-
1
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key exchange protocols
-
In: ACM
-
Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: Proceedings of STOC 98, pp. 419-428. ACM (1998)
-
(1998)
Proceedings of STOC 98
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
2
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
In: Preneel, B. (ed.) Springer, Berlin
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) Advances in Cryptology - EUROCRYPT'00, Lecture Notes in Computer Science, vol. 1807, pp. 139-155. Springer, Berlin (2000)
-
(2000)
Advances in Cryptology - EUROCRYPT'00, Lecture Notes in Computer Science
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
84945119254
-
Entity authentication and key distribution
-
In: Stinson, D.R. (ed.) Springer, Berlin
-
Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) Advances in Cryptology - CRYPTO '93, Lecture Notes in Computer Science, vol. 773, pp. 232-249. Springer, Berlin (1993)
-
(1993)
Advances in Cryptology - CRYPTO '93, Lecture Notes in Computer Science
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
0001940580
-
Provably secure session key distribution - The three party case
-
In: ACM, New York
-
Bellare, M., Rogaway, P.: Provably secure session key distribution - the three party case. In: Proceedings of the 27th Annual ACM Symposium on Theory of Computing, STOC'95, pp. 57-66. ACM, New York (1995)
-
(1995)
Proceedings of the 27th Annual ACM Symposium on Theory of Computing, STOC'95
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
34347373428
-
Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security
-
At the time of writing available electronically at
-
Bohli, J.-M., González Vasco, M.I., Steinwandt, R.: Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security. Cryptology ePrint Archive: Report 2005/360 (2005). At the time of writing available electronically at http://www.eprint.iacr.org/2005/360
-
(2005)
Cryptology EPrint Archive: Report 2005/360
-
-
Bohli, J.-M.1
González Vasco, M.I.2
Steinwandt, R.3
-
7
-
-
35248878662
-
Round-optimal contributory conference key agreement
-
In: Desmedt, Y. (eds) Springer, Berlin
-
Boyd C. and Nieto J.M.G. (2003). Round-optimal contributory conference key agreement. In: Desmedt, Y. (eds) Proceedings of PKC 2003, pp 161-174. Springer, Berlin
-
(2003)
Proceedings of PKC 2003
, pp. 161-174
-
-
Boyd, C.1
Nieto, J.M.G.2
-
8
-
-
50849127145
-
Provably authenticated group Diffie-Hellman key exchange-the dynamic case
-
In: Boyd C. (eds). Springer, Berlin
-
Bresson E., Chevassut O., Pointcheval D. (2001) Provably authenticated group Diffie-Hellman key exchange-the dynamic case. In: Boyd C. (eds). Advances in Cryptology - ASIACRYPT 2001, Lecture Notes in Computer Science, vol. 2248. Springer, Berlin, pp. 290-309
-
(2001)
Advances in Cryptology - ASIACRYPT 2001, Lecture Notes in Computer Science
, vol.2248
, pp. 290-309
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
9
-
-
0035751060
-
Provably authenticated group Diffie-Hellman key exchange
-
In: Samarati, P. (ed.) ACM, New York
-
Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.J.: Provably authenticated group Diffie-Hellman key exchange. In: Samarati, P. (ed.) Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS-8), pp. 255-264. ACM, New York (2001)
-
(2001)
Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS-8)
, pp. 255-264
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
Quisquater, J.J.4
-
10
-
-
84948991087
-
A secure and efficient conference key distribution system
-
In: Santis A.D. (eds). Springer, Berlin
-
Burmester M., Desmedt Y. (1995) A secure and efficient conference key distribution system. In: Santis A.D. (eds). Advances in Cryptology - EUROCRYPT'94, Lecture Notes in Computer Science, vol. 950. Springer, Berlin, pp. 275-286
