Author of the publication

Weaknesses in Shared RSA Key Generation Protocols.

, , , and . IMACC, volume 1746 of Lecture Notes in Computer Science, page 300-306. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques., and . Security Protocols Workshop, volume 1361 of Lecture Notes in Computer Science, page 137-158. Springer, (1997)Weaknesses in Shared RSA Key Generation Protocols., , , and . IMACC, volume 1746 of Lecture Notes in Computer Science, page 300-306. Springer, (1999)Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol., and . Public Key Cryptography, volume 1560 of Lecture Notes in Computer Science, page 154-170. Springer, (1999)Key Agreement Protocols and Their Security Analysis., , and . IMACC, volume 1355 of Lecture Notes in Computer Science, page 30-45. Springer, (1997)Securing Aeronautical Telecommunications.. IMACC, volume 1746 of Lecture Notes in Computer Science, page 243. Springer, (1999)Authenticated Diffie-Hellman Key Agreement Protocols., and . Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, page 339-361. Springer, (1998)Constant Weight Codes and Group Divisible Designs., and . Des. Codes Cryptogr., 16 (1): 11-27 (1999)