11.0. Ссылки составителя
[A] Кунегин С.В. Основы технологии АТМ. М., в/ч 33965,1999.
[B] Официальный сайт ATM Forum:
[C] "ATM Security Specification, Version 1.0"
[D] "ATM Forum: Glossary":
[1] ATM Forum Technical Committee, “B-ICI Specification, Version 2.0.”
[2] ATM Forum Technical Committee, “User-Network Interface (UNI) Specification,” Version 3.1, September 1994.
[3] ATM Forum Technical Committee, “User-Network Interface (UNI) Signalling Specification,” Version 4.0, April 1996.
[4] ATM Forum, “UNI Signaling 4.0 Security Addendum,”, ATM Forum BTD-CS-UNI-SEC-01.03, October 1998.
[5] ATM Forum, “PNNI Signaling 1.0 Security Addendum,” ATM Forum BTD-CS-PNNI-SEC-01.03, October 1998
[6] Federal Information Processing Standards Publication 46-2 (FIPS PUB 46-2), “Data Encryption Standard (DES),” December 1993.
[7] Federal Information Processing Standards Publication 81 (FIPS PUB 81), “DES Modes of
Operation,” December 1980.
[8] Federal Information Processing Standards Publication 180-1 (FIPS PUB 108-1), “Secure Hash
Standard,” April 1995.
[9] Federal Information Processing Standards Publication 186 (FIPS PUB 186), “Digital Signature Standard,” May 1994.
[10] Federal Information Processing Standards Publication 188 (FIPS PUB 188), “Standard Security
Label for Information Transfer,” September 1994.
[11] IETF, “HMAC: Keyed-Hashing for Message Authentication,” RFC 2104, February 1997.
[12] IETF, “The MD5 Message Digest Algorithm,” RFC 1321, April 1992.
[13] IETF, “Privacy Enhancement for Internet Electronic Mail (PEM),” RFCs 1421-1424, February 1993.
[14] IETF, “U.S. Department of Defense Security Options for the Internet Protocol,” RFC 1108, November 1991.
[15] ISO/IEC 9594-8, 1995 (E), Information Technology -- Open Systems Interconnection -- The
Directory: Authentication Framework.
[16] ISO/IEC 9594-8, 1995, Amendment 1: Certificate Extensions.
[17] ISO/IEC 9797, “Information Technology - Security Techniques - Data Integrity Mechanism using
a Cryptographic Check Function Employing a Block Cipher Algorithm,” 1994.
[18] ISO/IEC 10118-3, “Hash Functions - Part 3: Dedicated Hash Functions,” 1997.
[19] ITU-T Recommendation I.363, “B-ISDN ATM Adaptation Layer (AAL) Specification,” March 1993.
[20] ITU-T Recommendation I.610, “B-ISDN Operation and Maintenance Principles and Functions,” November 1994.
[21] ITU-T Recommendation Q.2931, “B-ISDN DSS2 User-Network Interface Layer 3 Specification
for Basic Call/Connection Control,” February 1995.
[22] ITU-T Recommendation Q.2971, “B-ISDN DSS2 User-Network Interface Layer 3 Specification
for Point-to-Multipoint Call/Connection Control,” 1995.
[23] ITU-T Recommendation X.509, “The Directory: Authentication Framework,” 1993.
[24] Public Key Cryptography Standards #1 (PKCS #1), “RSA Encryption Standard,” RSA
Laboratories, Version 1.5, November 1993.
[25] ANSI X9.17, “Financial Institution Key Management (Wholesale),” April 1985, p.23.
[26] Agnew, Mullin, and Vanstone, “Improved Digital Signature Scheme Based on Discrete
Exponentiation,” Electronic Letters, Vol. 26, pp. 1024-1025, 1990.
[27] Bird, et al., “The KryptoKnight Family of Light-Weight Protocols for Authentication and Key
Distribution,” IEEE/ACM Transactions on Networking, Vol. 3, no. 1, pp. 31-41, February 1995.
[28] ETSI TCR-TR 028, “Network Aspects (NA); Security Techniques Advisory Group (STAG);
Glossary of security terminology,” 1995.
[29] Fujioka, A., et al., “ESIGN: An Efficient Digital Signature Implementation for Smart Cards,”
Proceedings of Eurocrypt ‘91, Springer-Verlag, pp. 446-457, 1991.
[30] IEEE P1363, “Standard Specifications For Public Key Cryptography,” Draft, Version 1, December 1997.
[31] IETF, “Internet Security Association and Key Management Protocol (ISAKMP),” RFC 2408, November 1998.
[32] Miyaguchi, S., et al., “Expansion of FEAL Cipher,” NTT Review, Vol. 2, no. 6, pp. 117-127, November 1990.
[33] Miyaguchi, S., “The FEAL Cipher Family,” Advances in Cryptology - CRYPTO ‘90, LNCS 537,
pp. 627-638, Springer-Verlag, 1991.
[34] Okamoto, T., “A Fast Signature Scheme Based on Congruential Polynomial Operations,” IEEE
Transactions on Information Theory, Vol. 36, no. 1, pp. 47-53, 1990.
[35] Schneier, B., Applied Cryptography, 2nd edition, John Wiley & Sons, 1996.