Key agreement protocols and their security analysis
- 1 January 1997
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- Entity Authentication and Key DistributionPublished by Springer Science and Business Media LLC ,2001
- The Security of Cipher Block ChainingPublished by Springer Science and Business Media LLC ,2001
- On the Risk of Opening Distributed KeysPublished by Springer Science and Business Media LLC ,2001
- Systematic Design of Two-Party Authentication ProtocolsPublished by Springer Science and Business Media LLC ,2001
- Entity authentication and authenticated key transport protocols employing asymmetric techniquesPublished by Springer Science and Business Media LLC ,1998
- Key agreement protocols and their security analysisLecture Notes in Computer Science, 1997
- Minimizing the use of random oracles in authenticated encryption schemesPublished by Springer Science and Business Media LLC ,1997
- The Exact Security of Digital Signatures-How to Sign with RSA and RabinLecture Notes in Computer Science, 1996
- Security Proofs for Signature SchemesLecture Notes in Computer Science, 1996
- Authentication and authenticated key exchangesDesigns, Codes and Cryptography, 1992