Cryptographic analysis of the Bluetooth secure connection protocol suite
From MaRDI portal
Publication:6157540
Cites work
- scientific article; zbMATH DE number 1024060 (Why is no real title available?)
- Breaking the Bluetooth pairing -- the fixed coordinate invalid curve attack
- Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1
- Highly efficient key exchange protocols with optimal tightness
- On the security of TLS-DHE in the standard model
- On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments
- PRF-ODH: relations, instantiations, and impossibility results
- Practical and tightly-secure digital signatures and authenticated key exchange
This page was built for publication: Cryptographic analysis of the Bluetooth secure connection protocol suite
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6157540)