RSA Data Security, RSAREF Cryptographic Toolkit Source Code, File R_Random.C, available from ftp://ftp.rsa.com. |
“Security Requirements for Cryptographic Modules,” Federal Information Processing Standards Publication (FIPS PUB) 140-1, U.S. Department of Commerce, National Institute of Standards and Technology, Jan. 1994. |
M. Bellare et al., “Incremental Cryptography: The Case of Hashing and Signing” in: Desmedt, Y., Advances in Cryptology—Crypto 94 Proceedings (Berlin, Springer, 1994) pp. 216-233. |
Paul C. Kocher, “Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems,” in Koblitz, N., Advances in Cryptography—Crypto '96 (Berlin, Springer, 1996), pp. 104-113. |
H. Krawczyk et al., “HMAC: Keyed-Hashing for Message Authentication,” Network Working Group Request for Comments RFC 2104, Feb. 1997. |
Alfred J. Menezes et al., “Handbook of Applied Cryptography” (CRC Press, 1996), pp. including 285-298, 312-319, 452-462, 475, 515-524. |
J. Ryan, “Blinds for Thermodynamic Cipher Attacks,” unpublished material on the World Wide Web at http://www.cybertrace.com/thrmatak.html, Mar. 1996. |
Bruce Schneier, “Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C,” Oct. 18, 1995, pp. 34-41 and 480-481. |
Bank Technology News. Cries of Wolf Over Smart Card Security? Faulkner & Gray, Inc. Nov. 1, 1996. |