Back to Results
First PageMeta Content



Modular Security Proofs for Key Agreement Protocols Caroline Kudla? and Kenneth G. Paterson Information Security Group Royal Holloway, University of London, UK {c.j.kudla,kenny.paterson}@rhul.ac.uk
Add to Reading List

Document Date: 2005-08-23 12:50:20


Open Document

File Size: 216,45 KB

Share Result on Facebook

Company

Wilson / Oracle / Hewlett-Packard Laboratories / /

/

Facility

University of London / /

IndustryTerm

secure protocols / few protocols / agreement protocols / authenticated key agreement protocols / given protocol / secure protocol / certain very efficient protocols / certain key agreement protocols / basic protocols / non-modular protocols / secure key agreement protocol / lightweight key agreement protocols / course protocols / secure key agreement protocols / agreement protocol / mBR-attack protocol / /

Organization

University of London / /

Person

Kenneth G. Paterson / Caroline Kudla / /

Position

author / /

Technology

encryption / mBR-secure AKE protocol / cryptography / resulting protocols / authenticated key agreement protocols / public key / lightweight key agreement protocols / long-standing Protocol / key agreement protocol / Setup algorithm / agreement protocols / mBR-attack protocol / secure key agreement protocol / certain key agreement protocols / course protocols / related protocol / given protocol / private key / NR-mBR-attack protocol / relatively few protocols / secret key / 4.1 Protocol / key agreement protocols / secure protocol / secure key agreement protocols / constructing key agreement protocols / NR-mBR-secure key agreement protocol / constructing a secure protocol / /

SocialTag