-
1
-
-
84949221411
-
Authenticated Diffie-Hellman key agreement protocols
-
Springer-Verlag
-
S. Blake-Wilson, and A. Menezes Authenticated Diffie-Hellman key agreement protocols Proceedings of the SAC 1998 LNCS vol. 1556 1999 Springer-Verlag 339 361
-
(1999)
LNCS
, vol.1556
, pp. 339-361
-
-
Blake-Wilson, S.1
Menezes, A.2
-
2
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Proceedings of the CRYPTO 1984, Springer-Verlag
-
A. Shamir Identity-based cryptosystems and signature schemes Proceedings of the CRYPTO 1984 LNCS vol. 196 1984 Springer-Verlag 47 53
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
3
-
-
84945119254
-
Entity authentication and key distribution
-
Proceedings of the CRYPTO 1993, Springer-Verlag
-
M. Bellare, and P. Rogaway Entity authentication and key distribution Proceedings of the CRYPTO 1993 LNCS vol. 773 1993 Springer-Verlag 232 249
-
(1993)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Proceedings of the EUROCRYPT 2000, Springer-Verlag
-
M. Bellare, D. Pointcheval, and P. Rogaway Authenticated key exchange secure against dictionary attacks Proceedings of the EUROCRYPT 2000 LNCS vol. 1807 2000 Springer-Verlag 139 155
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
6
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
R. Canetti, and H. Krawczyk Analysis of key-exchange protocols and their use for building secure channels Proceedings of the EUROCRYPT 2001 LNCS vol. 245 2001 Springer-Verlag 453 474 (Pubitemid 33275848)
-
(2001)
Lecture Notes in Computer Science
, Issue.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
8
-
-
38149012093
-
Stronger security of authenticated key exchange
-
Proceedings of the ProvSection 2007, Springer-Verlag
-
B.A. LaMacchia, K. Lauter, and A. Mityagin Stronger security of authenticated key exchange Proceedings of the ProvSection 2007 LNCS vol. 4784 2007 Springer-Verlag 1 16
-
(2007)
LNCS
, vol.4784
, pp. 1-16
-
-
Lamacchia, B.A.1
Lauter, K.2
Mityagin, A.3
-
9
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh, and M. Franklin Identity-based encryption from the weil pairing Proceedings of the CRTPTO 2001 LNCS vol. 2139 2001 Springer-Verlag 213 229 (Pubitemid 33317917)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
10
-
-
0037142442
-
Identity-based authenticated key agreement protocol based on Weil pairing
-
DOI 10.1049/el:20020387
-
N.P. Smart An identity based authenticated key agreement protocol based on the Weil pairing Electron Lett 38 13 2002 630 632 (Pubitemid 34725603)
-
(2002)
Electronics Letters
, vol.38
, Issue.13
, pp. 630-632
-
-
Smart, N.P.1
-
12
-
-
33646180371
-
On session key construction in provably-secure key establishment protocols
-
Proceedings of the Mycrypt 2005, Springer-Verlag
-
K.K.R. Choo, C. Boyd, and Y. Hitchcock On session key construction in provably-secure key establishment protocols Proceedings of the Mycrypt 2005 LNCS vol. 3715 2005 Springer-Verlag 116 131
-
(2005)
LNCS
, vol.3715
, pp. 116-131
-
-
Choo, K.K.R.1
Boyd, C.2
Hitchcock, Y.3
-
13
-
-
24144458508
-
A new two-party identity-based authenticated key agreement
-
Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
-
N. McCullagh, and P.S.L.M. Barreto A new two-party identity-based authenticated key agreement Proceedings of the CT-RSA 2005 LNCS vol. 3376 2005 Springer-Verlag 262 274 (Pubitemid 41231216)
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 262-274
-
-
McCullagh, N.1
Barreto, P.S.L.M.2
-
15
-
-
84937389342
-
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
-
Public Key Cryptography
-
T. Okamoto, and D. Pointcheval The Gap-problems: a new class of problems for the security of cryptographic schemes Proceedings of the PKC 2001 LNCS vol. 1992 2001 Springer-Verlag 104 118 (Pubitemid 33232936)
-
(2001)
Lecture Notes in Computer Science
, Issue.1992
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
-
16
-
-
33646184315
-
Efficient identity-based and authenticated key agreement protocol
-
Wang Y. Efficient identity-based and authenticated key agreement protocol. Cryptology ePrint archive, report 2005/108. < http://eprint.iacr. org/2005/108 >.
