一、中文部份
余明興、吳明哲、黃世陽 (民94) 。Borland C++Builder 6 程式設計經典。台北:文魁資訊。
包盛杰 (民92)。Java Card與APPLET:智慧卡與安全。民94年2月23日,取自:http://www-128.ibm.com/developerworks/tw/library/wi-jcard/index1.html
邱榮輝 (民87) 。認識IC卡。資訊安全通訊,第四卷第三期,18-30。
張惟淙、楊中皇 (民94年12月) 。植基於Java Card與HMAC-SHA-2的檔案完整性稽核軟體設計與實現。中華民國九十四年全國計算機會議,私立崑山科技大學。
張惟淙、楊中皇 (民94年12月) 。結合Java Card的ECDSA數位簽章軟體設計與實現。第十一屆資訊管理暨實務研討會,私立實踐大學。
張惟淙、楊中皇 (民95年5月) 。PSEC-KEM與ECDSA的橢圓曲線密碼軟體設計與實現。第十七屆國際資訊管理學術研討會,私立義守大學。
陳志群 (民91) 。智慧卡技術實務-使用Java Card (周利欽、翁御舜譯) 。台北:碁峰資訊。
楊中皇 (民91) 。密碼學演算法於IC卡上的具體實現。資訊安全通訊,第八卷第三期,8-17。楊中皇 (民94) 。橢圓曲線密碼系統軟體實現技術之探討。資訊安全通訊,第十一卷第一期,15-25。楊中皇 (民95) 。網路安全理論與實務。台北:金禾資訊。
蔡明志譯 (民90) 。Visual C++ 6教學手冊。台北:碁峰資訊。
二、西文部份
ANSI X9.62 (1998). Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA).
Baentsch, M., Buhler, P., Eirich, T., Horing, F. and Oestreicher, M. (1999). JavaCard-From Hype to Reality. IEEE Concurrency, Vol. 07, No. 4, 36-43.
Castles Technology (2005). EZ100PU/PR PC/SC Smart CardReader. Retrieved May 1, 2006, from the World Wide Web: http://www.castech.com.tw/images_product/EZ100PU_PR%20Specification%2020051206.pdf
CRYPTREC (Cryptography Research and Evaluation Commi-ttees) Project (2006). http://www.ipa.go.jp/security/enc/CRYPTREC/index-e.html
Du, Z. (2006). GMP Install Instruction for Windows Platform. Retrieved May 1, 2006, from the World Wide Web: http://www.cs.nyu.edu/exact/core/gmp/
Feng, D., Lai, X., Wang, X. and Yu, H. (2004). Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. Retrieved May 1, 2006, from the World Wide Web: http://eprint.iacr.org/2004/199.pdf
Galindo, D., Martin, S. and Villar, J.L. (2004). Evaluating elliptic curve based KEMs in the light of pairings. Retrieved May 1, 2006, from the World Wide Web: http://eprint.iacr.org/2004/084.pdf
GNU Privacy Guard (2005). GnuPG Version 1.4.1 Source code. Retrieved May 1, 2006, from the World Wide Web: ftp://ftp.gnupg.org/gcrypt/gnupg/gnupg-1.4.1.tar.gz
IBM (2002). JCOP20 Technical Brief. Retrieved May 1, 2006, from the World Wide Web: ftp://ftp.software.ibm.com/software/pervasive/info/JCOP20Brief.pdf
IBM (2006). JCOP Tools User Guide. Retrieved May 1, 2006, from the World Wide Web: http://www.zurich.ibm.com/jcop/download/eclipse/doc/index.html
IETF (2005). RFC4051, Additional XML Security Uniform Resource Identifiers. Retrieved May 1, 2006, from the World Wide Web: from http://www.ietf.org/rfc/rfc4051.txt
Koblitz, N. (1987). Elliptic Curve Cryptosystems. Mathematics of Computation, Vol. 48, No. 177, 203-209.
Miller, V. (1986). Uses of Elliptic Curve in Cryptography. Advances in Cryptology – CRYPTO’85, LNCS 218, 417-426, Springer-Verlag.
Menezes, A. (1993). Elliptic Curve Public Key Cryptosystems. Kluwer.
Microsoft (2006). Smart Card Resource Manager API. Retrieved May 1, 2006, from the World Wide Web: http://msdn.microsoft.com/library/default.asp?url=/library/en-us/secauthn/security/smart_card_resource_manager_api.asp
Manabe, Y., Nagao, W. and Okamoto, T. (2006). A Universally Composable Secure Channel Based on the KEM-DEM Framework. IEICE Trans. Fundamentals, Vol.E89-A, No.1.
NESSIE (New European Schemes for Signatures, Integrity, and Encryption) Project (2006). https://www.cosic.esat.kuleuven.be/nessie/
NIST (2001). Digital Signature Standard (DSS), FIPS PUB186-2. Retrieved May 1, 2006, from the World Wide Web: http://csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf
NIST (2002). Secure Hash Standard, FIPS PUB 180-2. Retrieved May 1, 2006, from the World Wide Web: http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.pdf
NIST (2003). DRAFT Special Publication 800-57, Recommendation on Key Management. Retrieved May 1, 2006, from the World Wide Web: http://csrc.nist.gov/CryptoToolkit/kms/guideline-1-Jan03.pdf
NIST (2005). NIST Brief Comments on Recent Cryptanalytic Attacks on SHA-1, Retrieved May 1, 2006, from the World Wide Web: http://csrc.nist.gov/hash_standards_comments.pdf
NTT Corporation (2006). PSEC-KEM. http://info.isl.ntt.co.jp/crypt/eng/psec/index.html
NTT Corporation (2001). PSEC-KEM Specification. Retrieved May 1, 2006, from the World Wide Web: http://info.isl.ntt.co.jp/crypt/eng/psec/dl/cryptrec/01espec.pdf
NTT Corporation (2003). PSEC-KEM-ISO Source Code. Retrieved May 1, 2006, from the World Wide Web: http://www.nttmcl.com/sec/PsecKEM/ISO/psec_kem_11.4.2003.tar.gz
OpenSSL Project (2005). OpenSSL Version 0.9.8a Source code. Retrieved May 1, 2006, from the World Wide Web: http://www.openssl.org/source/openssl-0.9.8a.tar.gz
Ortiz, C.E. (2003). An Introduction to Java Card Technology. Retrieved May 1, 2006, from the World Wide Web: http://developers.sun.com/techtopics/mobility/javacard/articles/javacard1/
RSA Laboratories (1999). Password – Based Cryptography Standard, PKCS #5 v2.0. Retrieved May 1, 2006, from the World Wide Web: ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-5v2/pkcs5v2-0.pdf
Rankl, W. (2004). PUT DATA and GET DATA as JavaCard Applet. Retrieved May 1, 2006, from the World Wide Web: http://www.wrankl.de/Javacard/PGDATAJava.txt
Sun Microsystems (2006). Java Card Platform Specification. Retrieved May 1, 2006, from the World Wide Web: http://java.sun.com/products/javacard/specs.html
Shoup, V. (2004). Encryption algorithms-Part2: Asymmetric ciphers, Final Committee Draft 18033-2. Retrieved May 1, 2006, from the World Wide Web: http://shoup.net/iso/std6.pdf
Silverman, J. H. & Tate, J. (1992). Rational Points on Elliptic Curves. Undergraduate Texts in Mathematics, Springer-Verlag.
Stallings, W. (2002). Cryptography and Network Security Principles and Practices (3rd ed.). Prentice-Hall.