Amanote Research

Amanote Research

    RegisterSign In

Extending Cryptographic Logics of Belief to Key Agreement Protocols

doi 10.1145/168588.168617
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 1993

Authors
Paul van Oorschot
Publisher

ACM Press


Related search

Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols

English

Certificateless Authenticated Two-Party Key Agreement Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2007English

Modular Security Proofs for Key Agreement Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2005English

On the Security of Authenticated Group Key Agreement Protocols

Scalable Computing
Computer Science
2019English

Programming Cryptographic Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2005English

Cryptographic Protocols From Lattices

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

Multi-Exponentiation (Cryptographic Protocols)

IEE Proceedings - Computers and Digital Techniques
1994English

Cryptanalysis on Identity-Based Authenticated Key Agreement Protocols From Pairings

Journal of Networks
2010English

On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2006English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy