-
1
-
-
33749033076
-
Escrowfree encryption supporting cryptographic work ow
-
Al-Riyami, S. S., Malone-Lee, J.&Smart, N. P. (2006), 'Escrowfree encryption supporting cryptographic work ow.', Int. J. Inf. Sec. 5(4), 217-229.
-
(2006)
Int. J. Inf. Sec.
, vol.5
, Issue.4
, pp. 217-229
-
-
Alriyami, S.S.1
Malonelee, J.2
Smart, N.P.3
-
2
-
-
0031642585
-
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract)
-
Bellare, M., Canetti, R.&Krawczyk, H. (1998), A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract), in 'Proc. of the 30th Annual ACM Symposium on Theory of Computing-STOC'98', pp. 419-428.
-
(1998)
Proc. of the 30th Annual ACM Symposium on Theory of Computing-STOC'98
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
3
-
-
84873466407
-
Authenticated Key Exchange Secure against Dictionary Attacks
-
of LNCS, Springer
-
Bellare, M., Pointcheval, D.&Rogaway, P. (2000), Authenticated Key Exchange Secure against Dictionary Attacks, in 'Advances in Cryptology- EUROCRYPT'00', Vol. 1807 of LNCS, Springer, pp. 139-155.
-
(2000)
Advances in Cryptology- EUROCRYPT'00
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
4
-
-
84945119254
-
Entity Authentication and Key Distribution
-
of LNCS, Springer
-
Bellare, M.&Rogaway, P. (1993), Entity Authentication and Key Distribution, in 'Advances in Cryptology-CRYPTO'93', Vol. 773 of LNCS, Springer, pp. 232-249.
-
(1993)
Advances in Cryptology-CRYPTO'93
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0001940580
-
Provably secure session key distribution: the three party case
-
Bellare, M.&Rogaway, P. (1995), Provably secure session key distribution: the three party case, in 'Proc. of the 27th Annual ACM Symposium on Theory of Computing-STOC'95', ACM, pp. 57-66.
-
(1995)
Proc. of the 27th Annual ACM Symposium on Theory of Computing-STOC'95', ACM
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
84871201546
-
An IBE Scheme to Exchange Authenticated Secret Keys
-
Report 2004/071
-
Benits Jr, W.&Terada, R. (2004), 'An IBE Scheme to Exchange Authenticated Secret Keys', Cryptology ePrint Archive, Report 2004/071. http://eprint.iacr.org/2004/071.
-
(2004)
Cryptology ePrint Archive
-
-
Benits Jr., W.1
Terada, R.2
-
7
-
-
84949230533
-
Key Agreement Protocols and Their Security Analysis
-
of LNCS, Springer
-
Blake-Wilson, S., Johnson, D.&Menezes, A. (1997), Key Agreement Protocols and Their Security Analysis, in 'Proc. of the 6th IMA Intl. Conf. on Cryptography and Coding'97', Vol. 1355 of LNCS, Springer, pp. 30-45.
-
(1997)
Proc. of the 6th IMA Intl. Conf. on Cryptography and Coding'97
, vol.1355
, pp. 30-45
-
-
Blakewilson, S.1
Johnson, D.2
Menezes, A.3
-
8
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
of LNCS, Springer
-
Boneh, D.&Franklin, M. (2001), Identity-Based Encryption from the Weil Pairing, in 'Advances in Cryptology-CRYPTO'01', Vol. 2139 of LNCS, Springer, pp. 213-229.
-
(2001)
Advances in Cryptology-CRYPTO'01
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
of LNCS, Springer
-
Canetti, R.&Krawczyk, H. (2001), Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels, in 'Advances in Cryptology- EUROCRYPT'01', Vol. 2045 of LNCS, Springer, pp. 453-474.
