A Secure and Efficient Authenticated Diffie-Hellman Protocol
暂无分享,去创建一个
[1] David Pointcheval,et al. The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes , 2001, Public Key Cryptography.
[2] Edlyn Teske. On random walks for Pollard's rho method , 2001, Math. Comput..
[3] Nigel P. Smart,et al. Analysis of the Insecurity of ECMQV with Partially Known Nonces , 2003, ISC.
[4] Nicolas Thériault,et al. Solving Discrete Logarithms from Partial Knowledge of the Key , 2007, INDOCRYPT.
[5] Edlyn Teske. Square-root algorithms for the discrete logarithm problem (a survey) , 2001 .
[6] Mihir Bellare,et al. The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols , 2004, CRYPTO.
[7] Berkant Ustaoglu,et al. Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS , 2008, Des. Codes Cryptogr..
[8] Alfred Menezes,et al. On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols , 2006, INDOCRYPT.
[9] Alfred Menezes,et al. Another look at HMQV , 2007, J. Math. Cryptol..
[10] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[11] David Pointcheval,et al. About the Security of MTI/C0 and MQV , 2006, SCN.
[12] Zhenfu Cao,et al. Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol , 2008, IEEE Communications Letters.
[13] Hugo Krawczyk,et al. HMQV: A High-Performance Secure Diffie-Hellman Protocol , 2005, CRYPTO.
[14] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[15] Hassan M. Elkamchouchi,et al. An efficient protocol for authenticated key agreement , 2011, 2011 28th National Radio Science Conference (NRSC).
[16] Ueli Maurer,et al. Diffie-Hellman Oracles , 1996, CRYPTO.
[17] David A. Basin,et al. From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries , 2009, IACR Cryptol. ePrint Arch..
[18] D. Pointcheval. Les preuves de connaissance et leurs preuves de sécurité , 1996 .
[19] Alfred Menezes,et al. On reusing ephemeral keys in Diffie-Hellman key agreement protocols , 2010, Int. J. Appl. Cryptogr..
[20] Kristin E. Lauter,et al. Stronger Security of Authenticated Key Exchange , 2006, ProvSec.