Главная страница

Криптография 2е издание Протоколы, алгоритмы и исходные тексты на языке С


Скачать 3.25 Mb.
НазваниеКриптография 2е издание Протоколы, алгоритмы и исходные тексты на языке С
Дата29.04.2022
Размер3.25 Mb.
Формат файлаpdf
Имя файлаShnayer_Prikladnaya-kriptografiya.352928.pdf
ТипПротокол
#504484
страница78 из 78
1   ...   70   71   72   73   74   75   76   77   78
Report, ISEC92-16, 1992.
1625. C.H. Yang and H. Morita, "An Efficient Modular-Multiplication Algorithm for Smart-Card
Software Implementation, " IEICE Japan, Technical Report, ISEC91-58, 1991.
1626. J.H. Yang, K.C. Zeng, and Q.B. Di, "On the Construction of Large S-Boxcs, "
CHINACRYPT'94, Xidian, China, 11-15 Nov 1994, pp. 24-32. (In Chinese.)
1627. A.C.-C. Yao, "Protocols for Securc Computations, " Proceedings of the 23rd IEEE
Symposium on the Foundations of Computer Science, 1982, pp. 160 -164.
1628. B. Yee, "Using Secure Coprocessors, " Ph.D. dissertation, School of Computer Science,
Carnegie Mellon University, May 1994.
1629. S.-M. Yen, "Design and Computation of Public Key Cryptosystems," Ph. D. dissertation,
National Cheng Hung University, Apr 1994.
1630. S.-M. Yen and C.-S. Lai, "New Digital Signature Scheme Based on the Discrete
Logarithm," Electronics Letters, v. 29, n. 12, 1993, pp. 1120-1121.
1631. K. Yin and K. Peterson, "A Single-Chip VLSI Implementation of the Discrete Exponential
Public-Key Distribution System, " IBM Systems journal, v. 15, n. 1, 1982, pp. 102-116.
1632. K. Yiu and K. Peterson, "A Single-Chip VLSI Implementation of the Discrete Exponential
Public-Key Distribution System," Proceedings of Government Microcircuit Applications
Conference, 1982, pp. 18-23.
1633. H.Y. Youm, S.L. Lee, and M.Y. Rhee, "Practical Protocols for Electronic Cash,"
Proceedings of the 1993 Korea-Japan Workshop on Information Security and
Cryptography Seoul, Korea, 24-26 Oct 1993, pp. 10-22.

1634. M. Yung, "Cryptoprotocols: Subscriptions to a Public Key, the Secret Blocking, and the
Multi-Player Mental Poker Game, " Advances in Cryptology: Proceedings of CRYPTO
84, Springer-Verlag, 1985, 439-453.
1635. G. Yuval, "How to Swindle Rabin," Cryptologia, v. 3, n. 3, Jul 1979, pp. 187-190.
1636. K.C. Zeng and M. Huang, "On the Linear Syndrome Method in Cryptanalysis, "
Advances in Cryptology CRYPTO '88 Proceedings, Springer-Verlag, 1990, pp. 469-478.
1637. K.C. Zeng, M. Huang, and T.R.N. Rao, "An Improved Linear Algorithm in Cryptanalysis with Applications, " Advances in Cryptology CRYPT O '90 Proceedings, Springer-Verlag,
1991, pp. 34-47.
1638. K.C. Zeng, C.-H. Yang, and T.R.N. Rao, "On the Linear Consistency Test ILCTl in
Cryptanalysis with Applications," Advances in Cryptology CRYPT O '89 Proceedings,
Springer-Verlag, 1990, pp. 164-174.
1639. K.C. Zeng, C.-H. Yang, L. Wei, and T. R.N. Rao, "Pseudorandom Bit Generators in
Stream-Cipher Cryptography, " IEEE Computer, v. 24, n. 2, Feb libel, pp. 5-17.
1640. M. Zhang, S.E. Tavares, and L.L. Campbell, "Information Leakage of Boolean Functions and Its Relationship to Other Cryptographic Criteria," Proceedings of the 2nd Annual
ACM Conference on Computer and Communications Security, ACM Press, 1994, pp.
156-165.
1641. M. Zhang and G. Xiao, "A Modified Dcsign Criterion for Stream Ciphers,"
CHINACRYPT'94, Xidian, China, 11-15 Nov 1994, pp. 201-209. (In Chinese.)
1642. Y. Zheng, T. Matsumoto, and H. Imai, "Duality between two Cryptographic Primitives,"
Papers of Technical Group for Information Security, IEICE of Japan, Mar 1989, pp. 47-57.
1643. Y. Zhcng, T. Matsumoto, and H. Imai, "Impossibility and Optimality Results in
Constructing Pseudorandom Permutations," Advances in Cryptology EURO CRYPT '89
Proceedings, Springer-Verlag. 1990, pp. 412-422.
1644. Y. Zheng, T. Matsumoto, and H. Imai, "On the Construction of Block Ciphers Provably
Sccurc and Not Relying on Any Unproved Hypotheses, " Advances in Cryptology
CRYPTO '89 Proceedings, Springer-Verlag, 1990, pp. 461-480.
1645. Y. Zheng, T. Matsumoto, and H. Imai, "Duality hctwccn two Cryptographic Primitives,"
Proceedings of the 8th International Conference on Applied Algebra. Algebraic Algorithms and Error-Correcting Codes, Springer-Verlag, 1991, pp. 379-390.
1646. Y. Zheng, J. Pieprzyk, and J. Seberry, "HAVAL A One-Way Hashing Algorithm with
Variable Length of Output, " Advances in Crytology AUSCRYPT '92 Proceedings,
Springer-Verlag, 1993, pp. 83-104.

1647. N. Zierler, "Linear Recurring Sequences," Journal Soc. Indust. Appl. Math., v. 7, n 1,
Mar 1959, pp. 31 48.
1648. N. Zierler, "Primitive Trinomials Whose Degree Is a M ersenne Exponent," Information and
Control, v. 15, 1969, pp. 67-69.
1649. N. Zierler and J. Brillhart, "On Primitive Trinomials (mod 2)," Information and Control,
v. 13, n. 6, Dec 1968, pp. 541-544.
1650. N. Zicrlcr and W.H. Mills, "Products of Linear Recurring Scqucnces," Journal of
Algebra, v. 27, n. 1, Oct 1973, pp. 147-157.
1651. C. Zimmer, "Perfect Gibberish," Discover, v. 13, n. 12, Dec 1992, pp. 92-99.
1652. P. Zimmermann, The Official PGP User's Guide, Boston: MIT Press, 1995.
1653. P. Zimmermann, PGP Source Code and Internals, Boston: MIT Press, 1995.
1   ...   70   71   72   73   74   75   76   77   78


написать администратору сайта