-
(2001)
Advances in Cryptology- EUROCRYPT'01
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
10
-
-
36248932062
-
Identity-based Key Agreement Protocols From Pairings
-
Report 2006/199
-
Chen, L., Cheng, Z.&Smart, N. (2006), 'Identity-based Key Agreement Protocols From Pairings', Cryptology ePrint Archive, Report 2006/199. http://eprint.iacr.org/2006/199.
-
(2006)
Cryptology ePrint Archive
-
-
Chen, L.1
Cheng, Z.2
Smart, N.3
-
11
-
-
10444246846
-
Identity Based Authenticated Key Agreement Protocols from Pairings
-
Report 2002/184
-
Chen, L.&Kudla, C. (2002), 'Identity Based Authenticated Key Agreement Protocols from Pairings', Cryptology ePrint Archive, Report 2002/184. http://eprint.iacr.org/2002/184.
-
(2002)
Cryptology ePrint Archive
-
-
Chen, L.1
Kudla, C.2
-
12
-
-
33746351314
-
Key derivation and randomness extraction
-
Report 2005/061
-
Chevassut, O., Fouque, P.-A., Gaudry, P.&Pointcheval, D. (2005), 'Key derivation and randomness extraction', Cryptology ePrint Archive, Report 2005/061. http://eprint.iacr.org/2005/061.
-
(2005)
Cryptology ePrint Archive
-
-
Chevassut, O.1
Fouque, P.-A.2
Gaudry, P.3
Pointcheval, D.4
-
13
-
-
84871235031
-
Key Agreement from Signatures: Improved Protocols and Anonymous Extension
-
Report 2007/018
-
Chow, S.&Choo, K.-K. (2007), 'Key Agreement from Signatures: Improved Protocols and Anonymous Extension', Cryptology ePrint Archive, Report 2007/018. http://eprint.iacr.org/2007/018.
-
(2007)
Cryptology ePrint Archive
-
-
Chow, S.1
Choo, K.-K.2
-
14
-
-
33645962801
-
Hybrid Signcryption Schemes with Outsider Security
-
of LNCS, Springer
-
Dent, A. (2005), Hybrid Signcryption Schemes with Outsider Security, in 'Information Security, 8th International Conference-ISC'05', Vol. 3650 of LNCS, Springer, pp. 203-217.
-
(2005)
Information Security, 8th International Conference-ISC'05
, vol.3650
, pp. 203-217
-
-
Dent, A.1
-
15
-
-
35048839833
-
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes
-
of LNCS, Springer
-
Dodis, Y., Gennaro, R., Håstad, J., Krawczyk, H.&Rabin, T. (2004), Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes, in 'Advances in Cryptology-CRYPTO'04', Vol. 3152 of LNCS, Springer.
-
(2004)
Advances in Cryptology-CRYPTO'04
, vol.3152
-
-
Dodis, Y.1
Gennaro, R.2
Håstad, J.3
Krawczyk, H.4
Rabin, T.5
-
16
-
-
36549032633
-
Pairings for Cryptographers
-
Report 2006/165
-
Galbraith, S., Paterson, K.&Smart, N. (2006), 'Pairings for Cryptographers', Cryptology ePrint Archive, Report 2006/165. http://eprint.iacr.org/2006/165.
-
(2006)
Cryptology ePrint Archive
-
-
Galbraith, S.1
Paterson, K.2
Smart, N.3
-
17
-
-
38349008957
-
On the Connection Between Signcryption and One-pass Key Establishment
-
of LNCS, Springer-Verlag, To appear
-
Gorantla, M., Boyd, C.&González Nieto, J. (2007), On the Connection Between Signcryption and One-pass Key Establishment, in 'Proc. of the 11th IMA Intl. Conf. on Cryptography and Coding'07', Vol. 4887 of LNCS, Springer-Verlag, pp. 277-301. To appear.
