[1] Kim B, Koo J, Lee D.Robust e-mail protocols with perfect forward secrecy [J].IEEE Communications Letters, 2006, 10(6):510-512.
[2] Sun H, Hsieh B, Hwang H.Secure e-mail protocols providing perfect forward secrecy[J].IEEE Communications Letters, 2005, 9(1):58-60.
[3] Dent A W.Flaws in an e-mail protocol of Sun, Hsieh, and Hwang [J].IEEE Communications Letters, 2005, 9(8):718-719.
[4] Diffie W, Hellman M E.New directions in cryptography [J].IEEE Transactions on Information Theory, 1976, 22(5):644-654.
[5] Yoon E J, Yoo K Y.Cryptanalysis of robust e-mail protocols with perfect forward secrecy[J].IEEE Communications Letters, 2007, 11(5):372-374.
[6] Guttman J D, Thayer Fabrega F J.Authentication tests and the structure of bundles [J].Theoretical Computer Science, 2002, 283(2):333-380.
[7] Guttman J D.Security protocol design via authentication tests [C]//Proceedings of the 15th IEEE Workshop on Computer Security Foundations.Washington, DC, USA:IEEE Computer Society, 2002:65-80.
[8] Thayer Fabrega F J, Herzog J C, Guttman J D.Strand spaces:proving security protocols correct [J].Journal of Computer Security, 1999, 7(2/3):191-230.
[9] Zheng Y.Digital signcryption or how to achieve cost(signature and encryption)[C]//CRYPTO’ 97.Lecture Notes in Computer Science, 1997, 1294:165-179.