Mutual Authentication and Key Agreement based on Elliptic Curve Cryptography for GSM
暂无分享,去创建一个
K. Ammayappan | A. Negi | A. Saxena | A. Saxena | A. Negi | A. Saxena | K. Ammayappan
[1] K. Lauter,et al. The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.
[2] Liu Zhi-meng. An elliptic curve cryptography based on authentication and key agreement protocol for wireless communication , 2008 .
[3] Chin-Chen Chang,et al. Efficient authentication protocols of GSM , 2005, Comput. Commun..
[4] Eli Biham,et al. Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication , 2003, Journal of Cryptology.
[5] Cheng-Chi Lee,et al. Extension of authentication protocol for GSM , 2003 .
[6] Ali Aydin Selçuk,et al. A strong user authentication protocol for GSM , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).
[7] Min-Shiang Hwang,et al. An efficient authentication protocol for GSM networks , 2000, IEEE/AFCEA EUROCOMM 2000. Information Systems for Enhanced Public Safety and Security (Cat. No.00EX405).
[8] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[9] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[10] Ashutosh Saxena,et al. Mutual Authentication and Key Agreement for GSM , 2006, 2006 International Conference on Mobile Business.
[11] Robert Cole,et al. Computer Communications , 1982, Springer New York.
[12] N. Koblitz. Elliptic curve cryptosystems , 1987 .