More work on BiBTeX
[ach-master.git] / src / security.bib
1 @string {J_AM =
2     {\hyperref{http://stackexchange.com/}{}{}{Proceedings}
3      \hyperref{http://stackexchange.com/}{}{}{of}
4      \hyperref{http://stackexchange.com/}{}{}{Symposia}
5      \hyperref{http://stackexchange.com/}{}{}{in}
6      \hyperref{http://stackexchange.com/}{}{}{Applied}
7      \hyperref{http://stackexchange.com/}{}{}{Mathematics}}
8 }
9 @string {I_PolarSSL =
10     {\hyperref{http://polarssl.org/}{}{}{PolarSSL}}
11 }
12 @string {I_Stackexchange =
13     {\hyperref{http://stackexchange.com/}{}{}{Stackexchange}
14      \hyperref{http://stackexchange.com/}{}{}{Q\&A}
15      \hyperref{http://stackexchange.com/}{}{}{Site}}
16 }
17 @string {I_Wikipedia =
18     {\hyperref{http://wikipedia.org/}{}{}{Wikipedia}}
19 }
20 @string {I_Wolfram =
21     {\hyperref{http://mathworld.wolfram.com/}{}{}{Wolfram} 
22      \hyperref{http://mathworld.wolfram.com/}{}{}{Research} 
23      \hyperref{http://mathworld.wolfram.com/}{}{}{Mathworld}}
24 }
25 @string {J_TOMACS =
26     {\hyperref{http://tomacs.acm.org/}{}{}{ACM}
27      \hyperref{http://tomacs.acm.org/}{}{}{Transactions}
28      \hyperref{http://tomacs.acm.org/}{}{}{on}
29      \hyperref{http://tomacs.acm.org/}{}{}{Modeling}
30      \hyperref{http://tomacs.acm.org/}{}{}{and}
31      \hyperref{http://tomacs.acm.org/}{}{}{Computer}
32      \hyperref{http://tomacs.acm.org/}{}{}{Simulation}}
33 }
34
35 @inproceedings{HDWH12,
36    author    = {Nadia Heninger and Zakir Durumeric and Eric Wustrow
37                 and J. Alex Halderman},
38    title     = {Mining Your {P}s and {Q}s: {D}etection of Widespread Weak Keys
39                 in Network Devices},
40   booktitle  = {Proceedings of the 21st {USENIX} Security Symposium},
41   month      = aug,
42   year       = {2012},
43   url        = {https://factorable.net/weakkeys12.extended.pdf},
44 }
45
46 @techreport{Wikipedia:/dev/random,
47    key       = {Wikipedia:/dev/random},
48    title     = {/dev/random},
49    institution = I_Wikipedia,
50    year      = {2013},
51    month     = Dec,
52    type      = {Wikipedia},
53    url       = {http://en.wikipedia.org/wiki/dev/random},
54    note      = {Accessed 2013-12-06},
55 }
56
57 @article{SS03,
58    author    = {A. Seznec and N. Sendrier},
59    title     = {{HAVEGE}: a user-level software heuristic for generating
60                 empirically strong random numbers},
61    journal   = J_TOMACS,
62    year      = {2003},
63    volume    = {13},
64    number    = {4},
65    month     = Oct,
66    pages     = {334-346},
67    url       = {http://www.irisa.fr/caps/projects/hipsor/scripts/down.php?id=13781296&ext=.pdf},
68 }
69
70 @techreport{Eng11,
71    author    = {Jakob Engblom},
72    title     = {Evaluating {HAVEGE} Randomness},
73    year      = {2011},
74    month     = Feb,
75    type      = {Blog: Observations from Uppsala},
76    url       = {http://jakob.engbloms.se/archives/1374},
77 }
78
79 @techreport{POL11,
80    key       = {POL},
81    title     = {Weak random number generation within virtualized
82                 environments},
83    institution = I_PolarSSL,
84    year      = {2011},
85    month     = Dec,
86    type      = {Security Advisory},
87    number    = {2011-02},
88    url       = {https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2011-02},
89 }
90
91 @techreport{HAV13a,
92    key       = {HAV},
93    title     = {haveged -- A simple entropy daemon},
94    year      = {2013},
95    month     = Dec,
96    type      = {Software Homepage},
97    url       = {http://www.issihosts.com/haveged/},
98    note      = {Accessed 2013-12-06},
99 }
100
101 @techreport{HAV13b,
102    key       = {HAV},
103    title     = {haveged -- A simple entropy daemon: Runtime Testing},
104    year      = {2013},
105    month     = Dec,
106    type      = {Technical Background},
107    url       = {http://www.issihosts.com/haveged/},
108    note      = {Accessed 2013-12-06},
109 }
110
111 @book{katz2008introduction,
112   title={Introduction to modern cryptography},
113   author={Katz, J. and Lindell, Y.},
114   isbn={9781584885511},
