Современная криптология - Брассар Ж.
Скачать (прямая ссылка):
168
Литература Л
[310] Rompel, J., “One-way functions are necessary and sufficient for
secqre signatures”, Proceedings of 22nd ACM Symposium on Theory ,df,ff<»ftputing, May 199Q,ipp.J§87-394. jet*
[311] Salvail, L., Le probleme de reconciliation en cryptographic, memoire de m ait rise, Departement d’informatique et de recherche operationnelle, Universite de Montreal, 1991.
[312] SCHNEIER, B, Applied Cryptology, second edition, John Wiley & Sons, New York, N.Y., 1995.
[313] Schrift, A.W., Shamir, A, “The discrete log is very discreet”, Proceedings of 22nd ACM Symposium on Theory of Computing, May 1990, pp. 405-415.
[314] Sedlak, H., “The RSA cryptography processor: The first very high speed one-chip solution”, Advances in Cryptology — Eurocrypt’87 Proceedings, April 1987, Springer - Verlag, pp. 95-105.
[315] Shamir, A., “How to share a secret”, Communications of the ACM, vol. 24, 1979, pp. 612-613.
[316] Shamir, A., “On the generation of cryptographically strong pseudorandom sequences”, ACM Transactions on Computer Systems, vol. 1, 1983, pp. 38^44.
[317] Shamir, A., “A polynomial time algorithm fSr breaking the'"Basic Merkle-Hellman cryptosystem”, IEEE Transactions on Information Theory, vol. IT-30, 1984, pp. 699-704.
[318] Shamir, A., “Identity based cryptosystems and signature schemes”, Advances in Cryptology: Proceedings of Crypto 84, August 1984, Springer - Verlag, pp. 47-53.
[319] Shamir, A., “On the security of the DES”, Advances in Cryptology — Crypto’85 Proceedings, August 1985, Springer - Verlag, pp. 280-281.
[320] Shamir, A., “XV = ’PS'PACE”, Proceedings of 31st IEEE Symposium on Foundations of Computer Science, October 1990, pp. 11 -15.
[321] Shamir, A., Rivest, R. L., Adleman, L. М., “Mental poker”, в: Mathematical Gardner, D. E. Klarner (editor), Wadsworth International, Belmont, CA, 1981, pp. 37-43; (есть русский перевод в: Математический цветник, Д. А. Кларнер (срст. и ред.), М., Мир, 1984, стр. 58-66).
[322] Shand, М., Bertin, P., Vuillemin, J., “Hardware speedups in long integer multiplication”, Proceedings of 2nd ACM Symposium on Parallel Algorithms and Architectures, July 1990, pp. 138-145.
Литература-
169
[323] Shannon, С. Е., “A mathematical theory bf communications”, Bell System Technical Journal, vol. 27, 1948, pp. 379-423, pp. 623-656; (есть русский перевод в: K/iIUehhoh, Работы fneopuu информации и кибернетике, М., ИЛ, 1963, стр. 243 - 332).
[324] Shannon, С. Е;, “Communication theory of secrecy systems”, Bell
System Technical Journal, vol. 28,1949, pp. 656 - 715; (есть русский перевод в: К. Шеннон, Работы по теории информации и
кибернетике, М., ИЛ, 1963, стр. 333 - 402).
[325] Shannon, С. Е., “Prediction and entropy of printed English” , Bell
System Technical Journal, vol. 30, 1951, pp. 50-64; (есть русский перевод в: К. Шеннон, Работы по теории информации и
кибернетике, М., ИЛ, 1963, стр. 669 - 686).
[326] Simmons, G. J.f-“Symmetric and asymmetric encryption”, ACM Computing Surveys, vol. ll, 1979, pp. 305 - 330.
[327] SlMMONS, G.J.,“ Verification of treaty compliance — revisited”, Proceedings of 1983 IEEE Symposium on Security and Privacy, 1983, pp. 61-66.
[328] Simmons, G. J., “The prisoners’ problem and the subliminal channel”, Advances in Cryptology: Proceedings of Crypto 83, Au-
gust 1983, Plenum Press, pp. 51-67.
[329] Simmons, G. J., “A system for verifying User identity and authorization at the point-of-sale or access”, Cryptologia, vol. 8, 1984, pp. 1-21.
[330] SlMMONS, G. J., “Authentication theory /Coding theory”, Advances in Cryptology: Proceedings of Crypto 84, August 1984, Springer-Verlag, pp. 411-431.
[331] Simmons, G. J., “A secure subliminal channel (?)”, Advances in Cryptology — Crypto’85 Proceedings, August 1985, Springer-Verlag, pp. 33-41.
[332] Simmons, G. J., “Cryptology”, Encyclopaedia Britannica, 15th edition, Macropaedia, vol. 16, Chicago, IL, -1986, pp. 913 - 924B.
[333] Simmons, G. J. (editor), Contemporary Cryptology: The Sci-
ence of Information Integrity, IEEE Press, Piscataway, NJ, 1992; (есть русский перевод журнальных версий некоторых статей в:
: ; ТИИЭР, т. 76(1988), №5). 1
[334] Simmons, G. J., “A survey of information authentication”, в: [333],
1992, pp. 379 - 419; (есть русский перевод, журнальной версии в: ТИИЭР, т. 76(1988), №5, стр. 105-125). ^
170
Литература
[335] Simmons, G. J., “An introduction to shared secret and/or shared control schemes and their application”, в: [333], 1992, pp. 441-497.
[336] SIMMONS, G. J., “How to insure that data acquired to verify treaty compliance are trustworthy”, в: [333], 1992, pp. 615-630; (есть русский перевод журнальной версии в: ТИИЭР, т. 76(1988), №5, стр. 126-133).
[337] Smed, М. Е., Branstad, D. К., “The Data Encryption Standard: Past and future”, в: [333], 1992, pp. 43-64; (есть русский перевод журнальной версии в: ТИИЭР, т. 76(1988), №5, стр. 43-54).