-
2
-
-
37349005577
-
Deniable authentication protocol based on Diffie-Hellman algorithm
-
in Chinese
-
Xu CX, Fan L, Li JH. Deniable authentication protocol based on Diffie-Hellman algorithm. Computer Engineering, 2002, 28(10): 145-146 (in Chinese with English abstract).
-
(2002)
Computer Engineering
, vol.28
, Issue.10
, pp. 145-146
-
-
Xu, C.X.1
Fan, L.2
Li, J.H.3
-
5
-
-
0035268154
-
Deniable authentication protocols
-
Deng X, Lee CH, Zhu H. Deniable authentication protocols. IEE Proc.-Computers Digital Techniques, 2001, 148(2): 101-104.
-
(2001)
IEE Proc.-Computers Digital Techniques
, vol.148
, Issue.2
, pp. 101-104
-
-
Deng, X.1
Lee, C.H.2
Zhu, H.3
-
6
-
-
33745211009
-
Cryptanalysis of a suite of deniable authentication protocols
-
Zhu RW, Wong DS, Lee CH. Cryptanalysis of a suite of deniable authentication protocols. IEEE Communications Letters, 2006, 10(6): 504-506.
-
(2006)
IEEE Communications Letters
, vol.10
, Issue.6
, pp. 504-506
-
-
Zhu, R.W.1
Wong, D.S.2
Lee, C.H.3
-
10
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
New York: IEEE Computer Society Press
-
Canetti R. Universally composable security: A new paradigm for cryptographic protocols. In: Proc. of the 42nd IEEE Symp. on the FOCS. New York: IEEE Computer Society Press, 2001. 136-145.
-
(2001)
Proc. of the 42nd IEEE Symp. on the FOCS
, pp. 136-145
-
-
Canetti, R.1
-
11
-
-
24944473997
-
Smooth projective hashing and two-message oblivious transfer
-
LNCS 3494, Berlin: Springer-Verlag
-
Kalai YT. Smooth projective hashing and two-message oblivious transfer. In: Advances in Cryptology, Eurocrypt 2005. LNCS 3494, Berlin: Springer-Verlag, 2005. 78-96.
-
(2005)
Advances in Cryptology, Eurocrypt 2005
, pp. 78-96
-
-
Kalai, Y.T.1
-
12
-
-
84974602942
-
Improved non-committing encryption schemes based on general complexity assumptions
-
LNCS 1880, Berlin: Springer-Verlag
-
Damgard I, Nielsen JB. Improved non-committing encryption schemes based on general complexity assumptions. In: Proc. of the CRYPTO 2000. LNCS 1880, Berlin: Springer-Verlag, 2000. 432-450.
-
(2000)
Proc. of the CRYPTO 2000
, pp. 432-450
-
-
Damgard, I.1
Nielsen, J.B.2
-
14
-
-
84942550998
-
Public-Key cryptosystems based on composite-degree residuosity classes
-
LNCS 1592, Berlin: Springer-Verlag
-
Paillier P. Public-Key cryptosystems based on composite-degree residuosity classes. In: Advances in Cryptology, Eurocrypt'99. LNCS 1592, Berlin: Springer-Verlag, 1999. 223-238.
-
(1999)
Advances in Cryptology, Eurocrypt'99
, pp. 223-238
-
-
Paillier, P.1
-
15
-
-
84947267092
-
Universal Hash proofs and a paradigm for adaptive chosen cipher text secure public-key encryption
-
LNCS 2332, Berlin: Springer-Verlag
-
Cramer R, Shoup V. Universal Hash proofs and a paradigm for adaptive chosen cipher text secure public-key encryption. In: Advances in Cryptology, Eurocrypt 2002. LNCS 2332, Berlin: Springer-Verlag, 2002. 45-64.
-
(2002)
Advances in Cryptology, Eurocrypt 2002
, pp. 45-64
-
-
Cramer, R.1
Shoup, V.2
-
16
-
-
84860984371
-
Adaptively-Secure, non-interactive public-key encryption
-
Canetti R, Halevi S, Katz J. Adaptively-Secure, non-interactive public-key encryption. http://eprint.iacr.org/2004/317.pdf.
-
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
17
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key exchange protocols
-
Dallas: ACM Press
-
Bellare M, Canetti R, Krawzyk H. A modular approach to the design and analysis of authentication and key exchange protocols. In: Proc. of the 30th Symp. on Theory of Computing. Dallas: ACM Press, 1998. 419-428.
-
(1998)
Proc. of the 30th Symp. on Theory of Computing
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawzyk, H.3
|