Главная > Основы компьютерной алгебры с приложениями
НАПИШУ ВСЁ ЧТО ЗАДАЛИ
СЕКРЕТНЫЙ БОТ В ТЕЛЕГЕ
<< Предыдущий параграф Следующий параграф >>
Пред.
След.
Макеты страниц

Распознанный текст, спецсимволы и формулы могут содержать ошибки, поэтому с корректным вариантом рекомендуем ознакомиться на отсканированных изображениях учебника выше

Также, советуем воспользоваться поиском по сайту, мы уверены, что вы сможете найти больше информации по нужной Вам тематике

ДЛЯ СТУДЕНТОВ И ШКОЛЬНИКОВ ЕСТЬ
ZADANIA.TO

Литература

Afrati F. Introduction to the theory of information (in Greek). National Technical University of Athens, Greece, 1985.

Berlekamp E.R. Algebraic coding theory. McGraw-Hill, New York, 1968. [Имеется перевод: Берлекэмп Э. Алгебраическая теория кодирования, fyl.: Мир, 1974.]

Blake I.F. Codes and designs. Mathematics Magazine 52, 81-95, 1979.

Blakley G.R., Borosh I. Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages. Computers and Mathematics with Applications 5, 169-178, 1979.

Bose R.C., Ray-Chaudhuri D.K. On a class of error correcting binary group codes. Information and Control 3, 68-79, 279-290, 1960.

Childs L. A concrete introduction to higher algebra. Springer-Verlag, New York, 1979.

Diffie W., Heilman M.E. New directions in cryptography. IEEE transactions on Information Theory IT-22, 644-654, 1976.

Diffie W., Heilman M.E. Exhaustive cryptanalysis of the NBS data encryption standard. Computer 10, 74-84, June 1977.

Ecker A. Ueber die mathematis einiger ChifFrierverfahren. Computing 29, 277-287, 1982.

Feistel H. Cryptography and computer privacy. Scientific American 228, 15-23, May 1973.

Gass F. Solving a Jules Verne cryptogram. Mathematics Magazine 59, 3-11, 1986.

Hamming R.W. Error detecting and error correcting codes. Bell System Technical Journal 29, 147-150, 1950.

Heilman M.E. The mathematics of public-key cryptography. Sctntific American 241, 130-139, August 1979.

Herlestam T. Critical remarks on some public-key cryptosystems. BIT 18, 493-496, 1978.

Hill L.S. Cryptography in an algebraic alphabet. American Mathematical Monthly 36, 306-312, 1929.

Hill L.S. Concerning certain linear transformation apparatus of cryptography. American Mathematical Monthly 38, 135-154, 1931.

Hocquenghem A. Codes correcteurs d’erreurs. Chiffres 2, 147-156, 1959.

Kahn D. The Codebreakers. MacMillan, New York, 1967.

Krishnamurthy E.V., Ramachandran V. A cryptographic system based on finite field transforms. Proceedings of the Indian Academy of Sciences (Math. Sci.) 89, 75-93, 1980.

Lempel A. Cryptology in transition. ACM Computing Surveys 11, 280-303, 1979.

Levinston N. Coding theory: a counter to G.H. Hardy’s conception of applied mathematics. American Mathematical Monthly 77, 249-258, 1970.

Lewis H.R., Papadimitriou C.H. The efficiency of algorithms. Scientific American, 96-109, January 1978.

Lidl R., Pilz G. Applied abstract algebra. Springer-Verlag, New York, 1984.

Mackiw G. Applications of abstract algebra. Wiley, New York, 1985.

MacWilliams F.J., Sloane N.J.A. The theory of error-correcting codes, Part I and II. North-Holland, New York, 1977.

Merkle R.C. Secure communications over insecure channels. Communications of the ACM 21, 294-299, April 1978.

Merkle R.C., Heilman M.E. Hiding information and signatures in trapdoor knapsacks. IEEE Transactions on Information Theory IT-24, 525-530, 1978.

Merkle R.C., Heilman M.E. On the security of multiple encryption. Communications of the ACM 24, 465-467, July 1981.

Peterson W.W., Weldon E.J. Error-correcting codes, 2 ed. MIT press, Cambridge MA, 1972.

Pohlig S.С., Heilman M.E. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transactions on Information Theory IT-24, 106-110, 1978.

Rivest R.L., Shamir A., Adleman L. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21, 120-126, February 1978.

Shannon C.E. A mathematical theory of communication. Bell System Technical Journal 27, 379-423, 623-656, 1948.

Shannon C.E. Communication theory of secrecy systems. Bell System Technical Journal 28, 656-715, 1949.

Simmons G.J. Cryptology: The mathematics of secure communication. Mathematical Intelligencer 1, 233-246, 1979.

Sinkov A. Elementary cryptanalysis — a mathematical approach. The New Mathematical Library no. 22, Mathematical Association of America, Washington, D.C., 1968.

Wakerly J. Error detecting codes, self-checking circuits and applications. North-Holland, New York, 1978.

Williams H.C., Schmid B. Some remarks concerning the M.I.T. public-key cryptosystem. BIT 19, 525-538, 1979.

1
Оглавление
email@scask.ru