Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
0_diploma-result.doc
Скачиваний:
0
Добавлен:
01.04.2025
Размер:
799.74 Кб
Скачать

Список использованной литературы (в т.Ч. Гиперссылки и названия документов):

  1. http://ru.wikipedia.org – стандарты, описания, термины.

  2. Data Encryption Standard, National Bureau of Standards (U.S.), Federal Information Processing Standards Publication (FIPS PUB) 46, National Technical Information Service, Springfield, VA (1977).

  3. Guideline For Automatic Data Processing Risk Analysis, National Bureau of Standards (U.S.), Federal Information Processing Standards Publication (FIPS PUB) 65, National Technical Information Service, Springfield, VA (1979).

  4. FIPS 199 (Feb 2004) - Standards for Security Categorization of Federal Information and Information Systems

  5. Helen Fouchй Gaines, “Cryptanalysis”, 1939, Dover. ISBN 0-486-20097-3

  6. Ibrahim A. Al-Kadi, “The origins of cryptology: The Arab contributions”, Cryptologia, 16(2) (April 1992) pp. 97–126.

  7. Ibrahim A. Al-Kadi, “Cryptography and Data Security: Cryptographic Properties of Arabic”, proceedings of the Third Saudi Engineering Conference. Riyadh, Saudi Arabia: Nov 24-27, Vol 2:910-921., 1991.

  8. David Kahn, The Codebreakers - The Story of Secret Writing (ISBN 0-684-83130-9) (1967)

  9. Abraham Sinkov, Elementary Cryptanalysis: A Mathematical Approach, Mathematical Association of America, 1966. ISBN 0-88385-622-0

  10. Liddell and Scott's Greek-English Lexicon. Oxford University Press. (1984)

  11. a b c d David Kahn, The Codebreakers, 1967, ISBN 0-684-83130-9.

  12. a b c Oded Goldreich, Foundations of Cryptography, Volume 1: Basic Tools, Cambridge University Press, 2001, ISBN 0-521-79172-3

  13. "Cryptology (definition)". Merrriam-Webster's Collegiate Dictionary (11th edition). Merriam-Webster. Retrieved on 2008-02-01

  14. Eerdmans Commentary on the Bible, James D G Dunn, John W Rogerson, eds., Wm. B. Eerdmans Publishing, 2003, ISBN 0-8028-3711-5

  15. Kama Sutra, Sir Richard F. Burton, translator, Part I, Chapter III, 44th and 45th arts.

  16. James Gannon, Stealing Secrets, Telling Lies: How Spies and Codebreakers Helped Shape the Twentieth Century, Washington, D.C., Brassey's, 2001, ISBN 1-57488-367-4.

  17. a b c Whitfield Diffie and Martin Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, vol. IT-22, Nov. 1976, pp: 644–654. (pdf)

  18. a b c d e f AJ Menezes, PC van Oorschot, and SA Vanstone, Handbook of Applied Cryptography ISBN 0-8493-8523-7.

  19. FIPS PUB 197: The official Advanced Encryption Standard.

  20. NCUA letter to credit unions, July 2004

  21. RFC 2440 - Open PGP Message Format

  22. SSH at windowsecurity.com by Pawel Golen, July 2004

  23. a b Bruce Schneier, Applied Cryptography, 2nd edition, Wiley, 1996, ISBN 0-471-11709-9.

  24. Whitfield Diffie and Martin Hellman, "Multi-user cryptographic techniques" [Diffie and Hellman, AFIPS Proceedings 45, pp109–112, June 8, 1976].

  25. Ralph Merkle was working on similar ideas at the time, and Hellman has suggested that the term used should be Diffie-Hellman-Merkle aysmmetric key cryptography.

  26. David Kahn, "Cryptology Goes Public", 58 Foreign Affairs 141, 151 (fall 1979), p. 153.

  27. R. Rivest, A. Shamir, L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, Vol. 21 (2), pp.120–126. 1978. Previously released as an MIT "Technical Memo" in April 1977, and published in Martin Gardner's Scientific American Mathematical Recreations column

  28. Clifford Cocks. A Note on 'Non-Secret Encryption', CESG Research Report, 20 November 1973.

  29. "Shannon": Claude Shannon and Warren Weaver, "The Mathematical Theory of Communication", University of Illinois Press, 1963, ISBN 0-252-72548-4

  30. Pascal Junod, "On the Complexity of Matsui's Attack", SAC 2001.

  31. Dawn Song, David Wagner, and Xuqing Tian, "Timing Analysis of Keystrokes and Timing Attacks on SSH", In Tenth USENIX Security Symposium, 2001.

  32. J. Hеstad, R. Impagliazzo, L.A. Levin, and M. Luby, "A Pseudorandom Generator From Any One-Way Function", SIAM J. Computing, vol. 28 num. 4, pp 1364–1396, 1999.

