-
1
-
-
84969368443
-
An identity-based key-exchange protocol
-
Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989, Springer, Heidelberg
-
Günther, C.: An identity-based key-exchange protocol. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol.434, pp. 29-37. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.434
, pp. 29-37
-
-
Günther, C.1
-
3
-
-
77956569636
-
From Dolev-Yao to strong adaptive corruption: Analyzing security in the presence of compromising adversaries
-
Basin, D., Cremers, C.: From Dolev-Yao to strong adaptive corruption: Analyzing security in the presence of compromising adversaries. Cryptology ePrint Archive, Report 2009/079 (2009), http://eprint.iacr.org/
-
(2009)
Cryptology EPrint Archive, Report 2009/079
-
-
Basin, D.1
Cremers, C.2
-
4
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Pfitzmann, B. (ed.) EUROCRYPT 2001, Springer, Heidelberg
-
Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.2045, pp. 453-474. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
5
-
-
38149012093
-
Stronger security of authenticated key exchange
-
Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007, Springer, Heidelberg
-
LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol.4784, pp. 1-16. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4784
, pp. 1-16
-
-
Lamacchia, B.1
Lauter, K.2
Mityagin, A.3
-
6
-
-
0004023090
-
-
(version 4) (November, revision of IBM Research Report RZ 3120 (April 1999)
-
Shoup, V.: On formal models for secure key exchange (version 4) (November 1999); revision of IBM Research Report RZ 3120 (April 1999)
-
(1999)
On Formal Models for Secure Key Exchange
-
-
Shoup, V.1
-
7
-
-
77952356149
-
Securing group key exchange against strong corruptions
-
ACM, New York
-
Bresson, E., Manulis, M.: Securing group key exchange against strong corruptions. In: ASIACCS, pp. 249-260. ACM, New York (2008)
-
(2008)
ASIACCS
, pp. 249-260
-
-
Bresson, E.1
Manulis, M.2
-
8
-
-
84955559079
-
Authenticated multi-party key agreement
-
Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996, Springer, Heidelberg
-
Just, M., Vaudenay, S.: Authenticated multi-party key agreement. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol.1163, pp. 36-49. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1163
, pp. 36-49
-
-
Just, M.1
Vaudenay, S.2
-
10
-
-
0001940580
-
Provably secure session key distribution: The three party case
-
ACM, New York
-
Bellare, M., Rogaway, P.: Provably secure session key distribution: the three party case. In: Proc. STOC 1995, pp. 57-66. ACM, New York (1995)
-
(1995)
Proc. STOC 1995
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
11
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Preneel, B. (ed.) EUROCRYPT 2000, Springer, Heidelberg
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.1807, pp. 139-155. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
12
-
-
84945119254
-
Entity authentication and key distribution
-
Stinson, D.R. (ed.) CRYPTO 1993, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.773, pp. 232-249. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
13
-
-
35248878854
-
Scalable protocols for authenticated group key exchange
-
Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.2729, pp. 110-125. Springer, Heidelberg (2003) (Pubitemid 137636938)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2729
, pp. 110-125
-
-
Katz, J.1
Yung, M.2
-
14
-
-
48949088211
-
The Scyther Tool: Verification, falsification, and analysis of security protocols
-
Gupta, A., Malik, S. (eds.) CAV 2008, Springer, Heidelberg
-
Cremers, C.: The Scyther Tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol.5123, pp. 414-418. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5123
, pp. 414-418
-
-
Cremers, C.1
-
15
-
-
0342658605
-
Breaking and fixing the needham-schroeder public-key protocol using FDR
-
Tools and Algorithms for the Construction and Analysis of Systems
-
Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.1055, pp. 147-166. Springer, Heidelberg (1996) (Pubitemid 126050413)
-
(1996)
Lecture Notes in Computer Science
, Issue.1055
, pp. 147-166
-
-
Lowe, G.1
-
16
-
-
33750487822
-
Injective synchronisation: An extension of the authentication hierarchy
-
Cremers, C., Mauw, S., de Vink, E.: Injective synchronisation: an extension of the authentication hierarchy. Theoretical Computer Science, 139-161 (2006)
-
(2006)
Theoretical Computer Science
, pp. 139-161
-
-
Cremers, C.1
Mauw, S.2
De Vink, E.3
-
18
-
-
67650240831
-
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
-
ACM, New York
-
Cremers, C.: Unbounded verification, falsification, and characterization of security protocols by pattern refinement. In: CCS 2008: Proc. of the 15th ACM conference on Computer and communications security, pp. 119-128. ACM, New York (2008)
-
(2008)
CCS 2008: Proc. of the 15th ACM Conference on Computer and Communications Security
, pp. 119-128
-
-
Cremers, C.1
-
20
-
-
31844437459
-
Towards computationally sound symbolic analysis of key exchange protocols
-
ACM, New York
-
Gupta, P., Shmatikov, V.: Towards computationally sound symbolic analysis of key exchange protocols. In: Proc. FMSE 2005, pp. 23-32. ACM, New York (2005)
-
(2005)
Proc. FMSE 2005
, pp. 23-32
-
-
Gupta, P.1
Shmatikov, V.2
-
21
-
-
35048878818
-
One-round protocols for two-party authenticated key exchange
-
Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004, Springer, Heidelberg
-
Jeong, I.R., Katz, J., Lee, D.H.: One-round protocols for two-party authenticated key exchange. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol.3089, pp. 220-232. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3089
, pp. 220-232
-
-
Jeong, I.R.1
Katz, J.2
Lee, D.H.3
-
23
-
-
77954616596
-
One-round key exchange in the standard model
-
Boyd, C., Cliff, Y., Nieto, J.M.G., Paterson, K.G.: One-round key exchange in the standard model. IJACT 1(3), 181-199 (2009)
-
(2009)
IJACT
, vol.1
, Issue.3
, pp. 181-199
-
-
Boyd, C.1
Cliff, Y.2
Nieto, J.M.G.3
Paterson, K.G.4
-
24
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Communications of the ACM 21(12), 993-999 (1978)
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
25
-
-
77956577809
-
-
CCITT: The directory authentification framework, Version 7
-
CCITT: The directory authentification framework, Draft Recommendation X.509, Version 7 (1987)
-
(1987)
Draft Recommendation X.509
-
-
|