Cryptography Reference
In-Depth Information
Appendix A.2
Bibliography
[AndDES]
Anderson, R.,
A Serious Weakness of DES
, manuscript dated
Nov. 2, 1996; included on our Web site.
[AndKuhn.tamp]
Anderson, R., Kuhn, M.,
Tamper Resistance—A Cautionary
Note
, 2nd USENIX Workshop on Electronic Commerce
Proceedings, Oakland, CA, Nov. 18 - 21, 1996, pp. 1 - 11,
ISBN 1-880446-83-9. The manuscript is included on our Web
site, or found on the Internet:
www.ft.uni-erlangen.de/
∼
mskuhn/tamper.html
. This is
one of the most interesting texts from this list. It shows
impressively that there is a race between chip designers and
chip crackers, similar to the race between cryptography and
cryptanalysis. Some of the methods used for analysis are
adventurous.
[BBEQuant]
Bennett, C. H., Brassard, G., Ekert, A. K.,
Quantum
Cryptography
, Scientific American, Vol. 267 (1992) H.4, pp.
50 - 57.
[BBS]
Blum, M., Goldwasser, S.,
An Efficient Probabilistic
Public-Key Encryption Scheme Which Hides All Partial
Information
, Advances in Cryptology: Proceedings of
CRYPTO '84, Springer, 1985, p. 289.
[BauerDS]
Bauer, F. L.,
Decrypted Secrets, Methods and Maxims of
Cryptology
, Springer, 1997, ISBN 3-540-60418-9.