Towards a classification of key agreement protocols
暂无分享,去创建一个
[1] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[2] Ed Dawson,et al. Multistage secret sharing based on one-way function , 1994 .
[3] Charles Cresson Wood,et al. Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50 , 1985, Computers & security.
[4] Christian Waldvogel,et al. The Probability Distribution of the Diffie-Hellman Key , 1992, AUSCRYPT.
[5] Christoph G. Günther,et al. An Identity-Based Key-Exchange Protocol , 1990, EUROCRYPT.
[6] Colin Boyd,et al. Designing Secure Key Exchange Protocols , 1994, ESORICS.
[7] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[9] L. Gong,et al. Using one-way functions for authentication , 1989, CCRV.
[10] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..