A Study on the One-to-Many Authentication Scheme for Cryptosystem Based on Quantum Key Distribution
暂无分享,去创建一个
[1] Lidong Chen,et al. Recommendation for Key Derivation Using Pseudorandom Functions (Revised) , 2009 .
[2] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality [including updates through 7/20/2007] , 2004 .
[3] Morris J. Dworkin. SP 800-38C. Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality , 2004 .
[4] William M. Daley,et al. Security Requirements for Cryptographic Modules , 1999 .
[5] Quynh H. Dang,et al. Secure Hash Standard | NIST , 2015 .
[6] Ju-Sung Kang,et al. Key Derivation Functions Using the Dual Key Agreement Based on QKD and RSA Cryptosystem , 2016 .
[7] Elaine B. Barker. Recommendation for Key Management - Part 1 General , 2014 .
[8] Hugo Krawczyk,et al. HMAC-based Extract-and-Expand Key Derivation Function (HKDF) , 2010, RFC.
[9] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[10] Stefan Rass,et al. BB84 Quantum Key Distribution with Intrinsic Authentication , 2015 .
[11] Miles E. Smid,et al. Security Requirements for Cryptographic Modules | NIST , 1994 .
[12] D. R. Kuhn. A Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography , 2003, quant-ph/0301150.
[13] Gilles van Assche. Quantum Cryptography and Secret-Key Distillation: Cryptosystems based on quantum key distribution , 2006 .
[14] Elaine B. Barker,et al. The Keyed-Hash Message Authentication Code (HMAC) | NIST , 2002 .
[15] Quynh H. Dang,et al. Recommendation for Applications Using Approved Hash Algorithms , 2009 .