-
1
-
-
24144444566
-
One-time verifier-based encrypted key exchange
-
S. Vaudenay, editor, Public Key Cryptography - PKC 2005. Springer-Verlag
-
M. Abdalla, O. Chevassut, and D. Pointcheval. One-time verifier-based encrypted key exchange. In S. Vaudenay, editor, Public Key Cryptography - PKC 2005, volume 3386 of LNCS, pages 47-64. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3386
, pp. 47-64
-
-
Abdalla, M.1
Chevassut, O.2
Pointcheval, D.3
-
2
-
-
35048823512
-
Authenticated three party key agreement protocols from pairings
-
K.G. Paterson, editor, Proceedings of 9th IMA International Conference on Cryptography and Coding. Springer-Verlag
-
S.S. Al-Riyami and K.G. Paterson. Authenticated three party key agreement protocols from pairings. In K.G. Paterson, editor, Proceedings of 9th IMA International Conference on Cryptography and Coding, volume 2898 of Lecture Notes in Computer Science, pages 332-359. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2898
, pp. 332-359
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
3
-
-
33646826379
-
A new two-party identity-based authenticated key agreement
-
P.S.L.M. Barreto and N. McCullagh. A new two-party identity-based authenticated key agreement. Cryptology ePrint Archive, Report 2004/122, 2005. http://eprint.iacr.org/.
-
(2005)
Cryptology EPrint Archive, Report
, vol.2004
, Issue.122
-
-
Barreto, P.S.L.M.1
McCullagh, N.2
-
4
-
-
24144458508
-
A new two-party identity-based authenticated key agreement
-
Topics in Cryptology - CT-RSA '2005. Springer-Verlag
-
P.S.L.M. Barreto and N. McCullagh. A new two-party identity-based authenticated key agreement. In Topics in Cryptology - CT-RSA '2005, volume 3376 of Lecture Notes in Computer Science, pages 262-274. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 262-274
-
-
Barreto, P.S.L.M.1
McCullagh, N.2
-
6
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
B. Preneel, editor, Advances in Cryptology - EUROCRYPT 2000. Springer-Verlag
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In B. Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, pages 139-155. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
7
-
-
84945119254
-
Entity authentication and key distribution
-
Advances in Cryptology - CRYPTO '93. Springer-Verlag
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In Advances in Cryptology - CRYPTO '93, volume 773 of LNCS, pages 232-249. Springer-Verlag, 1994.
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
9
-
-
84949230533
-
Key agreement protocols and their security analysis
-
Cryptography and Coding. Springer-Verlag
-
S. Blake-Wilson, D. Johnson, and A. Menezes. Key agreement protocols and their security analysis. In Cryptography and Coding, volume 1355 of LNCS, pages 30-45. Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
10
-
-
33646180371
-
On session key construction in provably-secure key establishment protocols
-
Proceedings of International Conference on Cryptology in Malaysia - Mycrypt 2005. Springer-Verlag
-
C. Boyd, K.-K.R. Choo, and Y. Hitchcock. On session key construction in provably-secure key establishment protocols. In Proceedings of International Conference on Cryptology in Malaysia - Mycrypt 2005, volume 3715 of LNCS, page 116131. Springer-Verlag, 2005. http://eprint.iacr.org/2006/206.
-
(2005)
LNCS
, vol.3715
, pp. 116131
-
-
Boyd, C.1
Choo, K.-K.R.2
Hitchcock, Y.3
-
11
-
-
35048899816
-
Key agreement using statically keyed authenticators
-
Applied Cryptography and Network Security: Second International Conference, ACNS 2004. Springer-Verlag
-
C. Boyd, W. Mao, and K. Paterson. Key agreement using statically keyed authenticators. In Applied Cryptography and Network Security: Second International Conference, ACNS 2004, volume 3089 of Lecture Notes in Computer Science, pages 388-401. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3089
, pp. 388-401
-
-
Boyd, C.1
Mao, W.2
Paterson, K.3
-
12
-
-
34548783058
-
Tripartite key exchange in the Canetti-Krawczyk proof model
-
Proceedings of 5th International Conference on Cryptology in India INDOCRYPT 2004. Springer-Verlag
-
C. Boyd, J.M. González Nieto, and Y. Hitchcock. Tripartite key exchange in the Canetti-Krawczyk proof model. In Proceedings of 5th International Conference on Cryptology in India INDOCRYPT 2004, volume 3348 of Lecture Notes in Computer Science, pages 388-401. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3348
, pp. 388-401
-
-
Boyd, C.1
Nieto, J.M.G.2
Hitchcock, Y.3
-
13
-
-
0348155938
-
A password-based authenticator: Security proof and applications
-
Proceedings of 4th International Conference on Cryptology in India INDOCRYPT 2003. Springer-Verlag
-
C. Boyd, J.M. González Nieto, Y. Hitchcock, P. Montague, and Y.S.T. Tin. A password-based authenticator: Security proof and applications. In Proceedings of 4th International Conference on Cryptology in India INDOCRYPT 2003, volume 2904 of Lecture Notes in Computer Science, pages 388-401. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2904
, pp. 388-401
-
-
Boyd, C.1
Nieto, J.M.G.2
Hitchcock, Y.3
Montague, P.4
Tin, Y.S.T.5
-
14
-
-
63449093784
-
Provably secure mobile key exchange: Applying the Canetti-Krawczyk approach
-
Information Security and Privacy, 8th Australasian Conference, ACISP 2003. Springer-Verlag
-
C. Boyd, J.M. Gonzáleź Nieto, and Y.S.T. Tin. Provably secure mobile key exchange: Applying the Canetti-Krawczyk approach. In Information Security and Privacy, 8th Australasian Conference, ACISP 2003, volume 2727 of Lecture Notes in Computer Science, pages 166-179. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2727
, pp. 166-179
-
-
Boyd, C.1
Nieto, J.M.G.2
Tin, Y.S.T.3
-
15
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
B. Pfitzmann, editor, Advances in Cryptology EUROCRYPT 2001. Springer-Verlag
-
R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In B. Pfitzmann, editor, Advances in Cryptology EUROCRYPT 2001, volume 2045 of LNCS, pages 453-474. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
16
-
-
84947232363
-
Universally composable notions of key exchange and secure channels
-
L.R. Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002. Springer-Verlag
-
R. Canetti and H. Krawczyk. Universally composable notions of key exchange and secure channels. In L.R. Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002, volume 2332 of Lecture Notes in Computer Science, pages 337-351. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 337-351
-
-
Canetti, R.1
Krawczyk, H.2
-
17
-
-
10444246846
-
Identity based authenticated key agreement from pairings
-
L. Chen and C. Kudla. Identity based authenticated key agreement from pairings. Cryptology ePrint Archive, Report 2002/184, 2002. http://eprint.iacr. org/.
