Back to Results
First PageMeta Content
Diffie–Hellman key exchange / Station-to-Station protocol / Diffie–Hellman problem / Key-agreement protocol / XTR / Advantage / Random self-reducibility / Public-key cryptography / Oracle machine / Cryptography / Cryptographic protocols / MQV


An extended abstract of this work appears in Proceedings of the 5th International Conference (SCN ’06) (6 – 8 september 2006, Maiori, Italy) M. Yung Ed., Springer-Verlag, LNCS 4116, Pages 156–172. About the Securit
Add to Reading List

Document Date: 2012-11-06 05:29:21


Open Document

File Size: 220,41 KB

Share Result on Facebook

City

Maiori / Paris / /

Company

H(R||B)s A / MTI / /

Country

France / Italy / /

Currency

pence / /

/

IndustryTerm

generic / wellknown algorithms / secure authenticated key exchange protocols / communication network / signature algorithm / /

MusicGroup

G / /

Organization

DCSSI Crypto Lab / /

Person

G. Indeed / M. Yung Ed / /

Position

Prime Minister / correspondent / probability Pm / Private / /

Technology

plain MQV protocol / plain Diffie-Hellman protocol / cryptography / exchange protocol / public key / key exchange protocol / key exchange protocols / Station-To-Station protocol / AKE protocols / signature algorithm / signed Diffie-Hellman protocol / two-pass protocol / private key / secret key / simulation / two-pass protocols / 2 secure authenticated key exchange protocols / Diffie-Hellman protocol / /

SocialTag