[1] Schneier B.Applied cryptography[M].2nd ed.New York:John Wiley & Sons, Inc., 1995:56-120.
[2] ElGamal T.A public key cryptosystem and a signature scheme based on discrete logarithms [J].IEEE Trans Inform Theory, 1985, 31(4):469-472.
[3] Schneier B. Email security:how to keep your electronic mail private [M].New York:John Wiley & Sons, Inc., 1995:81-156.
[4] Bacard A.The computer privacy handbook:a practical guide to email encryption, data protection, and PGP privacy software [M].Peachpit Press, 1995:18-126.
[5] Kim B, Koo J, Lee D.Robust email protocols with perfect forward secrecy [J].IEEE Communications Letters, 2006, 10(6):510-512.
[6] Sun H, Hsieh B, Hwang H.Secure email protocols providing perfect forward secrecy [J].IEEE Communications Letters, 2005, 9(1):58-60.
[7] Dent A W.Flaws in an email protocol of Sun, Hsieh, and Hwang [J].IEEE Communications Letters, 2005, 9(8):718-719.
[8] Diffie W, Hellman M E.New directions in cryptography [J].IEEE Transactions on Information Theory, 1976, 22(5):644-654.
[9] Zheng Y.Digital signcryption or how to achieve cost(signature and encryption)[C]//CRYPTO’ 97.Santa Barbara, California, USA, 1997:165-179.