booksshare.net -> -> -> . -> " " -> 59

- .

. .: , 1999. 178 c.
( ): sovremennayakritologiya1999.pdf
<< 1 .. 53 54 55 56 57 58 < 59 > 60 61 62 63 64 65 .. 68 >>

154



[133] Damgard, I. ., The Application of Claw Free Functions in Cryptography; Unconditional Protection in Cryptographic Protocols, , Matematisk Institut, Aarhus Uni-versitet, Arhus, Danemark, 1988.

[134] David A, G., Chosen signature cryptanalysis of the RSA (MIT) public key cryptosystem, TR-CS-82-2, Department of EECS, University of Wisconsin, Milwaukee, WI, 1982.

[135] Davies, D. W., Parkin, G..I. P., The average cycle size of the key stream in output feedback encipherment, Advances in Cryptology: Proceedings of Crypto 82, August 1982, Plenum Press, pp. 97-98.

[136] Davies, D. W., Price, W. L., Security for Computer Networks: An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer, John Wiley & Sons, New York, NY, 1984.

[137] Davio, ., Desmedt, Y. G., Fosseprez, ., Govaerts, R., Hulsbosch, J., Neutjens, P., Piret, P., Quisquater, J.-J., Vandewalle, J., Wouters, P., Analytical characteristics of the DES, Advances in Cryptology: Proceedings of Crypto 83, August 1983, Plenum Press, pp. 171-202.

[138] Davio, ., Desmedt, Y. G., Goubert, J., Hoornaert, F., Quisquater, J.-J., Efficient hardware and software implementations of the DES, Advances in Cryptology: Proceedings of Crypto 84, August 1984, Springer - Verlag, pp. 144 - 146.

[139] Deavours, C.A., Unicity points in cryptanalysis, Cryptologia, vol. 1, 1977, pp. 46-68.

[140] Deavours, C. A., Kruh, L., Machine Cryptography and Modern Cryptanalysis, Artech House, Dedham, MA, 1985.

[141] Delorme, C., Quisquater, J.-J., Networks, graphs and security: I. Secrecy on identity of sender and addressee; II. Key exchanges, First International Conference on Industrial and Applied Mathematics, Paris, June 1987; Manuscrit 210, Philips Research Laboratory, Bruxelles, Belgique, 1987.

[142] DENNING, D. E. R., Cryptography and Data Security, Addison-Wesley, Reading, MA, 1983.

[143] Denning, D. . R., Digital signatures with RSA and other public-key cryptosystems, Communications of the ACM, vol. 27, 1984, pp. 388-392.


155

[144] DeSantis, A., Micali, S., Persiano, G., Non-interactive zero-knowledge proof systems, Advances in Cryptology Crypto 87 Proceedings, August 1987, Springer-Verlag, pp. 52-72.

[145] DESMEDT, Y. G., Analysis of the Security and New Algorithms for Modem Industrial Cryptography, , Katholieke Universiteit Leuven, Belgique, 1984.

[146] DESMEDT, Y. G., Unconditionally secure authentication schemes and practical and theoretical consequences, Advances in Cryptology Crypto85 Proceedings, August 1985, Springer - Verlag, pp. 42-55.

[147] DESMEDT, Y. G., Major security problems with the unforgeable (Feige-)Fiat-Shamir proofs of identity and how to overcome them, Proceedings of Securicom 88, March 1988, pp. 147-159.

[148] Desmedt, Y. G., Goutier, C., Bengio, S., Special uses and abuses of the Fiat - Shamir passport protocol, Advances in Cryptology Crypto 87 Proceedings, August 1987, Springer - Verlag, pp. 21-39.

[149] Desmedt, Y. G., Odlyzko, A.M., A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes, Advances in Cryptology Crypto 85 Proceedings, August 1985, Springer -Verlag, pp. 516-522.

[150] Desmedt, Y. G., Vandewalle, J., Govaerts, R., Critical analysis of the security of knapsack public key algorithms, IEEE Transactions on Information Theory, vol. IT-30, 1984, pp. 601-611.

[151] Desmedt, Y. G., Yung, ., Weaknesses of undeniable signature schemes, Advances in Cryptology Eurocrypt 91 Proceedings, April 1991, Springer - Verlag, pp. 205-220.

[152] Deutsch, D., Quantum theory, the Church - Turing principle and the universal quantum computer, Proceedings of the Royal Society, Londres, vol. A400, 1985, pp. 97-117.

[153] DEUTSCH, D., Three connections between Everetts interpretation and experiment, : Quantum Concepts in Space and Time, R. Penrose, C. Isham (editors), Clarendon Press, Oxford, 1986, pp. 215-225.

[154] DEUTSCH, D., Quantum communication thwarts eavesdroppers, New Scientist, 9 December 1989, pp. 25 - 26.

[155] Deutsch, D., Jozsa, R., Rapid solution of problems by quantum computation, , December 1991.
156



[156] Diffie, W., The first ten years of public-key cryptography, : [333], 1992, pp. 135-175; ( : , .76(1988), 5, . 54-74).

[157] Diffie, W., Hellman, . ., New directions in cryptography, IEEE Transactions on Information Theory, vol. IT-22, 1976, pp. 644-654.

[158] Diffie, W., Hellman, . E., Exhaustive cryptanalysis of the NBS Data Encryption Standard, Computer, vol. 10, June 1977, pp. 74-84.

[159] Diffie, W., Hellman, M.E., Privacy and authentication: An introduction to cryptography, Proceedings of the IEEE, vol. 67, 1979, pp. 397-427; ( : , .67(1979), 3, . 71-109).
<< 1 .. 53 54 55 56 57 58 < 59 > 60 61 62 63 64 65 .. 68 >>

c1c0fc952cf0704ad12d6af2ad3bf47e03017fed

, ?
2009 BooksShare.
.
Rambler's Top100

c1c0fc952cf0704ad12d6af2ad3bf47e03017fed