Pages that link to "Item:Q5451094"
From MaRDI portal
The following pages link to Errors in Computational Complexity Proofs for Protocols (Q5451094):
Displaying 10 items.
- Timed encryption with application to deniable key exchange (Q477191) (← links)
- A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol (Q621633) (← links)
- Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode (Q848272) (← links)
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange (Q865906) (← links)
- On security analysis of an after-the-fact leakage resilient key exchange protocol (Q888956) (← links)
- Cryptanalysis of simple three-party key exchange protocol (S-3PAKE) (Q931089) (← links)
- Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks (Q2456502) (← links)
- Traceable Privacy of Recent Provably-Secure RFID Protocols (Q3506416) (← links)
- Automating Computational Proofs for Public-Key-Based Key Exchange (Q4933211) (← links)
- Chasing Diagrams in Cryptography (Q5414973) (← links)