B. Schneier, “Applied Cryptography Second Edition: Protocols, algorithms, and Source Code in C,” Oct. 18, 1995, pp. 34-41 and 480-481.* |
Kocher, P. “Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems.” in: Koblitz, N.,Advances in Cryptology—CRYPTO '96 (Berlin, Springer, 1996), pp. 104-113. |
Bellare, M. et al, “Incremental Cryptography” in; Desmedt, Y., Advances in Cryptology—CRYPTO '94 (Berlin, Springer, 1994) pp. 216-233. |
“Security Requirements for Cryptographic Modules,” Federal Information Processing Standards Publication (FIPS PUB) 140-1, U.S. Department of Commerce, National Institute of Standards and Technology, Jan. 1994. |
RSA Data Security, RSAREF Cryptographic Toolkit Source Code, File R_RANDOM.C, available from ftp://ftp.rsa.com. |
Krawczyk, H. et al, “HMAC: Keyed-Hashing for Message Authentication,” Network Working Group Request for Comments RFC 2104, Feb. 1997. |
Ryan, J. “Blinds for Thermodynamic Cipher Attacks,” unpublished material on the world wide web at http://www.cybertrace.com/thrmatak.html, Mar. 1996. |
Menezes, A.J., et al. Handbook of Applied Cryptography (CRC Press, 1996), pp. including 285-298, 312-319, 452-462, 475, 515-524. |
Bank Technology News. Cries of Wolf Over Smart Card Security? Faulkner & Gray, Inc. Nov. 1, 1996. |