-
1
-
-
0017018484
-
New directions in cryptography
-
DIFFIE, W., and HELLMAN. M.E.: 'New directions in cryptography', IEEE Trans., 1976, IT-22, pp. 644-654
-
(1976)
IEEE Trans.
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
2
-
-
3743048940
-
IEEE P1363/D7: Standard specifications for public key cryptography
-
September 11, Available
-
IEEE P1363 Working Group. 'IEEE P1363/D7: Standard specifications for public key cryptography'. Draft version 7, September 11, 1998. (Available from http://grouper.ieee.org/groups/ 1363/)
-
(1998)
Draft Version 7
-
-
-
3
-
-
0022660635
-
On seeking smart public-key distribution systems
-
MATSUMOTO, T., TAKASHIMA, Y., and IMAI, H.: 'On seeking smart public-key distribution systems', Trans. IECE Jpn., 1986, E69, pp. 99-106
-
(1986)
Trans. IECE Jpn.
, vol.E69
, pp. 99-106
-
-
Matsumoto, T.1
Takashima, Y.2
Imai, H.3
-
4
-
-
0029727376
-
SKIP - Securing the internet
-
IEEE Computer Society Press
-
CARONNI, G., LUBICH, H., AZIZ, A., MARKSON, T., and SKRENTA, R.: 'SKIP - Securing the internet'. Proc. Fifth Workshop on enabling technologies (WET ICE '96), 1996, IEEE Computer Society Press
-
(1996)
Proc. Fifth Workshop on Enabling Technologies (WET ICE '96)
-
-
Caronni, G.1
Lubich, H.2
Aziz, A.3
Markson, T.4
Skrenta, R.5
-
5
-
-
84949230533
-
'Key agreement protocols and their security analysis
-
Springer
-
BLAKE-WILSON, S., JOHNSON, D., and MENEZES, A.: 'Key agreement protocols and their security analysis'. Proc. Sixth IMA Int. Conf. Cryptography and Coding, Vol. 1355 of Lecture Notes in Computer Science, 1997, Springer, pp. 30-45
-
(1997)
Proc. Sixth IMA Int. Conf. Cryptography and Coding, Vol. 1355 of Lecture Notes in Computer Science
, vol.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
6
-
-
84968503742
-
Elliptic curve cryptosystems
-
KOBLITZ, N.: 'Elliptic curve cryptosystems', Mathem. Comput., 1987, 48, pp. 203-209
-
(1987)
Mathem. Comput.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
7
-
-
85015402934
-
Use of elliptic curves in cryptography
-
WILLIAMS, H.C. (Ed.): Springer
-
MILLER, V.: 'Use of elliptic curves in cryptography', in WILLIAMS, H.C. (Ed.): 'Advances in cryptology: Proceedings of Crypto '85'. Vol. 218 of Lecture Notes in Computer Science, Springer, 1986, pp. 417-426
-
(1986)
'Advances in Cryptology: Proceedings of Crypto '85'. Vol. 218 of Lecture Notes in Computer Science
, vol.218
, pp. 417-426
-
-
Miller, V.1
-
8
-
-
3743094753
-
-
Public Key Solutions '95, Toronto, Canada, November
-
MENEZES, A., QU, M., and VANSTONE, S.: 'Key agreement and the need for authentication'. Public Key Solutions '95, Toronto, Canada, November 1995
-
(1995)
Key Agreement and the Need for Authentication
-
-
Menezes, A.1
Qu, M.2
Vanstone, S.3
-
9
-
-
84958601057
-
A key recovery attack on discrete log-based schemes using a prime order subgroup
-
KALISKI JR., B.S. (Ed.): Springer
-
LIM, CH., and LEE, P.J.: 'A key recovery attack on discrete log-based schemes using a prime order subgroup', in KALISKI JR., B.S. (Ed.): 'Advances in cryptology - Crypto '97 proceedings'. Vol. 1294 of Lecture Notes in Computer Science, Springer, 1997, pp. 249-263
-
(1997)
'Advances in Cryptology - Crypto '97 Proceedings'. Vol. 1294 of Lecture Notes in Computer Science
, vol.1294
, pp. 249-263
-
-
Lim, C.H.1
Lee, P.J.2
-
10
-
-
0005243827
-
-
Tech. Report CORR 98-05, Dept. of C&O, University of Waterloo, Canada, March 1998 revised August 28, Available
-
LAW, L., MENEZES, A., QU, M., SOLINAS, J., and VANSTONE, S.: 'An efficient protocol for authenticated key agreement'. Tech. Report CORR 98-05, Dept. of C&O, University of Waterloo, Canada, March 1998 (revised August 28, 1998). (Available from http:// www.cacr.math.uwaterloo.ca/)
-
(1998)
An Efficient Protocol for Authenticated Key Agreement
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
|