共 17 条
- [1] Law L., Menezes A., Qu M., Et al., An efficient protocol for authen-ticated key agreement, Designs, Codes and Cryptography, 28, 2, pp. 119-134, (2003)
- [2] Abadlla M., Fouque P.A., Pointcheval D., Password-based authenticated key exchange in the three-party setting, International Workshop on Public Key Cryptography, pp. 65-84, (2005)
- [3] Raimando M.D., Gennaro R., Provably secure threshold pass-word-authenticated key exchange, Journal of Computer and System Sciences, 72, 6, pp. 978-1001, (2006)
- [4] Zhao F., Gong P., Li S., Et al., Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev poly-nomials, Nonlinear Dynamics, 74, 1-2, pp. 419-427, (2013)
- [5] Xie Q., Zhao J., Yu X., Chaotic maps-based three-party pass-word-authenticated key agreement scheme, Nonlinear Dynamics, 74, 4, pp. 1021-1027, (2013)
- [6] Katz J., Vaikuntanathan V., Smooth projective hashing and password-based authenticated key exchange from lattices, Interna-tional Conference on the Theory and Application of Cryptology and Information Security, pp. 636-652, (2009)
- [7] Ding Y., Fan L., Efficient password-based authenticated key exchange from lattices, 2011 Seventh International Conference on Computa-tional Intelligence and Security (CIS), pp. 934-938, (2011)
- [8] Ding J., Xie X., Lin X., A simple provably secure key exchange scheme based on the learning with errors problem, IACR Cryptology Eprint Archive, (2014)
- [9] Fujioka A., Suzuki K., Xagawa K., Et al., Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism, The 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 83-94, (2013)
- [10] Hu X.X., Wei J.H., Ye M., Cryptanalysis of a strongly secure authen-ticated key exchange protocol, Journal of Electronics and Information Technology, 35, 9, pp. 2278-2282, (2013)