Applied Cryptography and Network Security
From MaRDI portal
Publication:4680938
DOI10.1007/b98360zbMath1103.68520OpenAlexW4301861138MaRDI QIDQ4680938
No author found.
Publication date: 13 June 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98360
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items
Round-optimal password-based authenticated key exchange, Efficient One-Round Key Exchange in the Standard Model, Provably secure three-party password-based authenticated key exchange protocol, Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal, Strongly secure authenticated key exchange from factoring, codes, and lattices, A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols, A Provably Secure One-Pass Two-Party Key Establishment Protocol, Comment on a certificateless one-pass and two-party authenticated key agreement protocol, On Forward Secrecy in One-Round Key Exchange