Г О С Т Р И С О 20022-1— 2013
Библиография
1ISO/IEC 9594-1, Information technology — Open Systems Interconnection — The Directory:Overview of concepts,
models and services - Part 1.
2 ISO/IEC 9594-2, Information technology — Open Systems Interconnection — The Directory: Models — Part 2.
3 ISO/IEC 9594-6. Information technology — Open Systems Interconnection — The Directory: Selected attribute
types — Part 6.
4 ISO/IEC 9834-1, Information technology — Open Systems Interconnection — Procedures for the operation of
OSI Registration Authorities: General procedures and top arcs of the International Object Identifier tree — Part 1.
5 ISO/IEC 10118-3, Information technology— Security techniques— Hash-functions— Part 3: Dedicated hash-
functions.
6 ISO 13491-1. Banking — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation
methods.
7 ISO/IEC TR 14516, Information technology — Security techniques — Guidelines for the use and management of
Trusted Third Party services.
8 ISO/IEC 15945, Information technology— Security techniques— Specification of TTP services to support the
application of digital signatures.
9 ISO.’lEC 18033-2. Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric
ciphers.
10ANS X9.30-1, Public Key Cryptography Using Irreversible Algorithms for the Financial Services Industry. Part 1:
The Digital Signature Algorithm (DSA).
11 ANS X9.31-1, Public Key Cryptography Using Reversible Algorithms for the Financial Services Industry, Part 1:
The RSA Signature Algorithm.
12 ANS X9.55, Public Key Cryptography For the Financial Services Industry: Extensions to Public Key Certificates
and Certificate Revocation Lists.
13 ANS X9.57, Public Key Cryptography For the Financial Services Industry: Certificate Management.
14 ANS X9.62. Public Key Cryptography For the Financial Services Industry: The Elliptic Curve Digital Signature
Algorithm (ECDSA).
15 ANS X9.79, Public Key Infrastructure — Practices and Policy Framework.
16 Federal Information Processing Standard 140-2. Security Requirements for Cryptographic Modules.
17 Frankel Y. and Desmedt Y. ParaBel reliable threshold multisignature, TR-92-04-02. U. of Wisconsin, Milwaukee,
1992.
18 Frankel Y.. Gemmel P, Mackenzie P. and Yung M. Proactive RSA. manuscript, 1996.
19 Gennaro R.. Jarecki S.. Krawczy. H. and Rabi, T. Robust Threshold DSS Signatures. Proceedings of Eurocrypt
96. 1996.
20 Gennaro R.. Jarecki S.. Krawczyk H. and Rabin T. Robust and Efficient Sharing of RSA Functions. Proceedings
of Crypto 96, 1996.
21 Herzberg A.. Jakobsson M„ Jarecki S.. Krawczyk H. and Yung M. Proactive Public Key and Signature Systems,
3rd ACM Conference on Computer and Communications Security. 1996.
22 Menezes A., van Oorschot P. and Vanstone S. Handbook ofApplied Cryptography. CRC Press. New York. 1996.
23 Shamir A. How to Share a Secret. Communications of the ACM. November 1979.
24 TC 68 Web site:
http://www.iso.org’1c68
.
151