-
1
-
-
84957629783
-
Relations Among Notions of Security for Public-Key Encryption Schemes
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations Among Notions of Security for Public-Key Encryption Schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26-45. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
2
-
-
84873466407
-
Authenticated Key Exchange Secure against Dictionary Attacks
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
84945119254
-
Entity Authentication and Key Distribution
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232 249. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
0001940580
-
Provably secure session key distribution: The three party case
-
Las Vegas, Nevada, U.S.A, pp, ACM press, New York
-
Bellare, M., Rogaway, P.: Provably secure session key distribution: the three party case. In: STOC 1995: Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, Las Vegas, Nevada, U.S.A, pp. 57-66. ACM press, New York (1995)
-
(1995)
STOC 1995: Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
84957059629
-
Non-malleable encryption: Equivalence between two notions, and an indistinguishability-based characterization
-
Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
-
Bellare, M., Sahai, A.: Non-malleable encryption: Equivalence between two notions, and an indistinguishability-based characterization. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 519-536. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 519-536
-
-
Bellare, M.1
Sahai, A.2
-
7
-
-
0038784597
-
Non-interactive and reusable non-malleable commitment schemes
-
San Diego, California, U.S.A, pp, ACM Press, New York
-
Damgård, I., Groth, J.: Non-interactive and reusable non-malleable commitment schemes. In: STOC 2003: Proceedings of the Thirty-Fifth Annual ACM Symposium on Theory of Computing, San Diego, California, U.S.A., pp. 426-437. ACM Press, New York (2003)
-
(2003)
STOC 2003: Proceedings of the Thirty-Fifth Annual ACM Symposium on Theory of Computing
, pp. 426-437
-
-
Damgård, I.1
Groth, J.2
-
8
-
-
84948991087
-
-
Desmedt, Y., Burmester, M.: A secure and efficient conference key distribution system (extended abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, 950, pp. 275-286. Springer, Heidelberg (1995)
-
Desmedt, Y., Burmester, M.: A secure and efficient conference key distribution system (extended abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275-286. Springer, Heidelberg (1995)
-
-
-
-
9
-
-
0031642212
-
Non-interactive and non-malleable commitment
-
Dallas, Texas, USA, pp, ACM Press, New York
-
Di Crescenzo, G., Ishai, Y., Ostrovsky, R.: Non-interactive and non-malleable commitment. In: STOC 1998: Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, Dallas, Texas, USA, pp. 141-150. ACM Press, New York (1998)
-
(1998)
STOC 1998: Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing
, pp. 141-150
-
-
Di Crescenzo, G.1
Ishai, Y.2
Ostrovsky, R.3
-
11
-
-
85028450627
-
Non-malleable cryptography (extended abstract)
-
New Orleans, Louisiana, U.S.A, pp, ACM Press, New York
-
Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography (extended abstract). In: STOC 1991: Proceedings of the Twenty Third Annual ACM Symposium on Theory of Computing, New Orleans, Louisiana, U.S.A., pp. 542-552. ACM Press, New York (1991)
-
(1991)
STOC 1991: Proceedings of the Twenty Third Annual ACM Symposium on Theory of Computing
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
12
-
-
84983134965
-
Efficient non-malleable commitment schemes
-
Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
-
Fischlin, M., Fischlin, R.: Efficient non-malleable commitment schemes. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 413-431. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 413-431
-
-
Fischlin, M.1
Fischlin, R.2
-
13
-
-
84955559079
-
-
Just, M., Vaudenay, S.: Authenticated Multi-Party Key Agreement. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, 1163, pp. 36-49. Springer, Heidelberg (1996)
-
Just, M., Vaudenay, S.: Authenticated Multi-Party Key Agreement. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 36-49. Springer, Heidelberg (1996)
-
-
-
-
14
-
-
84885941616
-
-
Laur, S., Nyberg, K.: Efficient Mutual Data Authentication Using Manually Authenticated Strings. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, 4301, pp. 90-107. Springer, Heidelberg (2006)
-
Laur, S., Nyberg, K.: Efficient Mutual Data Authentication Using Manually Authenticated Strings. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol. 4301, pp. 90-107. Springer, Heidelberg (2006)
-
-
-
-
15
-
-
84943400746
-
General composition and universal composability in secure multi-party computation, In: FOCS
-
Los Alamitos
-
Lindell, Y.: General composition and universal composability in secure multi-party computation, In: FOCS 2003, pp. 394-403. IEEE Computer Society, Los Alamitos (2003)
-
(2003)
394-403. IEEE Computer Society
, pp. 2003
-
-
Lindell, Y.1
-
16
-
-
35048882590
-
On Simulation-Sound Trapdoor Commitments
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
MacKenzie, P., Yang, K.: On Simulation-Sound Trapdoor Commitments. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004, LNCS, vol. 3027, pp. 382-400. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 382-400
-
-
MacKenzie, P.1
Yang, K.2
-
17
-
-
33745637238
-
-
Pasini, S., Vaudenay, S.: An Optimal Non-interactive Message Authentication Protocol. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, 3860, pp. 280-294. Springer, Heidelberg (2006)
-
Pasini, S., Vaudenay, S.: An Optimal Non-interactive Message Authentication Protocol. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 280-294. Springer, Heidelberg (2006)
-
-
-
-
18
-
-
33745832230
-
-
Pasini, S., Vaudenay, S.: SAS-based Authenticated Key Agreement. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 395-409. Springer, Heidelberg (2006)
-
Pasini, S., Vaudenay, S.: SAS-based Authenticated Key Agreement. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 395-409. Springer, Heidelberg (2006)
-
-
-
-
19
-
-
84876402257
-
-
Valkonen, J., Asokan, N., Nyberg, K.: Ad hoc security association for groups. In: Buttyán, L., GIigor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, 4357, pp. 150-164. Springer, Heidelberg (2006)
-
Valkonen, J., Asokan, N., Nyberg, K.: Ad hoc security association for groups. In: Buttyán, L., GIigor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, pp. 150-164. Springer, Heidelberg (2006)
-
-
-
-
20
-
-
33744911390
-
-
Vaudenay, S.: On Bluetooth repairing: Key agreement based on symmetric-key cryptography. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, 3822, pp. 1-9. Springer, Heidelberg (2005)
-
Vaudenay, S.: On Bluetooth repairing: Key agreement based on symmetric-key cryptography. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 1-9. Springer, Heidelberg (2005)
-
-
-
-
21
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 309-326. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 309-326
-
-
Vaudenay, S.1
|