Author:
Deundyak V. M.,Taran A. A.
Subject
Signal Processing,Control and Systems Engineering,Software
Reference16 articles.
1. Schneier, B., Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc., 1993.
2. Diffie, W. and Hellman, M., New directions in cryptography, IEEE Trans. Inf. Theory, 1976, vol. 22, no. 6, pp. 644–654.
3. Needham, R.M. and Schroeder, M.D., Using encryption for authentication in large networks of computers, Commun. ACM, 1978, vol. 21, no. 12, pp. 993–999.
4. Matsumoto, T. and Imai, I., On the key predistribution system: A practical solution to the key distribution problem, CRYPTO’87 A Conference on the Theory and Applications of Cryptographic Techniques, 1987, pp. 185–193.
5. Blom, R., An optimal class of symmetric key generation systems, Workshop on the Theory and Applications of Cryptographic Techniques, 1985, pp. 335–338.