Publisher
Springer Science and Business Media LLC
Reference22 articles.
1. R. M. Needham and M. D. Schroeder, “Using encryption for authentication in large networks of computers,” Commun. ACM, Vol. 21, No. 12, 993–999 (1978). https://doi.org/10.1145/359657.359659.
2. W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Trans. Inf. Theory, Vol. 22, No. 6, 644–654 (1976). https://doi.org/10.1109/TIT.1976.1055638.
3. A. Menezes, M. Qu, and S. Vanstone, “Key agreement and the need for authentication,” in: Workshop Records of PKS’95, Toronto, Canada, November (1995).
4. L. Law, A. Menezes, M. Qu, J. Solinas, and S. Vanstone, “An efficient protocol for authenticated key agreement,” Designs, Codes and Cryptography, Vol. 28, No. 2, 119–134 (2003). https://doi.org/10.1023/A:1022595222606.
5. B. S. Kaliski, “An unknown key-share attack on the MQV key agreement protocol,” ACM Transactions on Information and System Security, Vol. 4, No. 3, 275–288 (2001). https://doi.org/10.1145/501978.501981.