-
1
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key exchange protocols
-
Full version at
-
Mihir Bellare, Ran Canetti, and Hugo Krawczyk. A modular approach to the design and analysis of authentication and key exchange protocols. In Proceedings of the 30th Annual Symposium on the Theory of Computing, ACM, pages 412-428, 1998. Full version at http://www-cse.ucsd.edu/users/mihir/ papers/modular.pdf.
-
(1998)
Proceedings of the 30th Annual Symposium on the Theory of Computing, ACM
, pp. 412-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
3
-
-
84945119254
-
-
Mihir Bellare and Phillip Rogaway. Entity authentication and key distribution. In Advances in Cryptology - Crypto 1993, 773 of LNCS, pages 232-249. Springer-Verlag, 1994. Full version at http://www-cse.ucsd.edu/users/mihir/papers/eakd.pdf.
-
Mihir Bellare and Phillip Rogaway. Entity authentication and key distribution. In Advances in Cryptology - Crypto 1993, volume 773 of LNCS, pages 232-249. Springer-Verlag, 1994. Full version at http://www-cse.ucsd.edu/users/mihir/papers/eakd.pdf.
-
-
-
-
5
-
-
84956866842
-
Unknown key-share attacks on the station-to-station (sts) protocol
-
Public Key Cryptography 1999, of, Springer-Verlag
-
Simon Blake-Wilson and Alfred Menezes. Unknown key-share attacks on the station-to-station (sts) protocol. In Public Key Cryptography 1999, volume 1560 of LNCS, pages 154-170. Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1560
, pp. 154-170
-
-
Blake-Wilson, S.1
Menezes, A.2
-
7
-
-
35048860626
-
-
Ran Canetti and Hugo Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Advances in Cryptology - Eurocrypt 2001, 2045 of LNCS, pages 453-474. Springer-Verlag, 2001. Full version at http://eprint.iacr.org/2001/040.ps.
-
Ran Canetti and Hugo Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Advances in Cryptology - Eurocrypt 2001, volume 2045 of LNCS, pages 453-474. Springer-Verlag, 2001. Full version at http://eprint.iacr.org/2001/040.ps.
-
-
-
-
9
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P.C. van Oorschot, and M.J. Wiener. Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2:107-125, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
van Oorschot, P.C.2
Wiener, M.J.3
-
10
-
-
0036505541
-
Authentication protocols for mobile network environment value-added services
-
Günther Horn, Keith M. Martin, and Chris J. Mitchell. Authentication protocols for mobile network environment value-added services. IEEE Transactions on Vechicular Technology, 51(2):383-392, 2002.
-
(2002)
IEEE Transactions on Vechicular Technology
, vol.51
, Issue.2
, pp. 383-392
-
-
Horn, G.1
Martin, K.M.2
Mitchell, C.J.3
-
11
-
-
84958780603
-
Authentication and payment in future mobile systems
-
European Symposium on Research in Computer Security ESORICS, of, Springer-Verlag
-
Günther Horn and Bart Preneel. Authentication and payment in future mobile systems. In European Symposium on Research in Computer Security (ESORICS), volume 1485 of LNCS, pages 277-293. Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1485
, pp. 277-293
-
-
Horn, G.1
Preneel, B.2
-
12
-
-
84949186835
-
Mutual authentication for low-power mobile devices
-
Proceedings of Financial Cryptography 2001, of, Springer-Verlag
-
Markus Jakobsson and David Pointcheval. Mutual authentication for low-power mobile devices. In Proceedings of Financial Cryptography 2001, volume 2339 of LNCS, pages 178-195. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2339
, pp. 178-195
-
-
Jakobsson, M.1
Pointcheval, D.2
-
13
-
-
84937389342
-
The gap-problems: A new class of problems for the security of cryptographic schemes
-
Public Key Cryptography 2001, of, Springer-Verlag, February
-
Tatsuaki Okamoto and David Pointcheval. The gap-problems: a new class of problems for the security of cryptographic schemes. In Public Key Cryptography 2001, volume 1992 of LNCS, pages 104-118. Springer-Verlag, February 2001.
-
(2001)
LNCS
, vol.1992
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
-
14
-
-
63449140558
-
A fraud detection method and its application to third generation wireless systems
-
D.-G. Park, M.-N. Oh, and M. Looi. A fraud detection method and its application to third generation wireless systems. In Proceedings of Globecom 98, pages 1984-1989, 1998.
-
(1998)
Proceedings of Globecom
, vol.98
, pp. 1984-1989
-
-
Park, D.-G.1
Oh, M.-N.2
Looi, M.3
-
15
-
-
12344258539
-
Efficient signature generation by smart cards
-
Claus P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology 4, pages 161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, C.P.1
-
16
-
-
63449121396
-
-
Victor Shoup. On formal models for secure key exchange. Research Report RZ 3120, IBM Zurich Research Lab, 1999. Version 4 of 1999 revision of IBM Research Report RZ 3120 at http://www.shoup.net/papers/skey.pdf.
-
Victor Shoup. On formal models for secure key exchange. Research Report RZ 3120, IBM Zurich Research Lab, 1999. Version 4 of 1999 revision of IBM Research Report RZ 3120 at http://www.shoup.net/papers/skey.pdf.
-
-
-
-
17
-
-
84946838086
-
Efficient and mutually authenticated key exchange for low power computing devices
-
Advances in Cryptology, Asiacrypt 2001, of, Springer-Verlag
-
Duncan S. Wong and Agnes H. Chan. Efficient and mutually authenticated key exchange for low power computing devices. In Advances in Cryptology - Asiacrypt 2001, volume 2248 of LNCS, pages 272-289. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 272-289
-
-
Wong, D.S.1
Chan, A.H.2
|