On the Deniability of Some Deniable Authentication Protocols
暂无分享,去创建一个
[1] Alfred Menezes,et al. Authenticated Diffie-Hellman Key Agreement Protocols , 1998, Selected Areas in Cryptography.
[2] Yalin Chen,et al. Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols , 2005, IACR Cryptol. ePrint Arch..
[3] Jianhua Li,et al. Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery , 2007, HCI.
[4] Reihaneh Safavi-Naini,et al. ID-Based Chameleon Hashes from Bilinear Pairings , 2003, IACR Cryptol. ePrint Arch..
[5] Eun-Jun Yoon,et al. Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm , 2005, Appl. Math. Comput..
[6] Rosario Gennaro,et al. New approaches for deniable authentication , 2005, CCS.
[7] Giuseppe Ateniese,et al. Identity-Based Chameleon Hash and Applications , 2004, Financial Cryptography.
[8] Moni Naor,et al. Concurrent zero-knowledge , 2004, JACM.
[9] Hugo Krawczyk,et al. Deniable authentication and key exchange , 2006, CCS '06.
[10] Youngho Park,et al. An Enhanced ID-Based Deniable Authentication Protocol on Pairings , 2007, ICCSA.
[11] Ying Wang,et al. Chameleon Signature from Bilinear Pairing , 2003, IACR Cryptol. ePrint Arch..
[12] Kwangjo Kim,et al. Chameleon Hashing Without Key Exposure , 2004, ISC.
[13] Sanggon Lee,et al. Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol , 2008, 2008 International Conference on Information Science and Security (ICISS 2008).
[14] Hugo Krawczyk,et al. Chameleon Signatures , 2000, NDSS.
[15] Yalin Chen,et al. A ID-Based Deniable Authentication Protocol on pairings , 2006, IACR Cryptol. ePrint Arch..
[16] Chris Xu,et al. Deniable authentication protocol based on Deffie-Hellman algorithm , 2002 .
[17] Jianhua Li,et al. Efficient ID-based Proxy Chameleon Signature from Bilinear Pairings , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).
[18] Yunlei Zhao,et al. Deniable Internet Key Exchange , 2010, ACNS.
[19] Kenneth G. Paterson,et al. Deniable Authenticated Key Establishment for Internet Protocols , 2003, Security Protocols Workshop.
[20] Xiaotie Deng,et al. Deniable authentication protocols , 2001 .
[22] Xu Chongxiang. Deniable Authentication Protocol Based on Diffie-Hellman Algorithm , 2002 .
[23] Chia-Chen Lin,et al. An Improved Deniable Authentication Protocol , 2006 .