Главная страница

Криптография 2е издание Протоколы, алгоритмы и исходные тексты на языке С


Скачать 3.25 Mb.
НазваниеКриптография 2е издание Протоколы, алгоритмы и исходные тексты на языке С
Дата29.04.2022
Размер3.25 Mb.
Формат файлаpdf
Имя файлаShnayer_Prikladnaya-kriptografiya.352928.pdf
ТипПротокол
#504484
страница67 из 78
1   ...   63   64   65   66   67   68   69   70   ...   78
152. T. Beth and F. Schaefer, "Non Supersingular Elliptic Curves for Public Key Cryptosystems,"
Advances in Cryptology EUROCRYPT '91 Proceedings, Springer-Verlag, 1991, pp. 316-
327.
153. A. Beutelspacher, "How to Say 'No', " Advances in Cryptology EUROCRYPT '89
Proceedings, Springer-Verlag, 1990, pp. 491-96.
154. J. Bidzos, letter to NIST regarding DSS, 20 Sep 1991.
155. J. Bidzos, personal communication, 1993. 169.
156. R Bieber, "A Logic of Communication in a Hostile Environment," Proceedings of the
Computer Security Foundations Workshop, IEEE Computer Society Press, 1990, pp. 14-
22.
157. E. Biham, "Cryptanalysts of the Chaotic- Map Cryptosystem Suggested at EUROCRYPT
'91, " Advances in Cryptology EUROCRYPT '91 Proceedings, Springer-Verlag, 1991, pp.
532-534.
158. E. Biham, "New Types of Cryptanalytic Attacks Using Related Keys, " Technical Report
#753, Computer Science Department, Technion Israel Institute of Technology, Sep 1992.

159. E. Biham, "On the Applicability of Differential Cryptanalysis to Hash Functions," lecture at
EIES Workshop on Cryptographic Hash Functions, Mar 1992.
160. E. Biham, personal communication, 1993.
161. E. Biham, "Higher Order Differential Cryptanalysis, " unpublished manuscript, Jan 1994.
162. E. Biham, "On Modes of Operation," Fast Software Encryption, Cambridge Security
Workshop Proceedings, Springer-Verlag, 1994,pp. 116-120.
163. E. Biham, "New Types of Cryptanalytic Attacks Using Related Keys," Jo urnal of
Cryptology, v. 7, n. 4, 1994, pp. 229-246.
164. E. Biham, "On Matsui's Linear Cryptanalysis, " Advances in Cryptology EUROCRYPT '94
Proceedings, Springer-Verlag, 1995, pp. 398 -412.
165. E. Biham and A. Biryukov, "How to Strengthen DES Using Existing Hardware, "
Advances in Cryptology ASIACKYPT '94 Proceedings, Springer-Verlag, 1995, to appear.
166. E. Biham and P.C. Kocher, "A Known Plaintext Attack on the PKZIP Encryption," K.U.
Leuven Workshop on Cryptographic Algorithms, Springer-Verlag, 1995, to appear.
167. E. Biham and A. Shamir, "Differential Cryptanalysis of DES-like Cryptosystems,"
Advances in Cryptology- CRYPTO 90 Proceedings, Springer- Verlag, 1991, pp. 2-21.
168. E. Biham and A. Shamir, "Differential Cryptanalysis of DES-like Cryptosystems," Journal of Cryptology, v. 4, n. 1, 1991, pp 3-72.
169. E. Biham and A. Shamir, "Differential Cryptanalysis of Feal and N-Hash, " Advances in
Cryptology EUROCRYPT '91 Proceedings, Springer-Verlag, 1991, pp. 181. 1-16.
170. E. Biham and A. Shamir, "Differential Cryptanalysis of Snefru, Khafre, REDOC- II, LOKI,
and Lucifer," Advances in Cryptology CRYPTO '91 Proceedings, 1992, pp. 156-171.
171. E. Biham and A. Shamir, "Differential Cryptanalysis of the Full 16-Round DES,"
Advances in Cryptology CRYPTO '92 Proceedings, Springer-Verlag, 1993, 487- 496.
172. E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard,
Springer-Verlag, 1993.
173. R. Bird, I. Gopal, A. Herzberg, R Janson, S. Kutten, R. Molva, and M. Yung, "Systematic
Design of Two-Party Authentication Protocols, " Advances in Cryptology CRYPTO'91
Proceedings, Springer-Verlag, 1992, pp. 44-61.
174. R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung, "System- atic Design of a Family of Attack-Resistant Authentication Protocols, " IEEE journal of
Selected Areas in Communication, to appear.

