Security Protocols, Constraint Systems, and Group Theories
From MaRDI portal
Publication:2908488
DOI10.1007/978-3-642-31365-3_15zbMATH Open1358.68185OpenAlexW1494214213MaRDI QIDQ2908488FDOQ2908488
Daniel Pasaila, Stéphanie Delaune, Steve Kremer
Publication date: 5 September 2012
Published in: Automated Reasoning (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-31365-3_15
Recommendations
- Designing key transport protocols using combinatorial group theory
- scientific article
- Group theoretic cryptography
- An application of group theory in confidential network communications
- Group theory in cryptography
- scientific article; zbMATH DE number 1017514
- Security, Cryptography and Directed Bigraphs
- Cryptographic group actions and applications
Symbolic computation and algebraic computation (68W30) Cryptography (94A60) Specification and verification (program logics, model checking, etc.) (68Q60) Logic in computer science (03B70)
Cited In (4)
This page was built for publication: Security Protocols, Constraint Systems, and Group Theories
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2908488)