Cryptography Reference
In-Depth Information
Aronson, Genetic Witness: Science, Law, and Controversy in the Making of DNA Profiling
(New Brunswick: Rutgers University Press, 2007); Michael Lynch, Simon A. Cole,
Ruth McNally, and Kathleen Jordan, Truth Machine: The Contentious History of DNA
Fingerprinting (Chicago: University of Chicago Press, 2008); Henri Levy-Bruhl, La
preuve judiciaire (Paris: Librairie Marcel Rivière et Cie, 1964); Xavier Lagarde, Réflexion
critique sur le droit de la preuve (Paris: Librairie générale de droit et de jurisprudence,
1994); Michael T. Clanchy, From Memory to Written Record, England, 1066-1307 , 2nd
ed. (Oxford: Blackwell, 1993).
26. Lawrence Lessig, Code and Other Laws of Cyberspace (New York: Basic Books,
1999).
27. Rosemary J. Coombe, The Cultural Life of Intellectual Properties: Authorship, Appro-
priation, and the Law (Durham: Duke University Press, 1998), 9.
28. Isabelle Stengers, La vierge et le neutrino: Les scientifiques dans la tourmente (Paris:
Les empêcheurs de penser en rond, 2006), 35-36.
29. For example: “A good security design has not secrets in its details. . . . The
antithesis is security by obscurity . . . if a system is designed with security by obscurity,
then that security is delicate.” Schneier, Secrets and Lies , 344. My argument is pre-
cisely echoed by Koblitz and Menezes when they suggest that “a lot of people in
industry, government, and academia would like to truly understand to what extent
they can have confidence in the systems they use to protect, encrypt, and authen-
ticate data. . . . Cryptography is more an art than a science. Its fruits, and even its
inner working, should be accessible to a broad public.” Neal Koblitz and Alfred J.
Menezes, “Another Look at 'Provable Security,'” Journal of Cryptology 20, no. 1 (2007):
3-37.
30. The title is borrowed from Ron Rivest's characterization that “cryptography is
about communication in the presence of adversaries. ” Ron Rivest, “Cryptology,” in
Handbook of Theoretical Computer Science , ed. Jan van Leeuwen (New York: Elsevier,
1990), 717; emphasis in original.
31. Frank H. Easterbrook, “Cyberspace and the Law of the Horse,” Chicago Legal
Forum (1996): 207-216; Lawrence Lessig, “The Law of the Horse: What Cyberlaw
Might Teach,” Harvard Law Review 113, no. 2 (1999): 501-549.
32. I owe this title to Shawn J. Rosenheim's insightful topic The Cryptographic Imagi-
nation: Secret Writing from Poe to the Internet (Baltimore: Johns Hopkins University
Press, 1995).
2
Communication in the Presence of Adversaries
1. Simon Singh, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum
Cryptography (New York: Anchor, 2000), 345.
Search WWH ::




Custom Search