  33. Lбszlу Babai. "Trading group theory for randomness". Proceedings of the Seventeenth Annual Symposium on the Theory of Computing, ACM, 1985.

  34. G. Blakley. "Safeguarding cryptographic keys." In Proceedings of AFIPS 1979, volume 48, pp. 313–317, June 1979.

  35. A. Shamir. "How to share a secret." In Communications of the ACM, volume 22, pp. 612–613, ACM, 1979.

  36. S. Goldwasser, S. Micali, and C. Rackoff, "The Knowledge Complexity of Interactive Proof Systems", SIAM J. Computing, vol. 18, num. 1, pp. 186–208, 1989.

  37. S. Brands, "Untraceable Off-line Cash in Wallets with Observers", In Advances in Cryptology — Proceedings of CRYPTO, Springer-Verlag, 1994.

  38. R. Canetti, "Universally composable security: a new paradigm for cryptographic protocols", In Proceedings of the 42nd annual Symposium on the Foundations of Computer Science (FOCS), pp. 136–154, IEEE, 2001.

  39. D. Dolev and A. Yao, "On the security of public key protocols", IEEE transactions on information theory, vol. 29 num. 2, pp. 198–208, IEEE, 1983.

  40. M. Abadi and P. Rogaway, "Reconciling two views of cryptography (the computational soundness of formal encryption)." In IFIP International Conference on Theoretical Computer Science (IFIP TCS 2000), Springer-Verlag, 2000.

  41. D. Song, "Athena, an automatic checker for security protocol analysis", In Proceedings of the 12th IEEE Computer Security Foundations Workshop (CSFW), IEEE, 1999.

  42. a b RSA Laboratories' Frequently Asked Questions About Today's Cryptography

  43. Cryptography & Speech from Cyberlaw

  44. "Case Closed on Zimmermann PGP Investigation", press note from the IEEE.

  45. a b Levy, Steven (2001). "Crypto: How the Code Rebels Beat the Government — Saving Privacy in the Digital Age. Penguin Books, 56. ISBN 0-14-024432-8

  46. Bernstein v USDOJ, 9th Circuit court of appeals decision.

  47. The Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies

  48. "The Data Encryption Standard (DES)" from Bruce Schneier's CryptoGram newsletter, June 15, 2000

  49. Coppersmith, D. (May 1994). "The Data Encryption Standard (DES) and its strength against attacks" (PDF). IBM Journal of Research and Development 38 (3): 243. 

  50. E. Biham and A. Shamir, "Differential cryptanalysis of DES-like cryptosystems", Journal of Cryptology, vol. 4 num. 1, pp. 3–72, Springer-Verlag, 1991.

  51. http://www.cnss.gov/Assets/pdf/cnssp_15_fs.pdf

  52. John Kelsey, Stefan Lucks, Bruce Schneier, Mike Stay, David Wagner, and Doug Whiting, Improved Cryptanalysis of Rijndael, Fast Software Encryption, 2000 pp213–230

  1. Niels Ferguson, Richard Schroeppel, Doug Whiting (2001). "A simple algebraic representation of Rijndael" (PDF/PostScript). Proceedings of Selected Areas in Cryptography, 2001, Lecture Notes in Computer Science: pp. 103–111, Springer-Verlag. Retrieved on 2006-10-06

  2. Bruce Schneier. AES News, Crypto-Gram Newsletter, September 15, 2002. Retrieved on 2007-07-27.

  3. http://cr.yp.to/papers.html#cachetiming

  4. Louis Scheffer (2005-04-16). "Re: Successful remote AES key extraction". sci.crypt. (Google Groups).

  5. Bruce Schneier. AES Timing Attack. Retrieved on 2007-03-17.

  6. http://www.wisdom.weizmann.ac.il/~tromer/papers/cache.pdf

  7. Nicolas Courtois, Josef Pieprzyk, "Cryptanalysis of Block Ciphers with Overdefined Systems of Equations". pp267–287, ASIACRYPT 2002.

  8. Joan Daemen and Vincent Rijmen, "The Design of Rijndael: AES - The Advanced Encryption Standard." Springer-Verlag, 2002. ISBN 3-540-42580-2.

  9. NIST Special Publication 800-48 Wireless Network Security - 802.11, Bluetooth and Handheld Devices Recommendations of the National Institute of Standards and Technology by Tom Karygiannis and Les Owens

  10. Federal Information Processing Standards Publication 74 (1981 April 1) - FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION 1981 GUIDELINES FOR IMPLEMENTING AND USING THE NBS DATA ENCRYPTION STANDARD

  11. Federal Information Processing Standards Publication 197 November 26, 2001 Announcing the ADVANCED ENCRYPTION STANDARD (AES)