@article{MVK_2013_4_2_a8,
author = {A. Yu. Nesterenko},
title = {On an approach to the construction of secure connections},
journal = {Matemati\v{c}eskie voprosy kriptografii},
pages = {101--111},
year = {2013},
volume = {4},
number = {2},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/MVK_2013_4_2_a8/}
}
A. Yu. Nesterenko. On an approach to the construction of secure connections. Matematičeskie voprosy kriptografii, Tome 4 (2013) no. 2, pp. 101-111. http://geodesic.mathdoc.fr/item/MVK_2013_4_2_a8/
[1] Anosov V. D., Nesterenko A. Yu., “Skhema asimmetrichnogo shifrovaniya, osnovannaya na otechestvennykh kriptograficheskikh primitivakh”, Trudy IX Mezhdunarodnoi konferentsii “Intellektualnye sistemy i kompyuternye nauki”, v. 1, 2006
[2] Nesterenko A. Yu., “Ob odnoi realizatsii klyuchevoi funktsii kheshirovaniya”, Trudy XXXIII Dalnevostochnoi matematicheskoi shkoly-seminara im. akademika Zolotova (29 avgusta – 4 sentyabrya 2008 g.), Izd-vo “Dalnauka”, Vladivostok, 2008, 134–136
[3] Nesterenko A. Yu., “O kriptograficheskikh protokolakh udalennogo upravleniya”, Problemy informatsionnoi bezopasnosti. Kompyuternye sistemy, 2012, no. 2, 76–82
[4] Nesterenko A. Yu., “Novyi protokol vyrabotki obschego klyucha”, Sistemy vysokoi dostupnosti, 2012, no. 2, 81–90
[5] Stollings V., Osnovy zaschity setei. Prilozheniya i standarty, “Vilyams”, M., 2002, 432 pp.
[6] ISO/IEC 11770-3. Information technology – Security techniques – Key management, Part 3: Mechanisms using asymmetric techniques, Working Draft, 2012
[7] Nesterenko A. Yu., “Key transport protocol based on hybrid encryption scheme”, The 7th Int. Comp. Sci. Symp. in Russia, Workshop “Current Trends in Cryptology”, 2012, 20–21
[8] RFC 4357, Additional cryptographic algorithms for use with GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001 and GOST R 34.11-94 Algorithms