[1]Deering S. Host Extensions for IP Multicasting[S]. RFC 1112, 1989.
[2]Ma Chunbo, Ao Jun, Li Jianhua. A Novel Verifier-based Authenticated Key Agreement Protocol[C]//Proc. of the 3rd International Conference on Intelligent Computing. Heidelberg, Germany: Springer, 2007.
[3]Yoon Eun-Jun, Yoo Kee-Young. A New Key Agreement Protocol Based on Chaotic Maps[C]//Proc. of the 4th International KES Symposium on Agents and Multi-Agent Systems. Heidelberg, Germany: Springer, 2008: 897-906.
[4]陈礼青, 张福泰. 基于门限秘密共享的动态安全组播密钥协 商[J]. 计算机工程, 2008, 34(1): 147-149.
[5]Laur S, Pasini S. SAS-based Group Authentication and Key Agreement Protocols[C]//Proc. of the 11th International Workshop on Practice and Theory in Public-key Cryptography. Heidelberg, Germany: Springer, 2008: 197-213.
[6]Lim Meng-Hui, Yeoh Chee-Min, Lee Sang-Gon, et al. A Secure and Efficient Three-pass Authenticated Key Agreement Protocol Based on Elliptic Curves[C]//Proc. of the 3rd International Symposium on Information Assurance and Security. Heidelberg, Germany: Springer, 2008: 170-182.
[7]苏仁旺. 基于身份的认证密钥协商协议密码分析[J]. 计算机工程, 2008, 34(8): 172-173.
[8]Zhang Fangguo, Wang Yumin. Study and Advance of Hyper-elliptic Curves Cryptosystems[J]. Acta Electronica Sinica, 2002, 30(1): 126-131.
[9]Shamir A. Identity-based Cryptosystems and Signature Schemes[C]// Proc. of Crypto’84. Berlin, Germany: Springer, 1984: 47-53.
[10]Boneh D, Franklin M. Identity-based Encryption from the Weil Pairing[C]//Proc. of the 21st Annual International Cryptology Conference on Advances in Cryptology. London, UK: Springer-Verlag, 2001: 213-229.
[11]Sun Ming-Cheng, Su Chih-Pin, Huang Chih-Tsun. Design of a Scalable RSA and ECC Crypto-processor[C]//Proc. of the Asia and South Pacific Design Automation Conference. New York, NY, USA: ACM Press, 2003: 495-498.
[12]Oorschot P, Wiener M. Parallel Collision Search with Cryptanalytic Applications[J]. Journal of Cryptology, 1999, 12(1): 1-28. |