Delegation of cryptographic servers for capture-resilient devices
From MaRDI portal
Publication:5138499
Recommendations
Cites work
- scientific article; zbMATH DE number 176565 (Why is no real title available?)
- scientific article; zbMATH DE number 1302835 (Why is no real title available?)
- scientific article; zbMATH DE number 1088907 (Why is no real title available?)
- scientific article; zbMATH DE number 1842489 (Why is no real title available?)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- A method for obtaining digital signatures and public-key cryptosystems
- A public key cryptosystem and a signature scheme based on discrete logarithms
- The Diffie-Hellman protocol
- The exact security of digital signatures -- how to sign with RSA and Rabin
Cited in
(7)- scientific article; zbMATH DE number 1424190 (Why is no real title available?)
- Decoy-based information security
- Hardware security without secure hardware: how to decrypt with a password and a server
- scientific article; zbMATH DE number 1941226 (Why is no real title available?)
- TARD: temporary access rights delegation for guest network devices
- Password Mistyping in Two-Factor-Authenticated Key Exchange
- Toward generic method for server-aided cryptography
This page was built for publication: Delegation of cryptographic servers for capture-resilient devices
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5138499)