-
1
-
-
33645492588
-
-
publication #186-2. U.S. Department of Commerce, National Institute of Standards and Technology
-
Digital Signature Standard (DSS). Federal Information Processing Standards publication #186-2. U.S. Department of Commerce, National Institute of Standards and Technology, 2000.
-
(2000)
Federal Information Processing Standards
-
-
-
3
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
Les Diablerets, Switzerland, Lecture Notes in Computer Science 3386, Springer-Verlag
-
M. Abdalla, P.-A. Fouque, D. Pointcheval. Password-Based Authenticated Key Exchange in the Three-Party Setting. In Public Key Cryptography'05, Les Diablerets, Switzerland, Lecture Notes in Computer Science 3386, pp. 65-84, Springer-Verlag, 2005.
-
(2005)
Public Key Cryptography'05
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.-A.2
Pointcheval, D.3
-
4
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
San Diego, California, U.S.A., The Internet Society
-
D. Balfanz, D. K. Smeeters, P. Stewart, H. Chi Wong. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. In Network and Distributed System Security Symposium Conference (NDSS 02), San Diego, California, U.S.A., The Internet Society, 2002.
-
(2002)
Network and Distributed System Security Symposium Conference (NDSS 02)
-
-
Balfanz, D.1
Smeeters, D.K.2
Stewart, P.3
Wong, H.C.4
-
5
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Brugge, Belgium, Lecture Notes in Computer Science 1807, Springer-Verlag
-
M. Bellare, D. Pointcheval, P. Rogaway. Authenticated Key Exchange Secure against Dictionary Attacks. In Advances in Cryptology EUROCRYPT'00, Brugge, Belgium, Lecture Notes in Computer Science 1807, pp. 139-155, Springer-Verlag, 2000.
-
(2000)
Advances in Cryptology EUROCRYPT'00
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
6
-
-
84945119254
-
Entity authentication and key distribution
-
Santa Barbara, California, U.S.A., Lecture Notes in Computer Science 773, Springer-Verlag
-
M. Bellare, P. Rogaway. Entity Authentication and Key Distribution. In Advances in Cryptology CRYPTO'93, Santa Barbara, California, U.S.A., Lecture Notes in Computer Science 773, pp. 232-249, Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology CRYPTO'93
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
0001940580
-
Provably secure session key distribution: The three party case
-
Las Vegas, Nevada, U.S.A., ACM Press
-
M. Bellare, P. Rogaway. Provably Secure Session Key Distribution: the Three Party Case. In Proceedings of the 27th ACM Symposium on Theory of Computing, Las Vegas, Nevada, U.S.A., pp. 57-66, ACM Press, 1995.
-
(1995)
Proceedings of the 27th ACM Symposium on Theory of Computing
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
Oakland, California, USA, pp. IEEE Computer Society Press
-
S. M. Bellovin, M. Merritt. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks. In IEEE symposium on Research in Security and Privacy, Oakland, California, USA, pp. IEEE Computer Society Press, 72-84, 1992.
-
(1992)
IEEE Symposium on Research in Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
9
-
-
0027741529
-
Augmented encrypted key exchange
-
Fairfax, Virginia, U.S.A., ACM Press
-
S. M. Bellovin, M. Merritt. Augmented Encrypted Key Exchange. In 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, U.S.A., pp. 244-250, ACM Press, 1993.
-
(1993)
1st ACM Conference on Computer and Communications Security
, pp. 244-250
-
-
Bellovin, S.M.1
Merritt, M.2
-
10
-
-
0003259517
-
Quantum cryptography. Public key distribution and coin tossing
-
Bangalore, India, IEEE Press
-
C. H. Bennett, G. Brassard. Quantum Cryptography. Public Key Distribution and Coin Tossing. In Proc. IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, pp. 175-179, IEEE Press, 1984.
-
(1984)
Proc. IEEE International Conference on Computers, Systems, and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
11
-
-
84947778144
-
The decision diffie-hellman problem
-
Portland, Oregon, U.S.A., Lecture Notes in Computer Science 1423, Springer-Verlag
-
D. Boneh. The Decision Diffie-Hellman Problem. In Proceedings of the 3rd Algorithmic Number Theory Symposium, Portland, Oregon, U.S.A., Lecture Notes in Computer Science 1423, pp. 48-63, Springer-Verlag, 1998.
-
(1998)
Proceedings of the 3rd Algorithmic Number Theory Symposium
, pp. 48-63
-
-
Boneh, D.1
-
15
-
-
0031642212
-
Non-interactive and non-malleable commitment
-
Dallas, Texas, U.S.A., ACM Press
-
G. Di Crescenzo, Y. Ishai, R. Ostrovsky. Non-Interactive and Non-Malleable Commitment. In Proceedings of the 30th ACM Symposium on Theory of Computing, Dallas, Texas, U.S.A., pp. 141-150, ACM Press, 1998.
