ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
25
views
22
references
Top references
cited by
8
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
897
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Selected Areas in Cryptography
Authenticated Diffe-Hellman Key Agreement Protocols
other
Author(s):
Simon Blake-Wilson
,
Alfred Menezes
Publication date
(Online):
March 28 2002
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
JMIR: Research Protocols
Most cited references
22
Record
: found
Abstract
: not found
Article
: not found
A logic of authentication
Michael P Burrows
,
Martín Abadi
,
Roger Needham
(1990)
0
comments
Cited
229
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Authentication and authenticated key exchanges
Whitfield Diffie
,
Paul C. van Oorschot
,
Michael J. Wiener
(1992)
0
comments
Cited
81
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
Mihir Bellare
,
Phillip Rogaway
(1996)
0
comments
Cited
77
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
1999
Publication date (Online):
March 28 2002
Pages
: 339-361
DOI:
10.1007/3-540-48892-8_26
SO-VID:
72102d6c-dcb9-4538-a253-244681d5e79e
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 248
IDEA: A Cipher for Multimedia Architectures?
pp. 81
Storage-Efficient Finite Field Basis Conversion
pp. 190
Faster Attacks on Elliptic Curve Cryptosystems
pp. 201
Improved Algorithms for Elliptic Curve Arithmetic in GF(2n)
pp. 339
Authenticated Diffe-Hellman Key Agreement Protocols
Similar content
897
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties
Authors:
Benedikt Schmidt
,
Simon Meier
,
Cas Cremers
…
More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE)
Authors:
T Kivinen
,
M. Kojo
,
M. KOJO
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication
Authors:
Michel Abdalla
,
David Pointcheval
See all similar
Cited by
8
Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem
Authors:
Kee-Young Yoo
,
Eun-Jun Yoon
Round-Optimal Contributory Conference Key Agreement
Authors:
Colin Boyd
,
Juan Manuel González Nieto
Tripartite Authenticated Key Agreement Protocols from Pairings
Authors:
Sattam S. Al-Riyami
,
Kenneth G. Paterson
See all cited by