Security weaknesses of a signature scheme and authenticated key agreement protocols (Q2445398): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(4 intermediate revisions by 4 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: NAXOS / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.ipl.2013.11.005 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2084437673 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4542560 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341751 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4234051 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key agreement protocols and their security analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3840150 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434890 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778861 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Identity-Based Signature from Gap Diffie-Hellman Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Remark Concerning m-Divisibility and the Discrete Logarithm in the Divisor Class Group of Curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Cryptography - PKC 2006 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4413870 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An improved two-party identity-based authenticated key agreement protocol using pairings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2739458 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Stronger Security of Authenticated Key Exchange / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4718481 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Weil pairing, and its efficient calculation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Authenticated Key Exchange and Key Encapsulation in the Standard Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Cryptosystems and Signature Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-based authenticated key agreement protocol based on Weil pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptology and Network Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Batch Verifications with ID-Based Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Cryptography – PKC 2004 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 10:10, 8 July 2024

scientific article
Language Label Description Also known as
English
Security weaknesses of a signature scheme and authenticated key agreement protocols
scientific article

    Statements

    Security weaknesses of a signature scheme and authenticated key agreement protocols (English)
    0 references
    0 references
    14 April 2014
    0 references
    cryptography
    0 references
    identity-based
    0 references
    deterministic signature
    0 references
    aggregate signature
    0 references
    key authentication
    0 references
    two-party key agreement
    0 references

    Identifiers