-
1
-
-
35048881545
-
The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Bellare, M., Palacio, A.: The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 273-289. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 273-289
-
-
Bellare, M.1
Palacio, A.2
-
2
-
-
84873466407
-
Authenticated Key Exchange Secure Against Dictionary Attacks
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure Against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
84945119254
-
Entity Authentication and Key Distribution
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 110-125. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 110-125
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
84949230533
-
Key Agreement Protocols and their Security Analysis
-
Darnell, M, ed, Cryptography and Coding, Springer, Heidelberg
-
Blake-Wilson, S., Johnson, D., Menezes, A.: Key Agreement Protocols and their Security Analysis. In: Darnell, M. (ed.) Cryptography and Coding. LNCS, vol. 1355, pp. 30-45. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
8
-
-
33646779184
-
Errors in Computational Complexity Proofs for Protocols
-
Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
-
Choo, K-K.R., Boyd, C., Hitchcock, Y.: Errors in Computational Complexity Proofs for Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 624-643. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 624-643
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
-
9
-
-
33646805409
-
Examining Indistinguishability- Based Proof Models for Key Establishment Protocols
-
Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
-
Choo, K.-K.R., Boyd, C., Hitchcock, Y.: Examining Indistinguishability- Based Proof Models for Key Establishment Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 585-604. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 585-604
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
-
10
-
-
34548765558
-
A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model. The Computer Journal, Oxford University; also available at Cryptology ePrint Archive
-
Report 2007/188 to appear
-
Choo, K.-K.R.: A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model. The Computer Journal, Oxford University; also available at Cryptology ePrint Archive: Report 2007/188 (to appear, 2007)
-
(2007)
-
-
Choo, K.-K.R.1
-
11
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
12
-
-
33745179557
-
-
Krawczyk, H.: HMQV: A High-Performance Secure Diffie-Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, 3621, pp. 546-566. Springer, Heidelberg (2005)
-
Krawczyk, H.: HMQV: A High-Performance Secure Diffie-Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005)
-
-
-
-
13
-
-
35048878818
-
-
Jeong, I.R., Katz, J., Lee, D.H.: One-Round Protocols for Two-Party Authenticated Key Exchange. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004, LNCS, 3089, Springer, Heidelberg (2004)
-
Jeong, I.R., Katz, J., Lee, D.H.: One-Round Protocols for Two-Party Authenticated Key Exchange. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004, LNCS, vol. 3089, Springer, Heidelberg (2004)
-
-
-
-
14
-
-
33646756559
-
Modular Security Proofs for Key Agreement Protocols
-
Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
-
Kudla, C., Paterson, K.G.: Modular Security Proofs for Key Agreement Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 549-565. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 549-565
-
-
Kudla, C.1
Paterson, K.G.2
-
15
-
-
33745816645
-
-
Lauter, K., Mityagin, A.: Security Analysis of KEA Authenticated Key Exchange. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 378-394. Springer, Heidelberg (2006)
-
Lauter, K., Mityagin, A.: Security Analysis of KEA Authenticated Key Exchange. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 378-394. Springer, Heidelberg (2006)
-
-
-
-
17
-
-
84937389342
-
-
Okamoto, T., Pointcheval, D.: The Gap Problems: A New Class of Problems for the Security of Cryptographic Schemes. In: Kim, K.-c. (ed.) PKC 2001. LNCS, 1992, pp. 104-118. Springer, Heidelberg (2001)
-
Okamoto, T., Pointcheval, D.: The Gap Problems: A New Class of Problems for the Security of Cryptographic Schemes. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 104-118. Springer, Heidelberg (2001)
-
-
-
|