-
2
-
-
85015233534
-
Agreement of symmetric algorithm keys using Diffie-Hellman
-
ANSI-X9.42
-
ANSI-X9.42, Agreement of symmetric algorithm keys using Diffie-Hellman. In: Working Draft (1998)
-
(1998)
Working Draft
-
-
-
3
-
-
78349232894
-
Elliptic curve key agreement and key transport protocols
-
ANSI-X9.63
-
ANSI-X9.63, Elliptic curve key agreement and key transport protocols. In: Working Draft (1998)
-
(1998)
Working Draft
-
-
-
4
-
-
84937428623
-
Efficient Algorithms for Pairing-Based Cryptosystems
-
Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
-
Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient Algorithms for Pairing-Based Cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354-368. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
5
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
6
-
-
85016462400
-
Systematic design of two-party authentication protocols
-
Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
-
Bird, R., Gopal, I., Herzberg, A., Janson, P., Kutten, S., Molva, R., Yung, M.: Systematic design of two-party authentication protocols. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 44-61. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 44-61
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
7
-
-
84949230533
-
Key agreement protocols and their security analysis
-
Darnell, M.J. (ed.) Cryptography and Coding 1997. Springer, Heidelberg
-
Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30- 45. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
8
-
-
84949221411
-
Authenticated Diffie-Hellman key agreement protocols
-
Tavares, S., Meijer, H. (eds.) SAC 1998. Springer, Heidelberg
-
Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman key agreement protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 339-361. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1556
, pp. 339-361
-
-
Blake-Wilson, S.1
Menezes, A.2
-
9
-
-
24944562007
-
Hierarchical Identity Based Encryption with Constant Size Ciphertext
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
10
-
-
35048899816
-
Key Agreement Using Statically Keyed Authenticators
-
Applied Cryptography and Network Security Second International Conference, ACNS 2004 Yellow Mountain, China, June 8-11, 2004 Proceedings
-
Boyd, C., Mao, W., Paterson, K.-G.: Key agreement using statically keyed authenticators. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 248-262. Springer, Heidelberg (2004) (Pubitemid 38846744)
-
(2004)
LECTURE NOTES in COMPUTER SCIENCE
, vol.3089
, pp. 248-262
-
-
Boyd, C.1
Mao, W.2
Paterson, K.G.3
-
11
-
-
67649818515
-
On the Key- Compromise Impersonation vulnerability of One-pass key establishment protocols
-
Chalkias, K., Mpaldimtsi, F., Hristu-Varsakelis, D., Stephanides, G.: On the Key- Compromise Impersonation vulnerability of One-pass key establishment protocols. In: International Conference on Security and Cryptography - SECRYPT 2007, pp. 222-228 (2007)
-
(2007)
International Conference on Security and Cryptography - SECRYPT 2007
, pp. 222-228
-
-
Chalkias, K.1
Mpaldimtsi, F.2
Hristu-Varsakelis, D.3
Stephanides, G.4
-
12
-
-
77952514789
-
A Provably Secure One-Pass Two-Party Key Establishment Protocol
-
Chalkias, K., Halkidis, S.T., Hristu-Varsakelis, D., Stephanides, G., Alexiadis, A.: A Provably Secure One-Pass Two-Party Key Establishment Protocol. In: 3rd International SKLOIS Conference on Information Security and Cryptology - Inscrypt 2007, pp. 105-119 (2007)
-
(2007)
3rd International SKLOIS Conference on Information Security and Cryptology - Inscrypt 2007
, pp. 105-119
-
-
Chalkias, K.1
Halkidis, S.T.2
Hristu-Varsakelis, D.3
Stephanides, G.4
Alexiadis, A.5
-
14
-
-
36248981438
-
Cryptographic method and apparatus for public key exchange with authentication
-
U.S. Patent 4956865
-
Goss, K.-C.: Cryptographic method and apparatus for public key exchange with authentication. In: U.S. Patent 4956865 (1990)
-
(1990)
-
-
Goss, K.-C.1
-
16
-
-
35048878818
-
One-Round Protocols for Two-Party Authenticated Key Exchange
-
Applied Cryptography and Network Security Second International Conference, ACNS 2004 Yellow Mountain, China, June 8-11, 2004 Proceedings
-
Jeong, I., Katz, J., Lee, D.: One-round protocols for two-party authenticated key exchange. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 220-232. Springer, Heidelberg (2004) (Pubitemid 38846742)
