-
1
-
-
84961371662
-
ETSI/TC Recommendation GSM 03.20
-
version 3.3.2
-
ETSI/TC Recommendation GSM 03.20. Security related network function. version 3.3.2, 1991.
-
(1991)
Security Related Network Function
-
-
-
2
-
-
0028272762
-
Privacy and authentication for wireless local area networks
-
A. Aziz and W. Diffie. Privacy and authentication for wireless local area networks. IEEE Personal Communications, 1:25-31, 1994.
-
(1994)
IEEE Personal Communications
, vol.1
, pp. 25-31
-
-
Aziz, A.1
Diffie, W.2
-
3
-
-
84955620732
-
Secure acceleration of DSS signatures using insecure server
-
Philippe Beguin and Jean-Jacques Quisquater. Secure acceleration of DSS signatures using insecure server. In Asiacrypt’94, pages 249-259, 1994.
-
(1994)
Asiacrypt’94
, pp. 249-259
-
-
Beguin, P.1
Quisquater, J.-J.2
-
4
-
-
84956854891
-
Key establishment protocols for secure mobile communications: A selective survey
-
Colin Boyd and Anish Mathuria. Key establishment protocols for secure mobile communications: A selective survey. In ACISP’98, Lecture Notes in Computer- Science, volume 1438, pages 344-355, 1998.
-
(1998)
ACISP’98, Lecture Notes in Computer- Science
, vol.1438
, pp. 344-355
-
-
Boyd, C.1
Mathuria, A.2
-
6
-
-
84955578798
-
Attacks on protocols for server-aided RSA computation
-
B. Pfitzmann and M. Waidner. Attacks on protocols for server-aided RSA computation. In Eurocrypt’92, pages 153-162, 1992.
-
(1992)
Eurocrypt’92
, pp. 153-162
-
-
Pfitzmann, B.1
Waidner, M.2
-
8
-
-
84957648348
-
Security and performance of server-aided RSA computation protocols
-
C. H. Lim and P.J. Lee. Security and performance of server-aided RSA computation protocols. In Crypto’95, pages 70-83, 1995.
-
(1995)
Crypto’95
, pp. 70-83
-
-
Lim, C.H.1
Lee, P.J.2
-
9
-
-
84957641879
-
Server(Prover/signer)-aided verification of identity proofs and signature
-
C. H. Lim and P.J. Lee. Server(prover/signer)-aided verification of identity proofs and signature. In Eurocrypt’95, pages 64-78, 1995.
-
(1995)
Eurocrypt’95
, pp. 64-78
-
-
Lim, C.H.1
Lee, P.J.2
-
10
-
-
1542593353
-
Authentication and authenticated key exchanges
-
Kluwer Academic Publishers
-
W. Diffie, P.C.V. Oorschot, and M.J. Wiener. Authentication and authenticated key exchanges. In Designs, Codes and Cryptography, pages 107-125. Kluwer Academic Publishers, 1992.
-
(1992)
Designs, Codes and Cryptography
, pp. 107-125
-
-
Diffie, W.1
Oorschot, P.C.V.2
Wiener, M.J.3
-
11
-
-
84961367883
-
-
ETSI. ETS 300 175-7, 1992.
-
(1992)
ETS
, vol.300
, pp. 175-177
-
-
-
12
-
-
0001796258
-
A new approach to server-aided secret computation
-
Seong-Min Hong, Jun-Bum Shin, H. Lee-Kwnag, and Hyunsoo Yoon. A new approach to server-aided secret computation. In The 1st International Conference on Information Secuirty and Cryptology(ICISC’98), pages 33-45, 1998.
-
(1998)
The 1St International Conference on Information Secuirty and Cryptology(ICISC’98)
, pp. 33-45
-
-
Hong, S.-M.1
Shin, J.-B.2
Lee-Kwnag, H.3
Yoon, H.4
-
13
-
-
0020194569
-
Fast decipherment algorithm for RSA public-key cryptosystem
-
J.- J. Quisquater and C. Couvreur. Fast decipherment algorithm for RSA public-key cryptosystem. Electronics Letters, 18(21):905-907, 1982.
-
(1982)
Electronics Letters
, vol.18
, Issue.21
, pp. 905-907
-
-
Quisquater, J.-J.1
Couvreur, C.2
-
14
-
-
0028381806
-
Parameter selection for server-aided RSA computation schemes
-
J. Burns and C.J. Mitchell. Parameter selection for server-aided RSA computation schemes. IEEE Trans. on Computers, 43(2):163-174, 1994.
-
(1994)
IEEE Trans. On Computers
, vol.43
, Issue.2
, pp. 163-174
-
-
Burns, J.1
Mitchell, C.J.2
-
15
-
-
85028768002
-
Security aspects of mobile communications
-
Springer Verlag
-
K. Vedder. Security aspects of mobile communications. In Computer Security and Industrial Cryptography, LNCS741, pages 193-210. Springer Verlag, 1993.
-
(1993)
Computer Security and Industrial Cryptography, LNCS
, vol.741
, pp. 193-210
-
-
Vedder, K.1
-
16
-
-
84961307173
-
Evaluation of authentication protocols for mobile environment value added services
-
Keith Martin and Chris Mitchell. Evaluation of authentication protocols for mobile environment value added services. In Draft, Available on-line as http://isg.rhbnc.ac.uk/cjm/EOAPFM.ZIP, 1998.
-
(1998)
Draft
-
-
Martin, K.1
Mitchell, C.2
-
18
-
-
0027589399
-
Fully-fledged two-way public key authentication and key agreement for low-cost terminals
-
May
-
M.J. Beller and Y. Yacobi. Fully-fledged two-way public key authentication and key agreement for low-cost terminals. Electronics Letters, 29:999-1001, May 1993.
