Главная страница Случайная страница КАТЕГОРИИ: АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторикаСоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника |
Список использованных источников
[1] I. Chatzigiannakis, A. Pyrgelis, P. G. Spirakis, Y. C. Stamatiou. Elliptic Curve Based Zero Knowledge Proofs and Their Applicability on Resource Constrained Devices. CoRR, abs/1107.1626, 2011 [2] M. Hutter, P. Schwabe. NaCl on 8-bit AVR microcontrollers. AFRICACRYPT 2013, volume 7918 of Lecture Notes in Computer Science. Springer, 2013. [3] M. Kasper, T. Kasper, A. Moradi, C. Paar. Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed (2009). AFRICACRYPT 2009, volume 5580 of LNCS. Springer, 2009. [4] Atmel (2004). 8-bit AVR With 8K Bytes In-System Programmable Flash ATmega8/ATmega8L Data Sheet. Atmel Corp., San Jose, CA, USA. [5] Володин, В. И. Энергосбережение: учеб. пособие/ В. И. Володин. – Минск: БГУИР, БГТУ, 2001. [6] Кирвель, И. И. Энергосбережение в процессах теплообмена: метод. пособие для практ. занятий/ И. И. Кирвель, М. М. Бражников, Е. Н. Зацепин. – Минск: БГУИР, 2007. [7] Miller V. Use of elliptic curves in cryptography //Advances in Cryptology – CRYPTO’85 Proceedings. – Springer Berlin/Heidelberg, 1986. – С. 417-426. [8] Gura N. et al. Comparing elliptic curve cryptography and RSA on 8-bit CPUs //Cryptographic Hardware and Embedded Systems-CHES 2004. – Springer Berlin Heidelberg, 2004. – С. 119-132. [9] Коблиц Н. Курс теории чисел и криптографии //М.: ТВП. – 2001. – Т. 270. [10] Semiconductor N. nRF24L01 single chip 2.4 GHz transceiver product specification //2007]. https://www. nordicsemi. com/eng/Products/2.4 GHz-RF/nRF24L01. – 2007. [11] Semiconductor F. LM7805 3-Terminal 1A Positive Voltage Regulator. [12] Johnson D., Menezes A., Vanstone S. The elliptic curve digital signature algorithm (ECDSA) //International Journal of Information Security. – 2001. – Т. 1. – №. 1. – С. 36-63. [13] Федухин А. В., Сеспедес-Гарсия Н. В. К вопросу о статистическом моделировании надежности //Математичні машини і системи. – 2006. – №. 1. – С. 156-163. [14] Barker E., Kelsey J. NIST DRAFT Special Publication 800-90b recommendation for the entropy sources. – 2012. [15] Мордвінов Р. І. Порівняльний аналіз методів та засобів тестування випадкових послідовностей NIST 800 22 ТА NIST 800 90B //Прикладная радиоэлектроника. – 2013. – №. 12, № 2. – С. 250-253. [16] Blum M., Micali S. How to generate cryptographically strong sequences of pseudorandom bits //SIAM journal on Computing. – 1984. – Т. 13. – №. 4. – С. 850-864. [17] Ni X., Shi W., Foo Siang Fook V. AES Security Protocol Implementation for Automobile Remote Keyless System //Vehicular Technology Conference, 2007. VTC2007-Spring. IEEE 65th. – IEEE, 2007. [18] Cates R. Design considerations for remote keyless entry //WESCON/94. Idea/Microelectronics. Conference Record. – IEEE, 1994. [19] Biham E. et al. How to steal cars–A practical attack on keeLoq //EUROCRYPT. – 2008. – С. 1-18. [20] Mason S. Vehicle remote keyless entry systems and engine immobilisers: Do not believe the insurer that this technology is perfect //Computer Law & Security Review. – 2012. – Т. 28. – №. 2. – С. 195-200. [21] Davis B., DeLong R. Combined remote key control and immobilization system for vehicle security //Power Electronics in Transportation, 1996., IEEE. – IEEE, 1996. – С. 125-132. [22] Szczechowiak P. et al. NanoECC: Testing the limits of elliptic curve cryptography in sensor networks //Wireless sensor networks. – Springer Berlin Heidelberg, 2008. – С. 305-320. [23] Blass E. O., Zitterbart M. Towards Acceptable Public-Key Encryption in Sensor Networks //IWUC. – 2005. – С. 88-93. [24] Kelsey J. et al. Cryptanalytic attacks on pseudorandom number generators //Fast Software Encryption. – Springer Berlin Heidelberg, 1998. – С. 168-188. [25] Larrondo H. A. et al. Intensive statistical complexity measure of pseudorandom number generators //Physica A: Statistical Mechanics and its Applications. – 2005. – Т. 356. – №. 1. – С. 133-138.
|