-
1
-
-
84945119254
-
Entity authentication and key distribution
-
13th Annual International Cryptology Conference - CRYPTO '93, Springer, USA
-
Bellare M., and Rogaway P. Entity authentication and key distribution. 13th Annual International Cryptology Conference - CRYPTO '93. Lecture Notes in Computer Science vol. 773 (1994), Springer, USA 232-249
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
2
-
-
85013976350
-
On the risk of opening distributed keys
-
14th Annual International Cryptology Conference - CRYPTO '94, Springer, USA
-
Burmester M.V.D. On the risk of opening distributed keys. 14th Annual International Cryptology Conference - CRYPTO '94. Lecture Notes in Computer Science vol. 839 (1994), Springer, USA 308-317
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 308-317
-
-
Burmester, M.V.D.1
-
3
-
-
84949230533
-
Key agreement protocols and their security analysis (extended abstract)
-
6th IMA International Conference on Cryptography and Coding, Springer, USA
-
Blake-Wilson S., Johnson D., and Menezes A. Key agreement protocols and their security analysis (extended abstract). 6th IMA International Conference on Cryptography and Coding. Lecture Notes In Computer Science vol. 1355 (1997), Springer, USA 30-45
-
(1997)
Lecture Notes In Computer Science
, vol.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
5
-
-
84874800178
-
A public key cryptosystem and a signature protocol based on discrete logarithms
-
Elgamal T. A public key cryptosystem and a signature protocol based on discrete logarithms. IEEE Transactions on Information Theory 31 (1985) 469-472
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
6
-
-
84969368443
-
An identity-based key-exchange protocol
-
An Identity-Based Key-Exchange Protocol, Springer, USA
-
Günther C.G. An identity-based key-exchange protocol. An Identity-Based Key-Exchange Protocol. Lecture Notes in Computer Science vol. 434 (1990), Springer, USA 29.s-37.s
-
(1990)
Lecture Notes in Computer Science
, vol.434
-
-
Günther, C.G.1
-
8
-
-
0035120027
-
On the security of the Okamoto-Tanaka ID-based key exchange protocol against active attacks
-
Kim S., Mambo M., Okamoto T., Shizuya H., Tada M., and Won D. On the security of the Okamoto-Tanaka ID-based key exchange protocol against active attacks. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E84a 1 (2001) 231-238
-
(2001)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E84a
, Issue.1
, pp. 231-238
-
-
Kim, S.1
Mambo, M.2
Okamoto, T.3
Shizuya, H.4
Tada, M.5
Won, D.6
-
10
-
-
84964242030
-
Key distribution-systems based on identification information
-
Theory and Applications of Cryptographic Techniques on Advances in Cryptology, Springer, USA
-
Okamoto E. Key distribution-systems based on identification information. Theory and Applications of Cryptographic Techniques on Advances in Cryptology. Lecture Notes In Computer Science vol. 293 (1988), Springer, USA 194-202
-
(1988)
Lecture Notes In Computer Science
, vol.293
, pp. 194-202
-
-
Okamoto, E.1
-
12
-
-
84927727752
-
Security proofs for signature schemes
-
16th Annual International Cryptology Conference - CRYPTO '96, Springer, USA
-
Pointcheval D., and Stern J. Security proofs for signature schemes. 16th Annual International Cryptology Conference - CRYPTO '96. Lecture Notes in Computer Science vol. 1070 (1996), Springer, USA 387-398
-
(1996)
Lecture Notes in Computer Science
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
13
-
-
0017930809
-
Method for obtaining digital signatures and public-key cryptosystems
-
Rivest R.L., Shamir A., and Adleman L. Method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21 (1978) 120-126
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
14
-
-
0034249013
-
Improvement of Günther's identity-based key exchange protocol
-
Saeednia S. Improvement of Günther's identity-based key exchange protocol. Electronics Letters 36 18 (2000) 1535-1536
-
(2000)
Electronics Letters
, vol.36
, Issue.18
, pp. 1535-1536
-
-
Saeednia, S.1
-
15
-
-
84947923408
-
A new identity-based key exchange protocol minimizing computation and communication
-
First International Workshop on Information Security, Springer, USA
-
Saeednia S., and Safavi-Naini R. A new identity-based key exchange protocol minimizing computation and communication. First International Workshop on Information Security. Lecture Notes In Computer Science vol. 1396 (1998), Springer, USA 328-334
-
(1998)
Lecture Notes In Computer Science
, vol.1396
, pp. 328-334
-
-
Saeednia, S.1
Safavi-Naini, R.2
-
16
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
9th Annual International Cryptology Conference - CRYPTO '89, Springer, USA
-
Schnorr C.P. Efficient identification and signatures for smart cards. 9th Annual International Cryptology Conference - CRYPTO '89. Lecture Notes in Computer Science vol. 435 (1989), Springer, USA 235-251
-
(1989)
Lecture Notes in Computer Science
, vol.435
, pp. 235-251
-
-
Schnorr, C.P.1
-
18
-
-
33947405259
-
An efficient two-party identity-based key exchange protocol
-
Tseng Y.M. An efficient two-party identity-based key exchange protocol. Informatica 18 1 (2007) 125-136
-
(2007)
Informatica
, vol.18
, Issue.1
, pp. 125-136
-
-
Tseng, Y.M.1
-
19
-
-
33947430192
-
Cryptanalysis and improvement of an identity-based key exchange protocol
-
Tseng Y.M., Jan J.K., and Wang C.H. Cryptanalysis and improvement of an identity-based key exchange protocol. Journal of Computers 14 3 (2002) 17-22
-
(2002)
Journal of Computers
, vol.14
, Issue.3
, pp. 17-22
-
-
Tseng, Y.M.1
Jan, J.K.2
Wang, C.H.3
|