Documents Related by Co-Citation

581 Efficient signature generation by smart cards – C P Schnorr - 1991
1333 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
463 Entity Authentication and Key Distribution – Mihir Bellare, Phillip Rogaway - 1993
278 Security Arguments for Digital Signatures and Blind Signatures – David Pointcheval, Jacques Stern - 2000
261 Analysis of key-exchange protocols and their use for building secure channels – Ran Canetti, Hugo Krawczyk - 2001
264 Authentication and Authenticated Key Exchanges – Whitfield Diffie, Paul C. Van Oorschot, Michael J. Wiener - 1992
112 HMQV: A High-Performance Secure Diffie-Hellman Protocol – Hugo Krawczyk - 2005
307 Authenticated Key Exchange Secure Against Dictionary Attacks – Mihir Bellare, David Pointcheval, Phillip Rogaway - 2000
207 Provably Secure Session Key Distribution -- The Three Party Case – Mihir Bellare, et al. - 1995
827 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995
49 Optimal Security Proofs for PSS and other Signature Schemes – Jean-Sébastien Coron - 2002
560 Short signatures from the Weil pairing – Dan Boneh, Ben Lynn, Hovav Shacham - 2001
328 The exact security of digital signatures: How to sign with RSA and Rabin – Mihir Bellare, Phillip Rogaway - 1996
2453 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
38 Practice-Oriented Provable-Security – Mihir Bellare - 1997
24 Discrete-log-based signatures may not be equivalent to discrete log – Pascal Paillier, Damien Vergnaud - 2005
2693 New Directions in Cryptography – Whitfield Diffie, Martin E. Hellman - 1976
223 A modular approach to the design and analysis of authentication and key exchange protocols – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1998
35 On formal models for secure key exchange (version 4), revision – V Shoup - 1999