Voir la notice de l'article provenant de la source Math-Net.Ru
@article{VSGTU_2014_1_a16, author = {S. M. Ratseev}, title = {On {Construction} of {Perfect} {Ciphers}}, journal = {Journal of Samara State Technical University, Ser. Physical and Mathematical Sciences}, pages = {192--199}, publisher = {mathdoc}, number = {1}, year = {2014}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/VSGTU_2014_1_a16/} }
S. M. Ratseev. On Construction of Perfect Ciphers. Journal of Samara State Technical University, Ser. Physical and Mathematical Sciences, no. 1 (2014), pp. 192-199. http://geodesic.mathdoc.fr/item/VSGTU_2014_1_a16/
[1] A. P. Alferov, A. Yu. Zubov, A. S. Kuz'min, A. V. Cheremushkin, Osnovy kriptografii [Foundations of Cryptography], Helios, Association of Russian Universities, Moscow, 2005, 480 pp. (In Russian)
[2] C. E. Shannon, “Communication Theory of Secrecy Systems”, Bell System Technical Journal, 28:4 (1949), 656–715 ; K. Shennon, “Teoriya svyazi v sekretnykh sistemakh”, Raboty po teorii informatsii i kibernetike, Inostrannaya literatura, M., 1963, 333–369 | DOI | Zbl
[3] S. M. Ratseev, “About perfect imitation resistant ciphers”, Prikl. Diskr. Mat., 2012, no. 3, 41–46 (In Russian)
[4] A. Yu. Zubov, Kriptograficheskie metody zashchity informatsii. Sovershennye shifry [Cryptographic methods of information protection. Perfect codes], Helios, Association of Russian Universities, Moscow, 2005, 192 pp. (In Russian)
[5] S. M. Ratseev, “On optimal authentication code”, Sistemy i Sredstva Inform., 23:1 (2013), 53–57 (In Russian)