115   lccn={2007017861},
116   series={Chapman and Hall/CRC Cryptography and Network Security Series},
117   url={http://books.google.at/books?id=WIc\_AQAAIAAJ},
118   year={2008},
119   publisher={Chapman \& Hall/CRC}
120 }
121
122 @techreport{DJBSC,
123    key       = {DJB},
124    title     = {SafeCurves: choosing safe curves for elliptic-curve cryptography},
125    year      = {2013},
126    month     = Dec,
127    type      = {Technical Background},
128    url       = {http://safecurves.cr.yp.to/rigid.html},
129    note      = {Accessed 2013-12-09},
130 }
131
132 @techreport{Wikipedia:ExportCipher,
133    key       = {Wikipedia:ExportCipher},
134    title     = {Export of cryptography in the {U}nited {S}tates},
135    institution = I_Wikipedia,
136    year      = {2013},
137    month     = Dec,
138    type      = {Wikipedia},
139    url       = {http://en.wikipedia.org/wiki/Export_of_cryptography_in_the_United_States},
140    note      = {Accessed 2013-12-09},
141 }
142
143 @techreport{Wikipedia:Tempest,
144    key       = {Wikipedia:Tempest},
145    title     = {Tempest (codename)},
146    institution = I_Wikipedia,
147    year      = {2013},
148    month     = Dec,
149    type      = {Wikipedia},
150    url       = {https://en.wikipedia.org/wiki/Tempest_(codename)},
151    note      = {Accessed 2013-12-12},
152 }
153
154 @techreport{Wikipedia:Discrete,
155    key       = {Wikipedia:Discrete},
156    title     = {Discrete logarithm},
157    institution = I_Wikipedia,
158    year      = {2013},
159    month     = Dec,
160    type      = {Wikipedia},
161    url       = {https://en.wikipedia.org/wiki/Discrete_logarithm},
162    note      = {Accessed 2013-12-12},
163 }
164
165 @techreport{Wikipedia:Certificate,
166    key       = {Wikipedia:Certificate},
167    title     = {Certificate Policy},
168    institution = I_Wikipedia,
169    year      = {2013},
170    month     = Dec,
171    type      = {Wikipedia},
172    url       = {https://en.wikipedia.org/wiki/Certificate_Policy},
173    note      = {Accessed 2013-12-12},
174 }
175
176 @techreport{Sch13,
177    author    = {Bruce Schneier},
178    title     = {The {NSA} Is Breaking Most Encryption on the Internet},
179    year      = {2013},
180    month     = Sep,
181    type      = {Blog: Schneier on Security},
182    url       = {https://www.schneier.com/blog/archives/2013/09/the_nsa_is_brea.html},
183 }
184
185 @techreport{Sch13b,
186    author    = {Bruce Schneier},
187    title     = {The {NSA} Is Breaking Most Encryption on the Internet},
188    year      = {2013},
189    month     = Sep,
190    type      = {Answer to Blog Comment},
191    url       = {https://www.schneier.com/blog/archives/2013/09/the_nsa_is_brea.html\#c1675929},
192 }
193
194 @techreport{BL13,
195    author    = {D. J. Bernstein and Tanja Lange},
196    title     = {Security dangers of the {NIST} curves},
197    year      = {2013},
198    month     = Sep,
199    type      = {Presentation slides},
200    url       = {http://cr.yp.to/talks/2013.09.16/slides-djb-20130916-a4.pdf},
201 }
202
203 @techreport{W13,
204    author    = {D. W.},
205    title     = {Should we trust the {NIST}-recommended {ECC} parameters?},
206    year      = {2013},
207    month     = Sep,
208    type      = {Stackexchange Question},
209    institution = I_Stackexchange,
210    url       = {http://crypto.stackexchange.com/questions/10263/should-we-trust-the-nist-recommended-ecc-parameters},
211 }
212
213 @inproceedings{McC90,
214    author    = {Kevin S. McCurley},
215    title     = {The Discrete Logarithm Problem},
216    booktitle = {Cryptology and Computational Number Theory, } # J_AM,
217    year      = {1990},
218    volume    = {42},
219    pages     = {49-74},
220    url       = {http://www.mccurley.org/papers/dlog.pdf},
221 }
222
223 @techreport{WR13,
224    key       = {Wolfram Research, Mathworld},
225    title     = {Elliptic Curve},
226    year      = {2013},
227    month     = Dec,
228    type      = {Math Dictionary Entry},
229    institution = I_Wolfram,
230    url       = {http://mathworld.wolfram.com/EllipticCurve.html},
231    note      = {Accessed 2013-12-12},
232 }
233