References to the section Algorithms used in asymmetric cryptosystems

From CryptoWiki
Jump to: navigation, search

G04

Goldreich Oded. Foundations of Cryptography: Basic Tools. Cambridge University Press, 2004. P. 372. URL: http://www.twirpx.com/file/493751/

GB08

Goldwasser S., Bellare M. Lecture Notes on Cryptography. MIT Computer Science and Artificial Intelligence Laboratory; Department of Computer Science and Engineering, University of California San Diego, 2008. P. 290. URL: http://www.twirpx.com/file/880527/

KL07

Katz J., Lindell Y. Introduction to Modern Cryptography: Principles and Protocols. Chapman and Hall/CRC, 2007. 1 edition, p. 552. URL: http://www.twirpx.com/file/433857/

M03

Mao W. Modern Cryptography: Theory and Practice (2003). Prentice Hall PTR, 2003. P. 707. URL: http://bookfi.org/book/566158

MOV01

Menezes A.J., van Oorschot P.C., Vanstone S.A. Handbook of Applied Cryptography. CBC Press, 2001. P. 816. URL: http://cacr.uwaterloo.ca/hac/

S05

Stinson D.R. Cryptography: Theory and Practice. Chapman & Hall/CRC, 2005. P. 616. URL: http://www.twirpx.com/file/356397/

F10

Fomichev V.M. Metodi discretnoi matematici v criptologii. Moscow: Dialog-MIFI, 2010. P. 424. (in Russian)


To main page of the section