(Password) Authenticated Key Establishment: From 2-Party to Group
暂无分享,去创建一个
María Isabel González Vasco | Rainer Steinwandt | Maria Isabel Gonzalez Vasco | Michel Abdalla | Jens-Matthias Bohli | Michel Abdalla | J. Bohli | R. Steinwandt
[1] Rainer Steinwandt,et al. Secure group key establishment revisited , 2007, International Journal of Information Security.
[2] Douglas R. Stinson,et al. Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.
[3] Yvo Desmedt,et al. Efficient and Secure Conference-Key Distribution , 1996, Security Protocols Workshop.
[4] Dong Hoon Lee,et al. Scalable key exchange transformation: from two-party to group , 2004 .
[5] Yvo Desmedt,et al. A Secure and Efficient Conference Key Distribution System (Extended Abstract) , 1994, EUROCRYPT.
[6] Rafail Ostrovsky,et al. Forward Secrecy in Password-Only Key Exchange Protocols , 2002, SCN.
[7] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[8] Jong-Min Park. Efficient and Secure Authenticated Key Exchange , 2005, J. Inform. and Commun. Convergence Engineering.
[9] Ratna Dutta,et al. Password-based Encrypted Group Key Agreement , 2006, Int. J. Netw. Secur..
[10] Alfredo De Santis,et al. Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.
[11] Moni Naor,et al. Nonmalleable Cryptography , 2000, SIAM Rev..
[12] Serge Vaudenay. Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings , 2005, Public Key Cryptography.
[13] Sarvar Patel,et al. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman , 2000, EUROCRYPT.
[14] Jonathan Katz,et al. Modeling insider attacks on group key-exchange protocols , 2005, CCS '05.
[15] Moti Yung,et al. Secure protocol transformation via “expansion”: from two-party to groups , 1999, CCS '99.
[16] David Pointcheval,et al. Password-Based Authenticated Key Exchange in the Three-Party Setting , 2005, Public Key Cryptography.
[17] Victor Shoup. Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings , 2005, CRYPTO.
[18] Rainer Steinwandt,et al. Password-Authenticated Constant-Round Group Key Establishment with a Common Reference String , 2006, IACR Cryptol. ePrint Arch..
[19] Yehuda Lindell,et al. Session-Key Generation Using Human Passwords Only , 2001, Journal of Cryptology.
[20] Bart Preneel,et al. Advances in cryptology - EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 : proceedings , 2000 .
[21] Yehuda Lindell,et al. A Framework for Password-Based Authenticated Key Exchange , 2003, EUROCRYPT.
[22] Yehuda Lindell,et al. Universally Composable Password-Based Key Exchange , 2005, EUROCRYPT.
[23] Rafail Ostrovsky,et al. Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords , 2001, EUROCRYPT.
[24] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[25] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[26] Alfred Menezes,et al. Another look at HMQV , 2007, J. Math. Cryptol..
[27] Qiang Tang,et al. Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks , 2006, ACNS.
[28] Dong Hoon Lee,et al. Efficient Password-Based Group Key Exchange , 2004, TrustBus.
[29] Rafail Ostrovsky,et al. Efficient and secure authenticated key exchange using weak passwords , 2009, JACM.
[30] Moni Naor,et al. Non-malleable cryptography , 1991, STOC '91.
[31] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[32] Hugo Krawczyk,et al. HMQV: A High-Performance Secure Diffie-Hellman Protocol , 2005, CRYPTO.