-
1
-
-
78650316951
-
-
Advan red Enrryption Standard
-
Advan red Enrryption Standard, littp://csrc.inst.guv/encryptiun/aes/.
-
-
-
-
2
-
-
24944584156
-
Collisions ni SHA-0 and reduced SHA-1
-
E. Biharn, R. Chen, A. Joux, P. Carribault, W. Jalby and C. Lernuet, Collisions ni SHA-0 and reduced SHA-1, Advances in Cryptology-EUROCRYPT'05, pp.36-57, 200S.
-
(2005)
Advances in Cryptology-EUROCRYPT'05
, pp. 36-57
-
-
Biharn, E.1
Chen, R.2
Joux, A.3
Carribault, P.4
Jalby, W.5
Lernuet, C.6
-
3
-
-
84874324906
-
Identity-based encryption from tile weil pairing
-
D. Boneh and M. Frinklin, Identity-based encryption from tile weil pairing, Advances in CryptologyCRYPTO '01, LNCS, vol.2 139, pp.2 13-229, 2001.
-
(2001)
Advances in CryptologyCRYPTO '01, LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Frinklin, M.2
-
4
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
R. Canetti and H. Krawczyk, Analysis of key-exchange protocols and their use for building secure channels, Advan ces in Cryptology-EUROCR YPT'OJ, LNCS, vol.2045, pp.453-474, 2001.
-
(2001)
Advan Ces in Cryptology-EUROCR ypt'Oj, LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
5
-
-
2342566530
-
A novel three-party encrypted key exchange protocol
-
C. C. Chang and Y. F. Chang, A novel three-party encrypted key exchange protocol, Computer Standards é Interfaces, vol.26, no.5, pp.471-476, 2004.
-
(2004)
Computer Standards é Interfaces
, vol.26
, Issue.5
, pp. 471-476
-
-
Chang, C.C.1
Chang, Y.F.2
-
7
-
-
48249099653
-
A practical three-party key exchange protocol with round efficiency
-
Y. F. Chang, A practical three-party key exchange protocol with round efficiency, International Journal of Innovative Computing, Information and Control, vol.4, no.4, pp.953-960, 2008.
-
(2008)
International Journal of Innovative Computing, Information and Control
, vol.4
, Issue.4
, pp. 953-960
-
-
Chang, Y.F.1
-
8
-
-
63549107617
-
Time-bound based authentication scheme for multi-server architecture
-
C. C. Chang, J. S. Lee and J. Y. Kuo, Time-bound based authentication scheme for multi-server architecture, International Journal of Innovative Comnp uting, Information and Control, vol.4, 110.11, pp.2987-2996, 2008.
-
(2008)
International Journal of Innovative Comnp Uting, Information and Control
, vol.4
, Issue.110
, pp. 2987-2996
-
-
Chang, C.C.1
Lee, J.S.2
Kuo, J.Y.3
-
9
-
-
35448940560
-
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks
-
H. B. Chen, T. H. Chen, W. B. Lee and C. C. Chang, Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks, Computer Standards Interfaces, vol.30, no.1-2, pp.95-99, 2008.
-
(2008)
Computer Standards Interfaces
, vol.30
, Issue.1-2
, pp. 95-99
-
-
Chen, H.B.1
Chen, T.H.2
Lee, W.B.3
Chang, C.C.4
-
10
-
-
69649092978
-
Provably secure password-based three-party key exchange with optimal message steps
-
H. Y. Chien and T. C. Wu, Provably secure password-based three-party key exchange with optimal message steps, The Computer Journal, vol.52, no.6, pp.646-655, 2009.
-
(2009)
The Computer Journal
, vol.52
, Issue.6
, pp. 646-655
-
-
Chien, H.Y.1
Wu, T.C.2
-
11
-
-
0002805220
-
Undetected on-line password guessing attacks
-
Y. Ding and P. Horster, Undetected on-line password guessing attacks, ACM Operating Systems Review, vol.29, no.4, pp.77-86, 199S.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
12
-
-
0032649638
-
The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
-
T. Frey, M. Muller and H. Thick, The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems, IEEE Trans. on Information Theory, vol.45, no.5, pp.1717-1719, 1999.
