Главная страница

Криптография 2е издание Протоколы, алгоритмы и исходные тексты на языке С


Скачать 3.25 Mb.
НазваниеКриптография 2е издание Протоколы, алгоритмы и исходные тексты на языке С
Дата29.04.2022
Размер3.25 Mb.
Формат файлаpdf
Имя файлаShnayer_Prikladnaya-kriptografiya.352928.pdf
ТипПротокол
#504484
страница75 из 78
1   ...   70   71   72   73   74   75   76   77   78
1253. S.C. Pohlig and M.E. Hellman, "An Improved Algorithm for Computing Logarithms in
GF(p) and Its Cryptographic Significance," IEEE Transactions on Information Theory, v.
24, n. 1, Jan 1978, pp. 106-111.
1254. J.M. Pollard. "A Monte Carlo Method for Factorization," BIT v. 15, 1975, pp.331-334.
1255. J.M. Pollard and C.P. Schnorr, "An Efficient Solution of the Congruence x+ky= m (mod n)"
IEEE Transactions on Infor- mation Theory, v. IT-33, n. 5, Sep 1987, pp. 702-709.
1256. C. Pomerance, "Recent Developments in Primality Testing," The Mathematical
Intelligencer, v. 3, n. 3, 1981, pp. 97-105.
1257. C. Pomerance, "The Quadratic Sieve Factoring Algorithm," Advances in Cryptology:
Proceedings of EUROCRYPT 84, Springer-Verlag, 1985, 169-182.
1258. C. Pomerance, "Fast, Rigorous Factorization and Discrete Logarithm Algorithms,''
Discrete Algorithms and Complexity, New York: Academic Press, 1987, pp. 119-143.
1259. C. Pomerance, I W. Smith, and R. Tuler, "A Pipe-Line Architecture for Factoring Large
Integers with the Quadratic Sieve Algorithm," SIAM lournal on Computing, v.17, n.2,
Apr l988, pp. 387-403.
1260. G.J. Popek and C.S. Kline, "Encryption and Secure Computer Networks," ACM
Computing Surveys, v 11, n. 4, Dec 1979, pp. 331-356.
1261. F. Pratt, Secret and Urgent, Blue Ribbon Books, 1942.
1262. B. Preneel, "Analysis and Design of Cryptographic Hash Functions, " Ph.D. dissertation,
Katholieke Universiteit Leuven, Jan 1993.
1263. B. Preneel, "Differential Cryptanalysis of Hash Functions Based on Block Ciphers, "
Proceedings of the 1st ACM Conference on Computer and Communications Security,
1993, pp. 183-188.
1264. B. Preneel, "Cryptographic Hash Functions," European Transactions on
Telecommunications, v 5, n. 4, Jul/Aug 1994, pp. 431 -448.
1265. B. Preneel, personal communication, 1995.
1266. B. Preneel, A. Bosselaers, R. Govaerts, and J. Vandewalle, "Collision-Free Hash Functions
Based on Block Cipher Algorithms," Proceedings of the 1989 Carnahan Conference on
Security Technology 1989, pp. 203-210.

