-
1
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In EUROCRYPT, pages 139-155, 2000.
-
(2000)
EUROCRYPT
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
2
-
-
84945119254
-
Entity authentication and key distribution
-
D. R. Stinson, editor, CRYPTO, of, Springer
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In D. R. Stinson, editor, CRYPTO, volume 773 of Lecture Notes in Computer Science, pages 232-249. Springer, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
0001940580
-
Provably secure session key distribution: The three party case
-
ACM
-
M. Bellare and P. Rogaway. Provably secure session key distribution: the three party case. In STOC, pages 57-66. ACM, 1995.
-
(1995)
STOC
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
J. Kilian, editor, CRYPTO, of, Springer
-
D. Boneh and M. K. Franklin. Identity-based encryption from the weil pairing. In J. Kilian, editor, CRYPTO, volume 2139 of Lecture Notes in Computer Science, pages 213-229. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
5
-
-
70349858083
-
Efficient one-round key exchange in the standard model
-
Y. Mu, W. Susilo, and J. Seberry, editors, ACISP, of, Springer
-
C. Boyd, Y. Cliff, J. G. Nieto, and K. G. Paterson. Efficient one-round key exchange in the standard model. In Y. Mu, W. Susilo, and J. Seberry, editors, ACISP, volume 5107 of Lecture Notes in Computer Science, pages 69-83. Springer, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5107
, pp. 69-83
-
-
Boyd, C.1
Cliff, Y.2
Nieto, J.G.3
Paterson, K.G.4
-
6
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
B. Pfitzmann, editor, EUROCRYPT, of, Springer
-
R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In B. Pfitzmann, editor, EUROCRYPT, volume 2045 of Lecture Notes in Computer Science, pages 453-474. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
7
-
-
44449176564
-
The twin diffie-hellman problem and applications
-
N. P. Smart, editor, EUROCRYPT, of, Springer
-
D. Cash, E. Kiltz, and V. Shoup. The twin diffie-hellman problem and applications. In N. P. Smart, editor, EUROCRYPT, volume 4965 of Lecture Notes in Computer Science, pages 127-145. Springer, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.4965
, pp. 127-145
-
-
Cash, D.1
Kiltz, E.2
Shoup, V.3
-
8
-
-
34347393777
-
Identity-based key agreement protocols from pairings
-
L. Chen, Z. Cheng, and N. P. Smart. Identity-based key agreement protocols from pairings. Int. J. Inf. Sec., 6 (4):213-241, 2007.
-
(2007)
Int. J. Inf. Sec.
, vol.6
, Issue.4
, pp. 213-241
-
-
Chen, L.1
Cheng, Z.2
Smart, N.P.3
-
10
-
-
33646805409
-
Examining indistinguishability-based proof models for key establishment protocols
-
B. K. Roy, editor, ASIACRYPT, of, Springer
-
K.-K. R. Choo, C. Boyd, and Y. Hitchcock. Examining indistinguishability- based proof models for key establishment protocols. In B. K. Roy, editor, ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, pages 585-604. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3788
, pp. 585-604
-
-
Choo, R.K.-K.1
Boyd, C.2
Hitchcock, Y.3
-
11
-
-
33646180371
-
On session key construction in provably-secure key establishment protocols
-
E. Dawson and S. Vaudenay, editors, Mycrypt, of, Springer
-
K.-K. R. Choo, C. Boyd, and Y. Hitchcock. On session key construction in provably-secure key establishment protocols. In E. Dawson and S. Vaudenay, editors, Mycrypt, volume 3715 of Lecture Notes in Computer Science, pages 116-131. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3715
, pp. 116-131
-
-
Choo, R.K.-K.1
Boyd, C.2
Hitchcock, Y.3
-
12
-
-
38149091828
-
Strongly-secure identity-based key agreement and anonymous extension
-
J. A. Garay, A. K. Lenstra, M. Mambo, and R. Peralta, editors, ISC, of, Springer
-
S. S. M. Chow and K.-K. R. Choo. Strongly-secure identity-based key agreement and anonymous extension. In J. A. Garay, A. K. Lenstra, M. Mambo, and R. Peralta, editors, ISC, volume 4779 of Lecture Notes in Computer Science, pages 203-220. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4779
, pp. 203-220
-
-
Chow, S.S.M.1
Choo, R.K.-K.2
-
13
-
-
33745179557
-
Hmqv: A high-performance secure diffie-hellman protocol
-
V. Shoup, editor, CRYPTO, of, Springer
-
H. Krawczyk. Hmqv: A high-performance secure diffie-hellman protocol. In V. Shoup, editor, CRYPTO, volume 3621 of Lecture Notes in Computer Science, pages 546-566. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 546-566
-
-
Krawczyk, H.1
-
14
-
-
33646756559
-
Modular security proofs for key agreement protocols
-
B. K. Roy, editor, ASIACRYPT, of, Springer
-
C. Kudla and K. G. Paterson. Modular security proofs for key agreement protocols. In B. K. Roy, editor, ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, pages 549-565. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3788
, pp. 549-565
-
-
Kudla, C.1
Paterson, K.G.2
-
15
-
-
38149012093
-
Stronger security of authenticated key exchange
-
W. Susilo, J. K. Liu, and Y. Mu, editors, ProvSec, of, Springer
-
B. A. LaMacchia, K. Lauter, and A. Mityagin. Stronger security of authenticated key exchange. In W. Susilo, J. K. Liu, and Y. Mu, editors, ProvSec, volume 4784 of Lecture Notes in Computer Science, pages 1-16. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4784
, pp. 1-16
-
-
Lamacchia, B.A.1
Lauter, K.2
Mityagin, A.3
-
16
-
-
24144458508
-
A new two-party identity-based authenticated key agreement
-
A. Menezes, editor, CT-RSA, of, Springer
-
N. McCullagh and P. S. L. M. Barreto. A new two-party identity-based authenticated key agreement. In A. Menezes, editor, CT-RSA, volume 3376 of Lecture Notes in Computer Science, pages 262-274. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 262-274
-
-
McCullagh, N.1
Barreto, P.S.L.M.2
-
17
-
-
84937389342
-
The gap-problems: A new class of problems for the security of cryptographic schemes
-
K. Kim, editor, Public Key Cryptography, of, Springer
-
T. Okamoto and D. Pointcheval. The gap-problems: A new class of problems for the security of cryptographic schemes. In K. Kim, editor, Public Key Cryptography, 1volume 1992 of Lecture Notes in Computer Science, pages 104-118. Springer, 2001.
-
(1992)
Lecture Notes in Computer Science
, vol.1
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
-
18
-
-
0037142442
-
An identity based authenticated key agreement protocol based on the weil pairing
-
N. Smart. An identity based authenticated key agreement protocol based on the weil pairing. Electronics Letters, 38:630-632, 2002.
-
(2002)
Electronics Letters
, vol.38
, pp. 630-632
-
-
Smart, N.1
|