Introduction to the Journal of Cryptographic Engineering

Editorial

References

  1. 1.
    Diffie W., Hellman M.E.: New directions in cryptography. IEEE Trans. Inform. Theory 22, 644–654 (1976)CrossRefMATHMathSciNetGoogle Scholar
  2. 2.
    Rivest R.L., Shamir A., Adleman L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)CrossRefMATHMathSciNetGoogle Scholar
  3. 3.
    Miller, V.: Uses of elliptic curves in cryptography. In: Williams, H.C. (ed.) Advances in Cryptology—CRYPTO 85, Proceedings. LNCS, vol. 218, pp. 417–426. Springer, Berlin (1985)Google Scholar
  4. 4.
    Koblitz N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)CrossRefMATHMathSciNetGoogle Scholar
  5. 5.
    Biham E., Shamir A.: Differential Cryptanalysis of the Data Encryption Standard. Springer, Berlin (1993)MATHGoogle Scholar
  6. 6.
    National Institute of Standards and Technology. Data Encryption Standard (DES), FIPS 46–3, October 1999Google Scholar
  7. 7.
    National Institute of Standards and Technology. Advanced Encryption Standard (AES), FIPS 197, November 2001Google Scholar
  8. 8.
    Daemen J., Rijmen V.: The Design of Rijndael. Springer, Berlin (2002)MATHGoogle Scholar
  9. 9.
    National Institute of Standards and Technology. Secure Hash Standard (SHS), FIPS 180–3, October 2008Google Scholar
  10. 10.
    National Institute of Standards and Technology. Digital Signature Standard (DSS), FIPS 186–3, June 2009Google Scholar
  11. 11.
    Rivest, R.L.: A description of a single-chip implementation of the RSA cipher. Lambda, 1(Fourth Quarter):14–18 (1980)Google Scholar
  12. 12.
    Rivest, R.L.: RSA chips (Past/Present/Future). In: Beth, T., Cot, N., Ingemarsson, I. (eds.) Advances in Cryptology. Proceedings of Eurocrypt 84. LNCS, vol. 209, pp. 159–165. Springer, Berlin (1984)Google Scholar
  13. 13.
    Montgomery P.L.: Modular multiplication without trial division. Math. Comput. 44(170), 519–521 (1985)CrossRefMATHGoogle Scholar
  14. 14.
    Koç Ç.K., Acar T., Kaliski B.S. Jr: Analyzing and comparing montgomery multiplication algorithms. IEEE Micro. 16(3), 26–33 (1996)CrossRefGoogle Scholar
  15. 15.
    Koç, Ç.K.: High-Speed RSA Implementation. Technical Report TR 201, RSA Laboratories, pp. 73, (1994)Google Scholar
  16. 16.
    Koç, Ç.K.: RSA Hardware Implementation. Technical Report TR 801, RSA Laboratories, pp. 30, April 1996Google Scholar
  17. 17.
    Kocher, P.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) Advances in Cryptology—CRYPTO 96. LNCS, vol. 1109, pp. 104–113. Springer, Berlin (1996)Google Scholar
  18. 18.
    Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) Advances in Cryptology—CRYPTO 99. LNCS, vol. 1666, pp. 388–397. Springer, Berlin (1999)Google Scholar
  19. 19.
    Koç, Ç.K., Paar, C. (eds.): Cryptographic Hardware and Embedded Systems. First International Workshop, Worcester, MA, USA. LNCS, vol. 1717. Springer, Berlin (1999)Google Scholar

Copyright information

© Springer-Verlag 2011

Authors and Affiliations

  1. 1.University of CaliforniaSanta BarbaraUSA
  2. 2.Istanbul Şehir UniversityIstanbulTurkey

Personalised recommendations