[1]
R. IL. Rivest, Chaffing and Winnowing, Confidentiality Without Encryption" , , The Technical Newletter of RSA laboratories , Cryptobytes, Summer (1998).
Google Scholar
[2]
J. Burke, J. McDonald, T. Austin, Architectural Support for fast Symmetric-Key Cryptography, ", " International Conference on Archetectural Support For Programmig Languages and Operation Systems (ASPLOS_IX), November (2000).
DOI: 10.1145/378993.379238
Google Scholar
[3]
R. Atkinson, Security Architecture for the internet protocol, , IEFT Draft Architecture ipsec-and-see 00, (1998).
Google Scholar
[4]
E. Biham , Lars R. knudsen , DES , Triple-DES and AES, The technical Newsletter of RSA laboratories , Cryptobytes, Summer (1998).
Google Scholar
[5]
J.L. Messey, Architecture for Public-key Infrastructure, The Open Group, (1998).
Google Scholar
[6]
B. Schneider, et all, Twofish : A128-bit Block Cipher, , 1998 http: /www. nist. gov/aes.
Google Scholar
[7]
Henk CA,V. Tilborg, An Introduction to Cryptology, , Kluwer Academic Publisher, (1993).
Google Scholar
[8]
L. Wu, Ch. Wearer, T. Austin, CryptoManiac : A Fast Flexible Architecture foe Secure Communication, , 28 th annual International Symposium On Computer Architecture (ISCA-2001), June (2001).
DOI: 10.1145/379240.379256
Google Scholar
[9]
Agre, Phillip E. & Rotenberg, Marc (editors): Technology and Privacy: The New Landscape, MIT Press, 1998 ISBN: 0262511010.
Google Scholar
[10]
Electronic Privacy Information Center, Cryptography & Liberty 1999: An International Survey of Encryption Policy, EPIC, 1999, ISBN: 1893044033.
Google Scholar
[11]
Garfinkel, Simson, PGP: Pretty Good Privacy, O'Reilly & Associates, 1994, ISBN 1-56592-098-8.
Google Scholar
[12]
Kahn, David, The Code Breakers, The Story of Se cret Writing, The MacMillan Publishing Company (1968), ISBN: 0-02-560460-0.
Google Scholar
[13]
Lawson, Jerry, The Complete Internet Handbook for Lawyers, American Bar Association, 1999, ISBN: 1570736405.
Google Scholar
[14]
Schneier, Bruce, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, (1993).
Google Scholar
[15]
Privacy on the Line by Whitfield Diffie and Susan Landau, MIT Press, (1998).
Google Scholar
[16]
PGP: Pretty Good Privacy by Simson Garfinkel, O'Reilly, (1995).
Google Scholar
[17]
Building in Big Brother: The Cryptographic Policy Debate, by Lance J. Hoffman, Springer Verlag, (1995).
Google Scholar
[18]
The Codebreakers by David Kahn, MacMillan, (1972).
Google Scholar
[19]
A Course in Number Theory and Cryptography, 2nd edition, by Neil Koblitz, Springer Verlag, (1994).
Google Scholar
[20]
Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd edition, by Bruce Schneier, Wiley, (1996).
Google Scholar
[21]
The Electronic Privacy Papers: Documents on the Battle for Electronic Privacy by Bruce Schneier and David Banisar, Wiley, (1997).
Google Scholar
[22]
Cryptography: The Science of Secret Writing by Laurence Dwight Smith, Dover reprint of 1941 edition.
Google Scholar
[23]
Codes and Cryptography by Dominic Welsh, Oxford University Press, 1987, (the other text for this course).
Google Scholar
[24]
The Official PGP User's Guide by Phillip R. Zimmerman, MIT Press, 1995.
Google Scholar
[25]
Scientific American, August 1979, The Mathematics of Public Key Cryptography, , by Martin E. Hellman (of Diffie-Hellman). Still one of the best descriptions ever.
Google Scholar
[26]
Scientific American, August 1977, Mathematical Games" column by Martin Gardner. This is the column that brought the FBI to Martin Gardner, s door.
Google Scholar