-
1
-
-
4944234339
-
The Unified Model
-
contribution to ANSI X9F1 Oct
-
R. Ankney, D. Johnson, and M. Matyas, "The Unified Model," contribution to ANSI X9F1 Oct. 1995.
-
(1995)
-
-
Ankney, R.1
Johnson, D.2
Matyas, M.3
-
2
-
-
35048860626
-
Analysis of key exchange protocols and their use for building secure channels
-
Proc. Eurocrypt'01
-
R. Canetti and H. Krawczyk, "Analysis of key exchange protocols and their use for building secure channels," in Proc. Eurocrypt'01, LNCS 2045, pp. 453-474, 2001.
-
(2001)
LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
3
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644-654, 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
5
-
-
33745179557
-
HMQV: A high performance secure Diffie-Hellman protocol
-
Proc. Crypto'05
-
H. Krawczyk, "HMQV: A high performance secure Diffie-Hellman protocol," in Proc. Crypto'05, LNCS 3621, pp. 546-566, 2005.
-
(2005)
LNCS
, vol.3621
, pp. 546-566
-
-
Krawczyk, H.1
-
7
-
-
38149012093
-
Stronger security of authenticated key exchange
-
Proc. ProvSec'07
-
B. LaMacchia, K. Lauter, and A. Mityagin, "Stronger security of authenticated key exchange," in Proc. ProvSec'07, LNCS 4784, pp. 1-16, 2007.
-
(2007)
LNCS
, vol.4784
, pp. 1-16
-
-
LaMacchia, B.1
Lauter, K.2
Mityagin, A.3
-
8
-
-
74549221711
-
An efficient protocol for authenticated key agreement
-
L. Law, A. Menezes, M. Qu, J. Solinas, and S. A. Vanstone, "An efficient protocol for authenticated key agreement," Des. Codes Cryptography, vol. 28, no. 2, pp. 119-134, 2003.
-
(2003)
Des. Codes Cryptography
, vol.28
, Issue.2
, pp. 119-134
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.A.5
-
9
-
-
0022660635
-
On seeking smart public-key distribution systems
-
T. Matsumoto, Y. Takashima, and H. Imai, "On seeking smart public-key distribution systems," Trans. IEICE Jpn., vol. E69-E, no. 2, pp. 99-106, 1986.
-
(1986)
Trans. IEICE Jpn
, vol.E69-E
, Issue.2
, pp. 99-106
-
-
Matsumoto, T.1
Takashima, Y.2
Imai, H.3
-
10
-
-
33644499446
-
Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves
-
M. A. Strangio, "Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves," in Proc. 20th ACM Symposium on Applied Computing (SAC), pp. 324-331, 2005.
-
(2005)
Proc. 20th ACM Symposium on Applied Computing (SAC)
, pp. 324-331
-
-
Strangio, M.A.1
-
11
-
-
84947720258
-
Two-pass authenticated key agreement protocol with key confirmation
-
Proc. Indocrypt'00
-
B. Song and K. Kim, "Two-pass authenticated key agreement protocol with key confirmation," in Proc. Indocrypt'00, LNCS 1977, pp. 237-249, 2000.
-
(1977)
LNCS
, pp. 237-249
-
-
Song, B.1
Kim, K.2
-
12
-
-
40749145773
-
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
-
Cryptology ePrint Archive, Report 2007/123
-
B. Ustaoglu, "Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS," Cryptology ePrint Archive, Report 2007/123, 2007.
-
(2007)
-
-
Ustaoglu, B.1
|