Simple three-party key exchange protocol
Tài liệu tham khảo
Abdalla, 2005, Simple password-based encrypted key exchange protocols
Bellovin, 1992, Encrypted key exchange: password-based protocols secure against dictionary attacks, 72
Blake-Wilson, 1997, Key agreement protocols and their security analysis, 30
Boyd, 2004, Key agreement using statically keyed authenticators
Chang, 2004, A novel three-party encrypted key exchange protocol, Computer Standards and Interfaces, 26, 471, 10.1016/j.csi.2003.12.001
Diffie, 1976, New directions in cryptography, IEEE Transactions on Information Theory, IT, 22, 644, 10.1109/TIT.1976.1055638
Ding, 1995, Undetectable on-line password guessing attacks, ACM Operating Systems Review, 29, 77, 10.1145/219282.219298
Law, 2003, An efficient protocol for authenticated key agreement, Designs, Codes and Cryptography, 28, 119, 10.1023/A:1022595222606
Lee, 2004, Enhanced three-party encrypted key exchange without server public keys, Computers and Security, 23, 571, 10.1016/j.cose.2004.06.007
Lee, 2005, Efficient verifier-based key agreement protocol for three parties without server's public key, Applied Mathematics and Computation, 167, 996, 10.1016/j.amc.2004.06.129
Lin, 2000, Three party-encrypted key exchange: attacks and a solution, ACM Operating Systems Review, 34, 12, 10.1145/506106.506108
Lin, 2001, Three-party encrypted key exchange without server public-keys, IEEE Communication Letters, 5, 497, 10.1109/4234.974498
Steiner, 1995, Refinement and extension of encrypted key exchange, ACM Operating Systems Review, 29, 22, 10.1145/206826.206834
Sun, 2005, Secure key agreement protocols for three-party against guessing attacks, The Journal of Systems and Software, 75, 63, 10.1016/j.jss.2003.11.017
Zhang, 2002, ID-based one round authenticated tripartite key agreement protocol with pairings