-
1
-
-
0032218234
-
-
Ateniese, G., Steiner, M., Tsudik, G.: Authenticated Group Key Agreement and Friends. ACMCCS, 17-26 (1998)
-
Ateniese, G., Steiner, M., Tsudik, G.: Authenticated Group Key Agreement and Friends. ACMCCS, 17-26 (1998)
-
-
-
-
2
-
-
84945119254
-
Entity Authentication and Key Distribution
-
Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: CRYPTO, pp. 232-249 (1993)
-
(1993)
CRYPTO
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
0001940580
-
Provably Secure Session Key Distribution: The Three Party Case
-
Bellare, M., Rogaway, P.: Provably Secure Session Key Distribution: The Three Party Case. STOC, 57-66 (1995)
-
(1995)
STOC
, vol.57-66
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
35048875249
-
-
Bresson, E., Catalano, D.: Constant Round Authenticated Group Key Agreement via Distributed Computation. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, 2947, pp. 115-129. Springer, Heidelberg (2004)
-
Bresson, E., Catalano, D.: Constant Round Authenticated Group Key Agreement via Distributed Computation. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 115-129. Springer, Heidelberg (2004)
-
-
-
-
7
-
-
50849092893
-
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
-
Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
-
Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 321-336. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 321-336
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
8
-
-
0035751060
-
Provably Authenticated Group Diffie-Hellman Key Exchange
-
Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.J.: Provably Authenticated Group Diffie-Hellman Key Exchange. ACM CCS, 255-264 (2001)
-
(2001)
ACM CCS
, pp. 255-264
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
Quisquater, J.J.4
-
10
-
-
85013976350
-
On the Risk of Opening Distributed Keys
-
Burmester, M.: On the Risk of Opening Distributed Keys. In: CRYPTO, pp. 308-317 (1994)
-
(1994)
CRYPTO
, pp. 308-317
-
-
Burmester, M.1
-
12
-
-
33646805409
-
Examining Indistinguishability- Based Proof Models for Key Establishment Protocols
-
Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
-
Choo, K.K.R., Boyd, C., Hitchcock, Y.: Examining Indistinguishability- Based Proof Models for Key Establishment Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 585-604. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 585-604
-
-
Choo, K.K.R.1
Boyd, C.2
Hitchcock, Y.3
-
13
-
-
0017018484
-
New Directions in Cryptography
-
Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE IT 22(6), 644-654 (1976)
-
(1976)
IEEE IT
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
14
-
-
1542593353
-
-
Diffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and Authenticated Key Exchanges. DCC 2(2), 107-125 (1992)
-
Diffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and Authenticated Key Exchanges. DCC 2(2), 107-125 (1992)
-
-
-
-
16
-
-
0023985465
-
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
-
Goldwasser, S., Micali, S., Rivest, R.L.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM Journal of Computing 17(2), 281-308 (1988)
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
17
-
-
84969368443
-
-
Günther, C.G.: An Identity-Based Key-Exchange Protocol. In: EUROCRYPT, pp. 29-37 (1989)
-
Günther, C.G.: An Identity-Based Key-Exchange Protocol. In: EUROCRYPT, pp. 29-37 (1989)
-
-
-
-
18
-
-
33745766832
-
Modeling Insider Attacks on Group Key-Exchange Protocols
-
Katz, J., Shin, J.S.: Modeling Insider Attacks on Group Key-Exchange Protocols. ACM CCS, 180-189 (2005)
-
(2005)
ACM CCS
, pp. 180-189
-
-
Katz, J.1
Shin, J.S.2
-
19
-
-
35248878854
-
Scalable Protocols for Authenticated Group Key Exchange
-
Katz, J., Yung, M.: Scalable Protocols for Authenticated Group Key Exchange. In: CRYPTO, pp. 110-125 (2003)
-
(2003)
CRYPTO
, pp. 110-125
-
-
Katz, J.1
Yung, M.2
-
20
-
-
0034449805
-
Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups
-
Kim, Y., Perrig, A., Tsudik, G.: Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups. ACM CCS, 235-244 (2000)
-
(2000)
ACM CCS
, pp. 235-244
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
21
-
-
33745179557
-
-
Krawczyk, H.: HMQV: A High-Performance Secure Diffie-Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, 3621, pp. 546-566. Springer, Heidelberg (2005)
-
Krawczyk, H.: HMQV: A High-Performance Secure Diffie-Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005)
-
-
-
-
22
-
-
67849088015
-
Survey on Security Requirements and Models for Group Key Exchange. Technical Report
-
Manulis, M.: Survey on Security Requirements and Models for Group Key Exchange. Technical Report, http://eprint.iacr.org/2006/388
-
-
-
Manulis, M.1
-
23
-
-
68849114797
-
Security-Focused Survey on Group Key Exchange Protocols. Technical Report
-
Manulis, M.: Security-Focused Survey on Group Key Exchange Protocols. Technical Report. http://eprint.iacr.org/2006/395
-
-
-
Manulis, M.1
-
24
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A., van Oorschot, P.C., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.1
van Oorschot, P.C.2
Vanstone, S.3
-
25
-
-
0032069870
-
Key Control in Key Agreement Protocols
-
Mitchell, C.J., Ward, M., Wilson, P.: Key Control in Key Agreement Protocols. El. Letters 34(10), 980-981 (1998)
-
(1998)
El. Letters
, vol.34
, Issue.10
, pp. 980-981
-
-
Mitchell, C.J.1
Ward, M.2
Wilson, P.3
-
26
-
-
0004023090
-
On Formal Models for Secure Key Exchange (Version 4)
-
Technical Report
-
Shoup, V.: On Formal Models for Secure Key Exchange (Version 4). Technical Report. http://shoup.net/
-
-
-
Shoup, V.1
-
28
-
-
85032878997
-
On Key Distribution Systems
-
Yacobi, Y., Shmuely, Z.: On Key Distribution Systems. In: CRYPTO, pp. 344-355 (1989)
-
(1989)
CRYPTO
, pp. 344-355
-
-
Yacobi, Y.1
Shmuely, Z.2
|