-
1
-
-
24944516264
-
Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Abe, M., Gennaro, R., Kurosawa, K. and Shoup, V. (2005) 'Tag- KEM/DEM: a new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM', Paper presented in the Proceedings of the Advances in Cryptology EUROCRYPT 2005, Vol. 3494 of Lecture Notes in Computer Science, pp. 128-146, Springer. Available at: http://eprint.iacr.org/2005/027, Revised 11 October, 2006. (Pubitemid 41313950)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 128-146
-
-
Abe, M.1
Gennaro, R.2
Kurosawa, K.3
Shoup, V.4
-
3
-
-
35048832490
-
An uninstantiable random-oracle-model scheme for a hybridencryption problem
-
Paper presented in the 3027 of Lecture Notes in Computer Science
-
Bellare, M., Boldyreva, A. and Palacio, A. (2004) 'An uninstantiable random-oracle-model scheme for a hybridencryption problem', Paper presented in the Proceedings of the Advances in Cryptology - EUROCRYPT 2004, Vol. 3027 of Lecture Notes in Computer Science, pp. 171-188.
-
(2004)
Proceedings of the Advances in Cryptology - EUROCRYPT 2004
, pp. 171-188
-
-
Bellare, M.1
Boldyreva, A.2
Palacio, A.3
-
4
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key exchange protocols
-
Paper presented in the ACM Press
-
Bellare, M., Canetti, R. and Krawczyk, H. (1998) 'A modular approach to the design and analysis of authentication and key exchange protocols', Paper presented in the Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, pp. 419-428. ACM Press. Available at: http://www-cse.ucsd.edu/users/ mihir/papers/keydistribution.html.
-
(1998)
Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
5
-
-
85032128552
-
Security of the cipher block chaining message authentication code
-
DOI 10.1006/jcss.1999.1694
-
Bellare, M., Kilian, J. and Rogaway, P. (2000) 'The security of the cipher block chaining message authentication code', Journal of Computer and System Sciences, Vol. 61, pp. 362-399. Available at: http://www-cse.ucsd. edu/~mihir/ papers/cbc.html. (Pubitemid 32087266)
-
(2000)
Journal of Computer and System Sciences
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
7
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
Boneh, D. and Franklin, M. (2001) 'Identity-based encryption from the weil pairing', in Kilian, J. (Ed.), Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Vol. 2139 of Lecture Notes in Computer Science, pp. 213-229. Springer Verlag. (Pubitemid 33317917)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
35048899816
-
Key agreement using statically keyed authenticators
-
3089 of Lecture Notes in Computer Science, Springer
-
Boyd, C., Mao, W. and Paterson, K.G. (2004) 'Key agreement using statically keyed authenticators', Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Vol. 3089 of Lecture Notes in Computer Science, pp. 248-262. Springer.
-
(2004)
Applied Cryptography and Network Security: Second International Conference, ACNS 2004
, pp. 248-262
-
-
Boyd, C.1
Mao, W.2
Paterson, K.G.3
-
9
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
Canetti, R. and Krawczyk, H. (2001) 'Analysis of key-exchange protocols and their use for building secure channels', Paper presented in the Proceedings of the Advances in Cryptology - Eurocrypt 2001, Vol. 2045 of Lecture Notes in Computer Science, pp. 453-474. Springer-Verlag. Available at: http://eprint.iacr.org/2001/040.ps.gz. (Pubitemid 33275848)
-
(2001)
Lecture Notes in Computer Science
, Issue.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
10
-
-
0031619016
-
The random oracle methodology, revisited
-
Paper presented in the, New York, ACM Press
-
Canetti, R., Goldreich, O. and Halevi, S. (1998) 'The random oracle methodology, revisited', Paper presented in the Proceedings of the 30th Annual ACM Symposium on Theory of Computing-STOC 98, pp. 209-218, New York, ACM Press.
-
(1998)
Proceedings of the 30th Annual ACM Symposium on Theory of Computing-STOC 98
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
11
-
-
36248932062
-
Identity-based key agreement protocols from pairings
-
Chen, L., Cheng, Z. and Smart, N.P. (2006) 'Identity-based key agreement protocols from pairings', Cryptology ePrint Archive, Report 2006/199. Available at: http://eprint.iacr.org/ 2006/199.
