-
1
-
-
35048823512
-
Tripartite Authenticated Key Agreement Protocols from Pairings
-
Paterson, K.G. (ed.) Cryptography and Coding 2003. Springer, Heidelberg
-
Al-Riyami, S.S., Paterson, K.G.: Tripartite Authenticated Key Agreement Protocols from Pairings. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, pp. 332-359. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2898
, pp. 332-359
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
2
-
-
84945119254
-
Entity Authentication and Key Distribution
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
84949230533
-
Key Agreement Protocols and their Security Analysis
-
Darnell, M.J. (ed.) Cryptography and Coding 1997. Springer, Heidelberg
-
Blake-Wilson, S., Johnson, D., Menezes, A.: Key Agreement Protocols and their Security Analysis. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30-45. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
4
-
-
50849092893
-
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 321-336. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 321-336
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
5
-
-
0035751060
-
-
Provably Authenticated Group Diffie-Hellman Key Exchange. ACM Press, New York
-
Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.-J.: Provably Authenticated Group Diffie-Hellman Key Exchange. In: Proceedings of the 8th ACM conference on Computer and Communications Security (CCS 2001), pp. 255-264. ACM Press, New York (2001)
-
(2001)
Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001)
, pp. 255-264
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
Quisquater, J.-J.4
-
6
-
-
38049011067
-
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust
-
Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. Springer, Heidelberg
-
Bresson, E., Manulis, M.: Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 395-409. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4610
, pp. 395-409
-
-
Bresson, E.1
Manulis, M.2
-
7
-
-
50849102269
-
Contributory Group Key Exchange in the Presence of Malicious Participants
-
Bresson, E., Manulis, M.: Contributory Group Key Exchange in the Presence of Malicious Participants. IET Information Security 2(3), 85-93 (2008)
-
(2008)
IET Information Security
, vol.2
, Issue.3
, pp. 85-93
-
-
Bresson, E.1
Manulis, M.2
-
8
-
-
77952356149
-
Securing Group Key Exchange against Strong Corruptions
-
ACM Press, New York
-
Bresson, E., Manulis, M.: Securing Group Key Exchange against Strong Corruptions. In: Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), pp. 249-260. ACM Press, New York (2008);
-
(2008)
Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008)
, pp. 249-260
-
-
Bresson, E.1
Manulis, M.2
-
10
-
-
38149080530
-
On Security Models and Compilers for Group Key Exchange Protocols
-
Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. Springer, Heidelberg
-
Bresson, E., Manulis, M., Schwenk, J.: On Security Models and Compilers for Group Key Exchange Protocols. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol. 4752, pp. 292-307. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4752
, pp. 292-307
-
-
Bresson, E.1
Manulis, M.2
Schwenk, J.3
-
11
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
-
Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
12
-
-
33646841393
-
-
Cryptology ePrint Archive, Report 2004/079
-
Cheng, Z., Vasiu, L., Comley, R.: Pairing-based one-round tripartite key agreement protocols. Cryptology ePrint Archive, Report 2004/079 (2004)
-
(2004)
Pairing-based One-round Tripartite Key Agreement Protocols
-
-
Cheng, Z.1
Vasiu, L.2
Comley, R.3
-
13
-
-
68849108882
-
Session-state reveal is stronger than ephemeral key reveal: Attacking the NAXOS key exchange protocol
-
Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. Springer, Heidelberg
-
Cremers, C.: Session-state reveal is stronger than ephemeral key reveal: Attacking the NAXOS key exchange protocol. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 20-33. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5536
, pp. 20-33
-
-
Cremers, C.1
-
15
-
-
67049155509
-
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
-
Jarecki, S., Tsudik, G. (eds.) Public Key Cryptography - PKC 2009. Springer, Heidelberg
-
Gorantla, M.C., Boyd, C., González-Nieto, J.M.: Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. In: Jarecki, S., Tsudik, G. (eds.) Public Key Cryptography - PKC 2009. LNCS, vol. 5443, pp. 105-123. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 105-123
-
-
Gorantla, M.C.1
Boyd, C.2
González-Nieto, J.M.3
-
16
-
-
77952389096
-
Universally Composable Contributory Group Key Exchange
-
ACM Press, New York
-
Gorantla, M.C., Boyd, C., González-Nieto, J.M.: Universally Composable Contributory Group Key Exchange. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS 2009), pp. 146-156. ACM Press, New York (2009)
-
(2009)
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS 2009)
, pp. 146-156
-
-
Gorantla, M.C.1
Boyd, C.2
González-Nieto, J.M.3
-
17
-
-
34548783058
-
Tripartite Key Exchange in the Canetti-Krawczyk Proof Model
-
Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. Springer, Heidelberg
-
