Ремонт принтеров, сканнеров, факсов и остальной офисной техники


назад Оглавление вперед




[159]

410.J. Daemen, R. Govaerts, and J. Vandewalle, "A New Approach to Block Cipher Design," Fast Software Encryption, Cam bridge Security Workshop Proceedings, Springer-Verlag, 1994, pp. 18-32.

411.Z.-D. Dai, "Proof of Rueppels Linear Complexity Conjecture," IEEE Transactions on Information Theory, v. IT-32, n. 3, May 1986, pp. 440 443.

412.I.B. Damgard, "Collision Free Hash Functions and Public Key Signature Schemes,"

Advances in Cryptology EUROCRYPT 87 Proceedings, Springer-Verlag, 1988, pp.

203-216.

413.I.B. Damgard, "Payment Systems and Credential Mechanisms with Provable Secu rity Against Abuse by Individuals, " Advances in Cryptology CRYPTO 88 Iroceedings, Springer-Verlag, 1990, pp. 328-335

414.I.B. Damgard, "A Design Principle for Hash Functions, " Advances in Cryptol428. ogy CRYPTO 89 Proceedings, Springer Verlag, 1990, pp. 416 427.

415.I.B. Damgard, "Practical and Provably Secure Release of a Secret and Exchangc of Signatures, " Advances in Cryptology EUROCRYPT 93 Proceedings, Springer Verlag,

1994, pp. 200-217.

416.1.B. Damgard and L.R. Knudsen, "The Rreaking of the AR Hash Function, " Advances in Cryptology EUROCRYPT 93 Proceedings, Springer-Verlag, 1994, pp. 286-292.

417.I.B. Damgard and R Landrock, "Improved Bounds for the Rabin Primality Test, " 431.

Cryptography and Coding III, M.J. Ganley, e d., Oxford: Clarendon Press, 1993, pp. 117128.

418.I.B. Damgard, P. Landrock and C. Pomerance, "Average Case Error Estimates for the Strong Probablc Prime Test," Mathematics of Computation, v. 61, n. 203, Jul 1993, pp.

177-194.

419.H.E. Daniels, Jr., letter to Datapro Research Corporation regarding CCEP, 23 Dec 1985.

420.H. Davenport, The Higher Arithmetic, Dover Books, 1983.

421.G.I. Davida, "Inverse of Elements of a Galois Field," Electronics Letters, v. 8, n. 21, 19

Oct 1972, pp. 518-520.

422.G.I. Davida, "Hellmans Scheme Breaks DES in Its Basic Form," IEEE Spectrum, v. 16, n.

7, Jul 1979, p. 39.

423. G.I. Davida, "Chosen Signature Cryptanalysis of the RSA iMITJ Public Key Cryptosystem," Technical Report TR-CS-82-2, Department of EECS, University of Wis- consin, 1982.


424.G.I. Davida and G.G. Walter, "A Public Key Analog Cryptosystem," Advances in

Cryptology E UR O CRYPT 8 7 Proceedings, Springer-Verlag, 1988, pp. 143-147.

425.G.I. Davida, D. Wells, and J. Kam, "A Database Encryption System with Subkeys," ACM

Transactions on Database Systems,v.6,n.2,Junl981,pp.312-328.

426.D.W. Davies, "Applying the RSA Digital Signature to Electronic Mail," Computer, v. 16,

n. 2, Feb 1983, pp. 55-62.

427.D.W. Davies, "Some Regular Properties of the DES," Advances in Cryptology: Pro-

ceedings of Crypto 82, Plenum Press, 1983, pp. 89-96.

428.D.W. Davics, "A Message Authentication Algorithm Suitable for a Mainframe Com-

puter," Advances in Cryptology: Proceed- ings of Crypto 82, Springer-Verlag, 1985, pp.

393 400.

429.D.W. Davies and S. Murphy, "Pairs and Triplets of DES S-boxes, " Cryptologia, v. 8, n. 1,

1995, pp. 1-25.

