-
1
-
-
35048856922
-
Validation of elliptic curve public keys
-
In Yvo G. Desmedt, editor, Miami, FL, Springer Verlag
-
Adrian Antipa, Daniel Brown, Alfred Menezes, René Struik, and Scott Vanstone. Validation of elliptic curve public keys. In Yvo G. Desmedt, editor, Public Key Cryptography – PKC 2003, volume 2567, pages 211–223, Miami, FL, 2003. Springer Verlag.
-
(2003)
Public Key Cryptography – PKC 2003
, vol.2567
, pp. 211-223
-
-
Antipa, A.1
Brown, D.2
Menezes, A.3
Struik, R.4
Vanstone, S.5
-
2
-
-
85165846303
-
Part 1 - Basic requirements
-
Secretariat: DIN Deutsches Institut für Normung e.V, Berlin, 7 May
-
Application interface for smartcards used as secure signature creation devices: Part 1 - basic requirements. Technical Report CEN/ISSS WS/E-Sign Draft CWA Group K Version 1.05, Secretariat: DIN Deutsches Institut für Normung e.V, Berlin, 7 May 2003.
-
(2003)
Technical Report CEN/ISSS Ws/E-Sign Draft CWA Group K Version 1.05
-
-
-
3
-
-
0003400251
-
Computer security model: Unified exposition and multics interpretation
-
Bedford, MA, USA, HQ Electronic Systems Division, Hanscom AFB, MA, USA, June
-
David E. Bell and Leonard J. LaPadula. Computer security model: Unified exposition and multics interpretation. Technical Report ESD–TR–75–306, The MITRE Corporation, Bedford, MA, USA, HQ Electronic Systems Division, Hanscom AFB, MA, USA, June 1975. http://csrc.nist.gov/publications/history/bell76.pdf.
-
(1975)
Technical Report ESD–TR–75–306, the MITRE Corporation
-
-
Bell, D.E.1
Lapadula, L.J.2
-
4
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Bedford, MA, USA, HQ Electronic Systems Division, Hanscom AFB, MA, USA, April
-
Kenneth J. Biba. Integrity considerations for secure computer systems. Technical Report ESD–TR–76–372, The MITRE Corporation, Bedford, MA, USA, HQ Electronic Systems Division, Hanscom AFB, MA, USA, April 1977.
-
(1977)
Technical Report ESD–TR–76–372, the MITRE Corporation
-
-
Biba, K.J.1
-
5
-
-
84869635960
-
Security analysis of IKE’s signature-based keyexchange protocol
-
In Moti Yung, editor, Santa Barbara, CA, Springer-Verlag
-
Ran Canetti and Hugo Krawczyk. Security analysis of IKE’s signature-based keyexchange protocol. In Moti Yung, editor, Advances in Cryptology - Crypto 2002, volume 2045 of Lecture Notes in Computer Science, pages 143–161, Santa Barbara, CA, 2002. Springer-Verlag.
-
(2002)
Advances in Cryptology - Crypto 2002, Volume 2045 of Lecture Notes in Computer Science
, pp. 143-161
-
-
Canetti, R.1
Krawczyk, H.2
-
6
-
-
85165865801
-
Application interface
-
Secretariat: DIN Deutsches Institut für Normung e.V, Berlin, 15 December
-
Chipcards with digital signature application/function according to SigG and SigV - part 1: Application interface. Technical Report DIN V66291-1, Secretariat: DIN Deutsches Institut für Normung e.V, Berlin, 15 December 1998.
-
(1998)
Technical Report DIN V66291-1
-
-
-
7
-
-
85165844192
-
Basic security services
-
Secretariat: DIN Deutsches Institut für Normung e.V, Berlin, 17 October
-
Chipcards with digital signature application/function according to SigG and SigV - part 4: Basic security services. Technical Report DIN V66291-4, Secretariat: DIN Deutsches Institut für Normung e.V, Berlin, 17 October 2000.
