-
1
-
-
0041486245
-
Systematic Design of Two-Party Authentication
-
Springer-Verlag, Berlin
-
R. Bird, I. Gopal, A. Herzberg, P. Jansen, S. Kutten, R. Molva and M. Yung Systematic Design of Two-Party Authentication, Advances in Cryptology: Proceedings of Crypto 91, Lecture Notes in Computer Science, vol. 576, Springer-Verlag, Berlin, 1991.
-
(1991)
Advances in Cryptology: Proceedings of Crypto 91, Lecture Notes in Computer Science
, vol.576
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Jansen, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
2
-
-
84884730529
-
An Optimal Class of Symmetric Key Generation Systems
-
Springer-Verlag, Berlin
-
R. Blom, An Optimal Class of Symmetric Key Generation Systems, Advances in Cryptology: Proceedings of Eurocrypt 84, Lecture Notes in Computer Science, vol. 209, Springer-Verlag, Berlin, 1984, pp. 335-338.
-
(1984)
Advances in Cryptology: Proceedings of Eurocrypt 84, Lecture Notes in Computer Science
, vol.209
, pp. 335-338
-
-
Blom, R.1
-
3
-
-
85028941045
-
Secure Audio Conferencing, Advances in Cryptology: Proceedings of Crypto 87
-
Springer-Verlag, Berlin
-
E. Brickell, P.J. Lee and Y. Yacobi, Secure Audio Conferencing, Advances in Cryptology: Proceedings of Crypto 87, Lecture Notes in Computer Science, vol. 239, Springer-Verlag, Berlin, 1987, pp. 418-426.
-
(1987)
Lecture Notes in Computer Science
, vol.239
, pp. 418-426
-
-
Brickell, E.1
Lee, P.J.2
Yacobi, Y.3
-
5
-
-
0017018484
-
New Direction in Cryptography
-
W. Diffie and M.E. Heilman, New Direction in Cryptography, IEEE Transaction on Information Theory, vol. 22, no. 6, December 1976, pp. 644-654.
-
(1976)
IEEE Transaction on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Heilman, M.E.2
-
6
-
-
0008851532
-
Secure Bit Transmission Using a Random Deal of Cards
-
M.J. Fischer, M.S. Paterson and C. Rackoff, Secure Bit Transmission Using a Random Deal of Cards, in Distributed Computing and Cryptography, AMS, 1991, pp. 173-181.
-
(1991)
Distributed Computing and Cryptography, AMS
, pp. 173-181
-
-
Fischer, M.J.1
Paterson, M.S.2
Rackoff, C.3
-
7
-
-
84955360332
-
Multiparty Secret Key Exchange Using a Random Deal of Cards
-
Springer-Verlag, Berlin
-
M.J. Fischer and R.N. Wright, Multiparty Secret Key Exchange Using a Random Deal of Cards, Advances in Cryptology: Proceedings of Crypto 91, Lecture Notes in Computer Science, vol. 576, Springer-Verlag, Berlin, 1991, pp. 141-155.
-
(1991)
Advances in Cryptology: Proceedings of Crypto 91, Lecture Notes in Computer Science
, vol.576
, pp. 141-155
-
-
Fischer, M.J.1
Wright, R.N.2
-
8
-
-
85030309762
-
A Modular Approach to Key Distribution
-
Springer-Verlag, Berlin
-
W. Fumy and M. Munzert, A Modular Approach to Key Distribution, Advances in Cryptology: Proceedings of Crypto 90, Lecture Notes in Computer Science, vol. 537, Springer-Verlag, Berlin, 1990, pp. 274-283.
-
(1990)
Advances in Cryptology: Proceedings of Crypto 90, Lecture Notes in Computer Science
, vol.537
, pp. 274-283
-
-
Fumy, W.1
Munzert, M.2
-
10
-
-
0025212474
-
A Matrix Key-Distribution Scheme
-
L. Gong and D.J. Wheeler, A Matrix Key-Distribution Scheme, Journal of Cryptology, vol. 2, 1990, pp. 51-59.
-
(1990)
Journal of Cryptology
, vol.2
, pp. 51-59
-
-
Gong, L.1
Wheeler, D.J.2
-
11
-
-
0024866742
-
Limits on the Provable Consequences of One-Way Permutations
-
R. Impagliazzo and S. Rudich, Limits on the Provable Consequences of One-Way Permutations, 21-st STOC proceedings, May 1989, pp. 44-61.
-
(1989)
21-St STOC Proceedings
, pp. 44-61
-
-
Impagliazzo, R.1
Rudich, S.2
-
12
-
-
84990736101
-
Identity-based Conference Key Distribution
-
Springer-Verlag, Berlin
-
K. Koyama and K. Ohta, Identity-based Conference Key Distribution, Advances in Cryptology: Proceedings of Crypto 87, Lecture Notes in Computer Science, vol. 239, Springer-Verlag, Berlin, 1987, pp. 175-184.
-
(1987)
Advances in Cryptology: Proceedings of Crypto 87, Lecture Notes in Computer Science
, vol.239
, pp. 175-184
-
-
Koyama, K.1
Ohta, K.2
-
14
-
-
84989455644
-
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem
-
Springer-Verlag, Berlin
-
T. Matsumoto and H. Imai, On the Key Predistribution System: A Practical Solution to the Key Distribution Problem, Advances in Cryptology: Proceedings of Crypto 87, Lecture Notes in Computer Science, vol. 239, Springer-Verlag, Berlin, 1987, pp. 185-193.
