Главная страница

Криптография 2е издание Протоколы, алгоритмы и исходные тексты на языке С


Скачать 3.25 Mb.
НазваниеКриптография 2е издание Протоколы, алгоритмы и исходные тексты на языке С
Дата29.04.2022
Размер3.25 Mb.
Формат файлаpdf
Имя файлаShnayer_Prikladnaya-kriptografiya.352928.pdf
ТипПротокол
#504484
страница71 из 78
1   ...   67   68   69   70   71   72   73   74   ...   78
809. B.S. Kaliski, R.L. Rivest, and A.T. Sherman, "Is the Data Encryption Standard a Group?
(Results of Cycling Experiments on DESK," Journal of Cryptology v. 1, n. 1, 1988, pp. 3-
36.
810. B.S. Kaliski and M.J.B. Robshaw, "Fast Block Cipher Proposal," Fast Software
Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, 1994, pp. 33 40.
811. B.S. Kaliski and M.J.B. Robshaw, "Linear Cryptanalysis Using Multiple Approximations,"
Advances in Cryptology CRYPTO '94 Proceedings, Springer-Verlag, 1994, pp. 26-39.

812. B.S. Kaliski and M.J.B. Robshaw, "Linear Cryptanalysis Using Multiple Approximations and
PEAL," K.U. Leuven Workshop on Cryptographic Algorithms, Springer-Verlag, 1995, to appear.
813. R.G. Kammer, statement before the U.S. government Subcommittee on Telecommunications and Finance, Committee on Energy and Commerce, 29 Apr 1993.
814. T. Kaneko, K. Koyama, and R. Terada, "Dynamic Swapping Schemes and Differential
Cryptanalysis, Proceedings of the 1993 Korea- Japan Workshop on Information Security and Cryptography Seoul, Korea, 24-26 Oct 1993, pp. 292-301.
815. T. Kaneko, K. Koyama, and R. Terada, "Dynamic Swapping Schemes and Differential
Cryptanalysis," Transactions of the Institute of Electronics, Information, and
Communication Engineers, v. E77-A, n. 8, Aug 1994, pp. 1328-1336.
816. T. Kaneko and H. Miyano, "A Study on the Strength Evaluation of Randomized DES-
Like Cryptosystems against Chosen Plaintext Attacks, " Proceedings of the 1993
Symposium on Cryptography and Information Security (SCIS 93), Shozenji, Japan, 28-30
Jan 1993, pp. 15C.1-10.
817. J. Karl, "A Cryptosystem Based on Propositional Logic," Machines, Languages, and
Complexity: 5th International Meeting of Young Computer Scientists, Selected Con- tributions, Springer-Verlag, 1989, pp. 210-219.
818. E.D. Karnin, J.W. Greene, and M.E. Hellman, "On Sharing Secret Systems," IEEE
Transactions on Information Theory v. IT- 29, 1983, pp. 35 41.
819. F.W Kasiski, Die Geheimschriften and die Dechiffrir-kunst, E.S. Miller und Sohn, 1863. In
German.
820. A. Kehne, J. Schonwalder, and H. Langendorfer, "A Nonce-Based Protocol for Multiple
Authentications," Operating Systems Review, v. 26, n. 4, Oct 1992, pp. 84-89.
821. J. Kelsey, personal communication, 1994.
822. R. Kemmerer, "Analyzing Encryption Protocols Using Formal Verification Techniques, "
IEEE Journal on Selected Areas in Communications, v. 7, n. 4, May 1989, pp. 448 457.
823. R. Kemmerer, C.A. Meadows, and J. Millen, "Three Systems for Cryptographic Protocol
Analysis," Journal of Cryptology v. 7, n. 2, 1994, pp. 79-130.
824. S.T. Kent, "Encryption-Based Protection Protocols for Interactive User-Computer
Communications, " MIT/LCS/TR162, MIT Laboratory for Computer Science, May 1976.
825. S.T. Kent, "Privacy Enhancement for Internct Electronic Mail: Part II: Certificate Based Key
Management," RFC 1422, Feb 1993.

