1 |
E. Bresson, O. Chevassut, D. Pointcheval, 'Group Diffie-Hellman Key Exchange Secure Against Dictionary Attacks,' Advances in Cryptology Asiacrypt'02, LNCS vol. 2501, Springer-Verlag. pp. 497-514, 2002
|
2 |
S. Keung, K. Siu, 'Efficient Protocols Secure Against Guessing and Replay Attacks,' Proceedings of the Fourth International Conference on Computer Communications and Networks, pp. 105-112, 1995
DOI
|
3 |
J. W. Byun, I. R. Jeong, D. H. Lee, C. S. Park, 'Password-Authenticated Key Exchange between Clients with Different Passwords,' 4th International Conference on Information and Communication Security(ICICS), pp. 134-146, 2002
DOI
|
4 |
J. Kim, S. Kim, J. Kwak, D. Won, 'Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords,' 2nd Computational Science and Its Applications(ICCSA), pp. 895-902, May 2004
|
5 |
N. Asokan, P. Ginzboorg, 'Key Agreement in Ad-hoc Networks,' Expanded version of a talk given at the Nordsec'99 workshop, Februry 2000
|
6 |
J. Katz, R. Ostrovsky, M. Yung, 'Efficient Password-Authenticated key exchange Using human-Memorable Passwords,' In Advances in Cryptology-Eurocrypt 2001, Springer-Verlag, pp. 475-494, 2001
|
7 |
M. Steiner, G. Tsudik, M. Waidner, 'Refinement and extension of Encrypted Key Exchange,' ACM Operating Systems Review, vol. 29, no. 3, pp. 22-30, 1995
DOI
|
8 |
C. Carroll, Y. Frankel, Y. Tsiounis, 'Efficient key distribution for slow computing devices Achieving fast over-the-air activation for wireless systems,' In IEEE Symposium on Security and Privacy (S&P '98), May 1998
DOI
|
9 |
M. Bellare, D. Pointcheval, P. Rogaway, 'Authenticated key exchange secure against dictionary attacks,' In Advances in Cryptology Eurocrypt 2000, Springer-Verlag, pp. 139-155, 2000
|
10 |
S. Bellovin, M. Merrit, 'Encrypted key exchange: password based protocols secure against dictionary attacks,' In Proc. of the Symposium on Security and Privacy, pp. 72-84, 1992
DOI
|
11 |
E. Bresson, O. Chevassut, A. Essiari, D. Pointcheval, 'Mutual Authentication and Group Key Agreement for Low-Power Mobile Devices,' International Conference on Mobile and Wireless Communications Networks, Springer-Verlag,, Lecture Notes in Computer Science, LNCS 1514, pp. 59-62, 2003
|
12 |
M. Steiner, G. Tsudik, M. Waidner, 'Diffie-Hellman Key Distribution Extended to Group Communication,' Proc. of the 3rd A CM Conference on Computer and Communication Security(CCS'96), pp. 31-37, March 1996
DOI
|
13 |
J. Nam, S. Kim, D. Won, 'A Weakness in the Bresson-Chevassut-Essiari-Pointcheval' s Group Key Agreement Scheme for Low-Power Mobile Devices,' In Cryptology ePrint Archive, Report 2004/251, to appear, IEEE Communications Letters, 2005
|
14 |
J. Nam, J. Lee, S. Kim, D. Won, 'DDH-based Group Key Agreement in a Mobile Environment,' In Cryptology ePrint Archive, Report 2004/127, to appear, Journal of Systems and Software(JSS), 2005
|
15 |
I. Ingemarsson, D. T. Tang, C.K. Wong, 'A conference key distribution system,' IEEE Transactions on Information Theory, IT-28(5), pp. 714-720, September 1982
|
16 |
M. Burmester, Y. Desmedt, 'A secure and efficient conference key distribution system,' In Advances in Cryptology-Eurocrypt'94, Springer-Verlag, pp. 275-286, 1995
|