-
(2000)
Technical Report DIN V66291-4
-
-
-
8
-
-
85165836726
-
-
Joint Interoperability and Engineering Organization (JIEO), Fort Monmouth, NJ, 25 January
-
Common security label (CSL). Technical Report MIL-STD-2045-48501, Joint Interoperability and Engineering Organization (JIEO), Fort Monmouth, NJ, 25 January 1995.
-
(1995)
Technical Report MIL-STD-2045-48501
-
-
-
10
-
-
84867101962
-
-
Washington, DC, USA. Department of Defense Trusted Computer System Evaluation Criteria, December
-
DOD 5200.28-STD, Department of Defense, Washington, DC, USA. Department of Defense Trusted Computer System Evaluation Criteria, December 1985. http://csrc.nist.gov/publications/history/dod85.pdf.
-
(1985)
Department of Defense
-
-
-
11
-
-
34250726454
-
The story of non-secret encryption
-
Communications- Electronics Security Group (CESG), Cheltenham, UK
-
J. H. Ellis. The story of non-secret encryption. Technical report, Communications- Electronics Security Group (CESG), Cheltenham, UK, 1987. http://www.cesg.gov.uk/publications/media/nsecret/ellis.pdf.
-
(1987)
Technical Report
-
-
Ellis, J.H.1
-
12
-
-
85094816321
-
Which security policy for multiapplication smart cards?
-
Chicago, IL, The USENIX Association
-
Pierre Girard. Which security policy for multiapplication smart cards? In Proceedings of the USENIX Workshop on Smartcard Technology, pages 21–28, Chicago, IL, 1999. The USENIX Association.
-
(1999)
Proceedings of the USENIX Workshop on Smartcard Technology
, pp. 21-28
-
-
Girard, P.1
-
13
-
-
0004115841
-
The internet key exchange (IKE)
-
November
-
D. Harkins and D. Carrel. The internet key exchange (IKE). Technical Report RFC2409, November 1998. ftp://ftp.rfc-editor.org/in-notes/rfc2409.txt.
-
(1998)
Technical Report RFC2409
-
-
Harkins, D.1
Carrel, D.2
-
14
-
-
85165850202
-
Part 3: Electronic signals and transmission protocols
-
1997(E), International Organization for Standardization, Genève, 18 September
-
Information technology - identification cards - integrated circuit(s) cards with contacts- part 3: Electronic signals and transmission protocols. Technical Report ISO/IEC 7816-3:1997(E), International Organization for Standardization, Genève, 18 September 1997.
-
(1997)
Technical Report ISO/IEC 7816-3
-
-
-
15
-
-
85165845713
-
Part 4: Inter-industry commands for interchange
-
International Standards Organization, Genève
-
Information technology - identification cards - integrated circuit(s) cards with contacts - part 4: Inter-industry commands for interchange. Technical Report ISO/IEC 7816-4, International Standards Organization, Genève, 1995.
-
(1995)
Technical Report ISO/IEC 7816-4
-
-
-
16
-
-
85165865032
-
Part 15: Cryptographic information application
-
International Organization for Standardization, Genève
-
Information technology - identification cards - integrated circuit(s) cards with contacts - part 15: Cryptographic information application. Technical Report ISO/IEC CD 7816-15, draft edition, International Organization for Standardization, Genève, 2001.
-
(2001)
Technical Report ISO/IEC CD 7816-15, Draft Edition
-
-
-
17
-
-
85165841528
-
Security techniques – evaluation criteria for it security – parts 1, 2, and 3
-
International Organization for Standardization, Genève
-
Information technology - security techniques – evaluation criteria for it security – parts 1, 2, and 3. Technical Report ISO/IEC 15408-1, -2, and -3, International Organization for Standardization, Genève, 1999.
-
(1999)
Technical Report ISO/IEC 15408-1, -2, and -3
-
-
-
18
-
-
84892771875
-
Mechanisms using digital signature techniques
-
International Organization for Standardization, Genève, 15 October
-
Information technology - security techniques - entity authentication - part 3: Mechanisms using digital signature techniques. Technical Report ISO/IEC 9798-3, International Organization for Standardization, Genève, 15 October 1998.
