On an approach to the construction of secure connections
Matematičeskie voprosy kriptografii, Tome 4 (2013) no. 2, pp. 101-111 Cet article a éte moissonné depuis la source Math-Net.Ru

Voir la notice de l'article

One of possible approaches to the construction of secure connections permitting the transmission of confidential information through public networks is considered. We discuss conditions which are necessary for the approval of cryptographic quality of the protection mechanism. Protocols of remote control and public key distribution are used as examples.
@article{MVK_2013_4_2_a8,
     author = {A. Yu. Nesterenko},
     title = {On an approach to the construction of secure connections},
     journal = {Matemati\v{c}eskie voprosy kriptografii},
     pages = {101--111},
     year = {2013},
     volume = {4},
     number = {2},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/MVK_2013_4_2_a8/}
}
TY  - JOUR
AU  - A. Yu. Nesterenko
TI  - On an approach to the construction of secure connections
JO  - Matematičeskie voprosy kriptografii
PY  - 2013
SP  - 101
EP  - 111
VL  - 4
IS  - 2
UR  - http://geodesic.mathdoc.fr/item/MVK_2013_4_2_a8/
LA  - ru
ID  - MVK_2013_4_2_a8
ER  - 
%0 Journal Article
%A A. Yu. Nesterenko
%T On an approach to the construction of secure connections
%J Matematičeskie voprosy kriptografii
%D 2013
%P 101-111
%V 4
%N 2
%U http://geodesic.mathdoc.fr/item/MVK_2013_4_2_a8/
%G ru
%F MVK_2013_4_2_a8
A. Yu. Nesterenko. On an approach to the construction of secure connections. Matematičeskie voprosy kriptografii, Tome 4 (2013) no. 2, pp. 101-111. http://geodesic.mathdoc.fr/item/MVK_2013_4_2_a8/

[1] Anosov V. D., Nesterenko A. Yu., “Skhema asimmetrichnogo shifrovaniya, osnovannaya na otechestvennykh kriptograficheskikh primitivakh”, Trudy IX Mezhdunarodnoi konferentsii “Intellektualnye sistemy i kompyuternye nauki”, v. 1, 2006

[2] Nesterenko A. Yu., “Ob odnoi realizatsii klyuchevoi funktsii kheshirovaniya”, Trudy XXXIII Dalnevostochnoi matematicheskoi shkoly-seminara im. akademika Zolotova (29 avgusta – 4 sentyabrya 2008 g.), Izd-vo “Dalnauka”, Vladivostok, 2008, 134–136

[3] Nesterenko A. Yu., “O kriptograficheskikh protokolakh udalennogo upravleniya”, Problemy informatsionnoi bezopasnosti. Kompyuternye sistemy, 2012, no. 2, 76–82

[4] Nesterenko A. Yu., “Novyi protokol vyrabotki obschego klyucha”, Sistemy vysokoi dostupnosti, 2012, no. 2, 81–90

[5] Stollings V., Osnovy zaschity setei. Prilozheniya i standarty, “Vilyams”, M., 2002, 432 pp.

[6] ISO/IEC 11770-3. Information technology – Security techniques – Key management, Part 3: Mechanisms using asymmetric techniques, Working Draft, 2012

[7] Nesterenko A. Yu., “Key transport protocol based on hybrid encryption scheme”, The 7th Int. Comp. Sci. Symp. in Russia, Workshop “Current Trends in Cryptology”, 2012, 20–21

[8] RFC 4357, Additional cryptographic algorithms for use with GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001 and GOST R 34.11-94 Algorithms