Key Establishment Using Signcryption Techniques
From MaRDI portal
Publication:3000038
DOI10.1007/978-3-540-89411-7_11zbMath1217.68085OpenAlexW76173012MaRDI QIDQ3000038
Publication date: 18 May 2011
Published in: Practical Signcryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-89411-7_11
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Protocols for authentification and key establishment
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- New directions in cryptography
- On the security of public key protocols
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- On the Connection Between Signcryption and One-Pass Key Establishment
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- Information Security
- Progress in Cryptology - INDOCRYPT 2004
- Public Key Cryptography - PKC 2006
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Key Establishment Using Signcryption Techniques