Научная литература
booksshare.net -> Добавить материал -> Физика -> Брассар Ж. -> "Современная криптология " -> 59

Современная криптология - Брассар Ж.

Брассар Ж. Современная криптология — М.: ПОЛИМЕД, 1999. — 178 c.
Скачать (прямая ссылка): sovremennayakritologiya1999.pdf
Предыдущая << 1 .. 53 54 55 56 57 58 < 59 > 60 61 62 63 64 65 .. 68 >> Следующая

154

Литература

[133] Damgard, I. В., The Application of Claw Free Functions in Cryptography; Unconditional Protection in Cryptographic Protocols, тезисы докторской диссертации, Matematisk Institut, Aarhus Uni-versitet, Arhus, Danemark, 1988.

[134] David A, G., “Chosen signature cryptanalysis of the RSA (MIT) public key cryptosystem”, технический отчет TR-CS-82-2, Department of EECS, University of Wisconsin, Milwaukee, WI, 1982.

[135] Davies, D. W., Parkin, G..I. P., “The average cycle size of the key stream in output feedback encipherment”, Advances in Cryptology: Proceedings of Crypto 82, August 1982, Plenum Press, pp. 97-98.

[136] Davies, D. W., Price, W. L., Security for Computer Networks: An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer, John Wiley & Sons, New York, NY, 1984.

[137] Davio, М., Desmedt, Y. G., Fosseprez, М., Govaerts, R., Hulsbosch, J., Neutjens, P., Piret, P., Quisquater, J.-J., Vandewalle, J., Wouters, P., “Analytical characteristics of the DES”, Advances in Cryptology: Proceedings of Crypto 83, August 1983, Plenum Press, pp. 171-202.

[138] Davio, М., Desmedt, Y. G., Goubert, J., Hoornaert, F., Quisquater, J.-J., “Efficient hardware and software implementations of the DES”, Advances in Cryptology: Proceedings of Crypto 84, August 1984, Springer - Verlag, pp. 144 - 146.

[139] Deavours, C.A., “Unicity points in cryptanalysis”, Cryptologia, vol. 1, 1977, pp. 46-68.

[140] Deavours, C. A., Kruh, L., Machine Cryptography and Modern Cryptanalysis, Artech House, Dedham, MA, 1985.

[141] Delorme, C., Quisquater, J.-J., “Networks, graphs and security: I. Secrecy on identity of sender and addressee; II. Key exchanges”, представлено на First International Conference on Industrial and Applied Mathematics, Paris, June 1987; существует в виде рукописи Manuscrit М210, Philips Research Laboratory, Bruxelles, Belgique, 1987.

[142] DENNING, D. E. R., Cryptography and Data Security, Addison-Wesley, Reading, MA, 1983.

[143] Denning, D. Ё. R., “Digital signatures with RSA and other public-key cryptosystems”, Communications of the ACM, vol. 27, 1984, pp. 388-392.
Литература

155

[144] DeSantis, A., Micali, S., Persiano, G., “Non-interactive zero-knowledge proof systems”, Advances in Cryptology — Crypto ’87 Proceedings, August 1987, Springer-Verlag, pp. 52-72.

[145] DESMEDT, Y. G., Analysis of the Security and New Algorithms for Modem Industrial Cryptography, тезисы докторской диссертации, Katholieke Universiteit Leuven, Belgique, 1984.

[146] DESMEDT, Y. G., “Unconditionally secure authentication schemes and practical and theoretical consequences”, Advances in Cryptology — Crypto’85 Proceedings, August 1985, Springer - Verlag, pp. 42-55.

[147] DESMEDT, Y. G., “Major security problems with the ‘unforgeable’ (Feige-)Fiat-Shamir proofs of identity and how to overcome them”, Proceedings of Securicom 88, March 1988, pp. 147-159.

[148] Desmedt, Y. G., Goutier, C., Bengio, S., “Special uses and abuses of the Fiat - Shamir passport protocol”, Advances in Cryptology — Crypto ’87 Proceedings, August 1987, Springer - Verlag, pp. 21-39.

[149] Desmedt, Y. G., Odlyzko, A.M., “A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes”, Advances in Cryptology — Crypto ’85 Proceedings, August 1985, Springer -Verlag, pp. 516-522.

[150] Desmedt, Y. G., Vandewalle, J., Govaerts, R., “Critical analysis of the security of knapsack public key algorithms”, IEEE Transactions on Information Theory, vol. IT-30, 1984, pp. 601-611.

[151] Desmedt, Y. G., Yung, М., “Weaknesses of undeniable signature schemes”, Advances in Cryptology — Eurocrypt ’91 Proceedings, April 1991, Springer - Verlag, pp. 205-220.

[152] Deutsch, D., “Quantum theory, the Church - Turing principle and the universal quantum computer”, Proceedings of the Royal Society, Londres, vol. A400, 1985, pp. 97-117.

[153] DEUTSCH, D., “Three connections between Everett’s interpretation and experiment”, в: Quantum Concepts in Space and Time, R. Penrose, C. Isham (editors), Clarendon Press, Oxford, 1986, pp. 215-225.

[154] DEUTSCH, D., “Quantum communication thwarts eavesdroppers”, New Scientist, 9 December 1989, pp. 25 - 26.

[155] Deutsch, D., Jozsa, R., “Rapid solution of problems by quantum computation”, рукопись находится у авторов, December 1991.
156

Литературу

[156] Diffie, W., “The first ten years of public-key cryptography”, в: [333], 1992, pp. 135-175; (есть русский перевод журнальной версии в: ТИИЭР, т.76(1988), №5, стр. 54-74).

[157] Diffie, W., Hellman, М. Е., “New directions in cryptography”, IEEE Transactions on Information Theory, vol. IT-22, 1976, pp. 644-654.

[158] Diffie, W., Hellman, М. E., “Exhaustive cryptanalysis of the NBS Data Encryption Standard”, Computer, vol. 10, June 1977, pp. 74-84.

[159] Diffie, W., Hellman, M.E., “Privacy and authentication: An introduction to cryptography”, Proceedings of the IEEE, vol. 67, 1979, pp. 397-427; (есть русский перевод в: ТИИЭР, т.67(1979), №3, стр. 71-109).
Предыдущая << 1 .. 53 54 55 56 57 58 < 59 > 60 61 62 63 64 65 .. 68 >> Следующая

Реклама

c1c0fc952cf0704ad12d6af2ad3bf47e03017fed

Есть, чем поделиться? Отправьте
материал
нам
Авторские права © 2009 BooksShare.
Все права защищены.
Rambler's Top100

c1c0fc952cf0704ad12d6af2ad3bf47e03017fed