[8] |
LIN Y H . Research on three-party authentication key exchange protocol based on password[D]. Jinan:Shandong University, 2014.
|
[9] |
YOON E J , JEON I S . An efficient and secure Diffie–Hellman key agreement protocol based on Chebyshev chaotic map[J]. Communications in Nonlinear Science and Numerical Simulation, 2011,16(6): 2383-2389.
|
[10] |
ZHAO F , GONG P , LI S ,et al. Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials[J]. Nonlinear Dynamics, 2013,74(1-2): 419-427.
|
[11] |
LIN T H , LEE T F . Secure verifier-based three-party authentication schemes without server public keys for data exchange in telecare medicine information systems[J]. Journal of Medical Systems, 2014,38(5):30.
|
[12] |
LV C , MA M , LI H ,et al. An novel three-party authenticated key exchange protocol using one-time key[J]. Journal of Network and Computer Applications, 2013,36(1): 498-503.
|
[13] |
DIFFIE W , HELLMAN M . New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976,22(6): 644-654.
|
[1] |
ZHANG W , WANG F Y . The GRE over IPsec VPN research and implementation of combining with the construction scheme of NAT[J]. Journal of Shandong University of Technology, 2017(3): 87-90.
|
[2] |
ZAGHAL R , SALAH S , JABALI N . Extending AES with DH key-exchange to enhance VoIP encryption in mobile networks[C]// World Conference on Information Systems and Technologies. IEEE, 2018: 435-462.
|
[14] |
KODALI R K , NAIKOTI A . ECDH based security model for IoT using ESP8266[C]// International Conference on Control,Instrumentation,Communication and Computational Technologies. IEEE, 2017: 629-633.
|
[15] |
DING J , ALSAYIGH S , LANCRENON J ,et al. Provably secure password authenticated key exchange based on RLWE for the post-quantum world[C]// Cryptographers’ Track at the RSA Conference. Springer International Publishing, 2017: 183-204.
|
[3] |
LI C T , CHEN C L , LEE C C ,et al. A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps[J]. Soft Computing, 2017(6): 1-12.
|
[4] |
FARASH M S , ATTARI M A . An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps[J]. Nonlinear Dynamics, 2014,77(1-2): 399-411.
|
[16] |
MATSUMOTO T . On seeking smart public-key distribution systems[J]. IEICE Trans Fundamental, 1986,69(2): 224-231.
|
[17] |
ZHANG L , WU Q , DOMINGO-FERRER J ,et al. Round-efficient and sender-unrestricted dynamic group key agreement protocol for secure group communications[J]. IEEE Transactions on Information Forensics & Security, 2017,10(11): 2352-2364.
|
[5] |
WANG X , ZHAO J . An improved key agreement protocol based on chaos[J]. Communications in Nonlinear Science and Numerical Simulation, 2010,15(12): 4052-4057.
|
[6] |
叶茂, 胡学先, 刘文芬 . 基于格的三方口令认证密钥交换协议[J]. 电子与信息学报, 2013,35(6): 1376-1381.
|
|
YE M , HU X X , LIU W F . Password authenticated key exchange protocol in the three party setting based on lattices[J]. Journal of Electronics and Information Technology, 2013,35(6): 1376-1381.
|
[7] |
王元元 . 三方认证密钥交换协议研究[D]. 上海:上海交通大学, 2010.
|
|
WANG Y Y . Research on three-party authenticated key exchange protocol[D]. Shanghai:Shanghai Jiao Tong University, 2010.
|
[8] |
林远辉 . 基于口令的三方认证密钥交换协议研究[D]. 济南:山东大学, 2014.
|
[18] |
LENZ J , MUBAYI D . Eigenvalues of non-regular linear quasirandom hypergraphs[J]. Discrete Mathematics, 2017,340(2): 145-153.
|