참고문헌
- M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. Adv. in Cryptology-Crypto '93
- S. Blake-Wilson, D. Johnson, and A. Menezes. Key Agreement Protocols and their Security Analysis. 6th IMA Intl, Conf. on Cryptography and Coding, 1997
- M. Bellare, R. Canetti, and H. Krawczyk. A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. STOC '98 https://doi.org/10.1145/276698.276854
- D. Denning and G. M. Sacco. Timestamps in Key Distribution Protocols. Comm. ACM 24(8): 533-536 (1981) https://doi.org/10.1145/358722.358740
- W. Diffie, P. van Oorschot, and M. Wiener. Authentication and Authenticated Key Exchanges. Designs, Codes, and Cryptography 2(2): 107-125 (1992) https://doi.org/10.1007/BF00124891
- W. Diffie and M. Hellman. New Directions in Cryptography. IEEE Trans. Information Theory 22(6): 644-654 (1976) https://doi.org/10.1109/TIT.1976.1055638
- L. Law, A. Menezes, M. Qu, J. Solinas, and S. Vanstone. An Efficient Protocol for Authenticated Key Agreement. Technical report CORR 98-05, University of Waterloo, 1988
- T. Matsumoto, Y. Takashima, and H. Imai. On Seeking Smart Public-Key Distribution Systems. Trans. of the IECE of Japan, E69, pp.99-106, 1986
- National Security Agency. SKIPJACK and KEA Algorithm Specification. Version 2.0, May 29, 1998
- S. Blake-Wilson and A. Menezes. Authenticated Diffie-Hellman Key Agreement Protocols. Selected Areas in Cryptography, 1998
- R. Ankney, D. Johnson, and M. Matyas. The Unified Model. Contribution to ANSI X9F1, October 1995
- C. Boyd and J.M.G. Nieto. Round-Optimal Contributory Conference Key Agreement. Public Key Cryptography, 2003
- J. Katz and M. Yung. Scalable Protocols for Authenticated Group Key Exchange. Adv. in Cryptology - Crypto 2003
- M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key agreement secure against dictionary attacks. In Proc. of EUROCRYPT '00
- G. Ateniese, M. Steiner, and G. Tsudik. New Multi-Party Authentication Services and Key Agreement Protocols. IEEE J. on Selected Areas in Communications 18(4): 628-639 (2000) https://doi.org/10.1109/49.839937
- M. Bellare, A. Boldyreva, and S. Micali. PublicKey Encryption in a Multi-User Setting: Security Proofs and Improvements. Adv. in Cryptology Eurocrypt 2000
- R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung. Systematic Design of Two-Party Authentication Protocols. IEEE J. on Selected Areas in Communications 11(5): 679-693 (1993) https://doi.org/10.1109/49.223869
- C. Boyd. On Key Agreement and Conference Key Agreement. ACISP 1997
- E. Bresson, O. Chevassut, and D. Pointcheval. Provably Authenticated Group Diffie-Hellman Key Exchange-The Dynamic Case. Adv. in CryptologyAsiacrypt 2001
- E. Bresson, O. Chevassut, and D. Pointcheval. Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. Adv. in Cryptology- Eurocrypt 2002
- E. Bresson, O. Chevassut, D. Pointcheval, and J.- J. Quisquater. Provably Authenticated Group Diffie-Hellman Key Exchange. ACM Conf. on Computer and Communications Security, 2001 https://doi.org/10.1145/501983.502018
- M. Burmester and Y. Desmedt. A Secure and Efficient Conference Key Distribution System. Advances in Cryptology - Eurocrypt '94
- R. Canetti and H. Krawczyk. Universally Composable Notions of Key Exchange and Secure Channels. Adv. in Cryptology - Eurocrypt 2002
- I. Ingemarasson, D.T. Tang, and ex. Wong. A Conference Key Distribution System. IEEE Trans. on Information Theory 28(5): 714-720 (1982) https://doi.org/10.1109/TIT.1982.1056542
- M. Just and S. Vaudenay. Authenticated Multi-Party Key Agreement. Adv. in CryptologyAsiacrypt '96
- V. Shoup. On Formal Models for Secure Key Exchange. Available at http://eprint.iacr.org
- M. Steiner, G. Tsudik, and M. Waidner. Diffie-Hellman Key Distribution Extended to Group Communication. ACM Conf. on Computer and Communications Security, 1996 https://doi.org/10.1145/238168.238182
- W.-G. Tzeng. A Practical and Secure-FaultTolerant Conference-Key Agreement Protocol. Public Key Cryptography, 2000