1267. B. Preneel, R. Govaerts, and J. Vandewalle, "An Attack on Two Hash Functions by
Zheng-Matsumoto-Imai, " Advances in Cryptology ASIACRYPT '92 Proceedings,
Springer-Verlag, 1993, pp. 535-538.
1268. B. Preneel, R. Govaerts, and J. Vandewalle, "Hash Functions Based on Block Ciphers: A
Synthetic Approach, " Advances in Cryptology CRYPTO '93 Proceedings, Springer-
Verlag, 1994, pp.368-378.
1269. B. Preneel, M. Nuttin, V. Rijmen, and J. Buelens, "Cryptanalysts of the CFB mode of the
DES with a Reduced Number of Rounds," Advances in Cryptology CRYPTO '93
Proceedings, Springer-Verlag, 1994, pp. 212-223.
1270. B. Preneel and V. Rijmen, "On Using Maximum Likelihood to Optimize Recent
Cryptanalytic Techniques, " presented at the rump session of EUROCRYPT '94, May
1994.
1271. B. Preneel, W. Van Leekwijck, L. Van Linden, R. Govaerts, and J. Vandewalle,
"Propagation Characteristics of Boolean Functions, " Advances in Cryptology
EUROCRYPT '90 Proceedings, Springer-Verlag, 1991, pp. 161-173.
1272. W.H. Press, B.R Flannery, S.A. Teukolsky, and W.T. Vetterling, Numerical Recipes in
C: The Art of Scientific Computing, Cambridge University Press, 1988.
1273. W. Price, "Key Management for Data Encipherment, " Security: Proceedings of IFIP/SEC
'83, North Holland: Elsevier SciencePublishers 1983.
1274. G.R Purdy, "A High-Security Log-in Procedure," communications of the ACM, v 17, n. 8,
Aug 1974, pp. 442-445.
1275. J.-J. Quisquater, "Announcing the Smart -Card with RSA Capability, " Proceedings of the
Conference: IC Cards and Applications, Today and Tomorrow, Amsterdam, 1989.
1276. J.-J. Quisquater and C. Couvreur, "Fast Decipherment Algorithm for RSA Public Key
Cryptosystem," Electronic Letters, v. 18, 1982, pp. 155-168.
1277. J.-J. Quisquater and J.-R Delescaille, "Other Cycling Tests for DES," Advances in
Cryptology CRYPTO '87 Proceedings, Springer-Verlag, 1988, pp. 255-256.
1278. J.-J. Quisquater and Y.G. Desmedt, "Chinese Lotto as an Exhaustive Code-Breaking
Machine," Computer. v. 24, n. 11, Nov 1991, pp. 14-22.
1279. J.-J. Quisquater and M. Girault, "2p-bit Hash Functions Using e-bit Symmetric Block
Cipher Algorithms, Advances in Cryptology EUROCRYPT '89 Proceedings, Springer-
Verlag, 1990, pp. 102-109.
1280. J.-J. Quisquater and L.C. Guillou, "Des Procedes d'Authentification Bases sur une
Publication de Problemes Complexes et Personnalises dont les Solutions Maintenues

Secretes Constituent autant d'Accreditations, " Proceedings of SECURICOM '89: 7th
Worldwide Congress on Computer and Communications Security and Protection, Societe d'Edition et d'Organisation d'Expositions Professionnelles, 1989, pp. 149-158. (In French.)
1281. J.-J., Myriam, Muriel, and Michael Quisquater; L., Marie Annick, Gaid, Anna, Gwenole,
and Soazig Guillou; and T. Berson, "How to Explain Zero-Knowledge Protocols to Your
Children," Advances in Cryptology CRYPTO '89 Proceedings, Springer-Verlag 1990, pp.
628-631.
1282. M.O. Rabin, "Digital Signatures," Foundations of Secure Communication, New York:
Academic Press, 1978, pp. 155-168.
1283. M.O. Rabin, "Digital Signatures and Public-Key Functions as Intractable as Factorization, "
MIT Laboratory for Computer Science, Technical Report, MlT/LCS/TR 212, Jan 1979.
1284. M.O. Rabin, "Probabilistic Algorithm for Testing Primality," Journal of Number Theory, v.
12, n. 1, Feb 1980, pp. 128-138.
1285. M.O. Rabin, "Probabilistic Algorithms in Finite Fields," SIAM Journal on Computing, v.9,
n.2, May 1980, pp.273-280.
1286. M.O. Rabin, "How to Exchange Secrets by Oblivious Transfer," Technical Memo TR 81,
Aiken Computer Laboratory, Harvard University, 1981.
1287. M.O. Rabin, "Fingerprinting by Random Polynomials, " Technical Report TR15-81,
Center for Research in Computing Technology, Harvard University, 1981.
1288. T. Rabin and M. Ben-Or, "Verifiable Secret Sharing and Multiparty Protocols with
Honest Majority," Proceedings of the 21st ACM Symposium on the Theory of Computing,
1989, pp. 73-85.
1289. RAND Corporation, A Million Random Digits with 100,000 Normal Deviates, Glencoe,
IL: Free Press Publishers, 1955.
1290. T.R.N. Rao, "Cryposystems Using Algebraic Codes," International Conference on
Computer Systems and Signal Processing, Bangalore, India, Dec 1984.
1291. T.R.N. Rao, "On Struit-Tilburg Cryptanalysis of Rao-Nam Scheme," Advances in
Cryptology CRYPTO '87 Proceedings, Springer-Verlag, 1988, pp. 458-460.
1292. T.R.N. Rao and K.H. Nam, "Private-Key Algebraic-Coded Cryptosystems, " Advances in
Cryptology CRYPTO '86 Proceedings, Springer-Verlag, 1987, pp.35-48.
1293. T.R.N. Rao and K.H. Nam, "Private-Key Algebraic-Code Encryptions," IEEE
Transactions on Information Theory, v. 35, n. 4, Jul 1989, pp. 829-833.

