Central asian journal of mathematical theory and computer sciences vol: 03 Issue: 12


Download 0.92 Mb.
Pdf ko'rish
bet10/10
Sana08.01.2023
Hajmi0.92 Mb.
#1083812
1   2   3   4   5   6   7   8   9   10
Bog'liq
310-Article Text-653-1-10-20221219

 
References 
1. Schneier B. Applied cryptography. Protocols, algorithms, source texts in C language. - M., Ed. 
TRIUMPH, 2003. - 816 p. 
2. Kharin Yu.S., Bernik V.I., Matveev G.V., Agievich S.V. Mathematical and computer bases of 
cryptology: Textbook. - Minsk, LLC "New Knowledge", 2003. - 382 p. 
3. Asoskov A.V., Ivanov M.A. Stream ciphers, M: Kudits-Obraz, 2003. - 336 p. 
4. Akbarov D.Ye. Cryptographic methods of information security and their application. - Tashkent, "Mark 
of Uzbekistan" publishing house, 2009. - 432 p. 
5. http://www.cryptography.ru 
6. Musayev A.I. Research the basics of existing stream encryption algorithms and create new crypto-
resistant algorithms. Master's dissertation in the field of information security. Tashkent, 2008. - 81 p. 
7. Suwais K., Samsudin A. New Classification of Existing Stream Ciphers. Universiti Sains 
Malaysia(USM), Malaysia 2010. 

Download 0.92 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   10




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling