Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Maurizio Strangio
On the Feasibility of Key Compromise Impersonation Attacks Against the Elliptic Curve Version of the MTI/C0 Key Agreement Protocol
International Journal of Information and Electronics Engineering
Related publications
A Lightweight ID-Based Strong Designated Verifier Signature Scheme Against Key-Compromise Attacks
Journal of Software
Multiparty Key Agreement Protocol Based on Symmetric Techniques
Communications of the Korean Mathematical Society
Mathematics
Applied Mathematics
Faster Attacks on Elliptic Curve Cryptosystems
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Fast Elliptic Curve Multiplications Resistant Against Side Channel Attacks
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Electronic Engineering
Computer Graphics
Signal Processing
Applied Mathematics
Electrical
Computer-Aided Design
Freshness Consideration of Hierarchical Key Agreement Protocol in WSNs
International Journal of Security and its Applications
Computer Science
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
An Improved Certificate-Less Authenticated Key Agreement Protocol
DEStech Transactions on Computer Science and Engineering
On the Security of Authenticated Group Key Agreement Protocols
Scalable Computing
Computer Science
An Improvement of the User Identification and Key Agreement Protocol With User Anonymity
Informatica
Applied Mathematics
Information Systems