-
2
-
-
84949230533
-
Key Agreement Protocols and Their Security Analysis
-
Cryptography and Coding
-
S. Blake-Wilson, D. Johnson, and A. Menezes Key agreement protocols and their security analysis (extended abstract) Proceedings of the 6th IMA International Conference on Cryptography and Coding Lecture Notes in Comput. Sci. vol. 1355 1997 Springer New York 30 45 (Pubitemid 128005797)
-
(1997)
Lecture Notes in Computer Science
, Issue.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
3
-
-
84947778144
-
The Decision Diffie-Hellman Problem
-
Algorithmic Number Theory
-
D. Boneh The decision Diffie-Hellman problem Proceedings of the Third Algorithmic Number Theory Symposium Lecture Notes in Comput. Sci. vol. 1423 1998 Springer New York 48 63 (Pubitemid 128093541)
-
(1998)
Lecture Notes in Computer Science
, Issue.1423
, pp. 48-63
-
-
Boneh, D.1
-
4
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
D. Boneh, and M. Franklin Identity-based encryption from the Weil pairing SIAM J. Comput. 32 3 2003 586 615
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Lecture Notes in Comput. Sci. Springer New York
-
P.S.L.M. Barreto, H.Y. Kim, B. Lynn, and M. Scott Efficient algorithms for pairing-based cryptosystems Advances in Cryptology - Crypto 2002, Proceedings Lecture Notes in Comput. Sci. vol. 2442 2002 Springer New York 354 368
-
(2002)
Advances in Cryptology - Crypto 2002, Proceedings
, vol.2442
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
8
-
-
84942246351
-
Identity based authenticated key agreement protocols from pairings
-
IEEE, USA
-
L. Chen, C. Kudla, Identity based authenticated key agreement protocols from pairings, in: Computer Security Foundations Workshop, IEEE, USA, 2003, pp. 219-233.
-
(2003)
Computer Security Foundations Workshop
, pp. 219-233
-
-
Chen, L.1
Kudla, C.2
-
9
-
-
38049042723
-
On security proof of McCullagh Barretos key agreement protocol and its variants
-
Z. Cheng, and L. Chen On security proof of McCullagh Barretos key agreement protocol and its variants Internat. J. Secur. Networks 2 2007 251 259
-
(2007)
Internat. J. Secur. Networks
, vol.2
, pp. 251-259
-
-
Cheng, Z.1
Chen, L.2
-
10
-
-
10444220191
-
Efficient identity-based authenticated key agreement protocol from pairings
-
Y.J. Choie, E. Jeong, and E. Lee Efficient identity-based authenticated key agreement protocol from pairings Appl. Math. Comput. 162 1 2005 179 188
-
(2005)
Appl. Math. Comput.
, vol.162
, Issue.1
, pp. 179-188
-
-
Choie, Y.J.1
Jeong, E.2
Lee, E.3
-
11
-
-
33748173666
-
Revisit of McCullagh-Barreto two-party ID-based authenticated key agreement protocols
-
K.K.R. Choo Revisit of McCullagh-Barreto two-party ID-based authenticated key agreement protocols Internat. J. Netw. Secur. 1 3 2005 154 160
-
(2005)
Internat. J. Netw. Secur.
, vol.1
, Issue.3
, pp. 154-160
-
-
Choo, K.K.R.1
-
12
-
-
38149061118
-
On the indistinguishability-based security model of key agreement protocols-simple cases
-
Z. Cheng, M. Nistazakis, R. Comley, L. Vasiu, On The indistinguishability-based security model of key agreement protocols-simple cases, Cryptology ePrint Archive Report 2005/129, 2005.
-
(2005)
Cryptology EPrint Archive Report 2005/129
-
-
Cheng, Z.1
Nistazakis, M.2
Comley, R.3
Vasiu, L.4
-
14
-
-
0032649638
-
The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
-
T. Frey, M. Müller, and H. Rück The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems IEEE Trans. Inform. Theory 45 5 1999 1717 1719
-
(1999)
IEEE Trans. Inform. Theory
, vol.45
, Issue.5
, pp. 1717-1719
-
-
Frey, T.1
Müller, M.2
Rück, H.3
-
15
-
-
84946832010
-
Supersingular Curves in Cryptography
-
Advances in Cryptology - ASIACRYPT 2001
-
S. Galbraith Supersingular curves in cryptography 7th International Conference on the Theory and Application of Cryptology and Information Security - CRYPTO'01 Lecture Notes in Comput. Sci. vol. 2248 2001 Springer New York 495 513 (Pubitemid 33371203)
-
(2002)
Lecture Notes in Computer Science
, Issue.2248
, pp. 495-513
-
-
Galbraith, S.D.1
-
17
-
-
74149089191
-
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem
-
H. Huang, Z. Cao, An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem, Cryptology ePrint Archive Report 2008/224, 2008.
