The GN-authenticated key agreement
From MaRDI portal
Publication:2572038
DOI10.1016/J.AMC.2004.12.013zbMATH Open1076.94013OpenAlexW1984413599MaRDI QIDQ2572038FDOQ2572038
Authors: George Stephanides, Nicolae Constantinescu
Publication date: 14 November 2005
Published in: Applied Mathematics and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.amc.2004.12.013
Recommendations
Cryptography (94A60) Applications to coding theory and cryptography of arithmetic geometry (14G50) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Title not available (Why is that?)
- An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.)
- Monte Carlo Methods for Index Computation (mod p)
- Title not available (Why is that?)
- Key agreement protocols and their security analysis
- Cryptography. Theory and practice
- Title not available (Why is that?)
- Parallel collision search with cryptanalytic applications
- Title not available (Why is that?)
- Title not available (Why is that?)
- Algorithms for exponentiation in finite fields
- An efficient protocol for authenticated key agreement
- Title not available (Why is that?)
- A Remark Concerning m-Divisibility and the Discrete Logarithm in the Divisor Class Group of Curves
- Title not available (Why is that?)
Cited In (6)
This page was built for publication: The GN-authenticated key agreement
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2572038)