-
2
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
LNCS 1807
-
Bellare, M., Pointcheval, D. and Rogaway, P. (2000) ‘Authenticated key exchange secure against dictionary attacks’, Proceedings of Advances in Cryptology – Eurocrypt 2000, LNCS 1807, pp.139–155.
-
(2000)
Proceedings of Advances in Cryptology – Eurocrypt 2000
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
84949230533
-
Key agreement protocols and their security analysis
-
LNCS 1355
-
Blake-Wilson, S., Johnson, D. and Menezes, A. (1997) ‘Key agreement protocols and their security analysis’, Proceedings of the Sixth IMA International Conference on Cryptography and Coding, LNCS 1355, pp.30–45.
-
(1997)
Proceedings of the Sixth IMA International Conference on Cryptography and Coding
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
5
-
-
35048841300
-
Efficient selective-ID secure identity based encryption without random oracles
-
LNCS 3027
-
Boneh, D. and Boyen, X. (2004a) ‘Efficient selective-ID secure identity based encryption without random oracles’, Proceedings of Advances in Cryptology – Eurocrypt’2004, LNCS 3027, pp.223–238.
-
(2004)
Proceedings of Advances in Cryptology – Eurocrypt’2004
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
8
-
-
33645751214
-
Security proof of the Sakai-Kasahara’s identity-based encryption scheme
-
LNCS 3706
-
Chen, L. and Cheng, Z. (2005) ‘Security proof of the Sakai-Kasahara’s identity-based encryption scheme’, Proceedings of Cryptography and Coding 2005, LNCS 3706, pp.442–459.
-
(2005)
Proceedings of Cryptography and Coding 2005
, pp. 442-459
-
-
Chen, L.1
Cheng, Z.2
-
9
-
-
33645735382
-
An efficient ID-KEM based on the Sakai-Kasahara key construction
-
Chen, L., Cheng, Z., Malone-Lee, J. and Smart, N. (2006a) ‘An efficient ID-KEM based on the Sakai-Kasahara key construction’, IEE Proceedings of Information Security, Vol. 153, pp.19–26.
-
(2006)
IEE Proceedings of Information Security
, vol.153
, pp. 19-26
-
-
Chen, L.1
Cheng, Z.2
Malone-Lee, J.3
Smart, N.4
-
11
-
-
38149061118
-
On the indistinguishability-based security model of key agreement protocols-simple cases
-
The full paper available on Cryptology ePrint Archive, Report 2005/129
-
Cheng, Z., Nistazakis, M., Comley, R. and Vasiu, L. (2004) ‘On the indistinguishability-based security model of key agreement protocols-simple cases’, Proceedings of ACNS 2004 (technical track), The full paper available on Cryptology ePrint Archive, Report 2005/129.
-
(2004)
Proceedings of ACNS 2004 (technical track)
-
-
Cheng, Z.1
Nistazakis, M.2
Comley, R.3
Vasiu, L.4
-
13
-
-
33745619805
-
Identity-based key agreement with unilateral identity privacy using pairings
-
LNCS 3903
-
Cheng, Z., Chen, L., Comley, R. and Tang, Q. (2006) ‘Identity-based key agreement with unilateral identity privacy using pairings’, Proceedings of Information Security Practice and Experience 2006, LNCS 3903, pp.202–213.
-
(2006)
Proceedings of Information Security Practice and Experience 2006
, pp. 202-213
-
-
Cheng, Z.1
Chen, L.2
Comley, R.3
Tang, Q.4
-
15
-
-
33646180371
-
On session key construction in provably-secure key establishment protocols: revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-based protocols
-
LNCS 3715
-
Choo, K-K.R., Boyd, C. and Hitchcock, Y. (2005) ‘On session key construction in provably-secure key establishment protocols: revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-based protocols’, Proceedings of Mycrypt 2005, LNCS 3715, pp.116–131.
-
(2005)
Proceedings of Mycrypt 2005
, pp. 116-131
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
-
17
-
-
84952969042
-
-
Cryptology ePrint Archive, Report 2005/300
-
Li, S., Yuan, Q. and Li, J. (2005) ‘Towards security two-party authenticated key agreement protocols’, Cryptology ePrint Archive, Report 2005/300.
-
(2005)
Towards security two-party authenticated key agreement protocols
-
-
Li, S.1
Yuan, Q.2
Li, J.3
-
19
-
-
24144458508
-
A new two-party identity-based authenticated key agreement
-
LNCS 3376
-
McCullagh, N. and Barreto, P.S.L.M. (2005) ‘A new two-party identity-based authenticated key agreement’, Proceedings of CT-RSA 2005, LNCS 3376, pp.262–274.
-
(2005)
Proceedings of CT-RSA 2005
, pp. 262-274
-
-
McCullagh, N.1
Barreto, P.S.L.M.2
-
21
-
-
0036475666
-
A new traitor tracing
-
Mitsunari, S., Sakai, R. and Kasahara, M. (2002) ‘A new traitor tracing’, IEICE Transactions Fundamentals, Vol. E85-A, No. 2, pp.481–484.
-
(2002)
IEICE Transactions Fundamentals
, vol.E85-A
, Issue.2
, pp. 481-484
-
-
Mitsunari, S.1
Sakai, R.2
Kasahara, M.3
-
22
-
-
0022811943
-
Proposal for identity-based key distribution system
-
Okamoto, E. (1986) ‘Proposal for identity-based key distribution system’, Electronics Letters, Vol. 22, pp.1283–1284.
-
(1986)
Electronics Letters
, vol.22
, pp. 1283-1284
-
-
Okamoto, E.1
-
23
-
-
2642549675
-
Cryptosystems based on pairing
-
Okinawa, Japan
-
Sakai, R., Ohgishi, K. and Kasahara, M. (2000) ‘Cryptosystems based on pairing’, Proceedings of 2000 Symposium on Cryptography and Information Security, Okinawa, Japan.
-
(2000)
Proceedings of 2000 Symposium on Cryptography and Information Security
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
27
-
-
0037142442
-
An identity based authenticated key agreement protocol based on the weil pairing
-
Smart, N. P. (2002) ‘An identity based authenticated key agreement protocol based on the weil pairing’, Electronics Letters, Vol. 38, pp.630–632.
-
(2002)
Electronics Letters
, vol.38
, pp. 630-632
-
-
Smart, N.P.1
-
29
-
-
34347390578
-
Key distribution system for mail systems using ID-related information directory
-
Tanaka, K. and Okamoto, E. (1991) ‘Key distribution system for mail systems using ID-related information directory’, Computers and Security, Vol. 10, pp.25–33.
-
(1991)
Computers and Security
, vol.10
, pp. 25-33
-
-
Tanaka, K.1
Okamoto, E.2
-
33
-
-
35048854587
-
An efficient signature scheme from bilinear pairings and its applications
-
LNCS 2947
-
Zhang, F., Safavi-Naini, R. and Susilo, W. (2004) ‘An efficient signature scheme from bilinear pairings and its applications’, Proceedings of International Workshop on Practice and Theory in PublicKey Cryptography-PKC2004, LNCS 2947, pp.277–290.
-
(2004)
Proceedings of International Workshop on Practice and Theory in PublicKey Cryptography-PKC2004
, pp. 277-290
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
|