References
- C. Boyd and A. Mathuria, 'Key establishment protocols for secure mobile communications: A selective survey,' in ACISP'98, Lecture Notes in Computer Science, Vol. 1438, pp. 344-355, 1998 https://doi.org/10.1007/BFb0053746
- K. Vedder, 'Security aspects of mobile communications,' in Computer Security and Industrial Cryptography, LNCS 741, pp. 193-210, Springer Verlag, 1993 https://doi.org/10.1007/3-540-57341-0_63
- S. Lee, S.- M. Hong, H. Yoon, and Y. Cho, 'Accelerating key establisment protocol in mobile communication,' in to be appeared in LNCS series - Information Security and Privacy, 1999 https://doi.org/10.1007/3-540-48970-3_5
- W.Diffie and M.E.Hellman, 'New direction in cryptography,' IEEE Trans. Computers, Vol. IT-22, pp. 644-654, June 1976
- L. Gong, 'Increasing availability and security of an authentication service,' IEEE Journal on Selected Areas in Communications, Vol. 11, no. 5, pp. 657-662, 1993 https://doi.org/10.1109/49.223866
- U. Blumenthal, N.C.Hien, and J.H.Rooney, 'Low-cost secure server connection with limited-privilege clients,' in ACISP'98, Lecture Notes in Computer Science No.1438 (C. Boyd and E. Dawson, eds.), pp. 90-98, 1998 https://doi.org/10.1007/BFb0053724
- ISO, Open systems interconnection reference model-part 2: Security architecture,' ISO nternational Standard 7498-2, 1988
- W. Fumy and P. Landrock, 'Principles of key management,' IEEE journal on Selected Areas in Communications, Vol. 11, no. 5, pp. 785-793, 1993 https://doi.org/10.1109/49.223881
- T.Matsumoto, K.Kato, and H.Imai. 'Speeding up secret computations with insecure auxiliary devices,' in Crypto'88, pp. 497-506, 1988
- A. Shamir, 'How to share a secret,' Communications of the ACM, Vol. 22, no. 11, pp. 612-613, 1979 https://doi.org/10.1145/359168.359176
- G.R.Blakley, 'Safeguarding cryptographic keys,' in Proceedings of National Computer Conference (AFIPS'79), pp. 313-317, 1979
- M.P.Herlihy and J.D.Tygar, 'How to make replicated data secure,' in Advances in Cryp-tology - Proceedings of Crypto'87, LNCS 293, pp. 379-391, 1987
- M. Bellare, J. A Garay, and T. Rabin, 'Fast batch veri cation for modular exponentiatio and digital signature,' in Advances in Cryptology EUROCRYPT'98, LNCS1403, pp. 236-250, Springer Verlag, 1998 https://doi.org/10.1007/BFb0054130
- A. Fiat, 'Batch RSA,' Journal of Cryptology, Vol. 10, no. 2, pp. 75-88, 1997 https://doi.org/10.1007/s001459900021
- Y. Yacobi and M. J. Beller, 'Batch diffe-hellman key agreement systems,' Journal of Cryptology, Vol. 10, no. 2, pp. 89-96, 1997 https://doi.org/10.1007/s001459900022
- D. M'Raihi and D. Naccache, 'Batch exponentiation - a fast dlp based signature generation strategy,' in 3rd ACM Conference on Computer and Communications Security, pp. 58-61, ACM, 1994 https://doi.org/10.1145/238168.238187
- S.-M.Yen, 'Cryptanalysis of secure addition chain for sasc applications,' Electronics Letters, Vol. 31, no. 3, pp. 175-176, 1995 https://doi.org/10.1049/el:19950130
- S.-M.Yen and C.-S.Laih, 'More about the active attak on the server-aided secret computation protocol,' Electronics Letters, Vol. 28, no. 24, p. 2250, 1992 https://doi.org/10.1049/el:19921446
- R.J.Anderson, 'Attack on server assisted authentication protocols,' Electronics Letters, Vol. 28, no. 15, p. 1473, 1992 https://doi.org/10.1049/el:19920937
- B.Pfitzmann and M.Waidner, 'Attacks on protocols for server-aided RSA computation,' in Eurocrypt'92, pp. 153-162, 1992
- C.H.Lim and P.J.Lee, 'Security and performance of server-aided RSA computation protocols,' in Crypto'95, pp. 70-83, 1995
- J.Burns and C.J.Mitchell, 'Parameter selection for server-aided RSA computation schemes,' IEEE Trans. on Computers, Vol. 43, no. 2, pp. 163-174, 1994 https://doi.org/10.1109/12.262121
- C.HLim and P.J.Lee, 'Server(prover/signer)-aided verification of identity proofs and signature,' in Eurocrypt'95, pp. 64-78, 1995
- S.Kawamura and AShimbo, 'Fast server-aided secret computation protocols for modular exponentiation,' IEEE JSAC, Vol. 11, no. 5, pp. 778-784, 1993 https://doi.org/10.1109/49.223880
- S.-M. Hong, J.-B. Shin, H.Lee-Kwnag, and H. Yoon, 'A new approach to server-aided secret computation,' In International Conference on Information Secuirty and Cryptology (ICISC'98), pp. 33-45, 1998
- P. Nguyen and J. Stern, 'The beguin-quisquater server-aided RSA protocol from crypto'95 is not secure,' In Advances In Cryptology Asiacrypt'98, LNCS 1514, pp. 372-379, Springer Verlag, 1998
- P. Beguin and J.-J. Quisquater, 'Secure acceleration of DSS signatures using insecure server,' in Asiacrypt'94, pp. 249-259, 1994 https://doi.org/10.1007/BFb0000439
- Rivest, R., A. Shamir and L. Adleman, 'A Method for Obtaining Digital Signature and Public Key Cryptosystems', Comm. of ACM, 21, pp.120-126, 1978 https://doi.org/10.1145/359340.359342
- P.Beguin and J.J.Quisquater, 'Fast server-aided RSA signatures secure against active attacks,' in Crypto'95, pp. 57-69, 1995
- CCITT (Consultative Committee on International Telegraphy and Telephony), Recommen-dation X:509: The DirectoryAuthentication Framework, 1988
- J.- J. Quisquater and C.Couvreur, 'Fast decipherment algorithm for RSA public-key cryptosystem,' Electronics Letters, Vol. 18, no. 21, pp. 905-907, 1982 https://doi.org/10.1049/el:19820617
- D.E.Knuth, The art of computer programming Vol.2. Addition-Wesley.Inc., 1981
- E. F.Brickell, D. M.Gordon, K. S.McCurley, and D. B.Wilson, 'Fast exponentiation with precomputation,' in Advances in Cryptology - Eurocrypt'92, LNCS 658, pp. 200-207, 1993