[Adam] , , : Understanding Public Key Infrastructure Concepts, Standards & Deployment, Macmillan Technical Publishing, Indianapolis, 1999.
[BaSh] , , : Algorithmic Number Theory, Vol. 1, Efficient Algorithms, MIT Press, Cambridge (MA), London, 1996.
[BCGP] , , , , , : The generation of random numbers that are probably prime, Journal of Cryptology, Vol. 1, No. 1, pp. 53–64, 1988.
[Bern] : Proving primality after Agrawal–Kayal–Saxena, Draft paper, http://cr.yp.to/papers.html#aks, 2003.
[Bies] , , : Elektronisch unterschreiben—die digitale Signatur in der Praxis, 2. Auflage, Hüthig, 1999.
[BiSh] , , : Differential cryptanalysis of DES-like cryptosystems, Journal of Cryptology, Vol. 4, No. 1, 1991, pp. 3–72.
[Blum] , , : A simple unpredictable pseudo-random number generator, SIAM Journal on Computing, Vol. 15, No. 2, 1986, pp. 364–383.
[BMBF] Bundesministerium für Bildung, Wissenschaft, Forschung und Technologie: IUKDG—Informations- und Kommunikationsdienste-Gesetz—Umsetzung und Evaluierung, Bonn, 1997.
[BMWT] Bundesministerium für Wirtschaft und Technologie: Entwurf eines Gesetzes über Rahmenbedingungen für elektronische Signaturen—Diskussionsentwurf zur Anhörung und Unterrichtung der beteiligten Fachkreise und Verbände, April 2000.
[Bon2] , , , : Why Textbook ElGamal and RSA Encryption are Insecure, Advances in Cryptology, ASIACRYPT 2000, Lecture Notes in Computer Science 1976, pp. 30–43, Springer-Verlag, 2000.
[Boss] , , , : Comparison of three modular reduction functions, in Advances in Cryptology, CRYPTO 93, Lecture Notes in Computer Science No. 773, pp. 175–186, Springer-Verlag, New York, 1994.
[BSI1] Bundesamt für Sicherheit in der Informationstechnik: Geeignete Algorithmen zur Erfüllung der Anforderungen nach §17 Abs. 1 through 3 SigG of 22 May 2001 in association with Anlage 1 Abschnitt I Nr. 2 SigV of 22 November 2001. Published 13 February 2004 in Bundesanzeiger Nr. 30, pp. 2537–2538.
[BSI2] Bundesamt für Sicherheit in der Informationstechnik: Anwendungshinweise und Interpretation zum Schema (AIS). Funktionalitätsklassen und Evaluations-methodologie für deterministische Zufallszahlengeneratoren. AIS 20. Version 1. Bonn, 1999.
[Burt] : Further investigations with the strong probable prime test, Mathematics of Computation, Volume 65, pp. 373–381, 1996.
[BuZi] , , : Fast recursive division, Forschungsbericht MPI-I-98-1-022, Max-Planck-Institut für Informatik, Saarbrücken, 1998.
[CJRR] , , , , : A Cautionary Note Regarding Evaluation of AES Candidates on Smart Cards, 1999, http://csrc.nist.gov/encryption/aes/round1/conf2/papers/chari.pdf
[Cohe] , : A Course in Computational Algebraic Number Theory, Springer-Verlag, Berlin, Heidelberg, 1993.
[Coro] , , , : On the security of RSA padding, ed. M. Wiener, in Advances in Cryptology, CRYPTO '99, Lecture Notes in Computer Science No. 1666, pp. 1–17, Springer-Verlag, New York, 1999.
[Cowi] , , , , , , : A world wide number field sieve factoring record: on to 512 bits, ed. K. Kim and T. Matsumoto, in Advances in Cryptology, ASIACRYPT '96, Lecture Notes in Computer Science No. 1163, pp. 382–394, Springer-Verlag, Berlin 1996.
[CrPa] , , : On the implementation of AKS-class primality tests, http://developer.apple.com/hardware/ ve/pdf/aks3.pdf. [DaLP] , , , : Average case error estimates for the strong probable prime test, Mathematics of Computation, Volume 61, pp. 177–194, 1993.
