Author:
Dagdelen Özgür,Fischlin Marc,Gagliardoni Tommaso,Marson Giorgia Azzurra,Mittelbach Arno,Onete Cristina
Publisher
Springer Berlin Heidelberg
Reference51 articles.
1. Lecture Notes in Computer Science;M. Abdalla,2005
2. Albrecht, M.R., Paterson, K.G., Watson, G.J.: Plaintext recovery attacks against SSH. In: 2009 IEEE Symposium on Security and Privacy, pp. 16–26. IEEE Computer Society Press (May 2009)
3. Smart Card Alliance: Industry technical contributions: Opacity (April 2013),
http://www.smartcardalliance.org/pages/smart-cards-contributions-opacity
4. ANSI X9-63-199X – Public key cryptography for the financial services industry: Key agreement and key transport using elliptic curve cryptography (1999)
5. Lecture Notes in Computer Science;M. Bellare,1994
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences;2023-09-01
2. A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client Hello;Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security;2022-11-07
3. Post-quantum Anonymous One-Sided Authenticated Key Exchange Without Random Oracles;Public-Key Cryptography – PKC 2022;2022
4. Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake;Public-Key Cryptography – PKC 2022;2022
5. Key Exchanges;Lattice-Based Cryptosystems;2020