-
1
-
-
0034317075
-
Key Agreementin Ad-hoc Networks
-
N. Asokan and P. Ginzboorg. Key Agreementin Ad-hoc Networks. Computer Communications, 23(18):1627–1637, 2000.
-
(2000)
Computer Communications
, vol.23
, Issue.18
, pp. 1627-1637
-
-
Asokan, N.1
Ginzboorg, P.2
-
2
-
-
84873466407
-
Authenticated Key Exchange Secure Against Dictionary Attacks
-
B. Preneel, editor, LNCS 1807, Springer-Verlag
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure Against Dictionary Attacks. In B. Preneel, editor, Proc. of Eurocrypt’00, LNCS 1807, pages 139–155. Springer-Verlag, 2000.
-
(2000)
Proc of Eurocrypt’00
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
0026850091
-
Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attacks
-
IEEE
-
S. M. Bellovin and M. Merrit. Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attacks. In Proc. of the Symposium on Security and Privacy, pages 72–84. IEEE, 1992.
-
(1992)
Proc of the Symposium on Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merrit, A.2
-
5
-
-
0003887033
-
-
Bluetooth, December
-
Bluetooth. Specification of the Bluetooth System, December 1999. Available at http://www.bluetooth.com/developer/specification/specification.asp.
-
(1999)
Specification of the Bluetooth System
-
-
-
6
-
-
84947778144
-
The Decision Diffie-Hellman Problem
-
LNCS 1423, Springer-Verlag
-
D. Boneh. The Decision Diffie-Hellman Problem. In Third Algorithmic Number Theory Symposium, LNCS 1423, pages 48–63. Springer-Verlag, 1998.
-
(1998)
Third Algorithmic Number Theory Symposium
, pp. 48-63
-
-
Boneh, D.1
-
7
-
-
84937550984
-
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
-
LNCS 1807, Springer-Verlag
-
V. Boyko, P. MacKenzie, and S. Patel. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. In B. Preneel, editor, Proc. of Eurocrypt’01, LNCS 1807, pages 156–171. Springer-Verlag, 2000.
-
(2000)
Proc of Eurocrypt’01
, pp. 156-171
-
-
Boyko, V.1
Mackenzie, P.2
Patel, S.3
-
8
-
-
18744403812
-
Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks
-
Y. Zheng, editor, Springer, December, Full Version –
-
E. Bresson, O. Chevassut, and D. Pointcheval. Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. In Y. Zheng, editor, Proc. of Asiacrypt’2002. Springer, December 2002. Full Version – http://www.di.ens.fr/users/pointche.
-
(2002)
Proc of Asiacrypt’2002
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
9
-
-
18744403812
-
The Group Diffie-Hellman Problems
-
H. Heys and K. Nyberg, editors, LNCS. Springer-Verlag, August
-
E. Bresson, O. Chevassut, and D. Pointcheval. The Group Diffie-Hellman Problems. In H. Heys and K. Nyberg, editors, Proc. of SAC’2002, LNCS. Springer-Verlag, August 2002.
-
(2002)
Proc of SAC’2002
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
10
-
-
0035751060
-
Provably Authenticated Group Diffie-Hellman Key Exchange
-
November
-
E. Bresson, O. Chevassut, D. Pointcheval, and J. J. Quisquater. Provably Authenticated Group Diffie-Hellman Key Exchange. In Proc. of 8th ACM Conference on Computer and Communications Security, pages 255–264, November 2001.
-
(2001)
Proc of 8Th ACM Conference on Computer and Communications Security
, pp. 255-264
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
Quisquater, J.J.4
-
12
-
-
84880888233
-
Session-Key Generation using Human Passwords Only
-
J. Kilian, editor, LNCS 2139, Springer-Verlag, August
-
O. Goldreich and Y. Lindell. Session-Key Generation using Human Passwords Only. In J. Kilian, editor, Proc. of Crypto’01, LNCS 2139, pages 408–432. Springer-Verlag, August 2001.
-
(2001)
Proc of Crypto’01
, pp. 408-432
-
-
Goldreich, O.1
Lindell, Y.2
-
13
-
-
84935078039
-
Security Weaknesses in Bluetooth
-
LNCS 2020, RSA Data Security, Springer-Verlag
-
M. Jakobsson and S. Wetzel. Security Weaknesses in Bluetooth. In Proc. of the RSA Cryptographer’s Track (RSA CT’01), LNCS 2020, pages 176–191. RSA Data Security, Springer-Verlag, 2001.
-
(2001)
Proc of the RSA Cryptographer’s Track (RSA CT’01)
, pp. 176-191
-
-
Jakobsson, M.1
Wetzel, S.2
-
14
-
-
84945132563
-
Efficient Password-Authenticated Key Exchange using Human-Memorable Passwords
-
LNCS 2045, Springer-Verlag, May
-
J. Katz, R. Ostrovsky, and M. Yung. Efficient Password-Authenticated Key Exchange using Human-Memorable Passwords. In Proc. of Eurocrypt’01, LNCS 2045, pages 475–494. Springer-Verlag, May 2001.
-
(2001)
Proc of Eurocrypt’01
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
15
-
-
84937579448
-
More Efficient Password Authenticated Key Exchange
-
D. Naccache, editor, LNCS 2020, Springer-Verlag
-
P. MacKenzie. More Efficient Password Authenticated Key Exchange. In D. Naccache, editor, RSA Conference’01, LNCS 2020, pages 361–377. Springer-Verlag, 2001.
-
(2001)
RSA Conference’01
, pp. 361-377
-
-
Mackenzie, P.1
-
16
-
-
0031332843
-
Number-Theoretic Constructions of Efficient Pseudo-Random Functions
-
IEEE
-
M. Naor and O. Reingold. Number-Theoretic Constructions of Efficient Pseudo-Random Functions. In Proc. of 38th FOCS, pages 458–467. IEEE, 1997.
-
(1997)
Proc of 38Th FOCS
, pp. 458-467
-
-
Naor, M.1
Reingold, O.2
-
17
-
-
84958811016
-
-
NIST, AES, December
-
NIST. AES, December 2000. Available at http://www.nist.gov/aes.
-
(2000)
-
-
-
20
-
-
84880904783
-
OAEP Reconsidered
-
J. Kilian, editor, LNCS 2139, Springer-Verlag
-
V. Shoup. OAEP Reconsidered. In J. Kilian, editor, Proc. of Cryto’ 01, LNCS 2139, pages 239–259. Springer-Verlag, 2001.
-
(2001)
Proc of Cryto’ 01
, pp. 239-259
-
-
Shoup, V.1
|