826. S.T. Kent, "Understanding the Internet Certification System, " Proceedings of INET '93,
The Internet Society, 1993, pp. BAB 1 -BAB 10.
827. S.T. Kent and J. Linn, "Privacy Enhaneement for Internet Electronic Mail: Part II:
Certificate-Based Key Management," RFC 1114, Aug 1989.
828. V. Kessler and G. Wedel, "AUTOLOG An Advanced Logic of Authentication," Proceedings of the Computer Security Foundations Workshop, IEEE Computer Society Press, 1994, pp.
90-99.
829. E.L. Key, "An Analysis of the Structure and Complexity of Nonlinear Binary Sequence
Generators," IEEE Transactions on Information Theory v. IT-22, n. 6, Nov 1976, pp. 732-
736.
830. T. Kiesler and L. Harn, "RSA Blocking and Multisignature Schemes with No Bit
Expansion," Electronics Letters, v. 26, n. 18, 30 Aug 1990, pp. 1490-1491.
831. J. Kilian, Crises of Randomness in Algorithms and Protocols, MIT Press, 1990.
832. J. Kilian, "Achieving Zero-Knowledge Robustly, " Advances in Cryptology CRYPTO 90
Proceedings, Springer-Verlag, 1991, pp. 313-325.
833. J. Kilian and T. Leighton, "Failsafe Key Escrow," MIT/LCS/TR-636, MIT Laboratory for
Computer Science, Aug 1994.
834. K. Kim, "Construction of DES-Like S -Boxes Based on Boolean Functions Satisfying the
SAC, " Advances in Cryptology, ASIACRYPT 91 Proceedings, Springer-Verlag, 1993, pp.
59-72.
835. K. Kim, S. Lee, and S. Park, "Necessary Conditions to Strengthen DES S-Boxes Against
Linear Cryptanalysis," Proceedings of the 1994 Symposium on Cryptography and
Information Secunty (SCIS 94), Lake Biwa, Japan, 27-29 Jan 1994, pp. 15D.1-9.
836. K. Kim, S. Lee, and S. Park, "How to Strengthen DES against Differential Attack, "
unpublished manuscript, 1994.
837. K. Kim, S. Lee, S. Park, and D. Lee, "DES Can Be Immune to Differential Cryptanalysis, "
Workshop on Selected Areas in Cryptography Workshop Record, Kingston, Ontario, 5-6
May 1994, pp. 70-81.
838. K. Kim, S. Park, and S. Lee, "How to Strengthen DES against Two Robust Attacks,"
Proceedings of the 1995 Japan-Korea Workshop on Information Security and
Cryptography Inuyama, Japan, 24-27 Jan 1995, 173-182.
839. K. Kim, S. Park, and S. Lee, "Reconstruction of s2DES S-Boxes and their Immunity to
Differential Cryptanalysis, " Proceedings of the 1993 Korea- Japan Workshop on
Information Security and Cryptography, Seoul, Korea, 24-26 Oct l 993, pp.282-291.

840. S. Kim and B.S. Um, "A Multipurpose Membership Proof System Based on Discrete
Logarithm," Proceedings of the 1993 Korea- Japan Workshop on Information Security and Cryptography, Seoul, Korea, 24-26 Oct 1993, pp. 177-183.
841. P. Kinnucan, "Data Encryption Gurus: Tuchman and Meyer," Cryptologia, v. 2, n. 4, Oct
1978.
842. A. Klapper, "The Vulnerability of Geometric Sequences Based on Fields of Odd
Characteristic," Journal of cryptology v. 7, n. 1, 1994, pp. 33-52.
843. A. Klapper, "Feedback with Carry Shift Registers over Finite Fields," K. U. Leuven
Workshop on Cryptographic Algorithms, Springer-Verlag, 1995, to appear.
844. A. Klapper and M. Goresky, "2-adic Shift Registers, " Fast Software Encryption,
Cambridge Security Workshop l'roceed- ings, Springer-Verlag, 1994, pp. 174-178.
845. A. Klapper and M. Goresky, "2-adic Shift Registers," Technical Report #239-93,
Department of Computer Science, University of Kentucky, 19 Apr 1994.
846. A. Klapper and M. Goresky, "Large Period Nearly de Bruijn FCSR Sequences, " Advances in Cryptology EUROCRYPT 95 Proceedings, Springer-Verlag, 1995, pp. 263-273.
847. D.V. Klein, "'Foiling the Cracker: A Survey of, and Implications to, Password Security,"
Proceedings of the USENIX UNIX Security Workshop, Aug 1990, pp. 5-14.
848. D.V Klein, personal communication, 1994.
849. C.S. Kline and G.J. Popek, "Public Key vs. Conventional Key Cryptosystems," Proceedings of AFIPS National Computer Conference, pp. 831-837.
850. H.-J. Knobloch, "A Smart Card Implementation of the Fiat-Shamir Identification Scheme,"
Advances in Cryptology EUROCRPYT '88 Proceedings, Springer-Verlag, 1988, pp. 87-
95.
851. T. Knoph, J. Fropl, W. Beller, and T.Giesler, "A Hardware Implementation of a Modified
DES Algorithm," Microprocessing and Microprogramming, v. 30, 1990, pp. 59-66.
852. L.R. Knudsen, "Cryptanalysts of LOKI," Advances in Cryptology ASIACRYPT '91
Proceedings, Springer-Verlag, 1993, pp. 22-35.
853. L.R. Knudsen, "Cryptanalysts of LOKI," Cryptography and Coding 111, M.J. Ganley, ed.,
Oxford: Clarendon Press, 1993, pp. 223-236.
854. L.R. Knudsen, "Cryptanalysts of LOKI91," Advances in Cryptology AUSCRYPT '92
Proceedings, Springer-Verlag, 1993, pp. 196-208.

