|
|
|
Библиографический список
|
|
|
1. |
Черемушкин А. В., Криптографические протоколы. Основные свойства и уязвимости, ИЦ «Академия», М., 2009, 272 с. [Cheremushkin A. V., Cryptographic Protocols. Basic Properties and Vulnerability, IC “Akademiya”, M., 2009, 272 pp. (in Russian)] |
2. |
Молдовян А. А., Молдовян Д. Н., Левина А. Б., Протоколы аутентификации с нулевым разглашением секрета, Университет ИТМО, СПб., 2016, 55 с. [Moldovyan A. A., Moldovyan D. N., Levina A. B., Authentication protocols with zero-knowledge proof, ITMO Univ., St. Petersburg, 2016, 55 pp. (in Russian)] |
3. |
Schnorr C. P., “Efficient Identification and Signatures for Smart Cards”, Advances in Cryptology – CRYPTO'89. Proceedings., CRYPTO 1989, Lecture Notes in Computer Science, 435, Springer, N. Y., 1990, 239–252 |
4. |
Hankerson D., Menezes A., Vanstone S., Guide to Elliptic Curve Cryptography, Springer-Verlag, N. Y., 2004, 358 pp. |
5. |
An Elliptic Curve Cryptography (ECC) Primer: why ECC is the next generation of public key cryptography, The Certicom Corp. 'Catch the Curve' White Paper Series, June 2004, 24 с. https://www.certicom.com/content/dam/certicom/images/pdfs/WP-ECCprimer.pdf (accessed 05 September 2017) |
6. |
Рацеев С. М., Ростов М. А., “Методы ускорения и усовершенствования протокола аутентификации с нулевым разглашением на основе задачи о нахождении гамильтонова цикла в графе”, Научные ведомости БелГУ. Экономика. Информатика, 16(265):43 (2017), 131–137 [Ratseev S. M., Rostov M. A., “Methods of an acceleration and enhancement of the cryptography authentication protocol with zero disclosure of knowledge on the basis of the task about finding of a hamilton cycle in the graph”, Belgorod State University Scientific Bulletin. Economics. Computer Science, 16(265):43 (2017), 131–137 (in Russian)] |
7. |
Stone J. E., Phillips J. C., Freddolino P. L., Hardy D. J., Trabuco L. G., Schulten K., “Accelerating molecular modeling applications with graphics processors”, J. Comput. Chem., 28:16 (2007), 2618–2640 |
8. |
Van Meel J. A., Arnold A., Frenkel D., Zwart S. P., Belleman R., “Harvesting graphics power for MD simulations”, Molecular Simulation, 34:3 (2008), 259–266 |
9. |
Harris C., Haines K., Staveley-Smith L., “GPU accelerated radio astronomy signal convolution”, Exp. Astron., 22:1–2 (2008), 129–141 |
10. |
Muyan-Ozcelik P., Owens J. D., Xia J., Samant S. S., “Fast deformable registration on the GPU: A CUDA implementation of demons”, Proc. Int. Conf. Computational Science and its Applications (Perugia, Italy, 2008), 223–233 |
11. |
ISO/IEC 9798-5:2009(E): Information technology – Security techniques – Entity authentication – Part 5: Mechanisms using zero-knowledge technique, 2009 https://www.iso.org/standard/50456.html (accessed 05 September 2018) |