-
2
-
-
67649679929
-
-
ANSI-X9.42 (1998). Agreement of symmetric algorithm keys using Diffle-Hellman. In Working Draft.
-
ANSI-X9.42 (1998). Agreement of symmetric algorithm keys using Diffle-Hellman. In Working Draft.
-
-
-
-
3
-
-
67649736864
-
-
ANSI-X9.63 (1998). Elliptic curve key agreement and key transport protocols. In Working Draft.
-
ANSI-X9.63 (1998). Elliptic curve key agreement and key transport protocols. In Working Draft.
-
-
-
-
4
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Springer-Verlag
-
Bellare, M., Pointcheval, D., and Rogaway, P. (2000). Authenticated key exchange secure against dictionary attacks. In Proceedings EUROCRYPT 2000, LNCS 1807, pp. 139-155. Springer-Verlag.
-
(2000)
Proceedings EUROCRYPT 2000, LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
5
-
-
85016462400
-
Systematic design of two-party authentication protocols
-
Springer-Verlag
-
Bird, R., Gopal, I., Herzberg, A., Janson, P., Kutten, S., Molva, R., and Yung, M. (1991). Systematic design of two-party authentication protocols. In Proceedings of Advances in Cryptography - Crypto '91, LNCS 576, pp. 44-61. Springer-Verlag.
-
(1991)
Proceedings of Advances in Cryptography - Crypto '91, LNCS
, vol.576
, pp. 44-61
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
6
-
-
84949230533
-
Key agreement protocols and their security analysis
-
Springer-Verlag
-
Blake-Wilson, S., Johnson, D., and Menezes, A. (1997). Key agreement protocols and their security analysis. In Proceedings of 6th IMA International Conference on Cryptography and Coding, LNCS 1355, pp. 30-45. Springer-Verlag.
-
(1997)
Proceedings of 6th IMA International Conference on Cryptography and Coding, LNCS
, vol.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
8
-
-
35048899816
-
Key agreement using statically keyed authenticators
-
Springer-Verlag
-
Boyd, C, Mao, W., and Paterson, K.-G. (2004). Key agreement using statically keyed authenticators. In Proceedings of Applied Cryptography and Network Security - ACNS '04, LNCS 3089, pp. 248-262. Springer-Verlag.
-
(2004)
Proceedings of Applied Cryptography and Network Security - ACNS '04, LNCS
, vol.3089
, pp. 248-262
-
-
Boyd, C.1
Mao, W.2
Paterson, K.-G.3
-
10
-
-
36248981438
-
Cryptographic method and apparatus for public key exchange with authentication. In
-
U.S. Patent 4956865
-
Goss, K.-C. (1990). Cryptographic method and apparatus for public key exchange with authentication. In U.S. Patent 4956865.
-
(1990)
-
-
Goss, K.-C.1
-
11
-
-
67649711474
-
-
IEEE-1363 (1998). Standard specifications for public key cryptography. In Working Draft.
-
IEEE-1363 (1998). Standard specifications for public key cryptography. In Working Draft.
-
-
-
-
12
-
-
35048878818
-
One-round protocols for two-party authenticated key exchange
-
3089/ ofLNCS. Springer-Verlag
-
Jeong, I., Katz, J., and Lee, D. (2004). One-round protocols for two-party authenticated key exchange. In Applied Cryptography and Network Security - ACNS 2004, pp. 220-232., Vol. 3089/2004 ofLNCS. Springer-Verlag.
-
(2004)
Applied Cryptography and Network Security
, vol.ACNS 2004
, pp. 220-232
-
-
Jeong, I.1
Katz, J.2
Lee, D.3
-
13
-
-
67649746889
-
An unknown key share attack on the mqv key agreement protocol
-
Springer-Verlag
-
Kaliski, B. (2001). An unknown key share attack on the mqv key agreement protocol. In ACM Transactions on Information and System Security, pp. 3649. Springer-Verlag.
-
(2001)
ACM Transactions on Information and System Security
, pp. 3649
-
-
Kaliski, B.1
-
14
-
-
35248831117
-
Forward secrecy in password-only key exchange protocols
-
Springer-Verlag
-
Katz, J., Ostrovsky, R., and Yung, M. (2002). Forward secrecy in password-only key exchange protocols. In Proceedings SCN 2002, LNCS 2576, pp. 29-44. Springer-Verlag.
-
(2002)
Proceedings SCN 2002, LNCS
, vol.2576
, pp. 29-44
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
15
-
-
33745179557
-
Hmqv: A high-performance secure diffle- hellman protocol
-
Springer-Verlag
-
Krawczyk, H. (2005). Hmqv: A high-performance secure diffle- hellman protocol. In Proceedings of Advances in Cryptology - Crypto 'OS, LNCS 3621, pp. 546-566. Springer-Verlag.
-
(2005)
Proceedings of Advances in Cryptology - Crypto 'OS, LNCS
, vol.3621
, pp. 546-566
-
-
Krawczyk, H.1
-
19
-
-
0005243827
-
An efficient protocol for authenticated key agreement
-
98-05, University of Waterloo
-
Law, L., Menezes, A., Qu, M., Solinas, J., and Vanstone, S. (1998). An efficient protocol for authenticated key agreement. In Technical report CORR 98-05, University of Waterloo.
-
(1998)
Technical report CORR
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
20
-
-
67649701446
-
-
Lu, R., Cao, Z., Su, R., and Shao, J. (2005). Pairing-based two-party authenticated key agreement protocol.
-
(2005)
Pairing-based two-party authenticated key agreement protocol
-
-
Lu, R.1
Cao, Z.2
Su, R.3
Shao, J.4
-
21
-
-
0022660635
-
On seeking smart public-key distribution systems
-
Matsumoto, T., Takashima, Y., and Imai, H. (1986). On seeking smart public-key distribution systems. In Transactions of the IECE of Japan, E69, pp. 99-106,.
-
(1986)
Transactions of the IECE of Japan, E69
, pp. 99-106
-
-
Matsumoto, T.1
Takashima, Y.2
Imai, H.3
-
24
-
-
33745292713
-
-
Oh, S., Kwak, J., and Lee, S.and Won, D. (2003). Security analysis and applications of standard key agreement protocols. In ICCSA (2), pp. 191-200. Springer-Verlag.
-
Oh, S., Kwak, J., and Lee, S.and Won, D. (2003). Security analysis and applications of standard key agreement protocols. In ICCSA (2), pp. 191-200. Springer-Verlag.
-
-
-
-
25
-
-
33746215179
-
On the resilience of key agreement protocols to key compromise impersonation
-
Springer-Verlag
-
Strangio, M.-A. (2006). On the resilience of key agreement protocols to key compromise impersonation. In European PKI Workshop on Public Key Infrastructure , IMCS 4043, pp. 233-247. Springer-Verlag.
-
(2006)
European PKI Workshop on Public Key Infrastructure , IMCS
, vol.4043
, pp. 233-247
-
-
Strangio, M.-A.1
-
26
-
-
67649704527
-
Enhancing ck-model for key compromise impersonation resilience and identity-based key exchange. Cryptology ePrint Archive
-
Report 2005/455
-
Zhu, R. W., Tian, X., and Wong, D. S. (2005). Enhancing ck-model for key compromise impersonation resilience and identity-based key exchange. Cryptology ePrint Archive, Report 2005/455. http://eprint.iacr.org/.
-
(2005)
-
-
Zhu, R.W.1
Tian, X.2
Wong, D.S.3
|