Changes

Np1sec

948 bytes removed, 9 years ago
/* XII. References */
[*ACMP10] Michel Abdalla, Céline Chevalier, Mark Manulis, and David Pointcheval. “Flexible Group Key Exchange with on-Demand Computation of Subgroup Keys.” In ''Third African International Conference on Cryptology (AfricaCrypt ’10)'', edited by Dan Bernstein and Tanja Lange, 6055:351–368. LNCS. Stellenbosch, South Africa, 2010: Springer. doi:[http://dx.doi.org/10.1007/978-3-642-12678-9_21 10.1007/978-3-642-12678-9_21].
 
[*Be11],"conferencePaper","2011","Bernstein, Daniel J.; Duif, Niels; Lange, Tanja; Schwabe, Peter; Yang, Bo-Yin","High-Speed High-Security Signatures.","CHES","978-3-642-23950-2","http://dblp.uni-trier.de/db/conf/ches/ches2011.html#BernsteinDLSY11","","2011","2014-11-20 17:27:10","2014-11-20 17:27:10","","124-142","6917","Lecture Notes in Computer Science","Springer","dblp","Preneel, Bart; Takagi, Tsuyoshi"
[*BS07]Bohli, Jens-Matthias, and Rainer Steinwandt. 2007. “Deniable Group Key Agreement.” In ''VIETCRYPT'', edited by Phong Q. Nguyen, 4341:298–311. Lecture Notes in Computer Science. Springer. http://dblp.uni-trier.de/db/conf/vietcrypt/vietcrypt2006.html#BohliS06.
[*BCGNP08] Colin Boyd, Yvonne Cliff, Juan Gonzalez Nieto, and <span>KennethG.</span> Paterson. 2008. “Efficient One-Round Key Exchange in the Standard Model.” In ''Information Security and Privacy'', edited by Yi Mu, Willy Susilo, and Jennifer Seberry, 5107:69–83. Lecture Notes in Computer Science. Springer Berlin Heidelberg. http://dx.doi.org/10.1007/978-3-540-70500-0_6.
 
[*BoMa10] Boyd, Colin; Mathuria, Anish. "Protocols for Authentication and Key Establishment","3642077161, 9783642077166",2010, Springer Publishing Company, Incorporated, 1st edition
[*BCP01] Emmanuel Bresson, Olivier Chevassut, and David Pointcheval. 2001. “Provably Authenticated Group Diffie-Hellman Key Exchange - the Dynamic Case.” In ''Advances in Cryptology - Proceedings of ASIACRYPT ’01'', edited by Colin Boyd, 2248:290–309. LNCS. Gold Coast, Australia: Springer. doi:[http://dx.doi.org/10.1007/3-540-45682-1_18 10.1007/3-540-45682-1_18].
[*Da14] George Danezis, Should Group Key Agreement be Symmetric and Contributory, http://conspicuouschatter.wordpress.com/2014/06/28/should-group-key-agreement-be-symmetric-and-contributory/
 
[*Da02] Davis, Don,"Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML.","USENIX Annual Technical Conference, General Track","1-880446-09-X","http://dblp.uni-trier.de/db/conf/usenix/usenix2001g.html#Davis01","2002-09-022001", page 65-78,"USENIX","dblp","Park, Yoonho"
[*GUVGC09] Ian Goldberg, Berkant Ustao<span>\</span>uglu, Matthew D. Van Gundy, and Hao Chen. 2009. “Multi-Party Off-the-Record Messaging.” In ''Proceedings of the 16th ACM Conference on Computer and Communications Security'', 358–368. CCS ’09. New York, NY, USA: ACM. doi:[http://dx.doi.org/10.1145/1653662.1653705 10.1145/1653662.1653705]. http://doi.acm.org/10.1145/1653662.1653705.
[*Gun13b] Matthew Van Gundy March 2013. “[OTR-dev] Improved Deniable Signature Key Exchange for mpOTR.”
http://lists.cypherpunks.ca/pipermail/otr-dev/2013-March/001676.html.
 
