Cryptography Reference
In-Depth Information
Appendix A.2
Bibliography
[AndDES]
Anderson, R., A Serious Weakness of DES , manuscript dated
Nov. 2, 1996; included on our Web site.
[AndKuhn.tamp]
Anderson, R., Kuhn, M., Tamper Resistance—A Cautionary
Note , 2nd USENIX Workshop on Electronic Commerce
Proceedings, Oakland, CA, Nov. 18 - 21, 1996, pp. 1 - 11,
ISBN 1-880446-83-9. The manuscript is included on our Web
site, or found on the Internet:
www.ft.uni-erlangen.de/
mskuhn/tamper.html . This is
one of the most interesting texts from this list. It shows
impressively that there is a race between chip designers and
chip crackers, similar to the race between cryptography and
cryptanalysis. Some of the methods used for analysis are
adventurous.
[BBEQuant]
Bennett, C. H., Brassard, G., Ekert, A. K., Quantum
Cryptography , Scientific American, Vol. 267 (1992) H.4, pp.
50 - 57.
[BBS]
Blum, M., Goldwasser, S., An Efficient Probabilistic
Public-Key Encryption Scheme Which Hides All Partial
Information , Advances in Cryptology: Proceedings of
CRYPTO '84, Springer, 1985, p. 289.
[BauerDS]
Bauer, F. L., Decrypted Secrets, Methods and Maxims of
Cryptology , Springer, 1997, ISBN 3-540-60418-9.
Search WWH ::




Custom Search