資訊安全導論課程參考論文下載

論文
1. A. Lenstra, and E. Verheul, "Selecting Cryptographic Key Sizes," 1999, [PDF]
2. M. Blaze, W. Diffie, R. Rivest, B. Schneier, T. Shimomura, E. Thompson, M. Wiener, "Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security," A Report by an Ad Hoc Group of Cryptographers and Computer Scientists, January 1996, [PDF]
3. E. Biham and A. Shamir, "Differential Cryptoanalysis of DES-like Cryptosystems," Crypto 90, [PDF]
4. M. Matsui, "Linear Cryptoanalysis Method for DES cipher," Eurocrypt 93, [PDF]
5. P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Crypto 96, [PDF]
6. [PDF]
7. [PDF]
8. [PDF]
9. [PDF]
10. [PDF]
11. [PDF]
12. [PDF]
13. [PDF]
14. [PDF]
15. [PDF]
16. [PDF]
17. [PDF]
18. [PDF]
19. [PDF]
20. [PDF]
21. [PDF]
22. [PDF]
23. [PDF]
24. [PDF]
25. [PDF]
26. [PDF]
27. [PDF]
28. [PDF]
29. [PDF]
30. [PDF]
31. [PDF]
32. [PDF]
33. [PDF]
34. [PDF]
35. [PDF]
36. [PDF]
37. [PDF]
38. [PDF]
39. [PDF]
40. [PDF]
41. [PDF]
42. [PDF]
43. [PDF]
44. [PDF]
45. [PDF]
46. [PDF]
47. [PDF]
48. [PDF]
49. [PDF]
50. [PDF]

資訊安全導論課程 首頁

製作日期: 09/16/2002 by 丁培毅 (Pei-yih Ting)
E-mail: pyting@cs.ntou.edu.tw TEL: 02 24622192x6615
海洋大學 理工學院 資訊科學系 Lagoon