-
1
-
-
0345490607
-
Certificateless public key cryptography
-
Laih, C.-S. (ed.) ASIACRYPT 2003. Springer, Heidelberg
-
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452-473. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
2
-
-
24144432124
-
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
-
Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
-
Baek, J., Safavi-Naini, R., Susilo, W.: Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 380-397. Springer, Heidelberg (2005) (Pubitemid 41231344)
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 380-397
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
3
-
-
84945119254
-
Entity authentication and key distribution
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84949230533
-
Key Agreement Protocols and Their Security Analysis
-
Cryptography and Coding
-
Blake-Wilson, S., Johason, D., Menezes, A.: Key agreement protocols and their security analysis. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30-45. Springer, Heidelberg (1997) (Pubitemid 128005797)
-
(1997)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
5
-
-
74049114529
-
Certificateless one-way authenticated two-party key agreement protocol
-
Chen, W., Zhang, L., Qin, B., Wu, Q., Zhang, H.: Certificateless one-way authenticated two-party key agreement protocol. In: IEEE IAS 2009, pp. 483-486 (2009)
-
(2009)
IEEE IAS 2009
, pp. 483-486
-
-
Chen, W.1
Zhang, L.2
Qin, B.3
Wu, Q.4
Zhang, H.5
-
6
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001) (Pubitemid 33275848)
-
(2001)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
8
-
-
84871235333
-
ID-based one-pass authenticated key establishment
-
Gorantla, M., Boyd, C., Nieto, J.: ID-based one-pass authenticated key establishment. In: Sixth Australasian Conference on Information Security, vol. 81, pp. 39-46 (2008)
-
(2008)
Sixth Australasian Conference on Information Security
, vol.81
, pp. 39-46
-
-
Gorantla, M.1
Boyd, C.2
Nieto, J.3
-
9
-
-
84876307417
-
A new certificateless authenticated key agreement protocol for SIP with different KGCs
-
doi:10.1002/sec.595
-
Li, X., Zhang, Y., Zhang, G.: A new certificateless authenticated key agreement protocol for SIP with different KGCs, Security and Communication Networks, doi:10.1002/sec.595
-
Security and Communication Networks
-
-
Li, X.1
Zhang, Y.2
Zhang, G.3
-
10
-
-
69949142503
-
Strongly secure certificateless key agreement
-
Shacham, H., Waters, B. (eds.) Pairing 2009. Springer, Heidelberg
-
Lippold, G., Boyd, C., Nieto, J.G.: Strongly secure certificateless key agreement. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 206-230. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5671
, pp. 206-230
-
-
Lippold, G.1
Boyd, C.2
Nieto, J.G.3
-
11
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters 56(3), 131-133 (1995)
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
12
-
-
58349101975
-
An enhanced authentication and key agreement mechanism for SIP using certificateless public-key cryptography
-
Luo, M., Wen, Y., Zhao, H.: An enhanced authentication and key agreement mechanism for SIP using certificateless public-key cryptography. In: IEEE ICYCS 2008, pp. 1577-1582 (2008)
-
(2008)
IEEE ICYCS 2008
, pp. 1577-1582
-
-
Luo, M.1
Wen, Y.2
Zhao, H.3
-
13
-
-
49949116357
-
Certificateless authenticated two-party key agreement protocols
-
Okada, M., Satoh, I. (eds.) ASIAN 2006. Springer, Heidelberg
-
Mandt, T.K., Tan, C.H.: Certificateless authenticated two-party key agreement protocols. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol. 4435, pp. 37-44. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4435
, pp. 37-44
-
-
Mandt, T.K.1
Tan, C.H.2
-
14
-
-
84937389342
-
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
-
Public Key Cryptography
-
Okamoto, T., Pointcheval, D.: The gap-problems: a new class of problems for the security of cryptographic schemes. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 104-118. Springer, Heidelberg (2001) (Pubitemid 33232936)
-
(2001)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.1992
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
-
15
-
-
26944463841
-
One-way and two-party authenticated ID-based key agreement protocols using pairing
-
Torra, V., Narukawa, Y., Miyamoto, S. (eds.) MDAI 2005. Springer, Heidelberg
-
Okamoto, T., Tso, R., Okamoto, E.: One-way and two-party authenticated ID-based key agreement protocols using pairing. In: Torra, V., Narukawa, Y., Miyamoto, S. (eds.) MDAI 2005. LNCS (LNAI), vol. 3558, pp. 122-133. Springer, Heidelberg (2005)
-
(2005)
LNCS (LNAI)
, vol.3558
, pp. 122-133
-
-
Okamoto, T.1
Tso, R.2
Okamoto, E.3
-
16
-
-
77649258504
-
A Study of two-party certificateless authenticated key-agreement protocols
-
Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. Springer, Heidelberg
-
Swanson, C., Jao, D.: A Study of two-party certificateless authenticated key-agreement protocols. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 57-71. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5922
, pp. 57-71
-
-
Swanson, C.1
Jao, D.2
-
17
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
Shamir, A.: Identity based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
18
-
-
35048854587
-
An efficient signature scheme from bilinear pairings and its applications
-
Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. Springer, Heidelberg Full version
-
Zhang, F., Safavi-Naini, R., Susilo, W.: An efficient signature scheme from bilinear pairings and its applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 277-290. Springer, Heidelberg (2004), Full version: http://www.uow.edu.au/~wsusilo/PKC04.pdf
-
(2004)
LNCS
, vol.2947
, pp. 277-290
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
-
19
-
-
79960186888
-
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
-
Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Provably secure one-round identity-based authenticated asymmetric group key agreement protocol. Information Sciences 181(19), 4318-4329 (2011)
-
(2011)
Information Sciences
, vol.181
, Issue.19
, pp. 4318-4329
-
-
Zhang, L.1
Wu, Q.2
Qin, B.3
Domingo-Ferrer, J.4
-
20
-
-
73149101252
-
Simulatable certificateless two-party authenticated key agreement protocol
-
Zhang, L., Zhang, F., Wu, Q., Domingo-Ferrer, J.: Simulatable certificateless two-party authenticated key agreement protocol. Information Sciences 180(6), 1020-1030 (2010)
-
(2010)
Information Sciences
, vol.180
, Issue.6
, pp. 1020-1030
-
-
Zhang, L.1
Zhang, F.2
Wu, Q.3
Domingo-Ferrer, J.4
|