Active Bibliography

Programming Techniques – S. L. Graham, R. L. Rivest, A Method For Obtaining
Programming Techniques S.L. Graham, R.L. Rivest* Editors A Method for Obtaining Digital Signatures and Public- – Key Cryptosystems, R. L. Rivest, A. Shamir, L. Adleman
Programming S.L. Graham, R.L. Rivest * Techniques Editors A Method for Obtaining Digital Signatures and – Public-key Cryptosystems, R. L. Rivest, A. Shamir, L. Adleman
1 Cryptology – Prof Ronald Rivest, L. Rivest
James Nechvatal Security Technology Group PUBLIC-KEY CRYPTOGRAPHY – unknown authors - 1991
1923 Randomized Algorithms – Rajeev Motwani - 1995
869 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995
861 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
1305 Untraceable electronic mail, return addresses, and digital pseudonyms – David Chaum - 1981