-
1
-
-
0345490607
-
Certificateless public key cryptography
-
Laih, C.-S, ed, ASIACRYPT 2003, Springer, Heidelberg
-
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452-473. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
2
-
-
24144438230
-
-
Al-Riyami, S.S., Paterson, K.G.: CBE from CLE-PKE: A generic construction and efficient schemes. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 398-415. Springer, Heidelberg (2005)
-
Al-Riyami, S.S., Paterson, K.G.: CBE from CLE-PKE: A generic construction and efficient schemes. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 398-415. Springer, Heidelberg (2005)
-
-
-
-
3
-
-
52149104493
-
-
Boyen, X.: The uber-assumption family - a unified complexity framework for bilinear groups. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, 5209, pp. 39-56. Springer, Heidelberg (2008)
-
Boyen, X.: The uber-assumption family - a unified complexity framework for bilinear groups. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 39-56. Springer, Heidelberg (2008)
-
-
-
-
4
-
-
53449097686
-
A survey of certificateless encryption schemes and security models
-
Dent, A.W.: A survey of certificateless encryption schemes and security models. Int. J. Inf. Secur. 7(5), 349-377 (2008)
-
(2008)
Int. J. Inf. Secur
, vol.7
, Issue.5
, pp. 349-377
-
-
Dent, A.W.1
-
5
-
-
84937570422
-
Self-certified public keys
-
Davies, D.W, ed, EUROCRYPT 1991, Springer, Heidelberg
-
Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490-497. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.547
, pp. 490-497
-
-
Girault, M.1
-
6
-
-
33745179557
-
HMQV: A high-performance secure Diffie-Hellman protocol
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Krawczyk, H.: HMQV: A high-performance secure Diffie-Hellman protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 546-566
-
-
Krawczyk, H.1
-
7
-
-
38149012093
-
-
LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, 4784, pp. 1-16. Springer, Heidelberg (2007)
-
LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1-16. Springer, Heidelberg (2007)
-
-
-
-
8
-
-
84958601057
-
A key recovery attack on discrete log-based schemes using a prime order subgroup
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Lim, C.H., Lee, P.J.: A key recovery attack on discrete log-based schemes using a prime order subgroup. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 249-263. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 249-263
-
-
Lim, C.H.1
Lee, P.J.2
-
9
-
-
69949142503
-
-
Lippold, G., Boyd, C., Nieto, J.G.: Strongly secure certificateless key agreement. In: Shacham, H. (ed.) Pairing 2009. LNCS, 5671, pp. 206-230. Springer, Heidelberg (2009)
-
Lippold, G., Boyd, C., Nieto, J.G.: Strongly secure certificateless key agreement. In: Shacham, H. (ed.) Pairing 2009. LNCS, vol. 5671, pp. 206-230. Springer, Heidelberg (2009)
-
-
-
-
11
-
-
49949116357
-
-
Mandt, T.K., Tan, C.H.: Certificateless authenticated two-party key agreement protocols. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, 4435, pp. 37-44. Springer, Heidelberg (2008)
-
Mandt, T.K., Tan, C.H.: Certificateless authenticated two-party key agreement protocols. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol. 4435, pp. 37-44. Springer, Heidelberg (2008)
-
-
-
-
12
-
-
70349884780
-
Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard
-
ACM, New York
-
Menezes, A., Ustaoglu, B.: Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard. In: ASIACCS 2008: Proceedings of the 2008 ACM symposium on Information, computer and communications security, pp. 261-270. ACM, New York (2008)
-
(2008)
ASIACCS 2008: Proceedings of the 2008 ACM symposium on Information, computer and communications security
, pp. 261-270
-
-
Menezes, A.1
Ustaoglu, B.2
-
13
-
-
67650696914
-
Key-compromise impersonation attacks on some certificateless key agreement protocols and two improved protocols
-
Meng, G., Futai, Z.: Key-compromise impersonation attacks on some certificateless key agreement protocols and two improved protocols. In: International Workshop on Education Technology and Computer Science, vol. 2, pp. 62-66 (2009)
-
(2009)
International Workshop on Education Technology and Computer Science
, vol.2
, pp. 62-66
-
-
Meng, G.1
Futai, Z.2
-
14
-
-
13944274129
-
-
Shao, Z.-h.: Efficient authenticated key agreement protocol using self-certified public keys from pairings.Wuhan University Journal of Natural Sciences 10(1), 267-270 (2005)
-
Shao, Z.-h.: Efficient authenticated key agreement protocol using self-certified public keys from pairings.Wuhan University Journal of Natural Sciences 10(1), 267-270 (2005)
-
-
-
-
15
-
-
33947586742
-
Two-party authenticated key agreement in certificateless public key cryptography
-
Shi, Y., Li, J.: Two-party authenticated key agreement in certificateless public key cryptography. Wuhan University Journal of Natural Sciences 12(1), 71-74 (2007)
-
(2007)
Wuhan University Journal of Natural Sciences
, vol.12
, Issue.1
, pp. 71-74
-
-
Shi, Y.1
Li, J.2
-
17
-
-
33947589417
-
Escrow-free certificate-based authenticated key agreement protocol from pairings
-
Wang, S., Cao, Z.: Escrow-free certificate-based authenticated key agreement protocol from pairings. Wuhan University Journal of Natural Sciences 12(1), 63-66 (2007)
-
(2007)
Wuhan University Journal of Natural Sciences
, vol.12
, Issue.1
, pp. 63-66
-
-
Wang, S.1
Cao, Z.2
-
18
-
-
33845888269
-
Efficient certificateless authenticated key agreement protocol from pairings
-
Wang, S., Cao, Z., Wang, L.: Efficient certificateless authenticated key agreement protocol from pairings. Wuhan University Journal of Natural Sciences 11(5), 1278-1282 (2006)
-
(2006)
Wuhan University Journal of Natural Sciences
, vol.11
, Issue.5
, pp. 1278-1282
-
-
Wang, S.1
Cao, Z.2
Wang, L.3
-
19
-
-
57049167103
-
-
Xia, L., Wang, S., Shen, J., Xu, G.: Breaking and repairing the certificateless key agreement protocol from ASIAN 2006. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, 4435, pp. 562-566. Springer, Heidelberg (2008)
-
Xia, L., Wang, S., Shen, J., Xu, G.: Breaking and repairing the certificateless key agreement protocol from ASIAN 2006. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol. 4435, pp. 562-566. Springer, Heidelberg (2008)
-
-
-
|