Список использованных источников
-
Biham E., Kocher P. "A Known Plaintext Attack on the PKZIP Stream Cipher". Fast Software Encryption 2, Proceedings of the Leuven Workshop, LNCS 1008, December 1994.
-
Cerven P. Crackproof Your Software — The Best Ways to Protect Your Software Against Crackers — San Francisco: NO STARCH PRESS, 2002 —272 pages.
-
Ferguson N., Schneier B. Practical Cryptography — John Wiley & Sons, 2003 - 432 pages.
-
Menezes A. J., van Oorschot P. C, Vanstone S. A. Handbook of Applied Cryptography — CRC Press, 1996 — 816 pages.
-
Вернет С, Пэйн С. Криптография. Официальное руководство RSA Security. — М.: Бином-Пресс, 2002 — 384 с.
-
Зегжда Д. П., Ивашко А. М. Основы безопасности информационных систем. — М.: Горячая линия — Телеком, 2000 — 452 с.
-
Иванов М. А. Криптографические методы защиты информации в компьютерных системах и сетях. — М.: КУДИЦ-ОБРАЗ, 2001 — 368 с.
-
Нечаев В. И. Элементы криптографии (Основы теории защиты информации): Учеб. пособие для ун-тов и педвузов / Под ред. В. А. Садовничего — М.: Высш. шк., 1999 — 109 с.
-
Чмора А. Л. Современная прикладная криптография. 2-е изд., стер. — М: Гелиос АРВ, 2002 — 256 с.
-
Шнайер Б. Прикладная криптография. Протоколы, алгоритмы, исходные тексты на языке Си. — М.: Издательство ТРИУМФ, 2002 — 816 с.
-
http://aspack.corn/asprotect.html — ASPACK SOFTWARE— Best Choice Compression and Protection Tools for Software Developers.
-
http://cryptome.org/ms-drm-os.htm — CRYPTOME. Microsoft Digital Rights Management Operating System — US Patent No. 6,330,670.
-
http://news.bbc.co.Uk/2/hi/technology/3202116.htm — ВВС News. Questions cloud cyber crime cases.
-
http://pilorama.cora.ru/library/rflirt.html — Ilfak Guilfanov. FLIRT — Fast Library Identification and Recognition Technology.
-
http://research.microsoft.com/sn/detours — Microsoft Research. Detours.
-
http://resistor.topgamers.net — khaciez. Resistor Challenge.
-
http://retro.icequake.net/dob — Ryan Underwood. The Central Point Option Board.
-
http://securityhorizon.com/whitepapers/archives/lanman.html — Brian. NT / LANMAN Password Security Discussion.
-
http://triade.studentenweb.org/GInt/gint.html — Triade systems — GInt Page.
-
http://uozp.akcentplus.ru/16.htm — Общества защиты прав потребителей г. Уфы. Статья 16. Недействительность условий договора, ущемляющих права потребителя.
-
http://www.ahead.de/en/ — Ahead Software. Nero.
-
http://www.anticracking.sk/elicz/export.htm — EliCZ's Export (ApiHooks 5.6).
-
http://www.arjsoftware.com — ARJ Software, Inc.
-
http://www.atstake.com/research/advisories/1999/95replay.txt — weld@10pht.com. Win95/98 File Sharing Impersonation.
-
http://www.average.org/freecrypto — Использование "сильной" криптографии в России.
-
http://www.cacr.math.uwaterloo.ca/hac — Centre for Applied Cryptographic Research. Handbook of Applied Cryptography.
-
http://www.caesum.com/game/index.php — Cronos. Electrica the Puzzle Challenge.
-
http://www.casi.org.uk/discuss/2003/msg00457.html — Glen Rangwala. [casi] Intelligence? the British dossier on Iraq's security infrastructure.
-
http://www.computer.org/security/garfinkel.pdf — Simson L. Garfinkel, Abhi Shelat. Remembrance of Data Passed: A Study of Disk Sanitization Practices.
-
http://www.computerbytesman.com/privacy/blair.htm — Richard M. Smith. Microsoft Word bytes Tony Blair in the butt.
-
http://www.convertlit.com — Dan A. Jackson. Convert LIT.
-
http://www.cryptonessie.org — New European Schemes for Signature, Integrity, and Encryption.
-
http://www.cs.berkeley.edu/~daw/rny-posts/netscape-cracked-0 — lan Goldberg, David Wagner. Netscape SSL implementation cracked!
