共 54 条
- [2] Password-based authenticated key exchange in the three-party setting [J]. IEE Proceedings: Information Security, 2006, 153 (01): : 27 - 39
- [3] [Anonymous], 2011, ASIACCS
- [4] [Anonymous], 2011, 2011300 CRYPT EPRINT
- [5] Basin D, 2010, LECT NOTES COMPUT SC, V6345, P340, DOI 10.1007/978-3-642-15497-3_21
- [6] Basin D, 2010, LECT NOTES COMPUT SC, V6247, P1, DOI 10.1007/978-3-642-15205-4_1
- [7] Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
- [8] Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P57, DOI 10.1145/225058.225084
- [9] Bellare M., 1994, CRYPTO, P232
- [10] Blake-Wilson S, 1999, LECT NOTES COMPUT SC, V1556, P339