메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 234-247

The Diffie-Hellman key-agreement scheme in the strand-space model

Author keywords

Algorithm design and analysis; Character generation; Complexity theory; Computational modeling; Cryptographic protocols; DC generators; National security; Public key; Public key cryptography; Terminology

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; DC GENERATORS; FORMAL METHODS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; SECURITY SYSTEMS; TERMINOLOGY;

EID: 12144271120     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2003.1212716     Document Type: Conference Paper
Times cited : (39)

References (13)
  • 1
    • 84978977131 scopus 로고    scopus 로고
    • Formal eavesdropping and its computational interpretation
    • Martín Abadi and Jan Jürjens. Formal eavesdropping and its computational interpretation. Lecture Notes in Computer Science, 2215:82ff., 2001.
    • (2001) Lecture Notes in Computer Science , vol.2215
    • Abadi, M.1    Jürjens, J.2
  • 2
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • Martín Abadi and Phillip Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 4
    • 84947778144 scopus 로고    scopus 로고
    • The decision Diffie-Hellman problem
    • Proceedings of the Third Algorithmic Number Theory Symposium, Springer- Verlag
    • Dan Boneh. The decision Diffie-Hellman problem. In Proceedings of the Third Algorithmic Number Theory Symposium, number 1423 in Lecture Notes in Computer Science, pages 48-63. Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , Issue.1423 , pp. 48-63
    • Boneh, D.1
  • 8
    • 3042635426 scopus 로고    scopus 로고
    • The faithfulness of abstract protocol analysis: Message authentication
    • Forthcoming
    • Joshua D. Guttman, F. Javier Thayer, and Lenore D. Zuck. The faithfulness of abstract protocol analysis: Message authentication. Journal of Computer Security, 2003. Forthcoming.
    • (2003) Journal of Computer Security
    • Guttman, J.D.1    Thayer, F.J.2    Zuck, L.D.3
  • 10
    • 0034822650 scopus 로고    scopus 로고
    • A security analysis of the cliques protocols suites
    • Cape Breton, Canada, 11-13 June IEEE Computer Society Press
    • Olivier Pereira and Jean-Jacques Quisquater. A security analysis of the cliques protocols suites. In 14th IEEE Computer Security Foundations Workshop - CSFW'01, pages 73-81, Cape Breton, Canada, 11-13 June 2001. IEEE Computer Society Press.
    • (2001) 14th IEEE Computer Security Foundations Workshop - CSFW'01 , pp. 73-81
    • Pereira, O.1    Quisquater, J.-J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.