@article{cry-evaluate,
	author = {Andraşiu, Mircea and Simion, Emil},
	year = {2011},
	month = {01},
	pages = {52-62},
	title = {EVALUATION OF CRYPTOGRAPHIC ALGORITHMS},
	volume = {5},
	journal = {Romanian Economic Business Review}
}

@article{mentalpoker-liu,
	author = {刘镇,杨晓元,严波涛},
	year = {2009},
	month = {07},
	pages = {1836-1838},
	title = {一种无可信第三方的智力扑克协议},
	volume = {29},
	journal = {计算机应用}
}

@book{feng-cs, 
	author = {冯登国},
	title = {计算机通信网络安全},
	address={中国},
	publisher = {清华大学出版社},
	year = {2004年7月第3次印刷},
}

@book{feng-tc, 
	author = {冯登国},
	title = {可信计算——理论与实践},
	address={中国},
	publisher = {清华大学出版社},
	year = {2013年5月},
}

@book{feng-cryptanalysis, 
	author = {冯登国},
	title = {密码分析学},
	address={中国},
	publisher = {清华大学出版社},
	year = {2000年8月},
}

@book{qing-cry, 
	author = {卿斯汉},
	title = {密码学与计算机网络安全},
	address={中国},
	publisher = {清华大学出版社，广西科学技术出版社},
	year = {2002},
}

@book{klein-cry, 
	author = {Philip N. Klein，徐秋亮、蒋瀚、王皓(译)},
	title = {密码学基础教程——秘密与承诺(A Cryptography Primer——Secrets and Promisese)},
	address={中国},
	publisher = {机械工业出版社},
	year = {2017年12月第2次印刷},
}

@book{yang-mcry, 
	author = {杨波},
	title = {现代密码学(第四版)},
	address={中国},
	publisher = {清华大学出版社},
	year = {2019年1月第5次印刷},
}

@book{Denning-cry, 
	author = {Dorothy Elizabeth Robling Denning},
	title = {Cryptography and Data Security},
	address={中国},
	publisher = {Addison-Wesley Publishing Company},
	year = {1982},
}

@book{cracker, 
	author = {【英】斯蒂芬},
	title = {破译者},
	address={中国},
	publisher = {商务印刷},
	year = {2017},
}

@book{crypt-pic, 
	author = {【日】结城浩}, 
	title = {图解密码技术}, 
	address={中国},
	publisher = {中信出版社},
	year = {2017}, 
}

@book{zhang-cry, 
	author = {张焕国}, 
	year = {2017}, 
	title = {密码学引论}, 
	address={中国},
	publisher = {武汉大学出版社} 
}

@book{zhangwz-cry, 
	author = {张文政}, 
	title = {密码学的基本理论与技术}, 
	address={中国},
	publisher = {国防出版社},
	year = {2017}, 
}

@book{liu-netsec, 
	author = {刘建伟}, 
	title = {网络安全——技术与实践}, 
	address={中国},
	publisher = {清华大学出版社},
	year = {2017}, 
}

@book{jia-secfun, 
	author = {贾春福}, 
	title = {信息安全数学基础}, 
	address={中国},
	publisher = {机械工业出版社},
	year = {2017}, 
}

@book{boneh-cry, 
	author = {Dan Boneh and Victor Shoup}, 
	title = {A Graduate Course in Applied Cryptography}, 
	address={https://toc.cryptobook.us/},
	publisher = {Open Book,Shared in internet},
	year = {2020}, 
}

@article{pedigree-bitcoin,
	author = {Narayanan, Arvind and Clark, Jeremy},
	title = {Bitcoin’s Academic Pedigree},
	year = {2017},
	issue_date = {December 2017},
	publisher = {Association for Computing Machinery},
	address = {New York, NY, USA},
	volume = {60},
	number = {12},
	issn = {0001-0782},
	url = {https://doi.org/10.1145/3132259},
	doi = {10.1145/3132259},
	journal = {Commun. ACM},
	month = nov,
	pages = {36–45},
	numpages = {10}
}


