Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
65
views
12
references
Top references
cited by
37
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,638
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Crytography and Coding
Key agreement protocols and their security analysis
other
Author(s):
Simon Blake-Wilson
,
Don Johnson
,
Alfred Menezes
Publication date
(Online):
June 17 2005
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
JMIR: Research Protocols
Most cited references
12
Record
: found
Abstract
: not found
Book Chapter
: not found
Optimal asymmetric encryption
Mihir Bellare
,
Phillip Rogaway
(1995)
0
comments
Cited
114
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Authentication and authenticated key exchanges
Whitfield Diffie
,
Paul C. van Oorschot
,
Michael J. Wiener
(1992)
0
comments
Cited
82
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
Mihir Bellare
,
Phillip Rogaway
(1996)
0
comments
Cited
77
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
1997
Publication date (Online):
June 17 2005
Pages
: 30-45
DOI:
10.1007/BFb0024447
SO-VID:
8cbd865b-f5c3-4ee5-bd96-19e940bee631
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 30
Key agreement protocols and their security analysis
pp. 131
Finding small roots of univariate modular equations revisited
pp. 161
A digital signature scheme based on random error-correcting codes
Similar content
3,638
AOW-leeftijd op basis van principeakkoord juni 2019 [Statutory retirement age based on the principle agreement June 2019]
Authors:
International agreement of recording practices: Guidelines approved by the General Assembly held in Kuopio
Authors:
Judge-Jury Agreement in Criminal Cases: A Partial Replication of Kalven and Zeisel's The American Jury
Authors:
Theodore Eisenberg
,
Paula Hannaford-Agor
,
Valerie Hans
…
See all similar
Cited by
37
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Authors:
Ran Canetti
,
Hugo Krawczyk
Universally Composable Notions of Key Exchange and Secure Channels
Authors:
Ran Canetti
,
Hugo Krawczyk
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
Authors:
Victor. Boyko
,
Philip MacKenzie
,
Sarvar Patel
See all cited by