robert J. Zuccherato}, title = {Faster Attacks on Elliptic Curve Cryptosystems}, booktitle = {Selected Areas in Cryptography}, editor = {Stafford Tavares and Henk Meijer}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {1556}, year = {1998}, pages = {190--200}, note = {\url{http://sites.google.com/site/michaeljameswiener/ECattack.pdf?attredirects=0}}, } @techreport{ADH97, author = {William F. Applebe and Raja Das and C. Reid Harmon junior}, title = {Instructions Scheduling for Highly Super-scalar Processors}, institution = {Georgia Institute of Technology}, year = {1997}, note = {\url{http://hdl.handle.net/1853/6660}}, } @inproceedings{Bih97, author = {Eli Biham}, title = {A Fast New {DES} Implementation in Software}, booktitle = {Fast Software Encryption}, editor = {Eli Biham}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {1267}, year = {1997}, pages = {260--272}, note = {\url{http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1997/CS/CS0891.pdf}}, } @misc{Cer97, author = {Certicom}, title = {{Certicom ECC Challenge}}, year = {1997}, note = {\url{http://www.certicom.com/images/pdfs/cert_ecc_challenge.pdf}}, } @misc{Cer97a, author = {Certicom}, title = {{ECC Curves List}}, howpublished = {\url{http://www.certicom.com/index.php/curves-list}}, year = {1997}, } @book{Knu97, author = {Donald E. Knuth}, title = {{The Art of Computer Programming. Vol. 2, Seminumerical Algorithms}}, publisher = {Addison--Wesley}, year = {1998}, edition = {third}, } @book{LN97, author = {Rudolf Lidl and Harald Niederreiter}, title = {Finite fields}, publisher = {Cambridge University Press}, year = {1997}, edition = {second}, } @article{KA96, author = {{\c C}etin K. Ko{\c c} and Tolga Acar}, title = {Analyzing and Comparing Montgomery Multiplication Algorithms}, journal = {IEEE Micro}, volume = {16}, number = {3}, year = {1996}, pages = {26--33}, note = {\url{http://research.microsoft.com/pubs/103206/j37acmon.pdf}}, } @book{MOV96, author = {Alfred J. Menezes and Paul C. van Oorschot and Scott A. Vanstone}, title = {Handbook of Applied Cryptography}, publisher = {CRC Press}, year = {1996}, note = {\url{http://www.cacr.math.uwaterloo.ca/hac/}}, } @inproceedings{Koc96, author = {Paul C. Kocher}, title = {Timing Attacks on Implementations of {D}iffie-{H}ellman, {RSA}, {DSS}, and Other Systems}, booktitle = {Advances in Cryptology -- {CRYPTO'96}}, editor = {Neal Koblitz}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {1109}, year = {1996}, pages = {104--113}, note = {\url{http://www.cryptography.com/public/pdf/TimingAttacks.pdf}}, } @techreport{MPSR95, author = {Rajeev Motwani and Krishna V. Palem and Vivek Sarkar and Salem Reyen}, title = {Combining Register Allocation and Instruction Scheduling (Technical Summary)}, institution = {Courant Institute}, year = {1995}, note = {\url{http://www.cs.nyu.edu/csweb/Research/TechReports/TR1995-698/TR1995-698.pdf}}, } @inproceedings{GM94, author = {Torbj\"orn Granlund and Peter L. Montgomery}, title = {Division by Invariant Integers Using Multiplication}, booktitle = {Proceedings of the ACM SIGPLAN '94 Conference on Programming Language Design and Implementation}, publisher = {ACM}, address = {New York, NY, USA}, year = {1994}, pages = {61--72}, note = {\url{http://gmplib.org/~tege/divcnst-pldi94.pdf}}, } @article{Neu93, author = {John von Neumann}, title = {First Draft of a Report on the {EDVAC}}, journal = {IEEE Annals of the History of Computing}, volume = {15}, number = {4}, year = {1993}, pages = {27--75}, } @article{PP93, author = {Karl-Christian Posch and Reinhard Posch}, title = {Base extension using a convolution sum in residue number systems}, journal = {Computing}, publisher = {Springer-Verlag Wien}, volume = {50}, number = {2}, year = {1993}, pages = {93--104}, } @article{Gol91, author = {David Goldberg}, title = {What Every Computer Scientist Should Know About Floating-Point Arithmetic}, journal = {ACM Computing Surveys}, publisher = {ACM}, address = {New York, NY, USA}, volume = {23}, number = {1}, year = {1991}, pages = {5--48}, note = {Edited reprint available at \url{http://www.validlab.com/goldberg/paper.pdf}}, } @article{MOVW89, author = {Ron C. Mullin and Ivan M. Onyszchuk and Scott A. Vanstone and Richard M. Wilson}, title = {Optimal Normal Bases in {GF}($p^n$)}, journal = {Discrete Applied Mathematics}, publisher = {Elsevier}, volume = {22}, year = {1988/89}, pages = {149--161}, } @book{KR88, author = {Brian W. Kernighan and Dennis M. Ritchie}, title = {The C Programming Language}, publisher = {Prentice-Hall International, Inc.}, edition = {second}, year = {1988}, } @inproceedings{Bar87, author = {Paul Barrett}, title = {Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor}, booktitle = {Advances in Cryptology -- {CRYPTO '86}}, editor = {Andrew M. Odlyzko}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {263}, year = {1987}, pages = {311--323}, } @article{Kob87, author = {Neal Koblitz}, title = {Elliptic curve cryptosystems}, journal = {Mathematics of Computation}, publisher = {American Mathematical Society}, volume = {48}, number = {177}, year = {1987}, pages = {203--209}, note = {\url{http://www.ams.org/journals/mcom/1987-48-177/S0025-5718-1987-0866109-5/S0025-5718-1987-0866109-5.pdf}}, } @article{Mon87, author = {Peter L. Montgomery}, title = {Speeding the {Pollard} and elliptic curve methods of factorization}, journal = {Mathematics of Computation}, publisher = {American Mathematical Society}, volume = {48}, number = {177}, year = {1987}, pages = {243--264}, note = {\url{http://www.ams.org/journals/mcom/1987-48-177/S0025-5718-1987-0866113-7/S0025-5718-1987-0866113-7.pdf}}, } @inproceedings{Mil86, author = {Victor S. Miller}, title = {Use of Elliptic Curves in Cryptography}, booktitle = {Advances in Cryptology -- {CRYPTO '85}: Proceedings}, editor = {Hugh C. Williams}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag Berlin Heidelberg}, volume = {218}, year = {1986}, pages = {417--426}, } @misc{Mil86a, author = {Victor S. Miller}, title = {Short Programs for functions on Curves}, year = {1986}, howpublished = {Unpublished manuscript}, note = {\url{http://crypto.stanford.edu/miller/miller.pdf}}, } @article{Mon85, author = {Peter L. Montgomery}, title = {Modular Multiplication Without Trial Division}, journal = {Mathematics of Computation}, publisher = {American Mathematical Society}, year = {1985}, volume = {44}, number = {170}, pages = {519--521}, note = {\url{http://www.ams.org/journals/mcom/1985-44-170/S0025-5718-1985-0777282-X/S0025-5718-1985-0777282-X.pdf}}, } @article{Bla83, author = {G. R. Blakley}, title = {A Computer Algorithm for Calculating the Product AB Modulo M}, journal = {IEEE Transactions on Computers}, volume = {C-32}, number = {5}, year = {1983}, pages = {497--500}, } @article{BP81, author = {Richard P. Brent and John M. Pollard}, title = {{Factorization of the eighth Fermat number}}, journal = {Mathematics of Computation}, publisher = {American Mathematical Society}, volume = {36}, number = {154}, year = {1981}, pages = {627--630}, note = {\url{http://www.ams.org/journals/mcom/1981-36-154/S0025-5718-1981-0606520-5/S0025-5718-1981-0606520-5.pdf}}, } @manual{DES-FIPS, key = {NIST}, title = {{Data Encryption Standard} ({DES})}, organization = {{U.S. DEPARTMENT OF COMMERCE/National Institute of Standards and Technology}}, year = {1979}, note = {Federal Information Processing Standards Publication 46-3, \url{http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf}}, } @book{KP78, author = {Brian W. Kernighan and P. J. Plauger}, title = {The Elements of Programming Style}, publisher = {McGraw-Hill Book Company}, edition = {second}, year = {1978}, } @article{PH78, author = {Stephen C. Pohlig and Martin E. Hellman}, title = {An improved algorithm for computing logarithms over {GF$(p)$} and