library.bib 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220
  1. %% oldest and most popular article about known attacks on RSA.
  2. @article{20years,
  3. title = {Twenty years of attacks on the RSA cryptosystem},
  4. author = {Boneh, Dan and Rivest, Ron and Shamir, Adi and Adleman, Len and others},
  5. journal = {Notices of the AMS},
  6. volume = 46,
  7. number = 2,
  8. pages = {203--213},
  9. year = 1999
  10. }
  11. %% reccomended limits of p-q
  12. @misc{DSS2009,
  13. title={FIPS PUB 186-3: Digital Signature Standard},
  14. author={NIST},
  15. year=2009
  16. }
  17. %% here there's the descriptions for an efficient computation of fₚ(x) = y . y² ≡ x (mod p)
  18. %% [openssl implements it]
  19. @misc{ieee2001ieee,
  20. title = {IEEE P1363a D10 (Draft Version 10):
  21. Standard Specifications for Public Key Cryptography:
  22. Additional Techniques, IEEE P1363 Working Group, Working draft},
  23. author = {IEEE P1363 Working Group and others},
  24. year = 2001
  25. }
  26. @misc{rfc6176,
  27. title = {Prohibiting Secure Sockets Layer (SSL)
  28. Version 2.0},
  29. author = {S. Turner and T. Polk},
  30. publisher = {RFC Editor},
  31. url = {http://tools.ietf.org/html/rfc6176}
  32. }
  33. @misc{rfc4158,
  34. title = {RFC 4158: Certification Path Building},
  35. author = {M. Cooper and Y. Dzambasow and P. Hesse and S. Joseph and R. Nicholas},
  36. publisher = {RFC Editor},
  37. url = {http://tools.ietf.org/html/rfc4158}
  38. }
  39. @book{bombelli:algebra,
  40. title = {L'Algebra},
  41. author = {Rafael Bombelli},
  42. year = 1572,
  43. publisher = {Mathematical Association of America},
  44. url = {http://mathematica.sns.it/opere/9/}
  45. }
  46. @book{AOCPv2,
  47. author = {Knuth, Donald E.},
  48. title = {The Art of Computer Programming, Volume 2 (3rd Ed.):
  49. Seminumerical Algorithms},
  50. year = 1997,
  51. isbn = {0-201-89684-2},
  52. publisher = {Addison-Wesley Longman Publishing Co., Inc.},
  53. address = {Boston, MA, USA}
  54. }
  55. @book{MITalg,
  56. author = "T.~H. Cormen and C.~E. Leiserson and R.~L. Rivest and C.~Stein",
  57. edition = "3rd",
  58. publisher = "The MIT Press",
  59. title = "Introduction to Algorithms",
  60. year = 2009,
  61. isbn = "978-0-262-03384-8"
  62. }
  63. @book{Dijkstra:adop,
  64. author = {Dijkstra, Edsger Wybe},
  65. title = {A Discipline of Programming},
  66. year = 1997,
  67. isbn = {013215871X},
  68. edition = {1st},
  69. publisher = {Prentice Hall PTR},
  70. address = {Upper Saddle River, NJ, USA},
  71. }
  72. @book{riesel,
  73. author = {Riesel, Hans},
  74. title = {Prime Numbers and Computer Methods for Factorization},
  75. year = 1985,
  76. isbn = {0-8176-3291-3},
  77. publisher = {Birkhauser Boston Inc.},
  78. address = {Cambridge, MA, USA},
  79. }
  80. @book{Crandall,
  81. author = {Richard Crandall and Carl Pomerance and Richard Crandall and Carl Pomerance},
  82. title = {Prime numbers: a computational perspective. Second Edition},
  83. year = {2005},
  84. isbn = {0-8176-3291-3},
  85. publisher = {Birkhauser Boston Inc.},
  86. address = {Cambridge, MA, USA}
  87. }
  88. @article{wiener,
  89. author = {Michael J. Wiener},
  90. title = {Cryptanalysis of short RSA secret exponents},
  91. journal = {IEEE Transactions on Information Theory},
  92. year = 1990,
  93. volume = 36,
  94. pages = {553--558},
  95. url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.92.5261}
  96. }
  97. @article{pollard1974,
  98. author = {J. M. Pollard},
  99. title = {Theorems on factorization and primality testing},
  100. journal = {Mathematical Proceedings of the Cambridge Philosophical Society},
  101. volume = 76,
  102. issue = 03,
  103. month = 11,
  104. year = 1974,
  105. issn = {1469-8064},
  106. pages = {521--528},
  107. numpages = 8,
  108. doi = {10.1017/S0305004100049252},
  109. url = {http://journals.cambridge.org/action/displayAbstract?fromPage=online&aid=2074504}
  110. }
  111. @article{pollardMC,
  112. year={1975},
  113. issn={0006-3835},
  114. journal={BIT Numerical Mathematics},
  115. volume={15},
  116. number={3},
  117. doi={10.1007/BF01933667},
  118. title={A monte carlo method for factorization},
  119. url={http://dx.doi.org/10.1007/BF01933667},
  120. publisher={Kluwer Academic Publishers},
  121. author={Pollard, J.M.},
  122. pages={331-334},
  123. language={English}
  124. }
  125. @article{Williams:p+1,
  126. title = {A $p + 1$ Method of Factoring},
  127. author = {Williams, H. C.},
  128. journal = {Mathematics of Computation},
  129. volume = 39,
  130. number = 159,
  131. jstor_formatteddate = {Jul., 1982},
  132. pages = {pp. 225-234},
  133. url = {http://www.jstor.org/stable/2007633},
  134. ISSN = 00255718,
  135. language = {English},
  136. year = 1982,
  137. publisher = {American Mathematical Society},
  138. }
  139. @article{dixon,
  140. title = {Asymptotically Fast Factorization of Integers},
  141. author = {Dixon, John D.},
  142. journal = {Mathematics of Computation},
  143. volume = 36,
  144. number = 153,
  145. pages = {pp. 255-260},
  146. url = {http://www.jstor.org/stable/2007743},
  147. ISSN = 00255718,
  148. year = 1981
  149. }
  150. @article{pollard-brent,
  151. title = {An improved Monte Carlo Factorization algorithm},
  152. author = {Richard P. Brent},
  153. year=1980,
  154. issn={0006-3835},
  155. journal={BIT Numerical Mathematics},
  156. volume=20,
  157. number=2,
  158. url={http://dx.doi.org/10.1007/BF01933190},
  159. publisher={Kluwer Academic Publishers},
  160. pages={176-184},
  161. language={English}
  162. }
  163. @article{rsa,
  164. author = {Rivest, R. L. and Shamir, A. and Adleman, L.},
  165. title = {A Method for Obtaining Digital Signatures and Public-key Cryptosystems},
  166. journal = {Commun. ACM},
  167. issue_date = {Feb. 1978},
  168. volume = 21,
  169. number = 2,
  170. month = feb,
  171. year = 1978,
  172. issn = {0001-0782},
  173. pages = {120--126},
  174. numpages = 7,
  175. url = {http://doi.acm.org/10.1145/359340.359342},
  176. doi = {10.1145/359340.359342},
  177. acmid = 359342,
  178. publisher = {ACM},
  179. address = {New York, NY, USA}
  180. }
  181. @unpublished{SSLiverse,
  182. title= {Is the SSLiverse a safe place? An update on EFF's SSL Observatory project},
  183. author = {Jesse, Peter Eckersley},
  184. year = 2010,
  185. note = {[27c3]},
  186. url = {https://www.youtube.com/watch?v=DRjNV4YMvHI}
  187. }
  188. @article{morrison-brillhart,
  189. title={A method of factoring and the factorization of $mathcal{F}_7$},
  190. author={Morrison, Michael A and Brillhart, John},
  191. journal={Mathematics of Computation},
  192. volume=29,
  193. number=129,
  194. pages={183--205},
  195. year=1975
  196. }