-
1
-
-
77649257689
-
A scalable password-based group key exchange protocol in the standard model
-
M. Abdalla, D. Pointcheval, A scalable password-based group key exchange protocol in the standard model, in: Advances in Cryptology - Asiacrypt'06, 2006, pp. 332-347
-
(2006)
Advances in Cryptology - Asiacrypt'06
, pp. 332-347
-
-
Abdalla, M.1
Pointcheval, D.2
-
2
-
-
33745837743
-
Password-based group key exchange in a constant number of rounds
-
M. Abdalla, E. Bresson, O. Chevassut, D. Pointcheval, Password-based group key exchange in a constant number of rounds, in: Proceedings of PKC'06, 2006, pp. 427-440
-
(2006)
Proceedings of PKC'06
, pp. 427-440
-
-
Abdalla, M.1
Bresson, E.2
Chevassut, O.3
Pointcheval, D.4
-
3
-
-
38049071438
-
(Password) Authenticated key establishment: From 2-party to group. Theory of cryptography conference - TCC 2007
-
Abdalla M., Bohli J.-M., Gonzalez Vasco M.I., and Steinwandt R. (Password) Authenticated key establishment: From 2-party to group. Theory of cryptography conference - TCC 2007. Lecture Notes in Computer Science vol. 4392 (2007) 499-514
-
(2007)
Lecture Notes in Computer Science
, vol.4392
, pp. 499-514
-
-
Abdalla, M.1
Bohli, J.-M.2
Gonzalez Vasco, M.I.3
Steinwandt, R.4
-
4
-
-
0032218234
-
-
G. Ateniese, M. Steiner, G. Tsudik, Authenticated group key agreement and friends, in: 5th ACM Conference on Computer and Communications Security, November 1998, pp. 17-26
-
G. Ateniese, M. Steiner, G. Tsudik, Authenticated group key agreement and friends, in: 5th ACM Conference on Computer and Communications Security, November 1998, pp. 17-26
-
-
-
-
5
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Eurocrypt'00, Springer-Verlag, Berlin
-
Bellare M., Pointcheval D., and Rogaway P. Authenticated key exchange secure against dictionary attacks. Eurocrypt'00. Lecture Notes in Computer Science vol. 1807 (2000), Springer-Verlag, Berlin 139-155
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
7
-
-
50849127145
-
Provably authenticated group Diffie-Hellman key exchange - the dynamic case
-
December
-
E. Bresson, O. Chevassut, D. Pointcheval, Provably authenticated group Diffie-Hellman key exchange - the dynamic case, in: Advances in Cryptology - Crypto'01, December 2001, pp. 290-309
-
(2001)
Advances in Cryptology - Crypto'01
, pp. 290-309
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
8
-
-
0035751060
-
Provably group Diffie-Hellman key exchange
-
November
-
E. Bresson, O. Chevassut, D. Pointcheval, J. Quisquater, Provably group Diffie-Hellman key exchange, in: Proc. of 8th ACM Conference on Computer and Communications Security, November 2001
-
(2001)
Proc. of 8th ACM Conference on Computer and Communications Security
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
Quisquater, J.4
-
9
-
-
50849092893
-
Dynamic group Diffie-Hellman key exchange under standard assumptions
-
May
-
E. Bresson, O. Chevassut, D. Pointcheval, Dynamic group Diffie-Hellman key exchange under standard assumptions, in: Advances in Cryptology - Crypto'02, May 2002, pp. 321-336
-
(2002)
Advances in Cryptology - Crypto'02
, pp. 321-336
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
10
-
-
84958755223
-
Group Diffie-Hellman key exchange secure against dictionary attacks
-
E. Bresson, O. Chevassut, D. Pointcheval, Group Diffie-Hellman key exchange secure against dictionary attacks, in: Advances in Cryptology - Asiacrypt'02, 2002, pp. 497-514
-
(2002)
Advances in Cryptology - Asiacrypt'02
, pp. 497-514
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
11
-
-
18744393738
-
Security proof for an efficient password-based key exchange
-
E. Bresson, O. Chevassut, D. Pointcheval, Security proof for an efficient password-based key exchange, in: ACM Conference on Computer and Communications Security 2003, 2003, pp. 241-250
