[BOOK][B] Handbook of applied cryptography
AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …
important discipline that is not only the subject of an enormous amount of research, but …
Universally composable security: A new paradigm for cryptographic protocols
R Canetti - Proceedings 42nd IEEE Symposium on Foundations …, 2001 - ieeexplore.ieee.org
We propose a novel paradigm for defining security of cryptographic protocols, called
universally composable security. The salient property of universally composable definitions …
universally composable security. The salient property of universally composable definitions …
Authenticated Diffe-Hellman key agreement protocols
S Blake-Wilson, A Menezes - International Workshop on Selected Areas in …, 1998 - Springer
This paper surveys recent work on the design and analysis of key agreement protocols that
are based on the intractability of the Diffe-Hellman problem. The focus is on protocols that …
are based on the intractability of the Diffe-Hellman problem. The focus is on protocols that …
Entity authentication and key distribution
We provide the first formal treatment of entity authentication and authenticated key
distribution appropriate to the distributed environment. Addressed in detail are the problems …
distribution appropriate to the distributed environment. Addressed in detail are the problems …
Analysis of key-exchange protocols and their use for building secure channels
R Canetti, H Krawczyk - International conference on the theory and …, 2001 - Springer
We present a formalism for the analysis of key-exchange protocols that combines previous
definitional approaches and results in a definition of security that enjoys some important …
definitional approaches and results in a definition of security that enjoys some important …
Authentication and authenticated key exchanges
W Diffie, PC Van Oorschot, MJ Wiener - Designs, Codes and cryptography, 1992 - Springer
We discuss two-party mutual authentication protocols providing authenticated key
exchange, focusing on those using asymmetric techniques. A simple, efficient protocol …
exchange, focusing on those using asymmetric techniques. A simple, efficient protocol …
Perfectly-secure key distribution for dynamic conferences
A key distribution scheme for dynamic conferences is a method by which initially an (off-line)
trusted server distributes private individual pieces of information to a set of users. Later any …
trusted server distributes private individual pieces of information to a set of users. Later any …
A hierarchy of authentication specifications
G Lowe - Proceedings 10th computer security foundations …, 1997 - ieeexplore.ieee.org
Many security protocols have the aim of authenticating one agent to another. Yet there is no
clear consensus in the academic literature about precisely what" authentication" means. We …
clear consensus in the academic literature about precisely what" authentication" means. We …
[BOOK][B] Protocols for authentication and key establishment
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …
became outdated quickly. At the same time new developments have continued apace …
[CITATION][C] Applied cryptography: protocols, algorithms, and source code in C
B Schneier - 2007 - john wiley & sons