From 0d182403359acec810502577f228f7f7f58a41e2 Mon Sep 17 00:00:00 2001 From: Michael McLoughlin Date: Mon, 26 Apr 2021 18:28:22 -0700 Subject: [PATCH] doc: add knuth reference (#89) Section 4.6.3 of The Art of Computer Programming, Volume 2: Seminumerical Algorithms (3rd Edition) by Donald Knuth. --- .zenodo.json | 1 + doc/bibliography.md | 1 + doc/references.bib | 10 ++++++++++ internal/tools/docgen/zbibliography.go | 6 ++++++ 4 files changed, 18 insertions(+) diff --git a/.zenodo.json b/.zenodo.json index 52710d2..fc9ab82 100644 --- a/.zenodo.json +++ b/.zenodo.json @@ -37,6 +37,7 @@ "Mike Hamburg. Ed448-Goldilocks, a new elliptic curve. Cryptology ePrint Archive, Report 2015/625. 2015. https://eprint.iacr.org/2015/625", "Riad S. Wahby and Dan Boneh. Fast and simple constant-time hashing to the BLS12-381 elliptic curve. Cryptology ePrint Archive, Report 2019/403. 2019. https://eprint.iacr.org/2019/403", "Christophe Doche. Exponentiation. Handbook of Elliptic and Hyperelliptic Curve Cryptography, chapter 9. 2006. http://koclab.cs.ucsb.edu/teaching/ecc/eccPapers/Doche-ch09.pdf", + "Knuth, Donald E. Evaluation of Powers. The Art of Computer Programming, Volume 2 (Third Edition): Seminumerical Algorithms, chapter 4.6.3. 1997. https://www-cs-faculty.stanford.edu/~knuth/taocp.html", "Ayan Nandy. Modifications of Bos and Coster’s Heuristics in search of a shorter addition chain for faster exponentiation. Masters thesis, Indian Statistical Institute Kolkata. 2011. http://library.isical.ac.in:8080/jspui/bitstream/123456789/6441/1/DISS-285.pdf", "F. L. Ţiplea, S. Iftene, C. Hriţcu, I. Goriac, R. Gordân and E. Erbiceanu. MpNT: A Multi-Precision Number Theory Package, Number Theoretical Algorithms (I). Technical Report TR03-02, Faculty of Computer Science, \"Alexandru Ioan Cuza\" University, Iasi. 2003. https://profs.info.uaic.ro/~tr/tr03-02.pdf", "Daniel J. Bernstein and Tanja Lange. Security dangers of the NIST curves. 2013. https://cr.yp.to/talks/2013.09.16/slides-djb-20130916-a4.pdf", diff --git a/doc/bibliography.md b/doc/bibliography.md index 11bb3d7..2cb90b0 100644 --- a/doc/bibliography.md +++ b/doc/bibliography.md @@ -17,6 +17,7 @@ * Mike Hamburg. Ed448-Goldilocks, a new elliptic curve. Cryptology ePrint Archive, Report 2015/625. 2015. https://eprint.iacr.org/2015/625 * Riad S. Wahby and Dan Boneh. Fast and simple constant-time hashing to the BLS12-381 elliptic curve. Cryptology ePrint Archive, Report 2019/403. 2019. https://eprint.iacr.org/2019/403 * Christophe Doche. Exponentiation. Handbook of Elliptic and Hyperelliptic Curve Cryptography, chapter 9. 2006. http://koclab.cs.ucsb.edu/teaching/ecc/eccPapers/Doche-ch09.pdf +* Knuth, Donald E. Evaluation of Powers. The Art of Computer Programming, Volume 2 (Third Edition): Seminumerical Algorithms, chapter 4.6.3. 1997. https://www-cs-faculty.stanford.edu/~knuth/taocp.html * Ayan Nandy. Modifications of Bos and Coster’s Heuristics in search of a shorter addition chain for faster exponentiation. Masters thesis, Indian Statistical Institute Kolkata. 2011. http://library.isical.ac.in:8080/jspui/bitstream/123456789/6441/1/DISS-285.pdf * F. L. Ţiplea, S. Iftene, C. Hriţcu, I. Goriac, R. Gordân and E. Erbiceanu. MpNT: A Multi-Precision Number Theory Package, Number Theoretical Algorithms (I). Technical Report TR03-02, Faculty of Computer Science, "Alexandru Ioan Cuza" University, Iasi. 2003. https://profs.info.uaic.ro/~tr/tr03-02.pdf * Daniel J. Bernstein and Tanja Lange. Security dangers of the NIST curves. 2013. https://cr.yp.to/talks/2013.09.16/slides-djb-20130916-a4.pdf diff --git a/doc/references.bib b/doc/references.bib index d0ea009..065eafe 100644 --- a/doc/references.bib +++ b/doc/references.bib @@ -165,6 +165,16 @@ @inbook{hehcc:exp year = 2006, } +@inbook{knuth, + title = "Evaluation of Powers", + author = "Knuth, Donald E.", + url = "https://www-cs-faculty.stanford.edu/~knuth/taocp.html", + booktitle = "The Art of Computer Programming, Volume 2 (Third Edition): Seminumerical Algorithms", + chapter = "4.6.3", + publisher = "Addison-Wesley Longman Publishing Co., Inc.", + year = 1997, +} + @mastersthesis{modboscoster, title = "Modifications of Bos and Coster’s Heuristics in search of a shorter addition chain for faster exponentiation", author = "Ayan Nandy", diff --git a/internal/tools/docgen/zbibliography.go b/internal/tools/docgen/zbibliography.go index 4e0ea5b..f4e4080 100644 --- a/internal/tools/docgen/zbibliography.go +++ b/internal/tools/docgen/zbibliography.go @@ -110,6 +110,12 @@ var bibliography = []struct{ Formatted: "Christophe Doche. Exponentiation. Handbook of Elliptic and Hyperelliptic Curve Cryptography, chapter 9. 2006. http://koclab.cs.ucsb.edu/teaching/ecc/eccPapers/Doche-ch09.pdf", }, + { + CiteName: "knuth", + URL: "https://www-cs-faculty.stanford.edu/~knuth/taocp.html", + Formatted: "Knuth, Donald E. Evaluation of Powers. The Art of Computer Programming, Volume 2 (Third Edition): Seminumerical Algorithms, chapter 4.6.3. 1997. https://www-cs-faculty.stanford.edu/~knuth/taocp.html", + }, + { CiteName: "modboscoster", URL: "http://library.isical.ac.in:8080/jspui/bitstream/123456789/6441/1/DISS-285.pdf",