CRYPT 2001
.
Lecture Notes in Computer Science
. Springer-Verlag, 2001,
vol. 2045, p. 340–357.
7. Biham E.
New Types of Cryptoanalytic Attacks Using Related Keys.
? In:
Helleseth T. (ed).
Advances in Cryptology — EUROCRYPT ’93
.
Lecture
Notes in Computer Science
. Springer-Verlag, 1993, vol. 765, p. 398–409.
8. Black J., Halevi S., Krawczyk H., Krovetz T. and Rogaway P.
UMAC: Fast
and Secure Message Authentication.
? In: Michael Wiener (ed).
Advances in
Cryptology — CRYPTO ’99
.
Lecture Notes in Computer Science
. Springer-
Verlag, 1999, vol. 1666, p. 216–233.
408
Список основных источников информации
409
9. Bos J.
Booting problems with the JEC computer.
? Personal Communica-
tions, 1983.
10. Bos J.
Practical Privacy.
? PhD thesis : Eindhoven University of Technology,
1992 (см.
http://www.macfergus.com/niels/lib/bosphd.html
).
11. Brassard G. and Crepeau C.
Quantum Bit Commitment and Coin-Tossing
Protocols.
? In: Menezes A.J. and Vanstone S.A. (ed).
Advances in Cryptol-
ogy — CRYPTO ’90
.
Lecture Notes in Computer Science
. Springer-Verlag,
1990, vol. 537 p. 49–61.
12. Brincat K. and Mitchell C.J.
New CBC-MAC forgery attacks.
? In: Varad-
harajan V. and Mu Y. (ed).
Information Security and Privacy, ACISP 2001
.
Lecture Notes in Computer Science
. Springer-Verlag, 2001, vol. 2119, p. 3–
14.
13. Burwick C., Coppersmith D., D’Avignon E., Gennaro R., Halevi S., Jutla C.,
Matyas S.M. Jr., O’Connor L., Peyravian M., Safford D., Zunic N.
MARS —
a candidate cipher for AES.
? In: National Institute of Standards and Tech-
nology, August 1998 (см.
http://www.research.ibm.com/security/mars.
html
или
http://www.nist.gov/aes
).
14. Cachin C.
Entropy Measures and Unconditional Security in Cryptography.
?
PhD thesis, ETH : Swiss Federal Institute of Technology (Zurich, 1997)
(см.
ftp://ftp.inf.ethz.ch/pub/publications/dissertations/th12187.
ps.gz
).
15. Carroll L.
The Hunting of the Snark: an Agony, in Eight Fits.
? London :
Macmillan and Co., 1876.
16. Chabaud F. and Joux A.
Differential Collisions in SHA-0.
? In: Krawczyk H.
(ed).
Advances in Cryptology — CRYPTO ’98
.
Lecture Notes in Computer
Science
. Springer-Verlag, 1998, vol. 1462, p. 56–71.
17. Courtois N. and Pieprzyk J.
Cryptanalysis of Block Ciphers with Overdefined
Systems of Equations.
? Cryptology ePrint Archive, Report 2002/044, 2002
(см.
http://eprint.iacr.org/
).
18. Daemen J. and Rijmen V.
AES Proposal: Rijndael.
? In: National Institute of
Standards and Technology, August 1998 (см.
http://www.esat.kuleuven.
ac.be/~rijmen/rijndael
или
http://www.nist.gov/aes
).
19. Davis D., Ihaka R. and Fenstermacher P.
Cryptographic Randomness from
Air Turbulence in Disk Drives.
? In: Desmedt Y.G. (ed).
Advances in Cryp-
tology — CRYPTO ’94
.
Lecture Notes in Computer Science
. Springer-Verlag,
1994, vol. 839, p. 114–120.
20. Den Boer B. and Bosselaers A.
Collisions for the compression function of
MD5.
? In: Helleseth T. (ed).
Advances in Cryptology — EUROCRYPT ’93
.
410
Список основных источников информации
Достарыңызбен бөлісу: |