-
1
-
-
84937579774
-
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES
-
Topics in Cryptology - CT-RSA 2001 The Cryptographers' Track at RSA Conference 2001 San Francisco, CA, USA, April 8-12, 2001 Proceedings
-
Abdalla, M., Bellare, M., Rogaway, P.: The oracle diffie-hellman assumptions and an analysis of DHIES. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 143-158. Springer, Heidelberg (2001) (Pubitemid 33255161)
-
(2001)
Lecture Notes in Computer Science
, Issue.2020
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
2
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Canetti, R.: Universally Composable Security: A New paradigm for Cryptographic Protocols. In: 42nd Annual Symposium on Foundations of Computer Science FOCS 2001, pp. 136-145. IEEE, Los Alamitos (2001) (Pubitemid 33068374)
-
(2001)
Annual Symposium on Foundations of Computer Science - Proceedings
, pp. 136-145
-
-
Canetti, R.1
-
3
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001) (Pubitemid 33275848)
-
(2001)
Lecture Notes in Computer Science
, Issue.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
4
-
-
84869635960
-
Security analysis of ike's signature-based key- exchange protocol
-
Yung, M. ed., Springer, Heidelberg
-
Canetti, R., Krawczyk, H.: Security Analysis of IKE's Signature-Based Key- Exchange Protocol. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 143- 161. Springer, Heidelberg (2002)
-
(2002)
CRYPTO 2002. LNCS
, vol.2442
, pp. 143-161
-
-
Canetti, R.1
Krawczyk, H.2
-
6
-
-
26444544161
-
Hybrid signcryption schemes with insider security
-
Information Security and Privacy: 10th Australasian Conference, ACISP 2005. Proceedings
-
Dent, A.W.: Hybrid Signcryption Schemes with Insider Security. In: Boyd, C., Gonźalez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 253-266. Springer, Heidelberg (2005) (Pubitemid 41431786)
-
(2005)
Lecture Notes in Computer Science
, vol.3574
, pp. 253-266
-
-
Dent, A.W.1
-
7
-
-
33645962801
-
Hybrid signcryption schemes with outsider security
-
Zhou, J., Ĺopez, J., Deng, R.H., Bao, F. eds., Springer, Heidelberg
-
Dent, A.W.: Hybrid Signcryption Schemes with Outsider Security. In: Zhou, J., Ĺopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 203-217. Springer, Heidelberg (2005)
-
(2005)
ISC 2005. LNCS
, vol.3650
, pp. 203-217
-
-
Dent, A.W.1
-
8
-
-
70549109979
-
More on key wrapping
-
Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. eds., Springer, Heidelberg
-
Gennaro, R., Halevi, S.: More on KeyWrapping. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 53-70. Springer, Heidelberg (2009)
-
(2009)
SAC 2009. LNCS
, vol.5867
, pp. 53-70
-
-
Gennaro, R.1
Halevi, S.2
-
9
-
-
38049068181
-
Universally composable signcryption
-
Ĺopez, J., Samarati, P., Ferrer, J. eds., Springer, Heidelberg
-
Gjøsteen, K., Kr°akmo, L.: Universally Composable Signcryption. In: Ĺopez, J., Samarati, P., Ferrer, J. (eds.) EuroPKI 2007. LNCS, vol. 4582, pp. 346-353. Springer, Heidelberg (2007)
-
(2007)
EuroPKI 2007. LNCS
, vol.4582
, pp. 346-353
-
-
Gjøsteen, K.1
Krakmo, L.2
-
10
-
-
38349008957
-
On the connection between signcryption and one-pass key establishment
-
Galbraith, S. ed., Springer, Heidelberg
-
Gorantla, M., Boyd, C., Gonźalez Nieto, J.: On the Connection Between Signcryption and One-Pass Key Establishment. In: Galbraith, S. (ed.) Cryptography and Coding 2007. LNCS, vol. 4887, pp. 277-301. Springer, Heidelberg (2007)
-
(2007)
Cryptography and Coding 2007. LNCS
, vol.4887
, pp. 277-301
-
-
Gorantla, M.1
Boyd, C.2
Gonźalez Nieto, J.3
-
12
-
-
79952530263
-
-
Standard Specifications for Public Key Cryptography
-
IEEE 1363a-2004: Standard Specifications for Public Key Cryptography
-
IEEE 1363a-2004
-
-
-
13
-
-
33745179557
-
HMQV: A high-performance secure diffie-hellman protocol
-
Shoup, V. ed. , Springer, Heidelberg
-
Krawczyk, H.: HMQV: A High-Performance Secure Diffie-Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005), http://eprint.iacr.org/
-
(2005)
CRYPTO 2005. LNCS
, vol.3621
, pp. 546-566
-
-
Krawczyk, H.1
-
15
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
16
-
-
33746068613
-
A provable-security treatment of the key-wrap problem
-
DOI 10.1007/11761679-23, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Rogaway, P., Shrimpton, T.: A provable-security treatment of the key-wrap problem. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 373-390. Springer, Heidelberg (2006) (Pubitemid 44072251)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004
, pp. 373-390
-
-
Rogaway, P.1
Shrimpton, T.2
|