Cryptography Reference
In-Depth Information
12. See, for example, Burton Kaliski and Jessica Staddon, “Public-Key Cryptography
Standards (PKCS) #1: RSA Cryptography Specifications Version 2.0” (RSA Laborato-
ries, 1998).
13. Denning, “Digital Signatures with RSA and Other Public-Key Cryptosystems,”
391.
14. Chris J. Mitchell, Fred Piper, and Peter R. Wild, “Digital Signatures,” in Contem-
porary Cryptology: The Science of Information Integrity , ed. Gustavus J. Simmons
(Piscataway, NJ: IEEE Press, 1992), 325-378.
15. Menezes, van Oorschot, and Vanstone, Handbook of Applied Cryptography , 361.
16. Richard E. Smith, Authentication: From Passwords to Public Keys (Boston: Addison-
Wesley, 2002), 28-32.
17. Menezes, van Oorschot, and Vanstone, Handbook of Applied Cryptography , 361.
18. Feistel, “Cryptography and Computer Privacy,” 17.
19. Menezes, van Oorschot, and Vanstone, Handbook of Applied Cryptography , 361.
20. Rivest, “Cryptology,” 722.
21. Rivest, Shamir, and Adleman, “A Method for Obtaining Digital Signatures and
Public-Key Cryptosystems,” 121.
22. Rivest, Shamir, and Adleman, Cryptographic Communications System and Method
(patent, September 1983), 2.39-2.43; emphasis added.
23. Rivest, “Cryptology,” 739.
24. ISO, Information Technology, Open Systems Interconnection, Security Frameworks for
Open Systems, Part 4: Non-repudiation , ISO/IEC 10181-4 (Geneva: ISO, 1996).
25. Jianying Zhou and Dieter Gollmann, “Evidence and Non-repudiation,” Journal
of Network and Computer Applications 20, no. 3 (1997): 268.
26. Menezes, van Oorschot, and Vanstone, Handbook of Applied Cryptography , 5.
27. Jane K. Winn, “The Emperor's New Clothes: The Shocking Truth about Digital
Signatures and Internet Commerce,” Idaho Law Review 37 (2001): 371n49. Within
the cryptographic community, Michael Roe warned in a nuanced analysis that
“evidence is not the same as mathematical proof.” See Michael Roe, “Cryptography
and Evidence,” Ph.D. dissertation, University of Cambridge (1997). Roe has recently
applied Austin's speech act theory and Derrida's critique of presence to the analysis
of cryptographic protocols. See Michael Roe, “Non-repudiation and the Metaphysics
of Presence,” in Proceedings of the 13th International Conference on Security Protocols ,
ed. Bruce Christianson et al. (Berlin: Springer, 2007), 204-206.
28. Diffie and Hellman, “New Directions in Cryptography,” 648.
Search WWH ::




Custom Search