Key Establishment Using Signcryption Techniques
From MaRDI portal
Publication:3000038
DOI10.1007/978-3-540-89411-7_11zbMath1217.68085MaRDI QIDQ3000038
Publication date: 18 May 2011
Published in: Practical Signcryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-89411-7_11
68P25: Data encryption (aspects in computer science)
94A62: Authentication, digital signatures and secret sharing
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Protocols for authentification and key establishment
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- New directions in cryptography
- On the security of public key protocols
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- On the Connection Between Signcryption and One-Pass Key Establishment
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- Information Security
- Progress in Cryptology - INDOCRYPT 2004
- Public Key Cryptography - PKC 2006