Вперед: Предметный указатель
Вверх: Криптография в банковском деле
Назад: 15.3 Интерактивные системы доказательства с нулевым разглашением
  Содержание
  Предметный указатель
[Акр]
Акритас А., Основы компьютерной
алгебры с приложениями, М., Мир, 1994
[Ан]
Анохин М. И., О стойкости некоторого протокола
типа Диффи -- Хеллмана, рукопись
[АХУ]
Ахо А., Хопкрофт Дж., Ульман Дж. Построение и анализ вычислительных алгоритмов, М., Мир,
1979
[Бы]
Быстров Л. В., Смарт-карты в платежных
системах, Банковские системы, N 2, 1994, 32-37
[Вас]
Василенко О. Н., Современные способы проверки
простоты чисел. Обзор, Кибернетический сборник,
т. 25, М., Мир, 1988, 162-188
[Вас1]
Василенко О. Н., Современные способы
проверки простоты чисел. Обзор, Кибернетический сборн.,
вып. 25, 1988, 162-188
[ГДж]
Гэри М., Джонсон Д., Вычислительные
машины и трудно решаемые задачи, Москва, Мир, 1982
[До]
Домашевский С. Н., Применение кредитных и
интеллектуальных карточек в основных промышленно развитых
странах, Радиоэлектроника (состояние и тенденции развития),
т. IV, 1992, 5-36
[Кнут]
Кнут Д., Искусство
программирования для ЭВМ. т. 2, Получисленные алгоритмы, М., Мир, 1977
[КУ93]
Казарин О. В., Ухлинов Л. М., Интерактивная
система доказательств для интеллектуальных средств контроля
доступа к информационно-вычислительным ресурсам, Автоматика
и телемеханика, N 11, 1993, 167-175
[КУ94]
Казарин О. В., Ухлинов Л. М.
Интеллектуальные средства обеспечения безопасности данных в
информационно-вычислительных сетях, Вестник РОИВТ, N 3,
1994, 35-46
[ЛН]
Лидл Р., Нидеррайтер Г., Конечные
поля, т. 1, 2, М., Мир, 1988
[Ма]
Маркелов К. Н., Конкуренция технологий,
Банковские системы, N 2, 1994, 16-27
[Ман]
Манджино Б., Система безналичных платежей на
базе смарт-карт, Банковские технологии, N 2, 1994, 38-52
[Ме]
Месси Дж. Л., Введение в современную
криптологию, ТИИЭР, Малый тематический выпуск, Защита
информации, т. 76, N 5, 1988, 24-42
[Нест]
Нестеренко Ю. В., Частные Ферма и дискретное
логарифмирование по составному модулю, рукопись
[Прах]
Прахар К., Распределение простых
чисел, М., Мир, 1967
[Пя]
Пярин В. А., Интеллектуальные карты в России,
Защита информации, N 5, 1995, 68-72
[Се]
Серегин В. В., Использование Smart Card в
системах защиты информации, Безопасность информационных
технологий, N 3-4, 1994, 114-117
[Сем]
Семаев И. А., О вычислении логарифмов на
эллиптических кривых, представлено в редакцию журнала
"Дискретная математика"
[У2]
Ухлинов Л. М., Распределение ключей защиты
данных и проблема аутентификации, Автоматика и
вычислительная техника, N 5, 1990, 11-17
[Чеб]
Чебышев П. Л., Полное собр. соч., т. 1, Теория чисел, Изд-во АН СССР, Москва -- Ленинград,
1946, 168-174
[Ш]
Шауман А. М., Основы машинной
арифметики, Л., Изд-во Ленинградского ун-та, 1979
[Adl]
Adleman L., A subexponential algorithm for
the discrete logarithm problem with applications to
cryptography, Proc. 20th IEEE Ann. Symp. on Found. of Comp.
Sci., 1979, 55-60
[Adl91]
Adleman L. M., Factoring numbers using
singular integers, Proc. 23rd ACM Symp. on Theory of
Comput., N. O., LA., 1991, 64-71
[AGP]
Alford W. R., Granville A., Pomerance C.,
There are infinitely many Carmichael numbers, Univ. of
Georgia Math. preprint series, prep. N 1, v. 1,
1993, 1-21
[AHu1]
Adleman L. M., Huang M.-D., Recognising
primes in a random polynomial time, preprint ACM
0-89791-7/87/0006/-0462
[AHu2]
Adleman L. M., Huang M.-D. A., Primality
testing and Abelian varieties over finite fields, Lect.
Notes in Math., v. 1512, 1992, 142
[Allen]
Allender E. W., Some consequences of the
existence of pseudorandom generators, Proc. 19th Annu. ACM
Symp. on Theory of Computing, 1987, 151-159
[AM]
Adleman L. M., De Marrais J., A subexponential
algorithm for discrete logarithms over all finite fields,
Math. Comput., v. 61, N 203, 1-16
[AMOV]
Agnew G. B., Mullin R. C., Onyszchuk I. M.,
Vanstone S. A., An implementation for a fast public-key
cryptosystem, v. 3, N 2, 1991, 63-79
[AS]
Adams W., Shanks D., Strong primality tests,
that are notsufficient, Math. Comput., v. 35,
1980, 1003-1026
[AT]
Akl S. G., Taylor P. D., Cryptographic
solution to a problem of access control in a hierarchy, ACM
Trans. Comp. Sci., v. 1, N 1, 1983, 239-248
[B86]
Barrett P., Implementing the Rivest, Shamir
and Adleman public key encryption algorithm on a standart
digital signal processor, Proc. CRYPTO'86, Lect. Notes.
in Comp. Sci., v. 263, 1987, 310-323
[Ba]
Bach E., Intractable problems in number theory
(invited talk), Lect. Notes in Comp. Sci., v.
403, 1989, 77-93
[Bab]
Babai L., Trading group theory for
randomness, Proc. 17th Annu. ACM Symp. on Theory of
Comput., 1985, 421-429
[BaEis]
Barrett P., Eisele R., The smart diskette.
A universal user token and personal crypto-engine, Proc.
CRYPTO'89, Lect. Notes. in Comp. Sci., v.
