scientific article; zbMATH DE number 2217755
From MaRDI portal
Publication:5699490
Recommendations
Cited in
(6)- Key agreement under tropical parallels
- The GN-authenticated key agreement
- Application of differential cryptography to a GN authentication hierarchy scheme
- Computational Science and Its Applications – ICCSA 2004
- An efficient protocol for authenticated key agreement
- Authentification ranks with identities based on elliptic curves
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5699490)