855. L.R. Knudsen, "Iterative Characteristics of DES and sZDES," Advances in Cryptology
CRYPTO '92, Springer-Verlag, 1993, pp. 497-511.
856. L.R. Knudsen, "An Analysis of Kim, Park and Lee's DES-Like S-Boxes," unpublished manuscript, 1993.
857. L.R. Knudsen, "Practically Secure Feistel Ciphers," Fast Software Encryption, Cam- bridge Secunty Workshop Proceedings, Springer-Verlag, 1994, pp. 211-221.
858. L.R. Knudsen, "Block Ciphers Analysis, Design, Applications," Ph.D. dissertation, Aarhus
University, Nov 1994.
859. L.R. Knudsen, personal communication, 1994.
860. L.R. Knudsen, "Applications of Higher Order Differentials and Partial Differentials, " K. U
Leuven Workshop on Cryptographic Algorithms, Springer-Verlag, 1995, to appear.
861. L.R. Knudsen and X. Lai, "New Attacks on All Double Block Length Hash Functions of
Hash Rate 1, Including the Parallel-DM," Advances in Cryptology EUROCRYPT '94
Proceedings, Springer-Verlag, 1995, to appear.
862. L.R. Knudsen, "A Weakness in SAFER K-64, " Advances in Cryptology-CRYPT O '95
Proceedings, Springer-Verlag, 1995, to appear.
863. D. Knuth, The Art of Computer Programming: Volume 2, Seminumerical Algo rithms, 2nd edition, Addison-Wesley, 1981.
864. D. Knuth, "Deciphering a Linear Congruential Encryption," IEEE Transactions on
Information Theory, v. IT-31, n. 1, Jan 1985, pp. 49-52.
865. K. Kobayashi and L. Aoki, "On Linear Cryptanalysis of MBAL, " Proceedings of the 1995
Symposium on Cryptography and Information Security (SCIS 95, Innyama, Japan, 24-27
Jan 1995, pp. A4.2.1-9.
866. K. Kobayashi, K. Tamura, and Y. Nemoto, "Two-dimensional Modified Rabin
Cryptosystem," Transactions of the Institute of Electronics, Information, and
Communication Engineers, v. J72-D, n. 5, May 1989, pp. 850-851. (In Japanese. )
867. N. Koblitz, "Elliptic Curve Cryptosystems, " Mathematics of Computation, v. 48, n. 177,
1987, pp. 203-209.
868. N. Koblitz, "A Family of Jacobians Suitable for Discrete Log Cryptosystems, " Advances in Cryptology CRYPTO '88 Proceedings, Springer-Verlag 1990, pp. 94 -99.
869. N. Koblitz, "Constructing Elliptic Curve Cryptosystems in Characteristic 2," Advances in
Cryptology CRYPTO '90 Proceedings, Springer-Verlag 1991, pp. 15 6-167.

