@String{LNCS = {Lecture Notes in Computer Science}} @String{Springer = {Springer-Verlag}} @Inproceedings{Sc89, Author="C. P.~Schnorr", title="{Efficient Identification and Signatures for Smart Cards}", class="idld", Pages="235--251", booktitle="Proc. of Crypto '89", publisher=Springer, volume="435", series=LNCS, year=1990 } @article{Sc91, Author="C. P.~Schnorr", title="{Efficient Signature Generation by Smart Cards}", class="idld", Pages="161--174", journal="Journal of Cryptology", publisher=Springer, number="3", volume="4", year="1991" } @InProceedings{BoyMat98, author = {C. Boyd and A. Mathuria}, title = "{Key Establishment Protocols for Secure Mobile Communications: A Selective Survey}", booktitle = {Proc. of ACISP '98}, pages = {344--355}, year = {1998}, volume = {1438}, series = LNCS, publisher = Springer } @InProceedings{HubButtCap01, author = {J. P. Hubaux and L. Buttyan and S. Capkun}, title = "{The Quest for Security in Mobile Ad Hoc Networks}", booktitle = {Proc. of MobiHOC '01}, pages = {}, year = {2001}, volume = {}, series = {}, publisher = {ACM Press} } @InProceedings{PhaHuaDul02, author = {T. Phan and L. Huang and C. Dulan}, title = "{Challenge: Integrating Mobile Wireless Devices Into the Computational Grid}", booktitle = {Proc. of MobiCom '02}, pages = {271--278}, year = {2002}, volume = {}, series = {}, publisher = {ACM Press} } @InProceedings{WonCha01, author = {D. S. Wong and A. H. Chan}, title = "{Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices}", booktitle = {Proc. of Asiacrypt '01}, pages = {272--289}, year = {2001}, volume = {2248}, series = LNCS, publisher = Springer } @InProceedings{ZhuChaWonYe02, author = {F. Zhu and A. H. Chan and D. S. Wong and R. Ye}, title = "{Password Authenticated Key Exchange based on RSA for Imbalanced Wireless Network}", booktitle = {Proc. of ISC '02}, pages = {150--161}, year = {2002}, volume = {2433}, series = LNCS, publisher = Springer } @Misc{BlaGupHawMoe02, author = {S.~Blake-Wilson and V.~Gupta and C.~Hawk and B.~Moeller}, title = "{ECC Cipher Suites for TLS}", howpublished = {RFC 20296}, month = {February}, year = {2002} } @InProceedings{BerMelMos98, author = {K.~Berket and P.~M.~Melliar-Smith and L.~E.~Moser}, title = "{The InterGroup Protocols: Scalable Group Communication for the Internet}", booktitle = {Proc. of the 3rd Global Internet Mini-Conference}, year = {1998}, month = {November} } @Article{ObrTsuVis01, author = {K.~Obraczka and G.~Tsudik and K.~Viswanath}, title = "{Towards Reliable Multicast in Multi-Hop Ad Hoc Networks}", journal = {ACM/Balzer Wireless Networks}, year = {2001}, volume = {7}, number = {6} } @Misc{WTLS00, author = {Wireless Application Protocol}, title = "{Wireless Transport Layer Security Specification}", howpublished = {WAP TLS, WAP-199 WTLS}, month = {February}, year = {2000} } @InProceedings{EveGolMic89, author = {S.~Even and O.~Goldreich and S.~Micali}, title = "{On-line/Off-line Digital Signatures}", booktitle = {Proc. of Crypto '89}, pages = {263--277}, year = {1989}, editor = {G.~Brassard}, volume = {435}, series = LNCS, month = {August}, publisher = Springer } @InProceedings{ShaTau01, author = {A.~Shamir and Y.~Tauman}, title = "{Improved Online/Offline Signature Schemes}", booktitle = {Proc. of Crypto '01}, pages = {355--367}, year = {2001}, editor = {J.