Merge branch 'master' of https://git.bettercrypto.org/ach-master
authorAaron Kaplan <aaron@lo-res.org>
Thu, 12 Dec 2013 15:08:26 +0000 (16:08 +0100)
committerAaron Kaplan <aaron@lo-res.org>
Thu, 12 Dec 2013 15:08:26 +0000 (16:08 +0100)
Conflicts:
src/security.bib

1  2 
src/security.bib

     note      = {Accessed 2013-12-09},
  }
  
 +@article{ii2011ecrypt,
 +   title     = {ECRYPT II},
 +   author    = {II, ECRYPT and SYM, D},
 +   year      = {2012},
 +   url       = {http://www.ecrypt.eu.org/documents/D.SPA.20.pdf},
 +   pages     = {79-86},
 +}
 +
+ @techreport{Wikipedia:Tempest,
+    key       = {Wikipedia:Tempest},
+    title     = {Tempest (codename)},
+    institution = I_Wikipedia,
+    year      = {2013},
+    month     = Dec,
+    type      = {Wikipedia},
+    url       = {https://en.wikipedia.org/wiki/Tempest_(codename)},
+    note      = {Accessed 2013-12-12},
+ }
+ @techreport{Wikipedia:Discrete,
+    key       = {Wikipedia:Discrete},
+    title     = {Discrete logarithm},
+    institution = I_Wikipedia,
+    year      = {2013},
+    month     = Dec,
+    type      = {Wikipedia},
+    url       = {https://en.wikipedia.org/wiki/Discrete_logarithm},
+    note      = {Accessed 2013-12-12},
+ }
+ @techreport{Wikipedia:Certificate,
+    key       = {Wikipedia:Certificate},
+    title     = {Certificate Policy},
+    institution = I_Wikipedia,
+    year      = {2013},
+    month     = Dec,
+    type      = {Wikipedia},
+    url       = {https://en.wikipedia.org/wiki/Certificate_Policy},
+    note      = {Accessed 2013-12-12},
+ }
+ @techreport{Sch13,
+    author    = {Bruce Schneier},
+    title     = {The {NSA} Is Breaking Most Encryption on the Internet},
+    year      = {2013},
+    month     = Sep,
+    type      = {Blog: Schneier on Security},
+    url       = {https://www.schneier.com/blog/archives/2013/09/the_nsa_is_brea.html},
+ }
+ @techreport{Sch13b,
+    author    = {Bruce Schneier},
+    title     = {The {NSA} Is Breaking Most Encryption on the Internet},
+    year      = {2013},
+    month     = Sep,
+    type      = {Answer to Blog Comment},
+    url       = {https://www.schneier.com/blog/archives/2013/09/the_nsa_is_brea.html\#c1675929},
+ }
+ @techreport{BL13,
+    author    = {D. J. Bernstein and Tanja Lange},
+    title     = {Security dangers of the {NIST} curves},
+    year      = {2013},
+    month     = Sep,
+    type      = {Presentation slides},
+    url       = {http://cr.yp.to/talks/2013.09.16/slides-djb-20130916-a4.pdf},
+ }
+ @techreport{W13,
+    author    = {D. W.},
+    title     = {Should we trust the {NIST}-recommended {ECC} parameters?},
+    year      = {2013},
+    month     = Sep,
+    type      = {Stackexchange Question},
+    institution = I_Stackexchange,
+    url       = {http://crypto.stackexchange.com/questions/10263/should-we-trust-the-nist-recommended-ecc-parameters},
+ }
+ @inproceedings{McC90,
+    author    = {Kevin S. McCurley},
+    title     = {The Discrete Logarithm Problem},
+    booktitle = {Cryptology and Computational Number Theory, } # J_AM,
+    year      = {1990},
+    volume    = {42},
+    pages     = {49-74},
+    url       = {http://www.mccurley.org/papers/dlog.pdf},
+ }
+ @techreport{WR13,
+    key       = {Wolfram Research, Mathworld},
+    title     = {Elliptic Curve},
+    year      = {2013},
+    month     = Dec,
+    type      = {Math Dictionary Entry},
+    institution = I_Wolfram,
+    url       = {http://mathworld.wolfram.com/EllipticCurve.html},
+    note      = {Accessed 2013-12-12},
+ }