-
2
-
-
84945119254
-
Entity authentication and key distribution
-
D.R. Stinson, Ed., Springer-Verlag
-
Bellare, M., Rogaway, P.: Entity authentication and key distribution. In Advances in Cryptology-Crypto '93 (Lecture Notes in Computer Science 773) (1994) D. R. Stinson, Ed., Springer-Verlag, pp. 232-249.
-
(1994)
Advances in Cryptology-Crypto '93 (Lecture Notes in Computer Science 773)
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
85016462400
-
Systematic design of two-party authentication protocols
-
J. Feigenbaum, Ed., Springer-Verlag
-
Bird, R., Gopal, I., Herzberg, A., Jansen, P., Kutten, S., Molva, R., Yung, M.: Systematic design of two-party authentication protocols. In Advances in Cryptology-Crypto '91 (Lecture Notes in Computer Science 576) (1992) J. Feigenbaum, Ed., Springer-Verlag, pp. 44-61.
-
(1992)
Advances in Cryptology-Crypto '91 (Lecture Notes in Computer Science 576)
, pp. 44-61
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Jansen, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
4
-
-
84948991087
-
A Secure and Efficient Conference Key Distribution System
-
A. De Santis, Ed., Springer-Verlag
-
Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System. In Advances in Cryptology-Eurocrypt '94 (Lecture Notes in Computer Science 950) (1995) A. De Santis, Ed., Springer-Verlag, pp. 275-286.
-
(1995)
Advances in Cryptology-Eurocrypt '94 (Lecture Notes in Computer Science 950)
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
5
-
-
0017018484
-
New directions in cryptography
-
Diffie, W., Heilman, M. E.: New directions in cryptography. IEEE Trans. Inform. Theory, IT-22(6): 644-654, 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Heilman, M.E.2
-
7
-
-
0016038540
-
Codes which detect deception
-
Gilbert, E., MacWilliams, F., Sloane, N.: Codes which detect deception. The BELL System Technical Journal, 53(3): 405-424, 1974.
-
(1974)
The BELL System Technical Journal
, vol.53
, Issue.3
, pp. 405-424
-
-
Gilbert, E.1
McWilliams, F.2
Sloane, N.3
-
8
-
-
0022793132
-
How to construct random functions
-
Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. Journal of ACM, 33(4): 792-807, 1986.
-
(1986)
Journal of ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
10
-
-
0020880222
-
Analysis of certain aspects of output feedback mode
-
D. Chaum, R.L. Rivest, and A.T. Sherman, Eds., Plenum Press N.Y
-
Jueneman, R.: Analysis of certain aspects of output feedback mode. In Advances in Cryptology. Proc. Crypto 82 (1983) D. Chaum, R. L. Rivest, and A. T. Sherman, Eds., Plenum Press N. Y., pp. 99-127.
-
(1983)
Advances in Cryptology. Proc. Crypto 82
, pp. 99-127
-
-
Jueneman, R.1
-
12
-
-
84947597805
-
Towards the equivalence of breaking the Diffie-Hellman protocol and computing the discrete logarithm
-
Y.G. Desmedt, Ed., Springer-Verlag
-
Maurer, U. M.: Towards the equivalence of breaking the Diffie-Hellman protocol and computing the discrete logarithm. In Advances in Cryptology-Crypto '94 (Lecture Notes in Computer Science 839) (1994) Y. G. Desmedt, Ed., Springer-Verlag, pp. 271-281.
-
(1994)
Advances in Cryptology-Crypto '94 (Lecture Notes in Computer Science 839)
, pp. 271-281
-
-
Maurer, U.M.1
-
13
-
-
0024139776
-
A key distribution system equivalent to factoring
-
McCurley, K. S.: A key distribution system equivalent to factoring. Journal of Cryptology, 1(2): 95-105, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.2
, pp. 95-105
-
-
McCurley, K.S.1
-
14
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest, R. L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM, 21: 294-299, 1978.
-
(1978)
Commun. ACM
, vol.21
, pp. 294-299
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
15
-
-
84890522850
-
Communication Theory of Secrecy Systems
-
Shannon, C. E.: Communication Theory of Secrecy Systems. Bell System Techn. Jour. 28: 656-715, 1949.
-
(1949)
Bell System Techn. Jour
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
18
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
Wegman, M. N., Carter, L.: New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22: 265-279, 1981.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, L.2
|