|
[1]W. Diffie and M. Hellman. “New Directions In Cryptography,” IEEE Transaction on Information Theory, IT-22(6): 644-645, November, 1976. [2]D. R. Stinson. “Cryptography: Theory and Practice,” CRC Press, 1995. [3]S. M. Bellovin and M. Merrit. “Encrypted key exchange: password based protocols secure against dictionary attacks,” In: Proceedings of IEEE symposium on research in security and privacy. IEEE Computer Society Press, May 1992. pp. 72-84. [4]M. Steiner, G. Tsudik and M. Waidner. “Refinement and extension of encrypted key exchange,” ACM Operating Systems Review 1995, 29(3):22¬-30. [5]Y. Ding and P. Horster. “Undetectable on-line password guessing attacks,” ACM Operating Systems Review 1995, 29(4):77-86. [6]C. L. Lin, H. M. Sun and T. Hwang. “Three party-encrypted key exchanges: attacks and a solution,” ACM Operating Systems Review 2000, 34(4):12-20. [7]C. L. Lin, H. M. Sun, M. Steiner and T. Hwang. “Three-party encrypted key exchange without server public-keys,” IEEE Communication Letters 2001, 5(12):497-9. [8]L. Law, A. Menezes, M. Qu, J. Solinas and S. Vanstone. “An efficient protocol for authenticated key agreement,” Designs, Codes and Cryptography March 2003, 28(2):119-34. [9]C. C. Chang and Y. F. Chang. “A novel three-party encrypted key exchange protocol,” Computer Standards and Interfaces 2004, 26(5):471-6. [10]T. F. Lee, T. Hwang and C. L. Lin. “Enhanced three-party encrypted key exchange without server public keys,” Computers & Security 2004, 23(7):571-7. [11]S. W. Lee, H. S. Kim and K. Y. Yoo. “Efficient verifier-based key agreement protocol for three parties without server’s public key,” Applied Mathematics and Computation 2005, Vol 167, pp. 996-1003. [12]M. Abdalla and D. Pointcheval. “Simple password-based encrypted key exchange protocols,” Topics in cryptology – CT-RSA 2005, In: LNCS, Springer-Verlag; 2005, pp. 191-208. [13]R. Lu and Z. Cao. “Simple Three-party Key Exchange Protocol,” Computers & Security 2007, Vol. 26, pp. 94-97. [14]H. Guo, Z. Li, Y. Mu and X. Zhang. “Cryptanalysis of Simple Three-Party Key Exchange Protocol,” Computers & Security 2008, doi: 10.1016/j.cose.2008.03.001. [15]Y. Ding and P. Horster. “Undetectable on-line password guessing attacks,” ACM Operating System Review 1995, Vol. 29, pp. 77-86. [16]IEEE 2002, Standard specifications for public key cryptography, IEEE 1363.
|