-
(1993)
Electronics Letters
, vol.29
, pp. 999-1001
-
-
Beller, M.J.1
Yacobi, Y.2
-
20
-
-
84947806031
-
The beguin-quisquater server-aided RSA protocol from crypto’95 is not secure
-
Springer Verlag
-
Phong Nguyen and Jacques Stern. The beguin-quisquater server-aided RSA protocol from crypto’95 is not secure. In Advances in Cryptology - Asiacrypt’98, LNCS1514, pages 372-379. Springer Verlag, 1998.
-
(1998)
Advances in Cryptology - Asiacrypt’98, LNCS
, vol.1514
, pp. 372-379
-
-
Nguyen, P.1
Stern, J.2
-
21
-
-
0031234695
-
On certificate-based security protocols for wireless mobile communication systems
-
September/October
-
Choonsik Park. On certificate-based security protocols for wireless mobile communication systems. IEEE Network, pages 50-55, September/October 1997.
-
(1997)
IEEE Network
, pp. 50-55
-
-
Park, C.1
-
22
-
-
84969354234
-
On key distribution and authentication in mobile radio networks
-
Springer Verlag
-
Choonsik Park, Kaoru Kurosawa, Tatsuaki Okamoto, and Shigeo Tsujii. On key distribution and authentication in mobile radio networks. In Advances in Cryptology - Eurocrypt’93, pages 461-465. Springer Verlag, 1994.
-
(1994)
Advances in Cryptology - Eurocrypt’93
, pp. 461-465
-
-
Park, C.1
Kurosawa, K.2
Okamoto, T.3
Tsujii, S.4
-
23
-
-
84957639068
-
Fast server-aided RSA signatures secure against active attacks
-
P. Beguin and J.J. Quisquater. Fast server-aided RSA signatures secure against active attacks. In Crypto’95, pages 57-69, 1995.
-
(1995)
Crypto’95
, pp. 57-69
-
-
Beguin, P.1
Quisquater, J.J.2
-
25
-
-
0026897713
-
Attack on server assisted authentication protocols
-
R.J. Anderson. Attack on server assisted authentication protocols. Electronics Letters, 28(15):1473, 1992.
-
(1992)
Electronics Letters
, vol.28
, Issue.15
, pp. 1473
-
-
Anderson, R.J.1
-
26
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R.L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. CACM, 21:120-126, 1978.
-
(1978)
CACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
27
-
-
0029632472
-
Cryptanalysis of secure addition chain for sasc applications
-
S.-M. Yen. Cryptanalysis of secure addition chain for sasc applications. Electronics Letters, 31(3):175-176, 1995.
-
(1995)
Electronics Letters
, vol.31
, Issue.3
, pp. 175-176
-
-
Yen, S.-M.1
-
28
-
-
0026955204
-
More about the active attak on the server-aided secret computation protocol
-
S.-M. Yen and C.-S. Laih. More about the active attak on the server-aided secret computation protocol. Electronics Letters, 28(24):2250, 1992.
-
(1992)
Electronics Letters
, vol.28
, Issue.24
, pp. 2250
-
-
Yen, S.-M.1
Laih, C.-S.2
-
29
-
-
0027617773
-
Fast server-aided secret computation protocols for modular exponentiation
-
S. Kawamura and A. Shimbo. Fast server-aided secret computation protocols for modular exponentiation. IEEE JSAC, 11(5):778-784, 1993.
-
(1993)
IEEE JSAC
, vol.11
, Issue.5
, pp. 778-784
-
-
Kawamura, S.1
Shimbo, A.2
-
30
-
-
84969340391
-
Key distribution protocol for digital mobile communication systems
-
Springer Verlag
-
Makoto Tatebayashi, Natsume Matsuzaki, and David B. Newman, Jr. Key distribution protocol for digital mobile communication systems. In Advances in CryptologyCrypto’89, pages 324-334. Springer Verlag, 1990.
-
(1990)
Advances in Cryptology
, pp. 324-334
-
-
Tatebayashi, M.1
Matsuzaki, N.2
Newman, D.B.3
-
31
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
july
-
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, IT-31:469-472, july 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, pp. 469-472
-
-
Elgamal, T.1
-
32
-
-
85028812333
-
On verifiable implicit asking protocols for RSA computation
-
T. Matsumoto, H. Imai, C.S. Laih, and S. M. Yen. On verifiable implicit asking protocols for RSA computation. In Auscrypt92, pages 296-307, 1993.
-
(1993)
Auscrypt92
, pp. 296-307
-
-
Matsumoto, T.1
Imai, H.2
Laih, C.S.3
Yen, S.M.4
-
33
-
-
85031767993
-
Speeding up secret computations with insecure auxiliary devices
-
T. Matsumoto, K. Kato, and H. Imai. Speeding up secret computations with insecure auxiliary devices. In Crypto’88, pages 497-506, 1988.
-
(1988)
Crypto’88
, pp. 497-506
-
-
Matsumoto, T.1
Kato, K.2
Imai, H.3
-
34
-
-
0002378128
-
Optimal privacy and authentication on a portable communications system
-
U. Carlsen. Optimal privacy and authentication on a portable communications system. ACM Operating Systems Review, 28(3):16-23, 1994.
-
(1994)
ACM Operating Systems Review
, vol.28
, Issue.3
, pp. 16-23
-
-
Carlsen, U.1
-
37
-
-
85032878997
-
On key distribution systems
-
Springer Verlag
-
Y. Yacobi and Z Shmuley. On key distribution systems. In Advances in CryptologyCrypto’89, LNCS435, pages 344-355 Springer Verlag, 1989.
-
(1989)
Advances in Cryptology
, vol.435
, pp. 344-355
-
-
Yacobi, Y.1
Shmuley, Z.2
|