American National Standard for Information Systems - Programming Language - C, ANSI X3.159-1989.
Jon Louis Bentley, Writing Efficient Programs, Prentice-Hall, 1982, ISBN 0-13-970244-X.
Samuel P. Harbison and Guy L. Steele, C: A Reference Manual, Second Edition, Prentice-Hall, 1987,
ISBN 0-13-109802-0. (A third edition has recently been released.)
Mark R. Horton, Portable C Software, Prentice Hall, 1990, ISBN 0-13-868050-7.
Brian W. Kernighan and P.J. Plauger, The Elements of Programming Style, Second Edition,
McGraw-Hill, 1978, ISBN 0-07-034207-5.
Brian W. Kernighan and Dennis M. Ritchie, The C Programming Language, Prentice Hall, 1978, ISBN
0-13-110163-3.
Brian W. Kernighan and Dennis M. Ritchie, The C Programming Language, Second Edition, Prentice
Hall, 1988,
ISBN 0-13-110362-8, 0-13-110370-9.
Andrew Koenig, C Traps and Pitfalls, Addison-Wesley, 1989, ISBN 0-201-17928-8.
P.J. Plauger, The Standard C Library, Prentice Hall, 1992,
ISBN 0-13-131509-9.
Harry Rabinowitz and Chaim Schaap, Portable C, Prentice-Hall, 1990, ISBN 0-13-685967-4.
IEEE P1363 / D13 (Draft Version 13). Standard Specifications
for Public Key Cryptography:
Annex A (Informative).Number-Theoretic Background, November 12, 1999.
IEEE P1363a / D12 (Draft Version 12)Draft Standard
Specifications for Public Key Cryptography Amendment 1: Additional
Techniques, July 16, 2003.
SEC1:Elliptic Curve Cryptography, Certicom Research,
September 20, 2000.
SEC2:Recommended Elliptic Curve Domain Parameters,
Certicom Research, September 20, 2000.
T. Kobayashi, Base-φ Method for Elliptic Curves over OEF,
IEICE Trans. Vol.E83-A, No.4, April 2000.
A. Reyhani-Masoleh and M. A. Hasan, Fast Normal Basis
Multiplication Using General Purpose Processors, SAC'2001.
-CACR(Univ. of Waterloo) Technical Report, CORR 2001-25, 2001.
A. J. Menezes, Yi-Hong Wu and R. J. Zuccherato,
An elementary introduction to hyperelliptic curves,
Technical Report, CORR 96-19, Univ. of Waterloo, Nov. 7, 1996.
A. J. Menezes, Elliptic Curve Public Key Cryptosystems,
Kluwer Academic Publishers, 1993.
A. J. Menezes, Elliptic Curve Public Key Cryptosystems,
Kluwer Academic Publishers, 1993.
D. Boneh, B. Lynn and H. Shacham,
Short signatures from the Weil pairing, Advances in Cryptology -
ASIACRYPT 2001, C. Boyd (Ed.), Lecture Notes in Comput. Sci. 2248,
Springer-Verlag, pp. 514-532 (2001).
P.S.L.M. Barreto, H.Kim, B,Lynn and M. Scott,
Efficient Algorithm for Pairing-Based Cryptosystems,
CRYPTO 2002, LNCS 2442, pp.354--368, 2002.
Craig Gentry,
Certificate-Based Encryption and the Certificate Revocation Problem,
DoCoMo USA Labs, cgentry@docomolabs-usa.com,
Cryptology ePrint Archive, 183.pdf.
Bo Gyeong Kang, Je Hong Park, and Sang Geun Hahn,
A Certificate-based Signature Scheme, Jan 14, 2004.
Vipul Goyal, Omkant Pandey, Amit Sahai and Brent Waters, Attribute-Based Encryption for Fine-Grained
Access Control of Encrypted Data,
http://eprint.iacr.org/2006/309.pdf, Cryptology ePrint Archive, 2006.
Brent Waters, Ciphertext-Policy Attribute-Based Encryption: An Expressive Efficient, and Provably
Secure Realization,
http://eprint.iacr.org/2008/290.pdf, Cryptology ePrint Archive, 2008.
Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima and Brent Waters, Fully Secure
Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption,
http://eprint.iacr.org/2010/110.pdf, Cryptology ePrint Archive, 2010.
Zhen Liu and Zhenfu Cao, On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix in
Ciphertext-Policy Attribute-Based Encryption,
http://eprint.iacr.org/2010/374.pdf, Cryptology ePrint Archive, 2010.
Tatsuaki Okamoto and Katsuyuki Takashima,
, Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption,
http://eprint.iacr.org/2010/563.pdf, Cryptology ePrint Archive, 2010.