-
(1998)
Proceedings of the 30th ACM Symposium on Theory of Computing
, pp. 141-150
-
-
Di Crescenzo, G.1
Ishai, Y.2
Ostrovsky, R.3
-
16
-
-
84945133720
-
Efficient and non-interactive nonmalleable commitments
-
Innsbruck, Austria, Lecture Notes in Computer Science 2045, Springer-Verlag
-
G. Di Crescenzo, J. Katz, R. Ostrovsky, A. Smith. Efficient and Non-Interactive NonMalleable Commitments. In Advances in Cryptology EUROCRYPT'01, Innsbruck, Austria, Lecture Notes in Computer Science 2045, pp. 40-59, Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology EUROCRYPT'01
, pp. 40-59
-
-
Di Crescenzo, G.1
Katz, J.2
Ostrovsky, R.3
Smith, A.4
-
17
-
-
0038784597
-
Non-interactive and reusable non-malleable commitment schemes
-
San Diego, California, U.S.A., ACM Press
-
I. Damgård, J. Groth. Non-interactive and Reusable Non-malleable Commitment Schemes. In Proceedings of the 35th ACM Symposium on Theory of Computing, San Diego, California, U.S.A., pp. 426-437, ACM Press, 2003.
-
(2003)
Proceedings of the 35th ACM Symposium on Theory of Computing
, pp. 426-437
-
-
Damgård, I.1
Groth, J.2
-
19
-
-
0003286492
-
The TLS protocol version 1.0
-
standard tracks, the Internet Society
-
T. Dierks, C. Allen. The TLS Protocol Version 1.0. RFC 2246, standard tracks, the Internet Society, 1999.
-
(1999)
RFC
, vol.2246
-
-
Dierks, T.1
Allen, C.2
-
20
-
-
0343337504
-
Non-malleable cryptography
-
D. Dolev, C. Dwork, M. Naor. Non-Malleable Cryptography. SIAM Journal of Computing, vol. 30, pp. 391-437, 2000.
-
(2000)
SIAM Journal of Computing
, vol.30
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
21
-
-
23944521144
-
Manual authentication for wireless devices
-
C. Gehrmann, C. Mitchell, K. Nyberg. Manual Authentication for Wireless Devices. RSA Cryptobytes, vol. 7, pp. 29-37, 2004.
-
(2004)
RSA Cryptobytes
, vol.7
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, C.2
Nyberg, K.3
-
22
-
-
24644434353
-
Security in personal area networks
-
C. Mitchell (Ed.), IEE
-
C. Gehrmann, K. Nyberg. Security in Personal Area Networks. In Security for Mobility, C. Mitchell (Ed.), pp. 191-230, IEE, 2004.
-
(2004)
Security for Mobility
, pp. 191-230
-
-
Gehrmann, C.1
Nyberg, K.2
-
23
-
-
0003224934
-
The S/KEY one-time password system
-
N. Haller. The S/KEY One-Time Password System. RFC 1760, 1995.
-
(1995)
RFC
, vol.1760
-
-
Haller, N.1
-
24
-
-
0345253860
-
A pseudorandom generator from any oneway function
-
J. Håstad, R. Impagliazzo, L. Levin, M. Luby. A Pseudorandom Generator from any Oneway Function. SIAM Journal on Computing, vol. 4, pp. 1364-1396, 1999.
-
(1999)
SIAM Journal on Computing
, vol.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
25
-
-
34247333484
-
The ephemeral pairing problem
-
Key West, Florida, USA, Lecture Notes in Computer Science 3110, Springer-Verlag
-
J.-H. Hoepman. The Ephemeral Pairing Problem. In Financial Cryptography, Key West, Florida, USA, Lecture Notes in Computer Science 3110, pp. 212-226, Springer-Verlag, 2004.
-
(2004)
Financial Cryptography
, pp. 212-226
-
-
Hoepman, J.-H.1
-
26
-
-
24644472550
-
Ephemeral pairing on anonymous networks
-
Boppard, Germany, Lecture Notes in Computer Science 3450, Springer-Verlag
-
J.-H. Hoepman. Ephemeral Pairing on Anonymous Networks. In Proceedings of the Second International Conference on Security in Pervasive Computing (SPC'05), Boppard, Germany, Lecture Notes in Computer Science 3450, pp. 101-116, Springer-Verlag, 2005.
-
(2005)
Proceedings of the Second International Conference on Security in Pervasive Computing (SPC'05)
, pp. 101-116
-
-
Hoepman, J.-H.1
-
27
-
-
0003308762
-
Internet X.509 public key infrastructure certificate and CRL profile
-
Internet Standard, The Internet Society
-
R. Housley, W. Ford, W. Polk, D. Solo. Internet X.509 Public Key Infrastructure Certificate and CRL Profile. Internet Standard. RFC 2459, The Internet Society, 1999.