-
(1987)
Advances in Cryptology: Proceedings of Crypto 87, Lecture Notes in Computer Science
, vol.239
, pp. 185-193
-
-
Matsumoto, T.1
Imai, H.2
-
15
-
-
0024139776
-
A Key Distribution System Equivalent to Factoring
-
K.S. McCurley, A Key Distribution System Equivalent to Factoring, Journal of Cryptology, vol. 1, 1988, pp. 95-105.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 95-105
-
-
McCurley, K.S.1
-
16
-
-
3042553102
-
Non-interactive Public-Key Cryptography
-
Springer-Verlag, Berlin
-
U. Maurer and Y. Yacobi, Non-interactive Public-Key Cryptography, Advances in Cryptology: Proceedings of Eurocrypt 91, Lecture Notes in Computer Science, vol. 547, Springer-Verlag, Berlin, 1991, pp. 498-507.
-
(1991)
Advances in Cryptology: Proceedings of Eurocrypt 91, Lecture Notes in Computer Science
, vol.547
, pp. 498-507
-
-
Maurer, U.1
Yacobi, Y.2
-
17
-
-
0017959977
-
Secure Communication over Insecure Channels
-
R. C. Merlde, Secure Communication over Insecure Channels, Communications of the ACM, vol. 2l, Apr. 1978, pp. 294-299.
-
(1978)
Communications of the ACM
, vol.21
, pp. 294-299
-
-
Merlde, R.C.1
-
18
-
-
85028929504
-
-
and Alon (personal communication)
-
Fiat, Naor; and Alon (personal communication).
-
-
-
Fiat, N.1
-
19
-
-
0018048246
-
Using Encryption for Authentication in Large Networks of Computers
-
R. M. Needham and M. D. Schtoeder, Using Encryption for Authentication in Large Networks of Computers, Communications of the ACM, vol. 21, Dec. 1978, pp. 993-999.
-
(1978)
Communications of the ACM
, vol.21
, pp. 993-999
-
-
Needham, R.M.1
Schtoeder, M.D.2
-
20
-
-
0024665726
-
Key Distribution System Based on Identification Information
-
E. Okamoto and K. Tanaka, Key Distribution System Based on Identification Information, IEEE Journal on Selected Areas in Communications, vol. 7, no. 4, May pp. 481-485.
-
IEEE Journal on Selected Areas in Communications
, vol.7
, Issue.4
, pp. 481-485
-
-
Okamoto, E.1
Tanaka, K.2
-
21
-
-
0001827537
-
Identity-based Cryptosystems and Signature Scheme
-
A. Shamir, Identity-based Cryptosystems and Signature Scheme, Proceedings of Crypto 84, pp. 47-53.
-
Proceedings of Crypto
, vol.84
, pp. 47-53
-
-
Shamir, A.1
-
22
-
-
0002805974
-
A Secure Audio Teleconferencing System
-
Springer-Verlag, Berlin
-
D.G. Steer, L. Strawczynsji, W. Diffie and M Wiener, A Secure Audio Teleconferencing System, Advances in Cryptology: Proceedings of Crypto 89, Lecture Notes in Computer Science, vol. 403, Springer-Verlag, Berlin, 1990, pp. 518-528.
-
(1990)
Advances in Cryptology: Proceedings of Crypto 89, Lecture Notes in Computer Science
, vol.403
, pp. 518-528
-
-
Steer, D.G.1
Strawczynsji, L.2
Diffie, W.3
Wiener, M.4
-
23
-
-
84955595899
-
A New ID-based Key Sharing Scheme
-
Springer-Verlag, Berlin
-
S.. Tsujii and J. Chao, A New ID-based Key Sharing Scheme, Advances in Cryptology: Proceedings of Crypto 91, Lecture Notes in Computer Science, vol. 576, Springer-Verlag, Berlin, 1991, pp. 288-299.
-
(1991)
Advances in Cryptology: Proceedings of Crypto 91, Lecture Notes in Computer Science
, vol.576
, pp. 288-299
-
-
Tsujii, S.1
Chao, J.2
-
24
-
-
0348250970
-
A Key Distribution Paradox
-
Springer-Verlag, Berlin
-
Y. Yacobi, A Key Distribution Paradox, Advances in Cryptology: Proceedings of Crypto 90, Lecture Notes in Computer Science, vol. 537, Springer-Verlag, Berlin, pp. 268-273.
-
Advances in Cryptology: Proceedings of Crypto 90, Lecture Notes in Computer Science
, vol.537
, pp. 268-273
-
-
Yacobi, Y.1
-
25
-
-
85032878997
-
On Key Distribution Systems
-
Springer-Verlag, Berlin
-
Y. Yacobi and Z. Shmueley, On Key Distribution Systems, Advances in Cryptology: Proceedings of Crypto 89, Lecture Notes in Computer Science, vol. 435, Springer-Verlag, Berlin, 1990, pp. 344-355.
-
(1990)
Advances in Cryptology: Proceedings of Crypto 89, Lecture Notes in Computer Science
, vol.435
, pp. 344-355
-
-
Yacobi, Y.1
Shmueley, Z.2
|