Secure off-the-record messaging
暂无分享,去创建一个
[1] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[2] Hugo Krawczyk,et al. HMQV: A High-Performance Secure Diffie-Hellman Protocol , 2005, CRYPTO.
[3] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[4] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[5] Jonathan Katz,et al. Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications , 2003, EUROCRYPT.
[6] Tatu Ylonen,et al. SSH: secure login connections over the internet , 1996 .
[7] Hugo Krawczyk,et al. A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) , 1998, STOC '98.
[8] Gerrit Bleumer,et al. Random Oracle Model , 2005, Encyclopedia of Cryptography and Security.
[9] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[10] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[11] Blake Ramsdell,et al. S/MIME Version 3 Message Specification , 1999, RFC.
[12] Hugo Krawczyk,et al. Security Analysis of IKE's Signature-Based Key-Exchange Protocol , 2002, CRYPTO.
[13] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[14] Nikita Borisov,et al. Off-the-record communication, or, why not to use PGP , 2004, WPES '04.
[15] Hugo Krawczyk,et al. Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes , 2004, CRYPTO.
[16] Jon Callas,et al. OpenPGP Message Format , 1998, RFC.
[17] Christoph G. Günther,et al. An Identity-Based Key-Exchange Protocol , 1990, EUROCRYPT.
[18] Hugo Krawczyk,et al. SKEME: a versatile secure key exchange mechanism for Internet , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.
[19] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[20] K. Paterson,et al. On The Plausible Deniability Feature of Internet Protocols , 2002 .
[21] Hugo Krawczyk,et al. SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols , 2003, CRYPTO.
[22] Moni Naor,et al. Concurrent zero-knowledge , 1998, STOC '98.
[23] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[24] Alfred Menezes,et al. An Efficient Protocol for Authenticated Key Agreement , 2003, Des. Codes Cryptogr..
[25] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[26] Rafael Pass,et al. On Deniability in the Common Reference String and Random Oracle Model , 2003, CRYPTO.