Developer Reference for Intel® Integrated Performance Primitives Cryptography
This bibliography provides a list of publications that might be helpful to you in using cryptography functions of Intel IPP.
3GPP TS 35.202 V3.1.1 (2001-07). 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Specification of the 3GPP Confidentiality and Integrity Algorithms; 3G Security; Document 2: KASUMI Specification (Release 1999). Available from http://isearch.etsi.org/3GPPSearch/isysquery/
403fe057-469e-46a4-b298-f80b78bf4343/3/doc/35202-311.pdf.
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. Document 2: SNOW 3G Specification. September 2006. Available from http://www.gsmworld.com/using/algorithms/docs/snow_3g_spec.pdf.
Schneier, Bruce. Applied Cryptography. Protocols, Algorithms, and Source Code in C. Second Edition. John Wiley & Sons, Inc., 1996.
Daemen, Joan, and Vincent Rijmen. The Rijndael Block Cipher. AES Proposal. Available from http://www.nist.gov/aes.
ANSI X9.62-1998 Public Key Cryptography for the Financial Services Industry: the Elliptic Curve Digital Signature Algorithm (ECDSA). American Bankers Association, 1999.
Cohen, Henri. A Course in Computational Algebraic Number Theory. Springer, 1998.
Koblitz, Neal. Introduction to Elliptic Curves and Modular Forms. Springer, 1993.
Cohen, Henri, and Gerald Frey. Handbook of Elliptic and Hyperelliptic Curve Cryprography. Chapman & Hall/CRC, 2006.
Federal Information Processing Standards Publications, FIPS PUB 46-3. Data Encryption Standard (DES), October 1999. Available from http://csrc.nist.gov/publications/.
Federal Information Processing Standards Publications, FIPS PUB 113. Computer Data Authentication, May 1985. Available from http://csrc.nist.gov/publications/.
Federal Information Processing Standards Publications, FIPS PUB 180-2. Secure Hash Standard, August 2002. Available from http://csrc.nist.gov/publications/.
Federal Information Processing Standards Publications, FIPS PUB 180-4. Secure Hash Standard (SHS), March 2012. Available from http://csrc.nist.gov/publications/.
Federal Information Processing Standards Publications, FIPS PUB 186-2. Digital Signature Standard (DSS), January 2000. Available from http://csrc.nist.gov/publications/.
Federal Information Processing Standards Publications, FIPS PUB 197. Advanced Encryption Standard (AES), November 2001. Available from http://csrc.nist.gov/publications/.
Federal Information Processing Standards Publications, FIPS PUB 198. The Key-Hash Message Authentication Code (HMAC), July 2008. Available from http://csrc.nist.gov/publications/.
Standard Specifications for Public-Key Cryptography: Additional Techniques. May, 2000. Working Draft.
IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices. April 2008.
Intel® 64 and IA-32 Architectures Software Developer's Manual . Volume 1: Basic Architecture. Available from http://www.intel.com/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-software-developer-vol-1-manual.pdf.
ISO/IEC 11889-4:2015 Information technology - TPM Library - Part 4: Supporting Routines.
Recommendation for Block Cipher Modes of Operation - Methods and Techniques. NIST Special Publication 800-38A, December 2001. Available from http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf.
Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode. Addendum to NIST Special Publication 800-38A, October 2010. Available from http://doi.org/10.6028/NIST.SP.800-38A-Add.
Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. NIST Special Publication 800-38B, May 2005. Available from http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pd
Draft Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. NIST Special Publication 800-38C, September 2003. Available from http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C.pdf.
Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC. NIST Special Publication 800-38D, November 2007. Available from http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf.
Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices. NIST Special Publication 800-38E, January, 2010. Available from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf
RSA Laboratories. PKCS #1 v2.1: RSA Cryptography Standard. June 2002. Available from http://www.rsasecurity.com/rsalabs/pkcs.
RSA Laboratories. PKCS #7: Cryptographic Message Syntax Standard. An RSA Laboratories Technical Note Version 1.5 Revised, November 1, 1993.
Rivest, Ronald L. The RC5 Encryption Algorithm. Proceedings of the 1994 Leuven Workshop on Algorithms (Springer), 1994. Revised version, dated March 1997, is available from http://theory.lcs.mit.edu/~cis/pubs/rivest/rc5rev.ps.
Rivest, Ronald L. The MD5 Message-Digest Algorithm. RFC 1321, MIT and RSA Data Security, Inc, April 1992. Available from http://www.faqs.org/rfc1321.html.
Krawczyk, Hugo, Mihir Bellare, and Ran Canetti. HMAC: Keyed-Hashing for Message Authentication. RFC 2401, February 1997. Available from http://www.faqs.org/rfcs/rfc2401.html.
Frankel, Sheila, and Howard C. Herbert. The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec. RFC 3566, September 1996. Available from http://www.rfc-archive.org/getrfc.php?rfc=3566.
D. Harkins. Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES). RFC 5297, October 2008. Available from https://tools.ietf.org/pdf/rfc5297.pdf.
SEC1: Elliptic Curve Cryptography. Standards for Efficient Cryptography Group, September 2000. Available from http://www.secg.org/secg_docs.htm.
SEC2: Recommended Elliptic Curve Domain Parameters. Standards for Efficient Cryptography Group, September 2000. Available from http://www.secg.org/secg_docs.htm/.
SM2 Digital Signature Algorithm. Available from http://tools.ietf.org/html/draft-shen-sm2-ecdsa-01.
SM2 Public Key Cryptographic Algorithm Based on Elliptic Curves. Available from https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02
SM3 Hash Function. Available from https://tools.ietf.org/html/draft-shen-sm3-hash-00.
SMS4 Encryption Algorithm for Wireless Networks. Available from http://www.oscca.gov.cn/UpFile/200621016423197990.pdf (Chinese) and http://eprint.iacr.org/2008/329.pdf (English).
X9.42-2003: Public Key Cryptography for the Financial Services Industry: Agreement of Symmetric Keys Using Discrete Logarithm Cryptography. American National Standards Institute, 2003.