{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:57:52Z","timestamp":1772283472527,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540640400","type":"print"},{"value":"9783540696889","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0028166","type":"book-chapter","created":{"date-parts":[[2005,11,22]],"date-time":"2005-11-22T06:50:22Z","timestamp":1132642222000},"page":"137-158","source":"Crossref","is-referenced-by-count":28,"title":["Entity authentication and authenticated key transport protocols employing asymmetric techniques"],"prefix":"10.1007","author":[{"given":"Simon","family":"Blake-Wilson","sequence":"first","affiliation":[]},{"given":"Alfred","family":"Menezes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,15]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway. Entity authentication and key distribution. In Advances in Cryptology: Crypto '93, pages 232\u2013249, 1993.","DOI":"10.1007\/3-540-48329-2_21"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway. Random oracles are practical: a paradigm for designing efficient protocols. In 1st ACM Conference on Computer and Communications Security, pages 62\u201373, 1993.","DOI":"10.1145\/168588.168596"},{"key":"12_CR3","unstructured":"M. Bellare and P. Rogaway. Entity authentication and key distribution. Full version of [1], available at http:\/\/www-cse.ucsd.edu\/users\/mihir."},{"key":"12_CR4","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/BFb0053428","volume-title":"Advances in Cryptology \u2014 EUROCRYPT'94","author":"Mihir Bellare","year":"1995","unstructured":"M. Bellare and P. Rogaway. Optimal asymmetric encryption. In Advances in Cryptology: Eurocrypt '94, pages 92\u2013111, 1995."},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway. Provably secure session key distribution-the three party case. In Proceedings of the 27th ACM Symposium on the Theory of Computing, pages 57\u201366, 1995.","DOI":"10.1145\/225058.225084"},{"key":"12_CR6","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/3-540-68339-9_34","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201996","author":"Mihir Bellare","year":"1996","unstructured":"M. Bellare and P. Rogaway. The exact security of digital signatures-how to sign with RSA and Rabin. In Advances in Cryptology: Eurocrypt '96, pages 399\u2013416, 1996."},{"key":"12_CR7","first-page":"1","volume-title":"Information and Communications Security","author":"Mihir Bellare","year":"1997","unstructured":"M. Bellare and P. Rogaway. Minimizing the use of random oracles in authenticated encryption schemes. In Proceedings of PKS'97, 1997."},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung. Systematic design of two-party authentication protocols. In Advances in Cryptology: Crypto '91, pages 44\u201361, 1991.","DOI":"10.1007\/3-540-46766-1_3"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"M. Burrows, M. Abadi, and R. Needham. A logic of authentication. DEC SRC report 39, Digital Equipment Corporation, Palo Alto, CA, Feb. 1989. Revised Feb. 1990.","DOI":"10.1145\/74850.74852"},{"issue":"6","key":"12_CR10","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman. New directions in Cryptography. IEEE Transactions on Information Theory, IT-22(6): 644\u2013654, November 1976.","journal-title":"IEEE Transactions on Information Theory"},{"key":"12_CR11","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W. Diffie","year":"1992","unstructured":"W. Diffie, P.C. van Oorschot, and M.J. Wiener. Authentication and authenticated key exchanges. Designs, Codes, and Cryptography, 2: 107\u2013125, 1992.","journal-title":"Designs, Codes, and Cryptography"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"C. Dwork and M. Naor. An efficient existentially unforgeable signature scheme and its applications. In Advances in Cryptology: Crypto '94, pages 234\u2013246, 1994.","DOI":"10.1007\/3-540-48658-5_23"},{"key":"12_CR13","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser and S. Micali. Probabilistic encryption. Journal of Computer and System Sciences, 28: 270\u2013299, 1984.","journal-title":"Journal of Computer and System Sciences"},{"issue":"2","key":"12_CR14","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen message attacks. SIAM Journal of Computing, 17(2): 281\u2013308, 1988.","journal-title":"SIAM Journal of Computing"},{"key":"12_CR15","unstructured":"ISO\/IEC 9798-3. Information technology-Security techniques-Entity authentication mechanisms-Part 3: Entity authentication using a public-key algorithm, International Organization for Standardization, Geneva, Switzerland, 1993 (first edition)."},{"key":"12_CR16","unstructured":"ISO\/IEC 11770-3. Information technology-Security techniques-Key management \u2014 Part 3: Mechanisms using asymmetric techniques, draft, (DIS), 1996."},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone. Handbook of Applied Cryptography, chapter 12. CRC Press, 1996.","DOI":"10.1201\/9781439821916"},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1145\/359460.359473","volume":"21","author":"R.C. Merkle","year":"1978","unstructured":"R.C. Merkle. Secure communications over insecure channels. Communications of the ACM, 21: 294\u2013299, 1978.","journal-title":"Communications of the ACM"},{"key":"12_CR19","unstructured":"J.H. Moore. Protocol failure in cryptosystems. Chapter 11 in Contemporary Cryptology: the Science of Information Integrity, G. J. Simmons, editor, 541\u2013558, IEEE Press, 1992."},{"key":"12_CR20","unstructured":"National Institute of Standards and Technology, Entity Authentication using Public Key Cryptography, FIPS 196, February, 1997."},{"key":"12_CR21","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/3-540-68339-9_33","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201996","author":"David Pointcheval","year":"1996","unstructured":"D. Pointcheval and J. Stern. Security proofs for signature schemes. In Advances in Cryptology: Eurocrypt '96, pages 387\u2013398, 1996."},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"C. Rackoff and D.R. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In Advances in Cryptology: Crypto '91, pages 433\u2013444, 1992.","DOI":"10.1007\/3-540-46766-1_35"},{"issue":"5","key":"12_CR23","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1109\/49.223871","volume":"11","author":"Y. Zheng","year":"1993","unstructured":"Y. Zheng and J. Seberry. Immunizing public key cryptosystems against chosen ciphertext attacks. IEEE Journal on Selected Areas in Communications, 11(5): 715\u2013724, 1993.","journal-title":"IEEE Journal on Selected Areas in Communications"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0028166","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T02:49:15Z","timestamp":1586573355000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0028166"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540640400","9783540696889"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/bfb0028166","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998]]}}}