435, 1990, 74-79
[Bak]
Baker P. Fast computation of
,
Electron. lett., v. 23, N 15, 1987, 794-795
[BaWag]
Baillie R., Wagstaff S. S., Lucas
pseudoprimes, Math. Comput., v. 35, 1980,
1391-1417
[BBCGP]
Beauchemin P., Brassard G., Crepeau C.,
Goutier C., Pomerance C., The generation of random numbers,
that are probably prime, J. Cryptology, v. 1,
1988, 53-64
[BCCFP]
Brands S., Chaum D., Cramer R., Ferguson
N., Pedersen T., Transaction systems with observers, CWI
Tech. Rep., 1992
[BCDP]
Boyar J., Chaum D., Damg
rd I.,
Pedersen
T., Convertible undeniable signatures, Proc. CRYPTO'90,
Lect. Notes in Comp. Sci., v. 537, 1991,
189-205
[Be]
Berson T., Differential cryptanalysis
with applications to MD5, Proc.
EUROCRYPT'92, 1993, 71-80
[BeMi]
Bellare M., Micali S., How to sign given any
trapdoor function, Proc. CRYPTO'88, Lect. Notes. in Comp.
Sci., v. 403, 1990, 200-215
[Betal]
Ben-Or M., Goldreich O., Goldwasser S.,
H
stad J., Kilian J., Micali S., Rogaway P.,
Everything provable is provable in zero-knowledge,
CRYPTO'88, Lect. Notes in Comput. Sci., v. 403,
37-56
[BGG]
Barittaud T., Gilbert H., Girault M., FFT
hashing is not collision-free, Proc. EUROCRYPT'92,
1993, 35-44
[BGG1]
Bellare M., Goldreich O., Goldwasser S.,
Incremental cryptography: the case of hashing and signing,
Proc. CRYPTO'94, 1994, 216-233
[Bi]
Biham E., On the applicability of differential
cryptanalysis to hash functions, lecture at Workshop on
Cryptographic Hash Functions, March, 1992
[BiS1]
Biham E., Shamir A., Differential
cryptanalysis of FEAL and N-hash, Proc. EUROCRYPT'91,
Lect. Notes in Comput. Sci., v. 547, 1991,
1-16
[BiS2]
Biham E., Shamir A., Differential
cryptanalysis of Data Encryption Standart, Berlin,
Springer-Verlag, 1993
[BM]
Blum M., Micali S., How to generate
crytographically strong sequences of pseudo-random bits,
SIAM J. Comput, v. 13, N 4, 1984, 850-864
[BM90]
Brickell E. F., McCurley K. S. An
interactive identification scheme based on discrete
logarithms and factoring, Proc. EUROCRYPT'90, Lect.
Notes. in Comp. Sci., v. 473, 1991, 63-71
[BM91]
Brickell E. F., McCurley K. S., Interactive
identification and digital signatures, AT & T Technical
Journal, v. 70, N 6, November/December 1991,
73-86
[BMo]
Babai L., Moran S., Arthur-Merlin games: a
randomized proof system, and a hierarchy of complexity
classes, J. Comput. Syst. Sci., v. 36, N 2,
1988, 254-276
[Boer]
den Boer B., Diffie-Hellman is as strong as
discrete log for certain primes, Proc. CRYPTO'88, Lect.
Notes in Comp. Sci., v. 403, 1989, 530-539
[Boyd]
Boyd C., Digital multisignatures, in:
Cryptography and Coding, 1989, 241-246
[Boyd1]
Boyd C., Probabilistic prime tests, Comput.
Math. Res., Proc. Conf. Cardiff, Sept 29-30, 1986, Oxford,
1988, 57-68
[BP]
Brent R. P., Pollard J. M., Factorization of
the eight Fermat number, Math. Comput., v. 36,
1981, 627-630
[BPS]
Brown L., Pieprzyk J., Seberry J., LOKI a
cryptographic primitive for authentication and secrecy
application, Proc. AUSCRYPT'90, Lect. Notes in Comput.
Sci., v. 453, 1990, 229-236
[BPW]
Bleumer G., Pfitzmann B., Waidner M., A
remark on a signature scheme where forgery can be proved,
Proc. EUROCRYPT'90, Lect. Notes. in Comp. Sci.,
v. 473, 1991, 441-445
[BQ94]
Beguin Ph., Quisquater J.-J., Secure
acceleration of DSS insecure server, Proc. ASIACRYPT'94,
209-217
[Bra1]
Brassard G., An optimally secure relativized
cryptosystem, Rep. CRYPTO'81, Tech. Rep. N 82-04, 1982,
Dep. of ECE, Univ. of California, 54-58; reprinted in
SIGACT News, 1983, v. 15, N 1, 28-33
[Bra2]
Brassard G., Relativized cryptography, IEEE
Trans. on Inform. Theory, 1983, IT-19, 877-894
[Brand]
Brands S., Untraceable off-line cash in
wallets with observers, Proc. CRYPTO'93, 302-318
[Bril]
Brillhart J., A note on finding dependencies
over , Utilitas Math., v. 36, 1989,
211-213
[BriLS]
Brillhart J., Lehmer D. H., Selfridge G.
L., New primality criteria and factorizations of ,
Math. Comput., v. 29, N 130, 1975, 620-647
[BriMS]
Brillhart J., Montgomery P. L., Silverman
R. D., Tables of Fibonacci and Lucas factorizations, Math.
Comput., v. 50, N 181, 1988, 251-260
[BrMor]
Brillhart J., Morrison M. A., A method of
factoring and factorization of , Math. Comput.,
v. 29, 1975, 183-205
[BrRi]
Brent R. P., te Riele H. J. J.,
Factorization of ,
, Rept.
Cent. Math. and Comput. Sci., NM-R9212, 1992, 1-363
[BS]
Biham E., Shamir A., Differential
cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and
Lucifer, Proc. CRYPTO'91, Lect. Notes in Comput. Sci.,
v. 576, 156-171
[BSch]
Beth T., Schaefer F., Non supersingular
elliptic curves for public key cryptosystems., Lect. Notes
in Comp. Sci., v. 547, 1991, 316-327
[BuCP]
Buhler J. P., Crandall R. E., Penk M. A.,
Primes of the form and
, Math. Comput., v. 38,
1982, 639-643
[BuhLP]
Buhler J., Lenstra H. W., Pomerance C.,
Factoring integers with the number field sieve, preprint
[Bur]
Burmester M., On the risk of opening
distributed keys, Proc. CRYPTO'94, Lect. Notes in Comp.
Sci., v. 839, 308-317
[BW]
Buell D. A., Ward R. L., A multiprecize
arithmetic package, J. Supercomput., v. 3, N 2,
1989, 89-107
[CFN]
Chaum D., Fiat A., Naor M., Untraceable
electronic cash, Proc. CRYPTO'88, Lect. Notes in Comput.
