-
2
-
-
85020598353
-
Identity-based cryptosystems and signature protocols
-
LNCS
-
A. Shamir Identity-based cryptosystems and signature protocols Proc. CRYPTO1984 LNCS vol. 196 1984 47 53
-
(1984)
Proc. CRYPTO1984
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
3
-
-
0345490607
-
Certificateless public key cryptography
-
LNCS Springer-Verlag
-
S. Al-Riyami, and K.G. Paterson Certificateless public key cryptography Proceedings of ASIACRYPT 2003 LNCS vol. 2894 2003 Springer-Verlag 452 473
-
(2003)
Proceedings of ASIACRYPT 2003
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.1
Paterson, K.G.2
-
4
-
-
13944274129
-
Efficient authenticated key agreement protocol using self-certified public keys from pairings
-
Z. Shao Efficient authenticated key agreement protocol using self-certified public keys from pairings Wuhan University Journal of Natural Sciences 10 1 2005 267 270
-
(2005)
Wuhan University Journal of Natural Sciences
, vol.10
, Issue.1
, pp. 267-270
-
-
Shao, Z.1
-
6
-
-
49949116357
-
Certificateless authenticated two-party key agreement protocols
-
LNCS Springer-Verlag
-
T. Mandt, and C. Tan Certificateless authenticated two-party key agreement protocols Proceedings of the ASIAN 2006 LNCS vol. 4435 2008 Springer-Verlag 37 44
-
(2008)
Proceedings of the ASIAN 2006
, vol.4435
, pp. 37-44
-
-
Mandt, T.1
Tan, C.2
-
7
-
-
33947586742
-
Two-party authenticated key agreement in certificateless public key cryptography
-
Y. Shi, and J. Li Two-party authenticated key agreement in certificateless public key cryptography Wuhan University Journal of Natural Sciences 12 1 2007 71 74
-
(2007)
Wuhan University Journal of Natural Sciences
, vol.12
, Issue.1
, pp. 71-74
-
-
Shi, Y.1
Li, J.2
-
9
-
-
69949142503
-
Strongly secure certificateless key agreement
-
G. Lippold, C. Boyd, J. Nieto, Strongly secure certificateless key agreement. In Pairing 2009, 2009, pp. 206-230.
-
(2009)
Pairing 2009
, pp. 206-230
-
-
Lippold, G.1
Boyd, C.2
Nieto, J.3
-
10
-
-
73149101252
-
Simulatable certificateless two-party authenticated key agreement protocol
-
L. Zhang, F. Zhang, Q. Wua, and J. Domingo-Ferrer Simulatable certificateless two-party authenticated key agreement protocol Information Sciences 180 2010 1020 1030
-
(2010)
Information Sciences
, vol.180
, pp. 1020-1030
-
-
Zhang, L.1
Zhang, F.2
Wua, Q.3
Domingo-Ferrer, J.4
-
14
-
-
79956037223
-
Strongly secure certificateless key exchange without pairing
-
G. Yang, C. Tan, Strongly secure certificateless key exchange without pairing, in: 6th ACM Symposium on Information, Computer and Communications Security, 2011, pp. 71-79.
-
(2011)
6th ACM Symposium on Information, Computer and Communications Security
, pp. 71-79
-
-
Yang, G.1
Tan, C.2
-
15
-
-
80052632132
-
A pairing-free certificateless authenticated key agreement protocol
-
D. He, J. Chen, and J. Hu A pairing-free certificateless authenticated key agreement protocol International Journal of Communication Systems 25 2 2012 221 230
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.2
, pp. 221-230
-
-
He, D.1
Chen, J.2
Hu, J.3
-
16
-
-
80052626402
-
A new two-round certificateless authenticated key agreement protocol without bilinear pairings
-
D. He, Y. Chen, J. Chen, R. Zhang, and W. Han A new two-round certificateless authenticated key agreement protocol without bilinear pairings Mathematical and Computer Modelling 54 11-12 2011 3143 3152
-
(2011)
Mathematical and Computer Modelling
, vol.54
, Issue.1112
, pp. 3143-3152
-
-
He, D.1
Chen, Y.2
Chen, J.3
Zhang, R.4
Han, W.5
-
17
-
-
84945119254
-
Entity authentication and key distribution
-
LNCS Springer-Verlag
-
M. Bellare, and P. Rogaway Entity authentication and key distribution Proceedings of the CRYPTO 1993 LNCS vol. 773 1993 Springer-Verlag 232 249
-
(1993)
Proceedings of the CRYPTO 1993
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
19
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare, P. Rogaway, Random oracles are practical: A paradigm for designing efficient protocols, in: Proc. 1st ACM Conf. Comput. Commun. Security, 1993, pp. 62-73.
-
(1993)
Proc. 1st ACM Conf. Comput. Commun. Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
|