-
2
-
-
0033748607
-
New Multi-Party Authentication Services and Key Agreement Protocols
-
G. Ateniese, M. Steiner, and G. Tsudik. New Multi-Party Authentication Services and Key Agreement Protocols. IEEE Journal of Selected Areas in Communications, volume 18, No. 4, pages 628-639, 2000.
-
(2000)
IEEE Journal of Selected Areas in Communications
, vol.18
, Issue.4
, pp. 628-639
-
-
Ateniese, G.1
Steiner, M.2
Tsudik, G.3
-
4
-
-
84945119254
-
Entity Authentication and Key Distribution
-
Advances in Cryptology-CRYPTO 1993, Springer Verlag
-
M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. Advances in Cryptology-CRYPTO 1993, volume 773 of Lecture Notes in Computer Science, pages 232-249, Springer Verlag, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0027617333
-
Systematic Design of Two-Party Authentication Protocols
-
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung. Systematic Design of Two-Party Authentication Protocols. IEEE Journal on Selected Areas in Communications 11(5): 679-693 (1993).
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 679-693
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
6
-
-
84949230533
-
Key Agreement Protocols and their Security Analysis
-
ACM
-
S. Blake-Wilson, D. Johnson, and A. Menezes. Key Agreement Protocols and their Security Analysis. Sixth IMA International Conference on Cryptography and Coding, volume 1335, pages 30-45, ACM, 1997.
-
(1997)
Sixth IMA International Conference on Cryptography and Coding
, vol.1335
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
7
-
-
84949221411
-
Authenticated Diffie-Hellman Key Agreement Protocols
-
Selected Areas in Cryptography, Springer Verlag
-
S. Blake-Wilson and A. Menezes. Authenticated Diffie-Hellman Key Agreement Protocols. Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, pages 339-361, Springer Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1556
, pp. 339-361
-
-
Blake-Wilson, S.1
Menezes, A.2
-
8
-
-
84957893731
-
On Key Agreement and Conference Key Agreement
-
ACISP 1997, Springer Verlag
-
C. Boyd. On Key Agreement and Conference Key Agreement. ACISP 1997, volume 1270 of Lecture Notes in Computer Science, page 294-302, Springer Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1270
, pp. 294-302
-
-
Boyd, C.1
-
9
-
-
35248878662
-
Round-Optimal Contributory Conference Key Agreement
-
Public Key Cryptography, Springer Verlag
-
C. Boyd and J.M.G. Nieto. Round-Optimal Contributory Conference Key Agreement. Public Key Cryptography, volume 2567 of Lecture Notes in Computer Science, pages 161-174, Springer Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2567
, pp. 161-174
-
-
Boyd, C.1
Nieto, J.M.G.2
-
10
-
-
50849127145
-
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case
-
Advances in CryptologyASIACRYPT 2001, Springer Verlag
-
E. Bresson, O. Chevassut, and D. Pointcheval. Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case. Advances in CryptologyASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science, pages 290-309, Springer Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 290-309
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
11
-
-
50849092893
-
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
-
Advances in Cryptology-EUROCRYPT 2002, Springer Verlag
-
E. Bresson, O. Chevassut, and D. Pointcheval. Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. Advances in Cryptology-EUROCRYPT 2002, volume 2332 of Lecture Notes in Computer Science, pages 321-336, Springer Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 321-336
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
12
-
-
0035751060
-
Provably Authenticated Group Diffie-Hellman Key Exchange
-
E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater. Provably Authenticated Group Diffie-Hellman Key Exchange. ACM Conference on Computer and Communications Security, pages 255-264, 2001.
