-
3
-
-
84873466407
-
Authenticated Key Exchange Secure Against Dictionary Attacks
-
Advances in Cryptology - Eurocrypt'00, Springer-Verlag
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure Against Dictionary Attacks. In Advances in Cryptology - Eurocrypt'00, LNCS 1807, Springer-Verlag, pp. 139-155, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
4
-
-
0027726717
-
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
-
M. Bellare and P. Rogaway. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In Proc. of ACM CCS'93, 1993.
-
(1993)
Proc. of ACM CCS'93
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
84945119254
-
Entity Authentication and Key Distribution
-
Advances in Cryptology - Crypto'93, Springer-Verlag
-
M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. In Advances in Cryptology - Crypto'93, LNCS 773, Springer-Verlag, pp.232-249, 1994.
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
35048864734
-
Authenticated Ad Hoc Routing at the Link Layer for Mobile Systems
-
J. Binkley. Authenticated Ad Hoc Routing at The Link Layer for Mobile Systems. In Wireless Network, 1999.
-
(1999)
Wireless Network
-
-
Binkley, J.1
-
8
-
-
84937550984
-
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
-
Proc. of Eurocrypt 2000, Springer-Verlag
-
V. Boyko, P.D. MacKenzie and S. Patel. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. In Proc. of Eurocrypt 2000, LNCS 1807, Springer-Verlag, pp.156-171, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.D.2
Patel, S.3
-
9
-
-
35248878662
-
Round-Optimal Contributory Conference Key Agreement
-
Proc. of Public-Key Cryptography, Springer-Verlag
-
C. Boyd and J.M.G. Nietio. Round-Optimal Contributory Conference Key Agreement. In Proc. of Public-Key Cryptography, LNCS 2567, Springer-Verlag, pp.161-174, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 161-174
-
-
Boyd, C.1
Nietio, J.M.G.2
-
10
-
-
35048875249
-
Constant Round Authenticated Group Key Agreement via Distributed Computation
-
Proc. of PKC 2004, Springer-Verlag
-
E. Bresson and D. Catalano. Constant Round Authenticated Group Key Agreement via Distributed Computation. In Proc. of PKC 2004, LNCS 2947, Springer-Verlag, pp.115-129, 2004.
-
(2004)
LNCS
, vol.2947
, pp. 115-129
-
-
Bresson, E.1
Catalano, D.2
-
12
-
-
50849127145
-
Provably Authenticated Group Diffie-Hellman Key Exchange-The Dynamic Case
-
Advances in Cryptology - Asiacrypt'01, Springer-Verlag
-
E. Bresson, O. Chevassut and D. Pointcheval. Provably Authenticated Group Diffie-Hellman Key Exchange-The Dynamic Case. In Advances in Cryptology - Asiacrypt'01, LNCS 2248, Springer-Verlag, pp.290-309, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 290-309
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
13
-
-
50849092893
-
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
-
Advances in Cryptology - Eurocrpt'02, Springer-Verlag
-
E. Bresson, O. Chevassut and D. Pointcheval. Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. In Advances in Cryptology - Eurocrpt'02, LNCS 2332, Springer-Verlag, pp.321-336, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 321-336
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
15
-
-
0000288916
-
A Secure and Efficient Conference Key Distribution System
-
M. Burmester and Y. Desmedt. A Secure and Efficient Conference Key Distribution System. In Pre-proceedings of Eurocrypt'94, pp.279-290, 1994.
-
(1994)
Pre-proceedings of Eurocrypt'94
, pp. 279-290
-
-
Burmester, M.1
Desmedt, Y.2
-
19
-
-
35248878854
-
Scalable Protocols for Authenticated Group Key Exchange
-
Advances in Cryptology - Crypto'03 , Springer-Verlag
-
J. Katz and M. Yung. Scalable Protocols for Authenticated Group Key Exchange. In Advances in Cryptology - Crypto'03 , LNCS 2729, Springer-Verlag, pp.110-125, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 110-125
-
-
Katz, J.1
Yung, M.2
-
20
-
-
0008144151
-
Ubiquitous and Roubust Authentication Services for Ad Hoc Wireless Networks
-
H. Luo and S. Lu. Ubiquitous and Roubust Authentication Services for Ad Hoc Wireless Networks. In Technical Report, 2000.
-
(2000)
Technical Report
-
-
Luo, H.1
Lu, S.2
-
21
-
-
0000901529
-
Security Arguments for Digital Signatures and Blind Signatures
-
D. Pointcheval and J. Stern. Security Arguments for Digital Signatures and Blind Signatures. In Journal of Cryptology, 13(3):361-396, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
22
-
-
0004023090
-
On Formal Models for Secure Key Exchange
-
IBM Zurich Research Lab.
-
V. Shoup. On Formal Models for Secure Key Exchange. In Technical Report RZ 3120, IBM Zurich Research Lab., 1999.
-
(1999)
Technical Report RZ 3120
-
-
Shoup, V.1
-
23
-
-
0001831930
-
The Resurrecting Duckling: Security Issues for Adhoc Wireless Networks
-
F. Stajano and R. Anderson. The Resurrecting Duckling: Security Issues for Adhoc Wireless Networks. In AT&T Software Symposium, 1999.
-
(1999)
AT&T Software Symposium
-
-
Stajano, F.1
Anderson, R.2
-
24
-
-
84937394156
-
Round Efficient Conference Key Agreement Protocols with Provable Security
-
Advances in Cryptology - Asiacrypt'00, Springer-Verlag
-
W.-G. Tzeng and Z.-J. Tzeng. Round Efficient Conference Key Agreement Protocols with Provable Security. In Advances in Cryptology - Asiacrypt'00, LNCS 1976, Springer-Verlag, pp.614-628, 2000.
-
(2000)
LNCS
, vol.1976
, pp. 614-628
-
-
Tzeng, W.-G.1
Tzeng, Z.-J.2
-
25
-
-
0034590150
-
A Novel Authentication Scheme for Ad Hoc Networks
-
L. Venkatraman and D. P. Agrawal. A Novel Authentication Scheme for Ad Hoc Networks. In WCND'00, 2000.
-
(2000)
WCND'00
-
-
Venkatraman, L.1
Agrawal, D.P.2
|