Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2012_4_a6, author = {N. N. Tokareva}, title = {On the history of cryptography in {Russia}}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {82--107}, publisher = {mathdoc}, number = {4}, year = {2012}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2012_4_a6/} }
N. N. Tokareva. On the history of cryptography in Russia. Prikladnaâ diskretnaâ matematika, no. 4 (2012), pp. 82-107. http://geodesic.mathdoc.fr/item/PDM_2012_4_a6/
[1] Agentura.ru, Rossiiskii internet-resurs, posvyaschennyi problemam spetssluzhb, razvedki i borby s terrorizmom, www.agentura.ru
[2] Agibalov G. P., “50 let kriptografii v Tomskom gosudarstvennom universitete”, Prikladnaya diskretnaya matematika, 2009, no. 2, 104–126
[3] Alferov A. P., Zubov A. Yu., Kuzmin A. S., Cherëmushkin A. V., Osnovy kriptografii, Gelios ARV, M., 2005, 480 pp.
[4] Andreev N. N., Zubkov A. M., Ivchenko G. I. i dr., “Vladimir Yakovlevich Kozlov (k devyanostoletiyu so dnya rozhdeniya)”, Diskretnaya matematika, 16:2 (2004), 3–6 | DOI | MR | Zbl
[5] Babash A. V., Shankin G. P., Istoriya kriptografii, Ch. 1, Gelios ARV, M., 2002, 240 pp.
[6] Babash A. V., Golev Yu. I., Larin D. A., Shankin G. P., “O razvitii kriptografii v XIX veke”, Zaschita informatsii. Konfident, 2003, no. 5, 90–96
[7] Babash A. V., Golev Yu. I., Larin D. A., Shankin G. P., “Kriptograficheskie idei XIX veka”, Zaschita informatsii. Konfident, 2004, no. 1, 88–95
[8] Babash A. V., Golev Yu. I., Larin D. A., Shankin G. P., “Kriptograficheskie idei XIX veka. Russkaya Kriptografiya”, Zaschita informatsii. Konfident, 2004, no. 3, 90–96
[9] Babash A. V., Golev Yu. I., Larin D. A., Shankin G. P., “Shifry revolyutsionnogo podpolya Rossii XIX veka”, Zaschita informatsii. Konfident, 2004, no. 4, 82–87
[10] Babash A. V., Golev Yu. I., Larin D. A., Shankin G. P., “Kriptografiya v XIX veke”, Informatika, 466:33 (2004), 17–23
[11] Babievskii V. V., Butyrskii L. S., Larin D. A., Shankin G. P., Sovetskaya shifrovalnaya sluzhba: 1920–40-e, http://www.agentura.ru
[12] Bukashkin S. A., “V. A. Kotelnikov – osnovopolozhnik sekretnoi telefonii”, Sb. “V. A. Kotelnikov. Sudba, okhvativshaya vek”, v. 1, Vospominaniya kolleg, Fizmatlit, M., 2011, 21–24
[13] Golev Yu. I., Larin D. A., Trishin A. E., Shankin G. P., Kriptografiya: stranitsy istorii tainykh operatsii, Gelios ARV, M., 2008, 288 pp.
[14] Golev Yu. I., Larin D. A., Trishin A. E., Shankin G. P., “Kriptograficheskaya deyatelnost v period napoleonovskikh voin”, Zaschita informatsii. Konfident, 2004, no. 5, 90–95
[15] Golev Yu. I., Larin D. A., Trishin A. E., Shankin G. P., “Nauchno-tekhnicheskii progress i kriptograficheskaya deyatelnost v Rossii XIX veka”, Zaschita informatsii. INSIDE, 2005, no. 2, 67–75
[16] Golev Yu. I., Larin D. A., Trishin A. E., Shankin G. P., “Nachalo voiny v efire”, Zaschita informatsii. INSIDE, 2005, no. 3, 89–96
[17] Golev Yu. I., Larin D. A., Trishin A. E., Shankin G. P., “Kriptograficheskaya deyatelnost vo vremya Grazhdanskoi voiny v Rossii”, Zaschita informatsii. INSIDE, 2005, no. 4, 89–96
[18] Golev Yu. I., Larin D. A., Trishin A. E., Shankin G. P., “Kriptograficheskaya deyatelnost revolyutsionerov v 20–70-kh godakh XIX veka v Rossii: uspekhi i neudachi”, Zaschita informatsii. INSIDE, 2005, no. 5, 90–96
[19] Golev Yu. I., Larin D. A., Shankin G. P., “Kriptograficheskaya deyatelnost organizatsii “Zemlya i volya” i “Narodnaya volya” v Rossii v 1876–1881 godakh”, Zaschita informatsii. INSIDE, 2005, no. 6, 80–87
[20] Golev Yu. I., Larin D. A., Shankin G. P., “Kriptograficheskaya deyatelnost revolyutsionerov v Rossii. 1881–1887 gody: agoniya ‘Narodnoi voli’ ”, Zaschita informatsii. INSIDE, 2006, no. 2, 88–96
[21] Golev Yu. I., Larin D. A., Shankin G. P., “Kriptograficheskaya deyatelnost revolyutsionerov v Rossii v 90-e gody XIX veka”, Zaschita informatsii. INSIDE, 2006, no. 4, 84–91
[22] Gorkii M., “Po soyuzu sovetov. Ocherk V. Solovki”, Sobranie sochinenii v tridtsati tomakh, v. 17, GIKhL, M., 1952, 201–220
[23] Guzi L., Uznik Solovetskikh ostrovov Vladimir Krivosh-Nemanich, Spetsialno dlya “Solovki Entsiklopediya”. Dostupno po adresu: , Kafedra rusistiki, FF PU Preshov, Slovakiya, 15.11.2005 http://www.solovki.ca/camp_20/scientists.php
[24] Gulyaev Yu. V., Kratkaya nauchnaya biografiya akademika V. A. Kotelnikova, www.cplire.ru/alt/Kotelnikov/index.html
[25] Zakrevskii A. D., “Metod avtomaticheskoi shifratsii soobschenii”, Prikladnaya diskretnaya matematika, 2009, no. 2, 127–137
[26] S. Leskov, Intervyu: “Vladimir Kotelnikov: ‘Radio – glavnoe otkrytie XX veka’ ”, http://n-t.ru/tp/in/rd.htm
[27] Intervyu: “N. N. Andreev: Rossiya ostaëtsya v chisle liderov mirovoi kriptografii”, http://www.ssl.stu.neva.ru/psw/crypto/Andreev23.html
[28] Kalachev K. F., V kruge tretem: Vospominaniya i razmyshleniya o rabote Marfinskoi laboratorii v 1948–1951 godakh, Mashmir, M., 2001, 129 pp.
