-
2
-
-
0017018484
-
-
IEEE Trans. Inf. Theory, vol.IT-22, no.C, pp.6-14-G54, 1976.
-
W. Diffie and M. Helhnan, "New directions in cryptography," IEEE Trans. Inf. Theory, vol.IT-22, no.C, pp.6-14-G54, 1976.
-
New Directions in Cryptography
-
-
Diffie, W.1
Helhnan, M.2
-
3
-
-
84944878354
-
-
A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton, Florida, 1996.
-
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
4
-
-
0003418425
-
-
rfc2408, Nov. 1998.
-
D. Maughan, M. Schertier, M. Schneider, and J. Turner, "Internet security association and key management protocol (ISAKMP)," rfc2408, Nov. 1998.
-
Internet Security Association and Key Management Protocol (ISAKMP)
-
-
Maughan, D.1
Schertier, M.2
Schneider, M.3
Turner, J.4
-
6
-
-
85027195968
-
-
Proc. 1998 International Symposium on Information Theory and Its Applications (ISITA'98), pp.4G6-470, Mexico City, Mexico, Oct. 1998.
-
K. Matsuura and H. Imai, "Protection of authenticated key-agreement protocol against a denial-of-service attack," Proc. 1998 International Symposium on Information Theory and Its Applications (ISITA'98), pp.4G6-470, Mexico City, Mexico, Oct. 1998.
-
Protection of Authenticated Key-agreement Protocol against a Denial-of-service Attack
-
-
Matsuura, K.1
Imai, H.2
-
7
-
-
85027149826
-
-
eds. Y. Han, T. Okamoto, and S. Qing, pp.87-97, LNCS 1334, SpringerVerlag, Berlin, Nov. 1997.
-
T. Aura and P. Nikander, "Stateless connections, in information and communications security," eds. Y. Han, T. Okamoto, and S. Qing, pp.87-97, LNCS 1334, SpringerVerlag, Berlin, Nov. 1997.
-
Stateless Connections, in Information and Communications Security
-
-
Aura, T.1
Nikander, P.2
-
8
-
-
84944338592
-
-
Pre-Proc. Internet Workshop'99 (IWS'99), pp.1724, Osaka, Japan, Feb. 1999.
-
K. Matsuura and H. Imai, "Resolution of ISAKMP/Oakley key-agreement protocol resistant against denial-of-service attack," Pre-Proc. Internet Workshop'99 (IWS'99), pp.1724, Osaka, Japan, Feb. 1999.
-
Resolution of ISAKMP/Oakley Key-agreement Protocol Resistant against Denial-of-service Attack
-
-
Matsuura, K.1
Imai, H.2
-
9
-
-
63449122349
-
-
in Advances in Cryptology -Crypto'97, pp.165-179, LNCS 1294, Springer-Verlag, Berlin, Aug. 1997.
-
Y. Zheng, "Digital signcryption or how to achieve cost(signature k encryption) cost(signature) + cost(encryption)," in Advances in Cryptology -Crypto'97, pp.165-179, LNCS 1294, Springer-Verlag, Berlin, Aug. 1997.
-
Digital Signcryption or how to Achieve Cost(signature K Encryption) Cost(signature) + Cost(encryption)
-
-
Zheng, Y.1
-
12
-
-
84927727752
-
-
in Advances in Cryptology -EUROCRYPT'96, ed. U. Maurer, pp.387-398, LNCS 1070, Springer-Verlag, Berlin, 1996.
-
D. Pointcheval and J. Stern, "Security proofs for signature schemes," in Advances in Cryptology -EUROCRYPT'96, ed. U. Maurer, pp.387-398, LNCS 1070, Springer-Verlag, Berlin, 1996.
-
Security Proofs for Signature Schemes
-
-
Pointcheval, D.1
Stern, J.2
-
14
-
-
84874800178
-
-
IEEE Trans. Inf. Theory, vol.IT-31, no.4, pp.4G9-472, 1985.
-
T. ElGamal, "A public key cryptoSystem and a signature scheme based on discrete logarithms," IEEE Trans. Inf. Theory, vol.IT-31, no.4, pp.4G9-472, 1985.
-
A Public Key CryptoSystem and a Signature Scheme Based on Discrete Logarithms
-
-
Elgamal, T.1
-
16
-
-
84955567079
-
-
in Advances in Cryptology -CRYPTO'96, ed. N. Koblitz, pp.268-282, LNCS 1109, Springer-Verlag, Berlin, Aug. 1996.
-
U.M. Maurer and S. Wolf, "Diffie-Hellman oracles," in Advances in Cryptology -CRYPTO'96, ed. N. Koblitz, pp.268-282, LNCS 1109, Springer-Verlag, Berlin, Aug. 1996.
-
Diffie-Hellman Oracles
-
-
Maurer, U.M.1
Wolf, S.2
|