-
(2001)
ACM Conference on Computer and Communications Security
, pp. 255-264
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
Quisquater, J.-J.4
-
13
-
-
84948991087
-
A Secure and Efficient Conference Key Distribution System
-
Advances in Cryptology-EUROCRYPT 1994, Springer Verlag
-
M. Burmester and Y. Desmedt. A Secure and Efficient Conference Key Distribution System. Advances in Cryptology-EUROCRYPT 1994, volume 950 of Lecture Notes in Computer Science, pages 275-286, Springer Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.950
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
14
-
-
84947232363
-
Universally Composable Notions of Key Exchange and Secure Channels
-
Advances in Cryptology-Eurocrypt 2002, Springer Verlag
-
R. Canetti and H. Krawczyk. Universally Composable Notions of Key Exchange and Secure Channels. Advances in Cryptology-Eurocrypt 2002, volume 2332 of Lecture Notes in Computer Science, pages 337-351, Springer Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 337-351
-
-
Canetti, R.1
Krawczyk, H.2
-
15
-
-
84976665942
-
Timestamps in Key Distribution Protocols
-
D. Denning and G. M. Sacco. Timestamps in Key Distribution Protocols. Comm. ACM 24(8): 533-536, 1981.
-
(1981)
Comm. ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.1
Sacco, G.M.2
-
17
-
-
1542593353
-
Authentication and Authenticated Key Exchanges
-
W. Diffie, P. van Oorschot, and M. Wiener. Authentication and Authenticated Key Exchanges. Designs, Codes, and Cryptography 2(2): 107-125 (1992).
-
(1992)
Designs, Codes, and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.2
Wiener, M.3
-
18
-
-
0020180459
-
A Conference Key Distribution System
-
I. Ingemarasson, D.T. Tang, and C.K. Wong. A Conference Key Distribution System. IEEE Transactions on Information Theory, volume 28, Issue. 5, pages 714-720 , 1982.
-
(1982)
IEEE Transactions on Information Theory
, vol.28
, Issue.5
, pp. 714-720
-
-
Ingemarasson, I.1
Tang, D.T.2
Wong, C.K.3
-
19
-
-
35048830150
-
-
Full version of this paper
-
I.R. Jeong, J. Katz, and D.H. Lee. Full version of this paper. Available at http://cist.korea.ac.kr/e_cist/e_index.htm.
-
-
-
Jeong, I.R.1
Katz, J.2
Lee, D.H.3
-
20
-
-
84955559079
-
Authenticated Multi-Party Key Agreement
-
ASIACRYPT 1996, Springer Verlag
-
M. Just and S. Vaudenay. Authenticated Multi-Party Key Agreement. ASIACRYPT 1996, volume 1163 of Lecture Notes in Computer Science, page 36-49, Springer Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1163
, pp. 36-49
-
-
Just, M.1
Vaudenay, S.2
-
22
-
-
0005243827
-
-
Technical report CORR 98-05, University of Waterloo
-
L. Law, A. Menezes, M. Qu, J. Solinas, and S. Vanstone. An Efficient Protocol for Authenticated Key Agreement. Technical report CORR 98-05, University of Waterloo, 1988.
-
(1988)
An Efficient Protocol for Authenticated Key Agreement
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
23
-
-
0022660635
-
On Seeking Smart Public-Key Distribution Systems
-
T. Matsumoto, Y. Takashima, and H. Imai. On Seeking Smart Public-Key Distribution Systems. The Transactions of the IECE of Japan, E69, pages 99-106, 1986.
-
(1986)
The Transactions of the IECE of Japan
, vol.E69
, pp. 99-106
-
-
Matsumoto, T.1
Takashima, Y.2
Imai, H.3
-
27
-
-
84957807365
-
A Practical and Secure-Fault-Tolerant Conference-Key Agreement Protocol
-
Public Key Cryptography 2000, Springer Verlag
-
W.-G. Tzeng. A Practical and Secure-Fault-Tolerant Conference-Key Agreement Protocol. Public Key Cryptography 2000, volume 1751 of Lecture Notes in Computer Science, page 1-13, Springer Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1751
, pp. 1-13
-
-
Tzeng, W.-G.1
|