library.bib 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265
  1. %% oldest and most popular article about known attacks on RSA.
  2. @article{20years,
  3. title = {Twenty years of attacks on the RSA cryptosystem},
  4. author = {Boneh, Dan and Rivest, Ron and Shamir, Adi and Adleman, Len and others},
  5. journal = {Notices of the AMS},
  6. volume = 46,
  7. number = 2,
  8. pages = {203--213},
  9. year = 1999
  10. }
  11. %% reccomended limits of p-q
  12. @misc{DSS2009,
  13. title={FIPS PUB 186-3: Digital Signature Standard},
  14. author={NIST},
  15. year=2009
  16. }
  17. %% here there's the descriptions for an efficient computation of fₚ(x) = y . y² ≡ x (mod p)
  18. %% [openssl implements it]
  19. @misc{ieee2001ieee,
  20. title = {IEEE P1363a D10 (Draft Version 10):
  21. Standard Specifications for Public Key Cryptography:
  22. Additional Techniques, IEEE P1363 Working Group, Working draft},
  23. author = {IEEE P1363 Working Group and others},
  24. year = 2001
  25. }
  26. @misc{rfc6176,
  27. title = {RFC6176: Prohibiting Secure Sockets Layer (SSL)
  28. Version 2.0},
  29. author = {S. Turner and T. Polk},
  30. publisher = {RFC Editor},
  31. url = {http://tools.ietf.org/html/rfc6176}
  32. }
  33. @misc{rfc4158,
  34. title = {RFC 4158: Certification Path Building},
  35. author = {M. Cooper and Y. Dzambasow and P. Hesse and S. Joseph and R. Nicholas},
  36. publisher = {RFC Editor},
  37. url = {http://tools.ietf.org/html/rfc4158}
  38. }
  39. @misc{rfc2246,
  40. title = {RFC 2246: The TLS protocol version 1.0},
  41. author = {T. Dierks and C. Allen},
  42. publisher = {RFC Editor},
  43. url = {https://www.ietf.org/rfc/rfc2246.txt}
  44. }
  45. @book{bombelli:algebra,
  46. title = {L'Algebra},
  47. author = {Rafael Bombelli},
  48. year = 1572,
  49. publisher = {Mathematical Association of America},
  50. url = {http://mathematica.sns.it/opere/9/}
  51. }
  52. @book{AOCPv2,
  53. author = {Knuth, Donald E.},
  54. title = {The Art of Computer Programming, Volume 2 (3rd Ed.):
  55. Seminumerical Algorithms},
  56. year = 1997,
  57. isbn = {0-201-89684-2},
  58. publisher = {Addison-Wesley Longman Publishing Co., Inc.},
  59. address = {Boston, MA, USA}
  60. }
  61. @book{MITalg,
  62. author = "T.~H. Cormen and C.~E. Leiserson and R.~L. Rivest and C.~Stein",
  63. edition = "3rd",
  64. publisher = "The MIT Press",
  65. title = "Introduction to Algorithms",
  66. year = 2009,
  67. isbn = "978-0-262-03384-8"
  68. }
  69. @book{Dijkstra:adop,
  70. author = {Dijkstra, Edsger Wybe},
  71. title = {A Discipline of Programming},
  72. year = 1997,
  73. isbn = {013215871X},
  74. edition = {1st},
  75. publisher = {Prentice Hall PTR},
  76. address = {Upper Saddle River, NJ, USA},
  77. }
  78. @book{riesel,
  79. author = {Riesel, Hans},
  80. title = {Prime Numbers and Computer Methods for Factorization},
  81. year = 1985,
  82. isbn = {0-8176-3291-3},
  83. publisher = {Birkhauser Boston Inc.},
  84. address = {Cambridge, MA, USA},
  85. }
  86. @book{Crandall,
  87. author = {Richard Crandall and Carl Pomerance and Richard Crandall and Carl Pomerance},
  88. title = {Prime numbers: a computational perspective. Second Edition},
  89. year = {2005},
  90. isbn = {0-8176-3291-3},
  91. publisher = {Birkhauser Boston Inc.},
  92. address = {Cambridge, MA, USA}
  93. }
  94. @article{wiener,
  95. author = {Michael J. Wiener},
  96. title = {Cryptanalysis of short RSA secret exponents},
  97. journal = {IEEE Transactions on Information Theory},
  98. year = 1990,
  99. volume = 36,
  100. pages = {553--558},
  101. url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.92.5261}
  102. }
  103. @article{sslpadding,
  104. author = {Serge Vaudenay},
  105. title = {Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS},
  106. booktitle = {Proceedings of In Advances in Cryptology - EUROCRYPT'02},
  107. year = {2002},
  108. pages = {534--546},
  109. publisher = {Springer-Verlag},
  110. url = {http://www.iacr.org/archive/eurocrypt2002/23320530/cbc02_e02d.pdf}
  111. }
  112. @article{pollard1974,
  113. author = {J. M. Pollard},
