3.9 Article

Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols

Kim-Kwang Raymond Choo et al.

INFORMATION SCIENCES (2014)

Article Engineering, Electrical & Electronic

A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks

Daojing He et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2013)

Article Engineering, Electrical & Electronic

A fault-tolerant group key agreement protocol exploiting dynamic setting

Zi-Yao Cheng et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2013)

Article Engineering, Electrical & Electronic

A pairing-free certificateless authenticated key agreement protocol

Debiao He et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2012)

Article Computer Science, Interdisciplinary Applications

A new two-round certificateless authenticated key agreement protocol without bilinear pairings

Debiao He et al.

MATHEMATICAL AND COMPUTER MODELLING (2011)

Article Computer Science, Information Systems

Simulatable certificateless two-party authenticated key agreement protocol

Lei Zhang et al.

INFORMATION SCIENCES (2010)

Article Computer Science, Information Systems

A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges

Xuefei Cao et al.

INFORMATION SCIENCES (2010)

Article Computer Science, Hardware & Architecture

Identify-Based Authenticated Key Agreement Protocols without Bilinear Pairings

Xuefei Cao et al.

IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES (2008)

Article Computer Science, Theory & Methods

An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices

Robert W. Zhu et al.

THEORETICAL COMPUTER SCIENCE (2007)