Cited By
View all- Bicakci KCrispo BOligeri G(2013)LAKEACM Transactions on Internet Technology10.1145/2542214.254221613:2(1-27)Online publication date: 1-Dec-2013
- Lauter KMityagin A(2006)Security analysis of KEA authenticated key exchange protocolProceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography10.1007/11745853_25(378-394)Online publication date: 24-Apr-2006
- Kudla CPaterson K(2005)Modular security proofs for key agreement protocolsProceedings of the 11th international conference on Theory and Application of Cryptology and Information Security10.1007/11593447_30(549-565)Online publication date: 4-Dec-2005
- Show More Cited By