Next: About this document Up: TeletietotekniikkaS-38.116 Kryptologiset järjestelmät tietoturvassa-teoriaa Previous: Kuka tarvitsee Sapphirea?

Viitteet

Esityksessä on viitteitä seuraaviin kirjoihin, artikkeleihin tai dokumentteihin:

[ABEL85] Abelson, Sussman: Structure and Interpretation of Computer Programs, MIT-Press 1985.

[BERK86] UNIX Programmer's Manual, 4.3 Berkeley Software Distribution, University of California 1986.

[MORA90] François Morain: Thése: Coubres elliptiques et tests de primalité, Devant Université Claude Bernard Lyon 1990.

[NATI80] National Bureau of Standards: Federal Information Processing Standards Publication 81: DES Modes of Operation, December 2, 1980.

[SCHA82] B. P. Schanning: Applying public key distribution to local area networks, Computers &Security, Vol. 1, No. 3, November 1982.

[SEDG83] R. Sedgewick: Algorithms, Addison-Wesley inc. 1983.

[RINN93] T. Rinne, J. Helander, M. Teiste: Sapphire - Secure Data Communications Through Insecure Internet Connection, Library documentation, Cirion oy 1993.

[RIVE78] R. L. Rivest, A. Shamir, and L. Adleman: A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol. 21, No. 2, February 1978.

[ZIMM93] Philip Zimmermann, Pretty Good Privacy, Public key encryption for the masses, PGP 2.3 user's guide, Phil's Pretty Good Software 1993.


tri@cs.hut.fi
Thu Mar 31 14:58:17 EET DST 1994