Sci., v. 403, 1990, 319-327
[CH]
Chaum D., van Heyst E., Group signatures,
Proc. EUROCRYPT'91, Lect. Notes in Comp. Sci.,
v. 547, 1991, 257-265
[Ch90]
Chaum D., Zero-knowledge undeniable
signatures, Proc. EUROCRYPT'90, Lect. Notes. in Comp.
Sci., v. 473, 1991, 458-464
[Ch91]
Chaum D., Some weaknesses of "Weaknesses of
undeniable signatures", Proc. EUROCRYPT'91, Lect.
Notes in Comp. Sci., v. 547, 1991, 554-556
[Cha]
Chaum D., An improved protocol for
demonstrating prossession of discrete logarithms and some
generalizations, Lect. Notes in Comp. Sci., v.
304, 1988, 127-141
[Chaum]
Chaum D., Online cash checks, Proc.
EUROCRYPT'89, Lect. Notes in Comput. Sci., v. 434, 1990, 288-293
[Chaum90]
Chaum D., Security without
identification: Card computers to make big brother
obsolete, Cryptogr. and Data Prot.: Symp. Roy. Neth. Acad.
Arts and Sci., Amsterdam, 19th Dec. 1990, Amsterdam, 1992,
81-104
[ChDG88]
Chaum D., Damg
rd I. B., van de
Graaf J., Multiparty computations ensuring privacy of each
party's input and correctness of the result, Proc.
CRYPTO'87, Lect. Notes in Comput. Sci., v.
293, 1988, 87-119
[ChP]
Chaum D., Pedersen T. P., Transferred cash
grows in size, Proc. EUROCRYPT'92, 390-407
[CHW]
Chang C. C., Hwang R. J., Wu T. C.,
Cryptographic key assignment scheme for access control in a
hierarchy, Inf. Syst., v. 17, N 3, 1992,
243-247
[CMY]
Chang Z., Martin H., Yun D., Parallel
algorithmes and systolic arrays for RSA cryptosystem, Proc.
Int. Conf. Systolic Arrays, San-Diego, Calif., May 25-27,
1988. Proc. Washington(D.C.) 1988
[Co]
Coppersmith D., Two broken hash-functions,
Research Report RD 18397, IBM T. J. Watson Center, October,
1992
[Copp]
Coppersmith D., Fast evaluation of
logarithms in fields of characteristic two, IEEE Trans.
Inf. Theory, IT-30, N 4, 1984, 587-594
[CopW]
Coppersmith D., Winograd S., On the
asymptotic complexity of matrix multiplication, SIAM J.
Comput., 11, 1982, 472-492
[COS]
Coppersmith D., Odlyzko A. M., Schroeppel R.,
Discrete logarithms in , Algorithmica, v.
1, N 1, 1986, 1-15
[CP]
Crandall R. E., Penk M. A., A search for large
twin pairs, Math. Comput., v. 38, 1979,
383-388
[CP1]
Chen L., Pedersen T. P., New group signature
schemes, Proc. EUROCRYPT'94, 1994
[CP2]
Chen L., Pedersen T. P., Group signatures:
unconditional security for members, Tech. Report DAIMI
PB-481, Aarhus University, September 1994
[CP3]
Chen L., Pedersen T. P., On the efficiency of
group signatures providing information-theoretic anonymity,
Proc. EUROCRYPT'95, 39-49
[CP92]
Chaum D., Pedersen T. P., Wallet databeses
with observers, Proc. CRYPTO'92, Abstracts, Santa
Barbara, August 1992, 3.1-3.6
[CPr]
Chorley G. J., Price W. L., An intelligent
token for secure transactions, Proс. IFIP/Sec'86,
Monte-Carlo, 1986, 442-450
[CQ]
Couvreur C., Quisquater J., An introduction to
fast generation of large prime numbers, Philips J.
Research, v. 37, 1982, 231-264
[CrP]
Cramer R. J. F., Pedersen T. P., Improved
privacy in wallets with observers, Pre-proc.
EUROCRYPT'93, Wednesday 58-69
[CvA]
Chaum D., Van Antwerpen H., Undeniable
signatures, Proc. CRYPTO'89, Lect. Notes. in Comp. Sci.,
v. 435, 1990, 212-216
[CW]
Carter J. L., Wegman M. N., Universal classes
of hash functions, J. Comput. and Syst. Sci., v.
18, N 2, 1979, 143-154
[D]
Damg
rd I. B., Non-interactive circuit based
proofs and non-interactive perfect zero-knowledge with
preprocessing, Proc. EUROCRYPT'92, 313-326
[Da]
Damg
rd I. B., A design principle for hash
function, Proc. CRYPTO'89, Lect. Notes in Comput. Sci.,
v. 435, 1990, 416-427
[Dam90]
Damg
rd I. B., Payment systems and
credential mechanisms with provable security against abuse
by individuals, Proc. CRYPTO'88, Lect. Notes in Comput.
Sci., v. 403, 1990, 328-335
[dBB]
den Boer B., Bosselaers A., An attack on the
last two rounds of MD4, Proc. CRYPTO'91, Lect. Notes in
Comput. Sci., v. 576, 1991, 194-203
[dBB1]
den Boer B., Bosselaers A., Collisions for
the compression function of MD5, Proc. EUROCRYPT'93,
1994
[DBGV]
Daeman J., Bosselaers A., Govaerts R.,
Vandewalle J., Collisions for Schnorr's hash function
FFT-hash presented at Crypto'91, Proc. ASIACRYPT'91,
1991, presented at rump session
[DeSY]
De Santis A., Yung M., On the design of
provably-secure cryptographic hash functions, Proc.
EUROCRYPT'90, Lect. Notes in Comput. Sci., v. 473, 1991, 412-431
[deWQ90]
de Waleffe D., Quisquater J.-J., CORSAIR:
A smart card for pubiic key cryptosystems, Proc.
CRYPTO'90, Lect. Notes in Comp. Sci., v. 537,
1991, 502-509
[DGV2]
Daeman J., Govaerts R., Vandewalle J., A
hardware design model for cryptographic algorithms,
ESORICS, Proceedings of the Second European Symposium on
Research in Computer Security, Berlin: Springer-Verlag,
1992, 419-434
[DH]
Diffie W., Hellman M. E., New directions in
cryptography, IEEE Trans. on Inform. Theory., v.
