Анимация
JavaScript


Главная  Библионтека 

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 [ 49 ] 50 51 52 53 54 55 56 57

[133] Damgard, I. В., The Application of Claw Free Functions in Cryptography; Unconditional Protection in Cryptographic Protocols, тезисы докторской диссертадии, Matematisk Institut, Aarhus Uni-versitet, Arhus, Danemark, 1988.

[134] DAvroA, G., "Chosen signature cryptanalysis of the RSA (MIT) pubhc key cryptosystem", технический отчет TR-CS-82-2, Department of EECS, University of Wisconsin, Milwaukee, Wl, 1982.

[135] Davies, D. W., Parkin, G.I. P., "The average cycle size of the key stream in output feedback encipherment", Advances in Cryptology: Proceedings of Crypto 82, August 1982, Plenum Press, pp. 97-98.

[136] Davies, D. W., Price, W. L., Security for Computer Networks: An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer, John Wiley & Sons, New York, NY, 1984.

[137] Davio, M., Desmedt, Y. G., Fosseprez, M., Govaerts, R., hulsbosch, J., Neutjens, p., Piret, p., Quisquater, J.-J., Vandewalle, j., Wouters, p., "Analytical characteristics of the DES", Advances in Cryptology: Proceedings of Crypto 83, August 1983, Plenum Press, pp. 171 - 202.

[138] Davio, M., Desmedt, Y. G., Goubert, J., Hoornaert, F., Quisquater, J.-J., "Efficient hcirdware cind software implementations of the DES", Advances in Cryptology: Proceedings of Crypto 84, August 1984, Springer - Verlag, pp. 144 - 146.

[139] Deavours, C. A., "Unicity points in cryptanalysis", Cryptologia, vol. 1, 1977, pp. 46-68.

[140] Deavours, C. A., Kruh, L., Machine Cryptography and Modern Cryptanalysis, Artech House, Dedham, MA, 1985.

[141] Delorme, C, Quisquater, J.-J., "Networks, graphs and security: I. Secrecy on identity of sender and addressee; II. Key exchanges", представлено на First International Conference on Industrial and Applied Mathematics, Pfuis, Jime 1987; существует в виде рукописи Manuscrit M210, Philips Research Laboratory, Bruxelles, Belgique, 1987.

[142] Denning, D. E. R., Cryptography and Data Security, Addison-Wesley, Reading, MA, 1983.

[143] Denning, D. E. R., "Digital signatures with RSA and other pubHc-key cryptosystems". Communications of the ACM, vol. 27, 1984, pp. 388-392.



[144] DeSantis, а., Micali, S., Persiano, G., "Non-mteractive zero-knowledge proof systems". Advances in Cryptology - Crypto 87 Proceedings, August 1987, Springer-Verlag, pp. 52-72.

[145] Desmedt, Y. G., Analysis of the Security and New Algorithms for Modem Industrial Cryptography, тезисы докторской диссертации, Katholieke Universiteit Leuven, Belgique, 1984.

[146] Desmedt, Y. G., "Unconditionally secure authentication schemes and practical and theoretical consequences". Advances in Cryptology - Crypto 85 Proceedings, August 1985, Springer - Verlag, pp. 42-55.

[147] Desmedt, Y. G., "Major seciuity problems with the unforgeable (Feige-)Fiat-Shamir proofs of identity cind how to overcome them". Proceedings of Securicom 88, March 1988, pp. 147-159.

[148] Desmedt, Y. G., Goutier, C., Bengio, S., "Special uses and abuses of the Fiat - Shamir passport protocol", Advances in Cryptology - Crypto 87 Proceedings, August 1987, Springer - Verlag, pp. 21-39.

[149] Desmedt, Y. G., Odlyzko, A.M., "A chosen text attack on the RSA cryptosystem cind some discrete logcuithm schemes". Advances in Cryptology - Crypto85 Proceedings, August 1985, Springer-Verlag, pp. 516-522.

