Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves
暂无分享,去创建一个
[1] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[2] Chris J. Mitchell,et al. Key control in key agreement protocols , 1998 .
[3] M. Saeb,et al. A new two-pass key agreement protocol , 2003, 2003 46th Midwest Symposium on Circuits and Systems.
[4] B. MacWhinney. A UNIFIED MODEL , 2007 .
[5] Hideki Imai,et al. ON SEEKING SMART PUBLIC-KEY-DISTRIBUTION SYSTEMS. , 1986 .
[6] J. M. Irvine,et al. CHAPTER 17 – THE UNIFIED MODEL , 1972 .
[7] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[8] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[9] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[10] Nigel P. Smart,et al. Analysis of the Insecurity of ECMQV with Partially Known Nonces , 2003, ISC.
[11] Alfred Menezes,et al. An Efficient Protocol for Authenticated Key Agreement , 2003, Des. Codes Cryptogr..
[12] Burton S. Kaliski,et al. An unknown key-share attack on the MQV key agreement protocol , 2001, ACM Trans. Inf. Syst. Secur..
[13] Victor Shoup,et al. On Formal Models for Secure Key Exchange , 1999, IACR Cryptol. ePrint Arch..
[14] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[15] Kwangjo Kim,et al. Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation , 2000, INDOCRYPT.
[16] Alfred Menezes,et al. Key Agreement Protocols and Their Security Analysis , 1997, IMACC.
[17] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[18] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.