Author of the publication

Provably Secure Key Exchange: An Engineering Approach.

, , and . ACSW, volume 21 of CRPIT, page 97-104. Australian Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provably Secure Key Exchange: An Engineering Approach., , and . ACSW, volume 21 of CRPIT, page 97-104. Australian Computer Society, (2003)Certificateless Key Agreement in the Standard Model., and . AISC, volume 105 of CRPIT, page 75-85. Australian Computer Society, (2010)A Novel Method to Maintain Privacy in Mobile Agent Applications., , , , and . CANS, volume 3810 of Lecture Notes in Computer Science, page 247-260. Springer, (2005)3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function., , , and . IACR Cryptology ePrint Archive, (2005)Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1., , and . IACR Cryptology ePrint Archive, (2005)On Forward Secrecy in One-Round Key Exchange., and . IMACC, volume 7089 of Lecture Notes in Computer Science, page 451-468. Springer, (2011)Key Recovery in Third Generation Wireless Communication Systems., , , and . Public Key Cryptography, volume 1751 of Lecture Notes in Computer Science, page 223-237. Springer, (2000)Key Recovery System for the Commercial Environment., , , and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 149-162. Springer, (2000)Automated Proofs for Diffie-Hellman-Based Key Exchanges., , and . CSF, page 51-65. IEEE Computer Society, (2011)