-
1
-
-
84945119254
-
Node authentication and key distribution
-
LNCS
-
M. Bellare, P. Rogaway, Node authentication and key distribution, Advances in Cryptology-Crypto 1993, LNCS, vol. 773, 1993, pp. 232-249.
-
(1993)
Advances in Cryptology-Crypto 1993
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
2
-
-
84949230533
-
Key agreement protocols and their security analysis
-
LNCS
-
S. Blake-Wilson, C. Johnson, A. Menezes, Key agreement protocols and their security analysis, in: Proceedings of the Sixth IMA International Conference on Cryptography and Coding, LNCS, vol. 1355, 30C45, 1997.
-
(1997)
Proceedings of the Sixth IMA International Conference on Cryptography and Coding
, vol.1355
-
-
Blake-Wilson, S.1
Johnson, C.2
Menezes, A.3
-
3
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
LNCS
-
D. Boneh, X. Boyen, E. Goh, Hierarchical identity based encryption with constant size ciphertext, in: Proceedings of Eurocrypt'05, LNCS, vol. 3493, 2005, pp. 440-456.
-
(2005)
Proceedings of Eurocrypt'05
, vol.3493
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.3
-
4
-
-
84874324906
-
Identity based encryption from the weil pairing
-
LNCS
-
D. Boneh, M. Franklin, Identity based encryption from the weil pairing. Advances in Cryptology-Crypto 2001, LNCS, vol. 2139, 2001, pp. 213-229.
-
(2001)
Advances in Cryptology-Crypto 2001
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
84946840347
-
Short signatures from the weil pairing
-
LNCS
-
D. Boneh, B. Lynn, H. Shacham, Short signatures from the weil pairing, in: Proceedings of Asiacrypt'01, LNCS, vol. 2248, 2001, pp. 514-532.
-
(2001)
Proceedings of Asiacrypt'01
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
6
-
-
70349858083
-
Efficient one-round key exchange in the standard model
-
LNCS 2008
-
Colin Boyd, Yvonne Cliff, Juan Gonzalez Nieto, Kenneth G. Paterson, Efficient one-round key exchange in the standard model, in: Proceedings of ACISP, 2008, LNCS, vol. 5107, 2008, pp. 69-83.
-
(2008)
Proceedings of ACISP
, vol.5107
, pp. 69-83
-
-
Boyd, C.1
Cliff, Y.2
Gonzalez Nieto, J.3
Paterson, K.G.4
-
7
-
-
35048899816
-
Key agreement using statically keyed authenticators
-
LNCS
-
C. Boyd, W. Mao, K. Paterson, Key agreement using statically keyed authenticators, in: Applied Cryptography and Network Security: Second International Conference-ACNS 2004, LNCS, vol. 3089, 2004, pp. 248-262.
-
(2004)
Applied Cryptography and Network Security: Second International Conference-ACNS 2004
, vol.3089
, pp. 248-262
-
-
Boyd, C.1
Mao, W.2
Paterson, K.3
-
9
-
-
78049296439
-
A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
-
X. Cao, W. Kou, and X. Du A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges Information Sciences 180 15 2010 2895 2903
-
(2010)
Information Sciences
, vol.180
, Issue.15
, pp. 2895-2903
-
-
Cao, X.1
Kou, W.2
Du, X.3
-
11
-
-
84944050090
-
Applications of multiple trust authorities in pairing based cryptosystems
-
LNCS
-
L. Chen, K.Harrison, D. Soldera, N. Smart, Applications of multiple trust authorities in pairing based cryptosystems, in: Proceedings of the International Conference on Infrastructure Security (InfraSec 2002), LNCS, vol. 2437, 2002, pp. 260-275.
-
(2002)
Proceedings of the International Conference on Infrastructure Security (InfraSec 2002)
, vol.2437
, pp. 260-275
-
-
Chen, L.1
Harrison, K.2
Soldera, D.3
Smart, N.4
-
13
-
-
38149061118
-
On the indistinguishability-based security model of key agreement protocols-simple cases
-
Z. Cheng, M. Nistazakis, R. Comley, L. Vasiu, On the indistinguishability-based security model of key agreement protocols-simple cases, in: Proceedings of ACNS 2004 (technical track), 2004.
-
(2004)
Proceedings of ACNS 2004 (Technical Track)
-
-
Cheng, Z.1
Nistazakis, M.2
Comley, R.3
Vasiu, L.4
-
14
-
-
10444220191
-
Efficient identity-based authticated key agreement protocol from pairings
-
Y. Choie, E. Jeong, and E. Lee Efficient identity-based authticated key agreement protocol from pairings Applied Mathematics and Computation 162 2005 179 188
-
(2005)
Applied Mathematics and Computation
, vol.162
, pp. 179-188
-
-
Choie, Y.1
Jeong, E.2
Lee, E.3
-
15
-
-
77952088182
-
Making the Diffie-Hellman protocol identity-based
-
Dario Fiore1, Rosario Gennaro, Making the Diffie-Hellman protocol identity-based, in: Topics in Cryptology - CT-RSA 2010, vol. 5985, 2010, pp. 165-178.
