-
1
-
-
0033748607
-
New multiparty authentication services and key agreement protocols
-
April
-
G. Ateniese, M. Steiner, and G. Tsudik, "New multiparty authentication services and key agreement protocols," IEEE J. Sel. Areas Commun., vol. 18, no.4, pp.628-639, April 2000.
-
(2000)
IEEE J. Sel. Areas Commun.
, vol.18
, Issue.4
, pp. 628-639
-
-
Ateniese, G.1
Steiner, M.2
Tsudik, G.3
-
2
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Advances in Cryptology, Eurocrypt'00
-
M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," Advances in Cryptology, Eurocrypt'00, LNCS 1807, pp.139-155, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
84945119254
-
Entity authentication and key distribution
-
Advances in Cryptology, Crypto'93
-
M. Bellare and P. Rogaway, "Entity authentication and key distribution," Advances in Cryptology, Crypto'93, LNCS 773, pp.232-249, 1993.
-
(1993)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
35248878662
-
Round-optimal contributory conference key agreement
-
Proc. 6th International Workshop on Practice and Theory in Public Key Cryptography (PKC 2003)
-
C. Boyd and J.M.G. Nieto, "Round-optimal contributory conference key agreement," Proc. 6th International Workshop on Practice and Theory in Public Key Cryptography (PKC 2003), LNCS 2567, pp.161-174, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 161-174
-
-
Boyd, C.1
Nieto, J.M.G.2
-
5
-
-
0035751060
-
Provably authenticated group Diffie-Hellman key exchange
-
E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater, "Provably authenticated group Diffie-Hellman key exchange," Proc. 8th ACM Conf. on Computer and Communications Security (CCS'01), pp.255-264, 2001.
-
(2001)
Proc. 8th ACM Conf. on Computer and Communications Security (CCS'01)
, pp. 255-264
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
Quisquater, J.-J.4
-
6
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Advances in Cryptology, Eurocrypt 2001
-
R. Canetti and H. Krawczyk, "Analysis of key-exchange protocols and their use for building secure channels," Advances in Cryptology, Eurocrypt 2001, LNCS 2045, pp.453-474, 2001.
-
(2001)
LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
7
-
-
0028378975
-
Identity-based conference key broadcast schemes with user authentication
-
J.L. Chen and T. Hwang, "Identity-based conference key broadcast schemes with user authentication," Comput. Secur., vol.13, no.1, pp.53-57, 1994.
-
(1994)
Comput. Secur.
, vol.13
, Issue.1
, pp. 53-57
-
-
Chen, J.L.1
Hwang, T.2
-
8
-
-
0025554775
-
A new key sharing system for global telecommunications
-
IEEE Press
-
T. Chikazawa and T. Inoue, "A new key sharing system for global telecommunications," Proc. Global Telecommunications Conference 1990 (GLOBECOM'90), vol.2, pp.1069-1072, IEEE Press, 1990.
-
(1990)
Proc. Global Telecommunications Conference 1990 (GLOBECOM'90)
, vol.2
, pp. 1069-1072
-
-
Chikazawa, T.1
Inoue, T.2
-
9
-
-
32244443990
-
An improved identity-based one-way conference key sharing system
-
IEEE Press
-
T. Chikazawa and A. Yamagishi, "An improved identity-based one-way conference key sharing system," Proc. ICCS/ISITA'92, vol.1, pp.270-273, IEEE Press, 1992.
-
(1992)
Proc. ICCS/ISITA'92
, vol.1
, pp. 270-273
-
-
Chikazawa, T.1
Yamagishi, A.2
-
10
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. Oorschot, and M. Wiener, "Authentication and authenticated key exchanges," Des. Codes Cryptogr., vol.2, no.2, pp.107-125, 1992.
-
(1992)
Des. Codes Cryptogr.
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Oorschot, P.2
Wiener, M.3
-
11
-
-
0027615034
-
ID-based cryptographic schemes for user identification, digital signature, and key distribution
-
L. Harn and S. Yang, "ID-based cryptographic schemes for user identification, digital signature, and key distribution," IEEE J. Sel. Areas Commun., vol. 11, no.5, pp.757-760, 1993.
-
(1993)
IEEE J. Sel. Areas Commun.
