Extensions of information protocols based on mappings of finite sets
Diskretnaya Matematika, Tome 17 (2005) no. 4, pp. 18-28.

Voir la notice de l'article provenant de la source Math-Net.Ru

We introduce the concepts of an information protocol on a finite set, its extension and expansion. A series of examples of manipulations of an adversary with information protocols are given. We propose a system of protection of information protocols which admits an expansion into a large number of extensions and calculate some probabilistic characteristics of its quality.
@article{DM_2005_17_4_a2,
     author = {A. F. Ronzhin},
     title = {Extensions of information protocols based on mappings of finite sets},
     journal = {Diskretnaya Matematika},
     pages = {18--28},
     publisher = {mathdoc},
     volume = {17},
     number = {4},
     year = {2005},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/DM_2005_17_4_a2/}
}
TY  - JOUR
AU  - A. F. Ronzhin
TI  - Extensions of information protocols based on mappings of finite sets
JO  - Diskretnaya Matematika
PY  - 2005
SP  - 18
EP  - 28
VL  - 17
IS  - 4
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/DM_2005_17_4_a2/
LA  - ru
ID  - DM_2005_17_4_a2
ER  - 
%0 Journal Article
%A A. F. Ronzhin
%T Extensions of information protocols based on mappings of finite sets
%J Diskretnaya Matematika
%D 2005
%P 18-28
%V 17
%N 4
%I mathdoc
%U http://geodesic.mathdoc.fr/item/DM_2005_17_4_a2/
%G ru
%F DM_2005_17_4_a2
A. F. Ronzhin. Extensions of information protocols based on mappings of finite sets. Diskretnaya Matematika, Tome 17 (2005) no. 4, pp. 18-28. http://geodesic.mathdoc.fr/item/DM_2005_17_4_a2/

[1] Shennon K., Raboty po teorii informatsii i kibernetike, IL, Moskva, 1963

[2] Knyazev A. V., Ronzhin A. F., “O prosteishikh makhinatsiyakh v nekotorykh sistemakh notarialnogo zaverivaniya tsifrovykh podpisei”, Obozrenie prikladnoi i promyshlennoi matematiki, 10:2 (2003), 481–482

[3] Lampson B. W., “A note of the confinement problem”, Commun. ACM, 16:10 (1973), 613–615 | DOI

[4] Schneier B., Applied cryptography: protocols, algorithms and source code in C, Wiley, New York, 1996 | Zbl

[5] Grusho A. A., Timonina E. E., “Otsenka vremeni, trebuemogo dlya organizatsii skrytogo kanala”, Diskretnaya matematika, 15:2 (2003), 40–46 | MR | Zbl