Active Bibliography

926 Applied Cryptography -- Protocols, Algorithms, and Source Code in C – Bruce Schneier
519 Guide to Elliptic Curve Cryptography – Aleksandar Jurisic, Alfred J. Menezes - 2004
940 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995
599 Reaching Agreement in the Presence of Faults – M. Pease, R. Shostak, L. Lamport - 1980
584 Data Security – Dorothy E. Denning, Peter J. Denning - 1979
791 Crowds: Anonymity for Web Transactions – Michael K. Reiter, Aviel D. Rubin - 1997
2263 How to leak a secret – Ronald L. Rivest, Adi Shamir, Yael Tauman - 2001
897 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
1299 On the Security of Public Key Protocols – Danny Dolev, Andrew C. Yao - 1983