共 50 条
- [2] Weakness and solution of deniable authentication protocol based on Diffie-Hellman algorithm [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 401 - 403
- [5] Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2014, 14 (10): : 995 - 1006
- [6] Cryptanalysis on improved Chou et al.'s ID-based deniable authentication protocol [J]. ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 87 - +
- [7] Making the Diffie-Hellman Protocol Identity-Based [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 165 - +
- [8] A Hybrid Encryption Algorithm based on RSA and Diffie-Hellman [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 55 - 58
- [10] Boneh et al.'s k-element aggregate extraction assumption is equivalent to the Diffie-Hellman assumption [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 392 - 397