-
(2006)
Cryptology EPrint Archive, Report 2006/199
-
-
Chen, L.1
Cheng, Z.2
Smart, N.P.3
-
12
-
-
33746351314
-
Key derivation and randomness extraction
-
Chevassut, O., Fouque, P-A., Gaudry, P. and Pointcheval, D. (2005) 'Key derivation and randomness extraction', Cryptology ePrint Archive, Report 2005/061. Available at: http://eprint.iacr.org/2005/061.
-
(2005)
Cryptology EPrint Archive, Report 2005/061
-
-
Chevassut, O.1
Fouque, P.-A.2
Gaudry, P.3
Pointcheval, D.4
-
13
-
-
84958745695
-
Adapting the weaknesses of the random oracle model to the generic group model
-
Paper presented in the, Lecture Notes in Computer Science, Springer
-
Dent, A.W. (2002) 'Adapting the weaknesses of the random oracle model to the generic group model', Paper presented in the Proceedings of the Advances in Cryptology - ASIACRYPT 2002, Lecture Notes in Computer Science, pp. 100-109. Springer.
-
(2002)
Proceedings of the Advances in Cryptology - ASIACRYPT 2002
, pp. 100-109
-
-
Dent, A.W.1
-
15
-
-
0344839024
-
-
PhD thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology
-
Dodis, Y. (2000) Exposure-Resilient Cryptography. PhD thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology. Available at: http://theory.lcs.mit.edu/~yevgen/academic.html.
-
(2000)
Exposure-Resilient Cryptography
-
-
Dodis, Y.1
-
16
-
-
31444435304
-
Secure hashed Diffie-Hellman over non-DDH groups
-
Paper presented in the 3027 of Lecture Notes in Computer Science, Springer. Available at: Cryptology ePrint Archive), Report 2004/099.
-
Gennaro, R., Krawczyk, H. and Rabin, T. (2004) 'Secure hashed Diffie-Hellman over non-DDH groups', Paper presented in the Proceedings of the Advances in Cryptology - EUROCRYPT 2004, Vol. 3027 of Lecture Notes in Computer Science, pp. 361-381. Springer. Available at: Cryptology ePrint Archive (http://eprint.iacr.org/2004/099), Report 2004/099.
-
(2004)
Proceedings of the Advances in Cryptology - EUROCRYPT 2004
, pp. 361-381
-
-
Gennaro, R.1
Krawczyk, H.2
Rabin, T.3
-
18
-
-
35048878818
-
One-round protocols for two-party authenticated key ex-change
-
3089 of Lecture Notes in Computer Science, Springer
-
Jeong, I.R., Katz, J. and Lee, D.H. (2004) 'One-round protocols for two-party authenticated key ex-change', Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Vol. 3089 of Lecture Notes in Computer Science, pp. 220-232. Springer.
-
(2004)
Applied Cryptography and Network Security, Second International Conference, ACNS 2004
, pp. 220-232
-
-
Jeong, I.R.1
Katz, J.2
Lee, D.H.3
-
19
-
-
38049004199
-
Direct chosen-ciphertext secure identity-based encryption in the standard model with short ciphertexts
-
Kiltz, E. (2006) 'Direct chosen-ciphertext secure identity-based encryption in the standard model with short ciphertexts', Cryptology ePrint Archive, Report 2006/122. Available at: http://eprint.iacr.org/2006/122.
-
(2006)
Cryptology EPrint Archive, Report 2006/122
-
-
Kiltz, E.1
-
20
-
-
38049077895
-
Chosen-ciphertext secure key-encapsulation based on gap hashed Diffie-Hellman
-
T. Okamoto and X. Wang (Eds) 4450 of Lecture Notes in Computer Science. Springer
-
Kiltz, E. (2007) 'Chosen-ciphertext secure key-encapsulation based on gap hashed Diffie-Hellman', in T. Okamoto and X. Wang (Eds), Public Key Cryptography. Vol. 4450 of Lecture Notes in Computer Science. pp. 282-297, Springer.
