Ibn Sid: Isaac ibn Sid ,
Guess the weight of the donkey, Veterinary Record, vol.161, issue.17, pp.577-577, 2007. ,
Gala dinner to mark NIVA centenary, Veterinary Record, vol.160, issue.20, pp.676-676, 2007. ,
Skydiving vet helps set new record, Veterinary Record, vol.161, issue.16, pp.538-538, 2007. ,
, Second-Generation Platelet Concentrates (L-PRF, A-PRF, i-PRF, i-PRF M, i-PRF+) in Cutaneous Wound Surgery of the Foot, Advance Research on Foot & Ankle, vol.2, issue.1, 2019.
if k = ?, pick ? ?R {0, 1} ? , set ? := ?, and send (GetReady, sid , P) to F ,
,
, Ibn Sid: Isaac ibn Sid
Ibn Sid: Isaac ibn Sid ,
OceanSITES, Proceedings of OceanObs'09: Sustained Ocean Observations and Information for Society, 2010. ,
?Send me tribute, or else?,?, Notes and Queries, vol.s1-X, issue.245, pp.38-38, 1854. ,
GMSC and RCGP send replies to CMO on limited list, BMJ, vol.290, issue.6466, pp.485-486, 1985. ,
Eprint, Cryptology ePrint Archive, 2019. ,
Universally Composable Relaxed Password Authenticated Key Exchange, Advances in Cryptology ? CRYPTO 2020, pp.278-307, 2020. ,
URL : https://hal.archives-ouvertes.fr/hal-02948678
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES, Topics in Cryptology ? CT-RSA 2001, vol.2020, pp.143-158, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-02391537
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework, Topics in Cryptology ? CT-RSA 2008, vol.4964, pp.335-351, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00419157
Password-Based Authenticated Key Exchange in the Three-Party Setting, Public Key Cryptography - PKC 2005, vol.3386, pp.65-84, 2005. ,
URL : https://hal.archives-ouvertes.fr/hal-00918401
Password-based authenticated key exchange in the three-party setting, IEE Proceedings - Information Security, vol.153, issue.1, p.27, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-00918401
Simple Password-Based Encrypted Key Exchange Protocols, Lecture Notes in Computer Science, vol.3376, pp.191-208, 2005. ,
URL : https://hal.archives-ouvertes.fr/hal-02391456
Authenticated Key Exchange Secure against Dictionary Attacks, Advances in Cryptology ? EUROCRYPT 2000, vol.1807, pp.139-155, 2000. ,
Encrypted key exchange: password-based protocols secure against dictionary attacks, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp.72-84 ,
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman, Advances in Cryptology ? EUROCRYPT 2000, vol.1807, pp.156-171, 2000. ,
Password-Authenticated Public-Key Encryption, Applied Cryptography and Network Security, vol.11464, pp.442-462, 2019. ,
Universally composable security: a new paradigm for cryptographic protocols, Proceedings 42nd IEEE Symposium on Foundations of Computer Science, pp.136-145, 2001. ,
Universally Composable Password-Based Key Exchange, Lecture Notes in Computer Science, vol.3494, pp.404-421, 2005. ,
Faster and Shorter Password-Authenticated Key Exchange, Theory of Cryptography, vol.4948, pp.589-606 ,
A Method for Making Password-Based Key Exchange Resilient to Server Compromise, Lecture Notes in Computer Science, vol.4117, pp.142-159, 2006. ,
Session-Key Generation Using Human Passwords Only, Journal of Cryptology, vol.19, issue.3, pp.241-340, 2006. ,
A new framework for efficient password-based authenticated key exchange, Proceedings of the 17th ACM conference on Computer and communications security - CCS '10, pp.516-525, 2010. ,
AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT, IACR Transactions on Cryptographic Hardware and Embedded Systems, vol.286, pp.1-48, 2019. ,
AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT, IACR Transactions on Cryptographic Hardware and Embedded Systems, vol.2019, issue.2, pp.1-48, 2019. ,
The SPEKE Protocol Revisited, Security Standardisation Research, vol.585, pp.26-38, 2014. ,
Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange, Lecture Notes in Computer Science, vol.11035, pp.485-504, 2018. ,
Extended password key exchange protocols immune to dictionary attack, Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.248-255 ,
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks, Advances in Cryptology ? EUROCRYPT 2018, vol.10822, pp.456-486, 2018. ,
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks, Advances in Cryptology ? EUROCRYPT 2018, vol.163, pp.456-486, 2018. ,
Dual-System Simulation-Soundness with Applications to UC-PAKE and More, Advances in Cryptology -- ASIACRYPT 2015, vol.9452, pp.630-655, 2015. ,
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords, Lecture Notes in Computer Science, vol.2045, pp.475-494, 2001. ,
Forward Secrecy in Password-Only Key Exchange Protocols, Security in Communication Networks, vol.2576, pp.29-44, 2003. ,
Round-Optimal Password-Based Authenticated Key Exchange, Theory of Cryptography, vol.6597, pp.293-310, 2011. ,
The OPAQUE asymmetric PAKE protocol, 2019. ,
HMQV: A High-Performance Secure Diffie-Hellman Protocol, Advances in Cryptology ? CRYPTO 2005, vol.3621, pp.546-566, 2005. ,
More Efficient Password-Authenticated Key Exchange, Topics in Cryptology ? CT-RSA 2001, pp.361-377, 2001. ,
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Advances in Cryptology ? CRYPTO ?91, vol.576, pp.129-140 ,
VTBPEKE, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp.301-312, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01471737
Eprint, Cryptology ePrint Archive, 2019. ,