-
1
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key exchange protocols
-
M. Bellare, R. Canetti, and H. Krawczyk, A modular approach to the design and analysis of authentication and key exchange protocols, Proc. 30th Annual Symposium on the Theory of Computing, ACM, pp. 419-428, 1998.
-
(1998)
Proc. 30Th Annual Symposium on the Theory of Computing, ACM
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
3
-
-
84945119254
-
Entity autentication and key distribution
-
M. Bellare and P. Rogaway, Entity autentication and key distribution, Advances in Cryptology; Crypto’93, LNCS 773, Springer-Verlag, pp. 232-249, 1994.
-
(1994)
Advances in Cryptology; Crypto’93, LNCS 773, Springer-Verlag
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84956866842
-
Unknown key-share attacks on the station-to-station (STS) protocol
-
S. Blake-Wilson, D. Johnson and A. Menezes, Unknown key-share attacks on the station-to-station (STS) protocol, PKC’99, LNCS 1560, Springer-Verlag, pp. 154-170, 1999.
-
(1999)
PKC’99, LNCS 1560, Springer-Verlag
, pp. 154-170
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
5
-
-
84949221411
-
Authenticated Diffie-Hellman key agreement protocols
-
S. Blake-Wilson and A. Menezes, Authenticated Diffie-Hellman key agreement protocols, Proc. of the 5th Annual Workshop on Selected Areas in Cryptography, SAC’98, LNCS 1556, Springer-Verlag, pp. 339-361, 1999.
-
(1999)
Proc. of the 5Th Annual Workshop on Selected Areas in Cryptography, SAC’98, LNCS 1556, Springer-Verlag
, pp. 339-361
-
-
Blake-Wilson, S.1
Menezes, A.2
-
6
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, Advances in cryptology; Crypto’01, LNCS 2139, Springer-Verlag, pp. 213-229, 2001.
-
(2001)
Advances in Cryptology; Crypto’01, LNCS 2139, Springer-Verlag
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
10444220191
-
Efficient identity-based authenticated key agreement protocol from pairings
-
Y. J. Choie, E. Jeong and E. Lee, Efficient identity-based authenticated key agreement protocol from pairings, Applied Mathematics and Computation, 162(1), pp. 179-188, 2005.
-
(2005)
Applied Mathematics and Computation
, vol.162
, Issue.1
, pp. 179-188
-
-
Choie, Y.J.1
Jeong, E.2
Lee, E.3
-
8
-
-
0017018484
-
New directions in cryptography
-
W. Diffie, and M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, 22(6), pp. 644-654, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
9
-
-
84946844750
-
A one round protocol for tripartite Diffie-Hellman
-
A. Joux, A one round protocol for tripartite Diffie-Hellman, ANTS IV, LNCS 1838, Springer-Verlag, pp. 385-394, 2000.
-
(2000)
ANTS IV, LNCS 1838, Springer-Verlag
, pp. 385-394
-
-
Joux, A.1
-
11
-
-
33646720921
-
Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment
-
K. Kim, H. Lee, and H. Oh, Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment, ICICS’05, LNCS 3783, Springer-Verlag, pp. 323-335, 2004.
-
(2004)
ICICS’05, LNCS 3783, Springer-Verlag
, pp. 323-335
-
-
Kim, K.1
Lee, H.2
Oh, H.3
-
12
-
-
77949692038
-
ID-based authenticated multiple-key agreement protocol from pairing
-
K. Kim, E. Ryu, and K. Yoo, ID-based authenticated multiple-key agreement protocol from pairing, International Conference on Computational Science and Its Applications, ICCSA’04, LNCS 3046, Springer-Verlag, pp. 672-680, 2004.
-
(2004)
International Conference on Computational Science and Its Applications, ICCSA’04, LNCS 3046, Springer-Verlag
, pp. 672-680
-
-
Kim, K.1
Ryu, E.2
Yoo, K.3
-
13
-
-
24144458508
-
A new two-party identity-based authenticated key agreement
-
N. McCullagh, P. S. L. M. Barreto, A new two-party identity-based authenticated key agreement, CT-RSA’05, LNCS 3376, Springer-Verlag, pp. 262-274, 2005.
-
(2005)
CT-RSA’05, LNCS 3376, Springer-Verlag
, pp. 262-274
-
-
McCullagh, N.1
Barreto, P.S.L.M.2
-
14
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology; Crypto’84, LNCS 196, Springer-Verlag, pp. 47-53, 1884.
-
(1884)
Advances in Cryptology; Crypto’84, LNCS 196, Springer-Verlag
, pp. 47-53
-
-
Shamir, A.1
-
15
-
-
0037142442
-
An ID-based authenticated key agreement protocol based on the Weil pairing
-
N. Smart, An ID-based authenticated key agreement protocol based on the Weil pairing, Elec. Lett., vol. 38(13), pp. 630-632, 2002.
-
(2002)
Elec. Lett.
, vol.38
, Issue.13
, pp. 630-632
-
-
Smart, N.1
-
16
-
-
0038680685
-
Efficient one round authenticated tripartite key agreement protocol from Weil pairing
-
K. Shim, Efficient one round authenticated tripartite key agreement protocol from Weil pairing, Elec. Lett., vol. 39(8), pp. 653-654, 2003.
-
(2003)
Elec. Lett.
, vol.39
, Issue.8
, pp. 653-654
-
-
Shim, K.1
-
17
-
-
33645606306
-
Security analysis of Shim’s authenticated key agreement protocols from pairings
-
Report 2003/113
-
H. Sun and B. Hsieh, Security analysis of Shim’s authenticated key agreement protocols from pairings, Cryptogarphy ePrint Archive, Report 2003/113, available at http://eprint.iacr.org/2003/113/.
-
Cryptogarphy Eprint Archive
-
-
Sun, H.1
Hsieh, B.2
-
18
-
-
33645734037
-
An ID-based key agreement scheme from pairing
-
Report 2005/093
-
G. Xie, An ID-based key agreement scheme from pairing, Cryptology ePrint Archive: Report 2005/093, available at http://eprint.iacr.org/2005/093, 2005.
-
(2005)
Cryptology Eprint Archive
-
-
Xie, G.1
|