Анимация
JavaScript


Главная  Библионтека 

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 [ 47 ] 48 49 50 51 52 53 54 55 56 57

[60] BoYAR, J. F., Brassard, G. Peralta, R., "Subquadratic zero-, knov/ledge", Proceedings of 32nd IEEE Symposium on Foundations of Computer Science, October 1991, pp. 69-78.

[61] Boyar, J.F., Chaum, D., Damgard, I. В., Pedersen, Т., "Convertible imdeniable signatures". Advances in Cryptology - Crypto 90 Proceedings, August 1990, Springer - Verlag, pp. 189-205.

[62] BoYAR, J. F., Krentel, M.W., Kurtz, S.A., "A discrete logarithm implementation of perfect zero-knowledge blobs". Journal of Cryptology, vol. 2, 1990, pp. 63-76.

[63] BoYAR, J.F., Lund, C, Peralta, R., "On the communication complexity of zero-knowledge proofs". Journal of Cryptology, в процессе подготовки; предварительная версия в: Advances in Cryptology - Crypto89 Proceedings, August 1989, Springer-Verlag, pp. 507-525.

[64] Brassard, G., "A note on the complexity of cryptography", IEEE Transactions on Information Theory, vol. IT-25, 1979, pp. 232-233.

[65] Brassard, G., "A time-luck tradeoff in relativized cryptography". Journal of Computer and System Sciences, vol. 22, 1981, pp. 280-311.

[66] Brassard, G., "An optiitiadly seau-e relativized cryptosystem". Advances in Cryptography, a Report on Crypto 81, технический отчет no. 82-04, Department of ECE, University of California, Santa Barbara, CA, 1982, pp. 54-58; перепечатано в: Sigact News, vol. 15, no. 1, 1983, pp. 28-33.

[67] Brassard, G., "Computationally secure authentication tags requiring short secret shared keys". Advances in Cryptology: Proceedings of Crypto 82, August 1982, Plenum Press, pp. 79-86.

[68] Brassard, G., "Relativized cryptography", IEEE Transactions on Information Theory, vol. IT-29, 1983, pp. 877-894.

[69] Brassard, G., "Cryptology in academia: A ten year retrospective". Proceedings of 29th IEEE Computer Conference (CompCon), 1987, pp. 222-226.

[70] Brassard, G., "Cryptology", Encyclopcedia of Mathematics, D. Reidel Pubhshing Company, Dordrecht, Pays-Bas.

[71] Brassard, G., Modern Cryptology, Springer - Verlag, Lecture Notes in Computer Science, vol. 325, 1988. Рецензия на русеком языке: Вбтчинин М. П., «Современная криптология: рецензия на книгу Brassard, G., "Modern Crypto/ogy"», Новые книги за рубеоюом, 1994, № 9(сентябрь), стр. 30-34.



[72] Brassard, G., "How to improve signature schemes". Advances in Cryptology - Eurocrypt 89 Proceedings, April 1989, Springer -Verlag, pp. 16-22.

[73] Brassard, G., "Cryptology column - Hot news on interactive protocols", Sigact News, vol. 21, no. 1, 1990, pp. 7-11.

[74] Brassard, G., "Cryptology column - Hiding information from oracles", Sigact News, vol. 21, no. 2, 1990, pp. 5-11.

[75] Brassard, G., "Cryptology column - How convincing is уош- protocol?", Sigact News, vol. 22, no. 1, 1991, pp. 5-12.

[76] Brassard, G. Bratley, P., Algorithmique: conception et analyse, Massori, Paris, 1987.

[77] Brassard, G., Bratley, P., Algorithmics: Theory and Practice, Prentice-HaU, Englewood Chffs, NJ, 1988.

[78] Brassard, G., Chaum, D., Crepeau, C, "Minimum disclosure proofs of knowledge". Journal of Computer and System Sciences, vol. 37, 1988, pp. 156-189.

