Amanote Research
Register
Sign In
Extending Cryptographic Logics of Belief to Key Agreement Protocols
doi 10.1145/168588.168617
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 1993
Authors
Paul van Oorschot
Publisher
ACM Press
Related search
Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols
Certificateless Authenticated Two-Party Key Agreement Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Modular Security Proofs for Key Agreement Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
On the Security of Authenticated Group Key Agreement Protocols
Scalable Computing
Computer Science
Programming Cryptographic Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Cryptographic Protocols From Lattices
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Multi-Exponentiation (Cryptographic Protocols)
IEE Proceedings - Computers and Digital Techniques
Cryptanalysis on Identity-Based Authenticated Key Agreement Protocols From Pairings
Journal of Networks
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science