-
(2007)
Proc. of the 11th IMA Intl. Conf. on Cryptography and Coding'07
, vol.4887
, pp. 277-301
-
-
Gorantla, M.1
Boyd, C.2
Nieto, J.G.3
-
18
-
-
35248867510
-
Efficient Identity Based Signature Schemes Based on Pairings
-
of LNCS, Springer-Verlag
-
Hess, F. (2003), Efficient Identity Based Signature Schemes Based on Pairings, in 'Proc. of the 9th Workshop on Selected Areas in Cryptography- SAC '02', Vol. 2595 of LNCS, Springer-Verlag, pp. 310-324.
-
(2003)
Proc. of the 9th Workshop on Selected Areas in Cryptography- SAC '02
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
19
-
-
33745179557
-
HMQV: A High-Performance Secure Diefficiencye-Hellman Protocol
-
of LNCS, Springer
-
Krawczyk, H. (2005), HMQV: A High-Performance Secure Diefficiencye-Hellman Protocol, in 'Advances in Cryptology-CRYPTO'05', Vol. 3621 of LNCS, Springer, pp. 546-566.
-
(2005)
Advances in Cryptology-CRYPTO'05
, vol.3621
, pp. 546-566
-
-
Krawczyk, H.1
-
20
-
-
54249158637
-
Stronger Security of Authenticated Key Exchange
-
Report 2006/073, To appear in ProvSec 2007
-
LaMacchia, B., Lauter, K.&Mityagin, A. (2006), 'Stronger Security of Authenticated Key Exchange', Cryptology ePrint Archive, Report 2006/073. http://eprint.iacr.org/2006/073 To appear in ProvSec 2007.
-
(2006)
Cryptology ePrint Archive
-
-
Lamacchia, B.1
Lauter, K.2
Mityagin, A.3
-
21
-
-
26944463841
-
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing
-
of LNCS, Springer
-
Okamoto, T., Tso, R.&Okamoto, E. (2005), One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing, in 'Modeling Decisions for Artificial Intelligence, 2nd International Conference-MDAI'05', Vol. 3558 of LNCS, Springer, pp. 122-133.
-
(2005)
Modeling Decisions for Artificial Intelligence, 2nd International Conference-MDAI'05
, vol.3558
, pp. 122-133
-
-
Okamoto, T.1
Tso, R.2
Okamoto, E.3
-
22
-
-
1642414982
-
Cryptography from Pairings: A Snapshot of Current Research
-
Paterson, K. (2002), 'Cryptography from Pairings: A Snapshot of Current Research', Information Security Technical Report 7(3), 41-54.
-
(2002)
Information Security Technical Report
, vol.7
, Issue.3
, pp. 41-54
-
-
Paterson, K.1
-
23
-
-
33746100516
-
Cryptography from pairings
-
I Blake and G Seroussi and N Smart, ed., Cambridge University Press, chapter X
-
Paterson, K. (2005), Cryptography from pairings, in I Blake and G Seroussi and N Smart, ed., 'Advances in Elliptic Curve Cryptography', Cambridge University Press, chapter X.
-
(2005)
Advances in Elliptic Curve Cryptography
-
-
Paterson, K.1
-
24
-
-
2642549675
-
Cryptosystems based on Pairing
-
Sakai, R., Ohgishi, K.&Kasahara, M. (2000), Cryptosystems based on Pairing, in 'SCIS, C20'.
-
(2000)
SCIS, C20
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
25
-
-
85020598353
-
Identity-Based Cryptosystems and Signature Schemes
-
Shamir, A. (1984), Identity-Based Cryptosystems and Signature Schemes, in 'Advances in Cryptology-CRYPTO'84', pp. 47-53.
-
(1984)
Advances in Cryptology-CRYPTO'84
, pp. 47-53
-
-
Shamir, A.1
-
26
-
-
33646184315
-
Efficient Identity-Based and Authenticated Key Agreement Protocol
-
Report 2005/108
-
Wang, Y. (2005), 'Efficient Identity-Based and Authenticated Key Agreement Protocol', Cryptology ePrint Archive, Report 2005/108. http://eprint.iacr.org/2005/108.
-
(2005)
Cryptology ePrint Archive
-
-
Wang, Y.1
|