Bibliography#
This bibliography provides a list of publications that might be helpful to you in using cryptography functions of Intel® Cryptography Primitives Library.
- [3GPP 35.202]#
3GPP TS 35.202 V3.1.1 (2001-07). 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Specification of the 3GPP Confidentiality and Integrity Algorithms; 3G Security; Document 2: KASUMI Specification (Release 1999). Available from https://www.3gpp.org/specifications-technologies/specifications-by-series/confidentiality-algorithms.
- [3GPP 2006]#
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. Document 2: SNOW 3G Specification. September 2006. Available from http://www.gsmworld.com/using/algorithms/docs/snow_3g_spec.pdf.
- [AC]#
Schneier, Bruce. Applied Cryptography. Protocols, Algorithms, and Source Code in C. Second Edition. John Wiley & Sons, Inc., 1996.
- [AES]#
Daemen, Joan, and Vincent Rijmen. The Rijndael Block Cipher. AES Proposal. Available from http://www.nist.gov/aes.
- [ANSI]#
ANSI X9.62-1998 Public Key Cryptography for the Financial Services Industry: the Elliptic Curve Digital Signature Algorithm (ECDSA). American Bankers Association, 1999.
- [ANT]#
Cohen, Henri. A Course in Computational Algebraic Number Theory. Springer, 1998.
- [EC]#
Koblitz, Neal. Introduction to Elliptic Curves and Modular Forms. Springer, 1993.
- [EHCC]#
Cohen, Henri, and Gerald Frey. Handbook of Elliptic and Hyperelliptic Curve Cryprography. Chapman & Hall/CRC, 2006.
- [FIPS PUB 46-3]#
Federal Information Processing Standards Publications, FIPS PUB 46-3. Data Encryption Standard (DES), October 1999. Available from http://csrc.nist.gov/publications/.
- [FIPS PUB 113]#
Federal Information Processing Standards Publications, FIPS PUB 113. Computer Data Authentication, May 1985. Available from http://csrc.nist.gov/publications/.
- [FIPS PUB 180-2]#
Federal Information Processing Standards Publications, FIPS PUB 180-2. Secure Hash Standard, August 2002. Available from http://csrc.nist.gov/publications/.
- [FIPS PUB 180-4]#
Federal Information Processing Standards Publications, FIPS PUB 180-4. Secure Hash Standard (SHS), March 2012. Available from http://csrc.nist.gov/publications/.
- [FIPS PUB 186-2]#
Federal Information Processing Standards Publications, FIPS PUB 186-2. Digital Signature Standard (DSS), January 2000. Available from http://csrc.nist.gov/publications/.
- [FIPS PUB 197]#
Federal Information Processing Standards Publications, FIPS PUB 197. Advanced Encryption Standard (AES), November 2001. Available from http://csrc.nist.gov/publications/.
- [FIPS PUB 198-1]#
Federal Information Processing Standards Publications, FIPS PUB 198. The Key-Hash Message Authentication Code (HMAC), July 2008. Available from http://csrc.nist.gov/publications/.
- [FIPS PUB 202]#
Federal Information Processing Standards Publications, FIPS PUB 202. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, August 2015. Available from http://csrc.nist.gov/publications/.
- [IEEE P1363A]#
Standard Specifications for Public-Key Cryptography: Additional Techniques. May, 2000. Working Draft.
- [IEEE P1619]#
IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices. April 2008.
- [INTEL ARCH]#
Intel® 64 and IA-32 Architectures Software Developer’s Manual . Volume 1: Basic Architecture. Available from http://www.intel.com/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-software-developer-vol-1-manual.pdf.
- [ISO/IEC 11889-4]#
ISO/IEC 11889-4:2015 Information technology - TPM Library - Part 4: Supporting Routines.
- [LMS]#
Leighton-Micali Hash-Based Signatures. Available from https://www.rfc-editor.org/info/rfc8554.
- [NIST SP 800-38A]#
Recommendation for Block Cipher Modes of Operation - Methods and Techniques. NIST Special Publication 800-38A, December 2001. Available from http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf.
- [NIST SP 800-38A A.]#
Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode. Addendum to NIST Special Publication 800-38A, October 2010. Available from http://doi.org/10.6028/NIST.SP.800-38A-Add.
- [NIST SP 800-38B]#
Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. NIST Special Publication 800-38B, May 2005. Available from http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf.
- [NIST SP 800-38C]#
Draft Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. NIST Special Publication 800-38C, September 2003. Available from http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C.pdf.
- [NIST SP 800-38D]#
Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC. NIST Special Publication 800-38D, November 2007. Available from https://csrc.nist.gov/pubs/sp/800/38/d/final.
- [NIST SP 800-38E]#
Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices. NIST Special Publication 800-38E, January, 2010. Available from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf
- [PKCS 1.2.1]#
RSA Laboratories. PKCS #1 v2.1: RSA Cryptography Standard. June 2002. Available from https://www.rfc-editor.org/info/rfc3447.
- [PKCS 7]#
RSA Laboratories. PKCS #7: Cryptographic Message Syntax Standard. An RSA Laboratories Technical Note Version 1.5 Revised, November 1, 1993.
- [RC5]#
Rivest, Ronald L. The RC5 Encryption Algorithm. Proceedings of the 1994 Leuven Workshop on Algorithms (Springer), 1994.
- [RFC 1321]#
Rivest, Ronald L. The MD5 Message-Digest Algorithm. RFC 1321, MIT and RSA Data Security, Inc, April 1992. Available from https://www.rfc-editor.org/info/rfc1321.
- [RFC 2401]#
Krawczyk, Hugo, Mihir Bellare, and Ran Canetti. HMAC: Keyed-Hashing for Message Authentication. RFC 2401, February 1997. Available from https://www.rfc-editor.org/info/rfc2104.
- [RFC 3566]#
Frankel, Sheila, and Howard C. Herbert. The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec. RFC 3566, September 1996. Available from https://www.rfc-editor.org/info/rfc3566.
- [RFC 5297]#
D. Harkins. Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES). RFC 5297, October 2008. Available from https://www.rfc-editor.org/info/rfc5297.
- [RFC 5869]#
H. Krawczyk, P. Eronen. HMAC-based Extract-and-Expand Key Derivation Function (HKDF). RFC 5869, May 2010. Available from https://www.rfc-editor.org/info/rfc5869.
- [SEC1]#
SEC1: Elliptic Curve Cryptography. Standards for Efficient Cryptography Group, September 2000. Available from https://www.secg.org/sec1-v2.pdf.
- [SEC2]#
SEC2: Recommended Elliptic Curve Domain Parameters. Standards for Efficient Cryptography Group, September 2000. Available from https://www.secg.org/sec2-v2.pdf.
- [SM2]#
SM2 Digital Signature Algorithm. Available from http://tools.ietf.org/html/draft-shen-sm2-ecdsa-01.
- [SM2 PKE]#
SM2 Public Key Cryptographic Algorithm Based on Elliptic Curves. Available from https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02
- [SM3]#
SM3 Hash Function. Available from https://tools.ietf.org/html/draft-shen-sm3-hash-00.
- [SMS4]#
SMS4 Encryption Algorithm for Wireless Networks. Available from http://eprint.iacr.org/2008/329.pdf.
- [X9.42]#
X9.42-2003: Public Key Cryptography for the Financial Services Industry: Agreement of Symmetric Keys Using Discrete Logarithm Cryptography. American National Standards Institute, 2003.
- [XMSS]#
XMSS: eXtended Merkle Signature Scheme. Available from https://www.rfc-editor.org/info/rfc8391.