Cryptography Reference
In-Depth Information
Simmons, Gustavus J. “Contemporary Cryptology: A Foreword.” In Contemporary
Cryptology: The Science of Information Integrity , ed. Gustavus J. Simmons, vii-xv. Pis-
cataway, NJ: IEEE Press, 1992.
Simmons, Gustavus J. “The History of Subliminal Channels.” IEEE Journal on Selected
Areas in Communications 16, no. 4 (2002): 452-462.
Simmons, Gustavus J. “How to Insure That Data Acquired to Verify Treaty Compli-
ance Are Trustworthy.” In Contem po rary Cryptology: The Science of Information
Integrity , ed. Gustavus J. Simmons, 615-630. Piscataway, NJ: IEEE Press, 1992.
Simmons, Gustavus J. “The Prisoners' Problem and the Subliminal Channel.” In
Advances in Cryptology, Proceedings of CRYPTO '83 , ed. David Chaum, 51-67. New
York: Plenum Press, 1984.
Simmons, Gustavus J. “The Subliminal Channel and Digital Signatures.” In Advances
in Cryptology, Proceedings of EUROCRYPT '84 , ed. Thomas Beth, Norbert Cot, and
Ingemar Ingemarsson, 364-378. Berlin: Springer, 1985.
Singh, Simon. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum
Cryptography . New York: Anchor Books, 2000.
Sismondo, Sergio. “Models, Simulations, and Their Objects.” Science in Context 12,
no. 2 (1999): 247-260.
Smid, Miles E., and Dennis K. Branstad. “The Data Encryption Standard: Past and
Future.” Proceedings of the IEEE 76, no. 5 (1988): 550-599.
Smith, Richard E. Authentication: From Passwords to Public Keys . Boston: Addison-
Wesley, 2002.
Spalding, Helen. “Let Us Now Praise Prime Numbers.” In Strange Attractors: Poems of
Love and Mathematics , ed. Sarah Glaz and JoAnne Growney, 190. Wellesley, MA: A.
K. Peters, Ltd., 2008.
Stadler, Markus, Jean-Marc Piveteau, and Jan Camenisch. “Fair Blind Signatures.” In
Proceedings of the 14th Annual International Conference on Theory and Application of
Cryptographic Techniques , ed. Louis C. Guillou and Jean-Jacques Quisquater, 209-219.
Berlin: Springer, 1995.
Stamm, Sid, and Markus Jakobsson. “Privacy-Preserving Polling Using Playing
Cards.” Cryptology ePrint Archive: Report 2005/444. http://eprint.iacr.org/2005/444
(accessed June 24, 2011).
Standaert, François-Xavier, Tal G. Malkin, and Moti Yung. “A Unified Framework for
the Analysis of Side-Channel Key Recovery Attacks.” Cryptology ePrint Archive:
Report 2006/139. http://eprint.iacr.org/2006/139 (accessed June 24, 2011).
Search WWH ::




Custom Search