List of references for page Protocols for secure communication channels

From CryptoWiki
Jump to: navigation, search


РДНСД

РД ГТК РФ. Защита от НСД.

GoBe08

Goldwasser S., Bellare M.: Lecture Notes on Cryptography - MIT Computer Science and Artifical Intelligence Laboratory Department of Computer Science and Engineering, UC at San-Diego - 290 pages.

З07

Запечников С.В. Криптографические протоколы и их применение в финансовой и коммерческой деятельности. Учебное пособие для вузов. – М.: Горячая линия – Телеком, 2007. – 320 с.

VS01

Вильям Столлинг: «Криптографическая защита сетей: принципы и практика, 2-е издание» М.: Вильямс, 2001. — 672 с.: ил. — ISBN 5-8459-0185-5, ISBN 0-13-869017-0. URL:http://www.twirpx.com/file/1147782/

GrVa

Громов В.И., Васильев Г.А. "Энциклопедия компьютерной безопасности (сборник)" - 90 стр., 2007г. URL:http://www.twirpx.com/file/389744/

BelNam

Bellare M., Namprempre C. Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm // Proc. of ASI-ACRYPT ’00, LNCS Vol. 1976, Springer-Verlag, 2000, pp. 531 – 545.

CanKraw

Canetti R., Krawczyk H. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels // Advances in Cryptology – Proc. of EUROCRYPT ’01, LNCS Vol. 2045, Springer-Verlag, 2001, pp. 453 – 474.

Kraw01

Krawczyk H. The order of encryption and authentication for protecting communications (Or: how secure is SSL?) // Proc. of CRYPTO ’01, LNCS 2139, Springer-Verlag, 2001, pp. 310 – 331.

ShoIBM

Shoup V. On formal models for secure key exchange. – IBM research report RZ 3120, Apr. 1999. – URL: http://www.shoup.net

BelKohNam

Bellare M., Kohnoy T., Namprempre C. Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm. 2004.

AlSaiIPSSL

Alshamsi A., Saito T. A Technical Comparison of IPSec and SSL. Tokyo University of Technology, 10 pages.


Return to "Protocols for secure communication channels" page