biblio.bib 2.02 KB
Newer Older
Florent Chehab's avatar
update  
Florent Chehab committed
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
@article{shannon1949communication,
    author={Shannon, Claude E},
    journal={The Bell System Technical Journal},
    title={Communication theory of secrecy systems},
    year={1949},
    volume={28},
    number={4},
    pages={656-715},
    doi={10.1002/j.1538-7305.1949.tb00928.x},
    ISSN={0005-8580},
    month={Oct},
    abstract={Décrire le blabla ici},
}

@book{kahn1996codebreakers
,	title	= {The Codebreakers: the story of secret writing}
,	author	= {Kahn, David}
,	year	= {1996}
,	publisher	= {Scribner Book Company}
}

@misc{guillotHistoire
,	title	= {Histoire de la cryptologie}
,	author	= {Guillot, Philippe}
,	year	= {2014}
,    month={Sep}
, note={Cours du Master Mathématiques Fondamentales et Protection de l'Information de l'université Paris 8}
,   howpublished = "\url{http://ufr6.univ-paris8.fr/Math/sitemaths2/spip/IMG/pdf/CoursHistoireCryptologie.pdf}",
}


@misc{redhat,
  title = {A Brief History of Cryptography},
  howpublished = {\url{https://access.redhat.com/blogs/766093/posts/1976023}},
  note = {Accédé: 4 avril 2018},
  year = {2013}
}

@article{newDirections,
author={W. Diffie et M. Hellman},
journal={IEEE Transactions on Information Theory},
title={New directions in cryptography},
year={1976},
volume={22},
number={6},
pages={644-654},
keywords={Cryptography;Application software;Communication system security;Computer aided instruction;Computer networks;Costs;Hardware;Information theory;Postal services;Public key cryptography;Telecommunication computing},
doi={10.1109/TIT.1976.1055638},
ISSN={0018-9448},
month={Nov},}


@article{shor1997polynomialtimealgorithmsfor
,	year	= {1997}
,	title	= {Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer}
,	journal	= {SIAM Journal on Computing}
,	volume	= {26}
,	number	= {5}
,	pages	= {1484-1509}
,	author	= {Shor, P. W.}
}

@ARTICLE{Kerckhoffs1883
,	author	= {Kerckhoffs, Auguste}
,	title	= {La cryptographie militaire}
,	journal	= {Journal des sciences militaires}
,	year	= {1883}
,	volume	= {9}
,	pages	= {5--38}
,	number	= {1}
}