Enhancing the Resistence of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack
暂无分享,去创建一个
[1] Serge Vaudenay,et al. Authenticated Multi-Party Key Agreement , 1996, ASIACRYPT.
[2] Kwangjo Kim,et al. Advances in Cryptology — ASIACRYPT '96 , 1996, Lecture Notes in Computer Science.
[3] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[4] William Allen Simpson,et al. Photuris: Session-Key Management Protocol , 1999, RFC.
[5] Alfred Menezes,et al. Key Agreement Protocols and Their Security Analysis , 1997, IMACC.
[6] Pekka Nikander,et al. Stateless connections , 1997, ICICS.
[7] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[8] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[9] Claus-Peter Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1990, EUROCRYPT.
[10] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[11] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[12] Colin Boyd,et al. Cryptography and Coding , 1995, Lecture Notes in Computer Science.
[13] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[14] Ernest F. Brickell,et al. Advances in Cryptology — CRYPTO’ 92 , 2001, Lecture Notes in Computer Science.
[15] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[16] Shoichi Hirose,et al. An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks , 1998, Public Key Cryptography.
[17] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.