-
1
-
-
84945119254
-
Entity authentication and key distribution
-
[BR93] Douglas R. Stinson, editor, Advances in Cryptology - CRYPTO '93: 13th Annual International Cryptology Conference, Santa Barbara, California, U.S.A., Springer-Verlag
-
[BR93] Mihir Bellare and Phillip Rogaway. Entity authentication and key distribution. In Douglas R. Stinson, editor, Advances in Cryptology - CRYPTO '93: 13th Annual International Cryptology Conference, volume 773 of Lecture Notes in Computer Science, pages 232-249, Santa Barbara, California, U.S.A., 1993. Springer-Verlag.
-
(1993)
Lecture Notes in Computer Science
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
2
-
-
31344438973
-
Key agreement in peer-to-peer wireless networks
-
[ČČH06]
-
[ČČH06] Mario Čagalj, Srdjan Čapkun, and Jean-Pierre Hubaux. Key agreement in peer-to-peer wireless networks. Proceedings of the IEEE, Special Issue in Security and Cryptography, 94(2):467-478, 2006.
-
(2006)
Proceedings of the IEEE, Special Issue in Security and Cryptography
, vol.94
, Issue.2
, pp. 467-478
-
-
Čagalj, M.1
Čapkun, S.2
Hubaux, J.-P.3
-
3
-
-
0031619016
-
The random oracle methodology revisited (preliminary version)
-
[CGH98], New York, NY, USA, May. ACM Press
-
[CGH98] Ran Canetti, Oded Goldreich, and Shai Halevi. The random oracle methodology revisited (preliminary version). In STOC '98: Proceedings of the thirtieth annual ACM symposium on Theory of computing, pages 209-218, New York, NY, USA, May 1998. ACM Press.
-
(1998)
STOC '98: Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
4
-
-
84947267092
-
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
-
[CS02] Lars R. Knudsen, editor, Advances in Cryptology - EUROCRYPT '02: International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April. Springer-Verlag
-
[CS02] Ronald Cramer and Victor Shoup. Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In Lars R. Knudsen, editor, Advances in Cryptology - EUROCRYPT '02: International Conference on the Theory and Applications of Cryptographic Techniques, volume 2332 of Lecture Notes in Computer Science, Amsterdam, The Netherlands, April 2002. Springer-Verlag.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
-
-
Cramer, R.1
Shoup, V.2
-
5
-
-
0017018484
-
New directions in cryptography
-
[DH76], November
-
[DH76] Whitfield Diffie and Martin E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6):644-654, November 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
6
-
-
33745844079
-
-
[DSS00] Digital signature standard (DSS). Federal Information Processing Standard, Publication 186-2, U.S. Department of Commerce, National Institute of Standards and Technology, 2000
-
[DSS00] Digital signature standard (DSS). Federal Information Processing Standard, Publication 186-2, U.S. Department of Commerce, National Institute of Standards and Technology, 2000.
-
-
-
-
7
-
-
23944521144
-
Manual authentication for wireless devices
-
[GMN04], January
-
[GMN04] Christian Gehrmann, Chris J. Mitchell, and Kaisa Nyberg. Manual authentication for wireless devices. RSA Cryptobytes, 7(1):29-37, January 2004.
-
(2004)
RSA Cryptobytes
, vol.7
, Issue.1
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, C.J.2
Nyberg, K.3
-
8
-
-
33645409711
-
Enhancements to Bluetooth baseband security
-
[GN01], Copenhagen, Denmark, November
-
[GN01] Christian Gehrmann and Kaisa Nyberg. Enhancements to Bluetooth baseband security. In Nordsee '01, Copenhagen, Denmark, November 2001.
-
(2001)
Nordsee '01
-
-
Gehrmann, C.1
Nyberg, K.2
-
9
-
-
24644434353
-
Security in personal area networks
-
[GN04]
-
[GN04] Christian Gehrmann und Kaisa Nyberg. Security in personal area networks. Security for Mobility, pages 191-230, 2004.
-
(2004)
Security for Mobility
, pp. 191-230
-
-
Gehrmann, C.1
Nyberg, K.2
-
10
-
-
34247333484
-
The ephemeral pairing problem
-
[Hoe04] Ari Juels, editor, Financial Cryptography: the 8th International Conference (FC'04), Key West, FL, USA, February. Springer-Verlag
-
Jaap-Henk Hoepman. The ephemeral pairing problem. In Ari Juels, editor, Financial Cryptography: the 8th International Conference (FC'04), volume 3110 of Lecture Notes in Computer Science, pages 212-226, Key West, FL, USA, February 2004. Springer-Verlag.
