The GN-authenticated key agreement
From MaRDI portal
Publication:2572038
DOI10.1016/j.amc.2004.12.013zbMath1076.94013MaRDI QIDQ2572038
Nicolae Constantinescu, George Stephanides
Publication date: 14 November 2005
Published in: Applied Mathematics and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.amc.2004.12.013
94A60: Cryptography
14G50: Applications to coding theory and cryptography of arithmetic geometry
94A62: Authentication, digital signatures and secret sharing
Related Items
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Parallel collision search with cryptanalytic applications
- Algorithms for exponentiation in finite fields
- An efficient protocol for authenticated key agreement
- An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.)
- Monte Carlo Methods for Index Computation (mod p)
- A Remark Concerning m-Divisibility and the Discrete Logarithm in the Divisor Class Group of Curves
- Key agreement protocols and their security analysis