Научная литература
booksshare.net -> Добавить материал -> Информатика -> Петров А.А. -> "Компьютерная безопасность. Криптографические методы защиты" -> 179

Компьютерная безопасность. Криптографические методы защиты - Петров А.А.

Петров А.А. Компьютерная безопасность. Криптографические методы защиты — M.: ДМК, 2000. — 448 c.
ISBN 5-89818-064-8
Скачать (прямая ссылка): comp_safety.pdf
Предыдущая << 1 .. 173 174 175 176 177 178 < 179 > 180 .. 181 >> Следующая

59. Feistel H. Cryptography and Computer Privacy. Scientific American, 228(5), 1973.
60. Feistel H., Notz W., Lynn Smith J. Some cryptographic techniques for machine-to-machine data communications, IEEE IEEE proceedings, 63(11), 1975.
61. Fiat A., Shamir A. How to prove yourself: Practical solutions to identification and signature problems. In Advances in Cryptology - Crypto '86, Springer-Verlag, New York, 1987.
62. Friedman W. F., Solving German Codes in World War I. Aegean Park Press.
63. Gaines H. Cryptanalysis, a study of ciphers and their solution. Dover Publications, 1944.
64. Garon J., Outerbridge R. DES watch: an examination of the sufficiency of the Data Encryption Standard for financial institutions in the 1990's. Cryptologia, vol. XV, #3, 1991.
65. Gillogly. Cryptologia 4(2), 1980.
66. Goldwasser S., Micali S. Probabilistic Encryption and How To Play Mental Poker Keeping Secret All Partial Information. Proceedings of the Fourteenth Annual ACM Symposium on Theory of Computing, 1982.
67. Goldwasser S., Micali S. Probabilistic encryption. J. of Computer and System Sciences, 28,1984.
68. Good I. J. Good Thinking: the foundations of probability and its applications. University of Minnesota Press, 1983.
69. Gordon D. M. Discrete logarithms using the number field sieve. March 28, 1991.
70. Gordon D.M., McCurley K.S. Massively parallel computation of discrete logarithms. In Advances in Cryptology - Crypto '92, Springer-Verlag, New York, 1993.
Список рекомендуемой литературы___441
71. Gustafson H., Dawson E., Caelli W. Comparison of block ciphers. In Proceedings of AUSCRYPT '90, J. Seberry and J. Piepryzk eds., 1990.
72. Hastad J. Solving simultaneous modular equations of low degree. SIAM J. Computing,17, 1988.
73. Hellman M. A cryptanalytic time-memory trade off. IEEE Transactions on Information Theory, IT-26, 1980.
74. Hellman M, The mathematics of public key cryptography. Scientific American, 1979.
75. Hinsley F. H. et al. British Intelligence in the Second World War. Cambridge University Press, (vol's 1, 2, 3a, 3b & 4, so far). XXX Years and authors, fix XXX
76. Hodges A., Turing A. The Enigma. Burnett Books Ltd., 1983
77. Hunter D. G. N., Kam G., Davida G. A structured design of substitution-permutation encryption networks. IEEE Trans. Information Theory, 28(10),747-753, 1978.
78. Hunter D. G. N., McKenzie A. R. Experiments with Relaxation Algorithms for Breaking Simple Substitution Ciphers. Computer Journal 26 (1), 1983.
79. ISI for DARPA, RFC 793: Transport Control Protocol, September 1981.
80. Kahn D. The Codebreakers. Macmillan Co., New York, 1967.
81. Kahn D. Seizing the Enigma. Houghton Mifflin, 1991.
82. Kaliski B., Rivest R., Sherman A. Is the Data Encryption Standard a Group. Journal of Cryptology, vol. 1, #1, 1988.
83. Kaliski B. S. A survey of encryption standards. RSA Data Security, Inc., September 2, 1993.
84. Kalliski B. Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services. RFC 1424, February 1993.
85. Kaliski B. SJr., Rivest R. L., Sherman A. T. Is the data encryption standard a group? J. of Cryptology, I1 1988.
86. Kam J., Davida G. A structured design of substitution-permutation encryption networks. IEEE Trans. Information Theory, 28(10), 1978.
87. Kent S. RFC 1422: Privacy Enhancement for Internet Electronic Mail, Part II: Certificate-Based Key Management. Internet Activities Board, February 1993.
88. King and Bahler, An Algorithmic Solution of Sequential Homophonie Ciphers. Cryptologia 17(2), in press.
89. King and Bahler, Probabilistic Relaxation in the Cryptanalysis of Simple Substitution Ciphers. Cryptologia 16(3), 215-225,1992.
90. Kinnucan P. Data encryption gurus: Tuchman and Meyer.Cryptologia, vol. II #4, 371-XXX, 1978.
Компьютерная безопасность. Криптографические методы защиты
91. Knuth D. Е. The Art of Computer Pro gramming, volume 2: Semmumerical Algorithms. Addison-Wesley, 1981.
92. Knuth D. E. The Art of Computer Programming. Volume 2, Addison-Wesley, Reading, Mass., 2nd edition, 1981.
93. Koblitz N. A course in number theory and cryptography. Springer-Verlag, 1987.
94. Kochanski M. Another Data Insecurity Package. Cryptologia 12(3), 165-177, 1988.
95. Kochanski M. Another Data Insecurity Package. Cryptologia 12(3), 1988.
96. Konheim A. Cryptography: a primer. Wiley, 1981.
97. Kozaczuk W. Enigma. University Publications of America, 1984.
98. Krawczyk H. IETF Draft: Keyed-MD5 for Message Authentication, November 1995.
99. Kruh, Cryptologia 12(4), 1988.
100. Kruh D., Kruh L. Machine Cryptography and Modern Cryptanalysis. Artech FIouse, 1985,
101. Kullback S. Information Theory and Statistics. Dover, 1968.
102. Kullback S. Statistical Methods in Cryptanalysis. Aegean Park Press, 1976.
103. Lai X. On the Design and Security of Block Ciphers, ETH Series in Information Processing, v. 1, Konstanz: Flartung-Gorre Verlag, 1992.
104. Lai X., Massey J. A proposal for a new block encryption standard. EURO-CRYPT 90, 1990.
Предыдущая << 1 .. 173 174 175 176 177 178 < 179 > 180 .. 181 >> Следующая

Реклама

c1c0fc952cf0704ad12d6af2ad3bf47e03017fed

Есть, чем поделиться? Отправьте
материал
нам
Авторские права © 2009 BooksShare.
Все права защищены.
Rambler's Top100

c1c0fc952cf0704ad12d6af2ad3bf47e03017fed