1294. J.A. Reeds, "Cracking Random Number Generator," Cryptologia, v. 1, n. 1, Jan 1977, pp.
20-26.
1295. J.A. Reeds, "Cracking a Multiplicative Congruential Encryption Algorithm, " in
Information Linkage Between Applied Mathematics and Industry, P.C.C. Wang, ed.,
Academic Press, 1979, pp. 467 472.
1296. J.A. Reeds, "Solution of Challenge Cipher," Cryptologia, v. 3, n. 2, Apr 1979, pp. 83-95.
1297. J.A. Reeds and J.L. Manferdelli, "DES Has No Per Round Linear Factors," Advances in
Cryptology: Proceedings of CRYPTO 84, Springer-Verlag, 1985, pp. 377-389.
1298. J.A. Reeds and N.J.A. Sloane, "Shift Register Synthesis (Modulo m)," SIAM Journal on
Computing, v. 14, n. 3, Aug 1985, pp. 505-513.
1299. J.A. Reeds and P.J. Weinberger, "File Security and the UNIX Crypt Command, " AT &T
Technical Journal, v. 63, n. 8, Oct 1984, pp. 1673-1683.
1300. T. Renji, "On Finite Automaton One-Key Cryptosystems," Fast Software Encryption,
Cambridge Security Workshop Proceed ings, Springer-Verlag, 1994, pp. 135-148.
1301. T. Renji and C. Shihua, "A Finite Automaton Public Key Cryptosystems and Digital
Signature, " Chinese Journal of Computers, v. 8, 1985, pp. 401 -409. (In Chinese.)
1302. T. Renji and C. Shihua, "Two Varieties of Finite Automaton Public Key Cryptosystems and Digital Signature, " Journal of Computer Science and Tecnology, v. 1, 1986, pp. 9-18.
(In Chinese.)
1303. T. Renji and C. Shihua, "An Implementation of Identity-based Cryptosystems and
Signature Schemes by Finite Automaton Public Key Cryptosystems," Advances in
Cryptology CHINACRYPT '92, Bejing: Science Press, 1992, pp.87-104. (In Chinese.)
1304. T. Renji and C. Shihua, "Note on Finite Automaton Public Key Cryptosystems, "
CHINACRYPT '94, Xidian, China, 11-15 Nov 1994, pp. 76-80.
1305. Research and Development in Advanced Communication Technologies in Europe, RIPE
Integrity Primitives: Final Report of RACE Integrity Primitives Evaluation (R1040),
RACE, June 1992.
1306. J.M. Reyneri and E.D. Karnin, "Coin Flipping by Telephone," IEEE Transactions on
Information Theory, v. IT-30, n. 5, Sep 1984, pp. 775-776.
1307. P. Ribenboim, The Book of Prime Number Records, Springer-Verlag, 1988.
1308. P. Ribenboim, The Little Book of Big Primes, Springer-Verlag, 1991.

1309. M. Richter, "Fin Rauschgenerator zur Gewinnung won quasi-idealen Zufallszahlen fur die stochastische Simulation," Ph.D. dissertation, Aachen University of Technology, 1992.
(In German.)
1310. R.F. Rieden, J.B. Snyder, R.J. Widman, and W.J. Barnard, "A Two-Chip Implementation of the RSA Public Encryption Algorithm," Proceedings of GOMAC (Government
Microcircuit Applications Conference), Nov 1982, pp. 24 27.
1311. H. Riesel, Prime Numbers and Computer Methods for Factorization, Boston: Birkhauscr,
1985.
1312. K. Rihaczek, "Data Interchange and Legal Security Signature Surrogates," Computers &
Security, v. 13, n. 4, Sep 1994, pp. 287-293.
1313. V. Rilmen and B. Preneel, "Improved Characteristics for Differential Cryptanalysis of Hash
Functions Based on Block Ciphers," K.U. Leuven Workshop on Cryptographic
Algorithms, Springer-Verlag, 1995, to appear.
1314. R.L. Rivest, "A Description of a Single-Chip Implementation of the RSA Cipher, "
LAMBDA Magazine, v. 1, n. 3, Fall 1980, pp. 14-18.
1315. R.L. Rivest, "Statistical Analysis of the Hagelin Cryptograph," Cryptologia, v. 5, n. 1, Jan
1981, pp. 27-32.
1316. R.L. Rivest, "A Short Report on the RSA Chip, " Advances in Cryptology: Proceedings of
Crypto 82, Plenum Press, 1983, p. 327.
1317. R.L. Rivest, "RSA Chips (Past/Present/ Future), " Advances in Cryptology: Proceedings of
EUROCRYPT 84, Springer- Verlag, 1985, pp. 159-168.
1318. R.L. Rivest, "The MD4 Message Digest Algorithm," RFC 1186, Oct 1990.
1319. R.L. Rivest, "The MD4 Message Digest Algorithm," Advances in Cryptology CRYPTO
'90 Proceedings, Springer-Verlag, 1991, pp. 303-311.
1320. R.L. Rivest, "The RC4 Encryption Algorithm, " RSA Data Security, Inc., Mar 1992.
1321. R.L. Rivest, "The MD4 Message Digest Algorithm," RFC 1320, Apr 1992.
1322. R.L. Rivest, "The MD5 Message Digest Algorithm," RFC 1321, Apt 1992.
1323. R.L. Rivest, "Dr. Ron Rivest on the Difficulty of Factoring," Ciphertext: The RSA
Newsletter, v. 1, n. 1, Fall 1993, pp. 6, 8.
1324. R.L. Rivest, "The RC5 Encryption Algorithm," Dr. Dobb's Journal, v. 20, n. 1, Jan 95, pp.
146-148.

