6. References (参考文献)
6. References (参考文献)
6.1. Normative References (规范性参考文献)
[FIPS-186-4]
National Institute of Standards and Technology, "Digital Signature Standard (DSS)", Federal Information Processing Standards Publication (FIPS PUB) 186-4, July 2013.
[RFC2104]
Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed-Hashing for Message Authentication", RFC 2104, February 1997.
[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997.
[SEC1]
Certicom Research, "SEC 1: Elliptic Curve Cryptography (Version 2.0)", May 2009.
[SP800-90A]
National Institute of Standards and Technology, "Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised)", NIST Special Publication 800-90A, January 2012.
[X9.62]
American National Standards Institute, "Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)", ANSI X9.62-2005, November 2005.
6.2. Informative References (信息性参考文献)
[B2006]
Bellare, M., "New Proofs for NMAC and HMAC: Security without Collision-Resistance", Preliminary Version, in Proceedings of Crypto 2006, Lecture Notes in Computer Science, vol. 4117, 2006.
[BDLSY2011]
Bernstein, D., Duif, N., Lange, T., Schwabe, P., and B. Yang, "High-speed high-security signatures", Journal of Cryptographic Engineering vol. 2, pp. 77-89, September 2011.
[H2008]
Hirose, S., "Security Analysis of DRBG Using HMAC in NIST SP 800-90", IEICE Transactions 91-A(3), pp. 763-770, 2008.
[ISO-9796-2]
International Organization for Standardization, "Information technology - Security techniques - Digital signature schemes giving message recovery - Part 2: Integer factorization based mechanisms", ISO/IEC 9796-2, 2010.
[LN2009]
Liskov, M. and S. Naor, "The Strengthening Lemma Revisited", November 2009, http://arxiv.org/abs/0910.5757.
[NML1997]
Naccache, D., M'Raihi, D., and F. Levy-dit-Vehel, "Procede cryptographique de signature numerique", French patent application FR2764738A1, filed December 20, 1997.
[RFC3447]
Jonsson, J. and B. Kaliski, "Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1", RFC 3447, February 2003.
[RFC4251]
Ylonen, T. and C. Lonvick, Ed., "The Secure Shell (SSH) Protocol Architecture", RFC 4251, January 2006.
[RFC5246]
Dierks, T. and E. Rescorla, "The Transport Layer Security (TLS) Protocol Version 1.2", RFC 5246, August 2008.
[RFC5280]
Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., and W. Polk, "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile", RFC 5280, May 2008.
[RFC5652]
Housley, R., "Cryptographic Message Syntax (CMS)", STD 70, RFC 5652, September 2009.