-
(1995)
Advances in Cryptology - EUROCRYPT'94, Lecture Notes in Computer Science
, vol.950
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
12
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
In: Pfitzmann B. (eds). Springer, Berlin
-
Canetti R., Krawczyk H. (2001) Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann B. (eds). Advances in Cryptology - EUROCRYPT 2001, Lecture Notes in Computer Science, vol. 2045. Springer, Berlin, pp. 453-474
-
(2001)
Advances in Cryptology - EUROCRYPT 2001, Lecture Notes in Computer Science
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
13
-
-
33646841393
-
Pairing-Based One-Round Tripartite Key Agreement Protocols
-
At the time of writing available electronically at
-
Cheng, Z., Vasiu, L., Comley, R.: Pairing-Based One-Round Tripartite Key Agreement Protocols. Cryptology ePrint Archive: Report 2004/079. At the time of writing available electronically at http://www.eprint.iacr.org/ 2004/079 (2004)
-
(2004)
Cryptology EPrint Archive: Report 2004/079
-
-
Cheng, Z.1
Vasiu, L.2
Comley, R.3
-
14
-
-
33646805409
-
Examining indistinguishability-based proof models for key establishment protocols
-
In: Roy B. (eds). Springer, Berlin
-
Choo K.K.R., Boyd C., Hitchcock Y. (2005) Examining indistinguishability-based proof models for key establishment protocols. In: Roy B. (eds). Advances in Cryptology - ASIACRYPT 2005, Lecture Notes in Computer Science, vol. 3788. Springer, Berlin, pp. 585-604
-
(2005)
Advances in Cryptology - ASIACRYPT 2005, Lecture Notes in Computer Science
, vol.3788
, pp. 585-604
-
-
Choo, K.K.R.1
Boyd, C.2
Hitchcock, Y.3
-
15
-
-
23944475681
-
On session identifiers in provably secure protocols: The Bellare-Rogaway three-party key distribution protocol revisited
-
In: Blundo, C., Cimato, S. (eds.) Springer, Berlin
-
Choo, K.K.R., Boyd, C., Hitchcock, Y., Maitland, G.: On session identifiers in provably secure protocols: The Bellare-Rogaway three-party key distribution protocol revisited. In: Blundo, C., Cimato, S. (eds.) Fourth Conference on Security in Communication Networks - SCN 2004 Proceedings, Lecture Notes in Computer Science, vol. 3352, pp. 351-366. Springer, Berlin (2005)
-
(2005)
Fourth Conference on Security in Communication Networks - SCN 2004 Proceedings, Lecture Notes in Computer Science
, vol.3352
, pp. 351-366
-
-
Choo, K.K.R.1
Boyd, C.2
Hitchcock, Y.3
Maitland, G.4
-
16
-
-
0142188056
-
Initiator-resilient universally composable key exchange
-
In: Snekkenes E., Gollmann D. (eds). Springer, Berlin
-
Hofheinz D., Müller-Quade J., Steinwandt R. (2003) Initiator-resilient universally composable key exchange. In: Snekkenes E., Gollmann D. (eds). Computer Security, Proceedings of ESORICS 2003, Lecture Notes in Computer Science, vol. 2808. Springer, Berlin, pp. 61-84
-
(2003)
Computer Security, Proceedings of ESORICS 2003, Lecture Notes in Computer Science
, vol.2808
, pp. 61-84
-
-
Hofheinz, D.1
Müller-Quade, J.2
Steinwandt, R.3
-
17
-
-
24144432254
-
Password based key exchange with mutual authentication
-
In: Handschuh, H., Hasan, M.A. (eds.) Springer, Berlin
-
Jiang, S., Gong, G.: Password based key exchange with mutual authentication. In: Handschuh, H., Hasan, M.A. (eds.) Selected Areas in Cryptography: 11th International Workshop, SAC 2004, Lecture Notes in Computer Science, vol. 3357, pp. 267-279. Springer, Berlin (2004)
-
(2004)
Selected Areas in Cryptography: 11th International Workshop, SAC 2004, Lecture Notes in Computer Science
, vol.3357
, pp. 267-279
-
-
Jiang, S.1
Gong, G.2
-
18
-
-
34347370803
-
Modeling insider attacks on group key-exchange protocols