  114. title = {Theorems on factorization and primality testing},
  115. journal = {Mathematical Proceedings of the Cambridge Philosophical Society},
  116. volume = 76,
  117. issue = 03,
  118. month = 11,
  119. year = 1974,
  120. issn = {1469-8064},
  121. pages = {521--528},
  122. numpages = 8,
  123. doi = {10.1017/S0305004100049252},
  124. url = {http://journals.cambridge.org/action/displayAbstract?fromPage=online&aid=2074504}
  125. }
  126. @article{pollardMC,
  127. year={1975},
  128. issn={0006-3835},
  129. journal={BIT Numerical Mathematics},
  130. volume={15},
  131. number={3},
  132. doi={10.1007/BF01933667},
  133. title={A monte carlo method for factorization},
  134. url={http://dx.doi.org/10.1007/BF01933667},
  135. publisher={Kluwer Academic Publishers},
  136. author={Pollard, J.M.},
  137. pages={331-334},
  138. language={English}
  139. }
  140. @article{Williams:p+1,
  141. title = {A $p + 1$ Method of Factoring},
  142. author = {Williams, H. C.},
  143. journal = {Mathematics of Computation},
  144. volume = 39,
  145. number = 159,
  146. jstor_formatteddate = {Jul., 1982},
  147. pages = {pp. 225-234},
  148. url = {http://www.jstor.org/stable/2007633},
  149. ISSN = 00255718,
  150. language = {English},
  151. year = 1982,
  152. publisher = {American Mathematical Society},
  153. }
  154. @article{dixon,
  155. title = {Asymptotically Fast Factorization of Integers},
  156. author = {Dixon, John D.},
  157. journal = {Mathematics of Computation},
  158. volume = 36,
  159. number = 153,
  160. pages = {pp. 255-260},
  161. url = {http://www.jstor.org/stable/2007743},
  162. ISSN = 00255718,
  163. year = 1981
  164. }
  165. @article{pollard-brent,
  166. title = {An improved Monte Carlo Factorization algorithm},
  167. author = {Richard P. Brent},
  168. year=1980,
  169. issn={0006-3835},
  170. journal={BIT Numerical Mathematics},
  171. volume=20,
  172. number=2,
  173. url={http://dx.doi.org/10.1007/BF01933190},
  174. publisher={Kluwer Academic Publishers},
  175. pages={176-184},
  176. language={English}
  177. }
  178. @article{rsa,
  179. author = {Rivest, R. L. and Shamir, A. and Adleman, L.},
  180. title = {A Method for Obtaining Digital Signatures and Public-key Cryptosystems},
  181. journal = {Commun. ACM},
  182. issue_date = {Feb. 1978},
  183. volume = 21,
  184. number = 2,
  185. month = feb,
  186. year = 1978,
  187. issn = {0001-0782},
  188. pages = {120--126},
  189. numpages = 7,
  190. url = {http://doi.acm.org/10.1145/359340.359342},
  191. doi = {10.1145/359340.359342},
  192. acmid = 359342,
  193. publisher = {ACM},
  194. address = {New York, NY, USA}
  195. }
  196. @unpublished{SSLiverse,
  197. title= {Is the SSLiverse a safe place? An update on EFF's SSL Observatory project},
  198. author = {Jesse, Peter Eckersley},
  199. year = 2010,
  200. note = {[27c3]},
  201. url = {https://www.youtube.com/watch?v=DRjNV4YMvHI}
  202. }
  203. @article{morrison-brillhart,
  204. title={A method of factoring and the factorization of $\mathcal{F}_7$},
  205. author={Morrison, Michael A and Brillhart, John},
  206. journal={Mathematics of Computation},
  207. volume=29,
  208. number=129,
  209. pages={183--205},
  210. year=1975
  211. }
  212. @article{discretelogs,
  213. title={Discrete logarithms: The past and the future},
  214. author={Odlyzko, Andrew},
  215. journal={Towards a Quarter-Century of Public Key Cryptography},
  216. pages={59--75},
  217. year=2000,
  218. publisher={Springer US}
  219. }
  220. %% pollardrho parralelized.
  221. @article{brent:parallel,
  222. title={Parallel algorithms for integer factorisation},
  223. author={Brent, Richard P},
  224. journal={Number Theory and Cryptography (edited by JH Loxton), London Mathematical Society Lecture Note Series},
  225. volume={154},
  226. pages={26--37},
  227. year={1990}
  228. }
  229. %% <3 thanks dude
  230. @article{smeets,
  231. title={On continued fraction algorithms},
  232. author={Smeets, Ionica},
  233. year={2010},
  234. publisher={Mathematical Institute, Faculty of Science, Leiden University}
  235. }