-
1
-
-
10844233317
-
A cryptographically sound dolev-yao style security proof of the needham-schroeder-lowe public-key protocol
-
Michael Backes. A Cryptographically Sound Dolev-Yao Style Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol. IEEE Journal on Selected Areas in Communications, 22(10):2075-2086, 2004.
-
(2004)
IEEE Journal on Selected Areas in Communications
, vol.22
, Issue.10
, pp. 2075-2086
-
-
Backes, M.1
-
2
-
-
84976731140
-
A key distribution protocol using event markers
-
R. K. Bauer, Thomas A. Berson, and Richard J. Feiertag. A Key Distribution Protocol Using Event Markers. A CM Transactions on Computer Systems, 1(3): 249-255, 1983.
-
(1983)
A CM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 249-255
-
-
Bauer, R.K.1
Berson, T.A.2
Feiertag, R.J.3
-
3
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key exchange protocols
-
Jeffrey Vitter, editor, ACM Press
-
Mihir Bellare, Ran Canetti, and Hugo Krawczyk. A Modular Approach to The Design and Analysis of Authentication and Key Exchange Protocols. In Jeffrey Vitter, editor, 30th ACM Symposium on the Theory of Computing - STOC 1998, pages 419-428. ACM Press, 1998.
-
(1998)
30th ACM Symposium on the Theory of Computing - STOC 1998
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Bart Preneel, editor, Springer-Verlag, Volume 1807/2000 of Lecture Notes in Computer Science
-
Mihir Bellare, David Pointcheval, and Phillip Rogaway. Authenticated Key Exchange Secure Against Dictionary Attacks. In Bart Preneel, editor, Advances in Cryptology - Eurocrypt 2000, pages 139 - 155. Springer-Verlag, 2000. Volume 1807/2000 of Lecture Notes in Computer Science.
-
(2000)
Advances in Cryptology - Eurocrypt 2000
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
5
-
-
0005078946
-
Entity authentication and key distribution
-
Douglas R. Stinson, editor, Springer-Verlag, Volume 773/1993 of Lecture Notes in Computer Science
-
Mihir Bellare and Phillip Rogaway. Entity Authentication and Key Distribution. In Douglas R. Stinson, editor, Advances in Cryptology - Crypto 1993, pages 110-125. Springer-Verlag, 1993. Volume 773/1993 of Lecture Notes in Computer Science.
-
(1993)
Advances in Cryptology - Crypto 1993
, pp. 110-125
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
0001940580
-
Provably secure session key distribution: The three party case
-
F. Tom Leighton and Allan Borodin, editors, ACM Press
-
Mihir Bellare and Phillip Rogaway. Provably Secure Session Key Distribution: The Three Party Case. In F. Tom Leighton and Allan Borodin, editors, 27th ACM Symposium on the Theory of Computing - STOC 1995, pages 57-66. ACM Press, 1995.
-
(1995)
27th ACM Symposium on the Theory of Computing - STOC 1995
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
(Extended version available). Birgit Pfitzmann, editor, Springer-Verlag, Volume 2045/2001 of Lecture Notes in Computer Science
-
Ran Canetti and Hugo Krawczyk. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels (Extended version available from http://eprint.iacr.org/2001/040/). In Birgit Pfitzmann, editor, Advances in Cryptology - Eurocrypt 2001, pages 453-474. Springer-Verlag, 2001. Volume 2045/2001 of Lecture Notes in Computer Science.
-
(2001)
Advances in Cryptology - Eurocrypt 2001
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
9
-
-
26444548230
-
On session identifiers in provably secure protocols: The bellare-rogaway three-party key distribution protocol revisited
-
(Extended version available). Blundo Carlo and Stelvio Cimato, editors, Springer-Verlag, Volume 3352/2005 of Lecture Notes in Computer Science
-
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, and Greg Maitland. On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited (Extended version available from http://eprint.iacr.org/2004/345). In Blundo Carlo and Stelvio Cimato, editors, 4th Conference on Security in Communication Networks - SCN 2004, pages 352-367. Springer-Verlag, 2004. Volume 3352/2005 of Lecture Notes in Computer Science.
-
(2004)
4th Conference on Security in Communication Networks - SCN 2004
, pp. 352-367
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
Maitland, G.4
-
11
-
-
35048878818
-
One-round protocols for two-party authenticated key exchange
-
Markus Jakobsson, Moti Yung, and Jianying Zhou, editors, Springer-Verlag, Volume 3089/2004 of Lecture Notes in Computer Science
-
Ik Rae Jeong, Jonathan Katz, and Dong Hoon Lee. One-Round Protocols for Two-Party Authenticated Key Exchange. In Markus Jakobsson, Moti Yung, and Jianying Zhou, editors, Applied Cryptography and Network Security - ACNS 2004, pages 220-232. Springer-Verlag, 2004. Volume 3089/2004 of Lecture Notes in Computer Science.
-
(2004)
Applied Cryptography and Network Security - ACNS 2004
, pp. 220-232
-
-
Jeong, I.R.1
Katz, J.2
Lee, D.H.3
-
13
-
-
0023247970
-
Efficient and timely mutual authentication
-
Dave Otway and Owen Rees. Efficient and Timely Mutual Authentication. ACM Operating Systems Review, 21(1):8-10, 1987.
-
(1987)
ACM Operating Systems Review
, vol.21
, Issue.1
, pp. 8-10
-
-
Otway, D.1
Rees, O.2
-
14
-
-
84937411969
-
Flaws in applying proof methodologies to signature schemes
-
Moti Yung, editor, Springer-Verlag, Volume 2442/2002 of Lecture Notes in Computer Science
-
Jacques Stern, David Pointcheval, John Malone-Lee, and Nigel Smart. Flaws in Applying Proof Methodologies to Signature Schemes. In Moti Yung, editor, Advances in Cryptology - Crypto 2002, pages 93-110. Springer-Verlag, 2002. Volume 2442/2002 of Lecture Notes in Computer Science.
-
(2002)
Advances in Cryptology - Crypto 2002
, pp. 93-110
-
-
Stern, J.1
Pointcheval, D.2
Malone-Lee, J.3
Smart, N.4
-
15
-
-
26444456234
-
Provably secure key exchange: An engineering approach
-
Australian Computer Society, Volume 21 of Conferences in Research and Practice in Information Technology
-
Yiu Shing Terry Tin, Colin Boyd, and Juan Manuel Gonzalez-Nieto. Provably Secure Key Exchange: An Engineering Approach. In Australasian Information Security Workshop Conference on ACSW Frontiers 2003, pages 97-104. Australian Computer Society, 2003. Volume 21 of Conferences in Research and Practice in Information Technology.
-
(2003)
Australasian Information Security Workshop Conference on ACSW Frontiers 2003
, pp. 97-104
-
-
Tin, Y.S.T.1
Boyd, C.2
Gonzalez-Nieto, J.M.3
|