Cryptography Reference
In-Depth Information
Marty, Gabriel, and Pierre Raynaud. “Théorie générale des preuves.” In
Droit civil
.
Paris: Sirey, 1972.
Massey, James L. “An Introduction to Contemporary Cryptography.”
Proceedings of
the IEEE
76, no. 5 (1988): 533-549.
May, Timothy C. “The Crypto Anarchist Manifesto.” 1992. http://www.activism.net/
cypherpunk/crypto-anarchy.html (accessed June 24, 2011).
Mehrtens, Herbert. “Mathematical Models.” In
Models: The Third Dimension of
Science
, ed. Soraya De Chadarevian and Nick Hopwood, 276-306. Stanford: Stanford
University Press, 2004.
Menezes, Alfred J., Paul C. van Oorschot, and Scott A. Vanstone.
Handbook of Applied
Cryptography
. Boca Raton, FL: CRC Press, 1997.
Mercuri, Roberta. “A Better Ballot Box?”
IEEE Spectrum
39, no. 10 (2002): 46-50.
Merkle, Ralph C. “Secure Communications over Insecure Channels.”
Communica-
tions of the ACM
21, no. 4 (1978): 294-299.
Meyer, Elizabeth A.
Legitimacy and Law in the Roman World: Tabulae in Roman Belief
and Practice
. Cambridge: Cambridge University Press, 2004.
Micali, Silvio. “Fair Public-Key Cryptosystems.” In
Advances in Cryptology—CRYPTO
'92
, ed. Ernest F. Brickell, 113-138. London: Springer, 1992.
Micali, Silvio, and Leonid Reyzin. “Physically Observable Cryptography.” In
Theory
of Cryptography:
Proceedings of Theory of Cryptography,
TCC 2004, ed. Moni Naor,
278-296. Berlin: Springer, 2004.
Mitchell, Chris J., Fred Piper, and Peter R. Wild. “Digital Signatures.” In
Contemporary
Cryptology: The Science of Information Integrity
, ed. Gustavus J. Simmons, 325-378.
Piscataway, NJ: IEEE Press, 1992.
Mitchell, Sandra D.
Unsimple Truths: Science, Complexity, and Policy
. Chicago: Univer-
sity of Chicago Press, 2009.
Mitchell, William J.
The Reconfigured Eye: Visual Truth in the Post-Photographic Era
.
Cambridge, MA: MIT Press, 1994.
Monrose, Fabien, and Michael K. Reiter. “Graphical Passwords.” In
Security and
Usability: Designing Secure Systems That People Can Use
, ed. Lorrie Faith Cranor and
Simson Garfinkel, 157-174. Sebastopol, CA: O'Reilly Media. 2005.
Moran, Tal, and Moni Naor. “Basing Cryptographic Protocols on Tamper-Evident
Seals.”
Theoretical Computer Science
411, no. 10 (2010): 1283-1310.
Moran, Tal, and Moni Naor. “Polling with Physical Envelopes: A Rigorous Analysis
of a Human-Centric Protocol.” In
Advances in Cryptology—EUROCRYPT 2006
, ed.
Serge Vaudenay, 88-108. Berlin: Springer, 2006.