Author:
Boyko Victor,MacKenzie Philip,Patel Sarvar
Publisher
Springer Berlin Heidelberg
Reference30 articles.
1. D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. J. of Cryptology, 4(2):75–122, 1991.
2. M. Bellare, R. Canetti, and H. Krawczyk. A modular approach to the design and analysis of authentication and key exchange protocols. In STOC’98, pages 419–428.
3. M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In EUROCRYPT 2000, pages 139–155.
4. M. Bellare and P. Rogaway. Entity authentication and key distribution. In CRYPTO’93, pages 232–249.
5. M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM Security (CCS’93), pages 62–73.
Cited by
307 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献