Systematic Design of Two-Party Authentication Protocols (1992)

Cached

Download Links

by Ray Bird , Inder Gopal , Amir Herzberg , Phil Janson , Shay Kutten , Refik Molva , Moti Yung
Citations:52 - 3 self

Documents Related by Co-Citation

463 Entity Authentication and Key Distribution – Mihir Bellare, Phillip Rogaway - 1993
264 Authentication and Authenticated Key Exchanges – Whitfield Diffie, Paul C. Van Oorschot, Michael J. Wiener - 1992
2693 New Directions in Cryptography – Whitfield Diffie, Martin E. Hellman - 1976
223 A modular approach to the design and analysis of authentication and key exchange protocols – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1998
207 Provably Secure Session Key Distribution -- The Three Party Case – Mihir Bellare, et al. - 1995
1333 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
827 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995
48 Authentication and authenticated key exchanges – W Di e, P van Oorschot, M Wiener - 1992
1132 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
1172 Probabilistic encryption – S Goldwasser, S Micali - 1984
862 Using encryption for authentication in large networks of computers – R Needham, M Schroeder - 1978
249 New directions in cryptography – W Di e, M Hellman - 1976
2453 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
261 Analysis of key-exchange protocols and their use for building secure channels – Ran Canetti, Hugo Krawczyk - 2001
136 Key Agreement Protocols and their Security Analysis – Simon Blake-Wilson , Don Johnson, Alfred Menezes - 1997
33 Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques – Simon Blake-Wilson, Alfred Menezes - 1997
625 How to Construct Random Functions – O Goldreich, S Goldwasser, S Micali - 1986
307 Authenticated Key Exchange Secure Against Dictionary Attacks – Mihir Bellare, David Pointcheval, Phillip Rogaway - 2000
57 Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions – E. Bresson, O. Chevassut, D. Pointcheval - 2002