1 |
IETF, HTTP Authentication: Basic and Digest Access Authentication, RFC 2617, 1999.
|
2 |
IETF, SIP: Session Initiation Protocol, RFC3261, 2002.
|
3 |
D. Mishra and A.K. Das, “A Secure and Efficient ECC-based User Anonymity-preserving Session Initiation Authentication Protocol Using Smart Card,” Peer-to-Peer Networking and Appications, Vol. 9, No. 1, pp. 171-192, 2016.
DOI
|
4 |
H. Arshad and M. Nikooghadam, “An Efficient Sand Secure Authentication and Key Agreement Scheme for Session Initiation Protocol Using ECC,” Multimedia Tools and Applications, Vol. 75, No. 1, pp. 181-197, 2016.
DOI
|
5 |
P.W. Shor, "Algorithms for Quantum Computation: Discrete Logarithms and Factoring," Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124-134, 1994.
|
6 |
L.K. Grover, "A Fast Quantum Mechanical Algorithm for Database Search," Proceedings of the Twenty-eighth Annual Association for Computing Machinery Symposium on the Theory of Computing, pp. 212-219, 1996.
|
7 |
ETSI, Quantum Safe Cryptography and Security, ISBN NO. 979-10-92620-09-0, 2015.
|
8 |
NIST, Report on Post-Quantum Cryptography, IR 8105, 2016.
|
9 |
J. Hoffstein, J. Pipher, and J.H. Silverman, "NTRU: A Ring-Based Public Key Cryptosystem," Proceeding of International Algorithmic Number Theory Symposium, Vol. 1423, pp. 267-288, 1998.
|
10 |
IEEE P1363.1, Draft Standard for Public Key Cryptographic Techniques Based on Hard Problems over Lattices, International Association for Cryptologic Research Eprint Archive, 2008.
|
11 |
S.H. Jeong, K.S. Park, K.K. Lee, and Y.H. Park, "Secure NTRU-based Authentication and Key Distribution Protocol in Quantum Computing Environments," Journal of Korea Multimedia Society, Vol. 20, No. 8, pp. 1321-1329, 2017.
DOI
|
12 |
H. Tu, N. Kumar, N. Chilamkurti, and S. Rho, “An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card,” Peer-to-Peer Networking and Appications, Vol. 8, No. 5, pp. 903-910, 2014.
|
13 |
NIST, Security Considerations for Voice Over IP Systems, SP 800-58, 2005.
|