Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Top Cited Papers
- 15 April 2001
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
- Vol. 2001, 453-474
- https://doi.org/10.1007/3-540-44987-6_28
Abstract
No abstract availableKeywords
This publication has 22 references indexed in Scilit:
- Entity Authentication and Key DistributionPublished by Springer Nature ,2001
- Security and Composition of Multiparty Cryptographic ProtocolsJournal of Cryptology, 2000
- Relations among notions of security for public-key encryption schemesPublished by Springer Nature ,1998
- Systematic design of a family of attack-resistant authentication protocolsIEEE Journal on Selected Areas in Communications, 1993
- Authentication and authenticated key exchangesDesigns, Codes and Cryptography, 1992
- Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minorityJournal of Cryptology, 1991
- Advances in Cryptology — CRYPTO’ 88Published by Springer Nature ,1990
- The Knowledge Complexity of Interactive Proof SystemsSIAM Journal on Computing, 1989
- How to construct random functionsJournal of the ACM, 1986
- New directions in cryptographyIEEE Transactions on Information Theory, 1976