[DaRi] , , : AES-Proposal: Rijndael, Doc. Vers. 2.0, September 1999, http://www.nist.gov/encryption/aes
[DR02] , , : The Design of Rijndael: AES: The Advanced Encryption Standard, Springer-Verlag, Heidelberg, 2002.
[Dene] , : Software-Engineering, Springer-Verlag, Heidelberg, 1991. [deWe] , : Cryptanalysis of RSA with small prime difference, Cryptology ePrint Archive, Report 2000/016, 2000.
[Diff] , , : New Directions in Cryptography, IEEE Trans. Information Theory, pp. 644–654, Vol. IT-22, 1976.
[DoBP] , , , : RIPEMD-160, a strengthened version of RIPEMD, ed. D. Gollman, in Fast Software Encryption, Third International Workshop, Lecture Notes in Computer Science No. 1039, pp. 71–82, Springer-Verlag, Berlin, Heidelberg, 1996.
[DuKa] , , : A cryptographic library for the Motorola DSP56000, in Advances in Cryptology, EUROCRYPT '90, Lecture Notes in Computer Science No. 473, pp. 230–244, Springer-Verlag, New York, 1990.
[Dunc] , : Advanced OS/2-Programming: The Microsoft Guide to the OS/2-Kernel for Assembly Language and C Programmers, Microsoft Press, Redmond, Washington, 1981.
[Elli] : The Possibility of Non-Secret Encryption, 1970, http://www.cesg.gov.uk/htmsite/publications/media/possnse.pdf.
[EESSI] European Electronic Signature Standardization Initiative: Algorithms and Parameters for Secure Electronic Signatures, V.1.44 DRAFT, 2001.
[EU99] Richtlinie 1999/93/EG des Europäischen Parlaments und des Rates vom 13. Dezember 1999 über gemeinschaftliche Rahmenbedingungen für elektronische Signaturen.
[Evan] , : Splint Users Guide, Version 3.1.1-1, Secure Programming Group University of Virginia Department of Computer Science, June 2003.
[Fiat] , , : How to prove yourself: practical solutions to identification and signature problems, in Advances in Cryptology, CRYPTO '86, Lecture Notes in Computer Science No. 263, pp. 186–194, Springer-Verlag, New York, 1987.
[FIPS] Federal Information Processing Standard Publication 140 - 1: Security requirements for cryptographic modules, US Department of Commerce/ National Institute of Standards and Technology (NIST), 1994.
[F180] National Institute of Standards and Technology: Secure Hash Algorithm, Federal Information Processing Standard 180-2, NIST, 2001.
[FI81] National Institute of Standards and Technology: DES Modes of Operation, Federal Information Processing Standard 81, NIST, 1980.
[F197] National Institute of Standards and Technology: ADVANCED ENCRYPTION STANDARD (AES), Federal Information Processing Standards Publication 197, November 26, 2001
[Fisc] , , : Einführung in die Algebra, Teubner, 1974. [Fors] , : Algorithmische Zahlenthorie, Vieweg, Braunschweig, 1996.
[Glad] , , , , editors: Digitale Signatur & Sicherheitssensitive Anwendungen, DuD-Fachbeiträge, Vieweg, 1995. [Gldm] , : A Specification for Rijndael, the AES Algorithm, http://fp.gladman.plus.com, 2001.
[GoPa] , , Jacques Patarin DES and differential power analysis, Proceedings of CHES'99, Lecture Notes in Computer Science, No. 1717, Springer-Verlag, 1999.
[Gord] : Strong primes are easy to find, Advances in Cryptology, Proceedings of Eurocrypt '84, pp. 216–223, Springer-Verlag, Berlin, Heidelberg, 1985.
[Gut1] , : Software generation of Practically Strong Random Numbers, Usenix Security Symposium, 1998
[Hatt] : : Developing Software for High-Integrity and Safety-Critical Systems, McGraw-Hill, London, 1995.
[HKW] , , , : Mathematische Methoden der Kryptoanalyse, DuD-Fachbeiträge, Vieweg, Braunschweig, 1985.
[IEEE] IEEE P1363 / D13: Standard Specifications for Public Key Cryptography, Draft Version 13, November 1999.
[ISO1] ISO/IEC 10118-3: Information Technology—Security Techniques—Hash-Functions. Part 3: Dedicated Hash-Functions, CD, 1996.
