Entity authentication and authenticated key transport protocols employing asymmetric techniques
- 1 January 1998
- book chapter
- Published by Springer Nature
- p. 137-158
- https://doi.org/10.1007/bfb0028166
Abstract
No abstract availableKeywords
This publication has 17 references indexed in Scilit:
- Handbook of Applied CryptographyPublished by Taylor & Francis ,2018
- The Exact Security of Digital Signatures-How to Sign with RSA and RabinPublished by Springer Nature ,1996
- Security Proofs for Signature SchemesPublished by Springer Nature ,1996
- Optimal asymmetric encryptionPublished by Springer Nature ,1995
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993
- Authentication and authenticated key exchangesDesigns, Codes and Cryptography, 1992
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- Secure communications over insecure channelsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976