-
1
-
-
0031642585
-
A Modular Approach to the Design and Analysis of Authentication and Key Exchange
-
ACM
-
M. Bellare, R. Canetti, and H. Krawczyk A Modular Approach to the Design and Analysis of Authentication and Key Exchange Proceedings of STOC 1998 1998 ACM 419 428
-
(1998)
Proceedings of STOC 1998
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
2
-
-
84945119254
-
Entity Authentication and Key Distribution
-
LNCS Springer-Verlag
-
M. Bellare, and P. Rogaway Entity Authentication and Key Distribution Proceedings of CRYPTO 1993 LNCS vol. 773 1994 Springer-Verlag 232 249
-
(1994)
Proceedings of CRYPTO 1993
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
0027726717
-
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
-
ACM
-
M. Bellare, and P. Rogaway Random Oracles are Practical: A Paradigm for Designing Efficient Protocols Proceedings of ACM CCS 1993 1993 ACM 62 73
-
(1993)
Proceedings of ACM CCS 1993
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84873466407
-
Authenticated Key Exchange Secure against Dictionary Attacks
-
LNCS Springer-Verlag
-
M. Bellare, D. Pointcheval, and P. Rogaway Authenticated Key Exchange Secure against Dictionary Attacks Proceedings of EUROCRYPT 2000 LNCS vol. 1807 2000 Springer-Verlag 139 155
-
(2000)
Proceedings of EUROCRYPT 2000
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
5
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
D. Boneh, X. Boyen, and E.-J. Goh Hierarchical Identity based Encryption with Constant Size Ciphertext Proceedings of EUROCRYPT 2005 LNCS vol. 3494 2005 Springer-Verlag 440 456 (Pubitemid 41313968)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
6
-
-
0037623983
-
Identity based Encryption from the Weil Pairing
-
D. Boneh, and M. Franklin Identity based Encryption from the Weil Pairing SIAM Journal of Computing 32 3 2003 586 615
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
50849127145
-
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case
-
LNCS Springer-Verlag
-
E. Bresson, O. Chevassut, and D. Pointcheval Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case Proceedings of ASIACRYPT 2001 LNCS vol. 2248 2001 Springer-Verlag 290 309
-
(2001)
Proceedings of ASIACRYPT 2001
, vol.2248
, pp. 290-309
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
8
-
-
50849092893
-
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
-
LNCS Springer-Verlag
-
E. Bresson, O. Chevassut, and D. Pointcheval Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions Proceedings of EUROCRYPT 2002 LNCS vol. 2332 2002 Springer-Verlag 321 336
-
(2002)
Proceedings of EUROCRYPT 2002
, vol.2332
, pp. 321-336
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
10
-
-
84948991087
-
A Secure and Efficient Conference Key Distribution System
-
LNCS Springer-Verlag
-
M. Burmester, and Y. Desmedt A Secure and Efficient Conference Key Distribution System Proceedings of EUROCRYPT 1994 LNCS vol. 950 1995 Springer-Verlag 275 286
-
(1995)
Proceedings of EUROCRYPT 1994
, vol.950
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
12
-
-
78049296439
-
A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
-
X. Cao, W. Kou, and X. Du A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges Information Sciences 180 15 2010 2895 2903
-
(2010)
Information Sciences
, vol.180
, Issue.15
, pp. 2895-2903
-
-
Cao, X.1
Kou, W.2
Du, X.3
-
13
-
-
77958095782
-
A communication-efficient three-party password authenticated key exchange protocol
-
T. Chang, M. Hwang, and W. Yang A communication-efficient three-party password authenticated key exchange protocol Information Sciences 181 1 2011 217 226
-
(2011)
Information Sciences
, vol.181
, Issue.1
, pp. 217-226
-
-
Chang, T.1
Hwang, M.2
Yang, W.3
-
14
-
-
35048874197
-
Efficient ID-based Group Key Agreement with Bilinear Maps
-
LNCS Springer-Verlag
-
