RUS  ENG
Full version
JOURNALS // Intelligent systems. Theory and applications // Archive

Intelligent systems. Theory and applications, 2017 Volume 21, Issue 3, Pages 65–105 (Mi ista13)

Security Protocols, Part 1

A. M. Mironov

Lomonosov Moscow State University, Faculty of Mechanics and Mathematics

Abstract: The main cryptographic primitives used in security protocols are described (symmetric and asymmetric encryption systems, hash functions, secret sharing schemes), authentication protocols, and digital signature algorithms.

Keywords: protocols, security, cryptography, hash functions, authentication, digital signature.



© Steklov Math. Inst. of RAS, 2026