-
1
-
-
35048860626
-
Advances in cryptology eurocrypt 2001, analysis of keyexchange protocols and their use for building secure channels
-
Springer-Verlag
-
Canetti, R., Krawczyk, H., Advances in Cryptology Eurocrypt 2001, Analysis of KeyExchange Protocols and Their Use for Building Secure Channels. Lecture Notes in Computer Science, Springer-Verlag,Vol 2045 (2001) 453-474.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
2
-
-
35048899816
-
Key agreement using statically keyed authenticators
-
Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Springer-verlag
-
Colin Boyd, Wenbo Mao and Kenny Paterson: Key Agreement using Statically Keyed Authenticators, Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Lecture Notes in Computer Science, Springer-verlag, volume 3089,(2004)248-262.
-
(2004)
Lecture Notes in Computer Science
, vol.3089
, pp. 248-262
-
-
Boyd, C.1
Mao, W.2
Paterson, K.3
-
3
-
-
84945119254
-
Entity authentication and key distributionAdvances in Cryptology,- CRYPTO'93
-
Springer-Verlag
-
Bellare, M., Rogaway, P., Entity authentication and key distribution, Advances in Cryptology,- CRYPTO'93, Lecture Notes in Computer Science, Springer-Verlag, Vol 773 (1994) 232-249
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key-exchange protocols
-
Bellare, M., Canetti, R., Krawczyk, H., A modular approach to the design and analysis of authentication and key-exchange protocols, 30th STOC, (1998)419-428
-
(1998)
30th STOC
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
5
-
-
84944878354
-
-
chapter 12, CRC Press
-
A. Menezes, P. vanOorschot, and S. Vanstone, Handbook of Applied Cryptography, chapter 12, CRC Press, 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Vanoorschot, P.2
Vanstone, S.3
-
6
-
-
0017018484
-
New directions in cryptography
-
W. Diffie, M. Hellman: New directions in cryptography, IEEE Trans. Info. Theory IT-22, November (1976)644-654
-
(1976)
IEEE Trans. Info. Theory
, vol.IT-22
, Issue.NOVEMBER
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
7
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. van Oorschot, M. Wiener. Authentication and authenticated key exchanges, Designs, Codes and Cryptography, 2, (1992)107-125
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.2
Wiener, M.3
-
10
-
-
0004023090
-
On formal models for secure key exchange
-
V. Shoup, On Formal Models for Secure Key Exchange, Theory of Cryptography Library, 1999. http://philby.ucsd,edu/cryptolib/1999/99-12.html
-
(1999)
Theory of Cryptography Library
-
-
Shoup, V.1
-
12
-
-
0005243827
-
An efficient protocol for authenticated key agreement
-
Department of C&O, University of Waterloo
-
L. law, A. Menezes, M.Qu, et.al, An Efficient Protocol for Authenticated Key Agreement. Tech. Bep. CORR 98-05, Department of C&O, University of Waterloo.
-
Tech. Rep.
, vol.CORR 98-05
-
-
Law, L.1
Menezes, A.2
Qu, M.3
-
13
-
-
33644496615
-
Cryptanalysis of Al-Riyami-Paterson's authenticated three party key agreement protocols
-
Report 2003/122
-
K. Shim, Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols, Cryptology ePrint Archive, Report 2003/122, 2003. http://eprint.iacr.org/2003/122.
-
(2003)
Cryptology EPrint Archive
-
-
Shim, K.1
-
15
-
-
0036505541
-
Authentication protocols for mobile network environment value-added services
-
Günther Horn, Keith M. Martin, Chris J. Mitchell, Authentication Protocols for Mobile Network Environment Value-Added Services, IEEE Transaction on Vehicular Technology, Vol 51 (2002)383-392
-
(2002)
IEEE Transaction on Vehicular Technology
, vol.51
, pp. 383-392
-
-
Horn, G.1
Martin, K.M.2
Mitchell, C.J.3
-
16
-
-
0032069870
-
Key control in key agreement protocols
-
C. J. Mitchell, M. Ward, P. Wilson, Key control in key agreement protocols, Electronics Letters, Vol 34 (1998) 980-981
-
(1998)
Electronics Letters
, vol.34
, pp. 980-981
-
-
Mitchell, C.J.1
Ward, M.2
Wilson, P.3
-
18
-
-
84947232363
-
Universally composable notions of key exchange and secure channels
-
Advances in Cryptology-EUROCRYPT 2002, Springer-vertag
-
R. Canetti, H. Krawczyk. Universally Composable Notions of Key Exchange and Secure Channels. Advances in Cryptology-EUROCRYPT 2002, Lecture Notes in Computer Science, Springer-vertag, volume 2332 (2002) 337-351.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 337-351
-
-
Canetti, R.1
Krawczyk, H.2
-
19
-
-
0025386404
-
A logic of authentication
-
Burrows, M., Abadi, M., Needham, R.M, A logic of Authentication, ACM Transactions on Computer Systems, vol.8, No.l (1990) 122-133.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.50
, pp. 122-133
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
20
-
-
0001566477
-
Formal verification of cryptographic protocols: A survey
-
Advances in Cryptology, Asiacrypt'96 Proceedings. Springer-Verlag
-
Meadows C. Formal verification of cryptographic protocols: A survey. In: Advances in Cryptology, Asiacrypt'96 Proceedings. Lecture Notes in Computer Science, Springer-Verlag, Vol 1163, (1996) 135-150.
-
(1996)
Lecture Notes in Computer Science
, vol.1163
, pp. 135-150
-
-
Meadows, C.1
-
21
-
-
33646832790
-
Security extension for the Canetti-Krawczyk model in identity-based systems
-
Li Xinghua, Ma Jianfeng, SangJae Moon, Security Extension for the Canetti-Krawczyk Model in Identity-based Systems, Science in China, Vol 34, (2004)
-
(2004)
Science in China
, vol.34
-
-
Li, X.1
Ma, J.2
Moon, S.3
-
22
-
-
35048866891
-
New security results on encrypted key exchange
-
the 7th International Workshop on Theory and Practice in Public Key Cryptography-PKC 2004, Springer-Verlag, (2947)
-
E. Bresson, O. Chevassut, D. Pointcheval. New Security Results on Encrypted Key Exchange, the 7th International Workshop on Theory and Practice in Public Key Cryptography-PKC 2004, Springer-Verlag, LNCS (2947) 145-158.
-
LNCS
, pp. 145-158
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
23
-
-
0038687767
-
Efficient, DoS-resistant, secure key exchange for internet protocols
-
W. Aiello, S.M. Bellovin, M. Blaze. Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. Proceedings of the 9th ACM conference on Computer and communications security (2002) 45-58
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 45-58
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
|