@techreport{md5,
	author = {Xiaoyun Wang and Hongbo Yu},
	title = {How to Break MD5 and Other Hash Functions},
	url = {http://merlot.usc.edu/csac-f06/papers/Wang05a.pdf}
	note = "\url{http://merlot.usc.edu/csac-f06/papers/Wang05a.pdf}"
}

@MISC{keysize,
	author = {Andrea Pellegrini, Valeria Bertacco and Todd Austin},
	title = {Fault-Based Attack of RSA Authentication},
	month = mar,
	year = {2012},
	url = {http://web.eecs.umich.edu/~taustin/papers/DATE10-rsa.pdf}
	note = "\url{http://web.eecs.umich.edu/~taustin/papers/DATE10-rsa.pdf}"
}

@MISC{aes_gov,
	author = {U.S. Government},
	title = {National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information},
	url = {http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf}
	note = "\url{http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf}"
}

@MISC{aes,
	author = {Alex Biryukov and Dmitry Khovratovich},
	title = {Related-key Cryptanalysis of the Full AES-192 and AES-256},
	url = {http://eprint.iacr.org/2009/317.pdf}
	note = "\url{http://eprint.iacr.org/2009/317.pdf}"
}

@MISC{owasp,
	author = {OWASP},
	title = {{OWASP} {T}op {T}en},
	url = {https://www.owasp.org/index.php/Main_Page}
	note = "\url{https://www.owasp.org/index.php/Main_Page}"
}