22, N 6, 1976, 644-654
[DiPFM]
Di Porto A., Filipponi P., Montolivo E., An
efficient algorithm for finding large probable primes, Note
Recenzione Notizie, N 3-4, 1988, 163-168
[Dix]
Dixon J. D., Asymptotically fast
factorization of integers, Math. Comput., v.
36, 1981, 255-260
[DP]
Davies D. W., Price W. L., Digital signature
-- an update, Proc. of Int. Conf. on Comput.
Communications, Sydney, October, 1984, North Holland:
Elsevier Science Publishers, 1985, 843-847
[DSS]
A proposed federal informaton proccessing
standard for ddgital signature standard (DSS), Federal
Register, v. 56, N 169, August, 1991,
42980-42982
[EG85]
ElGamal T., A public key cryptosystem and a
signature scheme based on discrete logarithms, IEEE Trans.
Information Theory, IT-31, 1985, 469-472
[EIH]
Electronique International Hebdo, N 41, 1991,
19/XII, p. 9
[ElG84]
ElGamal T., A subexponential-time algorithm
for computing discrete logarithms over
, Advances in Cryptology: Proc.
CRYPTO'83, Proc. Workshop Theory and , 1984,
275-292
[ElG85]
ElGamal T., A subexponential-time algorithm
for computing discrete logarithms over
, IEEE Trans. Inform. Theory,
v. 31, 1985, 473-481
[ElG86]
ElGamal T., On computing logarithms over
finite fields, Lect. Notes in Comp. Sci., v.
218, 1986, 396-402
[EW]
Electronics Weekly, N 1583, 1992, 11/III, p.
1, 12-13
[Fahn]
Fahn P., Answers to frequently asked
questions about today's cryptography, Tech. Rep. RSA
Laboratories, 100 Marine Parkway, Redwood City, CA 94065
[Ferg]
Ferguson N., Extensions of single-term
coins, Proc. CRYPTO'93, 292-301
[FFS]
Feige U., Fiat A., Shamir A. Zero-knowledge
proofs of identity, J. Cryptology, N 1, 1988, 77-94
[FKLN]
Fortnow L., Karloff H., Lund C., Nisan N.,
Algebraic methods for interactive proof systems, 31st Annu.
Symp. on Found. of Comput. Sci., 1990, 2-10
[FOM91]
Fujioka A., Okamoto T., Miyaguchi S.,
ESIGN: An efficient digital signature implementation for
smart cards, Proc. EUROCRYPT'91. Lect. Notes in Comp.
Sci., v. 547, 1991, 186-194
[FR]
Frey G., Ruck H.-G., A remark concerning
-divisibility and discret logarithm in the divisor class
group of curves, preprint
[FS86]
Fiat A., Shamir A., How to prove yourself:
practical solutions to identification and signature
problems, Proc. CRYPTO'86, Lect. Notes. in Comp. Sci.,
v. 263, 1987, 186-194
[G]
G
nther C. G., An identity-based key
exchange protocol, Proc. EUROCRYPT'89, Lect. Notes in Comp.
Sci., v. 434, 1990, 29-37
[Getal]
Goldreich O. et al., Security preserving
amplification of hardness, Proc. 31th Annu. Symp. on Found.
of Comput. Sci., 1990, 318-326
[GGM]
Goldreich O., Goldwasser S., Micali S., How
to construct random functions, J. of ACM, v.
33, N 4, 1986, 792-807
[Gir]
Girault M. Identity-based identification
sheme based on discrete logarithms modulo a composite
number, Proc. EUROCRYPT'90, Lect. Notes. in Comp. Sci.,
v. 473, 1991, 481-486
[GK]
Goldreich O., Kushilevitz E., A perfect
zero-knowledge proof for a problem equivalent to discrete
logarithm, CRYPTO'88, Lect. Notes in Comp. Sci.,
v. 403, 1988, 57-70
[GKil]
Goldwasser S., Kilian J., Almost all primes
can be qickly certified, Proc. 18th Annu. ACM Symp. on
Theory of Computing, Bercley, May 28-30, 1986, 316-329
[GKr]
Goldreich O., Krawchyk H., On the composition
of zero-knowledge proof systems, ICALP'90, Lect. Notes in
Comput. Sci., v. 443, 268-282
[GLS]
Guy R. K., Lacampagne C. B., Selfridge G. L.,
Primes at a glance, Math. Comput., v. 48, N
177, 1987, 183-202
[GMR1]
Goldwasser S., Micali S., Rackoff C., The
knowledge complexity of interactive proof systems, Proc.
17th Annu. ACM Symp. on Theory of Computing, 1985, 291-304
[GMR2]
Goldwasser S., Micali S., Rackoff C., The
knowledge complexity of interactive proof systems, SIAM J.
on Comput., v. 18, N 1, 1989, 186-208
[GMRiv]
Goldwasser S., Micali S., Rivest R., A
secure digital signature scheme, SIAM J. on Computing,
v. 17, N 2, 1988, 281-308
[GMW1]
Goldreich O., Micali S., Wigderson A.,
Proofs that yield nothing but their validity and a
methodology of cryptographic protocol design, 27th Annu.
Symp. on Found. of Comput. Sci., 1986, 174-187
[GMW2]
Goldreich O., Micali S., Wigderson A.,
Proofs that yield nothing but their validity or all
languages in NP have zero-knowledge proof systems, J. of
ACM, v. 38, N 3, 1991, 691-729
[Gor]
Gordon D., Strong primes are easy to find,
Lect. Notes. in Comp. Sci., v. 209, 1985,
216-223
[Gord]
Gordon D. M., Discrete logarithms in
using the number field sieve., SIAM J. Disc. Math.,
v. 6, N 1, 1993, 124-138
[Goss]
Goss K. C., Cryptographic method and
apparatus for public key exchange with authentication, U.
S. Patent 4956863, Granted Sept. 11, 1990
[GQ]
Guillou L. C., Quisquater J.-J., A practical
zero-knowledge protocol fitted to security microprocessor
minimyzing both transmission and memory, Proc.
EUROCRYPT'88. Lect. Notes in Comp. Sci., v.