1325. R.L. Rivest, "The RC5 Encryption Algorithm, " K. U. Leuven Workshop on
CryptographicAlgorithms, Springer-Verlag, 1995, to appear.
1326. R.L. Rivest, M.E. Hcllman, J.C. Anderson, and J.W. Lyons, "Responses to NIST's
Proposal," Communications of the ACM, v. 35, n. 7, Jul 1992, pp. 41-54.
1327. R.L. Rivest and A. Shamir, "How to Expose an Eavesdropper," Communications of the
ACM, v.27, n.4, Apr 1984, pp.393-395.
1328. R.L. Rivest, A. Shamir, and L.M. Adleman, "A Method for Obtaining Digital Signatures and Publie-Key Cryptosystems," Communications of the ACM, v. 21, n. 2, Fe b 1978, pp.
120-126.
1329. R.L. Rivest, A. Shamir, and L.M. Adlcman, "On Digital Signatures and Public Key
Cryptosystems," MIT Laboratory for Computer Science, Technical Report,
MIT/LCS/TR-212, Jan 1979.
1330. R.L. Rivest, A. Shamir, and L.M. Adleman, "Cryptographic Communications System and
Method," U.S. Patent #4,405,829, 20 Sep 1983.
1331. M.J.B. Robshaw, "Implementations of the Search for Pseudo-Collisions in MD5, "
Technical Report TR-103, Version 2.0, RSA Laboratories, Nov 1993.
1332. M.J.B. Robshaw, "The Final Report of RACE 1040: A Technical Summary," Technical
Report TR-9001, Version 1.0, RSA Laboratories, Jul 1993.
1333. M.J.B. Robshaw, "On Evaluating the Linear Complexity of a Sequence of Least Period
2n,", Designs, Codes and Cryptography, v. 4, n. 3, 1994, pp. 263-269.
1334. M.J.B. Robshaw, "Block Ciphers," Technical Report TR-601, RSA Laboratories, Jul
1994.
1335. M.J.B. Robshaw, "MD2, MD4, MD5, SHA, and Other Hash Functions, " Technical
Report TR-101, Version 3.0, RSA Laboratories, Jul 1994.
1336. M.J.B. Robshaw, "On Pseudo-Collisions in MD5," Technical Report TR-102, Version
1.1, RSA Laboratories, Jul 1994.
1337. M.J.B. Robshaw, "Security of RC4," Technical Report TR-401, RSA Laboratories, Jul
1994.
1338. M.J.B. Robshaw, personal communication, 1995.
1339. M. Roe, "Reverse Engineering of an EES Device," K. U. Leuven Workshop on
Cryptographic Algorithms, Springer-Verlag, 1995, to appear.

