1 |
IEEE P1363/D13, 'Standard Specifications for Public Key Cryptography,' 1999
|
2 |
ANSI X9.63, 'Public Key Cryptography for the financial services industry : key agreement and key transport using elliptic curve cryptography,' 2001
|
3 |
W. Diffie, M. E. Hellman, 'New directions in cryptography,' IEEE Trans. Inform. Theory, IT-22, 6, pp.644-654, 1976
DOI
|
4 |
RSA Laboratories Technical Note v1.4, 'PKCS #3 : Diffie-Hellman Key Agreement Standard,' 1993
|
5 |
ANSI X9.42, 'Agreement of symmetric Key on Using Diffie-Hellman Cryptography,' 2001
|
6 |
K. Sakurai and H. Shizuya, 'Relationships among the computational powers of breaking discrete log cryptosystems,' J. Cryptology, Vol.11, pp.29-43, 1998
DOI
|
7 |
M. Mambo and H. Shizuya, 'A note on the complexity of breaking Okamoto-Tanaka Id-based key exchange scheme,' IEICE trans. fundamentals, Vol.E82-A, No.1, January. 1999
|
8 |
R. A Rueppel and P. C vanOorschot,' Computer communications, Vol.17, No.7, pp.458-465, 1994
DOI
ScienceOn
|
9 |
H. Woll, 'Reductions among number theoretic problems,' Information and Computation, Vol.72, pp.167-179, 1987
DOI
|
10 |
K. Sakurai and H. Shizuya, 'Relationships among the computational powers of breaking discrete log cryptosystems,' Proc. Eurocrypt'95, LNCS 921, pp.341-355, Springer Verlag, 1995
|
11 |
R. E. Neopolitan, Kumarss Niamipour, 'Foundations of Algorithms,' pp.409-444, 1999
|
12 |
E.Bach, 'Discrete Logarithms and factoring,' Technical Report UCB/CSD 84/186, University of California, Computer Science Division (EECS), 1984
|
13 |
S. J. Kim, M. Mambo et al., 'On the security of the Okamoto-Tanake ID-Based Key Exchange scheme against Active attacks,' IEICE Trans. pp.231-238, January, 2001
|