[1] Miller V S. Use of elliptic curves in cryptography[A]. Advances in Cryptology Crypto 85[C]. Lecture Notes in Computer Science, 1985,(128): 417-426. [2] Koblitz N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987, 48(177): 203-209. [3] Aydos M, Sunar B, Koc C K. An elliptic curve cryptography based authentication and key agreement protocol for wireless communication[A]. The SecondInternational Workshop on Discrete Algorithm and Methods for Model Computationand Communication[C]. Dallos, 1998. [4] Dong Hwi Seo, Sweeney P. Simple authenticated key agreement algorithm[J]. Electron Lett, 1999, 35(13): 1 073-1 074. [5] Ku W C, Wang S D. Cryptanalysis of modified authenticated key agreement protocol[J]. Electronics Letters, 2000, 36(21): 1 770-1 771. [6] Hsieh B T, Sun H M, Hwang T. Cryptanalysis of enhancement for simpleauthentication key agreement algorithm[J]. Electronics Letters, 2002, 38(1): 20-21. [7] Diffie W, Van Oorschot P C, Wiener M J. Authentication and authenticated key exchanges[J]. Des Codes Cryptography, 1992, (2): 107-125. [8] Bellovin S M, Merritt M. Encrypted key exchange: password-based protocols secure against dictionary attacks[A]. Proc 1992 IEEE Computer Society Conf on Research in Security and Privacy[C]. 1992. 72-84. [9] Menezes A J, van Oorschot P C, Vanstone S A. Handbook of applied cryptography[M]. CRC Press, 1997. 496. |