-
(2002)
Cryptology EPrint Archive, Report
, vol.2002
, Issue.184
-
-
Chen, L.1
Kudla, C.2
-
18
-
-
84942246351
-
Identity based authenticated key agreement from pairings
-
IEEE Computer Society Press
-
L. Chen and C. Kudla. Identity based authenticated key agreement from pairings. In IEEE Computer Security Foundations Workshop - CSFW-16 2003, pages 219-233. IEEE Computer Society Press, 2003.
-
(2003)
IEEE Computer Security Foundations Workshop - CSFW-16 2003
, pp. 219-233
-
-
Chen, L.1
Kudla, C.2
-
19
-
-
1542593353
-
Authentication and authenticated key exchange
-
W. Diffie, P. C. van Oorschot, and M. J. Weiner. Authentication and authenticated key exchange. Designs, Codes and Cryptography, 2:107-125, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Weiner, M.J.3
-
20
-
-
33646761205
-
Mutual authentication and key exchange protocol for low power devices
-
Financial Cryptography, 5th International Conference, FC 2001. Springer-Verlag
-
M. Jakobsson and D. Pointcheval. Mutual authentication and key exchange protocol for low power devices. In Financial Cryptography, 5th International Conference, FC 2001, volume 2339 of Lecture Notes in Computer Science, page 178195. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2339
, pp. 178195
-
-
Jakobsson, M.1
Pointcheval, D.2
-
21
-
-
35048878818
-
One-round protocols for two-party authenticated key exchange
-
Applied Cryptography and Network Security: the Second International Conference, ACNS 2004. Springer-Verlag
-
I.R. Jeong, J. Katz, and D.H. Lee. One-round protocols for two-party authenticated key exchange. In Applied Cryptography and Network Security: the Second International Conference, ACNS 2004, volume 3089 of Lecture Notes in Computer Science, pages 220-232. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3089
, pp. 220-232
-
-
Jeong, I.R.1
Katz, J.2
Lee, D.H.3
-
22
-
-
35248878854
-
Scalable protocols for authenticated group key exchange
-
D. Boneh, editor, Advances in Cryptology - CRYPTO 2003. Springer-Verlag
-
J. Katz and M. Yung. Scalable protocols for authenticated group key exchange. In D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, volume 2729 of LNCS, pages 110-125. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 110-125
-
-
Katz, J.1
Yung, M.2
-
23
-
-
74549221711
-
An efficient protocol for authenticated key agreement
-
L. Law, A. Menezes, M. Qu, J. Solinas, and S.A. Vanstone. An efficient protocol for authenticated key agreement. Designs, Codes and Cryptography, 28(2):119-134, 2003.
-
(2003)
Designs, Codes and Cryptography
, vol.28
, Issue.2
, pp. 119-134
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.A.5
-
24
-
-
0022660635
-
On seeking smart public-key-distribution systems
-
T. Matsumoto, Y. Takashima, and H. Imai. On seeking smart public-key-distribution systems. Electronics Letters, E69(2):99-106, 1986.
-
(1986)
Electronics Letters
, vol.E69
, Issue.2
, pp. 99-106
-
-
Matsumoto, T.1
Takashima, Y.2
Imai, H.3
-
25
-
-
84937389342
-
The gap-problems: A new class of problems for the security of cryptographic schemes
-
K. Kim, editor, Public Key Cryptography - PKC 2001. Springer-Verlag
-
T. Okamoto and D. Pointcheval. The gap-problems: A new class of problems for the security of cryptographic schemes. In K. Kim, editor, Public Key Cryptography - PKC 2001, volume 1992 of LNCS, pages 104-118. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.1992
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
-
26
-
-
0004023090
-
On formal models for secure key exchange
-
V. Shoup. On formal models for secure key exchange. IBM Technical Report RZ 3120, 1999. http://shoup.net/papers.
-
(1999)
IBM Technical Report
, vol.RZ 3120
-
-
Shoup, V.1
-
27
-
-
0037142442
-
An identity based authenticated key agreement protocol based on the Weil pairing
-
N.P. Smart. An identity based authenticated key agreement protocol based on the Weil pairing. Electronics Letters, 38(13):630-632, 2002.
-
(2002)
Electronics Letters
, vol.38
, Issue.13
, pp. 630-632
-
-
Smart, N.P.1
|