The following pages link to New directions in cryptography (Q3875826):
Displaying 14 items.
- Efficient set intersection with simulation-based security (Q271588) (← links)
- An attack on the Needham-Schroeder public-key authentication protocol (Q672251) (← links)
- The \(l\)-th power Diffie-Hellman problem and the \(l\)-th root Diffie-Hellman problem (Q683912) (← links)
- The ring authenticated encryption scheme-how to provide a clue wisely (Q1007859) (← links)
- The twin Diffie-Hellman problem and applications (Q1037234) (← links)
- Attacks to some verifiable multi-secret sharing schemes and two improved schemes (Q1750542) (← links)
- Efficient big integer multiplication and squaring algorithms for cryptographic applications (Q2336123) (← links)
- A provably secure proxy signcryption scheme using bilinear pairings (Q2336432) (← links)
- Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks (Q2864178) (← links)
- Gate Elimination for Linear Functions and New Feebly Secure Constructions (Q3007624) (← links)
- An algebraic approach to the verification of a class of Diffie-Hellman protocols (Q3435341) (← links)
- Optimal Randomness Extraction from a Diffie-Hellman Element (Q3627458) (← links)
- Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness (Q3637144) (← links)
- Algebraic curves and cryptography (Q5921638) (← links)