˳òåðàòóðà

 

1.     ISO/IEC 15408. Information technology – Security techniques – Evaluation criteria for IT security.

2.     ÄÑÒÓ 4145-2002 "²íôîðìàö³éí³ òåõíîëî㳿. Êðèïòîãðàô³÷íèé çàõèñò ³íôîðìàö³¿. Öèôðîâèé ï³äïèñ, ùî ´ðóíòóºòüñÿ íà åë³ïòè÷íèõ êðèâèõ. Ôîðìóâàííÿ òà ïåðåâ³ðÿííÿ". – Ê.: Äåðæñïîæèâñòàíäàðò Óêðà¿íè, 2002. – 44 ñ.

3.     Icart, T. How to hash into elliptic curves [Text] / T. Icart // Proc. of Crypto 2009. – Springer, 2009. – vol. 5677. – P 303 – 316.

4.     Krawczyk, H. Chameleon hashing and signatures [Text] / H. Krawczyk, T. Rabin // Proc. of NDSS. – 2000. – Ð. 143154.

5.     Chen, X. Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems [Text] / X. Chen, F. Zhang. –  Cryptology ePrint Archive: Report 2009/035, 2009. – 80 ð.

6.     Mironov, I. Hash functions: Theory, attacks, and applications  [Text] / I. Mironov. – Technical Report, MSR-TR-2005-187, Microsoft Research, November 2005. – 230 ð.