***** Google.Поиск по сайту:

Лекции по Теоретическим основам цифровой связи   

14. Шифрование и дешифрование


1. Kahn D. The Codebreakers. Macmillan Publishing Company, New York, 1967.

2. Diffie W. and Hellman M. E. Privacy and Authentication: An Introduction to Cryptography. Proc. IEEE, vol. 67, n. 3, March, 1979, pp. 397-427.

3. Beker H. and Piper F. Cipher Systems. John Wiley & Sons, Inc., New York, 1982.

4. Denning D. E. R. Cryptography and Data Security. Addison-Wesley Publishing Company, Reading, Mass, 1982.

5. Shannon C. E. Communication Theory of Secrecy Systems. Bell Syst. Tech. J., vol. 28, October, 1949, pp. 656-715.

6. Hellman M. E. An Extension of the Shannon Theory Approach to Cryptography. IEEE Trans. Inf. Theory, vol. IT23, May, 1978, pp. 289-294.

7. Smith J. L. The Design of Lucifer, a Cryptographic Device for Data Communications. IBM Research Rep. RC-3326, 1971.

8. Feistel H. Cryptography and Computer Privacy. Sci. Am., vol. 228, n. 5, May, 1973, pp. 15-23.

9. National Bureau of Standards. Data Encryption Standard. Federal Information Processing Standard (FIPS), Publication n. 46, January, 1977.

10. United States Senate Select Committee in Intelligence. Unclassified Summary: Involvement of NSA in the Development of the Data Encryption Standard. IEEE Commun. Soc. Mag., vol. 16, n. 6, November, 1978, pp. 53-55.

11. Stallings W. Cryptography and Network Security. Second Addition, Prentice Hall, Upper Saddle River, NJ. 1998. (Столлингс В. Криптография и защита сетей. Принципы и практика, 2-е издание. М.: — Издательский дом "Вильямc", 2001. — 672 с.)

12.  Diffie W. and Hellman M. E. New Directions in Cryptography. IEEE Trans. Inf. Theory, vol. 1722, November, 1976, pp. 644-654.

13.  Rivest R. L., Shamir A. and Adelman L.  On Digital Signature and Public Key Cryptosystems. Commun. ACM. Vol. 21, February, 1978, pp. 120-126.

14.  Knuth D. E. The Art of Computer Programming, Vol. 2, Seminumerical Algorithms. 2nd ed., Addison-Wesley Publishing Company, Reading, Mass, 1981. (Кнут Д. Искусство программирования, т. 2. Получисленные алгоритмы, 3-е издание. — М.: Издательский дом "Вильяме", 2000. — 832 с.)

15.  Mercal R. С. and Hellman M. E. Hiding Information and Signatures in Trap-Door Knapsacks. IEEE, Trans. Inf. Theory, vol. IT24, September, 1978, pp. 525-530.

16.  Shamir A. A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystems. IEEE 23rd Ann. Symp. Found. Comput. Sci., 1982, pp. 145-153.

17.  Zimmerman P. The Official PGP User's Guide. MIT Press, Cambridge, 1995.

18.  PGP Freeware User's Guide, Version 6.5. Network Associates, Inc., 1999.

19.  Schneier B. Applied Cryptography. John Wiley & Sons, New York, 1996.

20.  Hellman M. E., Martin, Bailey, Diffie, W. and Merkle R. C. United States Patent 4, 200, 700: Cryptographic Apparatus and Method. United States Patent and Trademark Office, Washington, DC, 1980.

21.  Stinson, Douglas. Cryptography Theory and Practice. CRC Press, Boca Raton, FL, 1995.

22.  Digital Signature Standard (Federal Information Processing Standards Publication 186-1). Government Printing Office, Springfield, VA, December, 15, 1998.

***** Яндекс.Поиск по сайту:

© Банк лекций Siblec.ru
Формальные, технические, естественные, общественные, гуманитарные, и другие науки.