On the Risk of Opening Distributed Keys
- 13 July 2001
- book chapter
- Published by Springer Nature
- p. 308-317
- https://doi.org/10.1007/3-540-48658-5_29
Abstract
No abstract availableKeywords
This publication has 22 references indexed in Scilit:
- Systematic Design of Two-Party Authentication ProtocolsPublished by Springer Nature ,2001
- Towards practical “proven secure” authenticated key distributionPublished by Association for Computing Machinery (ACM) ,1993
- Authentication and authenticated key exchangesDesigns, Codes and Cryptography, 1992
- Secure implementation of identification systemsJournal of Cryptology, 1991
- A logic of authenticationACM Transactions on Computer Systems, 1990
- Zero-Knowledge Authentication Scheme with Secret Key ExchangeLecture Notes in Computer Science, 1990
- On the formal specification and verification of a multiparty session protocolPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- Ways to verify the US-Soviet arms pactIEEE Spectrum, 1988
- Digital signatures with RSA and other public-key cryptosystemsCommunications of the ACM, 1984
- New directions in cryptographyIEEE Transactions on Information Theory, 1976