412
Список основных источников информации
45. Kahn D.
The Codebreakers, The Story of Secret Writing.
? New York :
Macmillan Publishing Co., 1967.
46. Kelsey J., Schneier B. and Ferguson N.
Yarrow-160: Notes on the Design
and Analysis of the Yarrow Cryptographic Pseudorandom Number Gener-
ator.
? In: Heys H. and Adams C. (ed).
Selected Areas in Cryptography,
6th Annual International Workshop, SAC ’99
.
Lecture Notes in Computer
Science
. Springer-Verlag, 1999, vol. 1758.
47. Kelsey J., Schneier B., Wagner D. and Hall C.
Cryptanalytic Attacks on
Pseudorandom Number Generators.
? In: Vaudenay S. (ed).
Fast Software
Encryption, 5th International Workshop, FSE ’98
.
Lecture Notes in Com-
puter Science
. Springer-Verlag, 1998, vol. 1372, p. 168–188.
48. Kelsey J., Schneier B., Wagner D. and Hall C.
Side Channel Cryptanalysis
of Product Ciphers //
Journal of Computer Security. — 2000. — 8(2-3). — Р.
141–158 (см. также
http://www.counterpane.com/side_channel.html
).
49. Kelsey J., Schneier B. and Wagner D.
Key-Schedule Cryptanalysis of IDEA,
G-DES, GOST, SAFER, and Triple-DES.
? In: Koblitz N. (ed).
Advances in
Cryptology — CRYPTO ’96
.
Lecture Notes in Computer Science
. Springer-
Verlag, 1996, vol. 1109, p. 237–251.
50. Kent S. and Atkinson R.
Достарыңызбен бөлісу: