library.bib 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171
  1. %% oldest and most popular article about known attacks on RSA.
  2. @article{20years,
  3. title = {Twenty years of attacks on the RSA cryptosystem},
  4. author = {Boneh, Dan and Rivest, Ron and Shamir, Adi and Adleman, Len and others},
  5. journal = {Notices of the AMS},
  6. volume = 46,
  7. number = 2,
  8. pages = {203--213},
  9. year = 1999
  10. }
  11. %% reccomended limits of p-q
  12. @misc{DSS2009,
  13. title={FIPS PUB 186-3: Digital Signature Standard},
  14. author={NIST},
  15. year=2009
  16. }
  17. %% here there's the descriptions for an efficient computation of fₚ(x) = y . y² ≡ x (mod p)
  18. %% [openssl implements it]
  19. @misc{ieee2001ieee,
  20. title = {IEEE P1363a D10 (Draft Version 10):
  21. Standard Specifications for Public Key Cryptography:
  22. Additional Techniques, IEEE P1363 Working Group, Working draft},
  23. author = {IEEE P1363 Working Group and others},
  24. year = 2001
  25. }
  26. @misc{rfc6176,
  27. title = {Prohibiting Secure Sockets Layer (SSL)
  28. Version 2.0},
  29. author = {S. Turner and T. Polk},
  30. publisher = {RFC Editor},
  31. url = {http://tools.ietf.org/html/rfc6176}
  32. }
  33. @book{bombelli:algebra,
  34. title = {L'Algebra},
  35. author = {Rafael Bombelli},
  36. year = 1572,
  37. publisher = {Mathematical Association of America},
  38. url = {http://mathematica.sns.it/opere/9/}
  39. }
  40. @book{AOCPv2,
  41. author = {Knuth, Donald E.},
  42. title = {The Art of Computer Programming, Volume 2 (3rd Ed.):
  43. Seminumerical Algorithms},
  44. year = 1997,
  45. isbn = {0-201-89684-2},
  46. publisher = {Addison-Wesley Longman Publishing Co., Inc.},
  47. address = {Boston, MA, USA}
  48. }
  49. @book{MITalg,
  50. author = "T.~H. Cormen and C.~E. Leiserson and R.~L. Rivest and C.~Stein",
  51. edition = "3rd",
  52. publisher = "The MIT Press",
  53. title = "Introduction to Algorithms",
  54. year = 2009,
  55. isbn = "978-0-262-03384-8"
  56. }
  57. @book{Dijkstra:adop,
  58. author = {Dijkstra, Edsger Wybe},
  59. title = {A Discipline of Programming},
  60. year = 1997,
  61. isbn = {013215871X},
  62. edition = {1st},
  63. publisher = {Prentice Hall PTR},
  64. address = {Upper Saddle River, NJ, USA},
  65. }
  66. @book{riesel,
  67. author = {Riesel, Hans},
  68. title = {Prime Numbers and Computer Methods for Factorization},
  69. year = 1985,
  70. isbn = {0-8176-3291-3},
  71. publisher = {Birkhauser Boston Inc.},
  72. address = {Cambridge, MA, USA},
  73. }
  74. @book{Crandall,
  75. author = {Richard Crandall and Carl Pomerance and Richard Crandall and Carl Pomerance},
  76. title = {Prime numbers: a computational perspective. Second Edition},
  77. year = {2005}
  78. }
  79. @article{wiener,
  80. author = {Michael J. Wiener},
  81. title = {Cryptanalysis of short RSA secret exponents},
  82. journal = {IEEE Transactions on Information Theory},
  83. year = 1990,
  84. volume = 36,
  85. pages = {553--558},
  86. url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.92.5261}
  87. }
  88. @article{pollard1974,
  89. author = {J. M. Pollard},
  90. title = {Theorems on factorization and primality testing},
  91. journal = {Mathematical Proceedings of the Cambridge Philosophical Society},
  92. volume = 76,
  93. issue = 03,
  94. month = 11,
  95. year = 1974,
  96. issn = {1469-8064},
  97. pages = {521--528},
  98. numpages = 8,
  99. doi = {10.1017/S0305004100049252},
  100. url = {http://journals.cambridge.org/action/displayAbstract?fromPage=online&aid=2074504}
  101. }
  102. @article{Williams:p+1,
  103. title = {A $p + 1$ Method of Factoring},
  104. author = {Williams, H. C.},
  105. journal = {Mathematics of Computation},
  106. volume = 39,
  107. number = 159,
  108. jstor_formatteddate = {Jul., 1982},
  109. pages = {pp. 225-234},
  110. url = {http://www.jstor.org/stable/2007633},
  111. ISSN = 00255718,
  112. language = {English},
  113. year = 1982,
  114. publisher = {American Mathematical Society},
  115. }
  116. @article{dixon,
  117. title = {Asymptotically Fast Factorization of Integers},
  118. author = {Dixon, John D.},
  119. journal = {Mathematics of Computation},
  120. volume = 36,
  121. number = 153,
  122. pages = {pp. 255-260},
  123. url = {http://www.jstor.org/stable/2007743},
  124. ISSN = 00255718,
  125. year = 1981
  126. }
  127. @article{rsa,
  128. author = {Rivest, R. L. and Shamir, A. and Adleman, L.},
  129. title = {A Method for Obtaining Digital Signatures and Public-key Cryptosystems},
  130. journal = {Commun. ACM},
  131. issue_date = {Feb. 1978},
  132. volume = 21,
  133. number = 2,
  134. month = feb,
  135. year = 1978,
  136. issn = {0001-0782},
  137. pages = {120--126},
  138. numpages = 7,
  139. url = {http://doi.acm.org/10.1145/359340.359342},
  140. doi = {10.1145/359340.359342},
  141. acmid = 359342,
  142. publisher = {ACM},
  143. address = {New York, NY, USA}
  144. }
  145. @unpublished{SSLiverse,
  146. title= {Is the SSLiverse a safe place? An update on EFF's SSL Observatory project},
  147. author = {Jesse, Peter Eckersley},
  148. year = 2010,
  149. note = {[27c3]},
  150. url = {https://www.youtube.com/watch?v=DRjNV4YMvHI}
  151. }