-
1
-
-
84874800178
-
A public key cryptosystem and a signature protocol based on discrete logarithms
-
T. ElGamal A public key cryptosystem and a signature protocol based on discrete logarithms IEEE Transactions on Information 31 1985 469 472
-
(1985)
IEEE Transactions on Information
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
2
-
-
0017930809
-
Method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
R.L. Rivest, A. Shamir, and L. Adleman A method for obtaining digital signatures and public key cryptosystems Communications of the ACM 21 2 1978 120 126 (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
4
-
-
0000112683
-
Elliptic curve cryptosystem
-
N. Koblitz Elliptic curve cryptosystem Mathematics of Computation 48 1987 203 209
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
5
-
-
85020598353
-
Identity-based cryptosystems and signature protocols
-
Santa Barbara, USA
-
A. Shamir, Identity-based cryptosystems and signature protocols, in: Proceedings of the Advances in Cryptology - Crypto'84, Santa Barbara, USA, 1984, pp. 47-53.
-
(1984)
Proceedings of the Advances in Cryptology - Crypto'84
, pp. 47-53
-
-
Shamir, A.1
-
6
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
D. Boneh, and M. Franklin Identity-based encryption from the Weil pairing SIAM Journal of Computing 32 3 2003 586 615
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
33744776672
-
A novel remote user authentication scheme using bilinear pairings
-
DOI 10.1016/j.cose.2005.09.002, PII S0167404805001525
-
M.L. Das, A. Saxena, V.P. Gulati, and D.B. Phatak A novel remote client authentication protocol using bilinear pairings Computer and Security 25 3 2006 184 189 (Pubitemid 43821240)
-
(2006)
Computers and Security
, vol.25
, Issue.3
, pp. 184-189
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
Phatak, D.B.4
-
11
-
-
47949104161
-
A pairing-based client authentication protocol for wireless clients with smart cards
-
Y.M. Tseng, T.Y. Wu, and J.D. Wu A pairing-based client authentication protocol for wireless clients with smart cards Informatica 19 2 2008 285 302
-
(2008)
Informatica
, vol.19
, Issue.2
, pp. 285-302
-
-
Tseng, Y.M.1
Wu, T.Y.2
Wu, J.D.3
-
12
-
-
54349089114
-
An improved bilinear pairing based remote client authentication protocol
-
T. Goriparthi, M.L. Das, and A. Saxena An improved bilinear pairing based remote client authentication protocol Computer Standard Interface 31 1 2009 181 185
-
(2009)
Computer Standard Interface
, vol.31
, Issue.1
, pp. 181-185
-
-
Goriparthi, T.1
Das, M.L.2
Saxena, A.3
-
13
-
-
77955659710
-
An efficient client authentication and key exchange protocol for mobile client-server environment
-
T.-Y. Wu, and Y.-M. Tseng An efficient client authentication and key exchange protocol for mobile client-server environment Computer Networks 54 2010 1520 1530
-
(2010)
Computer Networks
, vol.54
, pp. 1520-1530
-
-
Wu, T.-Y.1
Tseng, Y.-M.2
-
14
-
-
77951274055
-
Identity-based authentication key agreement protocols without bilinear pairings
-
X. Cao, W. Kou, Y. Yu, and R. Sun Identity-based authentication key agreement protocols without bilinear pairings IEICE Transactions on Fundamentals E91-A 12 2008 3833 3836
-
(2008)
IEICE Transactions on Fundamentals
, vol.E91-A
, Issue.12
, pp. 3833-3836
-
-
Cao, X.1
Kou, W.2
Yu, Y.3
Sun, R.4
-
15
-
-
28244469017
-
Analysis and improvement of an authenticated key exchange protocol for sensor networks
-
DOI 10.1109/LCOMM.2005.11006
-
X. Tian, D. Wong, and R. Zhu Analysis and improvement of authenticated key exchange protocol for sensor networks IEEE Communications Letters 9 11 2005 970 972 (Pubitemid 41709671)
-
(2005)
IEEE Communications Letters
, vol.9
, Issue.11
, pp. 970-972
-
-
Tian, X.1
Wong, D.S.2
Zhu, R.W.3
-
16
-
-
34547541295
-
A remote user authentication scheme using bilinear pairings and ECC
-
DOI 10.1109/ISDA.2006.253764, 4021816, Proceedings - ISDA 2006: Sixth International Conference on Intelligent Systems Design and Applications
-
Z. Jia, Y. Zhang, H. Shao, Y. Lin et al., A remote client authentication protocol using bilinear pairings and ECC, in: Proceedings of the Sixth International Conference on Intelligent System Design and Applications, Jinan, China, 2006, pp. 1091-1094. (Pubitemid 47179199)
-
(2006)
Proceedings - ISDA 2006: Sixth International Conference on Intelligent Systems Design and Applications
, vol.2
, pp. 1091-1094
-
-
Jia, Z.1
Zhang, Y.2
Shao, H.3
Lin, Y.4
Wang, J.5
-
17
-
-
47849093580
-
A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications
-
Athens, Greece
-
P.E. Abichar, A. Mhamed, B. Elhassan, A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications, in: Proceedings of the 2007 International Conference on Next Generation Mobile Applications, Services and Technologies, Athens, Greece, 2007, pp. 235-240.
