[1] |
DIFFIE W, HELLMAN M.New Directions in Cryptography[J]. IEEE Transactions on Information Theory, 1976, 22(6): 644-654.
|
[2] |
RIVEST R L, SHAMIR A, ADLEMAN L.A Method For Obtaining Digital Signatures and Public-Key Cryptosystems[J]. Communications of the ACM, 1978, 21(2): 120-126.
|
[3] |
ELGAMAL T.A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms[J]. IEEE Transactions on Information Theory, 1985, 31(4): 469-472.
|
[4] |
WAGNER I, ECKHOFF D.Technical Privacy Metrics: A Systematic Survey[J]. ACM Computing Surveys (CSUR), 2018, 51(3): 57-62.
|
[5] |
WU Y, KHISTI A, XIAO C, et al.A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead[J]. IEEE Journal on Selected Areas in Communications, 2018, 36(4): 679-695.
|
[6] |
DEBIAO H, JIANHUA C, JIN H.An ID-Based Client Authentication with Key Agreement Protocol for Mobile Client-Server Environment on ECC with Provable Security[J]. Information Fusion, 2012, 13(3): 223-230.
|
[7] |
LIU Jinhui, ZHANG Huanguo, JIA Jianwei, et al.Analysis of HKKS Key Exchange Protocol[J]. Journal of Computer Science, 2016, 39(3): 516-528.
|
|
刘金会,张焕国,贾建卫,等. HKKS 密钥交换协议分析[J].计算机学报,2016,39(3):516-528.
|
[8] |
WU F, XU L, LI X.A New Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Multi-Server Environment[C]//Springer. 6th International Conference on Frontier Computing, July 12-14, 2017, Osaka, Japan. Singapore: Springer, 2017: 335-344.
|
[9] |
YU Jinxia, LIAN Huanhuan, TANG Yongli, et al.Three-Party Authentication Key Exchange Protocol Based on Password[J]. Journal of Communications, 2018, 39(11): 87-97.
|
|
于金霞,廉欢欢,汤永利,等.格上基于口令的三方认证密钥交换协议[J].通信学报,2018,39(11):87-97.
|
[10] |
ARIKAN E.Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels[J]. IEEE Transactions on Information Theory, 2009, 55(7): 3051-3073.
|
[11] |
MAHDAVIFAR H, VARDY A.Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes[J]. IEEE Transactions on Information Theory, 2011, 57(10): 6428-6443.
|
[12] |
HOOSHMAND R, AREF M R, EGHLIDOS T.Secret Key Cryptosystem Based on Non-Systematic Polar Codes[J]. Wireless Personal Communications, 2015, 84(2): 1345-1373.
|
[13] |
HOOSHMAND R, AREF M R.Polar Code-Based Secure Channel Coding Scheme with Small Key Size[J]. IET Communications, 2017, 11(15): 2357-2361.
|
[14] |
HOOSHMAND R, Aref M R, Eghlidos T.Physical Layer Encryption Scheme Using Finite-Length Polar Codes[J]. IET Communications, 2015, 9(15): 1857-1866.
|
[15] |
HOOSHMAND R, Aref M R.Efficient Polar Code-Based Physical Layer Encryption Scheme[J]. IEEE Wireless Communications Letters, 2017, 6(6): 710-713.
|
[16] |
SHRESTHA S R, KIM Y S.New Mceliece Cryptosystem Based on Polar Codes as a Candidate for Post-Quantum Cryptography[C]//IEEE . 2014 14th International Symposium on Communications and Information Technologies (ISCIT), September 24-26, 2014, Incheon, South Korea. New York: IEEE, 2014: 368-372.
|
[17] |
CLANCY T C, MCGWIER R W, CHEN L.Post-Quantum Cryptography and 5G Security: Tutorial[C]//SIGSAC. Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, May 15-17, 2019, Miami, Florida, USA. New York: ACM, 2019: 285.
|
[18] |
GEFFE P R.Secrecy Systems Approximating Perfect And Ideal Secrecy[J]. Proceedings of the IEEE, 1965, 53(9): 1229-1230.
|