175. R. Bird, I. Gopal, A. Herzberg R Janson, S. Kutten, R. Molva, and M. Yung, "A Modu- lar Family of Secure Protocols for Authentication and Key Distribution," IEEE/ACM
Transactions on Networking, to appear.
176. M. Bishop, "An Application for a Fast Data Encryption Standard Implementation, "
Computing Systems, v. 1, n. 3, 1988, pp. 221-254.
177. M. Bishop, "Privacy-Enhanced Electronic Mail," Distributed Computing and Cryptography,
J. Feigenbaum and M. Merritt, eds., American Mathematical Society, 1991, pp. 93-106.
178. M. Bishop, "Privacy-Enhanced Electronic Mail, " Internetworking: Research and
Experience, v. 2, n. 4, Dec 1991, pp. 199-233.
179. M. Bishop, "Recent Changes to Privacy Enhanced Electronic Mail," Internetworking:
Research and Experience, v. 4, n. 1, Mar 1993, pp. 47-59.
180. I.F. Blake, R. Fuji-Hara, R.C. Mullin, and S.A. Vanstone, "Computing Logarithms in Finite
Fields of Characteristic Two, " SIAM Journal on Algebraic Discrete Methods, v. 5, 1984,
pp. 276-285.
181. I.F. Blake, R.C. Mullin, and S.A. Vanstone, "Computing Logarithms in GF (2n), "
Advances in Cryptology: Proceedings of CRYPTO 84, Springer-Verlag, 1985, pp. 73-82.
182. G.R. Blakley, "Safeguarding Cryptographic Keys," Proceedings of the National Computer
Conference, 1979, American Federation of Information Processing Societies, v. 48. 1979,
pp. 313-317.
183. G.R. Blakley, "One-Time Pads are Key Safeguarding Schemes, Not Cryptosystems Fast
Key Safeguarding Schemes (Threshold Schemes Exist ), " Proceedings of the 1980
Symposium on Security and Privacy, IEEE Computer Society. Apr 1980, pp. 108-113.
184. G.R. Blakley and I. Borosh, "Rivest-Shamir-Adleman Public Key Cryptosystems Do Not
Always Conceal Messages," Computers and Mathematics with Applications, v. 5, n. 3,
1979, pp. 169-178.
185. G.R. Blakley and C. Meadows, "A Database Encryption Scheme which Allows the
Computation of Statistics Using Encrypted Data," Proceedings of the 1985 Symposium on
Security and Privacy, IEEE Computer Society, Apr 1985, pp. 116-122.
186. M. Blaze, "A Cryptographic File System for UNIX," 1st ACM Conference on Computer and
Communications Security, ACM Press, 1993, pp. 9-16.
187. M. Blaze, "Protocol Failure in the Escrowed Encryption Standard, " 2nd ACM Conference on Computer and Communications security, ACM Press, 1994, pp. 59-67.

188. M. Blaze, "Key Management in an Encrypting File System, " Proceedings of the Summer
94 USENIX Conference, USENIX Association, 1994, pp. 27-35.
189. M. Blaze and B. Schneier, "The MacGuffin Block Cipher Algorithm, " K. U. Leuven
Workshop on Cryptographic Algorithms, Springer-Verlag, 1995, to appear.
190. U. Blocher and M. Dichtl, "Fish: A Fast Software Stream Cipher," Fast Software
Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, 1994, pp. 41-
44.
191. R. Blom, "Non-Public Key Distribution," Advances in Cryptology: Proceedings of Crypto
82, Plenum Press, 1983, pp. 231-236.
192. K.J. Blow and S.J.D. Phoenix, "On a Fundamental Theorem of Quantum Cryptography, "
Journal of Modern Optics, v. 40, n. 1, Jan 1993, pp. 33-36.
193. L. Blum, M. Blum, and M. Shub, "A Simple Unpredictable Pseudo-Random Number
Generator," SIAM Journal on Computing, v. 15, n. 2, 1986, pp. 364-383.
194. M. Blum, "Coin Flipping by Telephone: A Protocol for Solving Impossible Problems,''
Proceedings of the 24th IEEE Computer Conference (CompCon), 1982, pp. 133-137.
195. M. Blum, "How to Exchange Secret Keys, " ACM Transactions on Computer Systems, v.
1, n. 2, May 1983, pp. 175-193.
196. M. Blum, "How to Prove a Theorem So No Onc Else Can Claim It," Proceedings of the
International Congress of Mathematicians, Berkeley, CA, 1986, pp. 1444-1451.
197. M. Blum, A. De Santis, S. Micali, and G. Persiano, "Noninteractive Zero-Knowledge, "
SIAM Journal on Computing, v. 20, n. 6, Dec 1991. pp. 1084-1118.
198. M. Blum, P. Feldman, and S. Micali, "Non Interactivc Zero-Knowledge and Its
Applications, " Proceedings of the 20th ACM Symposilzm on Theory of Computing,
1988, pp. 103-112.
199. M. Blum and S. Goldwasser, "An Efficient Probabilistic Public-Key Encryption Scheme
Which Hides All Partial Information," Advances in Cryptology: Proceedings of C RYPTO
84, Springer-Verlag, 1985, pp. 289-299.
200. M. Blum and S. Micali, "How to Generate Cryptographically-Strong Sequences of Pseudo-
Random Bits," SIAM Journal on Computing, v. 13, n. 4, Nov 1984, pp. 850-864.
201. B. den Boer. "Cryptanalysts of F.E.A.L.," Advances in Cryptology E UROCRYPT '88
Proceeding.s, Springer-Verlag, 1988, pp. 293-300.
202. B. den Boer and A. Bosselaers, "An Attack on the Last Two Rounds of MD4, " Advances in Cryptology CRYPTO '91 Proceedings, Springer-Verlag, 1992, pp. 194-203.

