共 4 条
[1]
现代密码学理论与实践[M]. 电子工业出版社 , (英)WenboMao著, 2004
[2]
A modular approach to thedesign and analysis of authentication and key exchange protocols (extended abstract). Bellare M,Canetti R,Krawczyk H. Proc.of the Thirtieth Annual ACMSymposium on the Theory of Computing (STOC’’98) . 1998
[3]
Analysis of Key-exchange Protocolsand their use for building secure channels. R Canetti,H Krawczyk. Eurocrypt’’01 . 2001
[4]
On the security of public Key Protocols. D Dolev,A C Yao. Proceedings of the IEEE 22ndAnnual Symposium onFoundations of Computer Science . 1981