-
1
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key-exchange protocols
-
M. Bellare, R. Canetti and H. Krawczyk, “A modular approach to the design and analysis of authentication and key-exchange protocols”, 30th STOC, 1998.
-
(1998)
30Th STOC
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
2
-
-
84945119254
-
Entity authentication and key distribution
-
Lecture Notes in Computer Science, D. Stinson ed, Springer-Verlag
-
M. Bellare and P. Rogaway, “Entity authentication and key distribution”, Advances in Cryptology, - CRYPTO’93, Lecture Notes in Computer Science Vol. 773, D. Stinson ed, Springer-Verlag, 1994, pp. 232-249.
-
(1994)
Advances in Cryptology, - CRYPTO’93
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
0035163054
-
Universally Composable Security: A New paradigm for Cryptographic Protocols
-
Full version
-
R. Canetti, “Universally Composable Security: A New paradigm for Cryptographic Protocols”, 42nd FOCS, 2001. Full version available at http://eprint.iacr.org/2000/067.
-
(2001)
42Nd FOCS
-
-
Canetti, R.1
-
4
-
-
84858809967
-
Security Analysis of IKE’s Signature-based Key- Exchange Protocol
-
full version
-
Canetti, R., and Krawczyk, H., “Security Analysis of IKE’s Signature-based Key- Exchange Protocol”, full version. Cryptology ePrint Archive (http://eprint.iacr.org/), 2002.
-
(2002)
Cryptology Eprint Archive
-
-
Canetti, R.1
Krawczyk, H.2
-
5
-
-
70350563149
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
Full version in
-
Canetti, R., and Krawczyk, H., “Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels”, Advances in Cryptology – EUROCRYPT 2001, Full version in: http://eprint.iacr.org/2001/040.
-
Advances in Cryptology – EUROCRYPT 2001
-
-
Canetti, R.1
Krawczyk, H.2
-
6
-
-
3543100621
-
Universally Composable Notions of Key Exchange and Secure Channels
-
Full version
-
Canetti, R., and Krawczyk, H., “Universally Composable Notions of Key Exchange and Secure Channels”, Eurocrypt 02, 2002. Full version available at http://eprint.iacr.org/2002/059.
-
(2002)
Eurocrypt 02
-
-
Canetti, R.1
Krawczyk, H.2
-
7
-
-
84870707379
-
A Practical Public Key Cryptosystem Provable Secure Against Adaptive Chosen Ciphertext Attack
-
LNCS
-
R. Cramer and V. Shoup, “A Practical Public Key Cryptosystem Provable Secure Against Adaptive Chosen Ciphertext Attack”, In Crypto ’98, LNCS No. 1462, pages 13–25, 1998.
-
(1998)
Crypto ’98
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
8
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. van Oorschot and M. Wiener, “Authentication and authenticated key exchanges”, Designs, Codes and Cryptography, 2, 1992, pp. 107–125.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.2
Wiener, M.3
-
9
-
-
84937414246
-
-
manuscript, Feb
-
Gennaro, R., Krawczyk H., and Rabin, T., “Hashed Diffie-Hellman: A Hierarchy of Diffie-Hellman Assumptions”, manuscript, Feb 2002.
-
(2002)
Hashed Diffie-Hellman: A Hierarchy of Diffie-Hellman Assumptions
-
-
Gennaro, R.1
Krawczyk, H.2
Rabin, T.3
-
11
-
-
0003272021
-
The Internet Key Exchange (IKE)
-
D. Harkins and D. Carrel, ed., “The Internet Key Exchange (IKE)”, RFC 2409, Nov. 1998.
-
(1998)
RFC 2409
-
-
Harkins, D.1
Carrel, D.2
-
19
-
-
0032630725
-
Analysis of the Internet Key Exchange Protocol Using the NRL Protocol Analyzer
-
IEEE Computer Society Press, May
-
Meadows, C., “Analysis of the Internet Key Exchange Protocol Using the NRL Protocol Analyzer”, Proceedings of the 1999 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, May 1999.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
-
-
Meadows, C.1
-
21
-
-
0003294637
-
The OAKLEY Key Determination Protocol
-
Orman, H., “The OAKLEY Key Determination Protocol”, Request for Comments 2412, Nov. 1998.
-
(1998)
Request for Comments 2412
-
-
Orman, H.1
-
22
-
-
0004023090
-
On Formal Models for Secure Key Exchange
-
V. Shoup, “On Formal Models for Secure Key Exchange”, Theory of Cryptography Library, 1999. Available at: http://philby.ucsd.edu/cryptolib/1999/99-12.html.
-
(1999)
Theory of Cryptography Library
-
-
Shoup, V.1
|