-
1
-
-
0038680685
-
Effient ID-based authenticated key agreement protocol based on the Weil pairing
-
Shim, K.: Effient ID-based authenticated key agreement protocol based on the Weil pairing. Electron. Lett. 39(8), 653-654 (2003)
-
(2003)
Electron. Lett
, vol.39
, Issue.8
, pp. 653-654
-
-
Shim, K.1
-
2
-
-
33645606306
-
Security Analysis of Shim's Authenticated Key agreement Protocols from Pairings. Cryptology ePrint Archive
-
Report 2003/113
-
Sun, H., Hsieh, B.: Security Analysis of Shim's Authenticated Key agreement Protocols from Pairings. Cryptology ePrint Archive, Report 2003/113 (2003), http://eprint.iacr.org/2003/113
-
(2003)
-
-
Sun, H.1
Hsieh, B.2
-
3
-
-
33645590972
-
An Efficient ID-Based Authenticated Key Agreement Protocol
-
Mitrou, N.M, Kontovasilis, K, Rouskas, G.N, Iliadis, I, Merakos, L, eds, NETWORKING 2004, Springer, Heidelberg
-
Ryu, E., Yoon, E., Yoo, K.: An Efficient ID-Based Authenticated Key Agreement Protocol. In: Mitrou, N.M., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds.) NETWORKING 2004. LNCS, vol. 3042. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3042
-
-
Ryu, E.1
Yoon, E.2
Yoo, K.3
-
4
-
-
33646194579
-
-
Boyd, C., Choo, K.: Security of Two-Party Identity-Based Key Agreement. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, 3715, pp. 229-243. Springer, Heidelberg (2005)
-
Boyd, C., Choo, K.: Security of Two-Party Identity-Based Key Agreement. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 229-243. Springer, Heidelberg (2005)
-
-
-
-
5
-
-
38149028202
-
A New Efficient ID-based Authenticated Key Agreement Protocol. Cryptology ePrint Archive
-
Report 2005/309
-
Yuan, Q., Li, S.: A New Efficient ID-based Authenticated Key Agreement Protocol. Cryptology ePrint Archive, Report 2005/309 (2005), http://eprint.iacr.org/2005/309
-
(2005)
-
-
Yuan, Q.1
Li, S.2
-
7
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
0037142442
-
An identity based authenticated key agreement protocol based on the Weil pairing
-
Smart, N.P.: An identity based authenticated key agreement protocol based on the Weil pairing. Electronics Letters 38, 630-632 (2002)
-
(2002)
Electronics Letters
, vol.38
, pp. 630-632
-
-
Smart, N.P.1
-
9
-
-
84946844750
-
A one-round protocol for tripartite Diffie-Hellman
-
Bosma, W, ed, Algorithmic Number Theory, Springer, Heidelberg
-
Joux, A.: A one-round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) Algorithmic Number Theory. LNCS, vol. 1838, pp. 385-394. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1838
, pp. 385-394
-
-
Joux, A.1
-
10
-
-
0007441727
-
Some new key agreement protocols providing mutual implicit authentication
-
Menezes, A., Qu, M., Solinas, J., Vanstone, S.: Some new key agreement protocols providing mutual implicit authentication. In: proceedings of the second workshop on Selected Area in Cryptography, pp. 22-32 (1995)
-
(1995)
proceedings of the second workshop on Selected Area in Cryptography
, pp. 22-32
-
-
Menezes, A.1
Qu, M.2
Solinas, J.3
Vanstone, S.4
-
11
-
-
10444220191
-
Efficient identity-based authenticated key agreement protocol from pairings
-
Choie, Y., Jeong, E., Lee, E.: Efficient identity-based authenticated key agreement protocol from pairings. Applied Mathematics and Computation 162, 179C188 (2005)
-
(2005)
Applied Mathematics and Computation
, vol.162
, Issue.C188
, pp. 179
-
-
Choie, Y.1
Jeong, E.2
Lee, E.3
-
12
-
-
33646826379
-
A New Two-Party Identity-Based Authenticated Key Agreement. Cryptology ePrint Archive
-
Report 2004/122 , In: Proceeding of CT-RSA 2005
-
McCullagh, N., Barreto, P.S.L.M.: A New Two-Party Identity-Based Authenticated Key Agreement. Cryptology ePrint Archive, Report 2004/122 (2004). In: Proceeding of CT-RSA 2005, http://eprint.iacr.org/2004/122
-
(2004)
-
-
McCullagh, N.1
Barreto, P.S.L.M.2
-
13
-
-
84945119254
-
Entity Authentication and Key Distribution
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 110C125. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, Issue.C125
, pp. 110
-
-
Bellare, M.1
Rogaway, P.2
-
14
-
-
0003442756
-
-
Cambridge University Press, Cambridge
-
Blake, I., Seroussi, G., Smart, N.: Elliptic curve in cryptography. Cambridge University Press, Cambridge (1999)
-
(1999)
Elliptic curve in cryptography
-
-
Blake, I.1
Seroussi, G.2
Smart, N.3
-
16
-
-
84949230533
-
Key Agreement Protocols and their Security Analysis
-
Darnell, M, ed, Cryptography and Coding, Springer, Heidelberg
-
Blake-Wilson, S., Johnson, D., Menezes, A.d.: Key Agreement Protocols and their Security Analysis. In: Darnell, M. (ed.) Cryptography and Coding. LNCS, vol. 1355, pp. 30C45. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1355
, Issue.C45
, pp. 30
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.D.3
-
17
-
-
10444246846
-
Identity based authenticated key agreement protocols from pairings. Cryptology ePrint Archive
-
Report 2002/184 , available at
-
Chen, L., Kudla, C.: Identity based authenticated key agreement protocols from pairings. Cryptology ePrint Archive, Report 2002/184 (2002), available at http://eprint.iacr.org/2002/184/
-
(2002)
-
-
Chen, L.1
Kudla, C.2
-
18
-
-
0032069870
-
Key control in key agreement protocols
-
Mitchell, C., Ward, M., Wilson, P.: Key control in key agreement protocols. Electronics Letters 34(10), 980-981 (1998)
-
(1998)
Electronics Letters
, vol.34
, Issue.10
, pp. 980-981
-
-
Mitchell, C.1
Ward, M.2
Wilson, P.3
|