Список основных источников
информации
1. Anderson R.J.
Security Engineering: A Guide to Building Dependable Dis-
tributed Systems.
? John Wiley & Sons, Inc., 2001 (ISBN 0-471-38922-6).
2. Anderson R., Biham E. and Knudsen L.
Serpent: A proposal for the Ad-
vanced Encryption Standard.
? In: National Institute of Standards and
Technology, August 1998 (см.
http://www.cl.cam.ac.uk/~rja14/serpent.
html
или
http://www.nist.gov/aes
).
3. Bellare M., Canetti R. and Krawczyk H.
Keying Hash Functions for Message
Authentication.
? In: Koblitz N. (ed.).
Advances in Cryptology — CRYPTO
’96
.
Lecture Notes in Computer Science
. Springer-Verlag, 1996, vol. 1109,
р. 1–15.
4. Bellare M., Killian J. and Rogaway P.
The Security of Cipher Block Chain-
ing.
? In: Desmedt Y.G. (ed).
Advances in Cryptology — CRYPTO ’94
.
Lecture Notes in Computer Science
. Springer-Verlag, 1994, vol. 839, р. 341–
358.
5. Bennett C.H. and Brassard G.
An update on quantum cryptography.
? In:
Blackley G.R. and Chaum D. (ed).
Advances in Cryptology, Proceedings of
CRYPTO 84
.
Lecture Notes in Computer Science
. Springer-Verlag, 1984,
vol. 196, p. 475–480.
6. Biham E., Dunkelman O. and Keller N.
The Rectangle Attack — Rectangling
the Serpent.
? In: Pfitzmann B. (ed).
Advances in Cryptology — EURO-
Достарыңызбен бөлісу: