{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:17:59Z","timestamp":1766135879249,"version":"3.41.0"},"reference-count":71,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2007,7,1]],"date-time":"2007-07-01T00:00:00Z","timestamp":1183248000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2007,7]]},"abstract":"<jats:p>\n            Authenticated key-exchange protocols allow two participants\n            <jats:italic>A<\/jats:italic>\n            and\n            <jats:italic>B<\/jats:italic>\n            , communicating over a public network and each holding an authentication means to exchange a shared secret value. Methods designed to deal with this cryptographic problem ensure\n            <jats:italic>A<\/jats:italic>\n            (resp.\n            <jats:italic>B<\/jats:italic>\n            ) that no other participants aside from\n            <jats:italic>B<\/jats:italic>\n            (resp.\n            <jats:italic>A<\/jats:italic>\n            ) can learn any information about the agreed value and often also ensure\n            <jats:italic>A<\/jats:italic>\n            and\n            <jats:italic>B<\/jats:italic>\n            that their respective partner has actually computed this value. A natural extension to this cryptographic method is to consider a pool of participants exchanging a shared secret value and to provide a formal treatment for it. Starting from the famous two-party Diffie--Hellman (DH) key-exchange protocol and from its authenticated variants, security experts have extended it to the multiparty setting for over a decade and, in the past few years, completed a formal analysis in the framework of modern cryptography. The present paper synthesizes this body of work on the provably-secure authenticated group DH key exchange.\n          <\/jats:p>","DOI":"10.1145\/1266977.1266979","type":"journal-article","created":{"date-parts":[[2007,9,14]],"date-time":"2007-09-14T13:44:55Z","timestamp":1189777495000},"page":"10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":56,"title":["Provably secure authenticated group Diffie-Hellman key exchange"],"prefix":"10.1145","volume":"10","author":[{"given":"Emmanuel","family":"Bresson","sequence":"first","affiliation":[{"name":"DCSSI Crypto Laboratory, Paris, France"}]},{"given":"Olivier","family":"Chevassut","sequence":"additional","affiliation":[{"name":"Lawrence Berkeley National Laboratory, Berkeley, California"}]},{"given":"David","family":"Pointcheval","sequence":"additional","affiliation":[{"name":"\u00c9cole Normale Sup\u00e9rieure, Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2007,7]]},"reference":[{"volume-title":"Proc. of 6th IEEE Symposium on Computers and Communications. IEEE Computer Society Press, Washington, D.C. 22--28","author":"Agarwal D.","key":"e_1_2_1_1_1","unstructured":"Agarwal , D. , Chevassut , O. , Thompson , M. R. , and Tsudik , G . 2001. An integrated solution for secure group communication in wide-area networks . In Proc. of 6th IEEE Symposium on Computers and Communications. IEEE Computer Society Press, Washington, D.C. 22--28 . Also Technical Report LBNL-47158, Lawrence Berkeley National Laboratory. Agarwal, D., Chevassut, O., Thompson, M. R., and Tsudik, G. 2001. An integrated solution for secure group communication in wide-area networks. In Proc. of 6th IEEE Symposium on Computers and Communications. IEEE Computer Society Press, Washington, D.C. 22--28. Also Technical Report LBNL-47158, Lawrence Berkeley National Laboratory."},{"key":"e_1_2_1_2_1","unstructured":"Amir Y. and Stanton J. 1998. The spread wide area group communication system. Tech. rep. CNDS-98-4.  Amir Y. and Stanton J. 1998. The spread wide area group communication system. Tech. rep. CNDS-98-4."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2004.1278104"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288097"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.839937"},{"volume-title":"Proc. of Intl. Conference on Dependable Systems and Networks (DSN-2003)","author":"Backes M.","key":"e_1_2_1_6_1","unstructured":"Backes , M. and Cachin , C . 2003. Reliable broadcast in a computational hybrid model with byzantine faults, crashes, and recoveries . In Proc. of Intl. Conference on Dependable Systems and Networks (DSN-2003) . 37--46. Backes, M. and Cachin, C. 2003. Reliable broadcast in a computational hybrid model with byzantine faults, crashes, and recoveries. In Proc. of Intl. Conference on Dependable Systems and Networks (DSN-2003). 37--46."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288094"},{"key":"e_1_2_1_8_1","volume-title":"Proc. of Crypto '93","volume":"773","author":"Bellare M.","unstructured":"Bellare , M. and Rogaway , P . 1993a. Entity authentication and key distribution . In Proc. of Crypto '93 , D. R. Stinson, Ed. LNCS , vol. 773 . Springer-Verlag, New York. 232--249. Bellare, M. and Rogaway, P. 1993a. Entity authentication and key distribution. In Proc. of Crypto '93, D. R. Stinson, Ed. LNCS, vol. 773. Springer-Verlag, New York. 232--249."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/225058.225084"},{"volume-title":"Proc. of FOCS '96","author":"Bellare M.","key":"e_1_2_1_11_1","unstructured":"Bellare , M. , Canetti , R. , and Krawczyk , H . 1996. Pseudo-random functions revisited: The cascade construction and its concrete security . In Proc. of FOCS '96 . IEEE Computer Society Press, Washington, D.C. 514--523. Bellare, M., Canetti, R., and Krawczyk, H. 1996. Pseudo-random functions revisited: The cascade construction and its concrete security. In Proc. of FOCS '96. IEEE Computer Society Press, Washington, D.C. 514--523."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276854"},{"key":"e_1_2_1_13_1","volume-title":"Proc. of Eurocrypt '00","volume":"1807","author":"Bellare M.","unstructured":"Bellare , M. , Pointcheval , D. , and Rogaway , P . 2000. Authenticated key exchange secure against dictionary attacks . In Proc. of Eurocrypt '00 , B. Preneel, Ed. LNCS , vol. 1807 . Springer-Verlag, New York. 139--155. Bellare, M., Pointcheval, D., and Rogaway, P. 2000. Authenticated key exchange secure against dictionary attacks. In Proc. of Eurocrypt '00, B. Preneel, Ed. LNCS, vol. 1807. Springer-Verlag, New York. 139--155."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(02)00036-5"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/0470867167"},{"key":"e_1_2_1_16_1","volume-title":"Proc. of Crypto '91","volume":"576","author":"Bird R.","unstructured":"Bird , R. , Gopal , I. S. , Herzberg , A. , Janson , P. A. , Kutten , S. , Molva , R. , and Yung , M . 1991. Systematic design of two-party authentication protocols . In Proc. of Crypto '91 , J. Feigenbaum, Ed. LNCS , vol. 576 . Springer-Verlag, New York. 44--61. Bird, R., Gopal, I. S., Herzberg, A., Janson, P. A., Kutten, S., Molva, R., and Yung, M. 1991. Systematic design of two-party authentication protocols. In Proc. of Crypto '91, J. Feigenbaum, Ed. LNCS, vol. 576. Springer-Verlag, New York. 44--61."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(19990725)29:9%3C741::AID-SPE259%3E3.0.CO;2-I"},{"key":"e_1_2_1_18_1","volume-title":"Proc. of SPW '97","volume":"1361","author":"Blake-Wilson S.","unstructured":"Blake-Wilson , S. and Menezes , A. J . 1997a. Entity authentication and authenticated key transport protocols employing asymmetric techniques . In Proc. of SPW '97 , B. Christianson, B. Crispo, T. M. A. Lomas, and M. Roe, Eds. LNCS , vol. 1361 . Springer-Verlag, New York. 137--158. Blake-Wilson, S. and Menezes, A. J. 1997a. Entity authentication and authenticated key transport protocols employing asymmetric techniques. In Proc. of SPW '97, B. Christianson, B. Crispo, T. M. A. Lomas, and M. Roe, Eds. LNCS, vol. 1361. Springer-Verlag, New York. 137--158."},{"key":"e_1_2_1_19_1","volume-title":"Proc. of 6th IMA International Conference on Cryptography and Coding, M. Darnell, Ed. LNCS","volume":"1355","author":"Blake-Wilson S.","unstructured":"Blake-Wilson , S. , Johnson , D. , and Menezes , A. J . 1997b. Key agreement protocols and their security analysis . In Proc. of 6th IMA International Conference on Cryptography and Coding, M. Darnell, Ed. LNCS , vol. 1355 . Springer-Verlag, New York. 30--45. Blake-Wilson, S., Johnson, D., and Menezes, A. J. 1997b. Key agreement protocols and their security analysis. In Proc. of 6th IMA International Conference on Cryptography and Coding, M. Darnell, Ed. LNCS, vol. 1355. Springer-Verlag, New York. 30--45."},{"volume-title":"Proc. of ANTS III","author":"Boneh D.","key":"e_1_2_1_20_1","unstructured":"Boneh , D. 1998. The decision Diffie-Hellman problem . In Proc. of ANTS III , J. P. Buhler, Ed. LNCS, vol. 1423 . Springer-Verlag , New York . 48--63. Boneh, D. 1998. The decision Diffie-Hellman problem. In Proc. of ANTS III, J. P. Buhler, Ed. LNCS, vol. 1423. Springer-Verlag, New York. 48--63."},{"volume-title":"Proc. of CSFW '95","author":"Boyd C.","key":"e_1_2_1_21_1","unstructured":"Boyd , C. 1995. Towards a classification of key agreement protocols . In Proc. of CSFW '95 . IEEE Computer Society Press , Washington, D.C. 38--43. Boyd, C. 1995. Towards a classification of key agreement protocols. In Proc. of CSFW '95. IEEE Computer Society Press, Washington, D.C. 38--43."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/646034.677682"},{"key":"e_1_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Boyd C. and Mathuria A. 2003. Protocols for Authentication and Key Establishment. Springer-Verlag New York.   Boyd C. and Mathuria A. 2003. Protocols for Authentication and Key Establishment. Springer-Verlag New York.","DOI":"10.1007\/978-3-662-09527-0"},{"key":"e_1_2_1_24_1","volume-title":"Proc. of PKC '03","volume":"2567","author":"Boyd C.","unstructured":"Boyd , C. and Nieto , J. M . 2003. Round-optimal contributory conference key agreement . In Proc. of PKC '03 , Y. G. Desmedt, Ed. LNCS , vol. 2567 . Springer-Verlag, New York. 161--174. Boyd, C. and Nieto, J. M. 2003. Round-optimal contributory conference key agreement. In Proc. of PKC '03, Y. G. Desmedt, Ed. LNCS, vol. 2567. Springer-Verlag, New York. 161--174."},{"key":"e_1_2_1_25_1","volume-title":"Proc. of PKC '04","volume":"2947","author":"Bresson E.","unstructured":"Bresson , E. and Catalano , D . 2004. Constant round authenticated group key agreement via distributed computation . In Proc. of PKC '04 , F. Bao, R. H. Deng, and J. Zhou, Eds. LNCS , vol. 2947 . Springer-Verlag, New York. 115--129. Bresson, E. and Catalano, D. 2004. Constant round authenticated group key agreement via distributed computation. In Proc. of PKC '04, F. Bao, R. H. Deng, and J. Zhou, Eds. LNCS, vol. 2947. Springer-Verlag, New York. 115--129."},{"key":"e_1_2_1_26_1","volume-title":"Proc. of Asiacrypt '01","volume":"2248","author":"Bresson E.","unstructured":"Bresson , E. , Chevassut , O. , and Pointcheval , D . 2001a. Provably authenticated group Diffie-Hellman key exchange---the dynamic case . In Proc. of Asiacrypt '01 , C. Boyd, Ed. LNCS , vol. 2248 . Springer-Verlag, New York. 290--309. Full version available from authors' web pages. Bresson, E., Chevassut, O., and Pointcheval, D. 2001a. Provably authenticated group Diffie-Hellman key exchange---the dynamic case. In Proc. of Asiacrypt '01, C. Boyd, Ed. LNCS, vol. 2248. Springer-Verlag, New York. 290--309. Full version available from authors' web pages."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502018"},{"key":"e_1_2_1_28_1","volume-title":"Proc. of Eurocrypt '02","volume":"2332","author":"Bresson E.","unstructured":"Bresson , E. , Chevassut , O. , and Pointcheval , D . 2002a. Dynamic group Diffie-Hellman key exchange under standard assumptions . In Proc. of Eurocrypt '02 , L. R. Knudsen, Ed. LNCS , vol. 2332 . Springer-Verlag, New York. 321--336. Full version available from authors' web pages. Bresson, E., Chevassut, O., and Pointcheval, D. 2002a. Dynamic group Diffie-Hellman key exchange under standard assumptions. In Proc. of Eurocrypt '02, L. R. Knudsen, Ed. LNCS, vol. 2332. Springer-Verlag, New York. 321--336. Full version available from authors' web pages."},{"key":"e_1_2_1_29_1","volume-title":"Proc. of SAC '02","volume":"2595","author":"Bresson E.","unstructured":"Bresson , E. , Chevassut , O. , and Pointcheval , D . 2002b. The group Diffie-Hellman problems . In Proc. of SAC '02 , K. Nyberg and H. Heys, Eds. LNCS , vol. 2595 . Springer-Verlag, New York. 325--338. Bresson, E., Chevassut, O., and Pointcheval, D. 2002b. The group Diffie-Hellman problems. In Proc. of SAC '02, K. Nyberg and H. Heys, Eds. LNCS, vol. 2595. Springer-Verlag, New York. 325--338."},{"key":"e_1_2_1_30_1","volume-title":"Proc. of Eurocrypt '94","volume":"950","author":"Burmester M.","unstructured":"Burmester , M. and Desmedt , Y. G . 1994. A secure and efficient conference key distribution system . In Proc. of Eurocrypt '94 , A. D. Santis, Ed. LNCS , vol. 950 . Springer-Verlag, New York. 275--286. Burmester, M. and Desmedt, Y. G. 1994. A secure and efficient conference key distribution system. In Proc. of Eurocrypt '94, A. D. Santis, Ed. LNCS, vol. 950. Springer-Verlag, New York. 275--286."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1011767.1011820"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910006"},{"key":"e_1_2_1_33_1","volume-title":"Proc. of Eurocrypt '01","volume":"2045","author":"Canetti R.","unstructured":"Canetti , R. and Krawczyk , H . 2001. Analysis of key-exchange protocols and their use for building secure channels . In Proc. of Eurocrypt '01 , B. Pfitzmann, Ed. LNCS , vol. 2045 . Springer-Verlag, New York. 453--474. Canetti, R. and Krawczyk, H. 2001. Analysis of key-exchange protocols and their use for building secure channels. In Proc. of Eurocrypt '01, B. Pfitzmann, Ed. LNCS, vol. 2045. Springer-Verlag, New York. 453--474."},{"key":"e_1_2_1_34_1","volume-title":"Proc. of Eurocrypt '02","volume":"2332","author":"Canetti R.","unstructured":"Canetti , R. and Krawczyk , H . 2002. Universally composable notions of key exchange and secure channels . In Proc. of Eurocrypt '02 , L. R. Knudsen, Ed. LNCS , vol. 2332 . Springer-Verlag, New York. 337--351. Canetti, R. and Krawczyk, H. 2002. Universally composable notions of key exchange and secure channels. In Proc. of Eurocrypt '02, L. R. Knudsen, Ed. LNCS, vol. 2332. Springer-Verlag, New York. 337--351."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276741"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/503112.503113"},{"key":"e_1_2_1_37_1","volume-title":"Proc. of STACS '99","volume":"1563","author":"Crescenzo G. D.","unstructured":"Crescenzo , G. D. , Ferguson , N. , Impagliazzo , R. , and Jakobsson , M . 1999. How to forget a secret . In Proc. of STACS '99 , C. Meinel and S. Tison, Eds. LNCS , vol. 1563 . Springer-Verlag, New York. 500--509. Crescenzo, G. D., Ferguson, N., Impagliazzo, R., and Jakobsson, M. 1999. How to forget a secret. In Proc. of STACS '99, C. Meinel and S. Tison, Eds. LNCS, vol. 1563. Springer-Verlag, New York. 500--509."