[ISO2] ISO/IEC 9796: Information Technology—Security Techniques—Digital Signature Scheme giving Message Recovery, 1991.
[ISO3] ISO/IEC 9796-2: Information Technology—Security Techniques—Digital Signature Scheme Giving Message Recovery, Part 2: Mechanisms Using a Hash-Function, 1997.
[Koeu] Koeune, F., G. Hachez, J.-J. Quisquater: Implementation of Four AES Candidates on Two Smart Cards, UCL Crypto Group, 2000.
[Knut] , : The Art of Computer Programming, Vol. 2: Seminumerical Algorithms, 3rd Edition, Addison-Wesley, Reading, MA, 1998.
[KoJJ] , , , : Introduction to Differential Power Analysis and Related Attacks, 1998, http://www.cryptography.com/dpa/technical/
[Matt] , : Suggestions for Random Number Generation in Software, RSA Data Security Engineering Report, December 1995.
[Mied] , : Signaturregulierung im Rechtsvergleich, Der Elektronische Rechtsverkehr 1, Nomos Verlagsgesellschaft Baden-Baden, 2000.
[Mont] , : Modular multiplication without trial division, Mathematics of Computation, pp. 519–521, 44 (170), 1985.
[N38A] National Institute of Standards and Technology: Recommendation for Block Cipher Modes of Operation, NIST Special Publication 800-38A, 2001.
[N38B] National Institute of Standards and Technology: DRAFT Recommendation for Block Cipher Modes of Operation: The RMAC Authentication Mode, NIST Special Publication 800-38B, 2002.
[N38C] National Institute of Standards and Technology: Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality, NIST Special Publication 800-38C, 2004.
[NIST] , , , , , , , : Report on the Development of the Advanced Encryption Standard, National Institute of Standards and Technology, 2000.
[Nive] , , : Einführung in die Zahlentheorie vols. I und II, Bibliographisches Institut, Mannheim, 1972.
[Petz] , : Programming Windows: The Microsoft Guide to Writing Applications for Windows 3.1, Microsoft Press, Redmond, Washington, 1992.
[Pren] , : Analysis and Design of Cryptographic Hash Functions, Dissertation at the Katholieke Universiteit Leuven, 1993.
[Rabi] , : Digital Signatures and Public-Key Functions as Intractable as Factorization, MIT Laboratory for Computer Science, Technical Report, MIT/LCS/TR-212, 1979.
[RDS1] RSA Laboratories: Public Key Cryptography Standards, PKCS #1: RSA Encryption, Version 2.1, RSA Security Inc., 2002.
[RDS2] RSA Security, Inc.: Recent Results on Signature Forgery, RSA Laboratories Bulletin, 1999, http://www.rsasecurity.com/.
[RegT] Regulierungsbehörde für Telekommunikation und Post (RegTP): Bekanntmachung zur elektronischen Signatur nach dem Signaturgesetz und Signaturverordnung (Übersicht über geeignete Algorithmen), January 2, 2005.
[Rive] , , , : A method for obtaining digital signatures, Communications of the ACM 21, pp. 120–126, 1978.
[Sali] , : Sichere Implementierung und Integration kryptographischer Softwarekomponenten am Beispiel der Zufallszahlengenerierung, Diplomarbeit an der Universität Bonn, 2002.
[Scho] , : A lower bound on the length of addition chains, Theoretical Computer Science, pp. 229–242, Vol. 1, 1975.
[Schr] , : Number Theory in Science and Communications, 3rd edition, Springer-Verlag, Berlin, Heidelberg, 1997.
[SigG] Gesetz über Rahmenbedingungen für elektronische Signaturen und zur Änderung weiterer Vorschriften, at http://www.iid.de/iukdg, 2001.
[Skal] , : Multiple precision arithmetic in C, edited by Dale Schumacher, in Software Solutions in C, Academic Press, pp. 343–454, 1994.
[Squa] , , , : The block cipher square, Fast Software Encryption, Lecture Notes in Computer Science No. 1267, pp. 149–165, Springer-Verlag, 1997.
[Wien] , : Cryptanalysis of short RSA secret exponents, in IEEE Transactions on Information Theory, 36(3): pp. 553–558, 1990.