-
1
-
-
35048856922
-
Validation of elliptic curve public keys
-
Desmedt, Y. G. ed., Springer, Heidelberg
-
Antipa, A., Brown, D., Menezes, A., Struik, R., Vanstone, S.: Validation of elliptic curve public keys. In: Desmedt, Y. G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 211-223. Springer, Heidelberg (2002)
-
(2002)
PKC 2003. LNCS
, vol.2567
, pp. 211-223
-
-
Antipa, A.1
Brown, D.2
Menezes, A.3
Struik, R.4
Vanstone, S.5
-
2
-
-
0142156713
-
Variations of diffie-hellman problem
-
Qing, S., Gollmann, D., Zhou, J. eds., Springer, Heidelberg
-
Bao, F., Deng, R. H., Zhu, H.: Variations of diffie-hellman problem. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 301-312. Springer, Heidelberg (2003)
-
(2003)
ICICS 2003. LNCS
, vol.2836
, pp. 301-312
-
-
Bao, F.1
Deng, R.H.2
Zhu, H.3
-
3
-
-
35048881545
-
The knowledge-of-exponent assumptions and 3-round zeroknowledge protocols
-
Franklin, M. ed., Springer, Heidelberg
-
Bellare, M., Palacio, A.: The knowledge-of-exponent assumptions and 3-round zeroknowledge protocols. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 273-289. Springer, Heidelberg (2004)
-
(2004)
CRYPTO 2004. LNCS
, vol.3152
, pp. 273-289
-
-
Bellare, M.1
Palacio, A.2
-
4
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Preneel, B. ed., Springer, Heidelberg
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2001)
-
(2001)
EUROCRYPT 2000. LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
5
-
-
0005078946
-
Entity authentication and key distribution
-
Stinson, D. R. ed., Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D. R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 110-125. Springer, Heidelberg (1993)
-
(1993)
CRYPTO 1993. LNCS
, vol.773
, pp. 110-125
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
0001940580
-
Provably secure session key distribution: The three party case
-
Bellare, M., Rogaway, P.: Provably secure session key distribution: the three party case. In: STOC 1995, pp. 57-66 (1995)
-
(1995)
STOC 1995
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
33646760559
-
Minimizing the use of random oracles in authenticated encryption schemes
-
Han, Y., Quing, S. eds., Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Minimizing the use of random oracles in authenticated encryption schemes. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 1-16. Springer, Heidelberg (1997)
-
(1997)
ICICS 1997. LNCS
, vol.1334
, pp. 1-16
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Pfitzmann, B. ed., Springer, Heidelberg
-
Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001)
-
(2001)
EUROCRYPT 2001. LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
9
-
-
44449176564
-
The twin diffie-hellman problem and applications
-
Smart, N. P. ed., Springer, Heidelberg
-
Cash, D., Kiltz, E., Shoup, V.: The twin diffie-hellman problem and applications. In: Smart, N. P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 127-145. Springer, Heidelberg (2008)
-
(2008)
EUROCRYPT 2008. LNCS
, vol.4965
, pp. 127-145
-
-
Cash, D.1
Kiltz, E.2
Shoup, V.3
-
11
-
-
77956326531
-
Strongly secure authenticated key exchange protocol based on computational Diffie-Hellman problem
-
Huang, H., Cao, Z.: Strongly secure authenticated key exchange protocol based on computational Diffie-Hellman problem. In: Inscrypt 2008 (2008)
-
(2008)
Inscrypt 2008
-
-
Huang, H.1
Cao, Z.2
-
12
-
-
33745179557
-
HMQV: A high-performance secure diffie-hellman protocol
-
Shoup, V. ed., Springer, Heidelberg
-
Krawczyk, H.: HMQV: A high-performance secure diffie-hellman protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005)
-
(2005)
CRYPTO 2005. LNCS
, vol.3621
, pp. 546-566
-
-
Krawczyk, H.1
-
13
-
-
74549221711
-
An efficient protocol for authenticated key agreement
-
Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.: An efficient protocol for authenticated key agreement. Designs, Codes and Cryptography 28, 119-134 (2003)
-
(2003)
Designs, Codes and Cryptography
, vol.28
, pp. 119-134
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
14
-
-
0346761973
-
A key recovery attack on discrete log-based schemes using a prime order subgroup
-
Kaliski Jr., B. S. ed., Springer, Heidelberg
-
Lim, C. H., Lee, P. J.: A key recovery attack on discrete log-based schemes using a prime order subgroup. In: Kaliski Jr., B. S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 249-263. Springer, Heidelberg (1994)
-
(1994)
CRYPTO 1997. LNCS
, vol.1294
, pp. 249-263
-
-
Lim, C.H.1
Lee, P.J.2
-
15
-
-
38149012093
-
Stronger security of authenticated key exchange
-
Susilo, W., Liu, J. K., Mu, Y. eds., Springer, Heidelberg
-
LaMacchia, B. A., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J. K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1-16. Springer, Heidelberg (2007)
-
(2007)
ProvSec 2007. LNCS
, vol.4784
, pp. 1-16
-
-
LaMacchia, B.A.1
Lauter, K.2
Mityagin, A.3
-
20
-
-
84944878354
-
-
USA. CRC Press, Boca Raton, Florida
-
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of applied cryptography, Florida, USA. CRC Press, Boca Raton (1997)
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Oorschot, P.2
Vanstone, S.3
-
21
-
-
85009720314
-
On the importance of public-key validation in the MQV and HMQV key agreement protocols
-
Barua, R., Lange, T. eds., Springer, Heidelberg
-
Menezes, A., Ustaoglu, B.: On the importance of public-key validation in the MQV and HMQV key agreement protocols. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 133-147. Springer, Heidelberg (2006)
-
(2006)
INDOCRYPT 2006. LNCS
, vol.4329
, pp. 133-147
-
-
Menezes, A.1
Ustaoglu, B.2
-
22
-
-
38149140189
-
Authenticated key exchange and key encapsulation in the standard model
-
Kurosawa, K. ed., Springer, Heidelberg
-
Okamoto, T.: Authenticated key exchange and key encapsulation in the standard model. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 474-484. Springer, Heidelberg (2007)
-
(2007)
ASIACRYPT 2007. LNCS
, vol.4833
, pp. 474-484
-
-
Okamoto, T.1
-
23
-
-
84937389342
-
The Gap-Problems: A new class of problems for the security of cryptographic schemes
-
Kim, K.-c. ed., Springer, Heidelberg
-
Okamoto, T., Pointcheval, D.: The Gap-Problems: A new class of problems for the security of cryptographic schemes. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 104-118. Springer, Heidelberg (2001)
-
(2001)
PKC 2001. LNCS
, vol.1992
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
-
24
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Pointcheval, D., Stern, J.: Security Arguments for Digital Signatures and Blind Signatures. J. of Cryptology 13(3), 361-396 (2000)
-
(2000)
J. of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
25
-
-
38649136602
-
Obtaining a secure and efficient key agreement protocol for (H) MQV and NAXOS. Designs
-
Ustaǒglu, B.: Obtaining a secure and efficient key agreement protocol for (H) MQV and NAXOS. Designs, Codes and Cryptography 46(3), 329-342(2008), http://eprint.iacr.org/2007/123
-
(2008)
Codes and Cryptography
, vol.46
, Issue.3
, pp. 329-342
-
-
Ustaǒglu, B.1
-
26
-
-
77956319923
-
Efficient key exchange with tight security reduction
-
University of Waterloo
-
Wu, J., Ustaǒglu, B.: Efficient Key Exchange with Tight Security Reduction, Technical Report CACR 2009-23, University of Waterloo (2009), http://www.cacr.math.uwaterloo.ca/techreports/2009/cacr2009-23.pdf
-
(2009)
Technical Report CACR 2009-23
-
-
Wu, J.1
Ustaǒglu, B.2
|