Voir la notice de l'article provenant de la source Math-Net.Ru
[1] GOST R 34.10-2012 «Informatsionnaya tekhnologiya. Kriptograficheskaya zaschita informatsii. Protsessy formirovaniya i proverki elektronnoi tsifrovoi podpisi», Standartinform, M., 2012
[2] Alekseev E. K., Akhmetzyanova L. R., Oshkin I. B., Smyshlyaev S. V., “Obzor uyazvimostei nekotorykh protokolov vyrabotki obschego klyucha s autentifikatsiei na osnove parolya i printsipy postroeniya protokola SESPAKE”, Matematicheskie voprosy kriptografii, 7:4 (2016), 7–28 | MR | Zbl
[3] Alekseev E. K., Smyshlyaev S. V., “O bezopasnosti protokola SESPAKE”, Prikladnaya diskretnaya matematika, 50 (2020), 5–41 | Zbl
[4] V. V. Yaschenko (red.), Vvedenie v kriptografiyu, Izd. 4-e, dop., MTsNMO, M., 2012, 348 pp.
[5] Boileau A., Ruxcon 2006, Presentation https://papers.put.as/papers/macosx/2006/ab_firewire_rux2k6-final.pdf
[6] Witherden F., Memory forensics over the IEEE 1394 interface, 2010 https://freddie.witherden.org/pages/ieee-1394-forensics.pdf
[7] Hermann U., Physical memory attacks via Firewire/DMA – part 1: Overview and mitigation, 2010 https://firewire14.rssing.com/chan-8600345/all_p1.html
[8] Lenstra A. K., Hughes J. P., Augier M., Bos J. W., Kleinjung T., Wachter C., Ron was wrong, What is right, Cryptology ePrint Archive, Report 2012/064, 2012
[9] Schnorr C. P., “Efficient identification and signatures for smart cards”, CRYPTO'89, Lect. Notes Comput. Sci., 1990, 239–252 | DOI | Zbl
[10] Savage J. E., Models of Computation: Exploring the Power of Computing, Addison-Wesley Longman Publ. Co., Boston, MA, 1997, 672 pp.