PSEC-KEM 参考文献リスト
以下は、情報提供の一環として、PSEC-KEMに関連して学会等で発表があった論文および論文誌に掲載された論文を一覧にまとめたものです。内容等についての御質問は、それぞれの著者にお問い合わせください(NTTに問い合わせいただいてもお答えできませんので御了承ください)。また、NTTが内容の正確性について保証を与えるものでも有りません。
NTTは、PSEC-KEMに関連する皆様からの情報提供を歓迎します。
公式評価報告書
- NESSIE
- "NESSIE Security Report, version 2.0," NESSIE Deliverables of the NESSIE project D20, NES/DOC/ENS/WP5/D20/2, Feb. 2003.
- NESSIE
- "NESSIE Performance of Optimized Implementations of the NESSIE Primitives, version 2.0," NESSIE Deliverables of the NESSIE project D21, NES/DOC/TEC/WP6/D21/2, Feb. 2003.
- 情報処理振興事業協会、通信・放送機構
- 「暗号技術評価報告書(2002年度版) CRYPTREC Report 2002」、Mar. 2003.
- 総務省、経済産業省
- 「暗号技術検討会 2002年度報告書」、Mar. 2003.
論文等
- T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms." IEEE Transactions on Information Theory, vol. IT-31, no. 4, pp. 469--472, July 1985.
- T. ElGamal, "A public-key cryptosystem and signature scheme based on discrete logarithms." in Proceedings of Crypto'84, no. 196 in Lecture Notes in Computer Science, pp. 10--18, Springer-Verlag, 1985. Full version in [184].
- E. Fujisaki and T. Okamoto, "How to enhance the security of public-key encryption at minimum cost." in Proceedings of Public Key Cryptography, PKC'99, no. 1560 in Lecture Notes in Computer Science, pp. 53--68, Springer-Verlag, 1999.
- E. Fujisaki and T. Okamoto, "Secure integration of asymmetric and symmetric encryption schemes." in Proceedings of Crypto'99, no. 1666 in Lecture Notes in Computer Science, pp. 535--554, Springer-Verlag, 1999.
- E. Fujisaki, T. Kobayashi, H. Morita, H. Oguro, T. Okamoto, S. Okazaki, and D. Pointcheval, "PSEC: Provably secure elliptic curve encryption scheme." Primitive submitted to NESSIE by NTT Corp., Sept. 2000.
- V. Shoup, "A proposal for an ISO standard for public key encryption (version 2.0)." Available at http://eprint.iacr.org/2001/112/, 2001.
- A. W. Dent and E. Dottax, "An overview of side-channel attacks on the NESSIE asymmetric encryption primitives." Internal report, NESSIE, 2002. NES/DOC/RHU/WP5/020.
- T. Okamoto, "Comments on PSEC-KEM, ACE-KEM and ECIES-KEM." 2002. Comments of Security Report 1.0, presented in part during the rump session of the Third NESSIE Workshop.