-
(2003)
ACM Conference on Computer and Communications Security
, pp. 241-250
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
12
-
-
84957893731
-
On key agreement conference key agreement
-
Australasian Conference on Information Security and Privacy - ACISP'97, Springer-Verlag, Berlin
-
Boyd C. On key agreement conference key agreement. Australasian Conference on Information Security and Privacy - ACISP'97. Lecture Notes in Computer Science vol. 1270 (1997), Springer-Verlag, Berlin 294-302
-
(1997)
Lecture Notes in Computer Science
, vol.1270
, pp. 294-302
-
-
Boyd, C.1
-
13
-
-
84948991087
-
Efficient conference key distribution system
-
Proc. of Eurocrypt'94, Springer-Verlag
-
Burmester M., Desmedt Y., and Secure A. Efficient conference key distribution system. Proc. of Eurocrypt'94. Lecture Notes in Computer Science vol. 950 (1995), Springer-Verlag 275-286
-
(1995)
Lecture Notes in Computer Science
, vol.950
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
Secure, A.3
-
14
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Proceedings of CRYPTO'98
-
Cramer R., and Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. Proceedings of CRYPTO'98. Lecture Notes in Computer Science vol. 1462 (1998) 13-25
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
19
-
-
35248878854
-
-
in: Advances in Cryptology - Crypto'03, 2003, pp. 110-125. Full version available at
-
Katz J., and Yung M. Scalable protocols for authenticated group key exchange. in: Advances in Cryptology - Crypto'03, 2003, pp. 110-125. Full version available at. http://www.cs.umd.edu/~jkatz/papers.html
-
Scalable protocols for authenticated group key exchange
-
-
Katz, J.1
Yung, M.2
-
20
-
-
84955559079
-
Authenticated multi-party key agreement
-
Advances in Cryptology - Asiacrypt 1996, Springer-Verlag
-
Just M., and Vaudenay S. Authenticated multi-party key agreement. Advances in Cryptology - Asiacrypt 1996. Lecture Notes in Computer Science vol. 1163 (1996), Springer-Verlag 36-49
-
(1996)
Lecture Notes in Computer Science
, vol.1163
, pp. 36-49
-
-
Just, M.1
Vaudenay, S.2
-
21
-
-
35048828834
-
Efficient password-based group key exchange, Trust and privacy in digital business
-
S.-M. Lee, J.Y. Hwang, D.H. Lee, Efficient password-based group key exchange, Trust and privacy in digital business, in: 1st International Conference, 2004, pp. 191-199
-
(2004)
1st International Conference
, pp. 191-199
-
-
Lee, S.-M.1
Hwang, J.Y.2
Lee, D.H.3
-
22
-
-
0024983231
-
Public-key cryptosystems provably secure against chosen ciphertext attacks
-
M. Naor, M. Yung, Public-key cryptosystems provably secure against chosen ciphertext attacks, in: STOC'90, 1990
-
(1990)
STOC'90
-
-
Naor, M.1
Yung, M.2
-
23
-
-
0002360237
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
Crypto'91
-
Rackoff C., and Simon D.R. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. Crypto'91. Lecture Notes in Computer Science vol. 576 (1991) 387-394
-
(1991)
Lecture Notes in Computer Science
, vol.576
, pp. 387-394
-
-
Rackoff, C.1
Simon, D.R.2
-
24
-
-
0033342534
-
Non-malleable non-interactive zero knowledge and adaptive chosen ciphertext security
-
A. Sahai, Non-malleable non-interactive zero knowledge and adaptive chosen ciphertext security, in: FOCS'99, 1999, pp. 543-553
-
(1999)
FOCS'99
, pp. 543-553
-
-
Sahai, A.1
-
26
-
-
84957807365
-
A practical and secure fault-tolerant conference-key agreement protocol
-
Proc. of PKC2000, Springer-Verlag
-
Tzeng W.-G. A practical and secure fault-tolerant conference-key agreement protocol. Proc. of PKC2000. Lecture Notes in Computer Science (2000), Springer-Verlag
-
(2000)
Lecture Notes in Computer Science
-
-
Tzeng, W.-G.1
|