-
1
-
-
35048823512
-
Tripartite authenticated key agreement protocols from pairings
-
Cryptography and Coding, Springer-Verlag
-
Sattam S. Al-Riyami and Kenneth G. Paterson. Tripartite authenticated key agreement protocols from pairings. In Cryptography and Coding, volume 2898 of Lecture Notes in Computer Science, pages 332-359. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2898
, pp. 332-359
-
-
Sattam, S.1
Al-Riyami2
Paterson, K.G.3
-
2
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Advances in CryptologyCRYPTO 2002, Springer-Verlag
-
Paulo S. L. M. Barreto, Hae Y. Kirn, Ben Lynn, and Michael Scott. Efficient algorithms for pairing-based cryptosystems. In Advances in CryptologyCRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 354-368. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kirn, H.Y.2
Lynn, B.3
Scott, M.4
-
3
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract)
-
New York, May ACM Press. [Pull paper online]
-
Mihir Bellare, Ran Canetti, and Hugo Krawczyk. A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract). In Proceedings of the 30th Annual ACM Symposium on Theory of Computing (STOC '98), pages 419-428, New York, May 1998. ACM Press. [Pull paper online] http://www-cse.ucsd. edu/users/mihir/papers/nodular.ps.gz.
-
(1998)
Proceedings of the 30th Annual ACM Symposium on Theory of Computing (STOC '98)
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes (extended abstract)
-
Advances in Cryptology-CRYPTO '98, Springer-Verlag, [Pull paper online]
-
Mihir Bellare, Anand Desai, David Pointcheval, and Phil Rogaway. Relations among notions of security for public-key encryption schemes (extended abstract). In Advances in Cryptology-CRYPTO '98, volume 1462 of Lecture Notes in Computer Science, pages 26-45. Springer-Verlag, 1998. [Pull paper online] http://www-cse.ucsd.edu/users/mihir/papers/relations.pdf.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
5
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Advances in Cryptology-CRYPTO 2001, Springer-Verlag, [Full paper online]
-
Dan Boneh and Matthew Franklin. Identity-based encryption from the Weil pairing. In Advances in Cryptology-CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 213-229. Springer-Verlag, 2001. [Full paper online] http://crypto.Stanford.edu/"dabo/abstracts/ibe.html.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
84946840347
-
Short signatures from the Weil pairing
-
Advances in Cryptology-ASIACRYPT 2001, Springer-Verlag, [Full paper online]
-
Dan Boneh, Ben Lynn, and Hovav Shacham. Short signatures from the Weil pairing. In Advances in Cryptology-ASIACRYPT 2001, volume 2139 of Lecture Notes in Computer Science, pages 514-532. Springer-Verlag, 2001. [Full paper online] http://crypto.stanford.edu/~dabo/abstracts/weilsigs.html.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
8
-
-
0035751060
-
Provably authenticated group Diffie-Hellman key exchange
-
P. Samarati, editor, Philadelphia, Pennsylvania, USA, November ACM, ACM Press
-
E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater. Provably authenticated group Diffie-Hellman key exchange. In P. Samarati, editor, Proc. of ACM-CCS 01, pages 255-264, Philadelphia, Pennsylvania, USA, November 2001. ACM, ACM Press.
-
(2001)
Proc. of ACM-CCS 01
, pp. 255-264
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
Quisquater, J.-J.4
-
9
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Advances in Cryptology-EUROCRYPT 2001, Springer-Verlag, [Full paper online]
-
Ran Canetti and Hugo Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Advances in Cryptology-EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 451-472. Springer-Verlag, 2001. [Full paper online] http://eprint.iacr.org/2001/040.ps. gz.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 451-472
-
-
Canetti, R.1
Krawczyk, H.2
-
10
-
-
35248844436
-
An identity-based signature from gap DiffieHellman groups
-
Practice and Theory in Public Key Cryptography-PKC 2003, Springer-Verlag
-
Jae Choon Cha and Jung Hee Cheon. An identity-based signature from gap DiffieHellman groups. In Practice and Theory in Public Key Cryptography-PKC 2003, volume 2567 of Lecture Notes in Computer Science, pages 18-30. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2567
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
11
-
-
35048821649
-
Diffie-Hellman problems and bilinear maps
-
[Online] [accessed 11/07/2003]
-
Jung Hee Cheon and Dong Hoon Lee. Diffie-Hellman problems and bilinear maps. Cryptology ePrint Archive, Report 2002/117, 2002. [Online] http://eprint.iacr.org/ [accessed 11/07/2003].
