-
2
-
-
84945119254
-
Entity authentication and key distribution
-
Advances in Cryptology, - CRYPTO'93, D. Stinson ed, Springer-Verlag
-
M. Bellare and P. Rogaway, "Entity authentication and key distribution", Advances in Cryptology, - CRYPTO'93, Lecture Notes in Computer Science Vol. 773, D. Stinson ed, Springer-Verlag, 1994, pp. 232-249.
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84956866842
-
Unknown key-share attacks on the station-to-station (STS) protocol
-
Proceedings of PKC '99
-
S. Blake-Wilson and A. Menezes, "Unknown key-share attacks on the station-to-station (STS) protocol", Proceedings of PKC '99, Lecture Notes in Computer Science, 1560 (1999), 154-170.
-
(1999)
Lecture Notes in Computer Science
, vol.1560
, pp. 154-170
-
-
Blake-Wilson, S.1
Menezes, A.2
-
6
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
Eurocrypt'2001
-
Canetti, R., and Krawczyk, H., "Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels", Eurocrypt'2001, LNCS Vol. 2045.
-
LNCS
, vol.2045
-
-
Canetti, R.1
Krawczyk, H.2
-
7
-
-
84880890468
-
-
Full version Report 2001/040
-
Full version in: Cryptology ePrint Archive (http://eprint.iacr.org/), Report 2001/040.
-
Cryptology ePrint Archive
-
-
-
8
-
-
84869635960
-
Security Analysis of IKE's Signature-based Key-Exchange Protocol
-
Crypto 2002
-
Canetti, R., and Krawczyk, H., "Security Analysis of IKE's Signature-based Key-Exchange Protocol", Crypto 2002. LNCS Vol. 2442.
-
LNCS
, vol.2442
-
-
Canetti, R.1
Krawczyk, H.2
-
9
-
-
84880890468
-
-
Full version Report 2002/120
-
Full version in: Cryptology ePrint Archive (http://eprint.iacr.org/), Report 2002/120.
-
Cryptology ePrint Archive
-
-
-
13
-
-
0004115841
-
-
D. Harkins and D. Carrel, ed., RFC 2409, Nov.
-
D. Harkins and D. Carrel, ed., "The Internet Key Exchange (IKE)", RFC 2409, Nov. 1998.
-
(1998)
The Internet Key Exchange (IKE)
-
-
-
15
-
-
84945137421
-
Encryption Modes with Almost Free Message Integrity
-
Advances in Cryptology - EUROCRYPT 2001 Proceedings, Springer-Verlag, B. Pfitzmann, ed
-
C. Jutla, "Encryption Modes with Almost Free Message Integrity", Advances in Cryptology - EUROCRYPT 2001 Proceedings, Lecture Notes in Computer Science, Vol. 2045, Springer-Verlag, B. Pfitzmann, ed, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
-
-
Jutla, C.1
-
18
-
-
1442292341
-
-
draft-ietf-ipsec-ikev2-07.txt, April (to be published as an RFC)
-
C. Kaufman, "Internet Key Exchange (IKEv2) Protocol", draft-ietf-ipsec-ikev2-07.txt, April 2003 (to be published as an RFC).
-
(2003)
Internet Key Exchange (IKEv2) Protocol
-
-
Kaufman, C.1
-
21
-
-
84943289804
-
Communication to IPsec WG
-
April-October
-
H. Krawczyk, Communication to IPsec WG, IPsec mailing list archives, April-October 1995. http://www.vpnc.org/ietf-ipsec/
-
(1995)
IPsec Mailing List Archives
-
-
Krawczyk, H.1
-
23
-
-
0003196107
-
HMAC: Keyed-Hashing for Message Authentication
-
February
-
Krawczyk, H., Bellare, M., and Canetti, R., "HMAC: Keyed-Hashing for Message Authentication", RFC 2104, February 1997.
-
(1997)
RFC 2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
24
-
-
33645401426
-
Blinding of Credit Card Numbers in the SET Protocol
-
Proceedings of Financial Cryptography'99
-
Krawczyk, H., "Blinding of Credit Card Numbers in the SET Protocol", Proceedings of Financial Cryptography'99, LNCS Vol. 1648, 1999.
-
(1999)
LNCS
, vol.1648
-
-
Krawczyk, H.1
-
25
-
-
84880901653
-
The order of encryption and authentication for protecting communications (Or: How secure is SSL?)
-
Crypto'2001
-
H. Krawczyk, "The order of encryption and authentication for protecting communications (Or: how secure is SSL?)", Crypto'2001, LNCS Vol. 2139.
-
LNCS
, vol.2139
-
-
Krawczyk, H.1
-
26
-
-
84880890468
-
-
Full version Report 2001/045
-
Full version in: Cryptology ePrint Archive (http://eprint.iacr.org/), Report 2001/045.
-
Cryptology ePrint Archive
-
-
-
29
-
-
0032630725
-
Analysis of the Internet Key Exchange Protocol Using the NRL Protocol Analyzer
-
IEEE Computer Society Press
-
Meadows, C., "Analysis of the Internet Key Exchange Protocol Using the NRL Protocol Analyzer", Proc. of the 1999 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1999.
-
(1999)
Proc. of the 1999 IEEE Symposium on Security and Privacy
-
-
Meadows, C.1
-
31
-
-
0003294637
-
The OAKLEY Key Determination Protocol
-
Nov.
-
Orman, H., "The OAKLEY Key Determination Protocol", Request for Comments 2412, Nov. 1998.
-
(1998)
Request for Comments 2412
-
-
Orman, H.1
-
33
-
-
0004023090
-
On Formal Models for Secure Key Exchange
-
V. Shoup, "On Formal Models for Secure Key Exchange", Theory of Cryptography Library, 1999. Available at: http://philby.ucsd.edu/cryptolib/1999/99-12.html.
-
(1999)
Theory of Cryptography Library
-
-
Shoup, V.1
-
34
-
-
0027735231
-
Extending cryptographic logics of belief to key agreement protocols
-
Nov. Fairfax, Virginia
-
P. van Oorschot, "Extending cryptographic logics of belief to key agreement protocols", Proceedings, 1st ACM Conference on Computer and Communications Security, Nov. 1993, Fairfax, Virginia, pp. 232-243,
-
(1993)
Proceedings, 1st ACM Conference on Computer and Communications Security
, pp. 232-243
-
-
Van Oorschot, P.1
|