-
(1998)
Technical Report ISO/IEC 9798-3
-
-
-
19
-
-
85165860708
-
Mechanisms using asymetric techniques
-
International Organization for Standardization, Genève, 1 November
-
Information technology - security techniques - key management - part 3: Mechanisms using asymetric techniques. Technical Report ISO/IEC 11770-3, International Organization for Standardization, Genève, 1 November 1999.
-
(1999)
Technical Report ISO/IEC 11770-3
-
-
-
20
-
-
0018155334
-
The lattice security model in a public computing network
-
Washington, DC, USA, 4–6 December, Association for Computing Machinery
-
Paul A. Karger. The lattice security model in a public computing network. In ACM 78: Proceedings 1978 Annual Conference, volume 1, pages 453–459, Washington, DC, USA, 4–6 December 1978. Association for Computing Machinery.
-
(1978)
ACM 78: Proceedings 1978 Annual Conference
, vol.1
, pp. 453-459
-
-
Karger, P.A.1
-
21
-
-
77952286492
-
Multi-organizational mandatory access controls for commercial applications
-
Thomas J. Watson Research Center, Yorktown Heights, NY, 22 February
-
Paul A. Karger. Multi-organizational mandatory access controls for commercial applications. Technical Report RC 21673 (97655), IBM Research Division, Thomas J. Watson Research Center, Yorktown Heights, NY, 22 February 2000. http://domino.watson.ibm.com/library/CyberDig.nsf/home.
-
(2000)
Technical Report RC 21673 (97655), IBM Research Division
-
-
Karger, P.A.1
-
22
-
-
0011272226
-
A new mandatory security policy combining secrecy and integrity
-
Thomas J. Watson Research Center, Yorktown Heights, NY, 15 March
-
Paul A. Karger, Vernon R. Austel, and David C. Toll. A new mandatory security policy combining secrecy and integrity. Technical Report RC 21717 (97406), IBM Research Division, Thomas J. Watson Research Center, Yorktown Heights, NY, 15 March 2000. http://domino.watson.ibm.com/library/CyberDig.nsf/home.
-
(2000)
Technical Report RC 21717 (97406), IBM Research Division
-
-
Karger, P.A.1
Austel, V.R.2
Toll, D.C.3
-
23
-
-
33644484966
-
Using a mandatory secrecy and integrity policy on smart cards and mobile devices
-
Marseilles, France, 13–15 June
-
Paul A. Karger, Vernon R. Austel, and David C. Toll. Using a mandatory secrecy and integrity policy on smart cards and mobile devices. In EUROSMART Security Conference, pages 134–148, Marseilles, France, 13–15 June 2000.
-
(2000)
EUROSMART Security Conference
, pp. 134-148
-
-
Karger, P.A.1
Austel, V.R.2
Toll, D.C.3
-
24
-
-
84956989246
-
Using mandatory secrecy and integrity for business to business applications on mobile devices
-
Monterey, CA, 25-27 September, published on CD-ROM
-
Paul A. Karger, Vernon R. Austel, and David C. Toll. Using mandatory secrecy and integrity for business to business applications on mobile devices. In Workshop on Innovations in Strong Access Control, Naval Postgraduate School, Monterey, CA, 25-27 September 2000. published on CD-ROM. http://www.acsac.org/sac-tac/wisac00/wed0830.karger.pdf.
-
(2000)
Workshop on Innovations in Strong Access Control, Naval Postgraduate School
-
-
Karger, P.A.1
Austel, V.R.2
Toll, D.C.3
-
25
-
-
35248816546
-
SIGMA: The’SIGn-and-MAc’ approach to authenticated diffiehellman and its use in the IKE protocols
-
D. Boneh, editor, Santa Barbara, CA, 17-21 August, Springer–Verlag
-
Hugo Krawczyk. SIGMA: the’SIGn-and-MAc’ approach to authenticated diffiehellman and its use in the IKE protocols. In D. Boneh, editor, Advances in Cryptology – CRYPTO 2003 Proceesings, volume 2729 of Lecture Notes in Computer Science, pages 399–424, Santa Barbara, CA, 17-21 August 2003. Springer–Verlag.
