|
[1] W. Diffie, M. Hellman, New directions in cryptography. IEEE Transactions on Information Theory, 22(6), pp. 644–54, 1976. [2] S.M. Bellovin, M. Merrit, Encrypted key exchanged: password-based protocols secure against dictionary attacks. IEEE Symp. On Research in Security and Privacy, pp. 72–84, 1992. [3] M. Steiner, G. Tsudik, M. Waidner, Refinement and extension of encrypted key exchange. ACM Operating Systems Review, 29(3), pp. 22–30, 1995. [4] Y. Ding, P. Horster, Undetectable on-line password guessing attacks. ACM Operating Systems Review, 29(4), pp. 77–86, 1995. [5] C.-L. Lin, H.-M. Sun, T. Hwang, Three party-encrypted key exchange: attacks and a solution. ACM Operating Systems Review, 34(4), pp. 12–20, 2000. [6] H.-T. Yeh, H.-M. Sun, T. Hwang, Efficient three-party authentication and key agreement protocols resistant to password guessing attacks. International Journal of Information and System Engineering 19 (6), pp. 1059–1070, 2003. [7] H.-M. Sun, B.-C. Chen, T. Hwang, Secure key agreement protocols for three-party against guessing attacks. The Journal of Systems and Software 75, pp. 63–68, 2005. [8] T.-F. Lee, T. Hwang, C.-L. Lin, Enhanced three-party encrypted key exchange without server public keys. Computer and Security 23 (7), pp. 571–577, 2004. [9] S.-W. Lee, H.-S. Kim, K.-Y. Yoo, Efficient verifier-based key agreement protocol for three parties without server’s public key. Applied Mathematics and Computation 167 (2), pp. 996–1003, 2005. [10] M. Abdalla, D. Pointcheval, Simple password-based authenticated key protocols, Topics in Cryptology – CT-RSA 2005, Lecture Notes in Computer Science, vol. 3376, pp. 191–208, 2005. [11] R. Lu, Z. Cao, Simple three-party key exchange protocol, Computers and Security 26 (1), pp. 94–97, 2007. [12] R.C.-W. Phan, W.-C. Yau, B.-M. Goi, Cryptanalysis of simple three-party key exchange protocol (S-3PAKE), Information Sciences 178 (13), pp. 2849–2856, 2008. [13] H. Guo, Z. Li, Y. Mu, X. Zhang, Cryptanalysis of simple three-party key exchange protocol, Computers and Security 27, pp. 16–21, 2008. [14] T.-F. Lee, T. Hwang, Simple password-based three-party authenticated key exchange without server public keys, Information Sciences 180, pp. 1702–1714, 2010. [15] R. Rivest, “The MD5 Message Digest Algoritm,” RFC 1321, 1992. [16] FIPS PUB 180-3, “Secure Hash Standard,” National Institute of Standards and Technology, U.S. Department of Commerce, October 2008. [17] W. Stallings, Cryptography and Network Security: Principles and Practice. Prentice Hall International, Inc., third edition, 2003. [18] H. Krawczyk, T. Rabin, Chameleon signatures, Symposium on Network and Distributed Systems Security (NDSS’00), pp. 143-154, 2000. [19] A. Shamir, Y. Tauman, Improved online / offline signature schemes, Advances in Cryptology-CRYPTO’01, LNCS 2139, pp. 355-367, 2001. [20] F. Y. Yang, Improvement on a trapdoor hash function, International Journal of Network Security, Vol. 9, No. 1, July, pp. 17-21, 2009. [21] F. Y. Yang, Efficient trapdoor hash function for digital signatures, Chaoyang Journal, Vol. 12, pp. 351- 357, 2007. [22] F. Y. Yang, S. H. Chiu, C. M. Liao, Trapdoor Hash Functions with Efficient Online Computations, The Proceedings of Multimedia and Networking Systems Conference 2006 (MNSC 2006), Kaohsiung City, Taiwan, Session G1, 2006. [23] T.-F. Lee, J.-L. Liu, M.-J. Sung, S.-B. Yang, C.-M. Chen, Communication-efficient three-party protocols for authentication and key agreement, Computers and Mathematics with Applications 58, pp. 641-648, 2009.
|