-
2
-
-
0007441727
-
Some Key Agreement Protocols Providing Implicit Authentication
-
95
-
Menezes, A.J., Qu, M. and Vanstone, S.A.: Some Key Agreement Protocols Providing Implicit Authentication, 2nd Workshop Selected Area in Cryptography, SAC '95, (1995) 22-32
-
(1995)
2nd Workshop Selected Area in Cryptography, SAC
, pp. 22-32
-
-
Menezes, A.J.1
Qu, M.2
Vanstone, S.A.3
-
3
-
-
77949736299
-
IEEE P1363a D10 (Draft version 10): Standard Specifications for Public Key Cryptography: Additional Techniques
-
IEEE P1363 Working Group, available from
-
IEEE P1363 Working Group, 2001, IEEE P1363a D10 (Draft version 10): Standard Specifications for Public Key Cryptography: Additional Techniques, IEEE P1363 Working Group, Working draft (available from http://grouper.ieee.org/ groups/1363)
-
(2001)
IEEE P1363 Working Group, Working draft
-
-
-
5
-
-
0035837210
-
Authenticated Key Agreement without Using One-way Hash Functions
-
Harn, L. and Lin, H.-Y.: Authenticated Key Agreement without Using One-way Hash Functions. Electronics Letters, Vol. 37, No. 10, (2001) 229-630
-
(2001)
Electronics Letters
, vol.37
, Issue.10
, pp. 229-630
-
-
Harn, L.1
Lin, H.-Y.2
-
6
-
-
0036643547
-
Robust Generalized MQV Key Agreement Protocol without Using One-way Hash Functions
-
Tseng, Y.-M: Robust Generalized MQV Key Agreement Protocol without Using One-way Hash Functions. Computer Standards and Interfaces, Vol. 24, (2002) 241-246
-
(2002)
Computer Standards and Interfaces
, vol.24
, pp. 241-246
-
-
Tseng, Y.-M.1
-
7
-
-
0042468097
-
Security of Robust Generalized MQV Key Agreement Protocol Without Using One-way Hash Functions
-
Shao, Z.: Security of Robust Generalized MQV Key Agreement Protocol Without Using One-way Hash Functions, Computer Standards and Interfaces, Vol. 25, (2003) 431-436
-
(2003)
Computer Standards and Interfaces
, vol.25
, pp. 431-436
-
-
Shao, Z.1
-
8
-
-
3042559809
-
An Enhanced Authentication Key Exchange Protocol
-
Hwan, R.-J, Shiau, S.-H. and Lai, C.-H.: An Enhanced Authentication Key Exchange Protocol, Proceedings of the 17th International Conference on Advanced Information Networking and Applications, AINA 2003, (2003) 202-205
-
(2003)
Proceedings of the 17th International Conference on Advanced Information Networking and Applications, AINA
, pp. 202-205
-
-
Hwan, R.-J.1
Shiau, S.-H.2
Lai, C.-H.3
-
9
-
-
0141927192
-
Improved Authenticated Multiple-key Agreement Protocol Without Using Conventional One-way Function
-
Chien, H.-Y. and Jan, J.-K: Improved Authenticated Multiple-key Agreement Protocol Without Using Conventional One-way Function, Applied Mathematics and Computation, Vol. 147 (2004) 491-497
-
(2004)
Applied Mathematics and Computation
, vol.147
, pp. 491-497
-
-
Chien, H.-Y.1
Jan, J.-K.2
-
10
-
-
85020598353
-
Identity-based Cryptosystems and Signature Schemes
-
Advances in Cryptology, Crypto, 196. Springer-Verlag
-
Shamir, A.: Identity-based Cryptosystems and Signature Schemes. Advances in Cryptology, Crypto 84, Lecture Notes in Computer Sciene, Vol. 196. Springer-Verlag. (1984) 47-53
-
(1984)
Lecture Notes in Computer Sciene
, vol.84
, pp. 47-53
-
-
Shamir, A.1
-
11
-
-
0024664858
-
An ID-based Cryptosystem Based on the Discret Logarithm Problem
-
Tsuji, S. and Itoh, T.: An ID-based Cryptosystem Based on the Discret Logarithm Problem, IEEE Journal of Selected Areas in Communications, Vol. 7, No.4, (1989) 467-473
-
(1989)
IEEE Journal of Selected Areas in Communications
, vol.7
, Issue.4
, pp. 467-473
-
-
Tsuji, S.1
Itoh, T.2
-
12
-
-
84874324906
-
Identity-based Encryption from the Weil Pairing
-
Advances in Cryptology, Crypto 2001, Springer-Verlag
-
Boneh, D. and Franklin, M.: Identity-based Encryption from the Weil Pairing. Advances in Cryptology, Crypto 2001, Lecture Notes in Computer Sciene, Vol. 2139. Springer-Verlag. (2001) 213-229
-
(2001)
Lecture Notes in Computer Sciene
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
13
-
-
77950151506
-
An Identity Based Encryption Scheme Based on Quadratic Residus
-
Crytography and Coding, Springer-Verlag
-
Cocks, C.: An Identity Based Encryption Scheme Based on Quadratic Residus. Crytography and Coding, Lecture Notes in Computer Sciene, Vol. 2260. Springer-Verlag. (2001) 360-363
-
(2001)
Lecture Notes in Computer Sciene
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
14
-
-
0037142442
-
Identity-based Authnticated Key Agreement Protocol Based on Weil Pairing
-