-
(2003)
Advances in Cryptology – CRYPTO 2003 Proceesings, Volume 2729 of Lecture Notes in Computer Science
, pp. 399-424
-
-
Krawczyk, H.1
-
26
-
-
0003729341
-
HMAC: Keyed-hashing for message authentication
-
February
-
Hugo Krawczyk, M. Bellare, and Ran Canetti. HMAC: keyed-hashing for message authentication. Technical Report RFC-2104, February 1997. http://www.faqs.org/ftp/rfc/rfc2104.txt.
-
(1997)
Technical Report RFC-2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
27
-
-
84958601057
-
A key recovery attack on discrete log-based schemes using a prime order subgroup
-
In Burton S. Kaliski, editor, Santa Barbara, CA, Springer Verlag
-
Chae Hoon Lim and Pil Joong Lee. A key recovery attack on discrete log-based schemes using a prime order subgroup. In Burton S. Kaliski, editor, Advances in Cryptology - CRYPTO’97, volume 1294 of Lecture Notes in Computer Science, pages 249–263, Santa Barbara, CA, 1997. Springer Verlag.
-
(1997)
Advances in Cryptology - CRYPTO’97, Volume 1294 of Lecture Notes in Computer Science
, pp. 249-263
-
-
Lim, C.H.1
Lee, P.J.2
-
28
-
-
68249131357
-
Key agreement and key transport using elliptic curve cryptography
-
American National Standards Institute (ANSI)
-
Public key cryptography for the financial services industry, key agreement and key transport using elliptic curve cryptography. Technical Report X9.63-2001, American National Standards Institute (ANSI), 2001.
-
(2001)
Technical Report X9.63-2001
-
-
-
29
-
-
84944051800
-
Verification of a formal security model for multiapplicative smart cards
-
In F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, Toulouse, France, Springer-Verlag
-
Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul Karger, Vernon Austel, and David Toll. Verification of a formal security model for multiapplicative smart cards. In F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, 6th European Symposium on Research in Computer Security (ESORICS 2000), volume 1895 of Lecture Notes in Computer Science, pages 17–36, Toulouse, France, 2000. Springer-Verlag.
-
(2000)
6Th European Symposium on Research in Computer Security (ESORICS 2000), Volume 1895 of Lecture Notes in Computer Science
, pp. 17-36
-
-
Schellhorn, G.1
Reif, W.2
Schairer, A.3
Karger, P.4
Austel, V.5
Toll, D.6
-
30
-
-
85165842362
-
-
National Institute of Standards and Technology, Gaithersburg, MD, 6 September
-
Standard security label for information transfer. Technical Report FIPS PUB 188, National Institute of Standards and Technology, Gaithersburg, MD, 6 September 1994.
-
(1994)
Technical Report FIPS PUB 188
-
-
-
31
-
-
2442558738
-
Computer security requirements – guidance for applying the department of defense trusted computer system evaluation criteria in specific environments
-
DoD Computer Security Center, Fort George G. Meade, MD, 25 June
-
Technical rationale behind CSC-STD-003-85: Computer security requirements – guidance for applying the department of defense trusted computer system evaluation criteria in specific environments. Technical Report CSC-STD-004-85, DoD Computer Security Center, Fort George G. Meade, MD, 25 June 1985.
-
(1985)
Technical Report CSC-STD-004-85
-
-
-
32
-
-
85165857868
-
Kommentare zu application interface for smart cards used as secure signature creation devices, part 1 - Basic requirements version 0.14 28th february 2003 (in German)
-
Bonn, Germany, 14 March
-
Andreas Wiemers. Kommentare zu application interface for smart cards used as secure signature creation devices, part 1 - basic requirements version 0.14 28th february 2003 (in German). Technical report, Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, 14 March 2003.
-
(2003)
Technical Report, Bundesamt für Sicherheit in Der Informationstechnik (BSI)
-
-
Wiemers, A.1
|