203. B. den Boer and A. Bosselaers, "Collisions for the Compression Function of M D5,"
Advances in Cryptology EUROCRYPT 93 Proceedings, Springer-Verlag, 1994, pp. 293 204. J.-P. Boly, A. Bosselaers, R. Cramer, R. Michelsen, S. Mjolsnes, F. Muller, T. Pedersen, B.
Pfitzmann, R de Rooij, B. Schoenmakers, M. Schunter, L. Vallee, and M. Waidner,
"Digital Payment Systems in the ESPRIT Project CAFE, " Securicom 94, Paris, France, 2-
6 Jan 1994, pp. 35-45.
205. J.-R Boly, A. Bosselaers, R. Cramer, R. Michelsen, S. Mjolsnes, F. Muller, T. Pcdersen, B.
Pfitzmann, P. de Rooij, B. Schoen makers, M. Schunter, L. Vallee, and M. Waidner, "The
ESPRIT Project CAFE High Security Digital Payment System," Computer Security
ESORICS 94, Springer-Verlag, 1994, pp. 217-230.
206. D.J. Bond, "Practical Primality Testing," Proceedings of IKE International Conference on
Secure Communications Systems, 22-23 Feb 1984, pp. 50-53.
207. H. Bonnenberg, Secure Testing of VSLI Cryptographic Equipment, Series in
Microelectronics, Vol. 25, Konstanz: Hartung Gorre Verlag, 1993.
208. H. Bonnenberg, A. Curiger, N. Felber, H. Kacslin, and X. Lai, "VLSI Implementation of a
New Block Cipher," Proceedings of the IEEE International Conference on Computer
Design: VLSI in Computers and Processors (ICCD 91), Oct 1991, pp. 510 -513.
209. K.S. Booth, "Authentication of Signatures Using Public Key Encryption," Commu nications of the ACM, v. 24, n. 11, Nov 1981, pp. 772-774,
210. A. Bosselaers, R. Govaerts, and J. Vanderwalle, Advances in Cryptology CRYPTO '93
Proceedings, Springer-Verlag, 1994, pp. 175-186.
211. D.R Bovet and P. Crescenzi, Introduction to the Theory of CompiexiLy, Englewood Cliffs,
N.J.: Prenticc-Hall, 1994.
212. J. Boyar, "Inferring Scqucnccs Produced by a Linear Congruential Generator Missing
Low-Order Bits." Journal of Cryptology, v. 1, n. 3, 1989, pp. 177-184.
213. J. Boyar, D. Chaum, and I. Damgard, "Convertible Undeniable Signatures," Advances in
Cryptology CRYPTO '90 Proceedings, Springer-Verlag, 1991, pp. 189-205.
214. J. Boyar, K. Fricdl, and C. Lund, "Practical Zero-Knowledge Proofs: Giving Hints and
Using Deficiencies, " Advances in Cryptology EUROCRYPT '89 Proceedings, Springer-
Verlag, 1990, pp. 155-172.
215. J. Boyar, C. Lund, and R. Peralta, "On the Communication Complexity of Zero Knowledge
Proofs, " Journal of Cryptology, v.6, n.2, 1993, pp.65-85.

