Changes between Version 59 and Version 60 of Bibliography
 Timestamp:
 20110720T12:56:39Z (13 years ago)
Legend:
 Unmodified
 Added
 Removed
 Modified

Bibliography
v59 v60 35 35 === Elliptic Curve Cryptography === 36 36 37 [http://tools.ietf.org/html/draftlochterpkixbrainpoolecc03 ECC Brainpool Standard Curves and Curve Generation] new elliptic curve parameters which come with a proof that they were generated deterministically and pseudorandomly from the first few bits of pi, as well as proofs that they are immune to certain other potential cryptographic weaknesses.37 [http://tools.ietf.org/html/draftlochterpkixbrainpoolecc03 ECC Brainpool Standard Curves and Curve Generation] new elliptic curve parameters which come with a proof that they were generated deterministically and pseudorandomly from the first few bits of Π, as well as proofs that they are immune to certain other potential cryptographic weaknesses. 38 38 39 39 [http://eprint.iacr.org/2009/389 On the Security of 1024bit RSA and 160bit Elliptic Curve Cryptography] crypto gurus try to predict whether 160bit elliptic curve crypto can be bruteforcecracked in the next decade. They conclude: "Right now most certainly not: 2.5 billion PS3s or equivalent devices (such as desktops) for a year is way out of reach. In a decade, very optimistically incorporating 10fold cryptanalytic advances, still millions of devices would be required, and a successful open community attack on 160bit ECC even by the year 2020 must be considered very unlikely." … … 114 114 [http://cr.yp.to/chacha.html ChaChaCha20] even better stream cipher; It might be slightly safer than Salsa20 and it is certainly slightly faster on some platforms, but slightly slower on others. However, the author of Salsa20 and !ChaChaCha20, Daniel J. Bernstein, seems to have settled on using Salsa20 (or a tweak of it named XSalsa20), so probably that is the one to use. 115 115 116 [https://online.tugraz.ac.at/tug_online/voe_main2.getvolltext?pDocumentNr=81263 Cryptanalysis of the Tiger Hash Function] by Mendel and R Ijmen116 [https://online.tugraz.ac.at/tug_online/voe_main2.getvolltext?pDocumentNr=81263 Cryptanalysis of the Tiger Hash Function] by Mendel and Rijmen