-
(1999)
IEEE Trans. on Information Theory
, vol.45
, Issue.5
, pp. 1717-1719
-
-
Frey, T.1
Muller, M.2
Thick, H.3
-
13
-
-
44849118543
-
Cryptanalysis of simple three-party key exchange protocol
-
H. Guo, Z. Li, Y. Mu and X. Zhang, Cryptanalysis of simple three-party key exchange protocol, Computerw E4 Security, vol.27, no.1-2, pp.16-21, 2008.
-
(2008)
Computerw E4 Security
, vol.27
, Issue.1-2
, pp. 16-21
-
-
Guo, H.1
Li, Z.2
Mu, Y.3
Zhang, X.4
-
15
-
-
63549093774
-
A new efficient and complete remote user authentication protocol with smart card
-
H. F. Huang and W. C. Wei, A new efficient and complete remote user authentication protocol with smart card, International Journal of Innovative Computing, Information and Control, vol.4, no.11, pp.2803-2808, 2008.
-
(2008)
International Journal of Innovative Computing, Information and Control
, vol.4
, Issue.11
, pp. 2803-2808
-
-
Huang, H.F.1
Wei, W.C.2
-
16
-
-
4043095653
-
Efficient three-party key exchange using smart cards
-
W. S. Juang, Efficient three-party key exchange using smart cards, IEEE Trans. on Consumer Electronics, vol.50, no.2, pp.619-624, 2004.
-
(2004)
IEEE Trans. on Consumer Electronics
, vol.50
, Issue.2
, pp. 619-624
-
-
Juang, W.S.1
-
17
-
-
84939573910
-
Differential power analysis
-
P. Kocher, J. Jaffe and B. Jun, Differential power analysis, Advances in Cryptology-CRYPTO'99, LNCS, vol.1666, pp1388-1391, 1999.
-
(1999)
Advances in Cryptology-CRYPTO'99, LNCS
, vol.1666
, pp. 1388-1391
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
18
-
-
33745179557
-
HMQV: A high-performance secure Diffie-Hellman protocol
-
H. Krawczyk, HMQV: A high-performance secure Diffie-Hellman protocol, Advances in CryptologyCRYPTO'05, LNCS, vol.3621, pp.546-566, 2005.
-
(2005)
Advances in CryptologyCRYPTO'05, LNCS
, vol.3621
, pp. 546-566
-
-
Krawczyk, H.1
-
19
-
-
48249142956
-
Three-round smart card-based key exchange scheme
-
J. 0. Kwon and I. R. Jeong, Three-round smart card-based key exchange scheme, IEICE Trans. on Corn mnunications, vol.E90-B, no.11, pp.3255-3258, 2007.
-
(2007)
IEICE Trans. on Corn Mnunications
, vol.90
, Issue.11
, pp. 3255-3258
-
-
Kwon, J.O.1
Jeong, I.R.2
-
20
-
-
1842715081
-
The advantages of elliptic curve cryptography for wireless security
-
K. Lauter, The advantages of elliptic curve cryptography for wireless security, IEEE Wireless Comnmnunications, vol.11, no.1, pp.62 67, 2004.
-
(2004)
IEEE Wireless Comnmnunications
, vol.11
, Issue.1
, pp. 62-67
-
-
Lauter, K.1
-
21
-
-
48249095888
-
A novel authentication protocol for multi-server architecture without smart cards
-
J. S. Lee, Y. F. Chang and C. C. Chang, A novel authentication protocol for multi-server architecture without smart cards, International Journal of Innovative Comnp uting, Informnation and Control, vol.4, no.6, pp.l3S'7-l361, 2008.
-
(2008)
International Journal of Innovative Comnp Uting, Informnation and Control
, vol.4
, Issue.6
, pp. 1357-1361
-
-
Lee, J.S.1
Chang, Y.F.2
Chang, C.C.3
-
22
-
-
35448936926
-
Identity-based broadcast signcryption
-
F. Li, X. Xin and Y. Hu, Identity-based broadcast signcryption, Computer Standards Interfaces, vol.30, no.1-2, pp.89-94, 2008.
