˳òåðàòóðà
1.
ISO/IEC 15408. Information technology
– Security techniques – Evaluation criteria for IT security.
2.
ÄÑÒÓ 4145-2002 "²íôîðìàö³éí³
òåõíîëî㳿. Êðèïòîãðàô³÷íèé çàõèñò ³íôîðìàö³¿. Öèôðîâèé ï³äïèñ, ùî ´ðóíòóºòüñÿ
íà åë³ïòè÷íèõ êðèâèõ. Ôîðìóâàííÿ òà ïåðåâ³ðÿííÿ". – Ê.: Äåðæñïîæèâñòàíäàðò
Óêðà¿íè, 2002. – 44 ñ.
3. Icart, T. How to hash into elliptic
curves [Text] / T. Icart // Proc. of Crypto 2009. – Springer,
2009. – vol. 5677. – P 303 – 316.
4.
Krawczyk, H.
Chameleon hashing and signatures [Text]
/ H. Krawczyk,
T. Rabin // Proc. of NDSS. – 2000. – Ð. 143 – 154.
5.
Chen, X. Key-Exposure Free Chameleon
Hashing and Signatures Based on Discrete Logarithm Systems [Text]
/ X. Chen, F. Zhang. – Cryptology ePrint
Archive: Report 2009/035, 2009. – 80 ð.
6.
Mironov, I. Hash
functions: Theory, attacks, and applications [Text] / I. Mironov. – Technical Report, MSR-TR-2005-187, Microsoft Research,
November 2005. – 230 ð.