-
1
-
-
84949221411
-
Authenticated Diffie-Hellman key agreement protocols
-
Lecture Notes in Computer Science 1556. Berlin: Springer-Verlag
-
Blake-Wilson S, Menezes A. Authenticated Diffie-Hellman key agreement protocols//Proceedings of the SAC'98, Lecture Notes in Computer Science 1556. Berlin: Springer-Verlag, 1999: 339-361
-
(1999)
Proceedings of the SAC'98
, pp. 339-361
-
-
Blake-Wilson, S.1
Menezes, A.2
-
3
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Lecture Notes in Computer Science 196. Berlin: Springer-Verlag
-
Shamir A. Identity-based cryptosystems and signature schemes//Proceedings of the CRYPTO'84, Lecture Notes in Computer Science 196. Berlin: Springer-Verlag, 1984: 47-53
-
(1984)
Proceedings of the CRYPTO'84
, pp. 47-53
-
-
Shamir, A.1
-
4
-
-
24144458508
-
A new two-party identity-based authenticated key agreement
-
Lecture Notes in Computer Science 3376. Berlin: Springer-Verlag
-
McCullagh N, Barreto P S L M. A new two-party identity-based authenticated key agreement//Proceedings of the CT-RSA'05, Lecture Notes in Computer Science 3376. Berlin: Springer-Verlag, 2005: 262-274
-
(2005)
Proceedings of the CT-RSA'05
, pp. 262-274
-
-
McCullagh, N.1
Barreto, P.S.L.M.2
-
5
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Lecture Notes in Computer Science 2139. Berlin: Springer-Verlag
-
Boneh D, Franklin M. Identity-based encryption from the Weil pairing//Proceedings of the CRYPTO'01, Lecture Notes in Computer Science 2139. Berlin: Springer-Verlag, 2001: 213-229
-
(2001)
Proceedings of the CRYPTO'01
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
84874800178
-
A public key cryptosystem and signature scheme based on discrete logarithms
-
El Gamal T. A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Transaction on Information Theory, 1985, 31(4): 469-472
-
(1985)
IEEE Transaction on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
El Gamal, T.1
-
7
-
-
0037142442
-
An ID-based authenticated key agreement protocol based on the Weil pairing
-
Smart N. An ID-based authenticated key agreement protocol based on the Weil pairing. Electronic Letters, 2002, 38(13): 630-632
-
(2002)
Electronic Letters
, vol.38
, Issue.13
, pp. 630-632
-
-
Smart, N.1
-
8
-
-
0038680685
-
Efficient ID-based authenticated key agreement protocol based on Weil pairing
-
Shim K. Efficient ID-based authenticated key agreement protocol based on Weil pairing. Electronic Letters, 2003, 39(8): 653-654
-
(2003)
Electronic Letters
, vol.39
, Issue.8
, pp. 653-654
-
-
Shim, K.1
-
10
-
-
33645590972
-
An efficient ID-based authenticated key agreement protocol from pairings
-
Lecture Notes in Computer Science 3042. Berlin: Springer-Verlag
-
Ryu E K, Yoon E J, Yoo K Y. An efficient ID-based authenticated key agreement protocol from pairings//Proceedings of the NETWORKING'04, Lecture Notes in Computer Science 3042. Berlin: Springer-Verlag, 2004: 1458-1463
-
(2004)
Proceedings of the NETWORKING'04
, pp. 1458-1463
-
-
Ryu, E.K.1
Yoon, E.J.2
Yoo, K.Y.3
-
11
-
-
35048899816
-
Key agreement using statically keyed authenticators
-
Lecture Notes in Computer Science 3089. Berlin: Springer-Verlag
-
Boyd C, Mao W, Paterson K. Key agreement using statically keyed authenticators//Proceedings of ACNS'04, Lecture Notes in Computer Science 3089. Berlin: Springer-Verlag, 2004: 248-262
-
(2004)
Proceedings of ACNS'04
, pp. 248-262
-
-
Boyd, C.1
Mao, W.2
Paterson, K.3