330, 1988, 123-128
[GS]
Goldwasser S. and Sipser M., Private coins
versus public coins in interactive proof systems Proc. 18th
Annu. ACM Symp. on Theory of Computing, 1986, 59-68
[Gut]
Guthmann A., Effective primality tests for
integers of the forms and
, BIT (Dan.), v. 32, N
3, 1992, 529-534
[H]
H
stad J., Pseudo-random generators
under uniform assumptions, Proc. 22nd Annu. ACM Symp. on
Theory of Computing, 1990, 395-404
[HDVC]
Hoornaert F., Decroos M., Vandewalle J.,
Covaert R., Fast RSA: dream or reality, Proc.
EUROCRYPT'88. Lect. Notes in Comp. Sci., v.
330, 1988, 256-264
[HKi]
Harn L., Kiesler T., New scheme for digital
multisignatures, Electronics Letters, v. 25, N
15, 1989
[HL]
Harn L., Lin H. Y., A cryptographic key
generation scheme for multilevel data security, Comput.
Sec., v. 9, N 6, 1990, 539-546
[HP]
van Heyst E., Pedersen T. P., How to make
efficient fail-stop signatures, Proc. EUROCRYPT'92,
366-377
[HR]
Hellman H., Reyneri J. M., Fast computation of
discrete logarithms in , Advances in Cryptography:
Proc. CRYPTO'82, D. Chaum, R. Rivest, A. Sherman (eds.),
Plenum Press, 1983
[Hu]
Hunter D. G. N., RSA key calculations in ADA,
The Comp. J., v. 28, N 3, 1985, 343-348
[IL]
Impagliazzo R., Luby M., One-way functions are
essential for complexity based cryptography, Proc. 30th
Ann. Symp. on Found. of Comp. Sci., IEEE Comp. Soc., 1989
[ILL]
Impagliazzo R. , Levin L., Luby M.,
Pseudo-random generation from one-way functions, Proc. 21st
Symp. on Theory of Computing, 1989, 12-24
[IN]
Impagliazzo R., Naor M., Efficient
cryptographic schemes provably as secure as subset sum,
Proc. 30th Annu. Symp. on Found. of Comput. Sci., Research
Triangle Park, NC, 1989, 236-241
[IR]
Impagliazzo R., Rudich S., Limits on the
provable consequences of one-way permutations, Proc. 21st
Ann. Symp. on Theory of Computing. ACM, 1989, 44-61
[ISO1]
ISO 7816-1:1987 Карточки идентификационные.
Карточки на интегральных схемах с контактами. Часть 1.
Физические характеристики
[ISO2]
ISO 7816-2:1988 Карточки идентификационные.
Карточки на интегральных схемах с контактами. Часть 2.
Размеры и расположение контактов
[ISO3]
ISO 7816-3:1989 Карточки идентификационные.
Карточки на интегральных схемах с контактами. Часть 3.
Электронные сигналы и протоколы передачи
[ITW]
Ingemarsson I.,Tang D. T., Wong C. K., A
conference key distribution system, IEEE Trans on Inform.
Theory, v. IT-28, N 5, 1982, 714-720
[IZ]
Impagliazzo R., Zuckerman D., How to recycle
random bits, Proc. 30th Annu. Symp. on Found. of Comput.
Sci., Research Triangle Park, NC, 1989, 248-253
[JU]
Jammalamadaka S. R., Uppuluri V. R. R., Is
a prime number? Some probabilistic tests for primality,
Math. Scientist, v. 14, 1989, 55-61
[Ka]
Kaliski B. S., The MD2 message digest
algorithm, RFC 1319, April, 1992
[Kn]
Knudsen L. R., Cryptanalysis of LOKI, Proc.
ASIACRYPT'91, Abstracts, 1991, 19-30
[Kob]
Koblitz N., Course in number theory
and cryptography, NY, Springer-Verlag, 1987
[KonP]
Konyagin S., Pomerance C., On primes
recognizable in deterministic polynomial time, preprint
[Koy]
Koyama K., Direct demonstration of the power
to breac public cryptosystems. Lect. Notes in Comp. Sci.,
v. 453, 1990, 14-21
[La]
Lamport L., Constructing digital signatures
from one-way functions, SRI intl. CSL-98, Oct. 1979
[Lai]
Lai X., On the design and security of block
ciphers, ETH Series in Information Processing, v. 1, Konstanz: Hartung-Gorre Verlag, 1992
[LaM]
Lai X., Massey J., Hash functions based on
block ciphers, Proc. EUROCRYPT'92, 1993, 55-70
[LaMO]
LaMacchia B. A., Odlyzko A. M., Computation
of discrete logarithms in prime fields, preprint, 1990
[Lanc]
Lanczos C., An iterative method for the
solution of the eigenvalue problem of linear differential
and integral operators, J. Res. Nat. Bur. Standards, sect.
B, v. 45, 1950, 255-282
[Len84]
Lenstra H. W., Divisors in residue classes,
Math. Comput., v. 42, N 165, 1984, 331-340
[Len87]
Lenstra H. W., Factoring integers with
elliptic curves, Ann. Math., v. 126, N 3, 1987,
649-673
[LLMP]
Lenstra A. K., Lenstra H. W., Manasse M. S.,
Pollard J. M., The number field sieve, Proc. of the 22nd
ACM Symp. on Theory of Computing, ACM, 1990, 564-572
[LR]
Luby M., Rackoff C., How to construct
pseudorandom permutations from pseudorandom functions, SIAM
J. Comput., v. 17, N 2, 1988, 373-386
[LWL]
Liaw H. T., Wang S. J., Lei C. L., A dynamic
cryptographic key assignment scheme in a tree structure,
Comput. Math. Appl., v. 25, N 6, 1993, 109-114
[MaIm]
Matsumoto T., Imai H., On the key
predistribution system: a practical solution to the key
distribution problem, Proc. CRYPTO'87, Lect. Notes in
Comput. Sci., v. 293, 1988, 185-193
[Mats94]
Matsumoto T., Incidence structures for key
sharing, Proc. ASIACRYPT'94, 288-297
[Mau]
Maurer U. M., Towards the equivalence of
breaking the Diffie-Hellman protocol and computing
discrete logarithms, Proc. CRYPTO'94, Lect. Notes in
Comp. Sci., v. 839, 271-281
[McC88]
McCurley K. S., A key distribution system
equivalent to factoring, J. of Cryptology, v.
