References
- I. Ingemarsson, D. T. Tang, C.K. Wong, 'A conference key distribution system,' IEEE Transactions on Information Theory, IT-28(5), pp. 714-720, September 1982
- M. Burmester, Y. Desmedt, 'A secure and efficient conference key distribution system,' In Advances in Cryptology-Eurocrypt'94, Springer-Verlag, pp. 275-286, 1995
- M. Steiner, G. Tsudik, M. Waidner, 'Diffie-Hellman Key Distribution Extended to Group Communication,' Proc. of the 3rd A CM Conference on Computer and Communication Security(CCS'96), pp. 31-37, March 1996 https://doi.org/10.1145/238168.238182
- E. Bresson, O. Chevassut, A. Essiari, D. Pointcheval, 'Mutual Authentication and Group Key Agreement for Low-Power Mobile Devices,' International Conference on Mobile and Wireless Communications Networks, Springer-Verlag,, Lecture Notes in Computer Science, LNCS 1514, pp. 59-62, 2003
- J. Nam, S. Kim, D. Won, 'A Weakness in the Bresson-Chevassut-Essiari-Pointcheval' s Group Key Agreement Scheme for Low-Power Mobile Devices,' In Cryptology ePrint Archive, Report 2004/251, to appear, IEEE Communications Letters, 2005
- J. Nam, J. Lee, S. Kim, D. Won, 'DDH-based Group Key Agreement in a Mobile Environment,' In Cryptology ePrint Archive, Report 2004/127, to appear, Journal of Systems and Software(JSS), 2005
- C. Carroll, Y. Frankel, Y. Tsiounis, 'Efficient key distribution for slow computing devices Achieving fast over-the-air activation for wireless systems,' In IEEE Symposium on Security and Privacy (S&P '98), May 1998 https://doi.org/10.1109/SECPRI.1998.674824
- S. Bellovin, M. Merrit, 'Encrypted key exchange: password based protocols secure against dictionary attacks,' In Proc. of the Symposium on Security and Privacy, pp. 72-84, 1992 https://doi.org/10.1109/RISP.1992.213269
- M. Bellare, D. Pointcheval, P. Rogaway, 'Authenticated key exchange secure against dictionary attacks,' In Advances in Cryptology Eurocrypt 2000, Springer-Verlag, pp. 139-155, 2000
- J. Katz, R. Ostrovsky, M. Yung, 'Efficient Password-Authenticated key exchange Using human-Memorable Passwords,' In Advances in Cryptology-Eurocrypt 2001, Springer-Verlag, pp. 475-494, 2001
- M. Steiner, G. Tsudik, M. Waidner, 'Refinement and extension of Encrypted Key Exchange,' ACM Operating Systems Review, vol. 29, no. 3, pp. 22-30, 1995 https://doi.org/10.1145/206826.206834
- J. W. Byun, I. R. Jeong, D. H. Lee, C. S. Park, 'Password-Authenticated Key Exchange between Clients with Different Passwords,' 4th International Conference on Information and Communication Security(ICICS), pp. 134-146, 2002 https://doi.org/10.1007/3-540-36159-6_12
- J. Kim, S. Kim, J. Kwak, D. Won, 'Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords,' 2nd Computational Science and Its Applications(ICCSA), pp. 895-902, May 2004
- N. Asokan, P. Ginzboorg, 'Key Agreement in Ad-hoc Networks,' Expanded version of a talk given at the Nordsec'99 workshop, Februry 2000
- E. Bresson, O. Chevassut, D. Pointcheval, 'Group Diffie-Hellman Key Exchange Secure Against Dictionary Attacks,' Advances in Cryptology Asiacrypt'02, LNCS vol. 2501, Springer-Verlag. pp. 497-514, 2002
- S. Keung, K. Siu, 'Efficient Protocols Secure Against Guessing and Replay Attacks,' Proceedings of the Fourth International Conference on Computer Communications and Networks, pp. 105-112, 1995 https://doi.org/10.1109/ICCCN.1995.540108