~Kilian}, volume = {2139}, series = LNCS, month = {August}, publisher = Springer } @Misc{Bluetooth99, key = {Bluetooth99}, title = "{Specification of the Bluetooth System}", month = {December}, year = {1999}, note = {\texttt{http://www.bluetooth.com/dev/specifications.asp}} } @Misc{AsoGin00, author = {N.~Asokan and P.~Ginzboorg}, title = "{Key Agreement in Ad-hoc Networks}", note = {Expanded version of a talk given at the Nordsec '99 workshop in Kista, Sweden, in November 1999}, month = {February}, year = {2000} } @InProceedings{Gir91, author = {M.~Girault}, title = "{Self-Certified Public Keys}", booktitle = {Proc. of Eurocrypt '91}, pages = {490--497}, year = {1992}, editor = {D.~W.~Davies}, volume = {547}, series = LNCS, month = {May}, publisher = Springer, annote = {GPS scheme ancestor} } @InProceedings{PouSte98, author = {G.~Poupard and J.~Stern}, title = "{Security Analysis of a Practical ``on the {f}ly'' Authentification and Signature Generation}", booktitle = {Proc. of Eurocrypt '98}, pages = {422--436}, year = {1998}, editor = {K.~Nyberg}, volume = {1403}, series = LNCS, month = {May}, publisher = Springer, annote = {Provably secure GPS scheme} } @Book{Knu81c, author = {D.~E.~Knuth}, title = "{The Art of Computer Programming: Sorting and Searching}", publisher = {Addison-Wesley}, year = {1998}, isbn = {0-201-89685-0}, volume = {3}, OPTseries = {TAOCP}, address = {Reading, MA}, edition = {2\textsuperscript{nd}}, } @Article{PohHel78, author = {S.~C.~Pohlig and M.~E.~Hellman}, title = "{An Improved Algorithm for Computing Logarithms over ${\FF}_p$ and its Cryptographic Significance}", journal = {IEEE-IT}, year = {1978}, volume = {24}, number = {1}, pages = {106--110}, month = {January}, annote = {Pohlig-Hellman algorithm} } @TechReport{StePfiWai02, author = {M.~Steiner and B.~Pfitzmann and M.~Waidner}, title = {A Formal Model for Multi-party Group Key Agreement}, institution = {IBM Research}, year = {2002}, OPTkey = {}, type = {PhD Thesis}, number = {RZ 3383}, OPTaddress = {}, month = {April}, OPTnote = {}, OPTannote = {} } @InProceedings{BlaMen98b, author = {S. Blake-Wilson and A. Menezes}, title = {Authenticated {D}iffie-{H}ellman {K}ey {A}greement {P}rotocols}, booktitle = {Proc. of the 5th Annual Workshop on Selected Areas in Cryptography (SAC '98)}, pages = {339-361}, year = {1998}, volume = 1556, series = LNCS, publisher = Springer } @InProceedings{BlaJohMen97, author = {S. Blake-Wilson and D. Johnson and A. Menezes}, title = {Key {A}greement {P}rotocols and their {S}ecurity {A}nalysis}, booktitle = {Proc. of 6th IMA International Conference on Crypotography and Coding}, pages = {30--45}, year = {1997}, editor = {M. Darnell}, volume = {1355}, series = LNCS, publisher = Springer } @InProceedings{Rij00, author= {J. Daemen and V. Rijmen}, title= "{The Rijndael Block Cipher}", booktitle= {AES Proposal, NIST}, OPTmonth= {2000}, year= {2000}, OPTnote= {Available at http://csrc.nist.gov/encryption/aes/} } @article{RivShaAde78, Author="R.~Rivest and A.~Shamir and L.