Active Bibliography

25 Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using Timing Attacks (Extended Abstract) – Paul C. Kocher - 1995
1813 How to leak a secret – Ronald L. Rivest, Adi Shamir, Yael Tauman - 2001
792 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
838 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995
2980 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
802 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
731 Differential Power Analysis – Paul Kocher, Joshua Jaffe, Benjamin Jun - 1999
770 SPINS: Security Protocols for Sensor Networks – Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar - 2001
1227 Untraceable electronic mail, return addresses, and digital pseudonyms – David Chaum, Communications Of The Acm, R. Rivest, David L. Chaum - 1981