Анимация
JavaScript


Главная  Библионтека 

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 [ 54 ] 55 56 57

Литература- I6ff.

[323] Shannon, С. E., "A mathematical theory bf commmucations", Bell System Technical Journal, vol. 27, 1948, pp. 379-423, pp. 623-656; (есть русский перевод тК.Ш1вшюн, Работы ii&Теории информации и кибернетике, М., ИЛ, 1963, стр. 243-332),

[324] Shannon, С. Е., "Communication theory of secrecy systems". Bell System Technical Journal, vol. 28, 1949, pp. 656-715; (есть русский перевод в: К. Шеннон, Работы по теории информации и кибернетике, М., ИЛ, 1963, стр. 333 - 402).

[325] Shannon, С. Е., "Prediction and entropy of printed Enghsh", Bell System Technical Journal, vol. 30, 1951, pp. 50-64; (есть русский перевод в: К. Шеннон, Работы по теории информации и кибернетике, М., ИЛ, 1963, стр. 669 - 686).

[326] Simmons, G. J.,- "Symmetric and asymmetric encryption", ACM Computing Suruey3,yol. 11, 1979, pp. 305 - 330.

[327] Simmons, G. J., "Verification of treaty comphance - revisited". Proceedings of 1983 IEEE Symposium on Security and Privacy, 1983, pp. 61-66.

[328] Simmons, G. J., "The prisoners problem and the subhmindi channel". Advances in Cryptology: Proceedings of Crypto 83, August 1983,. Plenum Press, pp. 51-67.

[329] Simmons, G. J., "A system for verifying user identity and authorization at the point-of-sale or access", Cryptologia, vol. 8, 1984, pp. 1-21.

[330] Simmons, G. J., "Authentication theory / Coding theory". Advances in Cryptology: Proceedings of Crypto 84, August 1984, Springer-Verlag, pp. 411-431.

[331] Simmons, G. J., "A secure subKminal channel (?)", Advances in Cryptology - Crypto 85 Proceedings, August 1985, Springer -Verlag, pp. 33-41.

[332] Simmons, G. J., "Cryptology", Encyclopiedia Britannica, 15th edition, Macropaedia, vol. 16, Chicago, IL, 986, pp. 913 - 924B.

[333] Simmons, G. J. (editor). Contemporary Cryptology: The Science of Information Integrity, IEEE Press, Piscataway, NJ, 1992; (есть русский перевод журнальных версий некоторых статей в: ТИИЭР, t;76(1988)->(i:5).

[334] Simmons, G. J., "А survey of information authenticciion", в: [333], 1992, pp. 379 - 49; (есть русский перевод,жзфнальной версии в: ТИИЭР, т. 76(1988), №5;, <;тр. 105-125). ! ;



[335] Simmons, G. J., "An introduction to sheured secret cind/or shared control schemes and then: apphcation", в: [333], 1992, pp. 441-497.

[336] Simmons, G. J., "How td itosure that data acquired to verify treaty comphance are trustworthy", в: [333], 1992, pp. 615-630; (есть русский перевод журнальной версии в: ТИИЭР, т. 76(1988), №5, стр. 126-133).

[337] Smid, М. е., Branstad, D. К., "The Data Encryption Standard: Past and futiu-e", в: [333], 1992, pp. 43-64; (есть русский перевод журнальной версии в: ТИИЭР, т. 76(1988), №5, стр. 43-54).

[338] Smith, К., "Watch out hackers, pubhc encryption chips are coming", Electronic Week, 20 May 1985, pp. 30-31.

[339] Solovay, R., Strassen, V., "A fast Monte Carlo test for primaU-ty", SIAM Journal on Computing, vol. 6, 1977, pp. 84-85; erratum в: ibid, vol. 7, 1978, p. 118.

[340] Stewart, 1., "Schrodingers catflap", News and Views, Nature, vol. 353, 3 October 1991, pp. 384-385.

[341] Stinson, D.R., "Cryptography: Theory and Practice", CRC Press, 1995.

[342] Tedrick, T. , "How to exchange half a bit", Advances in Cryptology: Proceedings of Crypto 83, August 1983, Plenum Press, pp. 147-151.

[343] Tedrick, Т., "Fair exchange of secrets". Advances in Cryptology: Proceedings of Crypto 84, August 1984, Springer - Verlag, pp. 434-438.

[344] VAN TiLBORG, H. C. A., An Introduction to Cryptology, Kluwer Academic Pubhshers, Hingham, MA, 1988.

[345] TOMPA, M., "Zero knowledge interactive proofs of knowledge (a digest)", научно-исследовательский отчет RC 13282 (#59389), IBM Research Division, T. J. Watson Research Center, Yorktown Heights, NY, 1987.

[346] TOMPA, M., woll, H., "Random self-reducibihty and zero-knowledge interactive proofs of possession of information", Proceedings of 28th IEEE Symposium on Foundations of Computer Science, October 1987, pp. 472-482.

[347] Tuchman, W., представлено на NationalComputer Conference, Anaheim, CA, Jime 1978.

[348] Tuchman, W., "Hellman presents no shortcut solution to the DES", IEEE Spectrum, v6l. 16, July 1979, pp. 40-41.



Литература in

[349] Vazirani, U. V., Vazirani, V. V., "Trapdoor pseudo-random number generators with appUcations to protocol design". Proceedings , of,24th IEEE Symposium on Foundations of Computer Science, November 1983, pp. 23-30.

[350] Vazirani, U. V., Vazirani, V. V., "Efficient and secure pseudorandom number generation". Proceedings of 25th IEEE Symposium on Foundations of Computer Science, October 1984, pp. 458-463.

[351] Verbauwhede, 1., HooRNAERT, F., Vandewalle, j., De Man, H., "Security considerations in the design and implementation of a new DES chip". Advances in Cryptology - Eurocrypt87 Proceedings, April 1987, Springer-Verlag, pp. 287 - 300.

[352] VeRNAM, G.S., "Cipher printing telegraph systems for secret wire and radio telegraphic commimications", Journal of the American Institute of Electrical Engineers, vol. XLV, 1926, pp. 109-115.

[353] Voltaire, Dictionnaire philosophique, 1769.

[354] Wallich, p., "Quantum cryptography". Scientific American, May 1989, pp. 28-30.

[355] Wegman, M. N., Carter, J. L., "New hash functions and their use in authentication and set equahty". Journal of Computer and System Sciences, vol. 22, 1981, pp.265-279.

[356] Wiener, M. J., "Cryptanalysis of short RSA secret exponents", IEEE Transactions on Information Theory, vol. IT-36, 1990, pp. 553-558.

[357] Wiesner, S., "Conjugate coding", Sigact News, vol. 15, no. 1, 1983, pp. 78-88; оригинальная рукопись, написаннг1я примерно в 1970 году.

[358] Wilkes, М. V., Time-Sharing Computer Systems, American Elsevier, New York, NY, 1975.

[359] Williams, D., Hind in, H. J., "Can software do encryption job?". Electronics, 3 July 1980, pp. 102 -103.

[360] Williams, H. C, "A modification of the RSA pubhc-key encryption procediu-e", IEEE Transactions on Information Theory, vol. IT-26, 1980, pp. 726-729.

[361] WootteRS, W. K., Zurek, W. H., "A single quantum cannot be cloned". Nature, vol. 299, 1982, pp. 802-803.

[362] Wright, P., SpyCatcher, Viking Pengum Inc., New York, NY, 1987.

[363] Wyner, a. D., "The wire-tap diannel". Bell System Technical Journal, vol. 54, 1975, pp. 1355-1387.



0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 [ 54 ] 55 56 57