870. N. Koblitz, "Hyperelliptic Cryptosystems," Journal of Cryptology, v. 1, n. 3, 1989, pp.
129-150.
871. N. Koblitz, "CM-Curves with Good Cryptographic Properties, " Advances in Cryptology
CRYPTO '91 Proceedings, Springer-Verlag, 1992, pp. 279-287.
872. C.K. Koc, "High-Speed RSA Implementation," Version 2.0, RSA Laboratories, Nov 1994.
873. M.J. Kochanski, "Remarks on Lu and Lee's Proposals," Crypto logia, v. 4, n. 4, 1980, pp.
204-207.
874. M.J. Kochanski, "Developing an RSA Chip," Advances in Cryptology CRYPTO '85
Proceedings, Springer-Verlag, 1986, pp. 350-357.
875. J.T. Kohl, "The Use of Encryption in Kerberos for Network Authentication," Advances in
Cryptology CRYPTO '89 Proceedings, Springer-Verlag, 1990, pp.35 -43.
876. J.T. Kohl, "The Evolution of the Kerberos Authentication Service," Eur opean Conference
Proceedings, May 1991, pp. 295-313.
877. J.T. Kohl and B.C. Neuman, "The Kerberos Network Authentication Service, " RFC
1510, Sep 1993.
878. J.T. Kohl, B.C. Neuman, and T. Ts'o, "The Evolution of the Kerberos Authentication
System," Distributed Open Systems, IEEE Computer Society Press, 1994, pp. 78-94.
879. Kohnfelder, "Toward a Practical Public Key Cryptosystem, " Bachelor's thesis, MIT
Department of Electrical Engineering, May 1978.
880. A. G. Konheim, Cryptography: A Primer, New York: John Wiley & Sons, 1981.
881. A.G. Konheim, M.H. Mack, R.K. McNeill, B. Tuckerman, and G. Waldbaum, "The IPS
Cryptographic Programs," IBM Systems journal, v. 19, n. 2, 1980, pp. 253-283.
882. V.I. Korzhik and A.I. Turkin, "Cryptanalysis of McEliece's Public-Key Cryptosystem,"
Advances in Cryptology EUROCRYPT '91 Proceedings, Springer-Verlag, 1991, pp. 68-
70.
883. S.C. Kothari, "Generalized Linear Threshold Scheme," Advances in Cryptology:
Proceedings of CRYPTO 84, Springer-Verlag, 1985, pp. 231-241.
884. J. Kowalchuk, B.R Schanning, and S. Powers, "Communication Privacy: Integration of
Public and Secret Key Cryptography," Proceedings of the National Telecommunication
Conference, IEEE Press, 1980, pp. 49.1.1 49.1.5.

885. K. Koyama, "A Master Key for the RSA Public-Key Cryptosystem," Transactions of the
Institute of Electronics, Information, and Communication Engineers, v. J65-D, n. 2, Feb
1982, pp. 163-170.
886. K. Koyama, "A Cryptosystem Using the Master Key for Multi-Address Communications,"
Transactions of the Institute of Electronics, Information, and Communication Engineers,
v. J65-D, n. 9, Sep 1982, pp. 1151-1158.
887. K. Koyama, "Demonstrating Membership of a Group Using the Shizuya-Koyama -Itoh
(SKI) Protocol," Proceedings of the 1989 Symposium on Cryptography and Information
Security ( SCIS 89), Gotenba, Japan, 1989.
888. K. Koyama, "Direct Demonstration of the Power to Break Public-Key Cryptosystems, "
Advances in Cryptology AUSCRYPT '90 Proceedings, Springer-Verlag, 1990, pp. 14-21.
889. K. Koyama, "Security and Unique Decipherability of Two-dimensional Public Key
Cryptosystems," Transactions of the Institute of Electronics, Information, and
Communication Engineers, v. E73, n. 7, Jul 1990, pp. 1057-1067.
890. K. Koyama, U.M. Maurer, T. Okamoto, and S.A. Vanstone, "New Public-Key Schemes
Based on Elliptic Curves over the Ring Zn" Advances in Cryptology CRYPTO '91
Proceedings, Springer-Verlag, 1992, pp. 252-266.
891. K. Koyama and K. Ohta, "Identity-based Conference Key Dist ribution System," Ad- vances in Cryptology CRYPTO '87 Proceedings, Springer-Verlag, 1988, pp.175-184.
892. K. Koyama and T. Okamoto, "Elliptic Curve Cryptosystems and Their Applications, "
IEICE Transactions on Information and Systems, v. E75-D, n. 1, Jan 1992, pp. 50-57.
893. K. Koyama and R. Terada, " How to Strengthen DES-Like Cryptosystems against
Differential Cryptanalysis," Transactions of the Institute of Electronics, Information, and
Communication Engineers, v. E76-A, n. 1, Jan 1993, pp. 63-69.
894. K. Koyama and R. Terada, "Probabilistic Swapping Schemes to Strengthen DES against
Differential Cryptanalysis, " Proceedings of the 1993 Symposium on Cryptography and
Information Security (SCIS 93), Shuzenji, Japan, 28-30 Jan 1993, pp. 15D.1-12.
895. K. Koyama and Y. Tsuruoka, "Speeding up Elliptic Cryptosystems Using a Singled Binary
Window Method, " Advances in Cryptology CRYPTO '92 Proceedings, Springer-Verlag,
1993, pp. 345-357.
896. E. Kranakis, Pnmality and Cryptography, Wiler-Teubner Series in Computer Science, 1986.
897. D. Kravitz, "Digital Signature Algorithm," U.S. Patent #5,231,668, 27 Jul 1993.
898. D. Kravitz and L. Reed, "Extension of RSA Cryptostructure: A Galois Approach, "
Electronics Letters, v. 18, n. 6, 18 Mar 1982, pp. 255-256.

