Program - Encryptor (Windows, Linux)
Bibliography
|
-
Biham E., Biryukov A., Dunkelman O., Richardson E., Shamir A. Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR.
http://www.cs.technion.ac.il
- Technion - 1998.
-
Blaze M., Diffie W., Rivest R.L., Schneier B., Shimomura T., Thompson E., Wiener M. Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security.
http://www.schneier.com
- January 1996.
-
Menezes A., van Oorschot P., Vanstone S. Handbook of Applied Cryptography.
http://www.cacr.math.uwaterloo.ca
.
-
Panasenko S. Encryption algorithms - finalists of the AES competition.
http://www.ixbt.com
- 08/24/2006
-
Panasenko S. Interesting encryption algorithms.
-
Schneier B. Applied cryptography.
-
Partyka T.L., Popov I.I.
-
Krysin A.V.
-
Tarasyuk M.V.
-
Lukashov I.V. Cryptography?
-
Panasenko S.P., Information protection in computer networks // PC World Magazine 2002 No. 2.
-
Bunin O. Entertaining encryption // PC World Magazine 2003 No. 7.
-
Panasenko S.P., Rakitin V.V.
-
Panasenko S.P. To understand the language of cryptographers // PC World Magazine.
-
Panasenko S.P. To understand the language of cryptographers // PC World Magazine.