~Adleman", title="{A} {M}ethod for {O}btaining {D}igital {S}ignatures and {P}ublic {K}ey {C}ryptosystems", journal="Communications of the ACM", number="2", volume="21", month="february", year="1978", pages="120--126"} @InProceedings{BihBonRei99, author = {E. Biham and D. Boneh and O. Reingold}, title = {Breaking {G}eneralized {D}iffie-{H}ellman modulo a {C}omposite is no {e}asier than {F}actoring}, booktitle = {Information Processing Letters (IPL)}, OPTcrossref = {}, OPTkey = {}, pages = {83--87}, year = {1999}, OPTeditor = {}, volume = {70}, OPTnumber = {}, OPTseries = {}, OPTaddress = {}, OPTmonth = {}, OPTorganization = {}, OPTpublisher = {}, OPTnote = {}, OPTannote = {} } @InProceedings{Wei00, author = {S. H. Weingart}, title = {Physical {S}ecurity {D}evices for {C}omputer {S}ubsystems: {A} {S}urvey of {A}ttacks and {D}efenses}, booktitle = {CHES '00}, OPTcrossref = {}, OPTkey = {}, pages = {302-317}, year = {2000}, OPTeditor = {}, OPTvolume = {}, OPTnumber = {}, OPTseries = {}, OPTaddress = {}, OPTmonth = {}, OPTorganization = {}, OPTpublisher = {}, OPTnote = {}, OPTannote = {} } @manual{NIST94, organization = {U. S. National Institute of Standards and Technology}, title = {Federal {I}nformation {P}rocessing {S}tandards {P}ublication 140-1: {S}ecurity {R}equirements for {C}ryptographic {M}odules}, year = {Jan 1994}, OPTnote = {} } @Article{ChoKeiVit01, author= {G. V. Chockler and I. Keidar and R. Vitenberg}, title= {Group {C}ommunication {S}pecifications: {A} {C}omprehensive {S}tudy}, journal= {To appear in ACM Computing Surveys}, OPTpage= {}, month= {Dec}, year= {2001}, } @InProceedings{JerHonCofReeWhee98, author = {R. Jerdonek and P. Honeyman and K. Coffman and J. Rees and K. Wheeler}, title = {Implementation of a {P}rovably {S}ecure, {S}martcard-{B}ased {K}ey {Di}stribution {P}rotocol}, booktitle = {CARDIS '98}, OPTcrossref = {}, OPTkey = {}, pages = {230-235}, year = {1998}, OPTeditor = {}, OPTvolume = {}, OPTnumber = {}, OPTseries = {}, OPTaddress = {}, OPTmonth = {}, OPTorganization = {}, OPTpublisher = {}, OPTnote = {}, OPTannote = {} } @InProceedings{VedWei97, author = {K. Vedder and F. Weikmann}, title = {Smart {C}ards {R}equirements, {P}roperties, and {A}pplications}, booktitle = {State of the Art in Applied Cryptography}, OPTcrossref = {}, OPTkey = {}, pages = {307-331}, year = {1997}, OPTeditor = {}, OPTvolume = {}, OPTnumber = {}, OPTseries = {}, OPTaddress = {}, OPTmonth = {}, OPTorganization = {}, OPTpublisher = {}, OPTnote = {}, OPTannote = {} } @InProceedings{Gut00, author = {P. Gutmann}, title = {An {O}pen-{S}ource {C}ryptographic {C}oprocessor}, booktitle = {9th usenix Security Symposium}, OPTcrossref = {}, OPTkey = {}, pages = {97-111}, year = {2000}, OPTeditor = {}, OPTvolume = {}, OPTnumber = {}, OPTseries = {}, OPTaddress = {}, OPTmonth = {}, OPTorganization = {}, OPTpublisher = {}, OPTnote = {}, OPTannote = {} } @InProceedings{HasImpLevLub89, author = {J.~Hċstad, R.~Impagliazzo, L.~Levin and M.~Luby}, title = {A Pseudorandom Generator from any One-Way Function}, booktitle = {21st ACM STOC Conference}, OPTcrossref = {}, OPTkey = {}, OPTpages = {}, year = {1989}, OPTeditor = {}, OPTvolume = {}, OPTnumber = {}, OPTseries = {}, OPTaddress = {}, OPTmonth = {}, OPTorganization = {}, publisher = {ACM Press}, OPTnote = {}, OPTannote = {} } @InProceedings{Gun89, author = {C.~G.~Gunter}, title = {An Identity-Based Key Exchange Protocol}, booktitle = {Proc. of Eurocrypt '89}, pages = {29--37}, year = {1989}, editor = {J.