1. Chen, L., Jordan, S., Liu, Yi-Kai, Moody, D., Peralta, R., Perlner, R. and Smith-Tone, D. (2016), Report on Post-Quantum Cryptography, available at: www.nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8105.pdf.
2. “Protokol DIAMETR. Tehnicheskie materialy IBM” [DIAMETR protocol. IBM technical materials], available at: www.ibm.com/developerworks/ru/library/wi-diameter/ (accessed 20.04.2020).
3. Ankur Lohachab, Anu Lohachab and Ajay Jangra (2020), A Comprehensive Survey of Prominent Cryptographic Aspects for Securing Communication in Post-Quantum IoT Networks, Internet of Things, Vol. 9. https://doi.org/10.1016/j.iot.2020.100174.
4. Positive Technologies (2017), “Ugrozy bezopasnosti jadra paketnoj seti 4G” [4G packet core security threats], available at: https://www.ptsecurity.com/ru-ru/research/analytics/epc-2017/ (accessed 20.04.2020).
5. Positive Technologies (2018), “Ujazvimosti protokola Diameter v setjah 4G” [Diameter protocol vulnerabilities in 4G networks], available at: https://www.ptsecurity.com/ru-ru/research/analytics/diameter-2018/ (accessed 20.04.2020).