Cryptography Reference
In-Depth Information
47. Michael Lynch, Ruth MacNally, and Patrick Daly, “Le tribunal, fragile espace de
la preuve,” La Recherche Hors Série , no. 8 (2002): 113; my translation.
48. Fraenkel, La signature , 24.
49. The visual dimension of documents is unfortunately often seen as a vestigial
remain of a precomputing age. In Being Digital , Negroponte devotes no fewer than
four pages to the fax machine, “a serious blemish on the information landscape, a
step backward, whose ramifications will be felt for a long time.” Negroponte, Being
Digital , 187. He squarely lays the blame on the Japanese, who standardized and
manufactured them cheaply, and whose written culture found the medium greatly
advantageous. Bemoaning that “people don't understand the long-term cost, the
short-term failings, and the alternatives,” Negroponte ignores how Western business
culture also found the technology tremendously useful for gathering handwritten
signatures on forms.
50. Sellen and Harper, The Myth of the Paperless Office, , 198.
51. Ibid., 198.
7
The Cryptographic Imagination
1. Paul Kocher, Joshua Jaffe, and Benjamin Jun, “Differential Power Analysis,” in
Advances in Cryptology—CRYPTO '99 , ed. Michael Wiener (Berlin: Springer-Verlag,
1999), 388-389; emphasis added. More specifically, “EM emanations arise as a con-
sequence of current flows within the control, I/O, data processing or other parts of
a device. These flows and resulting emanations may be intentional or unintentional.
Each current carrying component of the device not only produces its own emana-
tions based on its physical and electrical characteristics but also affects the emana-
tions from other components due to coupling and circuit geometry.” Dakshi
Agrawal, Bruce Archambeault, Josyula R. Rao, and Pankaj Rohatgi, “The EM Side-
Channel (S),” in Cryptographic Hardware and Embedded Systems—CHES 2002 , ed.
Burton S. Kaliski (Berlin: Springer, 2003), 30.
2. Olivier Benoît and Thomas Peyrin. “Side-Channel Analysis of Six SHA-3 Candi-
dates,” in Cryptographic Hardware and Embedded Systems—CHES 2010 , ed. Stefan
Mangard and François-Xavier Standaert (Berlin: Springer, 2010), 140-157.
3. Stinson, Cryptography: Theory and Practice , 251. See also Landau, “Find Me a
Hash,” 330-332.
4. Menezes, van Oorschot, and Vanstone, Handbook of Applied Cryptography , 351.
5. See Rotman, Ad Infinitum, , for an attempt to devise an arithmetic system that
accounts for the physical embodiment of numbers.
6. The acrimony began with Koblitz and Menezes, “Another Look at 'Provable
Security,'” followed by Oded Goldreich, “On Post-Modern Cryptography,” Cryptol-
Search WWH ::




Custom Search