Several practical protocols for authentication and key exchange
- 27 January 1995
- journal article
- Published by Elsevier in Information Processing Letters
- Vol. 53 (2), 91-96
- https://doi.org/10.1016/0020-0190(94)00178-2
Abstract
No abstract availableKeywords
This publication has 5 references indexed in Scilit:
- Provably Secure and Practical Identification Schemes and Corresponding Signature SchemesPublished by Springer Nature ,2001
- Algorithmic measures for preventing middleperson attack in identification schemesElectronics Letters, 1993
- An interactive identification scheme based on discrete logarithms and factoringJournal of Cryptology, 1992
- Secure implementation of identification systemsJournal of Cryptology, 1991
- Efficient signature generation by smart cardsJournal of Cryptology, 1991