ASICS: authenticated key exchange security incorporating certification systems
暂无分享,去创建一个
Kenneth G. Paterson | Colin Boyd | Douglas Stebila | Cas J. F. Cremers | Bertram Poettering | Michèle Feltz | K. Paterson | Bertram Poettering | C. Cremers | D. Stebila | C. Boyd | Michèle Feltz
[1] Alfred Menezes,et al. Key Agreement Protocols and Their Security Analysis , 1997, IMACC.
[2] Kenneth G. Paterson,et al. ASICS: Authenticated Key Exchange Security Incorporating Certification Systems , 2013, ESORICS.
[3] Stephen Farrell,et al. Internet X.509 Public Key Infrastructure Certificate Management Protocols , 1999, RFC.
[4] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[5] Sean Turner. The application/pkcs10 Media Type , 2010, RFC.
[6] David Shaw. The Camellia Cipher in OpenPGP , 2009, RFC.
[7] Thomas Ristenpart,et al. The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks , 2007, EUROCRYPT.
[8] Cas J. F. Cremers,et al. Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal , 2012, ESORICS.
[9] Sanjit Chatterjee,et al. Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols , 2010, INDOCRYPT.
[10] Jim Schaad,et al. Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF) , 2005, RFC.
[11] Alfred Menezes,et al. Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques , 1997, Security Protocols Workshop.
[12] Cas J. F. Cremers. Examining indistinguishability-based security models for key exchange protocols: the case of CK, CK-HMQV, and eCK , 2011, ASIACCS '11.
[13] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[14] Elaine B. Barker,et al. SP 800-57. Recommendation for Key Management, Part 1: General (revised) , 2007 .
[15] Jacques Stern,et al. Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.
[16] Mihir Bellare,et al. Multi-signatures in the plain public-Key model and a general forking lemma , 2006, CCS '06.
[17] Kevin S. McCurley,et al. A key distribution system equivalent to factoring , 1988, Journal of Cryptology.
[18] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[19] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[20] Chae Hoon Lim,et al. A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp , 1997, CRYPTO.
[21] Alfred Menezes,et al. Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol , 1999, Public Key Cryptography.
[22] Dong Hoon Lee,et al. One-Round Protocols for Two-Party Authenticated Key Exchange , 2004, ACNS.
[23] Berkant Ustaoglu,et al. Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS , 2008, Des. Codes Cryptogr..
[24] Alfred Menezes,et al. Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard , 2008, ASIACCS '08.
[25] Kenneth G. Paterson,et al. Non-Interactive Key Exchange , 2012, IACR Cryptol. ePrint Arch..
[26] Hugo Krawczyk,et al. HMQV: A High-Performance Secure Diffie-Hellman Protocol , 2005, CRYPTO.
[27] Colin Boyd,et al. Examining Indistinguishability-Based Proof Models for Key Establishment Protocols , 2005, ASIACRYPT.
[28] Bogdan Warinschi,et al. Certified Encryption Revisited , 2009, AFRICACRYPT.
[29] Kristin E. Lauter,et al. Security Analysis of KEA Authenticated Key Exchange Protocol , 2006, IACR Cryptol. ePrint Arch..
[30] Alfred Menezes,et al. On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols , 2006, INDOCRYPT.
[31] William T. Polk,et al. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance , 2012 .
[32] Stephen Farrell,et al. Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP) , 2005, RFC.
[33] Alfred Menezes,et al. Another look at HMQV , 2007, J. Math. Cryptol..
[34] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[35] Jennifer Seberry,et al. Public Key Cryptography , 2000, Lecture Notes in Computer Science.
[36] Ian Goldberg,et al. Anonymity and one-way authentication in key exchange protocols , 2012, Designs, Codes and Cryptography.
[37] David Cash,et al. The Twin Diffie–Hellman Problem and Applications , 2009, Journal of Cryptology.
[38] Burton S. Kaliski,et al. An unknown key-share attack on the MQV key agreement protocol , 2001, ACM Trans. Inf. Syst. Secur..
[39] Elaine B. Barker. Recommendation for Key Management - Part 1 General , 2014 .
[40] Kenneth G. Paterson,et al. Modular Security Proofs for Key Agreement Protocols , 2005, ASIACRYPT.
[41] Victor Shoup,et al. On Formal Models for Secure Key Exchange , 1999, IACR Cryptol. ePrint Arch..
[42] Marc Fischlin,et al. A Closer Look at PKI: Security and Efficiency , 2007, Public Key Cryptography.
[43] Kristin E. Lauter,et al. Stronger Security of Authenticated Key Exchange , 2006, ProvSec.
[44] Berkant Ustaoglu,et al. Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols , 2009, ProvSec.