Author:
Sarr Augustin P.,Elbaz-Vincent Philippe,Bajard Jean-Claude
Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. Basin, D., Cremers, C.: From Dolev–Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries. Cryptology ePrint Archive, Report 2009/079 (2009)
2. Canetti, R., Krawczyk, H.: Analysis of Key–Exchange Protocols and Their Use for Building Secure Channels. Cryptology ePrint Archive, Report 2001/040 (2001)
3. Lecture Notes in Computer Science;K. Gopalakrishnan,2007
4. Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2003)
5. Krawczyk, H.: HMQV: A Hight Performance Secure Diffie–Hellman Protocol. Cryptology ePrint Archive, Report 2005/176 (2005)
Cited by
29 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献