Author:
Alvarez Bermejo J. A.,Lodroman M. A.,Lopez-Ramos J. A.
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference14 articles.
1. Cao X, Kou W, Du X (2010) A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf Sci 180(15):2895–2903
2. Chen L, Kudla C (2003) Identity based authenticated key agreement protocols from pairings. In: Proceedings 16th IEEE, Computer security foundations workshop, pp 219–233
3. Cheng Z, Nistazakis M, Comley R, Vasiu L (2004) On the indistinguishability-based security model of key agreement protocols-simple cases. In: Proceedings of ACNS, vol 4. Citeseer
4. ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. Inf Theory IEEE Trans 31(4):469–472
5. Kale L, Arya A, Bhatele A, Gupta A, Jain N, Jetley P et al (2011) Charm++ for productivity and performance: a submission to the 2011 HPC Class II Challenge. 11–49