References
- Bellovin , S. M. and Merritt , M. May 1992 . “ Encrypted key exchange: password-based protocols secure against dictionary attacks ” . In Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy May , 72 – 84 . in
- De win , E. and Preneel , B. 1998 . Elliptic curve public key cryptosystems–an introduction state of the art in applied cryptography , LNCS Vol. 1528 , 131 – 141 . Springer .
- Diffie , W. and Hellmans , M. November 1976 . “ New directions in cryptography ” . In IEEE Transaction on Information Theory Vol. 22 , November , 644 – 654 . in
- Johnston , A. M. and Gemmall , P. 2002 . Authenticated key exchange provably secure against the man-in-the-middle attack . Journal of Cryptology , 15 : 139 – 148 . Springer-Verlag
- Koblitz , N. 1987 . Elliptic curve cryptosystems . Mathematics of Computation , 48 : 203 – 209 .
- Koyama , K. , Mouser , V. M. , Okamoto , T. and Vanstone , S.A. “ New public-key schemes based on elliptic curves over the ring Zn ” . In CRYPTO’91, LNCS , Vol. 567 , 252 – 266 . Springer-Verlag .
- http://www.certicom.com/index.php?action=ecc_tutorial,homeOnline elliptic curve cryptography tutorial-certicom
- Law , L. , Menezes , A. , Qu , M. , Solinas , J. and Vastone , S. March 1998 . “ An efficient protocol for authenticated key agreement ” . In Technical Report CORR 9805 , March , Ontario : Dept. of C&O, University of Waterloo .
- Miller , V. 1986 . “ Uses of elliptic curves in cryptography ” . In Advances in Cryptology–CRYPTO’85, LNCS , Vol. 278 , 417 – 426 . Springer-Vendor .
- Stallings , W. 2003 . Cryptography and Network Security , 3rd , Prentice Hall .
- Al-Sulton , K. and Saeb , M. 2003 . “ M. Elmessiery and U. E’Raouf, A new two-pass key agreement protocol ” . In Proceedings of IEEE Midwest, Symp. Circuits, Systems and Computers in
- Viega , J. , Messier , M. and Chandra , P. 2002 . Network Security with Open SSL , 1st , O’Reiley .