1 |
NIST, "Recommendation for Key Management", NIST Special Publication 800-57 Part 1, Revision 4, 2016.
|
2 |
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, Vol.22, Issue 6, pp.644-654, Nov. 1976.
DOI
|
3 |
Dae Hun Nyang and Kyung Hee Lee, "Information Security: One Variant of Diffie-Hellman Key Exchange Protocol," The KIPS Transactions: Part C, Vol.14, No.6, pp.9-17, Oct. 2010.
|
4 |
A.-R. Sadeghi and M. Steiner, "Assumptions related to discrete logarithms: Why subtleties make a real difference," Advances in Cryptology - EUROCRYPT 2001 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings, 2045: 244-261, 2001.
|
5 |
T. Elgamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory IEEE Trans. Inform. Theory Information Theory, IEEE Transactions on. Vol.31, Issue 4, pp.469-472, Jul. 1985.
DOI
|
6 |
R. L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, Vol.21, Issue 2, pp.120-126, Feb. 1978.
DOI
|