-
1
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
Vaudenay, S. (ed.) PKC 2005. Springer, Heidelberg
-
Abdalla, M., Fouque, P.A., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 65-84. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3386
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.A.2
Pointcheval, D.3
-
2
-
-
70349858083
-
Efficient One-Round Key Exchange in the Standard Model
-
Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. Springer, Heidelberg
-
Boyd, C., Cliff, Y., Gonzalez Nieto, J., Paterson, K.G.: Efficient One-Round Key Exchange in the Standard Model. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 69-83. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5107
, pp. 69-83
-
-
Boyd, C.1
Cliff, Y.2
Gonzalez Nieto, J.3
Paterson, K.G.4
-
3
-
-
70350424437
-
Security Analysis of the PACE Key-Agreement Protocol
-
Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. Springer, Heidelberg
-
Bender, J., Fischlin, M., Kuegler, D.: Security Analysis of the PACE Key-Agreement Protocol. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 33-48. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5735
, pp. 33-48
-
-
Bender, J.1
Fischlin, M.2
Kuegler, D.3
-
4
-
-
84946840347
-
Short Signatures from the Weil Pairing
-
Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
-
Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514-532. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
7
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
-
Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
9
-
-
68849108882
-
Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol
-
Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. Springer, Heidelberg
-
Cremers, C.J.F.: Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 20-33. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5536
, pp. 20-33
-
-
Cremers, C.J.F.1
-
10
-
-
77949583585
-
Delayed-Key Message Authentication for Streams
-
Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
-
Fischlin, M., Lehmann, A.: Delayed-Key Message Authentication for Streams. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 290-307. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5978
, pp. 290-307
-
-
Fischlin, M.1
Lehmann, A.2
-
11
-
-
21144454271
-
Separating decision diffie-hellman from computational diffie-hellman in cryptographic groups
-
DOI 10.1007/s00145-003-0052-4
-
Joux, A., Nguyen, K.: Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups. J. Cryptology 16(4), 239-247 (2003) (Pubitemid 40877275)
-
(2003)
Journal of Cryptology
, vol.16
, Issue.4
, pp. 239-247
-
-
Joux, A.1
Nguyen, K.2
-
12
-
-
33646805409
-
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
-
Roy, B. (ed.) ASIACRYPT 2005. Springer, Heidelberg
-
Choo, K.K.R., Boyd, C., Hitchcock, Y.: Examining Indistinguishability- Based Proof Models for Key Establishment Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 585-604. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 585-604
-
-
Choo, K.K.R.1
Boyd, C.2
Hitchcock, Y.3
|