The Art of Cryptology: From Ancient Number System to Strange Number System
暂无分享,去创建一个
[1] Josef Pieprzyk,et al. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.
[2] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[3] D. Kahn. Kahn on Codes: Secrets of the New Cryptology , 1983 .
[4] Jan C. A. van der Lubbe,et al. Basic Methods of Cryptography , 1998 .
[5] D. Lateiner. Signifying Names and Other Ominous Accidental Utterances in Classical Historiography , 2005 .
[6] Mousa Farajallah,et al. Survey Paper: Cryptography Is The Science Of Information Security , 2011 .
[7] K. Bernstein. A Hidden War , 1987 .
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[9] Albrecht Beutelspacher,et al. Cryptology : an introduction to the art and science of enciphering, encrypting, concealing, hiding, and safeguarding described without any arcane skullduggery but not without cunning waggery for the delectation and instruction of the general public , 1994 .
[10] Jennifer Seberry,et al. Public Key Cryptography , 2000, Lecture Notes in Computer Science.
[11] Ibrahim A. Al-Kadit. Origins of Cryptology: the Arab Contributions , 1992, Cryptologia.
[12] Donald Davies. A brief history of cryptography , 1997, Inf. Secur. Tech. Rep..
[13] Tony M Damico. A Brief History of Cryptography , 2009 .
[14] Stamatios V. Kartalopoulos,et al. A primer on cryptography in communications , 2006, IEEE Communications Magazine.
[15] Scott R. Ellis. Chapter 2 – A Cryptography Primer , 2009 .