A resilient identity-based authenticated key exchange protocol
暂无分享,去创建一个
[1] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[2] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[3] Hugo Krawczyk,et al. SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols , 2003, CRYPTO.
[4] Antoine Joux,et al. A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.
[5] Masao Kasahara,et al. ID based Cryptosystems with Pairing on Elliptic Curve , 2003, IACR Cryptol. ePrint Arch..
[6] Mahabir Prasad Jhanwar,et al. On the number of solutions of the equation Rx2 + Sy2 = 1 (mod N) , 2010 .
[7] Ratna Dutta,et al. Overview of Key Agreement Protocols , 2005, IACR Cryptol. ePrint Arch..
[8] Angelos D. Keromytis,et al. Just fast keying: Key agreement in a hostile internet , 2004, TSEC.
[9] Hugo Krawczyk,et al. A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) , 1998, STOC '98.
[10] Chien-Chih Wang,et al. Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings , 2008, Comput. Electr. Eng..
[11] Ren-Junn Hwang,et al. An enhanced authentication key exchange protocol , 2003, 17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003..
[12] John Cremona,et al. Efficient solution of rational conics , 2003, Math. Comput..
[13] Craig Gentry,et al. Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.
[14] Yi Mu,et al. Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model , 2013, ISPEC.
[15] Henri Cohen,et al. A course in computational algebraic number theory , 1993, Graduate texts in mathematics.
[16] Kwangjo Kim,et al. Enhancements of authenticated multiple key exchange protocol based on bilinear pairings , 2010, Comput. Electr. Eng..
[17] Xiaotie Deng,et al. Two-factor mutual authentication based on smart cards and passwords , 2008, J. Comput. Syst. Sci..
[18] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[19] Tatsuaki Okamoto,et al. Leakage resilient eCK-secure key exchange protocol without random oracles , 2011, ASIACCS '11.
[20] Paulo S. L. M. Barreto,et al. A New Two-Party Identity-Based Authenticated Key Agreement , 2005, CT-RSA.
[21] Tatsuaki Okamoto,et al. Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, Journal of Cryptology.
[22] Tatsuaki Okamoto,et al. Authenticated Key Exchange and Key Encapsulation in the Standard Model , 2007, ASIACRYPT.
[23] Craig Gentry,et al. Space-Efficient Identity Based EncryptionWithout Pairings , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[24] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[25] Kenneth G. Paterson,et al. Efficient One-Round Key Exchange in the Standard Model , 2008, ACISP.
[26] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[27] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[28] Ivan Damgård,et al. On the Randomness of Legendre and Jacobi Sequences , 1990, CRYPTO.
[29] Dániel Marx,et al. On the Optimality of Planar and Geometric Approximation Schemes , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[30] Narn-Yih Lee,et al. Improved authentication key exchange protocol without using one-way hash function , 2004, OPSR.
[31] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[32] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[33] Nigel P. Smart,et al. AN IDENTITY BASED AUTHENTICATED KEY AGREEMENT PROTOCOL BASED ON THE WEIL PAIRING , 2001 .
[34] Colin Boyd,et al. Modelling after-the-fact leakage for key exchange , 2014, IACR Cryptol. ePrint Arch..
[35] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[36] Lein Harn,et al. Authenticated key agreement without using one-way hash functions , 2001 .
[37] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[38] Philip Hawkes,et al. A Mode of Operation with Partial Encryption and Message Integrity , 2003, IACR Cryptol. ePrint Arch..
[39] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[40] Dan Boneh,et al. Secure Identity Based Encryption Without Random Oracles , 2004, CRYPTO.
[41] Guomin Yang,et al. Authenticated Key Exchange under Bad Randomness , 2011, IACR Cryptol. ePrint Arch..
[42] Colin Boyd,et al. Continuous After-the-Fact Leakage-Resilient Key Exchange , 2014, ACISP.