Delegation of cryptographic servers for capture-resilient devices
From MaRDI portal
Publication:5138499
DOI10.1007/S00446-003-0098-4zbMATH Open1448.68197OpenAlexW2017306439MaRDI QIDQ5138499FDOQ5138499
Authors: Michael K. Reiter, Philip MacKenzie
Publication date: 4 December 2020
Published in: Distributed Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00446-003-0098-4
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Computer security (68M25)
Cites Work
- A method for obtaining digital signatures and public-key cryptosystems
- The exact security of digital signatures -- how to sign with RSA and Rabin
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Title not available (Why is that?)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Title not available (Why is that?)
- Title not available (Why is that?)
- The Diffie-Hellman protocol
- Title not available (Why is that?)
Cited In (7)
- Title not available (Why is that?)
- Decoy-based information security
- Hardware security without secure hardware: how to decrypt with a password and a server
- Title not available (Why is that?)
- TARD: temporary access rights delegation for guest network devices
- Password Mistyping in Two-Factor-Authenticated Key Exchange
- Toward generic method for server-aided cryptography
This page was built for publication: Delegation of cryptographic servers for capture-resilient devices
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5138499)