Список основных источников информации
413
56. Kocher P., Jaffe J. and Jun B.
Differential Power Analysis.
? In: Wiener M.
(ed).
Advances in Cryptology — CRYPTO ’99
.
Lecture Notes in Computer
Science
. Springer-Verlag, 1999, vol. 1666, p. 388–397.
57. Kohl J. and Neuman C.
The Kerberos Network Authentication Service (V5).
?
RFC 1510, September 1993.
58. Krawczyk H., Bellare M. and Canetti R.
HMAC: Keyed-Hashing for Message
Authentication.
? RFC 2104, February 1997.
59. Krovetz T., Black J., Halevi S., Hevia A., Krawczyk H. and Rogaway P.
UMAC: Message Authentication Code using Universal Hashing.
? RFC
draft draft-krovetz-umac-01.txt, 2000 (см.
http://www.cs.ucdavis.edu/
~rogaway/umac/
).
60. Lai X. and Massey J.L.
A Proposal for a New Block Encryption Standard.
?
In: Damg˚
ard I.B. (ed).
Advances in Cryptology — EUROCRYPT ’90
.
Lec-
ture Notes in Computer Science
. Springer-Verlag, 1990, vol. 473, p. 389–404.
61. Lai X., Massey J.L. and Murphy S.
Markov Ciphers and Differential Crypt-
analysis.
? In: Davies D.W. (ed).
Advances in Cryptology — EUROCRYPT
’91
.
Lecture Notes in Computer Science
. Springer-Verlag, 1991, vol. 547,
p. 17–38.
62. Lenstra A.K. and Verheul E.R.
Selecting Cryptographic Key Sizes
// J. Cryp-
tology. — 2001. — 14(4). — Р. 255–293.
63. Matsumoto T., Matsumoto H., Yamada K. and Hoshino S.
Impact of Ar-
tificial “Gummy” Fingers on Fingerprint Systems.
— In:
Proc. of SPIE,
Vol #4677, Optical Security and Counterfeit Deterrence Techniques IV
(см. также
www.itu.int/itudoc/itu-t/workshop/security/present/
s5p4.pdf
).
64. Menezes A.J., Van Oorschot P.C. and Vanstone S.A.
Handbook of Applied
Cryptography.
? CRC Press, 1996 (ISBN 0-8493-8523-7).
65. Mills D.L.
Network Time Protocol (Version 3).
? RFC 1305, March 1992.
66. Mills D.
Достарыңызбен бөлісу: