Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2009_11_a4, author = {A. V. Cheremushkin}, title = {Cryptographic protocols}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {115--150}, publisher = {mathdoc}, number = {11}, year = {2009}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2009_11_a4/} }
A. V. Cheremushkin. Cryptographic protocols. Prikladnaâ diskretnaâ matematika, no. 11 (2009), pp. 115-150. http://geodesic.mathdoc.fr/item/PDM_2009_11_a4/
[1] Cheremushkin A. V., Kriptograficheskie protokoly. Osnovnye svoistva i uyazvimosti: uchebnoe posobie, Izd. tsentr “Akademiya”, M., 2009, 272 pp.
[2] Index of the security protocols repository (SPORE) Laboratorie Spécification et Vérification, http://www.lsv.ens-cachan.fr/spore/table.html
[3] Clark J., Jacob J., A Survey of Authentication Protocol Literature: Version 1.0. 17 Nov., , 1997 http://www.cs.york.ac.uk/~jac/papers/drareview.ps.gz
[4] Menezes A. J., van Oorschot P. C., Vanstone S. A., Handbook of applied cryptography, CRC Press, Boca Raton–New York–London–Tokyo, 1997, 780 pp. | MR | Zbl
[5] Cremers C. J. F., Lafourcade P., Comparing State Spaces in Automatic Security Protocol Verification, ETH Technical Report. no. 558, 2007, 26 pp. | Zbl