Computer Science ›› 2013, Vol. 40 ›› Issue (11): 98-102.
Previous Articles Next Articles
TAO Wen-jun and HU Bin
[1] Canetti R,Krawczyk H.Analysis of Key-Exchange Protocolsand Their Use for Building Secure Channels[C]∥Advances in Cryptology — EUROCRYPT ’01.Springer-Verlag,2001:453-474 [2] LaMacchia B,Lauter K,Mityagin.A Stronger security of authenticated key exchange[C]∥Lecture Notes in Computer Science 4784.Berlin:Springer,2007:1-16 [3] Krawczyk H.HMQV:A High-Performance Secure Diffie-Hellman Protocol[C]∥Advances in Cryptology CRYPTO’05,LNCS3621.Springer-Verlag,2005:546-566 [4] Cas J F,Cremers.Formally and practically relating the CK,CK-HMQV and eCK security models for authenticated key exchange.http://eprint.iacr.org/2009/253.pdf [5] Cheng Qing-feng,Ma Chuang-gui, Wei Fu-shan.A modified eCK model with stronger security for tripartite authenticated key exchange.http://eprint.iacr.org/2010/ 042.pdf [6] Zhao Jian-jie,Gu Da-wei.Provably secure two-party authenticated key exchange protocol in eCK model[J].Chinese journal of computers,2011,34(1) [7] Zhou Qing-lei,Yang Zeng-fu.TUP:A new eCK-secure AKEprotocol under the CDH assumption[J].International Journal of Communications,Network and System Sciences,2012:5(6):332 [8] Pan Jin-xin,Wang Li-lin.TMQV:A strongly eCK-secure Diffie-Hellman protocol without Gap assumption[J].Journal of international services and informatin security,2012,1(2/3):107-124 [9] Fujioka A,Suzuki K.Designing Efficient Authenticated Key Ex-change Resilient to Leakage of Ephemeral Secret Keys[J].Lecture Notes in Computer Science,2011,6558:121-141 [10] Ustaoglu B.Obtaining a secure and efficient key agreement Drotocol from(H) MQV and NAXOS[J].Designs,Codes and Cryptography,2008,46(3):329-342 [11] 贾小英,李宝,刘亚敏.随机谕言模型[J].软件学报,2012,23(1)141-151 |
No related articles found! |
|