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"key":"e_1_2_1_40_1","unstructured":"Dupont R. and Enge A. 2002. Practical non-interactive key distribution based on pairings. Cryptology ePrint Archive.  Dupont R. and Enge A. 2002. Practical non-interactive key distribution based on pairings. Cryptology ePrint Archive."},{"key":"e_1_2_1_41_1","unstructured":"Foster I. and Kesselman C. 2004. The Grid 2: Blueprint for a New Computing Infrastructure. Morgan Kaufmann San Mateo CA.   Foster I. and Kesselman C. 2004. The Grid 2: Blueprint for a New Computing Infrastructure. Morgan Kaufmann San Mateo CA."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100270"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793244708"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73009"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056542"},{"volume-title":"Proc. of ANTS IV","author":"Joux A.","key":"e_1_2_1_47_1","unstructured":"Joux , A. 2000. A one-round protocol for tripartite Diffie-Hellman . In Proc. of ANTS IV , W. Bosma, Ed. LNCS, vol. 1838 . Springer-Verlag , New York . 385--394. Joux, A. 2000. A one-round protocol for tripartite Diffie-Hellman. In Proc. of ANTS IV, W. Bosma, Ed. LNCS, vol. 1838. Springer-Verlag, New York. 385--394."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266449"},{"key":"e_1_2_1_49_1","volume-title":"Proc. of Asiacrypt '96","volume":"1163","author":"Just M.","unstructured":"Just , M. and Vaudenay , S . 1996. Authenticated multi-party key agreement . In Proc. of Asiacrypt '96 , K. Kim and T. Matsumoto, Eds. LNCS , vol. 1163 . Springer-Verlag, New York. 36--49. Just, M. and Vaudenay, S. 1996. Authenticated multi-party key agreement. In Proc. of Asiacrypt '96, K. Kim and T. Matsumoto, Eds. LNCS, vol. 1163. Springer-Verlag, New York. 36--49."},{"key":"e_1_2_1_50_1","volume-title":"Proc. of Crypto '03","volume":"2729","author":"Katz J.","unstructured":"Katz , J. and Yung , M . 2003. Scalable protocols for authenticated group key exchange . In Proc. of Crypto '03 , D. Boneh, Ed. LNCS , vol. 2729 . Springer-Verlag, New York. 110--125. Katz, J. and Yung, M. 2003. Scalable protocols for authenticated group key exchange. In Proc. of Crypto '03, D. Boneh, Ed. LNCS, vol. 2729. Springer-Verlag, New York. 110--125."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352638"},{"key":"e_1_2_1_52_1","volume-title":"Proc. of International Federation for Information Processing (IFIP SEC 2001), M. Dupuy and P. Paradinas, Eds. IFIP Conference Proceedings","volume":"193","author":"Kim Y.","unstructured":"Kim , Y. , Perrig , A. , and Tsudik , G . 2001. Communication-efficient group key agreement . In Proc. of International Federation for Information Processing (IFIP SEC 2001), M. Dupuy and P. Paradinas, Eds. IFIP Conference Proceedings , vol. 193 . International Federation for Information Processing. Kluwer, Boston, MA. 229--244. Kim, Y., Perrig, A., and Tsudik, G. 2001. Communication-efficient group key agreement. In Proc. of International Federation for Information Processing (IFIP SEC 2001), M. Dupuy and P. Paradinas, Eds. IFIP Conference Proceedings, vol. 193. International Federation for Information Processing. Kluwer, Boston, MA. 229--244."},{"key":"e_1_2_1_53_1","volume-title":"Conference key agreement from secret sharing. In Proc. of ACISP '99","volume":"1587","author":"Li C.-H.","unstructured":"Li , C.-H. and Pieprzyk , J . 1999 . Conference key agreement from secret sharing. In Proc. of ACISP '99 , J. Pieprzyk, R. Safavi-Naini, and J. Seberry, Eds. LNCS , vol. 1587 . Springer-Verlag, New York. 64--76. Li, C.-H. and Pieprzyk, J. 1999. Conference key agreement from secret sharing. In Proc. of ACISP '99, J. Pieprzyk, R. Safavi-Naini, and J. Seberry, Eds. LNCS, vol. 1587. Springer-Verlag, New York. 64--76."