References
- IETF, HTTP Authentication: Basic and Digest Access Authentication, RFC 2617, 1999.
- IETF, SIP: Session Initiation Protocol, RFC3261, 2002.
- D. Mishra and A.K. Das, “A Secure and Efficient ECC-based User Anonymity-preserving Session Initiation Authentication Protocol Using Smart Card,” Peer-to-Peer Networking and Appications, Vol. 9, No. 1, pp. 171-192, 2016. https://doi.org/10.1007/s12083-014-0321-z
- H. Arshad and M. Nikooghadam, “An Efficient Sand Secure Authentication and Key Agreement Scheme for Session Initiation Protocol Using ECC,” Multimedia Tools and Applications, Vol. 75, No. 1, pp. 181-197, 2016. https://doi.org/10.1007/s11042-014-2282-x
- P.W. Shor, "Algorithms for Quantum Computation: Discrete Logarithms and Factoring," Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124-134, 1994.
- L.K. Grover, "A Fast Quantum Mechanical Algorithm for Database Search," Proceedings of the Twenty-eighth Annual Association for Computing Machinery Symposium on the Theory of Computing, pp. 212-219, 1996.
- ETSI, Quantum Safe Cryptography and Security, ISBN NO. 979-10-92620-09-0, 2015.
- NIST, Report on Post-Quantum Cryptography, IR 8105, 2016.
- J. Hoffstein, J. Pipher, and J.H. Silverman, "NTRU: A Ring-Based Public Key Cryptosystem," Proceeding of International Algorithmic Number Theory Symposium, Vol. 1423, pp. 267-288, 1998.
- IEEE P1363.1, Draft Standard for Public Key Cryptographic Techniques Based on Hard Problems over Lattices, International Association for Cryptologic Research Eprint Archive, 2008.
- S.H. Jeong, K.S. Park, K.K. Lee, and Y.H. Park, "Secure NTRU-based Authentication and Key Distribution Protocol in Quantum Computing Environments," Journal of Korea Multimedia Society, Vol. 20, No. 8, pp. 1321-1329, 2017. https://doi.org/10.9717/KMMS.2017.20.8.1321
- H. Tu, N. Kumar, N. Chilamkurti, and S. Rho, “An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card,” Peer-to-Peer Networking and Appications, Vol. 8, No. 5, pp. 903-910, 2014.
- NIST, Security Considerations for Voice Over IP Systems, SP 800-58, 2005.