ACM Transactions on Computer Systems (TOCS)
Authentication and authenticated key exchanges
Designs, Codes and Cryptography
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Extending cryptographic logics of belief to key agreement protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
The random oracle methodology, revisited (preliminary version)
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Systematic Design of Two-Party Authentication Protocols
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
On the Risk of Opening Distributed Keys
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
The Security of Cipher Block Chaining
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques
Proceedings of the 5th International Workshop on Security Protocols
Key Agreement Protocols and Their Security Analysis
Proceedings of the 6th IMA International Conference on Cryptography and Coding
A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Session key distribution using smart cards
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
The exact security of digital signatures-how to sign with RSA and Rabin
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
The Risks of Compromising Secret Information
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
The Group Diffie-Hellman Problems
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Round-Optimal Contributory Conference Key Agreement
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
A Provably Secure One-Pass Two-Party Key Establishment Protocol
Information Security and Cryptology
Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Authenticated Key Exchange Protocol in One-Round
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Provably secure authenticated key exchange protocol under the CDH assumption
Journal of Systems and Software
An identity-based scheme for ad hoc network secure routing protocol from pairing
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Strongly secure identity-based authenticated key agreement protocols
Computers and Electrical Engineering
A round-optimal three-party ID-based authenticated key agreement protocol
Information Sciences: an International Journal
Cryptanalysis of ID-based authenticated key agreement protocols from bilinear pairings (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Authenticated key agreement without subgroup element verification
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Security of an efficient ID-Based authenticated key agreement protocol from pairings
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Security of two-party identity-based key agreement
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
On the resilience of key agreement protocols to key compromise impersonation
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
New authentication protocol providing user anonymity in open network
WINE'05 Proceedings of the First international conference on Internet and Network Economics
One-Way and two-party authenticated ID-Based key agreement protocols using pairing
MDAI'05 Proceedings of the Second international conference on Modeling Decisions for Artificial Intelligence
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
HMQV: a high-performance secure diffie-hellman protocol
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Deriving secrecy in key establishment protocols
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
About the security of MTI/C0 and MQV
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
A diffie-hellman key exchange protocol without random oracles
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Provably secure tripartite password protected key exchange protocol based on elliptic curves
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Anonymous overlay network supporting authenticated routing
Information Sciences: an International Journal
Efficient Authentication and Key Agreement Protocol with Anonymity for Delay Tolerant Networks
Wireless Personal Communications: An International Journal
Establishing and preserving protocol security goals
Journal of Computer Security - Foundational Aspects of Security
Hi-index | 0.00 |
This paper surveys recent work on the design and analysis of key agreement protocols that are based on the intractability of the Diffie-Hellman problem. The focus is on protocols that have been standardized, or are in the process of being standardized, by organizations such as ANSI, IEEE, ISO/IEC, and NIST. The practical and provable security aspects of these protocols are discussed.