{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T11:10:02Z","timestamp":1736075402450,"version":"3.32.0"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T00:00:00Z","timestamp":1131321600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T00:00:00Z","timestamp":1131321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["AAECC"],"published-print":{"date-parts":[[2006,1]]},"DOI":"10.1007\/s00200-005-0185-9","type":"journal-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T12:38:13Z","timestamp":1131367093000},"page":"405-438","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Modular proofs for key exchange: rigorous optimizations in the Canetti\u2013Krawczyk model"],"prefix":"10.1007","volume":"16","author":[{"given":"Yvonne","family":"Hitchcock","sequence":"first","affiliation":[]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[]},{"given":"Juan Manuel","family":"Gonz\u00e1lez Nieto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,11,7]]},"reference":[{"key":"185_CR1","doi-asserted-by":"crossref","unstructured":"Backes, M., Pfitzmann, B., Steiner, M., Waidner, M.: Polynomial Fairness and Liveness. In: 15th IEEE Computer Security Foundations Workshop\u2013CSFW 2002, IEEE Computer Society Press, pp. 160\u2013174","DOI":"10.1109\/CSFW.2002.1021814"},{"key":"185_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Provably secure session key distribution \u2013 the three party case. In: Proc. 27th ACM Symposium on the Theory of Computing, ACM 1995, pp. 57\u201366","DOI":"10.1145\/225058.225084"},{"key":"185_CR3","doi-asserted-by":"crossref","unstructured":"Bellare M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: Proc. thirtieth Annual ACM Symposium on Theory of computing, ACM 1998, pp. 419\u2013428. Full version at http:\/\/www-cse.ucsd.edu\/users\/mihir\/papers\/key-distribution.html","DOI":"10.1145\/276698.276854"},{"key":"185_CR4","doi-asserted-by":"crossref","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) Advances in Cryptology \u2013 Eurocrypt 2000 vol. 1807. Lecture Notes in Computer Science. Springer-Verlag 2000, pp. 139\u2013155","DOI":"10.1007\/3-540-45539-6_11"},{"key":"185_CR5","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Advances in Cryptology \u2013 CRYPTO'93 vol. 773. Lecture Notes in Computer Science. Springer-Verlag 1993, pp. 232\u2013249. Full version at http:\/\/www-cse.ucsd.edu\/users\/mihir","DOI":"10.1007\/3-540-48329-2_21"},{"key":"185_CR6","doi-asserted-by":"crossref","unstructured":"Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman key agreement protocols. In: Tavares, S. et al. (ed.) Selected Areas in Cryptography, 5th International Workshop, vol 1556. Lecture Notes in Computer Science. Springer-Verlag 1999, pp. 339\u2013361","DOI":"10.1007\/3-540-48892-8_26"},{"key":"185_CR7","doi-asserted-by":"crossref","unstructured":"Boyd, C., Mao, W., Paterson, K.: Key agreement using statically keyed authenticators. In: Applied Cryptography and Newwork Security (ACNS'04) vol. 3089 Lecture Notes in Computer Science. Springer-Verlag 2004, pp. 248\u2013262. Corrected version at http:\/\/sky.fit.qut.edu.au\/~boydc\/papers\/acns04-corrected.pdf","DOI":"10.1007\/978-3-540-24852-1_18"},{"key":"185_CR8","doi-asserted-by":"crossref","unstructured":"Boyko, V., MacKenzie, P., Patel, S.: Provably secure password-authenticated key exchange using Diffie-Hellman. In: Preneel, B. (ed.) Advances in Cryptology \u2013 Eurocrypt 2000, vol. 1807. Lecture Notes in Computer Science. Springer-Verlag 2000, pp. 156\u2013171","DOI":"10.1007\/3-540-45539-6_12"},{"key":"185_CR9","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic group Diffie-Hellman key exchange under standard assumptions. In: Advances in Cryptology \u2013 Eurocrypt 2002, vol. 2332. Lecture Notes in Computer Science. Springer-Verlag 2002, pp. 321-336","DOI":"10.1007\/3-540-46035-7_21"},{"key":"185_CR10","doi-asserted-by":"crossref","unstructured":"Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols (Extended Abstract), IEEE, 42nd IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, pp. 136\u2013145, 2001, Full version available at: http:\/\/eprint.iacr.org\/2000\/067","DOI":"10.1109\/SFCS.2001.959888"},{"key":"185_CR11","doi-asserted-by":"crossref","unstructured":"Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Advances in Cryptology \u2013 Eurocrypt 2001, vol. 2045. Lecture Notes in Computer Science. Springer-Verlag 2001, pp. 453\u2013474 http:\/\/eprint.iacr.org\/2001\/040.ps.gz","DOI":"10.1007\/3-540-44987-6_28"},{"key":"185_CR12","doi-asserted-by":"crossref","unstructured":"Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally composable two-party and Multi-Party secure computation. In: Proc. 34th Annual Symposium on Theory of Computing (STOC) 2002, ACM Press, pp. 494\u2013503. Full paper appeared as Cryptology ePrint Archive: Report 2002\/140, http:\/\/eprint.iacr.org\/2002\/140\/","DOI":"10.1145\/509907.509980"},{"key":"185_CR13","doi-asserted-by":"crossref","unstructured":"Hitchcock, Y., Tin, Y.S.T., Boyd, C., Gonz\u00e1lez Nieto, J.M., Montague, P.: A password-based authenticator: Security proof and applications. In: 4th International Conference on Cryptology in India \u2013 INDOCRYPT 2003, vol. 2904. Lecture Notes in Computer Science. Springer-Verlag 2003","DOI":"10.1007\/978-3-540-24582-7_29"},{"key":"185_CR14","unstructured":"ISO. Information Technology \u2013 Security Techniques \u2013 Key Management \u2013 Part 3: Mechanisms Using Asymmetric Techniques. ISO\/IEC 11770-3, ISO 1999, International Standard"},{"key":"185_CR15","unstructured":"Terry Tin, Y.S., Colin, B., Gonz\u00e1lez Nieto, J.M.: Provably secure key exchange: An Engineering approach. In: Chris, J., Paul, M., Chris, S. (eds.) Australasian Information Security Workshop, vol. 21. Conferences in Research and Practice in Information Technology. Australian Computer Society. Adelaide Australia 2003, pp. 97\u2013104"},{"key":"185_CR16","doi-asserted-by":"crossref","unstructured":"Tin, Y.S.T., Boyd, C., Gonz\u00e1lez Nieto, J.M.: Provably secure mobile key exchange: Applying the Canetti-Krawczyk approach. In: Information security and privacy \u2013 ACISP 2003, vol. 2727. Lecture Notes in Compututer Science. Springer-Verlag 2003, pp. 166\u2014179","DOI":"10.1007\/3-540-45067-X_15"}],"container-title":["Applicable Algebra in Engineering, Communication and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-005-0185-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00200-005-0185-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-005-0185-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-005-0185-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T10:28:39Z","timestamp":1736072919000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00200-005-0185-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,7]]},"references-count":16,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2006,1]]}},"alternative-id":["185"],"URL":"https:\/\/doi.org\/10.1007\/s00200-005-0185-9","relation":{},"ISSN":["0938-1279","1432-0622"],"issn-type":[{"type":"print","value":"0938-1279"},{"type":"electronic","value":"1432-0622"}],"subject":[],"published":{"date-parts":[[2005,11,7]]},"assertion":[{"value":"8 November 2004","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 June 2005","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2005","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}