430.D.W. Davies and G.I.P. Parkin, "The Average Size of thc Key Stream in Output Feedback

Encipherment, " Cryptograph y Proceedings of the Wor kshop of cryplograpy Burg Feuer.stein, Germany, March 29-April 2, 1982, Springer-Verlag, 1983, pp. 263-279.

431 D.W. Davies and G.I.R Parkin, "The Averag e Size of the Key Stream in Output Feedback Mode, " Advances in Cryptology: Pro ceedings of Crypto 82, Plenum Press, 1983, pp. 9798.

432.D.W. Davies and W. L. Price, "The Applica tion of Digital Signatures Based on Public- Key

Cryptosystems, " Proceedings of the Fifth International Computer Communications

Conference, Oct 1980, pp. 525-530.

433.D.W. Davies and W.L. Price, "The Applica- tion of Digital Signatures Based on Public-

Key Cryptosystems, " National Physical Laboratory Report DNACS 39/80, Dec 1980.

434.D.W. Davies and W.L. Price, "Digital Sig- nature An Update," Proceedings of Inter-

national Conference on Computer Com- munications, Sydney, Oct 1984, North Holland:

Elsevier, 1985, pp. 843-847.

435.D.W. Davies and W.L. Price, Security for Computer Networks, second edition, John

Wiley & Sons, 1989.

436.M. Davio, Y. Desmedt, M. Fosseprez, R. Govaerts, J. Hulsbrosch, R Neutjens, R Piret, J -

l Quisquater, J Vandewalle, and S. Wouters, "Analytical Characteristics of the Data Encryption Standard," Advances in Cryptology: Proceedings of Crypto 83, Plenum Press,

1984, pp. 171-202.


437.M. Davio, Y. Desmedt, l Goubert, F. Hoor- naert, and l -J Quisquater, "Efficient Hard-

ware and Software Implementation of the DES," Advances in Cryptology: Proceed- ings of CRYPTO 84, Springer-Verlag, 1985, pp. 144 146.

438.M. Davio, Y. Desmedt, and l-l Quisquater, "Propagation Characteristics of the DES, "

Advances in Cryptology: Pro- ceedings of EUROCRYPT 84, Springer- Verlag, 1985, 6273.

439.D. Davis, R. Ihaka, and R Fenstermacher, "Cryptographic Randomness from Air

Turbulence in Disk Drives," Advances in Cryptology CRYPTO 94 Proceedings, Springer-Verlag, 1994, pp. 114 120.

440.J.A. Davis, D. B. Holdbridge, and G.l. Sim- mons, "Status Report on Factoring tat the

Sandia National Laboratoriesi," Advances in Cryptology: Proceedings of CRYPTO 84, Springer-Verlag, 1985, pp. 183-215.

441.R.M. Davis, "The Data Encryption Stan- dard in Perspective," Computer Secunty and the

Data Encryption Standard, National Bureau of Standards Special Pub- lication 500-27,

Feb 1978.

442.E. Dawson and A. Clark, "Cryptanalysts of Universal Logic Sequences," Advances in

Cryptology EUROCRYPT 93 Proceed- ings, Springer-Verlag, to appear.

443.M.H. Dawson and S.E. Tavares, "An Expanded Set of Design Criteria for Substi- tution

Boxes and Their Use in Strengthen- ing DES-Like Cryptosystems, " IEEE Pacific Rim Conference on Communica- tions, Computers, and Signal Processing, Victoria, BC, Canada, 9-10 May 1991, pp. 191-195.

444.M.H. Dawson and S.E. Tavares, "An Expanded Set of S-Box Design Criteria Based on

Information Theory and Its Relation to Differential-like Attacks," Advances in Cryptology EUROCRYPT 91 Proceedings, Springer-Verlag, 1991, pp. 352-367.

