[BOOK][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

Universally composable security: A new paradigm for cryptographic protocols

R Canetti - Proceedings 42nd IEEE Symposium on Foundations …, 2001 - ieeexplore.ieee.org
We propose a novel paradigm for defining security of cryptographic protocols, called
universally composable security. The salient property of universally composable definitions …

Authenticated Diffe-Hellman key agreement protocols

S Blake-Wilson, A Menezes - International Workshop on Selected Areas in …, 1998 - Springer
This paper surveys recent work on the design and analysis of key agreement protocols that
are based on the intractability of the Diffe-Hellman problem. The focus is on protocols that …

Entity authentication and key distribution

M Bellare, P Rogaway - Annual international cryptology conference, 1993 - Springer
We provide the first formal treatment of entity authentication and authenticated key
distribution appropriate to the distributed environment. Addressed in detail are the problems …

Analysis of key-exchange protocols and their use for building secure channels

R Canetti, H Krawczyk - International conference on the theory and …, 2001 - Springer
We present a formalism for the analysis of key-exchange protocols that combines previous
definitional approaches and results in a definition of security that enjoys some important …

Authentication and authenticated key exchanges

W Diffie, PC Van Oorschot, MJ Wiener - Designs, Codes and cryptography, 1992 - Springer
We discuss two-party mutual authentication protocols providing authenticated key
exchange, focusing on those using asymmetric techniques. A simple, efficient protocol …

Perfectly-secure key distribution for dynamic conferences

C Blundo, A De Santis, A Herzberg, S Kutten… - Advances in Cryptology …, 1993 - Springer
A key distribution scheme for dynamic conferences is a method by which initially an (off-line)
trusted server distributes private individual pieces of information to a set of users. Later any …

A hierarchy of authentication specifications

G Lowe - Proceedings 10th computer security foundations …, 1997 - ieeexplore.ieee.org
Many security protocols have the aim of authenticating one agent to another. Yet there is no
clear consensus in the academic literature about precisely what" authentication" means. We …

[BOOK][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

[CITATION][C] Applied cryptography: protocols, algorithms, and source code in C

B Schneier - 2007 - john wiley & sons