Author of the publication

Errors in Computational Complexity Proofs for Protocols.

, , and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 624-643. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Errors in Computational Complexity Proofs for Protocols., , and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 624-643. Springer, (2005)Examining Indistinguishability-Based Proof Models for Key Establishment Protocols., , and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 585-604. Springer, (2005)Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols., and . ACISP, volume 3574 of Lecture Notes in Computer Science, page 429-442. Springer, (2005)A Password-Based Authenticator: Security Proof and Applications., , , , and . INDOCRYPT, volume 2904 of Lecture Notes in Computer Science, page 388-401. Springer, (2003)Tripartite Key Exchange in the Canetti-Krawczyk Proof Model., , and . INDOCRYPT, volume 3348 of Lecture Notes in Computer Science, page 17-32. Springer, (2004)Improvements to the RAK Factoring Algorithm., , , and . Cryptographic Algorithms and their Uses, page 152-. Queensland University of Technology, (2004)RAK factoring algorithm., , , , and . Australas. J Comb., (2005)On Session Key Construction in Provably-Secure Key Establishment Protocols., , and . Mycrypt, volume 3715 of Lecture Notes in Computer Science, page 116-131. Springer, (2005)Complementing Computational Protocol Analysis with Formal Specifications., , , and . Formal Aspects in Security and Trust, volume 173 of IFIP, page 129-144. Springer, (2004)Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves., , , and . Selected Areas in Cryptography, volume 3897 of Lecture Notes in Computer Science, page 205-220. Springer, (2005)