Научная литература
booksshare.net -> Добавить материал -> Информатика -> Петров А.А. -> "Компьютерная безопасность. Криптографические методы защиты" -> 178

Компьютерная безопасность. Криптографические методы защиты - Петров А.А.

Петров А.А. Компьютерная безопасность. Криптографические методы защиты — M.: ДМК, 2000. — 448 c.
ISBN 5-89818-064-8
Скачать (прямая ссылка): comp_safety.pdf
Предыдущая << 1 .. 172 173 174 175 176 177 < 178 > 179 180 .. 181 >> Следующая

17. R Beauchemin P., Brassard G., Crepeau C, Goutier C, Pomerance C The generation of random numbers that are probably prime. J. of Cryptology, 1,1988.
18. Beker H., Piper F. Cipher Systems. Wiley, 1982.
19. Bennett J. Analysis of the Encryption Algorithm Used in the WordPerfect Word Processing Program. Cryptologia 11(4), 1987.
20. Bergen H. A, Caelli W J. File Security in WordPerfect 5.0. Cryptologia 15(1), January 1991.
21. Beth T Algorithm engineering for public key algorithms. IEEE Selected Areas of Communication, 1(4), 1990.
22. Biham E., Shamir A. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, vol. 4, #1, 1991.
23. Biham E., Shamir A. Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and LUCIFER. In Proceedings of CRYPTO '91, ed. byj. Feigenbaum, 1992.
24. Biham E. Shamir A. Differential Cryptanalysis of the Data Encryption Standard. Springer-Verlag, New York, 1993.
25. Biham E., Shamir A. Differential cryptanalysis of the full 16-round DES. In Advances in Cryptology - Crypto '92, Springer-Verlag, New York, 1993.
26. Blum M., Goldwasser S. An efficient probabilistic public-key encryption scheme which hides all partial information. In Advances in Cryptology -Crypto '84, Springer-Verlag, New York, 1985.
27. den Boer B., Bosselaers A. An attack on the last two rounds of MD4. In Advances in Cryptology - Crypto '91, Springer-Verlag, New York, 1992.
28. den Boer B., Bosselaers A. Collisions for the compression function of MD5. In Advances in Cryptology - Eurocrypt '93, 1993. Preprint.
29. Boyar J. Inferring Sequences Produced by Pseudo-Random Number Generators. Journal of the ACM, 1989.
30. Brandt J., Damgard I. On generation of probable primes by incremental search. In Advances in Cryptology - Crypto '92, Springer-Verlag, New York, 1993.
31. Brassard G. Modern Cryptology: a tutorial. Spinger-Verlag, 1988.
32. Brassard G. Modern Cryptology. Volume 325 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1988.
33. Bressoud D. M. Factorization and Primality Testing. Undergraduate Texts in Mathematics, Springer-Verlag, New York, 1989.
Список рекомендуемой литературы
439
34. Brickell E., Moore J., Purtill М. Structure in the S-boxes of DES. In Proceedings of CRYPTO '86, A. M. Odlyzko ed., 1987.
35. Brickell E.F., Denning D. E., Kent S. T., Maher D. P., Tuchrnan W. Skipjack Review, Interim Report: The Skipjack Algorithm. July 28, 1993.
36. Brown L. A proposed design for an extended DES, Computer Security in the Computer Age. Elsevier Science Publishers B.V. (North Holland), IFIP1 W.J. Caellied., 1989.
37. Brown L., Pieprzyk J., Seberry J. LOKI - a cryptographic primitive for authentication and secrecy applications. In Proceedings of AUSCRYPT 90, 1990.
38. Campbell K. W, Wiener M.J. Proof the DES is Not a Group. In Proceedings of CRYPTO '92, 1993.
39. Carrol J., Martin S. The Automated Cryptanalysis of Substitution Ciphers. Cryptologia 10(4), 1986.
40. Carrol J., Robbins L. Automated Cryptanalysis of Polyalphabetic Ciphers. Cryptologia 11(4), 1987.
41. CCITT Recommendation X.509: The Directory - Authentication Framework, 1988.
42. Chaum D. The dining cryptographers problem: Unconditional sender and recipient untraceability. Available from the author.
43. Chaum D. Privacy protected payments: Unconditional payer and/or payee untraceability. Available from the author.
44. Chaum, D. Snowing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms. Available from the author.
45. Contact RSA Data Security, Inc.
46. Data Encryption Standard. National Bureau of Standards, FIPS PUB 46, Washington, DC, January 1977.
47. Davio M., Goethals J. Elements of cryptology in Secure Digital Communications, G. Longo ed., 1983.
48. Denning Dorothy E. The Clipper encryption system. American Scientist, 81(4), July-August 1993.
49. Diffie W The first ten years of public-key cryptography. Proceedings of the IEEE, 76, 1988.
50. Diffie W, FIellman M. E. Exhaustive cryptanalysis of the NBS Data Encryption Standard. Computer, 10, 1977.
51. Diffie W The first ten years of public key cryptography. IEEE proceedings, 76(5), 1988.
52. Diffie W, Hellman M. New Directions in Cryptography, IEEE Transactions on Information Theory, V. IT-22, n. 6, Jun 1977.
440 Компьютерная безопасность. Криптографические методы защиты
53. Diffie, W., Hellman» М.Е. New directions in cryptography. IEEE Trans. Inf: Theory, IT-22, (November 1976).
54. W. Diffie and M.E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22, 1976.
55. Diffie W., Hellman M. Privacy and Authentication: An introduction to cryptography. IEEE proceedings, 1979.
56. ElGamal T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, IT-31, 1985.
57. Ellison С. M. Solution of the Hebern Messages. Cryptologia, vol. XII, #3, Jul 1988.
58. Even S. Goldreich О. DES-like functions can generate the alternating group. IEEE Trans, on Inform. Theory, vol. 29, #6, 1983.
Предыдущая << 1 .. 172 173 174 175 176 177 < 178 > 179 180 .. 181 >> Следующая

Реклама

c1c0fc952cf0704ad12d6af2ad3bf47e03017fed

Есть, чем поделиться? Отправьте
материал
нам
Авторские права © 2009 BooksShare.
Все права защищены.
Rambler's Top100

c1c0fc952cf0704ad12d6af2ad3bf47e03017fed