[ Pobierz całość w formacie PDF ]
.416 - 418 [16] C.Kościelny, Spurious Galois Fields^ Applied Mathematics and Computer Science, vol.5.nol, 1995, Zielona Góra, pp.169 - 188 [17] C.Kościelny, A Method of Constructtrtg (,)uasigroup-Based StrefWi-Cfphers, Apptied Mathematicsand Computer Science, vol.6.no l, 1996, Zielona Góra, pp.109 - 121 [18] C.Kościelny, NLPN Sequences over GF(q), Ouasigroups and Retated Systems, Institute ofMathematics, Academy of Sciences Moldova, no 4, 1997, pp.89 - 102[19] C.Kościelny, G.L.Mullen, AQuasigroup-BasedPubltc-K.ey Cyptosystem, Intemational Journal of Applied Mathematics and Computer Science, vol.9, no 4, 1999, pp.955 - 963, Zielona Góra [20] W.Madsen, Crypto AG: the NSA's Trojan Whore', Covert Action Ouartely,http://wwwJnediafilter.org/caq/cryptogate/ [21] A.J.Menezes,P.C.van Oorschot, S.A.Yanstone, Handbook of Applud Crypiography, CRCPress 1997[22] NSA http://www.nsa.gov-*-, Yyerb-^http^/www.fas.org/irp/nsa/ [23] NSA http://www.fas.org/irp/nsa/[24] PGP http://www.pgpi.org/[25] Terry Rittet, http://www.io.com/'-ritter/[26] B.Schneier, Applied Cryptoyaphy - Protocols, Ałgmthms, andSource Code zn C, Second Edition,John Wiley & Sons, 1996 [27] J.Shearer, P.Gutmann, Goyemment, Crypfography, andthe R/gA/ To Prwacy, Joucnal of Uni-versal Computer Science, Vol.2, No.3, March 1996, p.113 [28] D.L.Tiggre:, Echelon - Ri^its Violation in the Infonnation Agę,b^T^L.,.LW\i^,^ohunie;,CQt-ii/Y3.^.^,.(^heloi!.J.il"il [29] B.Wallace, D.Rzeźmcki, Wielki Bratpafr-y, PC Worid Komputer nr 6, 2000, str.28 [30] N.Hager, Esposing the Global Surveillance Systern, Covect Action Quartely,ht1p:_:_lca^,aw)/.(^(^/<:\i^^C}Iob,dS[loopJ]^rr•l.l [ Pobierz całość w formacie PDF ]

  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • lunamigotliwa.htw.pl
  •