Cryptanalysis and improvement of the Lee-Lee identity-based key agreement protocol
暂无分享,去创建一个
[1] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[2] Nigel P. Smart,et al. AN IDENTITY BASED AUTHENTICATED KEY AGREEMENT PROTOCOL BASED ON THE WEIL PAIRING , 2001 .
[3] Eun-Jun Yoon,et al. An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings , 2004, NETWORKING.
[4] Kim-Kwang Raymond Choo. On the Security Analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement Protocols , 2006, Informatica.
[5] Zhenfu Cao,et al. Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings , 2005, ISPA Workshops.
[6] Shyi-Tsong Wu,et al. Identity-Based Key Agreement for Peer Group Communication from Pairings , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[7] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[8] Gao Hai-ying. Efficient ID-based authenticated key agreement protocol , 2012 .
[9] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[10] Hyang-Sook Lee,et al. IDENTITY BASED AUTHENTICATED KEY AGREEMENT FROM PAIRINGS , 2005 .
[11] Liqun Chen,et al. Identity-based key agreement protocols from pairings , 2017, International Journal of Information Security.
[12] Colin Boyd,et al. Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.
[13] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[14] Yuh-Min Tseng,et al. An Efficient Two-Party Identity-Based Key Exchange Protocol , 2007, Informatica.
[15] Kyung-Ah Shim. Efficient ID-based authenticated key agreement protocol based on Weil pairing , 2003 .
[16] Hung-Min Sun,et al. Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings , 2003, IACR Cryptol. ePrint Arch..
[17] Colin Boyd,et al. Security of Two-Party Identity-Based Key Agreement , 2005, Mycrypt.
[18] Colin Boyd,et al. On Session Key Construction in Provably-Secure Key Establishment Protocols , 2005, Mycrypt.
[19] Gene Tsudik,et al. Secure and minimal protocols for authenticated key distribution , 1995, Comput. Commun..
[20] Alfred Menezes,et al. Authenticated Diffie-Hellman Key Agreement Protocols , 1998, Selected Areas in Cryptography.