Cryptography Reference
In-Depth Information
tamper-resistant hardware. Steganography is that branch of information privacy
which attempts to obscure the existence of data through such devices as invisible
inks, secret compartments, the use of subliminal channels, and the like.” Menezes,
van Oorschot, and Vanstone, Handbook of Applied Cryptography , 45-46, n1.2.
48. Manuel Blum, “Coin Flipping by Telephone: A Protocol for Solving Impossible
Problems,” ACM SIGACT News 15, no. 1 (1983): 23.
49. Gustavus J. Simmons, “How to Insure That Data Acquired to Verify Treaty Com-
pliance Are Trustworthy,” in Contemporary Cryptology: The Science of Information
Integrity , ed. Gustavus J. Simmons (Piscataway, NJ: IEEE Press, 1992): 615-630.
50. Gustavus J. Simmons, “The Prisoners' Problem and the Subliminal Channel,”
in Advances in Cryptology, Proceedings of CRYPTO '83 , ed. David Chaum (New York:
Plenum Press, 1984): 51-67. Gustavus J. Simmons, “The Subliminal Channel and
Digital Signatures,” in Advances in Cryptology, Proceedings of EUROCRYPT '84 , ed.
Thomas Beth, Norbert Cot, and Ingemar Ingemarsson (Berlin: Springer, 1985),
364-378.
51. Gustavus J. Simmons, “The History of Subliminal Channels,” IEEE Journal on
Selected Areas in Communications 16, no. 4 (2002): 452-462. The paper presents a
fascinating account of the discovery of subliminal channels during the Cold War,
when the two mutually distrusting superpowers sought to slowly diffuse their ability
to annihilate each other. Another fascinating application of covert channels is
described in Peter Winkler, “The Advent of Cryptology in the Game of Bridge,”
Cryptologia 7, no. 4 (1983): 327-332.
52. Adam Young and Moti Yung, “The Dark Side of 'Black-Box' Cryptography, or:
Should We Trust Capstone?” in Advances in Cryptology—CRYPTO '96 , ed. Neal Koblitz
(Berlin: Springer, 1996), 89-103; Adam Young and Moti Yung, “Kleptography: Using
Cryptography against Cryptography,” in Advances in Cryptology—EUROCRYPT '97 ,
ed. David Chaum, Christoph G. Günther, and Franz Picher (Berlin: Springer, 1997),
62-74; Adam Young and Moti Yung, Malicious Cryptography: Exposing Cryptovirology
(New York: Wiley, 2004).
53. Young and Yung, “The Dark Side of 'Black-Box' Cryptography,” 100.
54. David Chaum, “Untraceable Electronic Mail, Return Addresses, and Digital
Pseudonyms,” Communications of the ACM 24, no. 2 (February 1981): 84-90; David
Chaum, “Security without Identification: Transaction Systems to Make Big Brother
Obsolete,” Communications of the ACM 28, no. 10 (October 1985): 1030-1044; David
Chaum, “Achieving Electronic Privacy,” Scientific American 267, no. 2 (August 1992):
96-101.
55. David Chaum, “Blind Signatures for Untraceable Payments,” in Advances in
Cryptology Proceedings of CRYPTO '82 , ed. David Chaum, Ronald L. Rivest, and Alan
T. Sherman (New York: Plenum, 1983), 199-203.
Search WWH ::




Custom Search