@online{baidu-bitcoin,
	author = {百度百科},
	title = {比特币},
	url = {https://baike.baidu.com/item/%E6%AF%94%E7%89%B9%E5%B8%81},
	year = {2020},
}

@online{mooc现代密码学聂旭云,
	author = {聂旭云},
	title = {现代密码学(中国MOOC)},
	url = {https://www.icourse163.org/course/UESTC-1003046001},
	year = {2020},
}

@online{Barak-cry-online,
	author = {Boaz Barak},
	title = {An Intensive Introduction to Cryptography},
	url = {https://intensecrypto.org/public/index.html},
	year = {2020},
}

@book{shannon-symbolic,
	author = {Shannon, Claude Elwood},
	title = {A Symbolic Analysis of Relay and Switching Circuits},
	year = {1938},
}

@article{shannon-communication,  
	author={C. E. {Shannon}},  
	journal={The Bell System Technical Journal},   
	title={A mathematical theory of communication},   
	year={1948},  
	volume={27},  
	number={3},  
	pages={379-423},  
	doi={10.1002/j.1538-7305.1948.tb01338.x},
}

@article{shannon-secrecy,
	author={C. E. {Shannon}},	
	journal={The Bell System Technical Journal}, 	
	title={Communication theory of secrecy systems}, 
	year={1949},	
	volume={28},	
	number={4},	
	pages={656-715},	
	doi={10.1002/j.1538-7305.1949.tb00928.x},
}

@article{DH-newdirection,  
	author={W. {Diffie} and M. {Hellman}},  
	journal={IEEE Transactions on Information Theory},   
	title={New directions in cryptography},   
	year={1976},  
	volume={22},  
	number={6},  
	pages={644-654},  
	doi={10.1109/TIT.1976.1055638},
}

@article{shamir-Cryptocomplexity-knapsack,
	author = {Shamir, Adi},
	year = {1979},
	month = {07},
	pages = {118–129},
	title = {On the Cryptocomplexity of Knapsack Systems},
	volume = {29},
	journal = {Proceedings of the Eleventh Annual ACM Symposium on Theory of Computing},
}

@book{MaoWebBo-ModernCry,
	author = {Mao, Wenbo},
	title = {Modern Cryptography: Theory and Practice},
	year = {2003},
	isbn = {0130669431},
	address={中国},
	publisher = {Prentice Hall Professional Technical Reference},
	abstract = {Many cryptographic schemes and protocols, especially those based on public-keycryptography, have basic or so-called "textbook crypto" versions, as these versionsare usually the subjects for many textbooks on cryptography. This book takes adifferent approach to introducing cryptography: it pays much more attention tofit-for-application aspects of cryptography. It explains why "textbook crypto" isonly good in an ideal world where data are random and bad guys behave nicely.It reveals the general unfitness of "textbook crypto" for the real world by demonstratingnumerous attacks on such schemes, protocols and systems under variousreal-world application scenarios. This book chooses to introduce a set of practicalcryptographic schemes, protocols and systems, many of them standards or de factoones, studies them closely, explains their working principles, discusses their practicalusages, and examines their strong (i.e., fit-for-application) security properties, oftenwith security evidence formally established. The book also includes self-containedtheoretical background material that is the foundation for modern cryptography.}
}

@book{schneier-应用密码学, 
	author = {Bruce Schneier(美),吴世忠等译}, 
	title = {应用密码学：协议、算法与C源程序(原书第2版)}, 
	address={中国},
	publisher = {电子工业出版社},
	year = {2017}, 
}
@book{10.5555/3153732,
	author = {Golomb, Solomon W.},
	title = {Shift Register Sequences: Secure and Limited-Access Code Generators, Efficiency Code Generators, Prescribed Property Generators, Mathematical Models},
	year = {2017},
	isbn = {9789814632003},
	publisher = {World Scientific Publishing Co., Inc.},
	address = {USA},
	edition = {3rd},
	abstract = {Shift register sequences cover a broad range of applications, from radar signal design, pseudo-random number generation, digital wireless telephony, and many other areas in coded communications. It is the primary area for which the author, Dr Golomb, received the US National Medal of Science. This book is the third, revised edition of the original definitive book on shift register sequences which was published in 1967, which has been widely distributed, read, and cited. It has stood the test of time, and provides a clear, comprehensive, and readily applicable description of both linear and non-linear shift register sequences. Readership: Graduate students and researchers working on communications, radar signal design, pseudorandom number generator, digital wireless telephony, and many other areas which require understanding of shift register sequences.}
}
@book{肖国震1985伪随机序列及其应用,
	title={伪随机序列及其应用},
	author={肖国震},
	address={中国},
	publisher={国防工业出版社},
	year={1985},
}