-
(2008)
Cryptology EPrint Archive Report 2008/224
-
-
Huang, H.1
Cao, Z.2
-
18
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Lecture Notes in Comput. Sci. Springer New York
-
F. Hess Efficient identity based signature schemes based on pairings Selected Areas in Cryptography - SAC01 Lecture Notes in Comput. Sci. vol. 2595 2003 Springer New York 310 324
-
(2003)
Selected Areas in Cryptography - SAC01
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
19
-
-
84946844750
-
A one round protocol for tripartite Diffie-Hellman
-
Lecture Notes in Comput. Sci. Springer New York
-
A. Joux A one round protocol for tripartite Diffie-Hellman 4th International Symposium on Algorithmic Number Theory Lecture Notes in Comput. Sci. vol. 1838 2000 Springer New York 385 394
-
(2000)
4th International Symposium on Algorithmic Number Theory
, vol.1838
, pp. 385-394
-
-
Joux, A.1
-
20
-
-
74549221711
-
An efficient protocol for authenticated key agreement
-
L. Law, A. Menezes, M.H. Qu, J. Solinas, and S. Vanstone An efficient protocol for authenticated key agreement Des. Codes Cryptogr. 28 2 2003 119 134
-
(2003)
Des. Codes Cryptogr.
, vol.28
, Issue.2
, pp. 119-134
-
-
Law, L.1
Menezes, A.2
Qu, M.H.3
Solinas, J.4
Vanstone, S.5
-
25
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
A. Menezes, T. Okamoto, and S. Vanstone Reducing elliptic curve logarithms to logarithms in a finite field IEEE Trans. Inform. Theory 39 5 1993 1639 1646
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, Issue.5
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
27
-
-
81955161610
-
An efficient ID-based authenticated key agreement protocol with pairings
-
Lecture Notes in Comput. Sci. Springer
-
J.B. Oh, E.J. Yoon, and K.Y. Yoo An efficient ID-based authenticated key agreement protocol with pairings Parallel and Distributed Processing and Applications Lecture Notes in Comput. Sci. vol. 4742 2007 Springer 1458 1463
-
(2007)
Parallel and Distributed Processing and Applications
, vol.4742
, pp. 1458-1463
-
-
Oh, J.B.1
Yoon, E.J.2
Yoo, K.Y.3
-
28
-
-
33645590972
-
An efficient ID-based authenticated key agreement protocol from pairings
-
Lecture Notes in Comput. Sci. Springer New York
-
E.K. Ryu, E.J. Yoon, and K.Y. Yoo An efficient ID-based authenticated key agreement protocol from pairings Networking 2004 Lecture Notes in Comput. Sci. vol. 3042 2004 Springer New York 1458 1463
-
(2004)
Networking 2004
, vol.3042
, pp. 1458-1463
-
-
Ryu, E.K.1
Yoon, E.J.2
Yoo, K.Y.3
-
29
-
-
33646718113
-
Authenticated ID-based key exchange and remote log-in with simple token and PIN number
-
M. Scott, Authenticated ID-based key exchange and remote log-in with simple token and PIN number, Cryptology ePrint Archive Report 2002/164, 2002.
-
(2002)
Cryptology EPrint Archive Report 2002/164
-
-
Scott, M.1
-
30
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer New York
-
A. Shamir Identity-based cryptosystems and signature schemes Advances in Cryptology - CRYPTO'84 1985 Springer New York 47 53
-
(1985)
Advances in Cryptology - CRYPTO'84
, pp. 47-53
-
-
Shamir, A.1
-
31
-
-
0038680685
-
Efficient ID-based authenticated key agreement protocol based on Weil pairing
-
K. Shim Efficient ID-based authenticated key agreement protocol based on Weil pairing Electronics Lett. 39 8 2003 653 654
-
(2003)
Electronics Lett.
, vol.39
, Issue.8
, pp. 653-654
-
-
Shim, K.1
-
32
-
-
33744550865
-
Cryptanalysis of two ID-based authenticated key agreement protocols from pairings
-
K. Shim, Cryptanalysis of two ID-based authenticated key agreement protocols from pairings, Cryptology ePrint Archive Report 2005/357, 2005.
