Whatsapp Telegram Youtube
Service

Bibliography

    1. Biham E., Biryukov A., Dunkelman O., Richardson E., Shamir A. Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. http://www.cs.technion.ac.il - Technion - 1998.
    2. Blaze M., Diffie W., Rivest R.L., Schneier B., Shimomura T., Thompson E., Wiener M. Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. http://www.schneier.com - January 1996.
    3. Menezes A., van Oorschot P., Vanstone S. Handbook of Applied Cryptography. http://www.cacr.math.uwaterloo.ca .
    4. Panasenko S. Encryption algorithms - finalists of the AES competition. http://www.ixbt.com - 08/24/2006
    5. Panasenko S. Interesting encryption algorithms.
    6. Schneier B. Applied cryptography.
    7. Partyka T.L., Popov I.I.
    8. Krysin A.V.
    9. Tarasyuk M.V.
    10. Lukashov I.V. Cryptography?
    11. Panasenko S.P., Information protection in computer networks // PC World Magazine 2002 No. 2.
    12. Bunin O. Entertaining encryption // PC World Magazine 2003 No. 7.
    13. Panasenko S.P., Rakitin V.V.
    14. Panasenko S.P. To understand the language of cryptographers // PC World Magazine.
    15. Panasenko S.P. To understand the language of cryptographers // PC World Magazine.

family list tree collection families pedigree cryptographer surnames names phone secret animal genealogical app trees ancestry heritage gallery codes apple microsoft google huawei allsoft xiaomi samsung appstores screenshots amazon linux