-
2
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Springer-Verlag LNCS 2139
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In Proc. CRYPTO 01, pages 213-229. Springer-Verlag, 2001. LNCS 2139.
-
(2001)
Proc. CRYPTO 01
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
84944050090
-
Applications of multiple trust authorities in pairing based cryptosystems
-
Springer-Verlag LNCS 2437
-
L. Chen, K. Harrison, N. P. Smart, and D. Soldera. Applications of multiple trust authorities in pairing based cryptosystems. In Proceedings of Infrastructure Security: InfraSec 2002, pages 260-275. Springer-Verlag, 2002. LNCS 2437.
-
(2002)
Proceedings of Infrastructure Security: InfraSec 2002
, pp. 260-275
-
-
Chen, L.1
Harrison, K.2
Smart, N.P.3
Soldera, D.4
-
6
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Springer-Verlag LNCS 2260
-
C. Cocks. An identity based encryption scheme based on quadratic residues. In Cryptography and Coding, pages 360-363. Springer-Verlag, 2001. LNCS 2260.
-
(2001)
Cryptography and Coding
, pp. 360-363
-
-
Cocks, C.1
-
8
-
-
1842643238
-
-
IETF - Network Working Group, The Internet Society, March RFC 2311
-
S. Dusse, P. Hoffman, B. Ramsdell, L. Lundblade, and L. Repka. S/MIME Version 2 Message Specification. IETF - Network Working Group, The Internet Society, March 1998. RFC 2311.
-
(1998)
S/MIME Version 2 Message Specification
-
-
Dusse, S.1
Hoffman, P.2
Ramsdell, B.3
Lundblade, L.4
Repka, L.5
-
9
-
-
0004146915
-
-
IETF - Network Working Group, The Internet Society, March RFC 2535
-
D. Eastlake. Domain Name System Security Extensions. IETF - Network Working Group, The Internet Society, March 1999. RFC 2535.
-
(1999)
Domain Name System Security Extensions
-
-
Eastlake, D.1
-
11
-
-
0024135240
-
Zero knowledge proofs of identity
-
U. Feige, A. Fiat, and A. Shamir. Zero knowledge proofs of identity. Journal of Cryptology, 1(2):77-94, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
12
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
A. M. Odlyzko, editor Springer Lecture Notes in Computer Science No. 263
-
A. Fiat and A. Shamir. How to prove yourself: practical solutions to identification and signature problems. In A. M. Odlyzko, editor, Proc. CRYPTO 86, pages 186-194. Springer, 1987. Lecture Notes in Computer Science No. 263.
-
(1987)
Proc. CRYPTO 86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
13
-
-
85077732854
-
-
Free S/WAN Project. Free S/WAN. http://www.freeswan.org.
-
Free S/WAN
-
-
-
15
-
-
0004115841
-
-
IETF - Network Working Group, The Internet Society, November RFC 2409
-
D. Harkins and D. Carrel. The Internet Key Exchange (IKE). IETF - Network Working Group, The Internet Society, November 1998. RFC 2409.
-
(1998)
The Internet Key Exchange (IKE)
-
-
Harkins, D.1
Carrel, D.2
-
17
-
-
84947242701
-
Toward hierarchical identity-based encryption
-
Springer-Verlag LNCS 2332
-
J. Horwitz and B. Lynn. Toward hierarchical identity-based encryption. In Proc. EUROCRYPT 02, pages 466-481. Springer-Verlag, 2002. LNCS 2332.
-
(2002)
Proc. EUROCRYPT 02
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
20
-
-
0003418425
-
-
IETF - Network Working Group, The Internet Society, November RFC 2408
-
D. Maughan, M. Schertler, M. Schneider, and J. Turner. Internet Security Association and Key Management Protocol (ISAKMP). IETF - Network Working Group, The Internet Society, November 1998. RFC 2408.
-
(1998)
Internet Security Association and Key Management Protocol (ISAKMP)
-
-
Maughan, D.1
Schertler, M.2
Schneider, M.3
Turner, J.4
-
21
-
-
0003757663
-
-
IETF - Network Working Group, The Internet Society, November RFC 1034
-
P. Mockapetris. Domain Names - Concepts and Facilities. IETF - Network Working Group, The Internet Society, November 1987. RFC 1034.
-
(1987)
Domain Names - Concepts and Facilities
-
-
Mockapetris, P.1
-
25
-
-
2642549675
-
Cryptosystems based on pairing
-
Okinawa, Japan, January
-
R. Sakai, K. Ohgishi, and M. Kasahara. Cryptosystems based on pairing. In Proceedings of the Symposium on Cryptography and Information Security (SCIS 2000), Okinawa, Japan, January 2000.
-
(2000)
Proceedings of the Symposium on Cryptography and Information Security (SCIS 2000)
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
26
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
G. R. Blakley and D. C. Chaum, editors Springer Lecture Notes in Computer Science No. 196
-
A. Shamir. Identity-based cryptosystems and signature schemes. In G. R. Blakley and D. C. Chaum, editors, Proc. CRYPTO 84, pages 47-53. Springer, 1985. Lecture Notes in Computer Science No. 196.
-
(1985)
Proc. CRYPTO 84
, pp. 47-53
-
-
Shamir, A.1
-
27
-
-
0037142442
-
An identity based authenticated key agreement protocol based on the weil pairing
-
N. Smart. An identity based authenticated key agreement protocol based on the weil pairing. Electronics Letters, 38:630-632, 2002.
-
(2002)
Electronics Letters
, vol.38
, pp. 630-632
-
-
Smart, N.1
-
28
-
-
84868549334
-
-
Stanford Applied Cryptography Group. IBE secure email. http://crypto.stanford.edu/ibe.
-
IBE Secure Email
-
-
|