1, N 2, 1988, 95-105
[McC90]
McCurley K. S., The discrete logarithm
problem, Proc. of Symp. in Appl. Math., v. 42,
1990, 49-74
[McCr]
McCrindle J., Smart cards, IFS
Ltd, UK Springer-Verlag, 1990
[McKTMA]
MacKinnon S. J., Taylor P. D., Meijer H.,
Akl S. G., An optimal algorithm for assigning cryptographic
keys to access control in a hierarchy, IEEE Trans. Comput.,
v. C-34, N 9, 1985, 797-802
[Me]
Merkle R. C., A fast software one-way hash
function, J. of Cryptology, v. 3, N 1, 1990,
43-58
[MI]
Matsumoto T., Imai H., Human identification
through insecure channel, Proc. EUROCRYPT'91. Lect.
Notes in Comp. Sci., v. 547, 1991, 406-421
[Mil]
Miller G. L., Riemann's hypothsis and tests
for primality, J. Comput. and System Sci., v.
13, N 3, 1976, 300-317
[MKI]
Matsumoto T., Kaki K., Imai H., Speeding up
secret computations with insecure auxiliary devices, Proc.
CRYPTO'88, Lect. Notes in Comp. Sci., v. 403,
1989, 496-506
[MMO]
Matyas S. M., Meyer C. H., Oseas J.,
Generating strong one-way functions with cryptographic
algorithms, IBM Technical Disclosure Bulletin, v. 27, N 10A, March, 1985, 5658-5659
[MOI]
Miyaguchi Sh., Ohta K., Iwata M.,
Confirmation that some hash functions are not collision
free, Proc. EUROCRYPT'90, Lect. Notes in Comput. Sci.,
v. 473, 326-343
[MOI1]
Miyaguchi S., Ohta K., Iwata M., 128-bit
hash function (N-hash), Proc. of SECURICOM'90, 1990,
127-137
[MOI2]
Miyaguchi S., Ohta K., Iwata M.. 128-bit
hash function, NTT Review, v. 2, N 6, Nov.
1990, 128-132
[Mon]
Monier L., Evaluation and comparison of two
efficient probabilistic primality algorithms, Theor. Comp.
Sci., v. 12, 1980, 97-108
[MonS]
Montgomery P. L., Silverman R. D., An FFT
extension to the factoring algorithm, Math. Comput.,
v. 54, N 190, 1990, 839-854
[Mont]
Montgomery P. L., Speeding the Pollard and
elliptic curve method for factorization, Math. Comput.,
v. 48, N 177, 1987, 243-264
[Montg]
Montgomery P., Modular multiplication
without trial division, Math. of Comput., 1985, v. 44, N 170, 519-521
[Mor]
Morain F., Building cyclic elliptic curves
modulo large primes. Proc. EUROCRYPT'91, Lect. Notes in
Comp. Sci., v. 547, 1991, 328-336
[MOV]
Mendes A., Okamoto T., Vanstone S., Reducing
elliptic curve logarithms in a finite fields, Proc. of the
23 Annual ACM symposium on the theory of computing., 80-89
[MTI]
Matsumoto T., Takashima Y., Imai H., On
seeking smart public key distribution systems, Trans. IECE
of Japan, E69(2), 1986, 99-106
[NBS1]
NBS FIPS PUB 113, Computer Data
Authentication, National Bureau of Standarts, U.S.
Department of Commerce, May, 1985
[NBS2]
NBS FIPS PUB YY, Secure Hash Standart,
National Bureau of Standarts, U.S. Department of Commerce,
DRAFT, 22 January, 1992
[NBS3]
NBS FIPS PUB YY, Secure Hash Standart,
National Bureau of Standarts, U.S. Department of Commerce,
DRAFT, April, 1993
[Nis]
Nisan N., Pseudorandom generators for
spacebounded computation, manuscript, 1989
[NM'RR]
Naccache D., M'Raihi D., Raphaeli D., Can
Montgomery parasites be avoided? A design methodology based
on key and cryptosystem nodifications, Design, Codes and
Cryptography, v. 5, 1995, 73-80
[NY]
Naor M., Yung M., Universal one-way hash
functions and their cryptographic applications, Proc. 21st
Annu. ACM Symp. on Theory of Computing, 1989, 33-43
[Ober]
Mathematical concepts of dependable systems,
Tagungsber. Math. Forschungsinst., Oberwolfach,
N 17, 1990, 1-20
[Odl]
Odlyzko A. M., Discrete logarithms in finite
fields and their cryptographic significance, Proc.
EUROCRYPT'84, Lect. Notes in Comp. Sci., v.
209, 1985, 224-314
[Oka]
Okamoto T., A digital multisignature scheme
using bijective public-key cryptosystems, ACM Trans. on
Comp. Sys., v. 6, N 8, 1988, 432-441
[OO]
Ohta K., Okamoto T., A digital multisignature
scheme based on the Fiat-Shamir scheme, Proc.
ASIACRYPT'91, Lect. Notes. in Comp. Sci., v.
739, 1993, 139-148
[Ore]
Oren Y., On the cunning power of cheating
verifiers: some observations about zero-knowledge proofs,
28th Annu. Symp. on Found. of Comput. Sci., 1987, 462-471
[ORSPT]
Orton G. A., Roy M. P., Scott P. A.,
Peppard L. E., Tavares S. E., VLSI implemetation of
public-key encryption algorithm, Proc. CRYPTO'86, Lect.
Notes. in Comp. Sci., v. 263, 1987, 276-301
[OSch90]
Ong H., Schnorr C. P., Fast signature
generation with Fiat-Shamir-like scheme, Proc.
EUROCRYPT'90, Lect. Notes. in Comp. Sci., v.
473, 1991, 433-440
[OT]
Okamoto E., Tanaka K., Identity-based
information security manegement system for personal
computer networks, IEEE J. on Selected Areas in
Communications, v. 7, N 2, 1989, 290-294
[OWi]
Ostrovsky R., Wigderson A., One-way functions
are essential for non-trivial zero-knowledge, manuscript,
November 27, 1992
[Pa]
Parhami B., Generalized signed-digit number
systems: a unifying framework for redundant number
represantations, IEEE Trans. Comput., v. 39, N
1, 1990, 89-98
[Pat]
Patarin J., How to find and avoid collisions
for the knapsack hash function, Preproc. EUROCRYPT'93,
Wednesday 33-45
[PH]
Pohlig S. C., Hellman M.E., An improved
algorithm for computing logarithms over and its
cryptographic significance, IEEE Trans. Inform. Theory,
v. 24, N 1, 1978, 106-110
[Pi]
Piller E., Card-holder controlled access to
multiapplication smart-card, Smart card 2000, 159-163
[Pl]
Plaisted D., Fast verification, testing and
generation of large primes, Theor. Comput. Sci., v. 9, 1979, 1-16
[Poll74]
Pollard J. M., Theorems on factorization
and primality testing, Proc Cambridge Phil. Soc.,
v. 76, 1974, 521-528
[Poll75]
Pollard J. M., A Monte Carlo method for
factorization , BIT, v. 15, 1975, 331-334
[Pom82]
Pomerance C., Analysis and comparison of
some integer factoring algorithms, in: Lenstra H. W.,
Tijdeman R., Computational methods in number
theory, Amst., v. 1, 1982, 89-140
[Pom85]
Pomerance C., The quadratic sieve factoring
algorithm, Proc. EUROCRYPT'84, Lect. Notes in Comp.
