Библиография



  1. Carlisle Adams. "The CAST-128 Encryption Algorithm", в редакции RFC 2144, 1997г.


  1. Derek Atkins, W. Stallings и Philip Zimmermann. "PGP messages exchange format", в редакции RFC 1991, 1996г.


  1. J. Callas, L. Donnerhacke, H. Finney и R. Thayer. "OpenPGP Message Format", в редакции RFC 2440, 1998г.


  1. H. Dobbertin, A. Bosselaers и B. Preneel. "RIPEMD-160, a strengthened version of RIPEMD". Fast Software Encryption, страницы 71-82, 1996г.


  1. Hans Dobbertin. "Cryptanalysis of MD5 compress", 1996г.


  1. Simson Garfinkel. "PGP: Pretty Good Privacy". O'Reilly and associates, 1995г.


  1. Peter Gutmann. "Secure deletion of data from magnetic and solid-state memory". Sixth USENIX Security Symposium Proceedings, 1996г.


  1. Johan Hastad. "Solving simutaneous modular equations of low degree"[link1]. SIAM Journal on Computing, 17(2), 1988г.


  1. Benjamin Jun и Paul Kocher. "The Intel random number generator", 1999г.


  1. B. Kaliski. "RSA encryption PKCS#1 version 1.5", в редакции RFC 2313, 1998г.


  1. J. Katz и B. Schneier. "A chosen ciphertext attack against several e-mail encryption protocols". http://www.counterpane.com, 2000г.


  1. Ueli Maurer. "Modelling a public key infrastructure". Proceedings of European Symposium on Research in Computer Security 1996, (1146), 1996г.


  1. Alfred J. Menezes, Paul C. van Oorschot и Scott A. Vanstone. "Handbook of Applied Cryptography". CRC press, 1996г. Доступна в формате pdf.


  1. NAI. "PGP desktop security administrators guide", 2000г.


  1. NIST. "Digital Signature Standard (DSS)", в редакции FIPS 186, 1994г.


  1. NIST. "Secure Hash Standard (SHS)", в редакции FIPS 180, 1994г.


  1. Ron Rivest. "The MD5 Message-Digest Algorithm", в редакции RFC 1321, 1992г.


  1. Bruce Schneier. "Applied Cryptography". John Wiley and Sons, вторая редакция, 1996г.


  1. Ralph Senderek. "Key experiments"[link2]. 2000г.


  1. Gerard Tel. "Cryptografische beveiliging van de Digitale maatschappij". 2002г.

Назад[link3]

Ссылки
[link1] http://www.nada.kth.se/johanh/papers.html

[link2] http://senderek.de/security/key-experiments.html

[link3] http://www.pgpru.com/biblioteka/statji/analiznadezhnostipgp/zakljuchenie