its cryptographic significance}, journal = {{IEEE} Transaction on Information Theory}, volume = {24}, year = {1978}, pages = {106--110}, } @article{Pol78, author = {John M. Pollard}, title = {{Monte Carlo} methods for index computation (mod $p$)}, journal = {Mathematics of Computation}, publisher = {American Mathematical Society}, volume = {32}, number = {143}, year = {1978}, pages = {918--924}, note = {\url{http://www.ams.org/journals/mcom/1978-32-143/S0025-5718-1978-0491431-9/S0025-5718-1978-0491431-9.pdf}}, } @article{RSA78, author = {R. L. Rivest and A. Shamir and L. Adleman}, title = {A method for obtaining digital signatures and public-key cryptosystems}, journal = {Communications of the ACM}, publisher = {ACM}, address = {New York, NY, USA}, volume = {21}, year = {1978}, pages = {120--126}, } @article{DH76, author = {Whitfield Diffie and Martin E. Hellman}, title = {New Directions in Cryptography}, journal = {IEEE Transactions on Information Theory}, volume = {IT-22}, number = {6}, year = {1976}, pages = {644--654}, note = {\url{http://www-ee.stanford.edu/\%7Ehellman/publications/24.pdf}}, } @article{Fly66, author = {Michael J. Flynn}, title = {Very High-Speed Computing Systems}, journal = {Proceedings of the {IEEE}}, volume = {54}, number = {12}, year = {1966}, pages = {1901--1909}, note = {\url{http://ieeexplore.ieee.org/iel5/5/31091/01447203.pdf}}, } @article{Kah65, author = {William Kahan}, title = {Pracniques: further remarks on reducing truncation errors}, journal = {Communications of the ACM}, publisher = {ACM}, address = {New York, NY, USA}, volume = {8}, number = {1}, year = {1965}, pages = {40,48}, } @misc{Moo65, author = {Gordon E. Moore}, title = {Cramming more components onto integrated circuits}, howpublished = {Electronics magazine}, year = {1965}, note = {\url{ftp://download.intel.com/research/silicon/moorespaper.pdf}}, } @article{KO63, author = {Anatolii Karatsuba and Yuri Ofman}, title = {Multiplication of multidigit numbers on automata}, journal = {Soviet Physics Doklady}, volume = {7}, year = {1963}, pages = {595--596}, note = {Translated from Doklady Akademii Nauk SSSR, Vol. 145, No. 2, pp. 293--294, July 1962.}, } @article{Har60, author = {Bernard Harris}, title = {Probability distributions related to random mappings}, journal = {The Annals of Mathematical Statistics}, publisher = {Institute of Mathematical Statistics}, volume = {31}, year = {1960}, pages = {1045--1062}, } @misc{Sho51, author = {William Shockley}, title = {Circuit element utilizing semiconductive material}, howpublished = {United States Patent 2,569,347}, year = {1951}, note = {Application filed June 26, 1948, \url{http://www.freepatentsonline.com/2569347.html}}, } @misc{ME48, author = {Karl Marx and Friedrich Engels}, title = {Manifest der Kommunistischen Partei}, year = {1848}, note = {\url{http://www.dkpbrandenburg.de/old/manifest.pdf}}, } @misc{BW50, author = {John Bardeen and Walter Houser Brattain}, title = {Three-electrode circuit element utilizing semiconductive materials}, howpublished = {United States Patent 2,524,035}, year = {1950}, note = {Application filed June 17, 1948, \url{http://www.freepatentsonline.com/2524035.html}}, } @misc{Neu45, author = {John von Neumann}, title = {First Draft of a Report on the {EDVAC}}, year = {1945}, } @misc{Sch28, author = {Arthur Scherbius}, title = {Ciphering Machine}, howpublished = {United States Patent 1,657,411}, year = {1928}, note = {Application filed February 6, 1923, Serial No. 617,352, and in Germany February 11, 1922, \url{http://www.google.com/patents?vid=1657411}}, } @misc{aesspeed, author = {Daniel J. Bernstein}, title = {{AES} speed}, note = {\url{http://cr.yp.to/aes-speed.html} (accessed 2010-09-07)}, } @misc{ebacs, author = {Daniel J. Bernstein and Tanja Lange}, title = {{eBACS}: {ECRYPT} Benchmarking of Cryptographic Systems}, note = {\url{http://bench.cr.yp.to} (accessed 