, vol.11
, Issue.5
, pp. 757-760
-
-
Harn, L.1
Yang, S.2
-
12
-
-
0028017207
-
Identity-based conference key broadcast systems
-
T. Hwang and J.L. Chen, "Identity-based conference key broadcast systems," IEE Proc. - Computers and Digital Techniques, vol.141, no.1, pp.57-60, 1994.
-
(1994)
IEE Proc. - Computers and Digital Techniques
, vol.141
, Issue.1
, pp. 57-60
-
-
Hwang, T.1
Chen, J.L.2
-
13
-
-
3543038203
-
Attacks to Xu-Tilborg's conference key distribution scheme
-
B. Jung, S. Paeng, and D. Kim, "Attacks to Xu-Tilborg's conference key distribution scheme," IEEE Commun. Lett., vol.8, no.7, pp.446-448, 2004.
-
(2004)
IEEE Commun. Lett.
, vol.8
, Issue.7
, pp. 446-448
-
-
Jung, B.1
Paeng, S.2
Kim, D.3
-
14
-
-
84955559079
-
Authenticated multi-party key agreement
-
Advances in Cryptology, Asiacrypt'96
-
M. Just and S. Vaudenay, "Authenticated multi-party key agreement," Advances in Cryptology, Asiacrypt'96, LNCS 1163, pp.36-49, 1996.
-
(1996)
LNCS
, vol.1163
, pp. 36-49
-
-
Just, M.1
Vaudenay, S.2
-
15
-
-
35248878854
-
Scalable protocols for authenticated group key exchange
-
Advances in Cryptology, Crypto'03, Aug.
-
J. Katz and M. Yung, "Scalable protocols for authenticated group key exchange," Advances in Cryptology, Crypto'03, LNCS 2729, pp.110-125, Aug. 2003.
-
(2003)
LNCS
, vol.2729
, pp. 110-125
-
-
Katz, J.1
Yung, M.2
-
16
-
-
19644371756
-
A weakness in the Bresson-Chevassut-Essiari-Pointcheval's group key agreement scheme for low-power mobile devices
-
J. Nam, S. Kim, and D. Won, "A weakness in the Bresson-Chevassut- Essiari-Pointcheval's group key agreement scheme for low-power mobile devices," IEEE Commun. Lett., vol.9, no.5, pp.429-431, 2005.
-
(2005)
IEEE Commun. Lett.
, vol.9
, Issue.5
, pp. 429-431
-
-
Nam, J.1
Kim, S.2
Won, D.3
-
18
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Advances in Cryptology, Crypto'84
-
A. Shamir, "Identity-based cryptosystems and signature schemes," Advances in Cryptology, Crypto'84, LNCS 196, pp.47-53, 1984.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
19
-
-
0037352978
-
Some attacks on Chikazawa-Yamagishi ID-based key sharing scheme
-
K. Shim, "Some attacks on Chikazawa-Yamagishi ID-based key sharing scheme," IEEE Commun. Lett., vol.7, no.3, pp.145-147, 2003.
-
(2003)
IEEE Commun. Lett.
, vol.7
, Issue.3
, pp. 145-147
-
-
Shim, K.1
-
20
-
-
84957810610
-
Cryptanalysis of several conference key distribution schemes
-
Advances in Cryptology, Asiacrypt'91
-
A. Shimbo and S. Kawamura, "Cryptanalysis of several conference key distribution schemes," Advances in Cryptology, Asiacrypt'91, LNCS 739, pp.265-276, 1993.
-
(1993)
LNCS
, vol.739
, pp. 265-276
-
-
Shimbo, A.1
Kawamura, S.2
-
22
-
-
84863285641
-
Attack on the Koyama-Ohta identity based key distribution scheme
-
Advances in Cryptology, Crypto'87
-
Y. Yacobi, "Attack on the Koyama-Ohta identity based key distribution scheme," Advances in Cryptology, Crypto'87, LNCS 293, pp.429-433, 1988.
-
(1988)
LNCS
, vol.293
, pp. 429-433
-
-
Yacobi, Y.1
-
23
-
-
3042717133
-
Attack on an ID-based authenticated group key agreement scheme from PKC 2004
-
F. Zhang and X. Chen, "Attack on an ID-based authenticated group key agreement scheme from PKC 2004," Inf. Process. Lett., vol.91, pp.191-193, 2004.
-
(2004)
Inf. Process. Lett.
, vol.91
, pp. 191-193
-
-
Zhang, F.1
Chen, X.2
|