|
Volumn 15, Issue 2, 2002, Pages 139-148
|
Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack
|
Author keywords
Key words. q th Roots, Discrete logarithms, Key exchange, Signature scheme
|
Indexed keywords
COMPUTER APPLICATIONS;
CRYPTOGRAPHY;
AUTHENTICATED KEY EXCHANGE;
COMPOSITE INTEGERS;
COMPUTATION COSTS;
DISCRETE LOGARITHM PROBLEMS;
MAN IN THE MIDDLE ATTACKS;
PROVABLY SECURE;
ROOT PROBLEMS;
SQUARE ROOTS;
AUTHENTICATION;
|
EID: 4944240675
PISSN: 09332790
EISSN: 14321378
Source Type: Journal
DOI: 10.1007/s00145-001-0017-4 Document Type: Article |
Times cited : (23)
|
References (0)
|