@article{shannon1949communication, author={Shannon, Claude E}, journal={The Bell System Technical Journal}, title={Communication theory of secrecy systems}, year={1949}, volume={28}, number={4}, pages={656-715}, doi={10.1002/j.1538-7305.1949.tb00928.x}, ISSN={0005-8580}, month={10}, abstract={Décrire le blabla ici}, } @book{kahn1996codebreakers , title = {The Codebreakers: the story of secret writing} , author = {Kahn, David} , year = {1996} , publisher = {Scribner Book Company} } @misc{guillotHistoire , title = {Histoire de la cryptologie} , author = {Guillot, Philippe} , year = {2014} , month={9} , note={Cours du Master Mathématiques Fondamentales et Protection de l'Information de l'université Paris 8} , howpublished = "\url{http://ufr6.univ-paris8.fr/Math/sitemaths2/spip/IMG/pdf/CoursHistoireCryptologie.pdf}", } @misc{redhat, title = {A Brief History of Cryptography}, howpublished = {\url{https://access.redhat.com/blogs/766093/posts/1976023}}, note = {Accédé: 4 avril 2018}, month = {8}, year = {2013} } @misc{bsafe, title = {Exclusive: Secret contract tied NSA and security industry pioneer}, howpublished = {\url{https://www.reuters.com/article/us-usa-security-rsa/exclusive-secret-contract-tied-nsa-and-security-industry-pioneer-idUSBRE9BJ1C220131220}}, note = {Accédé: 14 avril 2018}, month = {12}, year = {2013}, author={Menn, Joseph} } @article{newDirections, author={W. Diffie et M. Hellman}, journal={IEEE Transactions on Information Theory}, title={New directions in cryptography}, year={1976}, volume={22}, number={6}, pages={644-654}, keywords={Cryptography;Application software;Communication system security;Computer aided instruction;Computer networks;Costs;Hardware;Information theory;Postal services;Public key cryptography;Telecommunication computing}, doi={10.1109/TIT.1976.1055638}, ISSN={0018-9448}, month={11}, abstract={Article qui introduit pour la première la révolution que sont les les systèmes cryptographiques à clef publique.} } @article{shor1997polynomialtimealgorithmsfor , year = {1997} , title = {Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer} , journal = {SIAM Journal on Computing} , volume = {26} , number = {5} , pages = {1484-1509} , author = {Shor, P. W.} } @ARTICLE{Kerckhoffs1883 , author = {Kerckhoffs, Auguste} , title = {La cryptographie militaire} , journal = {Journal des sciences militaires} , year = {1883} , volume = {9} , pages = {5--38} , number = {1} } @article{rivest1978method , title = {A method for obtaining digital signatures and public-key cryptosystems} , author = {Rivest, Ronald L and Shamir, Adi and Adleman, Len} , journal = {Communications of the ACM} , volume = {21} , number = {2} , pages = {120--126} , year = {1978} , publisher = {ACM} }