Èëëþñòðèðîâàííûé ñàìîó÷èòåëü ïî Protection to information


         

Kruth L. Machine cryptography and


Cryptologia. - 1993-1998. - ¹¹ 1-4.

Deavours C.A., Kruth L. Machine cryptography and modern cryptanalysis. -

Dedham, 1985.

Fast software encryption. — N.-Y., 1994.

Feistel H. Glyptography and computer privacy // Scientific American. - 1973. -Vol. 228. - ¹ 5.

Gardner M. Penrose tiles to trapdoor ciphers. — N.-Y., 1989.

Harris R. Enigma. - L, 1997.

Kahn D. The codebreakers. - N.-Y., 1967.

Kahn D. Soviet COM INT in the cold war // Cryptologia. - 1998. - ¹ 1.

Kelsey J., Scheier Â., Hall C. Side-channel cryptanalysis of product ciphers. -Internet, www.counterpane.com.

Koblitz N. A course in number theory and cryptography. - N.-Y., 1994.

Kocher P. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems // Lecture Notes in Computer Science. - 1996. - Vol. 1109.

Loeb V. Weaving a web of secrets // Washington Post. — 1999. — December 1.

Madsen W. Crypto AG: NSA's Trojan whore? // Covert Action Quarterly. — ¹ 63 (Winter 1998).

National information systems security (INFOSEC) glossary. - NSTISSI No. 4009, 1997.

Pope T. Password files // Dr. Dobb's journal. - 1996. — ¹ 1.

Proceedings of the IEEE. - 1988. - ¹ 5.

Rhee M. Glyptography and secure communications. — Singapore, 1994.

Robshaw M. Security estimates for 512-bit RSA. — Internet, www.rsa.com / pubs / techreports / security_estimates.pdf.

Robshaw M. Stream ciphers. — Internet, www.rsa.com / pubs / techreports / tr-701.pdf.

Schneier B. Applied cryptography. - N.-Y., 1996.

Schneier B. Cryptographic design vulnerabilities // Computer. — 1998. - ¹9.

Schneier B. Differential and linear cryptanalysis // Dr. Dobb's journal. - 1996. -¹ 1.

Schneier B. A self-study course in block-cipher cryptanalysis. — Internet, www.counterpane.com.

Sussman V. Policing cyberspace // U.S.News & World Report. - 1995. - January 23.

Thompson N. No more top-secret pizza boxes // Baltimore Sun. — 1999. — April 6.

Uncle Sam and his 40000 snoopers // Nation Review (AU), 1973.

U.S. Electronic Espionage: A Memoir// Ramparts. - 1996. - ¹ 2.

Wayner P. Don't lose your cryptokey // Byte. - 1996. - ¹ 5.

Webster's third new international dictionary. — Springfield, 1981.















 















Ñîäåðæàíèå  Íàçàä  Âïåðåä





Forekc.ru
Ðåôåðàòû, äèïëîìû, êóðñîâûå, âûïóñêíûå è êâàëèôèêàöèîííûå ðàáîòû, äèññåðòàöèè, ó÷åáíèêè, ó÷åáíûå ïîñîáèÿ, ëåêöèè, ìåòîäè÷åñêèå ïîñîáèÿ è ðåêîìåíäàöèè, ïðîãðàììû è êóðñû îáó÷åíèÿ, ïóáëèêàöèè èç ïðîôèëüíûõ èçäàíèé