Cryptography Reference
In-Depth Information
[14]
Boneh, D., R. DeMillo, and R. Lipton, “On the Importance of Checking Cryptographic Protocols
for Faults,” Proceedings of EUROCRYPT '97 , Springer-Verlag, LNCS 1233, 1997, pp. 37-51.
[15]
Biham, E., and A. Shamir, “Differential Fault Analysis of Secret Key Cryptosystems,” Proceed-
ings of CRYPTO '97 , Springer-Verlag, LNCS 1294, 1997, pp. 513-525.
[16]
Bleichenbacher, D., “Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption
Standard PKCS #1,” Proceedings of CRYPTO '98 , Springer-Verlag, LNCS 1462, 1998, pp. 1-12.
[17]
Kocher, P., J. Jaffe, and B. Jun, “Differential Power Analysis,” Proceedings of CRYPTO '99 ,
Springer-Verlag, LNCS 1666, 1999, pp. 388-397.
[18]
Anderson, R., and M. Kuhn, “Tamper Resistance — A Cautionary Note,” Proceedings of the 2nd
USENIX Workshop on Electronic Commerce , November 1996, pp. 1-11.
[19]
Anderson, R., and M. Kuhn, “Low Cost Attacks on Tamper Resistant Devices,” Proceedings of
the 5th International Workshop on Security Protocols , Springer-Verlag, LNCS 1361, 1997, pp.
125-136.
[20]
Anderson, R., “Why Cryptosystems Fail,” Communications of the ACM , Vol. 37, No. 11, Novem-
ber 1994, pp. 32-40.
[21]
Kahn, D., The Codebreakers: The Comprehensive History of Secret Communication from Ancient
Times to the Internet . Scribner, New York, 1996.
[22]
Bauer, F.L., Decrypted Secrets: Methods and Maxims of Cryptology , 2nd edition. Springer-Verlag,
New York, 2000.
[23]
Levy, S., Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age .
Viking Penguin, New York, 2001.
[24]
Shannon, C.E., “A Mathematical Theory of Communication,” Bell System Technical Journal ,Vol.
27, No. 3/4, July/October 1948, pp. 379-423/623-656.
[25]
Shannon, C.E., “Communication Theory of Secrecy Systems,” Bell System Technical Journal ,
Vol. 28, No. 4, October 1949, pp. 656-715.
[26]
Merkle, R.C., “Secure Communication over Insecure Channels,” Communications of the ACM ,
21(4), April 1978 (submitted in 1975), pp. 294-299.
[27]
Rivest, R.L., A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-
Key Cryptosystems,” Communications of the ACM , 21(2), February 1978, pp. 120-126.
[28]
ElGamal, T., “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithm,”
IEEE Transactions on Information Theory , IT-31(4), 1985, pp. 469-472.
[29]
Oppliger, R., Secure Messaging with PGP and S/MIME . Artech House Publishers, Norwood,
MA, 2001.
[30]
Oppliger, R., Internet and Intranet Security , 2nd edition. Artech House Publishers, Norwood,
MA, 2002.
[31]
Oppliger, R., Security Technologies for the World Wide Web , 2nd edition. Artech House Publish-
ers, Norwood, MA, 2003.
Search WWH ::




Custom Search