899. H. Krawczyk, "How to Predict Congruential Generators," Advances in Cryptology
CRYPTO'89 Proceedings, Springer- Verlag, 1990, pp. 138-153.
900. H. Krawczyk, "How to Predict Congruential Generators," Journal of Algorithms, v. 13, n.
4, Dec 1992, pp. 527-545.
901. H. Krawczyk, "The Shrinking Generator: Some Practical Considerations," Fast Software
Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, 1994, pp. 45 46.
902. G.J. Kuhn, "Algorithms for Self-Synchronizing Ciphers," Proceedings of COMSIG 88, 1988.
903. G.J. Kuhn, F. Bruwer, and W. Smit, "'n Vinnige Veeldoelige Enkripsievlokkie, " Pro- ceedings of Infosec 90, 1990. (In Afrikaans.)
904. S. Kullback, Statistical Methods in Cryptanalysis, U.S. Government Printing Office, 1935.
Reprinted by Aegean Park Press, 1976.
905. RV. Kumar, R.A. Scholtz, and L.R. Welch, "Generalized Bent Functions and their Prop- erties," Journal of Combinational Theory, Series A, v. 40, n. 1, Sep 1985, pp. 90-107.
906. M. Kurosaki, T. Matsumoto, and H. Imai, "Simple Methods for Multipurpose
Certification," Proceedings of the 1989 Symposium on Cryptography and Information
Security (SCIS 89), Gotenba, Japan, 1989.
907. M. Kurosaki, T. Matsumoto, and H. Imai, "Proving that You Belong to at Least One of the Specified Groups," Proceedings of the 1990 Symposium on Cryptography and
Information Security (SCIS 90), Hihondaira, Japan, 1990.
908. K. Kurosawa, "Key Changeable ID-Based Cryptosystem," Electronics Letters, v. 25, n. 9,
27 Apr 1989, pp. 577-578.
909. K. Kurosawa, T. Ito, and M. Takeuchi, "Public Key Cryptosystem Using a Reciprocal
Number with the Same Intractability as Factoring a Large Number," Cryptologia, v. 12, n.
4, Oct 1988, pp. 225-233.
910. K. Kurosawa, C. Park, and K. Sakano, "Group Signer/Verifier Separation Scheme,"
Proceedings of the 1995 Japan-Korea Workshop on Information Security and Cryptography,
Inuyama, Japan, 24-27 Jan 1995, 134-143.
911. G.C. Kurtz, D. Shanks, and H.C. Williams, "Fast Primality Tests for Numbers Less than
50*10" Mathematics of Computation, v. 46, n. 174, Apr 1986, pp. 691-701.
912. K. Kusuda and T. Matsumoto, "Optimization of the Time-Memory Trade-Off Cryptanalysis and Its Application to Block Ciphers, " Proceedings of the 1995 Symposium on

Cryptography and Information Security (SCIS 95 ), Inuyama, Japan, 24-27 Jan 1995, pp.
A3.2.1-11. (In Japanese.)
913. H. Kuwakado and K. Koyama, "Security of RSA-Type Cryptosystems Over Elliptic
Curves against Hastad Attack," Electronics Letters, v. 30, n. 22, 27 Oct 1994, pp. 1843-
1844.
914. H. Kuwakado and K. Koyama, "A Ncw RSA-Type Cryptosystem over Singular Elliptic
Curves, " IMA Conference on Applications of Finite Fields, Oxford University Press, to appear.
915. H. Kuwakado and K. Koyama, "A New RSA-Type Scheme Based on Singular Cubic
Curves," Proceedings of the 1995 Japan-Korea Workshop on Information Security and
Cryptography, Inuyama, Japan, 24-27 Jan 1995, pp. 144-151.
916. M. Kwan, "An Eight Bit Weakness in the LOKI Cryptosystem, " technical report,
Australian Dcfensc Force Academy, Apr 1991.
917. M. Kwan and J. Pieprzyk, "A General Purpose Technique for Locating Key Scheduling
Weakness in DES-Like Cryptosystcms, " Advances in Cryptology ASIACRYPT '91
Proceedings, Springer-Verlag, 1991, pp. 237-246.
918. J.B. Lacy, D.P. Mitchell, and W.M. Schell, "CryptoLib: Cryptography in Software,"
1   ...   67   68   69   70   71   72   73   74   ...   78


написать администратору сайта