216. J. Boyar and R. Peralta, "On the Concrete Complexity of Zero-Knowledge Proofs, "
Advances in Cryptology CRYPTO '89 Proceedings, Springer-Verlag 1990, pp. 507-525.
217. C. Boyd, "Some Applications of Multiple Key Ciphers," Advances in Cryptology
EUROCRYPT '88 Proceedings, Springer Verlag, 1988, pp. 455-467.
218. C. Boyd, "Digital Multisignatures," Cryptography and Coding, H.J. Beker and F.C. Piper,
eds., Oxford: Clarendon Press, 1989, pp. 241-246.
219. C. Boyd, "A New Multiple Key Cipher and an Improved Voting Scheme," Advances in
Cryptology EUROCRYPT '89 Proceed ings, Springer-Verlag, 1990, pp. 617 625.
220. C. Boyd, "Multisignatures Revisited," Cryptography and Coding, M.J. Ganley, ed.,
Oxford: Clarendon Press, 1993, pp. 21-30.
221. C. Boyd and W. Mao, "On the Limitation of BAN Logic, " Advances in Cryptology
EUROCRYPT '93 Proceedings, Springer Verlag, 1994, pp. 240-247.
222. C. Boyd and W. Mao, "Designing Secure Key Exchange Protocols," Computer Secu rity
ESORICS 94, Springer-Verlag, 1994, pp. 217-230.
223. B. O. Brachtl, D. Coppersmith, M.M. Hyden, S.M. Matyas, C.H. Meyer, J. Oseas, S.
Pilpel, and M. Schilling, "Data Authentication Using Modification Detection Codes Based on a Public One Way Function," U.S. Patent #4,908,861, 13 Mar 1990.
224. J. Brandt, I.B. Damgard, R Landrock, and T. Pederson, "Zero-Knowledge Authentication
Scheme with Secret Key Exchange," Advances in Cryptology CRYPTO '88, Springer-
Verlag, 1990, pp. 583-588.
225. S.A. Brands, "An Efficient Off-Line Electronic Cash System Based on the Representation
Problem," Report CS-R9323, Computer Science / Department of Algorithms and
Architecture, CWI, Mar 1993.
226. S.A. Brands, "Untraceable Off-line Cash in Wallet with Observers," Advances in
Cryptology CRYPTO '93, Springer Verlag, 1994, pp. 302-318.
227. S.A. Brands, "Electronic Cash on the Internet," Proceedings of the Internet Society
Symposium on Network and Distributed Systems Secunty, IEEE Computer Society Press
1995, pp 64-84.
228. D.K. Branstad, "Hellman's Data Does Not Support His Conclusion," IEEE Spectrum, v.
16, n. 7, Jul 1979, p. 39.
229. D.K. Branstad, J. Gait, and S. Katzke, "Report on the Workshop on Cryptography in
Support of Computer Security, " NBSIR 77-1291, National Bureau of Standards, Sep 21-
22, 1976, September 1977.

230. G. Brassard, "A Note on the Complexity of Cryptography, " IEEE Transactions on
Information Theory, v. IT-25, n. 2, Mar 1979, pp. 232-233.
231. G. Brassard, "Relativized Cryptography," Proceedings of the IEEE 20th Annual Symposium on the Foundations of Computer Science, 1979, pp. 383-391.
232. G. Brassard, "A Time-Luck Trade-off in Relativized Cryptography, " Proceedings of the
IEEE 21st Annual Symposium on the Foundations of Computer Science, 1980, pp. 380-
386.
233. G. Brassard, "A Time-Luck Tradeoff in Relativized Cryptography," Journal Of Computer and System Sciences, v. 22, n.3, Jun 1981, pp. 280-311.
234. G. Brassard, "An Optimally Secure Relativized Cryptosystem," SIGACT News, v. 15, n. 1,
1983, pp. 28-33.
235. G. Brassard, "Relativized Cryptography," IEEE Transactions on Information Theory, v.
IT-29, n. 6, Nov 1983, pp. 877-894.
236. G. Brassard, Modern Cryptology: A Tuto rial, Springer-Verlag, 1988.
237. G. Brassard, "Quantum Cryptography: A Bibliography," SIGACT News, v. 24, n. 3, Oct
1993, pp. 16-20.
238. G. Brassard, D. Chaum, and C. Crepeau, "An Introduction to Minimum Disclosure," CWI
Quarterly v. 1, 1988, pp. 3-17.
239. G. Brassard, D. Chaum, and C. Crepeau, "Minimum Disclosure Proofs of Knowledge,"
Journal of Computer and System Sciences, v. 37, n.2, Oct 1988, pp. 156-189.
240. G. Brassard and C. Crepeau, "Non-Transitive Transfer of Confidence: A Perfect Zero-
Knowledge Interactive Protocol for SAT and Beyond," Proceedings of the 27th IEEE
Symposium on Foundations of Computer Science, 1986, pp. 188-195.
241. G. Brassard and C. Crepeau, "Zero- Knowledge Simulation of Boolean Circuits," Advances in Cryptology CRYPTO '86 Proceedings, Springer-Verlag, 1987, pp. 22 5-233.
242. G. Brassard and C. Crcpeau, "Sorting Out Zcro-Knowlcdge, " Advances in Cryptology
EUROCRYPT '89 Proceedings, Springcr-Vcrlag, 1990, pp. 181-191.
243. G. Brassard and C. Crcpcau, "Quantum Bit Commitment and Coin Tossing Protocols, "
Advances in Cryptology CRYPTO '90 Proceedings, Springer-Verlag, 1991, pp. 49-61.
244. G. Brassard, C. Crepeau, R. Jozsa, and D. Langlois, "A Quantum Bit Commitment
Schcmc Provably Unbreakable by Both Parties, " Proceedings of the 34th IEEE
Symposium on Foundations of computer Science, 1993, pp. 362-371.

