-
2
-
-
35248835023
-
Constructing elliptic curves with prescribed embedding degrees
-
Security in communication networks - SCN'2002, Springer-Verlag
-
P.S.L.M. Barreto, B. Lynn, and M. Scott. Constructing elliptic curves with prescribed embedding degrees. In Security in communication networks - SCN'2002, volume 2576 of LNCS, pages 263-273. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2576
, pp. 263-273
-
-
Barreto, P.S.L.M.1
Lynn, B.2
Scott, M.3
-
3
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key exchange protocols
-
ACM Press, Full version
-
M. Bellare, R. Canetti, and H. Krawczyk. A modular approach to the design and analysis of authentication and key exchange protocols. In Proceedings of the thirtieth annual ACM symposium on Theory of computing, pages 419-428. ACM Press, 1998. Full version at http://www-cse.ucsd.edu/users/mihir/papers/key-distribution.html.
-
(1998)
Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
84945119254
-
Entity authentication and key distribution
-
Springer-Verlag, Full version
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In Advances in Cryptology - CRYPTO'93, pages 232-249. Springer-Verlag, 1993. Full version at www-cse.ucsd.edu/users/mihir.
-
(1993)
Advances in Cryptology - CRYPTO'93
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
J. Kilian, editor, Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference. Springer Verlag
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In J. Kilian, editor, Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, volume 2139 of LNCS, pages 213-229. Springer Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
full version of [6]
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. SIAM J. Computing, 32(3):586-615, 2003. http://www.crypto.stanford.edu/~dabo/abstracts/ibe.html, full version of [6].
-
(2003)
SIAM J. Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
84946840347
-
Short signatures from the Weil pairing
-
C. Boyd, editor, Advances in Cryptology - ASIACRYPT 2001. Springer-Verlag
-
D. Boneh, H. Shacham, and B. Lynn. Short signatures from the Weil pairing. In C. Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, volume 2248 of LNCS, pages 514-532. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Shacham, H.2
Lynn, B.3
-
9
-
-
0034227286
-
Methods, and protocols for secure key negotiation using IKE
-
July/August
-
M.S. Borella, Methods, and protocols for secure key negotiation using IKE. IEEE Network, pages 18-29, July/August 2000.
-
(2000)
IEEE Network
, pp. 18-29
-
-
Borella, M.S.1
-
11
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Advances in Cryptology - Eurocrypt 2001. Springer-Verlag
-
R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Advances in Cryptology - Eurocrypt 2001, volume 2045 of LNCS, pages 453-474. Springer-Verlag, 2001. http://eprint.iacr.org/2001/040.pg.gz.
-
(2001)
LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
13
-
-
0034804626
-
An architecture for the Internet Key Exchange protocol
-
P.-C. Cheng. An architecture for the Internet Key Exchange protocol. IBM Systems Journal, 40(3):721-745, 2001.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 721-745
-
-
Cheng, P.-C.1
-
15
-
-
27744571440
-
Practical non-interactive key distribution based on pairings
-
R. Dupont and A. Enge. Practical non-interactive key distribution based on pairings. Cryptology ePrint Archive, Report 2002/136, 2002. http://eprint.iacr.org/.
-
(2002)
Cryptology EPrint Archive, Report
, vol.2002
, Issue.136
-
-
Dupont, R.1
Enge, A.2
-
16
-
-
23944499936
-
Building curves with arbitrary small MOV degree over finite prime fields
-
R. Dupont, A. Enge, and F. Morain. Building curves with arbitrary small MOV degree over finite prime fields. Cryptology ePrint Archive, Report 2002/094, 2002. http://eprint.iacr.org/.
-
(2002)
Cryptology EPrint Archive, Report
, vol.2002
, Issue.94
-
-
Dupont, R.1
Enge, A.2
Morain, F.3
-
18
-
-
84946832010
-
Supersingular curves in cryptography
-
C. Boyd, editor, Proceedings of AsiaCrypt 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security. Springer-Verlag
-
S. D. Galbraith. Supersingular curves in cryptography. In C. Boyd, editor, Proceedings of AsiaCrypt 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, volume 2248 of LNCS, pages 495-513. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 495-513
-
-
Galbraith, S.D.1
-
19
-
-
82955246861
-
Implementing the Tate pairing
-
Algorithmic Number Theory 5th International Symposium, ANTS-V. Springer-Verlag
-
S. D. Galbraith, K. Harrison, and D. Soldera. Implementing the Tate pairing. In Algorithmic Number Theory 5th International Symposium, ANTS-V, volume 2369 of LNCS, pages 324-337. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2369
, pp. 324-337
-
-
Galbraith, S.D.1
Harrison, K.2
Soldera, D.3
-
20
-
-
84937570422
-
Self-certified public keys
-
LNCS. Springer-Verlag
-
M. Girault. Self-certified public keys. In Advances in Cryptology - Eurocrypt 1991, LNCS, pages 490-497. Springer-Verlag, 1991.
