1 |
M. Abdalla, E. Bresson, O. Chevassut, and D. Pointcheval. Password-based Group Key Exchange in a Constant Number of Rounds, In Proc. of PKC '06, LNCS 3958, pages 427-442 , 2006
|
2 |
J. W. Byun and D. H. Lee. Password-Authenticated Key Exchange between Clients with Different Passwords, In Proc. of ACNS '05, LNCS 3531, pages 75-90, 2005
|
3 |
M. Burmester and Y. Desmedt. A Secure and Efficient Conference Key Distribution System, In Proc. of EUROCRYPT '94, LNCS 950, pages 275-286, Springer-Verlag, 1995
|
4 |
S. M. Lee, J. Y. Hwang and D. H. Lee. Efficient Password-Based Group Key Exchange, In Proc. of TrustBus '04, LNCS 3184, pages 191-199, Springer-Verlag, 2004
|
5 |
Raphael C.-W. Phan and B.-M Goi. Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords, In Proc. of ACNS '06, LNCS 3989, pp. 226-238, Springer-Verlag, 2006
|
6 |
E. Bresson, O. Chevassut, and D. Pointcheval. Group Diffie-Hellman Key Exchange Secure Against Dictionary Attacks, In Proc. of ASIACRYPT 2002, LNCS 2501, pages 497-514, Springer-Verlag, 2002
|
7 |
J. O. Kwon, I. R. Jeong, D. H. Lee. One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange, In Proc. of CMS 2006, LNCS 4237, pages 87-96, Springer-Verlag, 2006
|
8 |
N. Asokan and P. Ginzboorg. Key Agreement in Ad-hoc Networks, Journal of Computer Communications 23(17), pages 1627-1637, 2000
DOI
ScienceOn
|
9 |
J. O. Kwon, I. R. Jeong, D. H. Lee. Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model, In Proc. of IWSEC '06, LNCS 4266, pp. 322-336, 2006
|
10 |
Q. Tang and L. Chen. Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols, IACR ePrint Archive, 2005/197, 2005
|
11 |
J. W. Byun and D.H. Lee. Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols, IACR ePrint Archive, 2005/209, 2005
|