biblio.bib 4.24 KB
Newer Older
Florent Chehab's avatar
update  
Florent Chehab committed
1
2
3
4
5
6
7
8
9
10
@article{shannon1949communication,
    author={Shannon, Claude E},
    journal={The Bell System Technical Journal},
    title={Communication theory of secrecy systems},
    year={1949},
    volume={28},
    number={4},
    pages={656-715},
    doi={10.1002/j.1538-7305.1949.tb00928.x},
    ISSN={0005-8580},
Florent Chehab's avatar
Florent Chehab committed
11
    month={10},
Florent Chehab's avatar
up  
Florent Chehab committed
12
    abstract={Article qui introduit la Théorie de l'Information appliquée au monde de la cryptographie.},
Florent Chehab's avatar
update  
Florent Chehab committed
13
14
15
16
17
18
19
}

@book{kahn1996codebreakers
,	title	= {The Codebreakers: the story of secret writing}
,	author	= {Kahn, David}
,	year	= {1996}
,	publisher	= {Scribner Book Company}
Florent Chehab's avatar
up  
Florent Chehab committed
20
, abstract = {David Kahn est un historien américain qui s'est beaucoup interessé à la cryptologie. Ce livre conséquent est l'une des références dans le domaine et sa lecture est très instructive.}
Florent Chehab's avatar
update  
Florent Chehab committed
21
22
23
24
25
26
}

@misc{guillotHistoire
,	title	= {Histoire de la cryptologie}
,	author	= {Guillot, Philippe}
,	year	= {2014}
Florent Chehab's avatar
Florent Chehab committed
27
,    month={9}
Florent Chehab's avatar
update  
Florent Chehab committed
28
, note={Cours du Master Mathématiques Fondamentales et Protection de l'Information de l'université Paris 8}
Florent Chehab's avatar
up  
Florent Chehab committed
29
,   howpublished = "\url{http://ufr6.univ-paris8.fr/Math/sitemaths2/spip/IMG/pdf/CoursHistoireCryptologie.pdf}"
Florent Chehab's avatar
up  
Florent Chehab committed
30
, abstract={Cours sur l'histoire de la cryptographie en Français. Ce document propose un regard similaire à celui de David Kahn, tout en étant complémentaire sur les développements les plus récents dans le monde de la cryptographie.}
Florent Chehab's avatar
update  
Florent Chehab committed
31
32
33
34
35
}


@misc{redhat,
  title = {A Brief History of Cryptography},
Florent Chehab's avatar
up  
Florent Chehab committed
36
  howpublished = "\url{https://access.redhat.com/blogs/766093/posts/1976023}",
Florent Chehab's avatar
update  
Florent Chehab committed
37
  note = {Accédé: 4 avril 2018},
Florent Chehab's avatar
Florent Chehab committed
38
  month = {8},
Florent Chehab's avatar
up  
Florent Chehab committed
39
40
  year = {2013},
  abstract={L'histoire de la cryptographie résummée en quelques pages. Une introduction brève mais qui reste intéressante.}
Florent Chehab's avatar
update  
Florent Chehab committed
41
42
}

Florent Chehab's avatar
up  
Florent Chehab committed
43
44
45
46


@misc{bsafe,
  title = {Exclusive: Secret contract tied NSA and security industry pioneer},
Florent Chehab's avatar
up  
Florent Chehab committed
47
  howpublished = "\url{https://www.reuters.com/article/us-usa-security-rsa/exclusive-secret-contract-tied-nsa-and-security-industry-pioneer-idUSBRE9BJ1C220131220}",
Florent Chehab's avatar
up  
Florent Chehab committed
48
49
50
  note = {Accédé: 14 avril 2018},
  month = {12},
  year = {2013},
Florent Chehab's avatar
up  
Florent Chehab committed
51
52
  author={Menn, Joseph},
  abstract={Publication concernant l'inclusion d'une porte dérobée par la NSA dans un procédé cryptographique standardisée.}
Florent Chehab's avatar
up  
Florent Chehab committed
53
54
55
}


Florent Chehab's avatar
up  
Florent Chehab committed
56
57
58

@misc{nistPostQuantum,
  title = {Post-Quantum Cryptography Standardization},
Florent Chehab's avatar
up  
Florent Chehab committed
59
  howpublished = "\url{https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization}",
Florent Chehab's avatar
up  
Florent Chehab committed
60
61
  note = {Accédé: 15 avril 2018},
  year = {2017},
Florent Chehab's avatar
up  
Florent Chehab committed
62
63
  author={NIST},
  abstract={Site internet du NIST annonçant la recherche de candidats pour un standard de cryptographie post-quantique.}
Florent Chehab's avatar
up  
Florent Chehab committed
64
65
66
67
}



Florent Chehab's avatar
update  
Florent Chehab committed
68
69
70
71
72
73
74
75
76
77
78
@article{newDirections,
author={W. Diffie et M. Hellman},
journal={IEEE Transactions on Information Theory},
title={New directions in cryptography},
year={1976},
volume={22},
number={6},
pages={644-654},
keywords={Cryptography;Application software;Communication system security;Computer aided instruction;Computer networks;Costs;Hardware;Information theory;Postal services;Public key cryptography;Telecommunication computing},
doi={10.1109/TIT.1976.1055638},
ISSN={0018-9448},
Florent Chehab's avatar
up  
Florent Chehab committed
79
month={11},
Florent Chehab's avatar
up  
Florent Chehab committed
80
abstract={Article qui introduit les systèmes cryptographiques à clé publique. Une révolution dans le monde de la cryptologie.}
Florent Chehab's avatar
up  
Florent Chehab committed
81
}
Florent Chehab's avatar
update  
Florent Chehab committed
82
83
84
85
86
87
88
89
90

@article{shor1997polynomialtimealgorithmsfor
,	year	= {1997}
,	title	= {Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer}
,	journal	= {SIAM Journal on Computing}
,	volume	= {26}
,	number	= {5}
,	pages	= {1484-1509}
,	author	= {Shor, P. W.}
Florent Chehab's avatar
up  
Florent Chehab committed
91
, abstract = {Article présentant un algorithme quantique de complexité linéaire pour la factorisation de nombre entiers ou la recherche du logarithme discret.}
Florent Chehab's avatar
update  
Florent Chehab committed
92
93
94
95
96
97
98
99
100
101
}

@ARTICLE{Kerckhoffs1883
,	author	= {Kerckhoffs, Auguste}
,	title	= {La cryptographie militaire}
,	journal	= {Journal des sciences militaires}
,	year	= {1883}
,	volume	= {9}
,	pages	= {5--38}
,	number	= {1}
Florent Chehab's avatar
up  
Florent Chehab committed
102
, abstract = {Publication incluse pour sa définition de chiffre idéal.}
Florent Chehab's avatar
up  
Florent Chehab committed
103
104
105
106
107
108
109
110
111
112
113
}

@article{rivest1978method
,	title	= {A method for obtaining digital signatures and public-key cryptosystems}
,	author	= {Rivest, Ronald L and Shamir, Adi and Adleman, Len}
,	journal	= {Communications of the ACM}
,	volume	= {21}
,	number	= {2}
,	pages	= {120--126}
,	year	= {1978}
,	publisher	= {ACM}
Florent Chehab's avatar
up  
Florent Chehab committed
114
, abstract = {Article introduisant le cryptosystème RSA.}
Florent Chehab's avatar
update  
Florent Chehab committed
115
}