Two phases encryption and its applications
From MaRDI portal
Publication:4406232
DOI10.1080/09720529.2002.10697955zbMath1022.68058MaRDI QIDQ4406232
Publication date: 25 June 2003
Published in: Journal of Discrete Mathematical Sciences and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/09720529.2002.10697955
94A60: Cryptography
68P25: Data encryption (aspects in computer science)
94A62: Authentication, digital signatures and secret sharing
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A note on Master keys for group sharing
- A new password authentication mechanism based on two phases encryption
- How to share a secret
- Communication Theory of Secrecy Systems*
- Relativized cryptography
- New directions in cryptography
- An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.)
- Using encryption for authentication in large networks of computers