-
At the time of writing available electronically at Full version of [19]
-
Katz, J., Shin, J.S.: Modeling insider attacks on group key-exchange protocols. Cryptology ePrint Archive: Report 2005/163. At the time of writing available electronically at http://www.eprint.iacr.org/2006/163. Full version of [19](2005)
-
(2005)
Cryptology EPrint Archive: Report 2005/163
-
-
Katz, J.1
Shin, J.S.2
-
20
-
-
35248878854
-
Scalable protocols for authenticated group key exchange
-
In: Boneh D. (eds). Springer, Berlin
-
Katz J., Yung M. (2003) Scalable protocols for authenticated group key exchange. In: Boneh D. (eds). Advances in Cryptology - CRYPTO'03, Lecture Notes in Computer Science, vol. 2729. Springer, Berlin, pp. 110-125
-
(2003)
Advances in Cryptology - CRYPTO'03, Lecture Notes in Computer Science
, vol.2729
, pp. 110-125
-
-
Katz, J.1
Yung, M.2
-
21
-
-
35048821512
-
Constant-round authenticated group key exchange for dynamic groups
-
In: Lee PJ. (eds). Springer, Berlin
-
Kim H.J., Lee S.M., Lee D.H. (2004) Constant-round authenticated group key exchange for dynamic groups. In: Lee PJ. (eds). Advances in Cryptology - ASIACRYPT'04, Lecture Notes in Computer Science, vol. 3329. Springer, Berlin, pp. 245-259
-
(2004)
Advances in Cryptology - ASIACRYPT'04, Lecture Notes in Computer Science
, vol.3329
, pp. 245-259
-
-
Kim, H.J.1
Lee, S.M.2
Lee, D.H.3
-
22
-
-
50849127145
-
Provably authenticated group Diffie-Hellman key exchange-the dynamic case
-
In: Boyd, C. (eds) Springer, Berlin
-
Bresson E., Chevassut O. and Pointcheval D. (2001). Provably authenticated group Diffie-Hellman key exchange-the dynamic case. In: Boyd, C. (eds) Advances in Cryptology - ASIACRYPT 2001, pp 290-309. Springer, Berlin
-
(2001)
Advances in Cryptology - ASIACRYPT 2001
, pp. 290-309
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
23
-
-
56049092580
-
Efficient identity-based conference key distribution protocols
-
In: Boyd C., Dawson E. (eds). Springer, Berlin
-
Saeednia S., Safavi-Naini R. (1998). Efficient identity-based conference key distribution protocols. In: Boyd C., Dawson E. (eds). Information Security and Privacy, Third Australasian Conference, ACISP'98, Lecture Notes in Computer Science, vol. 1438. Springer, Berlin, pp. 320-331
-
(1998)
Information Security and Privacy, Third Australasian Conference ACISP'98, Lecture Notes in Computer Science
, vol.1438
, pp. 320-331
-
-
Saeednia, S.1
Safavi-Naini, R.2
-
24
-
-
0004023090
-
On formal models for secure key exchange
-
At the time of writing available electronically at
-
Shoup, V.: On formal models for secure key exchange. Cryptology ePrint archive: Report 1999/012 (1999). At the time of writing available electronically at http://www.eprint. iacr.org/1999/012
-
(1999)
Cryptology EPrint Archive: Report 1999/012
-
-
Shoup, V.1
-
25
-
-
0344996490
-
Secure group key agreement
-
Ph.D. thesis, Universität des Saarlandes At the time of writing available at
-
Steiner, M.: Secure group key agreement. Ph.D. thesis, Universität des Saarlandes (2002). At the time of writing available at http:// www.semper.org/sirene/publ/Stei_02.thesis-final.pdf
-
(2002)
-
-
Steiner, M.1
-
26
-
-
84957807365
-
A practical and secure fault-tolerant conference-key agreement protocol
-
In: Imai, H., Zheng, Y. (eds.) Springer, Berlin
-
Tzeng, W.G.: A practical and secure fault-tolerant conference-key agreement protocol. In: Imai, H., Zheng, Y. (eds.) Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Lecture Notes in Computer Science, vol. 1751, pp. 1-13. Springer, Berlin (2000)
-
(2000)
Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Lecture Notes in Computer Science
, vol.1751
, pp. 1-13
-
-
Tzeng, W.G.1
|