-
4
-
-
0031642585
-
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols
-
M. Bellare, R. Canetti, and H. Krawczyk. A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. STOC '98.
-
STOC '98
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
6
-
-
0005078946
-
Entity Authentication and Key Distribution
-
M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. Crypto '93.
-
Crypto '93
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
33745796906
-
Provably-Secure Session Key Distribution: The Three Party Case
-
M. Bellare and P. Rogaway. Provably-Secure Session Key Distribution: the Three Party Case. STOC '95.
-
STOC '95
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
0027617333
-
Systematic Design of Two-Party Authentication Protocols
-
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung. Systematic Design of Two-Party Authentication Protocols. IEEE J. on Selected Areas in Communications, 11(5): 679-693 (1993).
-
(1993)
IEEE J. on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 679-693
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
9
-
-
35248892975
-
-
A preliminary version appeared
-
A preliminary version appeared in Crypto '91.
-
Crypto '91
-
-
-
10
-
-
35248821828
-
On Key Agreement and Conference Key Agreement
-
C. Boyd. On Key Agreement and Conference Key Agreement. ACISP '97.
-
ACISP '97
-
-
Boyd, C.1
-
11
-
-
15344350291
-
Round-Optimal Contributory Conference Key Agreement
-
C. Boyd and J.M.G. Nieto. Round-Optimal Contributory Conference Key Agreement. PKC 2003.
-
PKC 2003
-
-
Boyd, C.1
Nieto, J.M.G.2
-
12
-
-
0006453868
-
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case
-
E. Bresson, O. Chevassut, and D. Pointcheval. Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case. Asiacrypt 2001.
-
Asiacrypt 2001
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
15
-
-
0000288916
-
A Secure and Efficient Conference Key Distribution System
-
M. Burmester and Y. Desmedt. A Secure and Efficient Conference Key Distribution System. Eurocrypt '94.
-
Eurocrypt '94
-
-
Burmester, M.1
Desmedt, Y.2
-
16
-
-
0038629682
-
Key-Exchange Protocols and Their Use for Building Secure Channels
-
R. Canetti and H. Krawczyk. Key-Exchange Protocols and Their Use for Building Secure Channels. Eurocrypt 2001.
-
Eurocrypt 2001
-
-
Canetti, R.1
Krawczyk, H.2
-
17
-
-
3543100621
-
Universally Composable Notions of Key Exchange and Secure Channels
-
R. Canetti and H. Krawczyk. Universally Composable Notions of Key Exchange and Secure Channels. Eurocrypt 2002.
-
Eurocrypt 2002
-
-
Canetti, R.1
Krawczyk, H.2
-
18
-
-
84858809967
-
Security Analysis of IKE's Signature-Based Key-Exchange Protocol
-
R. Canetti and H. Krawczyk. Security Analysis of IKE's Signature-Based Key-Exchange Protocol. Crypto 2002.
-
Crypto 2002
-
-
Canetti, R.1
Krawczyk, H.2
-
19
-
-
35248889050
-
-
Personal communication (including a copy of the pre-proceedings version of [14]), March
-
Y. Desmedt. Personal communication (including a copy of the pre-proceedings version of [14]), March 2003.
-
(2003)
-
-
Desmedt, Y.1
-
21
-
-
1542593353
-
Authentication and Authenticated Key Exchanges
-
W. Diffie, P. van Oorschot, and M. Wiener. Authentication and Authenticated Key Exchanges. Designs, Codes, and Cryptography, 2(2): 107-125 (1992).
-
(1992)
Designs, Codes, and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.2
Wiener, M.3
-
22
-
-
0022045868
-
Impossibility of Distributed Consensus with One Faulty Process
-
M. Fischer, N. Lynch, and M. Patterson. Impossibility of Distributed Consensus with One Faulty Process. J. ACM 32(2): 374-382 (1985).
-
(1985)
J. ACM
, vol.32
, Issue.2
, pp. 374-382
-
-
Fischer, M.1
Lynch, N.2
Patterson, M.3
-
24
-
-
0009733453
-
A One Round Protocol for Tripartite Diffie Hellman
-
A. Joux. A One Round Protocol for Tripartite Diffie Hellman. ANTS 2000.
-
ANTS 2000
-
-
Joux, A.1
-
29
-
-
0033280698
-
Secure Protocol Transformation via "Expansion": From Two-Party to Groups
-
A. Mayer and M. Yung. Secure Protocol Transformation via "Expansion": From Two-Party to Groups. ACM CCCS '99.
-
ACM CCCS '99
-
-
Mayer, A.1
Yung, M.2
-
33
-
-
35248830084
-
-
A preliminary version appeared
-
A preliminary version appeared in ACM CCCS '96.
-
ACM CCCS '96
-
-
-
34
-
-
0344133881
-
A Practical and Secure Fault-Tolerant Conference Key Agreement Protocol
-
W.-G. Tzeng. A Practical and Secure Fault-Tolerant Conference Key Agreement Protocol. PKC 2000.
-
PKC 2000
-
-
Tzeng, W.-G.1
-
35
-
-
84943341876
-
Round Efficient Conference Key Agreement Protocols with Provable Security
-
W.-G. Tzeng and Z.-J. Tzeng. Round Efficient Conference Key Agreement Protocols with Provable Security. Asiacrypt 2000.
-
Asiacrypt 2000
-
-
Tzeng, W.-G.1
Tzeng, Z.-J.2
|