biblio.bib 4.27 KB
Newer Older
Florent Chehab's avatar
update  
Florent Chehab committed
1
@article{shannon1949communication,
Florent Chehab's avatar
Florent Chehab committed
2
3
4
5
6
7
8
9
10
11
12
  author={Shannon, Claude E},
  journal={The Bell System Technical Journal},
  title={Communication theory of secrecy systems},
  year={1949},
  volume={28},
  number={4},
  pages={656-715},
  doi={10.1002/j.1538-7305.1949.tb00928.x},
  ISSN={0005-8580},
  month={10},
  abstract={Article qui introduit la Théorie de l'Information appliquée au monde de la cryptographie.}
Florent Chehab's avatar
update  
Florent Chehab committed
13
14
}

Florent Chehab's avatar
Florent Chehab committed
15
16
17
18
19
20
21
@book{kahn1996codebreakers,
  title="The Codebreakers",
  subtitle="the story of secret writing",
  author={Kahn, David},
  year={1996},
  publisher={Scribner Book Company},
  abstract={David Kahn est un historien américain qui s'est beaucoup interessé à la cryptologie. Ce livre conséquent est l'une des références dans le domaine et sa lecture est très instructive.}
Florent Chehab's avatar
update  
Florent Chehab committed
22
23
}

Florent Chehab's avatar
Florent Chehab committed
24
25
26
27
28
29
30
31
32

@misc{guillotHistoire,
	title	= {Histoire de la cryptologie},
	author	= {Guillot, Philippe},
	year	= {2014},
  month={9},
  note={Cours du Master Mathématiques Fondamentales et Protection de l'Information de l'université Paris 8},
  howpublished = {\url{http://ufr6.univ-paris8.fr/Math/sitemaths2/spip/IMG/pdf/CoursHistoireCryptologie.pdf}},
  abstract={Cours sur l'histoire de la cryptographie en Français. Ce document propose un regard similaire à celui de David Kahn, tout en étant complémentaire sur les développements les plus récents dans le monde de la cryptographie.}
Florent Chehab's avatar
update  
Florent Chehab committed
33
34
35
36
37
}


@misc{redhat,
  title = {A Brief History of Cryptography},
Florent Chehab's avatar
Florent Chehab committed
38
39
  howpublished = {\url{https://access.redhat.com/blogs/766093/posts/1976023}},
  author = {Redhat},
Florent Chehab's avatar
update  
Florent Chehab committed
40
  note = {Accédé: 4 avril 2018},
Florent Chehab's avatar
Florent Chehab committed
41
  month = {8},
Florent Chehab's avatar
up  
Florent Chehab committed
42
  year = {2013},
Florent Chehab's avatar
Florent Chehab committed
43
  abstract={L'histoire de la cryptographie résumée en quelques pages. Une introduction brève mais qui reste intéressante.}
Florent Chehab's avatar
update  
Florent Chehab committed
44
45
}

Florent Chehab's avatar
up  
Florent Chehab committed
46
47
48


@misc{bsafe,
Florent Chehab's avatar
Florent Chehab committed
49
50
51
52
53
54
  title={Exclusive},
  subtitle={Secret contract tied NSA and security industry pioneer},
  howpublished={\url{https://www.reuters.com/article/us-usa-security-rsa/exclusive-secret-contract-tied-nsa-and-security-industry-pioneer-idUSBRE9BJ1C220131220}},
  note={Accédé: 14 avril 2018},
  month={12},
  year={2013},
Florent Chehab's avatar
up  
Florent Chehab committed
55
  author={Menn, Joseph},
Florent Chehab's avatar
Florent Chehab committed
56
  abstract={Publication concernant l'inclusion d'une porte dérobée par la NSA dans un procédé cryptographique standardisé.}
Florent Chehab's avatar
up  
Florent Chehab committed
57
58
59
}


Florent Chehab's avatar
up  
Florent Chehab committed
60
61
@misc{nistPostQuantum,
  title = {Post-Quantum Cryptography Standardization},
Florent Chehab's avatar
Florent Chehab committed
62
  howpublished = {\url{https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization}},
Florent Chehab's avatar
up  
Florent Chehab committed
63
64
  note = {Accédé: 15 avril 2018},
  year = {2017},
Florent Chehab's avatar
up  
Florent Chehab committed
65
66
  author={NIST},
  abstract={Site internet du NIST annonçant la recherche de candidats pour un standard de cryptographie post-quantique.}
Florent Chehab's avatar
up  
Florent Chehab committed
67
68
69
}


Florent Chehab's avatar
update  
Florent Chehab committed
70
@article{newDirections,
Florent Chehab's avatar
Florent Chehab committed
71
72
73
74
75
76
77
78
79
80
81
82
  author={W. Diffie et M. Hellman},
  journal={IEEE Transactions on Information Theory},
  title={New directions in cryptography},
  year={1976},
  volume={22},
  number={6},
  pages={644-654},
  keywords={Cryptography;Application software;Communication system security;Computer aided instruction;Computer networks;Costs;Hardware;Information theory;Postal services;Public key cryptography;Telecommunication computing},
  doi={10.1109/TIT.1976.1055638},
  ISSN={0018-9448},
  month={11},
  abstract={Article qui introduit les systèmes cryptographiques à clé publique. Une révolution dans le monde de la cryptologie.}
Florent Chehab's avatar
up  
Florent Chehab committed
83
}
Florent Chehab's avatar
update  
Florent Chehab committed
84

Florent Chehab's avatar
Florent Chehab committed
85
86
87
88
89
90
91
92
93
@article{shor1997polynomialtimealgorithmsfor,
	year	= {1997},
	title	= {Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer},
	journal	= {SIAM Journal on Computing},
	volume	= {26},
	number	= {5},
	pages	= {1484-1509},
	author	= {Shor, P. W.},
  abstract = {Article présentant un algorithme quantique de complexité linéaire pour la factorisation de nombres entiers ou la recherche du logarithme discret.}
Florent Chehab's avatar
update  
Florent Chehab committed
94
95
}

Florent Chehab's avatar
Florent Chehab committed
96
97
98
99
100
101
102
103
104
@ARTICLE{Kerckhoffs1883,
	author	= {Kerckhoffs, Auguste},
	title	= {La cryptographie militaire},
	journal	= {Journal des sciences militaires},
	year	= {1883},
	volume	= {9},
	pages	= {5--38},
	number	= {1},
  abstract = {Publication incluse pour sa définition de chiffre idéal.}
Florent Chehab's avatar
up  
Florent Chehab committed
105
106
}

Florent Chehab's avatar
Florent Chehab committed
107
108
109
110
111
112
113
114
115
116
@article{rivest1978method,
	title	= {A method for obtaining digital signatures and public-key cryptosystems},
	author	= {Rivest, Ronald L and Shamir, Adi and Adleman, Len},
	journal	= {Communications of the ACM},
	volume	= {21},
	number	= {2},
	pages	= {120--126},
	year	= {1978},
	publisher	= {ACM},
  abstract = {Article introduisant le cryptosystème RSA.}
Florent Chehab's avatar
update  
Florent Chehab committed
117
}