共 54 条
[2]
Password-based authenticated key exchange in the three-party setting
[J].
IEE Proceedings: Information Security,
2006, 153 (01)
:27-39
[3]
[Anonymous], 2011, ASIACCS
[4]
[Anonymous], 2011, 2011300 CRYPT EPRINT
[5]
Basin D, 2010, LECT NOTES COMPUT SC, V6345, P340, DOI 10.1007/978-3-642-15497-3_21
[6]
Basin D, 2010, LECT NOTES COMPUT SC, V6247, P1, DOI 10.1007/978-3-642-15205-4_1
[7]
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[8]
Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P57, DOI 10.1145/225058.225084
[9]
Bellare M., 1994, CRYPTO, P232
[10]
Blake-Wilson S, 1999, LECT NOTES COMPUT SC, V1556, P339