-
1
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key exchange protocols
-
ACM Press
-
Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: 30th ACM Symposium on Theory of Computing, pp. 419-428. ACM Press (1998), http://www-cse.ucsd.edu/users/mihir/papers/key-distribution.html
-
(1998)
30th ACM Symposium on Theory of Computing
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
2
-
-
84873466407
-
Authenticated Key Exchange Secure against Dictionary Attacks
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
84945119254
-
Entity Authentication and Key Distribution
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994), http://www-cse.ucsd.edu/users/mihir
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
0001940580
-
Provably secure session key distribution - The three party case
-
ACM Press
-
Bellare, M., Rogaway, P.: Provably secure session key distribution - the three party case. In: 27th ACM Symposium on Theory of Computing, pp. 57-66. ACM Press (1995)
-
(1995)
27th ACM Symposium on Theory of Computing
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
70349858083
-
Efficient One-Round Key Exchange in the Standard Model
-
Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. Springer, Heidelberg
-
Boyd, C., Cliff, Y., Gonzalez Nieto, J.M., Paterson, K.G.: Efficient One-Round Key Exchange in the Standard Model. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 69-83. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5107
, pp. 69-83
-
-
Boyd, C.1
Cliff, Y.2
Gonzalez Nieto, J.M.3
Paterson, K.G.4
-
6
-
-
35048860626
-
Analysis of Key-exchange Protocols and their use for Building Secure Channels
-
Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
-
Canetti, R., Krawczyk, H.: Analysis of Key-exchange Protocols and their use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001), http://eprint.iacr.org/ 2001/040/
-
(2001)
LNCS, 2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
7
-
-
84947232363
-
Universally Composable Notions of Key Exchange and Secure Channels
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Canetti, R., Krawczyk, H.: Universally Composable Notions of Key Exchange and Secure Channels. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 337-351. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 337-351
-
-
Canetti, R.1
Krawczyk, H.2
-
8
-
-
77649246342
-
Reusing Static Keys in Key Agreement Protocols
-
Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. Springer, Heidelberg
-
Chatterjee, S., Menezes, A., Ustaoglu, B.: Reusing Static Keys in Key Agreement Protocols. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 39-56. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5922
, pp. 39-56
-
-
Chatterjee, S.1
Menezes, A.2
Ustaoglu, B.3
-
9
-
-
38149091828
-
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
-
Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. Springer, Heidelberg
-
Chow, S.S.M., Choo, K.-K.R.: Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 203-220. Springer, Heidelberg (2007), http://eprint.iacr.org/2007/018
-
(2007)
LNCS
, vol.4779
, pp. 203-220
-
-
Chow, S.S.M.1
Choo, K.-K.R.2
-
12
-
-
67049104242
-
-
Cryptology ePrint Archive, Report 2006/260
-
Dent, A.W.: A note on game-hopping proofs. Cryptology ePrint Archive, Report 2006/260 (2006), http://eprint.iacr.org/2006/260/
-
(2006)
A Note on Game-hopping Proofs.
-
-
Dent, A.W.1
-
14
-
-
1542593353
-
Authentication and authenticated key exchange
-
Diffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchange. Designs, Codes and Cryptography 2, 107-125 (1992)
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
15
-
-
79956318444
-
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
-
Zhou, J., Yung, M. (eds.) ACNS 2010. Springer, Heidelberg
-
Gennaro, R., Krawczyk, H., Rabin, T.: Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 309-328. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6123
, pp. 309-328
-
-
Gennaro, R.1
Krawczyk, H.2
Rabin, T.3
-
16
-
-
35048878818
-
One-round Protocols for Two-party Authenticated Key Exchange
-
Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. Springer, Heidelberg
-
Jeong, I.R., Katz, J., Lee, D.-H.: One-round Protocols for Two-party Authenticated Key Exchange. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 220-232. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3089
, pp. 220-232
-
-
Jeong, I.R.1
Katz, J.2
Lee, D.-H.3
-
17
-
-
33745179557
-
HMQV: A High-Performance Secure Diffie-Hellman Protocol
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Krawczyk, H.: HMQV: A High-Performance Secure Diffie-Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005), http://eprint.iacr.org/2005/176/
-
(2005)
LNCS
, vol.3621
, pp. 546-566
-
-
Krawczyk, H.1
-
18
-
-
38149012093
-
Stronger Security of Authenticated Key Exchange
-
Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. Springer, Heidelberg
-
LaMacchia, B.A., Lauter, K., Mityagin, A.: Stronger Security of Authenticated Key Exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1-16. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4784
, pp. 1-16
-
-
LaMacchia, B.A.1
Lauter, K.2
Mityagin, A.3
-
19
-
-
77958053911
-
Comparing the pre- And post-specified peer models for key agreement
-
Menezes, A., Ustaoglu, B.: Comparing the pre- and post-specified peer models for key agreement. IJACT 1(3), 236-250 (2009)
-
(2009)
IJACT
, vol.1
, Issue.3
, pp. 236-250
-
-
Menezes, A.1
Ustaoglu, B.2
-
20
-
-
84964242030
-
Key Distribution Systems Based on Identification Information
-
Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
-
Okamoto, E.: Key Distribution Systems Based on Identification Information. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 194-202. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 194-202
-
-
Okamoto, E.1
-
22
-
-
84937389342
-
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
-
Public Key Cryptography
-
Okamoto, T., Pointcheval, D.: The Gap-problems: a New Class of Problems for the Security of Cryptographic Schemes. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 104-118. Springer, Heidelberg (2001) (Pubitemid 33232936)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1992
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
-
23
-
-
84855351110
-
-
Cryptology ePrint Archive, Report 2010/237
-
Sarr, A.P., Elbaz-Vincent, P., Bajard, J.-C.: A new security model for authenticated key agreement. Cryptology ePrint Archive, Report 2010/237 (2010), http://eprint.iacr.org/
-
(2010)
A New Security Model for Authenticated Key Agreement
-
-
Sarr, A.P.1
Elbaz-Vincent, P.2
Bajard, J.-C.3
-
25
-
-
77958071785
-
Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols
-
Pieprzyk, J., Zhang, F. (eds.) ProvSec 2009. Springer, Heidelberg
-
Ustaoglu, B.: Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols. In: Pieprzyk, J., Zhang, F. (eds.) ProvSec 2009. LNCS, vol. 5848, pp. 183-197. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5848
, pp. 183-197
-
-
Ustaoglu, B.1
-
26
-
-
38649136602
-
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
-
Ustaoglu, B.: Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS. Des. Codes Cryptography 46(3), 329-342 (2008)
-
(2008)
Des. Codes Cryptography
, vol.46
, Issue.3
, pp. 329-342
-
-
Ustaoglu, B.1
|