-
1
-
-
0032218234
-
Authenticated group key agreement and friends
-
G. Ateniese, M. Steiner, and G. Tsudik. Authenticated group key agreement and friends. In ACM CCS ’98, pp. 17–26. 1998.
-
(1998)
ACM CCS ’98
, pp. 17-26
-
-
Ateniese, G.1
Steiner, M.2
Tsudik, G.3
-
2
-
-
35048891868
-
Keying hash functions for message authentication
-
LNCS 1109, Springer
-
M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Proc. of Crypto ’96, LNCS 1109, pp. 1–15. Springer, 1996.
-
(1996)
Proc of Crypto ’96
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
3
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
LNCS 1807, Springer
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In Proc. of Eurocrypt ’00, LNCS 1807, pp. 139–155. Springer, 2000.
-
(2000)
Proc of Eurocrypt ’00
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
4
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway. Random oracles are practical: a paradigm for designing efficient protocols. In ACM CCS ’93, pp. 62–73. 1993.
-
(1993)
ACM CCS ’93
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0000539625
-
A review experience with reliable multicast
-
K. P. Birman. A review experience with reliable multicast. Software – Practice and Experience, 29(9):741–774, 1999.
-
(1999)
Software – Practice and Experience
, vol.29
, Issue.9
, pp. 741-774
-
-
Birman, K.P.1
-
6
-
-
84947778144
-
The decision Diffie-Hellman problem
-
LNCS 1423, Springer
-
D. Boneh. The decision Diffie-Hellman problem. In Proc. of ANTS III, LNCS 1423, pp. 48–63. Springer, 1998.
-
(1998)
Proc of ANTS III
, pp. 48-63
-
-
Boneh, D.1
-
8
-
-
50849127145
-
Provably authenticated group Diffie-Hellman key exchange – the dynamic case
-
LNCS 2248, Springer
-
E. Bresson, O. Chevassut, and D. Pointcheval. Provably authenticated group Diffie-Hellman key exchange – the dynamic case. In Proc. of Asiacrypt ’01, LNCS 2248, pp. 290–309. Springer, 2001.
-
(2001)
Proc of Asiacrypt ’01
, pp. 290-309
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
9
-
-
50849092893
-
Dynamic group Diffie-Hellman key exchange under standard assumptions
-
LNCS. Springer, Full version of this paper available at
-
E. Bresson, O. Chevassut, and D. Pointcheval. Dynamic group Diffie-Hellman key exchange under standard assumptions. In Proc. of Eurocrypt ’02, LNCS. Springer, 2002. Full version of this paper available at http://www.di.ens.fr/∼pointche.
-
(2002)
Proc of Eurocrypt ’02
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
10
-
-
84948991087
-
A secure and efficient conference key distribution system
-
LNCS 950, Springer
-
M. Burmester and Y. G. Desmedt. A secure and efficient conference key distribution system. In Proc. of Eurocrypt ’94, LNCS 950, pp. 275–286. Springer, 1995.
-
(1995)
Proc of Eurocrypt ’94
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.G.2
-
11
-
-
0001776520
-
Group communication specifications: A comprehensive study
-
G. V. Chockler, I. Keidar, and R. Vitenberg. Group communication specifications: A comprehensive study. ACM Computing Surveys, 33(4):1–43, 2001.
-
(2001)
ACM Computing Surveys
, vol.33
, Issue.4
, pp. 1-43
-
-
Chockler, G.V.1
Keidar, I.2
Vitenberg, R.3
-
12
-
-
84957086893
-
How to forget a secret
-
LNCS 1563, Springer
-
G. Di Crescenzo, N. Ferguson, R. Impagliazzo, and M. Jakobsson. How to forget a secret. In Proc. of STACS ’99, LNCS 1563, pp. 500–509. Springer, 1999.
-
(1999)
Proc of STACS ’99
, pp. 500-509
-
-
Di Crescenzo, G.1
Ferguson, N.2
Impagliazzo, R.3
Jakobsson, M.4
-
14
-
-
84978523717
-
A secure audio teleconference system
-
LNCS 403, Springer
-
W. Diffie, D. Steer, L. Strawczynski, and M. Wiener. A secure audio teleconference system. In Proc. of Crypto ’88, LNCS 403, pp. 520–528. Springer, 1988.