[79] Brassard, G. Crepeau, C, "Non-transitive transfer of confidence: A perfect zero-knowledge interactive protocol for SAT cind beyond". Proceedings, of 27th IEEE Sympasumon Foundations of Computer Science, October 1986, pp. 188-195.

[80] Brassard, G. Crepeau, C, "Sorting out zero-knowledge". Advances in Cryptology - Eurocrypt 89 Proceedings, April 1989, Springer - Verlag, pp. 181-191.

[81] Brassard, G. Crepeau, C, "Quantum bit commitment and coin tossing protocols". Advances in Cryptology - Crypto90 Proceedings, August 1990, Springer - Verlag, pp. 49 - 61.

[82] Brassard, G., Crepeau, C, Laplante, S., Leger, C, "Computationally convincing proofs of knowledge", Proceedings of 8th Symposium on Theoretical Aspects of Computer Science, February 1991, Springer - Verlag, pp. 251 - 262.

[83] Brassard, G., Crepeau, C, Robert, J.-M., "All-or-nothing disclosure of secrets". Advances in Cryptology - Crypto86 Proceedings, August 1986, Springer-Verlag, pp. 234-238.

[84] Brassard, G., Crepeau, C, Robert, J.-M., "Information theoretic reductions £imong disclosure problems". Proceedings of 27th IEEE Symposium on Foundations of Computer Science, October 1986, pp. 168-173.



[85] Brassakd, G,, Crepeau, С. Yhng, M., "Constant-round perfect zero-knowledge computati<HiaUy ccmvincing protocols". Theoretical Computer Science, vol. 84, 1991, pp. 23-52.

[86] Brassard, G., Monet, S., Zuffeixato, D., "Algorithmes pour rarithmetique des tres grands entiers", TSI: Technique et Science Informatigues, vol. 5, 1986, pp. 89-102.

[87] Brassard, G. Yung, M., "One-way group actions". Advances in Cryptology - Crypto 90 Proceedings, August 1990, Springer -Verlag, pp. 94-107.

[88] ВШСКШХ, E. F., "Solving low density knapsacks", Advances in Cryptology: Proceedings of Crypto 83, August 1983, Pleniun Press, pp. 25-37.

[89] ВшскЕЬЬ, E. F., "Breaking iterated knapsacks", Advances in Cryptology: Proceedings of Crypto 84, August 1984, Springer - Verlag, pp. 342 - 358.

[90] Brickell, E. F., "The cryptanalysis of knapseick cryptosystems", в: Applications of Discrete Mathematics, R.D. Ringeisen, F.S. Roberts (editors), SIAM, Philaddphia, PA, 1988, pp. 3-23.

[91] Brickell, E. F., "A survey of hardware implementations of RSA", Advances in Cryptology - Crypto 89 Proceeding, August 1989, Springer-Verlag, pp. 368 - 370.

[92] Brickell, E. P., Davenport, D. M., "On the classification of ideal secret sharing schemes", Journal of Cryptology, vol. 4, 1991, pp. 123-134.

[93] Brickell, E.P., Odlyzko, A.M., "Cryptanalysis: A survey of recent results", в: [333], 1992, pp. 501-540; (есть русский перевод журнальной версии в: ТИИЭР, т. 76(1988), №5, стр. 75-94).

[94] Burmester, М. V. D., Desmedt, Y. G., "Remarks on the soundness of proofs". Electronics Letters, vol. 25, 26 October 1989, pp. 1509-1511.

[95] Carroll, J. M., Computer Security, Butterworth Publishers, Stoneham, MA, 1987.

[96] Carroll, J. M., Robbins, L. E., "The automated cryptanalysis of polyalphabetic dphers", Crypologia, \ol. XI, 1987, pp. 193-205.

[97] Cahholl, j. M., RoBBDiS, L. E., "Computer cryptanalysis of product ciphers", Cryptologia, vol. ХШ, 1989, pp. 303 -326.



0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 [ 47 ] 48 49 50 51 52 53 54 55 56 57