References
- Lee , C. C. , Hwang , M. S. and Li , L. H. 2003 . A new key authentication scheme based on discrete logarithms . Applied Mathematics and Computation , 139 : 343 – 349 .
- Peinado , A. 2004 . Cryptanalysis of LHL-key authentication scheme . Applied Mathematics and Computation , 152 : 721 – 724 .
- Diffie , W. and Hellman , M. E. 1976 . New directions in cryptography . IEEE Transactions on Information Theory , 22 : 644 – 654 .
- Horng , G. and Yang , G. S. 1996 . Key authentication scheme for cryptosystems based on logarithms . Computer Communications , 19 : 848 – 850 .
- Zhan , B. , Li , Z. , Yang , Y. and Hu , Z. 1999 . On the security of HY-key authentication scheme . Computer Communications , 22 : 739 – 741 .
- Li , G. , Lomas , M. A. , Needham , R. M. and Saltzer , J. H. 1993 . Protecting poorly chosen secrets from guessing attacks . IEEE Journal on Selected Areas in Communications , 11 : 648 – 656 .
- ElGamal , T. 1985 . A public-key cryptosystem and a signature scheme based on discrete logarithms . IEEE Transactions on Information Theory , 33 ( 2 ) : 469 – 472 .
- Rosen , K. H. 1999 . Elementary Number Theory and its Application , 4th , Addison Wesley Longman .