Современная криптология - Брассар Ж.
Скачать (прямая ссылка):
154
Литература
[133] Damgard, I. В., The Application of Claw Free Functions in Cryptography; Unconditional Protection in Cryptographic Protocols, тезисы докторской диссертации, Matematisk Institut, Aarhus Uni-versitet, Arhus, Danemark, 1988.
[134] David A, G., “Chosen signature cryptanalysis of the RSA (MIT) public key cryptosystem”, технический отчет TR-CS-82-2, Department of EECS, University of Wisconsin, Milwaukee, WI, 1982.
[135] Davies, D. W., Parkin, G..I. P., “The average cycle size of the key stream in output feedback encipherment”, Advances in Cryptology: Proceedings of Crypto 82, August 1982, Plenum Press, pp. 97-98.
[136] Davies, D. W., Price, W. L., Security for Computer Networks: An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer, John Wiley & Sons, New York, NY, 1984.
[137] Davio, М., Desmedt, Y. G., Fosseprez, М., Govaerts, R., Hulsbosch, J., Neutjens, P., Piret, P., Quisquater, J.-J., Vandewalle, J., Wouters, P., “Analytical characteristics of the DES”, Advances in Cryptology: Proceedings of Crypto 83, August 1983, Plenum Press, pp. 171-202.
[138] Davio, М., Desmedt, Y. G., Goubert, J., Hoornaert, F., Quisquater, J.-J., “Efficient hardware and software implementations of the DES”, Advances in Cryptology: Proceedings of Crypto 84, August 1984, Springer - Verlag, pp. 144 - 146.
[139] Deavours, C.A., “Unicity points in cryptanalysis”, Cryptologia, vol. 1, 1977, pp. 46-68.
[140] Deavours, C. A., Kruh, L., Machine Cryptography and Modern Cryptanalysis, Artech House, Dedham, MA, 1985.
[141] Delorme, C., Quisquater, J.-J., “Networks, graphs and security: I. Secrecy on identity of sender and addressee; II. Key exchanges”, представлено на First International Conference on Industrial and Applied Mathematics, Paris, June 1987; существует в виде рукописи Manuscrit М210, Philips Research Laboratory, Bruxelles, Belgique, 1987.
[142] DENNING, D. E. R., Cryptography and Data Security, Addison-Wesley, Reading, MA, 1983.
[143] Denning, D. Ё. R., “Digital signatures with RSA and other public-key cryptosystems”, Communications of the ACM, vol. 27, 1984, pp. 388-392.
Литература
155
[144] DeSantis, A., Micali, S., Persiano, G., “Non-interactive zero-knowledge proof systems”, Advances in Cryptology — Crypto ’87 Proceedings, August 1987, Springer-Verlag, pp. 52-72.
[145] DESMEDT, Y. G., Analysis of the Security and New Algorithms for Modem Industrial Cryptography, тезисы докторской диссертации, Katholieke Universiteit Leuven, Belgique, 1984.
[146] DESMEDT, Y. G., “Unconditionally secure authentication schemes and practical and theoretical consequences”, Advances in Cryptology — Crypto’85 Proceedings, August 1985, Springer - Verlag, pp. 42-55.
[147] DESMEDT, Y. G., “Major security problems with the ‘unforgeable’ (Feige-)Fiat-Shamir proofs of identity and how to overcome them”, Proceedings of Securicom 88, March 1988, pp. 147-159.
[148] Desmedt, Y. G., Goutier, C., Bengio, S., “Special uses and abuses of the Fiat - Shamir passport protocol”, Advances in Cryptology — Crypto ’87 Proceedings, August 1987, Springer - Verlag, pp. 21-39.
[149] Desmedt, Y. G., Odlyzko, A.M., “A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes”, Advances in Cryptology — Crypto ’85 Proceedings, August 1985, Springer -Verlag, pp. 516-522.
[150] Desmedt, Y. G., Vandewalle, J., Govaerts, R., “Critical analysis of the security of knapsack public key algorithms”, IEEE Transactions on Information Theory, vol. IT-30, 1984, pp. 601-611.
[151] Desmedt, Y. G., Yung, М., “Weaknesses of undeniable signature schemes”, Advances in Cryptology — Eurocrypt ’91 Proceedings, April 1991, Springer - Verlag, pp. 205-220.
[152] Deutsch, D., “Quantum theory, the Church - Turing principle and the universal quantum computer”, Proceedings of the Royal Society, Londres, vol. A400, 1985, pp. 97-117.
[153] DEUTSCH, D., “Three connections between Everett’s interpretation and experiment”, в: Quantum Concepts in Space and Time, R. Penrose, C. Isham (editors), Clarendon Press, Oxford, 1986, pp. 215-225.
[154] DEUTSCH, D., “Quantum communication thwarts eavesdroppers”, New Scientist, 9 December 1989, pp. 25 - 26.
[155] Deutsch, D., Jozsa, R., “Rapid solution of problems by quantum computation”, рукопись находится у авторов, December 1991.
156
Литературу
[156] Diffie, W., “The first ten years of public-key cryptography”, в: [333], 1992, pp. 135-175; (есть русский перевод журнальной версии в: ТИИЭР, т.76(1988), №5, стр. 54-74).
[157] Diffie, W., Hellman, М. Е., “New directions in cryptography”, IEEE Transactions on Information Theory, vol. IT-22, 1976, pp. 644-654.
[158] Diffie, W., Hellman, М. E., “Exhaustive cryptanalysis of the NBS Data Encryption Standard”, Computer, vol. 10, June 1977, pp. 74-84.
[159] Diffie, W., Hellman, M.E., “Privacy and authentication: An introduction to cryptography”, Proceedings of the IEEE, vol. 67, 1979, pp. 397-427; (есть русский перевод в: ТИИЭР, т.67(1979), №3, стр. 71-109).