[*Kr00], "Krawczyk, Hugo","The order of encryption and authentication for protecting communications (Or: how secure is SSL?), 2001, Published: Cryptology ePrint Archive, Report 2001/045 http://eprint.iacr.org/
[*KPW13] Hugo Krawczyk and Kenneth G. Paterson, Hoeteck Wee. 2013. “On the Security of the TLS Protocol: A Systematic Analysis” in
''IACR Cryptology ePrint Archive''.
[*RGK05Mo13] Mario Di RaimondoMarlinspike, Rosario GennaroMoxie, and Hugo Krawczyk. 2005. “Secure Off-the-Record Messaging.” In ''WPES''"Simplifying OTR deniability" blogpost, 81–89. AlexandriaOpen Whispersystems, VA, USA. httphttps://dl.acmwhispersystems.org/citation.cfm?doid=1102199.1102216blog/simplifying-otr-deniability/
[*Sys14] Marlinspike, Moxie et al. Whisper Systems. 2014. “TextSecure ProtocolV2.” Accessed March 2. https://github.com/WhisperSystems/TextSecure/wiki/ProtocolV2.
[KiSo00*RGK05] Mario Di Raimondo,"bookSection"Rosario Gennaro,"2000","Song, Boyeon; Kim, Kwangjo","Two-Pass Authenticated Key Agreement Protocol with Key Confirmation","Progress in Cryptology —INDOCRYPT 2000","978-3-540-41452-0","","","http://dxand Hugo Krawczyk.doi2005.org/10.1007/3“Secure Off-540the-44495-5_21","","2000","2014-12-01 14:46:16","2014-12-01 14:46:16","","237-249","","","1977","","","","Lecture Notes in Computer Science","","","","Springer Berlin Heidelberg","","English","","","","","","","","","","","","","Roy, Bimal; Okamoto, Eiji","","","","","","","","","","","","","","","", [Mo13],"blogPost","","Marlinspike, Moxie","Simplifying OTR deniability","Open Wispersystems","","","","https://whispersystemsRecord Messaging.org/blog/simplifying-otr-deniability/" [Kr00]” In ''WPES'',"book","2001","Krawczyk, Hugo","The order of encryption and authentication for protecting communications (Or: how secure is SSL?)","","","","","","","2001","2014-11-28 18:16:08","2014-11-28 18:16:08","","","","","","","","","","","","","","","","","","","","","","Published: Cryptology ePrint Archive, Report 2001/045 http://eprint81–89.iacr.org/ [Da02]Alexandria,"2002"VA,"Davis, Don","Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XMLUSA.","USENIX Annual Technical Conference, General Track","1-880446-09-X","","","http://dblpdl.uni-trieracm.deorg/db/conf/usenix/usenix2001gcitation.html#Davis01","","2002-09-022001","2014-11-20 17:27:11","2014-11-20 17:27:11","","65-78","","","","","","","","","","","USENIX","","","","","","","","","","","","","dblp","","Park, Yoonho","","  [Be11],"conferencePaper","2011","Bernstein, Daniel Jcfm?doid=1102199.; Duif, Niels; Lange, Tanja; Schwabe, Peter; Yang, Bo-Yin","High-Speed High-Security Signatures.","CHES","978-3-642-23950-2","","","http://dblp.uni-trier.de/db/conf/ches/ches2011.html#BernsteinDLSY11","","2011","2014-11-20 17:27:10","2014-11-20 17:27:10","","124-142","","","6917","","","","Lecture Notes in Computer Science","","","","Springer","","","","","","","","","","","","","dblp","","Preneel, Bart; Takagi, Tsuyoshi","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","1102216
[BoMa10*KiSo00]Song,"book","2010","Boyd, ColinBoyeon; MathuriaKim, Anish"Kwangjo,"Protocols for Authentication and Two-Pass Authenticated Key EstablishmentAgreement Protocol with Key Confirmation","Progress in Cryptology —INDOCRYPT 2000","3642077161, 9783642077166","","","","","2010","2014978-3-12540-01 14:55:5541452-0","2014http://dx.doi.org/10.1007/3-12540-01 14:55:5544495-5_21","2000",; "237-249",1977 "Lecture Notes in Computer Science","","","","","","","","","","Springer Publishing CompanyBerlin Heidelber', Incorporated"Roy,""Bimal,""Okamoto,"","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","1st","","","","","","","","","","","","","","","","","","","","","","","","","",""Eiji
[*Git11] https://github.com/hellais/cryptocat
</HarvardReferences>
Bureaucrat, emailconfirmed, administrator, translator
662
edits