2010-09-07)}, } @misc{EFD, author = {Daniel J. Bernstein and Tanja Lange}, title = {Explicit-Formulas Database}, note = {\url{http://www.hyperelliptic.org/EFD/} (accessed 2010-09-07)}, } @misc{qhasm, author = {Daniel J. Bernstein}, title = {qhasm: tools to help write high-speed software}, note = {\url{http://cr.yp.to/qhasm.html} (accessed 2010-09-07)}, } @misc{decuda, author = {Wladimir J. van der Laan}, title = {Cubin Utilities}, year = {2007}, note = {\url{http://wiki.github.com/laanwj/decuda/}}, } @misc{cryptopp, author = {Wei Dai}, title = {{C}rypto++ library}, year = {2009}, note = {\url{http://www.cryptopp.com} (accessed 2010-09-07)}, } @misc{cryptopp-bench, author = {Wei Dai}, title = {{Crypto++} 5.6.0 Benchmarks}, year = {2009}, note = {\url{http://www.cryptopp.com/benchmarks.html} (accessed 2010-10-20)}, } @misc{mpich2, key = {mpich}, title = {{MPICH2} : High-performance and Widely Portable {MPI}}, note = {\url{http://www.mcs.anl.gov/research/projects/mpich2/} (accessed 2010-09-07)}, } @misc{gmp, key = {gmp}, title = {The {GNU MP} Bignum Library}, note = {\url{http://gmplib.org/} (accessed 2011-02-26)}, } @misc{nacl, author = {Tanja Lange and Daniel J. Bernstein}, title = {NaCl: Networking and Cryptography library}, year = {2010}, note = {\url{http://nacl.cr.yp.to/index.html} (accessed 2014-11-04)}, } @misc{openssl, author = {OpenSSL}, title = {{OpenSSL}: The Open Source toolkit for {SSL/TLS}}, note = {\url{http://www.openssl.org/} (accessed 2011-02-28)}, } @misc{openssl-bn, author = {OpenSSL}, title = {{OpenSSL}: Documents, bn(3)}, year = {2009}, note = {\url{http://www.openssl.org/docs/crypto/bn.html} (accessed 2011-02-26)}, } @misc{miracl, author = {{Shamus Software Ltd.}}, title = {Multiprecision Integer and Rational Arithmetic {C/C++} Library}, note = {\url{http://www.shamus.ie/} (accessed 2010-09-07)}, } @inproceedings{mpfq, author = {Pierrick Gaudry and Emmanuel Thom\'e}, title = {The {\tt mp}$\mathbb{F}_q$ library and implementing curve-based key exchanges}, booktitle = {Workshop Record of SPEED 2007: Software Performance Enhancement for Encryption and Decryption}, year = {2007}, note = {\url{http://www.hyperelliptic.org/SPEED/record.pdf}}, pages = {49--64}, } @misc{altivec, author = {Freescale}, title = {AltiVec}, note = {\url{http://www.freescale.com/altivec} (accessed 2010-09-07)}, } @misc{cell-sdk, author = {{IBM}}, title = {{IBM} {SDK} for Multicore Acceleration (version 3.1)}, note = {\url{http://www.ibm.com/developerworks/power/cell/downloads.html?S_TACT=105AGX16&S_CMP=LP} (accessed 2010-09-07)} } @misc{nobel-56, key = {Nobel}, title = {{The Nobel Prize in Physics 1956}}, note = {\url{http://nobelprize.org/nobel_prizes/physics/laureates/1956/} (accessed 2010-09-14)}, } @misc{curvecp, author = {Daniel J. Bernstein}, title = {{CurveCP}: Usable security for the {I}nternet}, year = {2011}, note = {\url{http://curvecp.org/} (accessed 2011-02-28)}, } @misc{debian-openssl, author = {{Software in the Public Interest, Inc.}}, title = {Debian Security Advisory, DSA-1571-1 openssl -- predictable random number generator}, year = {2008}, note = {\url{http://www.debian.org/security/2008/dsa-1571}}, } @misc{tor, key = {Tor}, title = {Tor Project: Anonymity Online}, note = {\url{https://www.torproject.org/} (accessed 2011-07-18)}, } @misc{cuda, author = {{NVIDIA}}, title = {CUDA Zone}, note = {\url{http://www.nvidia.com/object/cuda_home_new.html} (accessed 2010-09-07)}, } @misc{cccc, author = {Tanja Lange}, title = {Coding and {C}ryptography {C}omputer {C}luster ({CCCC})}, note = {\url{http://www.win.tue.nl/cccc/} (accessed 2010-12-04)}, } @misc{opendns, key = {OpenDNS}, title = {{OpenDNS | DNS}-based Web Security}, note = {\url{http://www.opendns.com/} (accessed 2011-07-18)}, } @misc{gdnsd, key = {gdnsd}, title = {gdnsd -- An Authorative {DNS} Server}, note = {\url{http://code.google.com/p/gdnsd/} (accessed 2011-07-18)}, }