共 22 条
- [1] A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves [J]. NETWORKING 2008: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2008, 4982 : 170 - +
- [2] AN EFFICIENT AND SECURE THREE-PASS AUTHENTICATED KEY AGREEMENT ELLIPTIC CURVE BASED PROTOCOL [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1273 - 1284
- [3] Cryptanalysis of a Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves [J]. JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (02): : 247 - 250
- [4] Security Analysis Combination Secret Sharing Protocol and Three-Pass Protocol [J]. 1ST INTERNATIONAL CONFERENCE ON ADVANCE AND SCIENTIFIC INNOVATION, 2019, 1175
- [5] Questioning the Security of Three Recent Authentication and Key Agreement Protocols [J]. IEEE ACCESS, 2021, 9 : 98204 - 98217
- [6] Key agreement protocols and their security analysis (Extended abstract) [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 1997, 1355 : 30 - 45
- [7] Security analysis and applications of standard key agreement protocols [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2003, PT 2, PROCEEDINGS, 2003, 2668 : 191 - 200
- [8] Analysis on Security Proof of Two Key Agreement Protocols [J]. NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 531 - +
- [9] Security analysis on tripartite authenticated key agreement protocols [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4653 - +
- [10] Security analysis of password-authenticated key agreement protocols [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 49 - 58