|
[1]W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, Vol. 22, 1976, pp. 644-654. [2]Eun-Kyung Ryu, Kee-Won Kim, and Kee-Young Yoo, “A simple key agreement protocol, ”International Carnahan Conference on Security Technology, Oct 2003, pp.128-131. [3]Jeong Ok Kwon and Ik Rae Jeong, “An Efficient Password-Based E-mail Protocol for Encrypted E-mail Transmissions on Mobile Equipment, ” International Conference on Consumer Electronics, Jan 2007, pp. 1-2. [4]NIST FIPS PUB 197, “Announcing the ADVANCED ENCRYPTION STANDARD (AES),” National Institute of Standards and Technology, U.S. Department of Commerce, November, 2001. [5]NIST FIPS PUB 46-3, “Data Encryption Standard (DES),” National Institute of Standards and Technology, U.S. Department of Commerce, October, 1999. [6]X. Lai and J. Massey, “A Proposal for a New Block Encryption Standard,” Advances in Cryptology: Proceedings of EUROCRYPT ''90, Springer-Verlag, 1990, pp. 389-404. [7]J. Dacmen and V. Rijmen, “AES Proposal: Rijndael,” AES Algorithm Submission, September, 1999. [8]R. Rivest, A. Shamir and L. Adelman, “A Method for Obtaining Digital Signature and Public Key Cryptosystem,” Communication of the ACM, Vol. 21, No. 2, 1978, pp. 120-126. [9]T. ElGamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Transactions on Information Theory, Vol. 31, No. 4, 1985, pp. 469-472. [10]T. ElGamal, “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” Advances in Cryptology: Procedings of CRYPOTO ''84, Springer-Verlag, 1984, pp. 10-18. [11]R. Rivest, “The MD5 Message Digest Algoritm,” RFC 1321, 1992. [12]NIST FIPS PUB 180, “Secure Hash Standard,” National Institute of Standards and Technology, U.S. Department of Commerce, DRAFT, 1993. [13]H. Sun, B. Hsieh and H. Hwang, “Secure E-mail Protocols Providing Perfect Forward Secrecy,” IEEE Communications Letters, vol. 9, no. 1, pp. 58-60, 2005. [14]F. Bao, R. H. Deng and W. Mao, “Efficient and Practical Fair Exchange Protocols with Off-line TTP,” IEEE Symposium on Security and Privacy Proceedings, pp. 77-85, 1998. [15]A. Dent, “Flaws in an E-Mail Protocol of Sun, Hsieh, and Hwang,” IEEE Communications Letters, vol. 9, no. 8, pp. 718-719, 2005. [16]范俊逸、徐瑞壕、許行,“具高效率前推私密性之安全電子郵件協定”,Communications of the CCISA, Oct.2007, pp.1-16.
|