-
3
-
-
84945119254
-
Entity Authentication and Key Distributions – the Three Party Case
-
Springer-Verlag
-
M. Bellare and P. Rogaway, “Entity Authentication and Key Distributions – the Three Party Case”, Advances in Cryptology – Crypto ’93, 773, Springer-Verlag, pp232-249, 1994. 248
-
(1994)
Advances in Cryptology – Crypto ’93
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84949221411
-
Authenticated Diffie-Hellman Key Agreement Protocols
-
Springer-Verlag
-
S. Blake-Wilson and A. Menezes, “Authenticated Diffie-Hellman Key Agreement Protocols”, Proceedings of the 5th Annual Workshop on Selected Areas in Cryptography (SAC ’98), 1556, Springer-Verlag, pp339-361, 1999. 238, 238, 238, 238, 239, 241, 244, 246, 247, 247, 247
-
(1999)
Proceedings of the 5Th Annual Workshop on Selected Areas in Cryptography (SAC ’98)
, vol.1556
, pp. 339-361
-
-
Blake-Wilson, S.1
Menezes, A.2
-
5
-
-
84949230533
-
Key Agreement Protocols and their Security Analysis
-
Springer-Verlag
-
S. Blake-Wilson, C. Johnson and A. Menezes, “Key Agreement Protocols and their Security Analysis”, Proceedings of the sixth IMA International Conference on Cryptography and Coding, 1355, Springer-Verlag, pp30-45, 1997. 242, 244, 244, 244, 248
-
(1997)
Proceedings of the Sixth IMA International Conference on Cryptography and Coding
, vol.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, C.2
Menezes, A.3
-
6
-
-
33744934995
-
-
Technical report CORR 98-42, Univ. Of Waterloo
-
S. Blake-Wilson and A. Menezes, “Unknown Key-Share Attacks on the Station-To-Station (STS) Protocol”, Technical report CORR 98-42, Univ. Of Waterloo, 1998. 237, 238, 243, 248
-
(1998)
Unknown Key-Share Attacks on the Station-To-Station (STS) Protocol
-
-
Blake-Wilson, S.1
Menezes, A.2
-
8
-
-
84955604812
-
Algorithms for Black-Box Fields and their Application to Cryptography
-
Springer-Verlag
-
D. Boneh and R. Lipton, “Algorithms for Black-Box Fields and their Application to Cryptography”, Advances in Cryptology – Crypto ’96, 1109, Springer-Verlag, pp 283-297, 1996. 239
-
(1996)
Advances in Cryptology – Crypto ’96
, vol.1109
, pp. 283-297
-
-
Boneh, D.1
Lipton, R.2
-
9
-
-
0032635116
-
Scalar Multiplication on Elliptic Curves by Frobenius Expansions
-
J. Cheon, S. Park, C. Park and S. Hahn, “Scalar Multiplication on Elliptic Curves by Frobenius Expansions”, ETRI J., Vol.21, No.1, pp27-38, 1999. 243
-
(1999)
ETRI J
, vol.21
, Issue.1
, pp. 27-38
-
-
Cheon, J.1
Park, S.2
Park, C.3
Hahn, S.4
-
11
-
-
36248981438
-
-
U.S. patent 4,956,865, September 11
-
K. C. Goss, “Cryptographic Method and Apparatus for Public Key Exchange with Authentication”, U.S. patent 4,956,865, September 11, 1990. 240
-
(1990)
Cryptographic Method and Apparatus for Public Key Exchange with Authentication
-
-
Goss, K.C.1
-
14
-
-
0005243827
-
-
Technical report CORR 98-5, Univ. Of Waterloo, Canada
-
L. Law, A. Menezes, M. Qu, J. Solinas and S. Vanstone, “An Efficient Protocol for Authenticated Key Agreement Protocol ”, Technical report CORR 98-5, Univ. Of Waterloo, Canada, 1998. 238, 238, 239, 239, 239, 239, 240, 240, 240, 241, 241, 242, 242, 242, 244, 244
-
(1998)
An Efficient Protocol for Authenticated Key Agreement Protocol
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
15
-
-
84958601057
-
A Key Recovery Attack on Discrete Log-based Schemes using a Prime Order Subgroup
-
Springer-Verlag
-
C. Lim and P. Lee, “A Key Recovery Attack on Discrete Log-based Schemes using a Prime Order Subgroup”, Advances in Cryptology – Crypto ’97, 1294, Springer-Verlag, pp249-263, 1997. 242
-
(1997)
Advances in Cryptology – Crypto ’97
, vol.1294
, pp. 249-263
-
-
Lim, C.1
Lee, P.2
-
16
-
-
1942544435
-
Diffie-Hellman Oracles
-
Springer-Verlag
-
U. Maurer and S. Wolf, “Diffie-Hellman Oracles”, Advances in Cryptology – Crypto ’96, 1109, Springer-Verlag, pp283-297, 1996. 239
-
(1996)
Advances in Cryptology – Crypto ’96
, vol.1109
, pp. 283-297
-
-
Maurer, U.1
Wolf, S.2
-
17
-
-
0022660635
-
On Seeking Smart Public-Key Distribution Systems
-
T. Matsumoto, Y. Takashima and H. Imai, “On Seeking Smart Public-Key Distribution Systems”, Trans. Of IEICE, Vol.69, pp99-106, 1986. 240
-
(1986)
Trans. Of IEICE
, vol.69
, pp. 99-106
-
-
Matsumoto, T.1
Takashima, Y.2
Imai, H.3
-
18
-
-
84944878354
-
-
CRC Press
-
A. Menezes, P. van Oorschot and S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997 237, 237, 237, 238, 238
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
19
-
-
0347124644
-
-
National Security Agency, Version 2.0, May 29
-
National Security Agency, “SKIPJACK and KEA Algorithm Specification”, Version 2.0, May 29, 1998. 240
-
(1998)
SKIPJACK and KEA Algorithm Specification
-
-
-
20
-
-
0348250970
-
A Key Distribution Paradox
-
Springer-Verlag
-
Y. Yacobi, “A Key Distribution Paradox”, Advances in Cryptology – Crypto ’90, 537, Springer-Verlag, pp268-273, 1991. 240
-
(1991)
Advances in Cryptology – Crypto ’90
, vol.537
, pp. 268-273
-
-
Yacobi, Y.1
|