Active Bibliography

28 Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using Timing Attacks (Extended Abstract) – Paul C. Kocher - 1995
828 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
1947 How to leak a secret – Ronald L. Rivest, Adi Shamir, Yael Tauman - 2001
869 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995
3188 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
861 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
860 Algorithms for Quantum Computation: Discrete Logarithms and Factoring – Peter W. Shor - 1994
595 Practical Byzantine Fault Tolerance – Miguel Castro, Barbara Loskov
642 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996