-
Cryptology EPrint Archive, Report 2005/108
-
-
Wang, Y.1
-
18
-
-
38149091828
-
Strongly-secure identity-based key agreement and anonymous extension
-
Proceedings of the ISC 2007, Springer-Verlag
-
S.S.M. Chow, and K.K.R. Choo Strongly-secure identity-based key agreement and anonymous extension Proceedings of the ISC 2007 LNCS vol. 4779 2007 Springer-Verlag 203 220
-
(2007)
LNCS
, vol.4779
, pp. 203-220
-
-
Chow, S.S.M.1
Choo, K.K.R.2
-
19
-
-
70349858083
-
Efficient one-round key exchange in the standard model
-
Proceedings of the ACISP 2008, Springer-Verlag
-
C. Boyd, Y. Cliff, J.G. Nieto, and K.G. Paterson Efficient one-round key exchange in the standard model Proceedings of the ACISP 2008 LNCS vol. 5107 2008 Springer-Verlag 69 83
-
(2008)
LNCS
, vol.5107
, pp. 69-83
-
-
Boyd, C.1
Cliff, Y.2
Nieto, J.G.3
Paterson, K.G.4
-
20
-
-
77952366226
-
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem
-
ACM
-
H. Huang, and Z. Cao An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem Proceedings of the ACM ASIACCS 2009 2009 ACM 333 342
-
(2009)
Proceedings of the ACM ASIACCS 2009
, pp. 333-342
-
-
Huang, H.1
Cao, Z.2
-
23
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Proceedings of the CRYPTO 2002, Springer-Verlag
-
P.S.L.M. Barreto, K.Y. Kim, and B. Lynn Efficient algorithms for pairing-based cryptosystems Proceedings of the CRYPTO 2002 LNCS vol. 2442 2002 Springer-Verlag 354 368
-
(2002)
LNCS
, vol.2442
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, K.Y.2
Lynn, B.3
-
24
-
-
82955246861
-
Implementing the Tate pairing
-
Proceedings of the ANTS-V, Springer-Verlag
-
S.D. Galbraith, K. Harrison, and D. Soldera Implementing the Tate pairing Proceedings of the ANTS-V LNCS vol. 2369 2002 Springer-Verlag 324 337
-
(2002)
LNCS
, vol.2369
, pp. 324-337
-
-
Galbraith, S.D.1
Harrison, K.2
Soldera, D.3
-
25
-
-
69949142503
-
Strongly secure certificateless key agreement
-
Proceedings of the pairing 2009, Springer-Verlag
-
G. Lippold, C. Boyd, and J.G. Nieto Strongly secure certificateless key agreement Proceedings of the pairing 2009 LNCS vol. 5671 2009 Springer-Verlag 206 230
-
(2009)
LNCS
, vol.5671
, pp. 206-230
-
-
Lippold, G.1
Boyd, C.2
Nieto, J.G.3
-
26
-
-
33745179557
-
HMQV: A high-performance secure Diffie-Hellman protocol
-
Proceedings of the CRYPTO 2005, Springer-Verlag
-
H. Krawczyk HMQV: a high-performance secure Diffie-Hellman protocol Proceedings of the CRYPTO 2005 LNCS vol. 3621 2005 Springer-Verlag 546 566
-
(2005)
LNCS
, vol.3621
, pp. 546-566
-
-
Krawczyk, H.1
-
27
-
-
77954580101
-
Modeling leakage of ephemeral secrets in tripartite/group key exchange
-
Proceedings of the ICISC 2009, Springer-Verlag
-
M. Manulis, K. Suzuki, and B. Ustaoglu Modeling leakage of ephemeral secrets in tripartite/group key exchange Proceedings of the ICISC 2009 LNCS vol. 5984 2010 Springer-Verlag 16 33
-
(2010)
LNCS
, vol.5984
, pp. 16-33
-
-
Manulis, M.1
Suzuki, K.2
Ustaoglu, B.3
-
28
-
-
73149101252
-
Simulatable certificateless two-party authenticated key agreement protocol
-
L. Zhang, F. Zhang, Q. Wu, and J. Domingo-Ferrer Simulatable certificateless two-party authenticated key agreement protocol Info Sci 180 6 2010 1020 1030
-
(2010)
Info Sci
, vol.180
, Issue.6
, pp. 1020-1030
-
-
Zhang, L.1
Zhang, F.2
Wu, Q.3
Domingo-Ferrer, J.4
|