-
4
-
-
84937407919
-
Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation
-
In, Springer-Verlag
-
M. Backes, C. Jacobi, and B. Pfitzmann. Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation. In Formal Methods-Getting IT Right, pages 310-329. Springer-Verlag, 2002.
-
(2002)
Formal Methods-Getting IT Right
, pp. 310-329
-
-
Backes, M.1
Jacobi, C.2
Pfitzmann, B.3
-
5
-
-
84873466407
-
Authenticated Key Exchange Secure Against Dictionary Attacks
-
In, Springer-Verlag, LNCS Volume 1807/2000
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure Against Dictionary Attacks. In Advances in Cryptology-Eurocrypt, pages 139-155. Springer-Verlag, 2000. LNCS Volume 1807/2000.
-
(2000)
Advances in Cryptology-Eurocrypt
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
6
-
-
0005078946
-
Entity Authentication and Key Distribution
-
In, Springer-Verlag, LNCS Volume 773/1993
-
M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. In Advances in Cryptology, pages 110-125. Springer-Verlag, 1993. LNCS Volume 773/1993.
-
(1993)
Advances in Cryptology
, pp. 110-125
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
0001940580
-
Provably Secure Session Key Distribution: The Three Party Case
-
In, ACM Press
-
M. Bellare and P. Rogaway. Provably Secure Session Key Distribution: The Three Party Case. In 27th ACM Symposium on the Theory of Computing, pages 57-66. ACM Press, 1995.
-
(1995)
27th ACM Symposium on the Theory of Computing
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
84882763552
-
Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis
-
In, British Computer Society Press, Dec
-
C. Boyd and K. Viswanathan. Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis. In Formal Aspects of Security-FASec 2002, pages 209-223. British Computer Society Press, Dec 2002.
-
(2002)
Formal Aspects of Security-FASec 2002
, pp. 209-223
-
-
Boyd, C.1
Viswanathan, K.2
-
10
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
In, Springer-Verlag, May, LNCS Volume 2045/2001
-
R. Canetti and H. Krawczyk. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In Advances in Cryptology-Eurocrypt 2001:, pages 453-474. Springer-Verlag, May 2001. LNCS Volume 2045/2001.
-
(2001)
Advances in Cryptology-Eurocrypt 2001
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
13
-
-
33645399350
-
Mutual Authentication and Key Exchange Protocol for Low Power Devices
-
In, Springer-Verlag
-
M. Jakobsson and D. Pointcheval. Mutual Authentication and Key Exchange Protocol for Low Power Devices. In Financial Cryptography, pages 178-195. Springer-Verlag, 2001.
-
(2001)
Financial Cryptography
, pp. 178-195
-
-
Jakobsson, M.1
Pointcheval, D.2
-
15
-
-
0005076119
-
Cryptographic Security of Reactive Systems
-
In Steve Schneider and Peter Ryan, editors, Reed Elsevier
-
B. Pfitzmann, M. Schunter, and M. Waidner. Cryptographic Security of Reactive Systems. In Steve Schneider and Peter Ryan, editors, Electronic Notes in Theoretical Computer Science, volume 32. Reed Elsevier, 2000.
-
(2000)
Electronic Notes in Theoretical Computer Science
, vol.32
-
-
Pfitzmann, B.1
Schunter, M.2
Waidner, M.3
-
17
-
-
84880904783
-
OAEP Reconsidered
-
In, Springer-Verlag, LNCS Volume 2139/2001
-
V. Shoup. OAEP Reconsidered. In Advances in Cryptology-CRYPTO 2001, pages 239-259. Springer-Verlag, 2001. LNCS Volume 2139/2001.
-
(2001)
Advances in Cryptology-CRYPTO 2001
, pp. 239-259
-
-
Shoup, V.1
-
18
-
-
2642534140
-
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
-
In, Springer-Verlag
-
D.S. Wong and A.H. Chan. Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices. In Advances in Cryptology-Asiacrypt 2001. Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology-Asiacrypt 2001
-
-
Wong, D.S.1
Chan, A.H.2
|