References
[1]. Ibrahem, M.K. (2012), “Modification of Diffie Hellman
Key Exchange Algorithm”, Future Communication
Networks (ICFCN), International Conference, pp. 147 -
152.
[2]. Emmanuel Bresson, Olivier Chevassut, David
Pointcheval, and Jean-Jacques Quisquater (2001).
“Provably Authenticated Group Diffie-Hellman Key
Exchange”, Computer and Communication Security,
Proc. of ACM CCS'01, p.p. 255-264.
[3]. Back, Amanda, (2009), "The Diffe-Hellman Key
Exchange", Retrieved from http://129.81.170.14
/~erowland/courses/2009-2/projects/Back.pdf.
[4]. Clausen, Andrew, (2007), "Logical Composition of
Zero - Knowledge Proofs", Retrieved from http://
www.econ.upenn.edu /_clausen.
[5]. Endre Bangerter, et al, (2009), "On the Design and Implementation of Efficient Zero-Knowledge Proofs of
Knowledge", Proceedings of the 2nd ECRYPT Conference
on Software Performance Enhancement for Encryption
and Decryption and Cryptographic Compilers (SPEEDCC'
09), Berlin, Germany.
[6]. Fischer, Michael J., (2010), "Cryptography and
Computer Security", Department of Computer Science,
Yale University.
[7]. Forouzan, Behrouz A. (2008), Cryptography and
Network Security, McGraw-Hill, Int. Ed, 2008.
[8]. Hellman, Martin E., (2002), "An Overview of Public Key
Cryptography", IEEE Communications Magazine, pp: 42-
49.
[9]. P. Bhattacharya, M. Debbabi and H. Otrok, (2005),
"Improving the Diffie-Heliman Secure Key Exchange",
International Conference on Wireless Networks,
Communications and Mobile Computing.
[10]. Maurer Ueli, (2009), "Unifying Zero-Knowledge Proofs
of Knowledge", Africacrypt 2009, LNCS 5580, pp.
272–286.
[11]. Michael Backes and Dominique Unruha, (2009).
"Computational Soundness of Symbolic Zero-Knowledge
Proofs", Journal of Computer Security, Vol. 18, No. 6, pp.
1077-1155, 2010.
[12]. Mohr, Austin (2007), "A Survey of Zero-Knowledge
Proofs with Applications to Cryptography", Southern Illinois
University.
[13]. Kizza, Joseph M, (2010), "Feige-Fiat-Shamir ZKP
Scheme Revisited", International Journal of Computing
and ICT Research, Vol. 4, No. 1.
[14]. Simari, Gerardo I., (2002), "A Primer on Zero
Knowledge Protocols", Technical report, Universidad
Nacional del Sur, Buenos aires, argentina.
[15]. Stallings, William (2010), "Cryptography and
Network Security", Prentice Hall, 5th Ed. 2010.
[16] . Velten, Michael, (2006), "Zero-Knowledge The
Magic of Cryptography", Saarland University.
[17]. Krantz, Steven G., (2007), "Zero Knowledge Proofs",
AIM Preprint Series, Volume 10-46.