-
1
-
-
3142632089
-
Just fast keying: Key agreement in a hostile internet
-
Aiello, W., Bellovin, S., Blaze, M., Canetti, R., Ionnidis, J., Keromytis, A. and Reingold, O. (2004) 'Just fast keying: key agreement in a hostile internet', ACM Transactions on Information and Systems Security, Vol. 7, No. 2, pp.1-30.
-
(2004)
ACM Transactions on Information and Systems Security
, vol.7
, Issue.2
, pp. 1-30
-
-
Aiello, W.1
Bellovin, S.2
Blaze, M.3
Canetti, R.4
Ionnidis, J.5
Keromytis, A.6
Reingold, O.7
-
3
-
-
35048856922
-
Validation of elliptic curve public keys
-
Antipa, A., Brown, D., Menezes, A., Struik, R. and Vanstone, S. (2003) 'Validation of elliptic curve public keys', in Desmedt, Y. (Ed.): Public Key Cryptography - PKC 2003, Lecture Notes in Computer Science, Vol. 2567, pp.211-223, Springer-Verlag. (Pubitemid 137638353)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2567
, pp. 211-223
-
-
Antipa, A.1
Brown, D.2
Menezes, A.3
Struik, R.4
Vanstone, S.5
-
5
-
-
84983134283
-
Differential fault analysis on elliptic curve cryptosystems
-
Bellare, M. (Ed.), Springer-Verlag
-
Biehl, I., Meyer, B. and Müller, V. (2000) 'Differential fault analysis on elliptic curve cryptosystems', in Bellare, M. (Ed.): Advances in Cryptology - CRYPTO 2000, Lecture Notes in Computer Science, Vol. 1880, pp.131-146, Springer-Verlag.
-
(2000)
Advances in Cryptology - CRYPTO 2000 Lecture Notes in Computer Science
, vol.1880
, pp. 131-146
-
-
Biehl, I.1
Meyer, B.2
Müller, V.3
-
7
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
Canetti, R. and Krawczyk, H. (2001) 'Analysis of key-exchange protocols and their use for building secure channels', in Pfitzmann, B. (Ed.): Advances in Cryptology - EUROCRYPT 2001, Lecture Notes in Computer Science, Vol. 2045, pp.453-474, Springer-Verlag, available athttp://eprint.iacr.org/2001/040/. (Pubitemid 33275848)
-
(2001)
Lecture Notes in Computer Science
, Issue.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
13
-
-
35248816546
-
SIGMA: The 'SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in the IKE protocols
-
Krawczyk, H. (2003) 'SIGMA: the 'SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in the IKE protocols', in Boneh, D. (Ed.): Advances in Cryptology -CRYPTO 2003, Lecture Notes in Computer Science, Vol. 2729, pp.400-425, Springer-Verlag. (Pubitemid 137636955)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2729
, pp. 400-425
-
-
Krawczyk, H.1
-
14
-
-
33745179557
-
HMQV: A high-performance secure Diffie-Hellman protocol
-
in Shoup, V. (Ed.), Springer-txt Verlag
-
Krawczyk, H. (2005) 'HMQV: a high-performance secure Diffie-Hellman protocol', in Shoup, V. (Ed.): Advances in Cryptology - CRYPTO 2005, Lecture Notes in Computer Science, Vol. 3621, pp.546-566, Springer-Verlag, available athttp://eprint.iacr.org/2005/176/.
-
(2005)
Advances in Cryptology - CRYPTO 2005 Lecture Notes in Computer Science
, vol.3621
, pp. 546-566
-
-
Krawczyk, H.1
-
15
-
-
84857846599
-
HMQV in IEEE P1363
-
7 July
-
Krawczyk, H. (2006) 'HMQV in IEEE P1363', Submission to the IEEE P1363 working group, 7 July, available at http://grouper.ieee.org/groups/1363/P1363- Reaffirm/submissions/ krawczyk-hmqv-spec.pdf.
-
(2006)
Submission to the IEEE P1363 Working Group
-
-
Krawczyk, H.1
-
16
-
-
74549221711
-
An efficient protocol for authenticated key agreement
-
Law, L., Menezes, A., Qu, M., Solinas, J. and Vanstone, S. (2003) 'An efficient protocol for authenticated key agreement', Designs, Codes and Cryptography, Vol. 28, pp.119-134.
-
(2003)
Designs, Codes and Cryptography
, vol.28
, pp. 119-134
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
17
-
-
84958601057
-
A key recovery attack on discrete log-based schemes using a prime order subgroup
-
in Kaliski, B. (Ed.), Springer-Verlag
-
Lim, C. and Lee, P. (1997) 'A key recovery attack on discrete log-based schemes using a prime order subgroup', in Kaliski, B. (Ed.): Advances in Cryptology - CRYPTO '97, Lecture Notes in Computer Science, Vol. 1294, pp.249-263, Springer-Verlag.
-
(1997)
: Advances in Cryptology - CRYPTO '97, Lecture Notes in Computer Science
, vol.1294
, pp. 249-263
-
-
Lim, C.1
Lee, P.2
-
18
-
-
0022660635
-
On seeking smart public-key distribution systems
-
Matsumoto, T., Takashima, Y. and Imai, H. (1986) 'On seeking smart public-key distribution systems', The Transactions of the IECE of Japan, Vol. E69, pp.99-106. (Pubitemid 16539156)
-
(1986)
Transactions of the Institute of Electronics and Communication Engineers of Japan. Section E
, vol.E69
, Issue.2
, pp. 99-106
-
-
Matsumoto Tsutomu1
Takashima Youichi2
Imai Hideki3
|