书接上回:
sv标准研读第一章-综述
第2章 标准引用
以下所引用的文件对于本标准的应用是必不可少的(即必须被使用,因此在文本中引用了每一个所引用的文件并解释了其与本标准的关系)。对于注明日期的参考文献,只适用所引用的版本。对于未注明日期的引用,引用文件的最新版本(包括任何修订或更正)适用。
Anderson, R., Biham, E., and Knudsen, L. “Serpent: A Proposal for the Advanced Encryption Standard,”
NIST AES Proposal, 1998.5
ANSI X9.52-1998, American National Standard for Financial Services—Triple Data Encryption Algorithm
Modes of Operation.6
ElGamal, T., “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE
Transactions on Information Theory, vol. IT-31, no. 4, pp. 469–472, July 1985.
FIPS 46-3 (October 1999), Data Encryption Standard (DES).7
FIPS 180-2 (August 2002), Secure Hash Standard (SHS).
FIPS 197 (November 2001), Advanced Encryption Standard (AES).
IEEE Std 754™, IEEE Standard for Floating-Point Arithmetic.8, 9
IEEE Std 1003.1™, IEEE Standard for Information Technology—Portable Operating System Interface
(POSIX®).
IEEE Std 1364™-1995, IEEE Standard Hardware Description Language Based on the Verilog® Hardware
Description Language.
IEEE Std 1364™-2001, IEEE Standard Verilog Hardware Description Language.
IEEE Std 1364™-2005, IEEE Standard for Verilog Hardware Description Language.
IEEE Std 1800™-2005, IEEE Standard for SystemVerilog—Unified Hardware Design, Specification, and
Verification Language.
IEEE Std 1800™-2009, IEEE Standard for SystemVerilog—Unified Hardware Design, Specification, and
Verification Language.
IEEE Std 1800™-2012, IEEE Standard for SystemVerilog—Unified Hardware Design, Specification, and
Verification Language.
IETF RFC 1319 (April 1992), The MD2 Message-Digest Algorithm.10
IETF RFC 1321 (April 1992), The MD5 Message-Digest Algorithm.
IETF RFC 2045 (November 1996), Multipurpose Internet Mail Extensions (MIME), Part One: Format of Internet Message Bodies.
IETF RFC 2144 (May 1997), The CAST-128 Encryption Algorithm.
IETF RFC 2437 (October 1998), PKCS #1: RSA Cryptography Specifications, Version 2.0.
IETF RFC 2440 (November 1998), OpenPGP Message Format.
ISO/IEC 10118-3:2004, Information technology—Security techniques—Hash-functions—Part 3: Dedicated
hash-functions.11
Schneier, B., “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish),” Fast Software
Encryption, Cambridge Security Workshop Proceedings (December 1993), Springer-Verlag, 1994, pp. 191–
204.
Schneier, B., et al., The Twofish Encryption Algorithm: A 128-Bit Block Cipher, 1st ed., Wiley, 1999.