-
1
-
-
0033748607
-
New multiparty authentication services and key agreement protocols
-
G. Ateniese, M. Steiner, and G. Tsudik, "New multiparty authentication services and key agreement protocols," IEEE Journal on Selected Areas in Communications, vol. 18, no. 4, pp. 628-639, 2000.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
, pp. 628-639
-
-
Ateniese, G.1
Steiner, M.2
Tsudik, G.3
-
3
-
-
84945119254
-
Entity authentication and key distribution
-
Advances in Cryptology - Crypto 1993
-
M. Bellare and P. Rogaway, "Entity authentication and key distribution," In Advances in Cryptology - Crypto 1993, Lecture Notes in Computer Science, vol. 773, pp. 232-249, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
35248878662
-
Round-optimal contributory conference key agreement
-
PKC 2003
-
C. Boyd and J.M.G. Nieto, "Round-optimal contributory conference key agreement," In PKC 2003, Lecture Notes in Computer Science, vol. 2567, pp. 161-174, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2567
, pp. 161-174
-
-
Boyd, C.1
Nieto, J.M.G.2
-
5
-
-
0035751060
-
Provably authenticated group Diffie-Hellman key exchange
-
E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater, "Provably authenticated group Diffie-Hellman key exchange," Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001), pp. 255-264, 2001.
-
(2001)
Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001)
, pp. 255-264
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
Quisquater, J.-J.4
-
6
-
-
84948991087
-
A secure and efficient conference key distribution system
-
Advances In Cryptology - Eurocrypt 1994
-
M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution system," In Advances In Cryptology - Eurocrypt 1994, Lecture Notes in Computer Science, vol. 950, pp. 275-286, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.950
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
7
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Advances in Cryptology - Eurocrypt 2001
-
R. Canetti and H. Krawczyk, "Analysis of key-exchange protocols and their use for building secure channels," In Advances in Cryptology - Eurocrypt 2001, Lecture Notes in Computer Science, vol. 2045, pp. 453-474, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
8
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. on Information Theory, vol. 22, no. 6, pp. 644-654, 1976.
-
(1976)
IEEE Trans. on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
9
-
-
0343337504
-
Nonmalleable cryptography
-
D. Dolev, C. Dwork, and M. Naor, "Nonmalleable cryptography," SIAM Journal on Computing, vol. 30, no. 2, pp. 391-437, 2000.
-
(2000)
SIAM Journal on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
10
-
-
0020180459
-
A conference key distribution system
-
I. Ingemarsson, D. Tang, and C. Wong, "A conference key distribution system," IEEE Trans. on Information Theory, vol. 28, no. 5, pp. 714-720, 1982.
-
(1982)
IEEE Trans. on Information Theory
, vol.28
, Issue.5
, pp. 714-720
-
-
Ingemarsson, I.1
Tang, D.2
Wong, C.3
-
11
-
-
84955559079
-
Authenticated multi-party key agreement
-
Advances in Cryptology - Asiacrypt 1996
-
M. Just and S. Vaudenay, "Authenticated multi-party key agreement," In Advances in Cryptology - Asiacrypt 1996, LNCS 1163, pp. 36-49, 1996.
-
(1996)
LNCS
, vol.1163
, pp. 36-49
-
-
Just, M.1
Vaudenay, S.2
-
12
-
-
35248878854
-
Scalable protocols for authenticated group key exchange
-
Advances in Cryptology - Crypto 2003
-
J. Katz and M. Yung, "Scalable protocols for authenticated group key exchange," In Advances in Cryptology - Crypto 2003, Lecture Notes in Computer Science, vol. 2729, pp. 110-125, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 110-125
-
-
Katz, J.1
Yung, M.2
-
13
-
-
3142512728
-
Tree-based group key agreement
-
Y. Kim, A. Perrig, and G. Tsudik, "Tree-based group key agreement," ACM Trans. on Information and System Security, vol. 7, no, 1, pp. 60-96, 2004.
-
(2004)
ACM Trans. on Information and System Security
, vol.7
, Issue.1
, pp. 60-96
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
14
-
-
19644371756
-
A weakness in the Bresson-Chevassut-Essiari-Pointcheval's group key agreement scheme for low-power mobile devices
-
J. Nam, S. Kim, and D. Won, "A weakness in the Bresson-Chevassut-Essiari-Pointcheval's group key agreement scheme for low-power mobile devices," IEEE Communications Letters, vol. 9, no. 5, pp. 429-431, 2005.
-
(2005)
IEEE Communications Letters
, vol.9
, Issue.5
, pp. 429-431
-
-
Nam, J.1
Kim, S.2
Won, D.3
-
16
-
-
23944520338
-
Efficient authenticated key agreement protocol for dynamic groups
-
5th International Workshop on Information Security Applications (WISA 2004)
-
K. Ren, H. Lee, K. Kim, and T. Yoo, "Efficient authenticated key agreement protocol for dynamic groups," In 5th International Workshop on Information Security Applications (WISA 2004), Lecture Notes in Computer Science, vol. 3325, pp. 144-159, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3325
, pp. 144-159
-
-
Ren, K.1
Lee, H.2
Kim, K.3
Yoo, T.4
-
17
-
-
0034247455
-
Key agreement in dynamic peer groups
-
M. Steiner, G. Tsudik, and M. Waidner, "Key agreement in dynamic peer groups," IEEE Trans. on Parallel and Distributed Systems, vol. 11, no. 8, pp. 769-780, 2000.
-
(2000)
IEEE Trans. on Parallel and Distributed Systems
, vol.11
, Issue.8
, pp. 769-780
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
18
-
-
3042717133
-
Attack on an ID-based authenticated group key agreement scheme from PKC 2004
-
F. Zhang and X. Chen, "Attack on an ID-based authenticated group key agreement scheme from PKC 2004," Information Processing Letters, vol. 91, no. 4, pp. 191-193, 2004.
-
(2004)
Information Processing Letters
, vol.91
, Issue.4
, pp. 191-193
-
-
Zhang, F.1
Chen, X.2
|