共 50 条
- [41] Enhanced authentication and key exchange protocols for roaming service Tongxin Xuebao/Journal on Communications, 2009, 30 (11 A): : 61 - 68
- [43] Authenticated Key Exchange Protocols Based on Factoring Assumption PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 21 - 37
- [44] Composability of Bellare-Rogaway Key Exchange Protocols PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 51 - 61
- [45] Computational Soundness for Key Exchange Protocols with Symmetric Encryption CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 91 - 100
- [46] Security of Group Key Exchange Protocols with Different Passwords 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 147 - 152
- [47] Highly Efficient Key Exchange Protocols with Optimal Tightness ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 767 - 797
- [48] Analyzing the security flaws of internet key exchange protocols Ruan Jian Xue Bao/Journal of Software, 2002, 13 (06): : 1173 - 1177
- [49] Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agreement Protocols ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT III, 2022, 13509 : 252 - 281
- [50] Zero-Knowledge Authentication Scheme with Secret Key Exchange Journal of Cryptology, 1998, 11 : 147 - 159