The GN-authenticated key agreement
From MaRDI portal
Publication:2572038
Recommendations
Cites work
- scientific article; zbMATH DE number 1263181 (Why is no real title available?)
- scientific article; zbMATH DE number 1349933 (Why is no real title available?)
- scientific article; zbMATH DE number 503255 (Why is no real title available?)
- scientific article; zbMATH DE number 1113839 (Why is no real title available?)
- scientific article; zbMATH DE number 1980955 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- scientific article; zbMATH DE number 1406786 (Why is no real title available?)
- A Remark Concerning m-Divisibility and the Discrete Logarithm in the Divisor Class Group of Curves
- Algorithms for exponentiation in finite fields
- An efficient protocol for authenticated key agreement
- An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.)
- Cryptography. Theory and practice
- Key agreement protocols and their security analysis
- Monte Carlo Methods for Index Computation (mod p)
- Parallel collision search with cryptanalytic applications
Cited in
(6)- Application of differential cryptography to a GN authentication hierarchy scheme
- scientific article; zbMATH DE number 2217755 (Why is no real title available?)
- scientific article; zbMATH DE number 1583949 (Why is no real title available?)
- A generic variant of NIST'S KAS2 key agreement protocol
- An authenticated key exchange protocol in elliptic curve cryptography
- An efficient protocol for authenticated key agreement
This page was built for publication: The GN-authenticated key agreement
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2572038)