Public-Key Cryptography (1991)

Cached

Download Links

by James Nechvatal
Citations:7 - 0 self

Documents Related by Co-Citation

1007 Applied Cryptography – B Schneier - 1996
7 The internet billing server transaction protocol alternatives – K R O'Toole - 1994
3 A Neglected Aspect of Digital Signatures – W Tsang, J John - 1987
2 Protecting Poorly Chosen Secrets Against Guessing Attacks – L Gong, M Lomas, R Needham, J Saltzer - 1993
2 A Method for Obtaining Digital Signatures – R Rivest, A Shamir, L Adleman - 1978
13 A Logic of Authentication. Research Report 39, Digital Systems Research Center – Michael Burrows, Mart n Abadi, Roger Needham - 1989
21 Formal Requirements for Key Distribution Protocols – Paul Syverson, Catherine Meadows - 1995
21 Exploring the BAN Approach to Protocol Analysis – E Snekkenes
25 Reasoning about Accountability in Protocols for Electronic Commerce – R Kailar - 1995
33 Undetectable On-line Password Guessing Attacks – Yun Ding, Patrick Horster, Yun Ding \delta Patrick Horster, Yun Ding \delta Patrick Horster - 1995
54 Cryptographic Protocols – Richard A. DeMillo, Nancy A. Lynch, Michael Y. Merritt - 1982
116 Robustness Principles for Public Key Protocols – Ross Anderson, Roger Needham - 1995
48 Protocol Failures in Cryptosystems – Judy H Moore - 1988
17 Logics for Cryptographic Protocols - Virtues and Limitations – V. D. Gligor, Gligor Kailar, S. Stubblebine, L. Gong - 1991
1109 A public key cryptosystem and a signature scheme based on discrete logarithms – T ElGamal - 1985
35 On a Limitation of BAN Logic – Colin Boyd, Wenbo Mao - 1993
354 Prudent Engineering Practice for Cryptographic Protocols – Martin Abadi, Roger Needhamt - 1994
104 The Design and Implementation of a Secure Auction Service – Matthew Franklin, Michael Reiter - 1995
56 Cryptographic Protocols – M Merritt - 1983