Sci., N. 209, 1985, 169-183
[Pom87]
Pomerance C., Fast and rigorous
factorization and discrete logarithm algorithms, in:
Discrete algorithms and complexity, Proc. of the Japan-US
joint seminair, London: Acad. Press., 1987, 119-143
[Pr]
Preneel B., Analysis and design of
cryptographic hash functions, Ph. D. diss.,
Katholieke Universiteit, Leuven, January,
1993
[PrBGV]
Preneel B., Bosselaers A., Govaerts R.,
Vanderwalle J., Collision-free hash functions based on
blockcipher algorithms, Proc. Carnahan Conf. on Security
Technology, 1989, 203-210
[PS]
Pieperzyk J., Sadeghiyan B., Design
of hashing algorithms, Berlin, Springer-Verlag, 1993
[PSS]
Pintz J., Steiger W. L., Szemeredi E.,
Infinite sets of primes with fast primality tests and quick
generation of large primes, Math. Comput., v.
53, N 187, 1989, 399-406
[PSW]
Pfitzmann B., Schunter M., Waidner M., How to
break another "provably secure" payment system, Proc.
EUROCRYPT'95, 121-132
[PSZ]
Parady B. K., Smith J. F., Zarantonello S.
E., Largest known twin primes, Math. Comput., v.
55, N 191, 1990, 381-382
[PW]
Pfitzmann B., Waidner M., How to break and
repair a "provably secure" untraceable payment system,
Proc. CRYPTO'91, Lect. Notes in Comput. Sci., v. 576, 1991, 338-350
[PW92]
Pfitzmann B., Waidner M. Attacks on
protocols for server-aided RSA computation, Proc.
EUROCRYPT'92, 1993, 153-162
[QD1]
Quisquater J.-J., Delescaille J.-P., How easy
is collision search? Application to DES, Proc.
EUROCRYPT'89, 429-434
[QD2]
Quisquater J.-J., Delescaille J.-P., How easy
is collision search. New results and applications to DES,
Proc. CRYPTO'89, Lect. Notes in Comput. Sci., v. 435, 1990, 408-413
[QG]
Quisquater J.-J., Girault M., -bit hash
functions using -bit symmetric block cipher algorithms,
Proc. EUROCRYPT'89, 1990, 102-109
[Ra]
Rankine G., Thomas -- a complete single chip
RSA device, Proc. CRYPTO'86, Lect. Notes. in Comp. Sci.,
v. 263, 1987, 479-487
[Rab]
Rabin M. O., Probabilistic algorithm for
testing primality, J. of number theory, v. 12,
N 1, 1980, 128-138
[Rab79]
Rabin M. O., Digitalized signatures and
public-key functions as intractable as factorization, MIT
Tech. Rep, 1979, MIT/LCS/TR-212
[RACE]
RACE. RIPE integrity primitives: final
report of RACE integrity primitives evaluation (R1040),
June 1992
[Ri1]
Rivest R., The MD4 message digest algorithm,
RFC 1186, October, 1990
[Ri2]
Rivest R., The MD4 message digest algorithm,
Proc. CRYPTO'90, 1991, 303-311
[Ri3]
Rivest R., The MD4 message digest algorithm,
RFC 1320, April, 1992
[Ri4]
Rivest R., The MD5 message digest algorithm,
RFC 1321, April, 1992
[Rib]
Ribenboim P., The book of prime
number records, Springer-Verlag, N.Y., 1988
[Rie]
Riesel H., Prime numbers and computer methods
for factorization, Progress in Math., v. 57,
Birkhauser, 1985
[Ries]
Riesel H., Some soluble cases of the
discrete logarithm problems, BIT, v. 28, N 4,
1988, 839-851
[Ro]
Rompel J., One-way functions are necessary and
sufficient for secure signatures, Proc. 22nd Annu. ACM
Symp. on Theory of Computing, 1990, 387-394
[RSA]
Rivest R. L., Shamir A., Adleman L., A method
for obtaining digital signatures and public-key
cryptosystems, Commun. ACM, v. 21, N 2, 1978,
120-126
[Rud]
Rudich S., The use of interaction in public
cryptosystem, Proc. CRYPTO'91, Lect. Notes in Comp. Sci.,
v. 576, 1992, 242-251
[S]
Shmuely Z., Composite Diffie-Hellman
public-key generating systems are hard to break, TR #356,
Comp. Sci. Dept. Tech. , IIT, Feb. 1985
[San]
Sandhu R. S., Cryptographic implementation of
a tree hierarchy for access control, Inf. Process. Lett.,
v. 27, N 2, 1988, 95-98
[Sch]
Schnorr C. P., Efficient identification and
signatures for smart cards, Proc. CRYPTO'89, Lect. Notes.
in Comp. Sci., v. 435, 1990, 239-252
[Sch1]
Schnorr C. P., Refined analysis and
improvements of some factoring algorithms., J. Algorithms,
v. 3, 1982, 101-127
[Schndr]
Schneider B., Applied
cryptography, Berlin, Springer-Verlag, 1993
[Schnr]
Schneir B., One-way hash functions, Dr.
Dobbs Journal, v. 16, N 9, September 1991,
148-151
[Schnrr1]
Schnorr C. P., An efficient cryptographic
hash function, presented at the rump session of CRYPTO'91
[Schnrr2]
Schnorr C. P., FFT-hash II, efficient
cryptographic hashing, Proc. EUROCRYPT'92, 1993, 45-54
[Scho]
Schoof R., Quadratic fields and
factorization, in: Lenstra H. W., Tijdeman R., Computational methods in number theory, Amst., v. 2, 1982, 235-286
[Se]
Sedlak H., The RSA cryptography processor,
Proc. EUROCRYPT'87, Lect. Notes in Comp. Sci.,
v. 304, 1988, 94-105
[Sha]
Shamir A., IPPSPACE, Proc. 31st Annu.