-
(2004)
Lecture Notes in Computer Science
, vol.3110
, pp. 212-226
-
-
Hoepman, J.-H.1
-
11
-
-
84991939136
-
LFSR-based hashing and authentication
-
[Kra94] Yvo Desmedt, editor, Advances in Cryptology - CRYPTO '94: 11th Annual International Cryptology Conference, Santa Barbara, California, U.S.A., August. Springer-Verlag
-
[Kra94] Hugo Krawczyk. LFSR-based hashing and authentication. In Yvo Desmedt, editor, Advances in Cryptology - CRYPTO '94: 11th Annual International Cryptology Conference, volume 839 of Lecture Notes in Computer Science, pages 129-139, Santa Barbara, California, U.S.A., August 1994. Springer-Verlag.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 129-139
-
-
Krawczyk, H.1
-
12
-
-
51249099680
-
Efficient mutual data authentication using manually authenticated strings
-
[LAN05]
-
[LAN05] Sven Laur, N. Asokan, and Kaisa Nyberg. Efficient mutual data authentication using manually authenticated strings. Cryptology ePrint Archive, Report 2005/424, 2005. http://eprint.iacr.org/.
-
(2005)
Cryptology ePrint Archive, Report
, vol.2005
, Issue.424
-
-
Laur, S.1
Asokan, N.2
Nyberg, K.3
-
13
-
-
35048882590
-
On simulation-sound trapdoor commitments
-
[MY04] Christian Cachin and Jan Camenisch, editors, Advances in Cryptology - EUROCRYPT '04: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May. Springer-Verlag
-
[MY04] Philip MacKenzie and Ke Yang. On simulation-sound trapdoor commitments. In Christian Cachin and Jan Camenisch, editors, Advances in Cryptology - EUROCRYPT '04 : International Conference on the Theory and Applications of Cryptographic Techniques, volume 3027 of Lecture Notes in Computer Science, pages 382-400, Interlaken, Switzerland, May 2004. Springer-Verlag.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 382-400
-
-
MacKenzie, P.1
Yang, K.2
-
14
-
-
33745637238
-
An optimal non-interactive message authentication protocol
-
[PV06] David Pointcheval, editor, Topics in Cryptology - CT-RSA '06: The Cryptographers' Track at the RSA Conference 2006, San Jose, California, U.S.A., February. Springer-Verlag
-
[PV06] Sylvain Pasini and Serge Vaudenay. An optimal non-interactive message authentication protocol. In David Pointcheval, editor, Topics in Cryptology - CT-RSA '06: The Cryptographers' Track at the RSA Conference 2006, volume 3860 of Lecture Notes in Computer Science, pages 280-294, San Jose, California, U.S.A., February 2006. Springer-Verlag.
-
(2006)
Lecture Notes in Computer Science
, vol.3860
, pp. 280-294
-
-
Pasini, S.1
Vaudenay, S.2
-
15
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
[RSA78] Februar
-
[RSA78] Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21 (2): 120-126, Februar 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
16
-
-
71049183202
-
Universal hashing and authentication codes
-
[Sti91] Joan Feigenbaum, editor, Advances in Cryptology - CRYPTO '91: 11th Annual International Cryptology Conference, Santa Barbara, California, U.S.A., August. Springer-Verlag
-
[Sti91] Douglas Stinson. Universal hashing and authentication codes. In Joan Feigenbaum, editor, Advances in Cryptology - CRYPTO '91: 11th Annual International Cryptology Conference, volume 576 of Lecture Notes in Computer Science, pages 74-85, Santa Barbara, California, U.S.A., August 1991. Springer-Verlag.
-
(1991)
Lecture Notes in Computer Science
, vol.576
, pp. 74-85
-
-
Stinson, D.1
-
17
-
-
0000410707
-
Universal hashing and authentication codes
-
[Sti94]
-
[Sti94] Douglas Stinson. Universal hashing and authentication codes. Designs, Codes and Cryptography, 4:369-380, 1994.
-
(1994)
Designs, Codes and Cryptography
, vol.4
, pp. 369-380
-
-
Stinson, D.1
-
18
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
[Vau05] Victor Shoup, editor, Advances in Cryptology - CRYPTO '05: The 25th Annual International Cryptology Conference, Santa Barbara, California, U.S.A., August. Springer-Verlag
-
[Vau05] Serge Vaudenay. Secure communications over insecure channels based on short authenticated strings. In Victor Shoup, editor, Advances in Cryptology - CRYPTO '05: The 25th Annual International Cryptology Conference, volume 3621 of Lecture Notes in Computer Science, pages 309-326, Santa Barbara, California, U.S.A., August 2005. Springer-Verlag.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 309-326
-
-
Vaudenay, S.1
-
19
-
-
33744911390
-
On Bluetooth repairing: Key agreement based on symmetric-key cryptography
-
[Vau06] Dengguo Feng, Dongdai Lin, and Moti Yung, editors, Information Security and Cryptology: First SKLOIS Conference, CISC'05, Beijing, China, December. Springer-Verlag
-
[Vau06] Serge Vaudenay. On Bluetooth repairing: Key agreement based on symmetric-key cryptography. In Dengguo Feng, Dongdai Lin, and Moti Yung, editors, Information Security and Cryptology: First SKLOIS Conference, CISC'05, volume 3822 of Lecture Notes in Computer Science, pages 1-9, Beijing, China, December 2006. Springer-Verlag.
-
(2006)
Lecture Notes in Computer Science
, vol.3822
, pp. 1-9
-
-
Vaudenay, S.1
|