Главная > Основы компьютерной алгебры с приложениями
<< Предыдущий параграф Следующий параграф >>
Пред.
След.
Макеты страниц

Распознанный текст, спецсимволы и формулы могут содержать ошибки, поэтому с корректным вариантом рекомендуем ознакомиться на отсканированных изображениях учебника выше

Также, советуем воспользоваться поиском по сайту, мы уверены, что вы сможете найти больше информации по нужной Вам тематике

Литература

Afrati F. Introduction to the theory of information (in Greek). National Technical University of Athens, Greece, 1985.

Berlekamp E.R. Algebraic coding theory. McGraw-Hill, New York, 1968. [Имеется перевод: Берлекэмп Э. Алгебраическая теория кодирования, fyl.: Мир, 1974.]

Blake I.F. Codes and designs. Mathematics Magazine 52, 81-95, 1979.

Blakley G.R., Borosh I. Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages. Computers and Mathematics with Applications 5, 169-178, 1979.

Bose R.C., Ray-Chaudhuri D.K. On a class of error correcting binary group codes. Information and Control 3, 68-79, 279-290, 1960.

Childs L. A concrete introduction to higher algebra. Springer-Verlag, New York, 1979.

Diffie W., Heilman M.E. New directions in cryptography. IEEE transactions on Information Theory IT-22, 644-654, 1976.

Diffie W., Heilman M.E. Exhaustive cryptanalysis of the NBS data encryption standard. Computer 10, 74-84, June 1977.

Ecker A. Ueber die mathematis einiger ChifFrierverfahren. Computing 29, 277-287, 1982.

Feistel H. Cryptography and computer privacy. Scientific American 228, 15-23, May 1973.

Gass F. Solving a Jules Verne cryptogram. Mathematics Magazine 59, 3-11, 1986.

Hamming R.W. Error detecting and error correcting codes. Bell System Technical Journal 29, 147-150, 1950.

Heilman M.E. The mathematics of public-key cryptography. Sctntific American 241, 130-139, August 1979.

Herlestam T. Critical remarks on some public-key cryptosystems. BIT 18, 493-496, 1978.

Hill L.S. Cryptography in an algebraic alphabet. American Mathematical Monthly 36, 306-312, 1929.

Hill L.S. Concerning certain linear transformation apparatus of cryptography. American Mathematical Monthly 38, 135-154, 1931.

Hocquenghem A. Codes correcteurs d’erreurs. Chiffres 2, 147-156, 1959.

Kahn D. The Codebreakers. MacMillan, New York, 1967.

Krishnamurthy E.V., Ramachandran V. A cryptographic system based on finite field transforms. Proceedings of the Indian Academy of Sciences (Math. Sci.) 89, 75-93, 1980.

Lempel A. Cryptology in transition. ACM Computing Surveys 11, 280-303, 1979.

Levinston N. Coding theory: a counter to G.H. Hardy’s conception of applied mathematics. American Mathematical Monthly 77, 249-258, 1970.

Lewis H.R., Papadimitriou C.H. The efficiency of algorithms. Scientific American, 96-109, January 1978.

Lidl R., Pilz G. Applied abstract algebra. Springer-Verlag, New York, 1984.

Mackiw G. Applications of abstract algebra. Wiley, New York, 1985.

MacWilliams F.J., Sloane N.J.A. The theory of error-correcting codes, Part I and II. North-Holland, New York, 1977.

Merkle R.C. Secure communications over insecure channels. Communications of the ACM 21, 294-299, April 1978.

Merkle R.C., Heilman M.E. Hiding information and signatures in trapdoor knapsacks. IEEE Transactions on Information Theory IT-24, 525-530, 1978.

Merkle R.C., Heilman M.E. On the security of multiple encryption. Communications of the ACM 24, 465-467, July 1981.

Peterson W.W., Weldon E.J. Error-correcting codes, 2 ed. MIT press, Cambridge MA, 1972.

Pohlig S.С., Heilman M.E. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transactions on Information Theory IT-24, 106-110, 1978.

Rivest R.L., Shamir A., Adleman L. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21, 120-126, February 1978.

Shannon C.E. A mathematical theory of communication. Bell System Technical Journal 27, 379-423, 623-656, 1948.

Shannon C.E. Communication theory of secrecy systems. Bell System Technical Journal 28, 656-715, 1949.

Simmons G.J. Cryptology: The mathematics of secure communication. Mathematical Intelligencer 1, 233-246, 1979.

Sinkov A. Elementary cryptanalysis — a mathematical approach. The New Mathematical Library no. 22, Mathematical Association of America, Washington, D.C., 1968.

Wakerly J. Error detecting codes, self-checking circuits and applications. North-Holland, New York, 1978.

Williams H.C., Schmid B. Some remarks concerning the M.I.T. public-key cryptosystem. BIT 19, 525-538, 1979.

Categories

1
Оглавление
email@scask.ru