-
12
-
-
10444220191
-
Efficient identity-based authenticated key agreement protocol from pairings
-
Choie Y J, Jeong E, Lee E. Efficient identity-based authenticated key agreement protocol from pairings. Journal of Applied Mathematics and Computation, 2005, 162(1): 179-188
-
(2005)
Journal of Applied Mathematics and Computation
, vol.162
, Issue.1
, pp. 179-188
-
-
Choie, Y.J.1
Jeong, E.2
Lee, E.3
-
13
-
-
33645734037
-
An ID-based key agreement scheme from pairing
-
Cryptology ePrint Archive, Report 2005/093
-
Xie G. An ID-based key agreement scheme from pairing. Cryptology ePrint Archive, Report 2005/093, 2005
-
(2005)
-
-
Xie, G.1
-
14
-
-
36248932062
-
Identity-based key agreement protocols from pairings
-
Cryptology ePrint Archive, Report 2006/199
-
Chen L, Cheng Z, Smart N P. Identity-based key agreement protocols from pairings. Cryptology ePrint Archive, Report 2006/199, 2006
-
(2006)
-
-
Chen, L.1
Cheng, Z.2
Smart, N.P.3
-
15
-
-
33646184315
-
Efficient identity-based and authenticated key agreement protocol
-
Cryptology ePrint Archive, Report 2005/108
-
Wang Y. Efficient identity-based and authenticated key agreement protocol. Cryptology ePrint Archive, Report 2005/108, 2005
-
(2005)
-
-
Wang, Y.1
-
17
-
-
33746062799
-
Practical identity-based encryption without random oracles
-
Lecture Notes in Computer Science 4004. Berlin: Springer-Verlag
-
Gentry C. Practical identity-based encryption without random oracles//Proceedings of the EUROCRYPT'06, Lecture Notes in Computer Science 4004. Berlin: Springer-Verlag, 2006: 445-464
-
(2006)
Proceedings of the EUROCRYPT'06
, pp. 445-464
-
-
Gentry, C.1
-
18
-
-
33750015293
-
About the Security of MTI/CO and MQV
-
Lecture Notes in Computer Science 4116. Berlin: Springer-Verlag
-
Kunz-Jacques S, Pointcheval D. About the Security of MTI/CO and MQV//Proceedings of the SCN'06, Lecture Notes in Computer Science 4116. Berlin: Springer-Verlag, 2006: 156-172
-
(2006)
Proceedings of the SCN'06
, pp. 156-172
-
-
Kunz-Jacques, S.1
Pointcheval, D.2
-
20
-
-
36248981438
-
Cryptographic method and apparatus for public key exchange with authentication
-
US Patent 4956863
-
Goss K C. Cryptographic method and apparatus for public key exchange with authentication. US Patent 4956863, September 1990
-
(1990)
-
-
Goss, K.C.1
-
22
-
-
84944878354
-
-
Boca Raton, FL, USA: CRC Press
-
Menezes A, van Oorschot P, Vanstone S. Handbook of applied cryptography. Boca Raton, FL, USA: CRC Press, 1997
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
van Oorschot, P.2
Vanstone, S.3
-
24
-
-
84945119254
-
Entity authentication and key distribution
-
Lecture Notes in Computer Science 773. Berlin: Springer-Verlag
-
Bellare M, Rogaway P. Entity authentication and key distribution//Proceedings of the CRYPTO'93, Lecture Notes in Computer Science 773. Berlin: Springer-Verlag, 1994: 110-125
-
(1994)
Proceedings of the CRYPTO'93
, pp. 110-125
-
-
Bellare, M.1
Rogaway, P.2
-
25
-
-
33646180371
-
On session key construction in provably secure protocols
-
Lecture Notes in Computer Science 3715. Berlin: Springer-Verlag
-
Choo K-K R, Boyd C, Hitchcock Y. On session key construction in provably secure protocols//Proceedings of the MYCRYPT'05. Lecture Notes in Computer Science 3715. Berlin: Springer-Verlag, 2005: 116-131
-
(2005)
Proceedings of the MYCRYPT'05
, pp. 116-131
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
|