Active Bibliography

Cryptologic Research A Software-Optimized Encryption Algorithm∗ – Phillip Rogaway - 1996
827 SPINS: Security Protocols for Sensor Networks – Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar - 2001
503 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
519 Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks – Yih-chun Hu - 2003
1Recent Developments in the Design of Conventional Cryptographic Algorithms – Bart Preneel, Vincent Rijmen, Antoon Bosselaers
861 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
806 Differential Power Analysis – Paul Kocher, Joshua Jaffe, Benjamin Jun - 1999
869 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995
1425 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995