-
1
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Shamir A. Identity-based cryptosystems and signature schemes. Lecture Notes in Computer Science, 1985, 196: 47-53.
-
(1985)
Lecture Notes in Computer Science
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
3
-
-
33846923573
-
Certificateless authenticated key agreement based on the MTI/CO protocol
-
Wang S, Cao Z, Dong X. Certificateless authenticated key agreement based on the MTI/CO protocol. Journal of Information and Computational Science, 2006, 3(3): 575-581.
-
(2006)
Journal of Information and Computational Science
, vol.3
, Issue.3
, pp. 575-581
-
-
Wang, S.1
Cao, Z.2
Dong, X.3
-
4
-
-
33947586742
-
Two-party authenticated key agreement in certificateless public key cryptography
-
Shi Y, Li J. Two-party authenticated key agreement in certificateless public key cryptography. Wuhan University Journal of Natural Sciences, 2007, 12(1): 71-74.
-
(2007)
Wuhan University Journal of Natural Sciences
, vol.12
, Issue.1
, pp. 71-74
-
-
Shi, Y.1
Li, J.2
-
6
-
-
49949116357
-
Certificateless authenticated two-party key agreement protocols
-
Mandt T, Tan C. Certificateless authenticated two-party key agreement protocols. Lecture Notes in Computer Science, 2007, 4435: 37-44.
-
(2007)
Lecture Notes in Computer Science
, vol.4435
, pp. 37-44
-
-
Mandt, T.1
Tan, C.2
-
7
-
-
44549086712
-
A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography
-
Wang F, Zhang Y. A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography. Computer Communications, 2008, 31(10): 2142-2149.
-
(2008)
Computer Communications
, vol.31
, Issue.10
, pp. 2142-2149
-
-
Wang, F.1
Zhang, Y.2
-
8
-
-
77649258504
-
A study of two-party certificateless authenticated key agreement protocols
-
Swanson C, Jao D. A study of two-party certificateless authenticated key agreement protocols. Lecture Notes in Computer Science, 2009, 5922: 57-71.
-
(2009)
Lecture Notes in Computer Science
, vol.5922
, pp. 57-71
-
-
Swanson, C.1
Jao, D.2
-
10
-
-
73149101252
-
Simulatable certificateless two party authenticated key agreement protocol
-
Zhang L, Zhang F, Wu Q, Domingo-Ferrer J. Simulatable certificateless two party authenticated key agreement protocol. Information Sciences, 2010, 180(6): 1020-1030.
-
(2010)
Information Sciences
, vol.180
, Issue.6
, pp. 1020-1030
-
-
Zhang, L.1
Zhang, F.2
Wu, Q.3
Domingo-Ferrer, J.4
-
11
-
-
84856471625
-
Secure and efficient handover authentication based on bilinear pairing functions
-
He D, Chen C, Chan S, Bu J. Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications, 2012, 11(1): 48-53.
-
(2012)
IEEE Transactions on Wireless Communications
, vol.11
, Issue.1
, pp. 48-53
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
-
13
-
-
79957985374
-
Faster explicit formulas for computing pairings over ordinary curves
-
Aranha D, Karabina K, Longa P, Gebotys C, López J. Faster explicit formulas for computing pairings over ordinary curves. Lecture Notes in Computer Science, 2011, 6632: 48-68.
-
(2011)
Lecture Notes in Computer Science
, vol.6632
, pp. 48-68
-
-
Aranha, D.1
Karabina, K.2
Longa, P.3
Gebotys, C.4
López, J.5
-
15
-
-
80052632132
-
A pairing-free certificateless authenticated key agreement protocol
-
He D, Chen Y, Chen J. A pairing-free certificateless authenticated key agreement protocol. International Journal of Communication Systems, 2012, 25(2): 221-230.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.2
, pp. 221-230
-
-
He, D.1
Chen, Y.2
Chen, J.3
-
16
-
-
80052626402
-
A new two-round certificateless authenticated key agreement protocol without bilinear pairings
-
He D, Chen Y, Chen J, Zhang R, Han W. A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Mathematical and Computer Modelling, 2011, 54(11-12): 3143-3152.
-
(2011)
Mathematical and Computer Modelling
, vol.54
, Issue.11-12
, pp. 3143-3152
-
-
He, D.1
Chen, Y.2
Chen, J.3
Zhang, R.4
Han, W.5
-
17
-
-
80054808436
-
Toward pairing-free certificateless authenticated key exchanges
-
Xiong H, Wu Q, Chen Z. Toward pairing-free certificateless authenticated key exchanges. Lecture Notes in Computer Science, 2011, 7001: 79-94.
-
(2011)
Lecture Notes in Computer Science
, vol.7001
, pp. 79-94
-
-
Xiong, H.1
Wu, Q.2
Chen, Z.3
-
20
-
-
84865646945
-
An efficient certificateless two-party authenticated key agreement protocol
-
He D, Padhye S, Chen J. An efficient certificateless two-party authenticated key agreement protocol. Computers and Mathematics with Applications, 2012, 64(6): 1914-1926.
-
(2012)
Computers and Mathematics with Applications
, vol.64
, Issue.6
, pp. 1914-1926
-
-
He, D.1
Padhye, S.2
Chen, J.3
-
22
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Canetti R, Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels. Lecture Notes in Computer Science, 2001, 2045: 453-474.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
24
-
-
33646805409
-
Examining indistinguishability-based proof models for key establishment protocols
-
Choo K, Boyd C, Hitchcock Y. Examining indistinguishability-based proof models for key establishment protocols. Lecture Notes in Computer Science, 2005, 3788: 585-604.
-
(2005)
Lecture Notes in Computer Science
, vol.3788
, pp. 585-604
-
-
Choo, K.1
Boyd, C.2
Hitchcock, Y.3
-
25
-
-
4143140890
-
A survey of two signature aggregation techniques
-
Boneh D, Gentry C, Lynn B, Shacham H. A survey of two signature aggregation techniques. CryptoBytes, 2003, 6(2): 1-10.
-
(2003)
CryptoBytes
, vol.6
, Issue.2
, pp. 1-10
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
|