Cryptography Reference
In-Depth Information
Chaum, David, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, and Josh
Benaloh, eds.,
Towards Trustworthy Elections: New Directions in Electronic Voting
. Berlin:
Springer, 2010.
Ciborra, Claudio.
The Labyrinths of Information: Challenging the Wisdom of Systems
.
Oxford: Oxford University Press, 2002.
Clanchy, Michael T.
From Memory to Written Record, England 1066-1307
. 2nd ed.
Oxford: Blackwell, 1993.
Cole, Simon A.
Suspect Identities: A History of Fingerprinting and Criminal Identification.
.
Cambridge, MA: Harvard University Press, 2002.
Conseil d'État.
Internet et les réseaux numériques
. Paris: La documentation
française, 1998.
Coombe, Rosemary J.
The Cultural Life of Intellectual Properties: Authorship, Appropria-
tion, and the Law
. Durham, NC: Duke University Press, 1998.
Constance, Paul. “How Jim Bamford Probed the NSA.”
Cryptologia
21, no. 1 (1997):
71-74.
Copeland, Jack B.
Colossus: The Secrets of Bletchley Park's Code-breaking Computers
.
Oxford: Oxford University Press, 2006.
Coron, Jean-Sébastien, Jacques Patarin, and Yannick Seurin. “The Random Oracle
Model and the Ideal Cipher Model Are Equivalent.” In
Advances in Cryptology—
CRYPTO 2008
, ed. David Wagner, 1-20. Berlin: Springer-Verlag, 2008.
Cranor, Lorrie Faith, and Simson Garfinkel, eds.
Security and Usability: Designing
Secure Systems That People Can Use
. Sebastopol, CA: O'Reilly Media, 2005.
Crowley, John. “Uses and Abuses of the Secret Ballot in the American Age of
Reform.” In
Cultures of Voting: The Hidden History of the Secret Ballot
, ed. Romain
Bertrand, Jean-Louis Briquet, and Peter Pels, 43-68. London: Hurst & Co, 2007.
Curtin, Matt.
Brute Force: Cracking the Data Encryption Standard
. New York: Coperni-
cus Books, 2005.
Dam, Kenneth W., and Herbert S. Lin, eds.
Cryptography's Role in Securing the Informa-
tion Society (CRISIS)
. Washington, DC: National Academy Press, 1996.
Damgård, Ivan. “A 'Proof-Reading' of Some Issues in Cryptography.” In
Automata,
Languages, and Programming
, ed. Lars Arge, Christian Cachin, Tomasz Jurdzinski, and
Andrzey Tarlecki, 2-11. Berlin: Springer-Verlag, 2007.
Datamonitor.
Public Key Infrastructure, 1999-2003
. n.p., 1999.
Davida, George.
Chosen Signature Cryptanalysis of the RSA (MIT) Public Key Cryptosys-
tem
. Technical Report TR-CS-82-2, Department of Electrical and Computer Science,
University of Wisconsin, 1982.