Applied Cryptography and Network Security
From MaRDI portal
Publication:4680938
DOI10.1007/b98360zbMath1103.68520MaRDI QIDQ4680938
No author found.
Publication date: 13 June 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98360
94A60: Cryptography
68P25: Data encryption (aspects in computer science)
94A62: Authentication, digital signatures and secret sharing
Related Items
Round-optimal password-based authenticated key exchange, Provably secure three-party password-based authenticated key exchange protocol, Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal, Strongly secure authenticated key exchange from factoring, codes, and lattices, A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols, Comment on a certificateless one-pass and two-party authenticated key agreement protocol, On Forward Secrecy in One-Round Key Exchange, Efficient One-Round Key Exchange in the Standard Model, A Provably Secure One-Pass Two-Party Key Establishment Protocol