},{"key":"e_1_2_1_54_1","unstructured":"McGrew D. A. and Sherman A. T. 1998. Key establishment in large dynamic groups using one-way function trees. Manuscript.  McGrew D. A. and Sherman A. T. 1998. Key establishment in large dynamic groups using one-way function trees. Manuscript."},{"key":"e_1_2_1_55_1","unstructured":"Menezes A. J. van Oorschot P. C. and Vanstone S. A. 1997. Handbook of Applied Cryptography. CRC Press Boca Raton Florida. http:\/\/cacr.math.uwaterloo.ca\/hac\/.   Menezes A. J. van Oorschot P. C. and Vanstone S. A. 1997. Handbook of Applied Cryptography. CRC Press Boca Raton Florida. http:\/\/cacr.math.uwaterloo.ca\/hac\/."},{"volume-title":"Proc. of FOCS '97","author":"Naor M.","key":"e_1_2_1_56_1","unstructured":"Naor , M. and Reingold , O . 1997. Number-theoretic constructions of efficient pseudo-random functions . In Proc. of FOCS '97 . IEEE Computer Society Press, Washington D.C. 458--467. Naor, M. and Reingold, O. 1997. Number-theoretic constructions of efficient pseudo-random functions. In Proc. of FOCS '97. IEEE Computer Society Press, Washington D.C. 458--467."},{"volume-title":"Federal Information Processing StandardsPublication 140-1: Security Requirements for Cryptographic Modules","key":"e_1_2_1_57_1","unstructured":"NIST. 1994. Federal Information Processing StandardsPublication 140-1: Security Requirements for Cryptographic Modules . U. S. National Institute of Standards and Technology . NIST. 1994. Federal Information Processing StandardsPublication 140-1: Security Requirements for Cryptographic Modules. U. S. National Institute of Standards and Technology."},{"key":"e_1_2_1_58_1","volume-title":"Proc. of Financial Crypto '98","volume":"1465","author":"Palmer E. R.","unstructured":"Palmer , E. R. , Smith , S. W. , and Weingart , S. H . 1998. Using a high-performance, programmable secure coprocessor . In Proc. of Financial Crypto '98 , R. Hirschfeld, Ed. LNCS , vol. 1465 . Springer-Verlag, New York. 73--89. Palmer, E. R., Smith, S. W., and Weingart, S. H. 1998. Using a high-performance, programmable secure coprocessor. In Proc. of Financial Crypto '98, R. Hirschfeld, Ed. LNCS, vol. 1465. Springer-Verlag, New York. 73--89."},{"key":"e_1_2_1_59_1","volume-title":"-J","author":"Pereira O.","year":"2001","unstructured":"Pereira , O. and Quisquater , J . -J . 2001 . A security analysis of the cliques protocol suites. In Proc. of CSFW '01. IEEE Computer Society Press , Washington, D.C. 73--81. Pereira, O. and Quisquater, J.-J. 2001. A security analysis of the cliques protocol suites. In Proc. of CSFW '01. IEEE Computer Society Press, Washington, D.C. 73--81."},{"key":"e_1_2_1_60_1","volume-title":"International Workshop on Cryptographic Techniques and E-Commerce CrypTEC '99","author":"Perrig A.","year":"1999","unstructured":"Perrig , A. 1999 . Simple and fault-tolerant key agreement for dynamic collaborative groups . In International Workshop on Cryptographic Techniques and E-Commerce CrypTEC '99 . Hong-Kong City University Press, Hong-Kong. Perrig, A. 1999. Simple and fault-tolerant key agreement for dynamic collaborative groups. In International Workshop on Cryptographic Techniques and E-Commerce CrypTEC '99. Hong-Kong City University Press, Hong-Kong."},{"volume-title":"Proc. of the 22ndIEEE Symposium on Security and Privacy. IEEE Computer Society Press, Washington, D.C. 184--200","author":"Pfitzmann B.","key":"e_1_2_1_61_1","unstructured":"Pfitzmann , B. and Waidner , M . 2001. A model for asynchronous reactive systems and its application to secure message transmission . In Proc. of the 22ndIEEE Symposium on Security and Privacy. IEEE Computer Society Press, Washington, D.C. 184--200 . Pfitzmann, B. and Waidner, M. 2001. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. of the 22ndIEEE Symposium on Security and Privacy. IEEE Computer Society Press, Washington, D.C. 184--200."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501982"},{"key":"e_1_2_1_63_1","volume-title":"Proc. of Eurocrypt '96","volume":"1070","author":"Rubin A. D.","unstructured":"Rubin , A. D. and Shoup , V . 1996. Session-key distribution using smart cards . In Proc. of Eurocrypt '96 , U. M. Maurer, Ed. LNCS , vol. 1070 . Springer-Verlag, New York. 321--331. Rubin, A. D. and Shoup, V. 1996. Session-key distribution using smart cards. In Proc. of Eurocrypt '96, U. M. Maurer, Ed. LNCS, vol. 1070. Springer-Verlag, New York. 321--331."},{"volume-title":"Proc. of Crypto '01","author":"Shoup V.","key":"e_1_2_1_65_1","unstructured":"Shoup , V. 2001. OAEP reconsidered . In Proc. of Crypto '01 , J. Kilian, Ed. LNCS, vol. 2139 . Springer-Verlag , New York . 239--259. Shoup, V. 2001. OAEP reconsidered. In Proc. of Crypto '01, J. Kilian, Ed. LNCS, vol. 2139. Springer-Verlag, New York. 239--259."},{"key":"e_1_2_1_66_1","volume-title":"Proc. of Crypto '88","volume":"403","author":"Steer D. G.","unstructured":"Steer , D. G. , Strawczynski , L. , Diffie , W. , and Wiener , M. J . 1988. A secure audio teleconference system . In Proc. of Crypto '88 , S. Goldwasser, Ed. LNCS , vol. 403 . Springer-Verlag, New York. 520--528. Steer, D. G., Strawczynski, L., Diffie, W., and Wiener, M. J. 1988. A secure audio teleconference system. In Proc. of Crypto '88, S. Goldwasser, Ed. LNCS, vol. 403. Springer-Verlag, New York. 520--528."},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/238168.238182"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.877936"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.5555\/648117.746739"},{"key":"e_1_2_1_70_1","volume-title":"Eds. LNCS","volume":"1528","author":"Vedder K.","unstructured":"Vedder , K. and Weikmann , F . 1997. Smart cards requirements, properties, and applications. In State of the Art in Applied Cryptography, B. Preneel and V. Rijmen , Eds. LNCS , vol. 1528 . Springer-Verlag, New York. 307--331. Vedder, K. and Weikmann, F. 1997. Smart cards requirements, properties, and applications. In State of the Art in Applied Cryptography, B. Preneel and V. Rijmen, Eds. LNCS, vol. 1528. Springer-Verlag, New York. 307--331."},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(19980725)28:9%3C963::AID-SPE179%3E3.0.CO;2-9"},{"volume-title":"Proc. of CHES '00, \u00b8 C","author":"Weingart S. H.","key":"e_1_2_1_72_1","unstructured":"Weingart , S. H. 2000. Physical security devices for computer subsystems: A survey of attacks and defenses . In Proc. of CHES '00, \u00b8 C . K. Ko\u00b8c and C. Paar, Eds. LNCS, vol. 1965 . Springer-Verlag , New York . 302--317. Weingart, S. H. 2000. Physical security devices for computer subsystems: A survey of attacks and defenses. In Proc. of CHES '00, \u00b8 C. K. Ko\u00b8c and C. Paar, Eds. LNCS, vol. 1965. Springer-Verlag, New York. 302--317."}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1266977.1266979","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1266977.1266979","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:52:14Z","timestamp":1750258334000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1266977.1266979"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":71,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2007,7]]}},"alternative-id":["10.1145\/1266977.1266979"],"URL":"https:\/\/doi.org\/10.1145\/1266977.1266979","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"type":"print","value":"1094-9224"},{"type":"electronic","value":"1557-7406"}],"subject":[],"published":{"date-parts":[[2007,7]]},"assertion":[{"value":"2007-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}