Several practical protocols for authentication and key exchange
From MaRDI portal
Publication:673818
DOI10.1016/0020-0190(94)00178-2zbMath0875.68377OpenAlexW1966334376MaRDI QIDQ673818
Publication date: 28 February 1997
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/0020-0190(94)00178-2
Data encryption (aspects in computer science) (68P25) Parallel algorithms in computer science (68W10)
Cites Work
- Efficient signature generation by smart cards
- An interactive identification scheme based on discrete logarithms and factoring
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- How to Utilize the Randomness of Zero-Knowledge Proofs
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Several practical protocols for authentication and key exchange