Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model (Q2502168): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s00200-005-0185-9 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2053218687 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4234051 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4542560 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374905 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341751 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4250828 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Applied Cryptography and Network Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374907 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737254 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778861 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Universally composable two-party and multi-party secure computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Progress in Cryptology - INDOCRYPT 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4450743 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 20:08, 24 June 2024

scientific article
Language Label Description Also known as
English
Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model
scientific article

    Statements

    Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model (English)
    0 references
    0 references
    0 references
    12 September 2006
    0 references
    0 references
    Key exchange protocols
    0 references
    Security proofs
    0 references
    Canetti-Krawczyk model
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references