Authenticated group key agreement and friends
暂无分享,去创建一个
[1] Hideki Imai,et al. ON SEEKING SMART PUBLIC-KEY-DISTRIBUTION SYSTEMS. , 1986 .
[2] Uta Wille,et al. Communication complexity of group key distribution , 1998, CCS '98.
[3] Chae Hoon Lim,et al. A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp , 1997, CRYPTO.
[4] Yvo Desmedt,et al. Towards practical “proven secure” authenticated key distribution , 1993, CCS '93.
[5] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[6] Yvo Desmedt,et al. Efficient and Secure Conference-Key Distribution , 1996, Security Protocols Workshop.
[7] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[8] Gene Tsudik,et al. Di e-hellman key distribution extended to groups , 1996, CCS 1996.
[9] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[10] Serge Vaudenay,et al. Minding your p's and q's , 1996, ASIACRYPT.
[11] Seif Haridi,et al. Distributed Algorithms , 1992, Lecture Notes in Computer Science.
[12] Yvo Desmedt,et al. A Secure and Efficient Conference Key Distribution System (Extended Abstract) , 1994, EUROCRYPT.
[13] Mike Burmester,et al. On the Risk of Opening Distributed Keys , 1994, CRYPTO.
[14] Hugo Krawczyk,et al. A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) , 1998, STOC '98.
[15] Gene Tsudik,et al. Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.
[16] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[17] Ran Canetti,et al. Studies in secure multiparty computation and applications , 1995 .
[18] Gene Tsudik,et al. CLIQUES: a new approach to group key agreement , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).