K. Choi, J. Hwang, and D. Lee Efficient ID-based Group Key Agreement with Bilinear Maps Proceedings of PKC 2004 LNCS vol. 2947 2004 Springer-Verlag 130 144
-
(2004)
Proceedings of PKC 2004
, vol.2947
, pp. 130-144
-
-
Choi, K.1
Hwang, J.2
Lee, D.3
-
16
-
-
84955339164
-
Secure Integration of Asymmetric and Symmetric Encryption Schemes
-
LNCS Springer-Verlag
-
E. Fujisaki, and T. Okamoto Secure Integration of Asymmetric and Symmetric Encryption Schemes Proceedings of CRYPTO 1999 LNCS vol. 1666 1999 Springer-Verlag 537 554
-
(1999)
Proceedings of CRYPTO 1999
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
18
-
-
67049155509
-
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
-
LNCS Springer-Verlag
-
M. Gorantla, C. Boyd, and J. Nieto Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols Proceedings of PKC 2009 LNCS vol. 5443 2009 Springer-Verlag 105 123
-
(2009)
Proceedings of PKC 2009
, vol.5443
, pp. 105-123
-
-
Gorantla, M.1
Boyd, C.2
Nieto, J.3
-
19
-
-
78449313002
-
Provably secure identity-based authenticated key agreement protocols with malicious private key generators
-
H. Guo, Z. Li, Y. Mu, and X. Zhang Provably secure identity-based authenticated key agreement protocols with malicious private key generators Information Sciences 181 3 2011 628 647
-
(2011)
Information Sciences
, vol.181
, Issue.3
, pp. 628-647
-
-
Guo, H.1
Li, Z.2
Mu, Y.3
Zhang, X.4
-
20
-
-
23944461491
-
A one round protocol for tripartite Diffie-Hellman
-
DOI 10.1007/s00145-004-0312-y
-
A. Joux A one round protocol for tripartite Diffie-Hellman Journal of Cryptology 17 4 2004 263 276 (Pubitemid 41201459)
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 263-276
-
-
Joux, A.1
-
23
-
-
35048821512
-
Constant-round authenticated group key exchange for dynamic groups
-
H. Kim, S. Lee, D. Lee, Constant-round authenticated group key exchange for dynamic groups, in: Proceedings of ASIACRYPT 2004, LNCS, vol. 3329, Springer-Verlag, 2004, pp. 245-259. (Pubitemid 39747758)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3329
, pp. 245-259
-
-
Kim, H.-J.1
Lee, S.-M.2
Lee, D.H.3
-
25
-
-
85020598353
-
Identity based Cryptosystems and Signature Schemes
-
LNCS Springer-Verlag
-
A. Shamir Identity based Cryptosystems and Signature Schemes Proceedings of CRYPTO'84 LNCS vol. 196 1984 Springer-Verlag 47 53
-
(1984)
Proceedings of CRYPTO'84
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
26
-
-
67650682832
-
Asymmetric Group Key Agreement
-
LNCS Springer-Verlag
-
Q. Wu, Y. Mu, W. Susilo, B. Qin, and J. Domingo-Ferrer Asymmetric Group Key Agreement Proceedings of EUROCRYPT 2009 LNCS vol. 5479 2009 Springer-Verlag 153 170
-
(2009)
Proceedings of EUROCRYPT 2009
, vol.5479
, pp. 153-170
-
-
Wu, Q.1
Mu, Y.2
Susilo, W.3
Qin, B.4
Domingo-Ferrer, J.5
-
27
-
-
77955048000
-
Identity-based Authenticated Asymmetric Group Key Agreement Protocol
-
LNCS Springer-Verlag
-
L. Zhang, Q. Wu, B. Qin, and J. Domingo-Ferrer Identity-based Authenticated Asymmetric Group Key Agreement Protocol Proceedings of COCOON 2010 LNCS vol. 6196 2010 Springer-Verlag 510 519
-
(2010)
Proceedings of COCOON 2010
, vol.6196
, pp. 510-519
-
-
Zhang, L.1
Wu, Q.2
Qin, B.3
Domingo-Ferrer, J.4
-
28
-
-
77956235295
-
Efficient many-to-one authentication with certificateless aggregate signatures
-
L. Zhang, B. Qin, Q. Wu, and F. Zhang Efficient many-to-one authentication with certificateless aggregate signatures Computer Networks 54 14 2010 2482 2491
-
(2010)
Computer Networks
, vol.54
, Issue.14
, pp. 2482-2491
-
-
Zhang, L.1
Qin, B.2
Wu, Q.3
Zhang, F.4
-
29
-
-
73149101252
-
Simulatable certificateless two-party authenticated key agreement protocol
-
L. Zhang, F. Zhang, Q. Wu, and J. Domingo-Ferrer Simulatable certificateless two-party authenticated key agreement protocol Information Sciences 180 6 2010 1020 1030
-
(2010)
Information Sciences
, vol.180
, Issue.6
, pp. 1020-1030
-
-
Zhang, L.1
Zhang, F.2
Wu, Q.3
Domingo-Ferrer, J.4
|