On the Security of Multi-Party Ping-Pong Protocols (1985)

Cached

Download Links

by Shimon Even , Oded Goldreich
Citations:59 - 1 self

Active Bibliography

1 Cryptology – Prof Ronald Rivest, L. Rivest
17 Lecture Notes on Cryptography – Shafi Goldwasser, Mihir Bellare - 2001
unknown title – Foreword Whitfield Diffie
19 Complexity and Security of Distributed Protocols – Matthew Keith Franklin - 1993
7 Varieties of Secure Distributed Computing – Matthew Franklin, Moti Yung - 1996
6 A Method for Examining Cryptographic Protocols – Brett C. Tjaden - 1997
12 Efficient Cryptographic Protocols Preventing “Man-in-the-Middle” Attacks – Jonathan Katz - 2002
17 Open Questions, Talk Abstracts, and Summary of Discussions – Joan Feigenbaum, Michael Merritt - 1991
333 Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) – Martín Abadi, Phillip Rogaway - 2000
Augmented Encrypted Key Exchange: – Password-Based Protocol Secure, Steven M. Bellovin, Michael Merritt - 1993
Introduction to Foundations of Security Protocols – R. Ramanujam, S. P. Suresh
1 Formal Model of Basic Concepts – Andre Adelsbach, Birgit Pfitzmann (eds.), Birgit Pfitzmann (editors, Universität Des Saarl - 1999
2 Private information retrieval: Improved upper bound, extension and applications – Jean-françois Raymond - 2000
Enhancements of Trapdoor Permutations – Oded Goldreich, Ron D. Rothblum - 2012
1 Combinatorics in Computer Science – L. Lovász, D.B. Shmoys, É. Tardos - 1990
75 Session-Key Generation using Human Passwords Only – Oded Goldreich, Yehuda Lindell - 2001
1132 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
A Glossary of Complexity Classes – n.n.
64 Computational Complexity: A Conceptual Perspective – Oded Goldreich - 2006