E. Andrew YoungT. Hudson OpenSSL library 1998 URL https://www.openssl.org/
E. BarkerQ. Dang NIST Special Publication 800-57, Part 3: Application-Specific Key Management Guidance 2015
M. BellareP. Rogaway The exact security of digital signatures-how to sign with rsa and rabin International Conference on the Theory and Applications of Cryptographic Techniques 399 416 Springer 1996
J. Böck RSA-PSS–Provable secure RSA Signatures and their Implementation Jan 31 2019 2011
G. ElbezH. B. KellerV. Hagenmeyer A Cost-efficient Software Testbed for Cyber-Physical Security in IEC 61850-based Substations 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm) 1 6 Oct 2018 [10.1109/SmartGridComm.2018.8587456]
F. FangD.-h. WANGX.-h. XUANJ.-h. XIEC. Qing Application research of hmac in intelligent substation communication security DEStech Transactions on Engineering and Technology Research 2018
S. M. FarooqS. S. HussainT. S. Ustun Performance evaluation and analysis of IEC 62351-6 probabilistic signature scheme for securing GOOSE messages IEEE Access 7 32343 32351 2019
F. HohlbaumM. BraendleF. Alvarez Cyber Security Practical considerations for implementing IEC 62351 PAC World Conference 2010
J. HoyosM. DehusT. X. Brown Exploiting the GOOSE protocol: A practical attack on cyber-infrastructure Globecom Workshops (GC Wkshps), 2012 IEEE 1508 1513 IEEE 2012
International Electrotechnical Commission (IEC) IEC 61850: Power Utility Automation (TC57) 2007
International Electrotechnical Commission (IEC) IEC 62351: Power systems management and associated information exchange - data and communications security - part 6: Security for IEC 62351 2010
International Electrotechnical Commission (IEC) IEC 61850: Communication networks and systems for power utility automation in substation - part 8.1 2011
D. IshchenkoR. Nuqui Secure communication of intelligent electronic devices in digital substations 2018 IEEE/PES Transmission and Distribution Conference and Exposition (T&D) 1 5 IEEE 2018
H. KrawczykM. BellareR. Canetti HMAC: Keyed-hashing for message authentication 1997
N. KushE. AhmedM. BranaganE. Foo Poisoned GOOSE: exploiting the GOOSE protocol Proceedings of the Twelfth Australasian Information Security Conference-Volume 149 17 22 Australian Computer Society, Inc 2014
R. L. RivestA. ShamirL. Adleman A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM 21 2 120 126 1978