1340. P. Rogaway and D. Coppersmith, "A Software-Oriented Encryption Algorithm, " Fast
Software Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, 1994,
pp. 56-63.
1341. H.L. Rogers, "An Overview of the Cand-ware Program, " Proceedings of the 3rd Annual
Symposium on Physical/Electronic Security, Armed Forces Communications and Electronics
Association, paper 31, Aug 1987.
1342. J. Rompel, "One-Way Functions Are Necessary and Sufficient for Secure Signatures,"
Proceedings of the 22nd Annual ACM Symposium on the Theory of Computing, 1990, pp.
387-394.
1343. T. Rosati, "A High Speed Data Encryption Processor for Public Key Cryptography, "
Proceedings of the IEEE Custom Integrated Circuits Conference, 1989, pp. 12.3.1-12.3.5.
1344. O.S. Rothaus, ''On Bent'Functions,'' Journal of Combinational Theory Series A, v. 20, n. 3,
1976, pp. 300-305.
1345. RSA Laboratories, "PKCS #1: RSA Encryption Standard," version 1.5, Nov 1993.
1346. RSA Laboratories, "PKCS #3: Diffie-Hellman Key-Agreement Standard, " version 1.4, Nov
1993.
1347. RSA Laboratories, "PKCS #5: Password-Based Encryption Standard," version 1.5, Nov
1993.
1348. RSA Laboratories, "PKCS #6: Extended-Certificate Syntax Standard," version 1.5, Nov
1993.
1349. RSA Laboratories, "PKCS #7: Cryptographic Message Syntax Standard," version 1.5,
Nov 1993.
1350. RSA Laboratories, "PKCS #8: Private Key Information Syntax Standard, " version 1.2,
Nov 1993.
1351. RSA Laboratories, "PKCS #9: Selected Attribute Types," version 1.1, Nov 1993.
1352. RSA Laboratories, "PKCS #10: Certification Request Syntax Standard, " version 1.0, Nov
1993.
1353. RSA Laboratories, "PKCS #11 : Cryptographic Token Interface Standard, " version 1.0,
Apr 95.
1354. RSA Laboratories, "PKCS #12: Public Key User Information Syntax Standard," version
1.0, 1995.

1355. A.D. Rubin and P. Honeyman, "Formal Methods for the Analysis of Authentication
Protocols," draft manuscript, 1994.
1356. F. Rubin, "Decrypting a Stream Cipher Based on J-K Flip-Flops, " IEEE Transactions on
Computing. v. C-28, n. 7, Jul l 97Y, pp. 483 487.
1357. R.A. Rueppel, Analysis and Design of Stream Ciphers, Springer-Verlag, 1986.
1358. R.A. Rueppel, "Correlation Immunity and the Summation Combiner," Advances in
Cryptology EUROCRYPT '85, Springer-Verlag, 1986, pp. 260-272.
1359. R.A. Rueppel, "When Shift Registers Clock Themselves," Advances in Cryptology
EUROCRYPT '87 Proceedings, Springer-Verlag, 1987, pp. 53-64.
1360. R.A. Rueppel, "Security Models and Notions for Stream Ciphers," Cryptography and
Coding 11, C. Mitchell, ed., Oxford: Clarendon Press, 1992, pp. 213 230.
1361. R.A. Rueppel, "On the Security of Schnorr's Pseudo-Random Sequence Generator,"
Advances in Cryptology EUROCRYPT 89 Proceedings, Springer-Verlag, 1990, pp. 423-
428.
1362. R.A. Rueppel, "Stream Ciphers," Contemporary Cryptology: The Science of Information
Integrity, G.J. Simmons, ed., IEEE Press, 1 992, pp. 65-134.
1363. R.A. Rueppel and J.L. Massey, "The Knapsack as a Nonlinear Function," IEEE
International Symposium on Information Theory, Brighton, UK, May 1985.
1364. R. A. Rueppel and O. J. Staffelbaeh, " Products of Linear Recurring Sequences with
Maximum Complexity, " IEEE Transactions on Information Theory, v. IT-33, n. 1, Jan
1987, pp. 124-131.
1365. D. Russell and G.T. Gangemi, Computer Security Basics, O'Reilly and Associates, Inc.,
1991.
1366. S. Russell and P. Craig, "Privacy Enhanced Mail Modules for ELM," Proceedings of the
Internet Society 1994 Workshop on Network and Distributed System Security, The
Internet Society, 1994, pp. 21-34.
1367. D.F.H. Sadok and J. Kelner, "Privacy Enhanced Mail Design and Implementation
Perspectives," Computer Communications Review, v. 24, n. 3, Jul 1994, pp. 38 -46.
1368. K Sakano, "Digital Signatures with User Flexible Reliability," Proceedings of the 1993
Symposium on Cryptography and Information Security (SCIS 93), Shuzenji, Japan, 28-30
Jan 1993, pp. 5C.1-8.

1369. K. Sakano, C. Park, and K. Kunsawa, ''Threshold Undeniable Signature Scheme,''
Proceedings of the 1993 Korea Japan Workshop on Information Security and
Cryptography, Seoul, Korea, 24-26 Oct 1993, pp. 184-193.
1370. K. Sako, "Electronic Voting Schemes Allowing Open Objection to the Tally,"
Transactions of the Institute of Electron ics, Information, and Communication Engineers,
v. E77-A, n. 1, 1994, pp. 24-30.
1371. K. Sako and J. Kilian, "Secure Voting Using Partially Compatible Homomorphisms,"
Advances ill Cryptology CRYPTO '94 Proceedings, Springer-Verlag, 1994, p. 411-424.
1   ...   70   71   72   73   74   75   76   77   78


написать администратору сайта