List of references for page Protocols for secure communication channels

From CryptoWiki
Jump to: navigation, search


РД ГТК РФ. Защита от НСД.


Goldwasser S., Bellare M.: Lecture Notes on Cryptography - MIT Computer Science and Artifical Intelligence Laboratory Department of Computer Science and Engineering, UC at San-Diego - 290 pages.


Запечников С.В. Криптографические протоколы и их применение в финансовой и коммерческой деятельности. Учебное пособие для вузов. – М.: Горячая линия – Телеком, 2007. – 320 с.


Вильям Столлинг: «Криптографическая защита сетей: принципы и практика, 2-е издание» М.: Вильямс, 2001. — 672 с.: ил. — ISBN 5-8459-0185-5, ISBN 0-13-869017-0. URL:


Громов В.И., Васильев Г.А. "Энциклопедия компьютерной безопасности (сборник)" - 90 стр., 2007г. URL:


Bellare M., Namprempre C. Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm // Proc. of ASI-ACRYPT ’00, LNCS Vol. 1976, Springer-Verlag, 2000, pp. 531 – 545.


Canetti R., Krawczyk H. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels // Advances in Cryptology – Proc. of EUROCRYPT ’01, LNCS Vol. 2045, Springer-Verlag, 2001, pp. 453 – 474.


Krawczyk H. The order of encryption and authentication for protecting communications (Or: how secure is SSL?) // Proc. of CRYPTO ’01, LNCS 2139, Springer-Verlag, 2001, pp. 310 – 331.


Shoup V. On formal models for secure key exchange. – IBM research report RZ 3120, Apr. 1999. – URL:


Bellare M., Kohnoy T., Namprempre C. Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm. 2004.


Alshamsi A., Saito T. A Technical Comparison of IPSec and SSL. Tokyo University of Technology, 10 pages.

Return to "Protocols for secure communication channels" page