@article{VSGTU_2014_134_1_a16,
author = {S. M. Ratseev},
title = {On {Construction} of {Perfect} {Ciphers}},
journal = {Journal of Samara State Technical University, Ser. Physical and Mathematical Sciences},
pages = {192--199},
year = {2014},
volume = {134},
number = {1},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/VSGTU_2014_134_1_a16/}
}
TY - JOUR AU - S. M. Ratseev TI - On Construction of Perfect Ciphers JO - Journal of Samara State Technical University, Ser. Physical and Mathematical Sciences PY - 2014 SP - 192 EP - 199 VL - 134 IS - 1 UR - http://geodesic.mathdoc.fr/item/VSGTU_2014_134_1_a16/ LA - ru ID - VSGTU_2014_134_1_a16 ER -
S. M. Ratseev. On Construction of Perfect Ciphers. Journal of Samara State Technical University, Ser. Physical and Mathematical Sciences, Tome 134 (2014) no. 1, pp. 192-199. http://geodesic.mathdoc.fr/item/VSGTU_2014_134_1_a16/
[1] A. P. Alferov, A. Yu. Zubov, A. S. Kuz'min, A. V. Cheremushkin, Osnovy kriptografii [Foundations of Cryptography], Helios, Association of Russian Universities, Moscow, 2005, 480 pp. (In Russian)
[2] C. E. Shannon, “Communication Theory of Secrecy Systems”, Bell System Technical Journal, 28:4 (1949), 656–715 ; K. Shennon, “Teoriya svyazi v sekretnykh sistemakh”, Raboty po teorii informatsii i kibernetike, Inostrannaya literatura, M., 1963, 333–369 | DOI | Zbl
[3] S. M. Ratseev, “About perfect imitation resistant ciphers”, Prikl. Diskr. Mat., 2012, no. 3, 41–46 (In Russian)
[4] A. Yu. Zubov, Kriptograficheskie metody zashchity informatsii. Sovershennye shifry [Cryptographic methods of information protection. Perfect codes], Helios, Association of Russian Universities, Moscow, 2005, 192 pp. (In Russian)
[5] S. M. Ratseev, “On optimal authentication code”, Sistemy i Sredstva Inform., 23:1 (2013), 53–57 (In Russian)