-
http://www.cyberlaw.com/rsa.html — Patrick J. Flinn and James M. Jordan III. CyberLaw Presents: The RSA Algorithm & The RSA Patent.
-
http://www.din.de/ni/sc27 - I SO/1 EC JTC 1/SC 27 - IT SECURITY TECHNIQUES.
-
http://www.distributed.net/pressroom/news-20020926.txt — David McNett. distributed.net completes rc5-64 project.
-
http://www.ebookpro.com — Internet Marketing Center. eBook Pro — Your Internet Publishing Solution.
-
http://www.ebxwg.org — EBX Workgroup (Open eBook Forum).
-
http://www.eetimes.com/story/90193 - ЕЕ Times. WinZip Hits 100 Million Download Mark on CNET Download.com.
-
http://www.elby.ch/en/products/clone_cd/ — Elaborate Bytes CloneCD.
-
http://www.heise.de/tp/engIish/inhalt/te/2898/l.html — Duncan Campbell. Export version of Lotus Notes provides trapdoor for NSA.
-
http://www.heise.de/tp/engIish/inhalt/te/5263/l.html — Duncan Campbell. How NSA access was built into Windows.
-
http://www.honeynet.org/scans/scan24/sol/pedram/reference/mike_zipattacks.htm — Michael Stay. ZIP Attacks with Reduced Known-Plaintext.
-
http://www.intertrust.com/main/ip/litigation.html — InterTrust Technologies — Litigation Status.
-
http://www.ipa.go.jp/security/enc/CRYPTREC/index-e.html — Informationtechnology Promotion Agency. Japan CRYPTREC.
-
http://www.mail-archive.com/cryptography-digest@senatorbedfellow.mit.edu/msg04871.html — cryptography-digest: Arcfour in Ada, by me — is it good?
-
http://www.microsoft.com/technet/security/bulletin/MS01-017.asp — Microsoft TechNet. Erroneous VeriSign-Issued Digital Certificates Pose Spoofing Hazard.
-
http://www.mod-x.co.uk — Mod-X Challenge.
-
http://www.nist.gov/aes — NIST. AES Home Page.
-
http://www.nytimes.com/library/world/mideast/041600iran-cia-index.html — James Risen. New York Times Special Report: The C.I.A. in Iran.
-
http://www.paceap.com — PACE Anti-Piracy.
-
http://www.password-crackers.com/crack.html — Pavel Semjanov. Russian Password Crackers.
-
http://www.password-crackers.com/publications/crypto.html — Павел Семьянов. Почему криптосистемы ненадежны?
-
http://www.password-crackers.com/publications/crypto_eng.html — Pavel Semjanov. On cryptosystems untrustworthiness.
-
http://www.pcworld.com/news/article/0,aid,109720,00.asp _ Mike Hogan. Intuit Sued Over Product Activation.
-
http://www.planetpdf.com/mainpage.asp?webpageid=2434 — Kurt Foss. Washington Post's scanned-to-PDF Sniper Letter More Revealing Than Intended.
-
http://www.planetpdf.com/mainpage.asp?webpageid=2450 — Planet PDF. U.S. Department of Justice selects Appligent Redax for PDF redaction.
-
http://www.planetpdf.com/mainpage.asp?webpageid=3177 — Kurt Foss. Makeshift PDF Redaction Exposes 'Secret' Government Info — Again.
-
http://www.planetpdf.com/mainpage.asp?webpageid=808 — Kurt Foss. PDF Secrets Revealed.
-
http://www.rarlab.com — RARLAB. WinRAR archiver, a powerful tool to process RAR and ZIP flies.
-
http://www.reverser-course.de — Zero, SantMat. The Reverse-Engeneering-Academy.
-
http://www.rsasecurity.coin/rsalabs/challenges/factoring/rsal55.html — RSA Laboratories. Factorization of RSA-155.
-
http://www.schneier.com/book-applied.html — Schneier.com: Applied Cryptography by Bruce Schneier.
-
http://www.sealedmedia.com — SealedMedia — Complete document protection and control, even after delivery.
-
http://www.siliconrealms.com/armadillo.html — Silicon Realms. The Armadillo Software Protection System.
-
http://www.slysoft.com/en/clonecd.html — SlySoft — CloneCD.
-
http://www.ssl.stu.neva.ru/psw/crypto/appl_rus/appl_cryp.htm — Павел Семьянов. Брюс Шнайер. Прикладная криптография.