-
1
-
-
0038687767
-
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols
-
ACM Press
-
William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, and Omer Reingold. Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 48–58. ACM Press, 2002.
-
(2002)
Proceedings of the 9Th ACM Conference on Computer and Communications Security
, pp. 48-58
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
Canetti, R.4
Ioannidis, J.5
Keromytis, A.D.6
Reingold, O.7
-
2
-
-
32844458560
-
A Universally Composable Cryptographic Library. Cryptology ePrint Archive
-
January
-
Michael Backes, Birgit Pfitzmann, and Michael Waidner. A Universally Composable Cryptographic Library. Cryptology ePrint Archive, Report 2003/015, January 2003. http://eprint.iacr.org/2003/015/.
-
(2003)
Report 2003/015
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
3
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key exchange protocols
-
ACM Press, Full version at
-
Mihir Bellare, Ran Canetti, and Hugo Krawczyk. A modular approach to the design and analysis of authentication and key exchange protocols. In Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, pages 419–428. ACM Press, 1998. Full version at http://eprint.iacr.org/1998/009.
-
(1998)
Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
5
-
-
84947778144
-
The Decision Diffie-Hellman Problem
-
Joe P. Buhler, editor, Springer
-
Dan Boneh. The Decision Diffie-Hellman Problem. In Joe P. Buhler, editor, Proceedings of the Third Algorithmic Number Theory Symposium, volume 1423 of Lecture Notes in Computer Science, pages 48–63. Springer, 1998.
-
(1998)
Proceedings of the Third Algorithmic Number Theory Symposium, Volume 1423 of Lecture Notes in Computer Science
, pp. 48-63
-
-
Boneh, D.1
-
6
-
-
0035163054
-
Universally Composable Security: A New Paradigm for Cryptographic Protocols
-
IEEE Computer Society, Full version at
-
Ran Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In Proceedings of 42nd Annual Symposium on Foundations of Computer Science, FOCS 2001, pages 136–145. IEEE Computer Society, 2001. Full version at http://eprint.iacr.org/2000/067.
-
(2001)
Proceedings of 42Nd Annual Symposium on Foundations of Computer Science, FOCS 2001
, pp. 136-145
-
-
Canetti, R.1
-
7
-
-
84880897758
-
Universally Composable Commitments
-
In Joe Kilian, editor, Springer, Full version at
-
Ran Canetti and Marc Fischlin. Universally Composable Commitments. In Joe Kilian, editor, Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Proceedings, volume 2139 of Lecture Notes in Computer Science, pages 19–40. Springer, 2001. Full version at http://eprint.iacr.org/2001/055.
-
(2001)
Advances in Cryptology - CRYPTO 2001, 21St Annual International Cryptology Conference, Proceedings, Volume 2139 of Lecture Notes in Computer Science
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
8
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
In Birgit Pfitzmann, editor, Springer, Full version at
-
Ran Canetti and Hugo Krawczyk. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In Birgit Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Proceedings, volume 2045 of Lecture Notes in Computer Science. Springer, 2001. Full version at http://eprint.iacr.org/2002/047.
-
(2001)
Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Proceedings, Volume 2045 of Lecture Notes in Computer Science
-
-
Canetti, R.1
Krawczyk, H.2
-
9
-
-
84947232363
-
Universally Composable Notions of Key Exchange and Secure Channels
-
In Lars R. Knudsen, editor, Springer, All citations refer to the full version at
-
Ran Canetti and Hugo Krawczyk. Universally Composable Notions of Key Exchange and Secure Channels. In Lars R. Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, volume 2332 of Lecture Notes in Computer Science. Springer, 2002. All citations refer to the full version at http://eprint.iacr.org/2002/059.
-
(2002)
Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, Volume 2332 of Lecture Notes in Computer Science
-
-
Canetti, R.1
Krawczyk, H.2
-
11
-
-
0036038991
-
Universally Composable Two-Party and Multi-party Secure Computation
-
ACM Press
-
Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, and Amit Sahai. Universally Composable Two-Party and Multi-party Secure Computation. In Proceedings on Thirty-Fourth Annual ACM Symposium on Theory of Computing, STOC 2002, pages 494–503. ACM Press, 2002.
-
(2002)
Proceedings on Thirty-Fourth Annual ACM Symposium on Theory of Computing, STOC 2002
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
12
-
-
85165851976
-
-
Universally Composable Two-Party and Multi-party Secure Computation, July, Full (and revised) version of [11], available at
-
Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, and Amit Sahai. Universally Composable Two-Party and Multi-party Secure Computation, July 2003.Full (and revised) version of [11], available at http://eprint.iacr.org/2002/140.
-
(2003)
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
14
-
-
84937437506
-
Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor
-
In Moti Yung, editor, Springer, Full version at
-
Ivan B. Damgård and Jesper B. Nielsen. Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor. In Moti Yung, editor, Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Proceedings, volume 2442 of Lecture Notes in Computer Science, pages 581–596. Springer, 2002. Full version at http://eprint.iacr.org/2001/091.
-
(2002)
Advances in Cryptology - CRYPTO 2002, 22Nd Annual International Cryptology Conference, Proceedings, Volume 2442 of Lecture Notes in Computer Science
, pp. 581-596
-
-
Damgård, I.B.1
Nielsen, J.B.2
-
15
-
-
0020720357
-
On the Security of Public Key Protocols
-
March
-
Danny Dolev and Andrew C. Yao. On the Security of Public Key Protocols. IEEE Transactions on Information Theory, 29(2):198–208, March 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
18
-
-
85165864200
-
-
IPSEC Working Group INTERNET-DRAFT draft-ietf-ipsec-ikev2-06.txt, March, Available at
-
Internet Key Exchange (IKEv2) Protocol. Charlie Kaufman, editor. IPSEC Working Group INTERNET-DRAFT draft-ietf-ipsec-ikev2-06.txt, March 2003. Available at http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ikev2-06.txt.
-
(2003)
-
-
Kaufman, C.1
-
19
-
-
0003984462
-
Pseudorandomness and Cryptographic Applications
-
Princeton University Press
-
Michael Luby. Pseudorandomness and Cryptographic Applications. Princeton Computer Science Notes. Princeton University Press, 1996.
-
(1996)
Princeton Computer Science Notes
-
-
Luby, M.1
-
20
-
-
0034823388
-
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission
-
IEEE Computer Society Press, Full version at
-
Birgit Pfitzmann and Michael Waidner. A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. In IEEE Symposium on Research in Security and Privacy, pages 184–200. IEEE Computer Society Press, 2001. Full version at http://eprint.iacr.org/2000/066.
-
(2001)
IEEE Symposium on Research in Security and Privacy
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
-
21
-
-
85165842976
-
On Formal Models for Secure Key Exchange. Cryptology ePrint Archive
-
Victor Shoup. On Formal Models for Secure Key Exchange. Cryptology ePrint Archive, Report 1999/012, 1999. http://eprint.iacr.org/1999/012.
-
(1999)
Report 1999/012
-
-
Shoup, V.1
-
22
-
-
0344996490
-
-
PhD thesis, Universität des Saarlandes, Online available at
-
Michael Steiner. Secure Group Key Agreement. PhD thesis, Universität des Saarlandes, 2002.Online available at http://www.semper.org/sirene/publ/Stei 02.thesis-final.pdf.
-
(2002)
Secure Group Key Agreement
-
-
Steiner, M.1
|