-
(2007)
Public Key Cryptography.
, pp. 282-297
-
-
Kiltz, E.1
-
21
-
-
33746374619
-
Direct chosen-ciphertext secure identity-based key encapsulation with-out random oracles
-
Kiltz, E. and Galindo, D. (2006a) 'Direct chosen-ciphertext secure identity-based key encapsulation with-out random oracles', Cryptology ePrint Archive, Report 2006/034. Available at: http://eprint.iacr.org/2006/034.
-
(2006)
Cryptology EPrint Archive, Report 2006/034
-
-
Kiltz, E.1
Galindo, D.2
-
22
-
-
33746324862
-
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
-
DOI 10.1007/11780656-28, Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Proceedings
-
Kiltz, E. and Galindo, D. (2006b) 'Direct chosen-ciphertext secure identity-based key encapsulation without random oracles', 11th Australasian Conference on Information Security and Privacy - ACISP 2006, Vol. 4058 of Lecture Notes in Computer Science, pp. 336-347. Springer. Available at: http://eprint.iacr.org/2006/034. (Pubitemid 44113021)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS
, pp. 336-347
-
-
Kiltz, E.1
Galindo, D.2
-
23
-
-
85018066264
-
SKEME: A versatile secure key exchange mechanism for internet
-
Paper presented in the
-
Krawczyk, H. (1996) 'SKEME: a versatile secure key exchange mechanism for internet', Paper presented in the Proceedings of the SNDSS, Vol. 96, p.114.
-
(1996)
Proceedings of the SNDSS
, vol.96
, pp. 114
-
-
Krawczyk, H.1
-
25
-
-
38149012093
-
Stronger security of authenticated key exchange
-
W. Susilo, J.K. Liu and Y. Mu (Eds) 4784 of Lecture Notes in Computer Science, Springer
-
LaMacchia, B.A., Lauter, K. and Mityagin, A. (2007) 'Stronger security of authenticated key exchange', in W. Susilo, J.K. Liu and Y. Mu (Eds), ProvSec, Vol. 4784 of Lecture Notes in Computer Science, pp. 1-16. Springer.
-
(2007)
ProvSec
, pp. 1-16
-
-
Lamacchia, B.A.1
Lauter, K.2
Mityagin, A.3
-
26
-
-
0025106672
-
The computational complexity of universal hashing
-
Paper presented in the ACM Press
-
Mansour, Y., Nisan, N. and Tiwari, P. (1990) 'The computational complexity of universal hashing', Paper presented in the Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing - STOC '90, pp. 235-243. ACM Press.
-
(1990)
Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing - STOC '90
, pp. 235-243
-
-
Mansour, Y.1
Nisan, N.2
Tiwari, P.3
-
28
-
-
0030086632
-
Randomness is linear in space
-
DOI 10.1006/jcss.1996.0004
-
Nisan, N. and Zuckerman, D. (1996) 'Randomness is linear in space', Journal Comp. and System Science, Vol. 52, pp. 43-52. (Pubitemid 126340848)
-
(1996)
Journal of Computer and System Sciences
, vol.52
, Issue.1
, pp. 43-52
-
-
Nisan, N.1
Zuckerman, D.2
-
29
-
-
70349885919
-
New identity-based authenticated key agreement protocols from pairings (without random oracles)
-
Wang, S., Cao, Z. and Choo, K-K.R. (2006) 'New identity-based authenticated key agreement protocols from pairings (without random oracles)', Cryptology ePrint Archive, Report 2006/446. Available at: http://eprint.iacr. org/.
-
(2006)
Cryptology EPrint Archive, Report 2006/446
-
-
Wang, S.1
Cao, Z.2
Choo, K.-K.R.3
-
30
-
-
24944566040
-
Efficient Identity-Based Encryption without random oracles
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Waters, B. (2005) 'Efficient identity-based encryption without random oracles', Paper presented in the Proceedings of the Advances in Cryptology - EUROCRYPT 2005, Vol. 3494 of Lecture Notes in Computer Science, pp. 114-127. Springer. (Pubitemid 41313949)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 114-127
-
-
Waters, B.1
|