Cryptanalysis of Aydos et al.'s ECC-based wireless authentication protocol
暂无分享,去创建一个
[1] B. Sunar,et al. 2nd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, Dallas, Texas, October 30, 1998. An Elliptic Curve Cryptography based Authentication and Key Agreement Protocol for Wireless Communication , 1998 .
[2] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[3] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[4] Çetin Kaya Koç,et al. High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor , 2001 .
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[6] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[7] Ramanujachary Kumanduri,et al. Number theory with computer applications , 1997 .
[8] Alfred Menezes,et al. Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.
[9] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .