4.
Литература по данной теме[1]
ATM Forum Technical Committee, “B-ICI Specification, Version 2.0.”[2]
ATM Forum Technical Committee, “User-Network Interface (UNI) Specification,” Version 3.1,September 1994.
[3]
ATM Forum Technical Committee, “User-Network Interface (UNI) Signalling Specification,”Version 4.0, April 1996.
[4]
ATM Forum, “UNI Signaling 4.0 Security Addendum,”, ATM Forum BTD-CS-UNI-SEC-01.03,October 1998.
[5]
ATM Forum, “PNNI Signaling 1.0 Security Addendum,” ATM Forum BTD-CS-PNNI-SEC-01.03,October 1998
[6]
Federal Information Processing Standards Publication 46-2 (FIPS PUB 46-2), “Data EncryptionStandard (DES),” December 1993.
[7]
Federal Information Processing Standards Publication 81 (FIPS PUB 81), “DES Modes ofOperation,” December 1980.
[8]
Federal Information Processing Standards Publication 180-1 (FIPS PUB 108-1), “Secure HashStandard,” April 1995.
[9]
Federal Information Processing Standards Publication 186 (FIPS PUB 186), “Digital SignatureStandard,” May 1994.
[10]
[Federal Information Processing Standards Publication 188 (FIPS PUB 188), “Standard SecurityLabel for Information Transfer,” September 1994.
[11]
IETF, “HMAC: Keyed-Hashing for Message Authentication,” RFC 2104, February 1997.[12]
IETF, “The MD5 Message Digest Algorithm,” RFC 1321, April 1992.[13]
IETF, “Privacy Enhancement for Internet Electronic Mail (PEM),” RFCs 1421-1424, February1993.
[14]
IETF, “U.S. Department of Defense Security Options for the Internet Protocol,” RFC 1108,November 1991.
[15]
ISO/IEC 9594-8, 1995 (E), Information Technology -- Open Systems Interconnection -- TheDirectory: Authentication Framework.
[16]
ISO/IEC 9594-8, 1995, Amendment 1: Certificate Extensions.[17]
ISO/IEC 9797, “Information Technology - Security Techniques - Data Integrity Mechanism usinga Cryptographic Check Function Employing a Block Cipher Algorithm,” 1994.
[18]
ISO/IEC 10118-3, “Hash Functions - Part 3: Dedicated Hash Functions,” 1997.[19]
ITU-T Recommendation I.363, “B-ISDN ATM Adaptation Layer (AAL) Specification,” March1993.
[20]
ITU-T Recommendation I.610, “B-ISDN Operation and Maintenance Principles and Functions,”November 1994.
[21]
ITU-T Recommendation Q.2931, “B-ISDN DSS2 User-Network Interface Layer 3 Specificationfor Basic Call/Connection Control,” February 1995.
[22]
ITU-T Recommendation Q.2971, “B-ISDN DSS2 User-Network Interface Layer 3 Specificationfor Point-to-Multipoint Call/Connection Control,” 1995.
[23]
ITU-T Recommendation X.509, “The Directory: Authentication Framework,” 1993.[24]
Public Key Cryptography Standards #1 (PKCS #1), “RSA Encryption Standard,” RSALaboratories, Version 1.5, November 1993.
[25]
ANSI X9.17, “Financial Institution Key Management (Wholesale),” April 1985, p.23.[26]
Agnew, Mullin, and Vanstone, “Improved Digital Signature Scheme Based on DiscreteExponentiation,” Electronic Letters, Vol. 26, pp. 1024-1025, 1990.
[27]
Bird, et al., “The KryptoKnight Family of Light-Weight Protocols for Authentication and KeyDistribution,” IEEE/ACM Transactions on Networking, Vol. 3, no. 1, pp. 31-41, February 1995.
[28]
ETSI TCR-TR 028, “Network Aspects (NA); Security Techniques Advisory Group (STAG);Glossary of security terminology,” 1995.
[29]
Fujioka, A., et al., “ESIGN: An Efficient Digital Signature Implementation for Smart Cards,”Proceedings of Eurocrypt ‘91, Springer-Verlag, pp. 446-457, 1991.
[30]
IEEE P1363, “Standard Specifications For Public Key Cryptography,” Draft, Version 1, December 1997.[31]
IETF, “Internet Security Association and Key Management Protocol (ISAKMP),” RFC 2408,November 1998.
[32]
Miyaguchi, S., et al., “Expansion of FEAL Cipher,” NTT Review, Vol. 2, no. 6, pp. 117-127,November 1990.
[33]
Miyaguchi, S., “The FEAL Cipher Family,” Advances in Cryptology - CRYPTO ‘90, LNCS 537,pp. 627-638, Springer-Verlag, 1991.
[34]
Okamoto, T., “A Fast Signature Scheme Based on Congruential Polynomial Operations,” IEEETransactions on Information Theory, Vol. 36, no. 1, pp. 47-53, 1990.
[35]
Schneier, B., Applied Cryptography, 2nd edition, John Wiley & Sons, 1996.