刘云,杨亮,等.一种改进的动态用户认证协议[J].电子学报,2012,41(1):42-46. Liu Yun,Yang Liang,et al.Improved dynamic user authentication protocol[J].Acta Electronica Sinica,2012,41(1):42-46.(in Chinese)
[2]
A Akavia,S Goldwasser,V Vaikuntanathan.Simultaneous hardcore bits and cryptography against memory attacks[A].Proceedings of the 6th Theory of Cryptography Conference (TCC 2009)[C].Berlin:Springe-Verlag,2009.474-495.
[3]
B Lamacchia,K Lauter,A Mityagin.Stronger security of authenticated key exchange[A].Proceedings of ProvSec 2007[C].Berlin:Springe-Verlag,2007.1-16.
[4]
J Alwen,Y Dodis,D Wichs.Leakage-resilientpublic-key cryptography in the bounded-retrieval model[A].Advances in Cryptology,Crypto 2009[C].Berlin:Springe-Verlag,2009.36-54.
[5]
T Okamoto.Authenticated key exchange and key encapsulation in the standard model[A].Advances in Cryptology,Asiacrypt 2007[C].Berlin:Springe-Verlag,2007.474-484.
[6]
M Kim,A Fujioka,B Usta[AKo~]lu.Strongly secure authenticated key exchange without NAXOS''approach[A].Proceedings of 4th International Workshop on Security(IWSEC''09)[C].Berlin:Springe-Verlag,2009.174-191.
[7]
张延红,陈明.标准模型下强安全的无证书认证密钥协商协议[J].四川大学学报,2013,45(1):125-132. Zhang Yan hong,Chen Min.Strongly secure certificateless authenticated key agreement protocol in standard model[J].Journal of Sichuan University,2013,45(1):125-132.(in Chinese)
[8]
K Yoneyama.Efficient and strongly secure password-based server aided key exchange[A].Proceedings of 9th International Conference on Cryptology in India(Indocrypt''08)[C].Berlin:Springe-Verlag,2010.172-184.
J Nam,J Paik,D Won.Security analysis of Zhao and Gu''s key exchange protocol[EB/OL].http://onlinepresent.org/proceedings/vol2_2012/15.pdf.
[11]
M Bellare,D Pointcheval,P Rogaway.Authenticated key exchange secure against dictionary attacks[A].Advances in Cryptology,Eurocrypt 2000[C].Berlin:Springe-Verlag,2000.139-155.
[12]
X Li,J Niu,MK Khan,et al.An enhanced smart card based remote user password authentication scheme[J].Journal of Network and Computer Applications,2013,36(5):1365-1371.