-
(2005)
Cryptology EPrint Archive Report 2005/357
-
-
Shim, K.1
-
33
-
-
84855363360
-
Cryptanalysis of ID-based authenticated key agreement protocols from bilinear pairings (short paper)
-
Lecture Notes in Comput. Sci. Springer New York
-
S.H. Seo, and K. Shim Cryptanalysis of ID-based authenticated key agreement protocols from bilinear pairings (short paper) Information and Communications Security Lecture Notes in Comput. Sci. vol. 4307 2006 Springer New York 410 419
-
(2006)
Information and Communications Security
, vol.4307
, pp. 410-419
-
-
Seo, S.H.1
Shim, K.2
-
34
-
-
0037142442
-
Identity-based authenticated key agreement protocol based on Weil pairing
-
DOI 10.1049/el:20020387
-
N.P. Smart Identity-based authenticated key agreement protocol based on Weil pairing Electronics Lett. 38 13 2002 630 632 (Pubitemid 34725603)
-
(2002)
Electronics Letters
, vol.38
, Issue.13
, pp. 630-632
-
-
Smart, N.P.1
-
35
-
-
33645606306
-
Security analysis of Shim's authenticated key agreement protocols from pairings
-
H.M. Sun, B.T. Hsieh, Security analysis of Shim's authenticated key agreement protocols from pairings, Cryptology ePrint Archive Report 2003/113, 2003.
-
(2003)
Cryptology EPrint Archive Report 2003/113
-
-
Sun, H.M.1
Hsieh, B.T.2
-
36
-
-
23044474013
-
Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
-
DOI 10.1007/s00145-004-0313-x
-
E.R. Verheul Evidence that XTR is more secure than supersingular elliptic curve cryptosystems J. Cryptology 17 4 2004 277 296 (Pubitemid 41201460)
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 277-296
-
-
Verheul, E.R.1
-
37
-
-
33646184315
-
Efficient identity-based and authenticated key agreement protocol
-
Y. Wang, Efficient identity-based and authenticated key agreement protocol, Cryptology ePrint Archive Report2005/108, 2005.
-
(2005)
Cryptology EPrint Archive Report2005/108
-
-
Wang, Y.1
-
38
-
-
33646703132
-
Security of an efficient ID-based authenticated key agreement protocol from pairings
-
Lecture Notes in Comput. Sci. Springer New York
-
S.B. Wang, Z.F. Cao, and H.Y. Bao Security of an efficient ID-based authenticated key agreement protocol from pairings Parallel and Distributed Processing and Applications - ISPA2005 Lecture Notes in Comput. Sci. vol. 3759 2005 Springer New York 342 349
-
(2005)
Parallel and Distributed Processing and Applications - ISPA2005
, vol.3759
, pp. 342-349
-
-
Wang, S.B.1
Cao, Z.F.2
Bao, H.Y.3
-
39
-
-
81955161609
-
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
-
S. Wang, Z. Cao, Z. Cheng, K.K.R. Choo, Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode, Cryptology ePrint Archive Report 2007/313, 2007.
-
(2007)
Cryptology EPrint Archive Report 2007/313
-
-
Wang, S.1
Cao, Z.2
Cheng, Z.3
Choo, K.K.R.4
-
40
-
-
33845521079
-
Cryptanalysis of Noel McCullagh and Paulo S.L.M. Barreto's two-party identity-based key agreement
-
G. Xie, Cryptanalysis of Noel McCullagh and Paulo S.L.M. Barreto's two-party identity-based key agreement, Cryptology ePrint Archive Report 2004/308, 2004.
-
(2004)
Cryptology EPrint Archive Report 2004/308
-
-
Xie, G.1
-
42
-
-
0037461946
-
Efficient ID-based key agreement from Weil pairing
-
X. Yi Efficient ID-based key agreement from Weil pairing Electronics Lett. 39 2 2003 206 208
-
(2003)
Electronics Lett.
, vol.39
, Issue.2
, pp. 206-208
-
-
Yi, X.1
-
43
-
-
38149028202
-
A new efficient ID-based authenticated key agreement protocol
-
Q. Yuan, S. Li, A new efficient ID-based authenticated key agreement protocol, Cryptology ePrint Archive Report 2005/309, 2005.
-
(2005)
Cryptology EPrint Archive Report 2005
, vol.309
-
-
Yuan, Q.1
Li, S.2
|