-
1
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman, "New directions in cryptography, IEEE Trans", Info. TH, 22, 644-654, 1976.
-
(1976)
IEEE Trans, Info. TH
, vol.22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
2
-
-
0345490607
-
Certificateless Public Key Cryptography
-
Asiacrypt 2003
-
S. Al-Riyami and K.G. Paterson, "Certificateless Public Key Cryptography", Asiacrypt 2003, LNCS 2894, pp.452-473, 2003.
-
(2003)
LNCS
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.1
Paterson, K.G.2
-
3
-
-
33845888269
-
Efficient certificateless authenticated Key agreement protocols from pairings
-
S. Wang, Zh. Cao and L. Wang, "Efficient certificateless authenticated Key agreement protocols from pairings", WUJNS vol.11 No.5, pp.1278-1282, 2006.
-
(2006)
WUJNS
, vol.11
, Issue.5
, pp. 1278-1282
-
-
Wang, S.1
Cao, Z.2
Wang, L.3
-
5
-
-
33947586742
-
Two-party authenticated key agreement in certificateless public key cryptography
-
Y. Shi and J. Lin, "Two-party authenticated key agreement in certificateless public key cryptography", Wuhan University Journal of Natural Sciences, pp.071-074, 2007.
-
(2007)
Wuhan University Journal of Natural Sciences
, pp. 071-074
-
-
Shi, Y.1
Lin, J.2
-
6
-
-
77949283023
-
-
F. Wang and Y. Zhang, A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography, Cryptology ePrint Archive, Report 2007/220, 2007.
-
F. Wang and Y. Zhang, "A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography", Cryptology ePrint Archive, Report 2007/220, 2007.
-
-
-
-
7
-
-
49949116357
-
Certificateless authenticated two-party key agreement protocol
-
ASIAN
-
Tarjei K. Mandt and Chik How Tan, "Certificateless authenticated two-party key agreement protocol", ASIAN 2006, LNCS 4435, pp.37-44, 2007.
-
(2006)
LNCS
, vol.4435
, pp. 37-44
-
-
Mandt, T.K.1
How Tan, C.2
-
8
-
-
57049167103
-
Breaking and Repairing the Certificateless key agreement protocol from ASIAN 2006
-
X. Liang, SH. Wang, J. Shen and G. Xu, "Breaking and Repairing the Certificateless key agreement protocol from ASIAN 2006", Wuhan University Journal of Natural Sciences, vol. 13, no. 5, pp. 562-566, 2008.
-
(2008)
Wuhan University Journal of Natural Sciences
, vol.13
, Issue.5
, pp. 562-566
-
-
Liang, X.1
Wang, S.H.2
Shen, J.3
Xu, G.4
-
9
-
-
33645958856
-
Certificateless public key encryption without pairing, ISC 2005
-
J. Baek, R. Safavi-Naini and W. Susilo, "Certificateless public key encryption without pairing", ISC 2005. LNCS 3650, pp. 134-148, 2005.
-
(2005)
LNCS
, vol.3650
, pp. 134-148
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
10
-
-
38349041777
-
Strongly Secure Certificateless Public Key Encryption without Pairing
-
4856, pp
-
Y. Sun, F. Zhang, and J. Baek, "Strongly Secure Certificateless Public Key Encryption without Pairing", CANS 2007, LNCS 4856, pp.194-208, 2007.
-
(2007)
LNCS
, vol.CANS 2007
, pp. 194-208
-
-
Sun, Y.1
Zhang, F.2
Baek, J.3
-
15
-
-
77949289870
-
-
L. Chen and C. Kudla, Identity-based Key Agreement from Pairings, International Journal of Information Security, 6 (2007), available: http://eprint.iacr.org/2006/199,2006
-
L. Chen and C. Kudla, "Identity-based Key Agreement from Pairings", International Journal of Information Security, 6 (2007), available: http://eprint.iacr.org/2006/199,2006
-
-
-
-
16
-
-
84949221411
-
Authenticated Diffie-Hellman key agreement protocols
-
SAC
-
S. Blake-Wilson and A. Menezes, "Authenticated Diffie-Hellman key agreement protocols", SAC 1998, LNCS 1556, pp. 339-361, 1999.
-
(1998)
LNCS
, vol.1556
, pp. 339-361
-
-
Blake-Wilson, S.1
Menezes, A.2
-
17
-
-
84945119254
-
Entity authentication and key distribution, Advances in Cryptology-CRYPTO'93
-
M. Bellare and P. Rogaway, "Entity authentication and key distribution", Advances in Cryptology-CRYPTO'93, LNCS 773, pp.232-249, 1994.
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
18
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels, EUROCRYPT'01
-
R. Canetti and H. Krawczyk, "Analysis of key-exchange protocols and their use for building secure channels", EUROCRYPT'01, LNCS 2045, pp. 453-474, 2001.
-
(2001)
LNCS 2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
19
-
-
38149012093
-
Stronger security of authenticated key exchange, ProvSec
-
B. LaMacchia, K. Lauter and A. Mityagin, "Stronger security of authenticated key exchange", ProvSec, LNCS 4784, pp.1-16, 2007.
-
(2007)
LNCS
, vol.4784
, pp. 1-16
-
-
LaMacchia, B.1
Lauter, K.2
Mityagin, A.3
-
20
-
-
0000537828
-
Efficient Identifications and Signatures for Smart Cards, Crypto'89
-
C. P. Schnorr, "Efficient Identifications and Signatures for Smart Cards", Crypto'89, LNCS 435, pp. 239-251, 1990.
-
(1990)
LNCS
, vol.435
, pp. 239-251
-
-
Schnorr, C.P.1
-
21
-
-
84927727752
-
Security Proofs for Signature Schemes, EUROCRYPT'96
-
D. Pointcheval, J. Stern, "Security Proofs for Signature Schemes", EUROCRYPT'96, LNCS 1070, pp.387-398, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
|