[150] Desmedt, Y. G., Vandewalle, J., Govaerts, R., "Critical analysis of the security of knapsack pubhc key algorithms", IEEE Transactions on Information Theory, vol. IT-30, 1984, pp. 601-611.

[151] Desmedt, Y. G., Yung, M., "Weaknesses of undeniable signature schemes", Advances in Cryptology - Eurocrypt 91 Proceedings, April 1991, Springer-Verlag, pp. 205-220.

[152] Deutsch, D., "Quantum theory, the Church-Turing principle and the univers£il quantum computer". Proceedings of the Royal Society, Londres, vol. A400, 1985, pp. 97-117.

[153] Deutsch, D., "Three connections between Everetts interpretation and experiment", в: Quantum Concepts in Space and Time, R. Penrose, C. Isham (editors). Clarendon Press, Oxford, 1986, pp. 215-225.

[154] Deutsch, D., "Qucintum communication thwarts eavesdroppers". New Scientist, 9 December 1989, pp. 25-26.

[155] Deutsch, D., Jozsa, R., "Rapid solution of problems by qucintum computation", рукопись нгисодится у авторов, December 1991.



[156] Diffie, W., "The first ten years of pubUc-key cryptography", в: [333], 1992, pp. 135-175; (есть русский перевод журнгильной версии в: ТИИЭР, т.76(1988), №5, стр. 54-74).

[157] Dff-fie, W., Hellman, М. Е., "New directions in cryptography", IEEE Transactions on Information Theory, vol. IT-22, 1976, pp. 644-654.

[158] Diffie, W., Hellman, M. E., "Exhaustive cryptanalysis of the NBS Data Encryption Standard", Computer, vol. 10, June 1977, pp. 74-84.

[159] Diffie, W., Hellman, M.E., "Privacy and authentication: An introduction to cryptography", Proceedings of the IEEE, vol. 67, 1979, pp. 397-427; (есть русский перевод в: ТИИЭР, т.67(1979), №3, стр. 71 -109).

[160] Dusse, S. R., Kaliski, В. S., Jr., "a cryptographic Ubrary for the Motorola DSP 56000", Advances in Cryptology - Eurocrypt 90 Proceedings, May 1990, Springer-Verlag, pp. 230-244.

[161] eler, R., LaGGEr, H., "Trapdoors in knapsack cryptosystems". Cryptography - Proceedings, Burg Feuerstein 1982, Lecture Notes in Computer Science, vol. 149, Springer - Verlag, 1983, pp. 316-322.

[162] Einstein, A., Podolsky, В., Rosen, N., ь"Сап quantum-mechcinical description of physical recJity be considered complete". Physical Review, vol. 47, 1935, p. 777.

[163] Ekert, a. K., "La meccinique qucmtique an secours des agents secrets", La Recherche, June 1991, pp. 790-791.

[164] Ekert, A. K., "Quantum cryptography based on Bells theorem". Physical Review Letters, vol. 67, 5 August 1991, pp. 661-663.

[165] Ekert, A. K., Rarity, J., Tapster, P., Palma, G.M., "Practical quantum cryptography based on two-photon interferometry", Physical Review Letters, vol. 69, 31 August 1992, pp. 1293-1296.

[166] ElGamal, Т., "A pubUc key cryptosystem cmd a signatvu-e scheme based on discrete logcirithm", IEEE Transactions on Information Theory, vol. IT-31, 1985, pp. 469-472.

[167] Evans, A., Kantrowitz, W., Weiss, E., "A user authentication scheme not requiring secrecy in the computer". Communications of the ACM, vol. 17, 1974, pp. 437-442.

[168] Even, S., Goldreich, O., Lempel, A., "A randomized protocol for signing contrcicts". Communications of the ACM, vol. 28, 1985, pp. 637-647.



0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 [ 49 ] 50 51 52 53 54 55 56 57