-
3
-
-
0031642585
-
R. Canetti, and H. Krawczyk, "A modular approach to the design and analysis of authentication and key exchange protocols,"
-
M. Bellare, R. Canetti, and H. Krawczyk, "A modular approach to the design and analysis of authentication and key exchange protocols," Proc. Annual Symposium on the Theory of Computing, 1998, (http://www-cse.ucsd.edu/users/mihir).
-
Proc. Annual Symposium on the Theory of Computing, 1998
-
-
Bellare, M.1
-
4
-
-
84956866842
-
"Unknown key-share attacks on the Station-to-Station (STS) protocol,"
-
S. Blake-Wilson and A. Menezcs, "Unknown key-share attacks on the Station-to-Station (STS) protocol," Proc. PKC'99, LNCS 15CO, pp.154-170, Springer-Verlag, 1999.
-
Proc. PKC'99, LNCS 15CO, Pp.154-170, Springer-Verlag, 1999.
-
-
Blake-Wilson, S.1
Menezcs, A.2
-
5
-
-
84957001208
-
"Entity authentication and authenticated key agreement protocols employing asymmetric techniques,"
-
S. Blake-Wilson and A. Menezcs, "Entity authentication and authenticated key agreement protocols employing asymmetric techniques," Proc. Security Protocols Workshop'97, LNCS 1361, pp. 137-158, Springer-Verlag, 1997.
-
Proc. Security Protocols Workshop'97, LNCS 1361, Pp. 137-158, Springer-Verlag, 1997.
-
-
Blake-Wilson, S.1
Menezcs, A.2
-
6
-
-
1542593353
-
P. van Oorschot, and M. Wiener, "Authentication and authenticated key exchanges,"
-
W. Diffie, P. van Oorschot, and M. Wiener, "Authentication and authenticated key exchanges," Designs, Codes and Cryptography, vol.2, pp. 107-125, 1992.
-
Designs, Codes and Cryptography, Vol.2, Pp. 107-125, 1992.
-
-
Diffie, W.1
-
7
-
-
84874800178
-
"A public key cryptosystem and a signature scheme based on discrete logarithms,"
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inf. Theory, vol.IT-31, no.4, pp.489-472, July 1985.
-
IEEE Trans. Inf. Theory, Vol.IT-31, No.4, Pp.489-472, July 1985.
-
-
Elgamal, T.1
-
8
-
-
84958952153
-
"An authenticated Diffie-Hellman key agreement protocol secure against active attacks,"
-
S. Hirose and S. Yoshida, "An authenticated Diffie-Hellman key agreement protocol secure against active attacks," Proc. PKC'98, LNCS 1431, pp.135-148, Springer-Verlag, 1998.
-
Proc. PKC'98, LNCS 1431, Pp.135-148, Springer-Verlag, 1998.
-
-
Hirose, S.1
Yoshida, S.2
-
9
-
-
33749935294
-
"Information technology-security techniques-key management-Part 3: Mechanisms using asymmetric techniques,"
-
ISO/IEC 11770-3
-
ISO/IEC 11770-3, "Information technology-security techniques-key management-Part 3: Mechanisms using asymmetric techniques," Final Text for Publication, 1999.
-
Final Text for Publication, 1999.
-
-
-
10
-
-
33749961023
-
"Standardising authentication protocols based on public key techniques,"
-
C. Mitchcll and A. Thomas, "Standardising authentication protocols based on public key techniques," J. Computer Security, vol.2, pp.23-4G, 1993.
-
J. Computer Security, Vol.2, Pp.23-4G, 1993.
-
-
Mitchcll, C.1
Thomas, A.2
-
12
-
-
0017930809
-
A. Shamir, and L.M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems,"
-
R.L. Rivest, A. Shamir, and L.M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol.21, pp.120-126, 1978.
-
Commun. ACM, Vol.21, Pp.120-126, 1978.
-
-
Rivest, R.L.1
-
13
-
-
3042666549
-
"On formal models for secure key exchange,"
-
V. Shoup, "On formal models for secure key exchange," IBM Research Report RZ 3120, 1999, Available at http://uuw.shoup.net/papers
-
IBM Research Report RZ 3120, 1999
-
-
Shoup, V.1
|