-
1
-
-
33646809001
-
A Simple Threshold Authenticated key Exchange from. Short Secrets
-
Springer, Heidelberg
-
Abdalla, M., Chevassut, O., Fouque, P., Pointcheval, D.: A Simple Threshold Authenticated key Exchange from. Short Secrets. In: Advances in Cryptology - Asiacrypt 2005, pp. 566-584. Springer, Heidelberg (2005)
-
(2005)
Advances in Cryptology - Asiacrypt
, pp. 566-584
-
-
Abdalla, M.1
Chevassut, O.2
Fouque, P.3
Pointcheval, D.4
-
2
-
-
85083027758
-
Reconciling Two Views of Cryptography (The Computaiotnal Soundness of Formal Encryption)
-
Abadi, M., Rogaway, P.: Reconciling Two Views of Cryptography (The Computaiotnal Soundness of Formal Encryption). Journal of Cryptology 15(2), 103-127 (2002)
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
3
-
-
85006614284
-
Verifying Security Protocols as Planning in Logic Programming
-
Aiello, L.C., Massacci, F: Verifying Security Protocols as Planning in Logic Programming. ACM Transactions on Computational Logic 2(4), 542-580 (2001)
-
(2001)
ACM Transactions on Computational Logic
, vol.2
, Issue.4
, pp. 542-580
-
-
Aiello, L.C.1
Massacci, F.2
-
4
-
-
35248899328
-
Cryptographically Sound and Machine-Assisted Verification of Security Protocols
-
Alt, H, Habib, M, eds, STACS 2003, Springer, Heidelberg
-
Backes, M., Jacobi, C.: Cryptographically Sound and Machine-Assisted Verification of Security Protocols. In: Alt, H., Habib, M. (eds.) STACS 2003. LNCS, vol. 2607, pp. 310-329. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2607
, pp. 310-329
-
-
Backes, M.1
Jacobi, C.2
-
5
-
-
44649159428
-
-
Baral, C, Knowledge Representation, Reasoning and Declarative Problem Solving. Cambridge University Press, Cambridge
-
Baral, C.: Knowledge Representation, Reasoning and Declarative Problem Solving. Cambridge University Press, Cambridge
-
-
-
-
6
-
-
35248878662
-
-
Boyd, C., González Nieto, J.M.: Round-optimal Contributory Conference Key Agreement. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, 2567, pp. 161-174. Springer, Heidelberg (2002)
-
Boyd, C., González Nieto, J.M.: Round-optimal Contributory Conference Key Agreement. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 161-174. Springer, Heidelberg (2002)
-
-
-
-
7
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
8
-
-
33845638668
-
Refuting Security Proofs for Tipartite Key Exchange with Model Checker in Planning Problem Setting
-
Choo, K.R.: Refuting Security Proofs for Tipartite Key Exchange with Model Checker in Planning Problem Setting. In: The 19th IEEE Computer Security Foundations Workshop CSFW 2006, pp. 297-308 (2006)
-
(2006)
The 19th IEEE Computer Security Foundations Workshop
, vol.CSFW 2006
, pp. 297-308
-
-
Choo, K.R.1
-
9
-
-
35048878818
-
-
Jeong, I.R., Katz, J., Lee, D.H.: One-Round Protocols for Two-Party Authenticated Key Exchange. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, 3089, pp. 220-232. Springer, Heidelberg (2004)
-
Jeong, I.R., Katz, J., Lee, D.H.: One-Round Protocols for Two-Party Authenticated Key Exchange. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 220-232. Springer, Heidelberg (2004)
-
-
-
-
12
-
-
0031643297
-
The Inductive Approach to Verifying Cryptographic Protocols
-
Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security 6, 85-128 (1998)
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
13
-
-
0002219322
-
An Attack on a Recursive Authentication Protocol: A Cautionary Tale
-
Ryan, P., Schneider, S.: An Attack on a Recursive Authentication Protocol: A Cautionary Tale. Information Processing Letters 65(15), 7-16 (1998)
-
(1998)
Information Processing Letters
, vol.65
, Issue.15
, pp. 7-16
-
-
Ryan, P.1
Schneider, S.2
|