-
(1999)
RFC
, vol.2459
-
-
Housley, R.1
Ford, W.2
Polk, W.3
Solo, D.4
-
28
-
-
84935078039
-
Security weaknesses in bluetooth
-
San Francisco, California, USA, Lecture Notes in Computer Science 2020, Springer-Verlag
-
M. Jakobsson, S. Wetzel. Security Weaknesses in Bluetooth. In Topics in Cryptology (CT-RSA'01), San Francisco, California, USA, Lecture Notes in Computer Science 2020, pp. 176-191, Springer-Verlag, 2001.
-
(2001)
Topics in Cryptology (CT-RSA'01)
, pp. 176-191
-
-
Jakobsson, M.1
Wetzel, S.2
-
29
-
-
84945132563
-
Efficient password-authenticated key exchange using human-memorable passwords
-
Innsbruck, Austria, Lecture Notes in Computer Science 2045, Springer-Verlag
-
J. Katz, R. Ostrovsky, M. Yung. Efficient Password-Authenticated Key Exchange using Human-Memorable Passwords. In Advances in Cryptology EUROCRYPT'01, Innsbruck, Austria, Lecture Notes in Computer Science 2045, pp. 475-494, Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology EUROCRYPT'01
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
30
-
-
0003237987
-
The kerberos network authentication service (V5)
-
Internet standard
-
J. Kohl, C. Neuman. The Kerberos Network Authentication Service (V5). Internet standard. RFC 1510, 1993.
-
(1993)
RFC
, vol.1510
-
-
Kohl, J.1
Neuman, C.2
-
31
-
-
35048882590
-
On simulation-sound trapdoor commitments
-
Interlaken, Switzerland, Lecture Notes in Computer Science 3027, Springer-Verlag
-
P. MacKenzie, K. Yang. On Simulation-Sound Trapdoor Commitments. In Advances in Cryptology EUROCRYPT'04, Interlaken, Switzerland, Lecture Notes in Computer Science 3027, pp. 382-400, Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology EUROCRYPT'04
, pp. 382-400
-
-
MacKenzie, P.1
Yang, K.2
-
32
-
-
0017959977
-
Secure communications over insecure channels
-
R. C. Merkle. Secure Communications over Insecure Channels. Communications of the ACM, vol. 21, pp. 294-299, 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 294-299
-
-
Merkle, R.C.1
-
33
-
-
0032069870
-
On key control in key agreement protocols
-
C. Mitchell, M. Ward, P. Wilson. On Key Control in Key Agreement Protocols. Electronics Letters, vol. 34, pp. 980-981, 1998.
-
(1998)
Electronics Letters
, vol.34
, pp. 980-981
-
-
Mitchell, C.1
Ward, M.2
Wilson, P.3
-
34
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. M. Needham, M. D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, vol. 21, pp. 993-999, 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
35
-
-
23944495158
-
IKE in ad-hoc IP networking
-
Heidelberg, Germany, Lecture Notes in Computer Science 3313, Springer-Verlag
-
K. Nyberg. IKE in Ad-hoc IP Networking. In Security in Ad-hoc and Sensor Networks, 1st European Workshop (ESAS'04), Heidelberg, Germany, Lecture Notes in Computer Science 3313, pp. 139-151, Springer-Verlag, 2005.
-
(2005)
Security in Ad-hoc and Sensor Networks, 1st European Workshop (ESAS'04)
, pp. 139-151
-
-
Nyberg, K.1
-
37
-
-
35248825608
-
On deniability in the common reference string and random oracle model
-
Santa Barbara, California, U.S.A., Lecture Notes in Computer Science 2729, Springer-Verlag
-
R. Pass. On Deniability in the Common Reference String and Random Oracle Model. In Advances in Cryptology CRYPTO'03, Santa Barbara, California, U.S.A., Lecture Notes in Computer Science 2729, pp. 316-337, Springer-Verlag, 2003.
-
(2003)
Advances in Cryptology CRYPTO'03
, pp. 316-337
-
-
Pass, R.1
-
38
-
-
33745121720
-
The pairing problem with user interaction
-
Chiba, Japan, Springer-Verlag
-
T. Peyrin, S. Vaudenay. The Pairing Problem with User Interaction. In Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference (SEC'05), Chiba, Japan, pp. 251-265, Springer-Verlag, 2005.
-
(2005)
Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference (SEC'05)
, pp. 251-265
-
-
Peyrin, T.1
Vaudenay, S.2
-
39
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystem
-
R. L. Rivest, A. Shamir and L. M. Adleman. A Method for Obtaining Digital Signatures and Public-key Cryptosystem. Communications of the ACM, vol. 21, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
40
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Cambridge, United Kingdom, Lecture Notes in Computer Science 1796, Springer-Verlag
-
F. Stajano, R. Anderson. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In Proceedings of the 7th International Workshop on Security Protocols, Cambridge, United Kingdom, Lecture Notes in Computer Science 1796, pp. 172-194, Springer-Verlag, 1999.
-
(1999)
Proceedings of the 7th International Workshop on Security Protocols
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
|