445.C.A. Deavours, "Unicity Points in Cryptanalysis," Cryptologia, v. 1, n. 1, 1977, pp. 46-68.

446.C.A. Deavours, "The Black Chamber: A Column; How the British Broke Enigma."

Cryptologia, v. 4, n. 3, lU1 1980, pp. 129- 132.

447.C.A. Deavours, "The Black Chamber: A Column; La Methode des Batons," Cryp- tologia,

v. 4, n. 4, Oct 1980, pp. 240-247.

448.C.A. Deavours and L. Kruh, Machine Cryptography and Modern Cryptanalysis, Norwood

MA: Artech House, 1985.

449. l.M. DeLaurentis, "A Further Weakness in the Common Modulus Protocol for the RSA Cryptosystem," Cryptologia, v. 8, n. 3, lul 1984, pp. 253-259.



[стр.Начало] [стр.1] [стр.2] [стр.3] [стр.4] [стр.5] [стр.6] [стр.7] [стр.8] [стр.9] [стр.10] [стр.11] [стр.12] [стр.13] [стр.14] [стр.15] [стр.16] [стр.17] [стр.18] [стр.19] [стр.20] [стр.21] [стр.22] [стр.23] [стр.24] [стр.25] [стр.26] [стр.27] [стр.28] [стр.29] [стр.30] [стр.31] [стр.32] [стр.33] [стр.34] [стр.35] [стр.36] [стр.37] [стр.38] [стр.39] [стр.40] [стр.41] [стр.42] [стр.43] [стр.44] [стр.45] [стр.46] [стр.47] [стр.48] [стр.49] [стр.50] [стр.51] [стр.52] [стр.53] [стр.54] [стр.55] [стр.56] [стр.57] [стр.58] [стр.59] [стр.60] [стр.61] [стр.62] [стр.63] [стр.64] [стр.65] [стр.66] [стр.67] [стр.68] [стр.69] [стр.70] [стр.71] [стр.72] [стр.73] [стр.74] [стр.75] [стр.76] [стр.77] [стр.78] [стр.79] [стр.80] [стр.81] [стр.82] [стр.83] [стр.84] [стр.85] [стр.86] [стр.87] [стр.88] [стр.89] [стр.90] [стр.91] [стр.92] [стр.93] [стр.94] [стр.95] [стр.96] [стр.97] [стр.98] [стр.99] [стр.100] [стр.101] [стр.102] [стр.103] [стр.104] [стр.105] [стр.106] [стр.107] [стр.108] [стр.109] [стр.110] [стр.111] [стр.112] [стр.113] [стр.114] [стр.115] [стр.116] [стр.117] [стр.118] [стр.119] [стр.120] [стр.121] [стр.122] [стр.123] [стр.124] [стр.125] [стр.126] [стр.127] [стр.128] [стр.129] [стр.130] [стр.131] [стр.132] [стр.133] [стр.134] [стр.135] [стр.136] [стр.137] [стр.138] [стр.139] [стр.140] [стр.141] [стр.142] [стр.143] [стр.144] [стр.145] [стр.146] [стр.147] [стр.148] [стр.149] [стр.150] [стр.151] [стр.152] [стр.153] [стр.154] [стр.155] [стр.156] [стр.157] [стр.158] [стр.159] [стр.160] [стр.161] [стр.162] [стр.163] [стр.164] [стр.165] [стр.166] [стр.167] [стр.168] [стр.169] [стр.170] [стр.171] [стр.172] [стр.173] [стр.174] [стр.175] [стр.176] [стр.177] [стр.178] [стр.179] [стр.180] [стр.181] [стр.182] [стр.183] [стр.184] [стр.185] [стр.186] [стр.187] [стр.188] [стр.189] [стр.190] [стр.191] [стр.192] [стр.193] [стр.194] [стр.195] [стр.196] [стр.197] [стр.198] [стр.199] [стр.200] [стр.201] [стр.202] [стр.203]