메뉴 건너뛰기




Volumn 6571 LNCS, Issue , 2011, Pages 317-334

One-pass HMQV and asymmetric key-wrapping

Author keywords

[No Author keywords available]

Indexed keywords

ASYMMETRIC KEY; CRYPTOGRAPHIC KEY; ENCRYPTION SCHEMES; EXPONENTIATIONS; FLEXIBLE MECHANISMS; FORMAL ANALYSIS; KEY-MANAGEMENT; MESSAGING PROTOCOLS; ONE-PASS; PUBLIC KEYS; SECURITY REQUIREMENTS; SERVER AUTHENTICATION; SIGNCRYPTION SCHEMES; STORAGE AND ACCESS;

EID: 79952528009     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19379-8_20     Document Type: Conference Paper
Times cited : (30)

References (18)
  • 1
    • 84937579774 scopus 로고    scopus 로고
    • The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES
    • Topics in Cryptology - CT-RSA 2001 The Cryptographers' Track at RSA Conference 2001 San Francisco, CA, USA, April 8-12, 2001 Proceedings
    • Abdalla, M., Bellare, M., Rogaway, P.: The oracle diffie-hellman assumptions and an analysis of DHIES. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 143-158. Springer, Heidelberg (2001) (Pubitemid 33255161)
    • (2001) Lecture Notes in Computer Science , Issue.2020 , pp. 143-158
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 2
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Canetti, R.: Universally Composable Security: A New paradigm for Cryptographic Protocols. In: 42nd Annual Symposium on Foundations of Computer Science FOCS 2001, pp. 136-145. IEEE, Los Alamitos (2001) (Pubitemid 33068374)
    • (2001) Annual Symposium on Foundations of Computer Science - Proceedings , pp. 136-145
    • Canetti, R.1
  • 3
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001) (Pubitemid 33275848)
    • (2001) Lecture Notes in Computer Science , Issue.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 4
    • 84869635960 scopus 로고    scopus 로고
    • Security analysis of ike's signature-based key- exchange protocol
    • Yung, M. ed., Springer, Heidelberg
    • Canetti, R., Krawczyk, H.: Security Analysis of IKE's Signature-Based Key- Exchange Protocol. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 143- 161. Springer, Heidelberg (2002)
    • (2002) CRYPTO 2002. LNCS , vol.2442 , pp. 143-161
    • Canetti, R.1    Krawczyk, H.2
  • 6
    • 26444544161 scopus 로고    scopus 로고
    • Hybrid signcryption schemes with insider security
    • Information Security and Privacy: 10th Australasian Conference, ACISP 2005. Proceedings
    • Dent, A.W.: Hybrid Signcryption Schemes with Insider Security. In: Boyd, C., Gonźalez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 253-266. Springer, Heidelberg (2005) (Pubitemid 41431786)
    • (2005) Lecture Notes in Computer Science , vol.3574 , pp. 253-266
    • Dent, A.W.1
  • 7
    • 33645962801 scopus 로고    scopus 로고
    • Hybrid signcryption schemes with outsider security
    • Zhou, J., Ĺopez, J., Deng, R.H., Bao, F. eds., Springer, Heidelberg
    • Dent, A.W.: Hybrid Signcryption Schemes with Outsider Security. In: Zhou, J., Ĺopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 203-217. Springer, Heidelberg (2005)
    • (2005) ISC 2005. LNCS , vol.3650 , pp. 203-217
    • Dent, A.W.1
  • 8
    • 70549109979 scopus 로고    scopus 로고
    • More on key wrapping
    • Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. eds., Springer, Heidelberg
    • Gennaro, R., Halevi, S.: More on KeyWrapping. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 53-70. Springer, Heidelberg (2009)
    • (2009) SAC 2009. LNCS , vol.5867 , pp. 53-70
    • Gennaro, R.1    Halevi, S.2
  • 9
    • 38049068181 scopus 로고    scopus 로고
    • Universally composable signcryption
    • Ĺopez, J., Samarati, P., Ferrer, J. eds., Springer, Heidelberg
    • Gjøsteen, K., Kr°akmo, L.: Universally Composable Signcryption. In: Ĺopez, J., Samarati, P., Ferrer, J. (eds.) EuroPKI 2007. LNCS, vol. 4582, pp. 346-353. Springer, Heidelberg (2007)
    • (2007) EuroPKI 2007. LNCS , vol.4582 , pp. 346-353
    • Gjøsteen, K.1    Krakmo, L.2
  • 10
    • 38349008957 scopus 로고    scopus 로고
    • On the connection between signcryption and one-pass key establishment
    • Galbraith, S. ed., Springer, Heidelberg
    • Gorantla, M., Boyd, C., Gonźalez Nieto, J.: On the Connection Between Signcryption and One-Pass Key Establishment. In: Galbraith, S. (ed.) Cryptography and Coding 2007. LNCS, vol. 4887, pp. 277-301. Springer, Heidelberg (2007)
    • (2007) Cryptography and Coding 2007. LNCS , vol.4887 , pp. 277-301
    • Gorantla, M.1    Boyd, C.2    Gonźalez Nieto, J.3
  • 12
    • 79952530263 scopus 로고    scopus 로고
    • Standard Specifications for Public Key Cryptography
    • IEEE 1363a-2004: Standard Specifications for Public Key Cryptography
    • IEEE 1363a-2004
  • 13
    • 33745179557 scopus 로고    scopus 로고
    • HMQV: A high-performance secure diffie-hellman protocol
    • Shoup, V. ed. , Springer, Heidelberg
    • Krawczyk, H.: HMQV: A High-Performance Secure Diffie-Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005), http://eprint.iacr.org/
    • (2005) CRYPTO 2005. LNCS , vol.3621 , pp. 546-566
    • Krawczyk, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.