-
(2010)
Topics in Cryptology - CT-RSA 2010
, vol.5985
, pp. 165-178
-
-
Fiore, D.1
Gennaro, R.2
-
16
-
-
78449304131
-
Novel and efficient identity-based authenticated key agreement protocols from weil pairings
-
LNCS
-
H. Guo, Y. Mu, X. Zhang, Z. Li, Novel and efficient identity-based authenticated key agreement protocols from weil pairings, in: UIC 2009, LNCS, vol. 5585, 2009, pp. 309-323.
-
(2009)
UIC 2009
, vol.5585
, pp. 309-323
-
-
Guo, H.1
Mu, Y.2
Zhang, X.3
Li, Z.4
-
17
-
-
77949732329
-
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
-
H. Guo, Y. Mu, X. Zhang, and Z. Li Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security International Journal of Security and Networks 5 2/3 2010 173 187
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 173-187
-
-
Guo, H.1
Mu, Y.2
Zhang, X.3
Li, Z.4
-
18
-
-
4944240675
-
Authenticated key exchange provably secure against the man-in-the-middle attack
-
A. Johnston, and P. Gemmell Authenticated key exchange provably secure against the man-in-the-middle attack Journal of Cryptology 15 2 2002 139 148
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 139-148
-
-
Johnston, A.1
Gemmell, P.2
-
19
-
-
84946844750
-
A One round protocol for tripartite Diffie-Hellman
-
LNCS
-
A. Joux, A One round protocol for tripartite Diffie-Hellman, in: Proceedings of Algorithmtic Number Theory Symposium IV, LNCS, vol. 1838, 2000, pp. 385-394.
-
(2000)
Proceedings of Algorithmtic Number Theory Symposium IV
, vol.1838
, pp. 385-394
-
-
Joux, A.1
-
20
-
-
24144458508
-
A new two-party identitybased authenticated key agreement
-
LNCS
-
N. McCullagh, P.S.L.M. Barreto, A new two-party identitybased authenticated key agreement, in: Proceedings of CT-RSA 2005, LNCS, vol. 3376, 2005, pp. 262-274.
-
(2005)
Proceedings of CT-RSA 2005
, vol.3376
, pp. 262-274
-
-
McCullagh, N.1
Barreto, P.S.L.M.2
-
21
-
-
33645590972
-
An efficient ID-based authenticated key agreement protocol from pairings
-
LNCS
-
E. Ryu, E. Yoon, K. Yoo, An efficient ID-based authenticated key agreement protocol from pairings, in: Networking 2004, LNCS, vol. 3042, 2004, pp. 1458-1463.
-
(2004)
Networking 2004
, vol.3042
, pp. 1458-1463
-
-
Ryu, E.1
Yoon, E.2
Yoo, K.3
-
22
-
-
52149087712
-
An identity-based key agreement protocol for the network layer
-
LNCS
-
C. Schridde, M. Smith, B. Freisleben, An identity-based key agreement protocol for the network layer, in: 6th International Conference on Security and Cryptography for Networks, SCN 2008, LNCS, vol. 5229, 2008, pp. 409-422.
-
(2008)
6th International Conference on Security and Cryptography for Networks, SCN 2008
, vol.5229
, pp. 409-422
-
-
Schridde, C.1
Smith, M.2
Freisleben, B.3
-
23
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
LNCS
-
A. Shamir, Identity-based cryptosystems and signature schemes, in: Proceedings of Advances in Cryptology-Crypto 1984, LNCS, vol. 196, 1984, pp. 47-53.
-
(1984)
Proceedings of Advances in Cryptology-Crypto 1984
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
24
-
-
0037142442
-
An identity based authenticated key agreement protocol based on the Weil pairing
-
N.P. Smart An identity based authenticated key agreement protocol based on the Weil pairing Electronics Letters 38 2002 630 632
-
(2002)
Electronics Letters
, vol.38
, pp. 630-632
-
-
Smart, N.P.1
-
25
-
-
55949109421
-
An improved identity-based key agreement protocol and its security proof
-
S. Wang, Z. Cao, and K. Choo An improved identity-based key agreement protocol and its security proof Information Sciences 179 3 2009 307 318
-
(2009)
Information Sciences
, vol.179
, Issue.3
, pp. 307-318
-
-
Wang, S.1
Cao, Z.2
Choo, K.3
-
26
-
-
38149028202
-
A new efficient ID-based authenticated key agreement protocol
-
Q. Yuan, S.A. Li, A new efficient ID-based authenticated key agreement protocol, Cryptology ePrint Archive, Report 2005/309.
-
(2005)
Cryptology EPrint Archive, Report
, pp. 309
-
-
Yuan, Q.1
Li, S.A.2
|