Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Anosov V. D., Nesterenko A. Yu., “Skhema asimmetrichnogo shifrovaniya, osnovannaya na otechestvennykh kriptograficheskikh primitivakh”, Trudy IX Mezhdunarodnoi konferentsii “Intellektualnye sistemy i kompyuternye nauki”, v. 1, 2006
[2] Nesterenko A. Yu., “Ob odnoi realizatsii klyuchevoi funktsii kheshirovaniya”, Trudy XXXIII Dalnevostochnoi matematicheskoi shkoly-seminara im. akademika Zolotova (29 avgusta – 4 sentyabrya 2008 g.), Izd-vo “Dalnauka”, Vladivostok, 2008, 134–136
[3] Nesterenko A. Yu., “O kriptograficheskikh protokolakh udalennogo upravleniya”, Problemy informatsionnoi bezopasnosti. Kompyuternye sistemy, 2012, no. 2, 76–82
[4] Nesterenko A. Yu., “Novyi protokol vyrabotki obschego klyucha”, Sistemy vysokoi dostupnosti, 2012, no. 2, 81–90
[5] Stollings V., Osnovy zaschity setei. Prilozheniya i standarty, “Vilyams”, M., 2002, 432 pp.
[6] ISO/IEC 11770-3. Information technology – Security techniques – Key management, Part 3: Mechanisms using asymmetric techniques, Working Draft, 2012
[7] Nesterenko A. Yu., “Key transport protocol based on hybrid encryption scheme”, The 7th Int. Comp. Sci. Symp. in Russia, Workshop “Current Trends in Cryptology”, 2012, 20–21
[8] RFC 4357, Additional cryptographic algorithms for use with GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001 and GOST R 34.11-94 Algorithms