|
|
|
Библиографический список
|
|
|
1. |
Hankerson D., Menezes A., Vanstone S., Guide to Elliptic Curve Cryptography, Springer-Verlag, N. Y., 2004, 358 pp. |
2. |
An Elliptic Curve Cryptography (ECC) Primer: why ECC is the next generation of public key cryptography, The Certicom Corp. 'Catch the Curve' White Paper Series, https://www.certicom.com/content/dam/certicom/images/pdfs/WP-ECCprimer.pdf, June 2004, 24 pp. (Accessed 05.09.2017) |
3. |
В. В. Ященко (ред.), Введение в криптографию, МЦНМО, М., 2012, 348 с. [V. V. Yashchenko (ed.), Introduction to cryptography, MTsNMO Publ., M., 2012, 348 pp. (in Russian)] |
4. |
Chaum D., Pedersen T. P., “Wallet databases with observers”, Proc. Crypto'92, Lect. Notes in Comput. Sci., 740, 1993, 89–105 |
5. |
Cramer R., Gennaro R., Schoenmakers B., “A secure and optimally efficient multi-authority election scheme”, Proc. EUROCRYPT'97, Lect. Notes in Comput. Sci., 1233, 1997, 103–118 |
6. |
Cramer R., Franklin M., Schoenmakers B., Yung M., “Multi-Authority Secret-Ballot Elections with Linear Work”, Proc. EUROCRYPT'96, Lect. Notes in Comput. Sci., 1070, 1996, 72–83 |
7. |
Черемушкин А. В., Криптографические протоколы. Основные свойства и уязвимости, Академия, М., 2009, 272 с. [Cheremushkin A. V., Cryptography protocols. Main properties and vulnerabilities, Academy, M., 2009, 272 pp. (in Russian)] |
8. |
Pedersen T. P., “Non-interactive and information-theoretic secure verifiable secret sharing”, Proc. EUROCRYPT'91, Lect. Notes in Comput. Sci., 576, 1992, 129–140 |
9. |
Зубов А. Ю., Криптографические методы защиты информации. Совершенные шифры, Гелиос АРВ, М., 2005, 192 с. [Zubov A. Yu., Cryptographic Methods of Information Security. Perfect ciphers, Gelios ARV, M., 2005, 192 pp. (in Russian)] |
10. |
Рацеев С. М., “Некоторые обобщения теории Шеннона о совершенных шифрах”, Вестн. ЮУрГУ. Сер. Матем. моделирование и программирование, 8:1 (2015), 111–127 [Ratseev S. M., “Some generalizations of Shannon's theory of perfect ciphers”, Bulletin of the South Ural State University, Ser. : Mathematical Modelling, Programming and Computer Software, 8:1 (2015), 111–127 (in Russian)] |