-
(1991)
Advances in Cryptology - Eurocrypt 1991
, pp. 490-497
-
-
Girault, M.1
-
22
-
-
18744370043
-
-
February. Internet Draft
-
D. Harkins, C. Kaufman, T. Kivinen, S. Kent, and R. Perlman. Design Rationale for IKEv2, February 2002. Internet Draft.
-
(2002)
Design Rationale for IKEv2
-
-
Harkins, D.1
Kaufman, C.2
Kivinen, T.3
Kent, S.4
Perlman, R.5
-
23
-
-
84946844750
-
A one round protocol for tripartite Diffie-Hellman
-
W. Bosma, editor. Springer-Verlag
-
A. Joux. A one round protocol for tripartite Diffie-Hellman. In W. Bosma, editor, Algorithmic Number Theory, IV-th Symposium (ANTS IV), Lecture Notes in Computer Science 1838, pages 385-394. Springer-Verlag, 2000.
-
(2000)
Algorithmic Number Theory, IV-th Symposium (ANTS IV), Lecture Notes in Computer Science
, vol.1838
, pp. 385-394
-
-
Joux, A.1
-
25
-
-
0029719080
-
Some new attacks upon security protocols
-
. IEEE Computer Society Press
-
G. Lowe. Some new attacks upon security protocols. In 9th IEEE Computer Security Foundations Workshop, pages 162-169. IEEE Computer Society Press, 1996.
-
(1996)
9th IEEE Computer Security Foundations Workshop
, pp. 162-169
-
-
Lowe, G.1
-
28
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
December
-
R.M. Needham and M.D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, December 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
29
-
-
1642414982
-
Cryptography from pairings: A snapshot of current research
-
K.G. Paterson. Cryptography from pairings: A snapshot of current research. Information Security Technical Report, 7(3):41-54, 2002. http://www.isg.rhul.ac.uk/~kp/pairings.ps.
-
(2002)
Information Security Technical Report
, vol.7
, Issue.3
, pp. 41-54
-
-
Paterson, K.G.1
-
30
-
-
0034315111
-
Key exchange in IPSec: Analysis of IKE
-
November-December
-
R. Perlman and C. Kaufman. Key exchange in IPSec: Analysis of IKE. IEEE Internet Computing, pages 50-56, November-December 2000.
-
(2000)
IEEE Internet Computing
, pp. 50-56
-
-
Perlman, R.1
Kaufman, C.2
-
31
-
-
0037611030
-
A note on Girault's self-certified model
-
S. Saeednia. A note on Girault's self-certified model. Information Processing Letters, 86:323-327, 2003.
-
(2003)
Information Processing Letters
, vol.86
, pp. 323-327
-
-
Saeednia, S.1
-
32
-
-
1642358858
-
Cryptosystems based on pairing
-
Okinawa, Japan, January
-
R. Sakai, K. Ohgishi, and M. Kasahara. Cryptosystems based on pairing. In The 2000 Sympoium on Cryptography and Information Security, Okinawa, Japan, January 2000.
-
(2000)
The 2000 Sympoium on Cryptography and Information Security
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
33
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer-Verlag
-
A. Shamir. Identity-based cryptosystems and signature schemes. In Proceedings of Crypto 84, pages 47-53. Springer-Verlag, 1985.
-
(1985)
Proceedings of Crypto 84
, pp. 47-53
-
-
Shamir, A.1
-
34
-
-
84945129491
-
Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
-
B. Pfitzmann, editor. Springer-Verlag
-
E. R. Verheul. Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. In B. Pfitzmann, editor, Advances in Cryptology - Proceedings of EUROCRYPT'01, Lecture Notes in Computer Science 2045, pages 195-210. Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology - Proceedings of EUROCRYPT'01, Lecture Notes in Computer Science
, vol.2045
, pp. 195-210
-
-
Verheul, E.R.1
-
35
-
-
0032669524
-
Fixing a security flaw in IKE protocols
-
24th June
-
J. Zhou. Fixing a security flaw in IKE protocols. Electronics Letters, 35(13):1072-1073, 24th June 1999.
-
(1999)
Electronics Letters
, vol.35
, Issue.13
, pp. 1072-1073
-
-
Zhou, J.1
-
36
-
-
0034315483
-
Further analysis of the Internet key exchange protocol
-
J. Zhou. Further analysis of the Internet key exchange protocol. Computer Communications, 23:1606-1612, 2000.
-
(2000)
Computer Communications
, vol.23
, pp. 1606-1612
-
-
Zhou, J.1
|