Hitchcock, Y., Boyd, C., Nieto, J.M.G.: Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 17-32. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3348
, pp. 17-32
-
-
Hitchcock, Y.1
Boyd, C.2
Nieto, J.M.G.3
-
18
-
-
84946844750
-
A one round protocol for tripartite Diffie-Hellman
-
Bosma, W. (ed.) ANTS 2000. Springer, Heidelberg
-
Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 385-393. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1838
, pp. 385-393
-
-
Joux, A.1
-
19
-
-
23944461491
-
A one round protocol for tripartite Diffie-Hellman
-
Joux, A.: A one round protocol for tripartite Diffie-Hellman. Journal of Cryptology 17(4), 263-276 (2004)
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 263-276
-
-
Joux, A.1
-
20
-
-
67649746889
-
An unknown key-share attack on the mqv key agreement protocol
-
doi:10.1145/501978.501981
-
Kaliski Jr., B.S.: An unknown key-share attack on the mqv key agreement protocol. ACM Transaction on Information and System Security 4(3), 275-288 (2001) doi:10.1145/501978.501981
-
(2001)
ACM Transaction on Information and System Security
, vol.4
, Issue.3
, pp. 275-288
-
-
Kaliski Jr., B.S.1
-
22
-
-
35248878854
-
Scalable protocols for authenticated group key exchange
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110-125. Springer, Heidelberg (2003), http://eprint.iacr.org/2003/171
-
(2003)
LNCS
, vol.2729
, pp. 110-125
-
-
Katz, J.1
Yung, M.2
-
24
-
-
33745179557
-
HMQV: A high-performance secure Diffie-Hellman protocol
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Krawczyk, H.: HMQV: A high-performance secure Diffie-Hellman protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 546-566
-
-
Krawczyk, H.1
-
25
-
-
54249158637
-
-
Cryptology ePrint Archive, Report 2006/073
-
LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. Cryptology ePrint Archive, Report 2006/073 (2006)
-
(2006)
Stronger Security of Authenticated Key Exchange
-
-
LaMacchia, B.1
Lauter, K.2
Mityagin, A.3
-
26
-
-
38149012093
-
Stronger Security of Authenticated Key Exchange
-
Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. Springer, Heidelberg
-
LaMacchia, B., Lauter, K., Mityagin, A.: Stronger Security of Authenticated Key Exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1-16. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4784
, pp. 1-16
-
-
LaMacchia, B.1
Lauter, K.2
Mityagin, A.3
-
27
-
-
74549221711
-
An efficient protocol for authenticated key agreement
-
Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.: An efficient protocol for authenticated key agreement. Designs, Codes and Cryptography 28(2), 119-134 (2003)
-
(2003)
Designs, Codes and Cryptography
, vol.28
, Issue.2
, pp. 119-134
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
28
-
-
77954583124
-
-
Cryptology ePrint Archive, Report 2007/411
-
Lim, M.-H., Lee, S., Lee, H.: Cryptanalysis on improved one-round Lin-Li's tripartite key agreement protocol. Cryptology ePrint Archive, Report 2007/411
-
Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol
-
-
Lim, M.-H.1
Lee, S.2
Lee, H.3
-
29
-
-
38049152611
-
An enhanced one-round pairing-based tripartite authenticated key agreement protocol
-
Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part II. Springer, Heidelberg
-
Lim, M.-H., Lee, S., Park, Y.-H., Lee, H.-J.: An enhanced one-round pairing-based tripartite authenticated key agreement protocol. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part II. LNCS, vol. 4706, pp. 503-513. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4706
, pp. 503-513
-
-
Lim, M.-H.1
Lee, S.2
Park, Y.-H.3
Lee, H.-J.4
-
30
-
-
33744495128
-
Secure one-round tripartite authenticated key agreement protocol from Weil pairing
-
Shibata, Y., Shih, T.K. (eds.) IEEE, Los Alamitos
-
Lin, C.-H., Lin, H.-H.: Secure one-round tripartite authenticated key agreement protocol from Weil pairing. In: Shibata, Y., Shih, T.K. (eds.) 19th International Conference on Advanced Information Networking and Applications - AINA 2005, vol. 2, pp. 135-138. IEEE, Los Alamitos (2005)
-
(2005)
19th International Conference on Advanced Information Networking and Applications - AINA 2005
, vol.2
, pp. 135-138
-
-
Lin, C.-H.1
Lin, H.-H.2
-
32
-
-
70349847680
-
Comparing the Pre- and Post-specified Peer Models for Key Agreement
-
Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. Springer, Heidelberg
-
Menezes, A., Ustaoglu, B.: Comparing the Pre- and Post-specified Peer Models for Key Agreement. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 53-68. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5107
, pp. 53-68
-
-
Menezes, A.1
Ustaoglu, B.2
-
33
-
-
0037461914
-
Efficient one round tripartite authenticated key agreement protocol from Weil pairing
-
Shim, K.: Efficient one round tripartite authenticated key agreement protocol from Weil pairing. IET Electronics Letters 39(2), 208-209 (2003)
-
(2003)
IET Electronics Letters
, vol.39
, Issue.2
, pp. 208-209
-
-
Shim, K.1
-
35
-
-
77954589852
-
Comparing SessionState Reveal and EphemeralKeyReveal for Diffie-Hellman protocols
-
To appear in
-
Ustaoglu, B.: Comparing SessionState Reveal and EphemeralKeyReveal for Diffie-Hellman protocols. To appear in ProvSec 2009 (2009)
-
ProvSec 2009 (2009)
-
-
Ustaoglu, B.1
|