Author:
Sukhodolskiy Ilya,Zapechnikov Sergey
Reference9 articles.
1. Bellare M. A forward secure digital signature scheme / M. Bellare, S. Miner // Advances in Cryptology — CRYPTO’ 99. 19th Annual International Cryptology Conference, Volume 1666 of Lecture Notes in Computer Science, pp. 431-448
2. Gunther C. An identity-based key-exchange protocol / C. Gunther // Advances in Cryptology – Eurocrypt 89 Proceedings, Lec. Notes in Comp. Sci. Vol. 434, J-J. Quisquater, J. Vandewille ed., Springer-Verlag, 1989.
3. Authentication and authenticated key exchanges;Diffie;Designs, Codes and Cryptography,1992
4. Milner K. Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications / K. Milner, C. Cremers, J. Yu, M. Ryan. 19 pp. URL: https://eprint.iacr.org/2017/234.pdf
5. Cohn-Gordon K. On Post-Compromise Security / K. Cohn-Gordon, C. Cremers, L. Garratt. Cryptology ePrint archive. Report 2016/221. 26 pp. URL: https://eprint.iacr.org/2016/221.pdf