Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model (Q2502168): Difference between revisions
From MaRDI portal
Added link to MaRDI item. |
ReferenceBot (talk | contribs) Changed an Item |
||
(2 intermediate revisions by 2 users not shown) | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1007/s00200-005-0185-9 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W2053218687 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4234051 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4542560 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q3374905 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4341751 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4250828 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Applied Cryptography and Network Security / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q3374907 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4737254 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q2778861 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Universally composable two-party and multi-party secure computation / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Progress in Cryptology - INDOCRYPT 2003 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4450743 / rank | |||
Normal rank |
Latest revision as of 20:08, 24 June 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model |
scientific article |
Statements
Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model (English)
0 references
12 September 2006
0 references
Key exchange protocols
0 references
Security proofs
0 references
Canetti-Krawczyk model
0 references