-J.~Quisquater and J.~Vandewalle}, volume = {434}, series = LNCS, publisher = Springer } @article{DifOorWie92, author = {W. Diffie and P. van Oorschot and M. Wiener}, title = {Authentication and {A}uthenticated {K}ey {E}xchange}, booktitle = {Designs, Codes and Cryptography}, volume = {2}, pages = {107-125}, year = {1992}, } @misc{iKey2000, key = {ikey2000}, title = {iKey2000}, howpublished = {Rainbow Technologies}, note = {http://www.rainbow.com/ikey/index.html} } @InProceedings{CacKurPetSho01, author = {C. Cachin and K. Kursawe and F. Petzold and V. Shoup}, title = {Secure and {E}fficient {A}synchronous {B}roadcast {P}rotocols}, booktitle = {Proc. Crypto '01}, month = {August}, OPTpages = {}, year = {2001}, } @InProceedings{CacKurSho00, author = {C. Cachin and K. Kursawe and V. Shoup}, title = {Random {O}racles in {C}onstantinople: {P}ractical {A}synchronous {B}yzantine {A}greement using {C}ryptography}, booktitle = {Proc. 2000 Principles of Distributed Computing}, month = {July}, year = {2000} } @TechReport{ensemble_security98, author = {O. Rodeh and K. Birman and M. Hayden and Z. Xiao and D. Dolev}, title = {Ensemble Security}, institution= {Cornell}, number = {TR98-1703}, year = {1998}, month = {Sept}, } @techreport{NSA97, author = {NSA Cross Organization CAPI Team}, title = {Security {S}ervice {API}: {C}ryptographic {API} {R}ecommendation}, institution= {NSA}, year = {1997} } @InProceedings{BelCanKra96, author = {M.~Bellare and R.~Canetti and H.~Krawczyk}, title = {Keying {H}ash {F}unctions for {M}essage {A}uthentication}, booktitle = {Proc. of Crypto '96}, year = {1996}, editor = {N.~Koblitz}, volume = {1109}, series = LNCS, publisher = Springer } @Article{Bir99, author = {K. P. Birman}, title = {A {R}eview of {E}experience with {R}eliable {M}ulticast}, journal = {Software \-\- Practice and Experience}, volume = {29}, number = {9}, pages = {pages 741--774}, year = {1999} } @Article{Bir98a, author = {K. P. Birman}, title = {Reliable {M}ulticast {G}oes {M}ainstream}, journal = {Bulletin of the Technical Committee on Operating Systems and Application Environments (TCOS)}, volume = {10}, number = {1}, OPTpages = {}, month = {Spring}, year = {1998}, OPTnote = {} } @Misc{OMG00, title = {Fault {T}olerant {CORBA} {S}precification}, howpublished = {OMG (Object Management Group) Document ptc/2000-04-04}, month = {August}, year = {2000}, } @Misc{IBM4758, author = {IBM Inc.}, title = {{IBM PCI} {C}ryptographic {C}oprocessor}, howpublished = {Product Brochure G325-1118}, month = {August}, year = {1997}, } @InProceedings{SmiPalWei98, author = {S. W. Smith and E. R. Palmer and S. Weingart}, title = {Using a {H}ight-{P}erformance, {P}rogrammable {S}ecure {C}oprocessor}, booktitle = {Proc of Financial Cryptography '98}, year = {1998}, pages = {73-89}, publisher = Springer, series = LNCS } @TechReport{Smi96, author = {S. W. Smith}, title = {Secure {C}oprocessing {A}pplications and {R}esearch {I}ssues}, institution = {Los Alamos}, year = {1996} } @InProceedings{LeiMic93, author = {T. Leighton and S. Micali}, title = {Secret-{K}ey {A}greement without {P}ublic-{k}ey {C}ryptography}, booktitle = {Proc of Crypt '93}, year = {1993}, pages = {456-479}, publisher = Springer, series = LNCS } @InProceedings{ShoRub96, author = {V. Shoup and A. Rubin}, title = {Session-{K}ey {D}istribution using {S}mart {C}ards}, booktitle = {Proc of Eurocrypt '96}, year = {1996}, pages = {321-331}, publisher = Springer, series = LNCS } @InProceedings{MccJac95, author = {S. McCanne and V. Jacobson}, title = {vic: {A} {F}lexible {F}ramework for {P}acket {V}ideo}, booktitle = {ACM Multimedia '95}, month = {November}, year = {1995}, OPTeditor = {}, pages = {511-522} } @Article{MosMelNara98, author = {L.E. Moser and P.M. Melliar-Smith and P. Narasimhan}, title = {Consistent {O}bject {R}eplication in the {E}ternal {S}ystem}, journal = {Theory and Practice of Object Systems}, volume = {4}, number = {2}, pages = {pages 81--92}, year = {1998} } @Article{AgaSacJoh98, author = {D. A. Agarwal and S. R. Sachs and W. E. Johnston}, title = {The {R}eality of {C}ollaboratories}, journal = {Computer Physics Communications}, volume = {10}, number = {issue 1-3}, pages = {pages 270-299}, month = {coverdate May}, year = {1998} } @InProceedings{BelRog96a, author = {M. Bellare and P. Rogaway}, title = {The {E}xact {S}ecurity of {D}igital {S}ignatures: {H}ow to sign with {RSA} and {R}abin}, booktitle = {Proc of Eurocrypt '96}, year = {1996}, editor = {U. Maurer}, publisher = Springer, series = LNCS } @InProceedings{FujOkaPoiSte01, author = {E. Fujisaki and T. Okamoto and D. Pointcheval and J. Stern}, title = {{RSA-OAEP} is {S}ecure under the {RSA} {A}ssumption}, booktitle = {Proc of. Crypto '01}, month = {August}, year = {2001} } @InProceedings{CanGolHal98, author = {R. Canetti and O. Goldreich and S. Halevi}, title = {The {R}andom {O}racle {M}ethodology, {R}evisited}, booktitle = {Proc of. Symposium on the Theory of Computing (SOC)}, month = {March}, year = {1998}, publisher = {ACM} } @Article{GolMic84, author = {S. Goldwasser and S. Micali}, title = {Probabilisitic {E}ncryption}, journal = {Journal of Computer and System Sciences}, volume = {28}, pages = {pages 270-299}, month = {April}, year = {1984}, OPTnote = {Full version of \cite{GolMic82}} } @InProceedings{PerQui01a, author = {O. Pereira and J. J. Quisquater}, title = {A {S}ecurity {A}nalysis of the {C}liques {P}rotocols {S}uites}, booktitle = {14-th IEEE Computer Security Foundations Workshop}, month = {June}, year = {2001}, publisher = {IEEE Computer Society Press} } @InProceedings{KimPerTsu01, author = {Y. Kim and A. Perrig and G. Tsudik }, title = {Communication-{E}fficient {G}roup {K}ey {A}greement}, booktitle = {Proc. of International Federation for Information Processing (IFIP SEC 2001)}, pages = {}, month = {June}, year = {2001} } @InProceedings{Tze00, author = {Wen-Guey Tzeng}, title = {A {P}ractical and {S}ecure {F}ault-{T}olerant {C}onference-{K}ey {A}greement {P}rotocol}, booktitle = {Proc. of PKC 2000}, year = {2000}, publisher = Springer, series = LNCS } @InProceedings{KimPerTsu00, author = {Y. Kim and A. Perrig and G. Tsudik }, title = {Simple and {F}ault-{T}olerant {K}ey {A}greement for {D}ynamic {C}ollaborative {G}roup}, booktitle = {Proc. of the 7th ACM CCS}, month = {November}, year = {2000} } @InProceedings{Sho97, author = {V. Shoup}, title = {Lower {B}ounds for {D}iscrete {L}ogarithms and {R}elated {P}roblems}, booktitle = {Proc. of Eurocrypt '97}, pages = {256--266}, year = {1997}, editor = {W. Fumy}, volume = {1233}, series = LNCS, publisher = Springer } @InProceedings{SteTsuWai98, author = {M. Steiner and G. Tsudik and M. Waidner }, title = {CLIQUES: A New Approach to Group Key Agreement}, booktitle = {IEEE ICDCS '98}, pages = {}, month = {May}, year = {1998} } @InProceedings{JusVau96, author = {M. Just and S. Vaudenay}, title = {Authenticated {M}ulti-{P}arty {K}ey {A}greement}, booktitle = {Proc. of Asiacrypt '96}, year = {1996}, editor = {}, volume = {1163}, pages = {36-49}, publisher = Springer, series = LNCS } @InProceedings{CanGarItkMiciNaoPin99, author = {R. Canetti and J. Garay and G. Itkis and D. Micciancio and M. Naor and B. Pinkas}, title = {Issues in {M}ulticast {S}ecurity: {A} {T}axonomy and {E}fficient {C}onstructions}, booktitle = {Proc. of INFOCOM '99}, pages = {}, month = {March}, year = {1999}, OPTmonth = {} } @InProceedings{BreChePoiQui01, author = {E. Bresson and O. Chevassut and D. Pointcheval and J.-J. Quisquater}, title = {Provably {A}uthenticated {G}roup {D}iffie-{H}ellman {K}ey {E}xchange}, booktitle = {Proc. of the 8th ACM CCS}, pages = {255--264}, month = {Nov}, year = {2001}, publisher = "ACM Press" } @InProceedings{BreChePoi01, author = {E. Bresson and O. Chevassut and D. Pointcheval}, title = {Provably {A}uthenticated {G}roup {D}iffie-{H}ellman {K}ey {E}xchange -- {T}he {D}ynamic {C}ase}, booktitle = {Proc. of Asiacrypt '01}, pages = {290--309}, series = LNCS, volume = 2248, month = {Dec}, year = {2001}, publisher = Springer } @InProceedings{BreChePoi02a, author = {E.~Bresson and O.~Chevassut and D.~Pointcheval}, title = "{Dynamic Group {D}iffie-{H}ellman Key Exchange under Standard Assumptions}", booktitle = {Proc. of Eurocrypt '02}, pages = {321--336}, year = {2002}, editor = {L.~R.~Knudsen}, volume = {2332}, series = LNCS, month = {May}, publisher = Springer } @InProceedings{BreChePoi02b, author = {E.~Bresson and O.~Chevassut and D.~Pointcheval}, title = "{The Group {D}iffie-{H}ellman Problems}", booktitle = {Proc. of SAC '02}, pages = {}, year = {2002}, editor = {K.~Nyberg and H. Heys}, series = LNCS, month = {August}, publisher = Springer } @InProceedings{SteTsuWai00, author = {M. Steiner and G. Tsudik and M. Waidner }, title = {Key {A}greement in {D}ynamic {P}eer {G}roups}, booktitle = {IEEE Transactions on Parallel and Distributed Systems}, pages = {}, month = {August}, year = {2000}, OPTmonth = {} } @Article{PoiSte00, author = {D. Pointcheval and J. Stern}, title = {Security {A}rguments for {D}igital {S}ignatures and {B}lind {S}ignatures}, journal = {J. of Cryptology}, year = {2000}, volume = {13}, number = {3}, pages = {361-396}, OPTmonth = {} } @InProceedings{JakPoi01, author = {M. Jakobsson and D. Pointcheval}, title = {Mutual {A}uthentication for {L}ow-{P}ower {M}obile {D}evices}, booktitle = {Proc. of Financial Cryptography '01}, pages = {178--195}, series = LNCS, volume = 2339, year = {2001}, publisher = Springer } @InProceedings{NaoRei97, author = {M. Naor and O. Reingold}, title = {Number-{T}heoretic {C}onstructions of {E}fficient {P}seudo-{R}andom {F}unctions}, booktitle = {Proc. of 38th IEEE FOCS Symposium}, pages = {458--467}, year = {1997} } @Article{AteSteTsu00, author = {G. Ateniese and M. Steiner and G. Tsudik}, title = {New {M}ultiparty {A}uthentication {S}ervices and {K}ey {A}greement {P}rotocols}, journal = {IEEE Journal of Selected Areas in Communications}, year = {2000}, month = {April} } @InProceedings{Bon98, author = {D. Boneh}, title = {The {D}ecision {D}iffie-{H}ellman {P}roblem}, booktitle = {Third Algorithmic Number Theory Symposium}, volume = {1423}, pages = {48--63}, series = LNCS, publisher = Springer, year = {1998} } @inproceedings{BelRog93, author = {M. Bellare and P. Rogaway}, title = {Entity {A}uthentification and {K}ey {D}istribution}, booktitle = {Proc. of Crypto '93}, year = 1993, pages = "232--249", volume = 773, series = LNCS, editor = {D.R. Stinson}, publisher = Springer } @InProceedings{BelRog93a, author = {M. Bellare and P. Rogaway}, title = {Random {O}racles are {P}ractical: a {P}aradigm for {D}esigning {E}fficient {P}rotocols}, booktitle = {Proc of ACM CCS '93}, year = 1993, publisher = {ACM Press} } @inproceedings{BelRog95, author = {M. Bellare and P. Rogaway}, title = {Provably {S}ecure {S}ession {K}ey {D}istribution: {T}he {T}hree {P}arty {C}ase}, booktitle = {Proc. of 27th ACM STOC Conference}, year = 1995 } @InProceedings{BurDes94, author = {M. Burmester and Y. Desmedt}, title = {A {S}ecure and {E}fficient {C}onference {K}ey {D}istribution {S}ystem}, booktitle = {Proc of Eurocrypt '94}, year = 1995, editor = {A. De Santis}, volume = {950}, pages = {275--286}, publisher = Springer, series = LNCS } @PhdThesis{Can95, author = {R. Canetti}, title = {Studies in {S}ecure {M}ultiparty {C}omputation and {A}pplications}, school = {Dept. of Computer Science and Applied Mathematics, Weizmann Institue of Science}, month = {May}, year = {1995}, } @Book{CorLeiRiv90, author= {T. H. Cormen and C. E. Leiserson and R. L. Rivest}, title= {Introduction to {A}lgorithms}, publisher= {MIT Electrical Engineering and Computer Science}, year= {1990} } @InProceedings{DifHel76, author = {W. Diffie and M. Hellman}, title = {New {D}irections {I}n {C}ryptography}, booktitle = {IEEE Transactions on Information Theory}, month = {November}, year = 1976, volume = {IT-22(6)}, pages = {644-654}, } @InProceedings{SteTsuWai96, author = {M. Steiner and G. Tsudik and M. Waidner}, title = {Diffie-{H}ellman {K}ey {D}istribution {E}xtended to {G}roups}, booktitle = {ACM CCS '96}, year = {March 1996} } @InProceedings{BlaMen98, author = {S. Blake-Wilson and A. Menezes}, title = {Entity {A}uthentication and {A}uthenticated {K}ey {T}ransport {P}rotocols {E}mploying {A}symmetric {T}echniques}, booktitle = {Proc. of the 5th International Workshop on Security Protocols}, pages = {137--158}, year = {1998}, volume = 1361, series = LNCS, publisher = Springer } @InProceedings{BlaMen98b, author = {S. Blake-Wilson and A. Menezes}, title = {Authenticated {D}iffie-{H}ellman {K}ey {A}greement {P}rotocols}, booktitle = {Proc. of the 5th Annual Workshop on Selected Areas in Cryptography (SAC '98)}, pages = {339-361}, year = {1998}, volume = 1556, series = LNCS, publisher = Springer } @InProceedings{BelCanKra98, author = {M. Bellare and R. Canetti and H. Krawczyk}, title = {A {M}odular {A}pproach to the {D}esign and {A}nalysis of {A}uthentication and {K}ey {E}xchange {P}rotocols}, booktitle = {Proc. of 30th Annual Symposium on the Theory of Computing}, publisher = {ACM Press}, year = {1998} } @InProceedings{AteSteTsu98, author = {G. Ateniese and M. Steiner and G. Tsudik}, title = {Authenticated {G}roup {K}ey {A}greement and {F}riends}, booktitle = {Proc. of the 5th ACM CCS}, pages = {17-26}, year = {November 1998} } @InProceedings{BecWil98, author = {K. Becker and U. Wille}, title = {Communication {C}omplexity of {G}roup {K}ey {D}istribution}, booktitle = {Proc. of the 5th ACM CCS}, pages = {1-6}, year = {November 1998} } @InProceedings{Mau94, author = {U. Maurer}, title = {Towards the {E}quivalence of {B}reaking the {D}iffie-{H}ellman {P}rotocol and {C}omputing {D}iscrete {L}ogarithms}, booktitle = {Proc of Crypto '94}, pages = {271-281}, year = {1994}, editor = {Y.G. Desmedt}, volume = {839}, series = LNCS, publisher = Springer } @InProceedings{Per99, author = {A. Perrig}, title = {Simple and {F}ault-{T}olerant {K}ey {A}greement for {D}ynamic {C}ollaborative {G}roups}, booktitle = {International Workshop on Cryptographic Techniques and E-Commerce CrypTEC '99}, year = {1999} } @TechReport{Sho99, author = {V. Shoup}, title = {On {F}ormal {M}odels for {S}ecure {K}ey {E}xchange}, institution = {IBM Zürich Research Lab}, year = {1999}, } @inproceedings{BelPoiRog00, author = {M. Bellare and D. Pointcheval and P. Rogaway}, title = {Authenticated {K}ey {E}xchange {S}ecure {A}gainst {D}ictionary {A}ttacks}, booktitle = {Proc. of Eurocrypt '00}, year = 2000, editor = {B. Preneel}, volume = {1807}, pages = {139--155}, publisher = Springer, series = LNCS } @InProceedings{IngTanWon82, author = {I. Ingemarsson and D. Tang and C. Wong}, title = {A {C}onference {K}ey {D}istribution {S}ystem}, booktitle = {IEEE Transactions on Information Theory}, pages = {714-720}, month = {September}, year = {1982}, volume = {28(5)}, } @InProceedings{DifSteStrWie88, author = {D. Steer and L. Strawczynski and W. Diffie and M. Wiener}, title = {A {S}ecure {A}udio {T}eleconference {S}ystem}, booktitle = {Proc. of Crypto '88}, year = 1988, editor = {S. Goldwasser}, volume = {403}, pages = {520-528}, publisher = Springer, series = LNCS } @InProceedings{Cor00, author = {J.-S. Coron}, title = {On the {E}xact {S}ecurity of {F}ull-{D}omain-{H}ash}, booktitle = {Proc. of Crypto '00}, year = 2000, editor = {M. Bellare}, volume = {1880}, pages = {229-235}, publisher = Springer, series = LNCS } @InProceedings{AgaCheThoTsu01, author = {D. A. Agarwal and O. Chevassut and M.R. Thompson and G. Tsudik}, title = {An {I}ntegrated {S}olution for {S}ecure {G}roup {C}ommunication in {W}ide-{A}rea {N}etworks}, booktitle = {Proc. of 6th IEEE Symposium on Computers and Communications}, year = 2001, editor = {}, volume = {}, pages = {}, publisher = {} } } @TechReport{AgaCheTsu00, author = {D. A. Agarwal and O. Chevassut and M.R. Thompson and G. Tsudik}, title = {An {I}ntegrated {S}olution for {S}ecure {G}roup {C}ommunication in {W}ide-{A}rea {N}etworks}, number = {LBNL-47158}, institution = {Lawrence Berkeley National Laboratory}, month = {December}, year = {2000}, } @Article{BluMic84, author = {M.~Blum{} and S.~Micali{}}, title = {How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits}, journal = {SIAM Journal on Computing}, year = {1984}, OPTkey = {}, volume = {13}, OPTnumber = {}, pages = {850--864}, OPTmonth = {}, OPTnote = {}, OPTannote = {} }