Strongly secure certificateless key exchange without pairing
暂无分享,去创建一个
[1] Rosario Gennaro,et al. Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement , 2010, Pairing.
[2] Yi Mu,et al. Certificateless Signature Revisited , 2007, ACISP.
[3] Kenneth G. Paterson,et al. Certificateless Encryption Schemes Strongly Secure in the Standard Model , 2008, Public Key Cryptography.
[4] Rosario Gennaro,et al. Making the Diffie-Hellman Protocol Identity-Based , 2010, CT-RSA.
[5] Colin Boyd,et al. Strongly Secure Certificateless Key Agreement , 2009, Pairing.
[6] Josep Domingo-Ferrer,et al. Simulatable certificateless two-party authenticated key agreement protocol , 2010, Inf. Sci..
[7] Qiuliang Xu,et al. A Two-party certificateless authenticated key agreement protocol without pairing , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[8] Joseph K. Liu,et al. Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.
[9] Ueli Maurer,et al. Diffie-Hellman Oracles , 1996, CRYPTO.
[10] Colleen M. Swanson,et al. Security in Key Agreement: Two-Party Certificateless Schemes , 2008 .
[11] David Pointcheval,et al. The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes , 2001, Public Key Cryptography.
[12] Tanja Lange,et al. Pairing-Based Cryptography , 2005, Handbook of Elliptic and Hyperelliptic Curve Cryptography.
[13] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[14] Chik How Tan,et al. Certificateless Authenticated Two-Party Key Agreement Protocols , 2006, ASIAN.
[15] Hugo Krawczyk,et al. HMQV: A High-Performance Secure Diffie-Hellman Protocol , 2005, CRYPTO.
[16] Futai Zhang,et al. Provably Secure Certificateless Two-Party Authenticated Key Agreement Protocol without Pairing , 2009, 2009 International Conference on Computational Intelligence and Security.
[17] Pooya Farshim,et al. Generic Constructions of Identity-Based and Certificateless KEMs , 2008, Journal of Cryptology.
[18] Qiong Huang,et al. Generic Certificateless Encryption in the Standard Model , 2007, IWSEC.
[19] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[20] Qiong Huang,et al. Generic Certificateless Key Encapsulation Mechanism , 2007, ACISP.
[21] Joonsang Baek,et al. Certificateless Public Key Encryption Without Pairing , 2005, ISC.
[22] SHAOZu-hua,et al. Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings , 2005 .
[23] Wang Shengbao,et al. Efficient certificateless authenticated key agreement protocol from pairings , 2006, Wuhan University Journal of Natural Sciences.
[24] Alexander W. Dent,et al. A survey of certificateless encryption schemes and security models , 2008, International Journal of Information Security.
[25] Kristin E. Lauter,et al. Stronger Security of Authenticated Key Exchange , 2006, ProvSec.
[26] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.