@article{戚征1972伪随机序列,
	title={伪随机序列},
	author={戚征},
	journal={数学的实践与认识},
	number={4},
	pages={29-48},
	year={1972},
}

@book{李浪-密码工程,
	title={密码工程学},
	author={李浪，邹祎，郭迎 },
	publisher={清华大学出版社},
	address={北京},
	year={2014},
}

@book{曾贵华-量子密码,
	title={量子密码学},
	author={曾贵华},
	publisher={科学出版社},
	address={北京},
	year={2006},
}

@book{Joye-fault-anaysis,
	title={密码故障分析与防护},
	author={[法]Marc Joye，[英]Michael Tunstall 编著,赵新杰，郭世泽，张帆，谷大武译},
	address={中国},
	publisher={科学出版社},
	year={2015},
}

@book{goldreich_foundcrypt_v1, 
	place={Cambridge}, 
	title={Foundations of Cryptography}, 
	volume={1}, 
	DOI={10.1017/CBO9780511546891}, 
	publisher={Cambridge University Press}, 
	author={Goldreich, Oded}, 
	year={2001}
}

@book{goldreich_foundcrypt_v2, 
	place={Cambridge}, 
	title={Foundations of Cryptography}, 
	volume={2}, 
	DOI={10.1017/CBO9780511721656}, 
	publisher={Cambridge University Press}, 
	author={Goldreich, Oded}, 
	year={2004}
}

@book{实用数学手册, 
	title={实用数学手册}, 
	publisher={科学出版社}, 
	address={北京}, 
	author={沈永欢,梁中在,许履瑚,蔡倩倩}, 
	year={1999}
}

@book{密码学原理与实践, 
	title={密码学原理与实践}, 
	publisher={电子工业出版社}, 
	address={北京}, 
	author={[加] Douglas R. Stinson著，冯登国 等译}, 
	year={2016}
}

@book{PrincetonProbReadings, 
	title={普林斯顿概率论读本}, 
	publisher={中国工信出版集团，人民邮电出版社}, 
	address={北京}, 
	author={[美] Steven J Miller著，李馨译}, 
	year={2021}
}

@book{HavardProbReadings, 
	title={哈佛概率论公开课}, 
	publisher={机械工业出版社}, 
	address={北京}, 
	author={[美] Benedict Gross, Joe Harris, Emily Riehl著，薄立军,李本崇 译}, 
	year={2020}
}

@book{韩东概率论, 
	title={概率论}, 
	publisher={科学出版社}, 
	address={北京}, 
	author={韩东，熊德文}, 
	year={2019}
}

@book{ele-InformationTheory, 
	title={Elements of Information Theory}, 
	publisher={WILEY}, 
	address={United States of America}, 
	author={Thomas M. Cover, Joy A. Thomas}, 
	year={2005}
}

@book{lxfFoCysMath,
	title={网络空间安全数学基础讲义},
	author={李晓峰},
	address={中国},
	publisher={开源书，\url{http://buuer_xxtxiaofeng.gitee.io/lxf/CSSMathFound.html}},
	year={2019},
}

@book{stalling-cry, 
	title={密码编码学与网络安全：原理与实践（第二版）}, 
	publisher={电子工业出版社}, 
	address={北京}, 
	author={William Stallings [著]，胥光辉、齐望东等[译]}, 
	year={2001}
}

@book{高胜-blockchain, 
	title={区块链技术与实践}, 
	publisher={机械工业出版社}, 
	address={北京}, 
	author={高胜，朱建明等编著}, 
	year={2021}
}