-
(2007)
Proceedings of the 2007 International Conference on Next Generation Mobile Applications, Services and Technologies
, pp. 235-240
-
-
Abichar, P.E.1
Mhamed, A.2
Elhassan, B.3
-
18
-
-
38049082183
-
A distributed electronic authentication protocol based on elliptic curve
-
Dalian, China
-
Z. Chen, X. Song, A distributed electronic authentication protocol based on elliptic curve, in: Proceedings of the Sixth International on Machine Learning and Cybernetics, Dalian, China, 2007, pp. 2179-2182.
-
(2007)
Proceedings of the Sixth International on Machine Learning and Cybernetics
, pp. 2179-2182
-
-
Chen, Z.1
Song, X.2
-
19
-
-
39049094066
-
IMBAS: Identity-based multi-client broadcast authentication in wireless sensor networks
-
X. Cao, W. Kou, and L. Dang IMBAS: identity-based multi-client broadcast authentication in wireless sensor networks Computer Communications 31 2008 659 671
-
(2008)
Computer Communications
, vol.31
, pp. 659-671
-
-
Cao, X.1
Kou, W.2
Dang, L.3
-
20
-
-
35248853846
-
An efficient scheme for user authentication in wireless sensor networks
-
DOI 10.1109/AINAW.2007.80, 4221098, Proceedings - 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/ Symposia, AINAW'07
-
C. Jiang, B. Li, H. Xu, An efficient protocol for client authentication in wireless sensor networks, in: Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops, Niagara Falls, Canada, 2007, pp. 438-442. (Pubitemid 47565422)
-
(2007)
Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07
, vol.2
, pp. 438-442
-
-
Jiang, C.1
Li, B.2
Xu, H.3
-
21
-
-
63049116480
-
An ID-based remote mutual authentication with key agreement protocol for mobile devices on elliptic curve cryptosystem
-
J. Yang, and C. Chang An ID-based remote mutual authentication with key agreement protocol for mobile devices on elliptic curve cryptosystem Computers and Security 28 2009 138 143
-
(2009)
Computers and Security
, vol.28
, pp. 138-143
-
-
Yang, J.1
Chang, C.2
-
22
-
-
70749138135
-
Robust ID-based remote mutual authentication with key agreement protocol for mobile devices on ECC
-
Vancouver, Canada
-
E. Yoon, K. Yoo, Robust ID-based remote mutual authentication with key agreement protocol for mobile devices on ECC, in: 2009 International Conference on Computational Science and Engineering, Vancouver, Canada, 2009, pp. 633-640.
-
(2009)
2009 International Conference on Computational Science and Engineering
, pp. 633-640
-
-
Yoon, E.1
Yoo, K.2
-
23
-
-
84946840347
-
Short Signatures from the Weil Pairing
-
Advances in Cryptology - ASIACRYPT 2001
-
D. Boneh, B. Lynn, H. Shacham, Short signatures from the Weil pairing, in: C. Boyd (Ed.), Advances in Cryptology-Asiacrypt 2001, Gold Coast, Australia, 2001, pp. 514-532. (Pubitemid 33371204)
-
(2002)
Lecture Notes in Computer Science
, Issue.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
25
-
-
84939573910
-
Differential power analysis
-
Santa Barbara, USA
-
P. Kocher, J. Jaffe, B. Jun, Differential power analysis, in: Proceedings of Advances in Cryptology - Crypto'99, Santa Barbara, USA, 1999, pp. 388-397.
-
(1999)
Proceedings of Advances in Cryptology - Crypto'99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
26
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
DOI 10.1109/TC.2002.1004593
-
T.S. Messerges, E.A. Dabbish, and R.H. Sloan Examining smart card security under the threat of power analysis attacks IEEE Transactions on Computers 51 5 2002 541 552 (Pubitemid 34550462)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
27
-
-
77958081838
-
A new secure remote user authentication scheme with smart cards
-
Manoj Kumar A new secure remote user authentication scheme with smart cards International Journal of Network Security 11 2 2010 88 93
-
(2010)
International Journal of Network Security
, vol.11
, Issue.2
, pp. 88-93
-
-
Kumar, M.1
-
28
-
-
84949230533
-
Key Agreement Protocols and Their Security Analysis
-
Cryptography and Coding
-
S. Blake-Wilson, D. Johnson, A. Menezes, Key agreement protocols and their security analysis, in: Proceedings of Sixth IMA International Conference on Cryptography and Coding, Cirencester, UK, 1997, pp. 30-45. (Pubitemid 128005797)
-
(1997)
Lecture Notes in Computer Science
, Issue.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
29
-
-
84858080355
-
-
Shamus Software Ltd., Miracl Library
-
Shamus Software Ltd., Miracl Library, < http://www.shamus.ie/index. php?page=home >.
-
-
-
|