-
(2008)
Computer Standards Interfaces
, vol.30
, Issue.1-2
, pp. 89-94
-
-
Li, F.1
Xin, X.2
Hu, Y.3
-
23
-
-
33846817471
-
Simple three-party key exchange protocol
-
R. Lu and Z. Cao, Simple three-party key exchange protocol, Computers 4 Security, vol.26, no.1, pp.94-97, 2007.
-
(2007)
Computers 4 Security
, vol.26
, Issue.1
, pp. 94-97
-
-
Lu, R.1
Cao, Z.2
-
24
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
A. Menezes, T. Okamoto and S. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field, IEEE Trans. on Information Theory, vol.39, no.5, pp.1639-16/16, 1993.
-
(1993)
IEEE Trans. on Information Theory
, vol.39
, Issue.5
, pp. 1639-1636
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
25
-
-
0036566408
-
Examining smart card security under tile threat of power analysis attacks
-
T. S. Messerges, E. A. Dabbish and R. H. Sloan, Examining smart card security under tile threat of power analysis attacks, IEEE Trans. on Computers, vol.51, no.5, pp.541-552, 2002.
-
(2002)
IEEE Trans. on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
26
-
-
32244432466
-
Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords
-
J. Nam and S. Kim, Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords, IEICE Trans. Fundamentals, vol.E89-A, no.1, pp.209-212, 2006.
-
(2006)
IEICE Trans. Fundamentals
, vol.89
, Issue.1
, pp. 209-212
-
-
Nam, J.1
Kim, S.2
-
27
-
-
42649086478
-
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
-
R. C. W. Phan, W. C. Yau and B. M. Goi, Cryptanalysis of simple three-party key exchange protocol (S-3PAKE), Information Sciences, vol.178, no.13, pp.2849-2856, 2008.
-
(2008)
Information Sciences
, vol.178
, Issue.13
, pp. 2849-2856
-
-
Phan, R.C.W.1
Yau, W.C.2
Goi, B.M.3
-
28
-
-
78650316402
-
-
ACM
-
R. L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public key cryptosysterns, Cornrnumncotiomis of flip ACM, vol.21, no.2, pp.l2O-l26, 1900.
-
(1900)
A Method for Obtaining Digital Signatures and Public Key Cryptosysterns, Cornrnumncotiomis of Flip
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
29
-
-
0003855464
-
-
2nd Edition, John Wiley & Sons Inc.
-
B. Schneier, Applied Cryptography, 2nd Edition, John Wiley & Sons Inc., 1996.
-
(1996)
Applied Cryptography
-
-
Schneier, B.1
-
30
-
-
9544230689
-
Secure key agreement protocols for three-party against guessing attacks
-
H. M. Sun, B. C. Chen and T. Hwang, Secure key agreement protocols for three-party against guessing attacks, The Journal of Systems and Software, vol.75, no.1-2, pp.63-68, 200S.
-
(2005)
The Journal of Systems and Software
, vol.75
, Issue.1-2
, pp. 63-68
-
-
Sun, H.M.1
Chen, B.C.2
Hwang, T.3
-
31
-
-
64149102436
-
A robust authentication scheme with user anonymity for wireless environments
-
R. C. Wang and W. S. Juang and C. L. Lei, A robust authentication scheme with user anonymity for wireless environments, International Journal of Innovative Comnp uting Info rmnation and Control, vol.5, no.4, pp.1069-1080, 2009.
-
(2009)
International Journal of Innovative Comnp Uting Informnation and Control
, vol.5
, Issue.4
, pp. 1069-1080
-
-
Wang, R.C.1
Juang, W.S.2
Lei, C.L.3
-
32
-
-
77956248934
-
The home network system by mutual complement of wireless and wired communications
-
K. Yamada, K. Kimura, H. Yuki and K. Yoshida, The home network system by mutual complement of wireless and wired communications, ICIC Eipress Letters, vol.2, no.1, pp.73-79, 2008.
-
(2008)
ICIC Eipress Letters
, vol.2
, Issue.1
, pp. 73-79
-
-
Yamada, K.1
Kimura, K.2
Yuki, H.3
Yoshida, K.4
-
33
-
-
42949161502
-
Improving the novel three-party encrypted key exchange protocol
-
E. J. Yoon and K. Y. Yoo, Improving the novel three-party encrypted key exchange protocol, Cornputer Standards Interfaces, vol.30, no.5, pp.309-314, 2008.
-
(2008)
Cornputer Standards Interfaces
, vol.30
, Issue.5
, pp. 309-314
-
-
Yoon, E.J.1
Yoo, K.Y.2
|