共 23 条
- [1] Zhang H., Han W., Lai X., Et al., Survey on cyberspace security, Scientia Scinica: Informations, 46, 2, pp. 125-164, (2016)
- [2] Jian H., Xu Q., Advances in key techniques of practical secure multi-party computation, Journal of Computer Research and Development, 52, 10, pp. 2247-2257, (2015)
- [3] Diffie W., Hellman M., New directions in cryptography, IEEE Trans on Information Theory, 22, 6, pp. 644-654, (1976)
- [4] Lim C.H., Lee P.J., A key recovery attack on discrete long-based schemes using a prime order subgroup, LNCS 1294: Advances in Cryptology 1997, pp. 249-263, (1997)
- [5] Just M., Vaudenay S., Authenticated multi-party key agreement, LNCS 1163: Advances in Cryptology 1996, pp. 36-49, (1996)
- [6] Goss K.C., Cryptographic method and apparatus for public key exchange with authentication
- [7] Menezes A., Qu M., Vanstone S., Some new key agreement protocols providing implicit authentication, Proc of the 2nd Workshop Selected Areas in Cryptography, pp. 89-98, (1995)
- [8] Schneier B., Skipjack and kea algorithm specification version 2.0, (1998)
- [9] Law L., Menezes A., Qu M., Et al., An efficient protocol for authenticated key agreement, Designs, Codes and Cryptography, 28, 2, pp. 119-134, (2003)
- [10] Standard specifications for public-key cryptography, pp. 1-228, (2000)