Cryptography Reference
In-Depth Information
Simmons, Gustavus J. “Contemporary Cryptology: A Foreword.” In
Contemporary
Cryptology: The Science of Information Integrity
, ed. Gustavus J. Simmons, vii-xv. Pis-
cataway, NJ: IEEE Press, 1992.
Simmons, Gustavus J. “The History of Subliminal Channels.”
IEEE Journal on Selected
Areas in Communications
16, no. 4 (2002): 452-462.
Simmons, Gustavus J. “How to Insure That Data Acquired to Verify Treaty Compli-
ance Are Trustworthy.” In
Contem
po
rary Cryptology: The Science of Information
Integrity
, ed. Gustavus J. Simmons, 615-630. Piscataway, NJ: IEEE Press, 1992.
Simmons, Gustavus J. “The Prisoners' Problem and the Subliminal Channel.” In
Advances in Cryptology, Proceedings of CRYPTO '83
, ed. David Chaum, 51-67. New
York: Plenum Press, 1984.
Simmons, Gustavus J. “The Subliminal Channel and Digital Signatures.” In
Advances
in Cryptology, Proceedings of EUROCRYPT '84
, ed. Thomas Beth, Norbert Cot, and
Ingemar Ingemarsson, 364-378. Berlin: Springer, 1985.
Singh, Simon.
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum
Cryptography
. New York: Anchor Books, 2000.
Sismondo, Sergio. “Models, Simulations, and Their Objects.”
Science in Context
12,
no. 2 (1999): 247-260.
Smid, Miles E., and Dennis K. Branstad. “The Data Encryption Standard: Past and
Future.”
Proceedings of the IEEE
76, no. 5 (1988): 550-599.
Smith, Richard E.
Authentication: From Passwords to Public Keys
. Boston: Addison-
Wesley, 2002.
Spalding, Helen. “Let Us Now Praise Prime Numbers.” In
Strange Attractors: Poems of
Love and Mathematics
, ed. Sarah Glaz and JoAnne Growney, 190. Wellesley, MA: A.
K. Peters, Ltd., 2008.
Stadler, Markus, Jean-Marc Piveteau, and Jan Camenisch. “Fair Blind Signatures.” In
Proceedings of the 14th Annual International Conference on Theory and Application of
Cryptographic Techniques
, ed. Louis C. Guillou and Jean-Jacques Quisquater, 209-219.
Berlin: Springer, 1995.
Stamm, Sid, and Markus Jakobsson. “Privacy-Preserving Polling Using Playing
Cards.” Cryptology ePrint Archive: Report 2005/444. http://eprint.iacr.org/2005/444
(accessed June 24, 2011).
Standaert, François-Xavier, Tal G. Malkin, and Moti Yung. “A Unified Framework for
the Analysis of Side-Channel Key Recovery Attacks.” Cryptology ePrint Archive:
Report 2006/139. http://eprint.iacr.org/2006/139 (accessed June 24, 2011).