scientific article; zbMATH DE number 1341873
From MaRDI portal
Publication:4263430
zbMath0929.68056MaRDI QIDQ4263430
Simon Blake-Wilson, Alfred J. Menezes
Publication date: 1 February 2000
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items
An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable, Certificateless signature: a new security model and an improved generic construction, Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes, Cryptanalysis of tripartite and multi-party authenticated key agreement protocols, Malleability and ownership of proxy signatures: towards a stronger definition and its limitations, Methodology for assessing the security of cryptographic protocols, The random oracle model: a twenty-year retrospective, A Critical Analysis and Improvement of AACS Drive-Host Authentication, A round-optimal three-party ID-based authenticated key agreement protocol, Two-pass authenticated key exchange with explicit authentication and tight security, Lattice-based completely non-malleable public-key encryption in the standard model, The lattice-based digital signature scheme qTESLA, Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal, Атаки на схемы электронной подписи, не учитываемые традиционными определениями стойкости, и меры противодействия им, Efficient identity-based authenticated key agreement protocol from pairings, Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings, Key Substitution in the Symbolic Analysis of Cryptographic Protocols, Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS, Privacy-preserving authenticated key exchange and the case of IKEv2, An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable, Security flaws in authentication and key establishment protocols for mobile communications