-
1
-
-
33745715734
-
Prudent Engineering Practice for Cryptographic Protocols
-
June 1
-
M. Abadi, R. Needham, "Prudent Engineering Practice for Cryptographic Protocols," DEC SRC Research Report 125, June 1, 1994.
-
(1994)
DEC SRC Research Report
-
-
Abadi, M.1
Needham, R.2
-
3
-
-
0013402235
-
Secure Implementation of Identification Systems
-
S. Bengio, G. Brassard, Y. Desmedt, C. Goutier, J. Quisquater, "Secure Implementation of Identification Systems," Journal of Cryptology, Vol. 4, 1991, pp. 175-183.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 175-183
-
-
Bengio, S.1
Brassard, G.2
Desmedt, Y.3
Goutier, C.4
Quisquater, J.5
-
6
-
-
0017018484
-
New Directions in Cryptography
-
November
-
W. Diffie, M. Heilman, "New Directions in Cryptography," IEEE Transactions on Information Theory, IT-22(6), November 1976, pp. 644-654.
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Heilman, M.2
-
7
-
-
1542593353
-
Authentication and Authenticated Key Exchanges
-
W. Diffie, P. C. van Oorschot, M. J. Wiener, "Authentication and Authenticated Key Exchanges," Designs, Codes and Cryptography, Vol. 2, 1992, pp. 107-125.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
van Oorschot, P.C.2
Wiener, M.J.3
-
8
-
-
84874800178
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
T. ElGamal, "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Transactions on Information Theory, Vol. 31, pp. 469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
ElGamal, T.1
-
10
-
-
0020180459
-
A Conference Key Distribution System
-
Sept
-
I. Ingemarsson, D. Tang, C. Wong, "A Conference Key Distribution System," IEEE Transactions on Information Theory, Vol. IT-28, No. 5, Sept. 1982, pp. 714-720.
-
(1982)
IEEE Transactions on Information Theory
, vol.IT-28
, Issue.5
, pp. 714-720
-
-
Ingemarsson, I.1
Tang, D.2
Wong, C.3
-
12
-
-
0022660635
-
On Seeking Smart Public-Key Distribution Systems
-
February
-
T. Matsumoto, Y. Takashima, H. Imai, "On Seeking Smart Public-Key Distribution Systems," The Transactions of the IECE of Japan, Vol. E. 69, No. 2, February 1986, pp. 99-106.
-
(1986)
The Transactions of the IECE of Japan
, vol.E69
, Issue.2
, pp. 99-106
-
-
Matsumoto, T.1
Takashima, Y.2
Imai, H.3
-
13
-
-
0007441727
-
Some New Key Agreement Protocols Providing Implicit Authentication
-
presented at the, Carleton University, Ottawa, ON
-
A. Menezes, M. Qu, S. Vanstone, "Some New Key Agreement Protocols Providing Implicit Authentication," presented at the Workshop on Selected Areas in Cryptography (SAC '95), Carleton University, Ottawa, ON., pp. 22-32.
-
Workshop on Selected Areas in Cryptography (SAC '95)
, pp. 22-32
-
-
Menezes, A.1
Qu, M.2
Vanstone, S.3
-
16
-
-
0028466586
-
Modern Key Agreement Techniques
-
July
-
R. Rueppel, P. van Oorschot, "Modern Key Agreement Techniques," Computer Communications Journal, Vol. 17, July 1994, pp. 458-465.
-
(1994)
Computer Communications Journal
, vol.17
, pp. 458-465
-
-
Rueppel, R.1
van Oorschot, P.2
-
17
-
-
0002805974
-
A Secure Audio Teleconference System
-
Springer-Verlag
-
D. Steer, L. Strawczynski, W. Diffie, M. Wiener, "A Secure Audio Teleconference System," Advances in Cryptology: Proceedings of CRYPTO '88, Springer-Verlag, 1988, pp. 520-528.
-
(1988)
Advances in Cryptology: Proceedings of CRYPTO '88
, pp. 520-528
-
-
Steer, D.1
Strawczynski, L.2
Diffie, W.3
Wiener, M.4
-
18
-
-
0029720059
-
Diffie-Hellman Key Distribution Extended to Group Communication
-
New Dehli, India, March 14-16
-
M. Steiner, G. Tsudik, M. Waidner, "Diffie-Hellman Key Distribution Extended to Group Communication," 3rd ACM Conference on Computer and Communications Security, New Dehli, India, March 14-16, 1996.
-
(1996)
3rd ACM Conference on Computer and Communications Security
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
|