Efficient three-party authenticated key agreement protocol in certificateless cryptography (Q2885502): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Cryptography and Coding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - ASIACRYPT 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409129 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783728 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short signatures from the Weil pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Certificateless Signature Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737495 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2739458 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Strongly Secure Certificateless Key Agreement / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4718481 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simulatable certificateless two-party authenticated key agreement protocol / rank
 
Normal rank

Latest revision as of 05:59, 5 July 2024

scientific article
Language Label Description Also known as
English
Efficient three-party authenticated key agreement protocol in certificateless cryptography
scientific article

    Statements

    Efficient three-party authenticated key agreement protocol in certificateless cryptography (English)
    0 references
    23 May 2012
    0 references
    information security
    0 references
    protocol design
    0 references
    authentication
    0 references
    key agreement
    0 references

    Identifiers