-
1
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
3
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Proc. of EUROCRYPT'00
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In Proc. of EUROCRYPT'00, LNCS, 2000.
-
(2000)
LNCS
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
5
-
-
84945119254
-
Entity authentication and key distribution
-
Proceedings of CRYPTO'93
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In Proceedings of CRYPTO'93, volume 773 of Lecture Notes in Computer Science, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.773
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
0020720357
-
On the security of public key protocols
-
March
-
D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, 29(2):198-208, March 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
8
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithm
-
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithm. IEEE Transactions on Information Theory, 31:469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
9
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
F. J. T. Fabrega, J. Hertzog, and J. Guttman. Strand spaces: Proving security protocols correct. Journal of Computer Security, 7(2/3):191-230, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 191-230
-
-
Fabrega, F.J.T.1
Hertzog, J.2
Guttman, J.3
-
13
-
-
28144456308
-
An attack on the Needham-Schroeder public key authentication protocol
-
November
-
G. Lowe. An attack on the Needham-Schroeder public key authentication protocol. Information processing letters, 56(3):131-136, November 1995.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-136
-
-
Lowe, G.1
-
14
-
-
0003130993
-
Breaking and fixing the Needham-Schröeder algorithm
-
Springer-Verlag
-
G. Lowe. Breaking and fixing the Needham-Schröeder algorithm. In Proc. of TACAS'96, pages 147-166. Springer-Verlag, 1996.
-
(1996)
Proc. of TACAS'96
, pp. 147-166
-
-
Lowe, G.1
-
16
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C. Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
17
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
December
-
R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Communications of ACM, December 1978.
-
(1978)
Communications of ACM
-
-
Needham, R.1
Schroeder, M.2
-
19
-
-
84974554584
-
Noninteractive zero-knowledge proofs of knowledfe and chosen ciphertext attack
-
C. Rackoff and D. Simon. Noninteractive zero-knowledge proofs of knowledfe and chosen ciphertext attack. In Advances in Cryptology- CRYPTO'91, pages 433-444, 1991.
-
(1991)
Advances in Cryptology- CRYPTO'91
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.2
|