-
(1988)
Proc of Crypto ’88
, pp. 520-528
-
-
Diffie, W.1
Steer, D.2
Strawczynski, L.3
Wiener, M.4
-
15
-
-
1542593353
-
Authentication and authenticated key exchange
-
W. Diffie, P. van Oorschot, and W. Wiener. Authentication and authenticated key exchange. In Designs, Codes and Cryptography, vol. 2(2), pp. 107–125, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.2
Wiener, W.3
-
16
-
-
84969368443
-
An identity-based key exchange protocol
-
LNCS 434, Springer
-
C. G. Gunter. An identity-based key exchange protocol. In Proc. of Eurocrypt ’89, LNCS 434, pp. 29–37. Springer, 1989.
-
(1989)
Proc of Eurocrypt ’89
, pp. 29-37
-
-
Gunter, C.G.1
-
17
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
J. Håstad, R. Impagliazzo, L. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM Journal of Computing, 28(4):1364–1396, 1999.
-
(1999)
SIAM Journal of Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
18
-
-
0030709604
-
On the importance of securing your bins: The garbage-man-in-the-middle attack
-
M. Joye and J.-J. Quisquater. On the importance of securing your bins: The garbage-man-in-the-middle attack. In ACM CCS’97, pp. 135–141. 1997.
-
(1997)
ACM CCS’97
, pp. 135-141
-
-
Joye, M.1
Quisquater, J.-J.2
-
19
-
-
84955559079
-
Authenticated multi-party key agreement
-
LNCS 1163, Springer
-
M. Just and S. Vaudenay. Authenticated multi-party key agreement. In Proc. Of Asiacrypt ’96, LNCS 1163, pp. 36–49. Springer, 1996.
-
(1996)
Proc of Asiacrypt ’96
, pp. 36-49
-
-
Just, M.1
Vaudenay, S.2
-
20
-
-
0031332843
-
Number-theoretic constructions of efficient pseudorandom functions
-
IEEE
-
M. Naor and O. Reingold. Number-theoretic constructions of efficient pseudorandom functions. In FOCS ’97, pp. 458–467. IEEE, 1997.
-
(1997)
FOCS ’97
, pp. 458-467
-
-
Naor, M.1
Reingold, O.2
-
21
-
-
0003584029
-
-
NIST. FIPS 140-1, U. S. N ational Institute of Standards and Technology
-
NIST. FIPS 140-1: Security Requirements for Cryptographic Modules. U. S. N ational Institute of Standards and Technology, 1994.
-
(1994)
Security Requirements for Cryptographic Modules
-
-
-
22
-
-
84958045366
-
Using a high-performance, programmable secure coprocessor
-
LNCS 1465, Springer
-
E. R. Palmer, S. W. Smith, and S. Weingart. Using a high-performance, programmable secure coprocessor. In Financial Crypto ’98, LNCS 1465, pp. 73–89. Springer, 1998.
-
(1998)
Financial Crypto ’98
, pp. 73-89
-
-
Palmer, E.R.1
Smith, S.W.2
Weingart, S.3
-
23
-
-
84947904235
-
Session-key disribution using smart cards
-
LNCS 1070, Springer
-
A. Rubin and V. Shoup. Session-key disribution using smart cards. In Proc. Of Eurocrypt ’96, LNCS 1070, pp. 321–331. Springer, 1996.
-
(1996)
Proc of Eurocrypt ’96
, pp. 321-331
-
-
Rubin, A.1
Shoup, V.2
-
25
-
-
84880904783
-
OAEP reconsidered
-
J. Kilian, editor, Springer-Verlag
-
V. Shoup. OAEP reconsidered. In J. Kilian, editor, Proc. of Cryto’ 01, volume 2139 of LNCS, pages 239–259. Springer-Verlag, 2001.
-
(2001)
Proc of Cryto’ 01, Volume 2139 of LNCS
, pp. 239-259
-
-
Shoup, V.1
-
26
-
-
0029720059
-
Diffie-Hellman key distribution extended to group communication
-
M. Steiner, G. Tsudik, and M. Waidner. Diffie-Hellman key distribution extended to group communication. In ACM CCS ’96, pp. 31–37. 1996.
-
(1996)
ACM CCS ’96
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
27
-
-
84957807365
-
A practical and secure fault-tolerant conference-key agreement protocol
-
LNCS 1751, Springer
-
W. G. Tzeng. A practical and secure fault-tolerant conference-key agreement protocol. In Proc. of PKC ’00, LNCS 1751, pp. 1–13. Springer, 2000.
-
(2000)
Proc of PKC ’00
, pp. 1-13
-
-
Tzeng, W.G.1
-
29
-
-
68549104046
-
Physical security devices for computer subsystems: A survey of attacks and defenses
-
LNCS 1965, Springer
-
S. H. Weingart. Physical security devices for computer subsystems: A survey of attacks and defenses. In Proc. of CHES ’00, LNCS 1965, pp. 302–317. Springer, 2000.
-
(2000)
Proc of CHES ’00
, pp. 302-317
-
-
Weingart, S.H.1
|