Cryptography Reference
In-Depth Information
[14]
Boneh, D., R. DeMillo, and R. Lipton, “On the Importance of Checking Cryptographic Protocols
for Faults,”
Proceedings of EUROCRYPT '97
, Springer-Verlag, LNCS 1233, 1997, pp. 37-51.
[15]
Biham, E., and A. Shamir, “Differential Fault Analysis of Secret Key Cryptosystems,”
Proceed-
ings of CRYPTO '97
, Springer-Verlag, LNCS 1294, 1997, pp. 513-525.
[16]
Bleichenbacher, D., “Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption
Standard PKCS #1,”
Proceedings of CRYPTO '98
, Springer-Verlag, LNCS 1462, 1998, pp. 1-12.
[17]
Kocher, P., J. Jaffe, and B. Jun, “Differential Power Analysis,”
Proceedings of CRYPTO '99
,
Springer-Verlag, LNCS 1666, 1999, pp. 388-397.
[18]
Anderson, R., and M. Kuhn, “Tamper Resistance — A Cautionary Note,”
Proceedings of the 2nd
USENIX Workshop on Electronic Commerce
, November 1996, pp. 1-11.
[19]
Anderson, R., and M. Kuhn, “Low Cost Attacks on Tamper Resistant Devices,”
Proceedings of
the 5th International Workshop on Security Protocols
, Springer-Verlag, LNCS 1361, 1997, pp.
125-136.
[20]
Anderson, R., “Why Cryptosystems Fail,”
Communications of the ACM
, Vol. 37, No. 11, Novem-
ber 1994, pp. 32-40.
[21]
Kahn, D.,
The Codebreakers: The Comprehensive History of Secret Communication from Ancient
Times to the Internet
. Scribner, New York, 1996.
[22]
Bauer, F.L.,
Decrypted Secrets: Methods and Maxims of Cryptology
, 2nd edition. Springer-Verlag,
New York, 2000.
[23]
Levy, S.,
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age
.
Viking Penguin, New York, 2001.
[24]
Shannon, C.E., “A Mathematical Theory of Communication,”
Bell System Technical Journal
,Vol.
27, No. 3/4, July/October 1948, pp. 379-423/623-656.
[25]
Shannon, C.E., “Communication Theory of Secrecy Systems,”
Bell System Technical Journal
,
Vol. 28, No. 4, October 1949, pp. 656-715.
[26]
Merkle, R.C., “Secure Communication over Insecure Channels,”
Communications of the ACM
,
21(4), April 1978 (submitted in 1975), pp. 294-299.
[27]
Rivest, R.L., A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-
Key Cryptosystems,”
Communications of the ACM
, 21(2), February 1978, pp. 120-126.
[28]
ElGamal, T., “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithm,”
IEEE Transactions on Information Theory
, IT-31(4), 1985, pp. 469-472.
[29]
Oppliger, R.,
Secure Messaging with PGP and S/MIME
. Artech House Publishers, Norwood,
MA, 2001.
[30]
Oppliger, R.,
Internet and Intranet Security
, 2nd edition. Artech House Publishers, Norwood,
MA, 2002.
[31]
Oppliger, R.,
Security Technologies for the World Wide Web
, 2nd edition. Artech House Publish-
ers, Norwood, MA, 2003.