(1. Department of Information Management, National Taiwan University of Science
and Technology, Taipei 10607;
2. Department of Information Management, Chinese Culture University, Taipei 11114)
(1. Department of Information Management, National Taiwan University of Science
and Technology, Taipei 10607;
2. Department of Information Management, Chinese Culture University, Taipei 11114)
1 Lu R X, Cao Z F. Simple three-party key exchange protocol [J]. Computers and Security, 2007, 26(1): 94-97.2 Chung H R, Ku W C. Three weaknesses in a simple three-party key exchange protocol [J]. Information Sciences, 2008, 178(1): 220-229.3 Guo H, Li Z J, Mu Y, et al. Cryptanalysis of simple three-party key exchange protocol [J]. Computers and Security, 2008, 27(1-2): 16-21.4 Nam J Y, Paik J Y, Kang H K, et al. An off-line dictionary attack on a simple three-party key exchange protocol [J]. IEEE Communications Letters, 2009, 13(3): 205-207.5 Phan R C-W, Yau W C, Goi B M. Cryptanalysis of simple three-party key exchange protocol (S-3PAKE) [J]. Information Sciences, 2008, 178(13): 2849-2856.6 Ding Y, Horster P. Undetectable on-line password guessing attacks [J]. ACM SIGOPS Operating Systems Review, 1995, 29(4): 77-86.7 Chien Hung-yu, Laih Chi-sung. ECC-based lightweight authentication protocol with untraceability for low-cost RFID [J]. Journal of Parallel and Distributed Computing, 2009, 69(10): 848-853.8 Lin S, Costello D J. Error control coding: Fundamentals and applications [M]. New Jersey: Prentice-Hall Press, 1983.