Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1341873 - MaRDI portal

scientific article; zbMATH DE number 1341873

From MaRDI portal
Publication:4263430

zbMath0929.68056MaRDI QIDQ4263430

Simon Blake-Wilson, Alfred J. Menezes

Publication date: 1 February 2000


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable, Certificateless signature: a new security model and an improved generic construction, Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes, Cryptanalysis of tripartite and multi-party authenticated key agreement protocols, Malleability and ownership of proxy signatures: towards a stronger definition and its limitations, Methodology for assessing the security of cryptographic protocols, The random oracle model: a twenty-year retrospective, A Critical Analysis and Improvement of AACS Drive-Host Authentication, A round-optimal three-party ID-based authenticated key agreement protocol, Two-pass authenticated key exchange with explicit authentication and tight security, Lattice-based completely non-malleable public-key encryption in the standard model, The lattice-based digital signature scheme qTESLA, Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal, Атаки на схемы электронной подписи, не учитываемые традиционными определениями стойкости, и меры противодействия им, Efficient identity-based authenticated key agreement protocol from pairings, Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings, Key Substitution in the Symbolic Analysis of Cryptographic Protocols, Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS, Privacy-preserving authenticated key exchange and the case of IKEv2, An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable, Security flaws in authentication and key establishment protocols for mobile communications