-
(2004)
LECTURE NOTES in COMPUTER SCIENCE
, vol.3089
, pp. 220-232
-
-
Jeong, I.R.1
Katz, J.2
Lee, D.H.3
-
17
-
-
67649746889
-
An unknown key share attack on the mqv key agreement protocol
-
Springer, Heidelberg
-
Kaliski, B.: An unknown key share attack on the mqv key agreement protocol. In: ACM Transactions on Information and System Security, pp. 36-49. Springer, Heidelberg (2001)
-
(2001)
ACM Transactions on Information and System Security
, pp. 36-49
-
-
Kaliski, B.1
-
18
-
-
35248831117
-
Forward Secrecy in Password-Only Key Exchange Protocols
-
Security in Communication Networks: Third International Conference, SCN 2002 Amalfi, Italy, September 11-13, 2002 Revised Papers
-
Katz, J., Ostrovsky, R., Yung, M.: Forward secrecy in password-only key exchange protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 29-44. Springer, Heidelberg (2002) (Pubitemid 36218554)
-
(2003)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.2576
, pp. 29-44
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
19
-
-
33745179557
-
Hmqv: A high-performance secure diffie- Hellman protocol
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Krawczyk, H.: Hmqv: A high-performance secure diffie- hellman protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 546-566
-
-
Krawczyk, H.1
-
23
-
-
0005243827
-
-
Technical report CORR 98-05, University of Waterloo
-
Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.: An efficient protocol for authenticated key agreement. Technical report CORR 98-05, University of Waterloo (1998)
-
(1998)
An Efficient Protocol for Authenticated Key Agreement
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
24
-
-
67649701446
-
-
Lu, R., Cao, Z., Su, R., Shao, J.: Pairing-based two-party authenticated key agreement protocol (2005), http://eprint.iacr.org/2005/354
-
(2005)
Pairing-based Two-party Authenticated Key Agreement Protocol
-
-
Lu, R.1
Cao, Z.2
Su, R.3
Shao, J.4
-
25
-
-
0022660635
-
On seeking smart public-key distribution systems
-
Matsumoto, T., Takashima, Y., Imai, H.: On seeking smart public-key distribution systems. In: Transactions of the IECE of Japan, E69, pp. 99-106 (1986)
-
(1986)
Transactions of the IECE of Japan
, vol.E69
, pp. 99-106
-
-
Matsumoto, T.1
Takashima, Y.2
Imai, H.3
-
27
-
-
85015402934
-
Use of Elliptic Curves in Cryptography
-
Williams, H.C. (ed.) CRYPTO 1985. Springer, Heidelberg
-
Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417-426. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
29
-
-
33745292713
-
Security Analysis and Applications of Standard Key Agreement Protocols
-
Computational Science and Its Applications - ICCSA 2003
-
Oh, S., Kwak, J., Lee, S., Won, D.: Security analysis and applications of standard key agreement protocols. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L'Ecuyer, P. (eds.) ICCSA 2003. LNCS, vol. 2668, pp. 191-200. Springer, Heidelberg (2003) (Pubitemid 36658134)
-
(2003)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.2668
, pp. 191-200
-
-
Oh, S.1
Kwak, J.2
Lee, S.3
Won, D.4
-
30
-
-
33746215179
-
On the resilience of key agreement protocols to key compromise impersonation
-
Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. Springer, Heidelberg
-
Strangio, M.-A.: On the resilience of key agreement protocols to key compromise impersonation. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp. 233-247. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4043
, pp. 233-247
-
-
Strangio, M.-A.1
-
31
-
-
40749145773
-
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
-
Report 123,2007
-
Ustaoglu, B.: Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS. In: Cryptology ePrint Archive, Report 123,2007 (2007), http://eprint.iacr.org/2007/123
-
(2007)
Cryptology ePrint Archive
-
-
Ustaoglu, B.1
-
32
-
-
67649704527
-
Enhancing ck-model for key compromise impersonation resilience and identity-based key exchange
-
Report 2005/455
-
Zhu, R.W., Tian, X., Wong, D.S.: Enhancing ck-model for key compromise impersonation resilience and identity-based key exchange. Cryptology ePrint Archive, Report 2005/455 (2005), http://eprint.iacr.org/
-
(2005)
Cryptology ePrint Archive
-
-
Zhu, R.W.1
Tian, X.2
Wong, D.S.3
|