245. G. Brassard, C. Crepeau, and J.-M. Robert, ''Information Theoretic Reductions Among
Disclosure Problems, " Proceedings of the 27th IEEE Symposium on Foundations of
Computer Science, 1986, pp. 168-173.
246. G. Brassard, C. Crcpeau, and J.-M. Robert, "All-or-Nothing Disclosure of Secrets, "
Advances in Cryptology CRYPTO '86 Proceedings, Springer-Verlag, 1987, pp. 234-238.
247. G. Brassard, C. Crepeau, and M. Yung, "Everything in NP Can Be Argued in Perfect Zero-
Knowledge in a Bounded Number of Rounds," Proceedings on the 16th Inter national
Colloquium on Automata, Languages, and Programming, Springer-Verlag, 1989, pp. 123-
136.
248. R.P. Brent, "An Improved Monte-Carlo Factorization Algorithm," BIT v. 20, n. 2, 1980,
pp. 176-184.
249. R.P. Brent, "On the Periods of Generalized 261. Fibonacci Recurrences, Mathematics of
Computation, v 63, n. 207, Jul 1994, pp. 389-401.
250. R.R Brent, "Parallel Algorithms for Integer Factorization," Research Report CMA-R49-89,
Computer Science Laboratory The Australian National University, Oct 1989.
251. D.M. Bressotid, Factorization and Primality Testing, Springer-Verlag, 1989.
252. E.F. Brickcll, "A Fast Modular Multiplication Algorithm with Applications to Two Key
Cryptography," Advances in Cryptology: Proceedings of Crypto 82, Plenum Press, 1982,
pp. 51-60.
253. E.F. Brickell, "Are Most Low Density Polynomial Knapsacks Solvable in Polynomial
Timer" Proceedings of the 14th Southeastern Conference on Combinatorics, Graph
Theory, and Computing, 1983.
254. E.F. Brickell, "Solving Low Density Knapsacks," Advances in Cryptology: Proceedings of
Crypto 83, Plenum Press, 1984, pp. 25-37.
255. E.F. Brickell, "Breaking Iterated Knapsacks," Advances in Cryptology: Proceedings of
Crypto 84, Springer-Verlag, 1985, pp. 342-358.
256. E.F. Brickell, "Cryptanalysts of the Uagisawa Public Key Cryptosystem," Abstracts of
Papers, EUROCRYPT '86, 20-22 May 1986.
257. E.F. Brickell, "The Cryptanalysis of Knapsack Cryptosystems, " Applications of Discrete
Mathematics, R.D. Ringeisen and F.S. Roberts, eds., Society for Industrial and Applied
Mathematics, Philadelphia, 1988, pp. 3-23.
258. E.F. Brickell, "Survey of Hardware Implementations of RSA, " Advances in Cryptology
CRYPTO '89 Proceedings, Springcr-Verlag, 1990, pp. 368-370.

259. E.F. Brickell, D. Chaum, I.B. Damgard, and J. van de Graff, "Gradual and Verifiable
Release of a Secret," Advances in Cryptology CRYPTO '87 Proceedings, Springer-Verlag,
1988, pp. 156-166.
260. E.F. Brickell, J.A. Davis, and G.J. Simmons, "A Preliminary Report on the Cryptanalysis of
Merkle-Hellman Knapsack, " Advances in Cryptology: Proceedings of Crypto 82, Plenum
1   ...   63   64   65   66   67   68   69   70   ...   78


написать администратору сайта