Active Bibliography

838 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995
1166 Identity-Based Encryption from the Weil Pairing – Dan Boneh, Matthew Franklin - 2001
557 Practical Byzantine Fault Tolerance – Miguel Castro, Barbara Loskov
571 Short signatures from the Weil pairing – Dan Boneh, Ben Lynn, Hovav Shacham - 2001
2980 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
1884 Randomized Algorithms – Rajeev Motwani - 1995
708 Factoring polynomials with rational coefficients – A. K. Lenstra, H. W. Lenstra - 1982
731 Differential Power Analysis – Paul Kocher, Joshua Jaffe, Benjamin Jun - 1999
770 SPINS: Security Protocols for Sensor Networks – Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar - 2001