Smart, N.P.: Identity-based Authnticated Key Agreement Protocol Based on Weil Pairing, Electronics Letters, Vol. 38, No. 13, (2002) 630-632
-
(2002)
Electronics Letters
, vol.38
, Issue.13
, pp. 630-632
-
-
Smart, N.P.1
-
15
-
-
2642541518
-
Authenticated Three Party Key Agreement Protocols from Pairings. Cryptology ePrint Archive
-
Report 2002/035, available at
-
Al-Riyami, S. and Paterson K.G.: Authenticated Three Party Key Agreement Protocols from Pairings. Cryptology ePrint Archive, Report 2002/035, available at http://eprint.iacr.org/2002/035/ (2002)
-
(2002)
-
-
Al-Riyami, S.1
Paterson, K.G.2
-
16
-
-
33645437508
-
ID-based One Round Authenticated Tripartite Key Agreement Protocol with Pairings. Cryptology ePrint Archive
-
Report 2002/122, available at
-
Zhang, F., Liu, S. and Kim, K.J.: ID-based One Round Authenticated Tripartite Key Agreement Protocol with Pairings. Cryptology ePrint Archive, Report 2002/122, available at http://eprint.iacr.org/2002/122/ (2002)
-
(2002)
-
-
Zhang, F.1
Liu, S.2
Kim, K.J.3
-
17
-
-
8744292583
-
ID-based Tripartite Authenticated Key Agreement Protocols from Pairings. Cryptology ePrint Archive
-
Report 2003/004, available at
-
Nalla, D. and Reddy, K.C.: ID-based Tripartite Authenticated Key Agreement Protocols from Pairings. Cryptology ePrint Archive, Report 2003/004, available at http://eprint.iacr.org/2003/004/ (2003)
-
(2003)
-
-
Nalla, D.1
Reddy, K.C.2
-
18
-
-
0038680685
-
Efficient ID-based Authenticated Key Agreement Protocol Based on Weil Pairing
-
Shim, K.: Efficient ID-based Authenticated Key Agreement Protocol Based on Weil Pairing. Electronics Letters, Vol. 39, No. 8, (2003) 653-654
-
(2003)
Electronics Letters
, vol.39
, Issue.8
, pp. 653-654
-
-
Shim, K.1
-
19
-
-
0037461946
-
Efficient ID-based Key Agreement from Weil Pairing
-
Yi, X.: Efficient ID-based Key Agreement from Weil Pairing. Electronics Letters, Vol. 39, No. 2, (2003) 206-208
-
(2003)
Electronics Letters
, vol.39
, Issue.2
, pp. 206-208
-
-
Yi, X.1
-
20
-
-
10444247601
-
ID-based Tripartite Key Agreement with Signatures. Cryptology ePrint Archive
-
Report 2003/144, available at
-
Nalla, D.: ID-based Tripartite Key Agreement with Signatures. Cryptology ePrint Archive, Report 2003/144, available at http://eprint.iacr.org/2003/144/ (2003)
-
(2003)
-
-
Nalla, D.1
-
21
-
-
84949230533
-
Key Agreement Protocols and Their Security Analysis
-
Proceedings of the sixth IMA International Conference on Cryptography and Coding, Springer-Verlag
-
Blake-Wilson, S., Johnson, D. and Menezes, A.: Key Agreement Protocols and Their Security Analysis. Proceedings of the sixth IMA International Conference on Cryptography and Coding, Lecture Notes in Computer Sciene, Vol. 1355. Springer-Verlag. (1997) 310-324
-
(1997)
Lecture Notes in Computer Sciene
, vol.1355
, pp. 310-324
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
22
-
-
74549221711
-
An Efficient Protocol for Authenticated Key Agreement
-
Law, L., Menezes, A.J., Qu, M., Solinas, J., and Vanstone, S.: An Efficient Protocol for Authenticated Key Agreement. Designs, Codes and Cryptography, Vol. 28. (2003) 119-134
-
(2003)
Designs, Codes and Cryptography
, vol.28
, pp. 119-134
-
-
Law, L.1
Menezes, A.J.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
23
-
-
35248867510
-
Efficient Identity based Signature Schemes Based on Pairings
-
Proceedings of 9th Workshop on Selected Areas in Cryptography, SAC, Springer-Verlag
-
Hess, F.: Efficient Identity based Signature Schemes Based on Pairings. Proceedings of 9th Workshop on Selected Areas in Cryptography, SAC 2002, Lecture Notes in Computer Sciene, Vol. 2595. Springer-Verlag. (2003) 310-324
-
(2002)
Lecture Notes in Computer Sciene
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
24
-
-
0000901529
-
Security Arguments for Digital Signatures and Blind Signatures
-
Pointcheval, D. and Stern, J.: Security Arguments for Digital Signatures and Blind Signatures, Journal of Cryptology, No. 13, (2000) 361-396
-
(2000)
Journal of Cryptology
, Issue.13
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
25
-
-
84945129491
-
Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
-
Advances in Cryptology, EuroCrypt 2001, Springer-Verlag
-
Verheul, E.R.: Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. Advances in Cryptology, EuroCrypt 2001, Lecture Notes in Computer Sciene, Vol. 2045. Springer-Verlag. (2001) 195-210
-
(2001)
Lecture Notes in Computer Sciene
, vol.2045
, pp. 195-210
-
-
Verheul, E.R.1
|