Symp. on Found. of Comput. Sci., 1990, 11-15
[Shain]
Shain M., Security in electronic funds
transfer: message integrity in money transfer and bond
settlements through GE information services' global
network, Computers and Security, v. 8, 1989,
209-221
[She]
Shen A., IPPSPACE: simplified proof,
manuscript, 1990
[Shiz]
Shizuya M., On the complexity of
hyperelliptic discrete logarithm problem, Lect. Notes in
Comp. Sci., v. 547, 1991, 337-351
[Si]
Simmons G. J. (ed.), Contemporary
cryptology: the science of information integrity,
Piscataway, N.J. IEEE Press, 1992
[Silv]
Silverman R. D., The multiple polynomial
quadratic sieve, Math. Comput., v. 48, N 177,
1987, 329-339
[Sim]
Simmons G. J., Authentication theory/coding
theory, Proc. CRYPTO'84, Lect. Notes in Comput. Sci.,
v. 196, 1985, 411-431
[Sip]
Sipser M., A complexity-theoretic approach to
randomness, Proc. 15th Annu. ACM Symp. on Theory of
Computing, 1983, 330-335
[SmC]
Smart Card 2000, D. Chaum and Schamuuler --
Bichl (Editors), Elsevier Science Publishers B. V.
(North-Holland)
[SPC]
Stadler M., Piveteau J.-M., Camnisch J., Fair
blind signatures, Proc. EUROCRYPT'95, 209-219
[SStr]
Solovay R., Strassen V., A fast Monte Carlo
test for primality, SIAM J. on Computing, v. 6,
1977, 84-85; erratum ibid. v. 7, 1978, 118
[SSY]
Sedgewick R., Szymanski T. G., Yao A. C., The
complexity of finding cycles in periodic functions, SIAM J.
Comput., v. 11, 1982, 376-390
[StM]
Staffelbach O., Meier W., Analysis of
pseudo-random sequences generated by cecullar automata,
Proc. EUROCRYPT'91, Lect. Notes in Comput. Sci.,
v. 547, 1991, 186-192
[Stra]
Strassen V., Einige Resultate uber
Berechnungscomplexitat, Jahresber.
Deutch. Math. Verein, 78(1976/77), 1-8
[Ta]
Takagi N., High-speed VLSI multiplication
algorithm a redundant binary addition tree, IEEE Trans.
Comput., v. C-34, N 9, 1985, 789-796
[TAM]
Tichenor H., Asbo E., McCoy G., VISA
Supersmart card application and technology, Smart Card
2000, D. Chaum and Schaumuuler -- Bichl (Editors),
Elsevier Science Publishers B. V. (North-Holland), 35-44
[Va]
Vaudenay S., FFT-hash II is not yet collision
free, Proc. CRYPTO'92, 1993
[vA90]
van Antwerpen H., Electronic cash, Master's
thesis, CWI, 1990
[Voor]
Voorhoeve M., Factorization algorithms of
exponential order, in: Lenstra H, W., Tijdeman R.,
Computational methods in number theory,
v. 1, Amsterdam, 1982, 79-88
[WC]
Wu T. C., Chang C. C., Controlling access in
tree hierarchies, Inform. Sci., v. 78, 1994,
69-76
[WHT]
Wang C.-H, Hwang T., Tsai J.-J., On the
Matsumoto and Imai identification scheme, IEE Proc. --
Comput. Digit. Tech., v. 142 N 5, 313-317
[Wi]
Winternitz R. S., Producing one-way hash
function from DES, Proc. CRYPTO'83, Plenum Press, 1984,
203-207
[Wied]
Wiedemann D., Solving sparse linear
equations over finite fields, IEEE Trans. Inform. Theory,
v. 32, N 1, 1986, 54-62
[Wil2]
Williams H. C., Effective primality tests
for some integers of the forms
and
, Math. Comput., v. 48, N 177,
1987, 385-404
[Wil3]
Williams H. C., A note on the primality of
and
, Fibonacci Quart., 1988, N 6,
296-305
[Wilk]
Wilkes M. V., Time-sharing
computer systems, New York, Elsevier, 1972
[Will]
Williams H. C., Primality testing on a
computer, Ars Combinatoria, v. 5, 1978,
127-185. (Перевод на русский язык: Кибернетический сборник,
вып. 23, 1986, 51-99)
[WilS]
Williams H. C., Schmidt B., Some remarks
concerning the M.I.T. public-key cryptosystem, BIT,
v. 19, 1979, 525-538
[WM]
Western A. E., Miller J. C. P., Tables of
indices and primitive roots, Royal Soc. Math. Tables,
v. 9, Cambrige Univ. Press, 1968
[WP]
Waidner M., Pfitzmann B., The dining
cryptographers in the disco: unconditional sender and
recipient untraceability with computationally secure
serviceability, Proc. EUROCRYPT'89, Lect. Notes in
Comp. Sci., v. 434, 1990
[WW]
Williams H. C., Wunderlich M. C., On the
parallel generation of the residues for the continued
fraction factoring algorithm, Math. Comput., v.
48, N 177, 1987, 405-423
[Y]
Yacobi Y., Exponentiating faster with additions
chains, Proc. CRYPTO'90, Lect. Notes in Comp. Sci.,
v. 537, 1991, 222-229
[Yac1]
Yacobi Y., A key distribution "paradox",
Proc. CRYPTO'90, Lect. Notes in Comp. Sci., v. 537, 1991, 268-273
[Yao]
Yao A. C., Theory and applications of
trapdoor functions, Proc. 31th Annu. Symp. on Found. of
Comput. Sci., 1982, 80-91
[Yuv]
Yuval G., How to swindle Rabin, Cryptologia,
v. 3, N 3, 1979, 187-189
[ZPS]
Zheng Y., Pieprzyk J., Seberry J., HAVAL --
one-way hashing algorithm with variable length of output,
Proc. AUSCRYPT'92, 1993 (N-hash), NTT Review, v. 2, N 6, Nov. 1990
Вперед: Предметный указатель
Вверх: Криптография в банковском деле
Назад: 15.3 Интерактивные системы доказательства с нулевым разглашением
  Содержание
  Предметный указатель
|