[29] Kan D., Vzlomschiki kodov, Tsentrpoligraf, M., 2000; Kahn D., The codebreakers, 1967
[30] V. A. Kotelnikov, Sudba, okhvativshaya vek, v 2 t., sost. N. V. Kotelnikova, Fizmatlit, M., 2011, 312 pp.
[31] Materialy k zasedaniyu mezhvedomstvennogo mezhdistsiplinarnogo seminara po nauchnym problemam informatsionnoi bezopasnosti, Laboratoriya MGU po matematicheskim problemam kriptografii 1990–2000, M., 2000, 48 pp.
[32] Larin D. A., “Sovetskaya shifrovalnaya sluzhba v gody Velikoi Otechestvennoi voiny”, Izv. UrFU. Ser. 1: Problemy obrazovaniya, nauki i kultury, 86:1 (2011), 69–80 http://proceedings.usu.ru/
[33] Likhachëv D. S., Izbrannoe: Velikoe nasledie. Zametki o russkom, Logos, SPb., 1998, 560 pp.
[34] Maslennikov M. E., Kriptografiya i svoboda
[35] Nechaev V. I., Elementy kriptografii, Osnovy teorii zaschity informatsii, Vysshaya shkola, M., 1999, 109 pp. | MR
[36] Novik V. K., “Khristian Goldbakh i Frants Epinus (iz istorii shifrovalnykh sluzhb Rossii XVIII veka)”, Matematika i bezopasnost informatsionnykh tekhnologii, Materialy konf. (MGU 23–24 oktyabrya 2003 g.), MTsNMO, M., 2004, 87–110
[37] Pervushin A. I., Okkultnyi Stalin, Yauza, M., 2006
[38] B. A. Pogorelov (red.), Pyatdesyat let Institutu kriptografii, svyazi i informatiki, Istoricheskii ocherk, M., 1999, 272 pp.
[39] Rudnev E. V., “O nashei yunosti i sverstnike moëm”, V. A. Kotelnikov. Sudba, okhvativshaya vek, cb. v 2 t., v. 1, Vospominaniya kolleg, Fizmatlit, M., 2011, 19–20
[40] Sait blagotvoritelnogo fonda im. I. Ya. Verchenko, www.verchenko.ru
[41] Sachkov V. N., “Vklad vypusknikov MGU v razvitie teoreticheskoi kriptografii v Rossii vo vtoroi polovine XX veka”, Moskovskii universitet i razvitie kriptografii v Rossii, Materialy konf. (MGU 17–18 oktyabrya 2002 g.), MTsNMO, M., 2003, 250–257 | MR
[42] Singkh S., Kniga shifrov. Tainaya istoriya shifrov i ikh rasshifrovki, AST Astrel, M., 2006, 447 pp.
[43] Soboleva T. A., Istoriya shifrovalnogo dela v Rossii, OLMA-PRESS, M., 2002, 512 pp.
[44] Soldatov A., Borogan I., Novoe dvoryanstvo: Ocherki istorii FSB, OOO “Yunaited Press”, M., 2011, 298 pp.
[45] Solovki-entsiklopediya. Digest project, www.solovki.ca
[46] J. Malinowska (Rezh.), ENIGMA, Poznan mathematicians success, Poznanskii universitet, Polsha, Film, 2008
[47] Fomichëv V. M., “Iz istorii razvitiya shifrov”, Razdel v ucheb. posobii, Matematicheskie osnovy sovremennoi kriptologii, Finansovyi universitet pri Pravitelstve RF, M., 2013 (to appear)
[48] Bury J., “Operation Stonka. An Ultimate Deception Spy Game”, Cryptologia, 35:4 (2011), 297–327 | DOI
[49] Hammant T. R., “Russian and Soviet cryptology I – Some communications intelligence in tsarist Russia”, Cryptologia, 24:3 (2000), 235–249 | DOI
[50] Hammant T. R., “Russian and Soviet cryptology II – The Magdeburg incident: the Russian view”, Cryptologia, 24:4 (2000), 333–338 | DOI
[51] Hammant T. R., “Russian and Soviet cryptology III – Soviet Comint and the Civil War, 1918–1921”, Cryptologia, 25:1 (2001), 50–60 | DOI
[52] Kahn D., “Soviet Comint in the Cold War”, Cryptologia, 22:1 (1998), 1–24 | DOI
[53] Kapera Z. J., “Summary Report of the State of the Soviet Military Sigint in November 1942 Noticing ‘ENIGMA’ ”, Cryptologia, 35:3 (2011), 247–256 | DOI
[54] Schimmelpenninck van der Oye D., “Tsarist Codebreaking some Background and some examples”, Cryptologia, 22:4 (1998), 342–353 | DOI