-
(2002)
Cryptology EPrint Archive, Report 2002/117
-
-
Cheon, J.H.1
Lee, D.H.2
-
12
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Selected Areas in Cryptography-SAC 2002, Springer-Verlag
-
Florian Hess. Efficient identity based signature schemes based on pairings. In Selected Areas in Cryptography-SAC 2002, volume 2595 of Lecture Notes in Computer Science, pages 310-324. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
13
-
-
84946844750
-
A one round protocol for tripartite Diffie-Hellman
-
Algorithmic Number Theory: Fourth International Symposium-ANTS-IV 2000, Proceedings, SpringerVerlag
-
Antoine Joux. A one round protocol for tripartite Diffie-Hellman. In Algorithmic Number Theory: Fourth International Symposium-ANTS-IV 2000, Proceedings, volume 1838 of Lecture Notes in Computer Science, pages 385-393. SpringerVerlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1838
, pp. 385-393
-
-
Joux, A.1
-
14
-
-
35048893509
-
New identity based signcryption schemes from pairings
-
[Online] [accessed 11/07/2003]
-
Benoit Libert and Jean-Jacques Quisquater. New identity based signcryption schemes from pairings. Cryptology ePrint Archive, Report 2003/023, 2003. [Online] http://eprint.iacr.org/ [accessed 11/07/2003].
-
(2003)
Cryptology EPrint Archive, Report 2003/023
-
-
Libert, B.1
Quisquater, J.-J.2
-
15
-
-
1142282396
-
Authenticated identity-based encryption
-
[Online] [accessed 11/07/2003]
-
Ben Lynn. Authenticated identity-based encryption. Cryptology ePrint Archive, Report 2002/072, 2002. [Online] http://eprint.iacr.org/ [accessed 11/07/2003].
-
(2002)
Cryptology EPrint Archive, Report 2002/072
-
-
Lynn, B.1
-
16
-
-
0242445175
-
Identity-based signcryption
-
[Online] [accessed 11/07/2003]
-
John Malone-Lee. Identity-based signcryption. Cryptology ePrint Archive, Report 2002/098, 2002. [Online] http://eprint.iacr.org/ [accessed 11/07/2003].
-
(2002)
Cryptology EPrint Archive, Report 2002/098
-
-
Malone-Lee, J.1
-
18
-
-
33645596850
-
Signcryption scheme for identity-based cryptosystems
-
[Online] [accessed 11/07/2003]
-
Divya Nalla and K.C. Reddy. Signcryption scheme for identity-based cryptosystems. Cryptology ePrint Archive, Report 2003/066, 2003. [Online] http://eprint.iacr.org/ [accessed 11/07/2003].
-
(2003)
Cryptology EPrint Archive, Report 2003/066
-
-
Nalla, D.1
Reddy, K.C.2
-
19
-
-
1642414982
-
Cryptography from pairings: A snapshot of current research
-
K.G. Paterson. Cryptography from pairings: a snapshot of current research. Information Security Technical Report, 7(3):41-54, 2002.
-
(2002)
Information Security Technical Report
, vol.7
, Issue.3
, pp. 41-54
-
-
Paterson, K.G.1
-
20
-
-
63449093784
-
Provably secure mobile key exchange: Applying the Canetti-Krawczyk approach
-
Information Security and Privacy-ACISP 2003, Springer-Verlag
-
Yiu Shing Terry Tin, Colin Boyd, and Juan Manuel Gonzalez Nieto. Provably secure mobile key exchange: Applying the Canetti-Krawczyk approach. In Information Security and Privacy-ACISP 2003, volume 2727 of Lecture Notes in Computer Science, pages 166-179. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2727
, pp. 166-179
-
-
Tin, Y.S.T.1
Boyd, C.2
Nieto, J.M.G.3
|